home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Feb 21 1993 Volume 5 : Issue 15
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Copy Editor: Etaion Shrdlu, Seniur
-
- CONTENTS, #5.15 (Feb 21 1993)
- File 1--MODERATORS' Corner (ah, sundry snippets)
- File 2--Re SPA/Piracy (CuD #5.14)
- File 3--TIME & Puzzlement
- File 4--Technology and Populist Publishing (GEnie Reprint)
- File 5--"Time Bomb" Detonated In Pennsylvania
- File 6--(fwd) CICnet rural datafication / ubiquitous access
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
- at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
- 466893; and using anonymous FTP on the Internet from ftp.eff.org
- (192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
- /cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
- ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail server at
- mailserv@batpad.lgb.ca.us.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sat, 20 Feb 93 19:21:51 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--MODERATORS' Corner (ah, sundry snippets)
-
- MISNUMBERING OF #5.14
-
- CuD #5.14 was inadvertently numbered as #5.17. The date (Feb 17) was
- used instead of the issue. Thanks to those who notified us. The type
- has been corrected, so if you save CuDs, you should re-number
- correctly.
-
- UNSUBBING FROM CuD
-
- For those who wish to unsub from CuD's mailing list, you should
- INLCUDE YOUR ADDRESS in the unsub notice. Sometimes, the address in
- the "From:' line doesn't correspond to anything on the mailing list.
- YOU SHOULD ALSO BE SURE TO SEND THE CORRECT UNSUB ADDRESS. If your
- unsub request doesn't originate from the address listed in the mailing
- list, it makes it rather difficult to determine the correct one to
- delete.
-
- CuD PUBLICATION SCHEDULE
-
- Beginning with #5.16 (next Sunday), we will try to revert back to the
- once-a-week publication schedule and do twice-a-week runs as
- infrequently as possible. We will also try to keep the size limits to
- about 38-40K, so CuDs will be a bit shorter than previously (by about
- 10 percent). The mailing list has grown so large that running an issue
- takes about two hours. Attempts to run 50-60 megs through the mailer
- in such a short time sometimes causes the log-jams.
-
- AMERICA ON-LINE SUBSCRIBERS
-
- AOL subbers have had problems receiving CuD. IBMmers are allowed to
- receive mail files of about 7K, and Mac folk about 28K. We tried
- breaking CuDs down into smaller sizes for them, but the size limits
- are simply prohibitive. We suggest they unite to ask for a more
- reasonable file size of about 50K. Sorry we can't be of much help on
- this problem.
-
- FREQUENTLY ASKED QUESTIONS (FAQS)
-
- We are now maintaining a list of FAQs that we can make available on
- request. It will also be available from the ftp sites. If there is
- interest, we will run it every three months or so as we add to it.
-
- BACK ISSUES
-
- Please read the header for back issue information. We are unable to
- send out back issues from the editors' site because of the sheer
- volume. Back issues (Vols 1 through 5.15) are available on the ftp
- sites, most long-standing BBSes, and many public access systems.
- Compressed, they require nearly four megs of disk space.
-
- REPRINTING "OLD" ARTICLES
-
- We are repeatedly asked why we reprint "old" news or news that seems
- erroneous. We do this for several reasons, including the following.
- First, especially for newcomers or those reading CuDs from a BBS, old
- news is new news. Second, some "old" news is repackaged and
- recirculated. We feel it's important to provide an archive of the ways
- in which this happens. For example, a recent summary of a virus
- article contained old news in a new format. We ran it to indicate the
- recursive nature of information that is passed on without critique. We
- try to indicate this in the "Subject:" line or in a "Moderators' Note"
- when this occurs. Sometimes, we goof. The virus article, for those who
- asked, was a GEnie reprint, and an accidental deletion removed the
- context. We apologize for the confusion.
-
- We also remind some of our critics that Cu Digest has no budget or
- staff, is run from a primitive Amdahl running Wylbur as its front end,
- and most articles must be reformatted before running. Our incoming
- mail is fairly heavy, and we try to respond personally to each one.
- Both editors have full time positions that require 60-plus hours of
- investment, and sometimes things simply slip by. We ain't perfect,
- but we try. So, we appreciate criticism, but we hope it is a bit more
- constructive than "can't you guys get anything straight?"
-
- ------------------------------
-
- Date: Thu, 18 Feb 93 16:20:51 EST
- From: tsa@CELLAR.ORG
- Subject: File 2--Re SPA/Piracy (CuD #5.14)
-
- First, it looks like the SPA has identified a significant problem,
- that of software piracy. I agree fully that piracy is wrong, and that
- it should be stopped. But I totally disapprove of their methods. The
- simple statement that many of those who settle out of court with the
- SPA are actually innocent was the first thing that shocked me. The
- American justice system is supposed to be the main way of determining
- right and wrong, not something used as a bludgeon to force others to
- do what you want. It seems that right and wrong have become
- decreasingly less important, and what matters is whether you can pay
- the lawyers. And many small companies simply can't afford a lawsuit.
- So the SPA waltz's in, threatens to sue the company, and walks away
- with $$$. Perhaps the SPA could consider "The end doesn't justify the
- means" for a little while. They are using heavy-handed, cruel
- tactics. It may be for a good cause, but that doesn't excuse it.
-
- Their tactics have been surprisingly effective. Every single case,
- settled out of court. It is not clear whether that indicates that the
- companies don't want to pay for a lawsuit, know that they are going to
- lose the lawsuit, or both. If the company knows that they would lose
- a lawsuit, then the SPA should force some settlement, since the
- company is guilty. But if the company is innocent, and can't afford a
- lawsuit to prove it, then the SPA can-and does-just threaten, bluff,
- and force a settlement. Then they walk away with money in their
- pockets, and no one can do a thing. It makes me want to puke.
-
- The double penalty system which the SPA imposes even upon the
- companies who agree to be inspected is preposterous. The company is
- forced to pay twice for each copy of the software, once to the SPA,
- and once to buy the software. Why should the company have to purchase
- legitimate copies of the software, just because one of their employees
- decided to pirate it? I agree that the offending software should be
- removed, but why should the company be forced to buy new copies?
- Also, I don't see why the company should have to pay the full price
- for the illegal software, and why that money should go to the SPA.
- The company did not obtain the full value of the software, it was
- probably used without manuals, which limits the use of a piece of
- software, and they didn't get the cool box with all the neato screen
- shots, pretty pastel colors, and designer logos on it. They did not
- get as much from the pirated program as they would have if they had
- bought it, so why should they pay the same amount? In many cases, the
- program may have been used only a small amount, by one employee, which
- doesn't justify charging the company the full price. And why should
- the money go to the SPA? That is the most ludicrous aspect of the
- entire fiasco. If the software has been stolen from the company that
- released it, then the company that released it should get the money.
- If that compan{chooses to donate part of it to the SPA, then fine, but
- there is little reason why the SPA should get it. Sure, they can say
- that they prevent piracy, that they educate people against it, so they
- should get it, but the software wasn't stolen from them, so they
- should not be recompensated for what they didn't lose.
-
- I have always wondered how piracy figures are estimated. It always
- seemed to be one of those statistics akin to "35% of Americans don't
- answer surveys honestly.", or "21.5% of all shoplifters are never
- caught." From the CuD's description of the estimate, there are a lot
- of obvious sources of error. First, they use the number of Intel and
- Macintosh computers sold. While the Mac figures may be accurate,
- since all Macs have to go through Apple sometime, how can they know
- the number of IBM computers sold? There are so many different clone
- manufacturers, and all of them would have to know exactly how many
- computers they sold, and report that number to the Dataquest mareting
- form, for an accurate estimation to be had. I very much doubt that
- all of the minor clone makers did this, so right from the start we
- have an inaccurate fact #1.
-
- The second fact looked fine at first, until I noticed the sentence
- "The business applications sales are taken from the report and used to
- estimate the the total u7it sales..." Business applications?
- Business applications? What omniscient genius works for the SPA who
- can determine the total unit sales of all software in the U. S. from
- the number of business applications sold? How can you determine the
- number of games, 3-D rendering programs, anti-viral utilities, and any
- of the other myriad kinds of programs from the number of Business
- applications sold? Say bye-bye to fact number 2!
-
- I like the pro-Mac direction which the data in the third fact, shows,
- but I simply cannot believe that 5 is the average number of
- applications owned by Macintosh users. <Quick check of hard drive> I
- have 24 applications that I have bought, and I don't buy software very
- often. I may not be a typical Mac user (I program, run a BBS, don't
- play many games), but I am not as prolific a program purchaser as many
- people I know, and even if I am the exception, there would have to be
- only 1 person with 24 applications for every 9.5 or so with 3
- applications for the average to work. I simply can't believe that my
- 24 applications is that far of the norm for the Mac, certainly not far
- enough to justify the 5 application/mac theory. Then when you look at
- Intel-based machines, the figures look even worse. IBM has a much
- wider range of most kinds of software available to its users, so one
- would expect IBM users to have more software. It is true that
- Macintosh's ease-of-use may promote the buying of more software, but
- one would expect the high software availability for the IBM to balance
- the ease-of-use factor out. I am not surprised that the figures are
- so off, since part of the way in which those figures were obtained was
- by counting returned registration cards. How many of us actually
- return those damn things? I'm sure that there are a few conscientious
- people out there thinking "Of course, I return all of them. Doesn't
- everyone?", but most people aren't like that. I still have the ones
- from Christmas sitting on my desk, waiting to be filled out and
- mailed. So the SPA is now 0 for 3 in their basic postulates.
-
- I would only argue slightly with the fourth fact, which calculates
- average price of a piece of software. People are probably going to be
- more willing to pirate software that they can't afford, so the average
- price of a piece of pirated software is probably higher than that of a
- bought program. But that's only an educated guess, and it's difficult
- to be sure. So the SPA actually does have one fact that hasn't been
- twisted into nothingness.
-
- I don't even have to do much to debunk the final assumption. It's
- obvious that a large percentage of the programs that are bought are
- bought for computers that were not purchased within the past year. It
- is true that with dropping computer prices, rapid expansion of the
- home market, etc.,
-
- many computers are new. But there are enough that aren't to destroy
- the credibility of this assumption. So now, using 3 skewed facts, an
- inaccurate assumption, and one fact that isn't too far off, the SPA
- thiNks that they can obtain an accurate answer. Somehow I doubt it.
- The entire process by which they obtain the answer is so far off, that
- I have no credence whatsoever in the answer which they obtained. I
- wouldn't be surprised if it was off by an order of magnitude or more,
- in either direction. But we'll never know, simply because their is no
- way to tell the total value of all pirated software.
-
- There are many other possible reasons for error, most of which the
- author of the CuD article states. It is clear that the SPA's
- estimates are incredibly inaccurate, and shouldn't be trusted. Yet,
- although even David Tremblay, the SPA Research Directory, admits fully
- that the figures are off, the SPA still uses them, as often as
- possible. They use them in their advertisements, literature, and
- educational material, treating the piracy estimates as
- incontrovertible fact, despite the fact that their own head of
- research admits their inaccuracies.
-
- In conclusion, the most recent issue of CuD has not left me with a
- good impression of the SPA. I like their educational efforts, and the
- fact that they are trying to curb the rampant piracy. But I feel that
- their methods of doing so are too harsh on small businesses, and the
- fact that they profit from successfully scaring the target company
- makes me doubt that they can maintain a truly objective demeanor.
- Since they benefit from intimidating the company subject to
- investigation, they have a strong economic incentive to prosecute as
- many companies as they can, without regard for innocence, and no
- incentive to only attack those that they feel are transgressors,
- rather than anyone they can bully.
-
- ------------------------------
-
- Date: 20 Feb 93 00:25:50 EST
- From: george c smith <70743.1711@COMPUSERVE.COM>
- Subject: File 3--TIME & Puzzlement
-
- TIME AND PUZZLEMENT - SUPERMARKET NEWS MAG
- MUGS "CYBERPUNK"; ALL HACKERS LOOK LIKE R. U. SIRIUS, DANCE TO
- HOUSE MUZIK, GOBBLE ECSTASY, QUOTE TIMOTHY LEARY
-
- Buzzwords, like "cyberpunk," I've decided, are cruel pranks
- sickeningly ambitious writers at glossy magazines use to make
- themselves instant authorities. Media magnification always makes these
- terms legitimate whether they are or not, so you know that while the
- TIME article on "cyberpunk" two weeks ago was pure baffle-crap (see, I
- can make my own buzzword, too), inside 4 months it will have spawned 6
- like-minded articles in other supermarket magazines, taking on a
- complete life of its own.
-
- So, I'm gonna rehash some of this nonsense now, in hope that you
- laugh, because if you don't, when you see it again as truth in the
- coming weeks, you just might have to cry,
-
- Didja know,
- that the computer virus is "the cybernetic analogue of AIDS," a
-
- disease which has affected millions worldwide and caused horrifying
- death and human suffering? According to Phil Elmer-Dewitt of TIME,
- it's so!
-
- Didja know,
- according to certified geezer Timothy Leary, "the PC is the LSD of the
- '90s"? Like you, I thought this was a fatuous, self-serving
- statement. But then I thought about it some more and began to feel
- warm inside. Since I missed LSD when it came around the first time,
- it felt good to know that I now had an unending supply of it sitting
- on my desk, just in case I felt the need to be "groovy."
-
- Didja know,
- that now "cyberpunks" don't look like young men with coke-bottle thick
- glasses and plastic pocket-protectors? No, they look like young, less
- warty, versions of Tiny Tim (which is what R. U. Sirius looks like in
- the photo in TIME magazine). It's true!
-
- Didja know,
- cyberpunks listen to "house" music, that "post-industrial," droning,
- artsy stuff that bands with names like Surgical Penis Klinik and
- Throbbing Gristle couldn't sell in the '80s because it was "too"
- alternative, but now it's big business because computer dudes and
- dudettes don't like those dead, fat guys in Lynyrd Skynyrd. Yup, it's
- true! And boy am I bummed! What am I going to do with my Angry
- Samoans and Mentors records?
-
- Didja know,
- "without visual cues, people communicating on-line tend to flame: to
- state their views more heatedly than they would face to face?" Visual
- cues-visual schmoos - here I thought they did it because there was
- little chance they would get popped on the jaw for being a jerk.
-
- Didja know,
- the movie "Terminator 2" was a cult film?
-
- Didja know,
- that TIME magazine used the same virtual illustration of "virtual
- reality d00d sucking the face off a virtual reality d00dette" as the
- movie "The Lawnmower Man," and the magazines OMNI, COMPUTE, PC
- Computing, Byte, MacWorld, Discover, Newsweek, Rolling Stone, SPIN,
- Science News, Playboy, Penthouse, Gent, USA Today, Details, MONDO
- 2000, Dog Fancy, Cat Fancy, Harpers, The Atlantic, etc., etc., etc.?
-
- Didja know,
- that the Electronic Frontier Foundation is a group that defends
- "exploratory hacking"? Well, they didn't know and they seemed pissed
- in Computer underground Digest when they found out.
-
- Didja know,
- that TIME magazine is now sold with samples of cheap men's cologne,
- along with ads for "Elvis not dead" books and chemicals which will
- chase away your male pattern baldness? It's true!
-
- George/Urnst, The Crypt Newsletter
-
- ------------------------------
-
- Date: 28 Dec 92 15:12:35 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 4--Technology and Populist Publishing (GEnie Reprint)
-
- GE Mail
- From--P.SHAPIRO1 Phil Shapiro
- Sub--Something's Not Quite Right
-
- Something's Not Quite Right in the Publishing World Today
-
- Something's not quite right in the publishing world today. You'd
- think that in this Information Age more people would be writing more
- books than ever before, that small new publishing companies would be
- springing up to bring promising new authors to market, that a new
- Renaissance would be blooming in the world of books, the arts, and
- culture in general. Not so.
-
- It's as difficult as ever, today, to bring a new book to market. No
- established publishing company will consider a manuscript that is
- delivered "over the transom" (unsolicited). The only way to approach
- a publishing company is through a book agent, and finding the right
- book agent is enough to discourage all but the most intrepid new
- authors.
-
- Furthermore, even if the larger publishing houses did take time to
- consider a book by a previously unpublished author, and even if they
- found the ideas or story fresh and original, they'd decline to market
- it unless they could sell sufficiently large quantities of the book to
- make a substantial profit.
-
- The publishing of books has become big business. Books are no longer
- treated as precious vessels of ideas, but rather as any other common
- commodity. Wheat. Pork. Books. Shampoo. Deodorant.
-
- Book lovers cringe at the thought that the business of books has been
- reduced to the buying and selling of a crass commodity. Books are no
- mere commodity. They're one of the most precious things we own. A
- well-written book is the essence of human spirit, captured in tangible
- form for all the world to enjoy.
-
- The commercialization of the book, and the sorry state of today's
- publishing industry, is well-chronicled in a 1989 book titled, "Beyond
- the Bestseller: A Literary Agent Takes You Inside the Book Business,"
- by Richard Curtis. Written by a successful literary agent with over
- 25 years experience in the business, the book speaks with some candor
- about the flawed process which modern publishing houses use to publish
- books.
-
- In the final chapter, "Toward Reform," Curtis crystallizes his
- comments:
-
- "The publishing industry is critically ailing, and no one, from
- the creator of the written word to the consumer, is untouched.
- The signs are everywhere, some statistically demonstrable, others
- less tangible but manifest to anyone who has been in the business
- long enough to watch it evolve. Some of the more commonly voiced
- ones are:
- of publishers on big-name authors.
- selling of publishing companies.
- current best-sellers.
- royalties with authors.
- their influence on editorial policies.
- cheating them out of royalties.
-
- Obviously, there is no single comprehensive explanation of what
- has gone wrong, nor any all-embracing solution. Still, it is
- surprising that authors, agents, publishers, booksellers, and
- other book people, highly intelligent individuals all, should
- continue applying patches and poultices to the symptoms when it
- is clear that the dimensions of the problem call for a thorough
- reevaluation of the way things are done in the publishing
- industry."
-
-
- But while the publishing world looks more dismal than ever, there is
- hope on the horizon. It's entirely possible that new technologies
- will arise that will undermine the monopoly the big New York City
- publishing houses have on the distribution of books. Such
- technologies could take one of two forms: print and non-print.
-
- If you're talking non-print publishing, you're talking about the
- electronic book. A device the size and shape of a regular book, with
- a sharp monochrome screen. Reading material would be distributed on
- some sort of magnetic or optical medium. Cartridges, it would seem,
- would be the favored distribution form.
-
- You plug the cartridge into the device, choose the font size you'd
- like to read in (and perhaps the typeface as well). The device would
- then display the text at a user-controllable rate of display,
- automatically clearing the screen once the text reached the bottom of
- the display. The rate of display would be controlled by a rotatable
- dial that would serve as a sort of "gas pedal" for the device.
-
- Some devices might have hypertext capability built in. Other devices
- might have audio capability built in, where word pronunciation would
- be available at the touch of keystroke. Such extra features would be
- available at a premium cost, though. The basic electronic book would
- be manufactured at the lowest possible cost for the largest possible
- distribution.
-
- New print publishing technologies are likely to continue along the
- lines of the desktop publishing revolution. What's needed is a
- dedicated "bookmaker" device that would accept a high density 3.5 inch
- floppy, and churn out a bound book in the output tray. Using text
- compression routines, over two megabtyes of text can be squeezed onto
- a high density 3.5 inch floppy. Two megabytes worth of text is
- equivalent to about 250,000 words. (One page of typed text, 250
- words, is equivalent to about 2K of memory.)
-
- So most normal length books could quite comfortably fit onto one high
- density 3.5 inch floppy (using the text compression routines.) The
- dedicated bookmaker device could then churn out a book on demand.
-
- The advantages offered by a dedicated bookmaker are enormous.
- Out-of-print books could be easily retrieved and distributed to those
- interested in reading them. Books could be sent inexpensively across
- country by air mail. (Or, a book could be transferred via modem to
- anyone interested in reading it.) A large part of publishing costs is
- the printing and physical distribution of the book. With the
- bookmaker device, the cost of distributing the book would plummet
- ten-fold.
-
- The consumer could then decide whether to print the book out in hard
- copy, or to read the book on the electronic book device. Those
- without a personal bookmaker device in their homes would have access
- to such a device at a public library. (Such a device would be
- coin-operated, much like a photocopying machine.)
-
- But most exciting would be the rise of energetic new book publishers
- who could take advantage of the economies of the new technology to
- distribute works by promising new authors, non-mainstream thinkers,
- and others who are currently excluded from the publishing enterprise.
-
- Anyone with access to a disk drive could open up a publishing company.
- The resulting flood of new books would most certainly contain a lot of
- low quality material. But the advantages of the bookmaker and
- electronic book far outweigh the disadvantages of having to put up
- with reams of lower quality prose. The lower quality prose can simply
- be sifted through by book reviewers, who'd erect signposts pointing
- towards the truly worthy reading.
-
- In terms of the bookmaker device, it would be best to have the device
- be constructed from the lowest cost electronic components that could
- still yield high quality print. So a low-cost printer along the lines
- of the Apple StyleWriter, with 360 dots per inch output, and very slow
- printing, would serve the purpose of a bookmaker device very well.
- The actual bookmaker would be a dedicated device, about the size of a
- current 3.5 inch drive, that would plug into a printer like the Apple
- StyleWriter. For the printing of longer books, you would just leave
- the device on overnight.
-
- Eventually newspaper and magazines would offer "bookmaker
- subscriptions" at a reduced rate than their regular "hard copy"
- subscriptions. These monthly or daily publications would be delivered
- either on disk, or via modem. After all, it doesn't make sense to
- print a newspaper across town, and physically deliver it to your front
- doorstep, when for the same trouble they could deliver the information
- across town, and you could print it (or read it on screen) in your own
- home.
-
- In some sense, the sorry state of today's publishing industry is a
- welcome impetus for the rise of a new industry based on the
- magneto-optic distribution of text. The primary beneficiary of such a
- new industry will be the book consumer, who'll have a far greater
- selection of books to read, at a far lower cost. A populist
- revolution in publishing is just around the corner. And just as
- surely as in Gutenberg's day, a new Renaissance will flourish amid all
- the creative and expressive arts.
-
-
- Phil Shapiro
- [The author takes an interest in the social dimensions of communications
- technology. He can be reached by electronic mail on GEnie at: P.Shapiro1;
- America Online at: pshapiro; Internet: pshapiro@pro-novapple.cts.com]
- This text is in the public domain.
-
- ------------------------------
-
- Date: Sat, 20 Feb 93 16:38:00 EDT
- From: d.mccauley1@GENIE.GEIS.COM
- Subject: File 5--"Time Bomb" Detonated In Pennsylvania
-
- Time Bomb Detonated In Pennsylvania
- by Dennis McCauley
- copyright, 1993
-
- A Pennsylvania meat packing company has filed a civil action
- in Bucks County Court against its former systems consultant, charging
- that the consultant inserted a software "time bomb" into the client's
- RealWorld financial accounting system.
-
- According to the suit filed on behalf of John Lustig Meats,
- Inc., the consulting firm, Sparrow Systems, Inc. of Lansdale, PA, had
- provided hardware and software support to Lustig for a number of
- years. On May 3rd, 1991, Lustig engaged Sparrow to upgrade the
- company's RealWorld system to the new version 6.0. The contract
- specified customized programming services in addition to software and
- installation charges. Lustig paid Sparrow in excess of $20,000 for
- installation of the upgrade.
-
- On September 15, 1991, Lustig's RealWorld system suddenly
- crashed. It would no longer accept orders, nor would it generate
- customer information, invoices, or receipts. As a result, the suit
- claims, Lustig was forced to handle orders manually, and suffered lost
- profits and goodwill, as well as additional personnel costs, and
- "investigation and analysis" expenses.
-
- The "investigation and analysis expenses" refer to Lustig's
- hiring of a second consultant, who rather quickly found and disarmed
- the time bomb, which was date-sensitive, and had been triggered by the
- system clock.
-
- A brief filed on behalf of Sparrow Systems specifically denied
- that a time bomb was installed on Lustig's system. It is interesting
- to note, however, that in a short article which appeared in a local
- newspaper the day after the suit was filed, Sparrow's president,
- William Mann, was quoted as saying, "We don't have any comment about
- whether we did or did not install a time bomb." Representatives of
- Sparrow Systems have refused comment on the case during preparation of
- this report.
-
- Several uninvolved system consultants indicated that
- installation of time bombs, while not standard practice, was not
- unheard of as a hedge against clients who failed to pay for services.
- A counterclaim filed on behalf of Sparrow Systems alleging that Lustig
- owes the consulting firm $2,700 seems to support this theory.
-
- The case raises serious issues about such practices, including
- the ethical considerations involved in placing a potentially damaging
- software device in anyone's system, much less that of a client.
-
- While Lustig v. Sparrow is a civil matter, it remains unclear
- as to whether criminal action might be an option in similar cases.
- Noted computer crime prosecutor Ken Citarella, of the Westchester
- County District Attorney's Office, indicated that the critical
- question in determining whether a criminal prosecution was warranted
- would be ownership of the software in question. In this case, it
- appears that Lustig purchased the RealWorld upgrade through Sparrow
- Systems, authorizing Sparrow to make certain agreed-upon custom
- modifications, none of which was the inclusion of a crippling time
- bomb. As of this writing, Sparrow still retains the source code,
- pending the outcome of the litigation.
-
- ------------------------------
-
- Date: 17 Feb 93 11:18:52
- From: Chiwatcher@DRKTOWR.CHI.IL.US
- Subject: File 6--(fwd) CICnet rural datafication / ubiquitous access
-
- This promises to be a good gathering - it's the first time as far as I
- know that there's been a major effort to organize folks toward the
- goal of wide spread low cost access to the Internet as a goal separate
- from the usual push towards high speed networking for elites.
-
- Apologies if you've seen this multiple times, I'm trying to get it out
- to some places where it might stir up discussion on how the local,
- regional, or national efforts fit in.
-
- Edward Vielmetti, vice president for research, Msen Inc. emv@Msen.com
- Msen Inc., 628 Brooks, Ann Arbor MI 48103 +1 313 998 4562 (fax: 998
- 4563)
-
- From--KIDSNET Mailing List <KIDSNET@vms.cis.pitt.edu>
-
- Date--Fri, 12 Feb 93 10:35:33 -0500
- From--Kimberly Shaffer <shaffer@cic.NET>
- Subject--Rural Datafication Conference Announcement
-
- Preliminary Program Announcement
-
- Rural Datafication:
- Achieving the goal of Ubiquitous Access to the Internet
-
- May 14, 1993
- Chicago, IL
-
- A joint conference focused on extending the services of the Internet to
- difficult-to-reach and typically under-served user communities.
-
- Jointly sponsored by CICNet and the following state networks
-
- Illinois: netILLINOIS
- Indiana: INDnet
- Iowa: IREN
- Michigan: MichNet
- Minnesota: MRNet
- New York: NYSERNet
- Wisconsin: WiscNet
-
- Conference focus and theme:
- +++++++++++++++++++++++++++
-
- CICNet is pleased to announce Rural Datafication as a major
- cooperative initiative among nine networking organizations committed to
- the creation of ubiquitous data networking services throughout their
- region and, indeed, throughout the nation. As part of this
- initiative, these organizations have agreed to co-sponsor a conference
- which builds on an already successful collaboration between CICNet and
- the above networks and which will focus on two primary areas:
-
- 1. Ways to most effectively respond to user communities which desire
- Internet services but which are currently unable to obtain
- Internet access.
-
- 2. Ways to best enhance existing services to those populations which
- which make use of non-dedicated connections: i.e., users whose
- access to the Internet is via dial-up modem rather than
- high speed dedicated lines. The focus includes users who use
- SLIP and PPP to get direct connections to the Internet, and users
- who use Internet facilities via dial-up terminal emulation.
-
- Come, join, and assist us as we plan for increased access for
- such communities. Examples include elementary and high schools,
- public libraries, small businesses, organizations located in remote
- geographic areas, and the rapidly evolving community of users who need
- Internet access from their homes. Help us develop ideas for new
- programs and services both useful and interesting. Meet other people
- who are committed to expanding the network's usefulness.
-
- Intended Audience:
- ++++++++++++++++++
-
- We invite you to meet with us to share information and successes you
- may have, to learn from the information and successes of others, to
- talk with people interested in developing the potential of networks,
- and to discuss ways to develop the rural datafication theme as a major
- initiative focused on meeting the needs of the user communities
- discussed throughout this announcement. This conference is
- specifically intended for three key communities:
-
- 1. Providers of networked information, whether they be network
- organizations or not, who are committed to assisting us as we
- pursue our rural datafication strategy.
-
- 2. Users of networked information: teachers, researchers, librarians,
- scientists, lawyers, bankers -- in short, those who are interested
- in contributing to and gaining from the growing electronically-
- connected community. We are particularly interested in attracting
- users interested in the rural datafication concept.
-
- 3. Perhaps of most importance, potential users of networked
- information who which to either learn about the network or advise
- us on how best to construct a truly pervasive and ubiquitous data
- network.
-
- Agenda, dates and times:
- +++++++++++++++++++++++
-
- Friday, May 14th:
-
- Opening remarks begin at 9:15 am
- Closing remarks will conclude at 4:30 PM
-
- An optional early registration and opening Reception will be held on
- Thursday, May 13th from 5 - 7pm.
-
- Location and fees:
- +++++++++++++++++
-
- McCormick Center Hotel
- Lake Shore Drive at 23rd Street
- Chicago, IL 60616
- +1.312.791.1900
- Conference room rates: Single $85; Double $95
-
- Conference fee: $69 -- includes Friday lunch, morning and afternoon
- breaks, and Thursday's registration reception
-
- For Additional Information:
- +++++++++++++++++++++++++++
-
- To be placed on the list to receive additional information, please
- email, mail, or fax your request for additional information to:
-
- email: may14@cic.net
- fax: +1.313.998.6105
- mail: Rural Datafication
- CICNet
- 2901 Hubbard
- Ann Arbor, MI 48105
-
- We will need either your e-mail or postal address with the request for
- additional information. We would like you to list a particular area
- of interest that you have, relevant to the theme of the conference.
-
- Queries may also be directed to Julie-Elise Burroughs at
- +1.313.998.6103 or to Glee Cady at +1.313.998.6419
-
- Registration:
- +++++++++++++
-
- If you wish to register for the conference now, please enclose a check
- or money order for $69 made payable to CICNet, Inc, and mail it, along
- with the registration information below, to:
-
- Rural Datafication
- CICNet
- 2901 Hubbard
- Ann Arbor, MI 48105
-
- REGISTRATION FORM
- Rural Datafication Conference
- May 14, 1993
- McCormick Center Hotel
- Chicago, IL
-
- Please print or type the following information:
-
- Name:
-
- Title:
-
- Organization:
-
- Address:
-
- City:
-
- State/Province:
-
- Postal Code:
-
- Telephone:
-
- Fax:
-
- Email:
-
- List a particular interest you have which is relevant to the
- theme of the conference:
-
- Cancellations:
- Full refunds will be made for cancellations received by April 26th.
- There will be no partial refunds.
-
- Hotel Reservations:
- Please make your reservations directly with the McCormick Center Hotel.
- When you speak with the reservations desk, mention the date and name
- CICNet to receive the special conference rates.
-
- The $69 fee includes Friday lunch, morning and afternoon breaks, and
- Thursday's registration reception
-
- Please mail this form along with a check for $69 made out to CICNet:
-
- Rural Datafication
- CICNet
- 2901 Hubbard
- Ann Arbor, MI 48105
-
- For additional information or assistance, you may send email to
- may14@cic.net; for assistance by telephone, call Julie-Elise Burroughs at
- +1.313.998.6103 or Glee Cady at +1.313.998.6419.
-
- ------------------------------
-
- End of Computer Underground Digest #5.15
- ************************************
-
-