920 lines
43 KiB
Plaintext
920 lines
43 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun Oct 4, 1992 Volume 4 : Issue 48
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivist: Dan Carosone
|
|||
|
Copy Editor: Etaion Shrdleax, Esq.
|
|||
|
|
|||
|
CONTENTS, #4.48 (Oct 4, 1992)
|
|||
|
File 1--Wes Morgan's on J Davis & Piracy (Re: CuD 4.46)
|
|||
|
File 2--"Whose Internet Is It Anyway?" (Online! Reprint)
|
|||
|
File 3--Implementing System Security
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
|||
|
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
|||
|
Back issues also may be obtained from the mail server at
|
|||
|
mailserv@batpad.lgb.ca.us
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Mon, 28 Sep 92 10:10:41 EDT
|
|||
|
From: morgan@ENGR.UKY.EDU(Wes Morgan)
|
|||
|
Subject: File 1--Wes Morgan's on J Davis & Piracy (Re: CuD 4.46)
|
|||
|
|
|||
|
In CuD #4.46, Jim Davis writes:
|
|||
|
|
|||
|
>First, the reality of software production in the late 20th century is
|
|||
|
>much different than this image. Most software production is NOT a
|
|||
|
>cottage industry.
|
|||
|
|
|||
|
Agreed, but that doesn't really change my arguments very much.
|
|||
|
|
|||
|
>The industry has quickly matured in the past few
|
|||
|
>years into a typical monopolized industry. Most patent filings are by
|
|||
|
>corporations. Most software is not purchased from the individuals who
|
|||
|
>create the software, it is purchased from companies who have required
|
|||
|
>their engineers to sign away any rights to whatever they come up with,
|
|||
|
>AS A CONDITION OF EMPLOYMENT. So IN MOST CASES, the creator has been
|
|||
|
>separated from the results of his or her creativity.
|
|||
|
|
|||
|
Isn't this true of almost any commercial concern? Toyota engineers
|
|||
|
sign away their rights to the design of the 1993 Camry, and contribu-
|
|||
|
ting editors sign away their rights to their editorials in the Lexington
|
|||
|
Herald-Leader (if printed, unsigned, as the opinion of the paper). Yet,
|
|||
|
these individuals still profit from their work; the engineers will receive
|
|||
|
raises/bonuses if their designs are commercially successful, and the editors
|
|||
|
of the Herald-Leader receive greater compensation if the paper's subscrip-
|
|||
|
tions increase. What's the difference?
|
|||
|
|
|||
|
>But the image of
|
|||
|
>the sole-proprietor hacker is raised up as a shield by the software
|
|||
|
>industry -- the public can take pity on the "defenseless" hacker;
|
|||
|
>people don't take pity on a Microsoft or an IBM.
|
|||
|
|
|||
|
It isn't a question of "pity", nor have I advanced it as such.
|
|||
|
|
|||
|
My argument is very simple. You do not have the moral, ethical, or legal
|
|||
|
right to take someone else's explicit design (be it computer software, a
|
|||
|
piece of sculpture, or a 1993 Camry), duplicate it, and give the copies away.
|
|||
|
|
|||
|
>Here we get
|
|||
|
>to the heart of the matter -- we're really talking about the "rights"
|
|||
|
>of software corporations here; not the hacker, not the consumer, and
|
|||
|
>not society.
|
|||
|
|
|||
|
So, the people who constitute a corporation are now in a separate class?
|
|||
|
|
|||
|
>Nowhere do I argue that the people who write software should not be
|
|||
|
>compensated for their effort. Of course people should be compensated!
|
|||
|
|
|||
|
You say that people should be compensated, yet you wish to remove their
|
|||
|
largest/best-protected source of compensation -- contract royalties from
|
|||
|
legitimate purchases.
|
|||
|
|
|||
|
>The question is how, and how much.
|
|||
|
|
|||
|
"how much"? This almost sounds like a thinly disguised slam on software
|
|||
|
prices........
|
|||
|
|
|||
|
>Paycheck dollars from a
|
|||
|
>corporation, a university, a cooperative or the government all spend
|
|||
|
>equally as well.
|
|||
|
|
|||
|
Of course, one's paycheck is usually proportional to the success of
|
|||
|
one's efforts. I can't imagine anyone increasing an employee's pay
|
|||
|
for "good societal benefits" of their work (with the exception of
|
|||
|
the fine people in the social work careers, of course....).
|
|||
|
|
|||
|
>But the social benefits from the programmer's efforts
|
|||
|
>are constrained by forcing them through the legal contortions of
|
|||
|
>intellectual property rights and private ownership.
|
|||
|
|
|||
|
If the programmer (or corporation) wants to reap social benefits, they'll
|
|||
|
place the program in the public domain (or provide 'student editions', or
|
|||
|
educational pricing, etc.). It's *their* choice, not yours.
|
|||
|
|
|||
|
>The model that we
|
|||
|
>have been using is private speculation for private gain, made possible
|
|||
|
>via exclusive monopolies granted by the government, enforced by law. I
|
|||
|
>am saying that other successful models exist and have generated useful
|
|||
|
>products.
|
|||
|
|
|||
|
Many such models exist; however, you would force everyone into the same
|
|||
|
model. Neither of us can dictate models to the developer.
|
|||
|
|
|||
|
>The subtext in the "I deserve a reward" argument is that
|
|||
|
>someone who comes up with a really useful idea should get a special
|
|||
|
>reward. Fine. I have no problem with public recognition of significant
|
|||
|
>contribution, even including a cash award. Again, this doesn't
|
|||
|
>_require_ intellectual property rights.
|
|||
|
|
|||
|
I can see it now -- "You've written a wonderful program! Here's a one-
|
|||
|
time cash award of $XXXX, and we're going to spread your program around
|
|||
|
the world, let other people use it to make more money, and you won't reap
|
|||
|
any further benefit from it."
|
|||
|
|
|||
|
>Morgan says that
|
|||
|
>"*companies* create for financial gain" (which I certainly agree
|
|||
|
>with), but puts this forward as if the protection of *their* financial
|
|||
|
>gain somehow justifies the rest of us having to suffer under
|
|||
|
>intellectual property rights.
|
|||
|
|
|||
|
Let's try a parallel (this usually degenerates into a flamefest, but...):
|
|||
|
|
|||
|
- You (Mr. Davis) write a book entitled "Intellectual Property in the
|
|||
|
Information Age"
|
|||
|
- Prentice-Hall, in their wisdom, deems it worthy; a First Edition is
|
|||
|
prepared, published, and placed on sale.
|
|||
|
- I purchase one copy, duplicate it 500 times, and distribute it to
|
|||
|
a conference *without your permission*.
|
|||
|
- Your book is included in the conference Proceedings, and is made
|
|||
|
available to the public; again, neither you nor PH recognize any
|
|||
|
compensation.
|
|||
|
|
|||
|
Can you honestly say that neither you nor Prentice-Hall will be concerned?
|
|||
|
|
|||
|
I have found that many people (NOT, necessarily, Mr. Davis) who argue against
|
|||
|
intellectual property rights have never been in a position to earn compensation
|
|||
|
from their personal work(s). I have been in such a position, and it definitely
|
|||
|
changes one's opinions. (While my experience in this area does not lie within
|
|||
|
the realm of computer software, I believe that my experience is valid.)
|
|||
|
|
|||
|
>Corporations are not necessary for the
|
|||
|
>generation of the software we need.
|
|||
|
|
|||
|
That's well and good; you (and anyone else) is quite free to design,
|
|||
|
implement, test, debug, document, and distribute any software you wish.
|
|||
|
|
|||
|
>Harlan Cleveland, .....wrote.....:
|
|||
|
>"Is the doctrine that information is owned by its
|
|||
|
>originator (or compiler) necessary to make sure that Americans remain
|
|||
|
>intellectually creative?" He answers in the negative, citing the
|
|||
|
>healthy public sector R&D efforts in space exploration, environmental
|
|||
|
>protection, weather forecasting and the control of infectious diseases
|
|||
|
>as counter examples.
|
|||
|
|
|||
|
Hmmm....."space exploration" == "NASA"
|
|||
|
"environmental protection" == "EPA"
|
|||
|
"weather forecasting" == "NOAA"
|
|||
|
"infectious diseases" == "PHS/HHS/CDC"
|
|||
|
|
|||
|
"public sector" seems to melt into "government agencies". If you (or
|
|||
|
Mr. Cleveland) can provide examples of such work which are outside the
|
|||
|
governmental realm, I'd like to know about it. Of course, a great deal
|
|||
|
of university research takes place under government grants; we might
|
|||
|
even argue that universities are another arm of the government in this
|
|||
|
respect.
|
|||
|
|
|||
|
I'm not familiar with any large-scale research which is truly in the
|
|||
|
"public sector".
|
|||
|
|
|||
|
>Fourth, the notion of a solitary inventor is a popular falsehood. No
|
|||
|
>one creates in a vacuum.
|
|||
|
|
|||
|
Agreed.
|
|||
|
|
|||
|
>The programmer's skills and creativity rest
|
|||
|
>upon past inventions and discoveries;
|
|||
|
|
|||
|
This is true of almost any invention, discovery, or creation; would you
|
|||
|
apply your arguments to cars, calculators, or novels? Heck, most musical
|
|||
|
compositions are based on the ancient notions of scales, keys, and modes;
|
|||
|
would you throw *all* music into the public domain, too?
|
|||
|
|
|||
|
>publicly supported education;
|
|||
|
|
|||
|
It is quite possible to complete one's education without setting foot
|
|||
|
in a "publicly supported" school.
|
|||
|
|
|||
|
>the other people who produced the hardware, the manuals and textbooks
|
|||
|
>and the development tools; as well as the artists and accompanying
|
|||
|
>infrastructure who may have inspired or influenced the programmer.
|
|||
|
|
|||
|
You're absolutely correct, but it's still the programmer's invention
|
|||
|
that made it possible.
|
|||
|
|
|||
|
>In
|
|||
|
>this sense, the developer's product is a social product, and
|
|||
|
>consequently should redound to the benefit of all of society.
|
|||
|
|
|||
|
Again, are you willing to apply this notion to *every* invention,
|
|||
|
development, or creation? I still don't believe that computer
|
|||
|
software is inherently different from any other medium.
|
|||
|
|
|||
|
>The
|
|||
|
>practical problem of compensation for effort and reward for
|
|||
|
>outstanding achievement can be addressed outside of "intellectual
|
|||
|
>property rights."
|
|||
|
|
|||
|
I'd like to see some concrete ideas about the implementation of this
|
|||
|
"compensation....and reward". You've mentioned it several times, but
|
|||
|
you haven't presented any practical implementations.
|
|||
|
|
|||
|
>The public
|
|||
|
>is already heavily involved in software production, but as is too
|
|||
|
>often the case, the public finances something, and then turns it over
|
|||
|
>to private corporations to reap all of the profits from it.
|
|||
|
|
|||
|
1) The "public" doesn't have to "turn it over" to the private sector.
|
|||
|
|
|||
|
2) Most programmers who develop something on their own (as opposed to
|
|||
|
"staff programmers" at a software company) usually recognize compen-
|
|||
|
sation in either lump-sum payment(s), increased salaries, or royalties.
|
|||
|
|
|||
|
3) If I decide to market my own software product, haven't I just become
|
|||
|
one of your much-villified "private corporations"?
|
|||
|
|
|||
|
>Re: my point that intellectual property rights prevent intellectual
|
|||
|
>effort, including software development, from maximizing its social
|
|||
|
>benefit: If a copy of Lotus 1-2-3 does have use for people, and people
|
|||
|
>are prevented from using it (e.g., because of the price barrier), then
|
|||
|
>its potential benefit is constricted.
|
|||
|
|
|||
|
You didn't address my mention of "public access" computing sites, such
|
|||
|
as those found in many schools and public libraries. It would seem that
|
|||
|
this growing "public access" facility would render your "price barrier"
|
|||
|
irrelevant.
|
|||
|
|
|||
|
>Mr. Woodhead says that no companies specialize in educational
|
|||
|
>software. If this in fact is the case, then this only reinforces the
|
|||
|
>argument for the necessity of some sort of social or public or
|
|||
|
>community (or whatever you want to call it) funding of educational
|
|||
|
>software development.
|
|||
|
|
|||
|
Just go ahead and say "government funding"; you've been hinting around
|
|||
|
the phrase for several paragraphs.
|
|||
|
|
|||
|
>Re: Mr. Morgan's notion of more aggressively extending patents to
|
|||
|
>software: it's already taking place.
|
|||
|
|
|||
|
Good; I'll look at the references you mentioned.
|
|||
|
|
|||
|
>17 years (typical for
|
|||
|
>patents) is an eternity in the evolution of software (as is 10 or 20
|
|||
|
>years, as suggested by Mr. Morgan).
|
|||
|
|
|||
|
OK, let's change it to 5; we're speaking rhetorically, right? 8)
|
|||
|
|
|||
|
>As a sidenote, even the SPA has
|
|||
|
>opposed software patents.
|
|||
|
|
|||
|
Of course they oppose it! It cuts into their profits! I've never
|
|||
|
said that current pricing is fair.......
|
|||
|
|
|||
|
>Re: fair use -- the point I was trying to make is that the concept of
|
|||
|
>"fair use" has EVOLVED and EXPANDED with increasing ability to easily
|
|||
|
>duplicate various media.
|
|||
|
|
|||
|
How, exactly, has it "evolved and expanded"?
|
|||
|
|
|||
|
>"Taping of television programs for personal
|
|||
|
>use appears to have become accepted as fair use of copyright material.
|
|||
|
|
|||
|
"appears to have"? It was explicitly affirmed in several court decisions.
|
|||
|
|
|||
|
>The
|
|||
|
>rationale of the court must have been the unlikely efficacy of trying
|
|||
|
>to put Pandora back into the box and the fact that no commercial use
|
|||
|
>of the tapes was either alleged or documented."
|
|||
|
|
|||
|
Bingo! The "personal use" factor was a determinant in each decision.
|
|||
|
You'll notice that the courts did NOT affirm any redistribution rights,
|
|||
|
either for-profit or for free.....
|
|||
|
|
|||
|
>The point is that legal constructs like "fair
|
|||
|
>use" are not brought to us by Moses -- they are determined by the
|
|||
|
>balance of social forces through legal, political, economic and other
|
|||
|
>forms of struggle. And therefore they are something which we can
|
|||
|
>affect.
|
|||
|
|
|||
|
Agreed!
|
|||
|
|
|||
|
I would enthusiastically support a "free for educational purposes" waiver of
|
|||
|
licensing. I'm the Systems Administrator for the UK College of Engineering;
|
|||
|
we spend a great deal of money on licenses, and some vendors have my undying
|
|||
|
gratitude (Swanson Analysis, MathWorks, and CADKEY, are you listening?).
|
|||
|
|
|||
|
Let me ask you a simple question:
|
|||
|
|
|||
|
You have championed (and rightfully so) the cause of "educational computing";
|
|||
|
you've used education as a bulwark of your arguments. However, would you
|
|||
|
voluntarily restrict your use of "free software" to educational purposes?
|
|||
|
If WordPerfect gave you 10 copies for your class, would you use it to write
|
|||
|
your next book? Would you sell that book?
|
|||
|
|
|||
|
>From: peter@FICC.FERRANTI.COM(Peter da Silva)
|
|||
|
>Subject--File 2--Response to Davis/Piracy (1)
|
|||
|
>
|
|||
|
>Re: Wes Morgan's article in CuD #4.43
|
|||
|
>
|
|||
|
>I largely agree with most of his arguments, but I would like to point
|
|||
|
>out one mistake... he says:
|
|||
|
>
|
|||
|
> "The whole concept of copyrights ... is based on the notion
|
|||
|
> that the creator ... is entitled to some compensation for his
|
|||
|
> effort"
|
|||
|
>
|
|||
|
>This is just not true. The whole concept of copyrights and patents in
|
|||
|
>the United States is based on the notion that by making intellectual
|
|||
|
>property a salable commodity subject to market forces, more and better
|
|||
|
>intellectual property will be created and it will be distributed more
|
|||
|
>freely.
|
|||
|
|
|||
|
Absolutely! I think we said the same thing; I just didn't extend my
|
|||
|
statement far enough. (My statement was based on my experience in
|
|||
|
more "artistic" fields, namely music; the market forces Peter mentions
|
|||
|
are less dominant in that field.)
|
|||
|
|
|||
|
Thanks for clarifying, Peter.
|
|||
|
|
|||
|
>And, you know what, it works. There's no better refutation, nor need
|
|||
|
>there be a better refutation, of the argument that piracy promotes
|
|||
|
>openness. It doesn't. It promotes encrypted software, dongles, and
|
|||
|
>trade secrets. It discourages publication. It reduces the incentive to
|
|||
|
>create viable products of commercial quality. These are not the result
|
|||
|
>of intellectual property laws, they're the result of the failure to
|
|||
|
>enforce intellectual property laws.
|
|||
|
|
|||
|
Breakaway! Shot! Goal!
|
|||
|
|
|||
|
Well said.
|
|||
|
|
|||
|
>From: "Michael Stack" <stack@STARNINE.COM>
|
|||
|
>Subject--File 3--Response to Davis/Piracy (2)
|
|||
|
>
|
|||
|
>They both seem to view copyright and
|
|||
|
>patents as a system guaranteeing a right to profit overlooking the
|
|||
|
>original constitutional intent to "promote the progress of Science and
|
|||
|
>the useful Arts."
|
|||
|
|
|||
|
Here's the relevant citation:
|
|||
|
|
|||
|
[Article I, Section 8, US Constitution]
|
|||
|
|
|||
|
...To promote the progress of science and useful arts, by securing for
|
|||
|
limited times to authors and inventors the exclusive right to their
|
|||
|
respective writings and discoveries;
|
|||
|
|
|||
|
We may argue that the current implementation of copyrights and patents
|
|||
|
is in need of overhaul/modification, but you cannot evade the Constitutional
|
|||
|
"exclusive right" for inventors and authors.
|
|||
|
|
|||
|
I'd also argue that the very presence of hundreds of software companies
|
|||
|
validates the "progress of science and useful arts"; I receive informa-
|
|||
|
tion on new software releases on an almost-daily basis.
|
|||
|
|
|||
|
>To be able to accuse someone of stealing or to claim something
|
|||
|
>as property (and to subsequently grant licenses on how this property
|
|||
|
>is to be used) implies there exists rights of ownership in the first
|
|||
|
>place. The crux of Mr. Davis's article questions this right. The
|
|||
|
>respondents by-pass this altogether.
|
|||
|
|
|||
|
I didn't bypass it at all; in fact, my entire argument is based on
|
|||
|
the premise of "I made it, and it's mine!". 8)
|
|||
|
|
|||
|
>Their articles are but
|
|||
|
>explanations of the existing order in case we didn't already
|
|||
|
>understand.
|
|||
|
|
|||
|
The "existing order" is entirely Constitutional. Mr. Davis' questions
|
|||
|
bypass the Constitutional provisions of "exclusive rights" for creations
|
|||
|
and inventions. Would you support a Constitutional amendment to revoke
|
|||
|
those "exclusive rights"?
|
|||
|
|
|||
|
Keep in mind that any such action would invalidate *all* trademarks,
|
|||
|
copyrights, and patents. None of the parties in this discussion have
|
|||
|
provided justification for applying different standards to computer
|
|||
|
software, so it's in the same boat as any other "writings and discoveries".
|
|||
|
|
|||
|
>The fact that "alls not well in the state of Denmark"
|
|||
|
>in itself punches large holes in the system the two respondents
|
|||
|
>defend.
|
|||
|
|
|||
|
>Both belittle the spectre of "police state" raised by Mr. Davis.
|
|||
|
>Amazingly, this is done within the pages of a publication which has
|
|||
|
>spotlighted many instances of "police-state" behavior: doors
|
|||
|
>kicked-in in the early hours of morning, guns drawn, threats,
|
|||
|
>equipment confiscated (permanently?), "guilty till proved innocent,"
|
|||
|
>etc.
|
|||
|
|
|||
|
I didn't "belittle" the police-state notion at all!
|
|||
|
|
|||
|
Of course, those are matters of criminal law, not copyright infringement.
|
|||
|
I have yet to hear mention of such a "police state" approach to copyrights.
|
|||
|
|
|||
|
>--On the one hand you argue "If I pour 4 years of my life into the
|
|||
|
>development of SnarkleFlex, I DESERVE to profit from it" but then you
|
|||
|
>append a caveat which undoes this assertion "(assuming that people
|
|||
|
>want to purchase/use it)." Doesn't this condition make your
|
|||
|
>capitalized assertion self-destruct?
|
|||
|
|
|||
|
How about "I deserve the OPPORTUNITY to profit from it"?
|
|||
|
|
|||
|
>Do you deserve to be rewarded
|
|||
|
>for your work, yes or no, or is it to be let dependent on market
|
|||
|
>caprice?
|
|||
|
|
|||
|
Market caprice, absolutely! That's the basis for ANYONE's living; one
|
|||
|
must provide a service (or goods) which people need or want. If there
|
|||
|
is no market for your skills, you get to find another job. That's self-
|
|||
|
determination.
|
|||
|
|
|||
|
>--You ask "Would you make a copy of Webster's Dictionary and give it
|
|||
|
>to a friend?" and you sport(!) "Xerox(tm)[ing] your entire printed
|
|||
|
>library for me..." "...would be just fine, right?" Yes, it would --
|
|||
|
>if the library and dictionary were in a readily distributable form and
|
|||
|
>the copy cost me near nothing i.e. in digital form. I'd be happy to
|
|||
|
>give you a copy. I could give it to anyone. As to how I'd have a
|
|||
|
>library in the first place we can discuss (perhaps outside of this
|
|||
|
>forum).
|
|||
|
|
|||
|
"how I'd have a library......we can discuss.....outside of this forum"?
|
|||
|
|
|||
|
Oh, my! Let's translate this a bit.....
|
|||
|
|
|||
|
"Sure, I'll give you a copy; just don't ask where I got it."
|
|||
|
|
|||
|
>Michael Goldhaber in his book Reinventing Technology states "Since new
|
|||
|
>information technology includes easy ways of reproducing information,
|
|||
|
>the existence of these [intellectual property] laws effectively
|
|||
|
>curtail the widest possible spread of this new form of wealth."
|
|||
|
|
|||
|
Your alternative is anarchic, is it not? I'll ask you a simple question,
|
|||
|
one for which no one has provided a suitable answer:
|
|||
|
|
|||
|
If I choose to make my living as a software author (either "on
|
|||
|
my own" or as part of a company/corporation), how will your
|
|||
|
proposed "freedom of information" help me earn a living? Will
|
|||
|
it, in fact, hinder me in earning a living?
|
|||
|
|
|||
|
--Wes
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 1 Oct 92 08:58:29 EDT
|
|||
|
From: Rich=Gautier%SETA%DRC@S1.DRC.COM
|
|||
|
Subject: File 2--"Whose Internet Is It Anyway?" (Online! Reprint)
|
|||
|
|
|||
|
This entire article was re-typed by Richard A. Gautier
|
|||
|
(RG%SETA%DRC@S1.DRC.COM). If there are any SPELLING errors, they are
|
|||
|
probably his. If there are grammar errors, they are Dr. Grundners, or
|
|||
|
the editors. Mr. Gautier HAS obtained permission to electronically
|
|||
|
disseminate this article from ngarman@tso.uc.edu who represents ONLINE
|
|||
|
magazine. Her comment was that this article really does belong in the
|
|||
|
electronic (Internet) forum, and that it was really a shame that I had
|
|||
|
to ask with an article like this.
|
|||
|
|
|||
|
"WHOSE INTERNET IS IT ANYWAY? -- A CHALLENGE"
|
|||
|
By Dr. Tom Grunder
|
|||
|
From--Online! Magazine, July 1992, pp. 6-7, 10.
|
|||
|
|
|||
|
It began innocently enough. I was rummaging around the Internet
|
|||
|
looking for some NREN information to include in a proposal I was
|
|||
|
writing, when I came across a rather one-sided "debate."
|
|||
|
|
|||
|
It was a string of messages written mostly by people from academic
|
|||
|
computing centers bemoaning the fact that NREN _might_ be made
|
|||
|
available to K-12 schools, businesses, libraries, and (horror of
|
|||
|
horrors) even to the general public. They were beside themselves.
|
|||
|
"The Internet and the NREN are supposed to be for academic and
|
|||
|
research purposes," they said. "What's going to happen if we allow
|
|||
|
all these other people on? There's not going to be enough bandwidth.
|
|||
|
Transmission time will suffer. Before you know it, the NREN is going
|
|||
|
to be just as bad as the Internet is now."
|
|||
|
|
|||
|
As the messages came in, their outrage seemed to build. So did
|
|||
|
mine.
|
|||
|
|
|||
|
Finally I came across a message that simply read: "Why should we
|
|||
|
let them use it at all???" and suddenly the terrible mistake we've
|
|||
|
been making became clear. We in the non-university networking
|
|||
|
community have been framing the wrong issue.
|
|||
|
|
|||
|
Until now, the issue has been whether K-12 schools and community
|
|||
|
users are going to have access to the NREN. It should have been
|
|||
|
whether K-12 and community users are going to
|
|||
|
_allow_the_academic_centers_ to access the NREN. Somehow we had
|
|||
|
gotten our priorities crossed.
|
|||
|
|
|||
|
Who do they think is _paying_ for all this? When the NREN comes
|
|||
|
online, the money to build it will be coming from that apparently
|
|||
|
forgotten group of people called "taxpayers." Who do they think is
|
|||
|
paying for the current Internet backbone? The National Science
|
|||
|
Foundation? Wrong! It's the taxpayers. Who do they think is paying
|
|||
|
for those mid-level networks, and for the high-speed data lines to
|
|||
|
connect their colleges to those networks, and for the nice
|
|||
|
high-powered servers that makes the connection so easy? Do they think
|
|||
|
that money is coming from good ole Siwash State U.? If so, then who,
|
|||
|
pray tell, is funding Siwash State? Right again. Taxpayers!
|
|||
|
|
|||
|
So now we come along, with hat in hand, begging for permission to
|
|||
|
have minimal access to the Internet and to be a part of NREN. Why?
|
|||
|
So we can set-up K-12 networks that will allow the _taxpayers'_ kids
|
|||
|
to learn the information age skills they will need to be competitive
|
|||
|
in the 21st century. So we can provide the _taxpayers_ access to
|
|||
|
electronic mail, government information, and other resources via
|
|||
|
libraries and community computer systems. So we can provide some
|
|||
|
piece of the information age to the people who paid for it in the
|
|||
|
first place! And the academics treat us like beggars in a subway
|
|||
|
station.
|
|||
|
|
|||
|
_Absurd!_ Absurd, but not surprising.
|
|||
|
|
|||
|
To understand this attitude, you have to keep in mind that, in
|
|||
|
most locations, these university computing centers are designed for
|
|||
|
the people who work there plus 35 of their buddies. No one else -
|
|||
|
including the other students and faculty on their own campuses - need
|
|||
|
apply. In most locations, students or faculty members seeking to use
|
|||
|
the Internet are given a blinking cursor that dares them to come up
|
|||
|
with some combination of nonsense syllables to make it do something.
|
|||
|
That's it. No help. No training. No assistance. Nothing. It is
|
|||
|
not surprising that the idea of letting the community have access to
|
|||
|
this preciously guarded resource would send chills up their spines.
|
|||
|
|
|||
|
But, in many ways, we in the non-academic computing circles have
|
|||
|
made our share of mistakes as well. Not only have we been apologetic
|
|||
|
in our claims to this national resource, but we have engaged in what I
|
|||
|
call the "Balkanization" of the information age - the fragmentation of
|
|||
|
our efforts into dozens of competing networks and special interest
|
|||
|
systems. We should be working toward a common framework with enough
|
|||
|
"conceptual bandwidth" to include everyone.
|
|||
|
|
|||
|
As a function of developing my organization, the National Public
|
|||
|
Telecomputing Network, I am asked to speak at a lot of conventions and
|
|||
|
conferences; and what I find at those meetings has become quite
|
|||
|
predictable. Everyone is excited about computer networking. When I
|
|||
|
go to a K-12 convention; everyone is talking about K-12 networks.
|
|||
|
When I go to a library conference; everyone is talking about library
|
|||
|
networks, and so on - all in direct competition with each other.
|
|||
|
|
|||
|
It doesn't make sense.
|
|||
|
|
|||
|
Let's say you are proposing a statewide network that will link
|
|||
|
your libraries together, complete with Internet connections - the
|
|||
|
whole bit. And let's say you take it to your state capital and,
|
|||
|
amazingly enough, you get it funded. Now, what happens if a month
|
|||
|
later the K-12 people (or someone else) shows up with a proposal to
|
|||
|
fund their network; or worse, what happens if they get there a month
|
|||
|
_before_ you? Some one must lose; it is inherent in that kind of
|
|||
|
competitive process.
|
|||
|
|
|||
|
But our mistakes do not end with the competition for monies. They
|
|||
|
run deeper than that. We have also failed to come up with a
|
|||
|
comprehensive plan to show how any of our ideas fit together. Let me
|
|||
|
use the K-12 initiatives as an example.
|
|||
|
|
|||
|
I have seen a number of proposals going around that (depending on
|
|||
|
the proposal) would provide every school in the city/state/country
|
|||
|
with a connection to the Internet - so every child will have access to
|
|||
|
the information resources to be found there. That's fine. In fact,
|
|||
|
on the surface, it sounds wonderful.
|
|||
|
|
|||
|
But what happens _after_ the student graduates from high school or
|
|||
|
college? Do we toss him or her out into a world where those resources
|
|||
|
are utterly unavailable? If so,
|
|||
|
_what's_the_point_of_training_them_on_the_resources_
|
|||
|
in_the_first_place? It's like having mandatory driver education in a
|
|||
|
world without cars!
|
|||
|
|
|||
|
It doesn't make sense. We create plan after plan, proposal after
|
|||
|
proposal, with no common conceptual framework to tie them together.
|
|||
|
|
|||
|
I believe we must start developing our programs in the context of
|
|||
|
community-wide information systems. The guy who runs the corner gas
|
|||
|
station (and who was in a K-12 class only a few years ago) should have
|
|||
|
at least as much information access as the K-12 students who are in
|
|||
|
class right now. But we can't do that; we can't achieve it; unless we
|
|||
|
can band together somehow to speak with one voice.
|
|||
|
|
|||
|
And...we need leadership.
|
|||
|
|
|||
|
Where is that leadership going to come from? One logical source
|
|||
|
is the library community. But I don't see that happening. What I see
|
|||
|
is a profession divided. Half the librarians I've talked to see this
|
|||
|
network technology as exactly the kind of thing libraries should be
|
|||
|
embracing; and the other half (usually higher-level officials) see it
|
|||
|
as the work of the devil - with no detectable middle ground.
|
|||
|
|
|||
|
We can't continue without leadership, without a plan, and in
|
|||
|
direct competition with each other. Perhaps what is needed is a plot
|
|||
|
of ground that stands outside existing territory, a place where
|
|||
|
everyone can stand, and around which we can all rally.
|
|||
|
|
|||
|
Let me try out an idea on you.
|
|||
|
|
|||
|
Suppose a super-fund was created for the development of a
|
|||
|
nationwide network of computerized community information systems.
|
|||
|
These systems would be free to the user in the same sense that the
|
|||
|
public library is free to its patrons. Of equal importance, each of
|
|||
|
these systems would have a place on them for the library community,
|
|||
|
the K-12 community, the medical community, government officials, and
|
|||
|
anyone else who wanted to use it. In addition, each system would be
|
|||
|
linked by, and would provide its users with controlled access to, the
|
|||
|
Internet/NREN. From a technological standpoint, there are no barriers
|
|||
|
to the development of these systems. Indeed, there currently exist
|
|||
|
several pilot systems that are already accomplishing all the above and
|
|||
|
more.
|
|||
|
|
|||
|
How would we fund it? One way would be to ask every Regional Bell
|
|||
|
Operating Company to contribute, along with every high-tech
|
|||
|
corporation, the federal government, every state government, every
|
|||
|
major city, and every major foundation. If necessary, we would
|
|||
|
approach the various state Public Utility Commissions to ask that a
|
|||
|
surtax be placed on phone company data line profits. The fund would
|
|||
|
be charged with developing a minimum of 100 community computers
|
|||
|
covering all 50 states by the year 2000. Initial cost would be about
|
|||
|
$30 million dollars.
|
|||
|
|
|||
|
Could it be done? Without any doubt, yes. We've done it before.
|
|||
|
Most people do not realize that 100 years ago there was no such
|
|||
|
thing as the public library as we know it. But we reached the
|
|||
|
point in this country where literacy levels got high enough (and
|
|||
|
the cost of producing books cheap enough) that the public library
|
|||
|
became feasible. People across the country began to come together
|
|||
|
around the idea of free public access to the printed word; and the
|
|||
|
result was a legacy from which everyone reading this article has
|
|||
|
benefitted.
|
|||
|
|
|||
|
What I am saying, is that in this century _computer_ literacy
|
|||
|
levels have gotten high enough (and the cost of computer equipment
|
|||
|
cheap enough) that it is time from a similar movement to form around
|
|||
|
the development of free public-access computerized community
|
|||
|
information systems. It is time for us to stop being apologetic, and
|
|||
|
to stop competing wih each other. In short, it is time for us to
|
|||
|
leave a legacy of our own.
|
|||
|
|
|||
|
Do you see what I am saying?
|
|||
|
Would you support such a plan? I mean, would you support it
|
|||
|
personally?
|
|||
|
Would you work for it?
|
|||
|
Would your company or institution support it?
|
|||
|
Would they contribute to it? If so, let me know.
|
|||
|
|
|||
|
Send me electronic mail, send me snailmail, but let me know. The
|
|||
|
key here is not the technology, that's already in place, it is "wil."
|
|||
|
Do we have the will to do it?
|
|||
|
|
|||
|
The issue is no longer _whether_ we will enter an information age.
|
|||
|
That part has been settled. We have. What is at issue is whether the
|
|||
|
information age is something that happens _to_ us, or something that
|
|||
|
happens _for_ us.
|
|||
|
|
|||
|
Fortunately, that decision still remains in our hands.
|
|||
|
|
|||
|
++++++++++++++++
|
|||
|
|
|||
|
_TOM_GRUNDNER_ is the president of the National Public
|
|||
|
Telecomputing Network, and the founder of the Cleveland Freenet. The
|
|||
|
freenets are community information systems, located in several Ohio
|
|||
|
communities and in Peoria, Illinois. A column in DATABASE (April
|
|||
|
1988, pp. 97-99) by Steve Cisler describes the Cleveland Freenet in
|
|||
|
its early stages.
|
|||
|
|
|||
|
Communications to the author should be addressed to Dr. Tom
|
|||
|
Grundner, National Public Telecomputing Network, Box 1987, Cleveland,
|
|||
|
OH 44106; 216/368-2733; Internet-aa001@cleveland.freenet.edu;
|
|||
|
BITNET-aa001%cleveland.freenet.edu@cunyvm. (Editor's Note: Write to
|
|||
|
Tom Grundner, or write to ONLINE (ngarman@tso.uc.edu), to answer this
|
|||
|
challenge and comment on this controversial issue facing the library
|
|||
|
and online community. ONLINE will publish as many notes and letters
|
|||
|
as we have room for in coming issues. --NG)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 25 Sep 1992 11:07:31 -0700 (MST)
|
|||
|
From: RayK <KAPLAN%UAMIS@ARIZVMS.BITNET>
|
|||
|
Subject: File 3--Implementing System Security
|
|||
|
|
|||
|
Toward the Implementation of a System and Network Security-Related
|
|||
|
Incident Tracking and Vulnerability Reporting Database
|
|||
|
by Ray Kaplan
|
|||
|
|
|||
|
Consider the need for a system and network security-related incident
|
|||
|
tracking and vulnerability reporting database (herein referred to as
|
|||
|
ITVRD for convenience).
|
|||
|
|
|||
|
Such a database might be a relational combination of reported
|
|||
|
vulnerabilities and incidents that could answer queries such as "show
|
|||
|
me recorded instances of compromise for version xxx of operating
|
|||
|
system yyy on zzz hardware" or "show me a list of known
|
|||
|
vulnerabilities of the login sequence for version xxx of operating
|
|||
|
system yyy on zzz hardware" or even, "show me a list of reported
|
|||
|
compromises of version AAA of third party product BBB running under
|
|||
|
version xxx of operating system yyy on zzz hardware". We might even
|
|||
|
be able to ask "show me known instances of password guessing attacks
|
|||
|
on version xxx of operating system yyy on zzz hardware at banks."
|
|||
|
|
|||
|
It is widely known that the flow of security-related information is
|
|||
|
carefully controlled and that such information is not readily or
|
|||
|
widely available to those who need it to protect their systems and
|
|||
|
networks. There is plenty of information available - but, its
|
|||
|
availability seems limited to the underground. While this apparently
|
|||
|
serves those who know and control this information, but it does little
|
|||
|
to help those who are trying to protect their systems and networks.
|
|||
|
Security by obscurity is widely known to be a flawed concept. My
|
|||
|
argument would be that this game of security incident/vulnerability
|
|||
|
tracking is a lot like dealing with the AIDs crisis. If we don't
|
|||
|
start talking openly about it, we are all in trouble(1).
|
|||
|
|
|||
|
While some of the various computer incident handling capabilities do
|
|||
|
an excellent job of distributing SOME significant vulnerability and
|
|||
|
incident information publicly(2), VERY LITTLE detailed information
|
|||
|
gets disseminated in comparison to the number of known vulnerabilities
|
|||
|
and known incidents. In addition, those who are not connected to the
|
|||
|
Internet have a difficult time staying abreast of those incidents that
|
|||
|
are reported. Worse yet, I speculate that the majority of systems and
|
|||
|
private networks that exist in the world today are simply not even
|
|||
|
tapped into the meager flow of security-related information that does
|
|||
|
exist.
|
|||
|
|
|||
|
I believe that this sad situation is due to the politics of security
|
|||
|
vulnerability information between vendors in the market(3), and an
|
|||
|
inherent desire to control the distribution of this information by the
|
|||
|
portion of the security community that has placed themselves in charge
|
|||
|
of it. As proof of this, consider that prototypes of system and
|
|||
|
network security-related ITVRDs are known to have been funded by the
|
|||
|
government, but were stopped when the funding agency wanted to
|
|||
|
classify the effort making it publicly inaccessible(4). What we - as
|
|||
|
a community - are left with is an odd situation where the best
|
|||
|
collections of vulnerability information are to be found only on the
|
|||
|
clandestine sources of the world's underground computer community.
|
|||
|
|
|||
|
At this writing, the Defense Advanced Research Projects Agency's
|
|||
|
(DARPA) Computer Emergency Response Team (CERT) is reporting on the
|
|||
|
order of 3 incidents per day, but we - as a community - hear very
|
|||
|
little about the exact nature of these problems, how they can be used
|
|||
|
against our systems or their fixes. While the relatively new Forum of
|
|||
|
Incident Response and Security Teams (FIRST) is working on the
|
|||
|
problems associated with the design and implementation of a ITVRD,
|
|||
|
their discussions are carefully restricted to their members and this
|
|||
|
topic has been under discussion for quite a long time with no
|
|||
|
apparent movement. In addition, most of us are not members of FIRST,
|
|||
|
so we can't contribute to the discussions even if we wanted to do so.
|
|||
|
|
|||
|
Since I know that the formation of a widely available ITVRD is a very,
|
|||
|
very emotional issue in the security community and since I am not
|
|||
|
willing to suggest that I have the best design and implementation plan
|
|||
|
for it in mind - I'm simply throwing the question out into the
|
|||
|
community for an open, vigorous debate: how can a system and network
|
|||
|
security-related ITVRD be implemented - or should it even be
|
|||
|
implemented? Based on my recent, unsuccessful experiences in trying
|
|||
|
to get members of the legitimate security community at large to talk
|
|||
|
to members of the world's computer underground, I have decided that it
|
|||
|
is not prudent for me to proceed with the design and implementation of
|
|||
|
a ITVRD until some consensus in the community is reached about how -
|
|||
|
or even if - such a thing should be done.
|
|||
|
|
|||
|
As a seed for the debate, here are some of the questions surrounding
|
|||
|
the implementation of a ITVRD that I think need vigorous discussion by
|
|||
|
the community. Please consider them carefully and offer us your
|
|||
|
thoughts. Post your reply to this channel or send it to me at any of
|
|||
|
the addresses below and I will collect it, combine it with others that
|
|||
|
I receive and report it in some regular manner which is yet to be
|
|||
|
determined.
|
|||
|
|
|||
|
A Myriad of hard questions:
|
|||
|
|
|||
|
What of the morals and ethics questions that surround the
|
|||
|
establishment of a widely available ITVRD? While this is not a new
|
|||
|
idea(5), we are talking about the morals and ethics of making an ITVRD
|
|||
|
available to anyone who wants access to it. This necessarily includes
|
|||
|
those that are not members of the legitimate security community. Even
|
|||
|
though information such as that which an ITVRD would hold is readily
|
|||
|
available now, it takes a lot of time and energy to find it. An ITVRD
|
|||
|
would make incident and vulnerability information trivially available
|
|||
|
|
|||
|
to anyone who wanted it.
|
|||
|
|
|||
|
How should an ITVRD be accessible? Should it be a database on the
|
|||
|
network that can be accessed by simply sending a well-formed query via
|
|||
|
electronic mail to a database server? Should an ITVRD allow
|
|||
|
interactive access? Should it be available via a toll-free, 1-800
|
|||
|
number? A pay per-call, 1-900 number?
|
|||
|
|
|||
|
Since it has its own very well-developed channels of communication,
|
|||
|
why would the underground even care to contribute to such an ITVRD?
|
|||
|
Would a widely accessible ITVRD threaten or replace popular
|
|||
|
underground publications like Hack-Tic or 2600? Would the underground
|
|||
|
be happy with attribution for the holes that they find? Would the
|
|||
|
contributors to an ITVRD even want to be identified?
|
|||
|
|
|||
|
Should a subscriber-based ITVRD pay its contributors for their
|
|||
|
submissions? If so, on what basis and how much? Should it be
|
|||
|
available to those that want to passively access it without
|
|||
|
contributing to it? Should this access be on a subscription basis?
|
|||
|
If so, does such a subscription service need some sort of
|
|||
|
authentication to restrict access to only legitimate, paid
|
|||
|
subscribers?
|
|||
|
|
|||
|
Should the contents of an ITVRD be exactly what is submitted to it, or
|
|||
|
should submissions to it be edited and/or verified for authenticity.
|
|||
|
If editing, verification and authentication of submissions are to take
|
|||
|
place, who should do this and under what rules should it be done? In
|
|||
|
recognition that many organizations do not currently report their
|
|||
|
security problems, should anonymous submissions be allowed?
|
|||
|
|
|||
|
Should such an ITVRD be in the public domain or should it be private
|
|||
|
property.
|
|||
|
|
|||
|
Where should an on-line ITVRD be maintained? Should it be located
|
|||
|
outside the traditional boundaries of countries that would restrict its
|
|||
|
availability?
|
|||
|
|
|||
|
I am sure that I have missed many, many important questions. Please
|
|||
|
contribute to this discussion.
|
|||
|
|
|||
|
Electronic mail:Internet - kaplan@mis.arizona.edu
|
|||
|
BITNET - KAPLAN@ARIZMIS
|
|||
|
|
|||
|
Snail mail:
|
|||
|
Ray Kaplan
|
|||
|
P.O. Box 42650
|
|||
|
Tucson, AZ 85733-2650
|
|||
|
FAX - (602) 791-3325
|
|||
|
|
|||
|
This has been posted to:
|
|||
|
|
|||
|
Some common Network Newsgroups, and the DECUS DECUServe bbs.Several of
|
|||
|
the world's underground publications: 2600 and HacK-Tic.Selected
|
|||
|
members of the security community.
|
|||
|
|
|||
|
Please feel free to re-post this anywhere you see fit - it is hereby
|
|||
|
released into the public domain. If you post it somewhere - please let
|
|||
|
me know where you put it so I can try and track the discussions - I'd
|
|||
|
like to do a summary of it all one of these days.
|
|||
|
|
|||
|
In advance, thanks for your time and consideration. Since I know that
|
|||
|
the ire of powerful forces in the security community may be stirred up
|
|||
|
by the idea of publically discussing the design and operation of an
|
|||
|
ITVRD, I only hope that a reasoned exchange of ideas will follow.
|
|||
|
|
|||
|
++++++++++
|
|||
|
|
|||
|
(1) I get into some interesting discussions with people who argue that
|
|||
|
secrecy is the best course of action. For instance, while splitting
|
|||
|
hairs on the tough subject of when you begin (of if there even should
|
|||
|
BE) sex education, there is an argument that says educating very young
|
|||
|
people about their sexuality will induce them to experiment where they
|
|||
|
otherwise might not do so. In my view, this is similar to discussions
|
|||
|
that I have with those that oppose the implementation of an ITRVD.
|
|||
|
There are those that say the mere availability of an ITRVD will cause
|
|||
|
more incidents. In the face of this criticism, I say that while this
|
|||
|
may be true, at least system and network managers WILL have a
|
|||
|
reference for this information where currently there is none. Just
|
|||
|
think, the formation of an ITRVD may lead to vendors actually shipping
|
|||
|
a document that describes the known vulnerabilities of their systems
|
|||
|
to their customers. Sort of like the warning from the surgeon
|
|||
|
General's warning on alcohol and tobacco products?
|
|||
|
|
|||
|
(2) Of note here is the Defense Advanced Research Projects Agency's
|
|||
|
(DARPA) Computer Emergency Response Team (CERT). While these
|
|||
|
consummate professionals do an excellent job of distributing incident
|
|||
|
and vulnerability-related information to the Internet community, not
|
|||
|
nearly enough is being done.
|
|||
|
|
|||
|
(3) While it is clear that there are vulnerabilities which affect many
|
|||
|
vendors, there is evidence to suggest that some vendors in the
|
|||
|
incident response community don't acknowledge those reports by other
|
|||
|
vendors which clearly affect their own systems - let alone reporting
|
|||
|
all of the vulnerabilities of their own systems.
|
|||
|
|
|||
|
(4) References available if you'd like them.
|
|||
|
|
|||
|
(5) There most certainly are ITVRDs currently being maintained in
|
|||
|
various places.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.48
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|