======================================================================== E P I C A l e r t ======================================================================== Volume 13.06 March 24, 2006 ------------------------------------------------------------------------ Published by the Electronic Privacy Information Center (EPIC) Washington, D.C. http://www.epic.org/alert/EPIC_Alert_13.06.html ======================================================================== Table of Contents ======================================================================== [1] EPIC, Archive File Brief Supporting Release of Abu Ghraib Images [2] EPIC Testifies Against Social Security Number Expansion [3] House Committee Approves Bill to Weaken Data Breach Laws [4] Judge Restricts Justice Department's Demand for Google Records [5] Security Flaws at Retailers Affect Thousands of Debit Card Holders [6] News in Brief [7] EPIC Bookstore: Mark S. Monmonier's "Spying with Maps" [8] Upcoming Conferences and Events ======================================================================== [1] EPIC, Archive File Brief Supporting Release of Abu Ghraib Images ======================================================================== EPIC and the National Security Archive have filed an amicus brief urging an appeals court to permit the disclosure of photos and videos showing American troops abusing detainees at Abu Ghraib prison in Iraq. The Pentagon has refused to release the information to the American Civil Liberties Union under the Freedom of Information Act, claiming that it would endanger U.S. soldiers serving in Iraq. EPIC and the Archive argue that the government is turning FOIA on its head by claiming that information likely to expose government misconduct should be withheld to prevent public outrage. In this case, the ACLU submitted Freedom of Information Act requests to several government agencies for information about the treatment of detainees in U.S. custody, including controversial images of abuse that had been reported in the media. When the government failed to respond to the ACLU's request nearly a year later, the organization filed suit in the District Court for the Southern District of New York. U.S. District Judge Alvin K. Hellerstein reviewed a sampling of photos depicting abuse of detainees, and ordered the government to release them in redacted form to protect the privacy of the pictured individuals. The government appealed the ruling to the Second Circuit Court of Appeals, arguing that disclosure of the images would "endanger the life or physical safety" of U.S. troops and coalition forces by provoking insurgent and terrorist attacks against them. The government also said that the photos should not be released, even in the redacted form required by Judge Hellerstein, because such disclosure could invade the personal privacy of the detainees. The amicus brief written by EPIC and the Archive argues that the government's claims undermine the FOIA's purpose of promoting open, honest and accountable government. The brief shows that U.S. courts have never allowed the potential for public anger to thwart the right to free expression guaranteed by the Constitution and reflected, in part, by the FOIA. The brief also argues that disclosure of the photos will not threaten personal privacy because Judge Hellerstein has already taken precautions to safeguard the rights of the pictured detainees. Disclosure of these redacted images will advance the public interest in examining the propriety of the U.S. soldiers' conduct. Such disclosure will also help to hold higher government officials responsible for the abuses at Abu Ghraib. Amicus Brief Filed by EPIC and the National Security Archive (pdf): http://www.epic.org/open_gov/darby/darby_amicus.pdf District Court Decision in ACLU v. Department of Defense (pdf): http://www.gwu.edu/~nsarchiv/news/20060313/aOrder092905.pdf National Security Archive Press Release: http://www.gwu.edu/~nsarchiv/news/20060313/index.htm ======================================================================== [2] EPIC Testifies Against Social Security Number Expansion ======================================================================== In testimony before the House Subcommittee on Social Security, EPIC Executive Director Marc Rotenberg urged Congress not to expand the uses of the Social Security number and the Social Security card. "Every system of identification is subject to error, misuse, and exploitation," Rotenberg said. The hearing was the fourth in a series held by Representative McCrery (R-LA) to focus on high-risk issues facing the Social Security number. The hearings, held over the course of the last four months, examined fraud, the use of the number in verifying employment eligibility, and possible modification of the card. Some members of Congress have proposed that the card contain digital photos, machine-readable identifiers, and biometric identifiers that could turn the Social Security card into a national ID card. Current Social Security cards, while bearing anti-counterfeiting features such as those used on banknotes, are not intended or designed to be used for identification. In creating the Social Security Administration in the 1930s, Congress was concerned with the number being used as a universal identifier that could aid in government tracking of activities, and that the first act of the newly formed Administration was to limit the card's use. Congress also halted later expansions of expansion of the card's role by passing Section 7 of the Privacy Act of 1974. Putting the card to new, unintended uses, Rotenberg testified, would erode privacy, running counter to this trend of protection. Rotenberg also noted that the improper use of the SSN for identification by the private sector contributes to identity theft. Nevertheless, members of Congress, including Representatives David Dreier (R-CA) and Silvestre Reyes (D-TX), called for additions to the card. Representative Drier insisted both that Social Security numbers are already used for identification purposes by the private sector, and also that the new photograph-bearing, machine-readable card would not, in fact, be an identification document. Frederick Streckewald of the Social Security Administration testified that adding ID-like features to the Social Security card would cost at least $9.5 billion. Dr. Stephen Kent of the National Research Council also testified that complex ID systems like the one proposed for the Social Security card often are pressed into unintended secondary uses that can cause privacy and security problems. Testimony of EPIC Executive Director Marc Rotenberg before Subcommittee on Social Security (pdf): http://www.epic.org/privacy/ssn/mar_16test.pdf Subcommittee on Social Security, Fourth Hearing on High-Risk SSN Issues: http://www.epic.org/redirect/ssn_hearings.html EPIC's SSN Page: http://www.epic.org/privacy/ssn ======================================================================== [3] House Committee Approves Bill to Weaken Data Breach Laws ======================================================================== The House Financial Services Committee approved legislation last week that would roll back protections for many Americans' personal records. The Financial Data Protection Act would create a weak national standard for consumer protection, overriding or "preempting" stronger state consumer protection laws. For instance, comapnies only have to notify consumer of data breaches where "information is reasonably likely to have been or to be misused in a manner causing substantial harm or inconvenience." However, many states have more stringent requirements that cause notices to be issued whenever a security breach occurs. The reasoning behind these requirements is that businesses have significant incentives not to give notice, and may overlook breaches and their potential harms to avoid embarrassment. But other loopholes in the language further limit the requirement to give notice. These include that the information must be "sensitive financial personal information," and that the company must know the scope of the breach (in many cases, the scope is unknown). The credit freeze provisions are similarly weak. Credit freeze is the ability of an individual to limit disclosure of their consumer report to new creditors, thus stopping companies from opening new accounts. This erects a nearly perfect shield against identity theft. Many states allow any concerned residents to freeze their credit as a precaution against future fraud. H.R. 3997, however, only allows credit freeze once someone has become a victim of identity theft. Furthermore, H.R. 3997 creates a difficult to use freeze mechanism that requires the victim to provide proof of the crime, to send the freeze request by certified mail, and it allows the consumer reporting agency to wait five business days before implementing the freeze. These inconveniences are designed to stop consumers from freezing their reports. The main driver of this legislation is preemption--the desire of many businesses to supersede stricter state laws. Additionally, the bill prohibits enforcement by the state attorneys general, weakening any possible enforcement of the law. The bill will next be considered by other committees in the House and Senate, where there is a possibility that it could be strengthened. H.R. 3997, the Financial Data Protection Act: http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.3997: EPIC's Page on Choicepoint and Other Security Breaches: http://www.epic.org/privacy/choicepoint/ Coalition letter on ID Theft Legislation: http://www.epic.org/privacy/choicepoint/datamarker11.09.05.html ======================================================================== [4] Judge Restricts Justice Department's Demand for Google Records ======================================================================== On March 17, a federal district judge in California issued an order limiting the Justice Department's demand for records from Google. While Google must still turn over a list of 50,000 web addresses, it will not have to reveal any Internet search terms submitted by users. The government's demands had been significantly narrowed compared, to the subpoena filed last August. That subpoena asked for the addresses of all web sites indexed by Google, as well as every search term entered into Google during a two-month period in 2005. Yahoo, Microsoft, and AOL, were also asked to provide records. Of the companies, Google alone objected, claiming that the demand threatened Google's trade secrets and its image as a protector of users' privacy. In making the decision, Judge Ware of the Northern District of California recognized that the demand affected not just Google, but also the privacy rights of individual Google users. Not only do users want the terms they search for to be private, search terms alone can sometimes reveal a user's identity, such as when people search for their social security numbers or credit card numbers to see if that information is available on the Internet. The judge also noted that the government might, in looking through search terms, decide to follow up on information for unauthorized purposes, quoting a Justice Department spokesperson who said that "if something raised alarms, we would hand it over…" Because of these concerns, the judge ruled that Google did not have to turn over search terms, but that the list of web addresses, since they did not impact privacy, had to be turned over. The Justice Department is seeking the records to conduct a statistical study for the defense of the Child Online Protection Act, an online censorship law that was blocked as unconstitutional by the Supreme Court in 2004. The government has given few details as to how it intends to use the information--an omission that the judge called "particularly striking," considering the time the government had to prepare the case, and given that it already had essentially the same information from the other major search engines. The Child Online Protection Act makes it a criminal offense for anyone to post adult material on the web, unless they first collect information from users proving that the user is not a minor. The Supreme Court barred enforcement of the law, saying that the government had not proven that this restriction on free speech was the most effective means to prevent minors from viewing adult material on the Internet. Text of the Decision in Google v. Gonzales (pdf): http://www.epic.org/privacy/gmail/doj_court_order.pdf Supreme Court Ruling on the Child Online Protection Act, Ashcroft v. ACLU: http://supct.law.cornell.edu/supct/html/03-218.ZS.html EPIC's Child Online Protection Act Page: http://www.epic.org/free_speech/copa/ ======================================================================== [5] Security Flaws at Retailers Affect Thousands of Debit Card Holders ======================================================================== Hundreds of thousands of debit cards may have been affected by fraud, but affected banks, card companies, and retailers are releasing very few details on the incident. Consumers first became aware of the problem as major banks, including Citibank, Wells Fargo, Washington Mutual, and Bank of America blocked ATM transactions in Canada, the United Kingdom and Russia, and quietly began issuing new debit cards to customers. The affected banks have since told reporters that the problems were related to fraudulent transactions that had been traced to data breaches at unspecified retailers. Recent reports have named OfficeMax and Sam's Club stores as likely sources for the breach, although OfficeMax continues to deny that it knew of any security mishaps. Thieves have apparently been able to collect not only the data contained within the magnetic strips on victims' ATM cards, but also the PIN codes that allow access to their accounts. Fraudulent withdrawals in Canada, the United Kingdom, and Russia apparently triggered the blocks in those countries, and have led to the arrests of 14 people in New Jersey. When consumers purchase goods with an ATM card, the PIN entered into the register is supposed to be encrypted when it is sent out for verification, and deleted after the transaction is complete. For the breaches to have occurred, the information must have been improperly retained on a computer and the thieves must have been able to decrypt the coded PINs, either because the encryption key was carelessly stored on the same server, or through hacking by an insider. The scope of the breach underscores the need for laws that will protect consumers from such crimes, by notifying them when breaches occur and allowing them to freeze accounts if they suspect fraud. Many bills currently before Congress provide loopholes that would allow breaches like this one to go unreported, and would not allow victims to place security freezes on their accounts unless they first filed a police report. Some of the proposed laws would also eliminate state stronger state consumer protections. EPIC's Identity Theft Page: http://www.epic.org/privacy/idtheft/ Coalition letter on ID Theft Legislation: http://www.epic.org/privacy/choicepoint/datamarker11.09.05.html ======================================================================== [6] News in Brief ======================================================================== Lawmakers Propose .xxx Domain Senators Max Baucus (D-MT) and Mark Pryor (D-AR) have proposed the Cyber Safety for Kids Act, a bill that would require the creation of a .xxx top-level domain. The law would require websites in the business of distributing adult material to register and host all adult material at the .xxx domain, instead of using any of the current top-level domains (such as .com, .net, .biz or others). Those who fail to use the .xxx domain would be subject to civil penalties by the Department of Commerce. The bill has not yet been introduced. Text of the .xxx TLD Bill (pdf): http://www.boingboing.net/images/CyberSafetyforKids.pdf Supreme Court Limits Warrantless Searches of Homes by Police The Supreme Court ruled Wednesday in Georgia v. Randolph that police, who do not have a warrant, may not search a home when one resident allows entry but another refuses it. Officers found evidence of illegal drugs in a home after a woman had given her consent to the officers but her husband had objected. In 1974, the Supreme Court ruled in United States v. Matlock that one occupant may give police permission to search a residence without a warrant if the other resident either is absent or does not object. Supreme Court Opinion in Georgia v. Randolph (pdf): http://www.supremecourtus.gov/opinions/05pdf/04-1067.pdf Federal Court: Fliers Must Complete Search Process Once It's Begun Last week, the Ninth Circuit Court of Appeals ruled in United States v. Aukai that travelers who begin the security screening process at airports cannot change their minds. The court said passengers who walk through airport metal detectors implicitly consent to a search, and they can't revoke that consent even if they are chosen to undergo a more extensive "secondary screening" process. The court did not rule on whether a passenger could refuse searches that are more invasive than simple pat-downs. Ninth Circuit Opinion in United States v. Aukai (pdf): http://www.epic.org/redirect/airport_screening_opinion.html EPIC's Passenger Profiling page: http://www.epic.org/privacy/airtravel/profiling.html Washington State Passes Pretexting Law Washington State appears to be the first to pass legislation to protect telephone records. The House and Senate have passed SB 6776, but the bill still awaits the Governor's signature. SB 6776 prohibits the intentional sale of phone records without consent of the account holder. It also prohibits pretexting. Under the law, it is a "class c felony" to sell, pretext, or knowingly purchase phone records, while it is a "gross misdemeanor" to knowingly receive records. There are also civil remedies, including a $5,000 liquidated damages award and attorneys' fees. Government entities and telephone companies are exempt from the law. EPIC Illegal Access to Phone Records Page: http://www.epic.org/privacy/iei/ Washington State Senate Bill 6776: http://apps.leg.wa.gov/billinfo/summary.aspx?bill=6776&year=2006 RFID Chips Vulnerable to Viruses A study by European researchers has revealed that radio frequency identification (RFID) systems can be affected by viruses encoded into individual chips. Melanie Rieback, Bruno Crispo, and Andrew Tanenbaum have authored a paper describing how the remotely readable tags can be programmed to infect the machines that read them and the databases that store their information. Such malicious programs could then force the systems to produce more infected tags, further spreading the virus. Text of the RFID Virus Paper (pdf): http://www.rfidvirus.org/papers/percom.06.pdf Paper Authors' Page on RFID Viruses: http://www.rfidvirus.org/ EPIC's RFID page: http://www.epic.org/privacy/rfid/ Deleted Gmails to be Turned Over in FTC Case A federal magistrate judge has ordered that Google turn over all of the email correspondence of a Gmail user, including emails that he has deleted. The Federal Trade Commission, investigating a credit counseling scam, subpoenaed the emails of Peter Baker, the owner of a company linked to the case. The subpoena asked not only for the email in Baker's Gmail mailboxes, but also for deleted emails that were retained on Google computers. Google's privacy policy says that copies of deleted email may remain on active servers for up to 60 days, or indefinitely on offline backup servers. Google's Gmail Privacy Policy: http://gmail.google.com/mail/help/privacy.html EPIC's Gmail page: http://www.epic.org/privacy/gmail/faq.html Homeland Security Gets Another 'F' for Computer Security A report by the House Government Reform Committee found that many federal agencies are failing to protect their computer and information networks. The committee gave the Department of Homeland Security an 'F' for a third straight year. The departments of Agriculture, Defense, Energy, State, Health and Human Services, Transportation, and Veterans Affairs also received failing grades again this year. The annual report bases the grades on information the agencies submit to the White House Office of Management and Budget, and the agencies' own internal assessments. Report and Testimony from Various Agency Leaders: http://www.epic.org/redirect/dhs_computer_security.html ======================================================================== [7] EPIC Bookstore: Mark S. Monmonier's "Spying with Maps" ======================================================================== Mark S. Monmonier. "Spying with Maps: Surveillance Technologies and the Future of Privacy" (University of Chicago Press, 2002). http://www.powells.com/partner/24075/biblio/7-0226534278-1 "Maps, as we know, help us find our way around. But they're also powerful tools for someone hoping to find you. Widely available in electronic and paper formats, maps offer revealing insights into our movements and activities, even our likes and dislikes. In Spying with Maps, the "mapmatician" Mark Monmonier looks at the increased use of geographic data, satellite imagery, and location tracking across a wide range of fields such as military intelligence, law enforcement, market research, and traffic engineering. Could these diverse forms of geographic monitoring, he asks, lead to grave consequences for society? To assess this very real threat, he explains how geospatial technology works, what it can reveal, who uses it, and to what effect. Despite our apprehension about surveillance technology, Spying with Maps is not a jeremiad, crammed with dire warnings about eyes in the sky and invasive tracking. Monmonier's approach encompasses both skepticism and the acknowledgment that geospatial technology brings with it unprecedented benefits to governments, institutions, and individuals, especially in an era of asymmetric warfare and bioterrorism. Monmonier frames his explanations of what this new technology is and how it works with the question of whether locational privacy is a fundamental right. Does the right to be left alone include not letting Big Brother (or a legion of Little Brothers) know where we are or where we've been? What sacrifices must we make for homeland security and open government?" ================================ EPIC Publications: "Information Privacy Law: Cases and Materials, Second Edition" Daniel J. Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98. http://www.epic.org/redirect/aspen_ipl_casebook.html This clear, comprehensive introduction to the field of information privacy law allows instructors to enliven their teaching of fundamental concepts by addressing both enduring and emerging controversies. The Second Edition addresses numerous rapidly developing areas of privacy law, including: identity theft, government data mining,and electronic surveillance law, the Foreign Intelligence Surveillance Act, intelligence sharing, RFID tags, GPS, sypware, web bugs, and more. Information Privacy Law, Second Edition, builds a cohesive foundation for an exciting course in this rapidly evolving area of law. ================================ "Privacy & Human Rights 2004: An International Survey of Privacy Laws and Developments" (EPIC 2004). Price: $50. http://www.epic.org/bookstore/phr2004 This annual report by EPIC and Privacy International provides an overview of key privacy topics and reviews the state of privacy in over 60 countries around the world. The report outlines legal protections, new challenges, and important issues and events relating to privacy. Privacy & Human Rights 2004 is the most comprehensive report on privacy and data protection ever published. ================================ "FOIA 2004: Litigation Under the Federal Open Government Laws," Harry Hammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004). Price: $40. http://www.epic.org/bookstore/foia2004 This is the standard reference work covering all aspects of the Freedom of Information Act, the Privacy Act, the Government in the Sunshine Act, and the Federal Advisory Committee Act. The 22nd edition fully updates the manual that lawyers, journalists and researchers have relied on for more than 25 years. For those who litigate open government cases (or need to learn how to litigate them), this is an essential reference manual. ================================ "The Public Voice WSIS Sourcebook: Perspectives on the World Summit on the Information Society" (EPIC 2004). Price: $40. http://www.epic.org/bookstore/pvsourcebook This resource promotes a dialogue on the issues, the outcomes, and the process of the World Summit on the Information Society (WSIS). This reference guide provides the official UN documents, regional and issue-oriented perspectives, and recommendations and proposals for future action, as well as a useful list of resources and contacts for individuals and organizations that wish to become more involved in the WSIS process. ================================ "The Privacy Law Sourcebook 2004: United States Law, International Law, and Recent Developments," Marc Rotenberg, editor (EPIC 2005). Price: $40. http://www.epic.org/bookstore/pls2004/ The Privacy Law Sourcebook, which has been called the "Physician's Desk Reference" of the privacy world, is the leading resource for students, attorneys, researchers, and journalists interested in pursuing privacy law in the United States and around the world. It includes the full texts of major privacy laws and directives such as the Fair Credit Reporting Act, the Privacy Act, and the OECD Privacy Guidelines, as well as an up-to-date section on recent developments. New materials include the APEC Privacy Framework, the Video Voyeurism Prevention Act, and the CAN-SPAM Act. ================================ "Filters and Freedom 2.0: Free Speech Perspectives on Internet Content Controls" (EPIC 2001). Price: $20. http://www.epic.org/bookstore/filters2.0 A collection of essays, studies, and critiques of Internet content filtering. These papers are instrumental in explaining why filtering threatens free expression. ================================ EPIC publications and other books on privacy, open government, free expression, crypto and governance can be ordered at: EPIC Bookstore http://www.epic.org/bookstore "EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html ================================ EPIC also publishes EPIC FOIA Notes, which provides brief summaries of interesting documents obtained from government agencies under the Freedom of Information Act. Subscribe to EPIC FOIA Notes at: https://mailman.epic.org/cgi-bin/control/foia_notes ======================================================================== [8] Upcoming Conferences and Events ======================================================================== Beyond the Basics: Advanced Legal Topics in Open Source and Collaborative Development in the Global Marketplace. University of Washington School of Law. March 21, 2006. Seattle, Washington. For more information: http://www.law.washington.edu/lct/Events/FOSS/ Call for papers for the 34th Research Conference on Communication, Information, and Internet Policy. Telecommunications Policy Research Conference. Proposals should be based on current theoretical or empirical research relevant to communication and information policy, and may be from any disciplinary perspective. Deadline is March 31, 2006. For more information: http://www.tprc.org/TPRC06/call06.htm Making PKI Easy to Use. National Institutes of Health. April 4-6, 2006. Gaithersburg, Maryland. For more information: http://middleware.internet2.edu/pki06/ First International Conference on Availability, Reliability and Security. Vienna University of Technology. April 20-22, 2006. Vienna, Austria. For more information: http://www.ifs.tuwien.ac.at/ares2006/ Third International Conference on Security in Pervasive Computing. University of York. April 19-20, 2006. York, United Kingdom. For more information: http://www.cs.york.ac.uk/security/spc-2006.html CHI 2006 Workshop on Privacy-Enhanced Personalization. UC Irvine Institute for Software Research and the National Science Foundation. April 22-23. Montreal, Quebec, Canada. For more information: http://www.isr.uci.edu/pep06/ The First International Conference on Legal, Security and Privacy Issues in IT (LSPI). CompLex. April 30-May 2, 2006. Hamburg, Germany. For more information: http://www.kierkegaard.co.uk/ Computers, Freedom, and Privacy Conference (CFP 2006). Association for Computing Machinery May 2-5, 2006. Washington, DC. For more information: http://cfp2006.org/ Infosecurity New York. Reed Exhibitions. September 12-14, 2006. New York, New York. For more information: http://www.infosecurityevent.com 34th Research Conference on Communication, Information, and Internet Policy. Telecommunications Policy Research Conference. September 29-October 1, 2006. Arlington, Virginia. For more information: http://www.tprc.org/TPRC06/2006.htm International Conference on Privacy, Security, and Trust (PST 2006). University of Ontario Institute of Technology. October 20-November 1, 2006. Oshawa, Ontario, Canada. For more information: http://www.businessandit.uoit.ca/pst2006/ BSR 2006 Annual Conference. Business for Social Responsibility. November 7-10, 2006. New York, New York. For more information: http://www.bsr.org/BSRConferences/index.cfm ====================================================================== Subscription Information ====================================================================== Subscribe/unsubscribe via web interface: https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news Back issues are available at: http://www.epic.org/alert The EPIC Alert displays best in a fixed-width font, such as Courier. ======================================================================== Privacy Policy ======================================================================== The EPIC Alert mailing list is used only to mail the EPIC Alert and to send notices about EPIC activities. We do not sell, rent or share our mailing list. We also intend to challenge any subpoena or other legal process seeking access to our mailing list. We do not enhance (link to other databases) our mailing list or require your actual name. In the event you wish to subscribe or unsubscribe your e-mail address from this list, please follow the above instructions under "subscription information." ======================================================================== About EPIC ======================================================================== The Electronic Privacy Information Center is a public interest research center in Washington, DC. It was established in 1994 to focus public attention on emerging privacy issues such as the Clipper Chip, the Digital Telephony proposal, national ID cards, medical record privacy, and the collection and sale of personal information. EPIC publishes the EPIC Alert, pursues Freedom of Information Act litigation, and conducts policy research. For more information, see http://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202 483 1140 (tel), +1 202 483 1248 (fax). If you'd like to support the work of the Electronic Privacy Information Center, contributions are welcome and fully tax-deductible. Checks should be made out to "EPIC" and sent to 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you can contribute online at: http://www.epic.org/donate Your contributions will help support Freedom of Information Act and First Amendment litigation, strong and effective advocacy for the right of privacy and efforts to oppose government regulation of encryption and expanding wiretapping powers. Thank you for your support. ------------------------- END EPIC Alert 13.06 ------------------------- .