Personal tools
brochure.html
First Announcement of
THE SECOND CONFERENCE ON COMPUTERS, FREEDOM, AND PRIVACY
L'Enfant Plaza Hotel, Washington DC
March 18-20, 1992
The rush of computers into our workplaces, homes, and institutions is drastically altering how we work and live, how we buy and sell, and with whom we communicate. Computers are obliterating traditional political and organizational boundaries, making time zones irrelevant, and bridging diverse cultures. They are fundamentally changing our culture, values, laws, traditions, and identities.
The turmoil of the changes calls into question many old assumptions about privacy, freedom of speech, search and seizure, access to personal and governmental information, professional responsibilities, ethics, criminality, law enforcement, and more. The only way to sort out these issues and arrive at a consensus for action is to acknowledge that we don't know the answers -- and then, with reason and good will, to find the answers through discussion and education. That's why the Conference on Computers, Freedom, and Privacy was founded in 1991.
The Computers, Freedom, and Privacy Conference is unique. It has no "agenda for change". It seeks only to bring together people from all the major communities and interest groups that have a stake in the new world being shaped by information technology, so that they may share their ideas, ideals, concerns and experiences.
At the first conference, hundreds of people from the fields of law, computer science, law enforcement, business, public policy, government, education, research, marketing, information providing, advocacy and a host of others met for several days. It was the first time such a diverse group had ever assembled, and the exchange of ideas and points of view was electric.
The conference is "single-track" -- all participants attend all the sessions. A morning of tutorials at the beginning of the conference will help participants get up to speed in specific "hot" areas. The conference sessions themselves take up timely and, at times, thorny issues. Each session aims for a balance of perspectives in order to assist diverse groups appreciate the views of others. A brief examination of the long list of sponsoring and supporting organizations will reveal that this respect for diverse outlooks is built into the conference from the ground up.
The question is no longer whether information technologies will change our world. They are, now. The real question is how we, as citizens and professionals, will respond to and manage that change. Those at the Second Conference on Computers, Freedom, and Privacy will lead the way.
- Sponsor:
- Association for Computing Machinery
- Special Interest Groups on
- Computers and Society
- Communications
- Security, Audit, and Control
- Communications
- Host:
- Department of Electrical Engineering and Computer Science
- The George Washington University
- Patrons:
- Bell Atlantic
- Computer Security Institute
- Department of Energy*
- Dun & Bradstreet
- Equifax
- Hayes Microcomputer Products, Inc.
- John Gilmore
- Mitchell Kapor
- National Institutes of Health*
- National Science Foundation*
*applied for
- Computer Security Institute
- Co-sponsors and cooperating organizations:
- American Civil Liberties Union
- Association for Computing Machinery
- Special Interest Group on Software Engineering
- Association of Research Libraries
- Computer Professionals for Social Responsibility
- Electronic Frontier Foundation
- Federal Library and Information Center Committee
- First Amendment Congress
- Institute for Electrical and Electronics Engineers-USA
- Committee on Communications and Information Policy
- Library and Information Technology Association
- Privacy International
- U. S. Privacy Council
- The WELL (Whole Earth 'Lectronic Link)
- Association for Computing Machinery
WHAT'S UNIQUE ABOUT CFP-2?
What isn't unique? The diverse mixture of expertise and interest; the depth and breadth of information presented; the unusual networking opportunities. CFP-2 provides an opportunity to learn from the mistakes of the past and to plan intelligently and humanely for the information-rich future. It's equivalent to inviting several hundred of the best information age experts in the world into one place just to help you understand the most important emerging issues in technology, business, and policy.
WHO SHOULD ATTEND CFP-2?
Computer hardware and software development officers and managers
Privacy advocates
Law enforcement officials
Computer security specialists
Direct marketers
Designers and users of databases with personal information
Local, state, and federal prosecutors or members of their staffs
Concerned computer users
Librarians
Computer bulletin board operators
Government officials
Attorneys
Congressional staff members
Civil libertarians
Specialists in those application areas where future conflicts of values are
foreseen (medical databases, credit reporting systems, criminal justice,
etc.)
PROGRAM HIGHLIGHTS
Featured Speakers
Allen Neuharth
Allen Neuharth, the founder of USA Today, retired two years ago as chairman of the Gannett Company, and has recently become chairman of the Freedom Forum, which is, according to an article in The New York Times, "the flashy new incarnation of what had been the Gannett Foundation". The Freedom Forum's mission is to set the agenda on issues involving press freedom and the First Amendment. Its goal is to foster free press, free speech, and free spirit at home and abroad.
Bruce Sterling
Bruce Sterling, author, journalist, editor, and critic, was born in 1954 and lives in Austin, Texas. He is the author of four science fiction novels: Involution Ocean (1977), The Artificial Kid (1980), Schismatrix (1985), and Islands in the Net (1988). His short stories appeared in the collections Crystal Express (1990) and Globalhead (1991), and in the Japanese collection Semi no Jo-o. He edited the collection Mirrorshades: The Cyberpunk Anthology (1986), and co-authored the novel The Difference Engine (1990) with William Gibson. His first nonfiction work is The Hacker Crackdown, a book about computer crime and civil liberties issues.
Conference Reception
At the conference reception Wednesday evening, you will have the opportunity to meet old friends and colleagues and to make new ones. One attendee last year said "everybody who was anybody" was there. Enlarge your old circle or create a new (human and/or computer-based) network of experts in different disciplines.
EFF Awards Reception
All conference attendees are invited to the Awards Reception sponsored by the Electronic Frontier Foundation (EFF) on Thursday evening. The first annual EFF Pioneer Awards will be given out, to individuals and organizations that have made distinguished contributions to the human and technological realms touched by computer-based communications. It's another great opportunity to rub elbows with leaders in your own or related fields.
Birds of a Feather Sessions
For those spur-of-the-moment meetings, or for planned gatherings of those with common interests, CFP-2 is providing "birds of a feather" rooms where small groups can gather in an informal environment to meet and talk. Groups should contact the conference chair to reserve meeting space.
WEDNESDAY, MARCH 18, 1992
Pre-Conference Tutorials
Group A: 9:00 a.m.
Making Information Law and Policy
Getting on the Net
Communications and Network Evolution
Private Sector Privacy
Group B: 10:30 a.m.
Constitutional Law for Nonlawyers
Computer Crime
Modern Telecommunications: Life after Humpty Dumpty
International Privacy Developments
KEYNOTE ADDRESS:
"Freedom in Cyberspace: New Wine in Old Flasks?"
2:30 pm - 4 pm
Who logs on?
- Panel:
- Linda Garcia, Office of Technology Assessment
- Alfred Koeppe, New Jersey Bell
- Brian Kahin, Kennedy School of Government, Harvard University
- Alfred Koeppe, New Jersey Bell
- Linda Garcia, Office of Technology Assessment
4:30 pm - 6 pm
Ethics, Morality, and Criminality
- Panel:
- Scott Charney, U. S. Dept. of Justice
- James Settle, Federal Bureau of Investigation
- Mike Godwin, Electronic Frontier Foundation
- Emory Hackman, Esq. (former president, Capital Area Sysops Association)
- Don Delaney, New York State Police
- James Settle, Federal Bureau of Investigation
- Scott Charney, U. S. Dept. of Justice
6:00 pm - 7:30 pm
RECEPTION
9:00 pm
BIRDS OF A FEATHER SESSIONS
9:00 am - 10:30 am
For Sale: Government Information
- Chair: George Trubow, John Marshall Law School
- Panel:
- Dwight Morris, Los Angeles Times Washington Bureau
- Ken Allen, Information Industry Association
- Patricia Glass Schuman, American Library Association
- Evan Hendricks, Privacy Times
- Fred Weingarten, Computing Research Association
- Franklin S. Reeder, Office of Management and Budget
- Costas Torreagas, Public Technology, Inc.
- Robert R. Belair, Kirkpatrick and Lockhart
- Ken Allen, Information Industry Association
- Panel:
10:45 am - 12:15 pm
Free Speech and the Public Telephone Network
- Henry Geller, The Markle Foundation
- Eli Noam, Columbia University
- John Podesta, Podesta Associates
- Eli Noam, Columbia University
12:15 pm - 1:45 pm
Luncheon with Address: Bruce Sterling
"Speaking for the Unspeakable"
2:00 pm - 3:30 pm
Who's in Your Genes?
- Chair: Phil Reilly, Shriver Center for Mental Retardation
- Panel:
- John Hicks, FBI Laboratory
- Tom Marr, Cold Spring Harbor Laboratory
- Paul Mendelsohn, Neurofibromatosis, Inc.
- Peter Neufeld, Esq.
- Madison Powers, Kennedy Center for Ethics, Georgetown University
- Tom Marr, Cold Spring Harbor Laboratory
- Panel:
3:45 pm - 5:15 pm
Private Collection of Personal Information
- Chair: Ron Plesser, Piper and Marbury
- Panel:
- Janlori Goldman, Privacy and Technology Project, ACLU
- John Baker, Equifax
- James D. McQuaid, Metromail
- James Rule, SUNY-Stony Brook
- Mary Culnan, Georgetown University
- P. Michael Neugent, Citicorp
- John Baker, Equifax
- Panel:
5:15 pm - 6:45 pm
EFF Awards Reception
9:00 pm
Birds of a Feather Sessions
Privacy and intellectual freedom in the digital library
- Chair: Marc Rotenberg, Computer Professionals for Social
Responsibility
Panel:
- Robert A. Walton, CLSI, Inc.
- Gordon M. Conable, Monroe (MI) County Library System
- Jean Armour Polly, Liverpool (NY) Public Library
- Gordon M. Conable, Monroe (MI) County Library System
- Robert A. Walton, CLSI, Inc.
10:45 am - 12:15 pm
Computers in the Workplace: Elysium or Panopticon?
- Chair: Alan F. Westin, Columbia University
- Panel:
- Gary Marx, MIT
- Mark DiBernardo, National Association of Manufacturers
- Kristina Zahorik, Subcommittee on Employment and Productivity, U. S. Senate Labor Committee
- Mark DiBernardo, National Association of Manufacturers
- Panel:
12:15 pm - 1:30 pm
Lunch (on your own)
1:30 pm - 3:00 pm
Who Holds the Keys?
- Chair: Dorothy Denning
- Panel:
- Jim Bidzos, RSA Data Security
- David Bellin, Pratt Institute
- John Gilmore, Cygnus Support
- Whitfield Diffie, SunSoft, Inc.
- David Bellin, Pratt Institute
- Panel:
3:00 pm - 4:15 pm
Public Policy for the 21st Century
- Co-chairs:
- Peter J. Denning, George Mason University
- Lance J. Hoffman, George Washington University
- Peter J. Denning, George Mason University
STEERING COMMITTEE
Lance J. Hoffman (General Chair)
The George Washington University
Michael F. Brewer
Dun and Bradstreet
Paul Clark (chair, Operations Committee)
Trusted Information Systems
Dorothy Denning (chair, Tutorials Committee)
Georgetown University
Peter Denning (chair, Program Committee)
George Mason University
David Farber
University of Pennsylvania
Craig Feied
The George Washington University Medical Center
Mike Gibbons
FBI
Mitchell Kapor
Electronic Frontier Foundation
Jane Kirtley
Reporters Committee for Freedom of the Press
Lu Kleppinger (chair, Finance Committee)
The George Washington University
C. Dianne Martin
The George Washington University
John McMullen (chair, Scholarship Committee)
McMullen & McMullen, Inc.
Lynn McNulty
NIST
Ronald Plesser
Piper and Marbury
Molly Raphael
D.C. Public Library
Mark Rotenberg
CPSR Washington Office
James Sylvester
Bell Atlantic
Jim Warren
Autodesk and MicroTimes
Fred Weingarten
Computing Research Association
ADVISORS
Allan Adler
Cohn and Marks
Ron Anderson
University of Minnesota
John Baker
Equifax
John Perry Barlow
Electronic Frontier Foundation
Robert R. Belair
Kirkpatrick & Lockhart
Jerry Berman
American Civil Liberties Union
Vint Cerf
Corporation for National Research Initiatives
Margaret A. Chambers
Meta Technologies Associates
Philip Chapnick
Computer Security Institute
Steve Cisler
Apple Computer
Mary Culnan
Georgetown University
Donald Delaney
New York State Police
Les Earnest
Consultant
Mary Eisenhart
MicroTimes
Clifford Figallo
The Well
Dahl Gerberick
Gerberick & Associates
John Gilmore
Cygnus Support
Janlori Goldman
American Civil Liberties Union
Mark Graham
Pandora Systems
Evan Hendricks
Privacy Times
Donald G. Ingraham
District Attorney's Office,
Alameda County, CA
Robert Jacobson
Washington Technology Center
Linda Knutson
Library & Information Technology Association
Bruce R. Koball
Motion West
Mary Berghaus Levering
Federal Library and Information Center Committee, Library of Congress
Craig Neidorf
Electronic Frontier Foundation
Peter G. Neumann
SRI International
Donn B. Parker
SRI International
John Podesta
Podesta Associates
David Redell
DEC Systems Research Center
Dennis Reynolds
CAPCON
Eric S. Roberts
CPSR
Paul Saffo
Institute for the Future
Harvey A. Silverglate
Silverglate and Good
Bruce Sterling
Author
Richard Taylor
University of California at Irvine
Gail Thackeray, Esq.
Jay E. Thorwaldson
Palo Alto Medical Foundation
George Trubow
John Marshall Law School
Willis H. Ware
RAND Corporation
Alan F. Westin
Columbia University
Bob Wilson
MCI
DID YOU MISS THE FIRST CONFERENCE ON COMPUTERS, FREEDOM, AND PRIVACY?
While we can't remedy that, we can help you experience some of the electricity at that event.
Audiotapes (great drive-time listening) and videotapes (the next best thing to being there), and the complete verbatim transcript (edited for clarity only) of the First Conference on Computers, Freedom & Privacy are now available.
Sessions covered are:
- The Constitution in the Information Age
- Trends in Computers and Networks
- International Perspectives and Impacts
- Personal Information and Privacy-I
- Personal Information and Privacy-II
- Networks Environments of the Future
- Law Enforcement Practices and Problems
- Law Enforcement and Civil Liberties
- Legislation and Regulation
- Computer-Based Surveillance of Individuals
- Security Capabilities, Privacy and Integrity
- Electronic Speech, Press and Assembly
- Access to Government Information
- Ethics and Education
- Where Do We Go From Here?
TO ORDER AUDIOTAPES:
PRICES & SHIPPING:
any one audio-tape ( 1 tape ) $14.95 +sales tax* + (for Canada delivery) $2.50 US, or + (for international delivery) $5.00 US five-tape set ( 5 tapes) $34.95 +sales tax* + (for Canada delivery) $5.00 US or + (for international delivery) $10.00 US
full-Conference set (15 tapes) $59.95 +sales tax* + (for Canada delivery) $7.50 US or + (for international delivery) $20.00 US
* - include 6.5% for sales tax to Cal.addresses; prices include U.S. shipping Make checks to *Recording, Etc.*; MasterCharge, Visa & American Express OK.
TO ORDER THE WRITTEN TRANSCRIPT:
All orders add $4.00 handling charge CA residents add 7.75% sales tax
TO ORDER THE VIDEOTAPES:
$480 per 15 volume set, plus $15 shipping/handling (in California, please add $39.60 sales tax). Individual sessions $55 each plus $4 shipping/handling per session. In California, please add 8.25% sales tax.) Send purchase order, check, or money order to
or call (800) 235-4922 or (213) 455-3915 with your Visa/Mastercard ready. (A more detailed brochure on the videotapes is available from Sweet Pea.)
GENERAL INFORMATION
Registration
Please register for the conference by returning the Conference Registration Form (below) along with the appropriate payment -- check, Visa, or Mastercard. Registration fee includes conference materials, Thursday luncheon, and receptions. The registration is $295 for ACM members and $350 for nonmembers, $65 for full-time students. Tutorials, $95 ($35 students).
Premium for Early Registration
While they last, a limited number of premiums are available to early registrants on a first-come, first-served basis. Early registrants will receive by mail a voucher which they can exchange at the conference for one of a number of premiums. These include:
- Videotapes of CFP-1 sessions
- Audiotapes of CFP-1 sessions
- Proceedings of CFP-1
- Computers Under Attack: Intruders, Worms, and Viruses by Peter Denning, editor
- Rogue Programs: Viruses, Worms, and Trojan Horses by Lance Hoffman, editor
- "Citizen Rights and Access to Electronic Information" by Dennis Reynolds, editor
- The Cuckoo's Egg by Cliff Stoll
- The Difference Engine by Bruce Sterling and William Gibson
- Confessions of an S.O.B. by Al Neuharth
- Cyberpunk by Katie Hafner and John Markoff
CONSIDER REGISTERING BY FAXING THE REGISTRATION FORM BELOW OR TELEPHONING IF YOU ARE INTERESTED IN ONE OF THESE PREMIUMS. THEY WON'T LAST LONG!
Registration Scholarships
Full-time students and others wishing to apply for one of a limited number of registration scholarships should send a request (no more than two typewritten pages) to arrive no later than January 15, 1992 to
The request should concisely contain the following information:
- personal data -- name, address, phones, email address, etc.
- category and supporting information -- student, law enforcement official, "hacker", etc. We are particularly interested in providing support to undergraduate and graduate students majoring in computer or information science, journalism, law, law enforcement, political science, and related disciplines as well as "hackers", law enforcement officials, librarians, etc., who could otherwise not attend the conference.
- a statement saying specifically that you will attend the entire conference and that you will be responsible for your own transportation and lodging expenses
- a paragraph explaining why you are interested in attending the conference and what use you expect to make of the information obtained there
- a paragraph explaining the need for financial assistance
Hotel Accomodations The 1992 Computers, Freedom, and Privacy Conference will be held at the Loew's L'Enfant Plaza Hotel, Washington, DC. One of the finest hotels in the city, it is just ten minutes from Washington National Airport, five minutes from Capitol Hill. The world-renowned Smithsonian Institution Museums are located within a few blocks.
To qualify for the conference rate of $105 single or $110 double, call the hotel reservation line (below) and identify yourself as a CFP-2 participant. To ensure a room at the L'Enfant Plaza, reservations should be made by February 10, 1992. After this date, rooms will be released to the public. Hotel reservations: (800) 243-1166; (202) 484-1000 (local).
Transportation
As a participant in CFP-2, you are eligible for discounted rates as follows: 40% off unrestricted coach fares and 5% off the lowest available fares on specified carriers (all rules and restrictions apply). To receive the best rate available call GW Travel (below) and make your reservations early. Seats may be limited. Please mention that you are attending the CFP-2 Conference. (Code C-6) GW Travel: (800) 222-1223; (301) 897-8001 (local).
Accreditation
The Second Conference on Computers, Freedom, and Privacy has been approved by The George Washington University Medical Center for Category One Continuing Medical Education Units.
Refund Policy
Refund requests received in writing by February 28, 1992 will be honored. A $50 cancellation fee will apply. No refunds will be made after this date; however, you may send a substitute in your place.
REGISTRATION FORM
YOU CAN NOT REGISTER BY ELECTRONIC MAIL. YOU MAY REGISTER BY MAIL, BY FAX, OR BY PHONE. YOU CAN PRINT THIS REGISTRATION FORM OUT, FILL IT IN, AND MAIL OR FAX IT. OR YOU CAN REQUEST A PRINTED BROCHURE FROM THE "BY MAIL" ADDRESS BELOW, WHICH WILL HAVE A PRINTED ONE-PAGE REGISTRATION FORM IN IT. YOU CAN ALSO OBTAIN THIS PRINTED BROCHURE BY ELECTRONICALLY MAILING A SHORT REQUEST WITH YOUR NAME AND (POSTAL) MAIL ADDRESS TO cfp2@seas.gwu.edu.
By mail: Conferences & Institutes, The George Washington University, 2003 G St. N.W., Washington, D. C. 20052 By fax (24 hrs., with credit card): Send registration form to (202) 994-7048 By phone (with credit card): (202) 994-7238 (9 a.m. to 5 p.m., EST) Name:______________________________________________________ Title:_____________________________________________________ Affiliation: ______________________________________________ Mailing address: __________________________________________ City ____________________________ State _____ Zip _________ Country (if not USA): _____________________________________ Telephone: ________________________________________________ FAX number: _______________________________________________ E-Mail address: ___________________________________________ PRIVACY NOTE: This information will not be sold, rented, loaned, exchanged, or used for any purpose other than official CFP-2 activities. A roster will be distributed to attendees. Please indicate your preference: ____ Print all information above ______ Print name only ____ Print only name, affiliation, ______ Omit all above information city, state, zip REGISTRATION FEES: Conference fee (check one) ___ ACM member ($295) ___ Non-member ($350) [includes conference materials, Thursday luncheon, and receptions] ____ Student (full-time/valid ID):___ $65 (no lunch) ___ $30 (lunch) Tutorial fee _____ Tutorial (half-day, 1 or 2 sessions, $95) (Pick 2, 75 min. each) _____ Student (half-day, 1 or 2 sessions, $35) Group A 9:00 a.m. ____ T(1) Making Information Law and Policy ____ T(2) Getting on the Net ____ T(3) Communications and Network Evolution ____ T(4) Private Sector Privacy Group B 10:30 a.m. ____ T(5) Constitutional Law for Non-lawyers ____ T(6) Computer Crime ____ T(7) Modern Telecommunications ____ T(8) International Privacy Developments Please check method of payment: Amount enclosed: $________ ____ Visa _____ MasterCard ____ Check (payable to The George Washington University) Credit card number: ______________________________________ Expiration date: _________________________________________ Name on card: ____________________________________________ Signature: _______________________________________________ For Continuing Medical Education accreditation, give state and medical #:
Return to CPSR conferences page. |
Return to the CPSR home page. |
Send mail to webmaster. |
Created before October 2004