Re: [iwar] Could Hollywood hack your PC? (fwd)

From: e.r. (fastflyer28@yahoo.com)
Date: 2002-07-26 21:21:43


Return-Path: <sentto-279987-5048-1027743704-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 26 Jul 2002 21:25:08 -0700 (PDT)
Received: (qmail 22777 invoked by uid 510); 27 Jul 2002 04:20:49 -0000
Received: from n16.grp.scd.yahoo.com (66.218.66.71) by all.net with SMTP; 27 Jul 2002 04:20:49 -0000
X-eGroups-Return: sentto-279987-5048-1027743704-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.94] by n16.grp.scd.yahoo.com with NNFMP; 27 Jul 2002 04:21:44 -0000
X-Sender: fastflyer28@yahoo.com
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-8_0_7_4); 27 Jul 2002 04:21:43 -0000
Received: (qmail 50959 invoked from network); 27 Jul 2002 04:21:43 -0000
Received: from unknown (66.218.66.217) by m1.grp.scd.yahoo.com with QMQP; 27 Jul 2002 04:21:43 -0000
Received: from unknown (HELO web14510.mail.yahoo.com) (216.136.224.169) by mta2.grp.scd.yahoo.com with SMTP; 27 Jul 2002 04:21:43 -0000
Message-ID: <20020727042143.11080.qmail@web14510.mail.yahoo.com>
Received: from [68.100.20.143] by web14510.mail.yahoo.com via HTTP; Fri, 26 Jul 2002 21:21:43 PDT
To: iwar@yahoogroups.com
In-Reply-To: <200207250320.g6P3KjZ29110@red.all.net>
From: "e.r." <fastflyer28@yahoo.com>
X-Yahoo-Profile: fastflyer28
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 26 Jul 2002 21:21:43 -0700 (PDT)
Subject: Re: [iwar] Could Hollywood hack your PC? (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.4 required=5.0 tests=IN_REP_TO,FROM_ENDS_IN_NUMS,SUBJ_HAS_Q_MARK,RISK_FREE,FREE_MONEY,SUPERLONG_LINE version=2.20
X-Spam-Level: 


Don't let your panty hose get all in a bunch over this bill.  While the House has passed some outlandish bills of late, it has been for the consumption of their constituants-alone.  Example: the case of the Bill that would have sent hackersa  to jail for life was dead and buried by the Senate 24 hours after passage by the House.
 The days remaining in the summer sesion are quickly fading away.  If I'm not mistaken, there is an election this fall.  The only matter that will receive any "air time" -baring serious problem- is finalizing the fedegal budget.  Other than that, it is only political white noise.
Fear not, cyber pals. Neither John Ashcroft is going to suspend the constitution, nor will Hollywood gain the  right to Hack into our lives.
 
 Fred Cohen wrote:   Could Hollywood hack your PC?
By Declan McCullagh
July 23, 2002, 4:45 PM a ASHINGTON--Congress is about to consider an entertainment
industry proposal that would authorize copyright holders to disable
PCs used for illicit file trading.

A draft bill seen by CNET News.com marks the boldest political effort
to date by record labels and movie studios to disrupt peer-to-peer
networks that they view as an increasingly dire threat to their bottom
line.

Sponsored by Reps. Howard Berman, D-Calif., and Howard Coble, R-N.C.,
the measure would permit copyright holders to perform nearly unchecked
electronic hacking if they have a "reasonable basis" to believe that
piracy is taking place. Berman and Coble plan to introduce the 10-page
bill this week.

The legislation would immunize groups such as the Motion Picture
Association of America and the Recording Industry Association of
America from all state and federal laws if they disable, block or
otherwise impair a "publicly accessible peer-to-peer network."

Anyone whose computer was damaged in the process must receive the
permission of the U.S. attorney general before filing a lawsuit, and a
suit could be filed only if the actual monetary loss was more than
$250.

According to the draft, the attorney general must be given complete
details about the "specific technologies the copyright holder intends
to use to impair" the normal operation of the peer-to-peer network.
Those details would remain secret and would not be divulged to the
public.

The draft bill doesn't specify what techniques, such as viruses,
worms, denial-of-service attacks, or domain name hijacking, would be
permissible. It does say that a copyright-hacker should not delete
files, but it limits the right of anyone subject to an intrusion to
sue if files are accidentally erased.

Source:
http://news.com.com/2100-1023-945923.html?tag=politech

Yahoo! Groups SponsorADVERTISEMENT

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 



---------------------------------
Do You Yahoo!?
Yahoo! Health - Feel better, live better

[Non-text portions of this message have been removed]


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Free $5 Love Reading
Risk Free!
http://us.click.yahoo.com/NsdPZD/PfREAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT