home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Nov 26, 1997 Volume 9 : Issue 87
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.87 (Wed, Nov 26, 1997)
-
- File 1--CyberPatrol, The Friendly Censor
- File 2--Ghost Stories - Hudson Institutes info-war Hallucination (Crypt)
- File 3--USACM Calls on Pres Clinton to Veto HR 2265
- File 4--RE: Microsoft's licensing (Cu Digest, #9.86)
- File 5--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sat, 22 Nov 1997 21:46:23 -0500 (EST)
- From: jw@bway.net
- Subject: File 1--CyberPatrol, The Friendly Censor
-
- CYBERPATROL: The Friendly Censor
-
- By Jonathan Wallace jw@bway.net
-
- This is the second in a series of articles about
- censorware products. The first, The X-Stop Files,
- can be found at http://www.spectacle.org/cs/xstop.html.
- The Censorware Page, http://www.spectacle.org/cs/,
- contains continuing coverage of these issues and links to
- other sites.
- -------------------------------------------
-
- "We didn't create our product for libraries," admits
- Susan Getgood, director of marketing for Microsystems
- Inc., distributors of CyberPatrol blocking software.
- But Microsystems is in business to make a profit, and when
- libraries come knocking on the door asking to buy
- the product, the company will sell it to them.
-
- Today, CyberPatrol is installed in at least
- two major public library
- systems, in Boston, Ma. and Austin, Tx. In the
- former, after a bitter debate, it was installed on
- terminals for use by people under 18 only.
- In the latter, it was installed
- on all terminals; the library is now, after
- many months, considering a pilot program to offer uncensored
- Internet access to adults, on one out of fifty terminals.
-
- News coverage of the blocking software industry has been
- dominated by the antics of Brian Milburn, president
- of rival Solid Oak Software, distributors of Cybersitter,
- the product which, in pursuit of a
- fundamentalist agenda, blocked the National Organization for
- Women among numerous other sites. By contrast, Microsystems
- has appeared to be the most reasonable and flexible of
- blocking software providers. It maintains a review board
- which meets every two months to review its blocking policies
- and which includes members of the gay community. When authors
- of web pages have complained to Microsystems that their sites
- were blocked, Microsystems has frequently apologized for the
- error and unblocked the sites in the product's next update.
-
- I was one of those authors. In February of this year, I was
- informed that CyberPatrol blocked the pages pertaining to
- my book, Sex, Laws and Cyberspace (Henry Holt, 1996),
- http://www.spectacle.org/freespch.
- I wrote an angry letter to Microsystems and received the
- following reply:
-
- "Hi Jonathan,
-
- Thank you for bringing this to our attention.
- This site was blocked in error.
- I have removed this site from the CyberNOT list.
- This change will take effect
- with the next build of the CyberNOT list, by next Tuesday.
- Please accept my
- apologies for any inconvenience this has caused.
-
- Debra Greaves
- Internet Research Supervisor"
-
- At the time, the Boston Public Library had just installed
- CyberPatrol. Ironically,
- six branches of the Boston library had my
- book on the shelves but you couldn't get to
- the Web page from a terminal with CyberPatrol installed.
-
- With a new wave of libraries considering the purchase of
- blocking software, I decided to go back and take another look
- at CyberPatrol. The informal methodology I used was to check
- my collection of ethical, political and legal Web sites
- (http://www.spectacle.org/links.html)
- against the Cybernot search engine that Microsystems
- maintains on its Web page (http://www.microsys.com).
- A Cybernot search
- will tell you whether or not the product blocks a particular
- site, but will not reveal in which category it
- is blocked. My goal was to determine which of these
- sites, containing controversial speech but no obscenity or
- illegal material whatever, were blocked by CyberPatrol.
-
- Cybernot reported that CyberPatrol blocked twelve of my
- bookmarked sites, out of a total of about 270. These included:
-
- The Flag Burning Page, http://www.indirect.com/user/warren/flag.html.
- This site, which I regard as one of the most intelligent and
- funny resources on the Web, examines the unconstitutionality
- under the First Amendment of laws against burning the flag.
-
- The Second Amendment Foundation, http://www.saf.org. This
- is a large collection of resources on Second Amendment
- right-to-bear-arms issues. While the blocking of this
- site is questionable under any theory, it is also a nice
- illustration of the inconsistency of CyberPatrol and of all
- blocking software. The product does not block the
- National Rifle Association, http://www.nra.org, or
- numerous other sites on both sides of
- the gun control issue.
-
- The Newtwatch page, http://www.cais.com/newtwatch/, is
- regrettably no longer on the Web, but CyberPatrol blocks it
- at its former URL. Funded by the Democratic party,
- Newtwatch was a combination of devastating political
- reportage and satire aimed at Speaker of the House
- Newt Gingrich. It contained nothing that was offensive
- to children by any stretch of the imagination--
- unless they were Republican children with no sense
- of humor.
-
- Another vanished Web page that is still blocked is
- the Dr. Bonzo web page, http://www.iglou.com/drbonzo/anathema.htm,
- a series of satirical essays on religious matters. The blocking
- of these two pages, long removed from the Web, raises
- questions about the frequency with which the CyberPatrol
- database is updated. A third blocked page which is no
- longer on the Web contained nothing but a copy of
- the U.S. Constitution.
-
- Other sites contained some explicit text but did so in
- the pursuit of a socially significant goal. For example,
- the Jake Baker page,
- http://krusty.eecs.umich.edu/people/pjswan/Baker/Jake_Baker.html,
- contains news reports and analysis of the case of the
- University of Michigan student who was arrested for
- distributing a rape and torture fantasy about a classmate
- on Usenet. Baker's stories, which led to his arrest,
- are also linked from this page.
- The case broke some new legal ground, and Mark Mangan
- and I used this site as a research resource in writing
- Sex, Laws and Cyberspace. It is hard to imagine how we
- could have written about the case without reading
- Baker's horrifying stories, which are presumably
- the reason why CyberPatrol blocks the entire site.
-
- CyberPatrol also blocks a Usenet search engine,
- www.dejanews.com. Dejanews, of course, is a
- major resource for anyone searching for Usenet discussion on
- any topic, and we also relied heavily on it in writing
- Sex, Laws and Cyberspace. One startled user of the Austin
- Public Library posted to Usenet a
- few weeks ago: "As DejaNews is one of the top Internet
- research tools, [this] decision transcends comprehension."
- Dejanews does not relay any graphics posted to Usenet;
- Microsystems apparently fears users will find explicit
- text.
-
- CyberPatrol blocked some of the bookmarked sites for
- no imaginable reason. The company has admitted
- to a number of errors in the past, in addition
- to the blocking of the Sex, Laws and Cyberspace
- page. Like other blocking software companies,
- Microsystems has employees surfing the
- Web, looking for sites to add to the Cybernot list--
- and frequently they are not very careful. For
- example, Cybernot reports that the Society
- for the Promotion of Unconditional Relationships (SPUR)
- ( http://dspace.dial.pipex.com/town/estate/xgv92/spur2.htm)
- is blocked. The group describes its mission
- thus: "to increase
- public understanding and awareness of the nature and
- benefits of Unconditional Commitment in
- Relationships." The SPUR page contains articles
- with names like "The Role of Faith in Relationships."
-
- It was also hard to understand why CyberPatrol blocks the
- Interactivism page (www.interactivism.com). This site specializes
- in virtual activism; its top page, as I write these words,
- invites you to send faxes to politicians on issues including
- handgun control, freedom for Tibet, and campaign
- finance reform.
-
- Adults researching a variety of topics, notably
- freedom of speech-related issues, in the Austin public
- library are going to run into some significant roadblocks.
- The Austin library blocks four categories, three of them
- sex-related (including the categories under which
- Dejanews and the Jake Baker page are blocked) and
- the fourth entitled "gross depictions". Jon Lebkowsky,
- an Austin-based author and activist, was involved in discussions
- with library officials about their installation
- of CyberPatrol. He commented: "The Austin Public
- Library promised that filters would be an 'interim
- measure,' but backed off from that promise,
- thinking that their scaled-down
- filtering was gaining acceptance....
- The APL should have honored the American Library
- Association's position on filters and removed the
- software after the Supreme Court's CDA decision."
-
- Microsystems acknowledges that
- CyberPatrol was never meant to be used to determine what
- adults can see. In March 1997, Susan Getgood
- wrote in a message posted to the Fight-Censorship
- list:
-
- "The CyberNOT list was designed to be used by adults
- to manage children's access to the Internet.
- It is not a filter meant for adults."
-
- A few weeks ago, at the annual New York Library
- Association meeting in Syracuse, Susan Getgood
- conducted a panel on blocking software. During the
- Q&A afterwards, I asked her:
-
- "Isn't it true that CyberPatrol blocks First Amendment
- protected, socially valuable material?"
-
- Susan thought for an extraordinarily long time before
- answering the question. Finally, she said very carefully,
- that in creating the Cybernot list, Microsystems didn't
- think about whether blocked pages are constitutionally
- protected or socially valuable. The company only thought
- about whether the material is (by its own standards)
- "inappropriate for children."
-
- Microsystems standards for determining appropriateness
- were not written by a librarian, nor meant for use in libraries.
- They weren't meant to keep speech from adult eyes.
- Applied to children, they draw no distinction between
- eight year olds and eighteen year olds.
- The latter conceivably might have a research assignment
- which involves looking at the Flag Burning page, the
- Jake Baker page or the Second Amendment Foundation.
- "Just as the CDA tried to reduce the entire net to
- something appropriate for 12-year-olds,
- so CyberPatrol is trying to expand the
- children's section to fill the entire library", said
- Jamie McCarthy, an Internet activist and software
- developer based in Michigan.
-
- In the Boston Public Library, CyberPatrol is installed
- on terminals used by people under 18, unless there is
- a parental permission slip on file allowing use of an
- uncensored computer. The three sex-related categories
- aree blocked; one of these, SexActs, is used to block
- text-only sites and is one of the categories assigned
- to Dejanews and the Jake Baker page. This category
- has also been used to block feminist discussion groups.
-
- The company's willingness to unblock sites is meaningless.
- The Internet is growing by leaps and bounds every week,
- and even as the company deletes sites like mine from the Cybernot
- database, Microsystems' harried surfers will be making
- fresh mistakes. Seth Finkelstein,
- a Boston-based software developer who follows censorware
- issues closely, commented: "No small group of
- people can hope to keep up with all the
- changes on the Web. Offering to correct 'mistakes',
- while good from a marketing standpoint, simply
- does not make up for the impossible
- nature of the task. We only see the problems
- which have been exposed so far; what else is lurking,
- not yet uncovered in their blacklist?"
-
- Putting a barrier between users and research sources
- is not what libraries do. Mark Mangan and
- I could not have written Sex, Laws and Cyberspace in
- the Austin library; too many of our sources are blocked.
- (Cyberpatrol also previously blocked The Electronic
- Frontier Foundation archives, www.eff.org, and the MIT Student
- Association for Free Expression, www.mit.edu/activities/safe/,
- two other sources we consulted in writing our book.)
- I hope that there are at least some librarians in Austin
- who feel ashamed that their library could not be used as
- a research source for a book on freedom of speech.
-
- CyberPatrol doesn't belong in public libraries. The company,
- by its own statements, has all but admitted this. The library
- which buys CyberPatrol has only itself to blame for its dereliction
- of responsibility towards its users.
-
- -----------------------
-
- If you don't want to see any more of these messages,
- simply remove yourself from the list by visiting
- http://www.spectacle.org/ or by typing the following
- URL into a Web browser:
-
- http://www.greenspun.com/spam/remove-2.tcl?domain=specpress&email=cudigest%40sun
- .soci.niu.edu
-
-
-
-
- ------------------------------
-
- Date: Thu, 6 Nov 1997 18:23:38 -0500
- From: "George Smith [CRYPTN]" <70743.1711@compuserve.com>
- Subject: File 2--Ghost Stories - Hudson Inst's info-war Hallucination (Crypt)
-
- Source - CRYPT NEWSLETTER 45 November -- December 1997
-
- SOME GHOST STORIES SEEN THROUGH A MIRROR: The Hudson Institute's
- info-war hallucination.
-
- If you visit this page often you surely have noticed grim dramas
- that play themselves out in the pronouncements of various national
- security experts.
-
- Time and time again, prophets appear to warn that our safety and
- security are at stake or that fantastical threats and intrigue
- are mounting in the corridors of foreign power.
-
- The solutions offered are always the same. Spend more taxpayer
- dollars. Give them to the Pentagon, proxies of the Pentagon,
- and/or consultants offering guidance to the Department of Defense.
-
- In the mainstream media, no one ever questions the methods or
- results of the prophets of national doom even though the same
- prophets have racked up a startling number of foolish mistakes and
- false alarms in the past few years.
-
- Few average Americans know how such mistakes are vended as
- truth or how intelligence information is twisted into unrecognizable
- analyses that share no relationship with their original sources. No
- one gets to look behind the doors of the national security
- apparatus except the carefully screened. Never you and certainly
- never anyone you know.
-
- Well, this story gives you a peek behind that door. It's a
- look at the nuts-and-bolts constituting an intelligence analysis provided
- by a highly respected think tank. Buckle yourself in and grab the bottle
- of Tums because it's not a pretty picture.
-
- In Crypt News 44, you read the tale of Mary C. FitzGerald, a
- Hudson Institute research fellow whose paper "Russian Views on
- Electronic and Information Warfare" dove into the realms of
- telepathy, the paranormal and their alleged military application.
-
- In it, FitzGerald fell for an old April Fool's joke known as
- the Gulf War virus hoax, too.
-
- The Hudson Institute paper stated:
-
- "For example, one cannot exclude the use of software inserts in
- imported gear used in the Iraqi air defense system for
- blocking it at the beginning of the war," is one of the incarnations
- of it -- as reprinted from "Russian Views on Electronic and Information
- Warfare." Published on the Internet earlier this year, it was
- disseminated through Winn Schwartau's Information Warfare mailing
- list.
-
- But where did this really come from?
-
- Ironically, the same statement can be found in an article retrieved
- from the CIA's Foreign Information Broadcast Surface (FBIS). Crypt
- Newsletter obtained an interesting FBIS English translation of an article
- published in October of 1995. Written by a Major M. Boytsov, it
- appeared with the title "Russia: Information Warfare" in a Russian
- publication entitled "In Foreign Navies."
-
- Despite it's misleading title, Boytsov's article is not about Russian
- ideas on information warfare. Instead, it is more a survey and analysis
- of U.S. Department of Defense thinking and effort on the subject.
- Boytsov's sources are attributed in a footnote to the "foreign press."
-
- So, in October of 1995, Boytsov writes in "Information Warfare,"
- "For example, one cannot exclude the use of software inserts
- [programmnyye zakladki] in imported gear used in the Iraqi air
- defense system for blocking it at the beginning of the war." Since
- Boytsov's sources are the "foreign press," it's quite likely
- he read of the Gulf War virus hoax either from US News & World Report,
- the original mainstream media source to spread it, or others
- pulled along for the ride. (As we've learned, this particular hoax
- sprang from an April Fool's joke published in Infoworld magazine.
- The joke was accepted as reality by the national news media and
- now it's an inescapable part of computer virus lore.)
-
- Since Mary C. FitzGerald's paper was provided as intelligence for
- the U.S. military, it is of further interest to taxpayers to know that
- money is being spent to educate the Department of Defense on issues
- that are normally reserved for television programs on the
- FOX network -- urban X-File-type myths.
-
- Another section of the Hudson Institute research paper on Russian
- views in information warfare are worth reviewing when compared with a
- completely different article published in 1994 by a colonel in
- the Russian military.
-
- Appearing in an August 1994 issue of Foreign Military Review,
- and again made available to Crypt Newsletter translated from Russian
- through the CIA's Foreign Broadcast Information Service (FBIS),
- Colonel V. Pavlychev writes in the article "Psychotronic Weapons: Myth or
- Reality":
-
- "The second direction [at the U.S. Department of Defense] includes
- an in-depth study of paranormal phenomena that are of greatest interest
- from the standpoint of possible military use -- clairvoyance, telekinesis,
- and so forth."
-
- Most of Pavlychev's paper is written from the standpoint
- of discussing U.S. Department of Defense involvement in potential
- use of the paranormal as a weapon. Leaving aside the ridiculous nature of
- the topic for an instant, keep in mind that Mary C. FitzGerald's Hudson
- Institute paper is on "Russian" military views.
-
- In "Russian Views on Electronic and Information Warfare," published
- by the Hudson Institute and FitzGerald on the Internet earlier this year,
- we see:
-
- "The second direction includes an in-depth study of paranormal
- phenomena that are of greatest interest from the standpoint of
- possible military use -- clairvoyance, telekinesis, telepathic hypnosis,
- and so forth."
-
- But wait. These aren't Russian views at all. Instead,
- Colonel Pavlychev attributes them to two Americans: Russell Targ and
- Keith Harary, who authored a book called "The Psychic Race" in 1984.
- Targ was a known as a psychic researcher at Stanford Research Institute
- in the Seventies and Eighties until this type of fringe science became
- badly discredited. Harary was a psychic who worked with Targ and
- who occasionally published in unusual journals like "Journal of the
- American Society of Psychical Research."
-
- Pavlychev also writes on the U.S. use of remote-viewers, or
- clairvoyants -- which is what most people, including the Russians, call
- them. ("Remote viewer," in Crypt Newsletter's estimation, was nothing
- but a clever dodge used by the crackpots in the U.S. Army and intelligence
- agencies in the Eighties to avoid immediately tipping off supervisors,
- the press and the skeptical that they were involved in using the
- equivalent of "crystal ball gazers" for military reconnaissance.)
-
- Anyway, Pavlychev's article states:
-
- "The framework of this phenomenon is quite broad: on a
- strategic scale, it is possible to penetrate the enemy's main
- command and control facilities to become familiar with his
- classified documents; on the tactical level, reconnaissance can
- be conducted on the battlefield and in the enemy's rear area
- (the "clairvoyant-scout" will always be located at a safe
- place). However, problems do exist -- the number of individuals
- possessing these abilities is limited, and the data received
- cannot be checked."
-
- Once again, this is material roughly attributed to Targ and
- Harary in 1984 -- not Russians in 1997.
-
- In the Hudson Institute research paper, this year,
- we read:
-
- "The framework of this phenomenon is quite broad: on a strategic
- scale, it is possible to penetrate the enemy's main command-and-control
- facilities to become familiar with his classified documents; on the
- tactical level, reconnaissance can be conducted on the battlefield and
- in the enemy's rear area (the 'clairvoyant-scout' will always be located
- at a safe place). However, problems do exist -- the number of
- individuals possessing these abilities is limited, and the data
- received cannot be checked."
-
- In Pavlychev's "Psychotronic Weapons," we see:
-
- "According to military experts, using psychokinesis to
- destroy command and control systems and disrupt the functioning of
- strategic arms is timely. The ability of a human organism to
- emit a certain type of energy today has been confirmed by
- photography of a radiation field known as the Kirlian effect.
- Psychokinesis is explained by the subject's generation of an
- electromagnetic force capable of moving or destroying some
- object. Studies of objects destroyed as a result of experiments
- conducted have shown a different form of breakage than under the
- effect of physical force."
-
-
- The Hudson Institute researcher writes in 1997:
-
- "The ability of a human organism to emit a certain type of energy
- has been confirmed by photography of a radiation field known as the
- Kirlian effect. Psychokinesis is explained by the subject's generation
- of an electromagnetic force capable of moving or destroying some object.
- Studies of objects destroyed as a result of experiments
- conducted have shown a different form of breakage than under the
- effect of physical force."
-
- In 1994, Pavlychev says:
-
- Using telepathic implantation, an enemy formation, "instead
- of exploiting the success, will try to consolidate on the line
- achieved or even return to the starting line."
-
- In 1997, the Hudson Institute research paper states of the power
- of implanted telepathic command: "For example, personnel of an enemy
- formation executing a sudden breakthrough of defenses, instead of
- exploiting the success, will try to consolidate on the line achieved
- or even return to the starting line."
-
- In 1994, Pavlychev states:
-
- "Many western experts, including military analysts, assume that
- the country making the first decisive breakthrough in this field will
- gain a superiority over its enemy that is comparable only with the
- monopoly of nuclear weapons. In the future, these type of
- weapons may become the cause of illnesses or death of an object
- (person), and without any risk to the life of the operator
- (person emitting the command). Psychotronic weapons are silent,
- difficult to detect, and require the efforts of one or several
- operators as a source of power. Therefore, scientific and
- military circles abroad are very concerned over a possible
- 'psychic invasion' and note the need to begin work on taking
- corresponding countermeasures."
-
- In 1997, the Hudson Institute publication reads:
-
- "Many 'Western experts,' including military analysts, assume that
- the country making the first decisive breakthrough in this field
- will gain a superiority over its enemy that is comparable only with
- the monopoly of nuclear weapons. In the future, these types of weapons
- may become the cause of illness or death of an object (person),
- and without any risk to the life of the operator (person emitting the
- command). Psychotronic weapons are silent, difficult to detect, and
- require the efforts of one or several operators as a source of power.
- Therefore, scientific and military circles abroad are very concerned
- over a possible 'psychic invasion' . . . "
-
- Pavlychev's 1994 article also distinctly points to sources
- derived from U.S. writers, specifically, the eccentrics --
- colleagues of Hal Puthoff, and employees of military men Albert
- Stubblebine and John B. Alexander's "spoon-bending" and "out of body
- experience" programs -- in residence at Stanford Research
- Institute (SRI) and the U.S. Army to study the paranormal in the
- Eighties.
-
- Other material from the Pavlychev paper is roughly attributed
- to another U.S. source, a book called "Mind Wars: The True Story of
- Government Research Into the Potential of Psychic Weapons,"
- written by Ronald McRae and published by St. Martins in 1984.
-
- And still other sources include American network television shows
- and the New York Times -- obviously also published in the
- U.S.
-
- It need repeating that Pavlychev's article is _not_ a monograph
- on Russian military views on the paranormal, but rather his analysis of
- the U.S. military's involvement in the area with information obtained
- from open source literature published in the United States.
-
- Paradoxically, the Hudson Institute's Mary C. FitzGerald uses
- the same subject material as Pavlychev's 1994 article and turns
- it around 180 degrees to show "Russian Views on Electronic and
- Information Warfare."
-
- What does all this gobble on telepathy and psychotronic
- brain weapons from books on the paranormal and comments from
- fringe researchers written in the Eighties have to do with
- Russian views on information warfare today? Does it have anything to
- do with information warfare and Internet security at all?
- Excellent questions! Ask the mandarins at the Hudson Institute.
- Perhaps they know.
-
- All of this serves to demonstrate that the environment in which these
- weird stories of strange pseudo-science and technology in service
- to the military machine circulate is like a hall of mirrors in which the
- equivalent of techno-myths and modern ghost stories bounce back and
- forth through Cold War minds until few can even tell where they
- originally came from.
-
- Like any good ghost story, they gain credibility when passed through
- supposedly expert sources -- think tanks. But the only thing remarkable
- about them is how they're used to frighten the ignorant -- in this case,
- military men, political leaders or uncritical journalists.
-
- -----------------
-
- Notes:Mary C. FitzGerald responded to having her report
- written up with regards to the Gulf War virus hoax in the Netly News.
- Her comments are appended to the original (URL below) and they are
- republished here in contrast with this issue's analysis.
-
- Mary C. FitzGerald replied:
-
- "According to George Smith, the sun revolves around the earth, the
- earth is flat, the Conquest of the Skies will never fly, and the new
- Revolution in Military Affairs is a Pentagon war-theory euphemism
- wherein futuristic contraptions are predominantly products of wishful
- thinking.
-
- "Mr. Smith debunks the potential use of computer viruses in warfare. He
- further argues that they are merely a conspiracy by the Pentagon and
- conservative think tanks designed to enhance a non-existent threat --
- presumably to increase defense spending. He has the right to say
- whatever he thinks, but the only thing he has demonstrated is his own
- selective paranoia.
-
- "The paper he cites is my presentation of Russian views on the nature
- of future war, a subject to which the Russians for many decades have
- devoted extensive resources and manpower. The Chief of the Russian
- General Staff, Marshal Ogarkov, not the Pentagon, used the phrase the
- Revolution in Military Affairs (RMA) over two decades ago to point out
- the impact of technology on future warfare. His writings and those of
- other Russian military theorists on the RMA are proving to be very
- prophetic. Ogarkov in the mid-70s correctly envisioned the type of
- warfare that was demonstrated in Desert Storm. Russian military
- theorists are evaluating not only the impact of computer viruses, but
- also all other types of information weapons, logic bombs, special
- microbes, and micro-chipping. They are also studying the impact of
- other new technologies (such as precision-guided munitions,
- third-generation nuclear weapons, and weapons based on new physical
- principles). George Smith may refuse to accept the potential of new
- technologies on modern warfare, but the Russians clearly disagree with
- him.
-
- "P.S. Throughout his commentary, Mr. Smith erroneously takes my
- discussion of what Russian military theorists have said and presents
- it as direct quotes from me."
-
- More relevant links:
-
- See the hyper-linked version on http://www.soci.niu.edu/~crypt .
-
- -------------------------------------------------------------
- George Smith, Ph.D., edits the Crypt Newsletter from Pasadena,
- CA.
-
- copyright 1997 Crypt Newsletter. All rights reserved.
-
- INTERNET: 70743.1711@compuserve.com
- crypt@sun.soci.niu.edu
- http://www.soci.niu.edu/~crypt
-
- Mail to:
- Crypt Newsletter
- 1635 Wagner St.
- Pasadena, CA 91106
- ph: 818-568-1748
-
- ------------------------------
-
- Date: Tue, 25 Nov 1997 15:04:25 -0500
- From: USACM Washington Office <usacm_dc@ACM.ORG>
- Subject: File 3--USACM Calls on Pres Clinton to Veto HR 2265
-
- PRESS RELEASE
-
- TUESDAY, NOVEMBER 25, 1997
-
- COMPUTER SCIENTISTS URGE PRESIDENT CLINTON TO VETO LEGISLATION
- RESTRICTING FLOW OF SCIENTIFIC INFORMATION
-
- Computer scientists fear that legislation rushed through in the closing
- days of Congress may inadvertently criminalize many scientific publications
- that are freely available on the Internet today. They are calling on the
- President to veto the measure.
-
- The Association for Computing's U.S. Public Policy Committee (USACM) said
- that the legislation could lead to criminal prosecutions against
- scientists, educators and others who do nothing more than share their own
- articles on the Internet with students and colleagues. According to USACM
- Chair Dr. Barbara Simons, "This legislation was hurried through Congress,
- was poorly drafted, and is likely to have many unintended consequences."
-
- The "No Electronic Theft Act" would criminalize the copying of materials
- which are currently protected under the well established U.S. doctrine of
- Fair-Use. According to the Act, any person who infringes a copyright
- willfully, by the electronic reproduction or distribution of one or more
- copies which have a total retail value of more than $1000 dollars, will be
- subject to a criminal prosecution.
-
- The scientists say that an essential element of research is that papers
- be reviewed by others. Scientists submit papers describing their research
- to scientific journals which facilitate the peer-review process. The
- journals then print the reviewed papers and thus own their copyrights.
- Since the Internet's development, researchers have used it to make their
- research widely available to others in their field. According to the
- letter, "Under the No Electronic Theft Act, an author who posts their
- research on the Internet, and whose documents are frequently read on-line,
- could be subject to criminal prosecution."
-
- USACM argues that the No Electronic Theft Act will have a chilling effect
- upon the free speech of scientists and professionals in universities and
- research labs. Universities may forbid scientists from publishing their
- research on- line, or reading and reviewing other scientist's research
- on-line, to avoid the potential of massive copyright litigation.
-
- According to Dr. Simons "This legislation is clearly contrary
- to the White House's stated goal of avoiding Internet regulation. We
- believe it is inconsistent with the Administration's policy to promote
- dramatically expansive laws for the Internet where other less burdensome
- means may be available to address copyright concerns."
-
- The Association for Computing (ACM) is the largest and oldest professional
- association of computer scientists in the United States. ACM's U.S. Public
- Policy Committee (USACM) facilitates communications between computer
- scientists and policy makers on issues of concern to the computing community.
-
- For more information, Please contact:
-
-
- Barbara Simons, Chair, USACM: 408/256-3661, simons@VNET.IBM.COM
- David Farber, USACM: 215/898-9508, farber@cis.upenn.edu
- Lauren Gelman, Associate Director, USACM, 202/544-4859, gelman@acm.org
-
- http://www.acm.org/usacm/copyright/
-
- _____________________
- November 25, 1997
-
- President William J. Clinton
- 1600 Pennsylvania Ave., NW
- Washington, DC 20500
-
- Dear President Clinton:
-
- The Association for Computing's U.S. Public Policy Committee
- believes that the "No Electronic Theft Act" (H.R. 2265), which is now
- before you, does not adequately reflect the nature of the new digital
- environment and will have a negative impact on the rich scientific
- communications that have developed on the Internet in many fields,
- including computer science. For this reason, we are asking you to veto the
- legislation. We agree that copyright holders have a legitimate need to
- protect their intellectual property. However, we are concerned that the
- bill was rushed through both Houses of Congress without careful
- consideration of its unintended consequences.
-
- We are concerned the Bill may:
-
- * Restrict scientists and other professionals from making their
- research available on the Internet for use by colleagues and students.
- Most scientists do not own the copyright on their own materials. Instead,
- that copyright ownership is retained by the scientific journal which
- peer-reviews and publishes the research. Under the No Electronic Theft
- Act, an author who posts their research on the Internet, and whose
- documents are frequently read on-line, could be subject to criminal
- prosecution. If the bill becomes law, scientists may have to choose
- between having their work peer-reviewed or making it widely available.
-
- * Criminalize the transfer of information that is currently protected
- under the U.S. 'fair use' doctrine. Copyright law is derived from the U.S.
- Constitution and is intended to advance "science and the useful arts." The
- fair-use doctrine protects reading and nonprofit copying and thus allows
- scientists and educators to openly exchange information. H.R. 2265 does
- not explicitly protect the "fair use" privilege which makes this open
- exchange of scientific information possible.
-
- * Chill free speech in universities and research labs. The
- terminology used in the Bill, including "willfully" and "for profit," are
- not defined; it is unclear what the parameters of a criminally prosecutable
- copyright infringement are. As a result, it is likely that many
- institutions will mandate that all copyrighted documents be removed from
- the net to avoid having to defend copyright infringement prosecutions.
-
- We hope that you will veto this measure and ask your staff to work
- with Congress during the next session to develop more sensible legislation.
-
-
- Sincerely,
-
- Dr. Barbara Simons Chair,
- U.S. Public Policy Committee
- Association For Computing
-
-
- The Association for Computing (ACM) is the largest and oldest professional
- association of computer scientists in the United States. ACM's U.S. Public
- Policy Committee (USACM) facilitates communication between computer
- scientists and policy makers on issues of concern to the computing
- community.
-
- cc: Vice President Albert Gore, Jr.
- Ira Magaziner, Senior Adviser to President
- Brian Kahin, Office of Science Technology and Public Policy.
- Henry J. Hyde, Chair, House Judiciary Committee
- John Conyers, Jr., Ranking Member, House Judiciary Committee
- Howard Coble, Chair, Courts and Intellectual Property Subcommittee,
- House Judiciary Committee
- Orrin G. Hatch, Chair, Senate Judiciary Committee
- Patrick J. Leahy, Ranking Member, Senate Judiciary Committee
- John Ashcroft, Chair, Constitution, Federalism and Property Rights
- Subcommittee, Senate Judiciary Committee
- Mike DeWine, Chair, Antitrust, Business Rights and Competition
- Subcommittee, Senate Judiciary Comittee
- Representative Virgil H. Goode
- Representative Barney Frank, House Judiciary Committee
- Representative Christopher Cannon, House Judiciary Committee
- Representative William Delahunt, House Judiciary Committee
- Representative Elton Gallegly, House Judiciary Committee
- Representative Bob Clement
-
- ------------------------------
-
- Date: Thu, 27 Nov 1997 10:28:05 +1000
- From: arb@LATROBE.VIC.GOV.AU
- Subject: File 4--RE: Microsoft's licensing (Cu Digest, #9.86)
-
- > Date-- Tue, 18 Nov 1997 15:24:07 -0500
- > From-- James Love <love@cptech.org>
-
- > The following is a letter by Brian Glaeske, a software developer, to
- > the US DOJ, regarding the Common Control DLL. Microsoft's licensing
- > requires developers who want to distribute this DLL to also distribute
- > MSIE4.0
-
- > The URL for the license is:
- >
-
- http://www.microsoft.com/msdn/sdk/inetsdk/help/itt/IEProg/Licensing.htm#ch
- _
-
- > MSHTML_licensing
-
- > The letter follows:
-
- > Forwarded by James Love <love@cptech.org>
- > -----------------------------
- > Subject--Microsoft Antitrust
-
- <SNIP>
-
- > It is the responsibility of DOJ to ensure that Microsoft does not use
- > its OS monopoly to monopolize the market for applications. I believe
- > that forcing third party developers to distribute Microsoft Internet
- > Explorer is a blatant anti-competitive act.
-
- If you actually read the Licensing and Distribution information, you will
- find that Microsoft only requires that you LICENSE IE4.0, not necessarily
- re-distribute it.
-
- The following paragraph is from the URL quoted above...
-
- ----------------
-
- Application developers who want to redistribute Microsoft(r) Internet
- Explorer technologies, such as the WebBrowser control, Wininet.dll,
- Urlmon.dll, or Comctl32.dll, must obtain a redistribution license for
- Microsoft(r) Internet Explorer 4.0. The Internet Explorer self-extracting
- executable installs a number of system files and registry entries in
- addition to the actual WebBrowser control. You can license Microsoft
- Internet Explorer for Windows(r) 95, Windows(r) 3.1, Windows NT(r)
- Workstation, and Apple Macintosh(r) royalty-free to redistribute within
- your organization or to your customers. Plus, you can use the Microsoft
- Internet Explorer Administration Kit (IEAK) to easily create Internet
- Explorer distribution media, which you can customize to specify start and
- search pages and a favorites list. This lets your organization create and
- distribute a Web browser that reflects your specific needs and the needs
- of your users. For more information on redistributing Internet Explorer,
- see the Microsoft Web page at http://www.microsoft.com/ie/ieak/.
-
- ----------------
-
- Nowhere in the licensing information do I find any requirement that you
- must distribute IE4.0 in order to distribute comctl32.dll. While I
- personally find it strange that Microsoft requires you to license IE4.0
- to distribute something that was originally a part of the OS, I can live
- with it. It seems to me as if Microsoft have simply changed the licensing
- requirements of comctl32.dll, and not in an overly harsh, or even vaguely
- restrictive way.
-
- It is easy to get an IE4.0 re-distribution license and then simply not
- distribute IE4.0 - you can freely distribute Netscape or some other
- browser (or even NO browser) under the terms of this license.
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.87
- ************************************
-
-
-