829 lines
40 KiB
Plaintext
829 lines
40 KiB
Plaintext
|
||
|
||
Computer underground Digest Mon Sep 7, 1992 Volume 4 : Issue 42
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Copy Editor: Etaion Shrdlu, Jrr.
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivist: Dan Carosone
|
||
|
||
CONTENTS, #4.42 (Sep 7, 1992)
|
||
File 1--Moderators' Corner - COMP hierarchy and future issues
|
||
File 2--Problem with refused back issue requests is resolved
|
||
File 3--Call for Papers
|
||
File 4--Updates to CPSR Listserv File Archive
|
||
File 5--TAP and Bringing Gov't into the Electronic Age
|
||
File 6--Reflections on INFOWEEK's CU-related stories
|
||
File 7--Software Piracy--The Social Context
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
||
libraries; from America Online in the PC Telecom forum under
|
||
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
||
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
||
For bitnet users, back issues may be obtained from the mail server at
|
||
mailserv@batpad.lgb.ca.us
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to
|
||
computer culture and communication. Articles are preferred to short
|
||
responses. Please avoid quoting previous posts unless absolutely
|
||
necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 06 Sep 92 19:01:27 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 1--Moderators' Corner - COMP hierarchy and future issues
|
||
|
||
We're back to a once-a-week schedule (we hope), although Labor Day
|
||
disrupted the normal Sunday posting. The next three issues will be
|
||
thematic: #4.43 will be a collection of retrospective reviews on Cliff
|
||
Stoll's The Cuckoo's Egg; #4.44 will be a fairly neutral summary and
|
||
description of the Software Publisher Association's policies, goals,
|
||
and activities; and #4.45 will be a critique/response to some of these
|
||
policies. We will invite the SPA to respond in #4.46.
|
||
|
||
We also remind users that alt.society.cu-digest will be gone soon,
|
||
replaced by comp.society.cu-digest. If you sub through the alt group,
|
||
be sure to join the comp version instead. If you're a sysad, be sure
|
||
you facilitate the change ASAP, because we have received a number of
|
||
queries asking why the comp version is not yet available on some
|
||
systems. If your system is one on which it's not available in the
|
||
comp group, ask your sysad, not us. We just work here.
|
||
|
||
------------------------------
|
||
|
||
Date: 06 Sep 1992 21:44:51 +0000 (GMT)
|
||
From: mike@BATPAD.LGB.CA.US
|
||
Subject: File 2--Problem with refused back issue requests is resolved
|
||
|
||
When I set up the mailserv the handle the AOT-D list and the archive
|
||
of back issues, I neglected to add the AOTD directory to the valid
|
||
paths file that the mailserv checks before sending a file. This is
|
||
why you have been getting refused messages when requesting a back
|
||
issue.
|
||
|
||
This is fixed now. I just tested it, and a request for vol1.zoo was
|
||
correctly queued to send.
|
||
|
||
Sorry for the confusion.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 3 Sep 92 21:36:03 EDT
|
||
From: "Jay A. Wood" <jwood@ANDROMEDA.RUTGERS.EDU>
|
||
Subject: File 3--Call for Papers
|
||
|
||
*AN INVITATION FOR THE SUBMISSION OF ARTICLES TO THE JOURNAL*
|
||
|
||
The Editorial Board of the Journal invites you to participate in our
|
||
continuing exploration of computers, technology, and the law by
|
||
submitting your article or commentary for publication.
|
||
|
||
Appropriate material would include articles, essays, comments, and
|
||
other items of interest in the area of technological advancement. The
|
||
Journal is published twice annually.
|
||
|
||
Manuscripts should be double-spaced, including footnotes in accordance
|
||
with the format rules set forth in _A Uniform System of Citation_.
|
||
|
||
All manuscripts submitted for publication are acknowledged and duly
|
||
considered for publication. Editors work closely with prospective
|
||
authors to ensure timely and accurate publication.
|
||
|
||
Send your submission to:
|
||
|
||
Rutgers Computer and Technology Law Journal
|
||
Rutgers School of Law
|
||
15 Washington Street
|
||
Newark, NJ 07102
|
||
|
||
or call 201/648-5549
|
||
|
||
or mail jwood@andromeda.rutgers.edu
|
||
|
||
|
||
*RECENT ARTICLES INCLUDE*
|
||
|
||
- Copyright and trade secret protection for chips, screen
|
||
designs, computer manuals, and computer created works.
|
||
|
||
- The patent, tort, and regulatory implications of recent
|
||
biotechnology developments.
|
||
|
||
- New environmental technologies and waste treatment
|
||
techniques.
|
||
|
||
- Government acquisition of software and copyrights.
|
||
|
||
- The use of computer, biological, or other high technology
|
||
evidence in civil and criminal trials.
|
||
|
||
- Copyright, free speech, and regulatory issues of new
|
||
transmission techniques; satellites, electronic bulletin
|
||
boards, and cable television.
|
||
|
||
- The ethical and malpractice issues arising from
|
||
professional reliance on artificial intelligence systems.
|
||
|
||
- Sales and property taxation problems in the computer
|
||
hardware and software industries.
|
||
|
||
- The use of computerized legal research systems.
|
||
|
||
- Automated data processing systems in governmental agencies
|
||
and courts.
|
||
|
||
Because the nexus between computers, technology, and the law
|
||
is constantly changing, any topic list can give only a
|
||
general indication of the scope of this Journal. Thus, this
|
||
list highlights - but does not exhaust - topics covered in
|
||
recent issues.
|
||
|
||
*UP-TO-DATE LEGAL GUIDE TO NEW TECHNOLOGIES*
|
||
|
||
First to enter the field and now in its third decade of publication,
|
||
the Journal provides attorneys and scholars with a guide to issues
|
||
arising from the interaction of computers, emerging technologies, and
|
||
the law. The JournalUs broad national and international circulation
|
||
has established its reputation as an effective and respected forum for
|
||
technology issues. The Journal has been cited in numerous texts and
|
||
articles, both foreign and domestic, and by the United States Supreme
|
||
Court.
|
||
|
||
In addition to provocative articles by leading commentators and
|
||
jurists, the Journal publishes timely book reviews by authorities in
|
||
the field and includes a comprehensive research source: _The Index and
|
||
Annual Selected Bibliography on Computers, Technology, and the Law_.
|
||
|
||
The Journal is an effective means of staying abreast of the latest
|
||
judicial and theoretical developments in the rapidly changing computer
|
||
and high technology areas.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 4 Sep 1992 16:05:05 EDT
|
||
From: Paul Hyland <PHYLAND@GWUVM.BITNET>
|
||
Subject: File 4--Updates to CPSR Listserv File Archive
|
||
|
||
To CPSR List subscribers,
|
||
|
||
Welcome to new subscribers -- in case you haven't noticed, we try to
|
||
keep traffic on this list to a minimum, reserving it for important
|
||
announcements and information about CPSR and the issues it tries to
|
||
address as an organization. We have substantially more information
|
||
stored on a Listserv file server. The complete list of files is
|
||
stored in the file CPSR ARCHIVE, and periodically updates to the
|
||
archive are posted to the list.
|
||
|
||
To obtain any of the files listed below, or others on the archive,
|
||
send commands to listserv@gwuvm.gwu.edu. In a mail message, put one
|
||
command per line, starting with the first one. The command:
|
||
|
||
GET <filename> <filetype>
|
||
|
||
will retrieve files. For example:
|
||
|
||
GET CPSR ARCHIVE
|
||
GET CPSR BROCHURE
|
||
GET NRENPRIV TESTMONY
|
||
|
||
Any questions, comments, or complaints about the listserv should be
|
||
directed to me, phyland@gwuvm.gwu.edu. Any questions about CPSR,
|
||
address changes for members, and the like, should be directed to
|
||
cpsr@csli.stanford.edu.
|
||
|
||
Paul Hyland
|
||
Owner, CPSR List
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
Filename Filetype Lines Description
|
||
++++++++ ++++++++ +++++ +++++++++++
|
||
CPSR-92 PROGRAM 213 CPSR Annual Meeting Program w/ confirmed speakers
|
||
Palo Alto, CA -- October 17-18, 1992
|
||
PDC-92 PROGRAM 126 CPSR Participatory Design Conference Program
|
||
Cambridge, MA -- November 6-7, 1992
|
||
NREN PRIVACY 0 **added as this, then updated and renamed to --
|
||
NRENPRIV TESTMONY 396 "Proposed Privacy Guidelines for the NREN"
|
||
presented at a hearing of the National
|
||
Commission on Libraries and Information
|
||
Sciences (NCLIS), July 21, 1992.
|
||
CRYPTO LETTER 380 Letter from CPSR to Rep. Jack Brooks, chair of
|
||
of House Judiciary Committee, on computer
|
||
security and cryptography policy
|
||
CPSRBERK 3Q92 573 CPSR/Berkeley Electronic Newsletter
|
||
Third Quarter, 1992
|
||
CPSR-DC JUNE1992 251 CPSR/DC Electronic Newsletter -- June 1992
|
||
HR2772 FACTS 0 **Deleted** (superseded by GATEWAY FACTS)
|
||
GATEWAY FACTS 161 Taxpayer Assets Project Fact Sheet on GPO WINDO
|
||
and GPO Gateway to Government Bills
|
||
GATEWAY STATEMENT 244 Taxpayer Assets Project statement on GPO WINDO/
|
||
Gateway submitted for joint hearing 7/23/92
|
||
AOT SAMPLE 815 Sample Issue of Art of Technology Digest - #2
|
||
August 4, 1992
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 9 Sep 1992 11:59:46 CDT
|
||
From: James P Love <LOVE%PUCC@PSUVM.PSU.EDU>
|
||
Subject: File 5--TAP and Bringing Gov't into the Electronic Age
|
||
|
||
Comments on Proposed Revisions of OMB Circular A-130
|
||
Taxpayer Assets Project
|
||
P.O. Box 19367
|
||
Washington, DC 20036
|
||
Internet: tap@essential.org
|
||
|
||
August 27, 1992
|
||
|
||
|
||
1. THE TAXPAYER ASSETS PROJECT
|
||
|
||
The Taxpayer Assets Project (TAP) was started by Ralph Nader to
|
||
monitor the sale and management of government property. Among the
|
||
public assets that we have investigated are government information
|
||
resources, government-funded software, and government-funded information
|
||
systems. We have been particularly interested in issues relating to the
|
||
pricing of government information products and services, public access
|
||
to taxpayer- funded information and information systems, and the quality
|
||
and nature of government information products and services.
|
||
|
||
TAP has also undertaken a number of case studies of the impact of
|
||
federal efforts to privatize the dissemination of government
|
||
information.
|
||
|
||
TAP is also engaged in research on a wide range of other topics,
|
||
including, for example, the management of federally owned mineral and
|
||
timber resources, licensing of federally funded inventions such as
|
||
pharmaceutical drugs, the allocation of rights to use public airwaves,
|
||
public infrastructure investments, and many other items.
|
||
|
||
In *all* of these endeavors, TAP is a consumer of government
|
||
information. We need to obtain information from dozens of federal
|
||
agencies on many different topics. Consider just two examples:
|
||
|
||
i. In our study of federal oil and gas resources, we need access
|
||
to Department of Interior (DOI) databases on OCS oil and gas
|
||
lease auctions, Department of Energy (DOE) databases on oil
|
||
output, consumption, and prices, and Federal Reserve databases
|
||
on bond yields for federal debt.
|
||
|
||
ii. In our research on government licensing of pharmaceutical
|
||
drugs we need access to databases on FDA approvals of new
|
||
drugs, federally funded medical research, patents, and federal
|
||
tax expenditures for orphan drugs.
|
||
|
||
For many projects we need access to information on corporations
|
||
that are reported in SEC filings, or agency notices that are published
|
||
in the Federal Register. This list could be expanded with countless
|
||
other federal information products and services.
|
||
|
||
TAP uses these information resources to do research and produce
|
||
reports and studies. Thus, TAP is both a consumer of government
|
||
information resources, and a producer of value added information
|
||
products and services.
|
||
|
||
|
||
2. CITIZENS NEED MECHANISMS TO TELL AGENCIES HOW INFORMATION POLICIES
|
||
CAN BE IMPROVED
|
||
|
||
The federal government spends billions of tax dollars every year to
|
||
collect and store of information. These expenditures create resources
|
||
that often have multiple uses, including uses that are beyond the
|
||
agency's mission. But agencies are often indifferent to the public
|
||
interest in the information resources that they manage.
|
||
|
||
Agencies should be required to accept comments from the public on a
|
||
wide range of information management issues, including policies on the
|
||
collection and the dissemination of information. Citizens should have
|
||
mechanisms to regularly inform agencies of changes in policies and
|
||
practices that will allow citizens to better utilize federal information
|
||
resources.
|
||
|
||
|
||
3. PUBLIC NOTICE SECTIONS IN A-130 SHOULD BE EXPANDED TO ADDRESS A
|
||
WIDE RANGE OF PUBLIC INTEREST CONSIDERATIONS
|
||
|
||
The proposed Circular requires agencies to provide notice and
|
||
accept public comments before an agency can create or terminate a major
|
||
information program. This is too narrow a scope for public notice and
|
||
comment. Citizens should have opportunities to tell agencies when
|
||
services are inadequate or poorly designed, and citizens should also
|
||
have opportunities to ask agencies to create new information products
|
||
and services.
|
||
|
||
Agencies often commit errors of omission. Failures to provide
|
||
public access to taxpayer-funded information systems, or to embrace new
|
||
technologies (online systems, CD-ROMs, etc) or standards are common and
|
||
important errors of omission. Regular opportunities for public comment
|
||
on agency information management policies and practices would provide an
|
||
important mechanism to identify such errors.
|
||
|
||
4. AGENCY PUBLIC NOTICE REQUIREMENTS SHOULD INCORPORATE THE PROPOSALS
|
||
IN H.R. 3459, THE IMPROVEMENT OF INFORMATION ACCESS ACT.
|
||
|
||
H.R. 3459, the Improvement of Information Access Act (IIA Act),
|
||
provides a model for public notice and comment on federal information
|
||
policy. The proposals in the IIA Act were developed by a large working
|
||
group of librarians, researchers, and agency officials. The public
|
||
notice sections would provide the following mechanism:
|
||
|
||
i. Every year all federal agencies would be required to publish a
|
||
report which describes:
|
||
|
||
- plans to introduce or discontinue information products and
|
||
services,
|
||
|
||
- efforts to develop or implement standards for file and record
|
||
formats, software query command structures, and other matters
|
||
that make information easier to obtain and use,
|
||
|
||
- the status of agency efforts to create and disseminate
|
||
comprehensive indexes or bibliographies of their information
|
||
products and services,
|
||
|
||
- how the public may access the agencies information,
|
||
|
||
- plans for preserving access to electronic information that is
|
||
stored in technologies that may be superseded or obsolete, and
|
||
|
||
- agency plans to keep the public aware of its information
|
||
resources, services, and products.
|
||
|
||
i. Agencies would be required to solicit public comments on this plan,
|
||
including comments on the types of information collected and
|
||
disseminated, the agency's methods of storing information, their
|
||
outlets for disseminating information, the prices they charge for
|
||
information, and the "validity, reliability, timeliness, and
|
||
usefulness to the public of the information." The agency would be
|
||
required to summarize the comments it received and report each year
|
||
what it had done to respond to the comments received in the
|
||
previous year.
|
||
|
||
The issues addressed in H.R. 3459 are the types of things that are
|
||
needed to make agencies more responsive to citizens who use federal
|
||
information resources. In comparison, the public notice and comment
|
||
provisions of the current draft of A-130 are limited and static. We
|
||
need the flexible and dynamic approach embraced in H.R. 3459, to address
|
||
the concerns of data users as technologies change and as the uses of
|
||
federal information resources change.
|
||
|
||
|
||
5. THE USE OF STANDARDS MAKES GOVERNMENT INFORMATION EASIER TO OBTAIN
|
||
AND USE
|
||
|
||
Few citizens are highly trained in using computers. Standards for
|
||
file formats, software interfaces, query commands and other items will
|
||
make it easier for the public to obtain and use agency information
|
||
resources. A-130 should require agencies to use standardized record and
|
||
file formats and software interfaces.
|
||
|
||
Computer technologies are rapidly changing. Because technologies
|
||
and standards are constantly evolving, agencies should be required to
|
||
accept regular and frequent input from data users.
|
||
|
||
|
||
6. DATA COLLECTION ISSUES ARE IMPORTANT
|
||
|
||
Citizens need information to understand the world around them.
|
||
Agencies should encourage public debates over information collection
|
||
issues. For example:
|
||
|
||
- The SEC should regularly accept public comments on the types
|
||
of information that should be reported in corporate disclosure
|
||
filings. Investors or citizens who monitor corporate
|
||
activities should have opportunities to tell the SEC the types
|
||
of the information that should be included on corporate 10k
|
||
reports, insider trading reports, stock prospectuses, and
|
||
other filings.
|
||
|
||
- Historically the taxpayers finance about half of all U.S. R&D
|
||
expenditures. One measure of the efficacy of those
|
||
investments are patents from inventions that were financed by
|
||
the taxpayers. The Patent and Trademark Office should collect
|
||
information on patent applications that identify the role of
|
||
federal funds in the development of the inventions.
|
||
|
||
- Prescription drugs are one of the fastest growing elements of
|
||
the nation's enormous health care bill. The federal government
|
||
funds more than $10 billion in medical research, and provides
|
||
a wide array of special marketing monopolies and tax
|
||
expenditures to the pharmaceutical industry. In order to
|
||
evaluate the reasonableness of the prices for prescription
|
||
drugs, particularly those developed with federal funds, the
|
||
federal government should collect data on the costs of drug
|
||
development. The government should also collect information
|
||
on drug prices and revenues and the amount of money the
|
||
government spends buying government developed but privately
|
||
marketed drugs through medicaid and medicare.
|
||
|
||
- Many economists say the recent boom and bust in commercial
|
||
real estate was a major contributor to the collapse of the
|
||
savings and loan industry and the weakening of the commercial
|
||
banking system, which has contributed to the current
|
||
recession. Pensions funds have also lost billions of dollars
|
||
in commercial real estate markets. The Bureau of the Census
|
||
spends millions of dollars every year on a monthly survey of
|
||
building permits. This survey collects information on the
|
||
*value* of permits issued. Most real estate researchers want
|
||
Census to collect information on the *square feet* of building
|
||
permits, since that statistic is a much better predictor of
|
||
real estate supply. Better information on the supply of
|
||
commercial real estate would help prevent costly investor
|
||
mistakes.
|
||
|
||
|
||
These are just a few of the countless data collection issues
|
||
that deserve far more debate. Agencies are often out of touch with
|
||
citizen concerns about information collection issues, and they need to
|
||
be required to accept suggestions on these issues.
|
||
|
||
7. CONFLICTS OF INTEREST ARE IMPORTANT, AND SHOULD BE ADDRESSED IN
|
||
A-130
|
||
|
||
Many agencies contract out data processing services to firms
|
||
that sell agency information to citizens. Conflicts of interest abound.
|
||
Frequently the contractor has an interest in restricting public access
|
||
to the agency information systems, so the contractor can sell the data
|
||
through its own retail outlets. For example:
|
||
|
||
- Mead Data Central will receive $13.5 million from the SEC to
|
||
provide online full text searching of the EDGAR database
|
||
system. Mead is also the SEC subcontractor in charge of
|
||
providing public access to the EDGAR database. But since Mead
|
||
wants to sell SEC information to the public through its own
|
||
LEXIS service, it has restricted public access to taxpayer
|
||
financed EDGAR system.
|
||
|
||
- Westlaw has a contract to create a digital version of federal
|
||
caselaw for the Justice Department's JURIS online database
|
||
system. But Westlaw wants to sell the public those same
|
||
records thought its own high priced online service, and it has
|
||
obtained a contact that restricted public access to the
|
||
Department of Justice's very important JURIS system. In doing
|
||
so Westlaw has not only denied the taxpayers access to an
|
||
important government database, but it has also prevented rival
|
||
database vendors from obtaining the JURIS database in order to
|
||
compete with Westlaw and Lexis, the two firms that currently
|
||
enjoy a duopoly in the market for online access to federal
|
||
legal opinions.
|
||
|
||
A-130 should address these types of agreements, instructing
|
||
agencies to insure that private contractors do not use federal data
|
||
processing contracts to obtain unfair advantages over their rivals, or
|
||
to deny the public access to information and information systems that
|
||
they have already paid for through taxes.
|
||
|
||
8. HIGH PRICES FOR INFORMATION PRODUCTS AND SERVICES CREATES LARGE
|
||
DISPARITIES BETWEEN CITIZENS BASED UPON THEIR ABILITY TO PAY
|
||
|
||
The Taxpayer Assets Project is a nonprofit organization with a
|
||
small budget. We simply cannot afford to buy many of the commercial
|
||
services that provide access to government databases. The groups that
|
||
are most able to afford these expensive services are those with large
|
||
financial interests in narrow aspects of government policy. For
|
||
example, most pharmaceutical firms have armies of lawyers, lobbyists and
|
||
policy analysts who can afford to monitor every actions of the FDA, PTO,
|
||
NIH, Congress and other government agencies, not to mention their
|
||
private sector rivals. When access to government information is rationed
|
||
according to willingness to pay, we find ourselves at an enormous
|
||
disadvantage. Not only do the pharmaceutical companies have the
|
||
resources to finance congressional and presidential campaigns, to dangle
|
||
high paying jobs to former government officials, and to vastly outstaff
|
||
groups that represent consumers and taxpayers, but they also are the
|
||
only ones who can afford to use the databases that are funded by the
|
||
taxpayers. This scenario, repeated throughout the government, is among
|
||
the reasons that special interest groups can manipulate and control the
|
||
government, at the expense of the broader public interest.
|
||
|
||
A-130 should instruct agencies to consider the impact of
|
||
information management policies on the prices that consumers will pay
|
||
for access to taxpayer funded information resources. For example, if an
|
||
agency can produce CD-ROM products for $35 or less, why should citizens
|
||
be required to pay $500 to $10,000 to buy the information from
|
||
commercial vendors? Likewise, if it costs between $15 and $35 an hour
|
||
to provide online access to the PTO's APS, why should citizens be forced
|
||
to pay $340 per hour to receive the same information through Lexis?
|
||
|
||
Agencies should avoid policies that deliberately restrict public
|
||
access to taxpayer funded information systems in order to bolster the
|
||
business interests of commercial vendors, since this leads to even
|
||
greater concentrations of political power. Low cost access to
|
||
government information is needed to strengthen citizen involvement in
|
||
government policy making.
|
||
|
||
|
||
9. OMB'S PROPOSED LIMITS ON PRICES FOR INFORMATION PRODUCTS AND
|
||
SERVICES ARE NEEDED
|
||
|
||
Among the best features of the proposed A-130 revision are the
|
||
provisions that would limit agency prices for information products and
|
||
services to the costs of dissemination. This is sorely needed.
|
||
|
||
|
||
10. AGENCIES ARE USING NTIS TO RAISE PRICES FOR INFORMATION PRODUCTS
|
||
AND SERVICES FAR ABOVE DISSEMINATION COSTS
|
||
|
||
Many agencies now have contracts that give NTIS exclusive rights to
|
||
sell information at prices that far exceed dissemination costs. For
|
||
example, the Federal Reserve sells its "bank call" reports on magnetic
|
||
tape for $560 per quarter. Information from the Home Mortgage Disclosure
|
||
Act (HMDA) is also very expensive. OMB should clarify an agency's
|
||
responsibility to provide access to information at cost, when NTIS is
|
||
simultaneously selling the information at huge markups. This is an
|
||
enormous issue, given the large and rapidly growing electronic
|
||
collections that NTIS currently manages.
|
||
|
||
|
||
11. THE FEDERAL DEPOSITORY LIBRARY PROGRAM SHOULD NOT BE SUBJECT TO A
|
||
TECHNOLOGICAL SUNSET
|
||
|
||
The federal Depository Library Program (DLP) provides 1,400
|
||
libraries with free access to federal information. This program, which
|
||
has been around since the middle of the 19th century, is not a welfare
|
||
program. It serves scholars, business persons, and many others who need
|
||
access to federal information.
|
||
|
||
We frequently use federal depository libraries. We cannot afford
|
||
to buy all the government publications that we use, but even when prices
|
||
are not an issue, we rely upon the library staff's expertise and
|
||
indexing resources to discover publications that may be useful to us.
|
||
The fact that information is disseminated in electronic formats should
|
||
not eliminate an agency's responsibility to this important program.
|
||
|
||
|
||
|
||
12. ACCEPTING PUBLIC COMMENTS VIA ELECTRONIC MAIL
|
||
|
||
OMB deserves a pat on the back for its efforts in using electronic
|
||
mail networks such as the Internet to disseminate information about the
|
||
proposed changes in the Circular, and to receive comments by electronic
|
||
mail. These steps will broaden public awareness of the Circular, and
|
||
allow a wider group of citizens to participate in the debate. We urge
|
||
OMB to address this issue in the final draft of A-130. That is, OMB
|
||
should encourage all federal agencies to use electronic mail networks to
|
||
disseminate public notices *and* to accept public comments. It is
|
||
particularly appropriate here, when many citizens who are interested in
|
||
government information policy have access to such networks. Of course,
|
||
these efforts should supplement and not replace other methods of
|
||
providing public notice and accepting comments.
|
||
+++++++++++++
|
||
James Love, Director VOICE: 215-658-0880
|
||
Taxpayer Assets Project FAX: call
|
||
12 Church Road INTERNET: love@essential.org
|
||
Ardmore, PA 19003
|
||
|
||
------------------------------
|
||
|
||
Date: 06 Sep 92 16:08:07 EDT
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 6--Reflections on INFOWEEK's CU-related stories
|
||
|
||
Information Week and "Weak Links"
|
||
|
||
The August 10, 1992 issue of INFORMATION WEEK (IW) features a story
|
||
on "weak links" in data security. IW Editor Jerry Colonna writes
|
||
that "We're not talking about hackers breaking into data centers.
|
||
Much attention has been paid to the obvious targets, and many data
|
||
centers now resemble medieval fortresses."
|
||
|
||
We will try to ignore the fact that just a few weeks ago IW
|
||
criticized the Computer Security Institute for using 'hacker' in
|
||
reference to computer intrusion. (see "Pirate is PC?" in CuD 4.35)
|
||
|
||
Colonna continues..."The problem is the low-tech access to your
|
||
network. If the deli down the road has your fax number, chances are
|
||
your competitors - or someone they hired - has it, too, and they can
|
||
read everything you send or receive. Orders from customers, invoices
|
||
from suppliers, Bank statements. Everything." (page 2) Later in
|
||
the same editorial he discusses the dangers of forgetting that
|
||
cellular phones can be overheard using a radio scanner.
|
||
|
||
The featured article has some good advice, ranging from buying an
|
||
encrypting phone for confidential conversations, to using fake names
|
||
when discussing business on an unsecured channel. (Although the
|
||
article didn't go so far as suggesting appropriate pseudonyms, I
|
||
enjoyed using 'Red Rooster Four' back in the Radio Shack
|
||
walkie-talkie days of my childhood. My friend Spencer was Red
|
||
Rooster One. There were no 'Two' or 'Three', but we wanted it to
|
||
sound like we had a bigger "army" then we actually did. A technique
|
||
that might also be handy on your car phone.)
|
||
|
||
And speaking of good advice, former Sun Devil mastermind Gail
|
||
Thackeray is quoted in the article as urging businesses to stop being
|
||
'promiscuous' with their fax numbers. Also, she advises, all outgoing
|
||
faxes should include a cover sheet saying that the fax is intended
|
||
only for the addressee. She reportedly stresses that this is
|
||
particularly important if the material in the fax is confidential.
|
||
Unfortunately there is no further explanation of just what good
|
||
stating this would do. It sounds vaguely like the "no cops allowed"
|
||
sign-ons found on some CU bulletin boards, which Thackeray and her
|
||
troops have no doubt ignored themselves.
|
||
|
||
Another interesting, but questionable, tidbit is found on page 30...
|
||
|
||
"If a corporate spy had to pick one 'darling' of the trade, it
|
||
would undoubtedly be the fax machine, says a report from the
|
||
American Institute For Business Research in Framingham, Mass.
|
||
The report, 'Protecting Corporate America's Secrets In the
|
||
Global Economy,' asserts that the fax is one of the easiest
|
||
ways for spies to steal corporate information. For one, the
|
||
report says, thieves can tap into the victim's fax line and
|
||
create a shadow version of every fax the victim sends or
|
||
receives."
|
||
|
||
Now I'm not an electrical engineer, but doesn't this seem about as
|
||
easy as getting three modems talking to each other all at once? I'm
|
||
not saying that a fax can't be intercepted, through a data trap, but
|
||
I don't think tapping a phone line and hanging an extra fax machine
|
||
in the circuit is going to get you anywhere. Reminding people that
|
||
faxed documents are inherently unsecure is a Good Thing, but this
|
||
vague statement might only lead to additional paranoia and
|
||
unwarranted concern. Unless, of course, this *is* something that is
|
||
easily accomplished. In which case it should have been stated even
|
||
more emphatically, and with more authority and credibility.
|
||
|
||
The four page article ends with an appropriate quote from the
|
||
security director at The Bank of Boston : "Technology can be your
|
||
best friend. But it can also be your mortal enemy". All in all,
|
||
not a bad thing to keep in mind.
|
||
|
||
CompuServe Magazine and Death in Cyberspace.
|
||
--------------------------------------------The September 1992 issue
|
||
of CompuServe Magazine features "The Mourning After" by Hank Nuwer.
|
||
(pp 32-34) Nuwer is a prolific author, including a recent book about
|
||
Fraternity Hazing. (_Broken Pledges: The Deadly Rite of Hazing) In
|
||
this article Nuwer discusses the grieving process, as experienced by
|
||
online friends, when someone dies.
|
||
|
||
The article touches upon four types of situations where online
|
||
communities are affected by the death of a member, or in some cases
|
||
the a death in the family of a community member. In the case of the
|
||
latter, online communities can provide a supportive network, removed
|
||
from the tragedy itself...
|
||
|
||
People often feel threatened when required to express
|
||
grief, but may be less intimidated expressing these
|
||
thoughts online, according to Dr. Dorothy DeMoya, a
|
||
consultant in %Compuserve's% Human Sexuality Information
|
||
and Advisory Service. 'Among patients who've lost loved
|
||
ones, strangers became family and family became strangers,'
|
||
she says. 'To be able to establish online relationships
|
||
like this is wonderful.'
|
||
|
||
Another example of how virtual communities are affected by death and
|
||
dying is illustrated by the unexpected death of Glenn Hart, sysop of
|
||
the Fox Software Forum, and contributing writer to PC Magazine.
|
||
After his death in January the forum was flooded with messages as
|
||
members expressed their sorrow and memories of him. In this case,
|
||
and in many others that Nuwer cites, the messages were captured and
|
||
printed by a forum member. They have been given to Hart's widow, who
|
||
is saving them for her younger children to read at the appropriate
|
||
time.
|
||
|
||
Finally, the article discusses the role of cyberspace in dealing with
|
||
deaths of other than family members. Participants in the RockNet
|
||
forum grieved the deaths of Bill Graham and Freddie Mercury, while
|
||
the Space and Astronomy Forum dealt with the loss of the six US
|
||
Astronauts lost in the 1986 Challenger Space Shuttle accident. Even
|
||
members of the Pet Forum have found that online friends can help in
|
||
adjusting to the loss of a favorite pet.
|
||
|
||
Moderators' Note: This is an area that is ripe for additional
|
||
research. CuD welcomes additional resources and references in this
|
||
area. Readers may also be interested in 'Online Suicide' by Preston
|
||
Gralla in the May 1991 issue of PC Computing. (p132+)
|
||
|
||
"No Piracy Shield"
|
||
|
||
Information Week reports that a US bankruptcy court in Los Angeles
|
||
has ruled a defendant cannot avoid paying damages for software piracy
|
||
by failing for bankruptcy. The ruling came down in Novell Inc v.
|
||
Medperfect Systems Inc (owned by Ronald S. Frank). The article
|
||
states that bankruptcy, in the past, has been used to avoid lawsuits
|
||
over copyright infringement and the like. Information Week also
|
||
reports that Medperfect admits to using unlicensed NetWare as the
|
||
basis for systems sold in dentist offices in Southern California.
|
||
Information Week July 13, 1992 p16
|
||
|
||
Phreak Insurance
|
||
|
||
Information Week is reporting that Travelers Corporation is going to
|
||
offer phone fraud insurance. The policy will be available in $50K
|
||
and $1 million dollar amounts to cover remote access fraud, those
|
||
calls made by hackers breaking into corporate phone systems and
|
||
placing outgoing calls. The policy will reportedly require that
|
||
certain minimum safeguards are met, such as making all passwords more
|
||
than three digits long. (INFORMATION WEEK, August 31, 1992 p16)
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 1 Sep 1992 10:22:44 -0700
|
||
From: James I. Davis <jdav@WELL.SF.CA.US>
|
||
Subject: File 7--Software Piracy--The Social Context
|
||
|
||
((MODERATORS' NOTE: Jim Davis raises a number of interesting issues
|
||
regarding piracy and the SPA. CuD 4.44 and 4.45 will be devoted to
|
||
some of these issues, and Jim will be invited to elaborate there on
|
||
some of the themes he addresses here)).
|
||
|
||
Anne Branscomb, a strong advocate of property rights in information --
|
||
admits that there is nothing "natural" about property rights (see her
|
||
essay "Property Rights in Information"). Property rights are social
|
||
conventions that are struggled over. And we shouldn't give up that
|
||
fight to the SPA.
|
||
|
||
Re: software "piracy" in schools, perhaps we should see an extension
|
||
of "Fair Use Doctrine" to software use in schools. A bit of recent
|
||
history -- broadcast TV shows were not intended to be copied and
|
||
viewed at leisure at home. But to have stuck to that point, the courts
|
||
would have criminalized a substantial number of adults who were
|
||
time-shifting with their VCRs to watch soaps or football games or
|
||
whatever. So "fair use", originally intended to allow book reviewers
|
||
to quote from works, was de jure extended to a de facto reality --
|
||
people "stole" TV shows, and enjoyed them. I understand that fair use
|
||
extends to school use as well.
|
||
|
||
Why don't people just see that loaning disks, copying programs, etc.
|
||
is wrong? Because it's not obvious, and it certainly isn't "naturally"
|
||
wrong. The SPA has to cultivate a mindset that isn't there. You give
|
||
me knowledge, you still have use of it; now I can use it too. The more
|
||
it is shared, the more useful it becomes. It doesn't really wear out,
|
||
and it doesn't get used up. So people (naturally) say, where's the
|
||
harm? It's not like I stole your silverware or pinched your car. A
|
||
rather noble attribute, sharing, is turned into a crime! And we are
|
||
all to be enlisted in this SPA scheme for policing property rights of
|
||
software companies. No thanks.
|
||
|
||
Property rights and information just don't go together:
|
||
|
||
(1) The enforcement of property rights in information requires a
|
||
police state. The SPA encourages people to squeal on each other by
|
||
calling an 800 number. If the laws were enforced, I would bet that
|
||
_most_ computer users would be guilty. Hence, the population is
|
||
criminalized, and subject to police and court control. Just because
|
||
the laws aren't enforced in totality doesn't mean that they can't be
|
||
used.
|
||
|
||
(2) Enforcing property rights in information prevents the "storehouse
|
||
of knowledge" from being used optimally. Hence society and
|
||
civilization is held back. The lost productivity due to conflicting
|
||
standards and interfaces required because of proprietary interfaces
|
||
etc. is one example. The lost educational opportunities resulting from
|
||
schools not getting the software they need in the quantities they need
|
||
is another. The lost time of researchers who must duplicate research
|
||
because they are prevented from sharing information because of trade
|
||
secrecy or international competition is another. The unavailability of
|
||
textbooks in poor countries because they cost as much as a month's
|
||
wages (or software that costs as much as a year's wages) is another .
|
||
|
||
(3) Property rights in information aren't needed to ensure software
|
||
production, creativity, advancement of society, etc. The freeware and
|
||
public domain library testify to this. People create for many reasons,
|
||
of which financial gain is only one, and I would argue, not the most
|
||
important. The challenge of doing it, peer or public recognition,
|
||
service to humanity are important motivators. Much valuable research
|
||
has been carried out in the public sector -- via federal research
|
||
institutions or via publicly funded universities. Obviously financial
|
||
gain wasn't the main motivator there (except until recently, brought
|
||
on by the de-funding of universities, forcing them to go begging. Most
|
||
engineers, I would guess, must sign work-for-hire agreements in order
|
||
to obtain work, effectively signing away any rights to the products of
|
||
their creativity. The beneficiaries of property rights in information
|
||
aren't the creators, but the entrepreneurs. Finally, is the software
|
||
industry profitable today? Yes. Even with the $24 billion in "piracy".
|
||
How can this be so? Because what the software companies "lose" is
|
||
revenue with no associated cost (the "pirate" has done the labor, and
|
||
presumably provided the equipment and disk). This is the difference
|
||
between stealing cars and duplicating software.
|
||
|
||
(4) But but but, how will software get written, who will finance it?
|
||
Knowledge is a _social_ treasury, and should be funded socially.
|
||
Public competitions, grants, a social fund supported by users,
|
||
whatever. We have some models already: the university and federal
|
||
research model; the arts funding model; the GNU experiment; the
|
||
freeware and public domain experience. We're a creative and energetic
|
||
group -- we can figure it out.
|
||
|
||
-----------------------------------------------------
|
||
|
||
End Cu Digest, #4.42
|
||
|
||
|