May 31st, 2009
FISA’s been a major topic since the 90s at the Computers, Freedom, and Privacy conference, and this year’s no exception. For the first time ever, we’ll be streaming video, and so the great content will be available whether or not you’re making the trek to Washington DC … and the Twitter backchannel will give a way to participate in the discussion as well.
Here’s a brief summary of some of the sessions that are likely to be of interest to Get FISA Right members — and anybody else interested in domestic surveillance, warrantless wiretapping, and a panoptic society.
– me, on the Get FISA Right blog
The rest of the post goes into more detail on Ari Melber’s Monday keynote on Net movements in the Obama era at the Twittering in the Trenches workshop, the back-to-back plenary sessions on Tuesday on Computers, Freedom and the Obama Administration and The Future of Security vs. Privacy, Wednesday night’s birds-of-a-feather (BoF) session on New strategies for fighting FISA and the PATRIOT Act, and NSA whistleblower Thomas Tamm’s participation in the closing plenary Panopticon: Internalizing the Gaze.
At last year’s CFP, Susan Crawford moderated the opening session, and McCain surrogate Chuck Fish’s description of telecom immunity as “selling indulgences” led to coverage in the Washington Post, New York Times, and National Review Online after Ryan Singel’s Wired story. This year, Susan’s once again on the opening session (now as Special Assistant to the President for Science, Technology, and Innovation Policy), and Ryan’s moderating the Future of Security vs. Privacy debate. Will lightning strike twice? Stay tuned!
jon
Tags: Bruce Schneier, CFP Program, FISA, Jim Harper, PATRIOT Act, Security vs Privacy, Susan Crawford
Posted in Uncategorized | Comments Off
May 29th, 2009
If this post seems like a foreign language to you, or if you’re new to Twitter, please check out our Getting Started on Twitter page!
Each Friday brings a fun “game” to Twitter called FollowFriday…. The aim of FollowFriday is to share with the Twitter community which tweeps you enjoy following. Of course, it can help you find new people to follow too.
– Sharon Hayes-Tucci (aka @sharonhayes), FollowFriday on Twitter
One of CFP’s major roles has always been to help connect people in the community. On Twitter, Follow Friday is a natural way to do this. I took a quick pass through CFP09’s followers and the names listed on the program, and here are the recommendations from the @cfp2009 account. If you’re interested in computers, freedom, and privacy, please consider following!
#followfriday for #cfp09 (1/5) @cfp2009 @pubic_citizen @eff @aclu @digiactive @cendemtech @catoinstitue
#followfriday for #cfp09 (2/5) @CharlotteAnne @AriMelber @cncpundit @benpolitico @schatzwsj @csoghoian @kpoulsen @nancyscola @shansell
#followfriday for #cfp09 (3/5) @bruceschneier @bendrath @securitysources @phillyberg @phragments @jeremycee @andrewclement @IsCool
#followfriday for #cfp09 (4/5) @edfelten @digitalsista @Gauravonomics @wonderwillow @hellrazr @jdp23 @netfreedom @txitua @dreamact
#followfriday for #cfp09 (5/5) @sairy @craignewmark @scrawford @ellenmiller @gregpincus @wendyg @mhintze @tribehelp
Apologies to anybody I overlooked; if you’re going to be at CFP and are on Twitter, please let @cfp2009 know.
And if there are CFP’ers you think people should follow, please make your own #followfriday recommendation– and don’t forget to include #cfp09 in your tweet to make it easy for others to find!
jon
PS: Micah Baldwin’s #FollowFriday: The Anatomy of a Twitter Trend has more about the history and usage patterns of Follow Friday, a fascinating example of a self-organizing peer-based recommendation system.
Posted in Uncategorized | Comments Off
May 28th, 2009
What do disco music, eight-track audio systems and beta videocassette tapes all have in common? They’re all examples of technologies and fads that have come and gone since the Privacy Act of 1974 was last updated.
Looking at the list above it’s painfully obvious that federal privacy standards, written during a time when “storage facility” literally referred to file cabinets, are overdue for an update in the digital era. While the basic framework of the Privacy Act has held up well over the past 35 years, changes need to be made to insure that the advent of new technologies do not threaten to undermine the protections that have been put in place.
Today, the Center for Democracy & Technology unveiled an in-depth proposal to update the federal Privacy Act and related federal privacy policy to address the challenges of the digital age. The announcement came as part of a panel discussion featuring government and privacy leaders that coincided with the release of the National Institute of Standards and Technology’s federal Information Security and Privacy Advisory Board’s report on its findings on government privacy rules. ISPAB has also called for significant changes to the existing federal privacy framework.
Read the rest of this entry »
Tags: center for democracy and technology, consumer, privacy, privacy act, rights
Posted in Uncategorized | Comments Off
May 27th, 2009
Kevin Poulsen, Wired Senior Editor, wonders on the Threat Level blog whether or not the threat of hackers attacking critical infrastructure is anything more than a red herring, or in some cases clever marketing.
Viral Video Hoax, or Proof of Impending Cyber Apocalypse?
This video of hackers taking over the lighting controls in an urban skyscraper in order to play the world’s most awesome game of Space Invaders is ominous proof that intruders really are eyeing utility control systems as targets, warns security vendor McAfee.
“Perhaps the first demo was just for fun, but the others will have less juvenile goals,” McAfee Avert Labs researcher Francois Paget blogged on Friday. “An attack can involve nationwide damage, a terrible effect on the public’s morale, and huge financial losses.”
More…>
Poulsen will explore the question in depth as he moderates the CFP Panel, Hacking as a National Security Threat: How Real Is It? As much attention is being paid to cybersecurity policy issues, panelists will discuss how real the threat is behind these policy debates. Does hacking — whether by foreign governments, organized crime, or lone hackers — really pose a national security-level threat?
Panelists include:
Herb Lin, National Research Council
Amit Yoran, Former Bush Administration Cybersecurity Czar
Michael Tanji, Former Supervisory Intelligence Officer, Defense Intelligence Agency
Moderator: Kevin Poulsen, Senior Editor, Wired News
Tags: CFP Program, Cybersecurity, Hacking, Kevin Poulsen
Posted in Uncategorized | Comments Off
May 27th, 2009
Melissa Ngo of Privacy Lives discusses the panels she’ll be moderating at this year’s CFP:
Computers, Freedom and Privacy is an annual conference to discuss the privacy, security and civil liberty questions raised by emerging technologies or new uses of old technologies. This year’s theme is “Creating the Future.”
The conference runs from June 1 to June 4 in Washington, DC. You can still register. Note that government employees and the press may attend for free, but you will have to show identification proving your status when you check in at the registration table.
There are a number of interesting panels on the program, including two panels that I am moderating… more>
Tags: CFP Program, Melissa Ngo
Posted in Uncategorized | Comments Off
May 26th, 2009
If you’ll be at the conference, why not live-blog some of the sessions you’ll be attending?
It’s a great opportunity to share the information with others and spark some conversation … and to attract new readers. We’ll send out links to the liveblogs for each session, and do daily wrapups to make it easy to follow.
If you’re interested, please leave your name, the session or sessions you’ll be blogging, and a link to your blog in the comments.
Thanks much!
jon
Tags: blogging, live-blogging, logistics, visibility
Posted in Uncategorized | 2 Comments »
May 24th, 2009
The Transportation Security Administration (TSA) recently made some surprising changes to the way whole body imaging is to take place at airports across the nation.
Prior to the changes, the TSA had said that whole body imaging, aka ‘the virtual strip search’, would be used only as a secondary screening tool, and that even then, it would be voluntary. Passengers would still have the choice between going through a virtual strip search and a pat down search. That is about to change. The TSA has announced that whole body imaging will be phased in as a replacement for primary screening, i.e. the metal detectors, and it will cease to be voluntary.
As a result of this announcement, many privacy and civil liberties groups have launched a campaign against the use of these machines as the primary method of screening (see links below).
As ACLU lawyer Chris Calabrese says: “A choice between being groped and being stripped, I don’t think we should pretend those are the only choices. People shouldn’t be humiliated by their government in the name of security…”
Read the rest of this entry »
Tags: privacy
Posted in Uncategorized | 2 Comments »
May 21st, 2009
The tubes are ablaze with buzz about government accountability and access as Data.gov launches today. Craig Newmark, who will be speaking at CFP blogs, “This is a genuinely big advance in grassroots democracy.”
Speaking of Newmark, Craigslist filed suit against the South Carolina AG “seeking declaratory relief and a restraining order with respect to criminal charges he has repeatedly threatened against craigslist and its executives.” Oddly enough, South Carolina Attorney General Henry McMaster has declared the action a victory.
The University of Michigan has changed the terms of its Library of the Future Project with Google. According to the new agreement, U of M will now get a digital copy of every book on its shelves. Sherwin Siy of Public Knowledge will be joined by Alex Macgillivray, on CFP’s panel about the Google Book Deal. Macgillivray led negotiations for the original deal.
The Committee to Protect Journalists released a list of the “10 Worst Countries to be a Blogger.” CFP will have bloggers from two of the “worst” countries listed in attendance to discuss what it’s like first hand.
Highschool Hackers: Get ready! The Pentagon wants to tap your talent. But be careful with your Facebook–there’s been another phishing attack.
In other government news, President Obama and former Vice President Cheney don’t agree on what should be kept secret. CFP’s opening keynote will feature Susan Crawford of the Obama Administration, who will speak about policies in areas involving technology and liberty. Also, a panel led by the ACLU’s Mike German will explore whether government secrecy makes sense in the internet age.
We’d love to hear about the news related to CFP topics that you’re interested in! Please share your links and ideas in the comments!
Tags: CFP Program, CFP&N, Craig Newmark, Facebook, Obama, privacy, Susan Crawford
Posted in Uncategorized | Comments Off
May 20th, 2009
Jim Harper of the Cato Institute is blogging about CFP.
The Computers Freedom & Privacy conference is consistently one of the most interesting and forward-looking privacy conferences. This year, it’s at George Washington University in Washington, D.C. June 1-4.
I helped organize it this time, though by no means does the event skew libertarian. What it does is bring together people of all ideologies to discuss common concerns about the present and future state of privacy.
I’ll be speaking on a panel called “The Future of Security vs. Privacy” on Tuesday, June 2nd. Here’s the program page. And here’s the registration page if any of this whets your appetite.
Tags: CFP Program, Jim Harper, privacy, Security vs Privacy
Posted in Uncategorized | 2 Comments »