Updated: 24.11.2002; 16:59:55 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Monday, August 26, 2002

Veterans' Medical Records Left on Disposed Systems [Hideaway.Net]
23:47 #

Brazilian cracking Spree

Hackers catch World Cup fever: Brazil's triumph in the football World Cup may have spurred the country's hackers to emulate the success in cyber-space. Brazilian hackers are now the most prolific in the world, taking over from Eastern European groups which dominated cyber-attacks in the 1990s, according to security firm mi2g. [Terrorism RealNews] I always wonder where they get their numbers from. It turns out, that they only counted Web Defacements. When attrition.org was still in the defacemnet mirror buisenes most "internet security statistics" where just the numbers plainly taken from attrition.org.
23:35 # G!

5 Jahre C4 Party

Der Chaos Computer Club Cologne (C4) veranstaltet am 31. August eine Party zu seinem 5j...hrigen Bestehen. [Chaos Computer Club] ... im Rahmen der Demo-Party evoke. Nett, aber auf der falschen Rheinseite.
22:58 # G!

Copyright hinders research quality.

Recently I found a link by Ed Felten to an article on the problems "intellectual property" creates for Academics. The Article was written by Siva Vaidyanatha and was published in "Chronicle of Higher Education".

I have a concrete example of "intellectual property" decreasing the quality of scientific research or at least the communication of research results:
I am writing my Ph.D. Thesis on computer crime. That brings me to a situation where I have do document hundreds of computer crime cases. The most information about computer crime cases is found on the Internet. And most of the information on the Internet is not as stable as one would wish.
On of the key points in scientific work in the field of humanities is that your research should be reproducable by others. So somebody using my research should be able to easily access the same sources. That's what citations, bibliographies and university libraries are for.
So how could I ensure that others have access to the same online resources that I have used? There is an very easy solution: Hack an little program that goes over my bibliographic database, downloads all online resources mentioned and and puts them in a folder of my homepage. (This technique is commonly referred as "mirroring"). I could put a note in my Thesis stating that any references on the Web which are inaccessible can also be found "mirroring"). I could put a note in my Thesis stating that any references on the Web which are inaccessible can also be found at "http://md.hudora.de/archive/diss/" or something. This all in all would take me less than 20 minutes and the additional effort to keep this single URL stable over the years.
By doing so I would be happy, my thesis advisor would be happy an my readers would be happy. Possibly most authors of the online-resources would be happy, too. I found out most like it, when they are deemed to be "important enough to be included in scientific work". Other resources I would mirror are by anonymous entities or government bodies which both shouldn't subject to being mirrored. Some resources are online magazines which might like it not that much because they might fear loosing advertising revenue.
But basically with twenty minutes of work I could raise the scientific use of my thesis considerably.

The problem is I can not take an mirror and publish it. German "Urheberrecht" allows me to take a mirror for my own use (so called "Eigengebrauch") but I am not allowed to publish it. I could ask all authors of online resources if they allow me to mirror their resource but this would take weeks instead of twenty minutes and I would have to build a databases of whom exactly allowed me to mirror what and republish under which conditions.

So I will simply do what all others do: take a mirror for my own use, keep it for myself and give out single documents in an informal way to fellow researchers asking me explicitly. Not a very satisfying solution.


22:43 # G!

Mobile Viruses?

Japanese phones vulnerable to hackers?

So far, no serious virus attacks have been reported in Japan--or anywhere else -- but tech security companies say cell phones could become targets as they turn into sophisticated, high-tech devices like PCs, allowing people to send e-mail, surf the Internet and shop online. [c|net] "FUD" spreaders seem to be obsessed with the dangers of mobile cracking and viruses. See SMS-Viruses which are just simple DoS-Attacks. Beware of a mobile Pearl Harbour!
22:01 # G!

Zahnarzt hat keiner gern.

Nicky war heute beim Zahnarzt und bekam eine F[florin]llung. Von dem zahnarzttypischen L...rm ist unser armes Zwezzle aufgewacht und war sehr unruhig - verst...ndlich.

Zweezle ist der Arbeitstitel f[florin]r unser ungeborenes ... zumindest wis wir das Geschlecht wissen. Neal war das Beezle.
21:46 # G!

Weblisten.com auf juristischem Glatteis

via [heise online news]: Die Geschichte zeigt erneut, dass es anscheinend unm[ring]glich ist legel eine vern[florin]nftige Musikauswahl online anzubieten. qui bono?
21:42 # G!

WebLog Wiederbelebungsversuche

Nachdem das "Familientagebuch" ja nun ienige Wochen brach liegt, ein neuer Versuch etwas aus unserem Leben niederzuschreiben. Diesmal mit neuer - hoffentlich praktischerer - Technik.

Diesmal verwende ich Radio Userland, ein Tool mit dem ich auch Material f[florin]r meine Dissertation strukturiere. Hoffentlich gelingt es damit besser, gelegentlich eine kleine Nachricht aus unseren Familienleben niederzupinnen.

Unsere Neuen Geschichten finden sich unter http://md.hudora.de/dornet/blog/.

Gru§

Max
20:25 # G!

reuters: Lawyer to challenge FBI in Russian sting

A Seattle lawyer has launched a challenge over a sting operation by the FBI that led to the arrest last year of two Russian hackers . The FBI apparently broke Russian laws by breaking into a computer system as part of the operation. Seattle defense attorney John Lundin said he will use the same argument Russia's state security service FSB has used--that the FBI acted criminally in its attempt to nab his client Vasiliy Gorshkov--in an appeal he expects to file after Gorshkov... [bplog]
9:28 # G!

dailytelegraph: Australia 'spied on' Norway claim

The Daily Telegraph reports on a new book about Australia's DSD intercepting phone calls to the Norwegian freighter Tampa . Both the book and the article appear to have very little new information. Phone calls were tapped by the Defence Signals Directorate when Norwegian ambassador Ove Thorsheim visited the freighter during the stand-off. A book, Tampa, to be published in Norway in October, recounts the events which triggered Australia's Pacific Solution and... [bplog]
9:27 # G!

Erst stoehnen und dann mit Verweis auf die Sittenwidrigkeit nicht zahlen ist nicht.

Bundesgerichtshof entscheidet [florin]ber Telefonentgelte bei Anwahl von 0190-Sondernummern (Telefonsex) ... das Urteil ist nicht mehr ganz frisch, aber trotzdem sehr zu begr[florin]§en.
7:19 # G!

Wary Customers Don't Trust Businesses To Protect Privacy: People are becoming increasingly cynical about how businesses use the data they collect about their customers, according to six years of consumer surveys conducted for Privacy & American Business, a privacy newsletter. The survey asks consumers whether they agree with three statements about data privacy: Consumers have lost control over how companies collect and use personal data; businesses handle consumer data properly and confidentially; and existing laws reasonably protect consumer privacy. [TechWeb: Security]
0:17 #

Secret Service hosts tech managers meeting to tighten security, city by city: Businesses in large U.S. cities soon will be able to send their information technology specialists to quarterly government-sponsored meetings to compare notes with their peers on the subject of cybersecurity. Companies need not worry about exposing secrets about their systems or successful attacks against them, says the government organization facilitating the meetings. That organization is the Secret Service, which prides itself on confidentiality. [.:[ Security-Protocols ]:.]
0:12 #

Secret Service Veteran: Corporations Lax About 'Inside' Security: A former U.S. Secret Service agent, experienced in risk assessment and high-tech crime, says companies are doing a poor job of securing themselves from the inside out. And they'll pay a heavy price for their careless unless they dramatically up security -- soon. [SecurityFocus]
0:09 #

Sneak Preview: WhiteHat Arsenal Tool Set Aims to Knock Off Web Site Black Hats [TechWeb: Security] ... alles wird gut?
0:05 #

virus-writing-HOWTO-..> This document describes how to write parasitic file viruses infecting ELF executables. Though it contains a lot of source code, no actual virus is included. Every mentioned infection method is accompanied with a practical guide to detection. [Packet Storm Files]
0:04 #

Hackers, crackers and ethics: Dear Editor, I read the story of ForensicTec hacking into military computers. Their stated intent, apparently, was to show security flaws. However, I think a more selfish reason was to give them instant credibility. They are, after all, a company that is only several months old and need to make a name for themselves. ... [SecurityFocus]
0:03 #

Maximillian Dornseif, 2002.
 
August 2002
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Jul   Sep

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.