924 lines
42 KiB
Plaintext
924 lines
42 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun Nov 7 1993 Volume 5 : Issue 84
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Eatitor: Etaoin Shrdlu, III
|
|||
|
|
|||
|
CONTENTS, #5.84 (Nov 7 1993)
|
|||
|
File 1--Computers, Freedom, and Privacy '94 Conference
|
|||
|
File 2--CFP '94 Scholarship Announcements
|
|||
|
File 3--Korea 94: Call for Papers
|
|||
|
File 4--CPSR NII Paper
|
|||
|
File 5--DES: Broken!
|
|||
|
File 6--NAFTA mandates software patents (fwd)
|
|||
|
File 7--Phiber Optik Sentenced to One Year in Prison
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
|
|||
|
UNITED STATES:
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|||
|
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: 1 Nov 93 09:59:46 CST
|
|||
|
From: 7TRUBOW@JMLS.EDU
|
|||
|
Subject: File 1--Computers, Freedom, and Privacy '94 Conference
|
|||
|
|
|||
|
((MODERATORS' NOTE: We will re-run the CFP '94 information
|
|||
|
periodically to remind readers that, although it will be held in
|
|||
|
March, that various deadlines for proposals, scholarships, and paper
|
|||
|
competition loom)).
|
|||
|
|
|||
|
COMPUTERS, FREEDOM, AND PRIVACY '94
|
|||
|
Conference Announcement
|
|||
|
Scholarships, Writing Competition Notice
|
|||
|
23-26 March 1994, Chicago, Il.
|
|||
|
|
|||
|
The fourth annual conference, "Computers, Freedom, and
|
|||
|
Privacy," (CFP'94) will be held in Chicago, Il., March 23-26, 1994.
|
|||
|
The conference is hosted by The John Marshall Law School; George B.
|
|||
|
Trubow, professor of law and director of the Center for Informatics
|
|||
|
Law at John Marshall, is general chair of the conference. The
|
|||
|
program is sponsored jointly by these Association for Computing
|
|||
|
Machinery (ACM) Special Interest Groups: Communications (SIGCOMM);
|
|||
|
Computers and Society (SIGCAS); Security, Audit and Control
|
|||
|
(SIGSAC).
|
|||
|
|
|||
|
The advance of computer and communications technologies holds
|
|||
|
great promise for individuals and society. From conveniences for
|
|||
|
consumers and efficiencies in commerce to improved public health
|
|||
|
and safety and increased participation in government and community,
|
|||
|
these technologies are fundamentally transforming our environment
|
|||
|
and our lives.
|
|||
|
|
|||
|
At the same time, these technologies present challenges to the
|
|||
|
idea of a free and open society. Personal privacy and corporate
|
|||
|
security is at risk from invasions by high-tech surveillance and
|
|||
|
monitoring; a myriad of personal information data bases expose
|
|||
|
private life to constant scrutiny; new forms of illegal activity
|
|||
|
may threaten the traditional barriers between citizen and state and
|
|||
|
present new tests of Constitutional protection; geographic
|
|||
|
boundaries of state and nation may be recast by information
|
|||
|
exchange that knows no boundaries in global data networks.
|
|||
|
|
|||
|
CFP'94 will assemble experts, advocates and interest groups
|
|||
|
from diverse perspectives and disciplines to consider freedom and
|
|||
|
privacy in today's "information society. Tutorials will be offered
|
|||
|
on March 23, 1994, from 9:00 a.m. - noon and 2:00 - 500 p.m. The
|
|||
|
conference program is Thursday, March 24, through Saturday, March
|
|||
|
26, 1994, and will examine the potential benefits and burdens of
|
|||
|
new information and communications technologies and consider ways
|
|||
|
in which society can enjoy the benefits while minimizing negative
|
|||
|
implications.
|
|||
|
|
|||
|
STUDENT PAPER COMPETITION
|
|||
|
|
|||
|
Full time college or graduate students may enter the student
|
|||
|
paper competition. Papers must not exceed 3000 words and should
|
|||
|
address the impact of computer and telecommunications technologies
|
|||
|
on freedom and privacy in society. Winners will receive financial
|
|||
|
support to attend the conference and present their papers. All
|
|||
|
papers should be submitted by December 15, 1993, (either as
|
|||
|
straight text via e-mail or 6 printed copies) to: Prof. Eugene
|
|||
|
Spafford, Department of Computer Science, Purdue University, West
|
|||
|
Lafayette, IN 47907-2004. E-Mail: spaf@cs.purdue.edu; Voice:
|
|||
|
317-494-7825
|
|||
|
|
|||
|
|
|||
|
SCHOLARSHIPS
|
|||
|
|
|||
|
The Chair for scholarships is John McMullen, assisted by Jim
|
|||
|
Thomas, Sociology, Northern Illinois University, DeKalb, IL.
|
|||
|
60115-2854. For more information, contact John McMullen
|
|||
|
(mcmullen@well.sf.ca.us). Scholarships will cover only the cost of the
|
|||
|
registration fee, which includes 3 luncheons, 2 receptions, 2 dinners
|
|||
|
and conference materials.
|
|||
|
|
|||
|
CONFERENCE REGISTRATION INFORMATION
|
|||
|
|
|||
|
Registration fees are as follows:
|
|||
|
If paid by: 1/31/94 3/15/94 4/23/94
|
|||
|
Early Regular Late
|
|||
|
|
|||
|
Tutorial $145 $175 $210
|
|||
|
Conference 315 370 420
|
|||
|
|
|||
|
NOTE: ACM members (give membership number) and John Marshall Alumni
|
|||
|
(give graduation date) receive a $10 discount from Tutorial and $15
|
|||
|
discount from Conference fees.
|
|||
|
|
|||
|
CONFERENCE REGISTRATION: Inquiries regarding registration should be
|
|||
|
directed to RoseMarie Knight, Registration Chair, at the JMLS
|
|||
|
address above; her voice number is 312-987-1420; E-mail,
|
|||
|
6rknight@jmls.edu.
|
|||
|
|
|||
|
CONFERENCE INFORMATION: Communications regarding the conference
|
|||
|
should be sent to: CFP'94, The John Marshall Law School, 315 S.
|
|||
|
Plymouth Ct., Chicago, IL 60604-3907
|
|||
|
(Voice: 312-987-1419; Fax: 312-427-8307; E-mail: CFP94@jmls.edu)
|
|||
|
|
|||
|
ROOM RESERVATIONS: The Palmer House Hilton, located in Chicago's
|
|||
|
"loop," and only about a block from The John Marshall Law School,
|
|||
|
is the conference headquarters. Room reservations only should be
|
|||
|
made directly with the hotel, mentioning "CFP'94" to get the
|
|||
|
special conference rate of $99.00, plus tax. (17 E. Monroe.,
|
|||
|
Chicago, Il., 60603, Tel: 312-726-7500; 1-800-HILTONS; Fax
|
|||
|
312-263-2556)
|
|||
|
|
|||
|
|
|||
|
NOTE: More specific information about conference program
|
|||
|
content will be available December 1, 1993.
|
|||
|
|
|||
|
***********
|
|||
|
George B. Trubow, Professor of Law
|
|||
|
Director, Center for Informatics Law
|
|||
|
The John Marshall Law School
|
|||
|
315 S. Plymouth Ct.
|
|||
|
Chicago, IL 60604-3907
|
|||
|
Fax: 312-427-8307; Voice: 312-987-1445
|
|||
|
E-mail: 7trubow@jmls.edu
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 01 Nov 93 10:00:42 EST
|
|||
|
From: mcmullen@MINDVOX.PHANTOM.COM(John F. McMullen)
|
|||
|
Subject: File 2--CFP '94 Scholarship Announcements
|
|||
|
|
|||
|
The Conference on Computers, Freedom & Privacy (CFP'94) is pleased to
|
|||
|
announce that it will once again provide a number of full tuition
|
|||
|
scholarships for attendance at the conference. The conference will be
|
|||
|
held in Chicago, IL from March 23rd through March 26th, 1995 and will
|
|||
|
be hosted by the John Marshall Law School under the chairmanship of
|
|||
|
George Trubow.
|
|||
|
|
|||
|
The conference traditionally attracts an extremely diverse group of
|
|||
|
persons concerned with issues relating to the rapid development of the
|
|||
|
"information society"; civil libertarians, information providers, law
|
|||
|
enforcement personnel, privacy advocates, "hackers", sociologists,
|
|||
|
educators and students, computer professionals, cryptography
|
|||
|
advocates, government policy makers and other interested parties have
|
|||
|
all played major roles in the three previous conference.
|
|||
|
|
|||
|
Speakers at previous conferences have included Electronic Frontier
|
|||
|
Foundation (EFF) co-founders John Perry Barlow and Mitch Kapor, FBI
|
|||
|
Deputy Director William A. "Al" Bayse, writer Bruce Sterling, privacy
|
|||
|
advocate Simon Davies, Harvard University law professor Lawrence
|
|||
|
Tribe, hacker "Phiber Optik", Georgetown University's Dorothy Denning,
|
|||
|
"Cuckoo's Egg" author Clifford Stoll, Prodigy counsel George Perry,
|
|||
|
USA Today founder Al Neuwith, former FCC Chairman Nicholas Johnson,
|
|||
|
Computer Professionals for Social Responsibility (CPSR)'s Marc
|
|||
|
Rotenberg, Arizona prosecutor Gail Thackeray, and Bay Area Women in
|
|||
|
Computing's Judi Clark.
|
|||
|
|
|||
|
The scholarships are intended to provide access to the conference to
|
|||
|
those that would like to attend the conference but are unable to
|
|||
|
afford the tuition. They are available to undergraduate and graduate
|
|||
|
students in any discipline (previous student attendees have come from
|
|||
|
computer science, law, sociology, liberal arts, journalism, and
|
|||
|
womens' studies backgrounds), law enforcement personnel, hackers,
|
|||
|
social scientists, and others interested in the future of the
|
|||
|
information society.
|
|||
|
|
|||
|
Persons interested in a scholarship should send the following
|
|||
|
information (e-mail greatly preferred) to:
|
|||
|
|
|||
|
John F. McMullen
|
|||
|
CFP'94 Scholarship Chair
|
|||
|
Perry Street
|
|||
|
Jefferson Valley, NY 10535
|
|||
|
|
|||
|
mcmullen@panix.com
|
|||
|
(914) 245-2734 (voice)
|
|||
|
(914) 245-8464 (fax)
|
|||
|
|
|||
|
1. Personal Information -- Name, Addresses (including e-mail), Phone
|
|||
|
Numbers, School and/or Business Affiliation
|
|||
|
|
|||
|
2. Short Statement explaining what the applicant helps to get from
|
|||
|
CFP'94 and what impact that attendance may have in the applicant's
|
|||
|
community or future work.
|
|||
|
|
|||
|
3. Stipulation that the applicant understands that he/she is
|
|||
|
responsible for transportation and lodging expenses related to the
|
|||
|
conference. The scholarship includes tuition and those meals included
|
|||
|
with the conference.
|
|||
|
|
|||
|
4. Stipulation that the applicant would not be able to attend the
|
|||
|
conference if a scholarship is not granted.
|
|||
|
|
|||
|
5. Stipulation that the applicant, if granted a scholarship, will
|
|||
|
attend the conference.
|
|||
|
|
|||
|
6. Stipulation that the applicant, if granted a scholarship, will
|
|||
|
provide a written critique of the conference to the scholarship
|
|||
|
committee by April 30, 1994.
|
|||
|
|
|||
|
Applications will be accepted until December 31, 1993 and scholarship
|
|||
|
winners will be notified by approximately February 1, 1994.
|
|||
|
|
|||
|
Please contact John McMullen at the above e-mail address or phone
|
|||
|
numbers with any questions.
|
|||
|
|
|||
|
John F. McMullen mcmullen@mindvox.phantom.com Consultant,
|
|||
|
knxd@maristb.bitnet mcmullen@well.sf.ca.us Writer,
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 24 Oct 1993 19:23:21 CDT
|
|||
|
From: Joel Sax <jsax@IGC.APC.ORG>
|
|||
|
Subject: File 3--Korea 94: Call for Papers
|
|||
|
|
|||
|
+------------------------Original message----------------------------
|
|||
|
Respond to hfrederick@igc.apc.org.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Subject--Korea 94*Intl Communication*Call for Papers
|
|||
|
|
|||
|
[Please excuse if you have received this by other channels.
|
|||
|
Please feel free to cross-post as appropriate. Howard Frederick]
|
|||
|
|
|||
|
Call for Papers
|
|||
|
|
|||
|
International Communication Section
|
|||
|
INTERNATIONAL ASSOCIATION
|
|||
|
FOR MASS COMMUNICATION RESEARCH
|
|||
|
|
|||
|
"Communication in the New Millennium:
|
|||
|
Communication Technology for Humanity"
|
|||
|
|
|||
|
July 3-8, 1994, Seoul, Korea
|
|||
|
|
|||
|
The International Association for Mass Communication Research (IAMCR)
|
|||
|
is the largest professional organization in its field. The Association has
|
|||
|
consultative status with various United Nations bodies and cooperates
|
|||
|
closely with regional communication research associations.
|
|||
|
|
|||
|
The conference theme COMMUNICATION IN THE NEW MILLENNIUM:
|
|||
|
COMMUNICATION TECHNOLOGY FOR HUMANITY reminds us that the technology and
|
|||
|
the process of human communication within and between national societies is
|
|||
|
essential for building a shared world that protects both the biosphere and
|
|||
|
the sociosphere.
|
|||
|
|
|||
|
All correspondence and submissions shall be directed to the Section
|
|||
|
convenor: Howard H. Frederick, School of International Service, The
|
|||
|
American University, Washington, DC 20016 USA. Office: +1-202-885-1635
|
|||
|
Fax: +1-202-885-2494 Email: hfrederick@igc.apc.org
|
|||
|
|
|||
|
With the author's permission, papers accepted for the Section's panels
|
|||
|
will be recommended for appropriate issues of _Journal of International
|
|||
|
Communication_.
|
|||
|
|
|||
|
PANELS OF THE INTERNATIONAL COMMUNICATION SECTION
|
|||
|
|
|||
|
INTERNATIONAL RELATIONS AND THE TECHNOLOGIES OF INTERNATIONAL
|
|||
|
COMMUNICATION. Examines the impact global channels of communication on
|
|||
|
international relations.
|
|||
|
|
|||
|
INTERNATIONAL COMMUNICATION AND INTERNATIONAL CONFLICT: LESSONS FROM
|
|||
|
RECENT HISTORY. Examines how mass media coverage has affected
|
|||
|
international crises, with a special focus on events in Asia. Papers are
|
|||
|
especially invited on Bosnia, Cambodia, Somalia, Korea, Palestine, East
|
|||
|
Timor.
|
|||
|
|
|||
|
INTERNATIONAL BROADCASTING AND INTERNATIONAL RELATIONS. Explores the the
|
|||
|
role of international broadcasting in international affairs.
|
|||
|
|
|||
|
THE MACBRIDE MOVEMENT AND THE EVOLVING RIGHT TO COMMUNICATE Investigates
|
|||
|
the movement for a new international information and communication order,
|
|||
|
human rights, and especially the evolving right to communicate. Assesses
|
|||
|
the progress and prospects of the movement toward a new world information
|
|||
|
and communication order.
|
|||
|
|
|||
|
GLOBAL COMMUNICATION AS A FIELD OF RESEARCH AND EDUCATION IN THE POST COLD
|
|||
|
WAR ERA Questions the traditional definitions of international
|
|||
|
communication and its impact on communication education in light of the
|
|||
|
globalization of all communication research.
|
|||
|
|
|||
|
THE CULTURAL AND POLITICAL CONTEXT OF TELECOMMUNICATIONS POLICY: ASIAN
|
|||
|
CONCERNS. Probes the issues and controversies surrounding regional and
|
|||
|
international telecommunications policy with a special focus on Asia.
|
|||
|
|
|||
|
OLYMPISM AND GLOBAL CIVIL SOCIETY. Explores the social and political
|
|||
|
impact of media channels on sports, and especially the Olympic Games.
|
|||
|
|
|||
|
COMPUTERS AND INTERNATIONAL COMMUNICATIONS. Examines the growing impact of
|
|||
|
global computer networks on the field of international communications.
|
|||
|
|
|||
|
JOURNAL OF INTERNATIONAL COMMUNICATION. Discusses how the International
|
|||
|
Communication Section can assist the emergence of this new academic
|
|||
|
journal.
|
|||
|
|
|||
|
COMMUNICATION AND CULTURAL INDUSTRIES. Examines role of entertainment
|
|||
|
programming in national development with a focus on soap opera/telenovelas,
|
|||
|
serial fiction, infotainment, co-productions, and reality-based series.
|
|||
|
|
|||
|
The International Communication Section will hold elections in Korea for a
|
|||
|
new President/Convenor. People who are interested in running may send
|
|||
|
their names to Ingrid Schulze by January 15 (see address below) and should
|
|||
|
include a curriculum vita and a 250-word statement of intention.
|
|||
|
Candidates nominations will be accepted until July 1994.
|
|||
|
|
|||
|
The International Communication Section is currently led by a President
|
|||
|
(Howard Frederick, see above) and three Vice Presidents: Abbas Malek,
|
|||
|
Department of Radio-Television-Film, Howard University, School of
|
|||
|
Communications, Washington DC 20059 USA +1-202-806-7927 (o) +1-703-849-0019
|
|||
|
(h) +1-202-483-5352 (f) email: amalek@auvm.american.edu ; Ingrid Schulze
|
|||
|
Schneider, Universidad Complutense, Facultad de C.C.I.I, Avda. Complutense,
|
|||
|
S/N, Madrid 28040 Spain +34-1-394-2131 (o) +34-1-859-9218 (h) +34-1-859-
|
|||
|
9692 (f) ; Anantha Babbili, Texas Christian University, Department of
|
|||
|
Journalism, Box 32930, Fort Worth TX 76129 USA +1-817-921-7425 (o) +1-817-
|
|||
|
732-2990 (h) +1-817-921-7133 (f) email: babbili@gamma.is.tcu.edu
|
|||
|
|
|||
|
How to respond to the Calls for Papers
|
|||
|
|
|||
|
Abstracts (2 pages or about 800 words) should be sent before 15 January
|
|||
|
1994 to the convenor.
|
|||
|
|
|||
|
At the same time the author should send a Brief Abstract (200 words) to the
|
|||
|
convenor. Brief Abstracts of accepted papers will be published in the "Book
|
|||
|
of Abstracts" which all conference participants will receive in Seoul.
|
|||
|
|
|||
|
The convenors will select Papers to be presented, and inform the authors
|
|||
|
accordingly by 15 February 1994. At the same time convenors should send
|
|||
|
Brief Abstracts of accepted papers to the editor of the Seoul "Book of
|
|||
|
Abstracts", IAMCR Secretary General Robin Cheesman.
|
|||
|
|
|||
|
For Brief Abstracts use the form included in the October IAMCR Newsletter.
|
|||
|
Or you may send your Brief Abstract by e-mail (preferred).
|
|||
|
|
|||
|
Final papers have to reach convenors not later than 30 March 1994.
|
|||
|
Abstracts and Papers can be sent by mail or when appropriate by e-mail. Do
|
|||
|
not use fax, since the quality of fax is not good enough for reproduction
|
|||
|
and we do not retype them.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
|||
|
Date: Mon, 25 Oct 1993 21:14:55 EST
|
|||
|
Subject: File 4--CPSR NII Paper
|
|||
|
|
|||
|
CPSR NII Paper
|
|||
|
FOR IMMEDIATE RELEASE
|
|||
|
|
|||
|
Contact:
|
|||
|
Todd Newman (CA) 415-390-1614
|
|||
|
Eric Roberts (CA) 415-723-3642
|
|||
|
Coralee Whitcomb (MA) 617-356-4309
|
|||
|
Marc Rotenberg (D.C.) 202-544-9240
|
|||
|
|
|||
|
|
|||
|
COMPUTER SCIENTISTS RAISE SOCIAL AND DESIGN CONCERNS
|
|||
|
ABOUT THE INFORMATION HIGHWAY
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Palo Alto, Calif., October 25, 1993 -- In the wake of sudden
|
|||
|
corporate mergers and rapid technological developments, Computer
|
|||
|
Professionals for Social Responsibility (CPSR) today voiced concern
|
|||
|
that the planned information superhighway will not realize its full
|
|||
|
potential. The public interest organization put forward specific
|
|||
|
guidelines for the National Information Infrastructure (NII) in a
|
|||
|
paper titled, "Serving the Community: A Public-Interest Vision of
|
|||
|
the National Information Infrastructure." Urging the Clinton
|
|||
|
Administration to move quickly to adopt these principles, CPSR
|
|||
|
President Eric Roberts said, "Although there is widespread agreement
|
|||
|
on general goals, there is no specific plan to ensure that these goals
|
|||
|
are met."
|
|||
|
|
|||
|
"It is much easier to state a vision than to achieve it, " said Dr.
|
|||
|
Roberts, who is also Associate Chair of the Computer Science
|
|||
|
department at Stanford University. "And there are many dangers on
|
|||
|
the horizon that threaten to compromise the value of the NII as a
|
|||
|
resource for the public.
|
|||
|
|
|||
|
"For example, if a small number of companies dominate the market,
|
|||
|
we're in danger of stifling competition and innovation on the
|
|||
|
network. If those same companies control the programming, then
|
|||
|
open and diverse speech is limited. If pricing structures do not cover
|
|||
|
universal service, the average person and the poor will be struggling
|
|||
|
to use the backroads of the information highway. If privacy isn't
|
|||
|
protected, your TV could keep more detailed records of your finances
|
|||
|
than the IRS. And, if the NII is not designed to allow everyone to
|
|||
|
communicate freely and to publish their own contributions, it could
|
|||
|
become nothing more than a medium for delivering 500-channel
|
|||
|
television, with interactivity limited to home-shopping and trying to
|
|||
|
guess the next play during sporting events."
|
|||
|
|
|||
|
CPSR's paper expands on these dangers and makes specific policy and
|
|||
|
technical recommendations for the newly formed Information
|
|||
|
Infrastructure Task Force. The Task Force is expected to coordinate
|
|||
|
network policy for the Clinton Administration.
|
|||
|
|
|||
|
"In its 'Agenda for Action' document, the Administration has set forth
|
|||
|
a positive vision of what the NII can be," said Dr. Roberts. "To
|
|||
|
achieve that vision, however, the government must play a major role
|
|||
|
in the design, development, and regulation of the network." CPSR
|
|||
|
recommends that the Administration adopt the following policies:
|
|||
|
|
|||
|
o Promote widespread economic benefits by evaluating the NII's
|
|||
|
economic success using measures that reflect its impact on the
|
|||
|
society as a whole, not merely the profits of NII investors and
|
|||
|
service providers.
|
|||
|
|
|||
|
o Evaluate the social impact of the NII by conducting periodic
|
|||
|
reviews as the NII is implemented and used to guarantee that it
|
|||
|
continues to serve the public interest.
|
|||
|
|
|||
|
o Guarantee equitable and universal access through an appropriate
|
|||
|
mix of legislation, regulation, taxation, and direct subsidies.
|
|||
|
|
|||
|
o Promote the development of a vital civic sector by ensuring
|
|||
|
resources, training, and support for public spaces within the NII
|
|||
|
where citizens can pursue noncommercial activities.
|
|||
|
|
|||
|
o Promote a diverse and competitive marketplace in terms of the
|
|||
|
content carried over the NII.
|
|||
|
|
|||
|
o Provide access to government services and information over the
|
|||
|
NII.
|
|||
|
|
|||
|
o Encourage democratic participation by ensuring full public
|
|||
|
disclosure, and actively promoting democratic decision-making
|
|||
|
and public participation in all stages of the development process.
|
|||
|
|
|||
|
o Actively facilitate the seamless connection of America's NII with
|
|||
|
the information infrastructures of other nations by working to
|
|||
|
resolve such issues as security, censorship, tariffs, and privacy.
|
|||
|
|
|||
|
o Guarantee the functional integrity of the NII by establishing
|
|||
|
critical technical requirements including ease of use, widespread
|
|||
|
availability, full functionality, high reliability, adequate privacy
|
|||
|
protection, and evolutionary expansion.
|
|||
|
|
|||
|
The recommendations follow from a yearlong review of the NII
|
|||
|
conducted by CPSR. The process included collecting more than 1,200
|
|||
|
suggestions for NII policy from network users across the country,
|
|||
|
drafting a report, holding special chapter meetings on the NII in
|
|||
|
Berkeley, Boston, Seattle, and Washington, D.C., and having a
|
|||
|
multiple-draft review process by the membership. Final changes
|
|||
|
to the report were made at the annual meeting of CPSR, where the
|
|||
|
report was adopted unanimously by the CPSR Board of Directors.
|
|||
|
|
|||
|
Dr. Roberts noted that he was very pleased by the level of
|
|||
|
participation in the NII report. "The computer community knows
|
|||
|
that the NII is the critical technological issue facing the United States
|
|||
|
today. Our members were extremely responsive when we asked
|
|||
|
them to participate in this project, because they understand from
|
|||
|
their own experience how much the NII has to offer."
|
|||
|
|
|||
|
CPSR also worked closely with the Telecommunications Policy
|
|||
|
Roundtable (TPR), a coalition of more than sixty nonprofit, consumer,
|
|||
|
labor and civil rights organizations based in Washington, DC. CPSR's
|
|||
|
paper endorses the principles set forth by TPR. TPR will unveil its
|
|||
|
founding principles in a press conference, Tuesday, October 26th at
|
|||
|
10:00 a.m. at the National Press Club in Washington, D.C.
|
|||
|
|
|||
|
CPSR is planning a conference next April in Cambridge,
|
|||
|
Massachusetts, on the future of the NII, The Directions and
|
|||
|
Implications of Advanced Computing. The conference will
|
|||
|
investigate at a more specific level how to achieve the principles
|
|||
|
in the CPSR report.
|
|||
|
|
|||
|
Founded in 1981, CPSR is a national, nonprofit, public interest
|
|||
|
organization of computer professionals and others concerned with
|
|||
|
the impact of computer technology on society. With offices in Palo
|
|||
|
Alto, California, and Washington D.C., and 22 chapters across the
|
|||
|
country, CPSR works to encourage public discussion of decisions
|
|||
|
involving the use of computers in systems critical to society and to
|
|||
|
challenge the assumption that technology alone can solve political
|
|||
|
and social problems.
|
|||
|
|
|||
|
CPSR's NII paper is available electronically by sending email to
|
|||
|
listserv@cpsr.org. In the message write the command
|
|||
|
"GET CPSR NII_POLICY" The paper will automatically be mailed to
|
|||
|
you. You can also FTP/WAIS/Gopher cpsr.org/nii/cpsr_nii_policy.txt.
|
|||
|
|
|||
|
For a hard copy of the paper or for more information about CPSR,
|
|||
|
call 415-322-3778 or write to cpsr@cpsr.org. For information about
|
|||
|
the Telecommunications Policy Roundtable, contact Jeff Chester at
|
|||
|
202-628-2620 or cme@access.digex.net.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 29 Oct 1993 02:03:24 -0800
|
|||
|
From: jonpugh@NETCOM.COM(Jon Pugh)
|
|||
|
Subject: File 5--DES: Broken!
|
|||
|
|
|||
|
I would like to thank everyone who responded to my query regarding a
|
|||
|
report of DES being broken. I would especially like to thank Charles
|
|||
|
Mattair <mattair@synercom.hounix.org> for sending me Michael Wiener's
|
|||
|
entire paper ala PostScript. Mr. Wiener is employed by Bell-Northern
|
|||
|
Research in Ontario, Canada. Here is the abstract for his paper:
|
|||
|
|
|||
|
"Abstract. Despite recent improvements in analytic techniques for
|
|||
|
attacking the Data Encryption Standard (DES), exhaustive key search
|
|||
|
remains the most practical and efficient attack. Key search is
|
|||
|
becoming alarmingly practical. We show how to build an exhaustive DES
|
|||
|
key search machine for $1 million that can f ind a key in 3.5 hours on
|
|||
|
average. The design for such a machine is described in detail for the
|
|||
|
purpose of assessing the resistance of DES to an exhaustive attack.
|
|||
|
This design is based on mature technology to avoid making guesses
|
|||
|
about future capabilities. With this approach, DES keys can be found
|
|||
|
one to two orders of magnitude faster than other recently proposed
|
|||
|
designs. The basic machine design can be adapted to attack the
|
|||
|
standard DES modes of operation for a small penalty in running time.
|
|||
|
The issues of development cost and machine reliability are examined as
|
|||
|
well. In light of this work, it would be prudent in many applications
|
|||
|
to use DES in a triple-encryption mode."
|
|||
|
|
|||
|
The paper describes the basic search as beginning from a
|
|||
|
plaintext-ciphertext pair and trying keys until one is found which
|
|||
|
will turn the plaintext into the cyphertext. The basis for the
|
|||
|
technique's speed is that neither the plaintext or cyphertext needs to
|
|||
|
be output and thus IO bottlenecks are removed. This technique does
|
|||
|
not directly attack a given ciphertext without a corresponding
|
|||
|
plaintext and thus does not directly attempt to break a DES encrypted
|
|||
|
cyphertext.
|
|||
|
|
|||
|
Feel free to correct me if I am wrong, but I don't see the
|
|||
|
applicability of this machine in decrypting DES encoded information
|
|||
|
unless one is in possession of a "Rosetta Stone" using the same key,
|
|||
|
and I think the chances of that are highly unlikely.
|
|||
|
|
|||
|
The intent of the paper seems to be merely to indicate that DES is
|
|||
|
within the range of being broken. It closes with a proposal that all
|
|||
|
serious DES encryption be done in "triple-encryption mode". This is
|
|||
|
where you encode with key 1, decode with key 2 and encode with key 3.
|
|||
|
The middle operation seems to be reversed merely to give the operation
|
|||
|
the effect of being the same as a single DES encryption when the 3
|
|||
|
keys are identical, but to get the proper effect the three keys should
|
|||
|
be different and unrelated.
|
|||
|
|
|||
|
Thus, my initial take from the short report I saw before was
|
|||
|
misleading. DES is not really "broken" in that there is still no way
|
|||
|
to take an arbitrary cipertext and turn it into the proper plaintext
|
|||
|
in the 3.5 hours mentioned in the paper.
|
|||
|
|
|||
|
Once again, feel free to correct me if I am wrong. I will be making
|
|||
|
the paper available to the CuD archive and others once I get my
|
|||
|
anonymous ftp directory set up. It is 424K of PostScript and much too
|
|||
|
large to mail reliably (although I only lost 1 character when Charles
|
|||
|
mailed it to me in 10 parts). ;)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 1 Nov 1993 16:57:40 -1200
|
|||
|
From: ygoland@SEAS.UCLA.EDU
|
|||
|
Subject: File 6--NAFTA mandates software patents (fwd)
|
|||
|
|
|||
|
From--lpf@uunet.uu.net (The League for Programming Freedom)
|
|||
|
Sender--friedman@frob.com
|
|||
|
Subject--NAFTA mandates software patents
|
|||
|
Date--Fri, 29 Oct 93 20:57:36 -0400
|
|||
|
|
|||
|
[Please post this widely, wherever appropriate.
|
|||
|
|
|||
|
The LPF is also collecting signatures from famous people who would be
|
|||
|
willing to "lend their names". We plan to send this piece to Congress and
|
|||
|
elsewhere. If you're interested, please contact lpf@uunet.uu.net.]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NAFTA and Software Patents
|
|||
|
by the League for Programming Freedom
|
|||
|
|
|||
|
If you believe software patents are harmful to software
|
|||
|
development--or that the patent system for software has problems and
|
|||
|
needs to be changed--or if you are *not yet sure*--then you need to be
|
|||
|
concerned about NAFTA now.
|
|||
|
|
|||
|
Opposition to software patents seems to be the majority view in our
|
|||
|
field. Two ACM surveys at well-attended conferences (SIGCHI and
|
|||
|
SIGGRAPH) showed a large majority of attendees entirely opposed to
|
|||
|
software patents. Most of the software companies applying for patents
|
|||
|
say their actions are for defensive purposes, because they fear being
|
|||
|
attacked with patents.
|
|||
|
|
|||
|
Among those not prepared to advocate a system of no patents in
|
|||
|
software--the system the US had until a decade ago--many agree that
|
|||
|
some change needs to be made. Even the Patent Office has recognized
|
|||
|
there is a problem, and has scheduled hearings for 1994. But before
|
|||
|
the hearings start, NAFTA may make them futile. NAFTA probably
|
|||
|
directly or indirectly prohibits all the proposed approaches for
|
|||
|
addressing the problem.
|
|||
|
|
|||
|
Those of us entirely opposed to software patents would like to
|
|||
|
eliminate them. There are two ways of doing this. One is to exempt
|
|||
|
software from the patent system. NAFTA clearly bars such a change, by
|
|||
|
requiring that patents apply to products of any kind.
|
|||
|
|
|||
|
Another way is not to issue patents that cover computational steps
|
|||
|
alone. (This approach would not do anything about the thousands of
|
|||
|
existing software patents.) NAFTA does not directly address this sort
|
|||
|
of rule, but the "all fields of technology" requirement may rule out
|
|||
|
this approach. (There is no way to find out for certain now; what we
|
|||
|
can predict is that IBM will argue that it is ruled out.)
|
|||
|
|
|||
|
On the other hand, if we do not abolish software patents entirely, we
|
|||
|
could reduce their harmful impact by changing other aspects of the
|
|||
|
software patent system.
|
|||
|
|
|||
|
For example, some have proposed that patents on software should last
|
|||
|
just a few years, since a program a few years old is obsolete for most
|
|||
|
commercial purposes. But NAFTA requires patents to last at least
|
|||
|
seventeen years.
|
|||
|
|
|||
|
An automatic mandatory licensing system could eliminate most of the
|
|||
|
problems that patents cause. However, NAFTA forbids any sort of
|
|||
|
automatic mandatory licensing.
|
|||
|
|
|||
|
The conclusion: if you believe that software patents cause problems
|
|||
|
and that a change in the patent system *might* be necessary for
|
|||
|
software, then join us now in calling for the rejection of NAFTA as it
|
|||
|
stands, so that this part can be changed.
|
|||
|
|
|||
|
What you should do is write or phone your senators and representative.
|
|||
|
A brief letter in your own words is the most effective way to
|
|||
|
communicate your views to them. The following addresses work for all
|
|||
|
federal legislators:
|
|||
|
|
|||
|
Honorable ...
|
|||
|
US Senate
|
|||
|
Washington DC 20510
|
|||
|
|
|||
|
Honorable ...
|
|||
|
US House of Representatives
|
|||
|
Washington DC 20515
|
|||
|
|
|||
|
It is also useful to send a copy to Representative Gephardt (one of
|
|||
|
the leading opponents of NAFTA as it stands) as well as your own
|
|||
|
elected officials. If you write your letter by computer, it would be
|
|||
|
helpful to send a copy by email to lpf@uunet.uu.net. We could show
|
|||
|
these copies on other occasions such as when the Patent Office
|
|||
|
reconsiders the issue.
|
|||
|
|
|||
|
A second proposed treaty, GATT (General Agreement on Tariffs and
|
|||
|
Trade), has even stronger requirements on patents. So it would be
|
|||
|
useful to mention in your letter that you are concerned about GATT as
|
|||
|
well.
|
|||
|
|
|||
|
The success of the Liberal party in Canada gives us a reprieve--a
|
|||
|
chance for changing NAFTA. It's up to us to make sure this part of
|
|||
|
NAFTA is reconsidered. Let's not waste this opportunity.
|
|||
|
|
|||
|
For those interested in checking these conclusions, the text of the
|
|||
|
patents section of NAFTA appears below.
|
|||
|
%
|
|||
|
Article 1709: Patents
|
|||
|
[Text as received from U.S. government email server, with whitespace
|
|||
|
cleaned up.]
|
|||
|
|
|||
|
1. Subject to paragraphs 2 and 3, each Party shall make patents
|
|||
|
available for any inventions, whether products or processes, in all
|
|||
|
fields of technology, provided that such inventions are new, result
|
|||
|
from an inventive step and are capable of industrial application. For
|
|||
|
purposes of this Article, a Party may deem the terms "inventive step"
|
|||
|
and "capable of industrial application" to be synonymous with the
|
|||
|
terms "non-obvious" and "useful", respectively.
|
|||
|
|
|||
|
2. A Party may exclude from patentability inventions if
|
|||
|
preventing in its territory the commercial exploitation of the
|
|||
|
inventions is necessary to protect order public or morality, including
|
|||
|
to protect human, animal or plant life or health or to avoid serious
|
|||
|
prejudice to nature or the environment, provided that the exclusion is
|
|||
|
not based solely on the ground that the Party prohibits commercial
|
|||
|
exploitation in its territory of the subject matter of the patent.
|
|||
|
|
|||
|
3. A Party may also exclude from patentability:
|
|||
|
|
|||
|
(a) diagnostic, therapeutic and surgical methods for the
|
|||
|
treatment of humans or animals;
|
|||
|
|
|||
|
(b) plants and animals other than microorganisms; and
|
|||
|
|
|||
|
(c) essentially biological processes for the production of
|
|||
|
plants or animals, other than non-biological and
|
|||
|
microbiological processes for such production.
|
|||
|
|
|||
|
Notwithstanding subparagraph (b), each Party shall provide for the
|
|||
|
protection of plant varieties through patents, an effective scheme of
|
|||
|
sui generis protection, or both.
|
|||
|
|
|||
|
4. If a Party has not made available product patent protection
|
|||
|
for pharmaceutical or agricultural chemicals commensurate with
|
|||
|
paragraph 1:
|
|||
|
|
|||
|
(a) as of January 1, 1992, for subject matter that relates
|
|||
|
to naturally occurring substances prepared or produced by,
|
|||
|
or significantly derived from, microbiological processes and
|
|||
|
intended for food or medicine, and
|
|||
|
|
|||
|
(b) as of July 1, 1991, for any other subject matter,
|
|||
|
|
|||
|
that Party shall provide to the inventor of any such product or its
|
|||
|
assignee the means to obtain product patent protection for such
|
|||
|
product for the unexpired term of the patent for such product granted
|
|||
|
in another Party, as long as the product has not been marketed in the
|
|||
|
Party providing protection under this paragraph and the person seeking
|
|||
|
such protection makes a timely request.
|
|||
|
|
|||
|
5. Each Party shall provide that:
|
|||
|
|
|||
|
(a) where the subject matter of a patent is a product, the
|
|||
|
patent shall confer on the patent owner the right to prevent
|
|||
|
other persons from making, using or selling the subject
|
|||
|
matter of the patent, without the patent owner's consent;
|
|||
|
and
|
|||
|
|
|||
|
(b) where the subject matter of a patent is a process, the
|
|||
|
patent shall confer on the patent owner the right to prevent
|
|||
|
other persons from using that process and from using,
|
|||
|
selling, or importing at least the product obtained directly
|
|||
|
by that process, without the patent owner's consent.
|
|||
|
|
|||
|
6. A Party may provide limited exceptions to the exclusive rights
|
|||
|
conferred by a patent, provided that such exceptions do not
|
|||
|
unreasonably conflict with a normal exploitation of the patent and do
|
|||
|
not unreasonably prejudice the legitimate interests of the patent
|
|||
|
owner, taking into account the legitimate interests of other persons.
|
|||
|
|
|||
|
7. Subject to paragraphs 2 and 3, patents shall be available and
|
|||
|
patent rights enjoyable without discrimination as to the field of
|
|||
|
technology, the territory of the Party where the invention was made
|
|||
|
and whether products are imported or locally produced.
|
|||
|
|
|||
|
8. A Party may revoke a patent only when:
|
|||
|
|
|||
|
(a) grounds exist that would have justified a refusal to
|
|||
|
grant the patent; or
|
|||
|
|
|||
|
(b) the grant of a compulsory license has not remedied the
|
|||
|
lack of exploitation of the patent.
|
|||
|
|
|||
|
9. Each Party shall permit patent owners to assign and transfer
|
|||
|
by succession their patents, and to conclude licensing contracts.
|
|||
|
|
|||
|
10. Where the law of a Party allows for use of the subject matter
|
|||
|
of a patent, other than that use allowed under paragraph 6, without
|
|||
|
the authorization of the right holder, including use by the government
|
|||
|
or other persons authorized by the government, the Party shall respect
|
|||
|
the following provisions:
|
|||
|
|
|||
|
(a) authorization of such use shall be considered on its
|
|||
|
individual merits;
|
|||
|
|
|||
|
(b) such use may only be permitted if, prior to such use,
|
|||
|
the proposed user has made efforts to obtain authorization
|
|||
|
from the right holder on reasonable commercial terms and
|
|||
|
conditions and such efforts have not been successful within
|
|||
|
a reasonable period of time. The requirement to make such
|
|||
|
efforts may be waived by a Party in the case of a national
|
|||
|
emergency or other circumstances of extreme urgency or in
|
|||
|
cases of public non-commercial use. In situations of
|
|||
|
national emergency or other circumstances of extreme
|
|||
|
urgency, the right holder shall, nevertheless, be notified
|
|||
|
as soon as reasonably practicable. In the case of public
|
|||
|
non-commercial use, where the government or contractor,
|
|||
|
without making a patent search, knows or has demonstrable
|
|||
|
grounds to know that a valid patent is or will be used by or
|
|||
|
for the government, the right holder shall be informed
|
|||
|
promptly;
|
|||
|
|
|||
|
(c) the scope and duration of such use shall be limited to
|
|||
|
the purpose for which it was authorized;
|
|||
|
|
|||
|
(d) such use shall be non-exclusive;
|
|||
|
|
|||
|
(e) such use shall be non-assignable, except with that
|
|||
|
part of the enterprise or goodwill that enjoys such use;
|
|||
|
|
|||
|
(f) any such use shall be authorized predominantly for the
|
|||
|
supply of the Party's domestic market;
|
|||
|
|
|||
|
(g) authorization for such use shall be liable, subject to
|
|||
|
adequate protection of the legitimate interests of the
|
|||
|
persons so authorized, to be terminated if and when the
|
|||
|
circumstances that led to it cease to exist and are unlikely
|
|||
|
to recur. The competent authority shall have the authority
|
|||
|
to review, on motivated request, the continued existence of
|
|||
|
these circumstances;
|
|||
|
|
|||
|
(h) the right holder shall be paid adequate remuneration
|
|||
|
in the circumstances of each case, taking into account the
|
|||
|
economic value of the authorization;
|
|||
|
|
|||
|
(i) the legal validity of any decision relating to the
|
|||
|
authorization shall be subject to judicial or other
|
|||
|
independent review by a distinct higher authority;
|
|||
|
|
|||
|
(j) any decision relating to the remuneration provided in
|
|||
|
respect of such use shall be subject to judicial or other
|
|||
|
independent review by a distinct higher authority;
|
|||
|
|
|||
|
(k) the Party shall not be obliged to apply the conditions
|
|||
|
set out in subparagraphs (b) and (f) where such use is
|
|||
|
permitted to remedy a practice determined after judicial or
|
|||
|
administrative process to be anticompetitive. The need to
|
|||
|
correct anticompetitive practices may be taken into account
|
|||
|
in determining the amount of remuneration in such cases.
|
|||
|
Competent authorities shall have the authority to refuse
|
|||
|
termination of authorization if and when the conditions that
|
|||
|
led to such authorization are likely to recur;
|
|||
|
|
|||
|
(l) the Party shall not authorize the use of the subject
|
|||
|
matter of a patent to permit the exploitation of another
|
|||
|
patent except as a remedy for an adjudicated violation of
|
|||
|
domestic laws regarding anticompetitive practices.
|
|||
|
|
|||
|
11. Where the subject matter of a patent is a process for
|
|||
|
obtaining a product, each Party shall, in any infringement proceeding,
|
|||
|
place on the defendant the burden of establishing that the allegedly
|
|||
|
infringing product was made by a process other than the patented
|
|||
|
process in one of the following situations:
|
|||
|
|
|||
|
(a) the product obtained by the patented process is new;
|
|||
|
or
|
|||
|
|
|||
|
(b) a substantial likelihood exists that the allegedly
|
|||
|
infringing product was made by the process and the patent
|
|||
|
owner has been unable through reasonable efforts to
|
|||
|
determine the process actually used.
|
|||
|
|
|||
|
In the gathering and evaluation of evidence, the legitimate interests
|
|||
|
of the defendant in protecting its trade secrets shall be taken into
|
|||
|
account.
|
|||
|
|
|||
|
12. Each Party shall provide a term of protection for patents of
|
|||
|
at least 20 years from the date of filing or 17 years from the date of
|
|||
|
grant. A Party may extend the term of patent protection, in
|
|||
|
appropriate cases, to compensate for delays caused by regulatory
|
|||
|
approval processes.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun 7 Nov 1993 16:04:43 CST
|
|||
|
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
|||
|
Subject: File 7--Phiber Optik Sentenced to One Year in Prison
|
|||
|
|
|||
|
Mark Abene (phiber optik) was sentenced in federal court in New York
|
|||
|
this past week to one year in prison in addition to 600 hours of
|
|||
|
community service. The term will start January 7, 1994. It is possible
|
|||
|
that Abene will be released after completion of 10 months of the
|
|||
|
sentence. However, he may be eligible for a community corrections
|
|||
|
program much earlier.
|
|||
|
|
|||
|
Abene was the last of the MOD defendants to be sentenced for computer
|
|||
|
intrusion and other crimes. Complete descriptions of events,
|
|||
|
including the indictment, can be found in CuDs 4.30, 4.31, 4.32, and
|
|||
|
4.33.
|
|||
|
|
|||
|
Further details will follow next week.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.84
|
|||
|
************************************
|
|||
|
|
|||
|
|