|
Program
(last updated 2004-May-21)
Room assignments & times subject to change
Program Booklet PDF (454K) - as
distributed at the conference; current through April 12, 2004
Wed 4/21 |
730-830 |
Continental Breakfast in the Claremont Ballroom
(Sponsored by Google) |
Exhibits:
Crypto Rights Highfire
Swipe Demo
in Claremont Ballroom
|
830-845 |
Opening
Remarks - Deirdre K. Mulligan & Mark Scott Johnson, ACM
Empire Ballroom |
845-945 |
Opening Keynote: David Dill Empire Ballroom |
945-1100 |
Plenary 1: 'Overseeing' the Poor
Empire Ballroom |
1100-1115 |
Break |
1115-1230 |
Plenary 2: Tapping the Net, Revisited
Empire Ballroom |
1230-100 |
Pick up lunch for concurrent sessions
Lunches in Claremont; Sessions on 2d
Floor |
100-200 |
Concurrent 4: Nations vs. the Net / WSIS
Napa 1/2/3 |
Concurrent 1: RFID Sonoma |
Concurrent 3: Gatekeepers of the Web Monterey |
Concurrent 2: Technology Transfer Mendocino |
|
215-330 |
Plenary 3: Datamining
Empire Ballroom
|
330-400 |
Coffee Break in the Claremont Ballroom
|
400-515 |
Plenary 4: Organizing Online
Empire Ballroom |
515-615 |
Dinner
in the Claremont Ballroom |
615-700 |
Screening: "Misleading Information:
The Future As It Never Was" Empire Ballroom |
700-930 |
Big Brother Awards
Horizon, 1st floor |
930-mid |
BOF 1: Great American Privacy Makeover
Napa 1 |
WSIS BOF
Napa 2
cancelled:
BOF 4: Computers, Freedom & Moore's Law
|
BOF 8: San Francisco Surveillance Camera Players
Napa 3 |
BOF 7: Mobilophobia
Sonoma |
BOF 3: Future of the PATRIOT Act
Monterey |
Social Networking BOF
Mendocino
cancelled:
BOF 2: Japan's New Privacy Protection Rules
|
BOF 5: New CFP Attendees Town Hall (tentative)
Lanai 2 |
BOF 6: Creative Commons User's Meeting
Lanai 3
|
|
Thu 4/22 |
730-830 |
Continental Breakfast
(Sponsored by Yahoo!) |
Exhibits:
Crypto Rights Highfire
Swipe Demo
in Claremont Ballroom
|
845-1000 |
Plenary 5: Trusted Computing
Empire Ballroom |
1000-1115 |
Plenary 6: Open Source,
Open Society Empire Ballroom |
1115-1145 |
Pick up lunch for concurrent sessions |
1145-1245 |
Concurrent 6: Suing File Sharers Napa 1 & 2 |
Concurrent 5: Wardriving Sonoma |
Concurrent 8: Data Retention & Privacy
Monterey |
Concurrent 9: Next Drug War Napa 3 |
Concurrent 7: Fahrenheit
451.3 Mendocino |
|
1-215 |
Plenary 7: The Net: Caught in the FCC's Web?
Empire Ballroom |
215-345 |
Plenary 8: Facing the Music
Empire Ballroom |
345-415 |
Coffee Break (Sponsored by
Hewlett Packard)
|
415-530 |
Plenary 9: Cybercrime Treaty
Empire Ballroom
|
530-700 |
Break (Buses available starting at 5:45 to take
people to Chabot for Pioneer Awards) |
700-1000 |
Pioneer Awards
Offsite at Chabot
|
1000-mid |
BOF 12: Litigating Surveillance
Napa 1 |
BOF 15: Software Demo: Program for Online Deliberation
Napa 2 |
BOF 11: Digital Copyright in Europe & Asia
Napa 3 |
BOF 14: Screening "Hacktivista"
Sonoma |
BOF 13: Designing in Privacy
Monterey |
BOF 18: Provable Elections
Mendocino
|
BOF 9: Repeat Screening "Misleading Information"
Empire Ballroom
|
BOF 10: Travel Data & Privacy
Living Room |
|
Fri 4/23 |
730-830 |
Continental Breakfast |
Exhibits:
Voting Machine
Demos
Swipe Demo
in
Claremont Ballroom |
845-1015 |
Plenary 10: GMail, Spam Filters, and Email
Privacy -- Expectations, the Law, and the Marketplace (replaces Policy
Laundering) Empire Ballroom |
1015-1130 |
Plenary 11: Government Profiling,
Private Data
Empire Ballroom
|
1130-1145 |
Break |
1145-115 |
Keynote & Lunch: Rachel Brand
(Introduced by Frank Torres, Microsoft) |
115-130 |
Break |
130-230 |
Concurrent 12: Next Generation Democracy
Napa 1 & 2 |
Concurrent 11: Cease & Desist Sonoma |
Concurrent 13: Law & Ethics of Online Research
Monterey |
Concurrent 14: Security & Privacy for EU Citizen
Napa 3 |
Concurrent 10: Identity Theft Mendocino |
|
230-245 |
Coffee &
Chocolate Break (Sponsored by Hewlett Packard) |
245-315 |
Special Event: Verified Voting Mock Election
Empire Ballroom
|
315-430 |
Plenary 12: Electronic Voting
Empire Ballroom
|
430-435 |
Special Performance: "Ashcroft's Army"
(performed by Wendy Grossman)
Empire Ballroom |
435-535 |
Closing Keynote: Brewster Kahle
Empire Ballroom |
|
Tuesday April 20
PreConference Tutorials & Workshops
|
7:30 - 9:00 am
Second Floor
|
Coffee, Fruit & Pastries
|
9:00 am - 4:30 pm
Napa 1 & 2 2d floor |
Workshop: Privacy and Civil Liberties Issues in
Computing Applications Research and Development
Numerous computing applications have been proposed, and in some cases
implemented, that have the potential of being invasive of privacy. Examples range
from commercially produced tags using Radio Frequency Identification (RFID)
technology to governmental programs such as Total Information Awareness. We will
discuss examples of computer science research and of applications of computing
technology that raise privacy and civil liberties issues.
We shall attempt to answer the following questions: 1. Is technology
"neutral"? Should decisions about the applications of technology be left solely to
the marketplace, the government, policy makers, and/or the law? Do the people
developing the technology have any ethical, moral, or legal responsibilities
regarding it subsequent use? What about businesses that market the technology? 2.
Is it possible or even desirable to raise awareness of privacy and civil liberties
issues among CS researchers and funders of CS research? Do researchers and/or
funders have any ethical responsibilities in trying to raise awareness? 3. Is it
possible to devise technologies that address privacy and civil liberties concerns?
If so, what strategies might be effective in providing or increasing funding for
the development of such technologies? Is there a risk in trying to develop
"ameliorating" technologies? Examples? 4. Have there been examples of CS R&D
projects where such issues have been successfully addressed? 5. Are there any
research or development projects on which people should refuse to work? What is the
role of the individual? How do you decide? What kinds of penalties might society
extract? Examples?
Organizer: Barbara Simons, ACM;
Presenters:
Ruzena Bajcsy, University of California, Berkeley;
Susan Landau, Senior Staff Engineer, Sun Microsystems Inc.: "Science -- and
Thinking About Ethical Solutions";
Terry Winograd, Stanford University;
Philippe Golle, Xerox Parc;
Marcia Hofmann, EPIC;
David Culler, University of California, Berkeley;
Andrew Grosso, Andrew Grosso & Associates
Materials:
Ruzena Bajcsy's powerpoint: CITRIS
Overview
Philippe Golle's Powerpoint: Protecting
Privacy in Terrorist Tracking Applications
Marcia Hoffman's powerpoint: CAPPS II: A
Case Study in Homeland Security Use of Technology
CFP2004 General Discussion
Blog
|
9:00 am - noon
Napa 3 2d floor |
Tutorial T1: Who Are You? The Basics of Identity,
Authentication and Privacy Today
Identity issues have become part of daily business and the daily news
for individuals around the world. New identification and authentication
technologies are often complex and counter-intuitive. Privacy is often viewed as a
barrier to better authentication and identification. But do they privacy and
authentication to be in tension?
This tutorial will cover the terminology, standards, current controversies
and best practices in privacy and authentication. We will explore E-Authentication,
biometrics, smart cards, datamining, and pattern analysis. We will consider how
some of the current authentication technologies address privacy. Commercial Web
services, E-Government, transportation security, and identity fraud issues will be
addressed.
Panelists:
Ari Schwartz, Center for Democracy
& Technology;
Paula Arcioni, New Jersey Office of
Information Technology;
Susan Crawford, Cardozo Law School;
Susan Landau, Sun Microsystems Research;
Khaja Ahmed, CTO of Passport Project,
Microsoft;
Marty Abrams, Executive Director,
Center for Information Policy Leadership at Hunton & Williams LLP;
Lara Flint, Center for Democracy &
Technology;
Marcia Hofmann, EPIC;
Jennifer Barrett, Chief Privacy
Officer/Privacy Team Leader, Acxiom Corporation
Materials:
CFP2004 General
Discussion Blog
|
9:00 am - noon Sonoma 2d floor |
Tutorial T2: Network Surveillance HOW-TO: A
Tutorial on Snooping Around Modern Networks
This half-day tutorial workshop will give you hands-on experience in
network surveillance. It will provide a high-level overview of network basics,
including the OSI layer model, as a prologue to getting down and dirty with packet
sniffing, wireless network scanners, intercepting encrypted protocol
transmissions, port scanning, and more.
We'll cover everything from basic terminology to live demonstrations
of how networks can be spied on, including packet sniffing, intercepting traffic,
"man-in-the-middle" attacks, SSL spoofing, and more, as well as information and
demonstrations on how common defense mechanisms work to protect your networks
against passive and active surveillance.
Panelists: Chris Palmer, Staff
Technologist, EFF; Seth Schoen, Staff
Technologist, EFF; Dan Silverstein, UC
Berkeley
Materials:
CFP2004 General Discussion
Blog
|
9:00 am - noon Monterey 2d floor |
Tutorial T3: Liability for Unsecured
Computers
While many companies try to minimize the expense of complying with existing
laws, crucial information is being stolen, modified, and used for illegitimate
purposes. What is a company's exposure to liability in the event of a breach of
security? Should there be additional laws and regulations to force companies to
protect private or sensitive data?
Recently, new information security laws and regulations have been enacted.
Concurrently, the Federal Trade Commission and State Attorneys General have
investigated numerous companies' security practices in response to concerns with
vulnerabilities, or following a breach of security. Collectively, these laws,
regulations, and decisions create standards, which become the measuring stick in
litigation. We'll provide a survey of recent laws, enforcement actions, and class
action litigation related to information security; presents possible actions for
companies; and suggests possible incentives for creating and implementing security
measures.
Panelists: Françoise
Gilbert, IT Law Group, "Legal Issues";
Jodie Westby, The Work-IT Group;
Mike Jerbic, Trusted Systems
Consulting
Materials:
Mike Jerbic PDF
CFP2004 General Discussion
Blog
|
9:00 am - noon Mendocino 2d floor |
Tutorial T4: RFID and Privacy
Radio frequency ID (RFID) presents the possibility of an
Internet-for-things, bringing digital information economics and control into the
analog, informationally limited, real world. It presents a new set of privacy
risks, including the possibility of much more robust and pervasive profiling. To
what degree should RFID be subject to regulatory restraints? Can we avoid privacy
problems through intelligent technical design now?
This tutorial is for anyone who wants to learn about the privacy and civil
liberties risks posed by RFID. It will examine the technology, its current and
contemplated applications, and the possibilities for political action to mitigate
the privacy risks of RFID and other location/tracking technologies and practices.
Panelists:
Lee Tien, EFF;
Richard M. Smith;
Linda Ackerman, Staff
Counsel, PrivacyActivism;
Beth Givens, Director, Privacy
Rights Clearinghouse;
Ross Stapleton-Gray
Materials:
Linda Ackerman &
Katherine Albrecht's slides
Beth Givens'
Powerpoint
Richard Smith's
Slides at http://www.computerbytesman.com/privacy/cfp2004/index.htm [local .zip]
Ross Stapleton-Gray's
Powerpoint
Lee Tien: RFID:
Government Use + Economic and Security Issues and Government RFID Use Table
CFP2004 General Discussion
Blog
|
1:30 - 4:30 pm
Napa 3 2d floor |
Tutorial T5: Constitutional Law in
Cyberspace
Mike Godwin, Senior Technology Counsel, Public Knowledge, will teach the
basics of constitutional law in cyberspace, with an emphasis on free-speech and
privacy issues. This tutorial is designed to inform non-lawyers and lawyers alike
about the constitutional issues that underlie computer-crime and computer
civil-liberties cases, as well as about the policy issues relating to intellectual
property and jurisdiction on the Net. Its goal is to prepare attendees to
understand the full range of constitutional and civil-liberties issues discussed at
the main panels and presentations at CFP2004, with particular emphasis this year on
the intersection of copyright law, constitutional law, and technology policy.
Presenter: Mike Godwin, Senior
Technology Counsel, Public Knowledge, has done evolving versions of this tutorial
at 11 different CFP conferences (sometimes for CLE credit and sometimes not), and
the tutorial has continued to be well-subscribed and highly rated.
Materials:
CFP2004 General Discussion
Blog
|
1:30 - 4:30 pm Sonoma 2d floor |
Tutorial T6: Telecommunications Law for the Rest
of Us
Primer on telecommunications law and concepts critical to
understanding the scope of the Federal Communication Commission's regulatory
authority over the Internet. Covers the original regulation of telephone companies
under a "common carrier" model, and the gradual removal of services such as data
storage and long-distance service from the framework of monopoly regulation, a
process that culminated in the 1996 Telecommunications Act. It will also provide an
overview of today's hot regulatory topics. It will introduce the major players: FCC
commissioners; relevant congressional commissions; state public utility
commissions; & affected industries. It will review the classification of Internet
access as unregulated "information services," and explain the practical
implications of classification as a regulated "telecommunications service."
Finally, it will provide background on debates about broadband Internet access,
wireless telephony & networks, including spread-spectrum and smart-radio
technology, and voice over IP.
Panelists: Christopher Savage, Cole,
Raywid & Braverman; Robert Cannon, Federal
Communications Commission
Materials:
Christopher Savage Handouts
(PDF)
CFP2004 General Discussion
Blog
|
1:30 - 4:30 pm Mendocino 2d floor |
Tutorial T7: Privacy Notices: Readability vs.
Completeness
Research has established that notices need to be relatively short, in a common
format and in plain English to work for consumers. However, such notices are, by
definition, not complete. This creates liability issues for companies. Sometimes,
laws are conflicted over what lawmakers want from organizations giving notice. This
tutorial will explore the research, government action on short notices, and the
liability issues.
Panelists:
Marty Abrams, Center for Information Policy Leadership;
Ari Schwartz, Associate Director, Center for Democracy and Technology;
Rebecca Richards, Director of Policy, TRUSTe;
Susan Henrichsen, California Dept.
of Justice;
Beth Givens, Executive Director, Privacy Rights Clearinghouse;
Ken McEldowney, Executive Director, Consumer Action;
Jennifer Barrett, Privacy Team Leader, Acxiom
Ken Anderson, Assistant Commissioner
for Privacy, Ontario, Canada
Materials:
CFP2004 General Discussion
Blog
|
|
Wednesday April 21 |
7:30 - 8:30 am
Claremont Ballroom |
Continental Breakfast
Sponsored by Google
|
8:30 - 8:45 am
Empire Ballroom
|
Opening Remarks, Deirdre
Mulligan, Conference Chair; and Introduction of David Dill,
Mark Scott Johnson, ACM Council
Materials:
Deirdre Mulligan Opening Remarks & Mark Scott Johnson Introduction
of David Dill - download audio recording:
mp3
Deirdre Mulligan Opening Remarks & Mark Scott Johnson Introduction
of David Dill - stream audio recording: mp3 | wma
|
8:45 - 9:45 am Empire Ballroom
|
Opening Keynote: David Dill, Professor of Computer
Science, Stanford University
"The Battle for Accountable Voting Systems"
Touch-screen voting machines store records of cast votes in internal
memory, where the voter cannot check them. Because of our system of secret
ballots, once the voter leaves the polls there is no way anyone can determine
whether the vote captured was what the voter intended. Why should voters trust
these machines?
Last December, I drafted a "Resolution on Electronic Voting" stating
that every voting system should have a "voter verifiable audit trail," which is a
permanent record of the vote that can be checked for accuracy by the voter, and
which is saved for a recount if it is required. After many rewrites, I posted the
page in January with endorsements from many prominent computer scientists. At that
point, I became embroiled in a surprisingly fierce (and time consuming) battle that
continues today.
We still don't have an answer for why we should trust electronic voting
machines, but a lot of evidence has emerged for why we should NOT.
In this talk, I will discuss the basic principles and issues in
electronic voting.
Materials:
David Dill's
PowerPoint [local copy]
David Dill Keynote - download audio recording:
mp3
David Dill Keynote - stream audio recording:
wma |
mp3
CFP2004 General Discussion
Blog
|
9:45 - 11:00 am
Empire Ballroom
|
Plenary 1:
'Overseeing' the Poor: Technology Privacy Invasions of Vulnerable Groups
2004 marks the 40th Anniversary of the '64 Civil Rights Act. This landmark Act
outlawed discrimination in public places, required employers to provide equal
employment opportunities, and stated that uniform standards for the right to vote
must prevail. We will explore the relationship between privacy and civil rights, in
light of the anniversary, focusing on the segment of our population who are without
computers but constantly subject to computer monitoring. Computer systems have not
eliminated discrimination - on the contrary: Discrimination has been grafted into
profiling algorithms, taking on airs of impartiality. We will focus on three
prominent issues that intersect computing and disadvantaged populations: Homeless
Management Information Systems, Credit Scoring, and Biometric Collection of
information on recipients of public benefits.
Moderator: Chris Hoofnagle,
EPIC
Panelists: Cindy Southworth,
National Network to End Domestic Violence; Chance
Martin, SF Coalition on the Homeless; Birny
Birnbaum, "Insurance Credit Scoring: 21st Century Redlining"; Grace A. Galligher, Coalition of California
Welfare Rights Organizations
Materials:
Birny Birnbaum, "Credit
Scoring: 21st Century Redlining and the End of Insurance" [pdf]
Cindy Southworth, NNEDV, How
Tracking Systems Place Victims at Risk
Download audio recording:
mp3
Stream audio recording:
mp3 |
wma
Plenary 1 Blog
|
11:00 - 11:15 am |
Break
|
11:15 - 12:30 am
Empire Ballroom |
Plenary 2: Tapping the Net, Revisited: Voice Over IP and Law
Enforcement
The FBI is back, insisting that VoIP be subject to the same
wiretap-friendly design mandates that apply to the plain old telephone system under
the controversial CALEA legislation. The FBI recently filed a petition asking for
an FCC rulemaking on the issue. Will the desire to guarantee law enforcement
access reach into the core of the Internet? What are the risks of tapping the Net?
Can surveillance questions be rationally addressed in the age of terrorism? Leading
participants in the debate from law enforcement, civil liberties and industry
explore these and related issues.
Moderator: John Morris, Center for
Democracy and Technology
Panelists:
Jeff Pulver, pulver.com;
Lee Tien, EFF;
Steve Bellovin, AT&T Lab-Research;
Mike Warren, Fiducianet
Materials:
Download audio recording:
mp3
Stream audio recording:
mp3 |
wma
Plenary 2 Blog
|
12:30 - 2:15 pm |
Concurrent Sessions & Working Lunch
Lunch available in Claremont Ballroom;
Concurrent sessions on second floor
|
12:30 - 1:00 pm
Claremont Ballroom
|
Pick up lunch (beverages
on 2d floor)
|
1:00 - 2:00 pm Napa 1 & 2 2d floor |
Concurrent 1: RFID and Privacy
Radio frequency ID (RFID) presents the possibility of an
"Internet-for-things", bringing digital information economics and control into the
analog, informationally limited, real world. It presents a new set of privacy
risks, including the possibility of much more robust and pervasive profiling. To
what degree should RFID be subject to regulatory restraints? Can we avoid privacy
problems through intelligent technical design now?
Moderator: Jonathan Weinberg, Wayne
State University Law School
Panelists:
Beth Givens, Director, Privacy Rights Clearinghouse;
Elliot Maxwell, Fellow, Center for the Study of American Government, Johns
Hopkins;
Jackie Griffin, Director, Berkeley Public Library;
Ann Brick, Staff Attorney, ACLU of Northern California
Materials:
Concurrent 1 Blog
|
1:00 - 2:00 pm Sonoma 2d floor |
Concurrent 2: Technology Transfer, Technology
Dumping
Technologies make their way across the world through global
commerce. However, technologies have different applications and implications
depending on culture and legal regimes. Those deploying technologies are faced with
demands that they reserve and limit access to various content. At the same time,
blogs have proven useful in routing around censorship. In China firewall
technology is used as a tool of censorship, a wall to keep citizens in rather than
to keep hackers out. What is being done to ameliorate negative and advance positive
impacts of technology? What have companies done, and what risks do they take?
Moderator: Mike Godwin,
Senior Technology Counsel, Public Knowledge
Panelists:
Xiao Qiang, China Internet Project;
Jagdish Parikh, Online Communications
Content Coordinator, Human Rights Watch;
Mary Wirth, Yahoo!;
Dave Del Torto, Cryptorights
Materials:
Jagdish Parikh's slides
Gus Hosein's slides
Concurrent 2 Blog
|
1:00 - 2:00 pm Monterey 2d floor |
Concurrent 3: Gatekeepers of the Web: The
Hidden Power of Search Engine Technology
People use search engines for the vast majority of online
content they access - giving a handful of companies the ability to shape what the
world sees and thinks about. Alarmingly, and unbeknownst to users, search engine
companies effectively censor content in subtle ways, both for commercial reasons
and when asked by governments. Ranking technologies provide users with a
homogenized handful of sites, and render smaller sites nearly invisible. Search
engine results are famously prone to manipulation. Finally, using search engines is
more complex than it seems, and general users have difficulty finding the right
content. The panel exposes hidden vulnerabilities of these critical gatekeepers to
the online world, and considers remedies.
Moderator: Kenneth Neil Cukier, Fellow, Harvard's Kennedy
School of Government
Panelists:
Prof. Dr. Marcel Machill, Professor for Journalism & International
Media Systems, Univ. of Leipzig, Germany, and the Bertelsmann Foundation:
"Transparency on the Net: Search Engines and Media Policy";
Andrew McLaughlin, Google;
Matthew Hindman, Fellow, Harvard's Kennedy School of Government;
Benjamin Edelman, Student, Harvard University: "Empirical
Research on Google Omissions"
Materials:
Concurrent 3 Blog
|
1:00 - 2:00 pm Napa 3 2d floor |
Concurrent 4: Nations vs. the Net: The UN World
Summit on the Information Society (WSIS)
Are governments trying to take over the Internet? Are their
actions indispensable to bringing the benefits of the information society to all?
Or is it something in the murky middle, where the details (and devils!) lie? In
Dec. 2003 over 10,000 delegates from governments, industry and activist groups
convened in Geneva for the first round of the UN World Summit on the Information
Society. There was little harmony on issues - from human rights and the digital
divide, to open source software and ICANN. Join us for a meeting to discuss the
issues, the stakes and the dangers that will emerge as the world prepares for the
final round of the Summit, in Tunisia in 2005.
Moderator: Peter Harter, Managing
Principal, The Farrington Group
Panelists: Bertrand De La
Chapelle, Founder, Open-WSIS Group; Stephanie
Perrin, President, Digital Discretion; David
Maher, Chairman of the Board, Public Interest Registry; Esther Dyson; Ralf Bendrath
Materials:
Concurrent 4 Blog
|
2:00 - 2:15 pm |
Break
|
2:15 - 3:30 pm
Empire Ballroom |
Plenary 3:
Datamining the Unknown Unknowns: Is It Useful for Knowing What We Don't Know We
Don't Know?
Search and analysis of structured and unstructured data races in
parallel to the ever increasing volume of information generated globally by people
and technology. Technology continually converts analog to digital, adding to the
complexity of information. These developments erode security through obscurity
individuals have historically enjoyed. This panel will discuss the positive and
negative aspects of the business and government activities which capitalize and
exploit person-based data.
Moderator: Peter Swire, Professor
of Law, Moritz College of Law, Ohio State University
Panelists: Jeff Jonas, SRD; Lara Flint, Center for Democracy and Technology;
Stewart Baker, Steptoe & Johnson LLP
(and former counsel at National Security Administration);
Doug Tygar, Professor, University of
California, Berkeley
Materials:
Download audio recording:
mp3
Stream audio recording: mp3 |
wma
Plenary 3 Blog
|
3:30 - 4:00 pm
Claremont Ballroom |
Coffee Break
Sponsored by Hewlett Packard
|
4:00 - 5:15 pm
Empire Ballroom |
Plenary 4: Organizing Online for Political Change
Can online organizing change the outcome of the 2004 elections? From the
"open-source" campaign model that briefly propelled Howard Dean to the front of the
Democratic pack, to the stunning impact of Moveon.org, American politics is being
turned upside down by new and innovative network-centered campaign strategies. Or
is it? We will examine recent trends and explore their implications on the 2004
election and American Democracy, discussing what tools and strategies have worked -
and failed - in recruiting and mobilizing supporters.
Moderator:
Jonah Seiger, Connections
Media
Panelists:
Bill Pease, Get Active;
Wes Boyd, MoveOn.org;
Tom Matzzie,
AFL-CIO;
Myles Weissleder,
Vice-President of Communications, Meetup.com
Materials:
Download audio recording:
mp3
Stream audio recording: mp3 |
wma
Plenary 4 Blog
|
5:15 - 6:15 pm
Claremont Ballroom |
Buffet Dinner
|
6:15 - 7:00 pm
Empire Ballroom |
Special Event - Screening: "Misleading Information:
The Future As It Never Was"
This video screening brings back the futuristic promises of the past --
alluring, utopian ideas like domestic robots, ubiquitous networking, telepresence,
and intelligent appliances -- and shows how major American corporations
appropriated them as their own. Their promise: a bright, affluent future enabled
by cybernetics and technology, and they're still singing the same song. We'll
counterpose films like CENTURY 21 CALLING, A NATION AT YOUR FINGERTIPS, and MAGIC
IN THE AIR with recent futuristic TV commercials from AT&T and IBM. What (if
anything) has changed? Why has utopian fantasy become campy anachronism rather
than call to action? And would we really want to live in this utopian world,
anyway?
Presenter: Rick
Prelinger, Prelinger Archives
Materials:
Prelinger Archives at prelinger.com
CFP2004 General Discussion
Blog
|
7:00 - 9:30 pm
Horizon 1st floor |
Big Brother Awards
Privacy International holds the 6th annual US Big Brother awards to
celebrate the invaders and champions of privacy. "Orwell" statutes will be
presented to the government agencies, companies and initiatives which have done
most to invade personal privacy. Brandeis Awards will be given to champions of
privacy. The Brandeis Award is named after US Supreme Court Justice Louis Brandeis,
who described privacy as "the right to be let alone." The awards are given to those
have done exemplary work to protect and champion privacy.
|
|
Birds-of-a-Feather
Sessions (BOFs):
|
9:30 - midnight Napa 1, 2d floor
|
BOF 1: The Great American Privacy
Makeover, Undressed: Survey Results & Methodology
In July, 2003, PC World conducted what is thought to be the largest
journalistic survey of its kind: The magazine asked 1500 people to provide details
about their online privacy practices and motivations. In this session, the author
of the survey and the head of PC World's research division will discuss the
methodology for conducting the survey, and present more results than there was
space to report in print in the November, 2003 issue.
Presenter: Andrew Brandt, Senior
Associate Editor, PC World
Materials:
CFP2004 General Discussion
Blog
|
9:30 -
midnight
Mendocino 2d floor |
BOF 2: Social Networking BOF
Organizer: Peter Harter
Materials:
CFP2004 General Discussion
Blog
|
9:30 -
midnight
Napa 2 2d floor |
BOF: WSIS
Presenters: Robert Guerra; Ralf Bendrath; Wolfgang
Kleinwächter
Materials:
CFP2004 General Discussion
Blog
|
9:30 - midnight
Monterey 2d floor |
BOF 3: The Future of the PATRIOT Act
Is the Patriot Act a foreshadow of things to come, or an aberration soon
to be corrected? What are specifics of the Patriot Act and "Patriot II", and their
pluses and minuses? What are the courts doing about the Act, and how should
computer professionals respond as responsible citizens?
First, a description of the Patriot Act, the proposals in "Patriot II," the
history of the various provisions, and a description of court cases that are coming
down the pipe. Then a round table discussion as to the pluses and minuses of the
Act's purposes and means; where these might lead in the future; and the role of
technology in such evolution.
Presenter: Andrew Grosso, Andrew Grosso &
Associates
Materials:
CFP2004 General Discussion
Blog
|
9:30 - midnight
Lanai 2 1st floor |
BOF 5: New CFP Attendees Town Hall
[Tentative]
BOF session for those with no obvious "flock": this 90-minute town meeting
will try to orient first or second attendees at an ACM/CFP conference on how to
make the most of their expensive trip. Meet newbies like yourself! Later, we'll
compare notes.
Materials:
CFP2004 General Discussion
Blog
|
9:30 - midnight
Lanai 3 1st floor |
BOF 6: Creative Commons Users' Meeting
Open content is revolutionising content creation and distribution just
like open source has changed the software business. Everyone using Open Content
Licensed material or interested in open content licensing is invited to a BOF to
hear a presentation on Creative Commons and the legal issues of open content
licensing. The BOF is an opportunity to exchange experiences of sharing open
content.
Organizer: Herkko Hietanen
Materials:
CFP2004 General Discussion
Blog
|
9:30 - midnight
Sonoma 2d floor |
BOF 7: MobiloPhobia
MobiloPhobia asks whether we should fear the friend in our pocket,
investigating how the mobile phone functions as a tracking device, through which
our movements can be monitored 24 hours a day. Mobile phones routinely generate
location data, which is stored by the operators, and regularly used in court cases
and by the intelligence services. This is cell based and simply records the closest
mast to the handset against time, while triangulation techniques allow for far
greater accuracy, and the radar-like CelldarTM system offers the capability to pull
up a real-time visual display of objects by analysing deviations in the microwave
radiation emitted by mobile phone masts. MobiloPhobia will assess the technical
capacity of different mobile phone surveillance techniques, and examine how artists
and DIY technologies offer alternative ways of engaging in surveillance to
traditional campaigning strategies. On the one hand creative projects that test the
limits of new locative technologies offer the chance to inhabit or explore the
blind spots and incoherencies of surveillance systems. And, on the other, the
emerging field of locative media explores the use of location aware portable
networked devices for social networking and cultural projects, highlighting
socially beneficial applications and creating an argument for safeguards and
openness to be integral to the platforms of tomorrow.
MobiloPhobia is part of a series of events and discussions on mobile and
locative media, which opened with MobiloTopia at Transmediale (Berlin, DE)
exploring the utopian hopes generated by locative media, and will culminate in the
Mobile Connections conference and artistic programme at the futuresonic04 festival
(Manchester, UK)
Presenters: Dr. Drew Hemment,
AHRB Research Fellow in Creative Technologies at University of Salford, UK; Nicola Green, Dept. of Sociology, University of
Surrey
Materials:
www.mobileconnections.org
www.futuresonic.com
CFP2004 General Discussion
Blog
|
9:30 - midnight
Napa 3 2d floor |
BOF 8: San Francisco Surveillance Camera Players
The San Francisco Surveillance Camera Players oppose the
surveillance of everyday life, in particular the video surveillance of public
space, including public transit, streets, and parks. We perform short, silent plays
in front of surveillance cameras in public places, to bring attention to and
challenge their presence. We also are beginning to map the locations of
surveillance cameras in the Bay Area and give occasional walking tours. We will
discuss how to identify surveillance cameras, how common they are in the Bay Area,
and what some of the issues are (legal, Constitutional, and moral).
A walking tour is also scheduled for the following Saturday, April 24th.
It meets at 2pm by the statue in the middle of Union Square in San Francisco (take
the BART to Powell Street, then walk three blocks north on Powell).
More information can be found on our website at http://www.survile.org/.
Players: Martin and Bettina
Materials:
www.survile.org
CFP2004 General Discussion
Blog
|
|
Thursday April 22 |
7:30 - 8:30 am
Claremont Ballroom |
Continental Breakfast
Sponsored by Yahoo!
|
8:30 - 1:00 pm
Claremont Ballroom |
Crypto Rights Highfire
CryptoRights is a nonprofit, nongovernmental organization (NGO)
dedicated to promoting global justice through the protection of human rights and
humanitarian workers, journalists and the information they collect and communicate
for the public good; and the preservation of freedoms for security professionals
who do open research on security and safety issues in the public interest.
Materials:
The CryptoRights Foundation at cryptorights.org
Project
Highfire
Exhibit: We-Swipe.us
SWIPE addresses the gathering of data from driver's licenses, a form of
data-collection that businesses are starting to practice in the United States. Bars
and convenience stores were the first to utilize license scanners in the name of
age and ID verification. These businesses, however, admit they reap huge benefits
from this practice beyond catching underage drinkers and smokers and fake IDs. With
one swipe - that often often occurs without notification or consent by the
cardholder - business acquires data that can be used to build a valuable consumer
database free of charge. Post 9/11, other businesses, like hospitals and airports,
are installing driver's license readers in the name of security. And still other
businesses are joining the rush to scan realizing the information contained on
driver's licenses is a potential gold mine.
Materials:
we-swipe.us
|
8:45 - 10:00 am
Empire Ballroom |
Plenary 5: Trusted Computing
Recent technology initiatives described as "Trusted Computing" have
been very controversial. We'll examine how they work and what their advantages and
disadvantages may be from a variety of points of view.
Moderator: Danny Weitzner, W3C and
Computer Science & Artificial Intelligence Laboratory, MIT
Panelists:
Seth Schoen, Staff Technologist, EFF;
David Safford, IBM;
Geoffrey Strongin, Platform
Security Architect, AMD
Materials:
Download audio recording:
mp3
Stream audio recording: mp3 |
wma
Plenary 5 Blog
|
10:00 - 11:15 am
Empire Ballroom |
Plenary 6: Open Source, Open Society
As governments increase the use of technology and bring functions online
for everything from birth certificates, paying taxes, and voting, the software that
is used determines the degree of transparency and freedom. Open source proponents
claim that open source lets citizen users inspect, improve and redistribute the
software freely, and point out that commercial software risks locking up official
documents in proprietary formats. But commercial software advocates point out the
benefits to a single entity claiming responsibility for their work. What are the
risks and benefits to each model?
Moderators: Jennifer M. Urban, Visiting
Acting Clinical Professor, University of California Berkeley School of Law (Boalt
Hall);
Kenneth Neil Cukier, Fellow, Harvard's
Kennedy School of Government
Panelists: Tony Stanco,
E-Government;
Bernard Benhamou, Director of
Forecasting and Internet Governance, E-Government Development Agency, Office of the
Prime Minister, France;
Jason Matusow, Microsoft;
Tom Kalil, Special Assistant to the
Chancellor for Science and Technology for UC Berkeley
Special Guest: Eric M. K. Osiakwan, Free and Open Source Software
Foundation for Africa (FOSSFA)
Materials:
Tom Kalil powerpoint: "And now for
something completely different!"
Download audio recording:
mp3
Stream audio recording: mp3 |
wma
Plenary 6 Blog
|
11:15 - 1:30 pm |
Concurrent Sessions &
Working Lunch
Lunch available in Claremont Ballroom;
Concurrent sessions on second floor
|
11:15 - 11:45 am Claremont Ballroom
|
Pick up lunch in
Claremont Ballroom; beverages available on 2d floor
|
11:45 - 12:45 pm Sonoma 2d floor |
Concurrent 5: Wardriving, Wireless Networks,
and the Law
Wireless networks are exploding in popularity, but are difficult to
secure. Locating insecure networks & advertising their locations has become a sport
known as "wardriving". We examine the Pen Register Act, the Wiretap Act, the
Electronic Communications Privacy Act, the Computer Fraud & Abuse Act to evaluate
criminal and civil liability which may apply to wardriving.
Moderator: Jennifer Granick,
Stanford CIS
Panelists: Steve Schroeder,
CCIPS consultant;
Simon Byers, AT&T;
Kevin Bankston, EFF
Materials:
Concurrent 5 Blog
|
11:45 - 12:45 pm Napa 1 & 2 2d floor |
Concurrent 6: Privacy and Liberty Implications
of Suing File Sharers
Copyright owners have sued p2p network services, providers of software,
ISPs, phone companies, and even venture capitalists who fund p2p companies. While
those initial suits were successful, content industries have recently suffered
reversals, most notably in their litigation against Streamcast & Grokster. Unable
to shut down p2p networks altogether, the music industry has begun to sue
individuals who upload music files.
These lawsuits present numerous legal, moral and policy issues. What First
Amendment and privacy rights are affected by the RIAA's subpoenas to ISPs' file
sharers' identities? How to balance the fact that p2p software has legal uses as
well as illegal ones, with the RIAA's claims that it is more efficient, and better
business, to sue the p2p software companies rather than users? Or should the RIAA
simply find a new business model? This panel will involve a vigorous and
wide-ranging debate among advocates of each of these positions, with a focus on the
privacy and liberty implications of the recent spate of lawsuits.
Moderator: Mark Lemley, Professor, Boalt Hall School of Law,
University of California at Berkeley, and Of Counsel, Keker & Van Nest.
Panelists:
Stacey Dogan, Associate Professor of Law, Northeastern University School of
Law;
Jon Healey, Los Angeles Times;
Wendy Seltzer, Staff Attorney, Electronic Frontier Foundation
Materials:
Concurrent 6 Blog
|
11:45 - 12:45 pm Mendocino 2d floor |
Concurrent 7: Fahrenheit 451.3: Using ISPs to
Control Content on the Internet
Recently, governments have tried a controversial new approach to
regulating Internet content: requiring ISPs to block access to content, such as
pornography and gambling, before it is delivered to Internet users. Targeting
neither the source nor host of the content, this content control instead places the
burden of blocking content on the delivering ISP. Yet this approach often leads to
the blocking of wholly unrelated content. We'll look at the court decision on the
Pennsylvania web blocking law, and other government efforts to control content at
the ISP bottleneck.
Panelists: John Morris, Center
for Democracy & Technology;
Stewart Baker, U.S. Internet Service
Providers Association (Steptoe & Johnson); Wolfgang
Schulz, University of Hamburg
Materials:
Wolfgang Schulz's slides: "Regulating
the Code? Using ISPs to block banned web-sites in Germany" (not for publication or
citation)
Concurrent 7 Blog
|
11:45 - 12:45 pm Monterey 2d floor |
Concurrent 8: Data Retention and Privacy: A
Real World Approach to EU and US Regulations
Data retention of ISP-generated traffic data is a major issue,
for privacy protection and also for the enforcement of the right of defense in
court. We'll analyse first the difference and similarity between EU and US and,
from a technical point of view, at which conditions the ISP retained data might be
held reliable in Court.
Presenters:
Andrea Monti, Electronic
Frontier, Italy; Susan Brenner, University of
Dayton School of Law; Cindy Cohn, Electronic
Frontier Foundation
Materials:
Concurrent 8 Blog
|
11:45 - 12:45 pm Napa 3 2d floor |
Concurrent 9: The Next Drug War: Possession
Statutes Target Technology
Suing customers appears to be in vogue. But long before the RIAA got in
on the action, DirecTV blazed the trail. Today, state "super DMCA" initiatives
across the US aim to make "mere possession" of general purpose technologies
unlawful, encouraging others to go where only DirecTV has dared to go before. What
are the implications for civil liberties and general purpose technologies when
lawyers can come after you for "mere possession"?
Moderator: Fred von Lohmann, EFF
Panelists: Jason Schultz, EFF;
Albert Zakarian, Esquire,
DTVDefense.com;
Christian Genetski, Partner,
Sonnenschein, Nath & Rosenthal, Anti-Piracy Counsel for DirecTV;
Robert S. Apgood, Attorney at Law,
AvantLaw PLLC
Materials:
Concurrent 9 Blog
|
12:45 - 1:00 pm |
Break
|
1:00 - 2:15 pm
Empire Ballroom |
Plenary 7: The Net: Caught in the FCC's Web?
The FCC has long had a role in regulating (or not regulating) the
Internet. Recently it has been reviewing that role. This panel will provide an
overview of the FCC's current plans and examine the implications for the future of
the Internet, focusing not only on concrete regulatory issues but also policy
issues about competition, openness, network neutrality, the "end-to-end"
principle and the concept of common carriage. Can FCC regulation or regulatory
forbearance foster openness, competition, and neutrality?
Moderator: Lee Tien, EFF
Panelists:
Chris Savage, Cole, Raywid & Braverman;
Robert Cannon, Senior Counsel for Internet Issues (Federal Communication
Commission's Office of Plans and Policy);
Jeff Pulver, President and CEO, Pulver.com, Inc.;
Dan Brenner, Senior Vice President for Law & Regulatory Policy, National
Cable & Telecommunications Association;
Paul Misener, Vice President, Global
Public Policy, Amazon.com; Jonathan Askin,
General Counsel to pulver.com
Materials:
Download audio recording:
mp3
Stream audio recording: mp3 |
wma
Plenary 7 Blog
|
2:15 - 3:45 pm
Empire Ballroom |
Plenary 8: Facing the Music: Can Creators Get Paid
for P2P File Sharing?
While the entertainment industry litigated and lobbied,
many observers concluded that p2p is an exciting technology with one significant
downside: how to pay authors & artists for their work. The file sharing wars
inspired widely divergent proposals for fostering online distribution and paying
authors and artists. We'll consider leading alternatives, including digital rights
management, compulsory licenses and levies, voluntary collective licensing, and
voluntary user payments. We'll focus on nuts & bolts, rather than debating the
file-sharing wars. We'll ask which proposals could work. What are their practical
advantages & drawbacks? How do they measure consumer demand? How do they affect
privacy?
Moderator: Jessica Litman, Wayne State
Univ. Law School.
Panelists:
Ted Cohen,
EMI;
Sarah Deutsch, Verizon;
Eric Garland, CEO, BigChampagne, LLC;
Daniel Gervais, Univ. of Ottawa Faculty of Law;
Neil Netanel, UT School of Law;
Fred von Lohmann, EFF
Materials:
Download audio recordings:
mp3
Stream audio recordings:
mp3
|
wma
Plenary 8 Blog
|
3:45 - 4:15 pm |
Coffee Break
(Sponsored by Hewlett Packard)
|
4:15 - 5:30 pm
Empire Ballroom |
Plenary 9: The Council of Europe Cybercrime
Treaty -- the Treaty Most of the Net Hasn't Heard Of, But That May
Change It Forever
The Council of Europe Cybercrime Treaty is an international
agreement created for the stated purpose of helping police cooperate on crimes that
take place on the Internet. Its supporters, including the US DOJ, argue that it is
a surgical instrument necessary to allow for international law enforcement
cooperation in prosecuting crime on the Net. Opponents say it is a meat axe,
requiring signatory nations to cooperate with foreign dictatorships and giving
invasive new surveillance powers to law enforcement. While the treaty has broad
implications for the wired world, it has received very little attention since 9/11.
President Bush recently sent the Treaty to the Senate for ratification, which will
rekindle the controversy in the US.
Readings: Two FAQs on the Treaty are available at:
http://www.aclu.org/Privacy/Privacy.cfm?ID=13475&c=131
http://www.cybercrime.gov/COEFAQs.htm
Moderator: Susan Landau, Sun
Microsystems Research;
Panelists:
Gus Hosein, Fellow,
Privacy International;
Betty Shave, Computer Crimes and
Intellectual Property Section of the US Justice Department;
Abraham Sofaer, Hoover Institute;
Barry Steinhardt, American Civil
Liberties Union
Materials:
Download audio recordings:
mp3
Stream audio recordings:
mp3
|
wma
Plenary 9 Blog
|
5:30 - 6:30 pm |
Break
|
6:30 - 10:00 pm
Offsite at Chabot |
Pioneer
Awards
Buses will be available beginning at 5:45 pm to take
people to and from Chabot Space & Science
Center
EFF established the Pioneer Awards to recognize leaders on the
electronic frontier who are extending freedom and innovation in the realm of
information technology. This year's ceremony will be held at Chabot Space and
Science Center. The event will begin at 6:30pm with a Planetarium show, which will
be followed by a catered reception, and the Pioneer Award ceremony itself.
|
10:00 - midnight
2d floor
|
Birds-of-a-Feather
Sessions (BOFs):
|
10:00 - midnight
Empire Ballroom |
BOF 9: Screening: "Misleading Information: The Future
As It Never Was"
Repeat of screening from Wednesday night.
This video screening brings back the futuristic promises of the
past -- alluring, utopian ideas like domestic robots, ubiquitous networking,
telepresence, and intelligent appliances -- and shows how major American
corporations appropriated them as their own. Their promise: a bright, affluent
future enabled by cybernetics and technology, and they're still singing the same
song. We'll counterpose films like CENTURY 21 CALLING, A NATION AT YOUR
FINGERTIPS, and MAGIC IN THE AIR with recent futuristic TV commercials from AT&T
and IBM. What (if anything) has changed? Why has utopian fantasy become campy
anachronism rather than call to action? And would we really want to live in this
utopian world, anyway?
Presenter: Rick
Prelinger, Prelinger Archives
Materials:
Prelinger Archives at prelinger.com
CFP2004 General Discussion
Blog
|
10:00 - midnight
Living Room 2d Floor |
BOF 10: Travel Data and Privacy
This BOF will provide an update and overview of (1) current
proposals for government and commercial uses of travel data and the conversion of
the travel reservation infrastructure into a system for surveillance of travelers,
including CAPPS-II, US- VISIT, APIS, biometric and RFID passports and travel
documents, the jetBlue Airways and Northwest Airlines "sharing" of reservation
archives, and current and potential policies and practices for commercial uses of
travel reservation archives; (2) the status of related regulatory and legislative
activity and litigation in the USA, EU, Canada, and international standard-setting
bodies such as IATA and ICAO; (3) Gilmore v. Ashcroft, Hiibel v. Nevada, and
anonymous travel; and (4) strategizing for responses and initiatives to protect
and defend the privacy of travelers and the right to travel.
Presenter: Edward
Hasbrouck, Author, "The Practical Nomad", Hasbrouck.org
Materials:
CFP2004 General Discussion Blog
|
10:00 - midnight
Napa 3 2d Floor |
BOF 11: Digital Copyright in Europe and Asia: How
Does it Differ From the U.S.?
This BOF will present the discussions on digital copyright in
Europe, Japan and China. It will explore how these discussions differ from those
taking place in the United States, and how they are influenced by the United
States. It is widely recognized that the United States has been leading the digital
copyright policy discussions on the international level (such as TRIPS and WIPO)
and influencing other countries' policies. However, the United States is not the
only country in which policy makers, lawyers and technologists debate about digital
copyright issues. The BOF will cover: how Europe is trying to solve the problem of
balancing anti-circumvention regulations and user freedoms; how its strategies
differ from the fair use approach taken in the U.S., and what pros and cons these
two strategies have in the digital environment; how the Japanese copyright law
currently respects and preserves user freedom; how the Koizumi Administration is
trying to expand the scope of copyright regulations inspired by the U.S. pro-IP
policy in the 1980's; how China has changed its copyright law in the past two
decades under U.S. diplomatic and political infuence; and, finally, the vigorous
opposing voices against a stronger copyright policy as well as unexpected copyright
and other legal issues arising from the digital freedom movement in China.
Moderator: Yugo Noguchi,
Stanford University Law School
Presenters:
Qiong Wu, University of California,
Berkeley, School of Law (Boalt Hall); Daniel
Benoliel, University of California, Berkeley, School of Law (Boalt Hall)
Materials:
CFP2004 General Discussion
Blog
|
10:00 - midnight
Napa 1 2d Floor |
BOF 12: Litigating Surveillance: How to Fight the USA
PATRIOT in the Courts
Lawyers and legal activists are invited to brainstorm solutions
to the legal hurdles facing any challenge to the USA PATRIOT Act's surveillance
provisions. In particular, we'll talk about how to find plaintiffs with standing to
challenge surveillance laws that operate in secret, and what legal theories may
succeed in the face of a decades-long weakening of Fourth Amendment protections.
After 10-15 minutes of introductory comments from Kevin Bankston
outlining the various legal hurdles facing lawyers hoping to challenge the PATRIOT
Act's surveillance provisions, attendees will participate in an interactive
discussion of innovative approaches and potential solutions to these problems.
Presenter: Kevin
Bankston, EFF
Materials:
CFP2004 General Discussion Blog
|
10:00 - midnight
Monterey 2d Floor |
BOF 13: Designing in Privacy - Architecture and Strategy Discussion
Technologists, developers, policymakers and advocates are invited to a
discussion with the HP Chief Privacy Officer and a HP Trusted Systems Lab scientist
to explore the needs of developers to design and build privacy-compliant and
privacy enabling products and systems. We will focus on ideas that contribute to
the practical application of design: tools, training, impact assessments and review
guides.
The HP Privacy program has been recognized by many as having an
industry-leading privacy policy and practices. We work hard on "walking the talk."
The HP Chief Privacy Officer is leading an internal intitative to take operational
privacy excellence to our commercial products and services. We're interested in
having an "outside looking in" perspective on both classic and novel approaches to
"designing in privacy". We are interested in techniques and practices that can be
leveraged across the industry.
- What are the best practices in other industries?
The worst?
- What do developers need be successful in designing in privacy?
- What are the most useful approaches or tools for developers
translating a set of
policy requirements to code?
- How can different aspects of privacy controls be built in to
allow for flexibility - for health information, financial information, behavior
information, sensitive information, anonymized information?
- What pitfalls should be avoided?
Join us for an intriguing and thought-provoking discussion on "design for
privacy."
Presenters: Barb Lawler, Chief
Privacy Officer, Hewlett Packard; Tomas
Sander, Research Scientist, Hewlett-Packard Laboratories
Materials:
CFP2004 General Discussion Blog
|
10:00 - midnight
Sonoma 2d Floor |
BOF 14: Screening: "Hacktivista" Documentary
"Hacktivista" is the story of three University of Toronto students who
travel with their professor to Guatemala and Chiapas to work with human rights
organizations and activists on Internet security and connectivity. The students
call themselves "hacktivists" -- a new breed of social activists who use technology
to fight for privacy and freedom of speech. See http://www.citizenlab.org/hacktivista/
for more info.
Presenter: Robert Guerra, consultant to & translator for the
documentary, will introduce the documentary & answer questions after the
screening.
Materials:
http://www.citizenlab.org/hacktivista/
CFP2004 General Discussion Blog
|
10:00 - midnight
Napa 2 2d Floor |
BOF 15: Software Demonstration: Program for Online
Deliberation
This session will include a demonstration of a new free/open platform
for online deliberation: an asynchronous, web-based tool for group discussion,
collaboration, and decision making, which is a project of PIECE (Partnership for
Internet Equity and Community Engagement, http://piece.stanford.edu). The platform is
aimed at helping grassroots organizations to be more participatory, with a richer
environment for online asynchronous meetings than is available in message boards,
email lists, and other groupware of which we are aware. We will demonstrate the
capabilities of POD and discuss the relationship between its design and the
problems of grassroots democracy. The fact that coming to decisions generally
requires real-time, face-to-face meetings serves as an excuse for inner-circle
decision making, which we hope to undermine through this project. The free/open
aspect will also allow groups to control their own online spaces, serving as an
antidote to the liberty-threatening policies of commercial providers.
Presenter: Todd Davies, Coordinator, Symbolic Systems Program,
Stanford University, and Partnership for Internet Equity and Community
Engagement
Materials:
http://piece.stanford.edu
CFP2004 General Discussion Blog
|
10:00 - midnight
Location TBA |
BOF 18: Provable Elections
Presenter: David Chaum
Materials:
CFP2004 General Discussion
Blog
|
|
Friday April 23 |
7:30 - 8:30 am
Claremont Ballroom
|
Continental Breakfast
|
8:00 am - 2:00 pm
Claremont Ballroom |
Exhibit: Voting Machines
Demo
Several vendors of electronic voting machines as well as the Open Voting
Consortium will be on hand to demonstrate their systems and answer questions. This
is an opportunity to try out several examples of electronic voting machines,
including machines that provide voter verified paper ballots.
|
8:45 - 10:15 am
Empire Ballroom |
Plenary 10: GMail, Spam Filters, and Email
Privacy -- Expectations, the Law, and the Marketplace
Replaces "Policy Laundering" Plenary
From ISP offered services and workplace accounts to webmail, from paid
to free, from client to server side spam filtering and virus blocking, etc.
consumers have a wide range of email options. Google's forthcoming email system,
Gmail, has reignited a conversation about the privacy of email. How should
consumers make the best choice for themselves? What are the risks of using an
employer's e-mail service for personal mail? What are the risks of using a webmail
service rather than one offered by an ISP? At what price free? How far is the
government's reach into your mailbox? What about private litigants? In what ways
could the laws be amended to better protect privacy expectations in email? Is there
a privacy difference between text based spam and virus filtering, and ad placement
based on the same technology? What happens when you store messages with an email
provider? Does it matter whether they are an ISP or not? This session will address
the wide range of privacy issues raised by continually evolving email technologies.
Panelists will reflect on what users expect, what the law protects, and what the
market offers.
Moderator: Deirdre K.
Mulligan
Announced Panelists:
J.C. Cannon, Microsoft;
Ari Schwartz, Center for Democracy &
Technology;
Chris Hoofnagle, Electronic Privacy
Information Center;
Sonia Arrison, Pacific Research
Institute;
Sunil Paul, Brightmail;
David Link, Technology Counsel, Cal.
Sen. Liz Figueroa; Nicole Wong, Senior Compliance Counsel for Google
Materials:
Images provided by Google:
GMail Screenshot |
GMail Inbox Screenshot
Plenary 10 Blog
|
10:15 - 11:30 am
Empire Ballroom |
Plenary 11: Government Profiling / Private Data
The US government's use of corporate databases containing personal
information on individuals in its effort to identify terrorists has garnered
criticism from elected officials, private citizens, and other nations. At the same
time, elected officials, think tanks, and those involved in intelligence and law
enforcement argue that identifying terrorists requires enhanced access and use of
information. We'll consider the current legal framework controlling government
access and use of private sector databases, the privacy and security concerns posed
by government use of such databases for terrorism purposes, and the possible
benefits of government use of such databases.
Moderator:
Nick Gillespie, Reason Magazine
Panelists:
Jennifer Barrett, Chief Privacy
Officer, Acxiom;
Bill Scannell, DontSpyOnUs.com;
Jim Harper, Privacilla;
Nuala O'Connor Kelly, Chief Privacy
Officer, Department of Homeland Security
Materials:
Download audio recording:
mp3
Stream audio recording:
mp3
|
wma
Bill
Scannell's Graphic [also available at www.dontspyonus.com]
Plenary 11 Blog
|
11:30 - 11:45 am |
Break
|
11:45 - 1:15 pm
Claremont Ballroom |
Keynote & Lunch: Rachel Brand, Principal Deputy
Assistant General, US Dept. of Justice, Office of Legal Policy
Introduced by Frank Torres, Microsoft
Materials:
Opening Remarks stream audio recording:
mp3
| wma
Opening Remarks download audio recording:
mp3
Rachel Brand Keynote stream audio recording:
mp3 |
wma
Rachel Brand Keynote download audio recording:
mp3
CFP2004 General Discussion
Blog
|
1:15 - 1:30 pm |
Break
|
1:30 - 2:30 pm |
Concurrent Sessions:
Concurrent sessions on second floor
|
1:30 - 2:30 pm Mendocino 2d floor |
Concurrent 10: Identity Theft: Addressing the
Problem at a Global Level
Identity theft often reaches beyond the borders of a single
state or country. Recently, for instance, credit card information of US citizens
was used to manufacture false cards in Romania, and then the cards were used in the
EU. To efficiently combat cybercrime and ID theft, countries must cooperate to
create a system of protection & enforcement that goes beyond each country's
borders. This session will provide actual examples of national and global identity
theft schemes; analyze existing and pending cyber security laws, protections, and
initiatives in different countries that address directly or indirectly identity
theft; review existing global cybercrime treaties and initiatives, and suggest
potential coordinated actions nationally and globally.
Moderator:
Françoise Gilbert, Managing
Director & Founder, IT Law Group
Panelists:
Mark Webber, English Solicitor, Osborne
Clarke;
Jacques F. Gilbert, Senior
Vice-President & Chief Architect, First Data Corporation;
Joanne McNabb, Chief Office of Privacy
Protection, State of California
Materials:
Joanne McNabb's PowerPoint
Françoise Gilbert's
PowerPoint
Jacques Gilbert's slides,
"Identity Theft: Technology Aspects"
Mark Webber's PowerPoint
Concurrent 10 Blog
|
1:30 - 2:30 pm Sonoma 2d floor |
Concurrent 11: Cease and Desist: Two Years of
Fighting Online Chill
During the course of the conference (or before, if you're less
fortunate) you may have been served with a cease-and-desist demand letter making
outrageous allegations that your online activities violate the law. The Chilling
Effects Clearinghouse (chillingeffects.org) has been collecting and cataloguing
these letters for the past two years and, where appropriate, fighting online chill.
Panelists from the project will give a weather map from data we've gathered,
assessing the climate for online activity: What activities risk being frozen out?
What can we do to warm the air?
Panelists: Wendy Seltzer,
Intellectual Property Attorney, Electronic Frontier Foundation; Jennifer M. Urban, Visiting Acting Clinical
Professor, University of California Berkeley School of Law (Boalt Hall): "Two Years
of DMCA Takedowns"; Agnes Li, J.D. Candidate,
Harvard Law School
Materials:
chillingeffects.org
Fake C&Ds Passed Out to CFP Attendees:
DMCA 512 notice (pdf) |
trademark infringement notice
(pdf)
Concurrent 11 Blog
Chillingeffects_JM_Urban.ppt
|
1:30 - 2:30 pm Napa 1 & 2 2d floor |
Concurrent 12: Next Generation Democracy: The
Internet, Young Voters, and Election 2004
The 18-24 year-old age group exhibits a vigorous attachment to online
community, from p2p networks to IM and text messaging. Will these attachments spill
over into the physical, and the political world? Will these attachments stick with
youth as their own demographics change? This panel will explore the ways that the
Internet has been used to engage youth in politics and in Election 2004.
Moderator:
David M. Anderson, Executive Director, Youth '04
Panelists:
Vincent M. Keenan, President, Publius.org;
Thomas A. Bryer, Director, Party Y;
David B. Smith, Executive Director, Mobilizing America's Youth
Materials:
Concurrent 12 Blog
|
1:30 - 2:30 pm Monterey 2d floor |
Concurrent 13: The Law and Ethics of Online
Research
A lawyer and an ethicist will lead a discussion regarding the unique
ethical and legal issues of privacy, anonymity, consent, and data ownership that
attend on-line research, and regarding the formulation of guidelines for conducting
such research.
Panelists: Dan Burk, Oppenheimer
Wolff & Donnelly Professor of Law, University of Minnesota; Charles Ess, Professor
of Philosophy and Religion and Distinguished Research Professor of
Interdisciplinary Studies, Drury University
Materials:
Concurrent 13 Blog
|
1:30 - 2:30 pm Napa 3 2d floor |
Concurrent 14: Security and Privacy for the Citizen in the Post 9-11
Digital Age: A European Perspective
Identity is a unifying concept bringing together security and privacy
aspects under one roof. The European Union has developed a strong legal and
regulatory framework in order to properly manage the balance between these two
aspects while respecting the fundament rights of the citizen. This balance,
strongly influenced by cultural environments in each country, has been challenged
recently by emerging information and communications technologies and post 9/11
policy initiatives. In this panel, technical experts will provide an overview of
the future of identity in Europe and its impact on security & privacy.
Presentations will be followed by a discussion between European privacy proponents
& representatives from law enforcement agencies about the future challenges related
to identity.
Moderator: Emilio De Capitani,
Civil Servant, European Parliament, Secretary of Committee on Citizen's Rights,
Justice and Home Affairs, "Identity and Balance Between Security and Privacy in
Europe"
Panelists:
Laurent Beslay, Scientific
Officer, Institute for Prospective Technological Studies (IPTS), European
Commission, "Identity: Privacy and Security for the Citizen in the Information
Society"; ;
Paul de Hert, Associated Professor (UHD), University of Leiden
University (the Netherlands), and Professor of Law, University of Brussels
(Belgium), "Privacy and Data Protection Concepts in Europe";
Marie-Hélène
Boulanger, Justice and Internal Affairs, European Commission, "Integration of
Data Protection Concerns in Justice and Home Affairs Large Scale IT
Systems."
Materials:
Passenger
Name Records - 31/03/2004
[local copy]
Laurent Beslay's slides
Paul de Hert's slides
Emilio De Capitani's slides
Concurrent 14 Blog
|
2:30 - 2:45 pm |
Closing Coffee & Chocolate Break
(Sponsored by Hewlett Packard)
|
2:45 - 3:15 pm
Empire Ballroom |
Special Event: Verified Voting Mock Election
Two candidates will stump us all in an election for "CFPer of the Year" at a
mock election designed to raise some of the issues brought up by electronic voting
systems with and without an auditing capability. Run by Verified Voting Founder
David Dill, this election will employ real election officials impersonating mock
election officials representing California and Florida and will serve as an
excellent introduction to the Electronic Voting panel that follows. Join us for a
fun way to explore this important topic and support the candidate you like best.
Who knows what might happen to your vote!
Presented by the Verified Voting Foundation
Materials:
CFP 2004: Mock Voter
Information Center
Download audio recording: mp3
Stream audio recording:
mp3 |
wma
CFP2004 General Discussion
Blog
|
3:15 - 4:30 pm
Empire Ballroom |
Plenary 12: Electronic Voting: The Great Paper Trail
Debate
If your next vote is cast on a touch screen voting machine, how
will you know that it was counted correctly? Many computer scientists and public
interest groups argue that voter verified paper ballots are a necessary check for
the integrity of our elections. Opponents of voter verified paper ballots counter
that they unnecessarily complicate the voting process, add needless expenses, and
make providing access for the disabled more difficult, without really improving the
integrity of elections.
Moderator:
Lorrie Faith Cranor, Associate Research
Professor, Carnegie Mellon University
Panelists:
David Wagner, Assistant Professor,
University of California, Berkeley;
Douglas A. Kellner, Commissioner, New
York City Board of Elections: "Counting Secret Ballots in Public";
Kim Alexander, California Voter
Foundation;
Michael I. Shamos, Distinguished Career
Professor, Carnegie Mellon University: "Paper vs. Electronic Voting Records: An
Assessment";
Scott Konopasek, Registrar of
Voters, San Bernardino County, California: "Audit Trail or 'New-Fangled' Chad? The
Phenomenon of Unintended Consequences";
Dan Tokaji, Assistant Professor of Law,
Ohio State University, Moritz College of Law
Materials:
Scott Konopasek's paper: "Audit
Trail or 'New-fangled' Chad? The Phenomenon of Unintended Consequences
Michael Shamos' paper: "Paper v.
Electronic Voting Records -- An Assessment, April 2004; also available at http://euro.ecom.cmu.edu/people/faculty/mshamos/paper.htm
David Wagner's PowerPoint
Download audio recording:
mp3
Stream audio recording:
mp3 |
wma
Plenary 12 Blog
|
4:30 - 4:35 pm
Empire Ballroom |
Special Performance:
"Ashcroft's Army"
Performed by Wendy Grossman; composed by John McCutcheon.
John McCutcheon recording available on John McCutcheon's album
"Hail to the Chief" and on The John McCutcheon website
at www.folkmusic.com.
Materials:
Lyrics
[local copy]
Download audio recording:
mp3
Stream audio recording:
mp3
|
wma
|
4:35 - 5:35 pm
Empire Ballroom |
Closing Keynote:
Brewster Kahle,
Digital Librarian, Internet Archive
"Universal Access to All Human Knowledge"
Materials:
Download audio recording (public domain & freely reproducible without
permission): mp3
Stream audio recording (public domain & freely reproducible without
permission):
mp3
|
wma
|
|
Saturday April 24 |
2:00 pm
San Francisco Meet at Union Square |
Related Event: San Francisco
Surveillance Camera Players, Walking Tour
A walking tour is scheduled for Saturday, April 24th. It meets at 2pm by
the statue in the middle of Union Square in San Francisco (take the BART to Powell
Street, then walk three blocks north on Powell). (For more information, come to
the SF-SCP BOF Wednesday night.)
|
|