NIST PRIVACY Forum
Abstract: This directory contains all issues of the digest and all related materials on internet privacy. The Internet PRIVACY Forum is a moderated digest for the discussion and analysis of issues relating to the general topic of privacy (both personal and collective) in the "information age" of the 1990's and beyond.
Information Technology and the Privacy of the
Abstract: This paper discusses the central role that personal privacy plays in our information technology world. The erosion of personal privacy by modern computer systems is an important and ongoing problem. Both the individual and society as a whole are hurt when the chilling effect of privacy invasion curtails the effective scope of personal freedom. Although the workings of this erosion process have been largely invisible to the average citizen, there are signs of growing public concern.
and Space Administration,
Assessment Panel Report On The Ames Management
Abstract: A team was established by NASA Headquarters in July 1992, to conduct a special management review of security, personnel and procurement matters which had been surfaced by the NASA Ames Research Center. The review was carried out during the period July 31-August 12, 1992. Primary focus of the review was on two divisions of the Aerophysics Directorate.
and Space Administration,
Management Review Of The Ames Research Center
Abstract: This management review found deficiencies in the culture and environment at the Ames Research Center that could lead to a significant loss of commercially valuable/sensitive technologies. It recommends corrective actions and also identifies steps which could further improve NASA's ability to protect commercially valuable/sensitive technology for first use by U.S. industry.
U.S. House of
CPSR Clipper Testimony 6/9
Abstract: This is the prepared testimony and Statement for the record of Marc Rotenberg, director CPSR Washington Office on Encryption Technology and Policy before The Subcommittee on Telecommunications and Finance, and Committee on Energy and Commerce.
Proposed Privacy Guidelines for the NREN
Abstract: Open Forum on Library and Information Service's Roles in the National Research and Education Network (NREN).
Lance J. Hoffman, Faraz A. Ali, Steven L. Heckler, Ann Huybrechts,
Cryptography: Policy And Technology Trends
Abstract: This report analyzes trends in encryption technology, markets, export controls, and legislation. It identifies five trends which will have a strong influence on cryptography policy in the United States.
U.S. Congress ,
Draft of New Digital Telephony Proposal
Abstract: The purpose of this Act is to clarify and define the responsibilities of common carriers, providers of common carrier support services, and telecommunications equipment manufacturers to provide the assistance required to ensure that government agencies can implement court orders and lawful authorizations to intercept the content of wire and electronic communications and acquire call setup information under chapters 119 and 206 of title 18 and chapter 36 of title 50.
FBI Digital Telephony Proposal
Abstract: The purposes of this Act are to clarify the responsibilities of providers of electronic communication services and private branch exchange operators to provide such assistance as necessary to ensure the ability of government agencies to implement lawful court orders or authorizations to intercept wire and electronic communications. SEC. 2.
What is the Internet PRIVACY Forum?
Abstract: Introduction to the Internet PRIVACY Forum.The Internet PRIVACY Forum is a moderated digest for the discussion and analysis of issues relating to the general topic of privacy (both personal and collective) in the "information age" of the 1990's and beyond. Topics include a wide range of telecommunications, information/database collection and sharing, and related issues, as pertains to the privacy concerns of individuals, groups, businesses, government, and society at large. The manners in which both the legitimate and the controversial concerns of business and government interact with privacy considerations are also topics for the digest. The PRIVACY Forum digest is supported in part by the ACM (Association for Computing Machinery) Committee on Computers and Public Policy.
The NSA Papers
Abstract: The following is the written response to my request for an interview with the NSA. To the best of author's knowledge, and according to their claims, it is the government's first complete answer to the many questions and allegations that have been made in regards to the matter of cryptography.
Clinton Administration Aims Fol Open Information
Abstract: This file consists of the press release concerning a new OMB A-130 Circular regarding information policy, followed by the full text of the document detailing the changes in that Circular.
Privacy Bulletin Board: Information for New Users
Abstract: The Privacy Rights Clearinghouse Bulletin Board Service (BBS) provides online information about telecommunications-related privacy issues for consumers with computer access.
Cordless and Cellular Phones: Is Everybody
Abstract: Cordless and Cellular Phone issues by PRC. It's easy for others to listen to calls you make on cordless or cellular phones ... and you may never know your conversations are being monitored. While cordless and cellular phones are very popular and have several advantages, privacy is not one of them. This paper starts the discussion on this issue.
How Private Is My Credit Report?
Abstract: Credit report issues by PRC. Credit reports are a gold mine of information about consumers. They contain Social Security numbers, addresses, credit payment status, employment, even legal information. To address concerns about who has access to this potentially sensitive information, California has passed a new law which enhances consumers' privacy rights. The credit bureaus have also adopted voluntary guidelines to improve consumer services.
How to Put an End to Unwanted or Harassing Phone
Abstract: Unwanted or Harassing phones calls issues by PRC. Obscene or harassing phone calls can be one of the most stressful and frightening invasions of privacy a person experiences. And unwanted phone calls, while a minor problem when compared with threatening calls, can still be a major inconvenience. Fortunately, there are steps you can take to help put an end to these unwelcome intrusions.
About The Privacy Rights Clearinghouse
Abstract: Introduction of the Privacy Rights Clearinghouse. The Clearinghouse is a nonprofit consumer education service funded by the California Public Utilities Commission through its Telecommunications Education Trust. It is administered by the University of San Diego School of Law's Center for Public Interest Law.
Junk Mail: How Did They All Get My Address?
Abstract: Issues on Junk Mail by PRC.Junk mail is only junk when you don't want to receive it. You may want to be on some mailing lists. If you want to receive some of this mail, do not contact the Direct Marketing Association and ask to be taken off all mailing lists. Rather, notify companies individually and tell them you want your name removed from their lists. Also, tell the companies you do business with to keep your name and address private. A growing number of businesses which rent their mailing lists are including statements in their catalogs to let you know you have this option.
How Private Is My Medical Information?
Abstract: Issues on Medical Information by PRC. Your medical information is shared by a wide range of people both in and out of the health care industry. Generally, access to your records is obtained when you agree to let others see them. You have probably signed "blanket waivers" or "general consent forms" when you have obtained medical care. When you sign such a waiver, you allow the health care provider to release your medical information to government agencies, insurance companies, employers and others.
From Cradle to Grave: Government Records and Your
Abstract: Issues on government records and people's privacy by PRC. Government records are public in order to ensure the free flow of information in a democratic society. The challenge to policymakers is to balance the public's right to information with the individual's right to privacy.
My Social Security Number: How Secure Is It?
Abstract: Issues on Social Security Number by PRC. When Social Security numbers were first issued in 1936, the federal government assured the public that use of the numbers would be limited to Social Security programs. Today, however, Social Security numbers are used for many purposes, including employee files, medical records, credit reports and banking information. In fact, the Social Security number (SSN) is now required for dependents over one year of age, and is the most frequently used record-keeping number in the United States.
About The Clearinghouse
Abstract: Another introduction file on PRC. The Clearinghouse is a nonprofit consumer education service funded by the California Public Utilities Commission through its Telecommunications Education Trust. It is administered by the University of San Diego School of Law's Center for Public Interest Law.
Telemarketing: Whatever Happened To A Quiet Evening At
Abstract: Issues on telemarketing by PRC. Most people have experienced it-that annoying ring of the phone just as dinner goes on the table. When you answer, you find it's not a call from a friend or family member, or even from work. It's someone calling to sell you something-a telemarketer. This paper discusses this topic.
Wiretapping and Eavesdropping: Is There Cause for
Abstract: Issues on Wiretapping and Eavesdropping by PRC. While relatively few legal wiretaps are authorized in the United States each year, improvements in technology have made it easier to illegally wiretap, record and eavesdrop on telephone conversations. People with sensitive jobs in business or government and those involved in high-stakes legal cases may have reason to be concerned about wiretapping and electronic eavesdropping.
Employee Monitoring: Is There Privacy in the
Abstract: Issues on Employee Monitoring by PRC. Employers want to be sure their employees are doing a good job, but employees don't want their every sneeze or trip to the water cooler logged. That's the essential conflict of workplace monitoring.
Preventing Electromagnetic Eavesdropping
Abstract: Eavesdropping on personal computers is not limited to looking over the shoulder of the operator or physically tapping in to an Ethernet cable. U.S. Government standards relating to the prevention of information capture via the emission of electro-magnetic radiation from computers and peripherals are known as TEMPEST. However, actual TEMPEST specifications are classified. TEMPEST aside, there are inexpensive and easily applied means for individuals to minimize unintentional emissions from equipment.This document "Preventing Electromagnetic Eavesdropping," discusses these techniques.
Ernest F. Brickell, Dorothy E. Denning, Stephen T. Kent, David P. Maher, Walter Tuchman,
The SKIPJACK Algorithm
Abstract: The objective of the SKIPJACK review was to provide a mechanism whereby persons outside the government could evaluate the strength of the classified encryption algorithm used in the escrowed encryption devices and publicly report their findings. Because SKIPJACK is but one component of a large, complex system, and because the security of communications encrypted with SKIPJACK depends on the security of the system as a whole, the review was extended to encompass other components of the system. The purpose of this Interim Report is to report on our evaluation of the SKIPJACK algorithm. A later Final Report will address the broader system issues.
Abstract: USPS Change of Address List.
Can Wiretaps Remain Cost-affective?
Abstract: This paper,will neglect these concerns, and ask instead whether this new wiretap chip, and other policies to preserve phone wiretaps, are cost-effective tools for police investigation.
Donald P. Delaney, Dorothy E. Denning, Alan R. McDonald,
Wiretap Laws And Procedures What Happens When The U.S. Government
Taps A Line
Abstract: Article Regarding Federal/State Wiretap Laws. This article describes the legal requirements for government interception of wire and electronic communications and some of the additional procedures and practices followed by federal and state agencies.
Abstract: This directory contains a wide variety of documents on investigative secrets such as privacy protection issues like background investigations, traces, asset studies, forensic information, investigative contacts, unique newsletters, articles, hi-tech schematics, electronic gadgetry and secret resources.
Michael E. Enlow,
ELECTRONIC SURVEILLANCE: Are you bugged?
Abstract: Electronic Surveillance. Are you Bugged? This is an abstract from Inside Secrets, a newsletter catering to detectives, attorneys, law enforcement officers and professionals around the world. Want to know how the pro's bug,tap phones, and use other things to hear what you're saying?
Michael E. Enlow,
Abstract: The INTEC complete catalog of books, newsletters, special reports, and the famous John Wilson catalog of high-tech, electronic surveillance and countermeasure gadgetry, along with schematics and very simple construction plans.
Abstract: The PRIVACY Forum is a moderated digest for the discussion and analysis of issues relating to the general topic of privacy (both personal and collective) in the "information age" of the 1990's and beyond.
Michael E. Enlow,
Who Is Mike Enlow? The Story Behind One Of America's Foremost
Private Detectives-Who Can Help You Get Almost Anything On
Abstract: The story behind Michael Enlow, retired Private Detective. Secret strategies of the trade.
Michael E. Enlow,
On-Line Investigations: Investigating By Computer!
Abstract: On-line investigations. Investigating via on-line unfair advantage... Litigation, business, personal or otherwise... Complete back issue of Mike's investigative newsletter.
Michael E. Enlow,
Under The Spy Glass Of Mike Enlow... A Day In The Life Of Mr.
Abstract: A day in the life of Mr. X. This is the e-text of a story from Mike Enlow's Inside Secrets newsletter, published in April of 1992. It will give you an idea of investigative/creative talent and perhaps an insight in to the "real arts and sciences" of the crafty trade of investigating.
Michael E. Enlow,
Tracing Made Simple-Track 'em Down!!!
Abstract: How To Detect It - How To Prosecute, and How To Stop It Cold. Information regarding shop lifting and theft deterrent procedures. Complete study on the subject.
U.S. CONGRESS OFFICE OF
TECHNOLOGY ASSESSMENT, Issue
Update on Information Security and Privacy in Network
Abstract: This background paper was prepared as part of the Office of Technology Assessment's follow-on assistance to the Senate Committee on Governmental Affairs, subsequent to release of the September 1994 OTA report Information Security and Privacy in Network Environments. The Committee requested additional informational and analytical assistance from OTA in order to prepare for hearings and legislation in the 104th Congress. This background paper updates and develops some key issues that OTA had identified in its earlier report, in light of recent developments in the private sector and in government. During the course of this work, OTA found that the need for timely attention to the security of unclassified information has intensified in the months since the 1994 report was issued.
Built by Mark Crosbie and Ivan Krsul.
Security Archive Homepage.
COAST Project (CERIAS)Page.
Purdue CS Dept page.