home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Jan 4, 1998 Volume 10 : Issue 01
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #10.01 (Sun, Jan 4, 1998)
-
- File 1--Re: Salary Survey Results + SANS Update
- File 2--China clamps new controls on the Net
- File 3--THERE GOES THE NEIGHBORHOOD (CyberPatrol again)
- File 4--Personal Information No Longer Available (CDT reprint)
- File 5-- Clinton Signs "No Electronic Theft Act"
- File 6--No Electronic Theft Act; who's to judge?
- File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 24 Dec 1997 16:19:26 -0500 (EST)
- From: The SANS Institute <sans@clark.net
- Subject: File 1--Re: Salary Survey Results + SANS Update
-
- ((MODERATORS' NOTE: The SANS Institute, in addition to producing
- the annual salary survey, publishes th Network Security Digest
- (every 6 weeks) which is the authoritative digest of new security
- threats and solutions. Practicing system administrators and security
- professionals can get free subscriptions to the Digest by emailing:
- sans@clark.net. This is one of the more useful resources on the
- Net and is well worth checking out.
-
- The following tables MAY NOT be redistributed or reproduced without
- express permission of the SANS Institute (sans@clark.net)).
-
- =================
-
- 1. Since this is the season of salary negotiations as well as holiday
- cheer, we are sending you a gift of the main tables from the new (1997)
- SANS Salary Survey. You'll get the complete survey report with all
- fourteen tables at SANS98 (or NT-SANS), but we hope the tables at the end
- of this note are helpful in any immediate salary discussions.
-
- 2. In the past week, we've gotten more than twenty emails asking whether
- we allow people to register early for SANS98 (Monterey in May) or asking
- for early data about the courses and program. Earlier today we put the
- finishing touches on the program and sent it off to the printers. We'll
- mail it, along with the new "Roadmap to Network Security" poster, in late
- January. But if you need something right away, we have an email version
- of the schedule and registration form you can use to register using 1997
- funds or to get a head start on the approval process. To get a copy,
- reply to this email with the subject: SANS-1, SANS-2, or SANS-3. For
- SANS-1 we'll send you the list of 51 courses scheduled at SANS98, For
- SANS-2 we'll send the list of courses plus the program (peer-reviewed
- sessions, invited sessions, and eleven short-courses) for the five-track
- technical conference. SANS-3 will get you the courses, the program and a
- registration form.
-
- I hope the new year brings you health and happiness.
-
- Alan
-
- PS. The first 1998 issue of the SANS Network Security Digest will be
- delivered early in January. The Digest is scheduled to come out every six
- to seven weeks; there wasn't a December 1997 issue.
-
- ====================================================================
- Summary Tables from the 1997 SANS System Administration and Security
- Salary Survey
-
- How much are system administrators and security professionals paid?
-
- Salary Range-------- Number
- of People Percentage
- 1. Under $20,000 --- 12 1%
- 2. $20,000 - $29,999 53 3%
- 3. $30,000 - $39,999 186 12%
- 4. $40,000 - $49,999 320 20%
- 5. $50,000 - $59,999 351 22%
- 6. $60,000 - $69,999 310 19%
- 7. $70,000 - $79,999 184 12%
- 8. $80,000 - $89,999 81 5%
- 9. $90,000 - $99,999 51 3%
- 10.$100,000 and over 49 3%
- Total--------------- 1599
-
-
-
-
- How do size and type of employer affect salary?
- -------------Number of Employees---------------
- Type of
- Employer Fewer 11-100 101-1000 More Average
- than 10 than 1,000
- Commercial
- - Business $58,462 $53,389 $55,825 $60,615 $58,474
- Commercial
- - Research $70,846 $54,722 $61,860 $62,961 $61,819
- Educational N/A $47,262 $43,933 $47,207 $46,389
- Government N/A $50,000 $47,349 $55,011 $53,501
- System Int'rs. $70,230 $68,471 $58,671 $62,592 $63,168
-
-
-
- How do years of system administration experience affect salary?
-
- Years of System
- Administration Average Salary Number
- Experience
-
- Less than One $50,034 50
- One to Three $45,811 300
- Three to Five $52,101 369
- More than Five $63,907 878
-
- (The high number for low experience reflects lots of experienced computer
- people moving into sysadmin jobs)
-
-
-
- Does geographic region affect salaries?
-
-
- Region Average Salary Number
-
- California $68,443 204
- US Northeast $61,818 430
- US Southwest $59,105 148
- US South-central $57,553 110
- Asia $54,793 13
- US Midwest $54,660 230
- US Southeast $53,858 202
- US Northwest $53,257 76
- Alaska & Hawaii $49,550 8
- Australia $46,558 37
- Canada $45,161 69
- Europe $43,734 86
- Africa $41,100 4
- South America $36,243 10
-
-
-
- How does education affect the gender gap in salary?
-
-
- Education Women Men
- High School $54,500 $50,971
- Some College $48,039 $57,770
- College Degree $53,910 $56,960
- Masters Degree $60,827 $60,671
- PhD. $46,400 $64,625
-
-
-
- Alan Paller, Director, The SANS Institute
- www.sans.org, sans@clark.net, 301-951-0102
- Upcoming SANS Conferences: | SANS Publications:
- NT SANS (March 2-6, San Diego, CA) | Roadmap to Network Security Poster
- SANS98 (May 9-15, Monterey. CA) | The Network Security Digest
- Network Security '98 (Oct., Orlando) | The SysAdmin/Security Salary Survey
-
- ------------------------------
-
- Date: Wed, 31 Dec 1997 09:43:23 -0800
- From: "James Galasyn (Excell Data Corporation)" <a-jameg@microsoft.com>
- Subject: File 2--China clamps new controls on the Net
-
- China clamps new controls on the Net
- Reuters
-
- BEIJING -- China clamped sweeping new controls on the Internet on Tuesday,
- warning that the network was being used to leak state secrets and to spread
- ``harmful information.''
-
- Regulations unveiled by Zhu Entao, Assistant Minister for Public Security,
- cover a wide range of crimes, including leaking state secrets, political
- subversion and spreading pornography and violence.
-
- The rules are also designed to protect against computer hacking, viruses and
- other computer-related crime.
-
- They call for unspecified ``criminal punishments'' and fines of up to 15,000
- yuan ($1,800) for Internet providers and users who violate the rules -- both
- individuals and business organisations.
-
- One article says the Internet must not be used to ``split the country,'' a
- clear reference to separatist movements in Tibet and the Moslem region of
- Xinjiang.
-
- Another on ``defaming government agencies'' appears designed to combat use
- of the Internet by dissidents. A number of Chinese political exiles have
- home pages which they use to attack the Beijing government.
-
- The regulations explicitly cover information circulating from Hong Kong,
- Macau and Taiwan.
-
- Hong Kong reverted to Chinese rule this year and Portuguese-run Macau will
- be handed back in 1999. China regards Nationalist-ruled Taiwan as a rebel
- province.
-
- The official Xinhua news agency quoted Zhu as telling a news conference on
- Monday that Internet links since 1994 had boosted China's cultural and
- scientific exchanges with the world.
-
- ``But the connection has also brought about some security problems,
- including manufacturing and publicising harmful information, as well as
- leaking state secrets through the Internet,'' he said.
-
- The regulations, contained in 25 articles, were approved by the State
- Council, or cabinet, on December 11 and took effect Tuesday.
-
- They go beyond earlier provisional regulations first promulgated in February
- 1996 and revised in May 1997, which also ban pornography and warn against
- leaking state secrets.
-
- Chinese authorities have made attempts to censor pornography, politics and
- Western news organisations on the Internet. But with scores of providers,
- Chinese surfers have been able to find almost anything they want.
-
- It was not immediately clear whether Beijing would devote more resources to
- policing the Internet now that new regulations were in place.
-
- Xinhua cited figures from the Internet Information Centre of China showing
- more than 49,000 host computers and 250,000 personal computers were
- connected to the Internet at the end of October.
-
- Under the new regulations, Internet providers would be subject to
- supervision by Public Security officials and would be required to help track
- down violators.
-
- Zhu said the regulations would ``safeguard national security and social
- stability,'' Xinhua said.
-
- Computer networks were now indispensable as tools for managing state
- affairs, economic construction, defence and science and technology, he said.
- They were a pillar of social development.
-
- ``Hence, the safe and effective management of computer information networks
- is a prerequisite for the smooth implementation of the country's
- modernisation drive,'' he said.
-
- ------------------------------
-
- Date: Tue, 23 Dec 1997 12:25:01 -0800
- From: Jonathan Wallace <jw@bway.net>
- Subject: File 3--THERE GOES THE NEIGHBORHOOD
-
- Jonathan Wallace
- The Ethical Spectacle http://www.spectacle.org
- Co-author, Sex, Laws and Cyberspace http://www.spectacle.org/freespch/
-
- THERE GOES THE NEIGHBORHOOD (CyberPatrol again)
-
- CyberPatrol blocks a gay community of 23,400 Web sites
-
- by Jonathan Wallace jw@bway.net
-
- Censorware software vendors say that they rarely make mistakes,
- and correct them quickly when called to their attention.
- CyberPatrol's block of an online neighborhood called West
- Hollywood sheds some interesting light on this assertion.
-
- Geocities is a free Web hosting service, organized into
- "neighborhoods" of shared interests. The West Hollywood
- neighborhood of Geocities,
- http://www.geocities.com/WestHollywood/, is for gay people. The
- entire West Hollywood neighborhood, of 23,400 separate Web sites,
- is blocked by CyberPatrol, a product of Microsystems Inc., a
- Boston company.
-
- There were a few hardcore pictures on a few West Hollywood Web
- pages, despite Geocities terms of service which ban pornography
- on the system. There were tens of thousands of other pages which
- contained no objectionable material at all. CyberPatrol critics
- say that Microsystems threw out a very large baby with a small
- amount of bathwater.
-
- Bob Parker is the Community Leader Liaison for West Hollywood--a
- sort of volunteer Webmaster. In a long, impassioned post to the
- fight-censorship mailing list, cross-posted to Microsystems and
- numerous other recipients, he quoted the Geocities terms of
- service, which ban the display of "material containing nudity or
- pornographic material of any kind." The company also has a
- full-time "Community Response Team" which investigates complaints
- filed by anyone, Geocities customer or not, about violations of
- the terms of service. In addition, West Hollywood maintains its
- own "Neighborhood Watch" program. Parker pointed out that
- Microsystems chose to block a community of 23,400 sites when
- there was an alternative: "[A]ll it would have taken was a few
- minutes of investigation on the part of Microsystems to find out
- about the Neighorhood Watch program at GeoCities, get the sites
- taken care of and avoid this whole situation."
-
- Challenged to justify the West Hollywood block, Microsystems CEO
- Dick Gorgens reacted equivocally. "Upon my review, you were
- absolutely correct in your assessment that the subdirectory block
- on WestHollywood is prejudicial to the Gay and Lesbian Geocities
- community," he told the Gay and Lesbian Alliance Against
- Defamation, a group which sits on a CyberPatrol oversight
- committee convened by Microsystems. But then he seemed to claim
- that the majority of West Hollywood web pages are pornographic:
- "We took the 'easier' approach to blocking the small number of
- actionable non-nudity publishers in that area rather than
- individually sanctioning them." But he acknowledged that
- "[t]aking that technique to the limit would have us pull the
- plug on the entire Internet which is obviously not our plan." He
- pledged that the West Hollywood "problem" would be corrected
- within a week. Two weeks later, it still has not been.
-
- "GLAAD was extremely disappointed that such a discriminatory move
- was made by Microsystems," wrote Loren Javier, the organization's
- interactive media director. Critics had suggested that the
- organization reconsider its role in advising Microsystems--that
- the organization might be providing cover to the company without
- actually preventing the product from blocking legitimate
- gay-oriented sites. Javier wrote: "The issue now is whether
- GLAAD will continue to serve on the oversight committee. I have
- sent a message to Dick Gorgens with conditions that I be able to
- review the complete block list and that I be able to ask why
- sites have been blocked." Microsystems has not previously allowed
- its oversight committee members to view the CyberNot list.
-
- The blocking of West Hollywood raises the issue of whether it is
- possible to filter the Internet at all. At five minutes per
- site--a very cursory amount of time to determine whether a Web
- page is "appropriate" under Microsystems' criteria--it would take
- a company employee 1950 hours, a little more than one
- person-year, to review every site in West Hollywood. And West
- Hollywood's pages constitute just a tiny drop of the estimated
- 200 million documents on the Internet. Though Microsystems says
- that it uses a tool called Cyber Spyder to winnow the Net and
- select sites for review, every page returned by the tool as a
- potential candidate for blocking is still reviewed by a human
- being. No-one seriously claims that any software possible today
- is capable of making the kinds of subjective determinations
- necessary in evaluating the "appropriateness" of Web pages.
- Censoring the net will always be a labor-intensive effort.
-
- The blocking of West Hollywood is not an isolated instance. A
- report issued this week by The Censorware Project, an ad hoc
- group of which I am a member, lists fifty Web hosting services
- blocked in their entirety by Cyberpatrol, even though the
- majority of user pages on these services are legitimate. One of
- them, members.tripod.com, hosts 1.4 million Web pages. (Source:
- "Blacklisted by CyberPatrol: From Ada to Yoyo,"
- http://www.spectacle.org/cwp/.)
-
- Faced with the near impossible task of reviewing the
- entire Net, censorware companies like Microsystems
- will continue to take the easy way out.
-
- ---------------------------------------------------
- (On Monday, December 22, 1997, Washington attorney
- Robert Corn-Revere filed a ground-breaking federal
- lawsuit challenging the use of another censorware
- product, X-Stop, in the Loudoun County, Va.,
- public library
- (http://www.pfaw.org/press/loudon_complaint.htm).
- I'll discuss the case in an upcoming SLAC bulletin.)
-
- ------------------------------
-
- Date: Thu, 18 Dec 1997 11:36:55 -0500
- From: Graeme Browning <gbrowning@CDT.ORG>
- Subject: File 4--Personal Information No Longer Available (CDT reprint)
-
- A briefing on public policy issues affecting civil liberties online
- -------------------------------------------------------------
- CDT POLICY POST Volume 3, Number 16 December 18, 1997
-
- CONTENTS: (1) Industry Responds to Online Community RE: Personal Information
- (2) How to Subscribe/Unsubscribe
- (3) About CDT, Contacting us
-
- ** This document may be redistributed freely with this banner intact **
- Excerpts may be re-posted with permission of <gbrowning@cdt.org>
-
- |PLEASE SEE END OF THIS DOCUMENT FOR SUBSCRIPTION INFORMATION|
- ___________________________________________________________________
-
- (1) INDUSTRY RESPONDS TO ONLINE COMMUNITY'S OUTRAGE OVER WIDESPREAD
- AVAILABILITY OF PERSONAL INFORMATION
-
- Dec. 18--In the wake of last year's public uproar over the providing of
- unique, personal identifiers like Social Security numbers, unlisted phone
- numbers and birthdates over the Internet, the country's three leading
- credit bureaus and individual reference services have pledged to stop
- making that information available to the general public, according to a
- report the Federal Trade Commission (FTC) released yesterday. The Center
- for Democracy and Technology (CDT) applauds the FTC, the credit bureaus and
- the reference services for their work, but warns that it doesn't entirely
- solve the problem of protecting consumers at a time when Web sites that
- provide fast, easy access to public records containing personal information
- on individuals are proliferating.
-
- The Individual Reference Services Group (IRSG)--an industry coalition
- composed of Experian, LEXIS-NEXIS, Equifax Credit Information Services,
- Inc., Trans Union Corp., and 10 other companies--has agreed to abide by a
- set of self-regulatory principles aimed at curbing access to sensitive
- private data on individuals. The issue of personal information made widely
- and easily available to the general public via the Internet first drew a
- public outcry in September 1996 when LEXIS-NEXIS began offering
- individuals' mothers' maiden names, Social Security numbers and dates of
- birth on its "P-Trak" database. At the height of the controversy Congress
- asked the Federal Reserve Board and the Federal Trade Commission to study
- the privacy implications of this practice. The FTC's report is available at
- http://www.ftc.gov/opa/9712/inrefser.htm. The Federal Reserve Board issued
- its report earlier this year.
-
- "The companies involved in the IRSG's effort are to be commended for
- stepping up to the plate and crafting the most comprehensive set of
- self-regulatory guidelines of any US industry, however, a number of
- important consumer and privacy issues remain to be addressed before this
- can be considered a complete solution," said CDT Staff Counsel Deirdre
- Mulligan, who focuses on privacy issues.
-
- COMPANIES' PROPOSAL RESPONDS TO PRIVACY CONCERNS
-
- The IRSG proposal responds to concerns raised by Internet users and
- privacy advocates last September, available at
- http://www.cdt.org/privacy/960920_Lexis.html, by:
-
- * prohibiting the distribution of Social Security Numbers, dates of birth,
- unlisted phone numbers, and mothers' maiden names to the general public;
-
- * prohibiting "reverse Social Security Number (SSN)" look-ups (finding a name
- or address based on an SSN);
-
- * requiring companies offering look-up services to the general public to allow
- people to "opt-out" of these databases;
-
- * providing individuals with access to information held by the companies that
- does not come >from public records; and
-
- * prohibiting the distribution of information about children unless it is for
- the purpose of locating a missing child.
-
- Experian, LEXIS-NEXIS and the other companies have promised to exchange
- database information only with other companies who also follow these
- principles, a decision that will increase the principles' effectiveness.
- Signers of the IRSG proposal also agree to undergo yearly audits of their
- practices and to make those audits available to the public. The audit
- records and the principles will help the FTC investigate instances where
- companies have not complied with the guidelines.
-
- SEVERAL IMPORTANT AREAS STILL BE BE ADDRESSED BY GUIDELINES
-
- The IRSG proposal falls short of providing complete protection for
- sensitive consumer information in a number of important areas, Mulligan
- said. They include the following:
-
- * Individuals will not be provided access to public records held by the
- companies that sign the proposal.
-
- CDT believes that the companies should provide individuals full access to
- their own personal information. These companies have an important role to
- play--just as they serve as a one-stop shopping source for other
- businesses, they should allow individuals access to information >from a
- centralized source.
-
- * Individuals will not be notified of adverse decisions based on data in the
- companies' files.
-
- Many people are unaware that others are using information services to make
- decisions about them. If data in a company's file comes from inaccurate
- public records or has been inaccurately transcribed, a consumer could be
- harmed. People should be notified when information >from the IRSG
- companies' files are used to make decisions about them so that they can
- correct inaccurate data, challenge inaccurate assumptions, or deal with
- real problems reflected in the data.
-
- * The IRSG companies will not maintain detailed audit trails, even though they
- will undergo yearly audits.
-
- CDT believes that accountability requires strict oversight over access to
- and use of personal information. When the end-users of sensitive personal
- data are law enforcement personnel, employers, or others who can exercise
- power over the consumer, an audit trail that documents the end-user's
- treatment of personal information would help curb abuses, prevent
- unauthorized access, and provide accountability to the system.
-
- * Individual consumers have no SIMPLE way to SEEK RELIEF from violations of the
- guidelines.
-
- The IRSG proposal doesn't provide a grievance process nor remedies for
- consumers who believe credit decisions have been made on the basis of
- inaccurate data. CDT hopes that the industry and the FTC will work to craft
- a grievance process and remedies that are responsive to consumers' needs.
-
- CDT believes that the IRSG proposal is a noteworthy step towards meaningful
- self-regulatory guidelines. We commend the FTC for their work in this area
- and encourage the agency to continue to monitor not only further
- developments in this area, but also the implementation and compliance with
- the IRSG guidelines. Strong enforcement of the guidelines and consumer
- education are key to effective work in this area.
-
- Still, as we noted last year, the wide spread availability and use of
- public record information is a continuing breeding ground for privacy
- concerns. See http://www.cdt.org/privacy/961008_Sen_let.html. As the FTC
- notes in its report, "the easy availability of sensitive, unique
- identifiers (e.g. Social Security number, mother's maiden name, and date of
- birth) listed on public records increases the risk of serious harm."
-
- Those IRSG companies with Web sites include:
-
- Acxiom Corporation http://www.acxiom.com/
-
- CDB Infotek, a choicePoint Company http://www.cdb.com/public/
-
- Equifax Credti Information Services, http://www.equifax.com/
-
- Experian http://www.experian.com/
-
- First Data Solutions Inc.
- http://www.firstdatacorp.com/busunits/busunits.html#fds
-
- Information Amercia Inc. http://www.infoam.com/
-
- IRSC Inc http://www.irsc.com/
-
- LEXIS-NEXIS http://www.LEXIS-NEXIS.com/
-
- Metromial Corporation http://www.metromail.com/
-
- Trans Union Corp http://www.transunion.com/
-
- ________________________________________________________________
-
- (2) SUBSCRIPTION INFORMATION
-
- Be sure you are up to date on the latest public policy issues affecting
- civil liberties online and how they will affect you! Subscribe to the CDT
- Policy Post news distribution list. CDT Policy Posts, the regular news
- publication of the Center For Democracy and Technology, are received by
- more than 13,000 Internet users, industry leaders, policy makers and
- activists, and have become the leading source for information about
- critical free speech and privacy issues affecting the Internet and other
- interactive communications media.
-
- To subscribe to CDT's Policy Post list, send mail to
-
- majordomo@cdt.org
-
- in the BODY of the message (leave the SUBJECT LINE BLANK), type
-
- subscribe policy-posts
-
- If you ever wish to remove yourself from the list, send mail to the
- above address with a subject of:
-
- unsubscribe policy-posts
- __________________________________________________________________
-
- (3) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US
-
- The Center for Democracy and Technology is a non-profit public interest
- organization based in Washington, DC. The Center's mission is to develop
- and advocate public policies that advance democratic values and
- constitutional civil liberties in new computer and communications
- technologies.
-
- Contacting us:
-
- General information: info@cdt.org
- World Wide Web: http://www.cdt.org/
-
-
- Snail Mail: The Center for Democracy and Technology
- 1634 Eye Street NW * Suite 1100 * Washington, DC 20006
- (v) +1.202.637.9800 * (f) +1.202.637.0968
-
- ------------------------------
-
-
- Date: Mon, 22 Dec 97 20:09:06 EST
- From: Computer Privacy Digest Moderator <comp-privacy@UWM.EDU>
- Subject: File 5-- Clinton Signs "No Electronic Theft Act"
-
- Source: Computer Privacy Digest Mon, 22 Dec 97 Volume 11 : Issue: 025
-
- From--Monty Solomon <monty@roscom.COM>
- Date--17 Dec 1997 14:31:46 -0500
-
- <http://www.news.com/News/Item/0,4,17443,00.html?dtn.head>
-
- Clinton signs Net antipiracy act
- By Courtney Macavinta
- December 17, 1997, 10:00 a.m. PT
-
- President Clinton signed a law that makes online piracy a felony
- offense, even if the guilty parties never profit from exchanging
- unauthorized digital copies of software, music, or literature.
-
- Drafted by Rep. Bob Goodlatte (R-Virginia), the No Electronic Theft
- (NET) Act, signed yesterday, makes distributing or possessing illegal
- copies of online copyrighted material a federal crime if the value of
- the works is $2,500 or more.
-
- Based on the new law, offenders could get up to five years in prison
- and a $250,000 fine for "willfully" possessing ten or more illegal
- digital copies of film clips or computer programs, for example. A
- misdemeanor charge will be filed for copied material with a retail
- value of $1,000 or more, and comes with up to a one-year jail term.
-
- There are a slew of high-tech and Net-related bills awaiting Congress
- members when they return from vacation in January. So far, however, the
- NET Act is only the third high-tech bill signed by Clinton this year.
- In August, the president approved an export tax exemption of up to 15
- percent for the software industry, which other industries had enjoyed
- since 1971. He also approved $425 million for the Education
- Department's Technology Literacy Challenge Fund, which allocates funds
- to states for hardware, software, and online access.
-
- The Software Publishers Association (SPA) and the U.S. Copyright Office
- lobbied for the bill's passage. But the 80,000-member Association for
- Computing Machinery urged Clinton to veto the bill. The international
- group of computer scientists argued that the law would undermine the
- public's right to use portions of copyrighted material under the U.S.
- 'fair use' doctrine.
-
- However, some legal experts disputed the association's claims. Still,
- the new law gives the Microsoft-backed SPA more ammunition in its
- ongoing crackdown on alleged Net pirates who share, as opposed to
- selling, unauthorized copies of valuable software.
-
- Internet editor Jeff Pelline contributed to this report.
-
- ========
-
- The Computer Privacy Digest is a forum for discussion on the effect of
- technology on privacy or vice versa. The digest is moderated and
- gatewayed into the moderated USENET newsgroup comp.society.privacy.
- Submissions should be sent to comp-privacy@uwm.edu and administrative
- requests to comp-privacy-request@uwm.edu.
-
- -----------
-
- A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
-
- Web browsers will find it at http://www.uwm.edu/org/comp-privacy/
-
- People with gopher capability can most easily access the library at
- gopher.cs.uwm.edu.
-
- Ftp users should Login as "ftp" with password identifying
- yourid@yoursite. The archives are in the directory
- "pub/comp-privacy".
-
- ------------------------------
-
- From: George J Kamenz <z005318b@BC.SEFLIN.ORG>
- Sender: George J Kamenz <z005318b@BC.SEFLIN.ORG>
- Subject: File 6--No Electronic Theft Act; who's to judge?
-
- Fortunately (for the those who might be accused, rather than the author)
- "retail price" is not the same as a falsely inflated list price. An
- attempt to pursue an action based on a falsely inflated prices is very
- nearly doomed. As long as the accused or the accused's attorney is aware
- of the past rulings that deal with actual prices paid rather than one
- falsely claimed by the accuser everything will work out okay.
-
- The same holds for selective enforcement of copyrights. The main reason a
- huge, rich firm like Disney goes after every copyright violation so
- fiercely, even one by a small, poor day care center with hand painted,
- not-for-profit, just to amuse the children material, is to maintain the
- copyright. If the accused or the accused's attorney is aware of the
- rulings that deal with selective enforcement everything will work out
- okay.
-
- Of course that isn't to say the accused isn't going to have to spend money
- and time on a defense, after all justice isn't free.
-
- On Mon, 22 Dec 1997, Cu Digest wrote:
-
- > From: wouter van den berg <wfberg@dds.nl>
-
- > Just one of the many scary aspects of the NET-Act, is that whether or
- > not copyright infringment is a criminal offense is dictated by the
- > "retail value".
-
- > One way to abuse this is to put a pricetag on, for example, your
- > homepage. If it's visited by some-one you dislike, you can then press
- > charges.
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #10.01
- ************************************
-
-
-