THIS SEARCH THIS DOCUMENT THIS CR ISSUE GO TO Next Hit Forward Next Document New CR Search Prev Hit Back Prev Document HomePage Hit List Best Sections Daily Digest Help Doc Contents
The serial number is accessible to the cellular telephone network, and as cellular telephones add Internet browsing and E-mail capabilities, it will potentially have the same
[Page: S14540] GPO's PDF
Other examples include DIVX DVD disks, which come with a serial number that permits tracking the use of each movie by a centralized network-recording system managed by the companies that sell the disks.
FEARING THE MISUSE OF ALL THOSE NUMBERS
Industry executives say that as the line between communications and computing becomes increasingly blurred, every electronic device will require some kind of identification to attach to the network
Making those numbers available to networks that need to pass information or to find a mobile user while at the same time denying the information to those who wish to gather information int o vast data bases may be an impossible task.
Privacy adv ocates argue that even if isolated numbers look harmless, they are actually harbingers of a trend toward ever more invasive surveillance networks.
``Whatever we can do to actually minimize the collection of personal dat a is good,' said March Rotenberg, director of the Electronic Privacy Inf ormation Cen ter, one of three groups trying to organize a boycott of Intel's chips.
The groups are concerned that the Government will require ever more invasive hardware modifications to keep track of individuals. Already they point to the 1994 Communications Assistance for Law Enforcement Act, which requires that telephone companies modify their network switches to make it easier for Government wiretappers.
Also, the Federal Communications Commission is developing regulations that will require every cellular telephone to be able to report its precise location for ``911'' emergency calls. Privacy gro ups are worried that this feature will be used as a tracking technology by law enforcement officials.
``The ultimate danger is that the Government will mandate that each chip have special logic added'' to track identifies in cyberspace, said Vernor Vinge, a computer scientist at San Diego State University. ``We're on a slide in that direction.''
Mr. Vinge is the author of ``True Names'' (Tor Books, 1984), a widely cited science fiction novel in the early 1980's, that forecast a world in which anonymity in computer networks is illegal.
Intel executives insist that their chip is being misconstrued by privacy gro ups.
``We're going to start building security architecture into
our chips, and this is the first step,'' said Pat Gelsinger, Intel vice
president and general manager of desktop products. ``The discouraging part of
this is our objective is to accomplish privacy. > That
quandry--that it is almost impossible to compartmentalize information for one purpose so that it
cannot be misused--lies at the heart of the argument. Moreover providing
security while at the same time offering anonymity has long been a technical and
a political challenge.
``We need to find ways to distinguish between security and identity,'' said James X. Dempsey, a privacy exp ert at the Center for Democracy and Technology, a Washington lobbying organization.
So far the prospects are not encouraging. One technical solution developed by a cryptographer, David Chaum, made it possible for individuals to make electronic cash payments anonymously in a network.
In the system Mr. Chaum designed, a user employs a different number with each organization, thereby insuring that there is no universal tracking capability.
But while Mr. Chaum's solution has been widely considered ingenious, it has failed in the marketplace. Last year, his company, Digicash Inc. based in Palo Alto, Calif., filed for bankruptcy protection.
``Privacy nev er seems to sell,'' said Bruce Schneier, a cryptographer and a computer industry consultant. ``Those who are interested in privacy don 't want to pay for it.''
--
Privacy Isn 't Dead Yet
It seems self-evident that information abo ut your shoe size does not need to be as well guarded as information abo ut tests ordered by your doctor. But with the Federal and state governments' piecemeal approach to privacy pro tection, if we release information abo ut one facet of our lives, we inadvertently expose much about the others.
During Senate hearings in 1987 about Robert Bork's fitness to serve as a Supreme Court justice, a reporter found out which videotapes Mr. Bork rented. The response was the enactment of the Video Privacy Pro tection Act. Another law prohibits the Social Security Administration (but hardly anybody else) from releasing our Social Security numbers. Still other laws limit what states can do with information tha t we provide to motor vehicle departments.
Congress is now seeking to add some more panels to this crazy quilt of narrowly drawn privacy law s. The House recently endorsed a bill to prohibit banks and securities and insurance companies owned by the same parent corporation from sharing personal med ical information. An d Congress is grappling with laws to prevent some information abo ut our mutual-fund holdings from being sold and bought as freely as hot dogs.
But with superpowerful computers and vast databases in the private sector, personal inf ormation can 't be segmented in this manner. For example, in 1996, a man in Los Angeles got himself a store card, which gave him discounts and allowed the store to trace what he purchased. After injuring his knee in the store, he sued for damages. He was then told that if he proceeded with his suit the store would use the fact that he bought a lot of liquor to show that he must have fallen because he was a drunkard.
Some health insurers try to ``cherry pick'' their clients, seeking to cover only those who are least likely to have genetic problems or contract costly diseases like AIDS. Some laws prohibit insurers from asking people directly about their sexual orientation. But companies sometimes refuse to insure those whose vocation (designer?), place of residence (Greenwich Village?) and marital status (single at 40-plus?) suggest that they might pose high risks.
Especially comprehensive privacy inv aders are ``cookies''--surveillance files that many marketers implant in the personal com puters of people who visit their Web sites to allow the marketers to track users' preferences and transactions. Cookies, we are assured, merely inform marketers about our wishes so that advertising can be better directed, sparing us from a flood of junk mail.
Actually, by tracing the steps we take once we gain a new piece of information, co okies reveal not only what we buy (a thong from Victoria's Secret? Antidepressants?) but also how we think. Nineteen eighty-four is here courtesy of Intel, Microsoft and quite a few other corporations.
All this has led Scott McNealy, the chairman and chief executive of Sun Microsystems, to state, ``You already have zero privacy--ge t over it.'' This pronouncement of the death of privacy is premature, but we will be able to keep it alive only if we introduce general, all-encompassing protections over segmented ones.
Some cyberspace anonymity can be provided by new technologies like anti-cookie programs and encryption software that allow us to encrypt all of our data. Corporate self-regulation can also help. I.B.M., for example, said last week that it would pull its advertising from Web sites that don't have clear privacy pol icies. Other companies like Disney and Kellogg have voluntarily agreed not to collect information abo ut children 12 or younger without the consent of their parents. And some new Government regulation of Internet commerce may soon be required, if only because the European Union is insisting that any personal inf ormation abo ut the citizens of its member countries cannot be used without the citizen's consent.
Especially sensitive information sho uld get extra protection. But such selective security can work only if all the other information abo ut a person is not freely accessible elsewhere.
--
A Middle Ground in the Privacy War ?
Jim Hightower, the former agriculture commissioner of Texas, is fond of saying that ``there's nothing in the middle of the road but yellow stripes and dead armadillos.''
It's punchy, and has become a rallying cry of sorts for activists on all sides. But is it right? Amitai Etzioni, a professor at George Washington University, thinks not. He thinks he has found a workable middle ground between the combatants in one of the fiercest fights in our high-tech society: the right of privacy. < p> Etzioni has carved out a place for himself over the decades as a leader in the ``communitarian'' movement. Communitarianism works toward a civil society that transcends both government regulation and commercial intrusion--a society where the golden rule is as important as the rule of law, and the notion that ``he who has the gold makes the rules'' does not apply.
What does all that have to do with privacy? Et zioni has written a new book, ``The Limits of Privacy,'' that applies communitarian principles to this thorny issue.
For the most part, the debate over privacy is carried out from two sides separated by a huge ideological gap--a gap so vast that they seem to feel a need to shout just to get their voices to carry across it. So Etzioni comes in with a theme not often heard, that middle of the road that Hightower hates so much.
What he wants to do is to forge a new privacy doc trine that protects the individual from snooping corporations and irresponsible government, but cedes individual privacy rig hts when public health and safety are at stake--``a balance between rights and the common good,'' he writes.
In the book, Etzioni tours a number of major privacy iss ues, passing judgment as he goes along. Pro-privacy dec isions that prohibited mandatory testing infants for HIV, for example, take the concept too far and put children at risk, he says. Privacy adv ocates' campaigns against the government's attempts to wiretap and unscramble encrypted messages, he says, are misguided in the face of the evil that walks the planet.
The prospect of some kind of national ID system, which many privacy adv ocates view as anathema, he finds useful for catching criminals, reducing fraud and ending the crime of identity theft. The broad distribution of our medical records for commercial gain, however, takes too much away from us for little benefit to society.
I called Etzioni to ask about his book. He said civil libertarians talk about the threat of government intrusion into our lives, and government talks about the threat of criminals, but that the more he got into his research, the more it seemed that the two
[Page: S14541] GPO's PDF
He's horrified, for example, by recent news that both Microsoft Corp. and Intel Corp. have included identifier codes in their products that could be used to track people's online habits: ``They not only track what we are doing,'' he says. ``They track what we think.''
His rethinking of privacy lea ds him to reject the notions that led to a constitutional right of privacy, be st expressed in the landmark 1965 case Griswold v. Connecticut.
In that case, Justice William O. Douglas found a right of privacy in the ``penumbra,'' or shadow border, of rights granted by other constitutional amendments--such as freedom of speech, freedom from unreasonable search and seizure, freedom from having troops billeted in our homes.
Etzioni scoffs at this ``stretched interpretation of a curious amalgam of sundry pieces of various constitutional rights,'' and says we need only look to the simpler balancing act we've developed in Fourth Amendment cases governing search and seizure, which give us privacy pro tection by requiring proper warrants before government can tape a phone or search a home.
``We cannot say that we will not allow the FBI under any conditions, because of a cyberpunk dream of a world without government, to read any message.'' He finds such a view ``so ideological, so extreme, that somebody has to talk for a sense of balance.''
I was surprised to see, in the acknowledgements in his book, warm thanks to Marc Rotenberg, who heads the Electronic Privacy Inf ormation Cen ter. Rotenberg is about as staunch a privacy adv ocate as I know, and I can't imagine him finding much common ground with Etzioni--but Etzioni told me that ``Marc is among all the people in this area the most reasonable. One can talk to him.''
So I called Rotenberg, too. He said he deeply respects Etzioni, but can't find much in the book to agree with. For all the talk of balance, he say, ``we have invariably found that when the rights of the individual are balanced against the claims of the community, that the individual loses out.''
We're in the midst of a ``privacy cri sis'' in which ``we have been unable to come up with solutions to the privacy cha llenges that new business practices and new technologies are creating,'' Rotenberg told me.
The way to reach answers, he suggested, is not to seek middle ground but to draw the lines more clearly, the way judges do in deciding cases. When a criminal defendant challenges a policeman's pat-down search in court, Rotenberg explained, ``the guy with the small plastic bag of cocaine either gets to walk or he doesn't. ..... Making those lines fuzzier doesn't really take you any closer to finding answers.''
As you can see, this is one argument that isn't settled. But I'm glad that Etzioni has joined the conversation--both for the trademark civility he brings to it, and for the dialogue he will spark.
Mr. TORRICELLI. Mr. President, I rise today to introduce the Privacy Pro tection Study Commission Act of 1999 with my colleague, Senator KOHL. This legislation creates a Commission to comprehensively examine privacy con cerns. This Commission will provide Congress with information to facilitate our decision making regarding how to best address individual privacy pro tections.
The rise in the use of information tec hnology--particularly the Internet, has led to concerns regarding the security of personal inf ormation. As many as 40 million people around the world have the ability to access the Internet. The use of computers for personal and business transactions has resulted in the availability of vast amounts of financial, medical and other information in the public domain. Information abo ut online users is also collected by Web sites through technology which tracks an individual's every interaction with the Internet.
Despite the ease of availability of personal inf ormation, th e United States is one of the few countries in the world that does not have comprehensive legal protection for personal inf ormation. Th is is in part due to differences in opinion regarding the best way to address the problem. While some argue that the Internet's size and constantly changing technology demands government and industry self-regulation, others advocate for strong legislative and regulatory protections. And, still others note that such protections, although necessary, could lead to unconstitutional consequences if drafted without a comprehensive understanding of the issue. As a result, congressional efforts to address privacy con cerns have been patchwork in nature.
This is why Senator KOHL and I are proposing the creation of a Commission with the purpose of thoughtfully considering the range of issues involved in the privacy deb ate and the implications of self-regulation, legislation, and federal regulation. The Commission will be comprised of experts in the fields of law, civil rights, business, and government. After 18 months, the Commission will deliver a report to Congress recommending the necessary legislative protections are needed. The Commission will have the authority to gather the necessary information to reach conclusions that are balanced and fair.
Americans are genuinely concerned about individual
privacy. Th e Privacy Com mission proposed by Senator
KOHL and myself will enable Congress and the public to evaluate the
extent to which we should be concerned and the proper way to address those
concerns. The privacy deb ate is
multifaceted and I encourage my colleagues to join Senator KOHL and
myself in our efforts to gain a better understanding of it. Senator KOHL
and I look forward to working with all those interested in furthering this
debate and giving Americans a greater sense of confidence in the security of
their personal inf ormation. > By Mrs.
FEINSTEIN:
S. 1902. A bill to require disclosure under the Freedom of Information Act regarding certain persons and records of the Japanese Imperial Army in a manner that does not impair any investigation or prosecution conducted by the Department of Justice or certain intelligence matters, and for other purposes; to the Committee on the Judiciary.
JAPANESE IMPERIAL ARMY DISCLOSURE ACT OF 1999
Mrs. FEINSTEIN. Mr. President, I rise today to introduce the Japanese Imperial Army Disclosure Act of 1999.
This legislation will require the disclosure under the Freedom of Information Act classified records and documents in the possession of the U.S. Government regarding chemical and biological experiments carried out by Japan during the course of the Second World War.
Let me preface my statement by making clear that none of the remarks that I will make in discussing this legislation should be considered anti-Japanese. I was proud to serve as the President of the Japan Society of Northern California, and I have done everything I can to foster, promote, and develop positive relations between Japan, the United States, China, and other states of the region. The legislation I introduce today is eagerly sought by a large number of Californians who believe that there is an effort to keep information abo ut possible atrocities and experiments with poisonous gas and germ warfare from the pubic record.
One of my most important goals in the Senate is to see the development of a Pacific Rim community that is peaceful and stable. I have worked towards this end for over twenty years. I introduce this legislation to try to heal wounds that still remain,
particularly in California's Chinese-American community.
This legislation is needed because although the Second World War ended over fifty years ago--and with it Japan's chemical and biological weapons experimentation programs--many of the records and documents regarding Japan's wartime activities remain classified and hidden in U.S. Government archives and repositories. Even worse, according to some scholars, some of these records are now being inadvertently destroyed.
THIS SEARCH THIS DOCUMENT THIS CR ISSUE GO TO Next Hit Forward Next Document New CR Search Prev Hit Back Prev Document HomePage Hit List Best Sections Daily Digest Help Doc Contents