Computers, Freedom and Privacy Conference

Last updated

The Computers, Freedom and Privacy Conference (or CFP, or the Conference on Computers, Freedom and Privacy) is an annual academic conference held in the United States or Canada about the intersection of computer technology, freedom, and privacy issues. The conference was first held in 1991 in Burlingame, California. [1] Since at least 1999, [2] it has been organized under the aegis of the Association for Computing Machinery. It was originally sponsored by CPSR.

Contents

Attendees include high-level government officials, grassroots advocates, and programmers. [3]

Panelists at the 2009 CFP Washington - CFP09-2090 - Google Panel (3656873028).jpg
Panelists at the 2009 CFP

The first annual US Big Brother Awards were made at CFP99 on Wednesday 7 April 1999, [1] the 50th anniversary of the publication of George Orwell's Nineteen Eighty-Four. The awards were made by the London-based Privacy International to recognize "the government and private sector organizations which have done the most to invade personal privacy in the United States." [4] Simon Davies, managing director of Privacy International, presented the awards, otherwise known as Orwell's. There were five categories of award: Greatest Corporate Invader, Lifetime Menace, Most Invasive Program, People's Choice, and Worst Public Official. [5]

Key Figures

The Evolution of the CFP

1991 - CFP Begins

1992 - 1998 Early Growth

1999 - Big Brother Awards

As well as challenging global internet policy's the CPF held their Big Brother Ceremony the same year. These were a set of awards made to call out companies who are seen as a "threat to civil liberties". [13] This award ceremony was to bring awareness on companies who were actively harming the peoples right to personal privacy in the space of technology.

2000 - 2005 Transition To ACM

2015 - Final Year And End Of CFP Conferences

Legacy

Key Event: The Crypto War

The Crypto War is the name given to a long standing issue which primarily plays out mostly in the United States, debating whether regular people should be allowed to use and share strong encryption technology without the influence of the government. [17] One of the parties that voted against giving the people encryption was enforcement and intelligence agencies, such as the FBI and NSA, who wanted "lawful access" to encrypted information for monitoring and surveillance. The parties that voted in favor of the right for encryption were mainly consisting of tech founders, civil liberties groups, and digital rights activists who believed that privacy and security was a given right to everyone. [18] This ongoing debate, often reduced to a simple choice between privacy and security, was strongly influenced by public advocacy and mainly debated in CFP Conferences and other institutions that advocated in the peoples right for technology. [19]

The beginning of this conflict went back to the years after World War II, when the U.S. government classified crypto tools as "munitions" under the Arms Export Control Act and successfully kept a strong control over these ciphers. [18] But in 1976, the invention of public key cryptography by Whitfield Diffie and Martin Hellman made secure digital communication available to everyone, challenging the government’s grip on encryption. [19]

The Crypto War reached its peak in the 1990s. When in 1993, the Clinton administration tried to introduce the controversial Clipper Chip ,backed by a key member of the CFP Dorothy Denning , a microchip that would let people use strong encryption, but only if a copy of the decryption key was stored with trusted third parties chosen by the government essentially still giving them full access to all of your encrypted files. [19] The plan was to make sure law enforcement could still do court approved surveillance and monitoring. [19] Because of this clause in the Clipper Chip instant widespread outrage was faced from technical experts, industry leaders, and privacy advocates. Many argued that the system was insecure and threatened basic privacy rights. The plan was collapsed after a major cryptographic flaw was discovered in 1994. [19]

At the same time, another equally important battle in the "Crypto War" was over sharing encryption software should be illegal or not. In 1991, software developer named Phil Zimmermann released Pretty Good Privacy (PGP), [18] which was the first end-to-end encryption system that everyday people were able to use. The U.S. Justice Department launched a three year criminal investigation against him, claiming that by sharing PGP, he was illegally "exporting weapons". [18] Activists like John Gilmore, who was one of the founders of the cypherpunk movement and the Electronic Frontier Foundation (EFF), jumped in to defend Zimmermann. They argued that software source code was a kind of free speech protected by theFirst Amendment. And to prove their point, supporters even published the PGP source code as a physical book, showing that you can’t ban mathematical instructions without violating free expression. [18]

These legal and fights were happening very often and out in the open, especially at events like the Conference on Computers, Freedom, and Privacy (CFP), becoming the main stage for critics of government policy and fighting for the right to private information. The government’s main argument was that strong, end-to-end (E2E) encryption would help "child molesters, terrorists, drug dealers, and money launderers" a scare tactic sometimes called the "Four Horsemen of the Infocalypse". [20] At the 1994 CFP, NSA lawyer Stewart A. Baker pointed to the criminal use of PGP, but activists pushed back. They argued that every new technology, from the telephone to the printing press, could be abused, but we still allow them because their benefits are greater than the risks. Advocates managed to shift the debate away from just privacy versus security, arguing that strong encryption is actually vital for everyone’s safety, for economic growth, and for the future of the internet.

Thanks to these advocacy efforts, things changed. By the late 1990s, the Clinton Administration started loosening export controls, eventually removing almost all restrictions on the sale of encryption products. [19] Legal wins and pressure from the tech industry played a huge role in this victory, which basically ended the first phase of the Crypto War. It set an important precedent: strong encryption was here to stay and was essential for the modern digital world. But the debate didn’t end. The rise of end-to-end encrypted messaging apps like Signal and Telegram, plus new surveillance scandals after 2013, reignited the conflict. Today’s version sometimes called "Crypto War 2.0" still centers on the struggle between government surveillance and digital privacy. [20]

References

  1. 1 2 McCullagh, Declan (6 Apr 1999). "Shaping Online Privacy". Wired News. Archived from the original on 8 May 1999. Retrieved 24 Jul 2014.
  2. Seminerio, Maria (6 Apr 1999). "New cyber privacy policy has powerful support". PC Week. Archived from the original on 8 May 1999. Retrieved 24 Jul 2014.
  3. Macavinta, Courtney (9 April 1999). "U.S. privacy policy trailing behind". CNET News. Archived from the original on 8 May 1999. Retrieved 26 Jul 2014.
  4. Diederich, Tom (8 April 1999). "Intel, US Govt "honored" for breaches of privacy". Computerworld. Archived from the original on 4 October 1999. Retrieved 25 Jul 2014.
  5. Boodhoo, Niala (8 April 1999). "Orwell's Legacy: Big Brother Awards". PC World. Archived from the original on 8 May 1999. Retrieved 25 Jul 2014.
  6. "Computers, Freedom, and Privacy". www.cfp.org. Retrieved 2025-10-27.
  7. "Computers, Freedom and Privacy < The WELL". The WELL. Retrieved 2025-12-01.
  8. "(Shearer J., Gutmann P.) Government, Cryptography, and the Right to Privacy". www.jucs.org. Retrieved 2025-12-01.
  9. "Chapter 1: Theory of Markets and Privacy | National Telecommunications and Information Administration". www.ntia.gov. Retrieved 2025-12-01.
  10. "6.805/STS085: Readings on Encryption and National Security". groups.csail.mit.edu. Retrieved 2025-12-01.
  11. "Clarke, Roger --- "Scenes from CFP '99: Anonymity and copyright on the global internet" [1999] PrivLawPRpr 20; (1999) 5(9) Privacy Law & Policy Reporter 174". austlii.edu.au. Retrieved 2025-12-01.
  12. Glover, Barbara (March 1, 2000). "Internet Policy Issues Debated at 9th Conference on Computers, freedom and privacy".
  13. Glave, James. "MS Wags the Privacy Awards". Wired. ISSN   1059-1028 . Retrieved 2025-12-01.
  14. Cranor, Lorrie Faith (2000-04-01). "Ten years of computers, freedom and privacy: a personal retrospective". Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions. CFP '00. New York, NY, USA: Association for Computing Machinery: 11–15. doi: 10.1145/332186.332193 . ISBN   978-1-58113-256-4.
  15. "The Seattle Times: Business & Technology: Keeping watch now goes both ways". hi.eecg.toronto.edu. Archived from the original on 2006-09-08. Retrieved 2025-12-01.
  16. "Computers, Freedom, and Privacy 2015". Center for Democracy and Technology. 2015-10-12. Retrieved 2025-12-01.
  17. "What are the Crypto Wars?". R Street Institute. Retrieved 2025-10-27.
  18. 1 2 3 4 5 Epstein, Jim (2020-10-21). "When Encryption Was a Crime: The 1990s Battle for Free Speech in Software". Reason.com. Retrieved 2025-10-27.
  19. 1 2 3 4 5 6 Thompson, Andi Wilson; Kehl, Danielle; Bankston, Kevin. "Doomed to Repeat History? Lessons from the Crypto Wars of the 1990s". New America. Retrieved 2025-10-27.
  20. 1 2 Lewis, James Andrew (2021-02-04). "The Crypto Wars Are Over". Center for Strategic and International Studies.