Return-Path: <sentto-279987-5218-1029805283-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 19 Aug 2002 18:05:11 -0700 (PDT) Received: (qmail 20522 invoked by uid 510); 20 Aug 2002 00:59:47 -0000 Received: from n37.grp.scd.yahoo.com (66.218.66.105) by all.net with SMTP; 20 Aug 2002 00:59:47 -0000 X-eGroups-Return: sentto-279987-5218-1029805283-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.96] by n37.grp.scd.yahoo.com with NNFMP; 20 Aug 2002 01:01:23 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 20 Aug 2002 01:01:23 -0000 Received: (qmail 14539 invoked from network); 20 Aug 2002 01:01:23 -0000 Received: from unknown (66.218.66.218) by m13.grp.scd.yahoo.com with QMQP; 20 Aug 2002 01:01:23 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 20 Aug 2002 01:01:23 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7K12ar11006 for iwar@onelist.com; Mon, 19 Aug 2002 18:02:36 -0700 Message-Id: <200208200102.g7K12ar11006@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 19 Aug 2002 18:02:36 -0700 (PDT) Subject: [iwar] [fc:Send.Congress.Back.to.School] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: Send Congress Back to School Why lawmakers should stop legislating the Internet until they understand it better. By Tim Mullen Aug 19, 2002 So this aide walks into the office of Jack Valenti, President and CEO of the Motion Picture Association of America... "Sorry for the interruption, Mr. Valenti" she says, "but it's about the Berman Bill. What should we do about it?" Valenti smiles and says, "Pay it." Coverage of the "Hack Bill" has been so prominent that the subject itself is almost hackneyed. Fortunately, every intelligent human being with an ounce of technical perception has denounced the bill for the utter folly that it is. Unfortunately, most of those inhabiting a seat on Capitol Hill will have to push away a pound of obscurity before they can begin to address the issue. That's the part that scares me. Momentarily deferring elaboration, let me say that I am aware that many are speciously equating the Berman Bill with my "hack-back" technology. It is a tangential argument at best. I call for the use of neutralizing processes by qualified personnel in response to definitively identified worm attacks, leaving offending systems fully operational. Berman, in contrast, calls for inflicting willful and deliberate damage directly on the end user and/or ownership entity by any third party copyright holder who presumes the target is illegally sharing content. There is an unbridgeable chasm between the two. That being said, my fear is the developing trend of our representatives, who are supposed to speak for us and represent our voices, to draft proposed laws that ultimately restrict our freedoms and increase our costs while focusing revenue streams and business opportunities onto a select few. They are like doctors who drill holes in our heads to relieve their own headaches. For all of its proposed power, implication, and potential for abuse, the Berman Bill is only about 1,600 words in detail. One would think that a technology bill would be, at the very least, somewhat technical. It isn't. For instance, the definition of a "peer-to-peer file trading network" is "two or more computers which are connected by computer software that is primarily designed to enable the connected computers to transmit files or data to other connected computers." You and I would call that the "Internet." Granted, he does attempt to further qualify possible targets, but in the use of equally ambiguous language, he fails grievously. Additionally, the requirement for deploying any given offensive action is that the copyright holder must submit technical details of the attack to the Attorney General seven days prior to production use. They don't have to get an 'okay' -- they just have to submit it. In a speech to the CCIA, Berman reveals that his technical insight into the Internet piracy issue stems from having a college-age daughter. Legislative Quackery You see, there is inherent danger in having lawmakers legislate technology when they have no understanding of what it really is. They are like doctors who drill holes in our heads to relieve their own headaches. Similarly, Fritz Hollings' Consumer Broadband and Digital Television Promotion Act will require that any "digital media device," being any hardware or software product that can reproduce copyrighted works in digital form, be enabled with a standard security technology that is reliable, renewable, resistant to attack, readily implemented, modular, applicable to multiple technology platforms, extensible, upgradeable, and not cost prohibitive. Of course, no one has any idea what that is. But, that ignorance does not keep them from submitting a bill that will require any qualifying device to adapt the technology within a year of them figuring it out. Yes, you read that correctly- they want to pass a law now that will require anything that can reproduce a digital signal to adopt technology that has yet to be determined. To be fair, I should mention that there is a deadline for arriving at what that technology will be. However, in representation of his best political form, Hollings has written into the bill that upon reaching that deadline, it can be extended. Bravo. And don't forget the implications of the original Patriot Act, or the recent House of Representative passing of the Cyber Security Enhancement Act, which grants life imprisonment sentences for malicious hackers as well as loosens telephone wiretap and Internet sniffing restrictions. When it comes to technology and the law, we are still in our infancy. Now is the time to educate ourselves, and our representatives, as to the implications of our actions, lest we find ourselves maturing into a troubled adulthood. Timothy M. Mullen is CIO and Chief Software Architect for AnchorIS.Com, a developer of secure, enterprise-based accounting software. ------------------------ Yahoo! Groups Sponsor ---------------------~--> 4 DVDs Free +s&p Join Now http://us.click.yahoo.com/pt6YBB/NXiEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT