======================================================================== E P I C A l e r t ======================================================================== Volume 13.14 July 13, 2006 ------------------------------------------------------------------------ Published by the Electronic Privacy Information Center (EPIC) Washington, D.C. http://www.epic.org/alert/EPIC_Alert_13.14.html ======================================================================== Table of Contents ======================================================================== [1] Georgia State, Federal Courts Halt Photo ID Requirement for Voters [2] EPIC Supports Supreme Court Review of DNA Databases [3] British ID Card Plan Stalls [4] FBI Proposes Wiretap Law Expansion [5] Defense Department Monitored Student Email [6] News in Brief [7] EPIC Bookstore: John Battelle's "The Search" [8] Upcoming Conferences and Events ======================================================================== [1] Georgia State, Federal Courts Halt Photo ID Requirement for Voters ======================================================================== The second attempt by the Georgia General Assembly to require voters to present photo identification as a pre-condition to cast a ballot was struck down by both state and federal courts in Georgia. Judge Harold Murphy of the U.S. District Court for the Northern District of Georgia issued a preliminary injunction preventing the state from demanding that registered voters present a government-issued photo ID at the polls. A week earlier, Georgia's Fulton County Superior Court found the "2006 Photo ID Act" imposed an unauthorized qualification on the right to vote, since the Georgia State Constitution only requires qualified voters to be 18 years old, mentally competent, and state residents. Accordingly, any of seventeen forms of proof of residence previously specified in state law, including a signed affirmation certificate, will remain acceptable to identify an eligible elector at the polling place. The state claim, filed by former Democratic Governor Roy E. Barnes, states that the new law would make it harder for minorities, the elderly, and the poor to participate in public elections. Defendant, Republican Governor Sonny Perdue, argued the Act was a reasonable means to prevent voter fraud. In his opinion, state judge Melvin K. Westmoreland rejected any political arguments raised by the parties relying solely on constitutional grounds stating, "Where the right of suffrage is fixed in the Constitution it cannot be restricted by the legislature." Secretary of State Cathy Cox had previously testified she "cannot recall one documented case of voter fraud. . . that specifically related to the impersonation of a registered voter at voting polls." The Secretary of State's office also estimated that as of 2005, 675,000 Georgians otherwise eligible to vote lack a driver's license or state issued photo identification card. In an official statement, Governor Perdue stated, "dead people have cast votes in Georgia and. . . there was no way to tell how many deceased voters, felons or even illegal aliens may have been casting ballots in Georgia elections." Governor Perdue's emergency appeal of the decision to the Georgia Supreme Court was denied. At the federal level, Judge Murphy had previously struck down an earlier law requiring voters present photo identification as a qualification to vote. The plaintiffs in this earlier case argued that the cost and inconvenience of obtaining such an ID was too much for many poor voters and therefore a violation of the Twenty-Fourth Amendment prohibition on poll taxes. In response to that ruling, the Georgia enacted the 2006 Photo ID Act mandating the same list of acceptable forms of photo identification but provided a means for voters to obtain a photo identification card at no cost. Georgia's 2006 Photo ID Act: http://www.legis.state.ga.us/legis/2005_06/sum/sb84.htm Fulton County Superior Court Decision (pdf): http://www.epic.org/privacy/voting/fulton_order.pdf EPIC's Congressional Testimony on Voter ID Requirements (pdf): http://www.epic.org/privacy/voting/voter_id-statement.pdf EPIC's Voting Resources Page: http://www.epic.org/privacy/voting/ National Committee for Voting Integrity: http://votingintegrity.org/ ======================================================================== [2] EPIC Supports Supreme Court Review of DNA Databases ======================================================================== EPIC has filed a "friend of the court" brief asking the U.S. Supreme Court to hear the case of a probationer who was forced to provide a DNA sample for inclusion in a federal database. The brief points out the more invasive nature of DNA profiling and also notes the lack of adequate protections to ensure that tissue samples are not abused for other purposes. One month prior to his release from probation, Lamar Johnson was ordered to provide the government with a blood sample, so that his DNA might be entered into a national database. Johnson refused, stating that the sample collection, being more invasive than fingerprinting, was a violation of his Fourth Amendment rights against unreasonable searches and seizures. He then filed for an injunction against the collection in federal district court. His case was dismissed by the federal district court in Washington, D.C., and he appealed to the D.C. Circuit, which upheld the district court's opinion, comparing the blood sample to a fingerprinting. EPIC supported Johnson's request for the Supreme Court to hear his case, noting in its "friend of the court" brief that collecting a tissue sample for DNA profiling was far more invasive than collecting a fingerprint. While a fingerprint does not reveal any characteristics about an individual, a DNA profile can reveal an individual's likely race and sex. Close relatives also share similar profiles, so collecting one person's DNA may easily implicate her immediate family. The brief also states that there are insufficient safeguards on the use of the original tissue sample, from which a vast amount of personal information, including personal traits and medical information, can be gleaned. There are no uniform guidelines determining how long this information-rich sample can be held, nor whether the sample will be destroyed if a conviction is overturned or a sentence served. The collection and use of DNA continues to expand, with laws now allowing police to collect DNA samples not only from convicted criminals, but from individuals who are arrested or merely detained by the government. Law enforcement has begun to use DNA collected from family members to implicate suspects, and the wealth of information contained within federal DNA databases allows for unanticipated uses and abuses in the absence of adequate safeguards. EPIC's Johnson v. Quander Page: http://www.epic.org/privacy/johnson EPIC Brief in Johnson v. Quander (pdf): http://www.epic.org/privacy/johnson/johnson_cert_amicus.pdf Johnson's Petition for Certiorari (pdf): http://www.epic.org/privacy/johnson/cert_petition.pdf EPIC's Genetic Privacy Page: http://www.epic.org/privacy/genetic/ ======================================================================== [3] British ID Card Plan Stalls ======================================================================== Plans for a mandatory national ID card in the United Kingdom have stalled after internal emails revealing severe problems with the plan were leaked from the UK's Home Office. The plan, originally scheduled to roll out in 2008, is now subject to further review and likely rescheduling, according to the government. Opponents of the plan, however, are pointing to the delay as evidence that the plan is unworkable. Despite public assertions from Home Office officials and Prime Minister Blair that the ID cards would combat terrorism, crime, illegal immigration and fraud, the internal emails, leaked to the Sunday Times, reveal that officials privately doubted that the plans were feasible or effective. One email states that the plans "lack clear benefits from which to demonstrate a return on investment." Another reveals that, due to fears that the plan cannot be implemented, a "face-saving," scaled-back plan could be introduced, where personal information and biometric data is stored in a national database, but not printed on cards. The original plan called for a mandatory ID card that would bear the holder's name, address, photograph, and other biometric data, such as iris scans and fingerprints. Government officials have placed the cost of the scheme at around 6 billion pounds, whereas a study last year by the London School of Economics estimated the cost at closer to 19.2 billion pounds. The report also noted that the card scheme faced massive technical issues, created potential security risks, and faced widespread opposition from UK citizens. Furthermore, the study found that creation of the national database would likely run afoul of a number of national laws and international agreements. A recent report on counter-terrorism by the Home Office also failed to mention the ID cards as part of Britain's national security strategy, raising additional doubts as to the viability of the card plan. Leaked Emails from the Home Office: http://www.timesonline.co.uk/article/0,,2087-2261631,00.html London School of Economics 2005 Study of the ID Card Plan: http://www.epic.org/redirect/lseid605.html London School of Economics 2006 Study (pdf): http://is2.lse.ac.uk/IDcard/identityreport.pdf EPIC's National ID Card Page: http://www.epic.org/privacy/id_cards/ Privacy International on National ID Cards: http://www.epic.org/redirect/pi_id_cards.html ======================================================================== [4] FBI Proposes Wiretap Law Expansion ======================================================================== The FBI has proposed that Congress pass a law that would expand a 1994 telephone wiretapping law to apply to Internet and voice over Internet protocol (VoIP) services. Among other things, the as-yet uncirculated proposal would require manufacturers of routing equipment to design systems so that the government can easily wiretap Internet communications. The Communications Assistance for Law Enforcement Act (CALEA) was passed in 1994, after law enforcement officials worried that new technologies, like mobile phones, were making it difficult to wiretap telephone conversations. The law therefore required that telephone companies build their systems to allow easy eavesdropping by the government. Recognizing that wiretapping Internet connections posed distinct problems, however, the law did not apply to "information services" like Internet service providers. The proposed law does more than apply the wiretap requirements to Internet services, however. The bill also would require service providers to process or filter customer communications to identify and isolate the types of communications law enforcement requested, and early reports indicate that it would eliminate the current requirement that the Justice Department report the number of wiretaps it grants each year. The proposed law follows a recent decision by the D.C. Circuit Court of Appeals that allowed the FCC to expand the reach of CALEA to the Internet without changing the law. Businesses, schools, and public interest groups, including EPIC, had challenged the FCC decision, which was upheld by a 2-1 panel. Changing CALEA through legislative action could prevent appeal or reconsideration of the Circuit Court's decision. Communications experts from the Information Technology Association of America have criticized applying CALEA to Internet services, noting that the decentralized structure of the Internet makes it difficult to apply CALEA without simultaneously wiretapping innocent individuals, introducing major security risks, or restructuring the network's nature. Text of CALEA: http://www.epic.org/privacy/wiretap/calea/calea_law.html D.C. Circuit Decision in ACE v. FCC (pdf): http://www.epic.org/privacy/wiretap/ace_v_fcc.pdf Justice Department's Annual Wiretap Reports: http://www.uscourts.gov/library/wiretap.html ITAA Report on Applying CALEA to the Internet (pdf): http://www.itaa.org/news/docs/CALEAVOIPreport.pdf ======================================================================== [5] Defense Department Monitored Student Email ======================================================================== The Department of Defense confirmed allegations that it had monitored the email of students who were preparing to protest against military policies, according to the Chronicle of Higher Education. Targets of the surveillance were engaged in organizing protests against the war in Iraq and the military's "don't ask don't tell" policy that prevents openly gay individuals from serving in the military. The Defense Department began the surveillance after being notified of protests through its TALON network, a system intended to inform the Department of potential terrorist threats. Instead, reports from the TALON system, released under a Freedom of Information Act request submitted by the Servicemembers Legal Defense Network, revealed the Defense Department investigating student protests against on-campus military recruitment. The released documents indicated surveillance of student speech at the State University of New York at Albany, Southern Connecticut State University, the University of California at Berkeley, and William Paterson University of New Jersey. Other programs within the Defense Department also focus on collecting student information. In May 2005, the Department announced that it was going to create a massive database for recruiting. The Pentagon's "Joint Advertising and Market Research" system proposed to combine student information, Social Security numbers, and information from state motor vehicle repositories into a unified database housed at a private direct marketing firm. Approximately 25 million individuals' information would be in the database, and individuals would not be allowed to opt out of inclusion. In June 2005, EPIC and 8 privacy and consumer groups objected to the creation of the database, arguing that it violated the Privacy Act and was unnecessarily invasive. In reaction to the database announcement, over 100 groups sent a letter to Secretary of Defense Rumsfeld protesting the database. To date, Secretary Rumsfeld has not acknowledged receipt of the letter. FOIA Documents Revealing Student Monitoring (pdf): http://www.sldn.org/binary-data/SLDN_ARTICLES/pdf_file/3028.pdf EPIC Memo on DOD Database (pdf): http://www.epic.org/privacy/student/epic_dod_71505.pdf Coalition Letter to the DOD Criticizing JAMRS: http://www.privacycoalition.org/nododdatabase/letter.html ======================================================================== [6] News in Brief ======================================================================== Congress Investigates Financial Surveillance Program The Bush administration failed to adequately inform Congress of the recently revealed secret banking surveillance program by briefing only a handful of members, according to the chairwoman of the Subcommittee on Oversight and Investigations of the House Committee on Financial Services. At a hearing about the program Tuesday, N.Y. Rep. Sue Kelly said she has asked for a Government Accountability Office investigation of the program. The government is using broad, secret subpoenas to review confidential financial transactions from a banking consortium that routes data in more than 200 countries. Hearing Information on "The Terror Finance Tracking Program: http://www.epic.org/redirect/finance_tracking.html US-VISIT RFID Needs Better Security, Report Says The Department of Homeland Security's Inspector General stated that the US-VISIT border security program fails to protect data collected through the use of radio frequency identification (RFID) tags. US-VISIT has been testing RFID-enabled I-94 visa forms and has distributed more than 150,000 of them. The Inspector General's report found "security vulnerabilities that could be exploited to gain unauthorized or undetected access to sensitive data" associated with people who carried the RFID-enabled forms. DHS Inspector General Report (redacted) (pdf): http://www.epic.org/redirect/usvisit_ig_report.html EPIC's US-VISIT page: http://www.epic.org/privacy/us-visit/ AT&T Fined $550,000 for Privacy Failures In a settlement reached with the Federal Communications Commission, AT&T agreed to pay $550,000 for failures to adequately safeguard consumer privacy. According to the settlement, AT&T may have improperly used customer data for marketing purposes. AT&T also agreed to improve procedures for opt-out notification. This investigation was prompted by an EPIC petition submitted to the FCC in August 2005. FCC Commissioner Adelstein praised the settlement, noting that "enforcement is essential to promote compliance with our consumer privacy rules." Adelstein also encouraged the FCC to move forward on a pending rulemaking more fully addressing EPIC's petition to better protect consumers' phone records. Text of the Settlement (pdf): http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-06-100A1.pdf Adelstein's Statement on the Settlement (pdf): http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-06-100A2.pdf EPIC's Phone Records Page: http://www.epic.org/privacy/cpni Illinois Outlaws Pretexting, Adopts New Privacy Safeguards Illinois Governor Rod R. Blagojevich signed legislation last week outlawing "pretexting:" pretending to be an account holder so as to obtain access to someone else's personal information. In the past year, Illinois has passed several laws to protect consumer privacy, including measures that address identity theft, limit the use of the Social Security Number, require notification of security breeches, and allow state residents to put a security freeze on their credit report if they believe their personal information has been compromised. Text of the Illinois Law (pdf): http://www.ilga.gov/legislation/94/SB/PDF/09400SB2554lv.pdf EPIC's Pretexting and Phone Records Page: http://www.epic.org/privacy/iei National Conference of State Legislatures Privacy Page: http://www.ncsl.org/programs/lis/cip/priv/privacy.htm Spotlight: Multiple Security Failures at Veterans Affairs In the wake of May's massive data theft, the Department of Veterans Affairs falls under the Spotlight on Surveillance. The immense data loss could easily happen again because of weak security at the agency, Spotlight reports. Veterans Affairs was warned about security weaknesses for many years, but failed to act, according to government officials. Documents reveal that the agency had given permission for the analyst, from whom the equipment was stolen, to work from home with the sensitive personal data. Agency officials previously said the analyst violated agency procedure by taking the data home. Spotlight on Surveillance: Veterans Affairs Data Breach http://epic.org/privacy/surveillance/spotlight/0506/default.html ======================================================================== [7] EPIC Bookstore: John Battelle's "The Search" ======================================================================== The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture. John Battelle. Portfolio, 2005. http://www.powells.com/partner/24075/biblio/62-1591840880-0 "What does the world want? According to John Battelle, a company that answers that question — in all its shades of meaning — can unlock the most intractable riddles of business and arguably of human culture itself. And for the past few years, that's exactly what Google has been doing. Jumping into the game long after Yahoo, Alta Vista, Excite, Lycos, and other pioneers, Google offered a radical new approach to search, redefined the idea of viral marketing, survived the dot-com crash, and pulled off the largest and most talked-about initial public offering in the history of Silicon Valley. But The Search offers much more than the inside story of Google's triumph. It's also a big-picture book about the past, present, and future of search technology and the enormous impact it's starting to have on marketing, media, pop culture, dating, job hunting, international law, civil liberties, and just about every other sphere of human interest. More than any of its rivals, Google has become the gateway to instant knowledge. Hundreds of millions of people use it to satisfy their wants, needs, fears, and obsessions, creating an enormous artifact that Battelle calls the Database of Intentions. Somewhere in Google's archives, for instance, you can find the agonized research of a gay man with AIDS, the silent plotting of a would-be bomb maker, and the anxiety of a woman checking out her blind date. Combined with the databases of thousands of other search-driven businesses, large and small, it all adds up to a gold mine of information that powerful organizations (including the government) will want to get their hands on." ================================ EPIC Publications: "Information Privacy Law: Cases and Materials, Second Edition" Daniel J. Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98. http://www.epic.org/redirect/aspen_ipl_casebook.html This clear, comprehensive introduction to the field of information privacy law allows instructors to enliven their teaching of fundamental concepts by addressing both enduring and emerging controversies. The Second Edition addresses numerous rapidly developing areas of privacy law, including: identity theft, government data mining,and electronic surveillance law, the Foreign Intelligence Surveillance Act, intelligence sharing, RFID tags, GPS, sypware, web bugs, and more. Information Privacy Law, Second Edition, builds a cohesive foundation for an exciting course in this rapidly evolving area of law. ================================ "Privacy & Human Rights 2004: An International Survey of Privacy Laws and Developments" (EPIC 2004). Price: $50. http://www.epic.org/bookstore/phr2004 This annual report by EPIC and Privacy International provides an overview of key privacy topics and reviews the state of privacy in over 60 countries around the world. The report outlines legal protections, new challenges, and important issues and events relating to privacy. Privacy & Human Rights 2004 is the most comprehensive report on privacy and data protection ever published. ================================ "FOIA 2004: Litigation Under the Federal Open Government Laws," Harry Hammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004). Price: $40. http://www.epic.org/bookstore/foia2004 This is the standard reference work covering all aspects of the Freedom of Information Act, the Privacy Act, the Government in the Sunshine Act, and the Federal Advisory Committee Act. The 22nd edition fully updates the manual that lawyers, journalists and researchers have relied on for more than 25 years. For those who litigate open government cases (or need to learn how to litigate them), this is an essential reference manual. ================================ "The Public Voice WSIS Sourcebook: Perspectives on the World Summit on the Information Society" (EPIC 2004). Price: $40. http://www.epic.org/bookstore/pvsourcebook This resource promotes a dialogue on the issues, the outcomes, and the process of the World Summit on the Information Society (WSIS). This reference guide provides the official UN documents, regional and issue-oriented perspectives, and recommendations and proposals for future action, as well as a useful list of resources and contacts for individuals and organizations that wish to become more involved in the WSIS process. ================================ "The Privacy Law Sourcebook 2004: United States Law, International Law, and Recent Developments," Marc Rotenberg, editor (EPIC 2005). Price: $40. http://www.epic.org/bookstore/pls2004/ The Privacy Law Sourcebook, which has been called the "Physician's Desk Reference" of the privacy world, is the leading resource for students, attorneys, researchers, and journalists interested in pursuing privacy law in the United States and around the world. It includes the full texts of major privacy laws and directives such as the Fair Credit Reporting Act, the Privacy Act, and the OECD Privacy Guidelines, as well as an up-to-date section on recent developments. New materials include the APEC Privacy Framework, the Video Voyeurism Prevention Act, and the CAN-SPAM Act. ================================ "Filters and Freedom 2.0: Free Speech Perspectives on Internet Content Controls" (EPIC 2001). Price: $20. http://www.epic.org/bookstore/filters2.0 A collection of essays, studies, and critiques of Internet content filtering. These papers are instrumental in explaining why filtering threatens free expression. ================================ EPIC publications and other books on privacy, open government, free expression, crypto and governance can be ordered at: EPIC Bookstore http://www.epic.org/bookstore "EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html ================================ EPIC also publishes EPIC FOIA Notes, which provides brief summaries of interesting documents obtained from government agencies under the Freedom of Information Act. Subscribe to EPIC FOIA Notes at: https://mailman.epic.org/cgi-bin/control/foia_notes ======================================================================== [8] Upcoming Conferences and Events ======================================================================== 7th Annual Institute on Privacy Law: Evolving Laws and Practices in a Security-Driven World. Practising Law Institute. June 19-20, New York, New York. July 17-18, Chicago, Illinois. Live webcast available. For more information: www.pli.edu identitymashup: Who Controls and Protects the Digital Me? Berkman Center for Internet & Society, Harvard Law School. June 19-21, 2006. Cambridge, Massachusetts. For more information: http://www.identitymash-up.org/ Call for papers for Identity and Identification in a Networked World. Submissions due by July 5. New York University. Symposium on September 29-30, 2006. New York, New York. For more information: http://www.easst.net/node/976 Infosecurity New York. Reed Exhibitions. September 12-14, 2006. New York, New York. For more information: http://www.infosecurityevent.com 34th Research Conference on Communication, Information, and Internet Policy. Telecommunications Policy Research Conference. September 29-October 1, 2006. Arlington, Virginia. For more information: http://www.tprc.org/TPRC06/2006.htm 6th Annual Future of Music Policy Summit. Future of Music Coalition. October 5-7, 2006. Montreal, Canada. For more information: http://www.futureofmusic.org/events/summit06/ The IAPP Privacy Academy 2006. International Association of Privacy Professionals. October 18-20, 2006. Toronto, Ontario, Canada. For more information: www.privacyassociation.org International Conference on Privacy, Security, and Trust (PST 2006). University of Ontario Institute of Technology. October 20-November 1, 2006. Markham, Ontario, Canada. For more information: http://www.businessandit.uoit.ca/pst2006/ BSR 2006 Annual Conference. Business for Social Responsibility. November 7-10, 2006. New York, New York. For more information: http://www.bsr.org/BSRConferences/index.cfm CFP2007: Computers, Freedom, and Privacy Conference. Association for Computing Machinery. May 2007. Montreal, Canada. For more information: http://www.cfp2007.org ====================================================================== Subscription Information ====================================================================== Subscribe/unsubscribe via web interface: https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news Back issues are available at: http://www.epic.org/alert The EPIC Alert displays best in a fixed-width font, such as Courier. ======================================================================== Privacy Policy ======================================================================== The EPIC Alert mailing list is used only to mail the EPIC Alert and to send notices about EPIC activities. We do not sell, rent or share our mailing list. We also intend to challenge any subpoena or other legal process seeking access to our mailing list. We do not enhance (link to other databases) our mailing list or require your actual name. In the event you wish to subscribe or unsubscribe your e-mail address from this list, please follow the above instructions under "subscription information." ======================================================================== About EPIC ======================================================================== The Electronic Privacy Information Center is a public interest research center in Washington, DC. It was established in 1994 to focus public attention on emerging privacy issues such as the Clipper Chip, the Digital Telephony proposal, national ID cards, medical record privacy, and the collection and sale of personal information. EPIC publishes the EPIC Alert, pursues Freedom of Information Act litigation, and conducts policy research. For more information, see http://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202 483 1140 (tel), +1 202 483 1248 (fax). If you'd like to support the work of the Electronic Privacy Information Center, contributions are welcome and fully tax-deductible. Checks should be made out to "EPIC" and sent to 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you can contribute online at: http://www.epic.org/donate Your contributions will help support Freedom of Information Act and First Amendment litigation, strong and effective advocacy for the right of privacy and efforts to oppose government regulation of encryption and expanding wiretapping powers. Thank you for your support. ------------------------- END EPIC Alert 13.14 ------------------------- .