> Program

Program Committee

About CFP


Privacy Policy

Submit Proposal



The CFP2006 program is subject to change.
Check this conference website for updates or revisions.

download "CFP2006 At-A-Glance" in .pdf format ( updated April 28, 2006 )

  view WEDNESDAY schedule >
  view THURSDAY schedule >
  view FRIDAY schedule >

8:00am – 9:00am Continental breakfast

9:00 am – 12:00 pm CONCURRENT TUTORIALS

Privacy-Enhancing Technologies for the Internet
In this tutorial, we will give an overview of the technologies currently available to help you protect your privacy online – the privacy of your email, your web interactions, your instant messages, and more -- as well as where things may be going in the future.

Ian Goldberg
, Off-The-Record Messaging
Roger Dingledine, The Free Haven Project

Constitutional Law in Cyberspace
Mike Goodwin, attorney and research fellow at Yale University, will teach the basics of constitutional law in cyberspace, with an emphasis on free-speech and privacy issues. This tutorial is designed to inform non-lawyers and lawyers alike about the constitutional issues that underlie computer-crime and computer civil-liberties cases, as well as about the policy issues relating to intellectual property and jurisdiction on the Net. Its goal is to prepare attendees to understand the full range of constitutional and civil-liberties issues discussed at the main panels and presentations at CFP2006, with particular emphasis on the intersection of copyright law, constitutional law, and technology policy.

Mike Godwin
, Yale University

ECPA, FISA, and Other Four Letter Words
This tutorial will present an overview of the two statutes that regulate Internet surveillance: the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). The tutorial will explain why the statutes were passed, how they work, and, in some cases, how they don’t work.

Orin Kerr
, George Washington University Law School

12:00pm – 1:30pm Lunch on Your Own

1:00pm - 5:00pm CFP2006 SPECIAL TOUR:

Tour of the National Security Agency
Join us on a special tour to the National Security Agency Headquarters in Fort Meade, Maryland. During the bus ride to the NSA you be briefed on how that agency operates. At the NSA you will be led on a tour of the National Cryptologic Museum. The return trip will allow you to de-brief with other tour participants.

Buses will leave from the Conference Hotel at 1:00 pm and return from NSA at 5:00 pm (approximately).

Space may be limited.

As described by the NSA:
The National Cryptologic Museum is the National Security Agency’s principal gateway to the public. It shares the Nation’s, as well as NSA’s, cryptologic legacy and place in world history. Located adjacent to NSA Headquarters, Ft. George G. Meade, Maryland, the Museum collection contains thousands of artifacts that collectively serve to sustain the history of the cryptologic profession. Here visitors can catch a glimpse of some of the most dramatic moments in the history of American cryptology: the people who devoted their lives to cryptology and national defense, the machines and devices they developed, the techniques they used, and the places where they worked. For the visitor, some events in American and world history will take on a new meaning. For the cryptologic professional, it is an opportunity to absorb the heritage of the profession.

Being the first and only public museum in the Intelligence Community, the Museum hosts approximately 50,000 visitors annually from all over the country and all over the world, allowing them a peek into the secret world of codemaking and codebreaking.

The Museum is also an invaluable educational tool, benefiting thousands of students and teachers every year. Tours are provided allowing students of all ages the chance to learn about cryptology’s impact on history and the possibility of exciting jobs in an area they may not have thought possible.


Telecommunications Law for the Rest of Us
The FCC’s role in Internet regulation has become a major policy issue since the enactment of the Telecommunications Act of 1996, especially in light of technological convergence and regulatory asymmetry. This tutorial will teach non-telecommunications lawyers what they need to know about the fundamental principles and policy instruments of FCC telecommunications regulation – how the FCC regulates telecommunications and other services, and what the FCC can and can’t do. NOTE: This updated tutorial was first presented at CFP 2004. It is particularly timely given the VoIP/CALEA litigation and the net neutrality issue.

Lee Tien, EFF
Robert Cannon, FCC/Washington Internet Project
Chris Savage, Cole, Raywid & Braverman

Lee Tien

The REAL ID Act: History and Current Status
The REAL ID Act, passed by Congress in Spring 2005, imposes a federal standard on the design, issuance and management of state driver’s licenses. Privacy groups from across the political spectrum have criticized the law as a backdoor attempt to require Americans to carry a de facto national ID card. State government officials have said that it is going to be difficult and costly to implement. This tutorial will look at how the law passed and how it is being implemented with a focus on potential privacy concerns.

Ari Schwartz, Center for Democracy and Technology
Toby Levin, Dept. of Homeland Security
Tom Wolfsohn, American Association of Motor Vehicle Administrators
Tim Sparapani, ACLU
Jim Harper, Cato Institute
David Williams, Citizens Against Government Waste

Ari Schwartz

Electronic Voting Systems
This tutorial will describe the latest developments in electronic voting. Professor Avi Rubin, Director of A Center for Correct, Usable, Reliable, Auditable and Transparent Elections (ACCURATE) supported by the National Science Foundation, will outline the structural defects and technical vulnerabilities that threaten free and fair elections. The rest of the program will include: an assessment of problems with HAVA implementation across the nation; the latest legislative efforts at both the federal and state level; an overview of litigation; information about technology options for concurrently providing accessibility, anonymity and security; a discussion of the multiplier effect electronic voting systems have on long-standing voting rights issues; and how intellectual property claims are being used to frustrate efforts at oversight, auditing, security testing, and monitoring. The tutorial will conclude with an assessment of the leading reform proposals and a summary of major issues that should be addressed in future legislative reform efforts.

Jack Lerner, Samuelson Law, Technology & Public Policy Clinic, UC-Berkeley
Joseph Lorenzo Hall, School for Information, UC-Berkeley
Matt Zimmerman, Electronic Frontier Foundation
Lillie Coney, Associate Director Electronic Privacy Information Center (EPIC), Coordinator, National Committee for Voting Integrity (NCVI)

Protecting Internet Speech Against Suppression
What can Internet speakers do to minimize legal exposure under trademark, libel and other theories, while maximizing public exposure? This tutorial will address the most common grounds on which speakers and web site operators are attacked and discuss both the applicable legal defenses, and the interplay between the risks of litigation and the political choices that are made in adjusting site content in light of those risks.

Paul Levy
, Public Citizen

6:00pm – 9:00pm OPENING RECEPTION at Public Citizen


  view WEDNESDAY schedule >
  view THURSDAY schedule >
  view FRIDAY schedule >

The CFP2006 program is subject to change.
Check this conference website for updates or revisions.


sponsored by ACM