home *** CD-ROM | disk | FTP | other *** search
-
-
- Computer underground Digest Sun Apr 5, 1992 Volume 4 : Issue .16
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Associate Editor: Etaion Shrdlu
- Arcmeisters: Brendan Kehoe and Bob Kusumoto
-
- CONTENTS, #4.16 (Apr 5, 1992)
- File 1--Article on Software Patents
- File 2--Why form is as important as content
- File 3--The FBI Needs Industry's Help--OpEd in NYT
- File 4--ACLU's Janlori Goldman's Reply to FBI Proposal (Risks Reprint)
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.eff.org (192.88.144.4),
- chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to
- computer culture and communication. Articles are preferred to short
- responses. Please avoid quoting previous posts unless absolutely
- necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sat, 28 Mar 92 17:35:31 CST
- From: Net Wrider <nwrider@uanonymous.uunet.uu.net>
- Subject: File 1--Article on Software Patents
-
- The following is available by anonymous FTP from prep.ai.mit.edu
- in the pub/lpf directory.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- This article by Brian Kahin appears in the April 1990 issue of
- Technology Review (Building W59, MIT, Cambridge MA 02139,
- (617)253-8250). It may be copied for noncommercial purposes
- provided that it is copied, along with this statement and the bio
- at the end of the article, without any modification whatsoever.
- (Copyright (C) 1990 by Brian Kahin)
-
- The Software Patent Crisis
-
- An explosion of patents on software processes may radically
- change the programming industry--and our concept of human
- expression in the computer age.
-
-
- Last August, Refac International, Ltd., sued six major spreadsheet
- publishers, including Lotus, Microsoft, and Ashton-Tate, claiming they
- had infringed on U.S. Patent No. 4,398,249. The patent deals with a
- technique called "natural order recalc," a common feature of
- spreadsheet programs that allows a change in one calculation to
- reverberate throughout a document. Refac itself does not have a
- spreadsheet program and is not even in the software industry. Its
- business is acquiring, licensing, and litigating patents.
-
- Within the last few years, software developers have been surprised to
- learn that hundreds, even thousands, of patents have been awarded for
- programming processes ranging from sequences of machine instructions
- to features of the user interface. Many of the patents cover
- processes that seem conventional or obvious, and developers now fear
- that any of the thousands of individual processes in their programs
- may be subject to patent-infringement claims.
-
- The Refac suit demonstrates the vulnerability of the industry to such
- claims. Patent no. 4,398,249 was applied for in 1970, granted in
- 1983, and only recently acquired by Refac. In the meantime, software
- developers have been busily creating spreadsheets and other new
- products unmindful of patents. The industry accepted copyright and
- trade secret as adequate protection for its products, and most
- programmers assumed that patents were not generally available for
- software.
-
- Never before has an industry in which copyright was widely established
- suddenly been subjected to patenting. As it is, only a few companies
- that create microcomputer software have the resources to try to defend
- against patent infringement claims. Most small firms will be forced
- to pay license fees rather than contest the claims, even though many
- software patents may not stand up in court.
-
- In the long run, the costs of doing business in a patent environment
- will radically restructure the industry. Many small companies will
- fold under the costs of licensing, avoiding patent infringement, and
- pursuing patents defensively. The individual software entrepreneur
- and inventor may all but disappear. There will be fewer publishers
- and fewer products, and the price of software will rise to reflect the
- costs.
-
- Especially disturbing is that the broad claims of many recent software
- patents appear to establish monopolies on the automation of such
- common functions as generating footnotes and comparing documents.
- Some claims even cover processes for presenting and communicating
- information, raising troubling questions about the effect of patents
- on the future of computer-mediated expression.
-
-
- Patent vs. Copyright
-
- Software patents, like all patents, give an inventor the right to
- exclude all others from making, selling, or using an invention for 17
- years. In return, the patentee discloses his or her "best method" of
- implementing the invention, thereby relinquishing trade secrets that
- might otherwise be enforced forever (like the formula for Coca-Cola).
-
- To obtain a patent, an applicant must convince Patent Office examiners
- that the invention would not be obvious to a "person of ordinary skill
- in the art" who is familiar with all the "prior art," which includes
- previous patents and publications. In contrast, copyright inheres in
- books, poems, music, and other works of authorship, including computer
- programs, from the moment they are created. Registering one's work
- with the Copyright Office is a simple, inexpensive procedure that has
- important benefits (it is a precondition for filing suit, for
- example), but the copyright itself is automatic when the work is fixed
- on paper or on disk.
-
- Copyright and patent protect different things. Copyright
- protects expression but not underlying ideas. Patents protect
- useful processes, machines, and compositions of matter.
- Traditionally "processes" have included methods of physically
- transforming materials but not business methods or mental steps.
- Thus, computer programs fall somewhere between the traditional
- territories of copyright and patent.
-
- >From the 1960s to the early 1980s, the Patent Office and the
- courts grappled with the question of whether algorithms--the
- elemental processes on which computer programs are built--are
- patentable as either processes or machines. Early on, the
- Patent Office granted some patents for processes built into
- computer hardware that today would be contained in software, but
- it was reluctant to grant patents for programs per se. As the
- 1966 Report of the President's Commission on the Patent System
- pointed out, the Patent Office had no system for classifying
- programs. The report also noted that even if this were remedied,
- the volume of programs being created was so enormous that
- reliable searches of "prior art" would not be feasible or
- economical.
-
- However, the Court of Customs and Patent Appeals (CCPA)
- maintained that computer programs were patentable and overturned
- numerous Patent Office decisions denying patentability. The
- Supreme Court vindicated the Patent Office in two decisions,
- Gottschalk v. Benson (1972) and Parker v. Flook (1978), holding
- that mathematical algorithms were not patentable subject matter.
- Still, the CCPA continued to uphold patentability in other cases.
- Finally, in Diamond v. Diehr (1981), a sharply divided Supreme
- Court upheld the patentability of a process for curing rubber
- that included a computer program. The majority concluded that
- programs that did not preempt all uses of a computer algorithm
- could be patented--at least when used in a traditional process
- for physically transforming materials.
-
- That case has been the Supreme Court's last word on the subject.
- But despite the narrowness of the ruling, the Patent Office
- underwent a radical change of heart. Until very recently, there
- were no reported appeals of adverse Patent Office decisions,
- leading observers to conclude that the office was eventually
- granting almost all applications for software patents. Although
- articles began appearing in legal periodicals a few years ago
- noting that patents were being routinely granted for many
- software processes, not until 1988 did the industry realize that
- the rulBY':. +)c{asp|3oz5&%bhqXG=Rz86JAUWdVR*`3Irdle of
- the game. By the spring of 1989, the patents that entered the
- pipeline after Diamond v. Diehr were starting to flow out in
- significant numbers--by one count, nearly 200 in the first four
- months of that year.
-
-
- Processing Problems
-
- Unfortunately, the Patent Office classification system remains
- unchanged, and the volume of software being created has grown
- exponentially. This makes searching for prior art--processes
- already in public use--time-consuming and expensive.
-
- The search is extraordinarily difficult because the field's
- printed literature is thin and unorganized. Software documents
- its own design, in contrast to physical processes, which require
- written documentation. Also, software is usually distributed
- without source code under licenses that forbid reverse
- engineering. This may amount to suppressing or concealing the
- invention and therefore prevent the program from qualifying as
- prior art. The search for prior art may require securing oral
- testimony from people who developed software at universities many
- years ago, an expensive proposition.
-
- Many programmers suspect that patent examiners lack knowledge of
- the field, especially since the Patent Office does not accept
- computer science as a qualifying degree for patent practice (it
- accepts degrees in electrical engineering). Moreover, attracting
- and holding individuals with expertise in a field like software,
- where industry demand is high, is not easy for a government
- agency. Less qualified examiners create problems because they
- naturally have a lower standard in determining the hypothetical
- "person having ordinary skill in the art," and are thus more apt
- to grant patents for obvious processes. Since the examination
- process is conducted ex parte (as a private matter between the
- Patent Office and the applicant), less qualified personnel are
- also more likely to be influenced by sophisticated patent
- attorneys and the apparent expertise of the applicant.
-
- The quality of software patents being awarded has aroused
- concern even among patent lawyers and other advocates of the new
- regime. But it will be left to firms being sued for infringement
- to prove that a process should not have been patented because it
- was obvious in view of the prior art. Meanwhile, software
- patents stand as intimidating weapons for those who hold them.
-
-
- Restructuring the Industry
-
- Perhaps because of some of these problems, applications for
- software patents take an average of 32 months to be approved and
- published. That's significantly longer than the overall average
- of 20 months, and a very long time given the short product cycles
- of the software business.
-
- Unlike copyright, independent creation is irrelevant to patent
- infringement. Every developer is charged with knowledge of all
- patents. Even if someone is not aware of a patent, he or she can
- still infringe against it. Furthermore, patent applications and
- the examination process are confidential, so there are ordinarily
- several years of patents in the pipeline that no search will
- reveal. Although no infringement occurs until the patent issues,
- an inventor may find that a newly awarded patent covers a feature
- he or she has already incorporated and marketed in a finished
- product. While this is a problem for the patent system as a
- whole, it is intolerable for software developers because of the
- industry's rapid pace of innovation and long patent-processing
- period.
-
- The problem is compounded by the fact that a modern software
- package may contain thousands of separately patentable processes,
- each of which adds to the risk of infringing patents that are
- already in the pipeline. Since software functions are
- interdependent and must be carefully integrated, developers can
- find it difficult to excise a process built into the original
- program.
-
- The patent system exacts a high penalty in an industry as
- decentralized as software. Programming requires no special
- materials, facilities, or tools: to design software is to build
- it. Because barriers to entry are low, the industry attracts
- many small players, including hundreds of thousands of
- individuals who work as consultants or short-term employees.
- Rather than a handful of competitors working on the same problem,
- there are likely to be dozens, hundreds, even thousands. Since
- under the patent system one winner takes all, many
- others--including developers without lawyers--are deprived of
- the fruits of their independent labor and investments.
-
- Patent proponents argue that this uninhibited duplication of
- effort wastes resources. But the "waste" could be cut only by
- reducing the number of players and slowing the pace of
- development to fit the cycles of the patent system. The result
- would be a handful of giants competing on a global scale, bidding
- for the ideas and loyalty of inventive individuals.
-
- However, many programmers believe that there are diseconomies of
- scale in software development--that the best programs are
- authored rather than assembled. The success of Visicalc, Lotus
- 1-2-3, WordPerfect, and other classic programs testifies to the
- genius of individuals and small teams. Certainly there has been
- no evidence that they need more incentives. Quite the contrary,
- the freewheeling U.S. software industry has been a model of
- creative enterprise.
-
-
- A Costly System
-
- Even software developers and publishers who do not wish to patent
- their products must bear the costs of operating under a patent
- system. While these costs may initially come out of the software
- industry's operating margins, in the long run, they will be borne
- by users.
-
- At the first level is the expense of analyzing prior art to avoid
- patent infringement. A precautionary search and report by
- outside patent counsel can run about $2,000--that's per process,
- not per program.
-
- Next are the direct costs of the patent monopoly--the license
- fees that must be paid to patent holders. If the patent holder
- refuses to license at a reasonable fee, developers must design
- around the patent, if that is possible. Otherwise, they must
- reconceive or even abandon the product.
-
- The third set of costs are those incurred in filing for patents.
- Searching for prior art, plus preparing, filing, negotiating, and
- maintaining a patent, can total $10,000 to $25,000, not including
- internal staff time. Seeking foreign patents can make the bill
- substantially higher.
-
- The notoriously high costs of patent litigation must be borne by
- both sides. Just the discovery phase of a lawsuit is likely to
- cost each side a minimum of $150,000, and a full trial can cost
- each from $250,000 to millions. Again, these figures do not
- include internal staff time, which could easily double the real
- cost. While a small patent holder may be able to secure a law
- firm on a contingency basis or sell an interest in the patent to
- speculators, the defendant has no such options.
-
- Litigation also involves the possibility and further expense of
- an appeal. All appealed patent cases now go directly to the
- Court of Appeals for the Federal Circuit (CAFC, successor to the
- CCPA), where panels in patent cases are usually led by patent
- lawyers turned judges. Whereas patents once fared poorly on
- appeal, the CAFC has found patents to be both valid and infringed
- in over 60 percent of the cases that have come before it. The
- CAFC has greatly strengthened the presumption of patent validity
- and upheld royalties ranging from 5 to 33 percent.
-
- While a large software company may be able to absorb these costs,
- they will disproportionately burden smaller companies. The first
- to suffer will be independent developers who cannot afford to
- market their own products. These developers typically receive
- royalties of 10 to 15 percent from publishers who serve as their
- distributors. Such modest margins, out of which developers must
- recoup their own costs, would be wiped out by the need to pay
- royalties to a few patent holders.
-
- The high costs of a patent environment give patentees
- considerable leverage over small firms who will, as a practical
- necessity, pay a license fee rather than contest a dubious claim.
- To establish credibility, the patentee will settle for small fees
- from the initial licensees. The patent holder can then move on
- to confront other small firms, pointing to such licensings as
- acknowledgments of the patent's validity and power. This tactic
- has a snowballing effect that can give the patent holder the
- momentum and resources to take on larger companies.
-
- Cross-licensing--where firms secure patents to trade for the
- right to other patents--seems to work reasonably well in many
- industries and has been touted as the answer to these problems.
- However, cross-licensing is of little value to smaller companies,
- which have little to bring to the table. And cross-licensing may
- prove of limited value even to large companies, since it does not
- protect against companies like Refac that have no interest in
- producing software and therefore no need to cross-license.
-
- Of course, the power that software patents afford may induce some
- venture capitalists to invest in them. But investing in software
- patents is one thing; investing in robust, complex products for a
- mass market is another.
-
- In fact, software publishers hold very few patents. The vast
- majority are held by large hardware companies, computer
- manufacturers that have in-house patent counsel and considerable
- experience in patenting and cross-licensing. Nearly 40 percent
- of the software patents that the U.S. Patent and Trademark Office
- now issues go to Japanese hardware companies. It is quite
- possible that the separate software publishing industry may cease
- to exist as companies find that they need the patent portfolios
- and legal resources that the hardware giants can provide. The
- result will be a loss of diversity in software products, reduced
- competition, and, many believe, a less productive software
- industry.
-
-
- Protecting Ideas and Information
-
- A deeper, more disturbing problem in patenting programs was
- barely evident before computers became ubiquitous personal tools
- and software became infinitely versatile. More than a
- "universal machine," the computer has developed into a medium for
- human expression and a mediator of human experience. Software is
- designed to satisfy specific needs for shaping and delivering
- information. Thus, what is increasingly at stake in software
- patents is the generation and flow of information. This becomes
- more threatening when the claims in a patent extend far beyond
- the disclosed means of implementation to cover general ideas.
-
- Broad patent claims covering abstract processes are not limited
- to software, or even to computer hardware. Consider patent no.
- 4,170,832, granted in 1979 for an "interactive teaching machine."
- The patent discloses a clumsy-looking combined videotape deck and
- television with a set of push buttons.
-
- The patent includes a process claim for a procedure commonly used
- in interactive video: showing an introductory video segment,
- presenting the viewer with a limited number of choices,
- registering the viewer's decision, and then revealing the likely
- outcome of that decision. The disclosed machine, which was never
- marketed, contributes nothing to the public domain: it simply
- reveals one person's way of implementing a basic instructional
- technique.
-
- In a notorious 1983 case, a federal district court upheld the
- patentability of Merrill Lynch's Cash Management Account system,
- a procedure for moving investment funds among different types of
- accounts. Acknowledging that the system--essentially a method of
- doing business--would not be patentable if executed with pencil
- and paper, the court nevertheless upheld the patent because it
- made use of a computer.
-
- The Patent Office has taken this principle one step further.
- Besides granting monopolies on new procedures such as the Cash
- Management Account system, the office is also awarding patents
- merely for automating familiar processes such as generating
- footnotes (patent no. 4,648,067) and comparing documents (patent
- no. 4,807,182). But software developers have been routinely
- automating such common office functions, bookkeeping procedures,
- learning strategies, and modes of human interaction for years.
- The principle that patents are granted to induce inventors to
- disclose trade secrets has no relevance here. These processes
- are part of everyday life, and can and should be computerized in
- a number of ways.
-
- What's more, information per se is traditionally the substance
- and territory of copyright. The intelligent ordering of
- information is the very heart of grammar, rhetoric, and graphic
- design.
-
- Why should information be subject to the pervasive restraints of
- patent simply because it is interactive rather than linear?
- Should human expression that is assembled, communicated, or
- assimilated with the aid of a computer be restrained by patents?
- If the computer is seen as an extension of the human mind rather
- than vice versa, the answer is no.
-
-
- Changing Patent Policy
-
- Software developers who understand the impact of patents are
- demoralized. Lawyers assure them that patents are here to stay,
- and that programmers must seek new patents to protect against
- other patents. These lawyers point to the growing torrent of
- software patents, the presumption of patent validity, and the
- fervidly pro-patent record of the Court of Appeals for the
- Federal Circuit. Smaller companies that cannot afford this
- advice can only hope that companies with deeper pockets will
- afford more visible and attractive targets for patent holders
- bringing suit.
-
- But the narrowness of the Supreme Court decision in Diamond v.
- Diehr remains. The Court never explicitly rejected the
- traditional doctrines against the patentability of mental steps
- and business methods, doctrines that may yet defeat many of the
- patents that have issued. If the hue and cry grows, Congress
- could amend the Patent Act to make it clear that the scope of
- patenting is still limited to physical processes.
-
- The software industry was not broke, but it is in the process of
- being "fixed." The question is whether the fixing will be done
- by the gush of awards from private proceedings in the Patent
- Office--or by a public decision about whether software patents
- serve "to promote the Progress of Science and useful Arts," as
- the Constitution requires.
-
- +++++++++++++++
-
- Brian Kahin is an attorney specializing in information technology
- and policy. An adjunct research fellow in the Science,
- Technology and Public Policy Program at Harvard University's
- Kennedy School of Government, he was formerly affiliated with the
- MIT Research Program on Communications Policy and the MIT
- Communications Forum. He is a graduate of Harvard College and
- Harvard Law School.
-
- ------------------------------
-
- Date: Thu, 26 Mar 92 11:20:08 EST
- From: ulowell!p30.f30.n231.z1.fidonet.org!Dave.Appel%harvard@HARVUNXW.BITNET
- Subject: File 2--Why form is as important as content
-
- I'd like to pass a message on to authors who write for electronic
- newsletters: If you make your article easy to read, you will get
- more people to read it.
-
- I've been reading electronic news in the form of computer
- bulletin boards and electronic newsletters since 1986. At first
- I mainly saw technical and hobbyist communication, but BBS and
- Usenet readership has changed. Your communications can no longer
- be directed solely to tech-weenies and computer-nerds. You must
- include a wide cross section of non-technical society as well.
-
- Your audience is wider than you think. For example, I get CUD
- from a BBS with a Usenet feed, and then distribute it to 4 other
- bulletin boards in town. When I see something very important,
- I'll post a message in the city-wide echo conference (25 BBSs)
- referring people to an article in CUD###.ZIP on such-an-such BBS.
- And, I know other folks in other cities do this too.
-
- QUESTION:
- What can you do to get more people to read what you write?
-
- ANSWER:
- ****----> MAKE IT EASIER TO READ <----****
-
- QUESTION:
- How do you make it easier to read?
-
- ANSWER:
- Form, format (pretty-printing and line length), good
- sentence structure, short well-constructed paragraphs,
- correct grammar, correct spelling, syntax ... all those
- things that made you hate your high school sophomore
- English teacher.
-
- Yes, this stuff does make an article easier to read. And, an
- article that is easy to read has a better chance of being read.
-
- One key segment of your audience consists of people, such as
- executives or other non-technicals, who won't read "news" on a
- monitor or VDT. (Believe it or not, there are a lot of people
- who don't work in front of a computer screen.) These people need
- to see a hard copy.
-
- Therefore, your article not only has to look good on the screen,
- it also has to look good on *PAPER* without reformatting. (You
- might come back and say "research has shown that X percent
- of readers read it online." But 100 minus X percent don't. And
- VIPs, the ones you want to convince and motivate the most, don't.
- To those people hard copy is not only easier but carries more
- impact than the ethereal electronic version.)
-
- Additionally, those who read the hardcopy version probably don't
- have access to e-mail to easily respond to surveys about how and
- where they read it. There is a vast silent readership out there.
- And the better your article looks on paper, the larger that
- readership will be.
-
- Here we go.
-
- LINE LENGTH:
-
- Long lines are harder to read than short lines. Just because you
- have 80 columns on the screen doesn't mean that line length has
- to extend that far. Printed magazines usually have three columns
- per page, sometimes more, always at least two.
-
- I suggest a maximum of 65 characters for line length. It's
- easier to read on the screen, and will give a print-out big 1"
- margins when printed on standard 8.5" x 11" paper in a standard
- pica (10 pitch, 12 point) font. BIG margins make it easier to
- read.
-
- Magazine editors have a formula for determining the optimum line
- length:
- O = lca x 1.5
- Mn = O - 25%
- Mx = O + 50%
- Where O= optimum line length and lca = lower case alphabet length.
-
- In essence, this formula says that a the best length for a line
- is one and one half times the length of all of the lower case
- letters printed next to each other, give 50% or take 25%.
-
- Example:
- I see your article online. I like it, believe it, and want to
- act on it. You've convinced me. But I'm staff, not management.
- I have to make a hard copy of your article, or the whole
- newsletter, and present it to management. Anyone who has
- presented reports to management knows that looks count.
-
- But I can't just shoot it out to the printer in a nice 11 or 12
- point font and maintain decent margins. I have to remove the
- hard carriage returns, but not all of them, to reformat
- paragraphs. Headers, quotes, tables, outlines, and indented
- paragraphs need the hard returns left in. So neither standard
- search-and-replace nor conversion programs will work 100%. It's
- a hand job. Now it's going to take me 15 to 20 minutes in a
- word-processor before I can print it out and hand it to my boss.
- Multiply that by the 100 or 1000 people around the world who
- might want to show your important article to their boss.
-
- SENTENCE LENGTH:
-
- Sentence length needs to be varied similar to how a story-teller
- or a comedian varies the pace. This keeps the audience or reader
- from getting bored. If all the sentences are of equal length it
- gets rhythmic and monotonous. Very long sentences are hard to
- understand.
-
- PARAGRAPH LENGTH:
-
- Long paragraphs make a page look gray, and make it harder to
- read. Long paragraphs are visually unpleasant. White space is
- needed to break it up.
-
- A paragraph should contain just one thought and be small enough
- to be easily understood. If your thought takes too long to
- explain, break it up into smaller pieces. More complex material
- needs shorter elements to be easily understood. Paragraph length
- affects the eye-strain, attention span and fatigue level of your
- reader, which in turn affects whether he will finish reading it.
-
- ORGANIZATION:
-
- Good organization can be summarized in three easy steps:
- 1) Thesis
- 2) Body
- 3) Conclusion
-
- Tell the reader what you're going to tell him. Expound upon it
- and make your points. Then recap what you said. The reader
- should not have to read three or four paragraphs down to find out
- what you are writing about. Most people just read the first
- paragraph to find out if they want to read the rest of article.
- If you don't hook them in the first paragraph, you've lost them.
-
- SPELLING, GRAMMAR, ETC:
-
- Just between us, I don't care if you make typos. You don't care
- if I make typos. However, errors stick out like a sore thumb to
- scholars, businessmen and management types.
-
- Spelling and obvious grammar or usage errors give the
- impression that you aren't serious about what you are writing.
- Such errors indicate that you didn't take the time to give your
- piece a professional appearance. These errors give people who
- don't know you the impression that you aren't as intelligent as
- you really are.
-
- Besides, a four star restaurant does not serve haute cuisine on
- paper plates. You don't package a diamond ring in an old cigar
- box. If your piece is important, you need to make it look
- important.
-
- HOW TO DO IT:
-
- First, check your work yourself, keeping in mind the above
- suggested guidelines. Proof it two or three times, then run it
- through spelling and grammar checkers if possible.
-
- If your piece is very important, ask a friend to look it over.
- If your piece is of the utmost importance, ask someone with
- professional editing or proofreading experience to look it over.
- Even professional writers admit that proofing and final editing
- one's work is best done by someone else. Other people can point
- out things in your writing that you don't see.
-
- Most spelling and grammar checkers don't point out such usage
- errors as "there" instead of "their" or "they're." It takes
- careful proofreading two or three times.
-
- An occasional comma splice or run-on sentence will not bother
- most readers. But complicated, poorly constructed, or hard to
- understand sentences will have the reader shaking his head
- wondering what you meant.
-
- If you don't have friends or associates who are good at
- proofreading and editing, you can try professional services.
- Many editors, proofreaders, typesetters, etc. have started their
- own desktop publishing businesses. Even if all you need is
- electronic editing, not hardcopy output, those people can help
- you polish your work. This will help you get your points across,
- and even increase the number of people who read your article.
-
- One such business in Indianapolis is The Electronic Editor BBS at
- (317)293-8395, 293-1863 voice. They allow you to upload your raw
- copy in practically any format and from any word processor.
- Making files "sysop only" insures privacy. Encryption with
- PKZIP's password facility prior to upload can guarantee privacy.
- Their editors make the edited version of your file available in
- encrypted format for download or mail the file back to you on
- diskette. Hardcopy laser printer output is optional.
-
- CONCLUSION:
-
- I think that many of the issues discussed in electronic
- newsletters such as CUD are important. I'd like to see those
- issues taken to the power holders, the movers and shakers, the
- corporate executives and the middle managers who run the
- institutions in our society.
-
- I see many articles that might be described as diamonds in the
- rough. Polishing your articles and formatting them nicely will
- go a long way towards:
-
- - increasing your readership
- - reaching the important people
- - assisting your current readership in re-distributing your
- work beyond the electronic community.
-
- You may send comments, questions, flames, to:
- Fidonet: Dave Appel @ 1:231/30
- RIME: Dave Appel -> IBMNET
- Internet: Dave.Appel@f30.n231.z1.fidonet.org
-
- ------------------------------
-
- Date: Fri, 27 Mar 92 8:01:39 EST
- From: Lance J. Hoffman <hoffman@seas.gwu.edu>
- Subject: File 3--FBI OpEd in NYT (Risks Digest Reprint, #3.31)
-
- The debate on (son of) S. 266 and on whether and how to "dumb down"
- computer technology to satisfy law enforcement needs is joined in The
- New York Times of Friday, March 27, 1992 with articles by William
- Sessions, FBI director, and Janlori Goldman, director of the privacy
- and technology project of the American
-
- Civil Liberties Union. RISKS readers with an interest (or stake)
- should read these articles carefully, and consider responding with
- letters to the editor of the New York Times of their own if they have
- anything to add. If the technical community wishes to be heard, it
- should speak up now. (Letters to their congressional representatives
- may not hurt either ;-) ).
- Pance Hoffman
-
- Department of Electrical Engineering and Computer Science, The George
- Washington University, Washington, D. C. 20052 (202) 994-4955
-
- ++++++++++++++++++++++++++++++
-
- >Date: Fri, 27 Mar 92 07:54:31 CST
- >From: ks@stat.tamu.edu (Kurt F. Sauer)
- >Subject: The FBI Needs Industry's Help--OpEd in NYT
-
- FBI Director William Sessions wrote an interesting op-ed piece in
- today's New York Times (Vol. CXLI, No. 48,918, Fri., Mar. 27, 1992, p.
- A15) dealing with the problems which federal law enforcement expects
- to encounter when placing court-ordered wiretaps on data circuits.
- When I read between the lines, it sounds as if Mr. Sessions doesn't
- want us to use data security which employs end-to-end encryption;
- perhaps other RISKS-DIGEST readers will draw different conclusions.
-
- [Under the rubric "Dialogue/High-Tech Wiretaps"]
-
- Keeping an Ear on Crime: The F.B.I. Needs Industry's Help
-
- By William S. Sessions
-
- Advances in telecommunications technology promise to deprive
- Federal, state and local law enforcement officers and the public of
- the incalculable benefits that can be obtained only by
- court-authorized wire-tapping.
-
- Wiretapping is one of the most effective means of combating drug
- trafficking, organized crime, kidnapping and corruption in government.
- The Federal Bureau of Investigation does not want the new digital
- technology that is spreading across America to impair this crucial
- law-enforcement technique. Thus, after consulting with the
- telecommunications industry, members of Congress and executive branch
- agencies, the Justice Department has proposed legislation that is
- intended to preserve the ability of law enforcement officers to
- intercept conversations of people engaged in serious crimes.
-
- This bill is consistent with legislation passed in 1968 after
- Congress debated the constitutional problem posed by the Government's
- need to address both serious criminal conduct and the individual's
- right to privacy. Congress struck a balance by passing the Omnibus
- Crime Control and Safe Streets Act.
-
- That law and later amendments created the meticulous procedure by
- which law enforcement officers obtain judicial authorization for
- electronic surveillance. Wiretaps can be used to address only the
- most serious criminal, sometimes violent, threats facing society.
- Only when a judge is satisfied that all statutory safeguards have been
- met and all other reasonable investigative steps have failed or will
- likely fail, are taps permitted.
-
- Digital technology makes possible the simultaneous transmission
- of multiple conversations and other data over the same lines. The
- problem is that voice transmission will soon be replaced by an
- endless, inseparable stream of electronic emissions, making it
- virtually impossible to capture criminal conversations.
-
- The Federal Bureau of Investigation is not complaining. As the
- telecommunications industry develops digital technology, new services
- such as Caller ID are becoming available to business and private
- customers. The new technology already has provided benefits for the
- F.B.I.--for example, it helped solve the bombing of Pan Am Flight 103.
-
- But if digital technology is fully introduced with insufficient
- attention to public safety, the effectiveness of law enforcement
- officers will be greatly impaired.
-
- As society and technology evolve, so do government's needs and
- responsibilities. And, yes, the burden of helping to safeguard the
- public often falls on those who make profits from regulated goods and
- services. It is reasonable for the telecommunications industry to
- come to the aid of law enforcement. The proposed legislation relies
- on it to find technical solutions that are cost effective while
- permitting the development of its technology. Surely it can do both
- in a way that insures its competitiveness.
-
- Indisputably, there will be financial costs associated with
- whatever technical solutions the private sector might develop. These
- costs cannot be measured only in dollars; consider the price society
- would pay if the ability to solve complex crimes were thwarted by an
- end to wiretapping. In a recent large-scale military-procurement
- fraud case-- which was successful because of wiretaps--the fines,
- restitutions, forfeitures and savings to taxpayers exceeded $500
- million.
-
- The cost to telecommunications companies would not be so
- substantial as to outweigh the consequences of an inability of law
- enforcement to act. But if nothing is done soon, as technology
- advances and the digital systems become more widespread, the cost of
- addressing the issue down the road will undoubtedly increase
- dramatically.
- The proposed legislation does not expand the authority of the
- F.B.I. or any other criminal justice agency. It simply preserves
- what Congress authorized in 1968--nothing more.
-
- In recent years, Congress has expanded the Federal criminal
- activities for which wiretapping may be obtained. As in 1968, it must
- decide if law enforcement should have this invaluable tool available.
- I am confident that congress will again support law enforcement by
- approving the necessary legislation.
-
- ------------------------------
-
- Date: Tue, 31 Mar 92 18:23:41 PST
- From: central office <9958@service.com
- Subject: File 4--ACLU's Janlori Goldman's Reply to FBI Proposal (Risks Reprint)
-
- >Date: Mon, 30 Mar 92 20:40:26 EST
- >From: "Daniel B. Dobkin" <dbd@ans.net>
- >Subject: Dumbing down the FBI
-
- Lance Hoffman's posting on Friday mentioned the New York Times Op-Ed
- dialogue between FBI Director William Sessions and Janlori Goldman,
- director of the ACLU Privacy and Technology Project. Kurt Sauer
- posted Director Session's article; at the risk of preaching to the
- choir, herewith is Ms. Goldman's reply.
-
- Keeping an Ear on Crime: Why Cater To Luddites?
-
- By Janlori Goldman
-
- The Federal Bureau of Investigation says advances in the
- telecommunications industry are likely to make it difficult to use its
- old-fashioned wiretapping techniques to listen in on telephone
- conversations. The F.B.I.'s solution, in legislation the Justice
- Department is asking Congress to pass, is to force the
- telecommunications and computer industries to redesign their
- modernized systems to accommodate the bureau's needs. Unfairly, the
- F.B.I. wants consumers to pay for it through rate increases and higher
- equipment costs. The telecommunications and computer industries both
- oppose a bill that would mandate such sweeping regulations.
-
- The proposal makes the bureau look like Luddites, the 19th century
- English weavers who smashed new machines that they claimed put them
- out of work. Instead of keeping up with new developments, the F.B.I.
- wants to freeze progress.
-
- It is wrongheaded and dangerous to require the industry to put
- surveillance first by slowing innovation and retarding efficiency. How
- can the F.B.I. justify this policy at home while the White House is
- wringing its hands over U.S. competitiveness in the international
- market?
-
- The F.B.I. fears that new digital technology will make it difficult,
- even impossible, to listen in on conversations by using traditional
- wiretapping equipment. The new technology converts voices and data
- into electronic blips and reconverts the blips into voices and data
- near the receiving end on high-speed fiberoptic lines.
-
- The bureau overstates its concern. The telecommunications industry
- says it is not aware of a single instance in which the F.B.I. has been
- unable to tap a line because of the widespread new technology. Even
- the Director, William S. Sessions, admitted in a Congressional
- hearing last week that no warrant has been issued that could not be
- executed.
-
- At issue is the F.B.I.'s ability to wiretap in the future. But the
- answer is not a legislative fix that freezes technology. The F.B.I. is
- not only asking the industry to dumb down existing software, it wants
- to prohibit it from developing new technologies that might interfere
- with the Government's ability to intercept various oral and electronic
- communications. The proposed restrictions not only cover phone
- companies but also on-line computer services (such as as Prodigy and
- Compuserve), electronic mail systems and bulletin boards, and
- switchboards.
-
- The F.B.I. says its proposal only seeks to preserve its legal
- authority to wiretap. Actually, it wants to expand the power of the
- Federal Communications Commission, which regulates the
- telecommunications industry, to make the F.B.I.'s needs a priority in
- designing new technologies. In its legislation, the Government
- threatens to impose a $10,000-a-day fine on companies that develop
- technologies that exceed the F.B.I.'s technical competence. The
- F.B.I. has it backward. If the Government wants to engage in
- surveillance, it must bear the burden of keeping pace with new
- developments. Last year, Congress appropriated $80 million for a
- five-year F.B.I. research effort focused on telecommunications
- advances.
-
- There is a serious risk that rollbacks in advances may make
- telecommunications networks more vulnerable to unauthorized intrusion.
- One of the industry's main goals is to design secure systems that
- thwart illegal interception of electronic funds transfers, proprietary
- information and other sensitive data.
-
- The F.B.I. is not the only agency trying to block progress. The
- National Security Agency has tried to put a cap on the private
- development of technology in encryption, the electronic encoding of
- data to guard against unauthorized use.
-
- As the private sector develops more effective encryption codes to
- protect information in its data bases, the N.S.A. worries that it may
- have trouble breaking such codes in its intelligence gathering
- overseas. The agency is denying export licenses for certain encryption
- codes, thus inhibiting the private sector's development and use of the
- technology. Congress should defeat the proposal. Otherwise, we may be
- prohibited from erecting sturdy buildings if the thick walls prevent
- an F.B.I. agent from eavesdropping on a conversation through a cup
- pressed to a wall.
-
- ------------------------------
-
- End of Computer Underground Digest #4.16
- ************************************
-