767 lines
32 KiB
Plaintext
767 lines
32 KiB
Plaintext
|
|
Computer underground Digest Sun Jan 4, 1998 Volume 10 : Issue 01
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #10.01 (Sun, Jan 4, 1998)
|
|
|
|
File 1--Re: Salary Survey Results + SANS Update
|
|
File 2--China clamps new controls on the Net
|
|
File 3--THERE GOES THE NEIGHBORHOOD (CyberPatrol again)
|
|
File 4--Personal Information No Longer Available (CDT reprint)
|
|
File 5-- Clinton Signs "No Electronic Theft Act"
|
|
File 6--No Electronic Theft Act; who's to judge?
|
|
File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Wed, 24 Dec 1997 16:19:26 -0500 (EST)
|
|
From: The SANS Institute <sans@clark.net
|
|
Subject: File 1--Re: Salary Survey Results + SANS Update
|
|
|
|
((MODERATORS' NOTE: The SANS Institute, in addition to producing
|
|
the annual salary survey, publishes th Network Security Digest
|
|
(every 6 weeks) which is the authoritative digest of new security
|
|
threats and solutions. Practicing system administrators and security
|
|
professionals can get free subscriptions to the Digest by emailing:
|
|
sans@clark.net. This is one of the more useful resources on the
|
|
Net and is well worth checking out.
|
|
|
|
The following tables MAY NOT be redistributed or reproduced without
|
|
express permission of the SANS Institute (sans@clark.net)).
|
|
|
|
=================
|
|
|
|
1. Since this is the season of salary negotiations as well as holiday
|
|
cheer, we are sending you a gift of the main tables from the new (1997)
|
|
SANS Salary Survey. You'll get the complete survey report with all
|
|
fourteen tables at SANS98 (or NT-SANS), but we hope the tables at the end
|
|
of this note are helpful in any immediate salary discussions.
|
|
|
|
2. In the past week, we've gotten more than twenty emails asking whether
|
|
we allow people to register early for SANS98 (Monterey in May) or asking
|
|
for early data about the courses and program. Earlier today we put the
|
|
finishing touches on the program and sent it off to the printers. We'll
|
|
mail it, along with the new "Roadmap to Network Security" poster, in late
|
|
January. But if you need something right away, we have an email version
|
|
of the schedule and registration form you can use to register using 1997
|
|
funds or to get a head start on the approval process. To get a copy,
|
|
reply to this email with the subject: SANS-1, SANS-2, or SANS-3. For
|
|
SANS-1 we'll send you the list of 51 courses scheduled at SANS98, For
|
|
SANS-2 we'll send the list of courses plus the program (peer-reviewed
|
|
sessions, invited sessions, and eleven short-courses) for the five-track
|
|
technical conference. SANS-3 will get you the courses, the program and a
|
|
registration form.
|
|
|
|
I hope the new year brings you health and happiness.
|
|
|
|
Alan
|
|
|
|
PS. The first 1998 issue of the SANS Network Security Digest will be
|
|
delivered early in January. The Digest is scheduled to come out every six
|
|
to seven weeks; there wasn't a December 1997 issue.
|
|
|
|
====================================================================
|
|
Summary Tables from the 1997 SANS System Administration and Security
|
|
Salary Survey
|
|
|
|
How much are system administrators and security professionals paid?
|
|
|
|
Salary Range-------- Number
|
|
of People Percentage
|
|
1. Under $20,000 --- 12 1%
|
|
2. $20,000 - $29,999 53 3%
|
|
3. $30,000 - $39,999 186 12%
|
|
4. $40,000 - $49,999 320 20%
|
|
5. $50,000 - $59,999 351 22%
|
|
6. $60,000 - $69,999 310 19%
|
|
7. $70,000 - $79,999 184 12%
|
|
8. $80,000 - $89,999 81 5%
|
|
9. $90,000 - $99,999 51 3%
|
|
10.$100,000 and over 49 3%
|
|
Total--------------- 1599
|
|
|
|
|
|
|
|
|
|
How do size and type of employer affect salary?
|
|
-------------Number of Employees---------------
|
|
Type of
|
|
Employer Fewer 11-100 101-1000 More Average
|
|
than 10 than 1,000
|
|
Commercial
|
|
- Business $58,462 $53,389 $55,825 $60,615 $58,474
|
|
Commercial
|
|
- Research $70,846 $54,722 $61,860 $62,961 $61,819
|
|
Educational N/A $47,262 $43,933 $47,207 $46,389
|
|
Government N/A $50,000 $47,349 $55,011 $53,501
|
|
System Int'rs. $70,230 $68,471 $58,671 $62,592 $63,168
|
|
|
|
|
|
|
|
How do years of system administration experience affect salary?
|
|
|
|
Years of System
|
|
Administration Average Salary Number
|
|
Experience
|
|
|
|
Less than One $50,034 50
|
|
One to Three $45,811 300
|
|
Three to Five $52,101 369
|
|
More than Five $63,907 878
|
|
|
|
(The high number for low experience reflects lots of experienced computer
|
|
people moving into sysadmin jobs)
|
|
|
|
|
|
|
|
Does geographic region affect salaries?
|
|
|
|
|
|
Region Average Salary Number
|
|
|
|
California $68,443 204
|
|
US Northeast $61,818 430
|
|
US Southwest $59,105 148
|
|
US South-central $57,553 110
|
|
Asia $54,793 13
|
|
US Midwest $54,660 230
|
|
US Southeast $53,858 202
|
|
US Northwest $53,257 76
|
|
Alaska & Hawaii $49,550 8
|
|
Australia $46,558 37
|
|
Canada $45,161 69
|
|
Europe $43,734 86
|
|
Africa $41,100 4
|
|
South America $36,243 10
|
|
|
|
|
|
|
|
How does education affect the gender gap in salary?
|
|
|
|
|
|
Education Women Men
|
|
High School $54,500 $50,971
|
|
Some College $48,039 $57,770
|
|
College Degree $53,910 $56,960
|
|
Masters Degree $60,827 $60,671
|
|
PhD. $46,400 $64,625
|
|
|
|
|
|
|
|
Alan Paller, Director, The SANS Institute
|
|
www.sans.org, sans@clark.net, 301-951-0102
|
|
Upcoming SANS Conferences: | SANS Publications:
|
|
NT SANS (March 2-6, San Diego, CA) | Roadmap to Network Security Poster
|
|
SANS98 (May 9-15, Monterey. CA) | The Network Security Digest
|
|
Network Security '98 (Oct., Orlando) | The SysAdmin/Security Salary Survey
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 31 Dec 1997 09:43:23 -0800
|
|
From: "James Galasyn (Excell Data Corporation)" <a-jameg@microsoft.com>
|
|
Subject: File 2--China clamps new controls on the Net
|
|
|
|
China clamps new controls on the Net
|
|
Reuters
|
|
|
|
BEIJING -- China clamped sweeping new controls on the Internet on Tuesday,
|
|
warning that the network was being used to leak state secrets and to spread
|
|
``harmful information.''
|
|
|
|
Regulations unveiled by Zhu Entao, Assistant Minister for Public Security,
|
|
cover a wide range of crimes, including leaking state secrets, political
|
|
subversion and spreading pornography and violence.
|
|
|
|
The rules are also designed to protect against computer hacking, viruses and
|
|
other computer-related crime.
|
|
|
|
They call for unspecified ``criminal punishments'' and fines of up to 15,000
|
|
yuan ($1,800) for Internet providers and users who violate the rules -- both
|
|
individuals and business organisations.
|
|
|
|
One article says the Internet must not be used to ``split the country,'' a
|
|
clear reference to separatist movements in Tibet and the Moslem region of
|
|
Xinjiang.
|
|
|
|
Another on ``defaming government agencies'' appears designed to combat use
|
|
of the Internet by dissidents. A number of Chinese political exiles have
|
|
home pages which they use to attack the Beijing government.
|
|
|
|
The regulations explicitly cover information circulating from Hong Kong,
|
|
Macau and Taiwan.
|
|
|
|
Hong Kong reverted to Chinese rule this year and Portuguese-run Macau will
|
|
be handed back in 1999. China regards Nationalist-ruled Taiwan as a rebel
|
|
province.
|
|
|
|
The official Xinhua news agency quoted Zhu as telling a news conference on
|
|
Monday that Internet links since 1994 had boosted China's cultural and
|
|
scientific exchanges with the world.
|
|
|
|
``But the connection has also brought about some security problems,
|
|
including manufacturing and publicising harmful information, as well as
|
|
leaking state secrets through the Internet,'' he said.
|
|
|
|
The regulations, contained in 25 articles, were approved by the State
|
|
Council, or cabinet, on December 11 and took effect Tuesday.
|
|
|
|
They go beyond earlier provisional regulations first promulgated in February
|
|
1996 and revised in May 1997, which also ban pornography and warn against
|
|
leaking state secrets.
|
|
|
|
Chinese authorities have made attempts to censor pornography, politics and
|
|
Western news organisations on the Internet. But with scores of providers,
|
|
Chinese surfers have been able to find almost anything they want.
|
|
|
|
It was not immediately clear whether Beijing would devote more resources to
|
|
policing the Internet now that new regulations were in place.
|
|
|
|
Xinhua cited figures from the Internet Information Centre of China showing
|
|
more than 49,000 host computers and 250,000 personal computers were
|
|
connected to the Internet at the end of October.
|
|
|
|
Under the new regulations, Internet providers would be subject to
|
|
supervision by Public Security officials and would be required to help track
|
|
down violators.
|
|
|
|
Zhu said the regulations would ``safeguard national security and social
|
|
stability,'' Xinhua said.
|
|
|
|
Computer networks were now indispensable as tools for managing state
|
|
affairs, economic construction, defence and science and technology, he said.
|
|
They were a pillar of social development.
|
|
|
|
``Hence, the safe and effective management of computer information networks
|
|
is a prerequisite for the smooth implementation of the country's
|
|
modernisation drive,'' he said.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 23 Dec 1997 12:25:01 -0800
|
|
From: Jonathan Wallace <jw@bway.net>
|
|
Subject: File 3--THERE GOES THE NEIGHBORHOOD
|
|
|
|
Jonathan Wallace
|
|
The Ethical Spectacle http://www.spectacle.org
|
|
Co-author, Sex, Laws and Cyberspace http://www.spectacle.org/freespch/
|
|
|
|
THERE GOES THE NEIGHBORHOOD (CyberPatrol again)
|
|
|
|
CyberPatrol blocks a gay community of 23,400 Web sites
|
|
|
|
by Jonathan Wallace jw@bway.net
|
|
|
|
Censorware software vendors say that they rarely make mistakes,
|
|
and correct them quickly when called to their attention.
|
|
CyberPatrol's block of an online neighborhood called West
|
|
Hollywood sheds some interesting light on this assertion.
|
|
|
|
Geocities is a free Web hosting service, organized into
|
|
"neighborhoods" of shared interests. The West Hollywood
|
|
neighborhood of Geocities,
|
|
http://www.geocities.com/WestHollywood/, is for gay people. The
|
|
entire West Hollywood neighborhood, of 23,400 separate Web sites,
|
|
is blocked by CyberPatrol, a product of Microsystems Inc., a
|
|
Boston company.
|
|
|
|
There were a few hardcore pictures on a few West Hollywood Web
|
|
pages, despite Geocities terms of service which ban pornography
|
|
on the system. There were tens of thousands of other pages which
|
|
contained no objectionable material at all. CyberPatrol critics
|
|
say that Microsystems threw out a very large baby with a small
|
|
amount of bathwater.
|
|
|
|
Bob Parker is the Community Leader Liaison for West Hollywood--a
|
|
sort of volunteer Webmaster. In a long, impassioned post to the
|
|
fight-censorship mailing list, cross-posted to Microsystems and
|
|
numerous other recipients, he quoted the Geocities terms of
|
|
service, which ban the display of "material containing nudity or
|
|
pornographic material of any kind." The company also has a
|
|
full-time "Community Response Team" which investigates complaints
|
|
filed by anyone, Geocities customer or not, about violations of
|
|
the terms of service. In addition, West Hollywood maintains its
|
|
own "Neighborhood Watch" program. Parker pointed out that
|
|
Microsystems chose to block a community of 23,400 sites when
|
|
there was an alternative: "[A]ll it would have taken was a few
|
|
minutes of investigation on the part of Microsystems to find out
|
|
about the Neighorhood Watch program at GeoCities, get the sites
|
|
taken care of and avoid this whole situation."
|
|
|
|
Challenged to justify the West Hollywood block, Microsystems CEO
|
|
Dick Gorgens reacted equivocally. "Upon my review, you were
|
|
absolutely correct in your assessment that the subdirectory block
|
|
on WestHollywood is prejudicial to the Gay and Lesbian Geocities
|
|
community," he told the Gay and Lesbian Alliance Against
|
|
Defamation, a group which sits on a CyberPatrol oversight
|
|
committee convened by Microsystems. But then he seemed to claim
|
|
that the majority of West Hollywood web pages are pornographic:
|
|
"We took the 'easier' approach to blocking the small number of
|
|
actionable non-nudity publishers in that area rather than
|
|
individually sanctioning them." But he acknowledged that
|
|
"[t]aking that technique to the limit would have us pull the
|
|
plug on the entire Internet which is obviously not our plan." He
|
|
pledged that the West Hollywood "problem" would be corrected
|
|
within a week. Two weeks later, it still has not been.
|
|
|
|
"GLAAD was extremely disappointed that such a discriminatory move
|
|
was made by Microsystems," wrote Loren Javier, the organization's
|
|
interactive media director. Critics had suggested that the
|
|
organization reconsider its role in advising Microsystems--that
|
|
the organization might be providing cover to the company without
|
|
actually preventing the product from blocking legitimate
|
|
gay-oriented sites. Javier wrote: "The issue now is whether
|
|
GLAAD will continue to serve on the oversight committee. I have
|
|
sent a message to Dick Gorgens with conditions that I be able to
|
|
review the complete block list and that I be able to ask why
|
|
sites have been blocked." Microsystems has not previously allowed
|
|
its oversight committee members to view the CyberNot list.
|
|
|
|
The blocking of West Hollywood raises the issue of whether it is
|
|
possible to filter the Internet at all. At five minutes per
|
|
site--a very cursory amount of time to determine whether a Web
|
|
page is "appropriate" under Microsystems' criteria--it would take
|
|
a company employee 1950 hours, a little more than one
|
|
person-year, to review every site in West Hollywood. And West
|
|
Hollywood's pages constitute just a tiny drop of the estimated
|
|
200 million documents on the Internet. Though Microsystems says
|
|
that it uses a tool called Cyber Spyder to winnow the Net and
|
|
select sites for review, every page returned by the tool as a
|
|
potential candidate for blocking is still reviewed by a human
|
|
being. No-one seriously claims that any software possible today
|
|
is capable of making the kinds of subjective determinations
|
|
necessary in evaluating the "appropriateness" of Web pages.
|
|
Censoring the net will always be a labor-intensive effort.
|
|
|
|
The blocking of West Hollywood is not an isolated instance. A
|
|
report issued this week by The Censorware Project, an ad hoc
|
|
group of which I am a member, lists fifty Web hosting services
|
|
blocked in their entirety by Cyberpatrol, even though the
|
|
majority of user pages on these services are legitimate. One of
|
|
them, members.tripod.com, hosts 1.4 million Web pages. (Source:
|
|
"Blacklisted by CyberPatrol: From Ada to Yoyo,"
|
|
http://www.spectacle.org/cwp/.)
|
|
|
|
Faced with the near impossible task of reviewing the
|
|
entire Net, censorware companies like Microsystems
|
|
will continue to take the easy way out.
|
|
|
|
---------------------------------------------------
|
|
(On Monday, December 22, 1997, Washington attorney
|
|
Robert Corn-Revere filed a ground-breaking federal
|
|
lawsuit challenging the use of another censorware
|
|
product, X-Stop, in the Loudoun County, Va.,
|
|
public library
|
|
(http://www.pfaw.org/press/loudon_complaint.htm).
|
|
I'll discuss the case in an upcoming SLAC bulletin.)
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 18 Dec 1997 11:36:55 -0500
|
|
From: Graeme Browning <gbrowning@CDT.ORG>
|
|
Subject: File 4--Personal Information No Longer Available (CDT reprint)
|
|
|
|
A briefing on public policy issues affecting civil liberties online
|
|
-------------------------------------------------------------
|
|
CDT POLICY POST Volume 3, Number 16 December 18, 1997
|
|
|
|
CONTENTS: (1) Industry Responds to Online Community RE: Personal Information
|
|
(2) How to Subscribe/Unsubscribe
|
|
(3) About CDT, Contacting us
|
|
|
|
** This document may be redistributed freely with this banner intact **
|
|
Excerpts may be re-posted with permission of <gbrowning@cdt.org>
|
|
|
|
|PLEASE SEE END OF THIS DOCUMENT FOR SUBSCRIPTION INFORMATION|
|
|
___________________________________________________________________
|
|
|
|
(1) INDUSTRY RESPONDS TO ONLINE COMMUNITY'S OUTRAGE OVER WIDESPREAD
|
|
AVAILABILITY OF PERSONAL INFORMATION
|
|
|
|
Dec. 18--In the wake of last year's public uproar over the providing of
|
|
unique, personal identifiers like Social Security numbers, unlisted phone
|
|
numbers and birthdates over the Internet, the country's three leading
|
|
credit bureaus and individual reference services have pledged to stop
|
|
making that information available to the general public, according to a
|
|
report the Federal Trade Commission (FTC) released yesterday. The Center
|
|
for Democracy and Technology (CDT) applauds the FTC, the credit bureaus and
|
|
the reference services for their work, but warns that it doesn't entirely
|
|
solve the problem of protecting consumers at a time when Web sites that
|
|
provide fast, easy access to public records containing personal information
|
|
on individuals are proliferating.
|
|
|
|
The Individual Reference Services Group (IRSG)--an industry coalition
|
|
composed of Experian, LEXIS-NEXIS, Equifax Credit Information Services,
|
|
Inc., Trans Union Corp., and 10 other companies--has agreed to abide by a
|
|
set of self-regulatory principles aimed at curbing access to sensitive
|
|
private data on individuals. The issue of personal information made widely
|
|
and easily available to the general public via the Internet first drew a
|
|
public outcry in September 1996 when LEXIS-NEXIS began offering
|
|
individuals' mothers' maiden names, Social Security numbers and dates of
|
|
birth on its "P-Trak" database. At the height of the controversy Congress
|
|
asked the Federal Reserve Board and the Federal Trade Commission to study
|
|
the privacy implications of this practice. The FTC's report is available at
|
|
http://www.ftc.gov/opa/9712/inrefser.htm. The Federal Reserve Board issued
|
|
its report earlier this year.
|
|
|
|
"The companies involved in the IRSG's effort are to be commended for
|
|
stepping up to the plate and crafting the most comprehensive set of
|
|
self-regulatory guidelines of any US industry, however, a number of
|
|
important consumer and privacy issues remain to be addressed before this
|
|
can be considered a complete solution," said CDT Staff Counsel Deirdre
|
|
Mulligan, who focuses on privacy issues.
|
|
|
|
COMPANIES' PROPOSAL RESPONDS TO PRIVACY CONCERNS
|
|
|
|
The IRSG proposal responds to concerns raised by Internet users and
|
|
privacy advocates last September, available at
|
|
http://www.cdt.org/privacy/960920_Lexis.html, by:
|
|
|
|
* prohibiting the distribution of Social Security Numbers, dates of birth,
|
|
unlisted phone numbers, and mothers' maiden names to the general public;
|
|
|
|
* prohibiting "reverse Social Security Number (SSN)" look-ups (finding a name
|
|
or address based on an SSN);
|
|
|
|
* requiring companies offering look-up services to the general public to allow
|
|
people to "opt-out" of these databases;
|
|
|
|
* providing individuals with access to information held by the companies that
|
|
does not come >from public records; and
|
|
|
|
* prohibiting the distribution of information about children unless it is for
|
|
the purpose of locating a missing child.
|
|
|
|
Experian, LEXIS-NEXIS and the other companies have promised to exchange
|
|
database information only with other companies who also follow these
|
|
principles, a decision that will increase the principles' effectiveness.
|
|
Signers of the IRSG proposal also agree to undergo yearly audits of their
|
|
practices and to make those audits available to the public. The audit
|
|
records and the principles will help the FTC investigate instances where
|
|
companies have not complied with the guidelines.
|
|
|
|
SEVERAL IMPORTANT AREAS STILL BE BE ADDRESSED BY GUIDELINES
|
|
|
|
The IRSG proposal falls short of providing complete protection for
|
|
sensitive consumer information in a number of important areas, Mulligan
|
|
said. They include the following:
|
|
|
|
* Individuals will not be provided access to public records held by the
|
|
companies that sign the proposal.
|
|
|
|
CDT believes that the companies should provide individuals full access to
|
|
their own personal information. These companies have an important role to
|
|
play--just as they serve as a one-stop shopping source for other
|
|
businesses, they should allow individuals access to information >from a
|
|
centralized source.
|
|
|
|
* Individuals will not be notified of adverse decisions based on data in the
|
|
companies' files.
|
|
|
|
Many people are unaware that others are using information services to make
|
|
decisions about them. If data in a company's file comes from inaccurate
|
|
public records or has been inaccurately transcribed, a consumer could be
|
|
harmed. People should be notified when information >from the IRSG
|
|
companies' files are used to make decisions about them so that they can
|
|
correct inaccurate data, challenge inaccurate assumptions, or deal with
|
|
real problems reflected in the data.
|
|
|
|
* The IRSG companies will not maintain detailed audit trails, even though they
|
|
will undergo yearly audits.
|
|
|
|
CDT believes that accountability requires strict oversight over access to
|
|
and use of personal information. When the end-users of sensitive personal
|
|
data are law enforcement personnel, employers, or others who can exercise
|
|
power over the consumer, an audit trail that documents the end-user's
|
|
treatment of personal information would help curb abuses, prevent
|
|
unauthorized access, and provide accountability to the system.
|
|
|
|
* Individual consumers have no SIMPLE way to SEEK RELIEF from violations of the
|
|
guidelines.
|
|
|
|
The IRSG proposal doesn't provide a grievance process nor remedies for
|
|
consumers who believe credit decisions have been made on the basis of
|
|
inaccurate data. CDT hopes that the industry and the FTC will work to craft
|
|
a grievance process and remedies that are responsive to consumers' needs.
|
|
|
|
CDT believes that the IRSG proposal is a noteworthy step towards meaningful
|
|
self-regulatory guidelines. We commend the FTC for their work in this area
|
|
and encourage the agency to continue to monitor not only further
|
|
developments in this area, but also the implementation and compliance with
|
|
the IRSG guidelines. Strong enforcement of the guidelines and consumer
|
|
education are key to effective work in this area.
|
|
|
|
Still, as we noted last year, the wide spread availability and use of
|
|
public record information is a continuing breeding ground for privacy
|
|
concerns. See http://www.cdt.org/privacy/961008_Sen_let.html. As the FTC
|
|
notes in its report, "the easy availability of sensitive, unique
|
|
identifiers (e.g. Social Security number, mother's maiden name, and date of
|
|
birth) listed on public records increases the risk of serious harm."
|
|
|
|
Those IRSG companies with Web sites include:
|
|
|
|
Acxiom Corporation http://www.acxiom.com/
|
|
|
|
CDB Infotek, a choicePoint Company http://www.cdb.com/public/
|
|
|
|
Equifax Credti Information Services, http://www.equifax.com/
|
|
|
|
Experian http://www.experian.com/
|
|
|
|
First Data Solutions Inc.
|
|
http://www.firstdatacorp.com/busunits/busunits.html#fds
|
|
|
|
Information Amercia Inc. http://www.infoam.com/
|
|
|
|
IRSC Inc http://www.irsc.com/
|
|
|
|
LEXIS-NEXIS http://www.LEXIS-NEXIS.com/
|
|
|
|
Metromial Corporation http://www.metromail.com/
|
|
|
|
Trans Union Corp http://www.transunion.com/
|
|
|
|
________________________________________________________________
|
|
|
|
(2) SUBSCRIPTION INFORMATION
|
|
|
|
Be sure you are up to date on the latest public policy issues affecting
|
|
civil liberties online and how they will affect you! Subscribe to the CDT
|
|
Policy Post news distribution list. CDT Policy Posts, the regular news
|
|
publication of the Center For Democracy and Technology, are received by
|
|
more than 13,000 Internet users, industry leaders, policy makers and
|
|
activists, and have become the leading source for information about
|
|
critical free speech and privacy issues affecting the Internet and other
|
|
interactive communications media.
|
|
|
|
To subscribe to CDT's Policy Post list, send mail to
|
|
|
|
majordomo@cdt.org
|
|
|
|
in the BODY of the message (leave the SUBJECT LINE BLANK), type
|
|
|
|
subscribe policy-posts
|
|
|
|
If you ever wish to remove yourself from the list, send mail to the
|
|
above address with a subject of:
|
|
|
|
unsubscribe policy-posts
|
|
__________________________________________________________________
|
|
|
|
(3) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US
|
|
|
|
The Center for Democracy and Technology is a non-profit public interest
|
|
organization based in Washington, DC. The Center's mission is to develop
|
|
and advocate public policies that advance democratic values and
|
|
constitutional civil liberties in new computer and communications
|
|
technologies.
|
|
|
|
Contacting us:
|
|
|
|
General information: info@cdt.org
|
|
World Wide Web: http://www.cdt.org/
|
|
|
|
|
|
Snail Mail: The Center for Democracy and Technology
|
|
1634 Eye Street NW * Suite 1100 * Washington, DC 20006
|
|
(v) +1.202.637.9800 * (f) +1.202.637.0968
|
|
|
|
------------------------------
|
|
|
|
|
|
Date: Mon, 22 Dec 97 20:09:06 EST
|
|
From: Computer Privacy Digest Moderator <comp-privacy@UWM.EDU>
|
|
Subject: File 5-- Clinton Signs "No Electronic Theft Act"
|
|
|
|
Source: Computer Privacy Digest Mon, 22 Dec 97 Volume 11 : Issue: 025
|
|
|
|
From--Monty Solomon <monty@roscom.COM>
|
|
Date--17 Dec 1997 14:31:46 -0500
|
|
|
|
<http://www.news.com/News/Item/0,4,17443,00.html?dtn.head>
|
|
|
|
Clinton signs Net antipiracy act
|
|
By Courtney Macavinta
|
|
December 17, 1997, 10:00 a.m. PT
|
|
|
|
President Clinton signed a law that makes online piracy a felony
|
|
offense, even if the guilty parties never profit from exchanging
|
|
unauthorized digital copies of software, music, or literature.
|
|
|
|
Drafted by Rep. Bob Goodlatte (R-Virginia), the No Electronic Theft
|
|
(NET) Act, signed yesterday, makes distributing or possessing illegal
|
|
copies of online copyrighted material a federal crime if the value of
|
|
the works is $2,500 or more.
|
|
|
|
Based on the new law, offenders could get up to five years in prison
|
|
and a $250,000 fine for "willfully" possessing ten or more illegal
|
|
digital copies of film clips or computer programs, for example. A
|
|
misdemeanor charge will be filed for copied material with a retail
|
|
value of $1,000 or more, and comes with up to a one-year jail term.
|
|
|
|
There are a slew of high-tech and Net-related bills awaiting Congress
|
|
members when they return from vacation in January. So far, however, the
|
|
NET Act is only the third high-tech bill signed by Clinton this year.
|
|
In August, the president approved an export tax exemption of up to 15
|
|
percent for the software industry, which other industries had enjoyed
|
|
since 1971. He also approved $425 million for the Education
|
|
Department's Technology Literacy Challenge Fund, which allocates funds
|
|
to states for hardware, software, and online access.
|
|
|
|
The Software Publishers Association (SPA) and the U.S. Copyright Office
|
|
lobbied for the bill's passage. But the 80,000-member Association for
|
|
Computing Machinery urged Clinton to veto the bill. The international
|
|
group of computer scientists argued that the law would undermine the
|
|
public's right to use portions of copyrighted material under the U.S.
|
|
'fair use' doctrine.
|
|
|
|
However, some legal experts disputed the association's claims. Still,
|
|
the new law gives the Microsoft-backed SPA more ammunition in its
|
|
ongoing crackdown on alleged Net pirates who share, as opposed to
|
|
selling, unauthorized copies of valuable software.
|
|
|
|
Internet editor Jeff Pelline contributed to this report.
|
|
|
|
========
|
|
|
|
The Computer Privacy Digest is a forum for discussion on the effect of
|
|
technology on privacy or vice versa. The digest is moderated and
|
|
gatewayed into the moderated USENET newsgroup comp.society.privacy.
|
|
Submissions should be sent to comp-privacy@uwm.edu and administrative
|
|
requests to comp-privacy-request@uwm.edu.
|
|
|
|
-----------
|
|
|
|
A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
|
|
|
|
Web browsers will find it at http://www.uwm.edu/org/comp-privacy/
|
|
|
|
People with gopher capability can most easily access the library at
|
|
gopher.cs.uwm.edu.
|
|
|
|
Ftp users should Login as "ftp" with password identifying
|
|
yourid@yoursite. The archives are in the directory
|
|
"pub/comp-privacy".
|
|
|
|
------------------------------
|
|
|
|
From: George J Kamenz <z005318b@BC.SEFLIN.ORG>
|
|
Sender: George J Kamenz <z005318b@BC.SEFLIN.ORG>
|
|
Subject: File 6--No Electronic Theft Act; who's to judge?
|
|
|
|
Fortunately (for the those who might be accused, rather than the author)
|
|
"retail price" is not the same as a falsely inflated list price. An
|
|
attempt to pursue an action based on a falsely inflated prices is very
|
|
nearly doomed. As long as the accused or the accused's attorney is aware
|
|
of the past rulings that deal with actual prices paid rather than one
|
|
falsely claimed by the accuser everything will work out okay.
|
|
|
|
The same holds for selective enforcement of copyrights. The main reason a
|
|
huge, rich firm like Disney goes after every copyright violation so
|
|
fiercely, even one by a small, poor day care center with hand painted,
|
|
not-for-profit, just to amuse the children material, is to maintain the
|
|
copyright. If the accused or the accused's attorney is aware of the
|
|
rulings that deal with selective enforcement everything will work out
|
|
okay.
|
|
|
|
Of course that isn't to say the accused isn't going to have to spend money
|
|
and time on a defense, after all justice isn't free.
|
|
|
|
On Mon, 22 Dec 1997, Cu Digest wrote:
|
|
|
|
> From: wouter van den berg <wfberg@dds.nl>
|
|
|
|
> Just one of the many scary aspects of the NET-Act, is that whether or
|
|
> not copyright infringment is a criminal offense is dictated by the
|
|
> "retail value".
|
|
|
|
> One way to abuse this is to put a pricetag on, for example, your
|
|
> homepage. If it's visited by some-one you dislike, you can then press
|
|
> charges.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #10.01
|
|
************************************
|
|
|