Advancing Civilization at the Expense of Individual Privacy

Total Page:16

File Type:pdf, Size:1020Kb

Advancing Civilization at the Expense of Individual Privacy Rochester Institute of Technology RIT Scholar Works Theses 2006 Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy Aaron D. Sanders Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Sanders, Aaron D., "Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy" (2006). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy By Aaron D. Sanders Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Information Technology Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences May 2006 Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Thesis Approval Form Student Name: Aaron Sanders Thesis Title: Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy Thesis Committee Name Signature Date Prof. William Stackpole Chair Charles Border, Ph. Di Committee Member Prof. Ronil Hira Committee Member Thesis Reproduction Permission Form Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy I, Aaron Sanders, hereby grant permission to the Wallace Library of the Rochester Institute of Technology to reproduce my thesis in whole or in part. Any reproduction must not be for commercial use or profit. Date: ____ Signature of Author: __.:.....:.Aa=..:...ro.;:;..:.n.:,...=S;.;:;:.:an..:....::;d:...::..:erc..::....s ___ 3 Abstract Technological advances have created a new existence, providing an unforeseen level of interaction and transaction between parties that have never physically met. Preliminary thinking was that these advances would create a previously unimaginable level ofprivacy and anonymity. While a surface examination suggests an abundance of privacy in modern society, a more thorough examination reveals different results. Advances in technology and changes in public policy have produced a world in which a startling amount of information is available regarding a given individual. Rather than experiencing an increase in individual privacy, modern societies suffer from rapidly decreasing individual privacy. Table of Contents I. Introduction a. Cultural Influences 6 b. Panoptic Sort and Persistent Digital Nym 9 c. Liberty and Passport: Persistent Digital Nym go Corporate 14 II. Computer Technology a. Protocol Flaws 17 b. The Problems of EP Addresses 23 c. Cookies: A Dangerous Treat 26 d. Spyware: Tracking Your Steps 31 e. The Wonders of Wireless 33 f. Archiving 36 g. Information Gathered From the Local Computer 38 III. Available Information a. The Wallet as a Tracking Device 47 b. The Dangers of Public Records 52 c. Name Seeding 53 IV. Case Study a. Case Study 55 V. Public Policy a. USA PATRIOT ACT: Enabling Government Monitoring 64 b. Collecting the Data 72 c. TLA: The Government's Data Warehouse 79 d. Other Programs 84 e. Government Information in Public View 85 f. Cameras on Every Corner 86 g. NASA's Mind Reading Experiments: Pre-Crime in the Physical World. .95 h. CAPPSII 99 i. Smart Stamps 1 02 j. FBI's DNA Databank 104 k. US VISIT 105 1. Privacy Protection Laws 106 m. Summary of Government Policies Ill n. Results of Policy Enactment 113 VI. Non-Computer Technology a. Automobile Data Recorders 115 b. Cellular Phone Tracking 117 c. REID 118 "Loyalty" d. Customer Cards 125 e. Chip Implants: Voluntary. .For Now 127 f. Social Engineering: Getting the Information From its Source 129 g. The Lurking Dangers of Identity Theft 137 VII. Concluding Section a. Conclusion 139 b. Bibliography 1 42 c. Curriculum Vitae 154 Introduction Cultural Influences Before examining the current situation, it is insightful to examine the opinions ofpopular "Metropolis" culture. Fritz Lang's (1927) was one of the first movies to explore the possibility of "Anthem" humanity's dark future. Ayn Rand's (1946) focused on philosophical struggles in a future where individuals did not choose their profession or spouse, and individuals identified each other by a number rather than name. Although a vehicle for spreading objectivism, "Anthem" did suggest the notion that a unique number could mean more than an individual's name, as the SSN (Social Security Number) often does in modern society. Next was George Police" Orwell's landmark "1984", which introduced familiar phrases such as "Thought and "1984" "Big Brother". presents a future where the government monitors individuals 24 hours a day, and even their own thoughts are not private. The novel coined the phrase "Big Brother is 'Net" watching". "The (1995) introduced a world in which all of an individual's personal information was available in digital form and stored in massive databases. The film highlighted the fact that one mistaken entry could ruin an individual's life. In the movie, a criminal cracker alters all of the warehoused information regarding the main character, causing law enforcement Report" to identify her as a criminal. "Minority (2002), introduced a future in which police can prevent crimes before they happen by predicting the future. In addition, the film presents a future where biometric technology is ubiquitous. At one point, the main character is walking down a street, and biometrics-enabled billboards scan his retina and change their advertising to suit his preferences. Definition of Privacy and Privacy Measurement "privacy" Although it may seem to possess a proper definition, the word requires clarity. The problem is that what privacy has been and what privacy is do not guarantee what privacy will be or what privacy could be. For that reason, the best definition of privacy is "control". When this thesis discusses an individual's right to privacy, it is referring to their right to have control over their personal information. Privacy does not mean secrecy, as an individual may freely share their personal information with everyone, if they so desire. Individual privacy focuses on an individual's right to have control over their information, allowing the sharing of their personal information only with their explicit permission. Privacy is critical because it enables individuals to feel safe, secure and in control of their lives. A feeling of privacy allows individuals to set limits that make them feel protected from the outside world. In addition, privacy can influence an individual's behavior, particularly in their shopping behaviors. Studies have found that an individual's shopping behavior can vary greatly given their feelings of trust towards an organization and their desired level of privacy protection (Glen Nowak, Joseph Phelps, and Giles D'Souza "Antecedents and"; Sheena Mitchell "The new"). Measuring privacy is difficult, as there is little prior knowledge on the subject of privacy measurement. In addition, measuring privacy attempts to put quantitative values on qualitative personal feelings, which each individual might perceive differently. This thesis measures privacy as the "level ofprivacy as it should effect all individuals". This thesis defines a "Privacy Level Indicator" with a scale of 1 through 5, with 1 being the least invasive and 5 being the most 4- invasive. The defined levels are: 1-Controlled, 2-Acceptable, 3-Uncomfortable, Threatened, 5-UncontroIled. To add finer granularity, the scale contains quarter points. This provides the ability to show a much more specific analysis of an event's effect on the "level of privacy" during the point in time when the event occurred. One similar measurement of the level of privacy is that ofEPIC s (Electronic Privacy Information Center) Privacy Threat Index. EPIC designed the index after September 11, 2001 to DHS' mirror the (Department of Homeland Security) Terrorism Threat Index. The Privacy Threat Index contains 5 levels, each identified by a color and descriptive label. This thesis does not utilize EPIC's Privacy Threat Index for two reasons. First, it was desirable to use quarter points between each integer level, to provide a finer analysis of each threat. In addition, this thesis looks to apply its designed scale to specific points in history, to determine the extent to which privacy has changed over time, ending with a current level ofprivacy. Those two objectives could not be met using EPIC's scale, although their scale is an important factor in determining the level of privacy for recent events. Most of the existing research has focused on the importance of privacy in specific situations, the value ofprivacy, or methods ofbenchmarking the effectiveness of privacy preservation methods. The AMA (American Medical Association) has created the Ethical Force Program, to develop performance measures for ethics in healthcare. Novak, Phelps, and consumers' Elizabeth Ferrell (2000) studied whether privacy concerns affected their willingness D' to provide their personal information during transactions. Nowak, Phelps, and Souza (2001) created an empirical study of how privacy concerns effect consumers. Christina Cary,
Recommended publications
  • Nonprofit Security Grant Program Threat Incident Report
    Nonprofit Security Grant Program Threat Incident Report: January 2019 to Present November 15, 2020 (Updated 02/22/2021) Prepared By: Rob Goldberg, Senior Director, Legislative Affairs [email protected] The following is a compilation of recent threat incidents, at home or abroad, targeting Jews and Jewish institutions (and other faith-based organization) that have been reported in the public record. When completing the Threat section of the IJ (Part III. Risk): ▪ First Choice: Describe specific terror (or violent homegrown extremist) incidents, threats, hate crimes, and/or related vandalism, trespass, intimidation, or destruction of property that have targeted its property, membership, or personnel. This may also include a specific event or circumstance that impacted an affiliate or member of the organization’s system or network. ▪ Second Choice: Report on known incidents/threats that have occurred in the community and/or State where the organization is located. ▪ Third Choice: Reference the public record regarding incidents/threats against similar or like institutions at home or abroad. Since there is limited working space in the IJ, the sub-applicant should be selective in choosing appropriate examples to incorporate into the response: events that are most recent, geographically proximate, and closely related to their type or circumstance of their organization or are of such magnitude or breadth that they create a significant existential threat to the Jewish community at large. I. Overview of Recent Federal Risk Assessments of National Significance Summary The following assessments underscore the persistent threat of lethal violence and hate crimes against the Jewish community and other faith- and community-based institutions in the United States.
    [Show full text]
  • Newscache – a High Performance Cache Implementation for Usenet News 
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 NewsCache – A High Performance Cache Implementation for Usenet News _ _ _ Thomas Gschwind and Manfred Hauswirth Technische Universität Wien © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org NewsCache – A High Performance Cache Implementation for Usenet News Thomas Gschwind Manfred Hauswirth g ftom,M.Hauswirth @infosys.tuwien.ac.at Distributed Systems Group Technische Universitat¨ Wien Argentinierstraße 8/E1841 A-1040 Wien, Austria, Europe Abstract and thus provided to its clients are defined by the news server’s administrator. Usenet News is reaching its limits as current traffic strains the available infrastructure. News data volume The world-wide set of cooperating news servers makes increases steadily and competition with other Internet up the distribution infrastructure of the News system. services has intensified. Consequently bandwidth re- Articles are distributed among news servers using the quirements are often beyond that provided by typical Network News Transfer Protocol (NNTP) which is de- links and the processing power needed exceeds a sin- fined in RFC977 [2]. In recent years several exten- gle system’s capabilities.
    [Show full text]
  • Fortran Resources 1
    Fortran Resources 1 Ian D Chivers Jane Sleightholme May 7, 2021 1The original basis for this document was Mike Metcalf’s Fortran Information File. The next input came from people on comp-fortran-90. Details of how to subscribe or browse this list can be found in this document. If you have any corrections, additions, suggestions etc to make please contact us and we will endeavor to include your comments in later versions. Thanks to all the people who have contributed. Revision history The most recent version can be found at https://www.fortranplus.co.uk/fortran-information/ and the files section of the comp-fortran-90 list. https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=comp-fortran-90 • May 2021. Major update to the Intel entry. Also changes to the editors and IDE section, the graphics section, and the parallel programming section. • October 2020. Added an entry for Nvidia to the compiler section. Nvidia has integrated the PGI compiler suite into their NVIDIA HPC SDK product. Nvidia are also contributing to the LLVM Flang project. Updated the ’Additional Compiler Information’ entry in the compiler section. The Polyhedron benchmarks discuss automatic parallelisation. The fortranplus entry covers the diagnostic capability of the Cray, gfortran, Intel, Nag, Oracle and Nvidia compilers. Updated one entry and removed three others from the software tools section. Added ’Fortran Discourse’ to the e-lists section. We have also made changes to the Latex style sheet. • September 2020. Added a computer arithmetic and IEEE formats section. • June 2020. Updated the compiler entry with details of standard conformance.
    [Show full text]
  • ED381174.Pdf
    DOCUMENT RESUME ED 381 174 IR 055 469 AUTHOR Klatt, Edward C.; And Others TITLE Windows to the World: Utah Library Network Internet Training Manual. INSTITUTION Utah State Library, Salt Lake City. PUB DATE Mar 95 NOTE 136p. AVAILABLE FROMWorld Wide Web at http://www.state.lib.ut.us/internet.htm (available electronically) or Utah State Library Division, 2150 S. 3rd W., Suite 16, Salt Lake City, UT 84115-2579 ($10; quantity price, $5). PUB TYPE Guides Non-Classroom Use (055) EDRS PRICE MF01/PC06 Plus Postage. DESCRIPTORS Access to Information; *Computer Networks; Computer Software; Electronic Mail; *information Networks; *Information Systems; *Librarians; Online Catalogs; Professional Training; Telecommunications IDENTIFIERS *Internet; Utah ABSTRACT This guide reviews the basic principles of Internet exploration for the novice user, describing various functions and utilizing "onscreen" displays. The introduction explains what the Internet is, and provides historical information. The introduction is followed by a listing of Internet hardware and software (freeware and shareware), both lists including information fo: PC-compatibles and Macintosh computers. Users are introduced to and instructed in the use of the following Internet systems and services: EWAN telnet; OPACS (Online Public Access Catalogs); CARL (Colorado Alliance of Research Libraries; FirstSearch; UMI (University Microfilm Inc.); Deseret News; Pegasus E-Mail; Listservs; WinVN Newsreader; Viewers; Netscape; Mosaic; Gopher; Archie; and FTP (File Transfer Protocol). Over 100 computer screen reproductions help to illustrate the instruction. Contains 16 references and a form for ordering additional copies of this guide are provided. (MAS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document.
    [Show full text]
  • Reviving Usenet
    Reviving Usenet Required Magic advanced technology ● What is Usenet ● The Rise and Fall of Usenet Agenda ● Back from the Dead? ● Questions to be Answered ● Stories from Usenet What is Usenet? About Me ● Training Engineer at SUSE ● Board Member for B8MB ● Volunteer for Tor Project ● All around nerd What is Usenet? Usenet is a worldwide distributed discussion network. It is the original long-form messaging system that predates the Internet as we know it. How does it work? Users read and send articles (messages) on a News server. That server exchanges articles with other News servers in the network. The collection of servers is known as the Usenet. Benefits of Usenet ● Decentralized ● Owned by no one ● Simplicity ● Resilient ● Anonymous ● Resistant to censorship Organization Usenet is organized into Newsgroups. Each group is generally a topic for discussion for that group. Newsgroups are organized into hierarchies. ● alt.bitcoins is in the alt.* hierarchy ● sci.crypt is in the sci.* hiearchy The Usenet Big-8 comp.* news.* sci.* talk.* misc.* rec.* soc.* humanities.* The Big-8 Management Board ● Creates well-named, well-used newsgroups in the Big-8 Usenet hierarchies ● Makes necessary adjustments to existing groups ● Removes groups that are not well-used ● Assists and encourages the support of a canonical Big-8 newsgroup list by Usenet sites The Rise and Fall of Usenet A Little History... In 1980… There was no Internet The was only the ARPANET and few had access It was commonly accepted at the time that to join the ARPANET took political connections
    [Show full text]
  • Wdv-Notes Stand: 5.SEP.1995 (13.)336 Das Usenet: Vom FUB-Server Lieferbare News-Gruppen
    wdv-notes Stand: 5.SEP.1995 (13.)336 Das UseNET: Vom FUB-Server lieferbare News-Gruppen. Wiss.Datenverarbeitung © 1991–1995 Edited by Karl-Heinz Dittberner FREIE UNIVERSITÄT BERLIN Net An der Freien Universität Berlin (FUB) wurde von der Zur Orientierung wird in diesem Merkblatt eine alphabeti- ZEDAT am 24. Februar 1995 ein neuer, wesentlich leistungsfä- sche Übersicht der Bezeichnungen aller aktuell vom News- higer News-Server in Betrieb genommen. Dieser ist mit einer Server der FUB zu allen Wissensgebieten zum Lesen und Posten geeigneten UseNET-Software (News-Reader) im Internet unter abrufbaren News-Gruppen gegeben. der Alias-Bezeichnung News.FU-Berlin.de erreichbar. Dieses ist natürlich nur eine Momentaufnahme, da ständig Aus der großen Vielfalt der im Internet verfügbaren interna- neue Gruppen hinzukommen und einige auch wieder verschwin- tionalen und nationalen News-Gruppen des eigentlichen UseNETs den bzw. gesperrt werden. Festgehalten ist hier auf 16 Seiten der sowie weiteren Foren aus anderen Netzen stellt dieser Server zur Stand vom 5. September 1995. Zeit fast 6.000 Gruppen zur Verfügung. alt.books.sf.melanie-rawn alt.culture.alaska alt.emusic A alt.books.stephen-king alt.culture.argentina alt.energy.renewable alt.1d alt.books.technical alt.culture.beaches alt.english.usage alt.3d alt.books.tom-clancy alt.culture.hawaii alt.engr.explosives alt.abortion.inequity alt.boomerang alt.culture.indonesia alt.etext alt.abuse-recovery alt.brother-jed alt.culture.internet alt.evil alt.abuse.recovery alt.business.import-export alt.culture.karnataka
    [Show full text]
  • The Internet of Garbage
    1 The Internet of Garbage © 2015, 2018 by Sarah Jeong Cover and Illustrations by William Joel for The Verge, © 2018 Vox Media, Inc. All rights reserved. The Verge Edition 1.5 August 2018 Published by Vox Media, Inc. www.theverge.com ISBN: 978-0-692-18121-8 2 Table of Contents Preface ............................................... 4 Chapter One: The Internet Is Garbage .................. 6 A Theory of Garbage .......................................... 8 Spam as Garbage .............................................. 9 Chapter Two: On Harassment ........................... 12 Harassment in the News ...................................... 13 About That Media Narrative . ............................ 18 Is Harassment Gendered? ..................................... 20 Intersections of Harassment ................................. 21 On Doxing ................................................... 24 SWATting .................................................... 27 Doxing Women ................................................ 28 Concluding Thoughts on Doxing ............................... 30 A Taxonomy of Harassment .................................... 32 On Modern-Day Social Media Content Moderation ............... 35 What Happens Before: Setting Norms .......................... 38 Chapter Three: Lessons from Copyright Law ............ 40 The Intersection of Copyright and Harassment ................ 41 How the DMCA Taught Us All the Wrong Lessons ................ 44 Turning Hate Crimes into Copyright Crimes ................... 47 Chapter Four: A
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • Invisible Crowds in Cyberspace
    Invisible Crowds in Cyberspace: Mapping the Social Structure of the Usenet1 Marc A. Smith University of California, Los Angeles Published in: Smith, Marc. “Invisible Crowds in Cyberspace: Measuring and Mapping the Social Structure of USENET” in Communities in Cyberspace: Perspectives on New Forms of Social Organization.. London, Routledge Press, 1999 SURVEYING SOCIAL CYBERSPACES The Usenet is a quintessential Internet social phenomenon: it is huge, global, anarchic and rapidly growing. It is also mostly invisible. Although, it is the largest example of a conferencing or discussion group system,2 the tools generally available to access it only display leaves and branches - chains of messages and responses. None present the trees and forest. With hundreds of thousands of new messages every day, it is impossible to try to read them all to get a sense of the entire place. As a result, an overview of activity in the Usenet has been difficult to assemble and many basic questions about its size, shape, structure and dynamics have gone unanswered. How big is the Usenet? How many people post? Where are they from? When and where do they post? How do groups vary from one another and over time? How many different kinds of groups are there? How many groups successfully thrive and how many die? What do the survivors have that the others lack? How do different social cyberspaces connect and fit together and form a larger ecology? There is no shortage of questions. But we lack a historical record of the transformations of social cyberspaces3 just at the point when network interaction media are being widely adopted.
    [Show full text]
  • The Design, Implementation and Operation of an Email Pseudonym Server
    The Design, Implementation and Operation of an Email Pseudonym Server David Mazieres` and M. Frans Kaashoek MIT Laboratory for Computer Science 545 Technology Square, Cambridge MA 02139 Abstract Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on withstanding the former, but the threat of the latter is equally real. One particularly effective attack against anonymous servers is to abuse them and stir up enough trouble that they must shut down. This paper describes the design, implementation, and operation of nym.alias.net, a server providing untraceable email aliases. We enumerate many kinds of abuse the system has weath- ered during two years of operation, and explain the measures we enacted in response. From our experiences, we distill several principles by which one can protect anonymous servers from similar attacks. 1 Introduction Anonymous on-line speech serves many purposes ranging from fighting oppressive government censorship to giving university professors feedback on teaching. Of course, the availability of anonymous speech also leads to many forms of abuse, including harassment, mail bombing and even bulk emailing. Servers providing anonymity are particularly vulnerable to flooding and denial-of-service attacks. Concerns for the privacy of legitimate users make it impractical to keep usage logs. Even with logs, the very design of an anonymous service generally makes it difficult to track down attackers. Worse yet, attempts to block problematic messages with manually-tuned filters can easily evolve into censorship—people unhappy with anonymous users will purposefully abuse a server if by doing so they can get legitimate messages filtered.
    [Show full text]
  • Download the Microsoft Tag and We’Ll Consider Them for the Magazine
    Fall 2014 Magazine Giant Creative Strategy Output @ 100% x 10"h Live: 7.375"w 8.25”w x 10.75”h Trim: Bleed: 8.75"w x 11.25"h Colors: 4CP + AD WINTER HB PATIENT PRINT GILPT11284 Speak from the PRINT live/trim_DO NOT heart about your angina “Tell your cardiologist exactly how you’re feeling. Don’t hold anything back.” Donnette, angina patient If you have been limiting your work or your activities because of your chronic angina, be sure to talk about it with your cardiologist. Your cardiologist is listening www.SpeakFromTheHeart.com Tips, information, and more from real angina patients Donnette, Ralph, and Claudia. Claudia, angina patient Speak From the Heart is a trademark, and the Speak From the Heart logo Ralph, angina patient is a registered trademark, of Gilead Sciences, Inc. © 2011 Gilead Sciences, Inc. All rights reserved. UN7951 1/11 D19528_1a_Donette.indd 11.04.2013 A17041x01G_300ucr_RBlk.tif 133 linescreen B19528x01A_3u.tif jn B19528x02A_3u.tif Dedicated to inspiring hope in heart disease patients and their families. Mission: Inspiring hope and improving the quality of life for heart patients and their families through ongoing peer-to-peer support THE MENDED HEARTS, INC. BOARD OF DIRECTORS 2013-2015 President Gus Littlefield Executive Vice President Donnette Smith Vice President Lynn Berringer Treasurer Dale Briggs Mended Little Hearts Vice President Andrea Baer Fall 2014 Regional Directors Central Jana Stewart Mid-Atlantic Gerald Kemp Midwest Cathy Byington Northeast Margaret Elbert Rocky Mountain Randy Gay Southern Fredonia Williams
    [Show full text]
  • Commencement 1969 Michigan State University the Commencement Committee
    COMMENCEMENT 1969 MICHIGAN STATE UNIVERSITY THE COMMENCEMENT COMMITTEE HERMAN L. KING, Chairman MADISON KUHN LLOYD R. CHAMPION JOHN G. LAETZ JAMES H . DENISON REBECCA J. LAU Student Representative EVERETT R. EMINO EDWARD L. PETRINI Student Representative HORACE C. KING KERMIT H. SMITH Following the close of the 1969 Winter term, approximately seven weeks are required to complete the processing of academic records and the preparation of diplomas. Based on this schedule, diplomas will be mailed in May, 1969. COMMENCEMENT 1969 Sunday, March 9 University Auditorium, East-Lansing The pageantry and color at commencement exercises reveal a record of ACADEMIC academic achievement of the various individuals taking part in the exercises. The following brief description is given that the audience might more readily COSTUME interpret such achievement. In 1895, the Intercollegiate Commission, a group of leading American educators, met at Columbia University to draft a code which would serve to regulate the design of gowns and hoods indicating the various degrees as well as the colors to indicate the various faculties. This code has been adopted by most of the colleges and universities in America and its use has made identification of scholastic honors an immediate activity. Three types of gowns are indicated by the code. Those worn by the bachelors are made of black worsted material and have long, pointed sleeves. Those worn by masters may be made either of black silk or black wool and have long, closed sleeves with the arc of a circle near the bottom. The arm goes through a slit, giving the appearance of short sleeves for the master's gown.
    [Show full text]