Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 07 Issue 02

  



Computer underground Digest Wed Jan 11, 1995 Volume 7 : Issue 02
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Reader: Laslo Toth

CONTENTS, #7.02 (Wed, Jan 11, 1995)

File 1-Royalities for GIFs at On-line Systems?
File 2-(fwd) Unisys's response to GIF furor (fwd)
File 3-Pioneer Awards--Call For Nominations
File 4- Politics of telecommunications "competition"
File 5-RFC: Key Capture Utility Survey
File 6-(fwd) AOL announcement on crackdown on illegal activities
File 7-Cu Digest Header Information (unchanged since 25 Nov 1994)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Fri, 6 Jan 1995 09:23:58 CST
From: "John D. Pritchard" <jdp@CS.COLUMBIA.EDU>
Subject: File 1--Royalities for GIFs at On-line Systems?

----------------------Original message----------------------------
hi, i think the members of this list will find this interesting..

An Open Letter to Our Colleagues In the Online Communications Community:
------------------------------------------------------------------
By Pat Clawson <rip.support@telegrafix.com>

January 2, 1995

The announcement by CompuServe and Unisys that users of the GIF image
format must register by January 10 and pay a royalty or face lawsuits
for their past usage, is the online communications community's
equivalent of the sneak attack at Pearl Harbor.

The announcement of the CompuServe-Unisys GIF Tax on December 29,
during the lull between Christmas and New Year's Day, was clearly
timed to cause maximum damage while an unsuspecting public celebrated
the holidays.

We at TeleGrafix Communications have no quarrel with those who seek to
protect their intellectual property and profit from it. Indeed, we
are in business to do the same. We believe those who develop software
are entitled to reap financial rewards from their labors.

But in our opinion, the timing and circumstances of the CompuServe-
Unisys action indicates this is a shakedown of the online communications
community by two powerful corporations, rather than a reasonable
effort to protect intellectual property.

The GIF format has been in widespread public use since 1987. Its
widespread use and royalty-free licensing has been encouraged by
CompuServe for years. Neither CompuServe or Unisys have made any
significant improvements to GIF or its underlying LZW algorithm and
compression process to justify charging for what has been free.

Giving GIF users only 14 days to comply with sudden, unexpected
demands to pay the private CompuServe-Unisys GIF Tax or face
prosecution for past usage of what had been promoted for seven years
as free, open standard software is unconscionable. It is especially
outrageous since CompuServe and Unisys admit in writing that they
decided to require licensing SIX MONTHS AGO in June, and didn't
announce it to the public until now.

According to the CompuServe-Unisys GIF licensing agreement, the
settlement of the patent dispute was executed on June 21, 1994.
CompuServe agreed to implement the agreement "as soon as reasonably
practicable and in no case later than six (6) months after the date
this Agreement is executed..." That six month period ended on
December 21, 1994 -- but CompuServe did not make the licensing terms
public until December 28. Indeed, CompuServe appears to have violated
the terms of its own settlement agreement with Unisys.

While many of the messages we have read online in reaction to the
CompuServe-Unisys GIF Tax decree express both dismay and disbelief,
virtually none have analyzed the actual provisions of the licensing
agreement. It is in this area that TeleGrafix Communications wishes
to contribute to the dialogue.

In our opinion, the CompuServe-Unisys licensing agreement is both
illogical and overly broad. Let's examine some of its key provisions.
All quotes cited are directly from the agreement.

1. CompuServe will license Developers who want to use GIF technology.
The term "developer" is defined as "the other undersigned party to the
agreement," and it seems to apply to ANYONE who contemplates distributing
any product that uses the GIF format.

2. Developers will be licensed to sell or distribute "Products" that
"use and exploit GIF ... solely within the Field of Use." The term
"Field of Use" is defined as "primarily for accessing the CompuServe
Information Service and for manipulating and viewing data received
through the CompuServe Information Service." The licensing agreement
further defines the term "Products" as being "software that is
developed or distributed ... which is designed for and used primarily
for accessing the CompuServe Information Service and for manipulating
and viewing data received through the CompuServe Information Service."

IT APPEARS THAT THE ONLY LAWFUL USE OF GIF WILL BE FOR COMPUSERVE-RELATED
PRODUCTS. Using GIF images in any other manner, such as on CD-ROMs or
bulletin board systems, is prohibited. Most of the thousands of
products that have used GIF in some manner are henceforth contraband.

3. Developers may no longer "use, copy, modify or distribute the GIF
specification, except as expressly permitted by CompuServe." This
states that the GIF specification can no longer be shared, published
or uploaded in any manner without the express consent of CompuServe.

4. Members of the public are prohibited from using any software
product containing GIF until they have become a REGISTERED user of the
product. The customer also must agree to use the product "primarily
for accessing the CompuServe Information Service and for manipulating
and viewing data received through the CompuServe Information Service."
This virtually eliminates the concept of freeware or shareware
containing GIF capabilities, since prospective customers can no longer
try out these software products without registering them first.

5. Software developers must pay $1.00 for a license to use GIF, PLUS a
fee equal to the GREATER of 1.5% of the selling price of the product,
or $0.15 per "Disposition." Disposition is defined as "the sale,
lease or license or any other grant of rights to a Product or any new
Product." All royalties must be paid quarterly. Noncommercial and
freeware usage of GIF technology is NOT exempted from the royalty
requirement. Because the royalty provisions and definition of
"Disposition" are so broad in scope, it appears that a GIF Tax payment
may be due to CompuServe-Unisys each time a GIF image is transmitted
via BBS or Internet. The operators of a BBS or World Wide Web site
with hundreds or thousands of GIF images online could easily be
bankrupted by these licensing requirements.

6. CompuServe must be notified of ANY new product using GIF when it is
first offered to customers.

7. Persons using GIF must keep records of its use, and CompuServe has
the right to audit those records every year upon seven days notice.
Persons using GIF must pay the cost of the audit if a royalty
underpayment of 10% or more is discovered, along with 12% interest on
any underpaid royalties.

8. Even if the patent is later found by the courts or the U.S. Patent
Office to be invalid and unenforcable, or if the patent expires, any
developer must "return all copies of the GIF specification and any
confidential information of CompuServe then in its possession or
control to CompuServe, (ii) stop using the Licensed Technology, and
(iii) stop distributing Products." This states that EVEN IF THE
PATENT IS OVERTURNED OR EXPIRES, YOU MUST STOP USING OR DISTRIBUTING
GIF.

9. Even though CompuServe has publicly disseminated the text of the
agreement it wants GIF users to sign, the terms of the agreement are
to remain confidential. This is illogical, to say the least, since
they have posted it for public download on their own system.

10. Developers have to indemnify and hold CompuServe harmless for any
damages if their CUSTOMERS somehow use GIF technology in a way not
permitted by the licensing agreement.

11. Unisys has the right to enforce the agreement, as well as
CompuServe. Further, Unisys has the right to pursue legal action or
seek damages against Developers even after the agreement has
terminated.

TeleGrafix Communicatons Inc. will not sign such a licensing
agreement. We think most other software developers, BBS sysops and
Web site operators also will refuse to sign.

We encourage our colleagues in the online communications community to
evaluate the CompuServe-Unisys action, and to lodge appropriate
protests directly with those companies.

We believe that the CompuServe-Unisys GIF Tax drives a stake through
the heart of Internet development. It will cripple the World Wide
Web, NCSA Mosaic, and other Internet multimedia technologies that rely
heavily on GIF imaging.

Fortunately, we at TeleGrafix Communications do not depend on GIF
imaging in our new RIPscrip 2.0 online multimedia technologies. We
chose to implement the JPEG image format and only recently decided to
add GIF support as a convienience to our customers. Due to the
restrictive conditions of the CompuServe-Unisys GIF Tax and licensing
agreement, we must now reevaluate our plans for supporting GIF use in
the upcoming release of RIPscrip 2.0.

While our company hopes to profit financially from our advanced
RIPscrip 2.0 technology, we will not demand royalties from those who
have used the freeware versions of our earlier RIPscrip 1.54 products
and/or technical specifications. The RIPscrip 2.0 specification also
will be made public for third-party use after it is finalized.

We expect that the CompuServe-Unisys action will spell the death of
GIF as a commercially viable technology, shifting the attention of the
online communications community to JPEG imaging.


Sincerely,

Pat Clawson
President & Chief Executive Officer
TeleGrafix Communications Inc.
Huntington Beach, CA

Voice: (714) 379-2140
Fax: (714) 379-2132
BBS: (714) 379-2133
Internet: rip.support@telegrafix.com

------------------------------

Date: Tue, 10 Jan 1995 22:09:21 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 2--(fwd) Unisys's response to GIF furor (fwd)

Here's the scoop, from Unisys themselves.

thanks, | "The most exciting breakthroughs of the 21st century
| will not occur because of technology but because
David Smith | of an expanding concept of what it means to be human."
bladex@bga.com | -- John Naisbitt / Patricia Aburdene

---------- Forwarded message ----------

>From the GRAPHSUPPORT forum on CompuServe:

January 6, 1995

Unisys Clarifies Policy Regarding Patent Use in On-Line Service
Offerings

The concerns, inquiries and some apparent confusion that have resulted
from the December CompuServe advisory clearly indicate that we need to
clarify our policy concerning the use of the Unisys Lev Zempel Welch
(LZW) patent by software developers for the major on-line services.

We want to reiterate earlier communications that the issue of patent
licenses is not focused on the end users of on-line networks,
including the Internet. We encourage end users to continue to take
full advantage of the outstanding benefits of a rapidly growing
on-line community.

Unisys was awarded the patent in 1985. We became aware of the
increasing interest in our LZW patent beginning in 1990 when many
companies approached us to license the patent for their hardware and
software products. The growth in the use of compression technology
was mushrooming in order to meet the demands for transmitting
increased amounts of data. To date, more than 100 companies,
including hardware, software and on-line information services, have
licensed the Unisys LZW technology.

Two years ago, Unisys learned that the LZW method was incorporated in
the GIF specification and immediately began negotiations with
CompuServe in January of 1993. We reached agreement with CompuServe
on licensing the technology in June 1994, which calls for CompuServe
to pay Unisys a royalty of 1% of the average selling price it charges
for its software. This represents approximately 11 cents for each
copy sold and connected to its information service.

Under the agreement, CompuServe, at its discretion, could relicense
the LZW technology to commercial developers using the GIF
specification in software that connected directly to the CompuServe
information service.

With the agreement completed on June 21, 1994, CompuServe was given
six months to implement the terms of its license. CompuServe later
asked for a one-month extension, which we granted.

Unisys did not require CompuServe to pass on any fee to its
sublicensees or end users. Such a decision, and the content and
timing of CompuServe+s advisory, was at their discretion.

Consistent with the entire information industry+s desire to protect
intellectual property, Unisys will expect all of the major commercial
on-line information services companies employing the LZW patent to
license the technology from Unisys at a reasonable rate. The on-line
service companies are not required to sublicense the technology to
developers producing software for the commercial on-line services. It
will be, as it is today, at the on-line service+s discretion as to
whether it charges a license fee to developers or chooses an
alternative method to account for its licensing fees payable to
Unisys.

We recognize and are concerned -- thanks in large part to the recent
and very active use of the on-line network -- that developers did not
understand that the patented technology was resident in GIF. Taking
that into account, Unisys does not intend to pursue previous
inadvertent infringement by versions of GIF-based software products
marketed prior to 1995.

Concerning all future software product development and enhancement of
existing products for accessing on-line services, Unisys expects
developers of commercial, for-profit software to secure a license
from Unisys, or through the licensed on-line service, for the use of
the patented technology. The very reasonable terms should prove no
financial barrier to the introduction of product into the on-line
network.

Unisys does not require licensing, or fees to be paid, for
non-commercial, non-profit GIF-based applications, including those for
use on the on-line services.

Concerning developers of software for the Internet network, the same
principle applies. Unisys will not pursue previous inadvertent
infringement by developers producing versions of software products
for the Internet prior to 1995. The company does not require
licensing, or fees to be paid for non-commercial, non-profit offerings
on the Internet, including +Freeware+.


Commercial developers of GIF-based software for the Internet are
expected to secure a licensing agreement with Unisys for software
products introduced beginning in 1995, or enhancements of products
that were introduced prior to 1995. Again, terms should not preclude
the entry by these firms into the marketplace.

For organizations introducing World Wide Web servers and +Home Page+
offerings, most will not be required to secure a license from Unisys.
Most organizations acquire software from other developers to create
their offerings on their servers. Therefore, only the software firms
who sell the enabling software for profit would be expected to secure
a licensing agreement from Unisys.

Unisys understands that this issue has caused concern. We want to
reassure all users and developers that we are strong proponents of the
on-line industry.

We+re proud that this important Unisys technology has played a role
in the introduction of innovative products and services, many of which
are fueling the explosive growth of the information superhighway.

As members of the information community we want to strike the
appropriate balance between information access and the rights of all
information companies, including the developers of software, to
protect their intellectual property rights.

Patent information: Contact Welch Patent Licensing Department;
Unisys; Mail Stop C1SW19; P.O. Box 500, Blue Bell, PA 19424.

Or via Internet, send E-mail to LZW_INFOUNISYS.COM, or use a form
available on the Home Page of the Unisys Web Server
(http:\\www.unisys.com) to request follow-up information.

Media contacts: Unisys Public Relations -- Bob O+Leary (215)
986-6413 or Oliver Picher (215) 986-5367

------------------------------

From: Mike Godwin <mnemonic@EFF.ORG>
Subject: File 3--Pioneer Awards--Call For Nominations
Date: Wed, 4 Jan 1995 09:06:41 -0500 (EST)

THE FOURTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
CALL FOR NOMINATIONS
Deadline: January 20, 1995

In every field of human endeavor,there are those dedicated to expanding
knowledge,freedom,efficiency and utility. Along the electronic frontier,
this is especially true. To recognize this, the Electronic Frontier
Foundation has established the Pioneer Awards for deserving individuals
and organizations.

The Pioneer Awards are international and nominations are open to all.

In March of 1992, the first EFF Pioneer Awards were given in Washington
D.C. The winners were: Douglas C. Engelbart, Robert Kahn, Jim Warren, Tom
Jennings, and Andrzej Smereczynski. The 1993 Pioneer Award recipients were
Paul Baran, Vinton Cerf, Ward Christensen, Dave Hughes and the USENET
software developers, represented by the software's originators Tom
Truscott and Jim Ellis. The 1994 Pioneer Award winners were Ivan
Sutherland, Whitfield Diffie and Martin Hellman, Murray Turoff and Starr
Roxanne Hiltz, Lee Felsenstein, Bill Atkinson, and the WELL.

The Fourth Annual Pioneer Awards will be given in Burlingame, California,
at the 5th Conference on Computers, Freedom, and Privacy, which will take
place on March 28-31 in 1995.

All valid nominations will be reviewed by a panel of impartial judges
chosen for their knowledge of computer-based communications and the
technical, legal, and social issues involved in networking.

There are no specific categories for the Pioneer Awards, but the following
guidelines apply:

1) The nominees must have made a substantial contribution to the
health, growth, accessibility, or freedom of computer-based
communications.

2) The contribution may be technical, social, economic or cultural.

3) Nominations may be of individuals, systems, or organizations in the
private or public sectors.

4) Nominations are open to all, and you may nominate more than one
recipient. You may nominate yourself or your organization.

5) All nominations, to be valid, must contain your reasons, however
brief, for nominating the individual or organization, along with a means
of contacting the nominee, and your own contact number. Anonymous
nominations will be allowed, but we prefer to be able to contact the
nominating parties in the event that we need more information..

6) Every person or organization, with the single exception of EFF staff
members, are eligible for Pioneer Awards.

7) Persons or representatives of organizations receiving a Pioneer
Award will be invited to attend the ceremony at the Foundation's expense.

You may nominate as many as you wish, but please use one form per
nomination. You may return the forms to us via email to

pioneer@eff.org

You may mail them to us at:

Electronic Frontier Foundation
attn: Pioneer Awards
1667 K St. NW
Suite 801
Washington, DC 20006

You may FAX them to us at:
+1 202-861-1258

Just tell us the name of the nominee, the phone number or email address at
which the nominee can be reached, and, most important, why you feel the
nominee deserves the award. You may attach supporting documentation.
Please include your own name, address, and phone number.

We're looking for the Pioneers of the Electronic Frontier that have made
and are making a difference. Thanks for helping us find them.

The Electronic Frontier Foundation

-------EFF Pioneer Awards Nomination Form------

Please return to the Electronic Frontier Foundation via email to:
pioneer@eff.org via surface mail to:


Electronic Frontier Foundation
attn: Pioneer Awards
1667 K St. NW
Suite 801
Washington, DC 20006

You may FAX them to us at:
+1 202-861-1258


Nominee:

Title:

Company/Organization:

Contact number or email address:

Reason for nomination:

Your name and contact information:

Extra documentation attached:

DEADLINE: ALL NOMINATIONS MUST BE RECEIVED BY THE ELECTRONIC FRONTIER
FOUNDATION BY MIDNIGHT, EASTERN STANDARD TIME U.S., JANUARY 20, 1995.

------------------------------

Date: Wed, 11 Jan 1995 17:46:44 CST
From: Vigdor Schreibman - FINS <fins@ACCESS.DIGEX.NET>
Subject: File 4-- Politics of telecommunications "competition"

==================================================================
FINS SPECIAL REPORT January 10, 1995
==================================================================

POLITICS OF TELECOMMUNICATIONS "COMPETITION"

Dramatic Clash Over Real Competition, and Giant Collaborators

Washington, DC--Vice President Al Gore, addressing a
Federal-State-Local Telecommunications Summit in the U.S. Capitol, Jan
9, underscored the administration's goal to seek "real competition" in
the marketplace of local telephone exchange services [Fins-II2-01].
The Regional Bell Operating Companies (RBOCs) presently enjoy monopoly
power and complete control over virtually all of the telephone traffic
in the local bottleneck, reliable industry reports disclose. Gore's
remarks were aimed squarely at the proposal made last year by Senate
Finance Chairman Bob Packwood (R-OR) and Sen. John Breaux (D.LA),
calling for complete deregulation of the telecommunications industry
by a date certain-without regard to competitive conditions--expected
to be presented again this year.

Gore stated that "the game should not begin on some arbitrary date
without rules at all on the mistaken assumption that a calendar can
replace a rulebooks." He added that "Too many people and businesses
have too much at stake to be subject to the vagaries of trying to play
now and figure out the rule later." The administration "cannot
support a proposal to fully deregulate the local telephone exchanges
upon the mere prospect that some theoretical competitor might be able
to provide some services to some hypothetical customer," Gore added.

The Vice President's remarks provided a dramatic backdrop for a
hearing on telecommunications issues held Jan 9, in the U.S. Senate by
the full Committee on Commerce, Science, and Transportation (Pressler,
R-SD, Chairman). The list of witnesses scheduled to attend the Senate
hearing included, no Democrats, but all the Republican big guns on
telecommunications matters: Senate Majority Leader Dole (R-KS), House
Speaker Gingrich (D-GA), House Commerce Chairman Bliley (R-VA), and
House Commerce Telecommunications and Finance Subcommittee Chairman
Jack Fields (R-TX).

Sen. Packwood and Sen. Breaux engaged the witnesses in a spirited
discussion concerning their proposal for setting a specific date for
local telecommunications competition to begin. "Gentlemen, let the
games begin" Sen Packwood exclaimed. Packwood said that Congress
should not try to set fair rules for competition because that would
defeat the objective of having a simple administrative process.
"There will be winners and loosers, and the government should not
decide such matters ... the marketplace should," Packwood declared.
Republican members of the Commerce Committee seemed to agree with the
Packwood formula, although Sen. Stevens (R-Alaska) and Snow (R-Maine)
appeared concerned about the potential adverse impact on rural
America. The House witnesses generally supported the idea, although
none of the members were unable to come up with a viable formula that
would assure "a level playing field" in an industry that is currently
dominated by monopolists and oligopolists.

Speaker Gingrich did not show up for the Senate hearing. However,
Gingrich has devoted considerable intellectual efforts to this subject
in the past [See e.g., The Futurist, June 1985]. Moreover, reports
circulating around the U.S. Capitol during recent weeks indicate that
Gingrich intends to play an important role in designing the future of
"the Knowledge Age." INTERACTIVE AGE, reported Dec 12, 1994 that
Speaker Newt Gingrich was "looking to a new think tank to map out a
Vision of America's high-tech future." The Progress and Freedom
Foundation, established for that purpose, has close links to Gingrich
according to IA.

Placed under retainer by The Progress and Freedom Foundation, are
well known technocrats George Gilder, Alvin Toffler, Jay Keyworth, and
Esther Dyson, who have written a plan calling for "deregulation of
every aspect of telecommunications." The vision document, which was
written by those celebrities of technology is called the "Magna Carta
for the Knowledge Age" [Fins-PaN-18]. The document was ultimately
expected to be passed on to Gingrich and his aides, as a basis for
legislative planning, according to IA.

The "Magna Carta" calls for sweeping deregulation of
telecommunications, in the name of promoting "competition," while also
calling for "much greater collaboration between the cable industry and
phone companies." What is intended is a plan to join the huge fiber
optic resources of the phone companies with the massive asset of 57
million broadband links (i.e. into homes now receiving cable-TV
service) of the cable TV companies to produce a new kind of national
network -- multimedia, interactive. The planners hope that this
network would become accessible to Americans of modest means "as costs
fall." The authors of the "Magna Carta" attempt to explain the
evident sharp contradiction in their plan, between promoting
competition through sweeping deregulation and santioning collaboration
between the two largest players, with this rationale:

... obstructing such collaboration -- in the cause of forcing a
competition between the cable and phone industries -- is socially
elitist. To the extent it prevents collaboration between the
cable industry and the phone companies, present federal policy
actually thwarts the administration's own goals of access and
empowerment.

Bell Atlantic Corp., and Telecommunications Inc., proposed last
October, a merger of phone and cable resources that could have paved
the way for such a national network. A number of lawmakers such as
Rep. Edward L. Markey (D-MA), and Sen. Howard M. Metzenbaum (D-OH),
expressed "extreme concern" over the anticompetitive nature of the
proposed Bell-TCI merger, and the plan was eventually scrapped under a
cloud of uncertainty.

George Gilder, one of the team of technocrats who wrote the "Magna
Carta" now writes about telecommunications issues for Forbes, ASAP.
In an article appearing in the June 6, 1994 issue of Forbes ASAP,
Gilder indicated a strong interest in the theory of unrestrained
*laissez-faire* capitalism, and called for a return to the ideas
advanced by the Robber Barons of the 19th century--Andrew Carnegie,
John D. Rockefeller, and J.P. Morgan--who he claimed were the
architects of America's early industrial growth. Toffler is known as
"The Buck Rogers of Blip Sociology." He was co-founder of the World
Future Society and author of the landmark work, "Future Shock" and
best seller "The Third Wave," concerned with radical changes in
civilization brought about by the evolution of technology. Keyworth,
was director of the Office of Science and Technology Policy under the
Reagan administration. Dyson, is an essayist and lecturer on computer
information, and head of Computer Industry Daily.

==================================================================
BECOME A MEMBER OF FINS--COLLABORATE IN ADVANCING THE GENIUS OF CYBERSPACE
---------------------------------------------------------------------------
NEW Personal Subscription: $2.95 a year. Receive 24 issues of your own copy
of Fins News Column, plus Special Reports and Fins Information Age Library.
---------------------------------------------------------------------------
Federal Information News Syndicate, Vigdor Schreibman, Editor &
Publisher, 18 - 9th Street NE #206, Washington, DC 20002-6042.
Copyright 1995 FINS. Internet: fins@access.digex.net. Browse Fins
Information Age Lib located at the inforM system of the University of
Maryland. With a gopher client gopher to inform.umd.edu and go to the
directory Educational_Resources/
AcademicResourcesByTopic/Computers_and_Society/Fins_Information_Age.

------------------------------

Date: Mon, 2 Jan 1995 12:24:35 -0800
From: KEY-CAPTURE@LSD.COM(Dave Del Torto)
Subject: File 5--RFC: Key Capture Utility Survey

REQUEST FOR COMMENTS ON KEY CAPTURE UTILITIES
---------------------------------------------

Key capture utilities present a serious threat to the security of
passwords on individual and networked computing systems, especially
when novice users are unaware of their presence. Well-educated users
and administrators help make all systems on and off the Internet more
reliably safe for everyone's data.

If you are a:

-- privacy, system security or cryptography advocate/activist
-- network admin concerned with the password-hygiene of your users or
-- computing professional with an appreciation of good security,

then please complete and return this quick survey. By contributing to
the knowledgebase on the subject of password protection, you can help
educate yourself and many novice/intermediate users about a common
weakness --utilities that may capture their keystrokes unseen as they
enter their *password* -- in ALL secured systems (a user's encryption
app, your network or its dial-in access, your company's email system
or database fileserver, etc.).

The intent here is to create a *central list of all key-capture
utilities* which will help people to at least be aware of their
existence or operation on a given system and describe in simple terms
how to disable the utility.

The results of the survey will be tabulated and put in the public
domain on the Internet. If your reply is included, your name will be
acknowledged in the resulting document, which will be: part of the new
"Beginner's PGP FAQ" for new users of the PGP (Pretty Good Privacy)
application; a msg posted on various Internet lists and online
services and; a text file available by anonymous FTP as:

ftp.netcom.com:/pub/dd/ddt/crypto/crypto_info/key_cap_util.txt

Please forward this survey to anyone you think can/will help - and
thanks in advance for your contribution!

_______________________________
THE KEY CAPTURE UTILITY SURVEY:

The survey is very easy to participate in. Just send as much information as
you can, even if you're only partially able to complete the form. Every
piece of information that can lead us to the utility - even just a fragment
of a name and an email address of someone who might know more about it -
will help us compile a fairly exhaustive list. To assist us in easily
tabulating the incoming mail on this topic, please send your reply to:

- - <KEY-CAPTURE@lsd.com>
- - Format your answer as follows:


******* PLEASE RETURN ONLY THIS INFORMATION *******

TO: KEY-CAPTURE@lsd.com
SUBJ: PLATFORM/Utility Name
MSG BODY:
[1] OPERATING-SYS <--- i.e. WIN/DOS/MAC/OS2/UNIX, etc.
[2] "Utility-Name" (utility-package-name, if not a stand-alone product)
[3] Developer-Name (company-individual)
[4] <developer-email-address>
[5] Type <--- i.e.: system extension, autoexec, TSR
[6] Path-to-file-location-when-loaded.
[7] How to disable the utility's key capturing operations (step-by-step if
possible). Please be brief, but aim for a novice level user. If disabling
the key capturing is too complex to describe easily, then just explain
what the user should ask a sys admin to do for them (while they watch, if
applicable).
***************************************************



(Here's an Example:)
SUBJ: MAC/Now Save
MSG BODY:
[1] MAC
[2] "Now Save" (Now Utilities v5.x), "NowSave" (Now Utilities v4.x)
[3] Now Software, Inc.
[4] <support@nowmail.nowsoft.com>
[5] System extension/Control Panel device (CDEV)
[6] [startup HD]:System Folder:Control Panels:Now Save (or :NowSave)
[7] How to Disable:

Open the "NowSave" (v4.x) or "Now Save" (v5.x) Control Panel.

v4.x: Click the "Preferences" button.
Click the "Key Capture..." button.
Click the "OFF" radio button (upper right corner of dialog).
Click the "OK" button.

v5.0: Click the "Key Capture..." button in the button-bar.
Click the "OFF" radio button (in upper right corner of dialog).
Click the "OK" button.

------------------------------

Date: Tue, 10 Jan 1995 22:36:22 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 6--(fwd) AOL announcement on crackdown on illegal activities

---------- Forwarded message ----------

====== AOL Community Update ======
1/6 Community Update

Ever since we first launched America Online we've remained committed
to fostering an electronic community that provides a fun, enjoyable
and enriching experience for all members. We've asked our members to
honor the privilege of interactivity, and we've strictly enforced our
Terms of Service to help foster the kind of community of which we can
all be proud. Recently, however, some material has been brought to
our attention by some of our members which involves illegal activity
-- the trading of images in electronic mail which appear to be child
pornography. Upon receiving the material, and verifying that it was a
violation of our Terms of Service, and in all likelihood illegal, we
immediately contacted the FBI and terminated the accounts of the
senders.

While we recognize that any community around the United States with
more than 1.5 million citizens will have its share of illegal
activity, we were nonetheless disheartened to find that some members
are abusing the communications features of AOL in this way. We simply
will not tolerate such illegal activity on America Online. To anyone
who may be using America Online for illegal purposes, be advised that
we will terminate the accounts of those participating and we will
notify the proper authorities of any illegal activity that is brought
to our attention.

Our policy is that all private communications -- including e-mail,
instant messages, and private chat rooms -- are strictly private. We
do not, will not, and legally cannot monitor any private
communications. But if we are alerted to a potential offense and we
are sent evidence, as we were recently, we will vigorously pursue the
matter. In this case, electronic mail was forwarded to our attention
by our members, and as recipients of the mail we were able to turn the
material over to the authorities.

We have over 250 people who help us provide assistance in the public
areas of the service and give guidance to members who are new or who
have questions. Of late, we've had a growing problem with
member-created rooms whose title and discussion violate our Terms of
Service. Member-created rooms have always been a unique and
much-valued aspect of America Online. Often, these rooms provide the
seeds for new special interest forums that later emerge. But as more
members abuse the privilege and establish rooms that suggest illegal
activity, or detract from the enjoyment of others with offensive
titles, we are faced with looking at a higher level of safeguards as
it relates to member-created rooms. We simply cannot keep up with the
sheer volume of rooms created, and as a result, from time to time
rooms that violate TOS remain open for some period of time. We're
looking at several alternatives to improve the situation. We don't
want to see our members denied the privilege of this fun and creative
interactive environment due to the abuses of a few, but at the same
time we do feel some action is warranted to safeguard this popular
"neighborhood" in our community.

Unfortunately, this is not the first time we have encountered this
problem, nor is it unique to AOL. In 1991, we were faced with a
similar situation. At that time, we went to our members -- as we're
doing now --advised them of the situation and asked for their help.
And recently, recognizing the potential for abuses in this emerging
medium, online service providers banded together to sponsor a "child
safety" brochure that gives parents tips and guidelines to foster a
productive and safe environment for children online. A copy of this
brochure can be found in the Parents Information Center, keyword:
Parents. We encourage parents to take the time to review it. In
addition we strongly encourage parents to monitor their children's use
of this medium, much as they would any other medium such as
television, magazines, etc. We've also implemented "parental
controls" which allow parents to restrict their children's online
access.

Each one of us needs to respect and honor the privileges of this
electronic community. If you haven't reviewed our Terms of Service,
take a few minutes now and do so. If you observe what you believe may
be illegal activity on AOL, bring it to our attention. The problem is
not widespread -- we believe only a mere fraction of this community is
involved. Let's work together to insure that America Online remains
the kind of community that you want your friends and family to enjoy.

Thanks for your continued support.


Transmitted: 95-01-06 17:07:42 EST

------------------------------

Date: Thu, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 7--Cu Digest Header Information (unchanged since 25 Nov 1994)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: Bits against the Empire BBS: +39-461-980493
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the NIU
Sociology gopher at:
URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #7.02
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT