CSCI 494: Preparation for Mar. 1

I have had difficulty finding good overview articles to cover matters related to government and privacy: many of the issues have been treated much more in the general press than in the technical literature.

From the readings for and class meeting on February 22, we should get a better handle on what privacy is and what is important about it. As we turn our attention from private sector to government, we find that the following broad areas have generated controversy:

There are some related topics that touch on these. For example, the regulation of cryptography is significant to both eavesdropping and surveilance.

The following are matters of recent or current interest; you may find online materials through the usual search engines, through advocacy sites, or through the library’s search databases.

Your assignment is to find and read at least three current (not more than 3 years old) news articles that together touch on at least two of these issues–either broad topics or specific matters such as those above. In addition, you need to read at least one background/overview article (longer than a page). When you submit your responses to readings, you should list what you have read: give full citation information, or, for selections below, the tag.

If you want some interesting historical perspective, there were articles in CACM around the time that the federal government began to use “record matching”, and around the time that CALEA was passed. The following are either readily available online, or have a copy in the folder marked “CSCI 494” in the Brandt room (where the books were previously shelved). Most of these articles would qualify as background reading. (These all now appear on the class readings page, too.)

[D+93]
Dorothy E. Denning et al. To tap or not to tap. Communications of the ACM, 36(3):24–44, March 1993.
[Cla88]
Roger Clarke. Information technology and dataveillance. Communications of the ACM, 31(5):498-512, May 1988.
[Giv02]
Beth Givens. Public records on the Internet: the privacy dilemma. Proceeings of the 12th Annual Conference on Computers, Freedom, and Privacy, ACM, April 2002.
[Gra02]
Jennifer Granick. Sowing the seeds of surveillance. Wired News, January 31, 2007. http://www.wired.com/news/columns/0,72608-0.html
[Kus84]
Richard P. Kusserow. The government needs computer matching to root out waste and fraud. Communications of the ACM, 27(6):542-545, June 1984.
[Man02]
Charles C. Mann. Homeland insecurity. Atlantic Monthly, 290(2):81–102, September 2002. http://www.theatlantic.com/issues/2000/09/mann.htm
[NW01]
Peter G. Neumann and Lauren Weinstein. Risks of national identity cards. Communications of the ACM, 44(12):176, December 2001.
[Sal68]
G. Salton. Editorial: On the future of mechanical infomration files. Communications of the ACM, 11(1):2, January 1968.
[Sha84]
John Shattuck. Computer matching is a serious threat to individual rights. Communications of the ACM, 27(6):538-541, June 1984.
[Tav96]
Herman T. Tavani. Computer matching and personal privacy: Can they be compatible? Proceeings of the 1996 Symposium on Computers and the Quality of Life, ACM SIGCAS, February 1996.

In addition, the following web sites might be helpful:

PRIVACY Forum
A moderated mailing list similar to RISKS Digest, but dealing with privacy issues. http://www.vortex.com/privacy/
Electronic Frontier Foundation (EFF)
http://www.eff.org/
Electronic Privacy Information Center (EPIC)
http://www.epic.org/

This document was translated from LATEX by HEVEA.