Past Meeting Archive | Los Angeles ACM home page | National ACM home page | Click here for More Activities this month |
Check out the Southern California Tech Calendar |
~Announcement~ Regular Meeting of the Wednesday, January 10, 2007 "Privacy vs. Security" Round Table Discussion
Information System Problems, Privacy and Government Regulation, Data Retention, Should Internet companies be required to keep track of what their customers are doing? Should the government classify massive numbers of travelers as potential threats based on their travel habits?
The idea of data retention -- forcing Internet companies to keep track of what their customers are doing -- will probably be one of the biggest Political-Technical topics of 2007. That's when the new Congress will convene, and the FBI will resume its push for federal legislation. The groundwork is being laid right now. The International Association of Chiefs of Police endorsed the concept in a resolution, and FBI director Robert Mueller applauded them a few hours later:
www.fbi.gov/pressrel/speeches/mueller101706.htm.
Quote,
Government Surveillance and Wire-Tapping – Is it necessary to stop terrorism? Should it be allowed without warrants? Are there technical considerations that influence the choices? We have discussed these issues before, but they are still around and the government has different ideas than the ACLU and the Electronic Freedom Foundation about what constitutes reasonable actions.
There are many other possible topics. The purpose of this meeting is to have a lot of interaction with the audience. You may have your own issues that you wish to have discussed. If you want them introduced for discussion at the meeting, Contact:
Mike Walsh.
You can also call him at (818) 785-5056, but email contacts are preferred.
You are also welcome to just come to the meeting and add your comments from the floor.
|
~Summary~
LA ACM Chapter January Meeting, The presentation was "Privacy vs. Security – Are Changes Needed To Fight Terrorism?" This was a Round Table Discussion by all attendees present.
Mike Walsh started out with a quote from Newt Gingrich and some Electronic Freedom Foundation positions on these issues: Gingrich said:
I saw this quote in a right-wing email. I did a search, found that it was valid and that there were quite a number of outraged people who replied. One person seemed outraged that Gingrich had been given a platform by an organization favoring free speech to express his views. The right wing group claimed Newt's comments had created a "firestorm." Not true, they were mostly ignored. The Electronic Freedom Foundation (EFF) did not bother to mention the speech when I did a search on Gingrich on their website. They are much more concerned about concrete efforts than editorial comment by politicians, especially those who are currently out of power. Should Internet companies be required to keep track of what their customers are doing? Should the government classify massive numbers of travelers as potential threats based on their travel habits? Should warrant-less online data searches, surveillance of mail and data retention for later search by authorities be permitted? The groundwork is being laid right now. The International Association of Chiefs of Police endorsed the concept of data retention in a resolution, and FBI director Robert Mueller applauded them a few hours later: "Today, terrorists coordinate their plans cloaked in the anonymity of the Internet, as do violent sexual predators prowling chat rooms... Before we can catch these offenders, Internet service providers have unwittingly deleted the very records that would help us identify these offenders and protect future victims. We must find a balance between the legitimate need for privacy and law enforcement's clear need for access. Your resolution on records retention passed this morning will help put us on the right path." Government Surveillance and Wire-Tapping – Is it necessary to stop terrorism? Should it be allowed without warrants? Are there technical considerations that influence the choices? We have discussed these issues before but they are still around and the government has different ideas than the ACLU and Electronic Freedom Foundation about what constitutes reasonable actions. EFF Fights Huge Data-Mining Program Set for Rollout on U.S. Borders Washington, D.C. - An invasive and unprecedented data-mining system is set to be deployed on U.S. travelers Monday, despite substantial questions about Americans' privacy. In comments sent to the Department of Homeland Security (DHS) today, the Electronic Frontier Foundation (EFF) asked the agency to delay the program's rollout until it makes more details available to the public and addresses critical privacy and due process concerns. The Automated Targeting System (ATS) will create and assign "risk assessments" to tens of millions of citizens as they enter and leave the country. Individuals will have no way to access information about their "risk assessment" scores or to correct any false information about them. But once the assessment is made, the government will retain the information for 40 years -- as well as make it available to untold numbers of federal, state, local, and foreign agencies in addition to contractors, grantees, consultants, and others. This is just an introductory sample of things that are being discussed and that are being done now. For myself, I have three questions and my view (but not knowledge) on the answers.
There were remarks about a school teacher who was convicted of having a sexual relationship with a student and who was given an extra two years sentence because she sent a video of her dancing to the student over the Internet. The video was not objectionable and would have been a permissible exercise of her free speech in other contexts. It is feared that this could set a pattern for wider suppression of free speech on the Internet. There was a concern that heavy handed interrogations of American Muslims could have the opposite effect of creating opposition where it had not existed before. There are some things that you think are bad enough that we could be headed for anarchy. Cultures that don't work together don't survive. People don't have a social view in our country anymore; things are driven by personal agendas. For years we have had secret intelligence agencies but there has been a failure of information to get to the right places because of constraints that were imposed because of objections to past practices. There were reasons why these were imposed. In intelligence in the Air Force there were some zealots who didn't want to follow rules. Agencies didn't communicate with each other because they lacked trust that their information would be properly used. There was a discussion about EFF positions and it was noted that EFF has given talks to LA ACM. They opposed the extension of copyrights. A lawyer, Larry Lessig, gave a talk on this and participated in the case all the way to the Supreme Court where they lost and copyrights were extended for their owners, including major corporations such as Disney. There was a discussion about EFF's suit against AT&T for putting in taps so the government could use them to get information on American citizens and doing this without warrant. So far EFF has not won their suit, but their legal action is continuing. Most of the discussion was about how this was being done and no strong viewpoints were expressed. There is a huge amount of information being transferred and it is difficult for anyone to make sense out of it. There is quite a bit of possibility of making errors and improperly accusing people of wrongdoing. It was mentioned that NSA does a lot of this surveillance outside the US without any US legal restrictions, and in fact has a mission to do this. It is illegal for them to do the same thing to US citizens in this country. There have been comments by people opposing the accumulation and storage of vast amounts of data because they claim it is useless because so little of the data is relevant. This is not true; because once you actually identify a suspicious target tracking their past calls is extremely relevant. Some years ago the U.S. Navy taught personnel that protection of old codes was more important than the newest operational codes. If you find your current code is compromised you can stop using it, but old codes can be used to decrypt stored past traffic which can provide much important military information. It was asked if the EFF was defending the stealing of intellectual property covered by copyright. It was mentioned that EFF was primarily interested in preventing the banning of technologies that had legitimate purposes other than stealing intellectual property. There was a discussion about individual uses of information for their own convenience and large scale distribution of things like songs. Napster lost in court eventually because the courts believed they were actively encouraging copyright violations. Another company that provided technology for file transmissions was not stopped by the courts because there are legitimate reasons for transmitting files from one person to another other than stealing intellectual property. This is a problem, because the attitude of major companies has been to try to make the technology completely illegal and ban its use entirely. EFF has also been interested in election software. They were trying to get a congressional election in Florida over-turned because of errors, but it was reported that a state court has ruled against them. Their was a discussion about the problem of errors in recounts, that there can be errors in manual recounts. There is a problem where there is no way to recount votes on some of the election equipment because no "paper trail" record is maintained. Myles Losch arrived and provided a call for proposals for the 17th conference on Computers, Freedom & Privacy that will be held in Montreal, May 1-4, 2007. US government agencies, including the FBI, have participated in these conferences in past years. There was a discussion about cell phone tracking. This is an added convenience for some people but a method of tracking by investigators. Technology now allows the mass tracking of large numbers of users. Data retention laws will allow the back-tracking of individuals. This has aroused privacy concerns. Tracking by RFIDs has also created concerns. There was some conjecture about whether the government might require implanted RFIDs in people who were legally in the country, using the same technology used by some owners to keep track of their pets. British Petroleum has used ID cards with RFIDs and keeps track of their personnel using ultra-wide band communications for safety purposes in hazardous areas. The military has considered RFID for use in keeping track of soldiers on the battlefield. The opinion was expressed that human intelligence by infiltrating terrorist organizations was used very effectively by the British in breaking up a plot against aircraft recently. The US has not been as successful in doing this. There was a discussion about the government using secret directives to airlines that direct them to not let certain people fly. The EFF wants more exposure of how these procedures work and just how they decide to tag certain people as risks. Concern was expressed about the government claiming the right to arrest US citizens within the US and hold them as enemy combatants. There was a discussion about the government cooperating with AT&T to allow the tapping of phones. The EFF is suing AT&T for breaching the law. There has also been a claim by President Bush that indicated that under certain conditions U.S. mail could be opened without warrants outside of the current standards that are based on safety, suspicion of such things as explosive devices or biological agents. There was no group consensus on the issues discussed. Everyone was concerned about the problem of tracking terrorist groups and government action being so widespread that it was impinging on people's normal expectation of privacy and violating current law and the U.S. Constitution. At least one person thought the government had good reasons for doing warrant-less wiretaps and needed more authority to do surveillance on US citizens than it currently has by law. If you have strong views on some of these issues please email Mike Walsh at mp_walsh@acm.org and give us permission to publish your views. We don't promise to do so, that will depend on our editorial judgment and competition for space in DATA-LINK. If we do print them, we may edit them, especially if they are lengthy.
For information on the 17th CFP Conference:
This was the fifth meeting of the LA Chapter year and was attended by 9 persons. There will be another discussion group held on February 10, 2006 on jobs and the effects of globalism.
|
And coming in February . . . Join us for another exciting and informative discussion. If you have a topic you would like to be addressed or discussed then please feel free to e-mail Mike Walsh and let him know. |
|
Directions to LMU & the Meeting Location:
This month's meeting will be held at Loyola Marymount University, University Hall, Room 1767 (Executive Dining Room), One LMU Dr., Los Angeles, CA 90045-2659 (310) 338-2700.
From the San Diego (405) Freeway:
Dinner will be in the Faculty Dining Room, UHall 1767: To get to the Roski Dining Hall, where you may purchase your food, take one of the elevators in the bay at the west end of the parking structure to the Lobby level. Exit the
elevators, then walk straight ahead through the glass doors and into the atrium. Turn right. The entrance to the cafeteria is on the right before you reach the cafeteria seating area at the west end of the atrium. (The cafeteria entrance is room 1700 according to the building floor plan).
To enter the Faculty Dining Room from the cafeteria:
After paying for your food, head back to the area between the grill and the
sandwich bar. Turn toward the exterior windows (north side of the room), and walk toward the windows. Before you reach the windows, there will be an opening on the east side of the room, which leads to a hall along the exterior north wall of UHall. Walk down the hall until you come to the faculty dining room.
Alternatively, leave the dining area through the doors on the south side of the dining area and walk east (left) through the lobby until you reach the Executive Conference Center (ECC). Enter the double glass doors to the ECC, continue straight down the hall to the end, then turn left and you will be in the faculty dining room.
The meeting will also be in the Faculty Dining Room, UHall 1767. From parking Lot P2 or P3 under University Hall, take one of the elevators in the bay at the center of the parking structure to the Lobby level of University Hall. When you exit the doors into the atrium, the next set of doors a short distance to your right says ECC Center. Enter those doors and walk straight down the hallway. Room 1767 is on your left hand side.
The Schedule for this Meeting is
5:15 p.m. Council Meeting
6:00 p.m. Networking/Food
7:00 p.m. Program
9:30 p.m. Adjourn
No resevations are required for this meeting. You are welcome to join us for a no host dinner in Room 1767. Food can be bought in the Cafeteria. Look for the ACM Banner.
If you have any questions about the meeting, call Mike Walsh at (818)785-5056, or send email to Mike Walsh .
For membership information, contact Mike Walsh,
(818)785-5056 or follow this
link.
Other Affiliated groups
SIGAda SIGCHI
SIGGRAPH SIGPLAN
Please visit our website for meeting dates, and news of upcoming events.
For further details contact the SIGPHONE at (310) 288-1148 or at Los_Angeles_Chapter@siggraph.org, or www.siggraph.org/chapters/los_angeles
Past Meeting Archive | Los Angeles ACM home page | National ACM home page | Top |
Last revision: 2007 0316 [Webmaster]
Page posted: 2007 0316