Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 04 Issue 42
Computer underground Digest Mon Sep 7, 1992 Volume 4 : Issue 42
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Copy Editor: Etaion Shrdlu, Jrr.
Archivist: Brendan Kehoe
Shadow-Archivist: Dan Carosone
CONTENTS, #4.42 (Sep 7, 1992)
File 1--Moderators' Corner - COMP hierarchy and future issues
File 2--Problem with refused back issue requests is resolved
File 3--Call for Papers
File 4--Updates to CPSR Listserv File Archive
File 5--TAP and Bringing Gov't into the Electronic Age
File 6--Reflections on INFOWEEK's CU-related stories
File 7--Software Piracy--The Social Context
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
libraries; from America Online in the PC Telecom forum under
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
For bitnet users, back issues may be obtained from the mail server at
mailserv@batpad.lgb.ca.us
European distributor: ComNet in Luxembourg BBS (++352) 466893.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to
computer culture and communication. Articles are preferred to short
responses. Please avoid quoting previous posts unless absolutely
necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: 06 Sep 92 19:01:27 CDT
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--Moderators' Corner - COMP hierarchy and future issues
We're back to a once-a-week schedule (we hope), although Labor Day
disrupted the normal Sunday posting. The next three issues will be
thematic: #4.43 will be a collection of retrospective reviews on Cliff
Stoll's The Cuckoo's Egg; #4.44 will be a fairly neutral summary and
description of the Software Publisher Association's policies, goals,
and activities; and #4.45 will be a critique/response to some of these
policies. We will invite the SPA to respond in #4.46.
We also remind users that alt.society.cu-digest will be gone soon,
replaced by comp.society.cu-digest. If you sub through the alt group,
be sure to join the comp version instead. If you're a sysad, be sure
you facilitate the change ASAP, because we have received a number of
queries asking why the comp version is not yet available on some
systems. If your system is one on which it's not available in the
comp group, ask your sysad, not us. We just work here.
------------------------------
Date: 06 Sep 1992 21:44:51 +0000 (GMT)
From: mike@BATPAD.LGB.CA.US
Subject: File 2--Problem with refused back issue requests is resolved
When I set up the mailserv the handle the AOT-D list and the archive
of back issues, I neglected to add the AOTD directory to the valid
paths file that the mailserv checks before sending a file. This is
why you have been getting refused messages when requesting a back
issue.
This is fixed now. I just tested it, and a request for vol1.zoo was
correctly queued to send.
Sorry for the confusion.
------------------------------
Date: Thu, 3 Sep 92 21:36:03 EDT
From: "Jay A. Wood" <jwood@ANDROMEDA.RUTGERS.EDU>
Subject: File 3--Call for Papers
*AN INVITATION FOR THE SUBMISSION OF ARTICLES TO THE JOURNAL*
The Editorial Board of the Journal invites you to participate in our
continuing exploration of computers, technology, and the law by
submitting your article or commentary for publication.
Appropriate material would include articles, essays, comments, and
other items of interest in the area of technological advancement. The
Journal is published twice annually.
Manuscripts should be double-spaced, including footnotes in accordance
with the format rules set forth in _A Uniform System of Citation_.
All manuscripts submitted for publication are acknowledged and duly
considered for publication. Editors work closely with prospective
authors to ensure timely and accurate publication.
Send your submission to:
Rutgers Computer and Technology Law Journal
Rutgers School of Law
15 Washington Street
Newark, NJ 07102
or call 201/648-5549
or mail jwood@andromeda.rutgers.edu
*RECENT ARTICLES INCLUDE*
- Copyright and trade secret protection for chips, screen
designs, computer manuals, and computer created works.
- The patent, tort, and regulatory implications of recent
biotechnology developments.
- New environmental technologies and waste treatment
techniques.
- Government acquisition of software and copyrights.
- The use of computer, biological, or other high technology
evidence in civil and criminal trials.
- Copyright, free speech, and regulatory issues of new
transmission techniques; satellites, electronic bulletin
boards, and cable television.
- The ethical and malpractice issues arising from
professional reliance on artificial intelligence systems.
- Sales and property taxation problems in the computer
hardware and software industries.
- The use of computerized legal research systems.
- Automated data processing systems in governmental agencies
and courts.
Because the nexus between computers, technology, and the law
is constantly changing, any topic list can give only a
general indication of the scope of this Journal. Thus, this
list highlights - but does not exhaust - topics covered in
recent issues.
*UP-TO-DATE LEGAL GUIDE TO NEW TECHNOLOGIES*
First to enter the field and now in its third decade of publication,
the Journal provides attorneys and scholars with a guide to issues
arising from the interaction of computers, emerging technologies, and
the law. The JournalUs broad national and international circulation
has established its reputation as an effective and respected forum for
technology issues. The Journal has been cited in numerous texts and
articles, both foreign and domestic, and by the United States Supreme
Court.
In addition to provocative articles by leading commentators and
jurists, the Journal publishes timely book reviews by authorities in
the field and includes a comprehensive research source: _The Index and
Annual Selected Bibliography on Computers, Technology, and the Law_.
The Journal is an effective means of staying abreast of the latest
judicial and theoretical developments in the rapidly changing computer
and high technology areas.
------------------------------
Date: Fri, 4 Sep 1992 16:05:05 EDT
From: Paul Hyland <PHYLAND@GWUVM.BITNET>
Subject: File 4--Updates to CPSR Listserv File Archive
To CPSR List subscribers,
Welcome to new subscribers -- in case you haven't noticed, we try to
keep traffic on this list to a minimum, reserving it for important
announcements and information about CPSR and the issues it tries to
address as an organization. We have substantially more information
stored on a Listserv file server. The complete list of files is
stored in the file CPSR ARCHIVE, and periodically updates to the
archive are posted to the list.
To obtain any of the files listed below, or others on the archive,
send commands to listserv@gwuvm.gwu.edu. In a mail message, put one
command per line, starting with the first one. The command:
GET <filename> <filetype>
will retrieve files. For example:
GET CPSR ARCHIVE
GET CPSR BROCHURE
GET NRENPRIV TESTMONY
Any questions, comments, or complaints about the listserv should be
directed to me, phyland@gwuvm.gwu.edu. Any questions about CPSR,
address changes for members, and the like, should be directed to
cpsr@csli.stanford.edu.
Paul Hyland
Owner, CPSR List
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Filename Filetype Lines Description
++++++++ ++++++++ +++++ +++++++++++
CPSR-92 PROGRAM 213 CPSR Annual Meeting Program w/ confirmed speakers
Palo Alto, CA -- October 17-18, 1992
PDC-92 PROGRAM 126 CPSR Participatory Design Conference Program
Cambridge, MA -- November 6-7, 1992
NREN PRIVACY 0 **added as this, then updated and renamed to --
NRENPRIV TESTMONY 396 "Proposed Privacy Guidelines for the NREN"
presented at a hearing of the National
Commission on Libraries and Information
Sciences (NCLIS), July 21, 1992.
CRYPTO LETTER 380 Letter from CPSR to Rep. Jack Brooks, chair of
of House Judiciary Committee, on computer
security and cryptography policy
CPSRBERK 3Q92 573 CPSR/Berkeley Electronic Newsletter
Third Quarter, 1992
CPSR-DC JUNE1992 251 CPSR/DC Electronic Newsletter -- June 1992
HR2772 FACTS 0 **Deleted** (superseded by GATEWAY FACTS)
GATEWAY FACTS 161 Taxpayer Assets Project Fact Sheet on GPO WINDO
and GPO Gateway to Government Bills
GATEWAY STATEMENT 244 Taxpayer Assets Project statement on GPO WINDO/
Gateway submitted for joint hearing 7/23/92
AOT SAMPLE 815 Sample Issue of Art of Technology Digest - #2
August 4, 1992
------------------------------
Date: Wed, 9 Sep 1992 11:59:46 CDT
From: James P Love <LOVE%PUCC@PSUVM.PSU.EDU>
Subject: File 5--TAP and Bringing Gov't into the Electronic Age
Comments on Proposed Revisions of OMB Circular A-130
Taxpayer Assets Project
P.O. Box 19367
Washington, DC 20036
Internet: tap@essential.org
August 27, 1992
1. THE TAXPAYER ASSETS PROJECT
The Taxpayer Assets Project (TAP) was started by Ralph Nader to
monitor the sale and management of government property. Among the
public assets that we have investigated are government information
resources, government-funded software, and government-funded information
systems. We have been particularly interested in issues relating to the
pricing of government information products and services, public access
to taxpayer- funded information and information systems, and the quality
and nature of government information products and services.
TAP has also undertaken a number of case studies of the impact of
federal efforts to privatize the dissemination of government
information.
TAP is also engaged in research on a wide range of other topics,
including, for example, the management of federally owned mineral and
timber resources, licensing of federally funded inventions such as
pharmaceutical drugs, the allocation of rights to use public airwaves,
public infrastructure investments, and many other items.
In *all* of these endeavors, TAP is a consumer of government
information. We need to obtain information from dozens of federal
agencies on many different topics. Consider just two examples:
i. In our study of federal oil and gas resources, we need access
to Department of Interior (DOI) databases on OCS oil and gas
lease auctions, Department of Energy (DOE) databases on oil
output, consumption, and prices, and Federal Reserve databases
on bond yields for federal debt.
ii. In our research on government licensing of pharmaceutical
drugs we need access to databases on FDA approvals of new
drugs, federally funded medical research, patents, and federal
tax expenditures for orphan drugs.
For many projects we need access to information on corporations
that are reported in SEC filings, or agency notices that are published
in the Federal Register. This list could be expanded with countless
other federal information products and services.
TAP uses these information resources to do research and produce
reports and studies. Thus, TAP is both a consumer of government
information resources, and a producer of value added information
products and services.
2. CITIZENS NEED MECHANISMS TO TELL AGENCIES HOW INFORMATION POLICIES
CAN BE IMPROVED
The federal government spends billions of tax dollars every year to
collect and store of information. These expenditures create resources
that often have multiple uses, including uses that are beyond the
agency's mission. But agencies are often indifferent to the public
interest in the information resources that they manage.
Agencies should be required to accept comments from the public on a
wide range of information management issues, including policies on the
collection and the dissemination of information. Citizens should have
mechanisms to regularly inform agencies of changes in policies and
practices that will allow citizens to better utilize federal information
resources.
3. PUBLIC NOTICE SECTIONS IN A-130 SHOULD BE EXPANDED TO ADDRESS A
WIDE RANGE OF PUBLIC INTEREST CONSIDERATIONS
The proposed Circular requires agencies to provide notice and
accept public comments before an agency can create or terminate a major
information program. This is too narrow a scope for public notice and
comment. Citizens should have opportunities to tell agencies when
services are inadequate or poorly designed, and citizens should also
have opportunities to ask agencies to create new information products
and services.
Agencies often commit errors of omission. Failures to provide
public access to taxpayer-funded information systems, or to embrace new
technologies (online systems, CD-ROMs, etc) or standards are common and
important errors of omission. Regular opportunities for public comment
on agency information management policies and practices would provide an
important mechanism to identify such errors.
4. AGENCY PUBLIC NOTICE REQUIREMENTS SHOULD INCORPORATE THE PROPOSALS
IN H.R. 3459, THE IMPROVEMENT OF INFORMATION ACCESS ACT.
H.R. 3459, the Improvement of Information Access Act (IIA Act),
provides a model for public notice and comment on federal information
policy. The proposals in the IIA Act were developed by a large working
group of librarians, researchers, and agency officials. The public
notice sections would provide the following mechanism:
i. Every year all federal agencies would be required to publish a
report which describes:
- plans to introduce or discontinue information products and
services,
- efforts to develop or implement standards for file and record
formats, software query command structures, and other matters
that make information easier to obtain and use,
- the status of agency efforts to create and disseminate
comprehensive indexes or bibliographies of their information
products and services,
- how the public may access the agencies information,
- plans for preserving access to electronic information that is
stored in technologies that may be superseded or obsolete, and
- agency plans to keep the public aware of its information
resources, services, and products.
i. Agencies would be required to solicit public comments on this plan,
including comments on the types of information collected and
disseminated, the agency's methods of storing information, their
outlets for disseminating information, the prices they charge for
information, and the "validity, reliability, timeliness, and
usefulness to the public of the information." The agency would be
required to summarize the comments it received and report each year
what it had done to respond to the comments received in the
previous year.
The issues addressed in H.R. 3459 are the types of things that are
needed to make agencies more responsive to citizens who use federal
information resources. In comparison, the public notice and comment
provisions of the current draft of A-130 are limited and static. We
need the flexible and dynamic approach embraced in H.R. 3459, to address
the concerns of data users as technologies change and as the uses of
federal information resources change.
5. THE USE OF STANDARDS MAKES GOVERNMENT INFORMATION EASIER TO OBTAIN
AND USE
Few citizens are highly trained in using computers. Standards for
file formats, software interfaces, query commands and other items will
make it easier for the public to obtain and use agency information
resources. A-130 should require agencies to use standardized record and
file formats and software interfaces.
Computer technologies are rapidly changing. Because technologies
and standards are constantly evolving, agencies should be required to
accept regular and frequent input from data users.
6. DATA COLLECTION ISSUES ARE IMPORTANT
Citizens need information to understand the world around them.
Agencies should encourage public debates over information collection
issues. For example:
- The SEC should regularly accept public comments on the types
of information that should be reported in corporate disclosure
filings. Investors or citizens who monitor corporate
activities should have opportunities to tell the SEC the types
of the information that should be included on corporate 10k
reports, insider trading reports, stock prospectuses, and
other filings.
- Historically the taxpayers finance about half of all U.S. R&D
expenditures. One measure of the efficacy of those
investments are patents from inventions that were financed by
the taxpayers. The Patent and Trademark Office should collect
information on patent applications that identify the role of
federal funds in the development of the inventions.
- Prescription drugs are one of the fastest growing elements of
the nation's enormous health care bill. The federal government
funds more than $10 billion in medical research, and provides
a wide array of special marketing monopolies and tax
expenditures to the pharmaceutical industry. In order to
evaluate the reasonableness of the prices for prescription
drugs, particularly those developed with federal funds, the
federal government should collect data on the costs of drug
development. The government should also collect information
on drug prices and revenues and the amount of money the
government spends buying government developed but privately
marketed drugs through medicaid and medicare.
- Many economists say the recent boom and bust in commercial
real estate was a major contributor to the collapse of the
savings and loan industry and the weakening of the commercial
banking system, which has contributed to the current
recession. Pensions funds have also lost billions of dollars
in commercial real estate markets. The Bureau of the Census
spends millions of dollars every year on a monthly survey of
building permits. This survey collects information on the
*value* of permits issued. Most real estate researchers want
Census to collect information on the *square feet* of building
permits, since that statistic is a much better predictor of
real estate supply. Better information on the supply of
commercial real estate would help prevent costly investor
mistakes.
These are just a few of the countless data collection issues
that deserve far more debate. Agencies are often out of touch with
citizen concerns about information collection issues, and they need to
be required to accept suggestions on these issues.
7. CONFLICTS OF INTEREST ARE IMPORTANT, AND SHOULD BE ADDRESSED IN
A-130
Many agencies contract out data processing services to firms
that sell agency information to citizens. Conflicts of interest abound.
Frequently the contractor has an interest in restricting public access
to the agency information systems, so the contractor can sell the data
through its own retail outlets. For example:
- Mead Data Central will receive $13.5 million from the SEC to
provide online full text searching of the EDGAR database
system. Mead is also the SEC subcontractor in charge of
providing public access to the EDGAR database. But since Mead
wants to sell SEC information to the public through its own
LEXIS service, it has restricted public access to taxpayer
financed EDGAR system.
- Westlaw has a contract to create a digital version of federal
caselaw for the Justice Department's JURIS online database
system. But Westlaw wants to sell the public those same
records thought its own high priced online service, and it has
obtained a contact that restricted public access to the
Department of Justice's very important JURIS system. In doing
so Westlaw has not only denied the taxpayers access to an
important government database, but it has also prevented rival
database vendors from obtaining the JURIS database in order to
compete with Westlaw and Lexis, the two firms that currently
enjoy a duopoly in the market for online access to federal
legal opinions.
A-130 should address these types of agreements, instructing
agencies to insure that private contractors do not use federal data
processing contracts to obtain unfair advantages over their rivals, or
to deny the public access to information and information systems that
they have already paid for through taxes.
8. HIGH PRICES FOR INFORMATION PRODUCTS AND SERVICES CREATES LARGE
DISPARITIES BETWEEN CITIZENS BASED UPON THEIR ABILITY TO PAY
The Taxpayer Assets Project is a nonprofit organization with a
small budget. We simply cannot afford to buy many of the commercial
services that provide access to government databases. The groups that
are most able to afford these expensive services are those with large
financial interests in narrow aspects of government policy. For
example, most pharmaceutical firms have armies of lawyers, lobbyists and
policy analysts who can afford to monitor every actions of the FDA, PTO,
NIH, Congress and other government agencies, not to mention their
private sector rivals. When access to government information is rationed
according to willingness to pay, we find ourselves at an enormous
disadvantage. Not only do the pharmaceutical companies have the
resources to finance congressional and presidential campaigns, to dangle
high paying jobs to former government officials, and to vastly outstaff
groups that represent consumers and taxpayers, but they also are the
only ones who can afford to use the databases that are funded by the
taxpayers. This scenario, repeated throughout the government, is among
the reasons that special interest groups can manipulate and control the
government, at the expense of the broader public interest.
A-130 should instruct agencies to consider the impact of
information management policies on the prices that consumers will pay
for access to taxpayer funded information resources. For example, if an
agency can produce CD-ROM products for $35 or less, why should citizens
be required to pay $500 to $10,000 to buy the information from
commercial vendors? Likewise, if it costs between $15 and $35 an hour
to provide online access to the PTO's APS, why should citizens be forced
to pay $340 per hour to receive the same information through Lexis?
Agencies should avoid policies that deliberately restrict public
access to taxpayer funded information systems in order to bolster the
business interests of commercial vendors, since this leads to even
greater concentrations of political power. Low cost access to
government information is needed to strengthen citizen involvement in
government policy making.
9. OMB'S PROPOSED LIMITS ON PRICES FOR INFORMATION PRODUCTS AND
SERVICES ARE NEEDED
Among the best features of the proposed A-130 revision are the
provisions that would limit agency prices for information products and
services to the costs of dissemination. This is sorely needed.
10. AGENCIES ARE USING NTIS TO RAISE PRICES FOR INFORMATION PRODUCTS
AND SERVICES FAR ABOVE DISSEMINATION COSTS
Many agencies now have contracts that give NTIS exclusive rights to
sell information at prices that far exceed dissemination costs. For
example, the Federal Reserve sells its "bank call" reports on magnetic
tape for $560 per quarter. Information from the Home Mortgage Disclosure
Act (HMDA) is also very expensive. OMB should clarify an agency's
responsibility to provide access to information at cost, when NTIS is
simultaneously selling the information at huge markups. This is an
enormous issue, given the large and rapidly growing electronic
collections that NTIS currently manages.
11. THE FEDERAL DEPOSITORY LIBRARY PROGRAM SHOULD NOT BE SUBJECT TO A
TECHNOLOGICAL SUNSET
The federal Depository Library Program (DLP) provides 1,400
libraries with free access to federal information. This program, which
has been around since the middle of the 19th century, is not a welfare
program. It serves scholars, business persons, and many others who need
access to federal information.
We frequently use federal depository libraries. We cannot afford
to buy all the government publications that we use, but even when prices
are not an issue, we rely upon the library staff's expertise and
indexing resources to discover publications that may be useful to us.
The fact that information is disseminated in electronic formats should
not eliminate an agency's responsibility to this important program.
12. ACCEPTING PUBLIC COMMENTS VIA ELECTRONIC MAIL
OMB deserves a pat on the back for its efforts in using electronic
mail networks such as the Internet to disseminate information about the
proposed changes in the Circular, and to receive comments by electronic
mail. These steps will broaden public awareness of the Circular, and
allow a wider group of citizens to participate in the debate. We urge
OMB to address this issue in the final draft of A-130. That is, OMB
should encourage all federal agencies to use electronic mail networks to
disseminate public notices *and* to accept public comments. It is
particularly appropriate here, when many citizens who are interested in
government information policy have access to such networks. Of course,
these efforts should supplement and not replace other methods of
providing public notice and accepting comments.
+++++++++++++
James Love, Director VOICE: 215-658-0880
Taxpayer Assets Project FAX: call
12 Church Road INTERNET: love@essential.org
Ardmore, PA 19003
------------------------------
Date: 06 Sep 92 16:08:07 EDT
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 6--Reflections on INFOWEEK's CU-related stories
Information Week and "Weak Links"
The August 10, 1992 issue of INFORMATION WEEK (IW) features a story
on "weak links" in data security. IW Editor Jerry Colonna writes
that "We're not talking about hackers breaking into data centers.
Much attention has been paid to the obvious targets, and many data
centers now resemble medieval fortresses."
We will try to ignore the fact that just a few weeks ago IW
criticized the Computer Security Institute for using 'hacker' in
reference to computer intrusion. (see "Pirate is PC?" in CuD 4.35)
Colonna continues..."The problem is the low-tech access to your
network. If the deli down the road has your fax number, chances are
your competitors - or someone they hired - has it, too, and they can
read everything you send or receive. Orders from customers, invoices
from suppliers, Bank statements. Everything." (page 2) Later in
the same editorial he discusses the dangers of forgetting that
cellular phones can be overheard using a radio scanner.
The featured article has some good advice, ranging from buying an
encrypting phone for confidential conversations, to using fake names
when discussing business on an unsecured channel. (Although the
article didn't go so far as suggesting appropriate pseudonyms, I
enjoyed using 'Red Rooster Four' back in the Radio Shack
walkie-talkie days of my childhood. My friend Spencer was Red
Rooster One. There were no 'Two' or 'Three', but we wanted it to
sound like we had a bigger "army" then we actually did. A technique
that might also be handy on your car phone.)
And speaking of good advice, former Sun Devil mastermind Gail
Thackeray is quoted in the article as urging businesses to stop being
'promiscuous' with their fax numbers. Also, she advises, all outgoing
faxes should include a cover sheet saying that the fax is intended
only for the addressee. She reportedly stresses that this is
particularly important if the material in the fax is confidential.
Unfortunately there is no further explanation of just what good
stating this would do. It sounds vaguely like the "no cops allowed"
sign-ons found on some CU bulletin boards, which Thackeray and her
troops have no doubt ignored themselves.
Another interesting, but questionable, tidbit is found on page 30...
"If a corporate spy had to pick one 'darling' of the trade, it
would undoubtedly be the fax machine, says a report from the
American Institute For Business Research in Framingham, Mass.
The report, 'Protecting Corporate America's Secrets In the
Global Economy,' asserts that the fax is one of the easiest
ways for spies to steal corporate information. For one, the
report says, thieves can tap into the victim's fax line and
create a shadow version of every fax the victim sends or
receives."
Now I'm not an electrical engineer, but doesn't this seem about as
easy as getting three modems talking to each other all at once? I'm
not saying that a fax can't be intercepted, through a data trap, but
I don't think tapping a phone line and hanging an extra fax machine
in the circuit is going to get you anywhere. Reminding people that
faxed documents are inherently unsecure is a Good Thing, but this
vague statement might only lead to additional paranoia and
unwarranted concern. Unless, of course, this *is* something that is
easily accomplished. In which case it should have been stated even
more emphatically, and with more authority and credibility.
The four page article ends with an appropriate quote from the
security director at The Bank of Boston : "Technology can be your
best friend. But it can also be your mortal enemy". All in all,
not a bad thing to keep in mind.
CompuServe Magazine and Death in Cyberspace.
--------------------------------------------The September 1992 issue
of CompuServe Magazine features "The Mourning After" by Hank Nuwer.
(pp 32-34) Nuwer is a prolific author, including a recent book about
Fraternity Hazing. (_Broken Pledges: The Deadly Rite of Hazing) In
this article Nuwer discusses the grieving process, as experienced by
online friends, when someone dies.
The article touches upon four types of situations where online
communities are affected by the death of a member, or in some cases
the a death in the family of a community member. In the case of the
latter, online communities can provide a supportive network, removed
from the tragedy itself...
People often feel threatened when required to express
grief, but may be less intimidated expressing these
thoughts online, according to Dr. Dorothy DeMoya, a
consultant in %Compuserve's% Human Sexuality Information
and Advisory Service. 'Among patients who've lost loved
ones, strangers became family and family became strangers,'
she says. 'To be able to establish online relationships
like this is wonderful.'
Another example of how virtual communities are affected by death and
dying is illustrated by the unexpected death of Glenn Hart, sysop of
the Fox Software Forum, and contributing writer to PC Magazine.
After his death in January the forum was flooded with messages as
members expressed their sorrow and memories of him. In this case,
and in many others that Nuwer cites, the messages were captured and
printed by a forum member. They have been given to Hart's widow, who
is saving them for her younger children to read at the appropriate
time.
Finally, the article discusses the role of cyberspace in dealing with
deaths of other than family members. Participants in the RockNet
forum grieved the deaths of Bill Graham and Freddie Mercury, while
the Space and Astronomy Forum dealt with the loss of the six US
Astronauts lost in the 1986 Challenger Space Shuttle accident. Even
members of the Pet Forum have found that online friends can help in
adjusting to the loss of a favorite pet.
Moderators' Note: This is an area that is ripe for additional
research. CuD welcomes additional resources and references in this
area. Readers may also be interested in 'Online Suicide' by Preston
Gralla in the May 1991 issue of PC Computing. (p132+)
"No Piracy Shield"
Information Week reports that a US bankruptcy court in Los Angeles
has ruled a defendant cannot avoid paying damages for software piracy
by failing for bankruptcy. The ruling came down in Novell Inc v.
Medperfect Systems Inc (owned by Ronald S. Frank). The article
states that bankruptcy, in the past, has been used to avoid lawsuits
over copyright infringement and the like. Information Week also
reports that Medperfect admits to using unlicensed NetWare as the
basis for systems sold in dentist offices in Southern California.
Information Week July 13, 1992 p16
Phreak Insurance
Information Week is reporting that Travelers Corporation is going to
offer phone fraud insurance. The policy will be available in $50K
and $1 million dollar amounts to cover remote access fraud, those
calls made by hackers breaking into corporate phone systems and
placing outgoing calls. The policy will reportedly require that
certain minimum safeguards are met, such as making all passwords more
than three digits long. (INFORMATION WEEK, August 31, 1992 p16)
------------------------------
Date: Tue, 1 Sep 1992 10:22:44 -0700
From: James I. Davis <jdav@WELL.SF.CA.US>
Subject: File 7--Software Piracy--The Social Context
((MODERATORS' NOTE: Jim Davis raises a number of interesting issues
regarding piracy and the SPA. CuD 4.44 and 4.45 will be devoted to
some of these issues, and Jim will be invited to elaborate there on
some of the themes he addresses here)).
Anne Branscomb, a strong advocate of property rights in information --
admits that there is nothing "natural" about property rights (see her
essay "Property Rights in Information"). Property rights are social
conventions that are struggled over. And we shouldn't give up that
fight to the SPA.
Re: software "piracy" in schools, perhaps we should see an extension
of "Fair Use Doctrine" to software use in schools. A bit of recent
history -- broadcast TV shows were not intended to be copied and
viewed at leisure at home. But to have stuck to that point, the courts
would have criminalized a substantial number of adults who were
time-shifting with their VCRs to watch soaps or football games or
whatever. So "fair use", originally intended to allow book reviewers
to quote from works, was de jure extended to a de facto reality --
people "stole" TV shows, and enjoyed them. I understand that fair use
extends to school use as well.
Why don't people just see that loaning disks, copying programs, etc.
is wrong? Because it's not obvious, and it certainly isn't "naturally"
wrong. The SPA has to cultivate a mindset that isn't there. You give
me knowledge, you still have use of it; now I can use it too. The more
it is shared, the more useful it becomes. It doesn't really wear out,
and it doesn't get used up. So people (naturally) say, where's the
harm? It's not like I stole your silverware or pinched your car. A
rather noble attribute, sharing, is turned into a crime! And we are
all to be enlisted in this SPA scheme for policing property rights of
software companies. No thanks.
Property rights and information just don't go together:
(1) The enforcement of property rights in information requires a
police state. The SPA encourages people to squeal on each other by
calling an 800 number. If the laws were enforced, I would bet that
_most_ computer users would be guilty. Hence, the population is
criminalized, and subject to police and court control. Just because
the laws aren't enforced in totality doesn't mean that they can't be
used.
(2) Enforcing property rights in information prevents the "storehouse
of knowledge" from being used optimally. Hence society and
civilization is held back. The lost productivity due to conflicting
standards and interfaces required because of proprietary interfaces
etc. is one example. The lost educational opportunities resulting from
schools not getting the software they need in the quantities they need
is another. The lost time of researchers who must duplicate research
because they are prevented from sharing information because of trade
secrecy or international competition is another. The unavailability of
textbooks in poor countries because they cost as much as a month's
wages (or software that costs as much as a year's wages) is another .
(3) Property rights in information aren't needed to ensure software
production, creativity, advancement of society, etc. The freeware and
public domain library testify to this. People create for many reasons,
of which financial gain is only one, and I would argue, not the most
important. The challenge of doing it, peer or public recognition,
service to humanity are important motivators. Much valuable research
has been carried out in the public sector -- via federal research
institutions or via publicly funded universities. Obviously financial
gain wasn't the main motivator there (except until recently, brought
on by the de-funding of universities, forcing them to go begging. Most
engineers, I would guess, must sign work-for-hire agreements in order
to obtain work, effectively signing away any rights to the products of
their creativity. The beneficiaries of property rights in information
aren't the creators, but the entrepreneurs. Finally, is the software
industry profitable today? Yes. Even with the $24 billion in "piracy".
How can this be so? Because what the software companies "lose" is
revenue with no associated cost (the "pirate" has done the labor, and
presumably provided the equipment and disk). This is the difference
between stealing cars and duplicating software.
(4) But but but, how will software get written, who will finance it?
Knowledge is a _social_ treasury, and should be funded socially.
Public competitions, grants, a social fund supported by users,
whatever. We have some models already: the university and federal
research model; the arts funding model; the GNU experiment; the
freeware and public domain experience. We're a creative and energetic
group -- we can figure it out.
-----------------------------------------------------
End Cu Digest, #4.42