[prev in list] [next in list] [prev in thread] [next in thread] 

List:       e-lang
Subject:    [E-Lang] Fwd: [MPUNKS] Cypherpunks 011013 at Stanford: Anti-Terrorism &
From:       "Mark S. Miller" <markm () caplet ! com>
Date:       2001-10-12 14:09:59
[Download RAW message or body]

This one looks especially good and important.


>Date: Fri, 12 Oct 2001 01:35:46 -0700
>To: Meetingpunks List <meetingpunks@cryptorights.org>
>From: Dave Del Torto <meetingpunks-admin@cryptorights.org>
>Subject: [MPUNKS] Cypherpunks 011013 at Stanford: Anti-Terrorism &
> Security Policy
>Cc: cypherpunks@lne.com, cryptography@c2.net, coderpunks@toad.com
>Sender: owner-coderpunks@toad.com
>X-Rcpt-To: markm@caplet.com
>
>IF YOU GET THIS TWICE: Sorry, it's because we're transitioning MLMs.
>
>See <http://cryptorights.org/meetingpunks> for subscription help and 
> Cypherpunks meeting announcements from around the world.
>
>..........................................................................
>
>SF Bay Area Cypherpunks
>
>October 2001 Physical Meeting Announcement
>
>GENERAL INFO:
>
>  DATE:  Saturday 13 October 2001
>  TIME:  1:00-6:00 PM (Pacific Time)
> PLACE:  Tressider Student Union Courtyard
>         Stanford University Campus
>         Palo Alto, California, USA
>
>This Cypherpunks meeting will begin forming around 12:00 PM, and the 
>structured Agenda will begin at approximately 1:00 PM.
>
>
>AGENDA:
>
> "Our agenda is a widely-held secret."
>
> As usual, this is an Open Meeting on US Soil, and everyone's invited
> ...yes, even the Director of Homeland Defense.
>
>......................................................
> 1. Recent Cypherpunk News
>
>Various Cypherpunks have been on the road recently, and will share 
>important news updates and colorful stories with us about their 
>journeys.
>
>CryptoRights Foundation representatives will also have some very 
>good news about CRF's recent progress.
>
>......................................................
> 2. Anti-Terrorism
>
>This meeting will feature a discussion on the implications for our 
>open society of two major legislative proposals resulting from the 
>recent crimes against humanity in NY, DC and PA. The Mobilization 
>Against Terrorism Act (MATA) and it's follow-on, the Uniting and 
>Strengthening America (USA) Act, are dramatic new proposals creating 
>major arguments in Congress. They include provisions that:
>
> * Define "computer intrusions" as a (federal) Terrorism offense.
> * Add convicted krackers to a central federal DNA database.
> * Remove wiretap restrictions on email scanning, web surveillance and
>    voicemail inspections by law enforcement.
> * Remove controls on roving (person-specific) wiretaps, implying 
>    wiretap capability in all communications infrastructures.
> * Allow LEAs to share wiretap data with any Executive Branch employee.
> * Make domestic surveillance easier under FISA (Foreign Intel Surv Act)
> * Provide US intelligence agencies with access to Grand Jury documents.
> * Let the President designate US Citizens as FISA surveillance targets.
> * Create free speech restrictions on "expert advice" to USG-defined 
>    "terrorists".
> * Authorize the CIA to "hire terrorists".
>
>In addition to MATA and USAA, the Administration has established a 
>new (soon to be Cabinet) position heading the Office of Homeland 
>Defense (OHD) for coordination of law enforcement and intelligence 
>efforts, including centralization of databases storing information 
>about US Citizens.
>
>These new initiatives have all been positioned and marketed to voters 
>as making Americans safer from the scourge of global Terrorism, but 
>we'll be asking the tough, skeptical questions:
>
> Q: Will these initiatives really make our lives more secure or simply
>     make the US a Police State?
> Q: Assuming these proposals work, are they worth sacrificing our civil
>     liberties?
>
>We'll also discuss the amendments proposed by Russell Feingold (D-WI) 
>to the USAA which:
>
> * Bar police from performing court-ordered "secret searches".
> * Narrow the ability the bill gives employers, schools and public 
>    libraries to spy on users, rather than allowing spying on 
>    all "computer trespassers".
> * Protect medical/academic records by requiring a judge's permission
>    instead of giving police access to all "tangible" data.
> * Modify "roving wiretaps" to permit eavesdropping only when the 
>    target is on specific hardware but not when others use it.
>
>In addition, our resident legal eagles will help us evaluate the 
>Constitutionality of these measures, and we'll also include a 
>discussion the Snake-Oil Protection Act (aka the DMCA), and the 
>wisdom of letting people who do not design security systems write 
>legislation affecting everyone's security.
>
>Background info:
> USAA <http://leahy.senate.gov/press/200110/100401a.html>
> MATA <http://www.justice.gov/opa/pr/2001/September/492ag.htm>
> OHD <http://www.whitehouse.gov/news/releases/2001/10/20011008.html>
> DMCA <http://www.loc.gov/copyright/legislation/dmca.pdf>
> EFF Analysis by Lee Tien and Shari Steele:
>  <http://www.eff.org/Privacy/Surveillance/20010926_eff_wiretap_pr.html>
>
>
>......................................................
> 3. CRF Human Rights Security Policy Design Session #1
>
>A good security policy is essential to good security in any 
>organization and many organizations don't know where to start. 
>CryptoRights is designing a comprehensive security policy template 
>for our human rights NGO clients, and we need the active 
>participation of the Cypherpunk Community. Please send and/or bring 
>non-proprietary policy documents/doc fragments, FAQs, URLs, papers 
>you've written or read, books you use and any other resources you can 
>think of regarding security policy design. We'll spread it all out on 
>the floor and begin brainstorming and creating the ultimate security 
>policy document in the first session of many.
>
>This document will be a showplace for Cypherpunk core competency. CRF 
>and its client NGOs and partners will be able to use it or portions 
>of it to bootstrap the wide adoption of a variety of communications 
>security tools, in order to establish their utility for the global 
>society.
>
>To add to the overall complexity of such a project, we also have to 
>contend with the new politics in the post-9/11 world. It's going to 
>have to be an amazingly flexible and comprehensive document built 
>from many different security professionals' experiences and 
>contributions.
>
>Our many design challenges include:
>
> * Flexible threat model definitions 
> * Encryption tool interfaces and training requirements 
> * Fieldworker security and travel considerations 
> * NGO security team qualifications and administrator credentials 
> * Law enforcement issues 
> * Integration with small/wearable platforms 
> * Revocation issues 
> * Authentication guidelines and procedures for online documents 
> * Physical security considerations 
> * Interfacing with other NGO security infrastructures 
> * Surveillance and counter-surveillance 
> * Protections from terrorists 
> * Field intelligence and urban counter-intelligence 
> * Human rights trustgroup trust models 
> * Evidence authentication and encryption frameworks 
> * E-commerce and digital cash for human rights NGOs 
> * Voice encryption and radio/telephony tradecraft 
> * Human rights public key infrastructure management 
> * Secret sharing requirements and guidelines 
> * Keyservers 
> * Hardware security tokens 
> * Biometrics 
> * Privacy policy 
> * Remailers and identity management guidelines and technology 
> * IPsec and DNSsec capabilities 
> * ...and more 
>
>Bring, laptops, pads of paper, whiteboard markers and your thinking caps!
>Submissions are welcome anytime, even after the meeting (we'll have more):
>   Email to: <mailto:sec-policy@cryptorights.org> or
>   Anonymous FTP uploads to: <ftp://cryptorights.org>.
>Please support and participate in this important community initiative!
>
>
>..........................................................................
>LOCATION:
>
>   The Stanford meeting location will be familiar to those who've been to our
>   outdoor summer meetings before, but for those who haven't been, it's on the
>   Stanford University campus (in Palo Alto, California), at the end of 
>   Santa Theresa, at the tables outside Tressider Union, just west of 
>   Dinkelspiel Auditorium.
>
>   We meet at the tables on the West side of the building, inside the
>   horseshoe "U" formed by the Tressider building. Ask anyone on campus 
>   where "Tressider" or the "Student Union" is and they'll help you find it.
>
>   If the weather is bad, we'll meet inside.
>
>   Food/beverages are available at the cafe and mini-market inside.
>
>   Location Maps:
>   Tressider Union (overview):
>     http://www.stanford.edu/home/map/search_map.html?keyword=&ACADEMIC=Tresidder+Union
>   Tressider Union (zoomed detail view):
>     http://www.stanford.edu/home/map/stanford_zoom_map.html?234,312
>   Printable Stanford Map (407k).
>     http://www.stanford.edu/home/visitors/campus_map.pdf
>
>   GPS Coordinates: 37d23:40 N 122d04:49 W 
>
>..........................................................................
>HELP?
>
>If you get lost, or have questions, comments or last-minute agenda 
>requests, please contact your friendly meeting organizers:
>
> Dave Del Torto <ddt@cryptorights.org>   Cell: +1.415.730.3583
> Bill Stewart   <bill@cryptorights.org>  Cell: +1.415.307.7119
>
>..........................................................................
>Heads-Up for November!
>
>The November meeting will be indoors, somewhere in San Francisco 
>(location TBD). Two very special events are being planned:
>
>(1) We hope to have the much-awaited Second Part of Black Unicorn's 
>presentation at the June meeting of his Analysis of Cocaine 
>Smuggling. In light of recent events, the national security 
>implications of his conclusions are more significant than ever.
>
>(2) Eric Blossom may present some very important CRF research and 
>development work on a Software Defined Radio for evaluating the 
>security of wireless devices. If you didn't see Eric's talk at 
>HAL2001, you shouldn't miss this. Early running code will be 
>demonstrated.
>
>END


        Cheers,
        --MarkM

_______________________________________________
e-lang mailing list
e-lang@mail.eros-os.org
http://www.eros-os.org/mailman/listinfo/e-lang

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic