IBM Makes A Move

InfoWorld: IBM seeks to force SCO’s hand in lawsuit — GrokLaw coverage: IBM Goes on the Offensive and Asks for Partial Summary Judgment Now; CNet: IBM asks for quick rejection of SCO claims

IBM has filed new documents in its legal dispute with Unix vendor The SCO Group, accusing SCO of having no evidence to back up its copyright infringement claims, and asking the judge to throw a major component of the case out of court.

“For more than a year, SCO has made far-reaching claims about its right to preclude IBM’s (and everyone else’s) Linux activities,” wrote IBM in documents filed with the United States District Court for the District of Utah on Tuesday. “Despite SCO’s grandiose descriptions of its alleged evidence of IBM’s infringement, SCO now effectively concedes that it has none.”

SCO has been unable to provide any evidence of copyright infringement during the discovery phase of the trial and the court should therefore render a summary judgement against SCO, IBM’s filings say.

120,000 Names on a List

Just think what it would mean to be on this list: Database Firm Listed 120,000 ‘Likely Terrorists’ (ACLU Press Release)

The company that runs the multistate MATRIX law enforcement database gave the U.S. government a list of 120,000 people who scored high on a computer profile it said was designed to identify likely terrorists, a civil liberties group said on Thursday.

[…] The ACLU has asked for a government investigation to determine who had access to the list of 120,000 people and how the information was used. It called the data-mining program a chilling invasion of privacy that allows police to investigate millions of law-abiding citizens without their knowledge.

“People on that list ought to be concerned,” said Barry Steinhardt, director of the ACLU’s privacy and technology program. “Just being associated with a terrorist list is going to make people’s lives miserable.”

Law enforcement officials involved with the program have said the terrorist quotient was abandoned when MATRIX was developed. But the ACLU said the documents it received through freedom of information requests contained nothing to indicate that, and that the terrorist profiling feature was “a sort of central selling point of the program.”

The ACLU’s Feature on MATRIX ; the AP story from the NYTimes: Database Tagged 120,000 as Possible Terrorist Suspects; Wired News: Are You a Potential Terrorist?

Irony? The PSU Policies on Speech

In light of the information cited below, the PSU Student Guide to General University Policies and Rules (from Policies, Guidelines, and Laws) include this bit of irony:


a. As an academic community, The Pennsylvania State University is committed to the protection and preservation of the free search for truth; the freedom of thought, inquiry, and speech; and the freedom to hear, examine, and debate alternative theories, data, and views. These are fundamental rights, which must be practiced, protected, and promoted by the University.

b. It is essential in the University that channels of communication be open, effective, and accessible to all members of the academic community.

c. The University recognizes, respects and protects all peaceful, non-obstructive expressions of dissent, whether individual or collective, that are within the law, that are within University regulations and that do not interfere with the regular and essential operation of the University. The regular and essential operation of the University is construed to include, but is not limited to, the operation of its offices, classrooms, laboratories, and research facilities and the right of access to these and any other physical accommodations used in the performance of the teaching, research, and administrative functions and related adjunct activities of the University.

d. Disruption is an action or combination of actions by an individual or a group that unreasonably interferes with, hinders, obstructs, or prevents the regular and essential operation of the University or infringes upon the rights of others to freely participate in its programs and services.

e. It is the responsibility of University officials to initiate action to restrain or prohibit behavior that threatens the purposes or the property of the University or the rights, freedoms, privileges, and safety of the personnel of the academic community.

So, how to we get from this to a flat denial of server operation on the residential network?

More from Copyfight: Penn State v. Education II

A Complete Educational Experience

Penn State: No Servers in Dorms [via LawGeek who has much more info here and here]

One of the most interesting parts of the day was a brief presentation by Russ Vaught, the Associate Vice Provost for IT at Penn State. He said that Penn State has a policy banning server software of all kinds from dormitory computers. No email servers; no web servers; no DNS servers; no chat servers; no servers of any kind. The policy is motivated by a fear that server software might be used to infringe copyrights.

This is a wrongheaded policy that undermines the basic educational mission of the university. As educators, we’re teaching our students to create, analyze, and disseminate ideas. We like nothing more than to see our students disseminating their ideas; and network servers are the greatest idea-disseminating technology ever invented. Keeping that technology away from our students is the last thing we should be doing.

Copyfight: Penn State v. Education? and Copyfighter’s Musings: More Copyright v. the University

Update: Note that the Penn State Residence Hall Network Connection Agreement (at the ResCom copyrights page) contradicts the assertions of the PSU vice provost (but see below — thanks, Donna!):

Exhibit A

Acceptable Use Policy

Your Housing provided Network Connection uses resources that are shared with many other Penn State students, faculty, and staff. Moreover, your Network Connection provides access to the global Internet that is used by millions of other users. Each user benefits by being able to share resources and communicate almost effortlessly with other members of the user community. However, as with any community, the benefits and privileges available via your Network Connection, and the Internet in general, must be balanced with duties and responsibilities so that other users can also have a productive experience.

[…] While servers used in conjunction with your Network Connection are not explicitly prohibited, [emphasis added] it is important to note that servers may cause activity or generate bandwidth traffic that violates this Policy. Examples of these activities include, but are not limited to, running servers for mail, web, ftp, Napster, irc, dhcp, and multi-user interactive forums (such as gaming servers).

[…] Bandwidth Limitations (revised)

Bandwidth is defined by Merriam-Webster as “the capacity for data transfer of an electronic communication system.” All residence hall network connections share Internet bandwidth with each other and with the rest of the University system (computer labs and facilities, dial-in connections, and faculty/staff offices). In order to ensure that this shared resource is distributed equitably across the University, Housing and the Office of Telecommunications have implemented bandwidth restrictions that limit the amount of Internet resources that residence hall network connections can use.

[…] There are currently two individual bandwidth restrictions in place.

  • Each Network Connection is currently limited to uploading (sending) 1.5 gigabytes of data per week to sources outside of the domain (to the Internet).

  • Each Network Connection is also currently limited to downloading (receiving) 1.5 gigabytes of data per week from sources outside of the domain (from the Internet).

The current restrictions do not apply to data uploaded or downloaded to or from computers within the domain–as long as the entire data path remains inside the domain.

Update: Donna found this: Residence Hall Server Exception Request citing AD20

Penn State’s AD-20 policy on Computer and Network Security prohibits the use of servers within on-campus residence hall networks. Exceptions to allow servers in the Residence Hall network will only be granted in the rarest of circumstances. The need to operate a server must be in connection with academic coursework and endorsed in writing by a faculty member. The Vice Provost for Information Technology (or designee) must approve any request to operate a Residence Hall server.

NY Declares Vonage A Telco

New York classifies Vonage as phone company

Handing a setback to emerging Internet phone services, the New York State Public Service Commission on Wednesday ruled that Vonage Holdings is a telephone company and thus subject to state regulation.

In a statement announcing its decision, the agency sought to soften the blow, saying that it nevertheless hoped to apply “only minimal regulations to ensure that it does not interfere with the rapid, widespread deployment of new technologies.”

Slashdot: New York State Classifies Vonage As Phone Company

Seattle Weekly: News:

In the past 20 months, Harris has become America’s leading critic of electronic voting (see “Black Box Backlash,” March 10). Her reporting on the problems with new computer voting machines has been a key component in a national, grassroots movement to safeguard voting. Her astounding discoveries have resulted in important studies by distinguished computer scientists. She has been leaked thousands of pages of internal memos from Diebold Election Systems, one of the country’s leading electronic voting companies. She is frequently cited by newspapers across the country and is a guest on national and local television and radio stations. Thousands of people visit her Web site and participate in its reader forums. Now, Harris claims, the government wants our names, forum messages, and computer addresses.

[…] Harris sounds the alarm about what the government wants her to turn over. “They want the logs of my Web site with all the forum messages and the IP [Internet protocol] addresses.” IP addresses are unique, numerical pointers to one or more computers on the Internet, making it possible to identify, or narrow the search for, a computer that has visited a given Web site. Writes Harris: “This has nothing to do with a VoteHere ‘hack’ investigation, and I have refused to turn it over.

“So, yesterday, they call me up and tell me they are going to subpoena me and put me in front of a grand jury. Well, let ’em. They still aren’t getting the list of members of unless they seize my computer—which my attorney tells me might be what they had in mind.”

Slashdot discussion: Feds to Open BlackBoxVoting User Logs?

RFIDs in Passports

US lubes passports with RFID snake oil

Unfortunately, this would also make it easy for street criminals to scan crowds in search of naive foreigners likely to be in possession of decent quantities of cash, like Americans and Europeans, say. The RFID lobby has consistently neglected to address issues of personal safety when sensitive, identifying information is being broadcast secretly and indiscriminately by their nifty gizmos. Such electronic documents are a boon to street thugs looking for probably-rich tourists, and, more ominously, to sophisticated criminals and kidnappers.

It’s a minor blow to one’s privacy when a packet of razor blades is chipped so that anyone with a reader can learn what brand you happen to like. But chipping personal documents such as ID cards and passports is tantamount to chipping people. A document that reveals your name, age, address, and more, that can be read from a distance without your knowledge by anyone for any reason, is a clear threat to personal safety, and, obviously, any semblance of privacy.

There is nothing, beyond a few laws that get weaker every year, to prevent overzealous Feds and similar government busybodies from setting up surreptitious readers, and performing silent, automated ID stops that one knows nothing about.