Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 10 Issue 01
Computer underground Digest Sun Jan 4, 1998 Volume 10 : Issue 01
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #10.01 (Sun, Jan 4, 1998)
File 1--Re: Salary Survey Results + SANS Update
File 2--China clamps new controls on the Net
File 3--THERE GOES THE NEIGHBORHOOD (CyberPatrol again)
File 4--Personal Information No Longer Available (CDT reprint)
File 5-- Clinton Signs "No Electronic Theft Act"
File 6--No Electronic Theft Act; who's to judge?
File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Wed, 24 Dec 1997 16:19:26 -0500 (EST)
From: The SANS Institute <sans@clark.net
Subject: File 1--Re: Salary Survey Results + SANS Update
((MODERATORS' NOTE: The SANS Institute, in addition to producing
the annual salary survey, publishes th Network Security Digest
(every 6 weeks) which is the authoritative digest of new security
threats and solutions. Practicing system administrators and security
professionals can get free subscriptions to the Digest by emailing:
sans@clark.net. This is one of the more useful resources on the
Net and is well worth checking out.
The following tables MAY NOT be redistributed or reproduced without
express permission of the SANS Institute (sans@clark.net)).
=================
1. Since this is the season of salary negotiations as well as holiday
cheer, we are sending you a gift of the main tables from the new (1997)
SANS Salary Survey. You'll get the complete survey report with all
fourteen tables at SANS98 (or NT-SANS), but we hope the tables at the end
of this note are helpful in any immediate salary discussions.
2. In the past week, we've gotten more than twenty emails asking whether
we allow people to register early for SANS98 (Monterey in May) or asking
for early data about the courses and program. Earlier today we put the
finishing touches on the program and sent it off to the printers. We'll
mail it, along with the new "Roadmap to Network Security" poster, in late
January. But if you need something right away, we have an email version
of the schedule and registration form you can use to register using 1997
funds or to get a head start on the approval process. To get a copy,
reply to this email with the subject: SANS-1, SANS-2, or SANS-3. For
SANS-1 we'll send you the list of 51 courses scheduled at SANS98, For
SANS-2 we'll send the list of courses plus the program (peer-reviewed
sessions, invited sessions, and eleven short-courses) for the five-track
technical conference. SANS-3 will get you the courses, the program and a
registration form.
I hope the new year brings you health and happiness.
Alan
PS. The first 1998 issue of the SANS Network Security Digest will be
delivered early in January. The Digest is scheduled to come out every six
to seven weeks; there wasn't a December 1997 issue.
====================================================================
Summary Tables from the 1997 SANS System Administration and Security
Salary Survey
How much are system administrators and security professionals paid?
Salary Range-------- Number
of People Percentage
1. Under $20,000 --- 12 1%
2. $20,000 - $29,999 53 3%
3. $30,000 - $39,999 186 12%
4. $40,000 - $49,999 320 20%
5. $50,000 - $59,999 351 22%
6. $60,000 - $69,999 310 19%
7. $70,000 - $79,999 184 12%
8. $80,000 - $89,999 81 5%
9. $90,000 - $99,999 51 3%
10.$100,000 and over 49 3%
Total--------------- 1599
How do size and type of employer affect salary?
-------------Number of Employees---------------
Type of
Employer Fewer 11-100 101-1000 More Average
than 10 than 1,000
Commercial
- Business $58,462 $53,389 $55,825 $60,615 $58,474
Commercial
- Research $70,846 $54,722 $61,860 $62,961 $61,819
Educational N/A $47,262 $43,933 $47,207 $46,389
Government N/A $50,000 $47,349 $55,011 $53,501
System Int'rs. $70,230 $68,471 $58,671 $62,592 $63,168
How do years of system administration experience affect salary?
Years of System
Administration Average Salary Number
Experience
Less than One $50,034 50
One to Three $45,811 300
Three to Five $52,101 369
More than Five $63,907 878
(The high number for low experience reflects lots of experienced computer
people moving into sysadmin jobs)
Does geographic region affect salaries?
Region Average Salary Number
California $68,443 204
US Northeast $61,818 430
US Southwest $59,105 148
US South-central $57,553 110
Asia $54,793 13
US Midwest $54,660 230
US Southeast $53,858 202
US Northwest $53,257 76
Alaska & Hawaii $49,550 8
Australia $46,558 37
Canada $45,161 69
Europe $43,734 86
Africa $41,100 4
South America $36,243 10
How does education affect the gender gap in salary?
Education Women Men
High School $54,500 $50,971
Some College $48,039 $57,770
College Degree $53,910 $56,960
Masters Degree $60,827 $60,671
PhD. $46,400 $64,625
Alan Paller, Director, The SANS Institute
www.sans.org, sans@clark.net, 301-951-0102
Upcoming SANS Conferences: | SANS Publications:
NT SANS (March 2-6, San Diego, CA) | Roadmap to Network Security Poster
SANS98 (May 9-15, Monterey. CA) | The Network Security Digest
Network Security '98 (Oct., Orlando) | The SysAdmin/Security Salary Survey
------------------------------
Date: Wed, 31 Dec 1997 09:43:23 -0800
From: "James Galasyn (Excell Data Corporation)" <a-jameg@microsoft.com>
Subject: File 2--China clamps new controls on the Net
China clamps new controls on the Net
Reuters
BEIJING -- China clamped sweeping new controls on the Internet on Tuesday,
warning that the network was being used to leak state secrets and to spread
``harmful information.''
Regulations unveiled by Zhu Entao, Assistant Minister for Public Security,
cover a wide range of crimes, including leaking state secrets, political
subversion and spreading pornography and violence.
The rules are also designed to protect against computer hacking, viruses and
other computer-related crime.
They call for unspecified ``criminal punishments'' and fines of up to 15,000
yuan ($1,800) for Internet providers and users who violate the rules -- both
individuals and business organisations.
One article says the Internet must not be used to ``split the country,'' a
clear reference to separatist movements in Tibet and the Moslem region of
Xinjiang.
Another on ``defaming government agencies'' appears designed to combat use
of the Internet by dissidents. A number of Chinese political exiles have
home pages which they use to attack the Beijing government.
The regulations explicitly cover information circulating from Hong Kong,
Macau and Taiwan.
Hong Kong reverted to Chinese rule this year and Portuguese-run Macau will
be handed back in 1999. China regards Nationalist-ruled Taiwan as a rebel
province.
The official Xinhua news agency quoted Zhu as telling a news conference on
Monday that Internet links since 1994 had boosted China's cultural and
scientific exchanges with the world.
``But the connection has also brought about some security problems,
including manufacturing and publicising harmful information, as well as
leaking state secrets through the Internet,'' he said.
The regulations, contained in 25 articles, were approved by the State
Council, or cabinet, on December 11 and took effect Tuesday.
They go beyond earlier provisional regulations first promulgated in February
1996 and revised in May 1997, which also ban pornography and warn against
leaking state secrets.
Chinese authorities have made attempts to censor pornography, politics and
Western news organisations on the Internet. But with scores of providers,
Chinese surfers have been able to find almost anything they want.
It was not immediately clear whether Beijing would devote more resources to
policing the Internet now that new regulations were in place.
Xinhua cited figures from the Internet Information Centre of China showing
more than 49,000 host computers and 250,000 personal computers were
connected to the Internet at the end of October.
Under the new regulations, Internet providers would be subject to
supervision by Public Security officials and would be required to help track
down violators.
Zhu said the regulations would ``safeguard national security and social
stability,'' Xinhua said.
Computer networks were now indispensable as tools for managing state
affairs, economic construction, defence and science and technology, he said.
They were a pillar of social development.
``Hence, the safe and effective management of computer information networks
is a prerequisite for the smooth implementation of the country's
modernisation drive,'' he said.
------------------------------
Date: Tue, 23 Dec 1997 12:25:01 -0800
From: Jonathan Wallace <jw@bway.net>
Subject: File 3--THERE GOES THE NEIGHBORHOOD
Jonathan Wallace
The Ethical Spectacle http://www.spectacle.org
Co-author, Sex, Laws and Cyberspace http://www.spectacle.org/freespch/
THERE GOES THE NEIGHBORHOOD (CyberPatrol again)
CyberPatrol blocks a gay community of 23,400 Web sites
by Jonathan Wallace jw@bway.net
Censorware software vendors say that they rarely make mistakes,
and correct them quickly when called to their attention.
CyberPatrol's block of an online neighborhood called West
Hollywood sheds some interesting light on this assertion.
Geocities is a free Web hosting service, organized into
"neighborhoods" of shared interests. The West Hollywood
neighborhood of Geocities,
http://www.geocities.com/WestHollywood/, is for gay people. The
entire West Hollywood neighborhood, of 23,400 separate Web sites,
is blocked by CyberPatrol, a product of Microsystems Inc., a
Boston company.
There were a few hardcore pictures on a few West Hollywood Web
pages, despite Geocities terms of service which ban pornography
on the system. There were tens of thousands of other pages which
contained no objectionable material at all. CyberPatrol critics
say that Microsystems threw out a very large baby with a small
amount of bathwater.
Bob Parker is the Community Leader Liaison for West Hollywood--a
sort of volunteer Webmaster. In a long, impassioned post to the
fight-censorship mailing list, cross-posted to Microsystems and
numerous other recipients, he quoted the Geocities terms of
service, which ban the display of "material containing nudity or
pornographic material of any kind." The company also has a
full-time "Community Response Team" which investigates complaints
filed by anyone, Geocities customer or not, about violations of
the terms of service. In addition, West Hollywood maintains its
own "Neighborhood Watch" program. Parker pointed out that
Microsystems chose to block a community of 23,400 sites when
there was an alternative: "[A]ll it would have taken was a few
minutes of investigation on the part of Microsystems to find out
about the Neighorhood Watch program at GeoCities, get the sites
taken care of and avoid this whole situation."
Challenged to justify the West Hollywood block, Microsystems CEO
Dick Gorgens reacted equivocally. "Upon my review, you were
absolutely correct in your assessment that the subdirectory block
on WestHollywood is prejudicial to the Gay and Lesbian Geocities
community," he told the Gay and Lesbian Alliance Against
Defamation, a group which sits on a CyberPatrol oversight
committee convened by Microsystems. But then he seemed to claim
that the majority of West Hollywood web pages are pornographic:
"We took the 'easier' approach to blocking the small number of
actionable non-nudity publishers in that area rather than
individually sanctioning them." But he acknowledged that
"[t]aking that technique to the limit would have us pull the
plug on the entire Internet which is obviously not our plan." He
pledged that the West Hollywood "problem" would be corrected
within a week. Two weeks later, it still has not been.
"GLAAD was extremely disappointed that such a discriminatory move
was made by Microsystems," wrote Loren Javier, the organization's
interactive media director. Critics had suggested that the
organization reconsider its role in advising Microsystems--that
the organization might be providing cover to the company without
actually preventing the product from blocking legitimate
gay-oriented sites. Javier wrote: "The issue now is whether
GLAAD will continue to serve on the oversight committee. I have
sent a message to Dick Gorgens with conditions that I be able to
review the complete block list and that I be able to ask why
sites have been blocked." Microsystems has not previously allowed
its oversight committee members to view the CyberNot list.
The blocking of West Hollywood raises the issue of whether it is
possible to filter the Internet at all. At five minutes per
site--a very cursory amount of time to determine whether a Web
page is "appropriate" under Microsystems' criteria--it would take
a company employee 1950 hours, a little more than one
person-year, to review every site in West Hollywood. And West
Hollywood's pages constitute just a tiny drop of the estimated
200 million documents on the Internet. Though Microsystems says
that it uses a tool called Cyber Spyder to winnow the Net and
select sites for review, every page returned by the tool as a
potential candidate for blocking is still reviewed by a human
being. No-one seriously claims that any software possible today
is capable of making the kinds of subjective determinations
necessary in evaluating the "appropriateness" of Web pages.
Censoring the net will always be a labor-intensive effort.
The blocking of West Hollywood is not an isolated instance. A
report issued this week by The Censorware Project, an ad hoc
group of which I am a member, lists fifty Web hosting services
blocked in their entirety by Cyberpatrol, even though the
majority of user pages on these services are legitimate. One of
them, members.tripod.com, hosts 1.4 million Web pages. (Source:
"Blacklisted by CyberPatrol: From Ada to Yoyo,"
http://www.spectacle.org/cwp/.)
Faced with the near impossible task of reviewing the
entire Net, censorware companies like Microsystems
will continue to take the easy way out.
---------------------------------------------------
(On Monday, December 22, 1997, Washington attorney
Robert Corn-Revere filed a ground-breaking federal
lawsuit challenging the use of another censorware
product, X-Stop, in the Loudoun County, Va.,
public library
(http://www.pfaw.org/press/loudon_complaint.htm).
I'll discuss the case in an upcoming SLAC bulletin.)
------------------------------
Date: Thu, 18 Dec 1997 11:36:55 -0500
From: Graeme Browning <gbrowning@CDT.ORG>
Subject: File 4--Personal Information No Longer Available (CDT reprint)
A briefing on public policy issues affecting civil liberties online
-------------------------------------------------------------
CDT POLICY POST Volume 3, Number 16 December 18, 1997
CONTENTS: (1) Industry Responds to Online Community RE: Personal Information
(2) How to Subscribe/Unsubscribe
(3) About CDT, Contacting us
** This document may be redistributed freely with this banner intact **
Excerpts may be re-posted with permission of <gbrowning@cdt.org>
|PLEASE SEE END OF THIS DOCUMENT FOR SUBSCRIPTION INFORMATION|
___________________________________________________________________
(1) INDUSTRY RESPONDS TO ONLINE COMMUNITY'S OUTRAGE OVER WIDESPREAD
AVAILABILITY OF PERSONAL INFORMATION
Dec. 18--In the wake of last year's public uproar over the providing of
unique, personal identifiers like Social Security numbers, unlisted phone
numbers and birthdates over the Internet, the country's three leading
credit bureaus and individual reference services have pledged to stop
making that information available to the general public, according to a
report the Federal Trade Commission (FTC) released yesterday. The Center
for Democracy and Technology (CDT) applauds the FTC, the credit bureaus and
the reference services for their work, but warns that it doesn't entirely
solve the problem of protecting consumers at a time when Web sites that
provide fast, easy access to public records containing personal information
on individuals are proliferating.
The Individual Reference Services Group (IRSG)--an industry coalition
composed of Experian, LEXIS-NEXIS, Equifax Credit Information Services,
Inc., Trans Union Corp., and 10 other companies--has agreed to abide by a
set of self-regulatory principles aimed at curbing access to sensitive
private data on individuals. The issue of personal information made widely
and easily available to the general public via the Internet first drew a
public outcry in September 1996 when LEXIS-NEXIS began offering
individuals' mothers' maiden names, Social Security numbers and dates of
birth on its "P-Trak" database. At the height of the controversy Congress
asked the Federal Reserve Board and the Federal Trade Commission to study
the privacy implications of this practice. The FTC's report is available at
http://www.ftc.gov/opa/9712/inrefser.htm. The Federal Reserve Board issued
its report earlier this year.
"The companies involved in the IRSG's effort are to be commended for
stepping up to the plate and crafting the most comprehensive set of
self-regulatory guidelines of any US industry, however, a number of
important consumer and privacy issues remain to be addressed before this
can be considered a complete solution," said CDT Staff Counsel Deirdre
Mulligan, who focuses on privacy issues.
COMPANIES' PROPOSAL RESPONDS TO PRIVACY CONCERNS
The IRSG proposal responds to concerns raised by Internet users and
privacy advocates last September, available at
http://www.cdt.org/privacy/960920_Lexis.html, by:
* prohibiting the distribution of Social Security Numbers, dates of birth,
unlisted phone numbers, and mothers' maiden names to the general public;
* prohibiting "reverse Social Security Number (SSN)" look-ups (finding a name
or address based on an SSN);
* requiring companies offering look-up services to the general public to allow
people to "opt-out" of these databases;
* providing individuals with access to information held by the companies that
does not come >from public records; and
* prohibiting the distribution of information about children unless it is for
the purpose of locating a missing child.
Experian, LEXIS-NEXIS and the other companies have promised to exchange
database information only with other companies who also follow these
principles, a decision that will increase the principles' effectiveness.
Signers of the IRSG proposal also agree to undergo yearly audits of their
practices and to make those audits available to the public. The audit
records and the principles will help the FTC investigate instances where
companies have not complied with the guidelines.
SEVERAL IMPORTANT AREAS STILL BE BE ADDRESSED BY GUIDELINES
The IRSG proposal falls short of providing complete protection for
sensitive consumer information in a number of important areas, Mulligan
said. They include the following:
* Individuals will not be provided access to public records held by the
companies that sign the proposal.
CDT believes that the companies should provide individuals full access to
their own personal information. These companies have an important role to
play--just as they serve as a one-stop shopping source for other
businesses, they should allow individuals access to information >from a
centralized source.
* Individuals will not be notified of adverse decisions based on data in the
companies' files.
Many people are unaware that others are using information services to make
decisions about them. If data in a company's file comes from inaccurate
public records or has been inaccurately transcribed, a consumer could be
harmed. People should be notified when information >from the IRSG
companies' files are used to make decisions about them so that they can
correct inaccurate data, challenge inaccurate assumptions, or deal with
real problems reflected in the data.
* The IRSG companies will not maintain detailed audit trails, even though they
will undergo yearly audits.
CDT believes that accountability requires strict oversight over access to
and use of personal information. When the end-users of sensitive personal
data are law enforcement personnel, employers, or others who can exercise
power over the consumer, an audit trail that documents the end-user's
treatment of personal information would help curb abuses, prevent
unauthorized access, and provide accountability to the system.
* Individual consumers have no SIMPLE way to SEEK RELIEF from violations of the
guidelines.
The IRSG proposal doesn't provide a grievance process nor remedies for
consumers who believe credit decisions have been made on the basis of
inaccurate data. CDT hopes that the industry and the FTC will work to craft
a grievance process and remedies that are responsive to consumers' needs.
CDT believes that the IRSG proposal is a noteworthy step towards meaningful
self-regulatory guidelines. We commend the FTC for their work in this area
and encourage the agency to continue to monitor not only further
developments in this area, but also the implementation and compliance with
the IRSG guidelines. Strong enforcement of the guidelines and consumer
education are key to effective work in this area.
Still, as we noted last year, the wide spread availability and use of
public record information is a continuing breeding ground for privacy
concerns. See http://www.cdt.org/privacy/961008_Sen_let.html. As the FTC
notes in its report, "the easy availability of sensitive, unique
identifiers (e.g. Social Security number, mother's maiden name, and date of
birth) listed on public records increases the risk of serious harm."
Those IRSG companies with Web sites include:
Acxiom Corporation http://www.acxiom.com/
CDB Infotek, a choicePoint Company http://www.cdb.com/public/
Equifax Credti Information Services, http://www.equifax.com/
Experian http://www.experian.com/
First Data Solutions Inc.
http://www.firstdatacorp.com/busunits/busunits.html#fds
Information Amercia Inc. http://www.infoam.com/
IRSC Inc http://www.irsc.com/
LEXIS-NEXIS http://www.LEXIS-NEXIS.com/
Metromial Corporation http://www.metromail.com/
Trans Union Corp http://www.transunion.com/
________________________________________________________________
(2) SUBSCRIPTION INFORMATION
Be sure you are up to date on the latest public policy issues affecting
civil liberties online and how they will affect you! Subscribe to the CDT
Policy Post news distribution list. CDT Policy Posts, the regular news
publication of the Center For Democracy and Technology, are received by
more than 13,000 Internet users, industry leaders, policy makers and
activists, and have become the leading source for information about
critical free speech and privacy issues affecting the Internet and other
interactive communications media.
To subscribe to CDT's Policy Post list, send mail to
majordomo@cdt.org
in the BODY of the message (leave the SUBJECT LINE BLANK), type
subscribe policy-posts
If you ever wish to remove yourself from the list, send mail to the
above address with a subject of:
unsubscribe policy-posts
__________________________________________________________________
(3) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US
The Center for Democracy and Technology is a non-profit public interest
organization based in Washington, DC. The Center's mission is to develop
and advocate public policies that advance democratic values and
constitutional civil liberties in new computer and communications
technologies.
Contacting us:
General information: info@cdt.org
World Wide Web: http://www.cdt.org/
Snail Mail: The Center for Democracy and Technology
1634 Eye Street NW * Suite 1100 * Washington, DC 20006
(v) +1.202.637.9800 * (f) +1.202.637.0968
------------------------------
Date: Mon, 22 Dec 97 20:09:06 EST
From: Computer Privacy Digest Moderator <comp-privacy@UWM.EDU>
Subject: File 5-- Clinton Signs "No Electronic Theft Act"
Source: Computer Privacy Digest Mon, 22 Dec 97 Volume 11 : Issue: 025
From--Monty Solomon <monty@roscom.COM>
Date--17 Dec 1997 14:31:46 -0500
<http://www.news.com/News/Item/0,4,17443,00.html?dtn.head>
Clinton signs Net antipiracy act
By Courtney Macavinta
December 17, 1997, 10:00 a.m. PT
President Clinton signed a law that makes online piracy a felony
offense, even if the guilty parties never profit from exchanging
unauthorized digital copies of software, music, or literature.
Drafted by Rep. Bob Goodlatte (R-Virginia), the No Electronic Theft
(NET) Act, signed yesterday, makes distributing or possessing illegal
copies of online copyrighted material a federal crime if the value of
the works is $2,500 or more.
Based on the new law, offenders could get up to five years in prison
and a $250,000 fine for "willfully" possessing ten or more illegal
digital copies of film clips or computer programs, for example. A
misdemeanor charge will be filed for copied material with a retail
value of $1,000 or more, and comes with up to a one-year jail term.
There are a slew of high-tech and Net-related bills awaiting Congress
members when they return from vacation in January. So far, however, the
NET Act is only the third high-tech bill signed by Clinton this year.
In August, the president approved an export tax exemption of up to 15
percent for the software industry, which other industries had enjoyed
since 1971. He also approved $425 million for the Education
Department's Technology Literacy Challenge Fund, which allocates funds
to states for hardware, software, and online access.
The Software Publishers Association (SPA) and the U.S. Copyright Office
lobbied for the bill's passage. But the 80,000-member Association for
Computing Machinery urged Clinton to veto the bill. The international
group of computer scientists argued that the law would undermine the
public's right to use portions of copyrighted material under the U.S.
'fair use' doctrine.
However, some legal experts disputed the association's claims. Still,
the new law gives the Microsoft-backed SPA more ammunition in its
ongoing crackdown on alleged Net pirates who share, as opposed to
selling, unauthorized copies of valuable software.
Internet editor Jeff Pelline contributed to this report.
========
The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa. The digest is moderated and
gatewayed into the moderated USENET newsgroup comp.society.privacy.
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.
-----------
A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Web browsers will find it at http://www.uwm.edu/org/comp-privacy/
People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.
Ftp users should Login as "ftp" with password identifying
yourid@yoursite. The archives are in the directory
"pub/comp-privacy".
------------------------------
From: George J Kamenz <z005318b@BC.SEFLIN.ORG>
Sender: George J Kamenz <z005318b@BC.SEFLIN.ORG>
Subject: File 6--No Electronic Theft Act; who's to judge?
Fortunately (for the those who might be accused, rather than the author)
"retail price" is not the same as a falsely inflated list price. An
attempt to pursue an action based on a falsely inflated prices is very
nearly doomed. As long as the accused or the accused's attorney is aware
of the past rulings that deal with actual prices paid rather than one
falsely claimed by the accuser everything will work out okay.
The same holds for selective enforcement of copyrights. The main reason a
huge, rich firm like Disney goes after every copyright violation so
fiercely, even one by a small, poor day care center with hand painted,
not-for-profit, just to amuse the children material, is to maintain the
copyright. If the accused or the accused's attorney is aware of the
rulings that deal with selective enforcement everything will work out
okay.
Of course that isn't to say the accused isn't going to have to spend money
and time on a defense, after all justice isn't free.
On Mon, 22 Dec 1997, Cu Digest wrote:
> From: wouter van den berg <wfberg@dds.nl>
> Just one of the many scary aspects of the NET-Act, is that whether or
> not copyright infringment is a criminal offense is dictated by the
> "retail value".
> One way to abuse this is to put a pricetag on, for example, your
> homepage. If it's visited by some-one you dislike, you can then press
> charges.
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #10.01
************************************