The Computers, Freedom and Privacy Conference (or CFP, or the Conference on Computers, Freedom and Privacy) is an annual academic conference held in the United States or Canada about the intersection of computer technology, freedom, and privacy issues. The conference was first held in 1991 in Burlingame, California. [1] Since at least 1999, [2] it has been organized under the aegis of the Association for Computing Machinery. It was originally sponsored by CPSR.
Attendees include high-level government officials, grassroots advocates, and programmers. [3]
The first annual US Big Brother Awards were made at CFP99 on Wednesday 7 April 1999, [1] the 50th anniversary of the publication of George Orwell's Nineteen Eighty-Four. The awards were made by the London-based Privacy International to recognize "the government and private sector organizations which have done the most to invade personal privacy in the United States." [4] Simon Davies, managing director of Privacy International, presented the awards, otherwise known as Orwell's. There were five categories of award: Greatest Corporate Invader, Lifetime Menace, Most Invasive Program, People's Choice, and Worst Public Official. [5]
1991 - CFP Begins
1992 - 1998 Early Growth
1999 - Big Brother Awards
As well as challenging global internet policy's the CPF held their Big Brother Ceremony the same year. These were a set of awards made to call out companies who are seen as a "threat to civil liberties". [13] This award ceremony was to bring awareness on companies who were actively harming the peoples right to personal privacy in the space of technology.
2000 - 2005 Transition To ACM
2015 - Final Year And End Of CFP Conferences
Legacy
The Crypto War is the name given to a long standing issue which primarily plays out mostly in the United States, debating whether regular people should be allowed to use and share strong encryption technology without the influence of the government. [17] One of the parties that voted against giving the people encryption was enforcement and intelligence agencies, such as the FBI and NSA, who wanted "lawful access" to encrypted information for monitoring and surveillance. The parties that voted in favor of the right for encryption were mainly consisting of tech founders, civil liberties groups, and digital rights activists who believed that privacy and security was a given right to everyone. [18] This ongoing debate, often reduced to a simple choice between privacy and security, was strongly influenced by public advocacy and mainly debated in CFP Conferences and other institutions that advocated in the peoples right for technology. [19]
The beginning of this conflict went back to the years after World War II, when the U.S. government classified crypto tools as "munitions" under the Arms Export Control Act and successfully kept a strong control over these ciphers. [18] But in 1976, the invention of public key cryptography by Whitfield Diffie and Martin Hellman made secure digital communication available to everyone, challenging the government’s grip on encryption. [19]
The Crypto War reached its peak in the 1990s. When in 1993, the Clinton administration tried to introduce the controversial Clipper Chip ,backed by a key member of the CFP Dorothy Denning , a microchip that would let people use strong encryption, but only if a copy of the decryption key was stored with trusted third parties chosen by the government essentially still giving them full access to all of your encrypted files. [19] The plan was to make sure law enforcement could still do court approved surveillance and monitoring. [19] Because of this clause in the Clipper Chip instant widespread outrage was faced from technical experts, industry leaders, and privacy advocates. Many argued that the system was insecure and threatened basic privacy rights. The plan was collapsed after a major cryptographic flaw was discovered in 1994. [19]
At the same time, another equally important battle in the "Crypto War" was over sharing encryption software should be illegal or not. In 1991, software developer named Phil Zimmermann released Pretty Good Privacy (PGP), [18] which was the first end-to-end encryption system that everyday people were able to use. The U.S. Justice Department launched a three year criminal investigation against him, claiming that by sharing PGP, he was illegally "exporting weapons". [18] Activists like John Gilmore, who was one of the founders of the cypherpunk movement and the Electronic Frontier Foundation (EFF), jumped in to defend Zimmermann. They argued that software source code was a kind of free speech protected by theFirst Amendment. And to prove their point, supporters even published the PGP source code as a physical book, showing that you can’t ban mathematical instructions without violating free expression. [18]
These legal and fights were happening very often and out in the open, especially at events like the Conference on Computers, Freedom, and Privacy (CFP), becoming the main stage for critics of government policy and fighting for the right to private information. The government’s main argument was that strong, end-to-end (E2E) encryption would help "child molesters, terrorists, drug dealers, and money launderers" a scare tactic sometimes called the "Four Horsemen of the Infocalypse". [20] At the 1994 CFP, NSA lawyer Stewart A. Baker pointed to the criminal use of PGP, but activists pushed back. They argued that every new technology, from the telephone to the printing press, could be abused, but we still allow them because their benefits are greater than the risks. Advocates managed to shift the debate away from just privacy versus security, arguing that strong encryption is actually vital for everyone’s safety, for economic growth, and for the future of the internet.
Thanks to these advocacy efforts, things changed. By the late 1990s, the Clinton Administration started loosening export controls, eventually removing almost all restrictions on the sale of encryption products. [19] Legal wins and pressure from the tech industry played a huge role in this victory, which basically ended the first phase of the Crypto War. It set an important precedent: strong encryption was here to stay and was essential for the modern digital world. But the debate didn’t end. The rise of end-to-end encrypted messaging apps like Signal and Telegram, plus new surveillance scandals after 2013, reignited the conflict. Today’s version sometimes called "Crypto War 2.0" still centers on the struggle between government surveillance and digital privacy. [20]