Updated: 24.11.2002; 17:34:49 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Thursday, September 12, 2002

Medienverbände stellen Strategie gegen Raubkopierer vor

Medienunternehmerverb...nde wollen den Aktivit...ten der Nutzer in Online-Tauschb[ring]rsen -- die vor allem die Musikindustrie trotz gegenteiliger Studien immer wieder f[florin]r sinkende Einnahmen verantwortlich macht -- nicht l...nger zusehen. Sie suchen nach Wegen, Raubkopien im Reich der Bits den Garaus zu machen. Anhaltspunkte soll ein 200-seitiges Gutachten zur "Datenpiraterie im Internet" bieten, das der Deutsche Multimedia Verband (dmmv) gemeinsam mit dem Verband privater Rundfunk- und Telekommunikationsanbieter (VPRT) am heutigen Donnerstag am Rande des Medienforums 2002 in Berlin vorstellte. [heise online news]

Prof. Sieber als einer der Autoren der Studie, geht von der Datenpiraterie eine existenzgef...hrdene Bedrohung f[florin]r die Content Industrie aus. Soweit ich das beim [integral]berfliegen des Gutachtens sehen konnte, baut Sieber diese Einsch...tzung einzig und allein auf Angaben der betroffenen Industriezweige zur H[ring]he der Sch...den auf. I respectfully dissent.
16:28 # G! Translate

ATMs: more features equals less security?

Cash machines to offer more Cash machines could soon be used for mobile phones top-ups and paying bills but they are unlikely to offer the range of services available on the continent. [BBC News | TECHNOLOGY]
16:04 # G!

E-Legal: Should Court Records Be Available on the Internet?

Historically, "openness" has been a guiding principle of the judicial system in the United States. Yet, as courts enter the age of the Internet, certain pluses and minuses of openness emerge. On the one hand, placing court records on the Internet makes them more widely available and easier to obtain. On the other hand, Internet-accessible court records facilitates disclosure of sensitive and personally identifiable information about people involved in court proceedings. Striking the proper balance between public disclosure and protecting privacy rights will be a challenge going forward.

On Aug. 21, the Washington, D.C.-based Center for Democracy & Technology released a survey on how state and local courts make information available to the public over the Internet. While many of these courts already have embarked on the process of making court records available online, they have proceeded in very different ways.

[Privacy Digest]
10:24 # G!

Yahoo, ISPs enter Net privacy fray

Yahoo and Internet service providers have sided with Verizon Communications in its legal spat with the recording industry over revealing the identity of an alleged peer-to-peer pirate.

In court papers filed late Monday, the groups said that the Recording Industry Association of America (RIAA) has not followed the law in its efforts to learn more about a Kazaa user accused of illicitly trading music files.

Monday's move highlights the latest battle lines that have been struck in the legal war over peer-to-peer networks. On one side are Internet companies, civil liberties groups and telecommunications providers, an alliance that is opposed by the RIAA and the Motion Picture Association of America (MPAA).

The 30-page amicus brief(PDF), signed by 12 groups including the U.S. Internet Industry Association, the Computer and Communications Industry Association, and Yahoo, accuses the RIAA of hoping to turn Internet providers into copyright cops.

"What the RIAA is really seeking, at the end of the day, is to shift the burden of copyright enforcement from its own members--who apparently would prefer not to alienate potential customers by suing them outright--to an ISP that does nothing more than provide an Internet connection to the customer," the brief says.

[Privacy Digest]
10:23 # G!

Hacking techniques: War dialing

This article looks at a popular form of attack on an organization's computer network known as war dialing. The term war dialing involves the exploitation of an organization's telephone, dial, and private branch exchange (PBX) systems to penetrate internal network and computing resources. After introducing and exploring the different forms war dialing attacks can take and some tools used to execute such attacks, the article examines measures that can be taken to prevent such an attack. [LinuxSecurity.com - Latest News]
10:20 # G!

Fear Along the Firewall

Moreover - moreover...]
10:16 # G!

Study: Bluetooth security should raise red flags

Much of the Bluetooth wireless security model is optional but network executives should start setting policies for handling the short-range radio technology, according to new Gartner Inc. research. [ComputerWorld - Security Knowledge Center]
10:14 # G!

Lawrence Lessig's Supreme Showdown

Professor Lessig is profiled in the October 2002 issue of Wired.

"The Great Liberator Lawrence Lessig helped mount the case against Microsoft. He wrote the book on creative rights in the digital age. Now the cyberlaw star is about to tell the Supreme Court to smash apart the copyright machine."

Lawrence Lessig's Supreme Showdown discusses Department of Justice v. Microsoft, the Creative Commons, Eldred v. Ashcroft and more.

[Lessig News Log]
10:11 # G!

Hackers chalk one up

The conference of the Australian Unix User Group was "war chalked" within hours of opening last week. [Help Net Security - News]
10:10 # G!

wired: How Changed Laws Changed U.S.

Wired notes the differences in opinion over the USA Patriot Act, and its effect on freedom. Polls suggest people simultaneously distrust the government, and are willing to give up some liberty in exchange for government protection.

Shortly after the Sept. 11 attacks, a CBS/New York Times poll found that 79 percent of Americans were willing to forfeit personal liberties to fight terrorism. But a Princeton survey in May found that only 40 percent of respondents said they they trusted the government. [zem]
10:05 # G!

Grafiksoftware mit Trojaner

Vom Moskauer Kaspersky Labs kommt die Warnung vor dem Trojaner FireAnvil, der sich in der Original-Software Firehand Ember Millennium des US-Unternehmens Firehand Technologies Corp. versteckt. Der Trojaner wurde in zwei Dateien des [florin]ber www.firehand.com erh...ltlichen Grafikprogramms entdeckt, n...mlich Ember32.exe [Newsbyte.ch]
10:02 # G! Translate

cnn: Man jailed for plane Tetris game

A British man has been jailed for four months for refusing to turn off his mobile phone during a flight from Egypt. The judge who delivered the sentence called for all mobile phones to be confiscated as passengers board planes.

Faiz Chopdat, 23, of Blackburn, Lancashire, was returning from Luxor in Egypt to Manchester Airport on September 10 last year when he was seen with his mobile switched on.

It is believed he was playing the popular game Tetris [...] [zem] [see also wired]
9:59 # G!

ap: Internet stalker gets 8 years

An Ohio man has been sentenced to 8 years on "internet stalking" charges, after sending obscene email and voice mail messages. In June, a jury convicted Eric Bowker, 39, of stalking television reporter Tina Knight by sending obscene e-mails and telephone messages and by stealing her mail.

He became the first person in Ohio to be convicted under an expanded federal stalking law enacted in 2000 that includes the Internet. [zem]
9:55 # G!

nytimes: Congress Criticizes F.B.I. and Justice Department Over Actions

A US Senate Judiciary Committee has accused the Justice Department of attempting to use secret FISA surveillance courts to cover up mistakes and bypass wiretapping restrictions in criminal investigations. The FISA Review Court met last week for the first time in history, to consider a DoJ request to allow FISA warrants to cover criminal matters under some circumstances.

A bipartisan group of lawmakers on the Senate Judiciary Committee focused its criticism on the Federal Bureau... [zem]
9:52 # G!

bbc: Court allows Greek gamers to play oo

bbc: Court allows Greek gamers to play on. A Greek court has thrown out charges against two internet cafe owners, and ruled that the new law banning computer games is unconstitutional.

Legislation passed in July banned people from playing video games in public places like internet cafes as part of a drive to stamp out illegal gambling.

The law has been criticised for not making a distinction between interactive gambling and computer games. The court, in its ruling, said the law was unconstitutional. [zem]
9:50 # G!

Haft für Cyberstalker

Erstmals kam ein im Jahr 2000 auf das Internet ausgeweitetes Gesetz zur Anwendung. Ein Mann, der eine Fernsehjournalistin im Internet verfolgte und bel...stigte (Stalking), wurde in Ohio zu acht Jahren Haft verurteilt.

Mit diesem Urteil blieb das Gericht sogar noch unter der m[ring]glichen H[ring]chststrafe von zehn Jahren. Der 39 Jahre alte Verurteilte muss sich zus...tzlich einer Therapie unterziehen. [intern.de]
9:43 # G! Translate

Spam Hits Some Anti-Spammers, Who Think They Have a Culprit

Tens of thousands of readers of e-mail newsletters have recently been spammed, and the newsletter publishers are blaming the company that manages and distributes the newsletters for them. [New York Times: Technology]

Spammbusters seem to get out of hand recently. See also John Gilmore on it , replies to John and the Problems of Edward Felten.
9:25 # G!

Printed Web Info OK for Inmates

Free-speech advocates hail a federal judge's decision to reverse a California prison policy barring inmates from receiving material printed from the Web via snail mail. By Julia Scheeres. [Wired News]
9:11 # G!

Handbook of Applied Cryptography

CRC Press - ISBN: 0-8493-8523-7 October 1996, 816 pages Fifth Printing (August 2001) The individual chapters are available for download as PDF documents or as postscript files.

[Privacy Digest]
9:11 # G!

Cyberterror

Author: R. J. Pineiro; $18.17 (Pre Order, release date February, 2003)
[Amazon Books: cyberterror]

Huh - a book on Cyberterror!
9:09 # G!

Victoria to table new laws on computer crime

Tough new legislation to combat hackers and those who knowingly spread viruses are set to be tabled in the Victorian parliament. [Help Net Security - News]
9:08 # G!

Virtually Helpless: Cyberterror FUD

The next time the USA is targeted by terrorists, the primary weapon may be an object no bigger than your thumbnail: a computer chip. [Help Net Security - News]
8:57 # G!

Know Your Enemy: Honeynets

Lance Spitzner let us know about the latest from the Honeynet Project. "A Honeynet is nothing more then one type of honeypot. Specifically, it is a high interaction honeypot designed primarily for research, to gather information on the enemy. Most traditional honeypots have been for deception or detecting attacks. They are usually single systems that emulate other systems, emulate known services or vulnerabilities, or create jailed environments.

To learn more about honeypots, the website http://www.tracking-hackers.com is dedicated to honeypot technologies. Know Your Enemy: Honeynets [LinuxSecurity.com - Latest News]
8:50 # G!

Survey on Internet Curbs

Civil Liberties A new study on Internet habits found 69 percent of people surveyed accept the US government to remove information needed by the public from the Internet in order to keep it away from terrorists. Still, about fifty percent think such measures will not help against acts of terror.

ZDnet has the story. [Greplaw]
8:30 # G!

Charges Under Greek Gaming law

News As reported by Greplaw the Greek government has banned any form of electric, electro-mechanical and electronic game devices, including computers, from hotels, coffee shops, club premises and public areas in general.

The first case based on the new law will be tried next week, Vnunet reports. Two individuals are charged for allowing users to play Counter-Strike. The individuals face possible fines of £95,000 and up to one year in jail.

The Greek Internet Cafe Union said to Vnunet that such cases 'would remain in the sphere of comedy if it didn't concern the employment of thousands of people'. [Greplaw]
8:23 # G!

Changes in Cyber Security plans

Security miladus writes " The Washington Post is reporting that plans national plans for cyber security are being pared down due to heavy lobbying from companies.  According to the article, the new plans will no longer include a recommendation for creating a 'privacy czar' position.  Calls for ISPs to bundle firewall software have also been dropped.  It appears that the new plan will focus mostly on the Federal government, making it a requirement to purchase only software that has been declared secure. " [Greplaw]
8:21 # G!

StreamCast & EFF in Defense of Gnutella

Digital Entertainment miladus writes "Intertnet.com is running an article about the latest filing by StreamCast Networks, developers of Morpheus, in a Los Angeles Federal courst asking a judge to rule that distribution of its Morpheus software does not violate copyright law.  It also quotes the EFF as arguing, along with StreamCast's lawyers, that distribution of the software is legal because the product is 'capable of substantial noninfringing uses and because StreamCast cannot control the various uses of the software.' " [Greplaw]
8:18 # G!

Maximillian Dornseif, 2002.
 
September 2002
Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Aug   Oct

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.