EPIC Alert 13.17 (25 August 2006)



========================================================================

E P I C A l e r t 
========================================================================

Volume 13.17 August 25, 2006 
------------------------------------------------------------------------


Published by the 
Electronic Privacy Information Center (EPIC) 
Washington, D.C. 

http://www.epic.org/alert/EPIC_Alert_13.17.html 

========================================================================

Table of Contents
========================================================================

1. Federal Court Finds NSA Wiretaps Illegal 
2. AOL Releases Users' Search Queries 
3. DHS Inspector General: More Security Needed for RFID 
4. Government to Require Cars Warn of "Black Box" Recording
5. DHS Seeks Expanded Access to Travelers' Data
6. News in Brief
7. EPIC Bookstore: David Lazer's "DNA and the Criminal Justice
System"
8. Upcoming Conferences and Events 

========================================================================

1. Federal Court Finds NSA Wiretaps Illegal 
========================================================================


On August 17, a federal court in Detroit held that the government's
program or warrantless eavesdropping was illegal and
unconstitutional. The court then ordered the government to halt the
program. 

The program, operated by the National Security Agency, taps into the
phone conversations of "US persons" (citizens and permanent
residents) without first obtaining a warrant, either from a criminal
court or even the secretive Foreign Intelligence Surveillance Court.
After the program's existence was made public, a coalition of civil
liberties organizations and individuals sued to keep the wiretap
program from continuing. 

The government, citing the secret nature of the program, argued that
the suit should be dismissed, since the existence of the program was
a "state secret." The court, however, refused to throw out the case,
noting that the government had admitted enough about the existence of
the program publicly to allow the suit. 

The court not only allowed the suit to proceed, however, but also
found that the warrantless surveillance program violated the Foreign
Intelligence Surveillance Act (FISA), which regulates the wiretapping
of foreign intelligence, and Title III of the Omnibus Crime Control
and Safe Streets Act, which regulates domestic surveillance. The
court also found that the Fourth Amendment had been violated, since
no warrants had been sought, either before or after surveillance had
begun. 

The program also violated the First Amendment, the court held, since
the wiretapping program would chill the speech of those groups and
individuals who thought themselves likely to be wiretapped. 

The decision also addressed the arguments that the president's
inherent powers and the 2001 Authorization for Use of Military Force
granted the administration the ability to conduct the wiretapping
program, contrary to existing laws. "First, this court must note that
the AUMF says nothing whatsoever of intelligence or surveillance. . .
Next it must be noted that FISA and Title III are together by their
terms denominated by Congress as the exclusive means by which
electronic surveillance may be conducted." The court dismissed the
inherent powers argument, noting that the military powers granted to
the president to not allow the violation of existing laws. 

The plaintiffs had also sued to halt another NSA program, which
trawls through a massive database of phone call records. However, the
court dismissed that claim, saying that, without any admission of the
program's existence, the state secrets privilege would bar the suit. 

This is the latest of three judicial opinions on government
surveillance programs to be issued in recent months. In July, a
federal judge in Illinois dismissed a lawsuit against AT&T for its
participation in the call records data mining, citing the state
secrets doctrine. A federal court in San Francisco, however, allowed
another suit against AT&T's participation in the eavesdropping
program to proceed, though it did not make a final ruling on the
case. Both the Congressional Research Service and a team of legal
scholars have issued reports concluding that the eavesdropping
program is illegal. 

Opinion in ACLU v. NSA (pdf): 
http://www.epic.org/privacy/terrorism/fisa/acluvnsaop081706.pdf 

Congressional Research Service Report on Domestic Surveillance
Program 
(pdf): 
http://www.epic.org/privacy/terrorism/fisa/crs_analysis.pdf 

Legal Scholars' Report on the Domestic Surveillance Program (pdf): 
http://www.epic.org/privacy/terrorism/fisa/dojreply.pdf 

EPIC's Spotlight on Surveillance on the NSA Program: 
http://epic.org/privacy/surveillance/spotlight/0106/default.html 

========================================================================

2. AOL Releases Users' Search Queries 
========================================================================


AOL's Chief Technology Officer has resigned and two staff have been
fired two weeks after researchers released the search terms used by
650,000 users of AOL's search engine over a three month period. The
data includes a unique identifier for each user, the terms searched
for, the time and date of the search, and the result the user clicked
on. It was intended to be a tool for researchers trying to design
better search engines. 

While AOL initially claimed the search data had been anonymized,
since the users' names had been replaced with numeric identifiers,
many of the search terms included personally identifiably information
such as names, addresses, and even e-mail messages. This often makes
the correlation of a user's search results with the user's real
identity possible. For instance, the New York Times was able to
identify user 4417749 as Thelma Arnold of Lilburn, Georgia. Her
searches included queries about medical conditions of some of her
friends. She also searched for landscapers in her area and other
interests like traveling. Other users in the disclosed data searched
for a wide range of topics, including relationship advice, escort
services, and other personal queries. 

Because a user is consistently identified by an identifying number,
the user's searches can be seen over time covering a variety of
subjects, and connections can be drawn between queries. As the New
York Times found, multiple queries can be used to narrow down the
identity of a searcher even without directly personally identifiable
information being given. 
However, many users apparently entered personally identifiable
information into their searches, including credit card and Social
Security numbers. 

AOL quickly took the data off its web site and later apologized, but
other people who had downloaded the data have made it available. AOL
has said it will review its privacy policies to prevent future
disclosures like this one, but it and other major search engines plan
to continue recording users' search terms. 

The breach has led to calls for the Federal Trade Commission to
investigate AOL for unfair and deceptive trade practices, since AOL's
privacy policy states that personal information and search queries
would not be disclosed without user consent. AOL's breach of
information would also likely trigger the security breach laws of
many states, requiring AOL to notify those customers whose
information has been published. 

World Privacy Forum's FTC Complaint (pdf): 
http://www.epic.org/redirect/wpf_aol_complaint.html 

Electronic Frontier Foundation's FTC Complaint (pdf): 
http://www.eff.org/Privacy/AOL/aol_ftc_complaint_final.pdf 

World Privacy Forum Search Privacy Tips: 
http://www.worldprivacyforum.org/searchengineprivacytips.html 

========================================================================

3. DHS Inspector General: More Security Needed for RFID 
========================================================================


According to a report recently released by the Department of Homeland
Security's Office of the Inspector General, the Department's use of
radio frequency identification (RFID) technology leaves critical
information open to unauthorized access. RFID chips store data and
broadcast it via radio waves in response to another radio signal. The
small, remotely-readable chips are being placed in immigration
documents, passports, and are may soon be used to track cargo and
passenger baggage. 

The report also found a lack of systematic inventories of RFID
technology and consistent policies, and identified security concerns
regarding user access permissions, password management, and auditing
in the Department's RFID databases. The specific database problems,
found within US Customs and Border Protection and the US Visitor and
Immigrant Status Indicator Technology Program, have been redacted
from the report released to the public. 

In addition to database security concerns, the Inspector General's
report highlighted that data on a tag, in the absence of adequate
security measures, can be read by a variety of authorized and
unauthorized readers. The report also found that security controls
were not always present in developing systems, creating the risk that
many systems under development would not be adequately tested prior
to their application in the real world. 

The State Department has begun using RFID technology in new
e-passports, which it rolled out in Colorado earlier this month.
However, a security researcher in Las Vegas announced before the
rollout that he was able, with readily available technology, to clone
the RFID tags that are to be placed in passports. Other privacy
concerns that have been raised over e-passports are unauthorized
reading of the tag's data and use of the tags to identify US
citizens. Both the Department of Homeland Security and the Government
Accountability Office have recently issued reports highlighting their
concerns over RFID's increased risks to privacy and paucity of the
touted security benefits. 

DHS Inspector General's Report (pdf): 
http://www.epic.org/redirect/dhs_ig_rfid.html 

GAO Report on RFID (pdf): 
http://www.gao.gov/new.items/d05551.pdf 

EPIC's RFID Page: 
http://www.epic.org/privacy/rfid/ 

========================================================================

4. Government to Require Cars Warn of "Black Box" Recording 
========================================================================


Car buyers will have to be notified if their car contains an Event
Data Recorder (EDR), according to a new rule proposed by the National
Highway Traffic Safety Administration (NHTSA). EDRs, like "black
boxes" used in airplanes, record information about a car's operation
in the moments before a crash. The position of the steering wheel,
the amount the brake pedal was depressed, the speed of the car,
whether seat belts are fastened, and other information recorded by
the cigarette pack-sized EDR can be used by law enforcement and in
court to recreate car's state at the time of a crash. 

NHTSA says that 64% of model 2005 cars came equipped with EDRs. Some
car manuals acknowledge the use of the EDR in the car, and some
states require disclosure of the presence of the EDR. In 2004, EPIC
argued in comments to the agency that all car owners should not only
be made aware that information about their driving is being recorded,
but that consumers should have the right to control the collection
and dissemination of their driving data. 

The new rule, which goes into effect 2010, requires that cars
equipped with EDRs must mention the usage in the owner's manual. The
new rule also requires that all EDRs must record the same information
and that they be made to be more durable, but NHTSA has stopped short
of requiring them in all new vehicles. NHTSA rules also do not
prevent a car owner from disabling the EDR, but the devices are often
wired into safety systems likes airbags and are difficult to
disconnect. In addition to law enforcement and trial use of the
information, auto manufacturers and NHTSA use information from EDRs
to study whether a car's safety features functioned in a crash and
how drivers react. 

NHTSA Final Rule on EDRs (pdf): 
http://www.epic.org/redirect/nhtsa_edr_rule.html 

EPIC's Comments on EDRs: 
http://www.epic.org/privacy/drivers/edr_comm81304.html 

========================================================================

5. DHS Seeks Expanded Access to Travelers' Data 
========================================================================


The Department of Homeland Security recently proposed expanding a
program that would extend the amount of time. In 2003, the Department
secretly entered into an agreement with European governments in which
personal information about travelers to the US would be transmitted
to the government before they arrived in the country. The European
Court of Justice found that the agreement violated European law, and
ruled that the program should be struck down unless amended by
September 30, 2006. Now, the department has expressed interest not
only in amending the old program to meet the court's requirements,
but expanding the length of time that data is stored and reducing
safeguards on sharing the information with other agencies. 

The passenger name record (PNR) system contains, at a minimum,
specific information on a passenger and travel plans, including name,
contact information, billing information, itinerary, and booking
information for the trip. However, the records will frequently
include much more sensitive information, such as date of birth,
credit card details, names and contact information of relatives, and
even religious, health or dietary considerations. 

In initial negotiations with the EU, the US government originally
sought access to all of the information in the PNR, and to store the
transferred data for up to fifty years. In the end, the agreement
allowed access to fewer fields of information, and allowed storage
for three and a half years. DHS officials stated that, while they do
not wish to gain access to more types of data than the 2003 agreement
allowed, they would like to allow more sharing of the data with other
agencies and retain the data for a longer time. 

DHS officials have claimed that the existing agreement "handcuffs"
their ability to share PNR data with law enforcement, though the
existing agreement already provides for such sharing in order to
prevent serious crimes. 

2004 Document Clarifying the 2003 PNR Agreement (pdf): 
http://www.epic.org/redirect/2004pnr_agreement.html 

EPIC's PNR Disclosure Page: 
http://www.epic.org/privacy/intl/passenger_data.html 

========================================================================

6. News in Brief
========================================================================


German State Finds SWIFT Data Transfers Violated German and EU Law 

The Data Protection Commission for the German state of
Schleswig-Holstein has found that the transfer of banking data to the
US government violated German and European data protection law.
Privacy International, a London-based human rights organization, has
filed complaints regarding the surveillance program in 33 European
countries, and the European Parliament has passed a resolution
objecting to the program. 

Privacy International, German Commission Condemns SWIFT Transfers: 
http://www.epic.org/redirect/pi_swift_germany.html 

Resolution of the European Parliament on SWIFT Transfers: 
http://www.epic.org/redirect/pi_ep_swift.html 

Privacy International Campaign Against SWIFT: 
http://www.epic.org/redirect/pi_swift.html 

Transportation Department Laptop Lost 

A Department of Transportation laptop containing the unencrypted
personal information of 133,000 individuals was lost earlier this
month, putting thousands of drivers and pilots at risk for identity
theft. The laptop was stolen from a department vehicle in Florida.
The data included the names, Social Security numbers, and dates of
birth for 9,500 Tampa area drivers, 80,000 commercial drivers based
in the Miami area, and 42,800 pilots issued liceses in Florida. The
Department has sent letters to affected individuals. 

Transportation Department Page on the Breach: 
http://www.oig.dot.gov/datasecurity.jsp 

Alltel Fined $100,000 for Call Record Violations 

Communications company Alltel was fined $100,000 by the Federal
Communications Commission in connection with poor security practices
that put customers' call records data at risk. In response to a
complaint by EPIC that data brokers were fraudulently obtaining
customers' calling habits from phone companies with poor security,
the FCC found that Alltel was not adhering to basic rules regarding
security for customer records. The FCC continues to pursue a broader
rulemaking that would increase phone record security requirements. 

FCC Order: 
http://www.fcc.gov/eb/Orders/2006/DA-06-1641A1.html 

EPIC's FCC Complaint on Phone Security: 
http://www.epic.org/privacy/iei/cpnipet.html 

EPIC's Phone Records Page: 
http://www.epic.org/privacy/iei/ 

US Sues Maine Officials for Investigating NSA 

The U.S. Department of Justice filed suit against state officials in
Maine who were investigating whether or not Verizon handed over
customer information to a secret NSA data mining program. Federal
lawyers sought to block the Maine Public Utilities Commission from
demanding information from the company. The federal government has
previously sued state officials in New Jersey and Missouri to prevent
similar investigations of the domestic spying program. 

EPIC's Resources on Domestic Surveillance: 
http://www.epic.org/features/surveillance.html 

Casino Security Used Cameras to Spy on Guests 

A security supervisor at a casino in Atlantic City, NJ had his
license suspended after a state review board found that he had used
the casino's security cameras to observe women instead of the state
of security on the floor. Caesars Atlantic City Hotel Casino also
paid a $185,000 fine and fired three employees due to allegations
that security personnel were abusing surveillance cameras in the
casino. EPIC has previously called attention to the potential for
security cameras being abused to invade individuals' privacy. 

EPIC's Spotlight on Surveillance on Security Camera Abuses: 
http://epic.org/privacy/surveillance/spotlight/1205/default.html 

NYC Proposes Cameras at Nightclub Exits 

New York City Council member Christine Quinn recently proposed that
New York place security cameras aimed at the entrances and exits of
nightclubs, in response to recent murders at clubs in the city. The
plan has met with opposition by civil liberties and gay groups, who
objected to the fact that the cameras could invade privacy and
eliminate patrons' anonymity. Though individuals in public may be
observed, their presence is not necessarily associated with an
identity. 
Recording their image, however, easily leads to the loss of
anonymity. EPIC has commented on similar proposals in Washington D.C.


EPIC's Comments on Increased CCTV Surveillance in Washington (pdf): 
http://www.epic.org/privacy/surveillance/cctvcom062906.pdf 

========================================================================

7. EPIC Bookstore: David Lazer's "DNA and the Criminal Justice
System" 
========================================================================


"DNA and the Criminal Justice System: The Technology of Justice" by
David Lazer (MIT Press 2004) 
http://www.powells.com/partner/24075/biblio/17-026262186x-1 

In the long history of criminal justice, no technology has had the
impact of DNA collection and analysis. According to the FBI, there
are now over three and half million profiles in the national Combined
DNA Index System. Fifteen years ago, CODIS was a pilot project
involving only twelve forensic laboratories. 

Experts say that DNA analysis offers a unique ability to determine
guilt and innocence. Prosecutors increasingly rely on DNA evidence to
make their case and to solve unsolved crimes. DNA evidence has also
been used by criminal defense attorneys to prove the innocence of
those who have been wrongly convicted. DNA testing has been used
successfully by groups such as the Innocence Project to exonerate
more than 170 wrongly convicted individuals, some of whom were on
death row and imprisoned for decades. 

Still, DNA analysis also reveals race, paternity, propensity to
develop certain diseases, and other information that falls far
outside the criminal justice realm. There is, on the horizon, the
very real possibility that DNA use may dramatically expand into
decisions about employment, hiring, housing, and citizenship. And
even within the criminal justice system, there are ongoing concerns
about the scope of collection, the reliability of testing, and the
possible use of DNA to predict future criminal acts. 

David Lazer's excellent collection of essays looks squarely at the
emerging policy concerns for DNA in the criminal justice system. A
balanced, thoughtful, and informative volume, "DNA and the Criminal
Justice System" should be required reading for policymarkers,
jurists, researchers and others seeking to understand the dramatic
transformation now taking place. 

As Justice Breyer explains in his contribution to the volume, there
must be "extensive, informed development of the relevant legal and
policy issues *prior* to decision." For example, the increased
reliance on DNA databases in criminal justice raises controversial
ethical questions in the realms of civil liberties, privacy,
surveillance, and forensic error. Do police laboratories need more
rigorous standards for DNA testing? Will law enforcement DNA
databases expand to include millions not convicted of any crime? Does
mandatory DNA testing provide the ultimate threat to civil liberties
and privacy? Does it in fact increase the likelihood of genetic or
racial profiling? 

These are pressing questions that Congress, the courts, and the
public will increasingly confront. 

- Marc Rotenberg 

================================ 

EPIC Publications: 

"Information Privacy Law: Cases and Materials, Second Edition" Daniel
J. Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price:
$98. http://www.epic.org/redirect/aspen_ipl_casebook.html 

This clear, comprehensive introduction to the field of information
privacy law allows instructors to enliven their teaching of
fundamental concepts by addressing both enduring and emerging
controversies. The Second Edition addresses numerous rapidly
developing areas of privacy law, including: identity theft,
government data mining and electronic surveillance law, the Foreign
Intelligence Surveillance Act, intelligence sharing, RFID tags, GPS,
spyware, web bugs, and more. Information Privacy Law, Second Edition,
builds a cohesive foundation for an exciting course in this rapidly
evolving area of law. 

================================ 

"Privacy & Human Rights 2005: An International Survey of Privacy Laws
and Developments" (EPIC 2006). Price: $60.
http://www.epic.org/bookstore/phr2005/phr2005.html 

This annual report by EPIC and Privacy International provides an
overview of key privacy topics and reviews the state of privacy in
over 70 countries around the world. The report outlines legal
protections, new challenges, and important issues and events relating
to privacy. Privacy & Human Rights 2005 is the most comprehensive
report on privacy and data protection ever published. 

================================ 

"FOIA 2004: Litigation Under the Federal Open Government Laws," Harry
Hammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004). Price:
$40. http://www.epic.org/bookstore/foia2004 

This is the standard reference work covering all aspects of the
Freedom of Information Act, the Privacy Act, the Government in the
Sunshine Act, and the Federal Advisory Committee Act. The 22nd
edition fully updates the manual that lawyers, journalists and
researchers have relied on for more than 25 years. For those who
litigate open government cases (or need to learn how to litigate
them), this is an essential reference manual. 

================================ 

"The Public Voice WSIS Sourcebook: Perspectives on the World Summit
on the Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook 

This resource promotes a dialogue on the issues, the outcomes, and
the process of the World Summit on the Information Society (WSIS).
This reference guide provides the official UN documents, regional and
issue-oriented perspectives, and recommendations and proposals for
future action, as well as a useful list of resources and contacts for
individuals and organizations that wish to become more involved in
the WSIS process. 

================================ 

"The Privacy Law Sourcebook 2004: United States Law, International
Law, and Recent Developments," Marc Rotenberg, editor (EPIC 2005).
Price: $40. http://www.epic.org/bookstore/pls2004/ 

The Privacy Law Sourcebook, which has been called the "Physician's
Desk Reference" of the privacy world, is the leading resource for
students, attorneys, researchers, and journalists interested in
pursuing privacy law in the United States and around the world. It
includes the full texts of major privacy laws and directives such as
the Fair Credit Reporting Act, the Privacy Act, and the OECD Privacy
Guidelines, as well as an up-to-date section on recent developments.
New materials include the APEC Privacy Framework, the Video Voyeurism
Prevention Act, and the CAN-SPAM Act. 

================================ 

"Filters and Freedom 2.0: Free Speech Perspectives on Internet
Content Controls" (EPIC 2001). Price: $20. 
http://www.epic.org/bookstore/filters2.0 

A collection of essays, studies, and critiques of Internet content
filtering. These papers are instrumental in explaining why filtering
threatens free expression. 

================================ 

EPIC publications and other books on privacy, open government, free
expression, crypto and governance can be ordered at: 

EPIC Bookstore http://www.epic.org/bookstore 

"EPIC Bookshelf" at Powell's Books
http://www.powells.com/features/epic/epic.html 

================================ 

EPIC also publishes EPIC FOIA Notes, which provides brief summaries
of interesting documents obtained from government agencies under the
Freedom of Information Act. 

Subscribe to EPIC FOIA Notes at:
https://mailman.epic.org/cgi-bin/control/foia_notes 

========================================================================

8. Upcoming Conferences and Events 
========================================================================


Infosecurity New York. Reed Exhibitions. September 12-14, 2006. New
York, New York. For more information:
http://www.infosecurityevent.com 

Identity and Identification in a Networked World. New York
University. September 29-30, 2006. New York, New York. For more
information: http://www.easst.net/node/976 

34th Research Conference on Communication, Information, and Internet
Policy. Telecommunications Policy Research Conference. September
29-October 1, 2006. Arlington, Virginia. For more information: 
http://www.tprc.org/TPRC06/2006.htm 

6th Annual Future of Music Policy Summit. Future of Music Coalition.
October 5-7, 2006. Montreal, Canada. For more information:
http://www.futureofmusic.org/events/summit06/ 

The IAPP Privacy Academy 2006. International Association of Privacy
Professionals. October 18-20, 2006. Toronto, Ontario, Canada. For
more information: http://www.privacyassociation.org 

International Conference on Privacy, Security, and Trust (PST 2006).
University of Ontario Institute of Technology. October 20-November 1,
2006. Markham, Ontario, Canada. For more information: 
http://www.businessandit.uoit.ca/pst2006/ 

Internet Governance Forum (IGF) October 30-November 2, 2006. Athens,
Greece. For more information: 
http://www.igfgreece2006.gr/ 

28th International Data Protection and Privacy Commissioners'
Conference. November 2-3, 2006. London, United Kingdom. For more
information: http://www.privacyconference2006.co.uk/ 

BSR 2006 Annual Conference. Business for Social Responsibility.
November 7-10, 2006. New York, New York. For more information:
http://www.bsr.org/BSRConferences/index.cfm 

CFP2007: Computers, Freedom, and Privacy Conference. Association for
Computing Machinery. May 2007. Montreal, Canada. For more
information: http://www.cfp2007.org. 

======================================================================

Subscription Information 
======================================================================


Subscribe/unsubscribe via web interface: 

https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news 

Back issues are available at: 

http://www.epic.org/alert 

The EPIC Alert displays best in a fixed-width font, such as Courier. 

==============About EPIC============================== 

The Electronic Privacy Information Center is a public interest
research center in Washington, DC. It was established in 1994 to
focus public attention on emerging privacy issues such as the Clipper
Chip, the Digital Telephony proposal, national ID cards, medical
record privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Act
litigation, and conducts policy research. For more information, see
http://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite
200, Washington, DC 20009. +1 202 483 1140 (tel), +1 202 483 1248
(fax). 

If you'd like to support the work of the Electronic Privacy
Information Center, contributions are welcome and fully
tax-deductible. Checks should be made out to "EPIC" and sent to 1718
Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you can
contribute online at: 

http://www.epic.org/donate 

Your contributions will help support Freedom of Information Act and
First Amendment litigation, strong and effective advocacy for the
right of privacy and efforts to oppose government regulation of
encryption and expanding wiretapping powers. 

Thank you for your support. 

------------------------- END EPIC Alert 13.17 ----------------------- 





================== HURIDOCS-Tech listserv ===================== 
Send mail intended for the list to <        >. 
Archives of the list can be found at: 
http://www.hrea.org/lists/huridocs-tech/markup/maillist.php




[Reply to this message] [Start a new topic] [Date Index] [Thread Index] [Author Index] [Subject Index] [List Home Page] [HREA Home Page]