924 lines
42 KiB
Plaintext
924 lines
42 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Nov 7 1993 Volume 5 : Issue 84
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Eatitor: Etaoin Shrdlu, III
|
||
|
||
CONTENTS, #5.84 (Nov 7 1993)
|
||
File 1--Computers, Freedom, and Privacy '94 Conference
|
||
File 2--CFP '94 Scholarship Announcements
|
||
File 3--Korea 94: Call for Papers
|
||
File 4--CPSR NII Paper
|
||
File 5--DES: Broken!
|
||
File 6--NAFTA mandates software patents (fwd)
|
||
File 7--Phiber Optik Sentenced to One Year in Prison
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
|
||
UNITED STATES:
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
ftp.eff.org (192.88.144.4) in /pub/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 1 Nov 93 09:59:46 CST
|
||
From: 7TRUBOW@JMLS.EDU
|
||
Subject: File 1--Computers, Freedom, and Privacy '94 Conference
|
||
|
||
((MODERATORS' NOTE: We will re-run the CFP '94 information
|
||
periodically to remind readers that, although it will be held in
|
||
March, that various deadlines for proposals, scholarships, and paper
|
||
competition loom)).
|
||
|
||
COMPUTERS, FREEDOM, AND PRIVACY '94
|
||
Conference Announcement
|
||
Scholarships, Writing Competition Notice
|
||
23-26 March 1994, Chicago, Il.
|
||
|
||
The fourth annual conference, "Computers, Freedom, and
|
||
Privacy," (CFP'94) will be held in Chicago, Il., March 23-26, 1994.
|
||
The conference is hosted by The John Marshall Law School; George B.
|
||
Trubow, professor of law and director of the Center for Informatics
|
||
Law at John Marshall, is general chair of the conference. The
|
||
program is sponsored jointly by these Association for Computing
|
||
Machinery (ACM) Special Interest Groups: Communications (SIGCOMM);
|
||
Computers and Society (SIGCAS); Security, Audit and Control
|
||
(SIGSAC).
|
||
|
||
The advance of computer and communications technologies holds
|
||
great promise for individuals and society. From conveniences for
|
||
consumers and efficiencies in commerce to improved public health
|
||
and safety and increased participation in government and community,
|
||
these technologies are fundamentally transforming our environment
|
||
and our lives.
|
||
|
||
At the same time, these technologies present challenges to the
|
||
idea of a free and open society. Personal privacy and corporate
|
||
security is at risk from invasions by high-tech surveillance and
|
||
monitoring; a myriad of personal information data bases expose
|
||
private life to constant scrutiny; new forms of illegal activity
|
||
may threaten the traditional barriers between citizen and state and
|
||
present new tests of Constitutional protection; geographic
|
||
boundaries of state and nation may be recast by information
|
||
exchange that knows no boundaries in global data networks.
|
||
|
||
CFP'94 will assemble experts, advocates and interest groups
|
||
from diverse perspectives and disciplines to consider freedom and
|
||
privacy in today's "information society. Tutorials will be offered
|
||
on March 23, 1994, from 9:00 a.m. - noon and 2:00 - 500 p.m. The
|
||
conference program is Thursday, March 24, through Saturday, March
|
||
26, 1994, and will examine the potential benefits and burdens of
|
||
new information and communications technologies and consider ways
|
||
in which society can enjoy the benefits while minimizing negative
|
||
implications.
|
||
|
||
STUDENT PAPER COMPETITION
|
||
|
||
Full time college or graduate students may enter the student
|
||
paper competition. Papers must not exceed 3000 words and should
|
||
address the impact of computer and telecommunications technologies
|
||
on freedom and privacy in society. Winners will receive financial
|
||
support to attend the conference and present their papers. All
|
||
papers should be submitted by December 15, 1993, (either as
|
||
straight text via e-mail or 6 printed copies) to: Prof. Eugene
|
||
Spafford, Department of Computer Science, Purdue University, West
|
||
Lafayette, IN 47907-2004. E-Mail: spaf@cs.purdue.edu; Voice:
|
||
317-494-7825
|
||
|
||
|
||
SCHOLARSHIPS
|
||
|
||
The Chair for scholarships is John McMullen, assisted by Jim
|
||
Thomas, Sociology, Northern Illinois University, DeKalb, IL.
|
||
60115-2854. For more information, contact John McMullen
|
||
(mcmullen@well.sf.ca.us). Scholarships will cover only the cost of the
|
||
registration fee, which includes 3 luncheons, 2 receptions, 2 dinners
|
||
and conference materials.
|
||
|
||
CONFERENCE REGISTRATION INFORMATION
|
||
|
||
Registration fees are as follows:
|
||
If paid by: 1/31/94 3/15/94 4/23/94
|
||
Early Regular Late
|
||
|
||
Tutorial $145 $175 $210
|
||
Conference 315 370 420
|
||
|
||
NOTE: ACM members (give membership number) and John Marshall Alumni
|
||
(give graduation date) receive a $10 discount from Tutorial and $15
|
||
discount from Conference fees.
|
||
|
||
CONFERENCE REGISTRATION: Inquiries regarding registration should be
|
||
directed to RoseMarie Knight, Registration Chair, at the JMLS
|
||
address above; her voice number is 312-987-1420; E-mail,
|
||
6rknight@jmls.edu.
|
||
|
||
CONFERENCE INFORMATION: Communications regarding the conference
|
||
should be sent to: CFP'94, The John Marshall Law School, 315 S.
|
||
Plymouth Ct., Chicago, IL 60604-3907
|
||
(Voice: 312-987-1419; Fax: 312-427-8307; E-mail: CFP94@jmls.edu)
|
||
|
||
ROOM RESERVATIONS: The Palmer House Hilton, located in Chicago's
|
||
"loop," and only about a block from The John Marshall Law School,
|
||
is the conference headquarters. Room reservations only should be
|
||
made directly with the hotel, mentioning "CFP'94" to get the
|
||
special conference rate of $99.00, plus tax. (17 E. Monroe.,
|
||
Chicago, Il., 60603, Tel: 312-726-7500; 1-800-HILTONS; Fax
|
||
312-263-2556)
|
||
|
||
|
||
NOTE: More specific information about conference program
|
||
content will be available December 1, 1993.
|
||
|
||
***********
|
||
George B. Trubow, Professor of Law
|
||
Director, Center for Informatics Law
|
||
The John Marshall Law School
|
||
315 S. Plymouth Ct.
|
||
Chicago, IL 60604-3907
|
||
Fax: 312-427-8307; Voice: 312-987-1445
|
||
E-mail: 7trubow@jmls.edu
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 01 Nov 93 10:00:42 EST
|
||
From: mcmullen@MINDVOX.PHANTOM.COM(John F. McMullen)
|
||
Subject: File 2--CFP '94 Scholarship Announcements
|
||
|
||
The Conference on Computers, Freedom & Privacy (CFP'94) is pleased to
|
||
announce that it will once again provide a number of full tuition
|
||
scholarships for attendance at the conference. The conference will be
|
||
held in Chicago, IL from March 23rd through March 26th, 1995 and will
|
||
be hosted by the John Marshall Law School under the chairmanship of
|
||
George Trubow.
|
||
|
||
The conference traditionally attracts an extremely diverse group of
|
||
persons concerned with issues relating to the rapid development of the
|
||
"information society"; civil libertarians, information providers, law
|
||
enforcement personnel, privacy advocates, "hackers", sociologists,
|
||
educators and students, computer professionals, cryptography
|
||
advocates, government policy makers and other interested parties have
|
||
all played major roles in the three previous conference.
|
||
|
||
Speakers at previous conferences have included Electronic Frontier
|
||
Foundation (EFF) co-founders John Perry Barlow and Mitch Kapor, FBI
|
||
Deputy Director William A. "Al" Bayse, writer Bruce Sterling, privacy
|
||
advocate Simon Davies, Harvard University law professor Lawrence
|
||
Tribe, hacker "Phiber Optik", Georgetown University's Dorothy Denning,
|
||
"Cuckoo's Egg" author Clifford Stoll, Prodigy counsel George Perry,
|
||
USA Today founder Al Neuwith, former FCC Chairman Nicholas Johnson,
|
||
Computer Professionals for Social Responsibility (CPSR)'s Marc
|
||
Rotenberg, Arizona prosecutor Gail Thackeray, and Bay Area Women in
|
||
Computing's Judi Clark.
|
||
|
||
The scholarships are intended to provide access to the conference to
|
||
those that would like to attend the conference but are unable to
|
||
afford the tuition. They are available to undergraduate and graduate
|
||
students in any discipline (previous student attendees have come from
|
||
computer science, law, sociology, liberal arts, journalism, and
|
||
womens' studies backgrounds), law enforcement personnel, hackers,
|
||
social scientists, and others interested in the future of the
|
||
information society.
|
||
|
||
Persons interested in a scholarship should send the following
|
||
information (e-mail greatly preferred) to:
|
||
|
||
John F. McMullen
|
||
CFP'94 Scholarship Chair
|
||
Perry Street
|
||
Jefferson Valley, NY 10535
|
||
|
||
mcmullen@panix.com
|
||
(914) 245-2734 (voice)
|
||
(914) 245-8464 (fax)
|
||
|
||
1. Personal Information -- Name, Addresses (including e-mail), Phone
|
||
Numbers, School and/or Business Affiliation
|
||
|
||
2. Short Statement explaining what the applicant helps to get from
|
||
CFP'94 and what impact that attendance may have in the applicant's
|
||
community or future work.
|
||
|
||
3. Stipulation that the applicant understands that he/she is
|
||
responsible for transportation and lodging expenses related to the
|
||
conference. The scholarship includes tuition and those meals included
|
||
with the conference.
|
||
|
||
4. Stipulation that the applicant would not be able to attend the
|
||
conference if a scholarship is not granted.
|
||
|
||
5. Stipulation that the applicant, if granted a scholarship, will
|
||
attend the conference.
|
||
|
||
6. Stipulation that the applicant, if granted a scholarship, will
|
||
provide a written critique of the conference to the scholarship
|
||
committee by April 30, 1994.
|
||
|
||
Applications will be accepted until December 31, 1993 and scholarship
|
||
winners will be notified by approximately February 1, 1994.
|
||
|
||
Please contact John McMullen at the above e-mail address or phone
|
||
numbers with any questions.
|
||
|
||
John F. McMullen mcmullen@mindvox.phantom.com Consultant,
|
||
knxd@maristb.bitnet mcmullen@well.sf.ca.us Writer,
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 24 Oct 1993 19:23:21 CDT
|
||
From: Joel Sax <jsax@IGC.APC.ORG>
|
||
Subject: File 3--Korea 94: Call for Papers
|
||
|
||
+------------------------Original message----------------------------
|
||
Respond to hfrederick@igc.apc.org.
|
||
|
||
|
||
|
||
Subject--Korea 94*Intl Communication*Call for Papers
|
||
|
||
[Please excuse if you have received this by other channels.
|
||
Please feel free to cross-post as appropriate. Howard Frederick]
|
||
|
||
Call for Papers
|
||
|
||
International Communication Section
|
||
INTERNATIONAL ASSOCIATION
|
||
FOR MASS COMMUNICATION RESEARCH
|
||
|
||
"Communication in the New Millennium:
|
||
Communication Technology for Humanity"
|
||
|
||
July 3-8, 1994, Seoul, Korea
|
||
|
||
The International Association for Mass Communication Research (IAMCR)
|
||
is the largest professional organization in its field. The Association has
|
||
consultative status with various United Nations bodies and cooperates
|
||
closely with regional communication research associations.
|
||
|
||
The conference theme COMMUNICATION IN THE NEW MILLENNIUM:
|
||
COMMUNICATION TECHNOLOGY FOR HUMANITY reminds us that the technology and
|
||
the process of human communication within and between national societies is
|
||
essential for building a shared world that protects both the biosphere and
|
||
the sociosphere.
|
||
|
||
All correspondence and submissions shall be directed to the Section
|
||
convenor: Howard H. Frederick, School of International Service, The
|
||
American University, Washington, DC 20016 USA. Office: +1-202-885-1635
|
||
Fax: +1-202-885-2494 Email: hfrederick@igc.apc.org
|
||
|
||
With the author's permission, papers accepted for the Section's panels
|
||
will be recommended for appropriate issues of _Journal of International
|
||
Communication_.
|
||
|
||
PANELS OF THE INTERNATIONAL COMMUNICATION SECTION
|
||
|
||
INTERNATIONAL RELATIONS AND THE TECHNOLOGIES OF INTERNATIONAL
|
||
COMMUNICATION. Examines the impact global channels of communication on
|
||
international relations.
|
||
|
||
INTERNATIONAL COMMUNICATION AND INTERNATIONAL CONFLICT: LESSONS FROM
|
||
RECENT HISTORY. Examines how mass media coverage has affected
|
||
international crises, with a special focus on events in Asia. Papers are
|
||
especially invited on Bosnia, Cambodia, Somalia, Korea, Palestine, East
|
||
Timor.
|
||
|
||
INTERNATIONAL BROADCASTING AND INTERNATIONAL RELATIONS. Explores the the
|
||
role of international broadcasting in international affairs.
|
||
|
||
THE MACBRIDE MOVEMENT AND THE EVOLVING RIGHT TO COMMUNICATE Investigates
|
||
the movement for a new international information and communication order,
|
||
human rights, and especially the evolving right to communicate. Assesses
|
||
the progress and prospects of the movement toward a new world information
|
||
and communication order.
|
||
|
||
GLOBAL COMMUNICATION AS A FIELD OF RESEARCH AND EDUCATION IN THE POST COLD
|
||
WAR ERA Questions the traditional definitions of international
|
||
communication and its impact on communication education in light of the
|
||
globalization of all communication research.
|
||
|
||
THE CULTURAL AND POLITICAL CONTEXT OF TELECOMMUNICATIONS POLICY: ASIAN
|
||
CONCERNS. Probes the issues and controversies surrounding regional and
|
||
international telecommunications policy with a special focus on Asia.
|
||
|
||
OLYMPISM AND GLOBAL CIVIL SOCIETY. Explores the social and political
|
||
impact of media channels on sports, and especially the Olympic Games.
|
||
|
||
COMPUTERS AND INTERNATIONAL COMMUNICATIONS. Examines the growing impact of
|
||
global computer networks on the field of international communications.
|
||
|
||
JOURNAL OF INTERNATIONAL COMMUNICATION. Discusses how the International
|
||
Communication Section can assist the emergence of this new academic
|
||
journal.
|
||
|
||
COMMUNICATION AND CULTURAL INDUSTRIES. Examines role of entertainment
|
||
programming in national development with a focus on soap opera/telenovelas,
|
||
serial fiction, infotainment, co-productions, and reality-based series.
|
||
|
||
The International Communication Section will hold elections in Korea for a
|
||
new President/Convenor. People who are interested in running may send
|
||
their names to Ingrid Schulze by January 15 (see address below) and should
|
||
include a curriculum vita and a 250-word statement of intention.
|
||
Candidates nominations will be accepted until July 1994.
|
||
|
||
The International Communication Section is currently led by a President
|
||
(Howard Frederick, see above) and three Vice Presidents: Abbas Malek,
|
||
Department of Radio-Television-Film, Howard University, School of
|
||
Communications, Washington DC 20059 USA +1-202-806-7927 (o) +1-703-849-0019
|
||
(h) +1-202-483-5352 (f) email: amalek@auvm.american.edu ; Ingrid Schulze
|
||
Schneider, Universidad Complutense, Facultad de C.C.I.I, Avda. Complutense,
|
||
S/N, Madrid 28040 Spain +34-1-394-2131 (o) +34-1-859-9218 (h) +34-1-859-
|
||
9692 (f) ; Anantha Babbili, Texas Christian University, Department of
|
||
Journalism, Box 32930, Fort Worth TX 76129 USA +1-817-921-7425 (o) +1-817-
|
||
732-2990 (h) +1-817-921-7133 (f) email: babbili@gamma.is.tcu.edu
|
||
|
||
How to respond to the Calls for Papers
|
||
|
||
Abstracts (2 pages or about 800 words) should be sent before 15 January
|
||
1994 to the convenor.
|
||
|
||
At the same time the author should send a Brief Abstract (200 words) to the
|
||
convenor. Brief Abstracts of accepted papers will be published in the "Book
|
||
of Abstracts" which all conference participants will receive in Seoul.
|
||
|
||
The convenors will select Papers to be presented, and inform the authors
|
||
accordingly by 15 February 1994. At the same time convenors should send
|
||
Brief Abstracts of accepted papers to the editor of the Seoul "Book of
|
||
Abstracts", IAMCR Secretary General Robin Cheesman.
|
||
|
||
For Brief Abstracts use the form included in the October IAMCR Newsletter.
|
||
Or you may send your Brief Abstract by e-mail (preferred).
|
||
|
||
Final papers have to reach convenors not later than 30 March 1994.
|
||
Abstracts and Papers can be sent by mail or when appropriate by e-mail. Do
|
||
not use fax, since the quality of fax is not good enough for reproduction
|
||
and we do not retype them.
|
||
|
||
------------------------------
|
||
|
||
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
||
Date: Mon, 25 Oct 1993 21:14:55 EST
|
||
Subject: File 4--CPSR NII Paper
|
||
|
||
CPSR NII Paper
|
||
FOR IMMEDIATE RELEASE
|
||
|
||
Contact:
|
||
Todd Newman (CA) 415-390-1614
|
||
Eric Roberts (CA) 415-723-3642
|
||
Coralee Whitcomb (MA) 617-356-4309
|
||
Marc Rotenberg (D.C.) 202-544-9240
|
||
|
||
|
||
COMPUTER SCIENTISTS RAISE SOCIAL AND DESIGN CONCERNS
|
||
ABOUT THE INFORMATION HIGHWAY
|
||
|
||
|
||
|
||
Palo Alto, Calif., October 25, 1993 -- In the wake of sudden
|
||
corporate mergers and rapid technological developments, Computer
|
||
Professionals for Social Responsibility (CPSR) today voiced concern
|
||
that the planned information superhighway will not realize its full
|
||
potential. The public interest organization put forward specific
|
||
guidelines for the National Information Infrastructure (NII) in a
|
||
paper titled, "Serving the Community: A Public-Interest Vision of
|
||
the National Information Infrastructure." Urging the Clinton
|
||
Administration to move quickly to adopt these principles, CPSR
|
||
President Eric Roberts said, "Although there is widespread agreement
|
||
on general goals, there is no specific plan to ensure that these goals
|
||
are met."
|
||
|
||
"It is much easier to state a vision than to achieve it, " said Dr.
|
||
Roberts, who is also Associate Chair of the Computer Science
|
||
department at Stanford University. "And there are many dangers on
|
||
the horizon that threaten to compromise the value of the NII as a
|
||
resource for the public.
|
||
|
||
"For example, if a small number of companies dominate the market,
|
||
we're in danger of stifling competition and innovation on the
|
||
network. If those same companies control the programming, then
|
||
open and diverse speech is limited. If pricing structures do not cover
|
||
universal service, the average person and the poor will be struggling
|
||
to use the backroads of the information highway. If privacy isn't
|
||
protected, your TV could keep more detailed records of your finances
|
||
than the IRS. And, if the NII is not designed to allow everyone to
|
||
communicate freely and to publish their own contributions, it could
|
||
become nothing more than a medium for delivering 500-channel
|
||
television, with interactivity limited to home-shopping and trying to
|
||
guess the next play during sporting events."
|
||
|
||
CPSR's paper expands on these dangers and makes specific policy and
|
||
technical recommendations for the newly formed Information
|
||
Infrastructure Task Force. The Task Force is expected to coordinate
|
||
network policy for the Clinton Administration.
|
||
|
||
"In its 'Agenda for Action' document, the Administration has set forth
|
||
a positive vision of what the NII can be," said Dr. Roberts. "To
|
||
achieve that vision, however, the government must play a major role
|
||
in the design, development, and regulation of the network." CPSR
|
||
recommends that the Administration adopt the following policies:
|
||
|
||
o Promote widespread economic benefits by evaluating the NII's
|
||
economic success using measures that reflect its impact on the
|
||
society as a whole, not merely the profits of NII investors and
|
||
service providers.
|
||
|
||
o Evaluate the social impact of the NII by conducting periodic
|
||
reviews as the NII is implemented and used to guarantee that it
|
||
continues to serve the public interest.
|
||
|
||
o Guarantee equitable and universal access through an appropriate
|
||
mix of legislation, regulation, taxation, and direct subsidies.
|
||
|
||
o Promote the development of a vital civic sector by ensuring
|
||
resources, training, and support for public spaces within the NII
|
||
where citizens can pursue noncommercial activities.
|
||
|
||
o Promote a diverse and competitive marketplace in terms of the
|
||
content carried over the NII.
|
||
|
||
o Provide access to government services and information over the
|
||
NII.
|
||
|
||
o Encourage democratic participation by ensuring full public
|
||
disclosure, and actively promoting democratic decision-making
|
||
and public participation in all stages of the development process.
|
||
|
||
o Actively facilitate the seamless connection of America's NII with
|
||
the information infrastructures of other nations by working to
|
||
resolve such issues as security, censorship, tariffs, and privacy.
|
||
|
||
o Guarantee the functional integrity of the NII by establishing
|
||
critical technical requirements including ease of use, widespread
|
||
availability, full functionality, high reliability, adequate privacy
|
||
protection, and evolutionary expansion.
|
||
|
||
The recommendations follow from a yearlong review of the NII
|
||
conducted by CPSR. The process included collecting more than 1,200
|
||
suggestions for NII policy from network users across the country,
|
||
drafting a report, holding special chapter meetings on the NII in
|
||
Berkeley, Boston, Seattle, and Washington, D.C., and having a
|
||
multiple-draft review process by the membership. Final changes
|
||
to the report were made at the annual meeting of CPSR, where the
|
||
report was adopted unanimously by the CPSR Board of Directors.
|
||
|
||
Dr. Roberts noted that he was very pleased by the level of
|
||
participation in the NII report. "The computer community knows
|
||
that the NII is the critical technological issue facing the United States
|
||
today. Our members were extremely responsive when we asked
|
||
them to participate in this project, because they understand from
|
||
their own experience how much the NII has to offer."
|
||
|
||
CPSR also worked closely with the Telecommunications Policy
|
||
Roundtable (TPR), a coalition of more than sixty nonprofit, consumer,
|
||
labor and civil rights organizations based in Washington, DC. CPSR's
|
||
paper endorses the principles set forth by TPR. TPR will unveil its
|
||
founding principles in a press conference, Tuesday, October 26th at
|
||
10:00 a.m. at the National Press Club in Washington, D.C.
|
||
|
||
CPSR is planning a conference next April in Cambridge,
|
||
Massachusetts, on the future of the NII, The Directions and
|
||
Implications of Advanced Computing. The conference will
|
||
investigate at a more specific level how to achieve the principles
|
||
in the CPSR report.
|
||
|
||
Founded in 1981, CPSR is a national, nonprofit, public interest
|
||
organization of computer professionals and others concerned with
|
||
the impact of computer technology on society. With offices in Palo
|
||
Alto, California, and Washington D.C., and 22 chapters across the
|
||
country, CPSR works to encourage public discussion of decisions
|
||
involving the use of computers in systems critical to society and to
|
||
challenge the assumption that technology alone can solve political
|
||
and social problems.
|
||
|
||
CPSR's NII paper is available electronically by sending email to
|
||
listserv@cpsr.org. In the message write the command
|
||
"GET CPSR NII_POLICY" The paper will automatically be mailed to
|
||
you. You can also FTP/WAIS/Gopher cpsr.org/nii/cpsr_nii_policy.txt.
|
||
|
||
For a hard copy of the paper or for more information about CPSR,
|
||
call 415-322-3778 or write to cpsr@cpsr.org. For information about
|
||
the Telecommunications Policy Roundtable, contact Jeff Chester at
|
||
202-628-2620 or cme@access.digex.net.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 29 Oct 1993 02:03:24 -0800
|
||
From: jonpugh@NETCOM.COM(Jon Pugh)
|
||
Subject: File 5--DES: Broken!
|
||
|
||
I would like to thank everyone who responded to my query regarding a
|
||
report of DES being broken. I would especially like to thank Charles
|
||
Mattair <mattair@synercom.hounix.org> for sending me Michael Wiener's
|
||
entire paper ala PostScript. Mr. Wiener is employed by Bell-Northern
|
||
Research in Ontario, Canada. Here is the abstract for his paper:
|
||
|
||
"Abstract. Despite recent improvements in analytic techniques for
|
||
attacking the Data Encryption Standard (DES), exhaustive key search
|
||
remains the most practical and efficient attack. Key search is
|
||
becoming alarmingly practical. We show how to build an exhaustive DES
|
||
key search machine for $1 million that can f ind a key in 3.5 hours on
|
||
average. The design for such a machine is described in detail for the
|
||
purpose of assessing the resistance of DES to an exhaustive attack.
|
||
This design is based on mature technology to avoid making guesses
|
||
about future capabilities. With this approach, DES keys can be found
|
||
one to two orders of magnitude faster than other recently proposed
|
||
designs. The basic machine design can be adapted to attack the
|
||
standard DES modes of operation for a small penalty in running time.
|
||
The issues of development cost and machine reliability are examined as
|
||
well. In light of this work, it would be prudent in many applications
|
||
to use DES in a triple-encryption mode."
|
||
|
||
The paper describes the basic search as beginning from a
|
||
plaintext-ciphertext pair and trying keys until one is found which
|
||
will turn the plaintext into the cyphertext. The basis for the
|
||
technique's speed is that neither the plaintext or cyphertext needs to
|
||
be output and thus IO bottlenecks are removed. This technique does
|
||
not directly attack a given ciphertext without a corresponding
|
||
plaintext and thus does not directly attempt to break a DES encrypted
|
||
cyphertext.
|
||
|
||
Feel free to correct me if I am wrong, but I don't see the
|
||
applicability of this machine in decrypting DES encoded information
|
||
unless one is in possession of a "Rosetta Stone" using the same key,
|
||
and I think the chances of that are highly unlikely.
|
||
|
||
The intent of the paper seems to be merely to indicate that DES is
|
||
within the range of being broken. It closes with a proposal that all
|
||
serious DES encryption be done in "triple-encryption mode". This is
|
||
where you encode with key 1, decode with key 2 and encode with key 3.
|
||
The middle operation seems to be reversed merely to give the operation
|
||
the effect of being the same as a single DES encryption when the 3
|
||
keys are identical, but to get the proper effect the three keys should
|
||
be different and unrelated.
|
||
|
||
Thus, my initial take from the short report I saw before was
|
||
misleading. DES is not really "broken" in that there is still no way
|
||
to take an arbitrary cipertext and turn it into the proper plaintext
|
||
in the 3.5 hours mentioned in the paper.
|
||
|
||
Once again, feel free to correct me if I am wrong. I will be making
|
||
the paper available to the CuD archive and others once I get my
|
||
anonymous ftp directory set up. It is 424K of PostScript and much too
|
||
large to mail reliably (although I only lost 1 character when Charles
|
||
mailed it to me in 10 parts). ;)
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 1 Nov 1993 16:57:40 -1200
|
||
From: ygoland@SEAS.UCLA.EDU
|
||
Subject: File 6--NAFTA mandates software patents (fwd)
|
||
|
||
From--lpf@uunet.uu.net (The League for Programming Freedom)
|
||
Sender--friedman@frob.com
|
||
Subject--NAFTA mandates software patents
|
||
Date--Fri, 29 Oct 93 20:57:36 -0400
|
||
|
||
[Please post this widely, wherever appropriate.
|
||
|
||
The LPF is also collecting signatures from famous people who would be
|
||
willing to "lend their names". We plan to send this piece to Congress and
|
||
elsewhere. If you're interested, please contact lpf@uunet.uu.net.]
|
||
|
||
|
||
|
||
NAFTA and Software Patents
|
||
by the League for Programming Freedom
|
||
|
||
If you believe software patents are harmful to software
|
||
development--or that the patent system for software has problems and
|
||
needs to be changed--or if you are *not yet sure*--then you need to be
|
||
concerned about NAFTA now.
|
||
|
||
Opposition to software patents seems to be the majority view in our
|
||
field. Two ACM surveys at well-attended conferences (SIGCHI and
|
||
SIGGRAPH) showed a large majority of attendees entirely opposed to
|
||
software patents. Most of the software companies applying for patents
|
||
say their actions are for defensive purposes, because they fear being
|
||
attacked with patents.
|
||
|
||
Among those not prepared to advocate a system of no patents in
|
||
software--the system the US had until a decade ago--many agree that
|
||
some change needs to be made. Even the Patent Office has recognized
|
||
there is a problem, and has scheduled hearings for 1994. But before
|
||
the hearings start, NAFTA may make them futile. NAFTA probably
|
||
directly or indirectly prohibits all the proposed approaches for
|
||
addressing the problem.
|
||
|
||
Those of us entirely opposed to software patents would like to
|
||
eliminate them. There are two ways of doing this. One is to exempt
|
||
software from the patent system. NAFTA clearly bars such a change, by
|
||
requiring that patents apply to products of any kind.
|
||
|
||
Another way is not to issue patents that cover computational steps
|
||
alone. (This approach would not do anything about the thousands of
|
||
existing software patents.) NAFTA does not directly address this sort
|
||
of rule, but the "all fields of technology" requirement may rule out
|
||
this approach. (There is no way to find out for certain now; what we
|
||
can predict is that IBM will argue that it is ruled out.)
|
||
|
||
On the other hand, if we do not abolish software patents entirely, we
|
||
could reduce their harmful impact by changing other aspects of the
|
||
software patent system.
|
||
|
||
For example, some have proposed that patents on software should last
|
||
just a few years, since a program a few years old is obsolete for most
|
||
commercial purposes. But NAFTA requires patents to last at least
|
||
seventeen years.
|
||
|
||
An automatic mandatory licensing system could eliminate most of the
|
||
problems that patents cause. However, NAFTA forbids any sort of
|
||
automatic mandatory licensing.
|
||
|
||
The conclusion: if you believe that software patents cause problems
|
||
and that a change in the patent system *might* be necessary for
|
||
software, then join us now in calling for the rejection of NAFTA as it
|
||
stands, so that this part can be changed.
|
||
|
||
What you should do is write or phone your senators and representative.
|
||
A brief letter in your own words is the most effective way to
|
||
communicate your views to them. The following addresses work for all
|
||
federal legislators:
|
||
|
||
Honorable ...
|
||
US Senate
|
||
Washington DC 20510
|
||
|
||
Honorable ...
|
||
US House of Representatives
|
||
Washington DC 20515
|
||
|
||
It is also useful to send a copy to Representative Gephardt (one of
|
||
the leading opponents of NAFTA as it stands) as well as your own
|
||
elected officials. If you write your letter by computer, it would be
|
||
helpful to send a copy by email to lpf@uunet.uu.net. We could show
|
||
these copies on other occasions such as when the Patent Office
|
||
reconsiders the issue.
|
||
|
||
A second proposed treaty, GATT (General Agreement on Tariffs and
|
||
Trade), has even stronger requirements on patents. So it would be
|
||
useful to mention in your letter that you are concerned about GATT as
|
||
well.
|
||
|
||
The success of the Liberal party in Canada gives us a reprieve--a
|
||
chance for changing NAFTA. It's up to us to make sure this part of
|
||
NAFTA is reconsidered. Let's not waste this opportunity.
|
||
|
||
For those interested in checking these conclusions, the text of the
|
||
patents section of NAFTA appears below.
|
||
%
|
||
Article 1709: Patents
|
||
[Text as received from U.S. government email server, with whitespace
|
||
cleaned up.]
|
||
|
||
1. Subject to paragraphs 2 and 3, each Party shall make patents
|
||
available for any inventions, whether products or processes, in all
|
||
fields of technology, provided that such inventions are new, result
|
||
from an inventive step and are capable of industrial application. For
|
||
purposes of this Article, a Party may deem the terms "inventive step"
|
||
and "capable of industrial application" to be synonymous with the
|
||
terms "non-obvious" and "useful", respectively.
|
||
|
||
2. A Party may exclude from patentability inventions if
|
||
preventing in its territory the commercial exploitation of the
|
||
inventions is necessary to protect order public or morality, including
|
||
to protect human, animal or plant life or health or to avoid serious
|
||
prejudice to nature or the environment, provided that the exclusion is
|
||
not based solely on the ground that the Party prohibits commercial
|
||
exploitation in its territory of the subject matter of the patent.
|
||
|
||
3. A Party may also exclude from patentability:
|
||
|
||
(a) diagnostic, therapeutic and surgical methods for the
|
||
treatment of humans or animals;
|
||
|
||
(b) plants and animals other than microorganisms; and
|
||
|
||
(c) essentially biological processes for the production of
|
||
plants or animals, other than non-biological and
|
||
microbiological processes for such production.
|
||
|
||
Notwithstanding subparagraph (b), each Party shall provide for the
|
||
protection of plant varieties through patents, an effective scheme of
|
||
sui generis protection, or both.
|
||
|
||
4. If a Party has not made available product patent protection
|
||
for pharmaceutical or agricultural chemicals commensurate with
|
||
paragraph 1:
|
||
|
||
(a) as of January 1, 1992, for subject matter that relates
|
||
to naturally occurring substances prepared or produced by,
|
||
or significantly derived from, microbiological processes and
|
||
intended for food or medicine, and
|
||
|
||
(b) as of July 1, 1991, for any other subject matter,
|
||
|
||
that Party shall provide to the inventor of any such product or its
|
||
assignee the means to obtain product patent protection for such
|
||
product for the unexpired term of the patent for such product granted
|
||
in another Party, as long as the product has not been marketed in the
|
||
Party providing protection under this paragraph and the person seeking
|
||
such protection makes a timely request.
|
||
|
||
5. Each Party shall provide that:
|
||
|
||
(a) where the subject matter of a patent is a product, the
|
||
patent shall confer on the patent owner the right to prevent
|
||
other persons from making, using or selling the subject
|
||
matter of the patent, without the patent owner's consent;
|
||
and
|
||
|
||
(b) where the subject matter of a patent is a process, the
|
||
patent shall confer on the patent owner the right to prevent
|
||
other persons from using that process and from using,
|
||
selling, or importing at least the product obtained directly
|
||
by that process, without the patent owner's consent.
|
||
|
||
6. A Party may provide limited exceptions to the exclusive rights
|
||
conferred by a patent, provided that such exceptions do not
|
||
unreasonably conflict with a normal exploitation of the patent and do
|
||
not unreasonably prejudice the legitimate interests of the patent
|
||
owner, taking into account the legitimate interests of other persons.
|
||
|
||
7. Subject to paragraphs 2 and 3, patents shall be available and
|
||
patent rights enjoyable without discrimination as to the field of
|
||
technology, the territory of the Party where the invention was made
|
||
and whether products are imported or locally produced.
|
||
|
||
8. A Party may revoke a patent only when:
|
||
|
||
(a) grounds exist that would have justified a refusal to
|
||
grant the patent; or
|
||
|
||
(b) the grant of a compulsory license has not remedied the
|
||
lack of exploitation of the patent.
|
||
|
||
9. Each Party shall permit patent owners to assign and transfer
|
||
by succession their patents, and to conclude licensing contracts.
|
||
|
||
10. Where the law of a Party allows for use of the subject matter
|
||
of a patent, other than that use allowed under paragraph 6, without
|
||
the authorization of the right holder, including use by the government
|
||
or other persons authorized by the government, the Party shall respect
|
||
the following provisions:
|
||
|
||
(a) authorization of such use shall be considered on its
|
||
individual merits;
|
||
|
||
(b) such use may only be permitted if, prior to such use,
|
||
the proposed user has made efforts to obtain authorization
|
||
from the right holder on reasonable commercial terms and
|
||
conditions and such efforts have not been successful within
|
||
a reasonable period of time. The requirement to make such
|
||
efforts may be waived by a Party in the case of a national
|
||
emergency or other circumstances of extreme urgency or in
|
||
cases of public non-commercial use. In situations of
|
||
national emergency or other circumstances of extreme
|
||
urgency, the right holder shall, nevertheless, be notified
|
||
as soon as reasonably practicable. In the case of public
|
||
non-commercial use, where the government or contractor,
|
||
without making a patent search, knows or has demonstrable
|
||
grounds to know that a valid patent is or will be used by or
|
||
for the government, the right holder shall be informed
|
||
promptly;
|
||
|
||
(c) the scope and duration of such use shall be limited to
|
||
the purpose for which it was authorized;
|
||
|
||
(d) such use shall be non-exclusive;
|
||
|
||
(e) such use shall be non-assignable, except with that
|
||
part of the enterprise or goodwill that enjoys such use;
|
||
|
||
(f) any such use shall be authorized predominantly for the
|
||
supply of the Party's domestic market;
|
||
|
||
(g) authorization for such use shall be liable, subject to
|
||
adequate protection of the legitimate interests of the
|
||
persons so authorized, to be terminated if and when the
|
||
circumstances that led to it cease to exist and are unlikely
|
||
to recur. The competent authority shall have the authority
|
||
to review, on motivated request, the continued existence of
|
||
these circumstances;
|
||
|
||
(h) the right holder shall be paid adequate remuneration
|
||
in the circumstances of each case, taking into account the
|
||
economic value of the authorization;
|
||
|
||
(i) the legal validity of any decision relating to the
|
||
authorization shall be subject to judicial or other
|
||
independent review by a distinct higher authority;
|
||
|
||
(j) any decision relating to the remuneration provided in
|
||
respect of such use shall be subject to judicial or other
|
||
independent review by a distinct higher authority;
|
||
|
||
(k) the Party shall not be obliged to apply the conditions
|
||
set out in subparagraphs (b) and (f) where such use is
|
||
permitted to remedy a practice determined after judicial or
|
||
administrative process to be anticompetitive. The need to
|
||
correct anticompetitive practices may be taken into account
|
||
in determining the amount of remuneration in such cases.
|
||
Competent authorities shall have the authority to refuse
|
||
termination of authorization if and when the conditions that
|
||
led to such authorization are likely to recur;
|
||
|
||
(l) the Party shall not authorize the use of the subject
|
||
matter of a patent to permit the exploitation of another
|
||
patent except as a remedy for an adjudicated violation of
|
||
domestic laws regarding anticompetitive practices.
|
||
|
||
11. Where the subject matter of a patent is a process for
|
||
obtaining a product, each Party shall, in any infringement proceeding,
|
||
place on the defendant the burden of establishing that the allegedly
|
||
infringing product was made by a process other than the patented
|
||
process in one of the following situations:
|
||
|
||
(a) the product obtained by the patented process is new;
|
||
or
|
||
|
||
(b) a substantial likelihood exists that the allegedly
|
||
infringing product was made by the process and the patent
|
||
owner has been unable through reasonable efforts to
|
||
determine the process actually used.
|
||
|
||
In the gathering and evaluation of evidence, the legitimate interests
|
||
of the defendant in protecting its trade secrets shall be taken into
|
||
account.
|
||
|
||
12. Each Party shall provide a term of protection for patents of
|
||
at least 20 years from the date of filing or 17 years from the date of
|
||
grant. A Party may extend the term of patent protection, in
|
||
appropriate cases, to compensate for delays caused by regulatory
|
||
approval processes.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun 7 Nov 1993 16:04:43 CST
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 7--Phiber Optik Sentenced to One Year in Prison
|
||
|
||
Mark Abene (phiber optik) was sentenced in federal court in New York
|
||
this past week to one year in prison in addition to 600 hours of
|
||
community service. The term will start January 7, 1994. It is possible
|
||
that Abene will be released after completion of 10 months of the
|
||
sentence. However, he may be eligible for a community corrections
|
||
program much earlier.
|
||
|
||
Abene was the last of the MOD defendants to be sentenced for computer
|
||
intrusion and other crimes. Complete descriptions of events,
|
||
including the indictment, can be found in CuDs 4.30, 4.31, 4.32, and
|
||
4.33.
|
||
|
||
Further details will follow next week.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.84
|
||
************************************
|
||
|
||
|