EPIC logo




======================================================================
                          E P I C  A l e r t
======================================================================
Volume 12.02                                         January 27, 2005
----------------------------------------------------------------------

                           Published by the
             Electronic Privacy Information Center (EPIC)
                           Washington, D.C.

            http://www.epic.org/alert/EPIC_Alert_12.02.html

======================================================================
Table of Contents
======================================================================

[1] EPIC Hosts Annual Privacy Coalition Summit
[2] EPIC FOIA Suit Reveals FBI Kept Millions of Passenger Records
[3] Inauguration Day Puts DC Under Unprecedented Surveillance
[4] Acxiom Lobbied for Broad Exemptions to Privacy Law After 9/11
[5] EPIC Urges Privacy Protections for Federal Employee ID Card
[6] News in Brief
[7] EPIC Bookstore: Prying Eyes
[8] Upcoming Conferences and Events

======================================================================
[1] EPIC Hosts Annual Privacy Coalition Summit
======================================================================

The Privacy Coalition's annual meeting took place in Washington, DC on
January 20-22.  Over 30 state and national organizations comprised of
privacy, civil rights and civil liberties experts gathered to assess
the impact of emerging technology on privacy, government policy, and
business activity over the past year.  The group also assessed the
privacy climate for 2005.

Panel discussions covered a wide range of challenges to civil
liberties, consumer rights, new technology and international
developments in privacy policy.  The challenges faced by civil rights,
civil liberties, and privacy advocates are not just domestic but
international.  It is anticipated that as technology is introduced in
the form of radio frequency identification (RFID), biometric
identification systems, and the incorporation of global positioning
systems (GPS) in consumer products the lines between public and
private activity will continue to blur.  The goal of many government
actions post 9/11 has been to make surveillance more efficient and to
encourage the mutual exchange of data on citizens among nations.

The meeting was an opportunity for privacy experts specializing in a
wide range of areas to teach and learn from each other in an intense
mini-course environment.  Those invited to join this annual gathering
are experts in their fields, which makes the summit unique and a
highly valued experience.  For more information on the Privacy
Coalition or joining this distinguished group, send your request to
coney@epic.org.

Privacy Coalition web site:

     http://privacycoalition.org

EPIC 2004 Privacy Year in Review/Issues to Watch:

     http://www.epic.org/alert/EPIC_Alert_yir2004.html

======================================================================
[2] EPIC FOIA Suit Reveals FBI Kept Millions of Passenger Records
======================================================================

EPIC's Freedom of Information litigation has revealed that the FBI is
keeping 257.5 million records on people who flew on commercial
airlines prior to the 9/11 terrorist attacks in its permanent
investigative database.  The data retained by the FBI come from
Passenger Name Records (PNR), which may include credit card numbers,
travel itineraries, and meal requests.

In a sworn declaration explaining why the FBI made heavy redactions in
documents released to EPIC in September, the Bureau noted that it
obtained the passenger records from a number of airlines shortly after
September 11, 2001.  The FBI also obtained passenger data from one
airline through a federal grand jury subpoena.  Citing privacy
concerns, the FBI refused to name the airlines that turned over
passenger records, the airline employees who disclosed it or the FBI
special agents who collected it.

The declaration explains the data were stored and combined with other
information from PENTTBOMB, the FBI's investigation into the 9/11
attacks.  "[T]he Airline Data Sets have been entered by the Cyber
Division into a 'Data Warehouse' and have been intertwined for
analytical purposes with the information from several other PENTTBOMB
Data Sets," the declaration stated.

Another EPIC FOIA lawsuit revealed last year that the FBI obtained one
full year's worth of passenger data from Northwest Airlines after
9/11.  The document revealed that the amount of personal data was so
vast that the airline provided it to the FBI on 6000 CDs.  In an
article based upon this information, the New York Times confirmed that
the Bureau had acquired passenger data not only from Northwest, but
from other U.S. air carriers, as well.

Declaration from the FBI:

     http://www.epic.org/privacy/airtravel/hardy_decl.pdf

FBI documents on collection of passenger data from airlines:

     http://www.epic.org/privacy/airtravel/fbi_airdata.pdf

For more information on privacy of passenger data, see EPIC's
Passenger Profiling Page:

     http://www.epic.org/privacy/airtravel/profiling.html

======================================================================
[3] Inauguration Day Puts DC Under Unprecedented Surveillance
======================================================================

President Bush's Inauguration on January 20 took Washington, DC to a
new level of surveillance.  Law enforcement conducted live video
surveillance from helicopters and used hundreds of video cameras
installed around the U.S. Capitol and along the parade route to
monitor the crowd and demonstrators.

Most of the video surveillance monitoring technology in DC was
deployed well before 9/11, prior to any threat of potential terrorist
attacks.  The DC Metropolitan Police Department (MPD) originally
installed cameras throughout the city to monitor demonstrators without
notifying the DC Council until the cameras were installed, thereby
denying the public a meaningful opportunity to comment. In 2002, EPIC
obtained documentary evidence under the Freedom of Information Act
that DC's surveillance equipment is mainly directed toward
demonstrators. In the last few years the MPD, FBI, and other law
enforcement agencies used live video surveillance from helicopters
mainly to control peaceful demonstrations.

In 2004, a DC Council report found that the MPD maintained widespread
and extensive spying operations on political advocacy organizations
based on their political philosophies and conduct protected under the
First Amendment, even in the absence of allegations of criminal
activity.  The Council recommended legislation to restrict MPD
surveillance of political organizations and preemptive arrests of
protesters.

These findings underscore the need for public vigilance and oversight
to make sure that new tools of surveillance do not impinge on
demonstrators' civil liberties, are used for proper purposes and not
subsequently used for illegitimate objectives.  The remote
surveillance of political demonstrators raises important First
Amendment issues: although police surveillance of protestors does not
constitute a direct ban on demonstration activities, images could be
used in retaliation against individuals for their political views and
chill protestors' freedom of speech, assembly and association.

Although the use of surveillance cameras raises far-reaching
constitutional questions that implicate the rights of people who
engage in peaceful public protest, video surveillance is not
regulated.  In DC, the U.S. Park Police and the MPD use video cameras
only subject to two weak guidelines, one of which was not even
submitted to the public for comment.  In testimony before Congress and
the DC Council, EPIC and other civil liberties groups have
consistently advocated that better privacy safeguards are necessary,
and that the use of video surveillance, if it sweeps broadly across
innocent activity and has an impact on First Amendment rights, must be
regulated at least as stringently as surveillance of electronic
communications.

EPIC has documented the growing expansion of video surveillance in
Washington through its Observing Surveillance Project:

     http://www.observingsurveillance.org

For more information about law enforcement use of video surveillance,
see EPIC's Video Surveillance Page:

     http://www.epic.org/privacy/surveillance

For more information about surveillance of protestors, see EPIC's
Protestor Privacy and Free Expression Rights Page:

     http://www.epic.org/privacy/protest

======================================================================
[4] Acxiom Lobbied for Broad Exemptions to Privacy Law After 9/11
======================================================================

EPIC has obtained documents showing that commercial data broker Acxiom
lobbied to water down key federal privacy laws immediately after the
September 11, 2001 terrorist attacks.  Acxiom sought broader access to
"credit headers" and drivers information to develop a system for
"identity and information verification that can be used by
organizations such as airlines, airports, cruise ships, and large
buildings and other applications to better determine whether a person
is actually who they say they are."

The documents consist mainly of notes prepared by Department of
Justice staff detailing conversations and communications between then
Attorney General John Ashcroft and Acxiom president Charles Morgan and
company attorney Jerry Jones.  According to the documents, Morgan and
Jones approached the Department of Justice on several occasions to
discuss "amendments to the Gramm Leach Bliley (GLB) and the Drivers
Privacy Protection Act (DPPA)" to accommodate a developing system for
"identity and information verification."  The documents also reference
107 H.R. 1447, the Aviation Security Act, which ultimately became law
without Acxiom's proposed amendments.  It also appears that Acxiom
courted Senator Blanche Lincoln (D-AR) and former Senator Tim
Hutchinson (R-AR) to support the amendments.

The Acxiom amendments would have created large loopholes in federal
privacy legislation.  For instance, Acxiom's amendments to the DPPA
would have allowed state motor vehicle administrations to release
Social Security numbers, photographs, and possibly biometric
information to any government agency or business "in order to
authenticate the identity or information relating to an individual."
That language is broad enough to justify release of drivers'
information for almost any transaction, down to opening an account at
a video rental store.

The Acxiom language to amend the Gramm-Leach-Bliley Act would have
created a broad exemption allowing disclosure of non-public personal
information not only for anti-terrorism purposes, but also to
authenticate "information provided by or concerning a consumer."  The
provision would have superceded state law, and information falling
within this exemption would not have been subject to the Fair Credit
Reporting Act. Because the proposed amendments allowed authentication
for "legitimate commercial purposes," the language would have
permitted use of "credit headers," compilations of personal
identification information, for even minor transactions.

EPIC documents on Acxiom's lobbying and proposed amendments:

     http://www.epic.org/privacy/drivers/acxiomlobby.pdf

EPIC staff publication, Big Brother's Little Helpers:

     http://papers.ssrn.com/sol3/papers.cfm?abstract_id=582302

======================================================================
[5] EPIC Urges Privacy Protections for Federal Employee ID Card
======================================================================

In response to a Department of Homeland Security directive, the
National Institute for Science and Technology (NIST) is developing an
ID system for federal employees and contractors.  The directive calls
for the development of a mandatory, government-wide standard for
secure and reliable forms of identification issued by the federal
government to its employees and contractors.  In response, NIST has
created a set of Federal Information Processing Standards (FIPS 201)
known as the Personal Identity Verification Project. Outcry by the
public and federal employee unions prompted NIST to hold a public
meeting on January 19 to discuss privacy concerns in the
implementation of federal employee ID cards.

At the meeting, EPIC Policy Analyst Frannie Wellings told NIST and the
Office of Management and Budget that while one of the functional
objectives of the proposal is to "protect the privacy of the
cardholder," the standard they have developed does not include
adequate safeguards to accomplish this goal.  Wellings urged that a
privacy impact assessment must be performed for the proposal
immediately, and that Fair Information Practices should be a minimal
baseline for protecting employee information.  She argued that NIST
must incorporate privacy protections into the decisionmaking process
now rather than awkwardly and inefficiently adjusting the standard
later.

Wellings noted that the standard's problems are numerous, including an
overextensive scope of data collection and storage.  Data minimization
would reduce the likelihood that the card will be used for unrelated
or potentially risky purposes.  The standard also involves contactless
cards that use radio frequency identification (RFID).  RFID poses a
security risk, allowing for remote and covert monitoring.  The
security of the information collected, displayed and made accessible
on the card requires a high level of security on the card itself as
well as oversight and privacy training for all employees accessing,
controlling, and storing the data.

Wellings also stated that the proposal must include explicit policies
limiting the collection, access and use of the data by government
agencies and the private sector.  This standard could lead to the
development of a large centralized bank of personal information, with
no guarantees on how government agencies or private contractors will
use the data.  Federal employees and other cardholders will not know
how each agency is using this information.  Furthermore, data
aggregated for specific security purposes intended to combat terrorism
might be used for unrelated purposes.

Wellings also pointed out that the standard creates the potential for
agencies to track employee movement within federal buildings,
including visits to other offices or possibly to a union office.  As
the cardholder uses the card to access various areas, a record of
these movements can be retained, creating a high volume of data about
the movements of federal employees, which could be exploited.  In
addition, if an employee is wrongly identified as a terrorist or if
her information is used inappropriately, the proposal currently
provides no methods of redress.

Wellings recommended that before this standard is further developed,
NIST must conduct a privacy impact assessment, reduce the data
collected and stored in accordance with Fair Information Practices,
and cardholders must be provided with legally enforceable rights. In
order to protect the privacy of federal employees who are dedicating
themselves to public service, legislation will be necessary to enforce
employees' rights under the proposal.

For more information on employees' privacy rights, see EPIC's
Workplace Privacy Page:

     http://www.epic.org/privacy/workplace

More Information on biometrics, see EPIC's Biometrics Page:

     http://www.epic.org/privacy/biometrics

Homeland Security Presidential Directive (HSPD-12) requiring the
development of an ID system for federal employees and contractors:

     http://csrc.nist.gov/policies/Presidential-Directive-Hspd-12.html

Personal Identity Verification Project:

     http://www.csrc.nist.gov/piv-project

======================================================================
[6] News in Brief
======================================================================

HOMELAND SECURITY ABANDONS SWEEPING NON-DISCLOSURE AGREEMENTS

Secrecy News reports that the Department of Homeland Security has
decided to stop making its employees sign non-disclosure agreements to
gain access to unclassified information that is marked "for official
use only" or "sensitive but unclassified."  The non-disclosure
agreements drew opposition from employees' unions and others partly
because they gave the government extraordinary power to "conduct
inspections at any time or place for the purpose of ensuring
compliance."

Department of Homeland Security Management Directive 11042.1,
"Safeguarding Sensitive by Unclassified (For Official Use Only)
Information":

     http://www.fas.org/sgp/othergov/dhs-sbu-rev.pdf

Intra-agency memorandum on Management Directive 11042.1, "Safeguarding
Sensitive by Unclassified (For Official Use Only) Information":

     http://www.fas.org/sgp/othergov/dhs20050111.pdf


COALITION CALLS FOR POSTAL PRIVACY REFORM

As the annual volume of junk mail approaches that of normal, first
class missives, Private Citizen and a coalition of privacy groups have
called upon legislators to reform privacy protections against unwanted
commercial postal mail.  The groups wrote: "While American residents
now enjoy substantial federal protection from telemarketing sales
calls . . . the U.S. Postal Service has not made significant strides
to reduce unwanted junk mail."  The groups continued: "To illustrate
the environmental, and privacy impact of . . . one segment of the junk
mail industry last year, consider that if each of the 5,340,243,500 .
. . trashed credit card mailings weighed just two-thirds of an ounce.
The aggregate wasted tonnage of those trashed mailings would exceed
the weight of a battle ready NIMITZ Class aircraft carrier."

The groups called for a national do-not-mail list, similar to the
registry now running for telemarketing; a no junk mail sticker for
mailboxes that would allow individuals to mark their preference not to
receive "saturation" junk mail; improvements to existing methods of
blocking mail from a certain company; an opt-out under the "National
Change of Address" program, which would stop junk mailers from getting
addresses of movers; and a change to the "Cooperative Mail Rule,"
which allows for-profit mailers to partner with non-profit
organizations to send mail at a lower postage rate.

Coalition letter calling for do-not-mail postal privacy reform:

     http://www.privatecitizen.com/mail/congress-109

USPS 2004 Annual Report, showing the volume of junk mail and standard
mail:

     http://www.usps.com/history/anrpt04/freview_006.htm

For more information about junk mail, see EPIC's Postal Privacy Page:

     http://www.epic.org/privacy/postal


HIGH-LEVEL OFFICIALS RESIGN FROM THE FEDERAL COMMUNICATIONS COMMISSION

Federal Communications Commission Chairman Michael Powell,
Commissioner Kathleen Abernathy, and Media Bureau Chief Kenneth Ferree
have all announced they are stepping down from their posts.  In the
coming year, the Commission will continue to deal with questions of
wiretapping, broadband access and privacy, and restrictions on
telemarketing.  It remains to be seen whether the White House and
Congress will select a Chairman and Commissioner who will respond to
the strong public support for freedom of expression without
surveillance and for non-commercial use and public ownership of
communications channels.  Such public support has been demonstrated in
recent months by hundreds of thousands of comments filed on various
issues and public attendance at hearings held around the country.

More information about public opinion on privacy is available at:

     http://www.epic.org/privacy/survey


GOOGLE WATCH WARNS LIBRARIES ABOUT GOOGLE'S TRACKING POTENTIAL

In a letter to the American Association of Libraries, Google Watch has
noted that Google's agreement to digitize material for certain
libraries creates enormous potential for tracking.  Google Watch
urged, "those librarians who contract with Google for access to their
books and documents for purposes of digitization should require that
any future searches done on Google that produce this material, must
respect the anonymity of the searcher.  This would mean that Google
cannot record the IP address or unique ID from the cookie for such
searches.  Short of this, another alternative would be for libraries
to deny Google access to any literature that has political content or
relevance."  Google Watch continued, "the ALA is already involved with
discovery and lobbying on this issue with the Justice Department over
practices that grew out of the USA Patriot Act.  But keep in mind that
the scale of anything Google does is a million times larger than the
scale of anything that involves discrete libraries, access to paper
hard copy, and occasional subpoenas for specific information."

The letter also noted that Google has made commitments to five major
libraries to digitize much of the material in their catalogs -- and
has insisted that the libraries sign nondisclosure agreements in
exchange for the service.

Google Watch appeal to the American Library Association:

     http://www.google-watch.org/appeal.html


KOREAN MEDIATION COMMITTEE RELEASES REPORT ON MAJOR PRIVACY ISSUES

The Korean Personal Information Dispute Mediation Committee released
its 2004 Annual Report.  The report identifies the major privacy
issues as the release and sale of customers' personal information by a
mobile telecom company; the database-marketing of customers' personal
information; the enactment of the Fundamental Law on Protection of
Personal Information; the increased use of blogs and the opening of
private life to the public; and the leaking of personal information
through P2P and data retrieval sites.

The report is available online in English:

     http://www.kopico.or.kr/eng/pub_01.jsp#1

For more information on privacy issues in Korea, see Privacy and Human
Rights 2004:

     http://www.epic.org/redirect/phr2004.html


EUROPEAN PARLIAMENT TO HOLD HEARING ON DATA PROTECTION AND TERRORISM

The European Parliament's Committee on Civil Liberties, Justice and
Home Affairs will hold a public seminar on January 31 to discuss the
necessary steps and data for law enforcement activities, common
principles of protection for data used for security purposes, access
and re-use of private data for security purposes in the specific case
of air passengers, Internet users' data, and financial data.  The
hearing will feature many high level officials from European Union
data protection and security agencies.

European Parliament's Committee on Civil Liberties, Justice, and Home
Affairs:

     http://www.europarl.eu.int/committees/libe_home.htm


NEW ON THE EPIC SITE: VICTORIA'S SECRET AND FINANCIAL PRIVACY

Outside the Beltway, it is not well known that a Victoria's Secret
catalog is one of the key reasons that Congress included privacy
protections for financial information when passing the
Gramm-Leach-Bliley Act.  A new web page on epic.org explains how one
Member of Congress was very upset that he started receiving Victoria's
Secret catalogs at his home in Washington.  He was convinced that his
credit union sold his new address to Victoria's Secret, and as a
result, he supported an amendment to add privacy protections to
federal financial services law.

EPIC's Victoria's Secret and Financial Privacy Page:

     http://www.epic.org/privacy/glba/victoriassecret.html

======================================================================
[7] EPIC Bookstore: Prying Eyes
======================================================================

Eric Gertler, Prying Eyes: Protect Your Privacy From People Who Sell
to You, Snoop on You, or Steal From You (Random House Reference 2004).

     http://www.powells.com/s?kw=prying+eyes&Search.x=50&Search.y=10

"You leave an electronic trail every time you use a credit card, rent
a DVD, mail in a rebate form, go to the doctor, open a bank account,
or surf the Internet at home and at work.

"News stories about identity theft, anti-terrorist legislation,
cyber-stalking, marketing databases, and employer surveillance
practices are evidence that your privacy is violated more and more
every day. Using examples from real-life situations, Prying Eyes
reveals how, often without your knowledge, people use your personal
information to sell to you, snoop on you, and steal from you.

"Eric Gertler reveals how to minimize your exposure in every facet of
life­at home, at the office, on vacation, at the store, at the
doctor's office, online, and on your cell phone. Beyond reporting and
speculation, Prying Eyes will empower you to take charge of your
personal information before someone else does.

"You will learn:

* How information about your bank account, credit, and purchases is
tracked, stored, and accessed -- and how to limit your exposure.

* How to protect yourself from identity theft­and how to recover if
you've been a victim.

* Risks to your privacy at work -- why it is important to separate
your personal life from your business life.

* Threats to your medical files -- who has access to them how they're
commonly mishandled, and how to prevent information from getting into
the wrong hands."

                       ================================

"The Public Voice WSIS Sourcebook: Perspectives on the World Summit on
the Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook

This resource promotes a dialogue on the issues, the outcomes, and the
process of the World Summit on the Information Society (WSIS).  This
reference guide provides the official UN documents, regional and
issue-oriented perspectives, as well as recommendations and proposals
for future action, as well as a useful list of resources and contacts
for individuals and organizations that wish to become more involved in
the WSIS process.

                       ================================

"The Privacy Law Sourcebook 2003: United States Law, International
Law, and Recent Developments," Marc Rotenberg, editor (EPIC 2003).
Price: $40. http://www.epic.org/bookstore/pls2003

The "Physicians Desk Reference of the privacy world."  An invaluable
resource for students, attorneys, researchers and journalists who need
an up-to-date collection of U.S. and International privacy law, as
well as a comprehensive listing of privacy resources.

                       ================================

"Filters and Freedom 2.0: Free Speech Perspectives on Internet Content
Controls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0

A collection of essays, studies, and critiques of Internet content
filtering.  These papers are instrumental in explaining why filtering
threatens free expression.

                       ================================

"The Consumer Law Sourcebook 2000: Electronic Commerce and the Global
Economy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls

The Consumer Law Sourcebook provides a basic set of materials for
consumers, policy makers, practitioners and researchers who are
interested in the emerging field of electronic commerce.  The focus is
on framework legislation that articulates basic rights for consumers
and the basic responsibilities for businesses in the online economy.

                       ================================

"Cryptography and Liberty 2000: An International Survey of Encryption
Policy," Wayne Madsen and David Banisar, authors (EPIC 2000). Price:
$20.  http://www.epic.org/bookstore/crypto00&

EPIC's third survey of encryption policies around the world.  The
results indicate that the efforts to reduce export controls on strong
encryption products have largely succeeded, although several
governments are gaining new powers to combat the perceived threats of
encryption to law enforcement.

                       ================================

EPIC publications and other books on privacy, open government, free
expression, crypto and governance can be ordered at:

       EPIC Bookstore
       http://www.epic.org/bookstore

       "EPIC Bookshelf" at Powell's Books
       http://www.powells.com/features/epic/epic.html

======================================================================
[8] Upcoming Conferences and Events
======================================================================

12th Annual Network and Distributed System Security Symposium. The
Internet Society.  February 3-4, 2005.  San Diego, CA.  For more
information: http://www.isoc.org/isoc/conferences/ndss/05/index.shtml.

14th Annual RSA Conference.  RSA Security.  February 14-18, 2005.  San
Francisco, CA.  For more information:
http://2005.rsaconference.com/us/general/default.aspx.

The World Summit on the Information Society PrepCom 2.  February
17-25, 2005.  Geneva, Switzerland.  For more information:
http://www.itu.int/wsis/preparatory2/hammamet/index.html.

3rd International Conference of Information Commissioners.  Federal
Institute of Access to Information.  February 20-23, 2005.  Cancun,
Mexico.  For more information:
http://www.icic-cancun.org.mx/index.php?lang=eng.

The Concealed I: Anonymity, Identity, and the Prospect of Privacy.  On
the Identity Trail and the Law and Technology Program at the
University of Ottawa.  March 4-5, 2005.  Ottawa, Canada.  For more
information: http://www.anonequity.org/concealedI.

The Health Information Technology Summit West. eHealth Initiative.
March 6-8, 2005.  San Francisco.  For more information:
http://www.hitsummit.com.

IAPP National Privacy Summit 2005.  International Association of
Privacy Professionals.  March 9-11, 2005.  Washington, DC.  For more
information:  http://privacyassociation.org.

O'Reilly Emerging Technology Conference.  March 14-17, 2005.  San
Diego, CA.  For more Information:
http://conferences.oreillynet.com/etech.

Policy Options and Models for Bridging Digital Divides: Freedom,
Sharing and Sustainability in the Global Network Society.  March
14-15, 2005.  Project on Global Challenges of eDevelopment, Hypermedia
Laboratory, University of Tampere.  Tampere, Finland.  For more
information: http://www.globaledevelopment.org/forthcoming.htm.

7th International General Online Research Conference.  German
Society for Online Research.  March 22-23, 2005.  Zurich, Switzerland.
For more information: http://www.gor.de.

The 2005 Nonprofit Technology Conference.  Nonprofit Technology
Enterprise Network.  March 23-25, 2005.  Chicago, IL.  For more
information: http://www.nten.org/ntc.

Internet Corporation For Assigned Names and Numbers (ICANN) Meeting.
April 4-8, 2005.  Mar del Plata, Argentina.  For more information:
http://www.icann.org.

VoIP World Africa 2005.  April 5-7, 2005.  Terrapinn.  Johannesburg,
South Africa.  For more information:
http://www.terrapinn.com/2005/voipza/confprog.stm.

5th Annual Future of Music Policy Summit.  Future of Music
Coalition.  April 10-11, 2005.  Washington DC.  For more information:
http://www.futureofmusic.org/events/summit05/index.cfm.

CFP2005: Fifteenth Annual Conference on Computers, Freedom and
Privacy.  April 12-15, 2005.  Seattle, WA.  For more information:
http://www.cfp2005.org.

2005 IEEE Symposium on Security and Privacy.  IEEE Computer Society
Technical Committee on Security and Privacy in cooperation with The
International Association for Cryptologic Research.  May 8-11, 2005.
Berkeley, CA.  For more information:
http://www.ieee-security.org/TC/SP2005/oakland05-cfp.html.

SEC2005: Security and Privacy in the Age of Ubiquitous Computing.
Technical Committee on Security & Protection in Information Processing
Systems with the support of Information Processing Society of Japan.
May 30-June 1, 2005.  Chiba, Japan.  For more information:
http://www.sec2005.org.

Internet Corporation For Assigned Names and Numbers (ICANN) Meeting.
July 11-15, 2005.  Luxembourg City, Luxenbourg.  For more information:
http://www.icann.org.

3rd International Human.Society@Internet Conference.  July 27-29,
2005.  Tokyo, Japan.  For more information: http://hsi.itrc.net.

The World Summit on the Information Society.  Government of Tunisia.
November 16-18, 2005.  Tunis, Tunisia.  For more information:
http://www.itu.int/wsis.

Internet Corporation For Assigned Names and Numbers (ICANN) Meeting.
November 30-December 4, 2005.  Vancouver, Canada.  For more
information: http://www.icann.org.

======================================================================
Subscription Information
======================================================================

Subscribe/unsubscribe via web interface:

       https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Back issues are available at:

       http://www.epic.org/alert

The EPIC Alert displays best in a fixed-width font, such as Courier.

======================================================================
Privacy Policy
======================================================================

The EPIC Alert mailing list is used only to mail the EPIC Alert and to
send notices about EPIC activities.  We do not sell, rent or share our
mailing list.  We also intend to challenge any subpoena or other legal
process seeking access to our mailing list.  We do not enhance (link
to other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail address
from this list, please follow the above instructions under
"subscription information."

======================================================================
About EPIC
======================================================================

The Electronic Privacy Information Center is a public interest
research center in Washington, DC.  It was established in 1994 to
focus public attention on emerging privacy issues such as the Clipper
Chip, the Digital Telephony proposal, national ID cards, medical
record privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Act
litigation, and conducts policy research.  For more information, see
http://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite
200, Washington, DC 20009. +1 202 483 1140 (tel), +1 202 483 1248
(fax).

If you'd like to support the work of the Electronic Privacy
Information Center, contributions are welcome and fully
tax-deductible.  Checks should be made out to "EPIC" and sent to 1718
Connecticut Ave., NW, Suite 200, Washington, DC 20009.  Or you can
contribute online at:

       http://www.epic.org/donate

Your contributions will help support Freedom of Information Act and
First Amendment litigation, strong and effective advocacy for the
right of privacy and efforts to oppose government regulation of
encryption and expanding wiretapping powers.

Thank you for your support.

---------------------- END EPIC Alert 12.02 ----------------------

.