Computer underground Digest Sun Sept 17, 1995 Volume 7 : Issue 74 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson CONTENTS, #7.74 (Sun, Sept 17, 1995) File 1--Correction (CuD 7.73) File 2--Text for Computer Underground Digest File 3--Changes in the CuD homepage File 4--(fwd) 2600 Case in Court, 9/14 (fwd) File 5--Computers & The Law Press Release File 6--The Computer Law Report - August 1995 (fwd) File 7--"Child-porn" Busts on AOL.COM File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sun, 17 Sep 1995 15:43:22 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 1--Correction (CuD 7.73) In CuD 7.73, we listed the source of information for Martin Rimm's "The Pornographer's Handbook" as "books in print" and "Library of Congress." Both pointers were intended to be "Books in Print." The PH does not appear in the Library of Congress records. ------------------------------ Date: Sat, 26 Aug 1995 14:29:19 -0400 (EDT) From: Charles Platt <cp@panix.com> Subject: File 2--Text for Computer Underground Digest ------------------------------------------------------------- [Not Much] News from Florida by Charles Platt In December of 1994, a polemical Usenet post on alt.comp.talk.eff claimed that half-a-dozen Florida BBSs had been shut down by the FBI, who had gone in with their guns drawn and had forced innocent sysops to lie facedown on the floor while most of their worldly belongings were impounded. During one raid, a crippled BBS owner was allegedly hauled out of his home and placed on a chair on his front lawn where he shivered helplessly for several hours in 50-degree weather. It all sounded excitingly outrageous. But was it true? The initial post was challenged by a couple others that accused it of exaggeration. A more moderate version appeared in CuD, but no one seemed to have really reliable first-hand information, and after a couple of weeks the story disappeared. Since I'm currently researching local BBS busts for an article for Wired, I wanted the facts. I made several phone calls, placed a couple of appeals for information on Usenet, sent similar plea through Fidonet ... and received no response. So I headed down to One BBScon, the annual event aimed at BBS owners which was held this year at the Tampa Convention Center in Florida from Wednesday August 16th through Sunday August 20th. Last year the convention attracted almost 4,000 people. This year the crowd looked thinner (in numbers, certainly not in kilos) but the convention center was so huge, it would have made any attendance under 10,000 seem insignificant. A couple-hundred exhibitors were doing business in the main hall, net access being the dominant theme. Many BBS owners, wandering from booth to booth, seemed tormented with an traumatic mixture of fear and greed. On one hand they feared being wiped out overnight by Microsoft Network, while on the other hand they couldn't help hoping that if they plugged their existing users into the Internet, they could charge twice as much for access and clean up. How should this net access be accomplished? Via a fractional T1 ... or maybe a satellite feed ... the possibilities seemed endless, and were endlessly confusing. On the retail side, I counted at least six different AOL-inspired user-friendly GUIs developed by hopeful nationwide providers making themselves accessible via local POPs. Microsoft Network was there (with a barren booth that attracted virtually no interest at all) and The Well was pushing its now-nationwide service from a sickeningly folksy, rustic booth all made of unfinished wood, complete with park benches and free bottled springwater. Beneath a big sign saying "Let's Talk!" an earnest salesperson told me that while The Well's per-hour charges were indeed a bit high, a flat rate would be offered "real soon." The Association of Online Professionals (AOP), a relatively new group founded by David McClure, was soliciting new members from its booth at $95 apiece. AOP promises to lobby in Washington to protect the interests of BBS owners and is particularly concerned by any move to make sysops responsible for content. By the end of the convention, AOP was claiming about 600 members total. (Check out http://www.wdn.com/aop for more information.) I stopped at the Telix booth to pay homage to my favorite modem software, was pleased to see them selling a new Windows version, but was disconcerted to learn that it's for Windows 3.1, not Windows 95. Several booths were pushing CD-ROMs stuffed with games or graphic images (yes, folks, for $9.95 you can own 10,000 shareware games--literally). Only two booths were selling hardcore adult material, and I was told that many sysops are dumping their XXX-rated photo libraries out of fear of being busted. One vendor was Lee Noga, a tough, no-nonsense young woman with a blond crewcut, running a business named Lion's Den International, which creates its own photo-CDs using its own models and sells the packages via mail order. Noga, who impressed me by matter-of-factly referred to herself as a pornographer, listed various companies (including Playboy) that had sued her for copyright infringement before she started originating photographs instead of borrowing them. She lives in Florida and was happy to talk to me about the busts that occurred there last year. In fact, one of them had occurred just half a mile from her own home. But she said that so far as she could tell, it had been purely a local matter; the FBI were not involved and there was no dramatic show of force. According to Noga, the people who were hit have subsequently refused to say anything about it, and the action resulted from allegations of copyright infringement. That's as close as I got to any hard data, but it was sufficient to invalidate most of what I had seen posted last December. BBScon closed each evening at 6 PM and the shuttle buses to neighboring hotels stopped running at 7 PM, suggesting that attendees were expected to go back to their rooms and stay there. To me this seemed bizarre compared with the scores of science-fiction conventions I've attended, where programming always runs till at least midnight and free movies may be shown on a 24-hour basis. But then, science- fiction conventions are not primarily about making money. The only officially sponsored evening entertainment at BBScon seemed to be a Saturday night "exhibitors only" party on a boat. I crashed it using a borrowed invitation only to find myself lectured at length by an amiable businessperson who insisted that I could get rich by selling my science- fiction novels through his fledgling online service. I also listened to an insistent monologue by the founder of ClariNet (for some reason, his name escapes me) who was adamant that people *will too* read fiction online if the video text is big enough and the video margins are wide enough. Later, back at my hotel room, I flipped through the cable channels and found that one of them was being fed with tapes of the previous day's BBScon seminars. I was just in time to catch Jack Rickard, editor/publisher of Boardwatch magazine and patron saint of BBScon, telling an audience of sysops that so long as they offer internet access without impairing the individuality of their boards, they will make good money and will not be squeezed out by the large service providers. Bearing in mind that each sysop at BBScon paid up to $295 just to attend, and most of them seemed panicky enough to splurge additional hundreds or thousands of dollars on hardware or software in the exhibition hall ... I certainly hope Rickard is right. ------------------------------ Date: Thu, 11 Sep 1995 11:12:04 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 3--Changes in the CuD homepage The CuD homepage has been re-organized to make it easier to find links and move around. To reduce traffic on the EFF and mirror sites (which should be used during off-peak hours to reduce the burden), we encourage especially Midwest readers to use the CuD site at: http://www.soci.niu.edu/~cudigest We've added a security section, including links to Gene Spafford's sites. His sites are exceptionally complete and well-organized. They're the cyber equivalent of the Smithsonian: You can browse them for weeks and still want more. We've also linked the site to the American Criminological Society's Critical Criminology Division for those preferring a more social-science oriented set of information and links. You'll also find links to timely issues (eg, the "Rimm Study," the Church of Scientology flap), newsletters (Jim Warren's GovAccess newsletter, BillWatch, Phrack, Crypt, and more), and information about and links to computer-related issues. ------------------------------ Date: Fri, 15 Sep 1995 00:11:00 -0500 (CDT) From: David Smith <bladex@BGA.COM> Subject: File 4--(fwd) 2600 Case in Court, 9/14 (fwd) ---------- Forwarded message ---------- From--sobel@epic.org (David L. Sobel) Subject--2600 Case in Court, 9/14 Date--Wed, 13 Sep 1995 12:41:25 -0500 The so-called "Pentagon City Raid" FOIA case will be argued in the U.S. Court of Appeals in Washington, DC on Thursday, September 14 at 3:00 p.m. The hearing is open to the public. The case involves the withholding of Secret Service documents concerning the break-up of a 2600 meeting at the Pentagon City Mall in November 1992. The Secret Service lost in the lower court and appealed the case. More information is available at EPIC's Web site -- http://www.epic.org/computer_crime/2600// The appellate argument will be held at the United States Courthouse, Third & Constitution Ave., N.W., Fifth Floor (U.S. Court of Appeals courtroom). David Sobel EPIC Legal Counsel ------------------------------ Date: Wed, 13 Sep 1995 12:24:13 -0400 (EDT) From: Charles Sumner <sales@SUG.ORG> Subject: File 5--Computers & The Law Press Release FOR IMMEDIATE RELEASE Contact: Charles Sumner September 11, 1995 Sun User Group (617) 232-0514 SUN USER GROUP CONFERENCE HELPS DEFINE CYBERCRIME Speakers from the FBI and the Electronic Frontier Foundation will be featured at the second annual "Computers & The Law" Conference, November 12-15, Tampa, Florida. This November 12 through 15, the Sun User Group will sponsor the second annual "Computers & The Law" symposium in Tampa, Florida. As computers and the Internet invade more and more corners of everyday life, the once distinct areas of technology, security, legislation, and law enforcement begin to collide -- often with disastrous results. In an effort to help members of these professions deal with a rapidly changing world, the Sun User Group founded the "Computers & The Law" conference. This year's conference is a unique forum in which members of these once diverse fields can meet to share experiences and ideas, and address the growing connections between their professions. Last year's symposium was critically acclaimed and this year's, with featured speakers from the FBI's Economic Espionage Unit and the Electronic Frontier Foundation, is expected to be even more successful. "The explosive growth of cyberspace is straining the law's ability to keep up. Issues such as privacy, copyright, jurisdiction, and the liability of system administrators are currently being played out in the courtroom in uncharted territory," said Edward A. Cavazos, chair of the "Computers & The Law" legal track. The question of 'uncharted territory' is a central theme of the conference, and one which plays a pivotal role in one of the many highlights -- a debate between Michael Froomkin, of the University of Miami Law School, and Jared Silverman, former New Jersey Securities Commissioner, on whether existing laws can be applied to Cyberspace. "It's the variety of security and legal speakers, discussing complex real-world cases, that has sparked so much interest in this conference," said Charles Sumner, the Sun User Group's Director of Marketing. The keynote addresses present three very different examples of the interaction between computers and laws, from three speakers who are at the forefront of these changes. The development of computer legislation is represented in Tuesday's keynote by Mike Godwin, the Legal Counsel of the Electronic Frontier Foundation, and the enforcement of those laws is addressed by Monday's keynote speaker, Ken Geide, Chief of the FBI's Economic Espionage Unit. Last, the results of crossing those legal bounds is detailed by Randall Schwartz. Mr. Schwartz, a noted UNIX consultant who was recently convicted in a landmark case brought by Intel, will discuss his experiences in Tuesday's endnote address. With the dramatic increase in the population of cyberspace and corporate America's new love affair with technology, system administrators are being confronted with many new shades of morality and ethics. "In order to thrive in today's swiftly changing world, a system administrator must be a technician, an attorney, a cop and a politician." says Alexander Newman, Executive Director of the Sun User Group. "He or she must establish and enforce fair-use policies, keep users from violating copyright laws, and deal with outside complaints about those users." The administrator must often accomplish this job with little or no knowledge of the rapidly growing web of laws surrounding the field. Cavazos, who is also co-author of "Cyberspace and the Law: Your Rights and Duties in the On-Line World" said that "This conference addresses these issues with an emphasis on making sense of a confusing and often contradictory set of precedents". What cybercrime is and how to protect yourself from it are two of the main themes of "Computers & The Law" and will be covered during a variety of talks throughout the four days. Some of the additional topics to be discussed at the symposium include: privacy, cyberporn, copyright infringement, on-line legislation, encryption, internet fraud, how to recover information if your site has been comprimised, and what to do if the government decides to investigate you. Featured instructors at "Computers & The Law" include: John C. Smith, an investigator with the High Tech Crime Unit of the Santa Clara County District Attorney's Office; Peter Galvin, the security columnist for "SunWorld On-line"; Lee Hollander, Florida's State Attorney; Bob Friel of the Electronic Crimes Branch of the U.S. Secret Service; and Richard Ress of the FBI Computer Crime Squad in addition to many other technical and legal speakers. "Computers & The Law", November 12-15, 1995, will be held at the Camberley Plaza, Sabal Park in Tampa, Florida, and features two days of talks and panels and two days of workshops. It will draw speakers and attendees from all over the world. The symposium is sponsored by the Sun User Group, an international, not-for-profit technical and professional association which serves the workstation industry. To register, or for more information on the conference or the Sun User Group, contact the Sun User Group via email at conference@sug.org, on the World Wide Web Page at http://sug.org, or by calling 617/232-0514. # # # ----------------------------------------------------- Charles Sumner | Now some people say that you shouldn't tempt fate Director of Sales | and for them I would not disagree. Sun Users Group | But I never learned nothing from playing it safe, e: sumner@sug.org | I say fate should not tempt me. v: 617/232-0514 | "I Take My Chances" - Mary Chapin Carpenter ------------------------------ Date: Mon, 11 Sep 1995 20:38:18 -0500 (CDT) From: David Smith <bladex@BGA.COM> Subject: File 6--The Computer Law Report - August 1995 (fwd) ---------- Forwarded message ---------- Date--Fri, 1 Sep 1995 10:03:46 -0400 From:Galkin@aol.com To--CompLawLst@aol.com Subject--The Computer Law Report - August 1995 ******************** THE COMPUTER LAW REPORT - AUGUST, 1995 PREPARED BY WILLIAM S. GALKIN, ESQ. galkin@aol.com ******************** *** NOTICE *** ALL LIST RECIPIENTS ARE **ENCOURAGED** TO FORWARD COPIES OF THE COMPUTER LAW REPORT TO OTHERS WHO MAY BE INTERESTED IN BEING ON THE LIST! ARTICLES CONTAINED IN THIS ISSUE: (1) Negotiating royalty agreements in the information age (2) New domain name registration rules (3) Protecting Software [* PLEASE READ *: If you have any questions about the material contained in The Computer Law Report, or would like to discuss issues related to computer or technology law, please contact William S. Galkin, Esq.: e-mail (galkin@aol.com), telephone (410-356-8853), fax (410-356-8804), or mail (10451 Mill Run Circle, Suite 400, Owings Mills, MD 21117). To subscribe, please respond via e-mail to galkin@aol.com. The Computer Law Report is distributed free, and designed for the non-lawyer. All information contained in The Computer Law Report is for the benefit of the recipients, and should not be relied on or considered as legal advice. When necessary, proper professionals should be consulted.] ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 - Negotiating royalty agreements in the information age ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ The author of a work (i.e., software, drawings, photographs, novels, etc.) owns, among other exclusive rights, the right to reproduce and market the work, as well as the right to create works derived from the original work, like movies from novels, or translating a novel from English to French, or software from a Macintosh to a Windows platform. The author may transfer all or a portion of these rights. Where the author is not marketing the work and has another person or company doing this, royalty payments will be the usual means of compensation to the author. A common example of royalty payments is where a publisher of a book pays to the author a percentage of the amount received on the sale of each copy of the book. In the past, there was a limited universe of means of distributing works, and a limited universe of works that could be derived from such works. Now, with communication technology evolving daily, the universes of distribution and derivation have greatly expanded. Furthermore, it is now extremely difficult, or impossible, to predict where future expansion will occur. However, the better these expansions can be predicted, the better an author will be able to protect his or her rights when transferred to a distributor. Royalty arrangements can be extremely complex. This article discusses a number of issues that it is particularly important to keep in mind. 1 - Derivative works: The distributor may or may not have the right to create derivative works. If the distributor does have this right, the distributor may want to decrease the royalty rate for the revenue received from derivative works. The rationale for this decrease is that as derivative works are created, the original work will represent a smaller and smaller portion of the work as a whole. This same concept will apply where the distributor has the right to merge the original work into other works (e.g., merging a photograph into a collage). If the author agrees with the concept of decreasing royalty, the author should make sure that there is a clear mechanism for determining an appropriate decrease. For example, if the modifications to the work are primarily cosmetic, then the decrease should be small. 2 - Sales price: Since royalties are usually based upon the sales price of the work, it is important to determine how this price is arrived at. For example, if the distributor is given complete discretion over the price, it would be possible that the distributor could decide to give the work away free, bundled with other products that are being sold. In such a case, the author would receive no royalties. On the other hand, if the author has too much control over price, then this may become intrusive on the exercise of marketing judgment of the distributor. One solution is to require a minimum royalty on each transfer of copies of the work. 3 - Guaranteed royalties: Amazingly, many royalty arrangements do not require the distributor to sell even one copy. The author may be all too appreciative that the distributor wants to distribute the work that there is no thought that the distributor will make less than a full effort to market the work. However, what if the day after you grant the distributor exclusive rights to market the work that you've spent the last two years developing, the distributor purchases the right to distribute a competitive work that the distributor thinks is better and leaves your work on the shelf? Or worse, what if the distributor's goal was just to get your work off the market so as not to compete with another product that the distributor has? These scenarios are not far fetched and need to be planned for. One solution is to require minimum royalty payments or sales, as mentioned above. This offers some protection, but it is better to also prohibit the distributor from marketing any competitive product. The definition of what is competitive must be carefully worded. 4 - Sublicensing rights: Sublicensing rights of a distributor can severely affect royalties earned by the author. For example, assume that you have negotiated a royalty of 15% of the gross revenue received by the distributor on sales. This royalty amount recognizes that the distributor has overhead expenses in addition to the expense of marketing. What if the distributor decides sublicense the work to another company to market. They will now receive 15% of the sales revenue as royalties from the new distributor, and you will only receive 15% of 15%, which only 2.25% of the gross sales price! The solution here is to either prohibit sublicensing or agree that the royalty will be higher (perhaps 50%) for revenues from sublicensing. 5 - Marketing efforts: It is important to require the distributor to begin marketing the work by some specific date. The work may need further development, and therefore a realistic date should be selected. Additionally, it is very beneficial to require the distributor to spend a certain amount of money on marketing within a specific time period (e.g., $100,000 in the first year). 6 - Royalty payments: In brief, royalty payments take the following forms: (1) Some cash up front plus royalty payments as sales are made; (2) Some cash up front which represents an advance against royalties earned in the future; and (3) Only royalties as sales are made, with no cash up front. These three forms represent a shift in risk from the distributor to the author. Cash up front represents a risk to the distributor, whereas royalty payments to the author only upon sales represents a higher risk assumed by the author. The level of rights granted by the author should take into account how much risk is assumed by either the author or the distributor. 7 - Audit rights: The author should have clear rights to audit the books of the distributor to determine the accuracy of the royalty payments the author receives. These audits will usually be at the expense of the author, however, the agreement can provide that where the distributor has underpaid, the cost of the audit is paid by the distributor. There could also be a penalty for such underpayments. 8 - Reversion of rights: There should be provisions that under certain circumstances rights immediately and automatically revert to the author. For example, if sales fall below a specified level, or if the distributor breaches the agreement. 9 - Arbitration: Lastly, it is often useful to have disputes that arise resolved by arbitration. Arbitrators can be selected in advance, which will facilitate a quick resolution of the issues, which otherwise could be dragged out in litigation, beyond the valuable commercial life of the work. However, arbitration is not a perfect solution, and the terms of the arbitration need to be carefully worked out in advance. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 2 -New domain name registration rules ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Network Solutions, Inc. is a private corporation that receives funding from the National Science Foundation for managing the Internic (Internet Network Information Center) Registration Services. Internic is the registry for all Internet domain names. Until recently, the registration policy for domain names was simple - first come, first served. This policy worked fine until recently when the presence of commercial forces (i.e., addresses ending with ".com") exploded. For example, in the past year .com registrations have increased from 18,000 to 82,600. The result has been an increase in the number of disputes between those with registered names and those holding trademarks to the registered names. In some instances, get-rich-quick types rushed and registered domain names that they hoped would be purchased from them by the trademark holder. In other cases, disputes arose because of honest disagreements as to the rights to registered names. Some examples of domain names registered not by the "known" trademark holder include: mcdonalds.com, ford.com, coke.com and mtv.com. A recent suit illustrates how Network Solutions could be caught in the middle. Frenchy Frys, a catering company in Seattle, Washington, registered the domain name "frys.com." Fry's Electronics, a large retail electronics chain that wants to register the same name, has sued Frenchy Frys as well as Network Solutions and the Internet service provider, Octave Systems, which originally requested the name for Frenchy Frys. Given the volume of commercial registrations, Network Solutions cannot pre-check that all such registrations do not infringe any trademark. Accordingly, Network Solutions has instituted a new policy to reduce its exposure to lawsuits. The new policy requires that applicants state that they have a legal right to the name they seek to register. Additionally, applicants must indemnify all persons involved in the registration process if a dispute arises. This means that the applicant will have to pay all damages, legal fees and other expenses that Network Solutions, or others covered by the indemnification incur as a result of a dispute. Under the old policy, where a dispute arose, the registrant kept the name until the dispute was resolved. However, under the new policy, if the registrant does not have a trademark registration for the name, then use of the name is immediately suspended. It should be noted, however, that to register a domain name, an applicant does not need to have a registered trademark. The bottom line is that before applying for a domain name, a search should be performed to make sure that it does not infringe a registered trademark. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 3 - Protecting software ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ There are three forms of protection available for software: patent, copyright and trade secret. These protections, properly implemented, greatly enhance the commercial value of software. When they are ignored or not known, a business risks inadvertently losing the right to rely on such protections in the future. Patent and copyright protections are provided for under federal statutes. Trade secret protection in many states is provided for under a version of the Uniform Trade Secrets Act. These protections are not exclusive and are most effectively used in combination. 1 - Patent Patent protection is the most powerful of the three methods of protection. Unlike copyright and trade secret protection, a patent prevents a competitor from using the technology reflected in the software patent, even if the competitor developed the technology independently without any knowledge of the software patent. Patent protection prevents anyone else from making, using or selling the technology reflected in patented software for a period of seventeen years. The expense of filing and prosecuting a patent application is far greater than to maintain copyright and trade secret protection; and it may take more than two years from the date of application to receive a patent for software. Although only recently becoming a popular form of protection for software, patent protection cannot be ignored for two important reasons. First, a patent must be applied for within twelve months of its first sale or the owner is barred from applying for a patent for the technology reflected in the software. Second, a patent granted to software may preclude another business, which is relying on trade secret protection, from using and selling its own similar software that is in existence and being used prior to the patent. 2 - Copyright Copyright protection is available for both source code and object code and is the most widely used method for protecting software. The copyright owner has certain exclusive rights which include the right to copy and distribute the software. Unlike patents, copyright protection applies immediately upon development of software. The software should nevertheless be registered with the U.S. Copyright Office to obtain important advantages for enforcing the copyright against infringers. The period of exclusive rights for copyright are substantially longer than for patents. Copyright protection on software created after 1977 will last for either 50 years after the death of the author or 75 years after registration of software developed for an employer by full-time employees. It is more difficult to inadvertently forfeit copyright protection than to forfeit patent and trade secret protection. However, prior to the United States joining the Berne Convention in 1989, distribution of a software program without a copyright notice could cause a forfeiture of the copyright. Under the current law, copyright notices are not required to be placed on software or other works. Copyright protection only applies to the expression of an idea rather than the idea itself. For example, the idea of a desktop publishing program is not protected, but the program code of a particular desktop publishing program is protected. The scope of copyright protection for software is currently uncertain because the law is struggling with how to apply the idea/expression dichotomy to software. Additionally, as stated above, unlike for patent protection, copyright protection does not prevent a competitor from selling identical software if the competitor developed its software independently without copying another's software. 3 - Trade Secret Trade secret protection prohibits the unauthorized disclosure or use of trade secret information. Unlike patents and copyrights, trade secret protection does not require the filing of any public documents and does not terminate after a specific number of years. Trade secret protection begins upon initial development or discovery, but may be forfeited in a variety of ways. Under most state laws, a trade secret is defined as information that has economic value because it is not generally known. If a business does not make reasonable efforts to maintain the secrecy of such information, trade secret protection will be forfeited. Elements of software that trade secret law will protect include source code, object code, flow charts, data structures and algorithms. Before enforcing a trade secret, a court will want to verify that a trade secret is valuable to the business and that reasonable efforts have been made to maintain secrecy. A court determines the "value" of a trade secret by examining the effort expended to develop the software and the ease with which competitors can develop similar software. Accordingly, maintaining records of expenses and employee time is essential to establish value. Value for trade secret purposes can be relatively modest. For instance, in one case, trade secret protection was granted for software even though a similar program could have been developed in four months at a cost of $18,000. However, most cases involving misappropriation of trade secrets focus on whether reasonable efforts were made to protect the trade secret. For instance, to what extent is the information known by the employees and by other businesses? The best evidence of efforts to maintain secrecy are confidentiality agreements signed by all employees with access to the software. Other evidence includes security procedures such as locking up confidential documentation, limited access to information accessible on local area networks, and conferences with incoming and outgoing employees advising them of the confidential nature of information that they will be or have been exposed to. Many businesses do not realize that licensing source code along with software will make any trade secrets within the source code public thereby forfeiting trade secret protection, unless adequate confidentiality restrictions are contained in the license. Similarly, if a program can be decompiled to discover trade secrets, then trade secret protection may be lost. To preserve a trade secret in such a case the license should prohibit decompiling of the software. Businesses should be aware that the enforceability of shrink-wrap type licenses is currently uncertain, therefore the effectiveness of confidentiality restrictions contained in shrink-wrap licenses for preserving trade secret status is also uncertain. Conclusion To enhance and preserve the value of software, businesses should do an intellectual property audit, in conjunction with a team composed of knowledgeable employees and professionals, in order to identify all patents, copyrights and trade secrets possessed by the business and to evaluate whether they are adequately protected. Such an audit should be done periodically. ------------------------------ Date: Sun, 17 Sep 1995 21:40:22 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 7--"Child-porn" Busts on AOL.COM ((MODERATORS' NOTE: Last week's busts of alleged child pornographers on AOL.COM has been covered. Below, we reprint Pat Townson's summary from Telecomm Digest, and include the New York Time's first paragrapher as a pointer for those wanting more information. We note that the NYT's Peter Lewis added a story that put the busts in perspective. Lewis suggests looking at AOL.COM as a large city. With 3.5 million users, this would make it roughly the same size as Cleveland or Detroit. All large cities have back-alley establishments, shady characters, and even a few who enjoy looking at pictures of children. This is useful to keep in mind: There is "porn on the net," there are crooks on the net, and--in fact--there is everything on the net that there is in the non-net world. That is, afterall, where most Net-users come from. And, when it comes right down to it, there is proportionally far less predatory behavior on the Net than there is in our daily lives, where nearly two percent of the U.S. population is currently under some form of correctional supervision. So, regardless of the hysteria of some media and congressional personnel, the Net remains a pretty safe place. ============== TELECOM Digest Thu, 14 Sep 95 12:14:00 CDT Volume 15 : Issue 383 From--TELECOM Digest Editor <telecom@eecs.nwu.edu> Subject--FBI Arrests Dozens of America OnLine Users Date--Thu, 14 Sep 1995 10:00:00 GMT The FBI made dozens of arrests and searched 120 homes and personal computers on Wednesday as part of an investigation into child pornography on America OnLine. Management of America OnLine has, over a two year period, supplied the FBI with the names and addresses of users 'suspected' of 'being involved in' child pornography and/or arranging sex with children. The raids on Wednesday marked the first time federal agents were called upon by an online service to investigate the behavior of their subscribers in private chat rooms. Attorney General Janet Reno spoke in support of the actions of America OnLine and FBI agents, noting, "We are not going to permit exciting new technology to be misused to exploit and injure children." The raids were conducted throughout the day Wednesday in 57 of the 94 FBI districts in the United States. They were mostly concentrated on the east coast, however arrests and confiscation of computer equipment took place all over the country in such diverse cities as Miami, New York, Dallas and Trenton, NJ. Carlos Fernandez, an FBI spokesperson in Washington, DC said that 'quite a few more arrests are expected in the next several days' and that the Bureau would wait until those arrests had been effected before discussing the case in detail. Pam McGraw, a spokesperson for America OnLine, based in Viennna, VA admitted that the company monitored email and private conversations seeking out persons who use their network to transmit pornographic material. She said they always provide the FBI with the names of users suspected of involvement in child pornography. Ms. McGraw also discussed an online 'neighborhood watch' program in effect on AOL where users are encouraged to oberve each other's activities and report on them to management of the online service. Although child pornography certainly is not allowed in public areas of AOL, according to Ms. McGraw it 'usually is transmitted in email between users, or in private chat rooms'. She did not indicate how AOL's interception of email for the purpose of examining it for 'pornography' or their monitoring of private conversations between subscribers could be reconciled with various privacy laws, apparently because it can't be. FBI spokesperson Fernandez said the federal investigation of AOL users showed that child pornographers are turning to online networks 'more and more' to lure curious children. He said, "the utilization of online services and bulletin board systems is rapidly becoming one of most prevalent tech-niques for individuals to create and share pornogrpahic pictures of children as well as to identify and recruit children into sexually illicit relation-ships." Raids and arrests of other AOL subscribers 'suspected of being involved in child pornography' will continue over the next few days until all the user-suspects have been located. I don't know about you, but I'm going to purge all the AOL sofware from my computer today. Child porn does not interest me in the least, but having AOL scanning my mail and checking up on my in private conversations with other users there is of great concern. It is hard for me to imagine how any online service could violate the trust of their users in this way, by getting into their email and personal files, regardless of the intentions. We have known for some time that AOL was 'cooperating' with federal agents in their investigation of child pornography, but until the massive raids and arrests commenced on Wednesday followed by AOL's admission that the 'evidence' was found in email and private chat, we did not know the extent to which AOL was abusing their subscribers in the process of cooperating. PAT =============== From the New York Times: September 14, 1995 Use of Computer Network for Child Sex Sets Off Raids By DAVID JOHNSTON WASHINGTON - The Justice Department on Wednesday announced a dozen arrests in a two-year investigation into the use of America Online, the country's largest computer network, to distribute child pornography and to lure minors into sex. The searches of 125 homes and offices around the country represented the first time that federal agents investigated the misuse of a nationwide computer network, in which information and graphic material is exchanged between computers. ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.74 ************************************