~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ PRIVACY 101 THEORY & PHILOSOPHY OF PRIVACY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By way of introduction to our Seminar, we each offer our views on, (1) the need for privacy, and (2) the prospects of achieving it. Later, we will provide more detailed lectures on specific privacy topics. After each such presentation, you will have an opportunity to ask questions, contribute ideas, argue with us or whatever. The venue will be a moderated list. Thank you for signing up for Privacy 101. We hope you will find it provocative, enlightening and rewarding. Sandy Sandfort Duncan Frissell September 1994 (c) 1994, Frissell and Sandfort 332 Bleecker St., #F-34 New York, NY 10014 USA Permission is hereby granted to reproduce and distribute any or all of "Privacy 101" provided this statement and the above copyright notice and address are included. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PRIVACY, WHO NEEDS IT? by Sandy Sandfort Curiously, I've never had much interest in privacy, per se. In part, this is because extreme, personal openness is an almost uniquely American cultural trait. For me, it's a personal one as well. It is one, however, from which I have been weaned by sometimes bitter personal experience and the "horror stories" of others. THE BAD NEWS What I'm concerned about is freedom. Unfortunately, there are those who are offended by the freedom of others, and seek to rectify the "problem." And information about you is one of the most effective weapons they have. Protecting your privacy keeps that weapon out of their hands. Whether you seek privacy for its own sake or to keep vital information out of the hands of enemies, your privacy is imperative. The "intelligence" in the names of the CIA, DIA and various law enforcement agency departments refers to the gathering of secret information for military or police purposes. Non-governmental organizations and individuals seek and use intelligence, too. Without the ability to gather intelligence, none of them can have much power over you. With good intelligence, it's another story. It can tell them your habits, your routine, your strengths, your weaknesses, where you sleep at night... where your family sleeps at night. There are wolves in the woods whether we choose to admit it or not. Unless you are absolutely sure you have--nor ever will have--any enemies, prudence dictates a low profile. It is clear that information about you in the wrong hands, puts you at risk. By the same token, it is NOT clear that information about you in anyone's hands does you much good. Promiscuous dissemination of personal information makes you vulnerable to every sort of societal predator. To address such risks, you need to organize your life such that your personal information can be made available only on a limited and conditional need-to-know basis. In addition, proactive steps can be taken to enhance, alter, duplicate, substitute or camouflage such information. More on this later in the Seminar.) What information should you protect? "Everything" is a good first approximation. For years, the amount of peanut butter used at military bases has been classified. The reason? It's trivial to determine manpower deployment if you have base-by-base figures for peanut butter consumption. A similar correlation has been made between late-night pizza orders from the Pentagon and the initiation of hostilities in such places at Granada, Panama and the Arabian Gulf. Obviously, though, some types of information are more critical than others. We will be discussing specific areas of concern in upcoming lectures. But what is far more important than merely enumerating specific threats, is getting yourself in the habit of "thinking privacy." If you are like me, "thinking privacy" does not come naturally, it must be learned. Hopefully, by the end of this Seminar, you will be automatically identifying and avoiding privacy pitfalls in your everyday life. THE GOOD NEWS There are those who profess to believe that a decade after the symbolic "1984," it is impossible to keep your affairs private. They are wrong, but such negativism acts as an insidious self-fulfilling prophecy that keeps them from trying. Even worse, their negativism often dissuade others from trying as well. How do I know privacy is possible? Well, for obvious reasons, identifying privacy "role models" is difficult. (Would the picture of the 1994 "Privacy Poster Boy" be just a blank 3'x4' piece of card stock? How about a picture of the Cayman Islands with a human silhouette superimposed on it?) Nevertheless, I have read about, communicated with, met and assisted many such "Privacy Poster Boys." I won't tell you most of their names, but I will verify their existence and share their secrets. The funny thing is, it's not that big a deal. Piece of cake, really. This is a seminar for optimists. Not because of the power of "positive thinking," but because the power of the individual is growing. Because there are many more of us (good guys) than them (bad guys). And because there are millions of folks in the world who are already successfully using the techniques we will be discussing. While there is no reward without risk, the pioneers have already blazed the trail. (c) 1994, Sandfort Please remember that specific threats and their solutions will come later. At this point we only want to shake the naysayers out of the trees. If you either doubt the threat or doubt that anything can be done about it, PLEASE state your case on the list. We want to address your real concerns rather than just guess what they may be. You may also start asking specific privacy questions at this time. We probably won't address them at this time, but we will have something to say about them later in the Seminar when we cover related subjects. All questions will be treated as confidential. In our public discussions, we will paraphrase, edit and generalize your questions to render them as anonymous as possible. We recommend you encrypt and mail forward questions containing sensitive personal information. You do not need to know your identity. My public key is: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.2 mQCNAisarBkAAAEEAMPHv7QMAR2Ulp55v7MhN1eif09AX2dfgAF4OtOrssSn7s07 dzuXHWN0L6W3XnwbtCxsJxynffwwUQ9FAheNdifNFqIXwO1QGPvlKJEcwTCrzE1f Jonqzzm0/z8zop4mfpsEPKOwwNCLHqIRRjAV3N2KJkVJlLvSeU5ULTXct1IzAAUR tCZTYW5keSBTYW5kZm9ydCA8U1NBTkRGT1JUQEFUVE1BSUwuQ09NPokAlQIFECui Vvvidd4O/2f3CwEBIIED/2yn8/BatDmefA48EEwa3emgj5hSzpWvvYPlf2LLdBEk FFMKRG1QF9tgZddwfaFWDUMC+9pOYWCzbq3ssTRqMsCDKPOvn5pf4plxHvHcVgZO 9bJ8B8xjkeZpwN5TNF2bldm6RvmiAoNG5A+B6keBnX3bTyxd/b7xXHKw57mvNjGj =NY1q -----END PGP PUBLIC KEY BLOCK----- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . WHY PRIVACY? That's the easy one to answer. People who are trying to invade your privacy, always ask, "If you haven't done anything wrong, what do you have to hide?" The answer -- "If I knew what I had to hide, I certainly would. Since I don't, I need my privacy." No one can predict what personal characteristics or behaviors will be punished in years to come. When I was born in the 1950s after all, smoking was a virtue and sodomy a vice. At some time and in some place during the last 200 years in Europe, virtually every human characteristic has led someone to kill someone else. Race, sex, creed, political philosophy, social or economic class -- all these factors have been used to attack people at certain times in certain places. Since some innocent fact about you may at some time put you at risk, and since no one can predict what that critical fact will be, a general habit of privacy preservation pays real dividends. Another answer to the question "why privacy?" is "why not." What right do others have to demand information from you? It costs you time and worry to surrender the intimate details of your life to strangers. If you can get what you want *and* preserve your privacy, you might as well do so. Let the busybodies that want to know all about your life find something else to do. Put the personal details of your life on a "need to know" basis. You'll save time and worry and frustrate those who are trying to get you to give them free information about you. PRIVACY YESTERDAY - PRIVACY TOMORROW Even though you may feel that your privacy is under attack as never before, it's simply not true. A few years ago, humorist P. J. O'Rourke moved to a small town in New Hampshire. After he had been living there for about 6 months, he had occasion to go into a local store to buy some underwear. As he was paying for his purchase, the sales clerk observed, "That's not your usual brand of underwear." The fact is that throughout most of human history, we've lived in tiny communities in which everyone knew everything worth knowing about everyone else. If the authorities wanted any information about anyone, they had merely to ask. Today's world allows many more opportunities to protect your privacy. Even though it may seem that all of us are wrapped in a web of computer databanks, much of that information is unlinked to us and hence unable to harm us. As we shall see in this seminar, there are many additional steps that you can take to protect yourself from modern attempts to rebuild the social control mechanisms of the ancient village. We will also have an opportunity to talk about how some of the traditional privacy techniques - residential ambiguity, multiplication of entities, offshore financial services, etc. can be combined with the latest in net tech to frustrate the attempts of control freaks to "make me dance as they desire with jail, and gallows, and hellfire." HOUSEKEEPING This is a moderated list. Most of the major posts will be essays by Sandy and me. We will be editing some of the posts we receive to frame questions that we can answer but if you have general privacy comments, there are other newsgroups and mailing lists which are a better forum for same. We can also be contacted personally if you have individual questions. If you don't know how to use the Majordomo software, send the message -- help -- to majordomo@c2.org. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQCNAirtsUkAAAEEAN4wvnp5CE1ZUyqq8HnBDk78WP9WpyIFbINw/qvDxRGHPK4e JFR7XBaMnd3Ek0x8c20syHwPVNrDUpdgRmJzperbNTeaS1lof4npfR8kPnGJ3wvv wJtIXSM+4ePDy+pfGQkyY+Y0qJEbBTxYNW01ciMrVS2Uac5C3YVO4r4sgSPhAAUR tCtEdW5jYW4gRnJpc3NlbGwgPDc2NjMwLjM1NzdAY29tcHVzZXJ2ZS5jb20+ =I88k -----END PGP PUBLIC KEY BLOCK----- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~