Unknown,
NIST PRIVACY Forum
Abstract: This directory contains all issues of the digest
and all related materials on internet privacy. The Internet
PRIVACY Forum is a moderated digest for the discussion and
analysis of issues relating to the general topic of privacy (both
personal and collective) in the "information age" of the 1990's
and beyond.
Dave Redell,
Information Technology and the Privacy of the
Individual
Abstract: This paper discusses the central role that
personal privacy plays in our information technology world. The
erosion of personal privacy by modern computer systems is an
important and ongoing problem. Both the individual and society as
a whole are hurt when the chilling effect of privacy invasion
curtails the effective scope of personal freedom. Although the
workings of this erosion process have been largely invisible to
the average citizen, there are signs of growing public
concern.
National Aeronautics
and Space Administration,
Assessment Panel Report On The Ames Management
Review
Abstract: A team was established by NASA Headquarters in
July 1992, to conduct a special management review of security,
personnel and procurement matters which had been surfaced by the
NASA Ames Research Center. The review was carried out during the
period July 31-August 12, 1992. Primary focus of the review was
on two divisions of the Aerophysics Directorate.
National Aeronautics
and Space Administration,
Management Review Of The Ames Research Center
Abstract: This management review found deficiencies in the
culture and environment at the Ames Research Center that could
lead to a significant loss of commercially valuable/sensitive
technologies. It recommends corrective actions and also
identifies steps which could further improve NASA's ability to
protect commercially valuable/sensitive technology for first use
by U.S. industry.
U.S. House of
Representatives,
CPSR Clipper Testimony 6/9
Abstract: This is the prepared testimony and Statement for
the record of Marc Rotenberg, director CPSR Washington Office on
Encryption Technology and Policy before The Subcommittee on
Telecommunications and Finance, and Committee on Energy and
Commerce.
Marc Rotenberg,
Proposed Privacy Guidelines for the NREN
Abstract: Open Forum on Library and Information Service's
Roles in the National Research and Education Network
(NREN).
Lance J. Hoffman, Faraz A. Ali, Steven L. Heckler, Ann Huybrechts,
Cryptography: Policy And Technology Trends
Abstract: This report analyzes trends in encryption
technology, markets, export controls, and legislation. It
identifies five trends which will have a strong influence on
cryptography policy in the United States.
U.S. Congress ,
Draft of New Digital Telephony Proposal
Abstract: The purpose of this Act is to clarify and define
the responsibilities of common carriers, providers of common
carrier support services, and telecommunications equipment
manufacturers to provide the assistance required to ensure that
government agencies can implement court orders and lawful
authorizations to intercept the content of wire and electronic
communications and acquire call setup information under chapters
119 and 206 of title 18 and chapter 36 of title 50.
U.S. Congress,
FBI Digital Telephony Proposal
Abstract: The purposes of this Act are to clarify the
responsibilities of providers of electronic communication
services and private branch exchange operators to provide such
assistance as necessary to ensure the ability of government
agencies to implement lawful court orders or authorizations to
intercept wire and electronic communications. SEC. 2.
Lauren Weinstein,
What is the Internet PRIVACY Forum?
Abstract: Introduction to the Internet PRIVACY Forum.The
Internet PRIVACY Forum is a moderated digest for the discussion
and analysis of issues relating to the general topic of privacy
(both personal and collective) in the "information age" of the
1990's and beyond. Topics include a wide range of
telecommunications, information/database collection and sharing,
and related issues, as pertains to the privacy concerns of
individuals, groups, businesses, government, and society at
large. The manners in which both the legitimate and the
controversial concerns of business and government interact with
privacy considerations are also topics for the digest. The
PRIVACY Forum digest is supported in part by the ACM (Association
for Computing Machinery) Committee on Computers and Public
Policy.
Joe Abernathy,
The NSA Papers
Abstract: The following is the written response to my
request for an interview with the NSA. To the best of author's
knowledge, and according to their claims, it is the government's
first complete answer to the many questions and allegations that
have been made in regards to the matter of cryptography.
Barry Toiv,
Clinton Administration Aims Fol Open Information
Policy
Abstract: This file consists of the press release
concerning a new OMB A-130 Circular regarding information policy,
followed by the full text of the document detailing the changes
in that Circular.
Privacy Rights
Clearinghouse,
Privacy Bulletin Board: Information for New Users
Abstract: The Privacy Rights Clearinghouse Bulletin Board
Service (BBS) provides online information about
telecommunications-related privacy issues for consumers with
computer access.
Privacy Rights
Clearinghouse,
Cordless and Cellular Phones: Is Everybody
Listening?
Abstract: Cordless and Cellular Phone issues by PRC. It's
easy for others to listen to calls you make on cordless or
cellular phones ... and you may never know your conversations are
being monitored. While cordless and cellular phones are very
popular and have several advantages, privacy is not one of them.
This paper starts the discussion on this issue.
Privacy Rights
Clearinghouse,
How Private Is My Credit Report?
Abstract: Credit report issues by PRC. Credit reports are
a gold mine of information about consumers. They contain Social
Security numbers, addresses, credit payment status, employment,
even legal information. To address concerns about who has access
to this potentially sensitive information, California has passed
a new law which enhances consumers' privacy rights. The credit
bureaus have also adopted voluntary guidelines to improve
consumer services.
Privacy Rights
Clearinghouse,
How to Put an End to Unwanted or Harassing Phone
Calls
Abstract: Unwanted or Harassing phones calls issues by
PRC. Obscene or harassing phone calls can be one of the most
stressful and frightening invasions of privacy a person
experiences. And unwanted phone calls, while a minor problem when
compared with threatening calls, can still be a major
inconvenience. Fortunately, there are steps you can take to help
put an end to these unwelcome intrusions.
Privacy Rights
Clearinghouse,
About The Privacy Rights Clearinghouse
Abstract: Introduction of the Privacy Rights
Clearinghouse. The Clearinghouse is a nonprofit consumer
education service funded by the California Public Utilities
Commission through its Telecommunications Education Trust. It is
administered by the University of San Diego School of Law's
Center for Public Interest Law.
Privacy Rights
Clearinghouse,
Junk Mail: How Did They All Get My Address?
Abstract: Issues on Junk Mail by PRC.Junk mail is only
junk when you don't want to receive it. You may want to be on
some mailing lists. If you want to receive some of this mail, do
not contact the Direct Marketing Association and ask to be taken
off all mailing lists. Rather, notify companies individually and
tell them you want your name removed from their lists. Also, tell
the companies you do business with to keep your name and address
private. A growing number of businesses which rent their mailing
lists are including statements in their catalogs to let you know
you have this option.
Privacy Rights
Clearinghouse,
How Private Is My Medical Information?
Abstract: Issues on Medical Information by PRC. Your
medical information is shared by a wide range of people both in
and out of the health care industry. Generally, access to your
records is obtained when you agree to let others see them. You
have probably signed "blanket waivers" or "general consent forms"
when you have obtained medical care. When you sign such a waiver,
you allow the health care provider to release your medical
information to government agencies, insurance companies,
employers and others.
Privacy Rights
Clearinghouse,
From Cradle to Grave: Government Records and Your
Privacy
Abstract: Issues on government records and people's
privacy by PRC. Government records are public in order to ensure
the free flow of information in a democratic society. The
challenge to policymakers is to balance the public's right to
information with the individual's right to privacy.
Privacy Rights
Clearinghouse,
My Social Security Number: How Secure Is It?
Abstract: Issues on Social Security Number by PRC. When
Social Security numbers were first issued in 1936, the federal
government assured the public that use of the numbers would be
limited to Social Security programs. Today, however, Social
Security numbers are used for many purposes, including employee
files, medical records, credit reports and banking information.
In fact, the Social Security number (SSN) is now required for
dependents over one year of age, and is the most frequently used
record-keeping number in the United States.
Privacy Rights
Clearinghouse,
About The Clearinghouse
Abstract: Another introduction file on PRC. The
Clearinghouse is a nonprofit consumer education service funded by
the California Public Utilities Commission through its
Telecommunications Education Trust. It is administered by the
University of San Diego School of Law's Center for Public
Interest Law.
Privacy Rights
Clearinghouse,
Telemarketing: Whatever Happened To A Quiet Evening At
Home?
Abstract: Issues on telemarketing by PRC. Most people have
experienced it-that annoying ring of the phone just as dinner
goes on the table. When you answer, you find it's not a call from
a friend or family member, or even from work. It's someone
calling to sell you something-a telemarketer. This paper
discusses this topic.
Privacy Rights
Clearinghouse,
Wiretapping and Eavesdropping: Is There Cause for
Concern?
Abstract: Issues on Wiretapping and Eavesdropping by PRC.
While relatively few legal wiretaps are authorized in the United
States each year, improvements in technology have made it easier
to illegally wiretap, record and eavesdrop on telephone
conversations. People with sensitive jobs in business or
government and those involved in high-stakes legal cases may have
reason to be concerned about wiretapping and electronic
eavesdropping.
Privacy Rights
Clearinghouse,
Employee Monitoring: Is There Privacy in the
Workplace?
Abstract: Issues on Employee Monitoring by PRC. Employers
want to be sure their employees are doing a good job, but
employees don't want their every sneeze or trip to the water
cooler logged. That's the essential conflict of workplace
monitoring.
Grady Ward,
Preventing Electromagnetic Eavesdropping
Abstract: Eavesdropping on personal computers is not
limited to looking over the shoulder of the operator or
physically tapping in to an Ethernet cable. U.S. Government
standards relating to the prevention of information capture via
the emission of electro-magnetic radiation from computers and
peripherals are known as TEMPEST. However, actual TEMPEST
specifications are classified. TEMPEST aside, there are
inexpensive and easily applied means for individuals to minimize
unintentional emissions from equipment.This document "Preventing
Electromagnetic Eavesdropping," discusses these techniques.
Ernest F. Brickell, Dorothy E. Denning, Stephen T. Kent, David P. Maher, Walter Tuchman,
The SKIPJACK Algorithm
Abstract: The objective of the SKIPJACK review was to
provide a mechanism whereby persons outside the government could
evaluate the strength of the classified encryption algorithm used
in the escrowed encryption devices and publicly report their
findings. Because SKIPJACK is but one component of a large,
complex system, and because the security of communications
encrypted with SKIPJACK depends on the security of the system as
a whole, the review was extended to encompass other components of
the system. The purpose of this Interim Report is to report on
our evaluation of the SKIPJACK algorithm. A later Final Report
will address the broader system issues.
Steve Peterson,
USPS addresses
Abstract: USPS Change of Address List.
Robin Hanson,
Can Wiretaps Remain Cost-affective?
Abstract: This paper,will neglect these concerns, and ask
instead whether this new wiretap chip, and other policies to
preserve phone wiretaps, are cost-effective tools for police
investigation.
Donald P. Delaney, Dorothy E. Denning, Alan R. McDonald,
Wiretap Laws And Procedures What Happens When The U.S. Government
Taps A Line
Abstract: Article Regarding Federal/State Wiretap Laws.
This article describes the legal requirements for government
interception of wire and electronic communications and some of
the additional procedures and practices followed by federal and
state agencies.
Enlow Enterprises,
Enlow
Enterprises
Abstract: This directory contains a wide variety of
documents on investigative secrets such as privacy protection
issues like background investigations, traces, asset studies,
forensic information, investigative contacts, unique newsletters,
articles, hi-tech schematics, electronic gadgetry and secret
resources.
Michael E. Enlow,
ELECTRONIC SURVEILLANCE: Are you bugged?
Abstract: Electronic Surveillance. Are you Bugged? This is
an abstract from Inside Secrets, a newsletter catering to
detectives, attorneys, law enforcement officers and professionals
around the world. Want to know how the pro's bug,tap phones, and
use other things to hear what you're saying?
Michael E. Enlow,
INTEC Catalog
Abstract: The INTEC complete catalog of books,
newsletters, special reports, and the famous John Wilson catalog
of high-tech, electronic surveillance and countermeasure
gadgetry, along with schematics and very simple construction
plans.
Lauren Weinstein,
Privacy Forum
Abstract: The PRIVACY Forum is a moderated digest for the
discussion and analysis of issues relating to the general topic
of privacy (both personal and collective) in the "information
age" of the 1990's and beyond.
Michael E. Enlow,
Who Is Mike Enlow? The Story Behind One Of America's Foremost
Private Detectives-Who Can Help You Get Almost Anything On
Anyone!
Abstract: The story behind Michael Enlow, retired Private
Detective. Secret strategies of the trade.
Michael E. Enlow,
On-Line Investigations: Investigating By Computer!
Abstract: On-line investigations. Investigating via
on-line unfair advantage... Litigation, business, personal or
otherwise... Complete back issue of Mike's investigative
newsletter.
Michael E. Enlow,
Under The Spy Glass Of Mike Enlow... A Day In The Life Of Mr.
X
Abstract: A day in the life of Mr. X. This is the e-text
of a story from Mike Enlow's Inside Secrets newsletter, published
in April of 1992. It will give you an idea of
investigative/creative talent and perhaps an insight in to the
"real arts and sciences" of the crafty trade of
investigating.
Michael E. Enlow,
Tracing Made Simple-Track 'em Down!!!
Abstract: How To Detect It - How To Prosecute, and How To
Stop It Cold. Information regarding shop lifting and theft
deterrent procedures. Complete study on the subject.
U.S. CONGRESS OFFICE OF
TECHNOLOGY ASSESSMENT, Issue
Update on Information Security and Privacy in Network
Environments
Abstract: This background paper was prepared as part of
the Office of Technology Assessment's follow-on assistance to the
Senate Committee on Governmental Affairs, subsequent to release
of the September 1994 OTA report Information Security and Privacy
in Network Environments. The Committee requested additional
informational and analytical assistance from OTA in order to
prepare for hearings and legislation in the 104th Congress. This
background paper updates and develops some key issues that OTA
had identified in its earlier report, in light of recent
developments in the private sector and in government. During the
course of this work, OTA found that the need for timely attention
to the security of unclassified information has intensified in
the months since the 1994 report was issued.
Built by Mark Crosbie
and Ivan
Krsul.