Updated: 26.11.2002; 11:47:02 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Wednesday, November 20, 2002

ISC "Irresponsible" for Withholding BIND Patches

The Internet Software Consortium is taking heavy criticism for the way it handled the release of patches for a new BIND vulnerability last week. ISC knew about the security holes in late October, but initially only provided fixes for paying members of its early-alert services. The advisory went public on November 12, though it took nearly a day longer for the patches to be readily available. Considering that BIND is critical DNS software running on millions of servers, and that the vulnerability could yield root access, many in the security community felt withholding the patches was both extortionary and irresponsible. [Hideaway.Net]
23:31 # G!

Gov't Report on Youth, Pornography, And The Internet

The National Academies commissioned a report on how youths are affected by child pornography, predators, and other threats on the net. They've issued a 400-page report on their findings, which are very extensive, and were used to support the argument for the new kids.us domain. [Slashdot: Your Rights Online]
23:26 # G!

Exploring better ways to announce court decisions

A post earlier this month by Aaron Swartz raises legitimate questions about how citizens can best be informed when courts announce decisions. Swartz pointed to Cornell University's e-mail syllabus announcement service, which is a good resource, but limited to the US Supreme Court. I run a similar e-mail opinion summary service here at the WV Supreme Court, which is very popular among citizens and lawyers alike. And we have the RSS feeds (1, 2, 3, 4) and official court weblogs (1, 2, 3, 4) where new decisions are announced.

But most courts don't have RSS feeds, so citizens have to simply watch news reports, know which web page to check (either a court site or a specialized appellate litigation site like How Appealing), or which clerk's office to call. All of which seems inefficient.

How can we do it better? I have two ideas. First, courts can agree with Jon Udell, that is, begin to act like XML is for the rest of us, and publish XML opinions directly to the web using a standard definition of elements for court documents. Within that XML document, courts could incorporate standard topical information, such as the codes used by the State Supreme Court Data Project, to categorize the topical information in court decisions. This topical markup would allow machine processing and discovery of court decisions relating to a specific topic.

Second, I wonder if the capabilities of RSS aggregation could be exploited at the case information level. For example, I could modify our case management system to output an RSS file each day that contains item-level data corresponding to each item on the docket sheets commonly used by court clerks to describe the progress of a court case. (e.g., here's the US Supreme Court's docket sheet for Eldred.) Citizens and lawyers could subscribe to that case's RSS feed to be informed about important filings or actions by the court. If the feed contained some top-level topical information, it may also be possible to implement auto-discovery. (e.g. run a search for pending cases related to free speech.)

I've seen the tangible benefits courts can reap from using self-publishing technology, including RSS, and I hope these benefits can continue. Perhaps the real technologists out there (I'm only a lawyer, after all) could let me know if I'm on the right track.

[Rory Perry's Weblog]
22:48 # G!

Big Retailers Squeeze FatWallet - copyright on Pricelists

A handful of large U.S. retailers, including Wal-Mart, use copyright law as an excuse to force a bargain shopping site to remove postings revealing upcoming sale prices. By Brian McWilliams. [Wired News]
22:37 # G!

The Onion deletes parody article about Chechen rebels

The Onion has deleted a parody article about the Chechen rebels and the Moscow theater siege. It was pretty tame by Onion standards. Last week, it appeared here: http://www.theonion.com/onion3842/those_chechen_rebels.html

Now it's quietly disappeared. The URL no longer works, and the article does not show up on a search of the site. Google has archived it here: http://216.239.33.100/search?q=cache:aTDv7HqpUIsJ:www.theonion.com/oni on3842/those_chechen_rebels.html+onion+chechen&hl=en&ie=UTF-8

I've mirrored an excerpt here: http://www.politechbot.com/docs/onion.deleted.112002.txt

I don't know the reason for the deletion. I invite The Onion to reply. [Politech]
22:02 # G!

Illegal Art: Freedom of Expression in the Corporate Age

November 13 - December 6 | New York
January 25 - February 21 | Chicago

The Illegal Art Exhibit will celebrate what is rapidly becoming the "degenerate art" of a corporate age: art and ideas on the legal fringes of intellectual property. Some of the pieces in the show have eluded lawyers; others have had to appear in court.

Should artists be allowed to use copyrighted materials? Where do the First Amendment and "intellectual property" law collide? What is art's future if the current laws are allowed to stand? Stay Free! considers these questions and others in our multimedia program.

[The Hacktivist]
21:26 # G!

Online-Protest against Repression in Italy

On saturday the 23th of November there is a huge Demonstration for the prisoners in Italy. This demonstration on the street should be supported by protests in the internet. Called for by E-Cowboys for Peace, Germany [The Hacktivist]

Visit the website www.giustizia.it massively on Saturday, Nov. 23th, 2002, from 11.00 to 14.00 (italian time) to show your solidarity with the protests in Italy on the street. [buschinberlin.de]
21:26 # G!

US government fails computer security test

The US government has failed a test for computer security for the second year in a row.

More than half of 24 major federal agencies flunked the latest 'Computer Security Report Card'.

The Justice, Defense, Energy and Treasury departments earned failing grades, while the Department of Transportation received the lowest score.

The Defense, State and Energy departments, as well as the Federal Emergency Management Agency, actually performed much worse than last year.

Only the Social Security Administration did OK with a 'B minus'.

According to the Washington Post, investigators used the data to determine whether agencies met network security standards, such as limiting access to privileged information and eliminating easily guessed passwords. [vnunet Hacking]
21:20 # G!

HACKERS AND LIBERTY

A collection of activist hackers is about to release software designed to thwart governmental censors of the Internet. The pro-democracy Six/Four project from Hacktivismo ( http://hacktivismo.com/ ) is a potentially valuable step to protect political dissidents and other people who have the quaint idea that their access to information shouldn't be thwarted by government-run firewalls in places like China and Saudi Arabia. [The Hacktivist]
20:22 # G!

Argentina's New Wireless Problem

As the country's economic crisis deepens, thieves are stooping to a new low. They're stealing the copper wires from telephone cables. Ricardo Sametband reports from Buenos Aires. [Wired News]
13:07 # G!

Software Retailer Uses FOIA to Spam Students

Aan enterprising software retailer used the Freedom of Information Act (FOIA) to obtain a list of students' names and addresses from West Virginia University--then used the list to send the students spam. [GrepLaw]

See also http://online.wsj.com/article/0,,SB1037720184301450468,00.html
11:22 # G!

Deleted E-Mails: Tell It To The Judge

[...] f you work for a company that happens to find itself an unfortunate party to litigation proceedings, there's a good chance your seemingly confidential documents, including e-mails, will be poured over by teams of lawyers--and not just your lawyers, but the lawyers for the other parties as well. You need to know what to expect if this happens in order to avoid major embarrassment and heavy expenses.

What can an IT manager expect in a legal dispute? When a legal dispute hits your company, your company's lawyers will immediately seek information via a detailed questionnaire or interview about the hardware and software in use, backup cycles, media used, retention of media, handling of user accounts, ghosting of PCs, and archiving. You could also be asked to produce any documentation detailing the company's corporate policies relating to document retention and archiving. These documents can later be used to verify that the routine you have in place actually matches corporate policy. And it is not uncommon for IT managers to have to take the stand in court regarding their document management procedures.

Lawyers use this information to determine the probable volume and type of electronic files they will be dealing with. It also enables their technology support group to ensure that sufficient server space, software, PCs, and other resources are available for the lawyers to carry out the review in the timeframe set by the court.

Next, you will be asked to provide all electronic data for a specified period, probably going back several years, depending on the nature of the dispute. Data requested can also include information contained on backup media. What happens next depends on the resources available. Often, because companies have limited IT resources, and management isn't familiar with the process for determining what is and what is not relevant in the discovery process, electronic material is sent directly to the lawyers to sort out. Specialist technology groups within the law firms generally set up the systems required to review these files. These IT folk have expertise across a wide range of technologies, enabling them to determine the best way to restore and dissect the information for review. [...] [LinuxSecurity.com]
9:56 # G!

Latest IE Flaw Exposes Hard Drives via Web

A security hole in Microsoft's Internet Explorer allows hackers to erase or take control of a computer's hard drive through a Web site and possibly through e-mail, according to a warning posted to security mailing list Bugtraq, which is published by Symantec. The vulnerability, just the latest in a string of security holes in the IE browser, also has fanned the flames of disagreement among security experts because the Bugtraq warning included working code that exploits the flaw. [NewsFactor Cybercrime & Security]
9:51 # G!

Maximillian Dornseif, 2002.
 
November 2002
Sun Mon Tue Wed Thu Fri Sat
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
Oct   Dec

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.