diff --git a/textfiles.com/magazines/JAUC/juac09.txt b/textfiles.com/magazines/JAUC/juac09.txt new file mode 100644 index 00000000..c74099d9 --- /dev/null +++ b/textfiles.com/magazines/JAUC/juac09.txt @@ -0,0 +1,710 @@ +From dfox@fc.net Sat Jan 21 05:21:03 1995 +Received: from freeside.fc.net (freeside.fc.net [198.6.198.2]) by bigboote.WPI.EDU (8.6.9/8.6) with ESMTP id FAA14695 for ; Sat, 21 Jan 1995 05:21:01 -0500 +Received: (from dfox@localhost) by freeside.fc.net (8.6.8.1/8.6.6) id EAA25573 for mikecap@wpi.edu; Sat, 21 Jan 1995 04:18:04 -0600 +Date: Sat, 21 Jan 1995 04:18:04 -0600 +From: Malik Al-Rashim +Message-Id: <199501211018.EAA25573@freeside.fc.net> +To: mikecap@wpi.edu +Subject: JAUC-File9 +Status: O + + + REVIEW OF SLIPKNOT 1.0 + + By Scott Davis, Editor (dfox@fc.net) + + SLIPKNOT 1.00 By Peter Brooks. + Tested version 1.00 on a Dell 466/XPS + 16 meg of RAM, Windows for Workgroups + #9 GXE 64 Pro video card (2 Meg Vram) + Boca 28.8 Vfast external modem + + On December 23, 1994, I contacted Felix Kramer (felix@panix.com) to let + him know that I would be happy to run his article/promotion for the + software called 'SlipKnot'. At that time, he asked me to ftp the + software and test it out, and follow up with a review of the software + in this issue of the magazine. So, here it is... + + The software was designed by Peter Brooks. SlipKnot is a graphical + World-Wide-Web browser for PC users running Windows 3.1+ or a higher level + of Windows. It is designed for modem users with ordinary dial-up UNIX + shell accounts. It does NOT require SLIP or PPP or TCP/IP services in any + form (no TIA or remosock, etc. if you are familiar with these products). + + The system requirements are Windows 3.1, Windows for Workgroups or + higher, running in 386 Enhanced Mode (SlipKnot cannot be used on 286 + processors). Not yet tested with Windows NT. You must have at least + 4 MB of memory, recommended 8MB. We have noticed memory deficiency + errors at 4 MB. Also, at least 2 MB of available hard disk space is + required. SlipKnot itself takes approx. 1.5 MB. When working, SlipKnot's + job will be to download documents for you from the Internet, and these + may require plenty of hard disk space. Mouse or other pointing device + required (cannot control SlipKnot via only the keyboard). + + Your UNIX system must have either the program "lynx" (version 2.2 or + later) or the program "www" available. If in doubt, log in to your + host, and try to execute either of these programs. You will then know + immediately whether they are available. To find the version of lynx on + your UNIX host, execute the UNIX command: "lynx -version". + + Your UNIX host must have a program to send files to you via either the + Xmodem or Ymodem protocol. The actual name of the programs that perform + these file transfers changes from system to system, but try the commands + "sx" (for XModem) or "sb" (for YModem). If these fail, ask your system + administrator or some other knowledgeable person. Likewise, you will + need to know the name of the UNIX program that will receive files from + your PC using Xmodem or Ymodem. Your UNIX system must be able to display + individual file sizes using the "ls -l filename" command. If "ls" has + been renamed or works differently from normal, SlipKnot will fail. + + SlipKnot was created because, at that time, there was no other alternative + to accessing the World Wide Web graphically if you did not have SLIP or + PPP or TCP/IP access. Having analyzed Mosaic and some of its competitors, + I concluded that all of these browsers were designed for people with very + rapid communications channels into the Internet, not modem users. Even if + you have SLIP access, most of these browsers do not allow you to save + entire documents (with the included pictures), forcing you to retrieve the + documents again whenever you wish to take a full look at them. It takes a + while to retrieve any document by modem with any browser, and you shouldn't + have to do this more than once. + + Now the good stuff: + + First of all, Slipknot is a fantastic idea. To be able to use the World + Wide Web and only requiring the end user to maintain a normal account + on his/her provider is great. This allows the user to have Web access + without paying those occasionally high rates for a SLIP or PPP connection. + + I ftp'd the Slipknot software and installed it. I was very happy that + it installed without any problems. + + Configuring the software was fairly painless. The biggest part was + taking the time to edit the login script for my service provider... + and that step is not even necessary since Slipknot allows you to + conduct manual logins of you so choose. + + I was finally ready to dial out. Everything was working like a champ until + about 10 minutes into my session when my entire system locked up. I had + to do a complete shutdown and start over. No big deal, I thought. + I attempted again, as the 10 minutes that I did use it was a great + experience. I had never seen an application that could do WWW over a + normal user account. It connected perfectly and was working fine for + another few minutes...then it locked up again. I began to worry. + I noticed that both times it locked up I was accessing the Federal Bureau + Of Investigation home page (FBI). Maybe Slipknot was not compatible with + sites who promote the Clipper chip...Hahahaha. Not the case, unfortunately. + + During the course of the day, it locked up at random. I tested my + computer hardware to see what the issue might be. There was no hardware + problem. My computer has never locked up on my under any circumstances + before. + + I am not going to give this software a bad review because it locked up + on my system. I polled some users on the Internet regarding their + experiences with the software and here's what some of them said; + + SLIPKNOT version 1.0 really works without a SLIP/PPP acct. In my case it + installed quite easily, with minimum tweaking (certainly less than to + install TIA). It opened the WWW to me. Next versions, should have FORMS + support. That is a must and is urgently needed, because many WWW pages + contain forms. Other than that, SLIPKNOT is highly recommended for a + low-budget approach to WWW. [one@netcom.com] + + ========================================================================= + + I find it to be a an incredibly clever idea, and it works quite well + with direct dial. Some problems with images and sound via telnet/rlogin, + but not a big problem. The idea of being able to web-surf without SLIP + is very attractive, especially for the dial-up user as so many of us are. + With the "load images" turned off, it is much faster, and you can + selectively load them. but since it uses Lynx as its engine, why not use + Lynx for imageless surfing. + + Speed: I compared it to my SLIP account with NCSA Mosaic and Netscape. + It loads images, etc. a bit slower than Mosaic and a lot slower than + Netscape. + + Installation and Set up: simple, esp as compared to the fun you can have + installing say Netscape and all the winsockets stuff, and IP/DNS + configuring. + + Look and Feel: I'd like a larger document window, but the pulldown menus, + etc. will make surfing easier for the newbies. + + Overall - a nice, inexpensive alternative to SLIP/PPP, especially for + those fairly new to the net and like that point and click feel. + + NB: another alternative for an "on the cheap" approach to the Web is The + Internet Adaptor -- I have it installed in my dial-up unix account, and it + is slick: it emulates SLIP, and works very well. I'm getting rid of my + SLIP account because I have TIA. If you have ever set up a SLIP, it is + pretty easy to install and set-up. If not, you'll spend some time. Cheap + too. - Jill Ellsworth + + ========================================================================= + + Very nice and easy to use developmental software. Web works well and the + terminal mode is functional and adequate for most users. everything + available from your Internet provider can be accessed, just as with a + full blown commercial package like ProCom, etc. Some limitations on + bells and whistles apply. + + Inability to support ftp and gopher from within the html page is a + bother, but as development continues I hope Peter Brooks will be able to + add that capability. + + Direct link to obtain upgrades and the automated upgrade installation + built into Slipknot is a neat touch. + + I am currently using Version 1.00 and have sent in my registration fee + because I want to encourage continued development. + + I really appreciated the opportunity to evaluate the fully functional + application. - Steve Seteroff (seteroff@kendaco.telebyte.com) + + ========================================================================= + + You're a brave man to ask for opinions on the Internet! + + I got SlipKnot right after it was released. It is a wonder. Last night I + got the latest version "g". I am so pleased. Peter Brooks and Felix + Kramer (?) have a winner on their hands. I had tried to install netscape, + tia, and winsockets about two weeks before I saw the announcement, and + failed. The only problems I had in the installation of SlipKnot were ones + anticipated in the help screens. (RTFM, dummy!) Peter Brooks was on the + newsnet answering questions almost 24 hours a day. + + 1. Easy to install. + 2. Cheap. + 3. Easy to use. + 4. Fun! + + And all this praise from a DOS command line freak. I told PBrooks in an + email that I hate Windoze and had been threatening my son to take it off + my computer (he uses my printer and MSWord). I complained to PBrooks that + now Brendan knew I wouldn't follow through on the threat. I have an + indispensable program that needs Windoze. + + Now some cautionary notes. ... Sorry I don't have any reservations. + BTW, I am not Peter's mother, nor do I have any affiliation with anyone + associated with MicroMind (a moronic name...like, encephalitis, dude!). + If you have any particular questions, I would be glad to respond. My + guess, judging by the activity in WWW newsgroup, is that you'll have more + response than you can handle. + + Good luck with the story. Happy holidays. (BTW I tipped off the LATimes + computer technology reporter and he just responded that he'd heard about + it. Here mosaic applications are bringing the Web to millions and it's + news, but a shell account enabler is ignored. Go figure.) Go SLIP not! + + Mike Howard (mikeh@netcom.com) + + ========================================================================= + + I think Peter has a good product. It is still in Beta Version. For + example I can not Down Load large files (over 19,456 Bytes). I am sure + Peter will find a fix but for now SK is for the experienced user. + + John Hammond (jhammond@unicomp.net) + + ========================================================================= + + I found it easy to install; unfortunately it crashes every time I try to + get something off the web and I must do a hard reboot - thus Dr.Watson + can save nothing, nor can slipknot's built-in debugger. I haven't yet + contacted the authors. + + Bennett Price (bjprice@itsa.ucsf.edu) + + ========================================================================= + + I have used SlipKnot for about six weeks and have come to rely on it for + an easy alternative to mistyped Unix commands. Since I work in a high + school that does not yet have Internet access, I foresee SlipKnot as a way + to hook the uninitiated into the 'Net. Teachers and administrators who are + not already convinced about the utility of the Internet would probably be + turned off by a Unix command line. Although downloading graphics through + SlipKnot is slow even at 14.4, for the inexperienced user, this wait time + is surely preferable to using a straight text-based Web browser. + + While I approve of Version 1.0e as far as it goes, I can certainly suggest + a number of needed improvements: + + 1. gopher support + 2. telnet support + 3. forms support + 4. better resource management (I run SlipKnot on a Pentium with 16 Mb of + RAM and yet often run low on GDI resources) + 5. improved error handling when the 'Net is busy or a page cannot be found + 6. automatic redial in the terminal mode (Maybe this can be done with a + script, but I could not see how.) + 7. Z-modem or Y-modem batch transfer support in terminal mode. + + Don't get me wrong. I like SlipKnot. Everything can be improved. I am sure + at Micromind. they are already at work (at least mentally) on these + suggestions. + + Jeff Ratliff (tratliff@whale.st.usm.edu) + + ========================================================================= + + I have found Slipknot to be a very worthwhile product. Its ease of + set-up is a definite plus. I downloaded Slipknot and had it installed + and running in a very short time. The installation instructions + addressed the few problems I had getting it running and then I was off -- + surfing the Web. My main dislikes of the software are the small window + size and the ability to open only five documents at the same time. I + understand that these two complaints are being addressed by the next + version. If you don't have direct access (i.e. you connect through a + dial-up shell) and don't have a SLIP or PPP connection, Slipknot is + definitely worth it. + + Kenyon Jon Michael (mkenyon@jove.acs.unt.edu) + + ========================================================================= + + I've been using Slipknot for a while now, and I'm very glad it's + around. I think it's seriously necessary, because there are a huge + number of people who get their net.access through shell accounts, and + this allows you to get a fuller Web experience than with Lynx. + + However, the program has it's problems, and there is a lot of + advancement that can be made in the future revisions. For example, forms + are not supported, so your Web use only goes one way; you can't reply + to things, write mail, make suggestions, etc., or for that matter, be + verified for logins like on HotWired. That's a huge pain. + + Another problem is the inability to use gopher servers, something + that's still widely implemented and integrated with the Web. And, of + course, Slipknot is also a bit buggy; any errors, and the program quits + rather than moving on, it displays certain dialog boxes more than once in + a row, etc. + + IOW, it's a good idea and good start for a much-needed program, but it + still needs work. However, with some more tweaking and advancement, it + will be a very solid program. + + Bill Pena (billpena@genesis.nred.ma.us) + + ========================================================================= + + I got (and paid) for Slipknot, and am currently running v1.0 with the + "g" patch. My host is a "pay" unix system that I call in to + get my mail on my "term" account. I am using the program on a + 486 cryix 40mhz system. + + The program is not perfect. It still has some bugs to work out, and + lots of features to be developed (forms, gopher, etc do not work at + this time). But!!! even with though the program is still in its early + stages of development, I find it VERY useful, and it DOES allow me + to view http documents with the graphics. + + I get good 14400/v42bis connections via the automatic log-in script (that + must be user customized) and acceptable download speed of the http. With + the program running under Windows 3.1, it does take a moment to analyze + the downloaded text to "find" the embedded graphics, then download the + graphics, plot the series of files, then display the document. + + With the program currently costing $30, the difference in the cost of my + term account and a slip/ppp account is a lot more than the cost of + Slipknot. + + I use the internet for e-mail and netnews more than a place to surf just + to look at images. As such, my primary access to the net is via term with + a text editor for mail/news replies. When I want to check out some + http/url, I just hang up and call back via Slipknot. I don't use it all + the time, so when I need it, it is there for me. + + Being shareware, it is perfect for the user to "play" with to determine + if he/she wants to continue to use it, prior to paying for the program... + and even with its limitations, it is still a deal at $30. and with the + authors still working on it, it is sure to get better and better. + + Tom Stangler (stangle@infi.net) + + ========================================================================= + + It works as advertised. Last I checked, it doesn't do forms or telnet + connection links It has trouble handling some inline images. + + Just like TIA, your provider can tell if you are using SlipKnot, and if + they wanted to, could ban it's use as going beyond the services provided + with your class of account. RCI doesn't have any restrictions on TIA or + SlipKnot... + + Kevin Kadow (kadokev@rci.ripco.com) + + ========================================================================= + + (Slipknot review continued...) + + As you see, we have a wide range of comments here. I believe that most + people realize that it still a very young project and has not yet + attained it's full potential. If you will note, there was one other + person who replied to my request for comments who is having the same + problem I am having with system lock ups. I mailed the author of the + program and they are getting right on the issue. + + The bottom line is that Slipknot is a great idea and a nice software + package. And with end users submitting comments, complaints, and other + information directly to the author or the press, the issues will be + worked out. I suggest that you keep an eye on Slipknot. It's really + going somewhere! + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + cDc GDU #18 + + By Swamp Ratte (sratte@phantom.com) + _ _ + ((___)) + [ x x ] cDc communications + \ / Global Domination Update #18 + (' ') November 1st, 1994 + (U) + Est. 1986 + + NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for November, 1994: + + _________________________________/Text + Files\_________________________________ + + 281: "Official cDc Press Release Concerning President Reagan" by Reid + Fleming. The Cult influences the international political climate of + opinion! We just want what we've got coming to us, mister. + + 282: "Argument" by Markian Gooley. Positivity and happy sunshine and + neato stuff. + + 283: "Possibilities" by Obscure Images. Once again, Oi brings the + linguistics for the nine deuce deuce. This one's got crazy subliminal + tapes and a hippy chick. + + 284: "Sanford's Calico" by James Cazamias. It's just like Disney's + _That Darn Cat!_, but different. + + 285: "Concise Guide to Forgetting How Much You Suck" by Jason Farnon. + Courtesy + of the cool _I Bleed For This?_ 'zine, here we go with a cDc edit/ + distribution. Lots of practical advice to improve your standard of living. + + 286: "The Divine Masters" by Shriek Broomstraw. Particle physics and alien + overlords and why you should be concerned with all this. You should. + Really. + + 287: "Shotgun" by Swamp Ratte'. Never mind _Where's Waldo?_, where's the + shotgun? Oh my. Fills out this release's angst quota. + + 288: "Rejection Letter Blues" by Jeff Swanson. Some people just can't + appreciate good literature. Fun-eeEe. + + 289: "Can There Be Artificial Intelligence?" by Tequila Willy. Another + scholarly scab for you to pick at. That Willsie, what a smart guy. + + 290: "Bob Takes a Trip" by Special Agent Finerty. Bob's a mechanical dog + and he's NUTS. CRAZY. Watch out. Zany hi-jinx. + + __________________________________/cDc + Gnuz\__________________________________ + _ _ + |\ /^\ /^\ + / / / @ )^ -| @ )^ - _ + / / 666 ( \/-^-^^| /--^-^-~ + \o \ \ o \ / /@ )^ - _ + | o| _ - _ \ / o /| /--^-^-~ + / / / O o ^ - / ( O |/ / /\ + | o \__ _/ O o O o ( o \ o \ /_/@ | + \ o o o / |__ _ \\ + \ o O \ O ( o - o / . ^ \S + - - \ o ) \ ( ) /(_ / /^ + | / - _ - - \ \ -_ -- - + | / \ / \ | \ \. + / | | \ | \ + /_ \ / | \ / _ \ + | \ - | \ - + + "This low-go you've received is the image of the be east. Whatever + you do, do not hold this image in your write hand or receive its image by + foe-ton trance Miss-shun through your I balls into your mined full crane + he um or you've received the mark of the bee east. Stung, by buy bull + revel lay shun. Keep your clothes on and don't follow the be eastly bare + whoreds." + -Philip Heggie + + --x X x-- + + New things? Yep. There's now a Usenet newsgroup for you to discuss the + All-Powerfulness of cDc. It's "alt.fan.cult-dead-cow" and if your + newsfeed isn't getting it, mail news@yersite and say, "GET WITH THE + PROGRAM, PAL! HUP HUP!" + + Tell me about the time you were in the 7th grade and had to do a #2 really + bad and those blind special ed. kids were in the bathroom swinging their + canes around and saying bad words. You were SCARED, weren't you. HA! + + The world is filled with WIMPS. You go to a large public restroom, into a + stall. All the other people in the stalls, you can see their feet. They + make no noise. They sit and wait and clutch their tiny little genitals in + FEAR. But I am NOT LIKE THEM. I MAKE MY DISGUSTING NOISES AS I PLEASE. + I clean up, I exit my stall, I wash my hands and I LEAVE. I AM DONE. + I AM RELIEVED. They remain, cowering, wishing they had the GUTS to CRAP + but they do not and their bowels TREMBLE with gasses. They are but + INSECTS because they cannot CRAP FREELY. LEARN FROM MY ACTIONS and you + too can be POWERFUL. + + Lady Carolin is now running the Official cDc Internet Dumpster: ftp or + gopher to cascade.net for all the cDc stuff, all the time. Cascade.net + gets 'em first and fast. The secondary site is ftp.eff.org as usual. + + The other day I finally got The Beatles' _Abbey Road_ album and this + "I Want You (She's So Heavy)" song is amazing. So I'm thinking, why + should I be concerned with this week's indie-certified alterna-wonder- + weenie when I DON'T EVEN HAVE A GOOD COPY OF BARRY MANILLOW'S "MANDY"? + MY 8-TRACK SUFFERS FROM EXTREME WOW AND FLUTTER. + + HOW CAN I EVEN _THINK_ ABOUT JAWBREAKER WHEN MY JACKSON 5 COLLECTION IS + SADLY INCOMPLETE!!?? + + If your writings have CLASS and STYLE, we want 'em. Dig the address at the + bottom of this file, daddy-o. + + + "What's good for cDc is good for America." - President Calvin Coolidge + + S. Ratte' + cDc/Editor and P|-|Ear13zz |_3@DeRrr + "We're into t-files for the groupies and money." + Middle finger for all. + + Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453. + Internet: sratte@phantom.com. + + cDc Global Domination Update #18-by Swamp Ratte'-"Hyperbole is our + business" Copyright (c) 1994 cDc communications. All Rights Reserved. + + ALL FILES LEECHABLE *NOW* BY WWW/GOPHER/FTP FROM CASCADE.NET: pub/cDc/New + _ _ + ((___)) + [ x x ] cDc communications + \ / Global Domination Update #19 + (' ') December 1st, 1994 + (U) + Est. 1986 + + NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for December, 1994: + + _________________________________/Text + Files\_________________________________ + + 291-299: Nine Christmas/Holiday/Cold Arctic Wasteland-related stories. + Some are funny, some are disturbing, and some will make you VERY AWARE of + every single PORE on your NOSE. + + * cDc - DOWN HOME FOR THE HOLIDAYS (1994). Dolly Parton, Kenny Rogers, + Olivia Newton-John, Clint Black. Gather 'round the tree and enjoy a + rousing duet of Kenny and Olivia singing "Jingle Bell Rock" while Ms. + Parton gets drunk and embarrasses herself. Directed by Martin Scorsese. + (Drug Use, Adult Language, Graphic Violence, Strong Sexual Content). + + __________________________________/cDc + Gnuz\__________________________________ + + "In their workshops, the elves toil under the oppressive eyes of the + redshirts. The Eskimos are all but extinct, and the dentists pull tooth + after whalebone tooth from the charred skulls of their remnants. + + Oh, the twinkling blue Aryan eyes! There is blood on his cheeks! + + He trains mighty legions in his impregnable northern fortress. The Lapps + have come to fear the sound of marching boots and jingling bells. + + With his newest sleigh, he can strike any European city in under twenty + minutes. + + Good children get a switch in their stocking. The bad ones disappear. + + LONG LIVE THE FOURTH REICH!" + -Andrew Solberg + + - x X x - + + + Conspicuous consumption of cDc products will fill the empty, gnawing + voids you may or may not feel in your life... which become all the more + apparent at ridiculous hours of the night as carbonated beverages + gradually wear away your stomach lining and ulcers work their own little + brand of magic. + + Things to look forward to in 1995: + + cDc #300 - Cow Beat #3: "Teen Idling on the Inphomashun Hi-Mom-I'm-on-TV- + way" + + cDc FACK: "Frequently Anointed Cows are K-rad." Or something. + + + I could give you promises of Twinkies and a cool, like, Yaga t-shirt. + Will you be happy then? From here to eternity we will shop. We will shop + at The Mall and buy only the finest in fashions and Rage Against the + Toaster will provide the aural motivation. "Fuck you, Mom, I won't clean + my room like you tell me." + + Go to HoHoCon and it'll be cool. Ramada Inn South. 1212 West Ben White + Blvd. Austin, Texas. Friday, December 30th through Sunday the 1st. + + Shop! Shop! Do the booty hop! The leather store has a sale on biker + jackets, Harley accessories optional and in-stock. New tats shine with + gleaming disinfectant. Bright red-skinned jolly pierceings, and sparkling + sterling silver! On the tongue, through the lip. Susy's got a charming + new necklace, and Little Johnny has a delightful new nose ring! "Come over + here, Johnny, so Aunty Emma can see your newest hole." + + Make new holes and fill 'em up. + + As cDc stalks around, hunting the logical conclusions. Ho. + + + S. Ratte' + cDc/Editor and P|-|Ear13zz |_3@DeRrr + "We're into t-files for the groupies and money." + Middle finger for all. + + Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453. + Internet: sratte@phantom.com. + _____________________________________________________________________________ + + cDc Global Domination Update #19-by Swamp Ratte'-"Hyperbole is our + business" Copyright (c) 1994 cDc communications. All Rights Reserved. + + ALL FILES LEECHABLE *NOW* BY WWW/GOPHER/FTP FROM CASCADE.NET: pub/cDc/New + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + MY LETTER TO WIRED RE: WWW PAGE + + [Editor's note: I mailed this to Wired...and they said that they would + print it in the February 1995 issue. We'll see] + + By Scott Davis (dfox@fc.net) + + Dear Wired, + + I have taken it upon myself to do an informal poll regarding your + new WWW page on the Internet. I recall that not so long ago, the + Wired WWW page was a great thing. It was easy to use and contained + a wealth of information. Now, it appears that one must have some + type of psudo-government security clearance to get into this WWW page. + It is my guess that the purpose for having to enter one's name, + e-mail address, special-secret-multi-digit-code, and other requested + information is for the purpose of demographics. No matter the reason + behind all of this...IS IT WORTH IT? Please allow me to explain the + frustrations of some of the net-community. + + In announcing my informal poll, I stated my opinion on the new WWW + page. It was not favorable to Wired. I asked others to mail me their + opinions also. I will edit some of these for brevity only. I assure + you that I did not receive a single good comment about the new page. + + And from what I understand, it seems like that there was some debate + regarding the creation and operation of the HotWired page. One + net-denizen replied to me, "Three weeks ago Jane Metcalfe came to + UCDavis to talk about Hotwired and to give the first public demo of + it. She told us that they had debated for quite some time about how + to set it up--wanting a balance between looking 'friendly' and 'not + allowing anonymous logins'. Sounds like the balance has tipped a bit + further than she wanted, given commentary on the net." + + Another frustrated user says, "I gave up after 2 go arounds with the + login problems. To bad as I liked to read the old hotwired. Oh well, at + least the magazine is still easy to open!" + + Other comments from disgruntled users include "I am getting nowhere with + this new interface. Requiring usernames, passwords, verification codes, + etc, ad nauseum has not yet induced me to like this new Web page." and + "Everytime I try to send my Hotwired Account Verification, it goes into + an endless loop, with the Mosaic icon spinning endlessly. If this is a + problem with using the Windows Mosaic 2.0a7 browser, I suggest that Wired + get rid of the verification, because I'm not getting rid of Mosaic." + + More graphic comments include "Looks like HotWired has become the living, + throbbing, thrashing (whatever other adverbs they like) pulse of a + self-important, jargon-speaking, head-up-someplace-where-it-is-very-dark + entity." and "...not to mention one that has security measures like NORAD! + People go to www.wired.com for one thing: BACK ISSUES OF WIRED. End of + story." And the be-all-end-all comment that fits this WWW page perfectly + came from an avid reader. He says "I'd have to say this new setup has + become TIRED before it was ever WIRED..." + + In running a large operation such as Wired, you are going to get + complaints about "something" all the time. And as the best publications + of it's kind, I am sure that you address the issues as much as possible + ...just as you have this one. And many of the complaints you receive + probably carry "less priority" than others. However I certainly hope + this does not fall into that category of "less priority". I could + understand if maybe 50 or 100 people complained. But over the past + several months, I have seen numerous people complain about the + procedures required to gain access to your WWW page. + + When I first sent my rough draft of this article into Wired, I received + a polite response from Andrew Anker of Wired Magazine. He was very + informative and perhaps his response seemed 'typical' to me because I + failed to provide him with much of the necessary information that I had + collected in order to do this article. I certainly do appreciate his + response to our concerns. Mr. Anker replied, "...over 20,000 people have + logged into the HotWired since we launched last Thursday, so it's very + possible that the people you polled didn't read the text of the intro + pages into HotWired that explain that certain browsers don't work with + HotWired." + + Giving Wired the benefit of the doubt and assuming that some browsers may + not work or could be outdated (which I now know to be true), my next step + was to get the latest copy of one of the more popular browsers and try + again. And once again, I ran into more problems. I was not about to + attempt to troubleshoot more problems with this WWW page. I had obtained + the proper hardware and software to accomplish the task. It was no longer + my problem. It's Wired's problem. + + After this last-ditch attempt to prove ourselves wrong in theory and + technique, one of my close friends stated, "Why the hell are they trying + to make it so hard to get at? Are they experimenting with someone's + cockamamie scheme for the Web equivalent of pay-TV?" + + It appears that many people are getting TIRED of this WWW page. + Many end users do not see the purpose of having to enter all this + information, and in the end, it causes nothing more than a headache + when it does not work. I certainly do not want people to think that + I am some 'Privacy Hound' who disagrees with the concept of entering + my personal information on some WWW page. My name, number and address + are of public record to anyone who wishes to dial 512-555-1212. + The fact is that I have spoken to several people who cannot seem + to get the interface to work. And I seriously doubt that each of them + have an ill-configured Moasic. + + Of all the people and companies on the net with Web pages, I would + venture to assume that Wired, of all people would promote accessibility + and ease before subjecting it's users to a verification procedure that many + feel is lacking, to say the least. I might go so far as to suggest that + Wired might want to resort back to the good 'ole days and have a WWW page + that is easily accessible and easy to use. Including the page where you + are requesting that the user input information can still remain on the + WWW site, but make it optional, and don't make it the home page. You + can ask people to fill out the requested information. I am sure that + many, if not most would comply. And by switching back, you are opening + doors for people who may not want to update their software, or just want + access for a short time obtain specific information. + + As far as updating browsing software, my theory is "if it's not broken, + don't fix it", and just because somebody can't get on Wired's page, does + not mean that their software is broken and should be updated. + + I must be honest and admit that I did FINALLY gain access to HotWired. + Nut not until I had tried every "compatible" version of Mosaic and + finally was forced to upgrade to NetScape for the sole purpose of + getting on HotWired. Was all that necessary? + + Please fix this problem by making Wired easier to access. We end users + have to jump through enough obstacles as it is, and there is no point + in having to do this to get our favorite magazine on our screen. + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + diff --git a/textfiles.com/magazines/JAUC/juac10.txt b/textfiles.com/magazines/JAUC/juac10.txt new file mode 100644 index 00000000..6b0bc47b --- /dev/null +++ b/textfiles.com/magazines/JAUC/juac10.txt @@ -0,0 +1,802 @@ +From dfox@fc.net Sat Jan 21 06:21:58 1995 +Received: from freeside.fc.net (freeside.fc.net [198.6.198.2]) by bigboote.WPI.EDU (8.6.9/8.6) with ESMTP id GAA16077 for ; Sat, 21 Jan 1995 06:21:53 -0500 +Received: (from dfox@localhost) by freeside.fc.net (8.6.8.1/8.6.6) id FAA01518 for mikecap@wpi.edu; Sat, 21 Jan 1995 05:18:54 -0600 +Date: Sat, 21 Jan 1995 05:18:54 -0600 +From: Malik Al-Rashim +Message-Id: <199501211118.FAA01518@freeside.fc.net> +To: mikecap@wpi.edu +Subject: JAUC-File10 +Status: O + + + CALLER ID FAQ + + By Padgett Peterson (padgett@tccslr.dnet.mmc.com) + + Frequently Asked Questions About Caller-ID v1.1 Mar. 1994 + + 1) What is Caller-ID ? + + First ask "What is ANI" + + 2) OK, What is ANI ? + + ANI or Automatic Number Identification is a mechanism by which the + different telephone companies determine what account is to be charged for + a call, This information is passed between Telcos and was originally + for billing purposes and predated both SS7 (Signaling System 7) + and (C)LASS (Local Area Signaling Services was the original AT&T + designations, the "C" was added by Bellcore after divesture) services + which make CNID or Calling Number IDentification as Caller-ID is more + properly known, possible. + + Since the Telcos had ANI, the decision was made to make it available + to authorized parties such as 911 service and law enforcement agencies. + ANI is also used to let a Telco operator know who is calling. + + More recently, ANI is used to report to 800 and 900 subscribers, + who made the calls they have received, in the first case so that + the 800 subscriber knows who the charge is for, and so that 900 + number subscribers know who to charge. + + Thus while ANI is similar to CALLER-ID and may provide the same + information, they are actually two different services and ANI information + is not necessarily the same as what will appear on a CALLER-ID display. + + 3) Now (maybe) what is Caller-ID ? + + Caller-ID is a Telco offering that is a byproduct of (C)LASS services. + In this case, only those numbers reported by participating exchanges are + returned, exactly which are and which are not is currently (March 1994) + at the Telco's discretion. + + The Federal Government has stated that it is their intent that nationwide + CNID be available by mid-1995. The full text of this decision may be + found FCC Report No. DC-2571 issued on March 8, 1994. + + The biggest effect of the ruling is to mandate transport of CPN (customer + provided number) information between interconnecting networks eliminating + the effective inter-LATA-only limitation that exists today in most areas. + + Currently there are two types of Caller-ID. The first (often referred + to as "basic" service) just returns the calling number or an error + message and the date/time of the call. + + The second ("enhanced" Caller-ID) also may return the directory + information about the calling number. At a minimum, the name of the + subscriber is returned (the subscriber is not the same as the caller, + the phone company has no way to determine who is actually on the line). + + 4) How is the Caller-ID information provided ? + + As a 1200 baud, 7 data bits, 1 stop bit data stream usually transmitted + following the first and before the second ring signal on the line. Note + that this is not a standard Bell 212 or CCITT v22 data format so a + standard modem will probably not be able to receive it. Further, the + serial information exists as such only from the recipient's switch to + the callee's location. Between carriers the signal exists as data packets. + + The signal is provided before the circuit is complete: picking up the + receiver before the data stream is finished will stop/corrupt the + transmission. + + Currently there are two types of information returned: a "short form" + which contains the date/time (telco and not local) of the call and the + calling number or error message. The "long form" will also contain the + name and possibly the address (directory information) of the calling phone. + + The "short form" stream consists of a set of null values, followed + by a two byte prefix, followed by the DATE (Month/Day), TIME (24 hour + format), and number including area code in ASCII, followed by a 2s + compliment checksum. Most modems/caller id devices will format the data + but the raw stream looks like this : + 0412303232383134333434303735353537373737xx + or (prefix)02281334407555777(checksum) + + A formatted output would look like this: + Date - Feb 28 + Time - 1:34 pm + Number - (407)555-7777 + + 5) Can a Caller-ID signal be forged/altered ? + + Since the signal is provided by the local Telco switch and the calling + party's line is not connected until after the phone is answered, generally + the signal cannot be altered from the distant end. Manipulation would + have to take place either at the switch or on the called party's line. + + However, the foregoing applies only to a properly designed CNID unit. + For instance the Motorola M145447 chip has a "power down" option that + wakes the Chip up when the phone rings for just long enough to receive, + process, and deliver the CNID signal after which it shuts down until the + next call. + + Should this option be disabled, the chip will be in a "listen always" + state and it is theoretically possible to "flood" a line making a + vulnerable box record successive erroneous numbers. + + I have received a report of a device called "Presto Chango" that + can transmit an extra ADSI modem tone after the call has been picked up + that will cause a susceptible box to display the later information. It + was also reported to me that CNID boxes marketed by US-West as their + brand and made by CIDCO have been used to demonstrate the "Presto Chango" + box. + + 6) What is "ID Blocking" ? + + Most Telco's providing Caller-ID have been required to also provide the + ability for a calling party to suppress the Caller-ID signal. Generally + this is done by pressing star-six-seven before making the call. In most + cases this will block the next call only however some Telcos have decided + to implement this in a bewildering array of methods. The best answer is + to contact the service provider and get an answer in writing. + + Currently this is supplied as either by-call or by-line blocking. By-Call + is preferred since the caller must consciously block the transmission + on each call. By-Line blocking as currently implemented has the + disadvantage that the caller, without having a second caller-id equipped + line to use for checking, has no way of knowing if the last star-six-seven + toggled blocking on or off. + + Note that blocking is provided by a "privacy" bit that is transmitted + along with the CNID information and so is still available to the Telco + switch, just not to the subscriber as a CNID signal. Consequently related + services such as call trace, call return, & call block may still work. + + 7) What happens if a call is forwarded ? + + Generally, the number reported is that of the last phone to forward the + call. Again there are some Telco differences so use the same precaution + as in (6). If the forwarding is done by customer owned equipment there + is no way of telling but will probably be the last calling number. + + Note that as specified, CNID is *supposed* to return the number of the + originating caller but this is at the mercy of all forwarding devices, + some of which may not be compliant. + + 8) What happens if I have two phone lines and a black box to do + the forwarding ? + + If you have two phone lines or use a PBX with outdialing features, the + reported number will be that of the last line to dial. Currently there + is no way to tell a black box from a human holding two handsets together. + + 9) I called somebody from a company phone (555-1234) but their Caller-ID + device reported 555-1000. + + Often a company with multiple trunks from the Telco and their own + switch will report a generic number for all of the trunks. + + There is a defined protocol for PBXs to pass true CNID information on + outgoing lines but it will be a long time before all existing COT + (Customer Owned Telephone) equipment is upgraded to meet this standard + unless they have a reason to do so. + + 10) I run a BBS. How can I use Caller-ID to authenticate/log callers ? + + There are two ways. The first utilizes a separate Caller-ID box + with a serial cable or an internal card. This sends the information + back to a PC which can then decide whether to answer the phone and what + device should respond. Some of these are available which can handle + multiple phone lines per card and multiple cards per PC. + + The second (and most common) is for the capability to be built in a modem + or FAX/modem. While limited to a single line per modem, the information + can be transmitted through the normal COM port to a program that again + can decide whether or not to answer the phone and how. There is a + FreeWare Caller-ID ASP script for Procomm Plus v2.x available for FTP + from the Telecom archive. Most such software packages will also log each + call as it is received and the action taken. + + Of course for true wizards, there are chips available (one of the first + was the Motorola MC145447) that can recognize the CNID signal and + transform it into a proper RS-232 (serial) signal. + + 11) How is security enhanced by using Caller-ID over a Call-Back + service or one-time-passwords for dial-up access ? + + Caller-ID has one great advantage over any other mechanism for telephone + lines. It allows the customer to decide *before* picking up the receiver, + whether to answer the call. + + Consider hackers, crackers, and phreaks. Their goal in life is to forcibly + penetrate electronic systems without permission (sounds like rape doesn't + it ?). They employ demon dialers and "finger hacking" to discover + responsive numbers, often checking every number in a 10,000 number + exchange. + + If they get a response such as a modem tone, they have a target and + will often spend days or weeks trying every possible combination of codes + to get in. With Caller-ID answer selection, the miscreant will never + get to the modem tone in the first place, yet for an authorized number, + the tone will appear on the second ring. Previously the best solution + for dial-ups was to set the modem to answer on the sixth ring (ats0=6). + Few hackers will wait that long but it can also irritate customers. + + 12) What error messages will Caller-ID return ? + + a) "Out of Area" - (Telco) the call came from outside the Telco's + service area and the Telco either has no available information or + has chosen not to return what information it has. + + b) "Blocked" or "Private" - (Telco) the caller either has permanent + call blocking enabled or has dialed star-six-seven for this call. You do + not have to answer either. + + c) "Buffer Full" - (device manufacturer) there are many Caller-ID devices + on the market and exactly how they have chosen to implement storage is up + to the manufacturer. This probably means that the divide has a limited + buffer space and the device is either losing the earliest call records or + has stopped recording new calls. + + d) "Data Error" or "Data Error #x" - (device manufacturer) signal was + received that was substandard in some way or for which the checksum did + not match the contents. + + e) "No Data Sent" - (device manufacturer) Signal was received consisting + entirely of nulls or with missing information but a proper checksum. + + 13) Why are so many people against Caller-ID ? + + FUD - Fear, Uncertainty, & Doubt or 10,000,000 lemmings can't be wrong. + There were some justifiable concerns that some people (battered wives, + undercover policemen) might be endangered or subject to harassment + (doctors, lawyers, celebrities) by Caller-ID. As mentioned above there + are several legitimate ways to either block Caller-ID or to have it return + a different number. It is up to the caller. The advantage is that with + Caller-ID, for the first time, the called party has the same "right of + refusal". + + Expect yet another Telco service (at a slight additional charge) to be + offered to return an office number for calls made from home. Crisis + centers could return the number of the local police station. + + + Compiled by Padgett Peterson. Constructive comments to: + padgett@tccslr.dnet.mmc.com Brickbats >nul. + + Thanks for additional material to: + + David J. Kovan + Robert Krten + John Levine + David G. Lewis + Karl Voss + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + THE PENTIUM BUG WAR ENDS AS WE KNOW IT + + By James Baar and Theodore Baar + + The real long-term significance of the Great Intel Pentium Flaw + Imbroglio is the imminent demise of the current practice of public + relations and corporate and government communications as we know them. + + Ironically caught unaware of the communications world it helped create, + Intel suffered a public relations near-disaster. Intel's arch competitor, + IBM, wandered bubba-like into a public relations bog the future depths + of which are still to be determined. + + Clearly we soon will see on the boneyard of history such communications + artifacts as: + + --The lengthy, well-spun news release or official statement + explaining what "really" happened or why a product "really" is a + breakthrough for all mankind. + + --The news conference where the news is that what the media said + yesterday or last week is "really" not the news at all. + + --The necessity to convince rushed and often ill-informed + journalists and beautiful and much more ill-informed TV anchors that your + truth is "really" true. + + The Internet is doing to public relations what CSPAN, CNN Forums + and talk radio are doing to news coverage: When you are there, the + messenger is extraneous. And, on the Internet, you are there and you are + the messenger as well.. + + The Pentium Flaw War was the first major corporate war to be fought + primarily in cyberspace. The initial, very scattered shots were fired + more than five months ago on the Internet; major engagements got underway + in October; and a worldwide battle raged through November and early + December. + + Little of this was noted particularly in the general or trade media + until near the end. And then it was reported as a highly technical + problem of limited general interest. Only when IBM found it convenient + to drop the equivalent of a small nuclear weapon did most of the major + national media take note that something much more than an academic, + technically obscure brawl was underway. + + Only then did the WALL STREET JOURNAL shout from it's front page: + + Chip Shot + Computer Giants' War + Over Flaw in Pentium + Jolts the PC Industry + + And, on the same day, the NEW YORK TIMES shouted from it's front page: + + I.B.M. HALTS SALES + OF IT'S COMPUTERS + WITH FLAWED CHIP + + Both stories were inspired belatedly by an IBM announcement that it was + suspending sales (sort of) of any of it's personal computers that included + the Intel Pentium chip because the chip had a flaw. + + Well, ho-hum: Except for the IBM announcement, this was old news along + the Information Highway. And the IBM announcement was immediately + discounted by many of the veteran cyberspace combatants of the Pentium + War as highly suspect: something similar to Parliament coming out against + slavery in America after Lexington and Concord. + + Most great military engagements begin quite casually if not accidentally: + A sniper picks off a poacher stealing a chicken. A nervous platoon leader + calls in a little artillery fire on a bunker. A lost company stumbles + on a tank column. + + Back in June, Intel and some of it's customers already knew about the bug + that was preventing the new Pentium microprocessors to divide accurately + out to more than nine or 10 decimal places in some cases. Intel did not + publish the information. If any messages about the bug appeared here and + there in various newsgroups on the Internet for the next few months, + they initially attracted little attention. + + This was not the kind of consumer problem that causes a lot of excitement + at your neighborhood 24-hour store. But this bug was of interest -- and + in some cases importance to parts of the world technical community + engaged in major mathematical calculations: This is a community that also + appreciates that such a flaw is not the first nor will be the last in + the increasing complexity of computer components and software; exalts + technical openness; recognizes quickly when it is being stonewalled; and + has a biting specialized sense of outrage and humor. + + Prof. Thomas Nicely of Lynchburg College reports that when he began + running into a potential flaw in the Pentium in June he started a three + month effort to determine whether the problem was the Pentium or something + else. For example, his own calculations; or possibly known bugs in other + hardware such as the Borland C Compiler. And in Copenhagen mathematicians + developed a T-shirt satirizing the Intel chip logo "Intel Inside" as "No + Intelligence Inside" and published memos saying "We knew about it early + in June..." + + Intel managed to downplay and contain word of the bug for the most part + through the next three months. Any callers were told at first that a fix + was underway and that the bug affected only very special situations. + + Then, on Oct. 30, Dr. Nicely posted a message to "whom it may concern" + on the Internet, reporting his findings and his frustrations with getting + Intel to pay serious attention to him. In the succeeding weeks, the war + between Intel and it's users exploded. Each day there were more reports + about the bug and Intel's truculence. + + The number of the strings of messages on the Internet increased and grew + longer as users at universities, laboratories and corporations around the + world reported the same bug and it's potential variations; discussed + their research for possibly more bugs; and reported on their + unsatisfactory and frustrating phone calls to Intel. + + And here was where the war was really fought. + + Intel treated each caller as an individual, linear event to be dealt with + in isolation; turned around or at least mollified. Intel's position was + that this was a routine bug that was being taken care of and was of no + major importance to most of it's customers. The Intel position essentially + remained that there was no need for a general replacement on demand; that + the problem was relatively minor; that if a user was engaged in the kind + of heavy mathematics that could be affected by the bug then Intel, if + it agreed, would replace a Pentium. + + Meantime, Intel and it's commercial allies continued to promote and sell + Pentiums. More than four million Pentiums were reported sold. + + The words "greedy" and "arrogance" became popular on the Internet among + customers describing Intel's position. The Internet discussion was highly + technical and profane. It also included useful suggestions for + broadening the discussion. For example, participants were provided + with the Fax number of the New York Times. And more and more of the + callers to Intel shared their mostly frustrating experiences on the + Internet with a worldwide audience of customers. An angry mob -- slowly + recognized as a major threat by Intel -- began to assemble in cyberspace + + Intel CEO Andrew Grove issued a statement on the Internet Nov. 27 seeking + to quiet the mob. Instead the roar in cyberspace increased. Intel's + Software Lab Technology Lab Director Richard Wirt on Dec. 8 issued a + statement on the Internet describing Intel plans to provide a fix for the + flaw. The roar continued and spread and Intel's weakening protests were + increasingly drowned out as the users reinforced each other with new data + and complaints around the clock around the world. + + It was at this point on Dec.12 that IBM -- a reported minor player in the + sale of Pentiums, but the developer of a competitive chip, the PowerPC -- + decided to announce both on the Internet and to the major national media + the halting of it's shipments of Pentium-based IBM PCs. + + The war was now spread to the major national media where the problem was + easily confused with various consumer product recalls and the Internet + where IBM's move was both discounted as self-serving and used + simultaneously to pummel Intel further. + + By Dec. 20 Intel had had enough. It agreed to a general recall and + apologized for not doing so sooner. + + The public relations lessons are clear. + + People -- particularly customers -- are no longer isolated waiting to + learn sooner or later what is happening through the third party media + screen and, in turn, relying on the third party media to screen and + sooner or later report their reaction. Even when the third party media + is accurate this process can take many days. + + Through the Internet, people -- particularly customers -- can tell a + corporation or organization exactly what they think and why and share that + simultaneously and instantaneously with all concerned around the world. + The Internet returns the world to the agora where everyone hears what was + said; and everyone hears all comments and reactions; everyone knows who + is talking and can make credibility judgments. + + The first Intel error was not to spot the issue stirring on the Internet + months ago when the commentary was helpful and understanding. At that + time and for several months later, Internet commentators could have been + embraced and thanked for their efforts; immediate plans for a work-around + fix could have been disclosed; and work on a permanent fix could have + been described: all in cyberspace among sophisticated customers who well + understand the complex nature of the technology. + + Intel's second error was not to recognize that because of the Internet it + no longer could reason at least semi-privately with customers and advance + rational technical arguments. In pre-cyberspace days, that could be + effective: the customer is grudgingly mollified until the issue is + eventually resolved. But in this case, as it's customers shared both + their problems and experiences with each other in real time, they fed + each others frustrations; were empowered as a group to demand better + treatment; and built mutual strength with each day for new battles to + come. + + Intel's third error was not to go directly on line with it's customers and + deal with the issue interactively. Instead, Intel pursued the classic + static public relations mode of issuing statements and news releases. + These were turned into blackened ruins by Internet flame messages in a + matter of hours. + + Meantime, IBM by it's announcement, uncorked the Law of Unanticipated + Consequences. The Internet mob really understood the issue; the general + public for the most part did not. IBM, with motives already under + suspicion, opened the bottle labeled "Doubt about Technology" to the + overall potential future detriment of the Information Technology Industry + in general. + + As more people around the world join the millions already using the + Internet for communications, corporations and government will be forced + if they wish to succeed to function within the new realities of cyberspace: + information is shared and sifted by thousands of knowledgeable people; + time is collapsed; facts are quickly checked; loss of credibility can be + instantaneous; second chances are rare and harder to effect; grandstand + plays better be perfect; and the playing off of one audience against + another is far more easily detected. + + Above all else, a smattering of obscure messages or even a random one or + two can no longer be automatically disregarded as mere technical mumbling. + For example, is anyone following up on a recent Internet potential bug + message regarding AMD DX-80 chips or another regarding "something about a + conditional loop" in the Pentium? + + One final cyberspace reality of note: instant corrosive humor is abundant + and effective. (If they really are laughing about you, you can't be taken + seriously anymore.) This was ably demonstrated by the Internet author + who wrote for the delectation of Intel customers and potential customers + everywhere a Star Trek parody. He called it: "BBUUGGS IINN + SSPPAACCEE!!". + + (This article is from a forthcoming issue of Knowledge Tools News, an + electronic newsletter of Omegacom, Inc. James Baar (jimbar@omegacom.com) + is president/managing consultant. Theodore Baar (tedbar@omegacom.com.) + is vice president/chief technologist.) + + ----------- + Copyright (c) 1994 Omegacom, Inc., all rights reserved. This article may + be posted to any USENET newsgroup, on-line service, or BBS as long as it + is posted in it's entirety and includes this copyright statement. All + other rights reserved. This article may not be included in commercial + collections or compilations without express permission from Omegacom, + Inc. jimbar@omegacom.com. For all other uses you must seek permission + of Omegacom, Inc. jimbar@omegacom.com + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + NON-DISCLOSURE AGREEMENT OF DR. NICELY + + The following message was posted to the Internet by Dr. Thomas Nicely, + discover of the Pentium Floating Point Unit Flaw. The first part deals + with a question regarding Dr. Nicely's signing of a non-disclosure + agreement with Intel. + + TO: Whomever It May Concern + FROM: Dr. Thomas R. Nicely, Lynchburg College, Lynchburg, Virginia + (nicely@acavax.lynchburg.edu) + RE: Pentium Bug and Intel NDA + DATE: 94.11.25.1400 EST + + This is in reply to Paul Rubin's (phr@netcom.com) inquiry of 23 November. + + * I signed a temporary nondisclosure agreement with Intel on 10 November. + + * There was no coercion or threat of any kind, by either party. + + * The NDA was signed in the course of discussions to determine + whether or not an agreement (such as a consultancy) could be reached + which would prove beneficial in the long term to myself, to the Intel + Corporation, and to my employer, Lynchburg College. + + * From 10 November until 22 November, I deflected all inquiries regarding + the Pentium FPU to Intel's representatives. This was a consequence of + my own mistaken interpretation of the NDA; I was treating it in the + manner of a security clearance; I once held a clearance for secret + restricted data in X-division (nuclear weapon design and analysis) + at Los Alamos National Laboratory, and that clearance treated most + information concerned as "born secret," even if the information was + acquired prior to the clearance and/or independently. In the same + spirit, I removed from the College's VAX anonymous FTP directory + copies of the codes used to analyze the Pentium chip for the bug. + + * After receiving some complaints in this regard, Intel (on its own + initiative) informed me on 22 November that I was free to discuss + publicly the discovery and nature of the Pentium FPU bug, since this was + my own work, accomplished prior to signing the NDA and without + assistance from Intel; and that the primary purpose of the NDA was to + insure confidentiality of information exchanged in the course of any + consulting I might do for Intel in the future. + + * To this date, Intel has been most cooperative in alleviating difficulties + caused for my own research (computational number theory; distribution of + twin primes and other constellations, and the sums of their reciprocals) + by the presence of the bug. They have shipped replacement chips for the + CPUs in the machines I am using, and I have verified that the new chips + are free of the bug (zero errors in > 1e15 simulated random divisions). + + * I cannot speak for Intel regarding its policies on CPU replacement for + Pentium systems having the bug; that is a management decision which + obviously must take into account the constraints of supply, inventory, + logistics, expense, and public relations. To date, I believe Intel has + handled the affair in essentially the manner that could usually be + expected of most businesses operating in a highly competitive, low-margin + capitalistic economy. Any Pentium owner who feels the need for a + replacement CPU should contact Intel Customer Service and Tech + Support at 800-628-8686, or Intel representative John Thompson at + 408-765-1279. + + * I probably have a somewhat different perspective on the bug than most + users. It is my opinion that the current generation of microprocessors + (and possibly all of them since, say, the 8080) has become so complex + that it is no longer possible to completely debug them, or even to + determine every bug that exists in one. Thus, the discovery of this + particular bug should not be any great surprise. There have been many + well-publicized bugs in the past (e.g., the 32-bit multiply bug in the + early 80386s, the arctangent bug in the early 80486s, the stack-handling + bug in the early 8088s, and the Motorola 68K revision F bug). + Furthermore, in view of this, all mission-critical computations should + be performed multiple times, in settings as independent as possible--- + preferably with different CPUs, operating systems, and software + algorithms. Where different platforms are not available, the same + computation should be performed using algorithms as independent as + possible; this was in fact how I pinpointed the Pentium bug---the + sums of the reciprocals of the twin primes were being done in both + long double floating point (64 significant bits) and in extended + precision using arrays of integers (26 decimal digits at that time, + 53 decimal digits currently). Dual calculations were also being run + on 486 and Pentium systems. + + * Note that the bug can be temporarily circumvented by locking out + the FPU. For most DOS applications, this can be done by means of the + DOS commands SET 87=NO (for executables created by Borland compilers) + and SET NO87=NO87 (for executables created by Microsoft compilers). + Of course, this is at best a performance-killing band-aid; some + applications require an FPU, while Windows and most DOS extenders + ignore these environmental variables. In theory, it should be + possible to write a fairly short (100 lines?) utility code which + enters protected mode (ring 0), sets up a valid global descriptor table + (and perhaps a valid interrupt descriptor table), resets the emulation + bit in the machine status word of control register 0, and then re-enters + real mode. Running such a code at boot time should lock out the FPU + even for Windows and DOS extended applications; a similar code could + reactivate the FPU at will. Unfortunately, I haven't had the time to + write the code yet! + + * To date, my analysis indicates that the bug will appear in about 1 in + 31 billion random divisions and 1 in 1.26 billion random reciprocals. + These figures are similar to the rate of 1 in 9.5 billion attributed to + Intel. In my own application (distribution of twin primes and the sum + of their reciprocals) no error appeared for values < 824e9. Most users + will find these values reassuring; those of us doing computational + number theory, chaos theory, or analysis of ill-conditioned matrices + may still want a new, bug-free CPU. + + * To date, the worst-case error of which I am aware is an example + apparently posted by Tim Coe of Vitesse Semiconductors on 14 November, + indicating that the quotient 4195835.0/3145727.0 is returned correctly + to only 14 significant bits (5 significant decimal digits). I have not + yet had a chance to verify this example. + + * Copies of some of the codes I have used to analyze the bug (updated to + reflect later developments) will be restored to the anonymous FTP + directory [anonymous.nicely.pentbug] of Lynchburg College's VAX server + (machine ID acavax.lynchburg.edu) as soon as I get time to update and + post them. + + * Feel free to transmit this communication as you wish. + + Sincerely, + + Dr. Thomas R. Nicely + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + THE COMPUTER NEVERMORE (The Raven) + + By Unknown + + Once upon a midnight dreary, fingers cramped and vision bleary, + System manuals piled high and wasted paper on the floor + Longing for the warmth of bedsheets, + Still I sat there, doing spreadsheets; + Having reached the bottom line, + I took a floppy from the drawer. + Typing with a steady hand, then invoked the SAVE command + But I got a reprimand: it read 'Abort, Retry, Ignore.' + + Was this some occult illusion? Some maniacal intrusion? + These were choices Solomon himself had never faced before. + Carefully, I weighed my options. + These three seemed to be the top ones. + Clearly I must now adopt one: + Choose 'Abort, Retry, Ignore.' + + With my fingers pale and trembling, + Slowly toward the keyboard bending, + Longing for a happy ending, hoping all would be restored, + Praying for some guarantee + Finally I pressed a key-- + But on the screen what did I see? + Again: 'Abort, Retry, Ignore.' + + I tried to catch the chips off-guard-- + I pressed again, but twice as hard. + Luck was just not in the cards. + I saw what I had seen before. + Now I typed in desperation + Trying random combinations + Still there came the incantation: + Choose: 'Abort, Retry, Ignore.' + + There I sat, distraught exhausted, by my own machine accosted + Getting up I turned away and paced across the office floor. + And then I saw an awful sight: + A bold and blinding flash of light-- + A lightning bolt had cut the night and shook me to my very core. + I saw the screen collapse and die + 'Oh no--my data base,' I cried + I thought I heard a voice reply, + 'You'll see your data Nevermore!' + + To this day I do not know + The place to which lost data goes + I bet it goes to heaven where the angels have it stored + But as for productivity, well + I fear that IT goes straight to hell + And that Us the tale I have to tell + Your choice: 'Abort, Retry, Ignore.' + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + TWAS THE NIGHT BEFORE STAR TREK... + + 'Twas the night before Christmas, when all through the ship + Not a circuit was buzzing, not one microchip; + The phasers were hung in the armory securely, + In hope that no alien would get up that early. + + The crewmen were nestled all snug in their bunks + (Except for the few who were partying drunks); + And Picard in his nightshirt, and Bev in her lace, + Had just settled down for a neat face to face... + + When out in the hall there arose such a racket, + That we leapt from our beds, pulling on pant and jacket. + Away to the lifts we all shot like a gun, + Leapt into the cars and yelled loudly "Deck One!" + + The bridge red-alert lights, which flashed through the din, + Gave a lustre of Hades to objects within. + When, what on the viewscreen, our eyes should behold, + But a weird kind of sleigh, and some guy who looked old. + + But the glint in his eyes was so strange and askew, + That we knew in a moment it had to be Q. + His sleigh grew much larger as closer he came. + Then he zapped on the bridge and addressed us by name: + + "It's Riker, It's Data, It's Worf and Jean-Luc! + It's Geordi, And Wesley, the genetic fluke! + To the top of the bridge, to the top of the hall! + Now float away! Float away! Float away all!" + + As leaves in the autumn are whisked off the street, + So the floor of the bridge came away from our feet, + And up to the ceiling, our bodies they flew, + As the captain called out, "What the Hell is this, Q?!" + + The prankster just laughed and expanded his grin, + And, snapping his fingers, he vanished again. + As we took in our plight, and were looking around, + The spell was removed, and we crashed to the ground. + + Then Q, dressed in fur from his head to his toe, + Appeared once again, to continue the show. + "That's enough!" cried the captain, "You'll stop this at once!" + And Riker said, "Worf, take aim at this dunce!" + + "I'm deeply offended, Jean-Luc" replied Q, + "I just wanted to celebrate Christmas with you." + As we scoffed at his words, he produced a large sack. + He dumped out the contents and took a step back. + + "I've brought gifts," he said, "just to show I'm sincere. + There's something delightful for everyone here." + He sat on the floor, and dug into his pile, + And handed out gifts with his most charming smile: + + "For Counselor Troi, there's no need to explain. + Here's Tylenol-Beta for all of your pain. + For Worf I've some mints, as his breath's not too great, + And for Geordi LaForge, an inflatable date." + + For Wesley, some hormones, and Clearasil-plus; + For Data, a joke book, For Riker a truss. + For Beverly Crusher, there's sleek lingerie, + And for Jean-Luc, the thrill of just seeing her that way." + + And he sprang to his feet with that grin on his face + And, clapping his hands, disappeared into space. + But we heard him exclaim as he dwindled from sight, + "Merry Christmas to all, and to all a good flight!" + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + SANTA SOURCE CODE + + By Unknown + + #bash + + better !pout !cry + better watchout + lpr why + santa claus town + + cat /etc/passwd >list + ncheck list + ncheck list + cat list | grep naughty >nogiftlist + cat list | grep nice >giftlist + santa claus town + + who | grep sleeping + who | grep awake + who | egrep 'bag|good' + for (goodnes sake) { + be good + } + + better !pout !cry + better watchout + lpr why + santa claus town + + + [original source unknown] + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + diff --git a/textfiles.com/magazines/JAUC/juac11.txt b/textfiles.com/magazines/JAUC/juac11.txt new file mode 100644 index 00000000..47127f23 --- /dev/null +++ b/textfiles.com/magazines/JAUC/juac11.txt @@ -0,0 +1,567 @@ +From dfox@fc.net Sat Jan 21 06:24:37 1995 +Received: from freeside.fc.net (freeside.fc.net [198.6.198.2]) by bigboote.WPI.EDU (8.6.9/8.6) with ESMTP id GAA16091 for ; Sat, 21 Jan 1995 06:24:34 -0500 +Received: (from dfox@localhost) by freeside.fc.net (8.6.8.1/8.6.6) id FAA02217 for mikecap@wpi.edu; Sat, 21 Jan 1995 05:21:35 -0600 +Date: Sat, 21 Jan 1995 05:21:35 -0600 +From: Malik Al-Rashim +Message-Id: <199501211121.FAA02217@freeside.fc.net> +To: mikecap@wpi.edu +Subject: JAUC-File11 +Status: O + + + MY LIFE AS AN INTERNATIONAL ARMS COURIER + + By Matt Blaze (mab@research.att.com) + + Under an obscure provision of US law, devices and computer programs + that use encryption techniques to hide information from prying eyes + and ears are considered ``munitions'' and subject to the same rules + that govern the international arms trade. In particular, taking such + items out of this country requires the approval of the State + Department, which decides whether exporting something might endanger + national security. In the past, these restrictions were of little + concern to the average citizen; encryption found most of its + application in military and diplomatic communications equipment. + Today, however, growing concern over electronic fraud and privacy + means that encryption techniques are starting to find their way into + more conventional commercial products like laptop computers and + portable phones. + + Mostly to find out what the process was like, I recently applied for a + temporary export license for a portable telephone encryption product + that I wanted to take with me on a business trip to England and + Belgium. + + The item in question is more properly called a ``telephone security + device.'' This is a little box that scrambles telephone conversations + to protect them against eavesdroppers; this sort of protection is + sometimes important when discussing confidential business matters from + faraway places. The particular model I bought was already approved + for export; it employs a cipher algorithm that the government has + already decided is not a threat to national security even should it + fall into the hands of some rogue government. This model is aimed + primarily, I presume, at international business travelers who want to + communicate in a reasonably secure manner with their home offices in + the states. In other words, a typical user buys two of them, leaving + one at the home office and carrying the other when traveling abroad. + The options that came with my device included a James Bond-ish looking + acoustic coupler and handset to facilitate its connection to the + hardwired phones that are still common in European hotel rooms. + + It turns out that there was recently some discussion in the government + about exempting products like my secure phone from the licensing + paperwork requirements. Unfortunately, however, this exemption never + actually took effect. So even though the device I had was already + approved for sale abroad, I still needed to get a temporary export + license before I could take it with me. But I was assured that ``this + is an easy, routine process''. Well, sure enough, about two weeks + before I was to leave I got back my official US State Department + ``license for the temporary export of unclassified defense articles''. + So far, so good. + + From what I was able to figure out by reading the license (and having + a few conversations with an export lawyer), I'm required to leave from + an international airport with a Customs agent present (no problem + there, although Customs is geared to arriving, rather than departing, + travelers). At the airport, I'm supposed to fill out a form called a + ``shipper's export declaration'' (SED) on which I have to declare that + ``these commodities are authorized by the US government for export + only to Belgium and the United Kingdom. They may not be resold, + transshipped, or otherwise disposed of in any country, either in their + original form or incorporated into other end-items without the prior + written approval of the US Department of State''. Then I'm to present + the SED and export license to a Customs official at the airport before + I leave. The Customs officer is supposed to take my SED and endorse + my license to show what I'm actually taking out of the country. + + On the way back in, I'm supposed to ``declare'' my item at Customs + (even though it was manufactured in the US) and show them my license, + and they're supposed to endorse the license again as proof that I + have, in fact, returned the ``defense article'' to the safety of the + United States. + + The first hitch I ran into was that no one could actually tell me + where I could get an SED form. But when I called Customs they assured + me that this was no big deal. ``Just come by when you get to the + airport and we stamp the license. I guess you can just fill out the + SED there,'' they said. + + I made sure to get to the airport early anyway. + + Although there was moderately heavy traffic near the airport, I made + it to JFK two and a half hours before my 10pm flight. I was flying + United, which has their own terminal at JFK, so Customs has an office + right there in the same building from which I was to depart (JFK is + awful to get around, so I was glad for this). I checked in for my + flight (and got upgraded to first class, which bolstered my + expectation that everything was going to be really easy from here on). + Then, luggage, license and phone in hand, I made my way downstairs to + Customs, expecting to fill out the SED form and ``just have my license + stamped'' as they had assured me earlier on the telephone. I + explained my situation to the security guard who controls entry to the + Customs area, and he led me to ``the back office'' without much + argument or delay. The head uniformed Customs guy in the back office + (which I think is same office where they take the people suspected of + being ``drug mules'' with cocaine-filled condoms in their stomaches) + looked approachable enough. He had a sort of kindly, grandfatherly + manner, and he was playing a video game on a laptop computer. I got + the impression that most of the people he encounters are suspected + drug smugglers, and he seemed pleased enough to be dealing with + something a little different from the norm. When I explained what I + was doing he looked at me as if I had just announced that I was a + citizen of Mars who hadn't even bothered to obtain a visa. + + He explained, carefully, that a) I really do need the SED form; b) not + only that, I should have already filled it out, in duplicate; c) he + doesn't have blank SED forms; d) he, like everyone else in the entire + US government that I had spoken to, has no idea where one gets them + from, but people must get them from somewhere; and e) it doesn't + really matter, because I'm in the wrong place anyway. + + I asked him where the right place is. ``The cargo building, of + course,'' he told me, patiently. I remembered the cargo building + because I passed it in the taxi just as the traffic jam began, about + half an hour before I got to the United terminal. The airport shuttle + bus doesn't stop there. I'd have to call a taxi. ``But I think + they're closed now, and even if they were open you'd never make it + before your flight'' he helpfully added, saving me the trip. He also + complemented me for going to the trouble to get the license. + + I must have looked hurt and confused. Eventually he called in some + fellow in a suit who I presume to have been his boss. + + ``Are you the guy who wants to export the fancy gun?'' the fellow in + the suit asked me. + + ``It's not a gun, it's a telephone,'' I responded, with a straight + face. + + ``Why do you have a license to export a telephone?'' Good question, I + thought. I explained about the export law and showed him the thing. + He agreed that it looked pretty harmless. + + The fellow in the suit reiterated points a through e almost verbatim + (do they rehearse for these things?) and explained that this isn't + really their department, since my license was issued by the State + Department, not Customs, and my situation doesn't come up very often + because exports usually go via the cargo building. He'd love to help + me, but the computer in which these things get entered is over in + Cargo. ``That's how the records get made. But you do have a valid + license, which is nice.'' He also suggested that I would have had an + easier time had I shipped the device instead of carrying it with me. + + I asked what I should do, given that my plane was scheduled to leave + in less than an hour. Neither was sure, but the fellow in the suit + seemed willing leave it to the discretion of the uniformed guy. ``How + does this thing work, anyway?'' he asked. I explained as best as I + could, trying to make it sound as harmless as it is. ``You mean like + that Clipper chip?'' he asked. + + At this point, given that he has a computer and knows something about + the Clipper chip, I figured that maybe there was some hope of making + my flight. Or maybe I was about to spend the night in jail. In my + mind, I put it at about a 90:10 hope:jail ratio. + + Then he asked, ``Do you know about this stuff?'' + + So we chatted about computers and cryptography for a while. Finally, + the two of them decided that it wouldn't really hurt for them to just + sign the form as long as I promised to call my lawyer and get the SED + situation straightened out ASAP. They assured me that I won't be + arrested or have any other trouble upon my return. + + I made my flight, validated license in hand. + + An aside: Throughout my trip, I discovered an interesting thing about + the phone and the various options I was carrying with it. Under X-ray + examination, it looks just like some kind of bomb. (I suspect it was + the coiled handset cords). Every time I went through a security + checkpoint, I had to dig the thing out of my luggage and show it to + the guard. I almost missed the new ``Eurostar'' chunnel train (3hrs + 15mins nonstop from London to Brussels, airport-style check-in and + security) as the guards were trying to figure out whether my telephone + was likely to explode. + + Coming back to the US was less eventful, though it did take me an + extra hour or so to get through Customs. Expecting a bit of a hassle + I didn't check any luggage and made sure to be the first person from + my flight to reach the Customs line. The inspector was ready to + wordlessly accept my declaration form and send me on my way when I + opened my mouth and explained that I needed to get an export license + stamped. That was obviously a new one for him. He finally decided + that this had to be handled by something called the ``Ships Office''. + I was sent to an unoccupied back room (a different back room from + before) and told to wait. I thought about the recent Customs + experiences of Phil Zimmermann. (Zimmermann, the author of a popular + computer encryption program, was recently detained, questioned and + searched by Customs officials investigating whether he violated the + same regulations I was trying so hard to follow.) After about half an + hour, an officer came in and asked me what I needed. I explained + about my export license that had to be endorsed. She just shrugged + and told me that she had to ``process the flight'' first. As best as + I could tell, her job was to clear the airplane itself through + Customs, that being, technically speaking, a very expensive import. + It would take a little while. She was pleasant enough, though, and at + least didn't look at me as if she intended to send me to jail or have + me strip searched. + + Finally, she finished with the plane and asked me for my form. She + studied it carefully, obviously never having seen one before, and + eventually asked me what, exactly, she was supposed to do. I + explained that I had never actually gone through this process before + but I understood that she's supposed to record the fact that I was + re-importing the device and stamp my license somewhere. She told me + that she didn't know of any place for her to record this. After some + discussion, we agreed that the best thing to do was to make a Xerox + copy of my license and arrange for it to go wherever it had to go + later. She stamped the back of the license and sent me on my way. It + was a little over an hour after I first reached the Customs desk. + + My conclusion from all this is that it just isn't possible for an + individual traveler to follow all the rules. Even having gone through + the process now, I still have no idea how to obtain, let alone file, + the proper forms, even for a device that's already been determined to + be exportable. The export of export-controlled items is ordinarily + handled by cargo shipment, not by hand carrying by travelers, and the + system is simply not geared to deal with exceptions. Technically + speaking, everyone with a laptop disk encryption program who travels + abroad is in violation of the law, but since no one actually knows or + checks, no mechanism exists to deal with those who want to follow the + rules. While (fortunately) everyone I dealt with was sympathetic, no + one in the government who I spoke with was able to actually help me + follow the rules. I was permitted to leave and come back only because + everyone involved eventually recognized that my telephone was pretty + harmless, that my intentions were good, and that the best thing to do + was be flexible. If anyone had taken a hard line and tried to enforce + the letter of the law, I simply wouldn't have been able to take the + thing with me, even with my license. Had I just put my telephone in + my suitcase without telling anyone instead of calling attention to + myself by trying to follow the rules, chances are no one would have + noticed or cared. + + Unfortunately, however, these absurd rules carry the full force of + law, and one ignores them only at the risk of being prosecuted for + international arms trafficking. While it may seem far-fetched to + imagine US citizens prosecuted as arms smugglers simply for carrying + ordinary business products in their luggage, the law as written allows + the government to do just that. At the same time, anyone who is aware + of and who tries to follow the regulations is made to jump through + pointless hoops that are so obscure that even the people charged with + enforcing them don't know quite what to make of them. + + Copyright 1995 by Matt Blaze. All rights reserved. + + Electronic redistribution permitted provided this article is reproduced + in its entirety. + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + OPEN LETTER TO WIRED MAGAZINE + + By Chris Goggans (phrack@well.sf.ca.us) + + To Whom It May Concern: + + I am writing this under the assumption that the editorial staff at + Wired will "forget" to print it in the upcoming issue, so I am + also posting it on every relevant newsgroup and online discussion forum + that I can think of. + + When I first read your piece "Gang War In Cyberspace" I nearly choked on + my own stomach bile. The whole tone of this piece was so far removed + from reality that I found myself questioning what color the sky must be + in Wired's universe. Not that I've come to expect any better from Wired. + Your magazine, which could have had the potential to actually do + something, has become a parody...a politically correct art-school project + that consistently falls short of telling the whole story or making a solid + point. (Just another example of Kapor-Kash that ends up letting everyone + down.) + + I did however expect more from Josh Quittner. + + I find it interesting that so much emphasis can be placed on an issue of + supposed racial slurs as the focus of an imaginary "gang war," especially + so many years after the fact. + + It's also interesting to me that people keep overlooking the fact that + one of the first few members of our own little Legion of Doom was black + (Paul Muad'dib.) Maybe if he had not died a few years back that wouldn't + be so quickly forgotten. (Not that it makes a BIT of difference what color + a hacker is as long as he or she has a brain and a modem, or these days + at least a modem.) + + I also find it interesting that a magazine can so easily implicate someone + as the originator of the so-called "fighting words" that allegedly sparked + this online-battle, without even giving a second thought as to the damage + that this may do to the person so named. One would think that a magazine + would have more journalistic integrity than that (but then again, this IS + Wired, and political correctness sells magazines and satisfies + advertisers.) Thankfully, I'll only have to endure one month of the + "Gee Chris, did you know you were a racist redneck?" phone calls. + + It's further odd that someone characterized as so sensitive to insults + allegedly uttered on a party-line could have kept the company he did. + Strangely enough, Quittner left out all mention of the MOD member who + called himself "SuperNigger." Surely, John Lee must have taken umbrage to + an upper-middle class man of Hebrew descent so shamefully mocking him and + his entire race, wouldn't he? Certainly he wouldn't associate in any way + with someone like that...especially be in the same group with, hang out + with, and work on hacking projects with, would he? + + Please, of course he would, and he did. (And perhaps he still does...) + + The whole "racial issue" was a NON-ISSUE. However, such things make + exciting copy and garner many column inches so keep being rehashed. In + fact, several years back when the issue first came up, the statement was + cited as being either "Hang up, you nigger," or "Hey, SuperNigger," but + no one was sure which was actually said. Funny how the wording changes + to fit the slant of the "journalist" over time, isn't it? + + I wish I could say for certain which was actually spoken, but alas, I was + not privy to such things. Despite the hobby I supposedly so enjoyed + according to Quittner, "doing conference bridges," I abhorred the things. + We used to refer to them as "Multi-Loser Youps" (multi-user loops) and + called their denizens "Bridge Bunnies." The bridge referred to in the + story was popularized by the callers of the 5A BBS in Houston, Texas. + (A bulletin board, that I never even got the chance to call, as I had + recently been raided by the Secret Service and had no computer.) Many + people from Texas did call the BBS, however, and subsequently used the + bridge, but so did people from Florida, Arizona, Michigan, New York and + Louisiana. And as numbers do in the underground, word of a new place to + hang out caused it to propagate rapidly. + + To make any implications that such things were strictly a New York versus + Texas issue is ludicrous, and again simply goes to show that a "journalist" + was looking for more points to add to his (or her) particular angle. + + This is not to say that I did not have problems with any of the people + who were in MOD. At the time I still harbored strong feelings towards + Phiber Optik for the NYNEX-Infopath swindle, but that was about it. + And that was YEARS ago. (Even I don't harbor a grudge that long.) + Even the dozen or so annoying phone calls I received in late 1990 and + early 1991 did little to evoke "a declaration of war." Like many people, + I know how to forward my calls, or unplug the phone. Amazing how + technology works, isn't it? + + Those prank calls also had about as much to do with the formation of + Comsec as bubble-gum had to do with the discovery of nuclear fission. + (I'm sure if you really put some brain power to it, and consulted Robert + Anton Wilson, you could find some relationships.) At the risk of sounding + glib, we could have cared less about hackers at Comsec. If there were no + hackers, or computer criminals, there would be no need for computer + security consultants. Besides, hackers account for so little in the real + picture of computer crime, that their existence is more annoyance than + something to actually fear. + + However, when those same hackers crossed the line and began tapping our + phone lines, we were more than glad to go after them. This is one of my + only rules of action: do whatever you want to anyone else, but mess with + me and my livelihood and I will devote every ounce of my being to paying + you back. That is exactly what we did. + + This is not to say that we were the only people from the computer + underground who went to various law enforcement agencies with information + about MOD and their antics. In fact, the number of hackers who did was + staggering, especially when you consider the usual anarchy of the + underground. None of these other people ever get mentioned and those of + us at Comsec always take the lead role as the "narks," but we were far + from alone. MOD managed to alienate the vast majority of the computer + underground, and people reacted. + + All in all, both in this piece, and in the book itself, "MOD, The Gang That + Ruled Cyberspace," Quittner has managed to paint a far too apologetic piece + about a group of people who cared so very little about the networks they + played in and the people who live there. In the last 15 years that I've + been skulking around online, people in the community have always tended + to treat each other and the computers systems they voyeured with a great + deal of care and respect. MOD was one of the first true examples of a + groupthink exercise in hacker sociopathy. Selling long distance codes, + selling credit card numbers, destroying systems and harassing innocent + people is not acceptable behavior among ANY group, even the computer + underground. + + There have always been ego flares and group rivalries in the underground, + and there always will be. The Legion of Doom itself was FOUNDED because of + a spat between its founder (Lex Luthor) and members of a group called The + Knights of Shadow. These rivalries keep things interesting, and keep the + community moving forward, always seeking the newest bit of information in + a series of healthy one-upsmanship. MOD was different. They took things + too far against everyone, not just against two people in Texas. + + I certainly don't condemn everyone in the group. I don't even know + a number of them (electronically or otherwise.) I honestly believe + that Mark Abene (Phiber) and Paul Stira (Scorpion) got royally screwed + while the group's two biggest criminals, Julio Fernandez (Outlaw) and + Allen Wilson (Wing), rolled over on everyone else and walked away free + and clear. This is repulsive when you find out that Wing in particular + has gone on to be implicated in more damage to the Internet (as Posse and + ILF) than anyone in the history of the computing. This I find truly + disgusting, and hope that the Secret Service are proud of themselves. + + Imagine if I wrote a piece about the terrible treatment of a poor prisoner + in Wisconsin who was bludgeoned to death by other inmates while guards + looked away. Imagine if I tried to explain the fact that poor Jeff Dahmer + was provoked to murder and cannibalism by the mocking of adolescent boys + who teased and called him a faggot. How would you feel if I tried to + convince you that we should look upon him with pity and think of him as a + misunderstood political prisoner? You would probably feel about how I do + about Quittner's story. + + 'Hacker' can just as easily be applied to "journalists" too, and with this + piece Quittner has joined the Hack Journalist Hall of Fame, taking his + place right next to Richard Sandza. + + Quittner did get a few things right. I do have a big cat named Spud, I do + work at a computer company and I do sell fantastic t-shirts. Buy some. + + With Love, + + Chris Goggans + aka Erik Bloodaxe + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + WHEN BIGOTRY OUTPACES TECHNOLOGY + + By Douglas Welch dewelch@pop.com + + Previously published in the Los Angeles Times, Monday, December 19, 1994. + Page B15 + + Note: Electronic re-posting is ALLOWED but NO PAPER REPRINTS or inclusion + in online digests without written permission from the author. All postings + must retain this notice. + + Copyright (c) 1994 Douglas E. Welch + dewelch@pop.com + 76625,3301 + + * Communications: We need to attack the message, not the modem, to ensure + on-line services are free from censorship. + + As each new technology marches onto the scene, there are some who instantly + blame all the ills of society on it. Groups calling for the censorship of + computer networks are forgetting that it is not the technology that is + causing the problem, but the people using the technology. Instead of + targeting the authors of hate speech on the computer networks, they are + targeting the networks themselves. This only reinforces the immediate need + for on-line computer services to be protected by the federal government + as "common carriers," like telephone utilities. + + Hatemongers and bigots have always been a part of human society. Through + ignorance and bullying, they gather their flock, but it is through open + debate, education and reasoned discourse that they are best confronted. + Instead, professed anti-hate groups are attacking the providers of on-line + services in an effort to force them to remove offensive messages or prevent + their posting. Rather than using the technology to fight back and denounce + hate speech, they are seeking to remove the freedom of speech altogether. + Were the situation reversed, I am sure you would hear them decrying the + evils of censorship as loudly as they call for it now. + + Telephone companies cannot be sued when offensive or illegal calls are + placed through their systems. On-line services deserve the same kind of + "common carrier" status. There is no reason on-line services should have to + be both provider and policeman. This places them in danger of being a + censor. + + On-line users have several simpler options. They can merely ignore the + message with the press of a key or set their "kill file" to ignore + messages of certain content or from a certain user. Ultimately, on-line + services provide users the chance to engage these hatemongers in a forum + free of physical threat with hopes of liberating their narrow focus. The + immediacy of posting a response can only be found in the on-line world. + + On-line services are no passing fad. they are rapidly gaining popularity + on par with telephone and fax service. We need to stop treating on-line + services like something new and ensure that they are free from censorship + pressures. + + Censorship has always been defined as a "slipperly slope" that can easily + lead to a repression of ideas and a lower quality of life. Whether we + communicate via paper, phone lines or on-line computer services, our + freedom of speech should be protected. Hate groups should be targeted for + their messages, not how they send them. + + Douglas E. Welch is a computer consultant. He can be reached at + dewelch@pop.com. + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + LETTER FROM STEVE CASE; RE: CHILD PORN ON AOL + + By Steve Case + + Ever since we first launched America Online we've remained committed to + fostering an electronic community that provides a fun, enjoyable and + enriching experience for all members. We've asked our members to honor + the privilege of interactivity, and we've strictly enforced our Terms of + Service to help foster the kind of community of which we can all be proud. + Recently, however, some material has been brought to our attention by some + of our members which involves illegal activity -- the trading of images in + electronic mail which appear to be child pornography. Upon receiving the + material, and verifying that it was a violation of our Terms of Service, + and in all likelihood illegal, we immediately contacted the FBI and + terminated the accounts of the senders. + + While we recognize that any community around the United States with more + than 1.5 million citizens will have its share of illegal activity, we were + nonetheless disheartened to find that some members are abusing the + communications features of AOL in this way. We simply will not tolerate + such illegal activity on America Online. To anyone who may be using + America Online for illegal purposes, be advised that we will terminate the + accounts of those participating and we will notify the proper authorities + of any illegal activity that is brought to our attention. + + Our policy is that all private communications -- including e-mail, instant + messages, and private chat rooms -- are strictly private. We do not, will + not, and legally cannot monitor any private communications. But if we + are alerted to a potential offense and we are sent evidence, as we were + recently, we will vigorously pursue the matter. In this case, electronic + mail was forwarded to our attention by our members, and as recipients of + the mail we were able to turn the material over to the authorities. + + We have over 250 people who help us provide assistance in the public areas + of the service and give guidance to members who are new or who have + questions. Of late, we've had a growing problem with member-created rooms + whose title and discussion violate our Terms of Service. Member-created + rooms have always been a unique and much-valued aspect of America Online. + Often, these rooms provide the seeds for new special interest forums that + later emerge. But as more members abuse the privilege and establish rooms + that suggest illegal activity, or detract from the enjoyment of others + with offensive titles, we are faced with looking at a higher level of + safeguards as it relates to member-created rooms. We simply cannot keep + up with the sheer volume of rooms created, and as a result, from time to + time rooms that violate TOS remain open for some period of time. We're + looking at several alternatives to improve the situation. We don't want + to see our members denied the privilege of this fun and creative + interactive environment due to the abuses of a few, but at the same time + we do feel some action is warranted to safeguard this popular + "neighborhood" in our community. + + Unfortunately, this is not the first time we have encountered this + problem, nor is it unique to AOL. In 1991, we were faced with a similar + situation. At that time, we went to our members -- as we're doing now -- + advised them of the situation and asked for their help. And recently, + recognizing the potential for abuses in this emerging medium, online + service providers banded together to sponsor a "child safety" brochure + that gives parents tips and guidelines to foster a productive and safe + environment for children online. A copy of this brochure can be found in + the Parents Information Center, keyword: Parents. We encourage parents + to take the time to review it. In addition we strongly encourage parents + to monitor their children's use of this medium, much as they would any + other medium such as television, magazines, etc. We've also implemented + "parental controls" which allow parents to restrict their children's + online access. + + Each one of us needs to respect and honor the privileges of this + electronic community. If you haven't reviewed our Terms of Service, take + a few minutes now and do so. If you observe what you believe may be + illegal activity on AOL, bring it to our attention. The problem is not + widespread -- we believe only a mere fraction of this community is + involved. Let's work together to insure that America Online remains the + kind of community that you want your friends and family to enjoy. + + Thanks for your continued support. + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + diff --git a/textfiles.com/magazines/JAUC/juac12.txt b/textfiles.com/magazines/JAUC/juac12.txt new file mode 100644 index 00000000..458a8f93 --- /dev/null +++ b/textfiles.com/magazines/JAUC/juac12.txt @@ -0,0 +1,331 @@ +From dfox@fc.net Sat Jan 21 07:14:46 1995 +Received: from freeside.fc.net (freeside.fc.net [198.6.198.2]) by bigboote.WPI.EDU (8.6.9/8.6) with ESMTP id HAA18195 for ; Sat, 21 Jan 1995 07:14:45 -0500 +Received: (from dfox@localhost) by freeside.fc.net (8.6.8.1/8.6.6) id GAA10048 for mikecap@wpi.edu; Sat, 21 Jan 1995 06:11:48 -0600 +Date: Sat, 21 Jan 1995 06:11:48 -0600 +From: Malik Al-Rashim +Message-Id: <199501211211.GAA10048@freeside.fc.net> +To: mikecap@wpi.edu +Subject: JAUC-File12 +Status: O + + + + LEE HARVEY OSWALD DIED FOR YOUR SINS + + By Gordon Fagan, Conspiracy Editor (flyer@io.com) + + + With all the hubbub over the OJ Simpson trial currently getting + under way, I thought it would be a good idea to get people to rethink + their conception of what justice is about in another matter. Where there + was no trial, not even real charges - just accusations, a bullet and 30+ + years of government approved postmortem derision as an insane killer. + We've all seen the movie JFK which is probably more than most of you want + to hear on the subject in the first place, so I'll just leave each of you + - in particular, those who have no interest in the JFK assassination + conspiracy but can't get enough of that OJ, with the following... + + + + It has been said that the American people are the only jury that + Lee Harvey Oswald will ever have. It is our responsibility, then, to + examine with utmost care and objectivity the evidence for and against him, + and to reach an independent verdict - Sylvia Meagher + + + + Jim Garrison's closing statement to the jury + + State of Louisiana vs. Clay Shaw, 1969 + + May it please the court. Gentlemen of the jury: + + I know you're very tired. You've been very patient. This final + day has been a long one, so I'll speak only a few minutes. + + In his argument, Mr. Dymond posed one final issue which raises the + question of what we do when the need for justice is confronted by power. + + So, let me talk to you about a question of whether or not there + was government fraud in this case. A question Mr. Dymond seems to want us + to answer. + + A government is a great deal like a human being. It's not + necessarily all good, and it's not necessarily all bad. We live in a good + country. I love it and you do, too. Nevertheless, the fact remains that + we have a government which is not perfect. + + There have been since November the 22nd of 1963, and that was not + the last, indications that there is an excessive power in some parts of + our government. It is plain that the people have not received all of the + truth about some of the things which have happened, about some of the + assassinations which have occurred, and more particularly about the + assassination of John Kennedy. + + Going back to when we were children, I think most of us, probably + all of us in this courtroom, once thought that justice came into being of + its own accord, that that virtue was its own regard, that good would + triumph over evil. In short, that justice occurred automatically. Later, + when we found that this wasn't quite so, most of us still felt hopeful + that at least occurred frequently of its own accord. + + Today, I think that almost all of us would have to agree that + there is really no machinery, not on this earth at least, which causes + justice to occur automatically. Men still have to make it occur. + Individual human beings have to make it occur. Otherwise, it doesn't come + into existence. This is not always easy. As a matter of fact, it's + always hard, because justice presents a threat to power. In order to make + justice come into being, you often have to fight power. + + Mr. Dymond raised the question; "Why don't we say it's all a fraud + and charge the government with fraud, if that is the case?" + + Let me be explicit, then, and make myself very clar on this point. + The goverment's handling of the investigation of John Kennedy's murder was + a fraud. It was the greatest fraud in the history of our country. It + probably was the greatest fraud ever perpetrated in the history of + humankind. + + That doesn't mean that we have to accept the continued existence + of the kind of government which allows this to happen. We can do + something about it. We're not forced either to leave this country or + accept the authoritarianism that has developed. The authoritarianism that + tells us that in the year 2039 we can see the evidence about what happened + to John Kennedy. + + Government does not consist only of secret police and domestic + espionage operations and generals and admirals. Government consists of + people. It also consists of juries. And in the cases of murder, whether + the poorest individual or the most distinguished citizen in the land, + should be looked at openly in a court of law, where juries can pass on + them and not be hidden, not be buried like the body of the victim beneath + concrete for countless years. + + You men in recent weeks have heard witnesses that no one else in + the world has heard. You've seen the Zapruder film. You've seen what + happened to your President. I suggest to you that you know right now + that, in that area at least, a fraud has been perpetrated. + + That does not mean that our government is entirely bad - and I + want to emphasize that. It does mean, however that in recent years, + through the development of excessive power because of the Cold War, forces + have developed in our government over which there is no control and these + forces have an authoritarian approach to justice; meaning, they will let + you know what justice is. + + Well, my reply to them is that we already know what justice is. + It is the decision of the people passing on the evidence. It is the jury + system. In the issue which is posed by the government's conduct in + concealing the evidence in this case, in the issue of humanity as opposed + to power, I have chosen humanity, and I will do it again without + hesitation. I hope every one of you will do the same. I do this because + I love my country and because I want to communicate to the government that + we will not accept unexplained assassinations with the casual information + that if we live seventy-five years longer, we might be given more + evidence. + + In this particular case, massive power was brought to bear to + prevent justice from ever coming into the courtroom. The power to make + authoritarian pronouncements, the power to manipulate the news media by + the release of false information, the power to interfere with an honest + inquiry and the power to provide an endless variety of experts to testify + in behalf of that power, repeatedly was demonstrated in this case. + + The American people have yet to see the Zapruder film. Why? The + American people have yet to see and hear from real witnesses to the + assassination. Why? Because, today in America too much emphasis is given + to secrecy, with regard to the assassination of our President, and not + enough emphasis is given to the question of justice and to the question of + humanity. + + These dignified deceptions will not suffice. We have had enough + of power without truth. We don't have to accept power without truth or + else leave the country. I don't accept power without truth or else leave + the country. I don't accept either of these two alternatives. I don't + intend to leave the country and I don't intend to accept power without + truth. + + I intend to fight for the truth. I suggest that not only is this + not un-American, but it is the most American thing we can do, because if + truth does not endure, then our country will not endure. + + In our country the worst of all crimes occurs when the government + murders truth. If it can murder truth, it can murder freedom. If it can + murder freedom it can murder your own sons, if they should dare to fight + for freedom, and then it can announce that they were killed in an + industrial accident, or shot by the "enemy" or God knows what. + + In this case, finally, it has been possible to bring the truth + about the assassination into a court of law, not before a commission + composed of important and politically astute men, but before a jury of + citizens. + + Now, I suggest to you that yours is a hard duty, because in a + sense what you're passing on is the equivalent to a murder case. The + difficult thing about passing on a murder case is that the victim is out + of your sight and buried a long distance away, and all you can see is the + defendant. It's very difficult to identify with someone you can't see, + and sometimes it's hard not to identify to some extent with the defendant + and his problems. + + In that regard, every prosecutor who is at all humane is concious + of feeling sorry for the defendant in every case he prosecutes. But he is + not free to forget the victim who lies buried out of sight. I suggest to + you that, if you do your duty, you also are not free to forget the victim + who is buried out of sight. + + Tennyson once said that "authority forgets a dying king." This + was never more true than in the murder of John Kennedy. The strange and + deceptive conduct of the government after his murder began while his body + was still warm, and has continued for five years. You have even seen in + this courtroom indications of interest of part of the government power + structure in keeping truth down, in keeping the grave closed. + + We presented a number of eyewitnesses as well as an expert witness + as well as the Zapruder film, to show that the fatal wound of the + President came from the front. A plane landed from Washington and out + stepped Dr. Finck for the defense, to counter the clear and apparent + evidence of a shot from the front. I don't have to go into Dr. Finck's + testimony in detail for you to show that it simply does not correspond to + the facts. He admitted that he did not complete the autopsy because a + general told him to not complete the autopsy. + + In this conflict between power and justice, to put it that way, + just where do you think Dr. Finck stands? A general who is not a + pathologist, told him not to complete the autopsy, so he didn't complete + it. This is not the way I want my country to be. When our president is + killed he deserves the kind of autopsy that the ordinary citizens get + every day in the state of Louisana. And the people deserve the facts + about it. We can't have the government power suddenly interjecting itself + and preventing the truth from coming to the people. + + Yet, in this case, before the sun rose the next morning, power had + moved into the situation and the truth was being concealed. And now, five + years later in this courtroom the power of the government in concealing + the truth is continuing in the same way. + + We presented eyewitnesses who told you of the shots coming from + the grassy knoll. A plane landed from Washington, and out came ballistics + expert Frazier for the defense. Mr. Frazier explanation of the sound of + the shots coming frm the front, which was heard by eyewitness after + eyewitness, was that Lee Oswald created a sonic boom in his firing. Not + only did Oswald break all of the world's records for marksmanship, but he + broke the sound barrier as well. + + I suggest to you, that if any of you have shot on a firing range, + and most of you probably in the service, you were shooting rifles in which + the bullet travelled faster than the speed of sound. I ask you to recall + if you ever heard a sonic boom. If you remember when you were on the + firing line, and they would say, "ready on the left - ready on the right - + ready on the firing line - commence firing," you heard the shots coming + from the firing line, to the left of you and to the right of you. If you + had heard as a result of Mr. Frazier's fictional sonic boom, firing coming + at you from the pits, you would have had a reaction which you would still + remember. + + Mr. Frazier's sonic boom simply doesn't exist. It's a part of the + fraud, a part of the continuing government fraud. + + The best way to make this country the kind of country it's + supposed to be is to communicate to the government that no matter how + powerful it may be, we do not accept these frauds. We do not accept these + false announcements. We do not accept the concealment of evidence with + regard to the murder of President Kennedy. + + Who is the most believable? A Richard Randolph Carr, seated here + in a wheelchair and telling you what he saw and what he heard and how he + was told to shut his mouth, or Mr. Frazier and his sonic booms? + + Do we really have to actually reject Mr. Newman and Mrs. Newman + and Mr. Carr and Roger Craig and the testimony of all those honest + witnesses, reject all this and accept the fraudulent Warren Commission, or + else leave the country? + + I suggest to you that there are other alternatives. Once of them + has been put in practice in the last month in the State of Louisiana, and + that is to bring out the truth in a proceeding where attorneys can + cross-examine, where the defendant can be confronted by testimony against + him, where the rules of evidence are applied and where a jury of citizens + can pass on it, and where there is no government secrecy. Above all, + where you do not have evidence concealed for seventy-five years in the + name of "national security." + + All we have in this case are the facts. Facts which show that the + defendant participated in the conspiracy to kill the President and that + the President was subsequently killed in an ambush. + + The reply of the defense has been the same as the early reply of + the government in the Warren Commission. It has been authority, + authority, authority. The President's seal outside of each volume of the + Warren Commission Report, made necessary because there is nothing inside + these volumes. Men of high position and prestige sitting on a board, and + announcing the results to you, but not telling you what the evidence is, + because the evidence has to be hidden for seventy-five years. + + You heard in this courtroom in recent weeks, eyewitness after + eyewitness after eyewitness and, above all, you saw one eyewitness which + was indifferent to power, the Zapruder film. The lens of the camera is + totally indifferent to power and it tells what happened as it saw it + happen, and that is one of the reasons 200 million Americans have not seen + the Zapruder film. They should have seen it many times. They should know + exactly what happened. They all should know what you know now. + + Why hasn't all of this come into being if there hasn't been + government fraud? Of course there has been fraud by the government. + + But I'm telling you now that I think we can do something about it. + I think that there are still enough Americans left in this country to make + it continue to be America. I think that we can still fight + authoritarianism, the government's insistence on secrecy, government force + used in counterattacks against an honest inquiry, and when we do that, + we're not being un-American, we're being American. It isn't easy. You're + sticking your neck out in a rather permanent way, but it has to be done + because truth does not come into being automatically. Justice does not + happen automatically. Individual men, like the members of my staff here, + have to work and fight to make it happen, and individual men like you have + to make justice come into being because otherwise it doesn't happen. + + What I'm trying to tell you is that there are forces in America + today, unfortunately, which are not in favor of the truth coming out about + John Kennedy's assassination. As long as our government continues to be + like this, as long as such forces can get away with such actions, then + this is no longer the country in which we were born. + + The murder of John Kennedy was probably the most terrible moment + in the history of our country. Yet, circumstances have placed you in the + position where not only have you seen the hidden evidence but you are + actually going to have the opportunity to bring justice into the picture + for the first time. + + Now, you are here sitting in judgement on Clay Shaw. Yet you, as + men, represent more than jurors in an ordinary case because the victims in + this case. You represent, in a sense, the hope of humanity against + government power. You represent humanity, which yet may triumph over + excessive government power. If you will cause it to be so, in the course + of doing your duty in this case. + + I suggest that you ask not what your country can do for you but + what you can do for your country. + + What can you do for your country? You can cause justice to happen + for the first time in this matter. You can help make our country better + by showing that this is still a government of the people. And if you do + that, as long as you live, nothing will ever be more important. + + --------------------------- + + Since you read all the way through, you might be interested in + more information. You can check out alt.conspiracy.jfk at your favourite + USENET site and see the still active coverup covering up. Now including a + phoney "Oswald did it alone" FAQ posting from a .mil address. The + internet equivalent to Gerald Posner's "Case Closed." Though less well + written, it includes about the same amount of real research. There are + some good people on the newsgroup as well and they have a large and + growing body of info on display regularly. Another excellent source is + the web site for Fair Play magazine: http://www.kaiwan.com/~ljg/fp.html + + -31 and counting- + + + + diff --git a/textfiles.com/magazines/JAUC/juacind.txt b/textfiles.com/magazines/JAUC/juacind.txt new file mode 100644 index 00000000..c0740185 --- /dev/null +++ b/textfiles.com/magazines/JAUC/juacind.txt @@ -0,0 +1,158 @@ +From dfox@fc.net Wed Jan 18 09:39:47 1995 +Received: from freeside.fc.net (freeside.fc.net [198.6.198.2]) by bigboote.WPI.EDU (8.6.9/8.6) with ESMTP id JAA11992 for ; Wed, 18 Jan 1995 09:39:46 -0500 +Received: (from dfox@localhost) by freeside.fc.net (8.6.8.1/8.6.6) id IAA20555 for mikecap@wpi.edu; Wed, 18 Jan 1995 08:36:40 -0600 +Date: Wed, 18 Jan 1995 08:36:40 -0600 +From: JAUC +Message-Id: <199501181436.IAA20555@freeside.fc.net> +To: mikecap@wpi.edu +Subject: JAUC-INDEX +Status: OR + + THERE ARE 13 FILES (INCLUDING THIS TITLE) IN THIS ISSUE... PLEASE ALLOW + 3 DAYS BEFORE COMPLAINING ABOUT NOT RECEIVING THEM. THANK YOU. + + ======================================================================= + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Quarterly + ====================================================================== + ISSN 1074-3111 Volume One, Issue Seven January 17, 1994 + ====================================================================== + + Editor-in-Chief: Scott Davis (dfox@fc.net) + Co-Editor/Technology: Max Mednick (kahuna@fc.net) + Conspiracy Editor: Gordon Fagan (flyer@io.com) + Information Systems: Carl Guderian (bjacques@usis.com) + Legal Editor Steve Ryan (blivion@sccsi.com) + Computer Security: George Phillips (ice9@paranoia.com) + Graphics/WWW Design Mario Martinez (digital@comland.com) + + ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC + ** ftp site: ftp.fc.net /pub/tjoauc + + U.S. Mail: + The Journal Of American Underground Computing + or Fennec Information Systems + 10111 N. Lamar - Suite 25 + Austin, Texas 78753-3601 + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + IMPORTANT ADDRESSES - + ============================================================================ + To Subscribe to "TJOAUC", send mail to: sub@fennec.com + All questions/comments about this publication to: comments@fennec.com + Send all articles/info that you want published to: submit@fennec.com + Commercial Registration for Profitable Media: form1@fennec.com + ============================================================================ + + "The underground press serves as the only effective counter to a growing + power, and more sophisticated techniques used by establishment mass media + to falsify, misrepresent, misquote, rule out of consideration as a priori + ridiculous, or simply ignore and blot out of existence: data, books, + discoveries that they consider prejudicial to establishment interest..." + + (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + Contents Copyright (C) 1995 The Journal Of American Underground Computing + and/or the author of the articles presented herein. All rights reserved. + Nothing may be reproduced in whole or in part without written permission + of the Editor-In-Chief and/or the author of the article. This publication + is made available periodically to the amateur computer hobbyist free of + charge. Any commercial usage (electronic or otherwise) is strictly + prohibited without prior consent of the Editor, and is in violation of + applicable US Copyright laws. To subscribe, send email to sub@fennec.com + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + DISCLAIMER AND NOTICE TO DISTRIBUTORS - + + NOTE: This electronic publication is to be distributed free of charge + without modifications to anyone who wishes to have a copy. Under NO + circumstances is any issue of this publication, in part or in whole, + to be sold for money or services, nor is it to be packaged with other + computer software, including, but not limited to CD Rom disks, without + the express written or verbal consent of the author and/or editor. + To obtain permission to distribute this publication under any of the + certain circumstances stated above, please contact the editor at one of + the addresses above. If you have intentions of publishing this journal + in any of the ways described above, or you are in doubt about whether or + not your intentions conflict with the restrictions, please contact the + editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com + This publication is provided without charge to anyone who wants it. + This includes, but is not limited to lawyers, government officials, + cops, feds, hackers, social deviants, and computer hobbyists. If anyone + asks for a copy, please provide them with one, or mail the subscription + list so that you may be added. + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + TABLE OF CONTENTS + + [File #1:] + Is There A Santa Claus Unknown + What Do People Think Unknown + .SIG Heil K. K. Campbell + WWW - The Junkyard Of The Internet Ram Samudrala + Austin (Tx) Zeen Scene Josh Ronsen + Object Technology In Cyberspace Chris Hand + + [File #2] + Deadkat Deadkat + EFF Personnel Announcement Stanton McCandlish + Reader Feedback Our Reader(s) + Call Security / Voice Crypto FAQ Neil Johnson + There's A Body On The Internet Uncle Bob's NN #103 + + [File #3] + Windows And TCP/IP For Internet Access Harry Kriz + + [File #4] + Windows And TCP/IP For Internet Access (Cont...) Harry Kriz + + [File #5] + Say What? Libel And Defamation On The Internet Eric Eden + Jacking In From The "Back From The Dead" Port Brock Meeks + Announcing Slipknot Felix Kramer + + [File #6] + Telecommunications Security Howard Fuhs + + [File #7] + Old Freedoms And New Technologies Jay Weston + Information Superhighway: Reality Reid Goldsborough + Internet Tools Summary John December + LOD T-Shirts Chris Goggans + + [File #8] + Interview With Erik Bloodaxe (Chris Goggans) Netta Gilboa + + [File #9] + Review Of Slipknot 1.0 Scott Davis + cDc GDU #18 Swamp Ratte + My Letter To Wired Magazine Scott Davis + + [File #10] + Caller ID FAQ Padgett Peterson + The Pentium Bug War Ends As We Know It James/Ted Barr + Pentium Non-Disclosure Agreement Of Dr. Nicely Thomas Nicely + The Computer Nevermore [A Late Christmas Tale] Unknown + Twas The Night Before Star Trek [Another One] Unknown + Santa Claus Source Code [The Last Late X-Mas Tale] Unkown + + [File #11] + My Life As An International Arms Courier Matt Blaze + An Open Letter To Wired Magazine Chris Goggans + When Bigotry Outpaces Technology Douglas Welch + Letter From Steve Case: Child Porn On AOL Steve Case + + [File #12] + Lee Harvey Oswald Died For Your Sins Gordon Fagan + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + diff --git a/textfiles.com/magazines/JAUC/readme.phk b/textfiles.com/magazines/JAUC/readme.phk new file mode 100644 index 00000000..b88a2051 --- /dev/null +++ b/textfiles.com/magazines/JAUC/readme.phk @@ -0,0 +1,10 @@ + +Thanks for downloading The Journal Of American Underground Computing. +We are sure that you will enjoy this issue. Below are some addresses +that may be helpful if you wish to send feedback. + + To Subscribe to "TJOAUC", send mail to: sub@fennec.com + All questions/comments about this publication to: comments@fennec.com + Send all articles/info that you want published to: submit@fennec.com + Mail to all of the editors of the magazine: editors@fennec.com + \ No newline at end of file diff --git a/textfiles.com/magazines/JOAUC.1 b/textfiles.com/magazines/JOAUC.1 new file mode 100644 index 00000000..ab570f1a --- /dev/null +++ b/textfiles.com/magazines/JOAUC.1 @@ -0,0 +1,20 @@ + +T E X T F I L E S + +

+The Journal of American Undergound Computing (1994) +

+

+ + +
+
Filename +Size +Description of the Textfile
jauc01.txt 41501
The Journal of American Undergound Computing by Scott Davis #1 (March 19, 1994) +
jauc02.txt 151511
The Journal of American Undergound Computing by Scott Davis #2 (April 4, 1994) +
jauc03.txt 162068
The Journal of American Undergound Computing by Scott Davis #3 (April 30, 1994) +
jauc04.txt 161755
The Journal of American Undergound Computing by Scott Davis #4 (June 7, 1994) +
jauc05.txt 129878
The Journal of American Undergound Computing by Scott Davis #5 (August 1, 1994) +
jauc06.txt 292484
The Journal of American Undergound Computing by Scott Davis #6 (October 1, 1994) +
jauc07.txt 423078
The Journal of American Undergound Computing by Scott Davis #7 (January 7, 1994) +

There are 7 files for a total of 1,362,275 bytes.
\ No newline at end of file diff --git a/textfiles.com/magazines/JOAUC/.windex.html b/textfiles.com/magazines/JOAUC/.windex.html new file mode 100644 index 00000000..b123627f --- /dev/null +++ b/textfiles.com/magazines/JOAUC/.windex.html @@ -0,0 +1,20 @@ + +T E X T F I L E S + +

+The Journal of American Undergound Computing (1994) +

+

+ + +
+
Filename +Size +Description of the Textfile
jauc01.txt 41501
The Journal of American Undergound Computing by Scott Davis #1 (March 19, 1994) +
jauc02.txt 151511
The Journal of American Undergound Computing by Scott Davis #2 (April 4, 1994) +
jauc03.txt 162068
The Journal of American Undergound Computing by Scott Davis #3 (April 30, 1994) +
jauc04.txt 161755
The Journal of American Undergound Computing by Scott Davis #4 (June 7, 1994) +
jauc05.txt 129878
The Journal of American Undergound Computing by Scott Davis #5 (August 1, 1994) +
jauc06.txt 292484
The Journal of American Undergound Computing by Scott Davis #6 (October 1, 1994) +
jauc07.txt 423078
The Journal of American Undergound Computing by Scott Davis #7 (January 7, 1994) +

There are 7 files for a total of 1,362,275 bytes.
diff --git a/textfiles.com/magazines/JOAUC/jauc01.txt b/textfiles.com/magazines/JOAUC/jauc01.txt new file mode 100644 index 00000000..56759f86 --- /dev/null +++ b/textfiles.com/magazines/JOAUC/jauc01.txt @@ -0,0 +1,1582 @@ + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Quarterly + + =================================================================== + + ISSN 1074-3111 Volume One, Issue One March 19, 1994 + + =================================================================== + + + + Editor-in-Chief: Scott Davis + + NetSurfer: John Logan + + It's A Conspiracy!: Gordon Fagan + + + + E-Mail - editors@fennec.com + + ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC + + + + U.S. Mail: + + The Journal Of American Underground Computing + + 10111 N. Lamar #25 + + Austin, Texas 78753 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + To Subscribe to "TJOAUC", send mail to: sub@fennec.com + + All questions/comments about this publication to: comments@fennec.com + + Send all articles/info that you want published to: submit@fennec.com + + Commercial Registration for Profitable Media: form1@fennec.com + + + + "The underground press serves as the only effective counter to a growing + + power, and more sophisticated techniques used by establishment mass media + + to falsify, misrepresent, misquote, rule out of consideration as a priori + + ridiculous, or simply ignore and blot out of existence: data, books, + + discoveries that they consider prejudicial to establishment interest..." + + + + (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Contents Copyright (C) 1994 The Journal Of American Underground Computing + + and/or the author of the articles presented herein. All rights reserved. + + Nothing may be reproduced in whole or in part without written permission + + of the Editor-In-Chief and/or the author of the article. This publication + + is made available quarterly to the amateur computer hobbyist free of charge. + + Any commercial usage (electronic or otherwise) is strictly prohibited + + without prior consent of the Editor, and is in violation of applicable + + US Copyright laws. To subscribe, send email to sub@fennec.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + DISCLAIMER AND NOTICE TO DISTRIBUTORS - + + + + NOTE: This electronic publication is to be distributed free of charge + + without modifications to anyone who wishes to have a copy. Under NO + + circumstances is any issue of this publication, in part or in whole, + + to be sold for money or services, nor is it to be packaged with other + + computer software, including, but not limited to CD Rom disks, without + + the express written or verbal consent of the author and/or editor. + + To obtain permission to distribute this publication under any of the + + certain circumstances stated above, please contact the editor at one of + + the addresses above. If you have intentions of publishing this journal + + in any of the ways described above, or you are in doubt about whether or + + not your intentions conflict with the restrictions, please contact the + + editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com + + + + This publication is provided without charge to anyone who wants it. + + This includes, but is not limited to lawyers, government officials, + + cops, feds, hackers, social deviants, and computer hobbyists. If anyone + + asks for a copy, please provide them with one, or mail the subscription + + list so that you may be added. + + + + The articles and information printed herein are the property of the author + + and / or The Journal Of American Underground Computing. An electronic mail + + address of the author will be provided when made available to us so that you + + can contact the author with your comments. No article in this publication + + can be reprinted without the permission of the author / editor. Any attempt + + to do so will be in direct violation of United States Copyright laws. + + Any attempt to sell this publication in part or in whole, on CD Rom or + + while packaged with any other software bundle without the express consent + + of the editor is also a direct violation of United States Copyright laws. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 1 + + + + TABLE OF CONTENTS + + + + 1) Introduction To TJOAUC Editors + + 2) Control Of Information In The Mass Media Gordon Fagan + + 3) Some Thoughts On Clipper, NSA, ... Jim Bidzos + + 4) CIA Corrupt, Stupid, Should Be Abolished Mark Lane + + 5) Legion Of Doom T-Shirts...get 'em!! Chris Goggans + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Introduction To The Journal Of American Underground Computing + + + + By The Editors (editors@fennec.com) + + + + First of all, I want to personally thank you for taking the time + + to read this electronic publication. The editors of this publication had a + + large hand in The World View Magazine, a publication that became defunct as + + of January 1, 1993. We had become stagnant with that publication, so we + + jointly agreed to ditch it. Since then, we have received hundreds of + + subscription requests for the magazine. After consulting with each other + + for several months, we have decided to do a "new-and-improved" version of + + that popular magazine...but under a different name. And in a more official + + capacity I might add. So here it is...Issue one, Volume one. The format for + + this magazine is totally undefined. The decision to do it this way is better + + than focusing on a certain area in the sense that we can cover anything and + + everything...and people will not be suprised when they see an article that + + is "out of character". Also, I hope that it will inspire people to write + + about whatever they feel intimate with...be it politics, computer networking, + + hacking, etc...or any remote aspect of such topics. So please read on, and + + keep in mind that we encourage you to comment on anything you agree with, + + disagree with, like, dislike, etc...we will print comments like that. + + Your input is necessary. Thanks for reading, and enjoy. A special thanks + + goes to "The Spotlight", a weekly publication in our nation's capital for + + permission to reprint, etc...Thanks to Don Markey! + + + + Editors + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CONTROL OF INFORMATION IN THE MASS MEDIA + + + + By Gordon Fagan (fagang@ccmail.us.dell.com) + + + + + + The Public's right to know is not always what the Public ends up + + getting. The Public frequently gets one-sided, biased information + + and not just from the mass media. It's easy to have a long arm that + + protects the special interest groups: this kind of a "one world + + family" of insiders that is capable of affecting federal judges, + + U.S. attorneys, to slant or obstruct justice, to hide or cover up + + crucial information, and to interfere with our liberties. + + + + There has been a major campaign on the part of the Central + + Intelligence Agency to place Central Intelligence Agency agents, in + + various news media posts. Documents have been found on this. It was + + called "Operation Mocking Bird". They placed operatives in places + + like TIME Magazine and LIFE Magazine, the New York Times, inside CBS + + and ABC News. The National Student Association and other student + + groups were also targeted. + + + + Originally, the intent of "Operation Mocking Bird" was to make + + certain that these major media outlets and student organizations + + reflected an adequately anti-communist perspective. And then, of + + course, as they became entrenched and in-place, any time the Central + + Intelligence Agency wanted a story killed or distorted they would + + contact their agents inside. They have bragged openly in private + + memos back and forth inside the Agency about how proud they are of + + having very important "assets" inside virtually every major news + + media in the United States. + + + + For example, the Chief National Security Correspondent for TIME + + Magazine, Bruce Van Voorst, is a regular Central Intelligence + + Agency officer. It turns out that Ben Bradlee from the Washington + + Post was a regular Central Intelligence Agency officer prior to + + coming to his post at the Washington Post. Bob Woodward at the + + Washington Post was the Point-Briefer for U.S. Naval Intelligence + + of the Joint Chiefs-of-Staff before he went over to the Washington + + Post. What we're told in the media (and what we're told officially + + from Government sources) and what is the truth are frequently at + + varying degrees against each other. + + + + We find these people constantly in the news media. When the New + + York Times was refusing to print any information about Oliver North, + + Richard Secord, Albert Hakim and Rob Owen, and all of the other men + + who, throughout 1985 and 1986, were engaged in a massive criminal + + conspiracy to violate the Boland Amendment prohibiting any weapons + + shipments to the Contras, and who were involved in smuggling TOW + + missiles to Iran. Keith Schneider, who was one of the reporters + + assigned to look into the issue, said that the Times was refusing to + + print any of it because their high-level sources inside the Central + + Intelligence Agency refused to confirm the stories. + + + + This kind of relationship between self-conscious "assets" of the + + Covert Operations Director of the Central Intelligence Agency is a + + political police force on an international level to protect the + + ostensible economic interests of United States industries by placing + + these people inside a news media which, under the First Amendment, + + ostensibly has the responsibility to critique and investigate + + potential injustices on the part of the State, inside the Government + + is an extraordinarily dangerous development here in the United States. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Article printed with permission of the author, Jim Bidzos + + Jim Bidzos is the President and CEO of RSA Data Security, and is a + + well respected authority in the area of security and encryption. + + + + SOME THOUGHTS ON CLIPPER, NSA, AND ONE KEY ESCROW ALTERNATIVE + + + + By Jim Bidzos (bidzos@rsa.com) + + + + In a recent editorial, Dr. Dorothy Denning of Georgtown University + + argued in support of the U.S. government's proposed Clipper Chip, a + + security device that would allow law enforcement to decipher the + + communications of users of such devices. + + + + Dr. Denning attempts to argue that Clipper is necessary for law + + enforcement agencies to be able to do their job. I'm not going to + + argue that one; there are plenty of people who can argue that + + compromising privacy for all citizens in order to aid law enforcement + + is a bad idea more effectively than I, particularly in the Clipper + + case, where the arguments from law enforcement are dubious at best. + + (The current justification is inadequate; there may be better reasons, + + from a law enforcement perspective, but we haven't heard them yet.) + + + + Without doubt, law enforcement and intelligence are huge stakeholders + + in the debate over encryption. But every individual and corporation in + + the U.S. must be included as well. Are NSA's actions really in the + + best interests of all the stakeholders? Are there alternatives to the + + current key escrow program? + + + + If one steps back and looks at what has happened over the last few + + years, one might well question the government's approach with Clipper, + + if not its motivation, for dealing with this problem. (I believe it + + may even be possible to conclude that Clipper is the visible portion + + of a large-scale covert operation on U.S. soil by NSA, the National + + Security Agency.) Over a number of years, through their subversion of + + the Commerce Department (who should be championing the causes of U.S. + + industry, not the intelligence agencies), NSA has managed to put many + + U.S. government resources normally beyond their control, both legally + + and practically, to work on their program of making U.S. and + + international communications accessible. + + + + The first step was the MOU (Memorandum of Understanding) between the + + Commerce Department's National Institute of Standards and Technology + + (NIST) and the Defense Department's NSA. This document appears to + + contravene the provisions of the Computer Security Act of 1987, the + + intent of which was to give NIST control over crypto standards-making + + for the unclassified government and commercial sectors. The MOU + + essentially gave NSA a veto over any proposals for crypto standards by + + NIST. + + + + By using the standards making authority of NIST, NSA is attempting to + + force the entire U.S. government to purchase Clipper equipment since + + only NIST-standard equipment may be purchased by government agencies. + + This purchasing power can then be used to force U.S. manufacturers to + + build Clipper products or risk losing government business. (GSA is + + currently questioning NSA's authority to control government-wide + + procurement, and should continue to do so.) This of course not only + + subsidizes Clipper products, but could make Clipper a de facto + + standard if the costs associated with alternatives are too high. + + These costs to industry, of ignoring Clipper, come in the form of lost + + government market share, costly support for multiple versions of + + incompatible products, and non-exportability of non-Clipper products. + + + + It also appears that NSA is desperately seeking a digital signature + + standard that would force users to take that signature capability + + wrapped up with a Clipper chip. If this is the case, as it appears to + + be, then NSA has is trying to use what is probably the most powerful + + business tool of the information age as a means to deny us its + + benefits unless we subsidize and accept Clipper in the process. This + + would, if true, be an unprecedented abuse of government power to + + influence U.S. industry and control individual privacy. (Clipper is + + part of a chip called Capstone, which is where their proposed digital + + signature standard would be used.) + + + + The overall cost of these policies is unknown. We only know that NSA + + has spent a considerable amount of money on the program directly. + + Other costs are not so obvious. They are: + + + + - A burdened U.S. industry, which will have to build multiple products + + or more expensive products that support multiple techniques; + + + + - A low-intensity "trade war" with the rest of the world over + + encryption; + + + + - Lost sales to U.S. companies, since international buyers will surely + + go to non-U.S. suppliers for non- Clipper encryption, as may buyers in + + the U.S.; + + + + - Potential abuses by government and loss of privacy for all citizens. + + + + Does NSA truly believe they can displace other methods with Clipper? + + With over three million licensed, documented RSA products, the + + technology they feel threatened by, in use in the U.S. today? Not + + likely; therefore, they have already decided that these costs are + + acceptable even if they only delay the inevitable, and that U.S. + + industry and U.S. taxpayers should bear these costs, whatever they + + are. This policy was apparently developed by unelected people who + + operate without oversight or accountability. Does the White House + + really support this policy? + + + + It has been reported that NSA is attempting to gain support from + + foreign governments for escrow technology, especially if "local + + control" is provided. Even if NSA can convince their sister + + organizations around the world to support key escrow (by offering + + Clipper technology with a do-your-own-escrow option), will these other + + organizations succeed in selling it to their government, industry and + + citizens? Most countries around the world have much stronger privacy + + laws and a longer history of individual privacy than the U.S. + + + + WHY AGAIN WHEN IT DIDN'T WORK THE FIRST TIME? + + + + Many seem to have forgotten or are not aware that the Clipper program + + is not new, and it's also not the first time NSA has attempted to + + force communications security on U.S. industry that it could + + compromise. In the mid-80's, NSA introduced a program called the + + Commercial COMSEC Endorsement Program, or CCEP. CCEP was essentially + + Clipper in a black box, since the technology was not sufficiently + + advanced to build lower-cost chips. Vendors would join CCEP (with the + + proper security clearances) and be authorized to incorporate + + classified algorithms into communications systems. NSA had proposed + + that they themselves would actually provide the keys to end-users of + + such systems. The new twist is access by key escrow. + + + + To see how little things have changed, consider this quote: "...RSA + + Data Security, Inc. asserts that since CCEP-2 is not published and + + therefore cannot be inspected by third parties, the NSA could put a + + 'trap door' in the algorithm that would enable the agency to inspect + + information transmitted by the private sector. When contacted, NSA + + representative Cynthia Beck said that it was the agency's policy not + + to comment on such matters." That was in 1987. ("The Federal Snags in + + Encryption Technology," Computer and Communications Decisions, July + + 1987, pp. 58-60.) + + + + To understand NSA's thinking, and the danger of their policies, + + consider the reply of a senior NSA official when he was asked by a + + reporter for the Wall Street Journal if NSA, through the CCEP program, + + could read anyone's communications: "Technically, if someone bought + + our device and we made the keys and made a copy, sure we could listen + + in. But we have better things to do with our time." (The Wall Street + + Journal, March 28, 1988, page 1, column 1, "A Supersecret Agency Finds + + Selling Secrecy to Others Isn't Easy," by Bob Davis.) Another NSA + + official, in the same Journal story, said "The American Public has no + + problem with relying on us to provide the technology that prevents the + + unauthorized launch of nuclear weapons. If you trust us to protect + + against that, you can trust us to protect private records." Remember + + that the Cold War was still on at that time. + + + + Law enforcement and intelligence gathering are certainly impeded by + + the use of cryptography. There are certainly legitimate concerns that + + these interests have. But is the current approach really the way to + + gain support from industry and the public? People with a strong + + military and intelligence bias are making all the decisions. There + + seem to be better ways to strike a balance. + + + + AN ALTERNATIVE PROPOSAL + + + + One approach would be to have NIST develop a standard with three + + levels. The first level could specify the use of public-key for key + + management and signatures without any key escrow. There could be a + + "Level II" compliance that adds government key escrow to message + + preparation. "Level III" could be key escrow controlled by the user, + + typically a corporation. Would this work? The first level, meeting + + the standard by itself, would back up the government's claim that key + + escrow is voluntary; if I want privacy and authentication without key + + escrow, then I can have it, as the government has claimed I can. + + Actions speak louder than words. + + + + Why would any vendors support Level II? There would be several + + reasons. They would find a market in the government, since the + + government should purchase only Level II products. (I would certainly + + like our public servants to use key escrow, just as I want work + + product paid for by my corporation to be accessible. Of course, anyone + + can buy Level I products for home and personal use.) So the + + government can still influence the private sector by buying only + + products that include Level II compliance. Also, Level II products + + would be decontrolled for export. This way the market can decide; + + vendors will do what their customers tell them to. This satisifies + + the obvious desire on the part of the government to influence what + + happens with their purchasing power. + + + + Level III would allow any user to insert escrow keys they control into + + the process. (Level II would not be a prerequisite to Level III.) My + + company may want key escrow; I, as an individual, may want to escrow + + my keys with my attorney or family members; a standard supporting + + these funtions would be useful. I don't necessarily want or need the + + government involved. + + + + NIST already knows how to write a FIPS that describes software and + + hardware implementations, and to certify that implementations are + + correct. + + + + This approach cetainly isn't perfect, but if the administration really + + believes what it says and means it, then I submit that this is an + + improvement over a single key escrow FIPS foisted on everyone by NSA, + + and would stand a much better chance of striking a workable balance + + between the needs of the government and the right of individuals to + + privacy. Therefore, it RISKS much less than the current plan. + + + + The real problem with the way NSA works is that we don't find out what + + they're really doing and planning for decades, even when they're + + wrong. What if they are? + + + + In the 60's and 70's, the CIA was out of control, and the Congress, + + after extensive hearings that detailed some of the abuses of power by + + the CIA, finally moved to force more accountability and oversight. In + + the 80's and 90's, NSA's activities should be equally scrutinized by a + + concerned Congress. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SYSOPS: CAN YOU GO TO JAIL ? + + + + By Jeff A. Heyens + + Additional Comments By chris@eastern.eastern.com + + + + We have a new problem. Everyone knows that lately there has + + been a crackdown on Bulletin Boards which carry pornography, + + pirated software, etc. There is, however, a new and much more + + powerful threat which is threatening to stop all privately run + + BBS's. + + + + The Canadian Radio and Telecommunications Commission (CRTC) + + is currently in the process of setting itself up to regulate + + Public bulletin boards. They want to make it an offense to run a + + BBS without a CRTC license. If licensing comes into effect, the + + BBS scene will quite literally shrivel up and die. + + + + Consider the example of radio in the 40's and 50's. Before + + the CRTC was formed, anyone could broadcast radio signals legally + + from their home on any bandwidth. Fearing obscenity and extreme + + access to information, the CRTC was formed to sell licenses to + + broadcasters. Without such a license, you could be prosecuted + + for broadcasting. The result of this action can be seen today: + + the only radio stations we see are totally mainstream and are + + hell-bent on making profit, not pleasing listeners or informing + + the public. + + + + We all know that the bulletin board systems are a great way + + to get alternative information. We can get information on the + + Paul Teele / Karla Homolka trials. We can get new insights as to + + what is really happening in the former Yugoslavia through the + + giant Internet. We currently have access to multitudes of + + information that isn't available through the mainstream media. + + + + If licensing comes into affect, we will LOSE this access. + + Not only will the pirate boards be hunted down and exterminated, + + but all currently LEGAL PUBLIC DOMAIN BBS's will also be made + + illegal unless they can afford a license. And who do you think + + will get licenses? Only those willing to follow the CRTC + + guidelines for radio and television. Corporations and rich + + executives. The BBS world, our underground paradise (if you + + will) is in great danger of becoming a commercial hell like the + + rest of today's media. + + + + We don't yet know what the proposed licensing fee will be, + + but it could anywhere in the area of $300-$5,000. This could + + also depend on the size of the BBS. However, most BBS's will + + simply close up shop if the government wants a license. The + + government will simply weed out all the little guys and support + + the big guys. + + + + This WILL HAPPEN, and sooner than you think! The U.S. + + Government has already started doing this, with the new + + Information SuperHighway being the flag-ship of government + + regulated systems. The Canadian government is going farther, and + + must be stopped now. + + + + Before I go into my plan of action, I want to tell you that + + if licensing comes into effect, if will be basically impossible + + to beat the system. All pirate radio stations in North America + + have been crushed by the government in a matter of months. + + Imagine how easy it will be to crush pirate bulletin board + + systems (and by that I simply mean BBS's without a license) with + + traceable phone numbers. Bell Canada would be sure to help the + + CRTC bust those boards. And the RCMP would have a real easy time + + busting any boards with illegal software, because those boards + + would not have licenses. The CRTC finds the board through Bell, + + arrests the sysop for running a board without a license, then + + informs the RCMP that this sysop was allowing copyrighted + + material to be transferred through his/her bbs. That sysop, for + + the first time in his/her life, is suddenly looking at a possible + + jail term. + + + + + + COULD YOU IMAGINE GOING TO JAIL FOR RUNNING A BBS???????? + + + + That, I admit, is the extreme case, but it is looking more and + + more likely as time goes on. If you're as pissed off about this + + as I am, then keep reading, because I have a plan of + + action/protest to stop this from happening. + + + + WE are the only people out there who can stop this from + + transpiring. Only the extremely computer literate, those of us + + who know the ins and outs of the BBS scene and computers + + generally, will be able to generate an argument strong enough to + + counter the argument of the government and the CRTC. + + + + I've been a user in different parts of Ontario for about six + + years. I currently go to York University for Computer Science + + and my plan is to organize a campaign of users who will be + + willing to petition the government to stop this craziness. My + + sister is a lawyer and also an occasional user of the boards. + + She would be willing to confront the CRTC on legal grounds if we + + have enough support from YOU. I have to hear from you. In order + + to force the CRTC to at least seriously listen to our argument, + + we need a lot of names, and a lot of letters to your local MP and + + to the CRTC. + + + + If I have enough support, I will set up a BBS which is + + dedicated to keeping you informed. I will keep up to date as to + + what the CRTC is doing and open up discussion concerning what we + + should do about it. I would also print out all the messages on + + the board and send them off to the prime minister, the CRTC and + + our local MP's. At the same time, my sister and I will prepare a + + legal argument to present to the government and the CRTC. IF we + + have the support of your names and your letters behind us, the + + CRTC will be forced to stop. + + + + OUR GOAL: To stop the CRTC from requiring the licensing of + + bulletin board systems and get it written into the law books that + + private, home run bbs's are totally legal and should never be + + regulated, in the interests of free information. + + + + + + PLEASE send me E-mail or letter mail with your thoughts. I + + WILL set up the bbs and get this ball rolling if we have enough + + support! Please send this file to other BBS's and get this + + information out. Contact me if you want to be involved. We need + + all your support! + + + + Support USERS AGAINST THE LICENSING OF BBS's (UALBBS). + + + + KEEP PRIVATE BBS's LEGAL! + + + + *** Begin Additional Comments: *** + + + + Reading the preceding document has brought a few thoughts to + + my mind. First of all, there has been much apprehension about + + what the computerization of society holds for the freedom of the + + common citizen. It seems that the more powerful a thing is, the + + more potential it has for both good and bad; and there is no doubt + + that the computerization of information is powerful indeed. + + + + On one side, the computerization of society holds the potential + + for a centralized authoritarian regime that could not have been + + dreamed of previously. In the near future, there will be no further + + need for cash money and there will be no economic activity beyond + + the reach central intelligence and control. And there will be no + + personal information that will be kept secret from the authorities. + + Even the USSR, with the model of central authority we feared most, + + could could not have been capable of realizing the degree of control, + + the dawn of which, we now witness. + + + + But the evil that we feared in Communism infects our own society. + + Abstract concepts such as truth and justice are minimum requirements + + for spiritual beings, yet we deny the spiritual and cling to the + + material. If we assert that we are but material beings, how real + + can the spiritual necessities really be? And yet, in order for + + us to have any hope of happiness, these must be acknowledged in + + any formula for a culture and society we might propose. Even So, + + we increasingly embrace a purely materialist interpretation of + + existence in which such things as truth and justice, if not + + outright delusional, are relative. + + + + If we continue to embrace the same cosmology as drove the Soviet + + repression, and the tools of a police state become available, + + what of government's temptation to become the definer of truth and + + justice and all the things which are the very breath of life + + for the human soul? Even one who is completely seduced by + + materialism would have to be blind indeed not to perceive what + + an enormous poison this is. + + + + On the other side, the proliferation of information technology has the + + same sort of potential as the cheap portable video camera. The + + particular aspect of this potential I'm addressing has been made most + + obvious by the effect the video camera has had in totalitarian + + countries, namely, that it is increasingly difficult for these + + governments to suppress the truth of events by simple denial and + + propaganda. The proliferation of information technology can + + have a parallel with the advent of the Guttenberg press, which made + + it more difficult for the Inquisition to suppress the works of + + heretics-- but only if it is allowed. If the Church had tried + + to regulate the press, it would have been possible to operate them + + underground. This is not the case with BBSs because the telephone + + network can be programmed to log all modem communications. + + + + From the positive aspect of information technology, there comes the + + potential for a democratic process that has not been practical + + until now. As information technology becomes more accessible, + + there could come a world in which an average Joe might write an + + article about picking his nose, and it would have no less + + distribution than if it had been published in MacLean's or Newsweek. + + + + Although the suppression of pornography and other abuses has its + + attractiveness, the complete and unregulated liberation of + + information is our only defense against its dark side. The + + scope of the suffering that information enslavement can inflict + + upon us is so great that "preventing misuse" can only be an + + excuse of those who would enslave us. + + + + Any move that leaves the dark potential of the new technology + + in place, while invalidating its positive aspects, leaves the + + potential for authoritarian abuse in place, while invalidating + + our only true defense. Any such move is quite obviously + + a move toward enslaving us. If any cause is worthy of struggle, + + the preservation of information liberty is indeed such a cause. + + + + Three other thoughts: + + + + 1) If the traditional media loses its preeminence to the "new" + + media, it shows a flaw in the traditional media. Then, the + + success of the alternative media will be the excuse for imposing + + the same regulation on the alternative media as on the traditional. + + But this will have the effect of imposing the same mediocrity into + + the alternative media as made the traditional media less + + attractive. Such are the politics of information enslavement. + + + + 2) Radio and television are vulnerable to interference from + + the incompetent and abusive. But private BBSs must be explicitly + + dialled into. Can the regulators seriously contend that they + + might protect us from information that we must access in + + such a deliberate and specific manner? + + + + 3) If private BBSs are regulated, uucp and FidoNet, which amount + + to networks of BBSs for machines, will also be. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + The following article reprinted from "The Spotlight" in Washington D.C + + with permission from Asst. Editor Don Markey. + + + + CIA CORRUPT, STUPID, SHOULD BE ABOLISHED + + + + We're spending untold billions on any international spying + + operation that can't figure out what it's own people are + + doing. It's time for a change. + + + + By Mark Lane + + + + The arrest of Aldrich Hazen Ames, former head of the CIA's Soviet + + counterintelligence branch, as a Soviet spy, raises some seminal questions + + about the value of the CIA. With the fox and his wife, Maria del Rosario + + Casas Ames, also charged as a Soviet spy, in charge of the henhouse, it is + + time to wonder about the fate of the chickens. + + + + During September, 1985, Vitaly Yurchenko, a senior KGB official, defected. + + Ames was assigned to debrief him. Yurchenko, after that debriefing, + + escaped from his CIA controllers while having dinner with them in a + + restaurant in Georgetown and then returned to the Soviet Union. + + + + Edward Lee Howard, a CIA officer, was under secret FBI surveillance during + + the same period. He too fled to the Soviet Union after he learned that he + + was about to be arrested. Until now the CIA and FBI have been unable to + + figure out how Howard learned of his imminent incarceration. + + + + There is a simple rule employed by police departments throughout the + + United States to spot a possibly corrupt cop. Is he living beyond his + + means? Even unsophisticated local police organizations which do not + + regularly spy on their own colleagues or subject them to lie detector + + tests, as does the CIA, have established a relatively sound and simple + + method to locate potentially corrupt officers. Did he buy a Cadillac + + instead of a Ford? How can he afford to build a garage or construct an + + addition to his house? + + + + During his highest paid year with the CIA, Ames earned under $70,000. His + + wife was a student. Last year he bought a new Jaguar -- which cost about + + his annual income after taxes, unless it was loaded with extras. He also + + bought a house in Arlington, Virginia (a Washington suburb) worth well + + over half-a-million dollars, a large farm and a number of condominiums in + + Columbia, his wife's country of birth. He paid for the Virginia house -- + + $540,000 -- in cash. + + + + Apparently he was paid approximately $1.5 million by the Soviet Union + + during the last several years and spent it all on a luxurious life style. + + And now, we are informed by the CIA that no one at the agency noticed the + + improved Ames lifestyle during the past decade. + + + + The Ames case is reminiscent of the case of CIA officer Edwin P. Wilson + + who engaged in a similar grand life, while earning a relatively meager + + salary at the CIA. He was subsequently charged and convicted of illegally + + shipping explosives to Libya. For years Wilson lived on a huge baronial + + estate in Virginia, kept horses and permitted other CIA officers, + + including his superiors, to send their children over to his mansion and + + stables to ride the horses. + + + + The CIA later claimed to be astonished that Wilson had some other income. + + He claimed the agency knew it all along and that he was the victim of a + + change in policy toward Libya in the smoke-filled rooms in Langley, + + Virginia (headquarters of the CIA) where the resident scholars engage in + + thinking too convoluted and too secret thoughts for ordinary Americans to + + comprehend. Wilson is now in prison and the CIA is newly astonished by + + Ames. + + + + Most Americans have not yet decided to forgive the CIA for murdering + + President John F. Kennedy and the leaders of other states. The only + + justification for its existence, immoral though it may be, is that at + + least it is effective. That excuse has now expired. So should the CIA. + + + + The American people deserve an intelligence agency created in the + + post-Communist world, one designed not to plot, overthrow and kill, but to + + inquire and determine. An organization which can predict, based on work + + on the ground and contacts, trouble spots such as in Bosnia before they + + erupt, a financial crisis in Japan secured through evaluation and study of + + trends by competent scientists, the uprising of Mexican indigenous people + + before we enter into a NAFTA which makes us partners of their oppressors + + -- all of these would be of great value to America. + + + + Above all, a democratic society deserves an intelligence agency designed + + to meet the needs of such a country, not designed for a totalitarian + + state. + + + + This portion of the story ends on a light note. The "Washington Times" + + reported in front page headlines that the Russians may lose billions of + + dollars in U.S. aid due to their perfidy of spying on us. Just recently + + Philip Heyman, a Justice Department high official, over the objection of + + Janet Reno, the attorney general and his superior, demanded that Jonathan + + Pollard, the American who spied for Israel, be freed. Pollard was paid in + + dollars which the United States had sent to Israel as part of its enormous + + contribution to that state. + + + + I am still looking for the headline that suggests that Israel may lose + + billions of dollars in U.S. aid. + + + +*** An internationally known attorney and recognized authority on the + +*** assassination of John F. Kennedy, Mark Lane is the author of "Rush to + +*** Judgment", the definitive critique of the Warren Commission, and + +*** "Plausible Denial", which links the CIA to the JFK assassination. Both + +*** books are available from Liberty Lobby, 300 Independence Avenue SE, + +*** Washington, D.C. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LEGION OF DOOM T-SHIRTS!! Get 'em + + + + By Chris Goggans + + + +After a complete sellout at HoHo Con 1993 in Austin, TX this past + +December, the official Legion of Doom t-shirts are available + +once again. Join the net luminaries world-wide in owning one of + +these amazing shirts. Impress members of the opposite sex, increase + +your IQ, annoy system administrators, get raided by the government and + +lose your wardrobe! + + + +Can a t-shirt really do all this? Of course it can! + + + +-------------------------------------------------------------------------- + + + +"THE HACKER WAR -- LOD vs MOD" + + + +This t-shirt chronicles the infamous "Hacker War" between rival + +groups The Legion of Doom and The Masters of Destruction. The front + +of the shirt displays a flight map of the various battle-sites + +hit by MOD and tracked by LOD. The back of the shirt + +has a detailed timeline of the key dates in the conflict, and + +a rather ironic quote from an MOD member. + + + +(For a limited time, the original is back!) + + + +"LEGION OF DOOM -- INTERNET WORLD TOUR" + + + +The front of this classic shirt displays "Legion of Doom Internet World + +Tour" as well as a sword and telephone intersecting the planet + +earth, skull-and-crossbones style. The back displays the + +words "Hacking for Jesus" as well as a substantial list of "tour-stops" + +(internet sites) and a quote from Aleister Crowley. + + + +-------------------------------------------------------------------------- + + + +All t-shirts are sized XL, and are 100% cotton. + + + +Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for + +postage. + + + +Send checks or money orders. Please, no credit cards, even if + +it's really your card. + + + + + +Name: __________________________________________________ + + + +Address: __________________________________________________ + + + +City, State, Zip: __________________________________________ + + + + + +I want ____ "Hacker War" shirt(s) + + + +I want ____ "Internet World Tour" shirt(s) + + + +Enclosed is $______ for the total cost. + + + + + +Mail to: Chris Goggans + + 603 W. 13th #1A-278 + + Austin, TX 78701 + + + + + +These T-shirts are sold only as a novelty items, and are in no way + +attempting to glorify computer crime. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + In the super-state, it really does not matter at all what + + actually happened. Truth is what the government chooses + + to tell you. Justice is what it wants to happen. + + --Jim Garrison, New Orleans District Attorney + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + +. + diff --git a/textfiles.com/magazines/JOAUC/jauc02.txt b/textfiles.com/magazines/JOAUC/jauc02.txt new file mode 100644 index 00000000..28f89536 --- /dev/null +++ b/textfiles.com/magazines/JOAUC/jauc02.txt @@ -0,0 +1,5940 @@ + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically + + ====================================================================== + + ISSN 1074-3111 Volume One, Issue Two April 4, 1994 + + ====================================================================== + + + + Editor-in-Chief: Scott Davis (dfox@fennec.com) + + Technology Editor: Max Mednick (kahuna@bga.com) + + Consipracy Editor: Gordon Fagan (dolphin@bga.com) + + Network Security: George Phillips (ice9@bga.com) + + + + ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC + + + + U.S. Mail: + + The Journal Of American Underground Computing + + 10111 N. Lamar #25 + + Austin, Texas 78753-3601 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + To Subscribe to "TJOAUC", send mail to: sub@fennec.com + + All questions/comments about this publication to: comments@fennec.com + + Send all articles/info that you want published to: submit@fennec.com + + Commercial Registration for Profitable Media: form1@fennec.com + + + + "The underground press serves as the only effective counter to a growing + + power, and more sophisticated techniques used by establishment mass media + + to falsify, misrepresent, misquote, rule out of consideration as a priori + + ridiculous, or simply ignore and blot out of existence: data, books, + + discoveries that they consider prejudicial to establishment interest..." + + + + (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Contents Copyright (C) 1994 The Journal Of American Underground Computing + + and/or the author of the articles presented herein. All rights reserved. + + Nothing may be reproduced in whole or in part without written permission + + of the Editor-In-Chief and/or the author of the article. This publication + + is made available quarterly to the amateur computer hobbyist free of + + charge. Any commercial usage (electronic or otherwise) is strictly + + prohibited without prior consent of the Editor, and is in violation of + + applicable US Copyright laws. To subscribe, send email to sub@fennec.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + DISCLAIMER AND NOTICE TO DISTRIBUTORS - + + + + NOTE: This electronic publication is to be distributed free of charge + + without modifications to anyone who wishes to have a copy. Under NO + + circumstances is any issue of this publication, in part or in whole, + + to be sold for money or services, nor is it to be packaged with other + + computer software, including, but not limited to CD Rom disks, without + + the express written or verbal consent of the author and/or editor. + + To obtain permission to distribute this publication under any of the + + certain circumstances stated above, please contact the editor at one of + + the addresses above. If you have intentions of publishing this journal + + in any of the ways described above, or you are in doubt about whether or + + not your intentions conflict with the restrictions, please contact the + + editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com + + This publication is provided without charge to anyone who wants it. + + This includes, but is not limited to lawyers, government officials, + + cops, feds, hackers, social deviants, and computer hobbyists. If anyone + + asks for a copy, please provide them with one, or mail the subscription + + list so that you may be added. + + + + The articles and information printed herein are the property of the author + + and / or The Journal Of American Underground Computing. An electronic mail + + address of the author will be provided when made available to us so that you + + can contact the author with your comments. No article in this publication + + can be reprinted without the permission of the author / editor. Any attempt + + to do so will be in direct violation of United States Copyright laws. + + Any attempt to sell this publication in part or in whole, on CD Rom or + + while packaged with any other software bundle without the express consent + + of the editor is also a direct violation of United States Copyright laws. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 2 + + + + TABLE OF CONTENTS + + + + 1) A note from the Editor Scott Davis + + 2) Comments from our readers Readers + + 3) Paul and Karla Hit The Net Wired Online + + 4) AT&T Cellular Privacy Systems David Arneke + + 5) Clipper / From "The Guardian" Mike Holderness + + 6) Privacy: Notes from Cyberspace Various + + 7) Kidnapped By The State / Internet Not Safe Matthew Mihaly + + 8) Legion Of Doom - Internet T-Shirts Chris Goggans + + 9) Public vs. Mass Media: The Case of The Internet Jim O'Loughlin + + 10) Bruce Sterling's Comments at CFP '94 Bruce Sterling + + 11) Book Review - Doing Business On The Internet Steve Brock + + 12) Generic Usenet Flame Form [Humor] + + 13) McDonnell Douglas Warranty Card [Humor] + + 14) Social Contract Between Us and Them [Humor] + + 15) Electronic Petition Against Clipper Editors + + 16) Form letter againt Clipper for the President Editors + + 17) Official Government press release: Clipper Editors + + 18) ISDN Information (RBOCS) Max Mednick + + 19) A catalog of national ISDN solutions Max Mednick + + 20) Sprint expands presence in China News + + 21) SSN FAQ / Social Security Number info Chris Hibbert + + 22) The Clipper Chip is your friend Bob Davis (WSJ) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + A NOTE FROM THE EDITOR + + + + It is my pleasure to welcome aboard to the editing staff Mr. Max Mednick + + as the Technology Editor. Max is a technical trainer and network support + + specialist for a Fortune 500 company, and has several years of experience + + in the field of networking and communications. Everyone send him a message + + welcoming him. (kahuna@bga.com). Also, we are welcoming Carl Guderian + + as Director of Information Systems. He is currently employed by big-brother. + + His email address is bjacques@cypher.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + COMMENTS FROM OUR READERS + + + + + + From: jim@rsa.com (Jim Bidzos) + + To: comments@fennec.com + + Subject: TJOAUC-1.1 + + + + Great! I'm honored to have contributed to TJOAUC! Thanks, and keep up + + the good work. + + + + =-=-=-=-=-=-=-=-=-=-=-=-=-= + + + + From: Anonymous@some.government.agency + + To: comments@fennec.com + + Subject: Thanks! + + + + I checked your archived 'Journal of American Underground Computing' + + at extext.archive.umich.edu. + + + + I found the quality and content to be high. + + + + If you could also subscribe me, I would be grateful. Sorry about + + the skepticism (with reservations to Mark Lanes allegations that + + the CIA murdered JFK). + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PAUL AND KARLA HIT THE NET + + + + Posted By Dennis R. Hilton (drhilton@kaiwan.com) + + Copyright 1993,4 Wired Ventures, Ltd. All Rights Reserved + + For complete copyright information, please see the end of this file + + + + WIRED 2.04 + + Electric Word + + ************* + + + + Recent events in Canada have proven once again that - for better or worse - + + the information genie has escaped into cyberspace and can't be put back in + + the bottle. When an Ontario judge issued an order barring media coverage of + + a sensationalized murder trial, Canadians used the Net to break the ban. + + + + The case concerns Paul "Bernardo" Teale and his wife, Karla Homolka Teale, + + who were each charged in the grisly murders of two teenagers. Paul Teale + + now stands accused of 48 sex-related charges, while Karla Homolka entered + + into a plea bargain: She pleaded guilty to manslaughter and is expected to + + testify against Paul. + + + + The nonstop press coverage prompted Paul Teale's lawyer to ask for a media + + gag order until the conclusion of his trial, on the grounds that it would + + be impossible to impanel an impartial jury. Despite legal intervention by + + several major Canadian media outlets, the court imposed a ban on the + + publication of the details of the crimes. + + + + At first the ban had its desired effect. When the US television show + + A Current Affair featured the case, it was banned in Canada, and Canadian + + cable stations blacked out CNN coverage of the case. + + + + With the conventional media halted, the infosphere took over. First, two + + BBSes in Toronto began to post daily details of the trial. In August, a + + group of McGill University students created a Usenet group, alt.fan.karla- + + homolka, to discuss the case. By December, after phone calls by law-abiding + + Net surfers to systems managers, the Usenet group had been banned by + + systems managers and university officials at sites all over Canada. + + + + After the banning of alt.fan.karla-homolka, two new Usenet groups were + + created: alt.pub-ban and alt.pub-ban.homolka. + + + + Some Net users theorized that if they cross-posted all over the Net, the + + Royal Canadian Mounted Police would be in the impossible position of + + scrambling through cyberspace plugging leaks. One Net dweller jokingly + + proposed the ideal tactic: "The solution is obvious. Take the discussion to + + rec.sport.hockey. You silly Canadians would never ban that group." + + + + Other curious Canadians searched the pay-per-view news and magazine + + databases on Nexis and CompuServe for stories published by US newspapers. + + Most of the banned articles were re-posted verbatim to alt.true-crime, a + + group overlooked by the Mounties. + + + + As the infosphere grows to encompass the planet, the question is no longer + + whether certain information is too sensitive to be made public. The real + + question becomes whether it is even possible to keep certain information + + out of cyberspace. In the Teale-Homolka case, the ban was not so much + + broken as rendered irrelevant by the voracious online community: It is + + estimated that one in four Canadians knows the banned facts. + + + + Anita Susan Brenner and B. Metson + + + + + + %%%%%%%%%%%%%%%%%%%% WIRED Online Copyright Notice %%%%%%%%%%%%%%%%%%%%%% + + + + Copyright 1993,4 Wired Ventures, Ltd. All rights reserved. + + + + This article may be redistributed provided that the article and this + + notice remain intact. This article may not under any circumstances + + be resold or redistributed for compensation of any kind without prior + + written permission from Wired Ventures, Ltd. + + If you have any questions about these terms, or would like information + + about licensing materials from WIRED Online, please contact us via + + telephone (+1 (415) 904 0660) or email (info@wired.com). + + + + WIRED and WIRED Online are trademarks of Wired Ventures, Ltd. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + AT&T CELLULAR PRIVACY SYSTEMS + + AMERITECH CELLULAR PRIVACY SERVICE USES AT&T TECHNOLOGY + + + + By David R. Arneke (darneke@attmail.com) + + + + AT&T SECURE COMMUNICATIONS SYSTEMS NEWS RELEASE + + Reprinted with permission + + + + GREENSBORO, N.C. -- Ameritech Cellular Services in Chicago has + + become the first cellular telephone system in the country to offer + + voice privacy service using the AT&T Advanced Cellular Privacy System. + + + + Ameritech launched its Enhanced Voice Privacy service in Chicago + + this month. + + + + "This technology adds to the productivity and value that + + Ameritech cellular service provides to its customers," said Thomas A. + + Brooks, AT&T Paradyne senior vice president, Secure Communications + + Systems. + + + + "And, by helping the carrier provide value to the cus- tomer, + + AT&T cellular privacy technology adds value to the carrier as well." + + + + The AT&T technology scrambles the cellular telephone's + + over-the-air signal. The signal is descrambled at Ameritech's + + cellular switch, transmitting a conventional phone signal to the + + recipient. + + + + If the scrambled over-the-air signal is intercepted, the + + eavesdropper will hear only a chirping sound. AT&T's advanced privacy + + technology renders the over-the-air signal unintelligible. + + + + The system already is in wide use in Japan in the cellular system + + of one of the two major Japanese telephone companies. + + + + The AT&T Cellular Privacy System offers cellular users a variety + + of benefits. + + + + -- Its technology is small enough and light enough to be + + embeddable in today's small, portable phones. + + + + -- The system features an unmatched combination of high voice + + quality and an advanced level of privacy. + + + + -- It is applicable to all three types of cellular telephones -- + + portable, transportable ("bag phones") and mobile (car phones). + + + + The system has two components. The AT&T privacy unit attaches to + + the phone and scrambles the phone's signal. Voice privacy modules are + + available for several brands of cellular telephones, among them AT&T + + models, including the AT&T Privacy-Capable Portable Telephone 9000; + + the Audiovox 3200 series; Mitsubishi models using the Model 1200 + + transceiver; the Motorola 2600; the NEC 3800B and 4800; the Oki 800 + + series; and the Toshiba 3200 series. + + + + Modules for other brands and models are in development. + + + + The Mobile Telephone Office Switch (MTSO) unit is installed at + + the cellular carrier's switch and descrambles the signal. + + + + Because the privacy system scrambles only the over-the-air + + portion of the call, no matching unit or special equipment is required + + at the receiving phone. + + + + The AT&T Paradyne Cellular Privacy System was developed by AT&T + + Secure Communications Systems, a world leader in the design, + + manufacture and integration of encryption and privacy products. It is + + a primary supplier of secure products to the governments of the United + + States and other nations as well as corporations around the world. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CLIPPER (From The Guardian) + + + + By Mike Holderness (mikeh@gn.apc.org) + + + + This piece on the Clipper controversy appeared in the London, UK + + _Guardian_ on 3 March 1994. My apologies for the delay in circulating + + this to all of you who helped with advice and comments or expressed + + an interest; and to a couple people whose attributions got cut for space. + + + + Some Netizens may find the piece a bit wishy-washy. Better that than + + the _Independent_'s coverage, which was full of unsubstantiated claims -- + + if they _know_ the NSA has a back-door, I wish they'd publish + + the evidence... + + + + I _know_ the description of the technology ended up inexact. Anyone + + who can give an exact description in fewer words gets a bottle of + + champagne next time you're in London... + + + + If you re-distribute this, please do so in its entirety and un-cut. + + Contact me to discuss terms before you publish it on paper: I have + + a freelance living to earn and a landlord to feed. + + + + (C)opyright 1994 Mike Holderness + + mikeh@gn.apc.org + + London, UK + + + + HED: Are these men a threat to freedom? + + PIC: (4-column): Gore & Clinton + + + + YOUR COMPANY is, at last, connected to the Internet. You can swap memos + + with branch offices around the world within minutes. But you naturally + + don't want your competitors, or their governments, siphoning the details + + of your bid for that dam contract in the Philippines out of the net. + + What do you do? + + + + On the other hand, when you receive an electronic message announcing a + + call for tenders, how do you know it's genuine? You've heard that it's + + possible to fake electronic mail, and you're worried about all the + + possibilities for creative industrial espionage which this opens up. + + + + Then again, you might be a Cabinet minister, setting up a meeting with + + your boyfriend on the mobile phone. Wouldn't it be good to know that + + no-one could tap the message? + + + + The answer to all these problems lies in encryption technology. The + + solution the US government proposed earlier this month, however, has + + generated a furious row in the "on-line community" about the government + + interfering in citizens' right to communicate in private. The disturbing + + implications for people outside the US have gone largely unremarked. + + + + Computer programs that can do practically unbreakable encryption are + + available to the public in the US and elsewhere. One, named PGP for + + Pretty Good Privacy, is increasingly being used to authenticate + + electronic messages (Computer Guardian, Nov ?? 1993). It can encrypt the + + whole message, or send the main text "in clear", followed by an + + encrypted block containing a mathematical "fingerprint" of the message + + and the sender's name and address. The program can thus verify whether a + + signature belongs to the purported sender and whether the message + + arrives as it left. + + + + Encryption has long worried law-enforcement agencies. What if drug- dealers + + and terrorists start using unbreakable encryption? The US government's + + Key Escrow Encryption system -- commonly known by its working title, + + Clipper -- is its answer. + + + + Clipper uses an encryption chip suitable for building into a mobile + + phone or a modem. Its method of encryption, developed by the US National + + Security Agency (NSA), depends on "keys". These are codes which are used + + mathematically to mangle the text or speech. The receiver can only get + + the original back out if they have the key and can use it to un-mangle + + -- decrypt -- the message. + + + + PGP depends on a "public-key" system. Users sending signed messages + + encrypt the signature with keys known only to them. They also issue + + public keys. These are mathematically derived from the private key, and + + allow anyone to verify the signature. If someone sends them a message + + encrypted with their public key, only the private key will extract it. + + By contrast, each Clipper chip will have an encryption key built in. + + When the chip is manufactured, two parts of the key will be lodged with + + two separate US government agencies. (In legal jargon, this is like + + "holding the keys in escrow".) A secret "super-key" allows law + + enforcement agencies to retrieve the serial number of the chip used on + + the link they're tapping. + + + + Under US guidelines released on February 4, if a law enforcement agency + + wants to eavesdrop on encrypted communications, it should send details + + of a search warrant to the agencies holding the key components. + + + + This is a red rag to the inhabitants of Internet discussion forums, + + "the world's largest functioning anarchy". There, discussions of the + + right (under the First Amendment to the Constitution) to unrestricted + + free speech can and do slip effortlessly into the belief that, as one + + participant put it, "The People must be allowed to discuss anything, + + including revolution." + + + + According to Brian Yoder, president of California company Networxx, + + "The US Constitution doesn't grant the government the power to maintain + + this kind of surveillance capability over the population. Period. The + + assumption is that anything that enhances the ability of the police to + + catch criminals is OK, but that is not what the Constitution says, and + + that's not the kind of country I want to live in." + + + + Cryptology specialist Dr Dorothy Denning at Georgetown University in + + Washington DC, who was part of a team reviewing the NSA's design + + process, points out that Clipper "will not make it any easier to tap + + phones, let alone computer networks. All it will do is make it + + technically possible to decrypt communications that are encrypted with + + the standard, assuming the communications are not super-encrypted with + + something else. Law enforcers still need to get a court order." + + + + But who trusts the NSA? The Clipper design is secret. Many assume that + + the Agency has built in a "trap-door" allowing it to break encryption + + without the keys. + + + + No-one has proposed making non-Clipper encryption illegal, but the US + + government clearly hopes to establish it as an industry standard. For + + example, while it's usually illegal to export any form of encryption + + technology from the US, it will be legal to export Clipper. + + + + Non-US companies using it to protect their communications will have to + + live with the uneasy knowledge that the NSA could be listening in -- and + + the NSA, like its UK sibling organisation GCHQ in Cheltenham, has a long + + history of intercepting foreign commercial messages for the benefit of + + home companies. (GCHQ declined to say whether it had been involved in + + any discussions over Clipper.) + + + + The protests have started. A petition organised by Computer + + Professionals for Social Responsibility against Clipper, and in favour + + of a Bill to permit export of competing encryption systems, gathered + + more than 20,000 electronic signatures in its first two weeks. Wired + + magazine has proclaimed that ``This is a pivotal moment in history'', + + accusing ``the Clinton-Gore administration'' of ``attempting a stealth + + strike on our rights''. It has asked readers to sign the CPSR petition + + against Clipper and to ``call or write your Congressional + + representatives and let them know how you feel''. + + + + Encryption and authentication are important for much more than the + + privacy of the frequently obscure or banal discussions on the Net. + + Medical and financial records are now commonly held on computers, and a + + growing proportion of business transactions take place on line. + + Cyberspace is where your money is. + + + + For private communications, Emma Nicholson MP takes a relaxed view: "In + + communicating, we should start from a belief that everyone listens to + + everything. Gossip is what makes the world go round. I have very few + + secrets. I would be deeply concerned if a device were marketed that + + could stop interception -- I would support the FBI completely." + + + + Computer-law barrister Alistair Kelman, however, believes that any + + attempt to enforce the Clipper chip as a worldwide standard would meet + + stiff opposition. The European Commission could be expected to object + + that it fell foul of Treaty of Rome provisions against misuse of a + + dominant position. "If you want to have a world standard for encryption, + + fine," Kelman said, but the EC could respond: "let's all get together + + and settle on something that meets our requirements as well." + + + + + + + + Wired articles on Clipper can be obtained via the Internet by putting + + the following three lines into the body of an electronic mail message + + addressed to infobot@wired.com: + + send clipper/privacy.meeks + + send clipper/privacy.barlow + + end + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PRIVACY: NOTES FROM CYBERSPACE + + + + These are just little tidbits picked up from here and there...feel free to + + comment on them. -Editors + + + + + + NOTES FROM CYBERSPACE - ARTICLE 1 + + By Arthur Entlich (ua107@freenet.victoria.bc.ca) + + Subject: Privacy in Canada + + + + Over the last several years there has been a feeding frenzy in the private + + sector toward collection of private information. Currently, to my know- + + ledge there is only one province in Canada that has legislation on the + + books which protects individual's private information within the + + private sector, and that is Quebec, which may not be a province of + + Canada for long, if things continue. + + + + Anyway, recently a few provinces have developed Offices of Privacy and + + Freedom of Information (Ontario and British Columbia) both of which have + + "left of center" parties in power. However, these government offices + + only regulate the issues of freedom of information and privacy within the + + public sector (governmental agencies). These is also a similar + + office on a federal basis. Ther eis much to be done here to roll + + back the amount and connectivity of information in the public and + + private sector. For instance, our SIN number (Social Insurance Number) + + which was legislated originally for only about 6 programs, all relating + + to employment, has been expanded to uses such as banking, (required by law + + now) medical plans, etc, Also, the private sector has a field day with + + this number and it has basically become a national identity number. + + + + Some changes are occurring, such as in British Columbia, we were issued + + a separate and unique medical plan number after many complaints, however + + on several occasions I have by phone or in person requested information + + about my coverage and claimed I did not have my medical number handy, + + and was asked for my SIN, at which point they crossreferenced to my + + medical number, so obviously they are still connected internally. + + + + More recently, the government of B.C. has indicated that in two months + + a new program called PharmaNet will be put in place. This will hook up + + all pharmacies in the province so that ones drug profile is available + + to each pharmacist if they use a keyword you provide (the keyword was + + demanded by the office of privacy, originally it didn't even have this). + + You must provide this keyword and your medical plan number in order + + to purchase the drugs. The government claims it is becaus ethey + + have a problem with drug interactions, especially amongst the + + elderly who see numerous doctors and don't remember what they are taking. + + + + They also claim it is to prevent the practice of people seeing several + + doctors for one prescription type, then go to several pharmacies to buy + + multiple prescriptions, and then sell the drugs on the street. + + + + The government does have some justification, in that they do pay for + + the partial cost of drugs to people over 65 and they also pay for + + all drug costs over $600 per family per year. However, the vast + + majority of the population does not fit into these groups. + + + + In the private sector things are much worse. Most video stores re- + + quire D.L.# plus SIN, and they can sell this info to anyone at + + the present state of the law. Banks have gotten really nasty of + + late, and are requiring a credit card number just to open a chequing + + (or checking if you are south of the border) account. I was required + + to sign a statement when opening a simple chequing/savings account + + at a credit union which gave them permission to "acquire any information + + deemed necessary to verify the information provided, or to protect the + + credit union", and that such information could be transmitted to + + other financial institutions, branches of their company, and other + + companies they own (which includes and investment and insurance + + division). I am fighting to change this now, as the next shareholders + + meeting is in mid-April and i have submitted several resolutions to + + change the current constitution of the credit union. + + + + Anyway, I know this has been long winded... sorry. I would be most + + interested in anyone who can provide inform + + anyone who can provide information on laws in the states or elsewhere + + which deal with issues such as these. I would like to know what other + + legislation is out there to protect the privacy of personal information + + in either the public or private sector. + + + + Thanks... please E-Mail me. + + + + %%%%%%%%%%%%%%%%%%% + + + + NOTES FROM CYBERSPACE - ARTICLE 2 + + By Anonymous + + Subject: What is being done about Privacy??? + + + + I have been doing some reading about the available databases, I was + + shoked at some of the services that are listed. Just to name a + + few .... + + + + * Searches for SSN's, lists name, address, last transaction + + * Searches for Mass Mailings and magazine subscriptions + + * change of address, (someone also mentioned PO Box info!!) + + * for most states - car ownership and Drivers lisc history + + * Top of Credit reports (name, address, SSN, employer) + + * neighborhood searches, demographics (income, ect ..) + + * National Phone listings + + * Airplane and Boat ownership + + * Professional Lisc's + + * ect, ect, ...... + + + + I have seen alot of talk about not giving out a SSN, but whats the point? + + It seems like it is already too late. I haven't seen the info in all of + + these datbases, but it seems as though Big Brother is already here. + + + + I am sure many people in this group already knew about alot of this. I + + am curious if anything is actually being done about this? I have seen + + the EFF do alot against clipper; are they doing anything against these + + databases that are open to the public (for a price)??? The clipper + + petition got alot of names, couldn't the same be done about these + + databases. I would bet most people have no idea all this personal + + information is available. They would be just as shocked as I was and + + you could get more signatures than the clipper petition. + + + + %%%%%%%%%%%%%%%%%% + + + + NOTES FROM CYBERSPACE - ARTICLE 3 + + By Anonymous + + Subject: Comments on Wall Street Journal / NSA 'cryptomathematician' + + + + In the Tuesday March 22, 1994 issue of the Wall Street Journal appeared + + an interview by reporter Bob Davis of Clinton Brooks the head of the + + NSA effort for an Escrow Encryption system commonly associated with + + Clipper. In the article Mr. Brooks relates there efforts to produce + + such as system came to fruition in a timely fashion with respect to + + AT&T desiring to sell secure voice systems. + + + + Having spoken with several people marketing AT&T Surety Communications + + products, it appears that indeed, NSA 'balked', and not just over the + + point of export licensing for DES based products. AT&T also sells several + + proprietary encryption algorithms, including one approved for export + + under ITAR. These all predate clipper. One of the marketing types + + at AT&T Surety indicated that NSA didn't want DES in secure voice + + products and hinted at international agreements to limit proliferation + + of DES applications, although apparently no evidence of this has arisen + + through John Gilmores FOIA requests. + + + + If AT&T was ready to sell two tier products domestic/overseas, why + + the jump to clipper? They offered a captive market, the Justice Department, + + which has paid in the neighborhood of $8 million dollars from asset siezures + + for a couple thousand clipper phone units probably at a higher price + + than they would sell for on the open market. They have also gained the + + promise of a single tiered product, although the rest of the STUIII + + compatible products are still available. AT&T appears hard pressed to + + find a nongovernment related market place for secure voice, without + + significant non-Justice shipping. Part of this may be cost, a Telephone + + Security Device costs more than an AT&T videophone while having a lower + + complexity. A popular MODEM manufacturer Paradyne, a subsidiary of + + AT&T, sells a MODEM with more than half the complexity of the Telephone + + Security Device for $179 retail. The videophone is selling for around + + $940 while the TSD 3600, a unit sitting between your phone and the wall + + sells for $1050. + + + + AT&T appears to have had a hard time waiting for MYK-78e chip shipments + + from Mykotronx. They received the initial production lot in October or + + November, following a protracted nonreassuring rubber stamp review + + process and a NIST Encryption Escrow non Standard release, which from + + the WSJ article was staged simple for AT&Ts benefit. + + + + That and we get a secretive governmental agency starting an unprecedented + + propaganda effort. Is this a case of our government doing more for us than + + we would possibly ask? Perhaps we should ask why. + + + + %%%%%%%%%%%%%%%%%%%% + + + + NOTES FROM CYBERSPACE - ARTICLE 4 + + By Anonymous + + Subject: Creative Freedom / Restrictions on Free Communcication + + + + I am aware of a case where a student made significant headway + + in development of techniques which accelerate convergence of + + algorithms used in computer arbitrage. The advisor told + + the student that this was amazing and great! But then the + + advisor tried to get the student to change the name of the + + technique to something that would make it sound like the + + advisor thought of it. Then, on the second idea the student + + mentioned, the advisor exclaimed how great it was and then + + suddenly turned around and began to try to talk the student + + out of the idea. But, the student had already convinced his/herself + + of the validity and value and stood ground on the second idea. + + + + When the student began to e-mail others in the community, the + + advisor had an irrational reaction. The advisor required the + + student to consult with (the advisor) before discussing his/her + + results vi e-mail with others in the community. Also, the advisor + + said that such discussions should not leave the local research + + group. + + + + TELL ME, IS THIS AN ETHICAL REQUIREMENT?? + + WHAT DO YOU THINK IS GOING ON HERE? + + + + %%%%%%%%%%%%%%%%%%%%% + + + + NOTES FROM CYBERSPACE - ARTICLE 5 + + From: James Ebright (jebright@magnus.acs.ohio-state.edu) + + Subject: Re: Wall Street Journal Interview with NSA 'cryptomathematician' + + + + My response to AT&T: I switched to MCI today... (Who else is listening + + to my true voice?) You can switch too... call 800-624-8030. + + + + My response to NSA: I still don't think folks are going to buy + + many guaranteed tapable 'secure' phones. + + + + But this shows the power of entrenched bureacuracies who have a vested + + interest in intrusive government. If the Cantwell bill passes, this + + mugging of US businesses via ITARs would be impossible. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + KIDNAPPED BY THE STATE / INTERNET NOT SAFE + + + + By Matthew A. Mihaly (mam6@cornell.edu) + + + + O.k., here is the situation. I had been contemplating suicide and + + posted my situation on alt.romance.chat (lot's of nice people replied, + + btw.) I also posted something on alt.drugs (under the name "Matt" asking + + for some useful drugs for the purpose of killing myself (which, for any + + of you fu*king ass-sucking cops out there: I am not saying I want to). + + + + The Internet is not safe. Two days (on 3/14) after I posted it, a couple + + of cops show up at my door, along with some nut from the mental health + + department of Tompkins County (that's this county obviously) and tell me + + I have to come with them to the hospital for "an hour, maybe an hour and + + a half." I said "What if I don't choose to go." They replied that I + + don't have a choice. They informed me that I'm going with them because + + some people read my internet message and were concerned. I was in the + + middle of conducting some business on the phone and asked if I could make + + a couple of phone calls first but the pigs replied that no, I couldn't. + + In effect, they kidnapped me. + + + + So, they drive me to Tompkins County Hospital where I am forced to sit in + + a room for 2 hours (with a couple of goons waiting outside to make sure I + + don't try to run). Finally, some bitch comes in and talks to me for all + + of 4 or 5 minutes. I explicity told her that I am not planning on + + killing myself (partly due to the 20 or 30 supportive e-mail messages I + + got from people). She said it's not here decision whether I'm held or + + not but that she would go give the doctor her opinion (she left me with + + the impression that she would tell me to let me go.) The doctor came in, + + after another 45 minutes of waiting) and talked to me for maybe 2 + + minutes. I said I wanted a lawyer. He said "Sure, you can always have a + + lawyer." and walked away mumbling something about always being able to + + have a lawyer. Apparently he was being sarcastic because no lawyer ever + + showed up. After another 20 minutes or so, some guy pokes his head in + + the room and asks me who I am. I didn't tell me of course, but 2 minutes + + later, some little geek walks in, sits down and says "I don't know if + + you've heard yet, but you are being transfered to a mental health ward." + + I say something to the effect of f*ck you I'm not going anywhere. By + + this time, there were a couple of goons in the room also. They told me + + that I could either go of my own free will or they would drag me there. + + Noticing that there were about six other guys standing out in the hall + + way I said I'd go. I then stood up, told the little geek that I hope he + + goes home tonight and suffers the worst kind of hell (or something to + + that effect). Then, one of the goons grabs me and drags me out into the + + hallway where I see one of those portable beds for ambulances with + + restraining devices on them. + + + + AT this point I was absolutely livid with rage. No way are you f*ckers + + restraining me I said. Well, they said I had to be restrained because I + + had just threatened the little geek with violence (not true, I just + + wished hell on him). So, they strap me down (I cooperated but was + + berating them the whole time) and put me in the ambulance and left a guy + + in the back to watch me. I was telling him what a dick he is and how big + + a violation of my human rights this was and he just told me to shut up. + + After a period of silence I apologized to him and told him I didn't mean + + anything personal. He responded with something to the effect of "Well + + f*ck you, I dont' like your tone of voice." I asked him, very + + sarcastically, if he was pleased with how well he was doing his job. He + + said "Look, I'm just doing my job here." Yeah, yeah I replied, so were + + the Nazi death-camp guards. + + + + Anyhow, they get me to this hospital (Soldiers and Sailors Memorial in + + Penn Yan, NY). They made me strip and put on stupid hospital clothes. + + By this time it was 8:30 at night (I got picked up at about 4:30) and no + + one had given me anything to eat. They gave me some graham crackers at + + this point. Whoopee. + + + + So anyhow, I wait for an hour or so and some guy named Tom Rice (yeah, I + + hope you're reading this you cocksucker) comes in and talks to me for + + about 3 minutes and says "o.k., I'm admitting you." Well, I was pretty + + pissed as you might imagine. + + + + So, they bring me upstairs, give me a room, etc., etc. and expect me to + + go to sleep until morning. Yeah, whatever. Like I can sleep when I'm a + + prisoner. I spent the whole night planning a way to escape (pathetic + + security cause I was in the wing where people with things like depression + + are kept, not the criminally insane wing). At 6:30 in the morning, they + + come in and tell me they are going to take blood from me. When I said no + + they said they were going to anyhow. + + + + Well, the long and short of this all is that I ended up spending two + + nights in a f*cking mental hospital because A) some f*ckers at Cornell + + University are idiots (I know at least one of their names so far... Leeza + + Casinelli, a therapist at our health services.. she is a fascist pig, + + don't go see her) and B) the idiot psychiatrist I saw the next morning + + said they have to keep me another night for observation. Nevermind the + + fact that I was obviously fine and the rest of the staff knew it. The + + food there sucked, I was confined in EXTREME boredom (what, they expect + + me to read 2 year old Time magazines all day???), missed many classes, a + + test, and some papers. Furthermore, I do alot of investing and lost a + + significant sum during this time. + + + + I guess my point in all this is that the Internet is definitely not safe, + + even if you aren't breaking the law. I got back about 2 hours ago from + + that f*cking place. I'm thinking about suing Cornell U (they are the + + ones who started all this) and maybe the state of New York. The way I + + look at it, I was held without indictement, without warrant, and without + + legal representation based on evidence contained on a Usenet posting. I + + mean c'mon. Like even 1/8 of the stuff posted here should be taken + + seriously. Take a look at alt.devilbunnies for instance. A completely + + amusing group, but not something to take seriously. Anyhow, I go to + + Cornell and live in Ithaca. I keep on trying to contact the ACLU here + + but no one ever answers. I've only gotten a busy signal once too. Also, + + are there any lawyers around here that someone can recommend for me? + + + + I was kidnapped and imprisoned for two days by the state. The state, not + + just of America, but the state of the world must be destroyed. Power, + + concentrated like this is absolutely tyrannical. I am not suicidial + + (although I was at one point) and these morons should have realized this. + + Be careful what you post and look into PGP encryption. F*ck the + + government and f*ck you you Cornell U. bastards. I hope you rot in the + + worst part of hell for what you put me through. If you want me to be + + depressed, go ahead, do it again. Make me miss classes, tests, and lose + + money. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LEGION OF DOOM T-SHIRTS!! Get 'em + + + + By Chris Goggans + + + + After a complete sellout at HoHo Con 1993 in Austin, TX this past + + December, the official Legion of Doom t-shirts are available + + once again. Join the net luminaries world-wide in owning one of + + these amazing shirts. Impress members of the opposite sex, increase + + your IQ, annoy system administrators, get raided by the government and + + lose your wardrobe! + + + + Can a t-shirt really do all this? Of course it can! + + + +-------------------------------------------------------------------------- + + + + "THE HACKER WAR -- LOD vs MOD" + + + + This t-shirt chronicles the infamous "Hacker War" between rival + + groups The Legion of Doom and The Masters of Destruction. The front + + of the shirt displays a flight map of the various battle-sites + + hit by MOD and tracked by LOD. The back of the shirt + + has a detailed timeline of the key dates in the conflict, and + + a rather ironic quote from an MOD member. + + + + (For a limited time, the original is back!) + + + + "LEGION OF DOOM -- INTERNET WORLD TOUR" + + + + The front of this classic shirt displays "Legion of Doom Internet World + + Tour" as well as a sword and telephone intersecting the planet + + earth, skull-and-crossbones style. The back displays the + + words "Hacking for Jesus" as well as a substantial list of "tour-stops" + + (internet sites) and a quote from Aleister Crowley. + + + +-------------------------------------------------------------------------- + + + + All t-shirts are sized XL, and are 100% cotton. + + + + Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for + + postage. + + + + Send checks or money orders. Please, no credit cards, even if + + it's really your card. + + + + + + Name: __________________________________________________ + + + + Address: __________________________________________________ + + + + City, State, Zip: __________________________________________ + + + + + + I want ____ "Hacker War" shirt(s) + + + + I want ____ "Internet World Tour" shirt(s) + + + + Enclosed is $______ for the total cost. + + + + + + Mail to: Chris Goggans + + 603 W. 13th #1A-278 + + Austin, TX 78701 + + + + + + These T-shirts are sold only as a novelty items, and are in no way + + attempting to glorify computer crime. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PUBLIC vs. MASS MEDIA: THE CASE OF THE INTERNET + + + + By Jim O'Loughlin (v049lnwe@ubvms.cc.buffalo.edu) + + + + In its initial configuration, the Internet was designed to be + + neither a public or a mass media. Twenty years ago, the ARPAnet, as + + it was then called, was a U.S. Department of Defense research experiment + + into how to create a computer network that could withstand partial + + outages, as from a bomb attack. (Krol 11) In the mid 1980s, the National + + Science Foundation created a network built on the ARPAnet technology that + + for the first time expanded access beyond computer researchers and + + government employees. The NSF promoted universal access by connecting + + universities only if they had plans to promote Internet use. (12) + + The Internet, as a network of networks, began expanding rapidly, becoming + + international and spawning commercial imitators such as Prodigy, CompuServe, + + and America Online. + + + + Currently, strictly commercial ventures are banned on the Internet, + + which is still officially only used for research purposes. However, its + + growing popularity and commercial potential have whetted the appetite of + + business. Much of the current discussion about the "information + + superhighway" revolves around how to turn the Internet into a source of + + commercial profit. Lost in much of the information superhighway rhetoric + + is the nature of most of the "traffic" on the Internet. For while media + + discussion often portrays the Internet as a science fiction version of + + Cable TV, much of its current popularity is due to its ability to + + facilitate discussions between people throughout the globe. To understand + + what is at stake in the transition from the Internet to the information + + superhighway, it is necessary to consider the cultural position of the + + Internet, or, to use C. Wright Mills terminology from *The Power Elite*, + + the extent to which the Internet is a public vs. a mass media. + + + + Though Mills's model focuses on the extent to which a population is a + + public or a mass, I believe it can be applied to media and its use. + + First, the formal media of communication need to be examined for the + + proportion of expressed to received opinions. In a public, "virtually + + as many people express opinions as receive them." (303) In essence, + + opinions would be communicated through direct discussions. In a mass, + + "far fewer people express opinions than receive them." (304) The extreme + + of the latter state would be a case in which "one person talks impersonally + + through a network of communications to millions of listeners and viewers." + + (302) + + + + The second standard is the extent to which an opinion can be + + responded to without "internal or external reprisals being taken." (302) + + Public communications would be organized to facilitate the immediate and + + effective response to any publicly expressed opinion without fear of + + retribution. The conditions of mass communications make it impossible for + + any individual to "answer back immediately or with any effect." (304) + + + + The third term of measurement would be the degree to which the + + formation of opinions can lead to social action. In a public realm, + + opinions can readily lead to effective action, even against the powers + + that be. Authorities retain tight control over opinion in a mass sphere + + and can organize and control any attempts at such action. + + + + Finally, there is the extent to which "institutionalized authority, + + with its sanctions and controls, penetrates the public." (303) Is a + + particular media one in which the public has true autonomy? In an ideal + + public, "authoritative institutions do not penetrate the public," (304) while + + in a mass, people have no autonomy from institutions of power and are + + frequently manipulated. + + + + The limitations of these terms need to be understood. They represent + + extreme types, "social reality is always some sort of mixture of the two. + + Yet we cannot readily understand just how much of which is mixed into our + + situation if we do not first understand, in terms of explicit dimensions, + + the clear-cut and extreme types." (302) The Internet functions in a + + combination of mass and public roles. Importantly, however, this paper + + will argue that much of what is involved in the creation of the information + + superhighway will turn the Internet into more of a mass media, to the + + detriment of the extent to which the Internet is currently a public media. + + + + The Internet is probably most noteworthy as a public media for the + + extent to which people have equal access to expressing and receiving + + opinions. Though large parts of the Internet exist to disperse information + + (tools such as GOPHER and MOSAIC are designed to facilitate access to + + databases and other information banks), much of the Internet is made up of + + bulletin boards, salons, or discussion groups around cultural, political or + + leisure topics (such as alt.cyberspace, soc.politics or + + rec.food.veg.cooking). Though some groups are controlled by moderators, + + the majority have no limitations on what can be posted. In a newsgroup, + + there are usually a number of parallel conversations (or threads) going + + on at any one time. In a recent overview of commercial on-line services + + in *Newsweek*, it was noted that people seem more interested in + + communication than services. "People want to talk to one another." + + (Meyer 39) On-line shopping and banking facilities have had a less than + + stellar reception, however, discussion groups have been hugely popular. + + More than 100,000 messages are posted on the Prodigy system every day. + + On the Internet, the equivalent of dozens of full-length novels are + + written on a daily basis. This interchange, or the extent to which + + authorship has become a public role, is perhaps the Internet's most + + important feature. + + + + A concern with the coming of the information superhighway is the + + extent to which these discussion groups will be affected. As the Internet + + becomes increasingly privatized, it comes questionable whether or not these + + groups will retain their current form. Some businesses have attempted to + + capitalize on their popularity. Microsoft is launching a Complete Baseball + + newsgroup that features discussions, fantasy-baseball leagues, and access to + + a wealth of statistical information. According to Barry Berkov of + + CompuServe, "this is where the growth is... Anything addictive is good." + + (quoted in Meyer 39) Groups based on entertainment or leisure topics + + (particularly ones in which certain people have an obsessive interest) may + + attract capital. It remains questionable what would happen to less + + "addictive" or more politically inclined groups. + + + + At its best, discussion on the Internet operates on a civil + + libertarian model. One is free to post whatever one wishes and free to + + participate in any of the discussions. However, the computer technology + + upon which the Internet relies also makes surveillance and reprisals a + + simple matter. It is relatively easy for any group to monitor a conversation + + (some on the Internet have suggested that governmental agencies do just + + that), and a simple matter for systems operators at any computer site to + + tap into one's account or to withdraw one's Internet privileges. + + Though cases of direct governmental intervention so far are few, there + + are cases such as the 18 year old who was arrested for threatening the + + president's life over electronic mail (president@whitehouse.gov). + + + + However, one of the most ominous recent developments has been the + + proposed "Clipper chip." A Clinton administration proposal to standardize + + encryption chips was recently developed in consultation with the National + + Security Agency. Telephones containing the Clipper chip would send out "a + + string of bits called a law enforcement field. Its purpose is to enable the + + police and the FBI to decode conversations that they wiretap pursuant to + + court order." (Wallich 116) Both computer civil libertarians and major + + software companies have been opposed to this proposal (the former for + + reasons of privacy, the latter for reasons of international competitiveness). + + The Clinton administration is currently rethinking the policy, nevertheless, + + the technology and means does exist to give the government an exclusive + + "back-door" into cellular telephones. + + + + The third criterion for measurement, the extent to which the + + formation of opinions can lead to social action, is the one in which the + + jury is still out on the Internet. Few traditional political groups are + + entirely "online," and the physical distance between Internet participants + + raises serious questions as to its use in organizing. Is cyberspace a + + locale within which social action is likely or possible? Has it become + + a medium of a public sphere in which people can engage public authorities + + "in a debate over the general rules governing relations in the basically + + privatized but publicly relevant sphere of commodity exchange and social + + labor?" (Habermas 27) Computer Professionals for Social Responsibility + + circulated an electronic petition in opposition to the Clipper Chip + + proposal. This petition was distributed to a wide variety of newsgroups + + and eventually forwarded to the president. Such examples, however, are + + the exception rather than the rule. Calls to action are rare on the + + Internet. The question would be whether that is a carry over from the + + state of the world outside of cyberspace or endemic to shifting populations + + of the Internet. + + + + The final issue to consider is the role of institutionalized + + authority. No single authority governs the Internet. A council of elders + + (called the Internet Architecture Board) from the Internet Society has + + responsibility for the technical management and direction of the Internet. + + (Krol 14) However, this group has almost no control over the actual content + + of materials over the Internet. Often the metaphor used to describe the + + rules of the Internet is "frontier justice." "The two overriding premises + + of network ethics are: Individualism is honored and fostered. + + The network is good and must be protected." (35) Such a definition seems + + a bit romanticized but it does capture the suspicion of any authorial + + intrusion into cyberspace. Many recognize that the computer technology + + which brought about the Internet also makes stricter governmental control + + a possibility. + + + + As the Internet slowly becomes repaved into the Information + + superhighway, it will be important to watch the extent to which people are + + assumed to be either a mass or a public. In the former case, we can expect + + governmental concern about consumer rights, or the ability of people to have + + the ability to obtain as much information as possible for a reasonable price. + + Such a mindset governs most federal discussions about cable television + + regulation. However, if the people are considered to constitute a public, + + then concern will be raised about what Jurgen Habermas has termed + + "participatory rights" (229) These are not simply rights which protect + + people from something (often the intrusion of government), but rights which, + + in this case, ensure people's ability to partake in freedom of assembly and + + association through the medium of the Internet. + + + + Works Cited + + + + Habermas, Jurgen. *The Structural Transformation of the Public Sphere: An + + Inquiry into a Category of Bourgeois Society* Cambridge: MIT Press, + + 1993 (1962). + + + + Krol, Ed. *The Whole Internet: User's Buide & Catalog* Sebastopal, CA: + + O'Reilly & Associates, Inc., 1992. + + + + Meyer, Michael. "The 'On-Line' War Heats Up." *Newsweek* 28 March + + 1994: 38-9. + + + + Mills, C. Wright. *The Power Elite* New York: Oxford University Press, + + 1956. + + + + Wallich Paul. "Clipper Runs Aground." *Scientific American* August 1993: + + 116. + + + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + BRUCE STERLING'S REMARKS AT CFP '94 + + + + Posted By Carl Kadie (kadie@eff.org) + + Comments to Bruce Sterling (bruces@well.sf.ca.us) + + + + LITERARY FREEWARE: NOT FOR COMMERCIAL USE + + + + I've been asked to explain why I don't worry much about the + + topics of privacy threat raised by this panel. And I don't. One reason + + is that these scenarios seem to assume that there will be large, + + monolithic bureaucracies (of whatever character, political or + + economic) that are capable of harnessing computers for one-way + + surveillance of an unsuspecting populace. I've come to feel that + + computation just doesn't work that way. Being afraid of monolithic + + organizations especially when they have computers, is like being + + afraid of really big gorillas especially when they are on fire. + + + + The threat simply doesn't concur with my historical + + experience. None of the large organizations of my youth that + + compelled my fear and uneasy respect have prospered. Let me just + + roll off a few acronyms here. CCCP. KGB. IBM. GM. AEC. SAC. + + + + It was recently revealed that the CIA has been of actual + + negative worth -- literally worse than useless -- to American + + national security. They were in the pockets of the KGB during our + + death struggle with the Soviet Union -- and yet we still won. + + Japanese zaibatsus -- Japan Inc. -- the corporate monoliths of Japan + + -- how much hype have we heard about that lately? I admit that + + AT&T has prospered, sort of -- if you don't count the fact that + + they've hollowed themselves out by firing a huge percentage of their + + personnel. + + + + Suppose that, say, Equifax, turned into an outright fascist + + organization and stated abusing privacy in every way they could. + + How could they keep that a secret? Realistically, given current + + employment practices in the Western economies, what kind of + + loyalty could they command among their own personnel? The low + + level temps have no health insurance and no job security; the high + + level people are ready to grab their golden parachutes and bail at any + + time. Where is the fanatically loyal army of gray flannel + + organization men who will swear lifelong allegiance to this + + organization, or *any* organization in this country with the possible + + exception of the Mafia? + + + + I feel that the real threat to our society isn't because people + + are being surveilled but because people are being deliberately + + ignored. People drop through the safety nets. People stumble + + through the streets of every city in this country absolutely wrapped + + in the grip of demons, groping at passersby for a moment's attention + + and pity and not getting it. In parts of the Third World people are + + routinely disappeared, not because of high-tech computer + + surveillance but for the most trivial and insane reasons -- because + + they wear glasses, because they were seen reading a book -- and if + + they survive, it's because of the thin thread of surveillance carried + + out by Amnesty International. + + + + There may be securicams running 24 hours a day all around us, + + but mechanical surveillance is not the same as people actually + + getting attention or care. Sure, rich people, like most of us here, are + + gonna get plenty of attention, probably too much, a poisonous + + amount, but in the meantime life has become so cheap in this society + + that we let people stagger around right in front of us exhaling + + tuberculosis without treatment. It's not so much information haves + + and have-nots and watch and watch-nots. + + + + I wish I could speak at greater length more directly to the + + topic of this panel. But since I'm the last guy to officially speak at + + CFP IV, I want the seize the chance to grandstand and do a kind of + + pontifical summation of the event. And get some irrepressible + + feelings off my chest. + + + + What am I going to remember from CFP IV? I'm going to + + remember the Chief Counsel of NSA and his impassioned insistence + + that key escrow cryptography represents normality and the status + + quo, and that unlicensed hard cryptography is a rash and radical leap + + into unplumbed depths of lawlessness. He made a literary reference + + to BRAVE NEW WORLD. What he said in so many words was, "We're + + not the Brave New World, Clipper's opponents are the Brave New + + World." + + + + And I believe he meant that. As a professional science fiction + + writer I remember being immediately struck by the deep conviction + + that there was plenty of Brave New World to go around. + + + + I've been to all four CFPs, and in my opinion this is the darkest + + one by far. I hear ancestral voices prophesying war. All previous + + CFPs had a weird kind of camaraderie about them. People from the + + most disparate groups found something useful to tell each other. + + But now that America's premiere spookocracy has arrived on stage + + and spoken up, I think the CFP community has finally found a group of + + outsiders that it cannot metabolize. The trenchworks are going up + + and I see nothing but confrontation ahead. + + + + Senator Leahy at least had the elementary good sense to + + backpedal and temporize, as any politician would when he saw the + + white-hot volcano of technological advance in the direct path of a + + Cold War glacier that has previously crushed everything in its way. + + + + But that unlucky flak-catcher the White House sent down here + + -- that guy was mousetrapped, basically. That was a debacle! Who + + was briefing that guy? Are they utterly unaware? How on earth + + could they miss the fact that Clipper and Digital Telephony are + + violently detested by every element in this community -- with the + + possible exception of one brave little math professor this high? + + Don't they get it that everybody from Rush Limbaugh to Timothy + + Leary despises this initiative? Don't they read newspapers? The + + Wall Street Journal, The New York Times? I won't even ask if they + + read their email. + + + + That was bad politics. But that was nothing compared to the + + presentation by the gentleman from the NSA. If I can do it without + + losing my temper, I want to talk to you a little bit about how + + radically unsatisfactory that was. + + + + I've been waiting a long time for somebody from Fort Meade to + + come to the aid of Dorothy Denning in Professor Denning's heroic and + + heartbreaking solo struggle against twelve million other people with + + email addresses. And I listened very carefully and I took notes and I + + swear to God I even applauded at the end. + + + + He had seven points to make, four of which were disingenuous, + + two were half-truths, and the other was the actual core of the + + problem. + + + + Let me blow away some of the smoke and mirrors first, more + + for my own satisfaction than because it's going to enlighten you + + people any. With your indulgence. + + + + First, the kidporn thing. I am sick and tired of hearing this + + specious blackwash. Are American citizens really so neurotically + + uptight about deviant sexual behavior that we will allow our entire + + information infrastructure to be dictated by the existence of + + pedophiles? Are pedophiles that precious and important to us? Do + + the NSA and the FBI really believe that they can hide the structure of + + a telephone switch under a layer of camouflage called child + + pornography? Are we supposed to flinch so violently at the specter + + of child abuse that we somehow miss the fact that you've installed a + + Sony Walkman jack in our phones? + + + + Look, there were pedophiles before NII and there will be + + pedophiles long after NII is just another dead acronym. Pedophiles + + don't jump out of BBSes like jacks in the box. You want to impress + + me with your deep concern for children? This is Chicago! Go down + + to the Projects and rescue some children from being terrorized and + + recruited by crack gangs who wouldn't know a modem if it bit them + + on the ass! Stop pornkidding us around! Just knock it off with that + + crap, you're embarrassing yourselves. + + + + But back to the speech by Mr. Baker of the NSA. Was it just me, + + ladies and gentlemen, or did anyone else catch that tone of truly + + intolerable arrogance? Did they guy have to make the remark about + + our missing Woodstock because we were busy with our + + trigonometry? Do spook mathematicians permanently cooped up + + inside Fort Meade consider that a funny remark? I'd like to make an + + even more amusing observation -- that I've seen scarier secret + + police agencies than his completely destroyed by a Czech hippie + + playwright with a manual typewriter. + + + + Is the NSA unaware that the current President of the United + + States once had a big bushel-basket-full of hair? What does he + + expect from the computer community? Normality? Sorry pal, we're + + fresh out! Who is it, exactly, that the NSA considers a level-headed + + sober sort, someone to sit down with and talk to seriously? Jobs? + + Wozniak? Gates? Sculley? Perot -- I hope to God it's not Perot. + + Bob Allen -- okay, maybe Bob Allen, that brownshoe guy from AT&T. + + Bob Allen seems to think that Clipper is a swell idea, at least he's + + somehow willing to merchandise it. But Christ, Bob Allen just gave + + eight zillion dollars to a guy whose idea of a good time is Microsoft + + Windows for Spaceships! + + + + When is the NSA going to realize that Kapor and his people and + + Rotenberg and his people and the rest of the people here are as good + + as people get in this milieu? Yes they are weird people, and yes they + + have weird friends (and I'm one of them), but there isn't any + + normality left for anybody in this society, and when it comes to + + computers, when the going got weird the weird turned pro! The + + status quo is *over!* Wake up to it! Get used to it! + + + + Where in hell does a crowd of spooks from Fort Meade get off + + playing "responsible adults" in this situation? This is a laugh and a + + half! Bobby Ray Inman, the legendary NSA leader, made a stab at + + computer entrepreneurism and rapidly went down for the third time. + + Then he got out of the shadows of espionage and into the bright + + lights of actual public service and immediately started gabbling like + + a daylight-stricken vampire. Is this the kind of responsive public + + official we're expected to blindly trust with the insides of our + + phones and computers? Who made him God? + + + + You know, it's a difficult confession for a practiced cynic like + + me to make, but I actually trust EFF people. I do; I trust them; + + there, I've said it. But I wouldn't trust Bobby Ray Inman to go down + + to the corner store for a pack of cigarettes. + + + + You know, I like FBI people. I even kind of trust them, sort of, + + kind of, a little bit. I'm sorry that they didn't catch Kevin Mitnick + + here. I'm even sorry that they didn't manage to apprehend Robert + + Steele, who is about one hundred times as smart as Mitnick and ten + + thousand times as dangerous. But FBI people, I think your idea of + + Digital Telephony is a scarcely mitigated disaster, and I'll tell you + + why. + + + + Because you're going to be filling out your paperwork in + + quintuplicate to get a tap, just like you always do, because you don't + + have your own pet court like the NSA does. And for you, it probably + + is going to seem pretty much like the status quo used to be. But in + + the meantime, you will have armed the enemies of the United States + + around the world with a terrible weapon. Not your court-ordered, + + civilized Digital Telephony -- their raw and tyrannical Digital + + Telephony. + + + + You're gonna be using it to round up wiseguys in streetgangs, + + and people like Saddam Hussein are gonna be using it to round up + + democratic activists and national minorities. You're going to + + strengthen the hand of despotism around the world, and then you're + + going to have to deal with the hordes of state-supported + + truckbombers these rogue governments are sending our way after + + annihilating their own internal opposition by using your tools. You + + want us to put an axe in your hand and you're promising to hit us + + with only the flat side of it, but the Chinese don't see it that way; + + they're already licensing fax machines and they're gonna need a lot + + of new hardware to gear up for Tiananmen II. + + + + I've talked a long time, but I want to finish by saying + + something about the NSA guy's one real and actual argument. The + + terrors of the Brave New World of free individual encryption. When + + he called encryption enthusiasts "romantic" he was dead-on, and + + when he said the results of spreading encryption were unpredictable + + and dangerous he was also dead-on, because people, encryption is not + + our friend. Encryption is a mathematical technique, and it has about + + as much concern for our human well-being as the fact that seventeen + + times seventeen equals two hundred and eighty-nine. It does, but + + that doesn't make us sleep any safer in our beds. + + + + Encrypted networks worry the hell out of me and they have + + since the mid 1980s. The effects are very scary and very + + unpredictable and could be very destabilizing. But even the Four + + Horsemen of Kidporn, Dope Dealers, Mafia and Terrorists don't worry + + me as much as totalitarian governments. It's been a long century, + + and we've had enough of them. + + + + Our battle this century against totalitarianism has left + + terrible scars all over our body politic and the threat these people + + pose to us is entirely and utterly predictable. You can say that the + + devil we know is better than the devil we don't, but the devils we + + knew were ready to commit genocide, litter the earth with dead, and + + blow up the world. How much worse can that get? Let's not build + + chips and wiring for our police and spies when only their police and + + spies can reap the full benefit of them. + + + + But I don't expect my arguments to persuade anyone in the NSA. + + If you're NSA and I do somehow convince you, by some fluke, then I + + urge you to look at your conscience -- I know you have one -- and + + take the word to your superiors and if they don't agree with you -- + + *resign.* Leave the Agency. Resign now, and if I'm right about + + what's coming down the line, you'll be glad you didn't wait till later. + + + + But even though I have a good line of gab, I don't expect to + + actually argue people out of their livelihood. That's notoriously + + difficult. + + + + So CFP people, you have a fight on your hands. I'm sorry that a + + community this young should have to face a fight this savage, for + + such terribly high stakes, so soon. But what the heck; you're + + always bragging about how clever you are; here's your chance to + + prove to your fellow citizens that you're more than a crowd of net- + + nattering MENSA dilettantes. In cyberspace one year is like seven + + dog years, and on the Internet nobody knows you're a dog, so I figure + + that makes you CFP people twenty-eight years old. And people, for + + the sake of our society and our children you had better learn to act + + your age. + + + + Good luck. Good luck to you. For what it's worth, I think you're + + some of the best and brightest our society has to offer. Things look + + dark but I feel hopeful. See you next year in San Francisco. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + [BOOK REVIEW] DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC + + HIGHWAY IS TRANSFORMING AMERICAN COMPANIES + + + + By Steve Brock (sbrock@teal.csn.org) + + + + DOING BUSINESS ON THE INTERNET: HOW THE ELECTRONIC HIGHWAY IS + + TRANSFORMING AMERICAN COMPANIES by Mary J. Cronin. Van Nostrand + + Reinhold, 115 Fifth Avenue, N.Y., NY 10003, (800) 544-0550, (212) + + 254-9499 FAX. Index, bibliography, list of service providers. 320 + + pp., $29.95 paper. 0-442-01770-7 + + + + REVIEW + + + + Buying and selling on the Internet? Deals being made? Call + + the net police! Seriously, commercial traffic is only forbidden on + + the NSFnet - the Internet backbone, and restrictions there are + + scheduled to disappear by the end of this year, when the National + + Science Foundation (NSF) turns its administration of NSFnet over to + + commercial organizations. Sensing this transition, companies are + + flocking to the Internet. In a recent survey, 63% of Internet + + traffic worldwide is by businesses or their research labs. + + + + What can businesses get from the Internet? Mary Cronin, in + + her new book "Doing Business on the Internet," has many answers. + + After an overview of the mother of all networks and tips for + + choosing a service provider, she outlines strategies for seeking + + and exchanging information, increasing productivity, and increasing + + communications between departments and with customers. + + + + Another asset for businesses is that information can be + + retrieved swiftly. While the Internet has gone through many + + permutations, businesses have business to do right now, and Cronin + + says that companies with an Internet connection can "receive the + + advantages of high-speed telecommunications and continuously + + evolving technology while learning invaluable lessons about the + + management of networked organizations." + + + + While a few may desire more information than the non-technical + + overview Cronin provides, "Doing Business on the Internet" is a + + solid introduction to networked communication and information + + retrieval - the way business is going to be conducted from now on. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + GENERIC FLAME FORM + + + + This form is a generic-all-purpose Flame Form (tm). Don't you just hate it + + when you are reading Usenet and can't filter through all of the crap + + posted by people who simply do not have a clue! Well, maybe this form + + will cut down on some of that. If someone pisses you off on Usenet, + + fill it out and mail it to 'em. + + + + ---------cut here-------------cut here-------------cut here------------- + + + + ************************************************************************* + + GENERIC FLAME FORM + + ************************************************************************* + + + + Dear Sir/Madam + + + + I took exception to your recent post to alt.insert.newsgroup.here + + + + MESSAGE CONTENT SECTION + + + + It was (check all that apply): + + + + ___ lame. + + ___ stupid. + + ___ much longer than any worthwhile thought of which you may be capable. + + + + Your attention is drawn to the fact that: + + + + ___ What you posted/said has been done before. + + ___ Not only that, it was also done better the last time. + + ___ Your post was a pathetic imitation of ______________________. + + ___ Your post contained commercial advertising. + + ___ Your post contained numerous spelling errors. + + ___ Your post contained multiple grammatical errors. + + ___ YOUR POST CONTAINED EXCESSIVE CAPITALIZATION AND/OR PUNCTUATION!!!!! + + ___ Your post was an obvious forgery. + + ___ It was done clumsily. + + ___ You quoted an article in followup and added no new text. + + ___ You quoted an article in followup and only added ___ lines of text. + + ___ You quoted an article in followup and only added the line "Me, too!!!" + + ___ You flamed someone who has been around far longer than you. + + ___ You flamed someone who is far more intelligent and witty than you. + + ___ Your lines are 80 columns wide or wider. + + + + SIGNATURE SECTION + + + + ___ Your .sig is longer than four lines. + + ___ And your mailer truncated it. + + ___ Your .sig is ridiculous because (check all that apply): + + ___ You listed ___ snail mail address(es). + + ___ You listed a nine-digit ZIP code. + + ___ You listed ___ phone numbers for people to use in prank calls. + + ___ You included a stupid disclaimer. + + + + ___ Your pathetic attempt at being witty in the disclaimer failed. + + ___ Miserably. + + + + You included: + + ___ a stupid self-quote. + + ___ a stupid quote from a net.nobody. + + ___ a Rush Limbaugh quote. + + ___ a Dan Quayle joke. + + ___ a Hitler reference + + ___ a reference to the world being 6000 years old + + ___ a reference to Beavis & Butthead. + + ___ lame ASCII graphic(s) (Choose all that apply): + + ___ USS Enterprise + + ___ Australia + + ___ The Amiga logo + + ___ Company logo + + ___ and you stated that you don't speak for your employer. + + ___ Bicycle + + ___ Bart Simpson + + + + Furthermore: + + + + ___ You have greatly misunderstood the purpose of alt.insert.newsgroup.here + + ___ You have greatly misunderstood the purpose of the net. + + ___ You are a loser. + + ___ You must have spent your entire life on a milk carton to be this dumb! + + ___ This has been pointed out to you before. + + + + ___ It is recommended that you: + + ___ Stick to FidoNet and come back when you've grown up. + + ___ Find a volcano and throw yourself in. + + ___ Get a gun and shoot yourself. + + ___ Stop reading alt.censorship and get a life. + + ___ Stop sending email and get a life. + + ___ Learn the concepts of cross-posting and follow-ups + + ___ Try reading a newsgroup for a week (or more than an hour) before + + posting + + + + Additional comments: + + Follow-ups to: /dev/null + + + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + McDonnell Douglas + + AIRCRAFT-SPACE SYSTEMS-MISSILES + + + + Important! Important! + + + + Please fill out and mail this form within 10 days of purchase + + + + Thank you for purchasing a McDonnell Douglas military aircraft. In + + order to protect your new investment, please take a few moments to + + fill out the warranty registration card below. Answering the survey + + questions is not required, but the information will help us to develop new + + products that best meet your needs and desires. + + + + 1. _Mr. _Mrs. _Ms. _Lt. _Gen. _Comrade _Classified _Other + + + + First Name________________Initial____Last Name_______________________ + + + + Latitude________________________Longitude____________________________ + + + + Altitude____________________Password, Code Name, Etc.________________ + + + + 2. Which model aircraft did you purchase? + + + + _F-15 Eagle _F-16 Falcon _F-117A Stealth _Classified + + + + 3. Date of purchase: Month___________Day___________Year____________ + + + + 4. Serial Number____________________ + + + + 5. Please check where this product was purchased: + + + + _Received as Gift/Aid Package + + _Catalog Showroom + + _Sleazy Arms Broker + + _Mail Order + + _Discount Store + + _Government Surplus + + _Classified + + + + 6. Please check how you became aware of the McDonnell Douglas product + + you have just purchased: + + + + _Heard loud noise, looked up + + _Store Display + + _Espionage + + _Recommended by friend/relative/ally + + _Political lobbying by Manufacturer + + _Was attacked by one + + + + 7. Please check the three (3) factors which most influenced your + + decision to purchase this McDonnell Douglas product: + + + + _Style/Appearance + + _Kickback/Bribe + + _Recommended by salesperson + + _Speed/Maneuverability + + _Comfort/Convenience + + _McDonnell Douglas Reputation + + _Advanced Weapons Systems + + _Price/Value + + _Back-Room Politics + + _Negative experience opposing one in combat + + + + 8. Please check the location(s) where this product will be used: + + + + _North America + + _Central/South America + + _Aircraft Carrier + + _Europe + + _Middle East + + _Africa + + _Asia/Far East + + _Misc. Third-World Countries + + _Classified + + + + 9. Please check the products that you currently own, or intend to purchase in + + the near future: + + + + Product Own Intend to purchase + + Color TV + + VCR + + ICBM + + Killer Satellite + + CD Player + + Air-to-Air Missiles + + Space Shuttle + + Home Computer + + Nuclear Weapon + + + + 10. How would you describe yourself or your organization? Check all + + that apply: + + + + _Communist/Socialist + + _Terrorist + + _Crazed (Islamic) + + _Crazed (Other) + + _Neutral + + _Democratic + + _Dictatorship + + _Corrupt (Latin American) + + _Corrupt (Other) + + _Primitive/Tribal + + + + 11. How did you pay for your McDonnell Douglas product? + + + + _Cash + + _Suitcases of Cocaine + + _Oil Revenues + + _Deficit Spending + + _Personal Check + + _Credit Card + + _Ransom Money + + _Traveler's Check + + + + 12. Occupation You Your Spouse + + + + Homemaker + + Sales/Marketing + + Revolutionary + + Clerical + + Mercenary + + Tyrant + + Middle Management + + Eccentric Billionaire + + Defense Minister/General + + Retired + + Student + + + + 13. To help us understand our Customers' lifestyles, please indicate + + the interests and activities in which you and your spouse enjoy + + participating on a regular basis: + + + + Activity/Interest You Your Spouse + + Golf + + Boating/Sailing + + Sabotage + + Running/Jogging + + Propaganda/Disinformation + + Destabilizing/Overthrow + + Default on Loans + + Gardening + + Crafts + + Black Market/Smuggling + + Collectibles/Collections + + Watching Sports on TV + + Wines + + Interrogation/Torture + + Household Pets + + Crushing Rebellions + + Espionage/Reconnaissance + + Fashion Clothing + + Border Disputes + + Mutually Assured Destruction + + + + Thanks for taking the time to fill out this questionnaire. Your + + answers will be used in market studies that will help McDonnell + + Douglas serve you better in the future -- as well as allowing you to + + receive mailings and special offers from other companies, governments, + + extremist groups, and mysterious consortia. + + + + Comments or suggestions about our fighter planes? Please write to: + + + + McDONNELL DOUGLAS CORPORATION + + Marketing Department + + Military Aerospace Division + + P.O. Box 800 + + St. Louis, MO 55500 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SOCIAL CONTRACT + + between an individual and the United States Government + + + + WHEREAS I wish to reside on the North American continent, and + + WHEREAS the United States Government controls the area of the + + continent on which I wish to reside, and + + WHEREAS tacit or implied contracts are vague and therefore + + unenforceable, + + + + I agree to the following terms: + + + + SECTION 1: I will surrender a percentage of my property to the + + Government. The actual percentage will be determined by the Government and + + will be subject to change at any time. The amount to be surrended may be + + based on my income, the value of my property, the value of my purchases, or + + any other criteria the Government chooses. To aid the Government in + + determining the percentage, I will apply for a Government identification + + number that I will use for all of my major financial transactions. + + + + SECTION 2: Should the Government demand it, I will surrender my liberty for + + a period of time determined by the Government and typically no shorter than + + two years. During that time, I will serve the Government in any way it + + chooses, including military service in which I may be called upon to + + sacrifice my life. + + + + SECTION 3: I will limit my behavior as demanded by the Government. I will + + consume the drugs only permitted by the Government. I will limit my sexual + + activities to those permitted by the Government. I will forsake religious + + beliefs that conflict with the Government's determination of propriety. + + More limits may be imposed at any time. + + + + SECTION 4: In consideration of the above the Government will allow me to + + find employment, subject to limits that will be subject to the Government. + + These limits may restrict my choice of career or the wages I may accept. + + + + SECTION 5: The Government will permit me to reside in the area of North + + America that it controls. Also the Government will permit me to speak + + freely, subject to limits determined by the Government's Congress and + + Supreme Court. + + + + SECTION 6: The Government will attempt to protect my life and my claim to + + the property that it has allowed me to keep. I agree not to hold the + + Government liable if it fails to protect me or my property. + + + + SECTION 7: The Government will offer various services to me. The nature + + and extent of these services will be determined by the Government and are + + subject to change at any time. + + + + SECTION 8: The Government will determine whether I may vote for certain + + Government officials. The influence of my vote will vary inversely with the + + number of voters, and I understand that it will be typically miniscule. I + + agree not to hold any elected Government officials liable for acting against + + my best interests or for breaking promises, even if those promises motivated + + me to vote for them. + + + + SECTION 9: I agree that the Government may hold me fully liable if I fail + + to abide by the above terms. In that event, the Government may confiscate + + any property that I have not previously surrended to it, and may imprison me + + for a period of time determined by the Government. I also agree that the + + Government may alter the terms of this contract at any time. + + + + + + ______________________________________ ______________________________ + + SIGNATURE DATE + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Electronic Petition to Oppose Clipper + + Please Distribute Widely + + + + On January 24, many of the nation's leading experts in cryptography + + and computer security wrote President Clinton and asked him to + + withdraw the Clipper proposal. + + + + The public response to the letter has been extremely favorable, + + including coverage in the New York Times and numerous computer and + + security trade magazines. + + + + Many people have expressed interest in adding their names to the + + letter. In response to these requests, CPSR is organizing an + + Internet petition drive to oppose the Clipper proposal. We will + + deliver the signed petition to the White House, complete with the + + names of all the people who oppose Clipper. + + + + To sign on to the letter, send a message to: + + + + Clipper.petition@cpsr.org + + + + with the message "I oppose Clipper" (no quotes) + + + + You will receive a return message confirming your vote. + + + + Please distribute this announcement so that others may also express + + their opposition to the Clipper proposal. + + + + CPSR is a membership-based public interest organization. For + + membership information, please email cpsr@cpsr.org. For more + + information about Clipper, please consult the CPSR Internet Library - + + FTP/WAIS/Gopher CPSR.ORG /cpsr/privacy/crypto/clipper + + + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + The President + + The White House + + Washington, DC 20500 + + + + Dear Mr. President: + + + + We are writing to you regarding the "Clipper" escrowed encryption + + proposal now under consideration by the White House. We wish to + + express our concern about this plan and similar technical standards + + that may be proposed for the nation's communications infrastructure. + + + + The current proposal was developed in secret by federal agencies + + primarily concerned about electronic surveillance, not privacy + + protection. Critical aspects of the plan remain classified and thus + + beyond public review. + + + + The private sector and the public have expressed nearly unanimous + + opposition to Clipper. In the formal request for comments conducted + + by the Department of Commerce last year, less than a handful of + + respondents supported the plan. Several hundred opposed it. + + + + If the plan goes forward, commercial firms that hope to develop + + new products will face extensive government obstacles. Cryptographers + + who wish to develop new privacy enhancing technologies will be + + discouraged. Citizens who anticipate that the progress of technology + + will enhance personal privacy will find their expectations + + unfulfilled. + + + + Some have proposed that Clipper be adopted on a voluntary basis + + and suggest that other technical approaches will remain viable. The + + government, however, exerts enormous influence in the marketplace, and + + the likelihood that competing standards would survive is small. Few + + in the user community believe that the proposal would be truly + + voluntary. + + + + The Clipper proposal should not be adopted. We believe that if + + this proposal and the associated standards go forward, even on a + + voluntary basis, privacy protection will be diminished, innovation + + will be slowed, government accountability will be lessened, and the + + openness necessary to ensure the successful development of the + + nation's communications infrastructure will be threatened. + + + + We respectfully ask the White House to withdraw the Clipper + + proposal. + + + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE WHITE HOUSE + + Office of the Press Secretary + + + + For Immediate Release + + + + STATEMENT BY THE PRESS SECRETARY + + + + The President today announced a new initiative that will bring + + the Federal Government together with industry in a voluntary + + program to improve the security and privacy of telephone + + communications while meeting the legitimate needs of law + + enforcement. + + + + The initiative will involve the creation of new products to + + accelerate the development and use of advanced and secure + + telecommunications networks and wireless communications links. + + + + For too long, there has been little or no dialogue between our + + private sector and the law enforcement community to resolve the + + tension between economic vitality and the real challenges of + + protecting Americans. Rather than use technology to accommodate + + the sometimes competing interests of economic growth, privacy and + + law enforcement, previous policies have pitted government against + + industry and the rights of privacy against law enforcement. + + + + Sophisticated encryption technology has been used for years to + + protect electronic funds transfer. It is now being used to + + protect electronic mail and computer files. While encryption + + technology can help Americans protect business secrets and the + + unauthorized release of personal information, it also can be used + + by terrorists, drug dealers, and other criminals. + + + + A state-of-the-art microcircuit called the "Clipper Chip" has + + been developed by government engineers. The chip represents a + + new approach to encryption technology. It can be used in new, + + relatively inexpensive encryption devices that can be attached to + + an ordinary telephone. It scrambles telephone communications + + using an encryption algorithm that is more powerful than many in + + commercial use today. + + + + This new technology will help companies protect proprietary + + information, protect the privacy of personal phone conversations + + and prevent unauthorized release of data transmitted + + electronically. At the same time this technology preserves the + + ability of federal, state and local law enforcement agencies to + + intercept lawfully the phone conversations of criminals. + + + + A "key-escrow" system will be established to ensure that the + + "Clipper Chip" is used to protect the privacy of law-abiding + + Americans. Each device containing the chip will have two unique + + "keys," numbers that will be needed by authorized government + + agencies to decode messages encoded by the device. When the + + device is manufactured, the two keys will be deposited separately + + in two "key-escrow" data bases that will be established by the + + Attorney General. Access to these keys will be limited to + + government officials with legal authorization to conduct a + + wiretap. + + + + The "Clipper Chip" technology provides law enforcement with no + + new authorities to access the content of the private + + conversations of Americans. + + + + To demonstrate the effectiveness of this new technology, the + + Attorney General will soon purchase several thousand of the new + + devices. In addition, respected experts from outside the + + government will be offered access to the confidential details of + + the algorithm to assess its capabilities and publicly report + + their findings. + + + + The chip is an important step in addressing the problem of + + encryption's dual-edge sword: encryption helps to protect the + + privacy of individuals and industry, but it also can shield + + criminals and terrorists. We need the "Clipper Chip" and other + + approaches that can both provide law-abiding citizens with access + + to the encryption they need and prevent criminals from using it + + to hide their illegal activities. In order to assess technology + + trends and explore new approaches (like the key-escrow system), + + the President has directed government agencies to develop a + + comprehensive policy on encryption that accommodates: + + + + the privacy of our citizens, including the need to + + employ voice or data encryption for business purposes; + + + + the ability of authorized officials to access telephone + + calls and data, under proper court or other legal + + order, when necessary to protect our citizens; + + + + the effective and timely use of the most modern + + technology to build the National Information + + Infrastructure needed to promote economic growth and + + the competitiveness of American industry in the global + + marketplace; and + + + + the need of U.S. companies to manufacture and export + + high technology products. + + + + The President has directed early and frequent consultations with + + affected industries, the Congress and groups that advocate the + + privacy rights of individuals as policy options are developed. + + + + The Administration is committed to working with the private + + sector to spur the development of a National Information + + Infrastructure which will use new telecommunications and computer + + technologies to give Americans unprecedented access to + + information. This infrastructure of high-speed networks + + ("information superhighways") will transmit video, images, HDTV + + programming, and huge data files as easily as today's telephone + + system transmits voice. + + + + Since encryption technology will play an increasingly important + + role in that infrastructure, the Federal Government must act + + quickly to develop consistent, comprehensive policies regarding + + its use. The Administration is committed to policies that + + protect all American's right to privacy while also protecting + + them from those who break the law. + + + + Further information is provided in an accompanying fact sheet. + + The provisions of the President's directive to acquire the new + + encryption technology are also available. + + + + For additional details, call Mat Heyman, National Institute of + + Standards and Technology, (301) 975-2758. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + ISDN Contacts (RBOCS) + + + + Editor's Note: + + This is a list sent to us regarding getting more info on ISDN from the + + RBOCS. We claim no accuracy to this info. I am sure that most, if not + + all of it is valid. If you need ISDN info, feel free to contact one + + of the organizations below. + + + + + + COMPANY CONTACT TELEPHONE NO. + + + + AMERITECH National ISDN Hotline 1-800-543-ISDN + + BELL ATLANTIC ISDN Sales & Technology Center 1-800-570-ISDN + + BELL SOUTH National ISDN HotLine 1-800-428-ISDN + + CINCINNATI BELL ISDN Service Center 1-513-566-DATA + + NYNEX ISDN Information Hotline 1-800-GET-ISDN + + or Roy Ray 1-914-644-5152 + + PACIFIC BELL ISDN Information or Wayne Purves, 1-800-622-0735 + + NI-1 Product Mgr. 1-510-823-5118 + + SNET Donovan Dillon 1-203-553-2369 + + STENTOR (Canada) Steve Finlay 1-604-432-3527 + + SOUTHWESTERN BELL Cyd McInerney 1-314-235-1567 + + U S WEST Louise Walsh 1-303-965-7073 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + BELLSOUTH ANNOUNCES LARGEST GEOGRAPHIC DEPLOYMENT OF ISDN IN THE NATION + + + + Advanced telecommuting telemedicine and education applications will become + + the most widely available in the nation as a result of a technology + + deployment plan announced today by BellSouth Telecommunications. + + + + The nine-state introduction of a new way to provide Integrated Services + + Digital Network (ISDN), which combines voice, data and video services, + + begins in June 1994. ISDN can use advanced fiber optic cable or + + traditional copper cable to transmit multiple services. + + + + Until now, a customer who wished to use ISDN needed to be served by a + + telephone office that was ISDN capable. With the innovative approach by + + BellSouth, a customer can obtain the benefits of ISDN through an alternate + + serving arrangement which eradicates geographic boundaries. + + + + "Expanded access to ISDN will facilitate customer-oriented applications + + since there are fewer technological and geographic limitations on + + availability," said Larry Carter, assistant vice president of product + + management for BellSouth Telecommunications. + + + + This announcement is the latest in a very aggressive deployment strategy + + for ISDN. + + + + -- In July 1992, Bellsouth announced the nation's first metropolitan-wide + + deployment of ISDN in the cities of Huntsville and Madison, Ala. + + + + -- Six months later, South Central Bell customers throughout the state + + of Tennessee were offered ISDN Individual Line Service and now ISDN + + availability is being expanded region wide. + + + + This announcement significantly increases the percentage of customers + + with access to ISDN capabilities and will ultimately lead to 100% of + + BellSouth customers. Until now, 50% of BellSouth's customers in major + + metropolitan areas had direct access to ISDN and 320 central offices were + + equipped with ISDN. The expanded access applies to ISDN Individual Line + + (2B+D) and MegaLink (SM) ISDN Service which is BellSouth's primary rate + + (23B+D) offering. + + + + "Previously, you had to be served directly by a central office switch + + equipped with ISDN capability. Under this new alternate serving + + arrangement, ISDN capabilities can be routed from a nearby ISDN-capable + + switch to your home or office -- at no additional charge. This + + arrangement is a cost-effective and expeditious method of deploying + + ISDN region wide," Carter said. + + + + ISDN availability is an important part of the information superhighway + + providing access at lower speeds. For example, through distance + + learning, advanced classes could be transported at very high speeds + + to a customer's city on the information highway from a university in + + another city. This high speed signal is then divided into lower speeds + + and redistributed within the city. ISDN would make these classes + + available to any school anywhere. + + + + Dr. Ira Denton, chief surgeon at Crestwood Hospital in Huntsville, Ala., + + has used ISDN to send, receive and annotate X-rays and video images + + while talking to other physicians. Because ISDN is available citywide + + and there are no geographic restrictions, physicians can communicate + + through ISDN from any of their offices and even their homes. + + + + "Health care specialists as well as any other businesses that have + + multiple locations within a metropolitan area can benefit from this new + + capability," Carter added. "The education industry will especially benefit + + from applications including distance learning, security and truancy + + monitoring." + + + + To aid in marketing ISDN, last year BellSouth announced the "ISDN + + Applications and Solutions Plus" (IAS+) initiative where strategic + + marketing alliances are formed in major metropolitan areas to provide + + customers with complete and innovative solutions. This initiative in + + addition to the expanded access will make ISDN applications more readily + + available for BellSouth customers. + + + + BellSouth Telecommunications, Inc., with headquarters in Atlanta, provides + + telecommunications services in the BellSouth (NYSE: BLS) region. BellSouth + + Telecommunications, Inc. does business as Southern Bell in North Carolina, + + South Carolina, Georgia and Florida, and as South Central Bell in + + Kentucky, Tennessee, Alabama, Mississippi and Louisiana. These + + companies serve more than 19 million local telephone lines and provide + + local exchange and intraLATA long distance service over one of the most + + modern telecommunications networks in the world. + + + + CONTACT: + + Karen M. Roughton of BellSouth Telecommunications, 404-529-6514 + + BellSouth National ISDN HotLine, 1-800-428-4736 + + + + Posted by: + + Bellcore ISDN Hotline 1-800-992-ISDN + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + A CATALOG OF NATIONAL ISDN SOLUTIONS ... + + + + The files in this directory compose the final draft + + of "A Catalog of National ISDN Solutions for Selected NIUF + + Applications, Second Edition." This document was + + approved as an official product of the North American ISDN Users' + + Forum on February 11, 1994. + + + + The Catalog is intended for anyone who needs detailed + + information on how ISDN can be used today to support a wide + + variety of applications. Each of the 61 solution guides includes a + + description, picture, details on what to look for in end-systems, and + + what to ask for from the ISDN provider. A separate chapter + + presents one page summaries of over 200 products and services + + from over 100 companies. The new Catalog goes far beyond the First + + Edition. For the decision maker, example "feasibility studies" are + + included to help support a business' decision to use ISDN. Each + + solution is rewritten to be more accessible. The solutions cover + + National ISDN-1, National ISDN-2, BRI, and PRI. Applications + + range from multipoint videoconferencing to point of sale, + + telecommuting to PBX interflow. For the more technical reader, + + additional detailed information is included on a variety of topics. + + + + CONTENTS + + + + 0.ps Title page, Preface, Table of Contents, etc. + + 1.ps Introduction + + 2.ps ISDN - A Decision Maker's Perspective + + 3.0.ps National ISDN Solutions + + 3.1.A.ps NI-1 BRI Local Area Network (LAN) Solutions + + Integrating telephones and workstations + + Access on demand to local-area networks + + High performance access on demand to local-area + + networks Linking workstations with supercomputers + + Leased line replacement + + 3.1.B.ps NI-1 BRI Screen Sharing Solutions + + Screen sharing for two users + + Screen sharing for many users + + Screen sharing with workstations connected to a + + remote LAN + + 3.1.C.ps NI-1 BRI Video Solutions + + Desktop videoconferencing + + Centralized management of video images + + Videoconferencing facilities + + 3.1.D.ps NI-1 BRI Voice & Data Solutions + + Caller identification + + Call coverage + + ACD agent at home + + 3.1.E.ps NI-1 BRI File Transfer Solutions + + Flexible bandwidth allocation + + File transfer between personal computers + + File transfer between a personal computer and a host + + computer + + High speed transfer of large text and image files + + 3.1.F.ps NI-1 BRI Work-At-Home Solutions + + Telecommuting with casual data requirements + + Telecommuting and transferring files + + Telecommuting accessing interactive services + + High performance telecommuting (interactive + + graphics and text) + + 3.1.G. NI-1 BRI Facsimile and Imaging Solutions + + Group 3 facsimile + + Receiving faxes as electronic documents + + High speed access to electronic document image + + systems + + Multimedia real estate listings + + Medical document imaging + + 3.1.H.ps NI-1 BRI Transaction Services Solutions + + Credit card authorization at the point of sale + + Electronic Data Interchange (EDI) + + Insurance verification at the point of service + + Supermarket checkout + + 3.1.I.ps Other NI-1 BRI Solutions + + Access to IBM mainframes and compatibles + + Remote access to minicomputers + + Integrating voice and data communications + + Integrated communications and messaging + + Automatic utility meter reading + + University dormitory + + Access to frame relay services + + Switched access to frame relay services + + High fidelity voice transmission systems + + 3.2.ps National ISDN-2 BRI Solutions + + Roll about videoconferencing + + X.25 backup + + Packet mode screen sharing for many users + + Home office + + 3.3.0.ps National ISDN-2 PRI Solutions + + 3.3.A.ps NI-2 PRI Local Area Network (LAN) Solutions + + Local-area network interconnection + + File transfer and LAN access in PBX environment + + Private line overflow and disaster recovery + + ISDN concentrator for campus connectivity + + 3.3.B.ps NI-2 PRI Video Solutions + + PRI Videoconferencing + + Multimedia desktop video via Ethernet and + + Multirate ISDN + + Multipoint videoconferencing + + Videoconferencing facilities + + 3.3.C.ps NI-2 PRI Voice & Data Solutions + + Caller identification to PBXs and other devices + + Emergency-services call management + + Call by Call Service Selection + + 3.3.D.ps NI-2 PRI Facsimile and Imaging Solutions + + Fax mail + + Teleradiology + + 3.3.E.ps Other NI-2 PRI Solutions + + High quality audio transmission + + Access to litigation support system + + Call center load balancing + + Networked voice messaging systems + + 4.0&1.ps National ISDN Product Information and Industry + + Contacts + + 4.2.1.ps Basic Rate Terminal Adapters + + 4.2.2.ps Basic Rate Interface Cards for Personal Computers, + + Workstations, and Minicomputers; Workstations + + with Built-in ISDN + + 4.2.3.ps Attendant Consoles + + 4.2.4.ps ISDN Phones + + 4.2.5.ps Single Port ISDN LAN Bridges + + 4.2.6.ps Communications Servers, Routers, Bridges, and + + Multiport ISDN LAN Bridges and Routers + + 4.2.7.ps Inverse Multiplexers, Multiplexers, and + + Communications Controllers + + 4.2.8.ps PRI Adapters + + 4.2.9.ps Videoconferencing Systems and Multipoint Control + + Units + + 4.2.10.ps Other Products + + 4.2.11.ps Network Terminations (NT-1s) + + 4.2.12.ps Power Supplies + + 4.2.13.ps Software and Services + + 4.2.14.ps Private Network Solutions and Private Branch + + Exchanges(PBXs) + + 4.2.15.ps Service Providers + + 4.3.ps Supplier Contact Information + + 5.1.ps Selected Topics in ISDN + + Call Types and Bearer Capabilites + + Terminal Endpoint Identifiers (TEIs) + + Service Profile Identifiers (SPIDs) + + Rate Adaptation: V.110/V.120 + + Lower Layer Compatibility (LLC) and Higher Layer + + Compatibility (HLC) Information Elements + + Signaling System 7 (SS7) Interconnection + + Multiline Hunt Group + + Powering and Wiring of Customer Equipment + + Configurations for High Bandwidth Applications + + Communications Server Alternatives + + NIUF ISDN Interface Groups (NIIGs) and Parameter + + Groups (NIPGs) + + Additional Information Applicable to Many ISDN + + Solutions + + Conformance Testing + + 5.2.ps ISDN Signaling Diagrams + + 6.ps Bibliography + + 7.ps Glossary of Terms + + 8.ps Acronym List + + A.ps Annex: How the NIUF is making real the promise of + + ISDN An Overview of the North American ISDN Users' + + Forum (NIUF) + + Relevance of this NIUF Catalog + + Application Profiles + + Implementation Agreements + + Versions + + Conformance Criteria and ISDN Testing + + Application Software Interfaces + + Cost Justification Worksheet + + I.ps Index + + + + + + All of the above files are uncompressed PostScript files and may + + be FTPed using the text/ASCII option. + + + + The Catalog is a publicly available document and may be + + distributed and used freely with proper recognition of the source. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SPRINT EXPANDS PRESENCE IN CHINA, INTRODUCES NEW SERVICES + + + + + + Interesting press release I thought you might like. + + + + THIS RELEASE WAS DISTRIBUTED IN CHINA ONLY. + + Contacts: Janis Langley, (O) 202-828-7427 + + + + BEIJING, March 21, 1994 -- Sprint today announced a + +significant expansion of its presence, and product and service + +offerings, in China. Sprint also announced the immediate availability + +of three of those services -- a toll-free Sprint Express(R) number for + +calling worldwide and for collect calling to the United States, a + +prepaid calling card, and CLEARLINE(R) international private-line + +service. + + + + Sprint made the announcements today at a press briefing and + +two-day seminar to inform customers and leading Chinese organizations + +of the company's expanded local capabilities. + + + + Sprint is one of the largest telecommunications carriers in + +the United States, providing innovative calling services to nearly 8 + +million customers in that country alone. Sprint offers voice, video + +and data communications services worldwide via some of the world's + +largest and most advanced networks. + + + + Sprint is a pioneer and innovator in technology. It built + +the first nationwide (40,000 kilometer) all-digital, fiber-optic + +network in the United States. It also is the first carrier to offer + +such advanced services as Asynchronous Transfer Mode -- a broadband + +service that simultaneously carries voice, data and image -- and a + +voice-recognition calling card that automatically dials frequently + +called numbers with a single-word command, such as "home" or "office." + + + + Sprint has operated locally in China since 1992 through an + +office in Beijing that primarily offered data communications systems + +support for the company's growing customer base. Its Beijing office + +now has expanded to 15 employees who represent the company's + +increasingly diverse capabilities in consumer services, including the + +Sprint Prepaid Calling Card and Sprint FONCARD(SM); international + +network solutions for large-scale multinational users; data + +communications systems and services; and international carrier + +services to provide transit and capacity for telecommunications + +carriers worldwide. + + + + Sprint China will immediately begin to offer several of + +Sprint's versatile and cost-effective calling products: a toll-free + +Sprint Express number for global calling and collect calls to the + +United States; Sprint's Prepaid Calling Card; and its CLEARLINE + +international private line service. + + + + o Sprint Express -- By dialing "108-13," callers in China can + +place collect calls to family and colleagues in the United States, + +and also charge calls to the United States and worldwide using + +their major credit card or Sprint FONCARD. Operator assistance is + +available in English, with Mandarin support planned. + + + + o Sprint's Prepaid Calling Card, which initially will be + +available only through a limited market test, lets consumers pre- + +purchase calling credits that they can use from any telephone + +without needing exact change. The card carries attractive + +designer graphics -- suitable for collectors -- and offers the + +added convenience of operator assistance. + + + + Callers can use the prepaid calling card from nearly 30 + +countries for calls to virtually any other country worldwide -- + +including the United States. Mandarin-language instructions are + +available for calls from China (by dialing 108-16). The card can also + +be used in more than 28 countries worldwide to make calls back to + +China or to virtually anywhere in the world. + + + + o CLEARLINE international private-line service lets + +large-scale users consolidate their international calling to receive + +volume discounts. The service is provided via Sprint's worldwide + +network, which extends from the United States through its + +participation in virtually every major submarine fiber-optic cable + +system project. + + + + "Sprint has been active in China for several years, and we + +are delighted to be able to expand our commitment to users in this + +important market by offering some of the other feature-rich, cost + +effective products popular in the United States and worldwide," said + +Herb Bradley, China country manager for Sprint International, Sprint's + +global telecommunications subsidiary. + + + + "We believe that businesses and consumers will benefit from + +these innovative services as much in China as they have in the United + +States, and we look forward to building on strong relationships we + +have formed with many Chinese organizations in delivering these new + +services," he said. + + + + Elsewhere in the Pacific Rim, Sprint has data network points + +of presence in Hong Kong, Indonesia, Japan, Korea, Taiwan, Singapore, + +Australia and New Zealand. It also has an office in Hong Kong, which + +provides sales and technical support for Sprint's business interests + +in Hong Kong, Indochina, Indonesia, Malaysia, the Philippines, Taiwan, + +Thailand and Singapore. + + + + Sprint operates fiber-optic and value-added networks that are + + among the world's largest, offering voice services to over 290 + + countries and locations, packet-switched data links to more than + + 120 countries and international locations, and video services via + + one of the world's largest videoconferencing networks, serving + + nearly 40 countries. Sprint also has U.S. cellular operations that + + serve 42 metropolitan markets and more than 50 rural service + + areas. The company has more than 50,000 employees and has + + operations in six continents through more than 50 subsidiaries, + + joint ventures and distributors. Sprint's customers include 80 + + percent of the 500 largest U.S. industrial corporations (the + + "Fortune 500"), and the U.S. federal government, which awarded + + Sprint a contract to provide 40 percent of the government's total + + long distance services, and data and video services, over a + + 10-year period. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SOCIAL SECURITY FAQ + + HOW TO GET INFORMATION AND HOW TO PROTECT YOUR OWN + + + + By Chris Hibbert (hibbert@netcom.com) + + Computer Professionals For Social Responsibility + + + + Many people are concerned about the number of organizations asking for their + + Social Security Numbers. They worry about invasions of privacy and the + + oppressive feeling of being treated as just a number. Unfortunately, I + + can't offer any hope about the dehumanizing effects of identifying you with + + your numbers. I *can* try to help you keep your Social Security Number + + from being used as a tool in the invasion of your privacy. + + + + Surprisingly, government agencies are reasonably easy to deal with; private + + organizations are much more troublesome. Federal law restricts the agencies + + at all levels of government that can demand your number and a fairly + + complete disclosure is required even if its use is voluntary. There are no + + comparable Federal laws restricting the uses non-government organizations + + can make of it, or compelling them to tell you anything about their plans. + + Some states have recently enacted regulations on collection of SSNs by + + private entities. With private institutions, your main recourse is refusing + + to do business with anyone whose terms you don't like. They, in turn, are + + allowed to refuse to deal with you on those terms. + + + + + + Short History + + + + Social Security numbers were introduced by the Social Security Act of 1935. + + They were originally intended to be used only by the social security + + program. In 1943 Roosevelt signed Executive Order 9397 which required + + federal agencies to use the number when creating new record-keeping systems. + + In 1961 the IRS began to use it as a taxpayer ID number. The Privacy Act of + + 1974 required authorization for government agencies to use SSNs in their + + data bases and required disclosures (detailed below) when government + + agencies request the number. Agencies which were already using SSN as an + + identifier before January 1, 1975 were allowed to continue using it. The + + Tax Reform Act of 1976 gave authority to state or local tax, welfare, + + driver's license, or motor vehicle registration authorities to use the + + number in order to establish identities. The Privacy Protection Study + + Commission of 1977 recommended that the Executive Order be repealed after + + some agencies referred to it as their authorization to use SSNs. I don't + + know whether it was repealed, but no one seems to have cited EO 9397 as + + their authorization recently. + + + + Several states use the SSN as a driver's license number, while others record + + it on applications and store it in their database. Some states that + + routinely use it on the license will make up another number if you insist. + + According to the terms of the Privacy Act, any that have a space for it on + + the application forms should have a disclosure notice. Many don't, and + + until someone takes them to court, they aren't likely to change. (Though + + New York recently agreed to start adding the notice on the basis of a letter + + written by a reader of this blurb.) + + + + The Privacy Act of 1974 (Pub. L. 93-579) requires that any federal, state, + + or local government agency that requests your Social Security Number has to + + tell you four things: + + + + 1: Whether disclosure of your Social Security Number is required or + + optional, + + + + 2: What statute or other authority they have for asking for your number, + + + + 3: How your Social Security Number will be used if you give it to them, and + + + + 4: The consequences of failure to provide an SSN. + + + + In addition, the Act says that only Federal law can make use of the Social + + Security Number mandatory. So anytime you're dealing with a government + + institution and you're asked for your Social Security Number, just look for + + the Privacy Act Statement. If there isn't one, complain and don't give your + + number. If the statement is present, read it. If it says giving your + + Social Security Number is voluntary, you'll have to decide for yourself + + whether to fill in the number. + + + + + + Private Organizations + + + + The guidelines for dealing with non-governmental institutions are much more + + tenuous. Most of the time private organizations that request your Social + + Security Number can get by quite well without your number, and if you can + + find the right person to negotiate with, they'll willingly admit it. The + + problem is finding that right person. The person behind the counter is + + often told no more than "get the customers to fill out the form completely." + + + + Most of the time, you can convince them to use some other number. Usually + + the simplest way to refuse to give your Social Security Number is simply to + + leave the appropriate space blank. One of the times when this isn't a + + strong enough statement of your desire to conceal your number is when + + dealing with institutions which have direct contact with your employer. + + Most employers have no policy against revealing your Social Security Number; + + they apparently believe that it must be an unintentional slip when an + + employee doesn't provide an SSN to everyone who asks. + + + + Public utilities (gas, electric, phone, etc.) are considered to be private + + organizations under the laws regulating SSNs. Most of the time they ask for + + an SSN, and aren't prohibited from asking for it, but they'll usually relent + + if you insist. Ask to speak to a supervisor, insist that they document a + + corporate policy requiring it, ask about alternatives, ask why they need it + + and suggest alternatives. + + + + Lenders and Borrowers + + (those who send reports to the IRS) + + + + Banks and credit card issuers and various others are required by the IRS to + + report the SSNs of account holders to whom they pay interest or when they + + charge interest and report it to the IRS. If you don't tell them your + + number you will probably either be refused an account or be charged a + + penalty such as withholding of taxes on your interest. + + + + Most banks send your name, address, and SSN to a company called ChexSystem + + when you open an account. ChexSystem keeps a database of people whose + + accounts have been terminated for fraud or chronic insufficient funds in the + + past 5 years. ChexSystems is covered by the Fair Credit Reporting Act, and + + the bank is required to let you know if it refuses to open your account + + and a report from ChexSystems was a factor. You can also send a letter to + + ChexSystems directly and request a copy of your report. + + + + Many Banks, Brokerages, and other financial institutions have started + + implementing automated systems to let you check your balance. All too often, + + they are using SSNs as the PIN that lets you get access to your personal + + account information. If your bank does this to you, write them a letter + + pointing out how common it is for the people with whom you have financial + + business to know your SSN. Ask them to change your PIN, and if you feel + + like doing a good deed, ask them to stop using the SSN as a default + + identifier for their other customers. Some customers will believe that + + there's some security in it, and be insufficiently protective of their + + account numbers. + + + + Sometimes banks provide for a customer-supplied password, but are reluctant + + to advertise it. The only way to find out is to ask if they'll let you + + provide a password. (This is reportedly true of Citibank Visa, e.g. They + + ask for a phone number but are willing to accept any password.) + + + + When buying (and possibly refinancing) a house, most banks will now ask for + + your Social Security Number on the Deed of Trust. This is because the + + Federal National Mortgage Association recently started requiring it. The + + fine print in their regulation admits that some consumers won't want to give + + their number, and allows banks to leave it out when pressed. [It first + + recommends getting it on the loan note, but then admits that it's already on + + various other forms that are a required part of the package, so they already + + know it. The Deed is a public document, so there are good reasons to refuse + + to put it there, even though all parties to the agreement already have + + access to your number.] + + + + Insurers, Hospitals, Doctors + + + + No laws require medical service providers to use your Social Security Number + + as an ID number (except for Medicare, Medicaid, etc.) They often use it + + because it's convenient or because your employer uses it to identify + + employees to its groups health plan. In the latter case, you have to get + + your employer to change their policies. Often, the people who work in + + personnel assume that the employer or insurance company requires use of the + + SSN when that's not really the case. When a previous employer asked for my + + SSN for an insurance form, I asked them to try to find out if they had to + + use it. After a week they reported that the insurance company had gone + + along with my request and told me what number to use. Blood banks also ask + + for the number but are willing to do without if pressed on the issue. + + After I asked politely and persistently, the blood bank I go to agreed that + + they didn't have any use for the number. They've now expunged my SSN from + + their database, and they seem to have taught their receptionists not to + + request the number. + + + + Most insurance companies share access to old claims through the Medical + + Information Bureau. If your insurance company uses your SSN, other + + insurance companies will have a much easier time finding out about your + + medical history. You can get a copy of the file MIB keeps on you by writing + + to Medical Information Bureau, P.O. Box 105, Essex Station, Boston, MA + + 02112. Their phone number is (617)426-3660. + + + + If an insurance agent asks for your Social Security Number in order to + + "check your credit", point out that the contract is invalid if your check + + bounces or your payment is late. They don't need to know what your credit + + is like, just whether you've paid them. + + + + Children + + + + The Family Support Act of 1988 (Pub. L. 100-485) requires states to require + + parents to give their Social Security Numbers in order to get a birth + + certificate issued for a newborn. The law allows the requirement to be + + waived for "good cause", but there's no indication of what may qualify. + + + + The IRS requires taxpayers to report SSNs for dependents over one year of + + age, but the requirement can be avoided if you're prepared to document the + + existence of the child by other means if challenged. The law on this can be + + found at 26 USC 6109. The penalty for not giving a dependant's number is + + only $5. Several people have reported that they haven't provided SSNs for + + their dependents for several years, and haven't been challenged by the IRS. + + + + Universities and Colleges + + + + Universities that accept federal funds are subject to the Family Educational + + Rights and Privacy Act of 1974 (the "Buckley Amendment"), which prohibits + + them from giving out personal information on students without permission. + + There is an exception for directory information, which is limited to names, + + addresses, and phone numbers, and another exception for release of + + information to the parents of minors. There is no exception for Social + + Security Numbers, so covered Universities aren't allowed to reveal students' + + numbers without their permission. In addition, state universities are bound + + by the requirements of the Privacy Act, which requires them to provide the + + disclosures mentioned above. If they make uses of the SSN which aren't + + covered by the disclosure they are in violation. + + + + Why SSNs are a bad choice for UIDs in data bases + + + + Database designers continue to introduce the Social Security Number as the + + key when putting together a new database or when re-organizing an old one. + + Some of the qualities that are (often) useful in a key and that people think + + they are getting from the SSN are Uniqueness, Universality, Security, and + + Identification. When designing a database, it is instructive to consider + + which of these qualities are actually important in your application; many + + designers assume unwisely that they are all useful for every application, + + when in fact each is occasionally a drawback. The SSN provides none of + + them, so designs predicated on the assumption that it does provide them will + + fail in a variety of ways. + + + + Uniqueness + + + + Many people assume that Social Security Numbers are unique. They were + + intended by the Social Security Administration to be unique, but the SSA + + didn't take sufficient precautions to ensure that it would be so. They have + + several times given a previously issued number to someone with the same name + + and birth date as the original recipient, thinking it was the same person + + asking again. There are a few numbers that were used by thousands of people + + because they were on sample cards shipped in wallets by their manufacturers. + + (One is given below.) + + + + The passage of the Immigration reform law in 1986 caused an increase in the + + duplicate use of SSNs. Since the SSN is now required for employment, + + illegal immigrants must find a valid name/SSN pair in order to fool the INS, + + and IRS long enough to collect a paycheck. Using the SSN when you can't + + cross-check your database with the SSA means you can count on getting some + + false numbers mixed in with the good ones. + + + + Universality + + + + Not everyone has a Social Security Number. Foreigners are the primary + + exception, but many children don't get SSNs until they're in school. They + + were only designed to be able to cover people who were eligible for Social + + Security. + + + + Identification + + + + Few people ever ask to see an SSN card; they believe whatever you say. The + + ability to recite the number provides little evidence that you're associated + + with the number in anyone else's database. + + + + There's little reason to carry your card with you anyway. It isn't a good + + form of identification, and if your wallet is lost or stolen, it provides + + another way for the thief to hurt you, especially if any of your banks use + + the SSN as your PIN. + + + + Security + + + + The card is not at all forgery-resistant, even if anyone did ever ask for + + it. The numbers don't have any redundancy (no check-digits) so any 9-digit + + number in the range of numbers that have been issued is a valid number. + + It's relatively easy to copy the number incorrectly, and there's no way to + + tell that you've done so. + + + + In most cases, there is no cross-checking that a number is valid. Credit + + card and checking account numbers are checked against a database almost + + every time they are used. If you write down someone's phone number + + incorrectly, you find out the first time you try to use it. + + + + + + + + Why you should resist requests for your SSN + + + + When you give out your number, you are providing access to information about + + yourself. You're providing access to information that you don't have the + + ability or the legal right to correct or rebut. You provide access to data + + that is irrelevant to most transactions but that will occasionally trigger + + prejudice. Worst of all, since you provided the key, (and did so + + "voluntarily") all the info discovered under your number will be presumed to + + be true, about you, and relevant. + + + + A major problem with the use of SSNs as identifiers is that it makes it hard + + to control access to personal information. Even assuming you want someone + + to be able to find out some things about you, there's no reason to believe + + that you want to make all records concerning yourself available. When + + multiple record systems are all keyed by the same identifier, and all are + + intended to be easily accessible to some users, it becomes difficult to + + allow someone access to some of the information about a person while + + restricting them to specific topics. + + + + Unfortunately, far too many organizations assume that anyone who presents + + your SSN must be you. When more than one person uses the same number, it + + clouds up the records. If someone intended to hide their activities, it's + + likely that it'll look bad on whichever record it shows up on. When it + + happens accidentally, it can be unexpected, embarrassing, or worse. How do + + you prove that you weren't the one using your number when the record was + + made? + + + + + + What you can do to protect your number + + + + If despite your having written "refused" in the box for Social Security + + Number, it still shows up on the forms someone sends back to you (or worse, + + on the ID card they issue), your recourse is to write letters or make phone + + calls. Start politely, explaining your position and expecting them to + + understand and cooperate. If that doesn't work, there are several more + + things to try: + + + + 1: Talk to people higher up in the organization. This often works + + simply because the organization has a standard way of dealing + + with requests not to use the SSN, and the first person you deal + + with just hasn't been around long enough to know what it is. + + + + 2: Enlist the aid of your employer. You have to decide whether talking + + to someone in personnel, and possibly trying to change + + corporate policy is going to get back to your supervisor and + + affect your job. + + + + 3: Threaten to complain to a consumer affairs bureau. Most newspapers + + can get a quick response. Ask for their "Action Line" or + + equivalent. If you're dealing with a local government agency, + + look in the state or local government section of the phone book + + under "consumer affairs." If it's a federal agency, your + + congressmember may be able to help. + + + + 4: Insist that they document a corporate policy requiring the number. + + When someone can't find a written policy or doesn't want to + + push hard enough to get it, they'll often realize that they + + don't know what the policy is, and they've just been following + + tradition. + + + + 5: Ask what they need it for and suggest alternatives. If you're + + talking to someone who has some independence, and they'd like + + to help, they will sometimes admit that they know the reason + + the company wants it, and you can satisfy that requirement a + + different way. + + + + 6: Tell them you'll take your business elsewhere (and follow through if + + they don't cooperate.) + + + + 7: If it's a case where you've gotten service already, but someone + + insists that you have to provide your number in order to have a + + continuing relationship, you can choose to ignore the request + + in hopes that they'll forget or find another solution before + + you get tired of the interruption. + + + + If someone absolutely insists on getting your Social Security Number, you + + may want to give a fake number. There are legal penalties for providing + + a false number when you expect to gain some benefit from it. A federal + + court of appeals ruled that using a false SSN to get a Driver's License + + violates the federal law. + + + + There are a few good choices for "anonymous" numbers. Making one up at + + random is a bad idea, as it may coincide with someone's real number and + + cause them some amount of grief. It's better to use a number like + + 078-05-1120, which was printed on "sample" cards inserted in thousands of + + new wallets sold in the 40's and 50's. It's been used so widely that both + + the IRS and SSA recognize it immediately as bogus, while most clerks haven't + + heard of it. + + + + There are several patterns that have never been assigned, and which + + therefore don't conflict with anyone's real number. They include numbers + + with any field all zeroes, and numbers with a first digit of 8 or 9. + + For more details on the structure of SSNs and how they are assigned, use + + anonymous ftp to retrieve the file: + + /cpsr/privacy/ssn/SSN-structure from the machine cpsr.org. + + + + Giving a number with an unused patterns rather than your own number isn't + + very useful if there's anything serious at stake since they're likely to be + + noticed . The Social Security Administration recommends that people showing + + Social Security cards in advertisements use numbers in the range 987-65-4320 + + through 987-65-4329. + + + + If you're designing a database or have an existing one that currently uses + + SSNs and want to use numbers other than SSNs, you should make your + + identifiers use some pattern other than 9 digits. You can make them longer + + or shorter than that, or include letters somewhere inside. That way no one + + will mistake the number for an SSN. + + + + The Social Security Administration recommends that you request a copy of + + your file from them every few years to make sure that your records are + + correct (your income and "contributions" are being recorded for you, and + + no one else's are.) As a result of a recent court case, the SSA has agreed + + to accept corrections of errors when there isn't any contradictory evidence, + + SSA has records for the year before or after the error, and the claimed + + earnings are consistent with earlier and later wages. (San Jose Mercury + + News, 5/14, 1992 p 6A) Call the Social Security Administration at + + (800) 772-1213 and ask for Form 7004, (Request for Earnings and Benefit + + Estimate Statement.) + + + + When All Else Fails + + (Getting a Replacement Number) + + + + The Social Security Administration (SSA) will occasionally issue a + + replacement SSN. The most common justification is that the SSA or the IRS + + has mixed together earnings records from more than one person, and since one + + of the people can't be located, it's necessary to issue a new number to the + + other. The SSA tries very hard to contact the person who is using the + + number incorrectly before resorting to this process. + + + + There are a few other situations that the SSA accepts as justifying a new + + number. The easiest is if the number contains the sequences 666 or 13. The + + digits need to be consecutive according to SSA's policy manual, but may be + + separated by hyphens. You apparently don't have to prove that your religious + + objection is sincere. Other commonly accepted complaints include harassment, + + sequential numbers assigned to family members, or serious impact on your + + credit history that you've tried to clear up without success. + + + + In all cases, the process includes an in-person interview at which you have + + to establish your identity and show that you are the original assignee of + + the number. The decision is normally made in the local office. If the + + problem is with a credit bureau's records, you have to show that someone + + else continues to use your number, and that you tried to get the credit + + bureau to fix your records but were not successful. When they do issue a + + new number, the new recoreds are linked to the old ones. (Unless you can + + convince them that your life might be endangered by such a link.) + + + + There are a few justifications that they don't accept at all: attempting to + + avoid legal responsibilities, poor credit record which is your own fault, + + lost SSNm card (without evidence that someone else has used it), or use of + + the number by government agencies or private companies. + + + + The only justification the SSA accepts for cancelling the issuance of an SSN + + is that the number was assigned under their Enumeration at Birth (wherein + + SSNs are assigned when birth certificates are issued) program without the + + parent's consent. In this case, the field officer is instructed to try very + + hard to convince the parent that getting the number revoked is futile, but + + to give in when the parent is persistent. + + + + US Passports + + + + The application for US Passports (DSP-11 12/87) requests a Social Security + + Number, but gives no Privacy Act notice. There is a reference to "Federal + + Tax Law" and a misquotation of Section 6039E of the 1986 Internal Revenue + + Code, claiming that the section requires that you provide your name, mailing + + address, date of birth, and Social Security Number. The referenced section + + only requires TIN (SSN), and it requires that it be sent to the IRS and not + + to the Passport office. It appears that when you apply for a passport, you + + can refuse to reveal your SSN to the passport office, and instead mail a + + notice to the IRS, giving only your SSN (other identifying info optional) + + and notifying them that you are applying for a passport. [Copies (in + + postscript) of the letter that was used by one contributor (The measure of + + his success is that he didn't hear back from any with complaints.) are + + available by anonymous ftp from cpsr.org in /cpsr/privacy/ssn/passport.ps.Z. + + I'd be interested in hearing how the State department and the Post Office + + (which processes passport applications) react.] + + + + + + Results from Some Recent Legal Cases (3/24/93) + + + + CPSR joined two legal cases in 1992 which concerned Social Security Numbers + + and privacy. One of them challenged the IRS practice of printing Social + + Security Numbers on mailing labels when they send out tax forms and related + + correspondence. The other challenged Virginia's requirement of a Social + + Security Number in order to register to vote. + + + + Dr. Peter Zilahy Ingerman filed suit against the IRS in Federal District + + Court in 1991, and CPSR filed a friend of the court brief in August '91. The + + case was decided in favor of the IRS. According to "Privacy Journal", the + + IRS plans to start covering the SSNs on its mailing labels, but they made + + the decision too late to affect this year's returns. Some people got a + + version that hid their numbers, but it was apparently a pilot project in + + limited areas. | + + + + The Virginia case was filed by a resident who refused to supply a Social + + Security Number when registering to vote. When the registrar refused to + + accept his registration, he filed suit. He also challenged Virginia on two + + other bases: the registration form lacked a Privacy Act notice, and the + + voter lists they publish include Social Security Numbers. The Federal court + + of appeals ruled that Virginia may not require the disclosure of Social + + Security numbers as a condition of registering to vote. The court said that + + the Virginia requirement places an "intolerable burden" on the right to + + vote. The case is officially referred to as Greidinger v. Davis, No. + + 92-1571, Fourth Circuit Court of Appeals, March 22, 1993. + + + + + + If you have suggestions for improving this document please send them to me + + at: + + Chris Hibbert + + hibbert@netcom.com or 1195 Andre Ave. + + Mountain View, CA 94040 + + + + + + + + New versions of this posting are always available using any of the + + following mechanisms. You can use anonymous ftp from the following + + sites: + + + + Site Location + + + + rtfm.mit.edu /pub/usenet-by-hierarchy/news/answers/ssn-privacy + + ftp.pica.army.mil /pub/privacy/ssn-privacy.faq + + ftp.cpsr.org /cpsr/privacy/ssn/Social_Security_Number_FAQ + + + + Gopher can retrieve it from gopher.cpsr.org. World Wide Web (www) can + + find it using the following locator (and probably several others you + + could construct from the other directions I've given): + + + + http://polar.pica.army.mil/ssn_faq.html + + + + You can also retrieve it by sending email to + + + + Address Command (omit the quotes) + + + + listserv@cpsr.org "GET cpsr/privacy/ssn Social_Security_Number_FAQ" + + mail-server@rtfm.mit.edu + + "send usenet-by-hierarchy/news/answers/ssn-privacy" + + + + You can also ask for general help from either of these email servers by + + sending a message to the same address with just "help" in the body. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CLIPPER CHIP IS YOUR FRIEND, NSA CONTENDS + + NSA Seeks to Dispel Misgivings of Public About Clipper Chip + + + + By Bob Davis + + + + Staff Reporter of The Wall Street Journal. + + (C)1994 Wall Street Journal + + + + FORT MEADE, Md. --- The National Security Agency wants everyone to know + + that its new computer-security system will protect individual privacy. + + But as the spy agency knows, hardly anyone believes that. + + + + Critics fear the government will use the NSA technology, designed in + + secret, to spy on Americans. The project "is a focal point for the + + distrust of government," acknowledges Clinton Brooks, the NSA scientist + + who led the so-called Clipper Chip project, in the agency's first + + interview on the subject. + + + + The Clinton administration last month adopted the NSA plan for a series + + of computer chips that would protect telephones and computers. Use + + of the technology would be voluntary. Federal agencies would adopt it + + first, and public use is expected to spread gradually. + + + + Under the plan, cryptographic "keys" that could unscramble the + + communications would be split in two and held separately at the Treasury + + Department and the National Institute of Standards and Technology. That + + way, law-enforcement agents could tap the communications by getting court + + authorization to obtain the two halves. The idea is to boost security + + but to keep the technology out of the hands of criminals and spies. + + + + The NSA is the world's biggest eaves-dropper. Equipped with the latest + + in super-computers and satellite receivers, it targets communications by + + foreign governments. The agency shuns publicity but agreed to the + + interview to explain its role in the Clipper controversy and try to + + dispel fears. Mr. Brooks, a 26-year veteran of the NSA, says the project + + began in 1989 and cost more than $2.5 million. + + + + He says the NSA is consumed with what it calls the "equities problem" --- + + how to balance privacy rights against the needs of law enforcement, + + national security and private industry. In 1989, he and Raymond Kammer, + + deputy director of NIST, began discussions about how to improve computer + + security without making it impenetrable to police. NIST is a Commerce + + Department agency with formal responsibility for unclassified computer + + security. + + + + Before the interview, Mr. Brooks takes a look around a small cryptographic + + museum just outside the NSA's gates. He stands before an exhibit of + + Enigma machines, used by the Germans during World War II to encrypt + + messages --- and later broken by Allied intelligence. Enigma started as + + a commercial product; recognizing its military value, the Nazis pulled + + it off the market. "That was the concern we're wrestling with today," + + Mr. Brooks says --- commercial encryption technology becoming so good that + + U.S. spy agencies can't crack it. + + + + In 1989, NIST and the NSA put together an eight-person team, split evenly + + between the agencies, to quietly work out security concepts. The team + + decided against using a weak encryption code --- "Roman Numeral One is + + that it had to be good security," says Mr. Brooks. And it also rejected + + a so-called trapdoor approach, in which the computer code would be + + designed so it would have a weak spot --- a trapdoor --- that federal + + agencies could enter via computer to tap the communications. Someone else + + could discover the trapdoor, they decided. + + + + The team settled on a system with a powerful encryption formula, called + + an algorithm, and encryption keys that would be held by outsiders. Law- + + enforcement agencies could get copes of the keys when they needed to bug + + the conversations. The toughest decision, both Mr. Brooks and Mr. Kammer + + say, was to keep the algorithm, dubbed the Skipjack, secret. That meant + + the public wouldn't know for sure whether the NSA had inserted a trapdoor + + or some other eavesdropping device. + + + + "It would defeat the purpose [of the project] if we gave the knowledge + + of how the algorithm worked" to the public, says the 56-year-old Mr. + + Brooks. "It was going to have to be kept classified." Otherwise, he + + explains, engineers could use the algorithm to design computer-security + + systems that the government's encryption keys couldn't unlock. + + + + By 1990, he says, as many as 30 NSA "cryptomathematicians" and other + + employees were working to perfect the algorithm and other features. A + + year later, the NSA launched what it called the Capstone Project to build + + the algorithm into a computer chip. The NSA contracted with Mykotronx + + Inc., a small company in Torrance, Calif., to do much of the development. + + By September 1992, the NSA was confident the system would work. + + + + None too early for the NSA. Earlier that year, Mr. Brooks says, American + + Telephone & Telegraph Co. informed the NSA that it wanted to sell a + + phone using a popular encryption technology to scramble conversations. + + The NSA balked. "We said it probably wouldn't get an export license + + from this country," Mr. Brooks says. Instead, AT&T was told of the + + Capstone work and agreed to use the technology if it became a federal + + standard and was exportable, he says. The NSA then took some of the + + functions of the Capstone chip and tailored it to phone equipment, calling + + the resulting product the Clipper Chip. For computers, Capstone was + + encased on a computer card that became known as Tessera. + + + + The the Bush administration, enmeshed in a re-election bid, never pushed + + Capstone. So shortly after the election, National-security heavyweights + + importuned the Clinton transition team to move quickly on Capstone. Just + + weeks after the inauguration, the new administration's national-security + + team was debating the NSA proposal and in April announced to the public + + that it would adopt the scheme. + + + + Last month, the administration gave the final go-ahead --- despite + + withering criticism from industry. Vice President Gore called encryption + + a "law and order issue." NIST's Mr. Kammer says the new administration + + was also trying to line up backing among national-security officials to + + liberalize export controls on computer equipment and other high-tech + + gear. + + + + The high-tech industry was stunned at the decision. David Peyton, vice + + president of the Information Technology Association of America, a trade + + group of computer companies, says the scheme will dangerously centralize + + power in the federal government and will limit exports. James Bidzos, + + president of a computer-security firm, RSA Data Security Inc., goes + + further. He posted a letter on the Internet computer network arguing + + that Clipper may be the "visible portion of a large-scale covert + + operation on U.S. soil by NSA." + + + + Nonsense, responds Mr. Brooks, who says he is distressed by the + + "emotionalism" of the arguments. "The only reason we're involved is + + that we have the best cryptomathematicians in the country." + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + In the super-state, it really does not matter at all what + + actually happened. Truth is what the government chooses + + to tell you. Justice is what it wants to happen. + + --Jim Garrison, New Orleans District Attorney + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + +. + diff --git a/textfiles.com/magazines/JOAUC/jauc03.txt b/textfiles.com/magazines/JOAUC/jauc03.txt new file mode 100644 index 00000000..d87754e4 --- /dev/null +++ b/textfiles.com/magazines/JOAUC/jauc03.txt @@ -0,0 +1,6216 @@ + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically + + ====================================================================== + + ISSN 1074-3111 Volume One, Issue Three April 30, 1994 + + ====================================================================== + + + + Editor-in-Chief: Scott Davis (dfox@fennec.com) + + Technology Editor: Max Mednick (kahuna@bga.com) + + Consipracy Editor: Gordon Fagan (flyer@fennec.com) + + Network Security: George Phillips (ice9@bga.com) + + + + ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC + + + + U.S. Mail: + + The Journal Of American Underground Computing + + 10111 N. Lamar #25 + + Austin, Texas 78753-3601 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + IMPORTANT ADDRESSES - + + ============================================================================ + + To Subscribe to "TJOAUC", send mail to: sub@fennec.com + + All questions/comments about this publication to: comments@fennec.com + + Send all articles/info that you want published to: submit@fennec.com + + Commercial Registration for Profitable Media: form1@fennec.com + + ============================================================================ + + + + "The underground press serves as the only effective counter to a growing + + power, and more sophisticated techniques used by establishment mass media + + to falsify, misrepresent, misquote, rule out of consideration as a priori + + ridiculous, or simply ignore and blot out of existence: data, books, + + discoveries that they consider prejudicial to establishment interest..." + + + + (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Contents Copyright (C) 1994 The Journal Of American Underground Computing + + and/or the author of the articles presented herein. All rights reserved. + + Nothing may be reproduced in whole or in part without written permission + + of the Editor-In-Chief and/or the author of the article. This publication + + is made available periodically to the amateur computer hobbyist free of + + charge. Any commercial usage (electronic or otherwise) is strictly + + prohibited without prior consent of the Editor, and is in violation of + + applicable US Copyright laws. To subscribe, send email to sub@fennec.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + DISCLAIMER AND NOTICE TO DISTRIBUTORS - + + + + NOTE: This electronic publication is to be distributed free of charge + + without modifications to anyone who wishes to have a copy. Under NO + + circumstances is any issue of this publication, in part or in whole, + + to be sold for money or services, nor is it to be packaged with other + + computer software, including, but not limited to CD Rom disks, without + + the express written or verbal consent of the author and/or editor. + + To obtain permission to distribute this publication under any of the + + certain circumstances stated above, please contact the editor at one of + + the addresses above. If you have intentions of publishing this journal + + in any of the ways described above, or you are in doubt about whether or + + not your intentions conflict with the restrictions, please contact the + + editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com + + This publication is provided without charge to anyone who wants it. + + This includes, but is not limited to lawyers, government officials, + + cops, feds, hackers, social deviants, and computer hobbyists. If anyone + + asks for a copy, please provide them with one, or mail the subscription + + list so that you may be added. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 3 + + + + TABLE OF CONTENTS + + + + 1) Visa Establishes International Consortium... NewsWire + + 2) Cyberspace Cowboy Maureen Harrington + + 3) A Message From The Vice President Al Gore + + 4) Legion Of Doom T-Shirts Chris Goggans + + 5) Computers Tnd The Second Amendment Carl Guderian + + 6) How To Survive The First Year Of Law School.. Mike Godwin + + 7) Notes From Cyberspace - 2nd Edition Readers + + 8) Editorial Of The Month [A Humorous Diddy] Marco Landin + + 9) Whitehouse Electronic Publications FAQ Stanton McCandlish + + 10) Redefining The Modem User Ed Cavazos + + 11) Texas ISDN - Request For Comments Public Util. Comm. + + 12) Test Scores, Funny, But Makes You Wonder Anonymous + + 13) An Interview With Tom Jennings Jon Lebkowsky + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + J.R. "Bob" Dobbs - The Ultimage SubGenius + + @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ + + @@@@@@@^^~~~~~~~~~~~~~~~~~~~~^^@@@@@@@@ + + @@@@@@^ ~^ @ @@ @ @ @ I ~^@@@@@@ + + @@@@@ ~ ~~ ~I @@@@@ + + @@@@' ' _,w@< @@@@ + + @@@@ @@@@@@@@w___,w@@@@@@@@ @ @@@ + + @@@@ @@@@@@@@@@@@@@@@@@@@@@ I @@@ + + @@@@ @@@@@@@@@@@@@@@@@@@@*@[ i @@@ + + @@@@ @@@@@@@@@@@@@@@@@@@@[][ | ]@@@ + + @@@@ ~_,,_ ~@@@@@@@~ ____~ @ @@@ + + @@@@ _~ , , `@@@~ _ _`@ ]L J@@@ + + @@@@ , @@w@ww+ @@@ww``,,@w@ ][ @@@@ + + @@@@, @@@@www@@@ @@@@@@@ww@@@@@[ @@@@ + + @@@@@_|| @@@@@@P' @@P@@@@@@@@@@@[|c@@@@ + + @@@@@@w| '@@P~ P]@@@-~, ~Y@@^'],@@@@@@ + + @@@@@@@[ _ _J@@Tk ]]@@@@@@ + + @@@@@@@@,@ @@, c,,,,,,,y ,w@@[ ,@@@@@@@ + + @@@@@@@@@ i @w ====--_@@@@@ @@@@@@@@ + + @@@@@@@@@@`,P~ _ ~^^^^Y@@@@@ @@@@@@@@@ + + @@@@^^=^@@^ ^' ,ww,w@@@@@ _@@@@@@@@@@ + + @@@_xJ~ ~ , @@@@@@@P~_@@@@@@@@@@@@ + + @@ @, ,@@@,_____ _,J@@@@@@@@@@@@@ + + @@L `' ,@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ + + @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ + + + + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - April 30,1994 ISSN 1074-3111 + + ============================================================================ + + + + EDITOR'S NOTES: + + + + FREE-NET: I had intended to do some kind of informative article on + + the Free-Net systems around the world for this issue. In my attempts to + + get information, I mailed about 60 individuals/groups requesting information + + on their organization. I contacted persons in several countries as well as + + many, many people here in the states. ...and low and behold, only 2 people + + responded offering information. Half did not reply at all, and the other + + half (minus the two brave souls mentioned above) replied saying that they + + had not developed an organization, had no info, no volunteers, etc... + + Go figure...(Is Free-Net the Vapor-Ware of the 90's??) + + + + PUBLISHING: Our original publishing schedule has gone to hell-in-a-handbasket + + to say the least. We will probably release 2 or 3 times per quarter. + + + + Order some Legion Of Doom T-Shirts! + + + + Share this issue with all of the little boys and girls that you know who + + have an e-mail address. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + VISA ESTABLISHES INTERNATIONAL CONSORTIUM FOR + + ELECTRONIC PURSE SPECIFICATIONS + + + + /PRNEWSWIRE (C)opyright 1994 + + + + SAN FRANCISCO, March 22 /PRNewswire/ -- Visa today formed an international + + consortium of market leaders in the consumer payments industry to develop + + common specifications for a new way to pay -- an "Electronic Purse," a card + + with a micro chip that can be used instead of cash and coins for everything + + from vending machines to public transportation. + + + + The Electronic Purse would consist of a micro-chip embedded in a credit + + card, debit card, or stand alone card to store value electronically. + + The card would replace cash and coins for small-ticket purchases (less than + + U.S. $10), such as gasoline stations, pay phones, road/bridge tolls, video + + games, school cafeterias, fast food restaurants, convenience stores, and + + cash lanes at supermarkets. Cardholders can "reload" the micro-chip and + + control the amount of value stored in the card's memory. The Electronic + + Purse provides cardholders with the security and convenience of carrying + + less cash and coins, eliminating the need for exact change. Many + + participants in this worldwide effort are currently pilot testing electronic + + purse products, additional pilots are expected in late 1995. + + + + Joining forces with Visa to develop international technical specifications + + for the Electronic Purse are: Banksys; Electronic Payment Services, Inc., + + (EPS); Financial Information Systems Center, (FISC); Groupement des Cartes + + Bancaires, (CB); NationsBank Corporation; Sociedad Espanola de Medios de + + Pago, (SEMP); Sociedade Interbancaria de Servicos, S.A., (SIBS); and + + Wachovia Corporation. To ensure worldwide representation, limited additional + + payment systems that have invested energies in open-market electronic purse + + projects, will be invited to join. In addition, Visa will form a parallel + + group with technology companies to ensure the specifications support low-cost, + + efficient production of necessary equipment. + + + + "The goal of our combined efforts is to lead the market into the next + + frontier of payment processing -- the automation of cash and coins," said Ed + + Jensen, president and chief executive officer, Visa International. "The + + highly complementary capabilities of the participating companies will allow + + us to address issues for all aspects of smart card-based electronic purse + + solutions, including the cards themselves, point-of-sale systems, networks + + and back-end interchange and settlement systems." + + + + This announcement reflects Visa's commitment to providing superior, + + convenient payment services to its member financial institutions who serve + + consumers and merchants around the globe. The consortium was formed in + + response to member requests that Visa take the lead in facilitating the + + addition of an electronic purse to existing credit and debit cards, as well + + as the introduction of a stand alone card. Visa will leverage its global + + brand presence by teaming up with strategic partners to develop common + + standards. + + + + "The most critical step in making this concept a global market reality is + + the definition of open standards that can be shared among all participants," + + said Wesley Tallman, president, Visa Products and Information Services. + + "Recognizing that important domestic electronic purse developments are + + underway, the consortium will leverage the expertise of all participants. + + Group 'knowledge sharing,' especially with our European participants that + + have made significant advancements in the chip card arena, will facilitate + + the development of a specification that is relevant to markets worldwide." + + The technological specifications will govern the standards needed to + + establish an infrastructure that supports electronic purse payments. + + + + The worldwide market for automating cash transactions remains virtually + + untapped. According to the Bank for International Settlement, consumer cash + + transactions in the U.S. alone exceed 300 billion per year. By contrast, + + bank-facilitated consumer transactions, such as credit and debit cards, + + checks, and wire transfers total only 60 billion per year. As these figures + + indicate, there is a vast market potential for automating cash transactions. + + "EPS has been investing significant resources to develop smart card solutions + + since 1991," stated David Van Lear, chairman and chief executive officer of + + Electronic Payment Services, Inc. "Combining the resources of these industry + + leaders will accelerate market acceptance." + + + + Just as the standard operating environments have fueled the growth of the + + personal computer industry, the specifications that emerge from this + + collective effort will provide the essential framework to ensure + + compatibility, reduce development time and cost, and open up the market for + + others. + + + + International payment system participants included in this cooperative + + effort are: + + + + Banksys -- based in Brussels, Belgium, is a leading European specialist in + + electronic funds transfer (EFT) and payment security. Banksys operates the + + automated teller machine (ATM) and point-of-sale (POS) network on behalf of + + all card issuing banks in Belgium. Besides Belgium, 10 other countries are + + equipped with the Banksys system. Banksys is entrusted with the development + + of the Belgian Electronic Purse project, with pilot testing expected to begin + + in December 1994. + + + + Electronic Payment Services, Inc.(EPS) -- based in Wilmington, Del., is the + + leading electronic funds transfer company in the United States with an annual + + transaction volume of 1.7 billion. EPS is the holding company for BUYPASS + + Corporation and MONEY ACCESS SERVICE INC., operator of the MAC(R) network. + + + + Financial Information Systems Center (FISC) -- based in Taipei, Taiwan, is a + + government organization that supports electronic purse initiatives in that + + country. Through its members, FISC has issued 80 thousand integrated circuit + + cards and has installed more than one thousand point-of-sale systems with + + integrated circuit card readers. + + + + Groupement des Cartes Bancaires (CB) -- based in Paris, is the country's + + payment cards organization that has succeeded in launching the world's + + largest integrated circuit card program, with more than 22 million cards in + + circulation generating 2.2 billion transactions per year. + + + + NationsBank Corporation -- headquartered in Charlotte, N.C., is the third + + largest banking company in the United States with approximately $158 billion + + in assets, more than 1,900 retail banking centers in nine states and the + + District of Columbia, and consumer offices in 33 states. NationsBank is a + + financial services company providing products and services nationally and + + internationally to individuals, businesses, corporations, institutional + + investors and government agencies. + + + + Sociedad Espanola de Medios de Pago (SEMP) -- based in Madrid, SEMP is a + + sister company of Visa Espana, a group member of Visa banks in Spain. SEMP + + operates Sermepa, the card processing company of Visa Espana. + + + + Sociedade Interbancaria de Servicos, S.A., (SIBS) -- based in Lisbon, + + Portugal, is the country's leading bank payments company which provides + + electronic clearing services and operates the national Multibanco ATM and + + EFT/POS networks. As an extension to its service offerings, SIBS, is + + introducing the Multibanco Electronic Purse, (MEP). + + + + Visa International -- headquartered in the United States, is the world's + + leading consumer payments system with more than 333 million cards issued, + + more than 11 million acceptance locations, and the largest global ATM + + network. + + + + Wachovia Corporation -- with dual headquarters in Atlanta, and + + Winston-Salem, N.C., is one of the United States' leading debit card issuers + + and provides credit card services to three million cardholders nationwide. + + + + /NOTE TO EDITORS: In December 1993 Visa International, MasterCard + + International and Europay announced an agreement to form a joint working + + group to develop a common set of technical specifications for the + + integration of microprocessor chips in payment cards -- commonly known as + + "Integrated Circuit," "Chip," and "Smart" cards. The electronic currency + + specifications referenced in this release will enable the electronic purse + + application to be added to the integrated circuit cards./ + + + + /CONTACT: Albert Coscia of Visa, 415-432-2039/ + + + + 03/28 VISA TECHNOLOGY GROUP SUPPORTS ELECTRONIC PURSE SPECIFICATIONS + + + + SAN FRANCISCO, /PRNewswire/ -- Visa today announced the formation + + of a technology group of international manufacturers to support the + + adaptation of specifications for a variety of technologies that will + + facilitate the issuance and acceptance of the "Electronic Purse" -- a payment + + card that stores value electronically and is designed to replace cash and + + coins for a wide range of low-value (under U.S. $10) consumer payments. + + + + The technology group will work with Visa who recently formed an + + international consortium of payment systems that will develop common + + specifications for Electronic Purse programs. Because plans are underway + + for the card to be used globally in a variety of venues -- including, + + gas/petrol stations, grocery stores, convenience stores, fast food + + restaurants, school cafeterias, and for such routine items as telephone calls + + from pay phones, road/bridge tolls and video games -- a number of + + technologies required to support card acceptance in global markets will be + + examined by the group. + + + + The first suppliers to join the international technology group are + + VeriFone, Inc., the leading global provider of point-of-sale transaction + + systems, and Gemplus, SCA, the world's leading manufacturer of smart cards. VeriFone and + + Gemplus have formed a joint venture, called VeriGem, to pursue electronic + + purse opportunities. To ensure worldwide representation, additional + + technology leaders who have invested energies in electronic purse + + applications will be invited to join the group. + + + + In addition to acceptance technologies, "loading" systems that enable + + cardholders to restore currency value into the micro chip will also be + + analyzed. Automated Teller Machines (ATMs) are expected to play an important + + role in loading value into the electronic purse. Future loading methods, such + + as specialized devices located at merchant locations or in the home, will + + also be explored. Operating both the largest international consumer payment + + network, VisaNet, and the world's largest ATM network puts Visa in a unique + + position to lead this global effort. + + + + "As with all emerging technologies, consultation with suppliers responsible + + for physically implementing the technology is critical to ensuring the + + viability of the product design," said Wesley Tallman, president, Visa + + Products and Information Services. "As market leaders in the payment systems + + field, all of those who have joined us in this initiative are truly partners + + in paving this 'express lane' of the electronic payment superhighway." + + + + Tallman emphasized that the technology group will be charged with ensuring + + that the specifications developed by the consortium support low-cost, + + efficient production of necessary systems and equipment. + + This group approach has been a key tool in support of Visa's product and + + market development efforts. In December 1992, Visa formed a manufacturer's + + group to support development efforts for security specifications of + + integrated circuits on payment cards. Still active today, this group lends + + critical on-going support and expertise to Visa's chip card efforts. + + Participants in this international group include: Bull, CPS (France); + + Gemplus, (France); Giesecke and Devrient (Germany); Schlumberger Industries + + (France); and Toshiba Corporation (Japan). Visa expects and welcomes the + + participation of these and other technology partners in the electronic purse + + effort. + + + + Hatim Tyabji, chairman, president and chief executive officer of VeriFone, + + agreed with the need for a supplier's group that would lend systems expertise + + to this effort. "Establishing worldwde specifications is the essential first + + step in the global standardization of the electronic purse, uniting all + + industry participants on a common playing field with a common set of rules. + + The endorsement and support of the electronic purse by Visa, its member banks + + and leading worldwide payment systems send a strong message to the industry + + -- the electronic purse is no longer merely a possibility, but a real market + + direction," said Tyabji. + + + + "With their high storage capacity, programmability and increasing + + affordability, smart cards are now poised to move beyond specialized + + applications and become a truly universal payment medium," said Dr. Marc + + Lassus, president and chief executive officer of Gemplus. "We share the + + consortium's vision of the electronic purse, and are excited about helping + + to bring speed, reliability and efficiency of smart card-based electronic + + cash to markets around the globe." + + + + Visa International, headquartered in San Francisco, California, is the + + world's leading consumer payments system with more than 333 million cards + + issued, more than 11 million acceptance locations, and the largest global + + ATM network. + + + + VeriFone, Inc., based in Redwood City, California, is a leading global + + provider of Transaction Automation solutions used to deliver payment + + processing and other transaction services to various retail market segments, + + as well as the healthcare and government benefits market. The company has + + more than 30 facilities located throughout Asia, Europe and the United States. + + To date, VeriFone has shipped more than 3.4 million Transaction Automation + + systems, which have been installed in more than 70 countries. Net revenues + + in 1993 were U.S. $258.9 million. + + + + Gemplus Card International, based in Gemenos, France, is the leading + + worldwide manufacturer of smart cards. Gemplus' cards are used for secure + + transactions in public and cellular telephone, banking, pay TV, + + transportation, healthcare and defense applications. The company has three + + manufacturing facilities: two near Marseilles, France, and one near + + Stuttgart, Germany. Current Gemplus production exceeds 14 million cards + + per month. The company has direct sales offices in 12 countries and a + + distribution network covering an additional 50 countries worldwide. The + + company's 1993 revenues were U.S. $130 million. + + + + NOTE: Gemplus is a registered trademark of Gemplus Card International. + + VeriFone is a registered trademark of VeriFone, Inc. Visa is a registered + + trademark of Visa International, Inc. + + + + /NOTE TO EDITORS: On March 22, 1994, Visa announced the formation of an + + international consortium to develop worldwide technical specifications for + + the Electronic Purse. The supplier's group discussed in this release is a + + complementary effort, serving Visa in a consultative or advisory capacity. + + + + /CONTACT: Albert Coscia of Visa, 415-432-2039/ + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CYBERSPACE COWBOY + + + + John Perry Barlow rides the range on the electronic frontier + + + + By Maureen Harrington + + + + PINEDALE WY- John Perry Barlow isn't exactly your average + + computer big shot. Burly and bearded, prone to an eccentric mix + + of gaudy cowboy shirts and Italian leather jackets, he's a far + + cry from a pencil neck geek with a pocket protector and a Mensa + + membership. His interest in technology tends less to megabytes + + than toward souping up the V-8 in his pickup. + + + + But neither is he cut out for a corporate dance card. Barlow's + + sarcasm would get him tossed out of most boardrooms. + + + + Despite his unusual resume'- lyricist for the Grateful Dead, + + former Students for a Democratic Society organizer with an + + impeccable Republican pedigree, and failed Wyoming cattle rancher + + with the heart of an environmentalist- Barlow, 46, found a niche + + in computers. Accidentally. + + + + He's an outlaw at heart who lost his home on the range and found + + another. Barlow intends to keep the electronic frontier free of + + rustlers, ruffians and the strong and long arm of the feds. Just + + as he fought to keep the West free of polluters, developers and + + the strong and long arm of the law. + + + + The computer community has its first cultural historian, critic + + and social activist. Barlow has set out to watchdog the goings + + on in cyberspace- the intangible place between the computer key + + board and the dots that appear on the computer screen. + + + + He's become, by dint of his megaverbal skills and nontechnical + + point of view, the cowboy conscience of the computer culture. + + He's regarded by computer CEO's, journalists who follow the + + industry and the wildcatters who swoop through systems as the man + + to ask about the future of technology. + + + + Barlow not only writes and speaks about the future that is racing + + down the information highway, he puts his talent where his mouth + + is: he helped found the Electronic Frontier Foundation (EFF) in + + 1991, along with Mitch Kapor, inventor of Lotus 1-2-3, the best- + + selling spreadsheet software in the world and with an assist from + + Steve Wozniak, Apple computer's onetime whiz kid. + + + + Kapor and Barlow started the foundation to protect the right to + + privacy in cyberspace. They had both been visited by federal + + agents looking for the second-story men of the computer industry- + + hackers. They became alarmed. + + + + The tale of Kapor and Barlow's friendship has become one of the + + first cyberspace legends. + + + + "I was sitting here in Pindale, enjoying this new found world on + + my computer, when an FBI agent shows up asking me what I might be + + doing on it," said Barlow. + + + + At the time, Barlow was unaware of a growing government concern + + about what they considered computer crimes of the most heinous + + nature. + + + + "A nice guy, but he was expert in cattle rustling, not in high- + + tech crime," recalled Barlow. "I tried to explain it to him, but + + he didn't really understand computers. He went on back to the + + office." + + + + Barlow got on the techies' horn- the WELL, a computer bulletin + + board- and alerted users all over the country to what happened. + + In Connecticut, at about the same time, Kapor also had been + + visited by the feds. Like Barlow, Kapor was concerned about + + government invasion in this newly forming world. + + + + He and Barlow got together via computers, naturally. Later + + Kapor, on the way to the West Coast from his home on the East + + Coast, dropped into Wyoming in his private jet to talk with + + Barlow. + + + + As Barlow tells it, "Here we are two very different guys- one + + from Long Island, who has been a leader in this field for years + + and me, a small town Wyoming rancher who just figured out how to + + turn these things on. I felt like I'd known Mitch all my life." + + + + In a few hours at a kitchen table in Wyoming, the two men + + conceived the first civil rights group for high-tech's new age. + + + + EFF, now headquartered in Washington, D.C., raises money for + + lobbying and provides funds for the defense of so-called + + "computer criminals." Their first projects were helping with the + + legal defense of hackers who the founders don't think deserved + + such harsh treatment by the feds. + + + + "Oh, hell, these were kids mostly," said Barlow. "Just fooling + + around. They were being treated like major criminals. This + + hacking is a lot like boys going out to abandoned buildings and + + looking around. Yeah, the property owners don't like it, but + + it's part of a boy's life as far as I can tell." + + + + Barlow and Kapor have been bitterly criticized for their support + + of what many in corporate America- the software and telephone + + companies, in particular- say are serious criminals. + + + + Barlow takes that into consideration: "Crimes should be + + prosecuted. There are some real bad things being done on these + + machines. But that doesn't mean that we shouldn't be watching + + out for misuse of (government) power and helping to protect the + + innocent. We're into educating people about this stuff, as much + + as anything." + + ----------- + + + + Barlow doesn't fit, by nature or training, into either the + + techno-wonk category or the big money elite that has developed + + around the technology. Nonetheless, both factions of the + + computer culture listen to him. + + + + He's preaching the sermon of change, from his high-tech pulpit: + + the computer bulletin board. Barlow can be read on The WELL (one + + of the first and largest bulletin boards) as well as in the op-ed + + pages of the New York Times and the slick computer-lifestyle + + magazines, Wired and Mondo 2000. + + + + He's been profiled in the New York Times and quoted as an expert + + on the computer culture in scores of newspapers and + + newsmagazines. Remarkably, Barlow had never used a computer + + until four years ago. He caught on fast. + + + + "Oh, Jesus," he said, rolling his eyes, impatient with ordinary + + definitions of jobs. "I'm a techno-crank. I've got all kinds of + + hats on and most of them don't fit exactly. But let's just say I + + came into computers late, but I was able to see fairly quickly + + some of the possibilities and problems of this new reality. + + + + "I got my first computer to do some of the accounting work for + + the ranch (The Bar Cross, outside Pinedale), in the late '80's. + + I discovered that you could talk to people on it. I got + + fascinated." + + + + "Fascinated," for most of us, constitutes a hobby. + + + + For Barlow, fascination turned into a new career. Caught in the + + double bind of rising taxes and expenses and lower prices for + + cattle, Barlow had to sell the Bar Cross, which had been in the + + family for three generations. Just as that part of his life was + + ending, he was catapulted into cyberspace. And his future. + + + + Barlow is one of the few nontechnoids who has caught the + + attention of the citizenry of cyberspace. In fact, he was the + + first to co-opt the word "cyberspace" from sci-fi novelist + + William Gibson and use it in everyday language. + + + + According to Bruce Sterling, a journalist, novelist and + + accomplished chronicler of computer culture, "Barlow saw that the + + world of electronic communications, now made visible through the + + computer screen, could no longer be regarded as just a tangle of + + high-tech wiring. Instead it had become a place, cyberspace, + + which demanded a new set of metaphors, a new set of rules and + + behaviors." + + + + Sitting in his mothers home in Pinedale, wearing a short kimono + + over jeans and boots, Barlow had been on the phone, fax and modem + + all morning. Mim Barlow, from whom he inherited his + + conversational skills, was decked out in bright red lipstick and + + matching rhinestone earrings. + + + + She has no problem, pointing out that although her son "was a + + brilliant child- quite interesting to raise- I thought for sure + + he was doomed. + + + + "His father and grandfather were alcoholics, and he was going + + down the same road." + + + + Barlow no longer drinks. + + + + "Hell, he was headed for juvenile delinquency," said Mim Barlow. + + "No question. + + + + "We got him out of town. Sent him to Fountain Valley, a prep + + school outside of Colorado Springs. Best thing that ever + + happened to this town." + + + + The best thing that happened to her son, too, he freely admitted: + + + + "I'm forever in debt to that school. It saved me. I hope my + + three girls will be able to go there, if I can afford it." + + + + (Barlow is divorced from his wife Elaine, who remains in Pinedale + + with their three children. Barlow commutes between Wyoming and + + New York City. He serves on the board of Fountain Valley.) + + + + Barlow met his fate at prep school: Bob Weir, a co-founder of the + + Grateful Dead and life-long friend. Barlow has been writing for + + the Grateful Dead since 1970, including the lyrics for "Hell In a + + Bucket," "Picasso Moon," and "I need a Miracle." The royalties + + kept the family ranch afloat for years and pay Barlow's bills + + now. + + + + "There's a resurgence in interest in the band and I'm actually + + picking up the pace a little," said Barlow. + + + + "You know I saw Bobby Weir last year," interjected Barlow's + + eighty something mother. "He didn't look so good. + + + + "This one," she nodded at her son like he's a questionable head + + of beef, "looks better." + + + + Barlow shot his mother a look of mild disgust. "Hell, Ma, Bob's + + had a *life*. It shows, that's all." + + + + Barlow has had quite a life, too. + + + + After graduating from Wesleyan University in Connecticut, he was + + swept into the counterculture. He went to India. Rode + + motorcycles around Europe and was in and out of Haight-Ashbury. + + He wandered back to the United States, in the early '70's, and + + was headed to Hollywood for a job, when he stopped at the family + + ranch on the way to Glamourville. He didn't get out of Wyoming. + + + + "The ranch was in a mess. My dad had been sick. We were in + + debt. I found something I could put my hand to. I was a hippie + + that was running cattle and trying to keep the land. I got + + married and had kids." + + + + Along the way, true to his deep Republican roots, he became an + + activist. Two generations of Barlows were in the Wyoming Senate. + + John Perry may have gotten there too, but he narrowly missed + + winning a Senate seat in 1987 running as a Republican. + + + + Instead, he became involved in the small town life. He set out + + to protect that way of life by becoming an environmentalist- + + rancher, which is considered a bit of an oxymoron in the West. + + But environmentalism is, in Barlow's estimation, "inevitable. + + You've got to conserve the land." + + + + The loss of his land still rankles. Driving through the Bar + + Cross acreage, now owned, as many ranches around Pinedale are, by + + a wealthy "weekend rancher," Barlow tightens up a little: "I did + + the best I could. I just couldn't make a go of it." + + + + Barlow sold his land at, "about break-even." + + + + He's been living mostly in New York for the past several years, + + writing for various magazines and becoming more and more famous + + on the electronic grapevine. He travels constantly and is as + + provocative a speaker as he is writer. While his income is still + + largely from royalties, he's commanding more attention and fees + + as a speaker. He's spoken in China to a scientific congress and + + has been asked to help explain the future of information to the + + CIA. + + + + Barlow doesn't find that such an odd task for a social activist: + + "Like so many organizations, the CIA is waking up to the fact + + that they know nothing about this technology. And, they are + + realizing that if they don't know about the revolution in + + information, they will be left behind. + + + + "People who don't accept this change are going to be left behind. + + What we once thought of as power and wealth is changing. Who's + + in charge is changing." + + + + Barlow's business card may say it all: There are nine phone, + + fax, modem, and beeper numbers. Under his name, his title reads, + + "cognitive dissident." + + + + In a new book, "The Hacker Crackdown: Law and Disorder on the + + Electronic Frontier" (Bantam $23), Sterling calls Barlow, "a + + computer networker of truly stellar brilliance. He has a poet's + + gift of concise, colorful phrasing. He also has a journalist's + + shrewdness, an off-the-wall, self deprecating wit and a + + phenomenal wealth of simple personal charm." + + + + Sterling adds that Barlow is "a gifted critic...who coins the + + catchphrases and the terms of debate that become the common + + currency of the period." + + + + John Perry Barlow has become the poet laureate of technologies + + new age. + + + + He's the hackers' hero- patrolling the borders of the newly + + discovered frontiers of technology. If anyone is going to + + explain the social, legal and personal implications of all the + + megachange coming down the high-tech pike, it's Barlow. + + + + As he has written in the latest edition of Wired: "In the little + + hick town I come from, they don't give you much credit for just + + having ideas. You are judged by what you make of them." + + + + Using that criterion, Barlow may just have a future in + + cyberspace. + + + + *** Maureen Harrington is a Denver Post staff writer. *** + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + A MESSAGE FROM THE VICE PRESIDENT + + ON NETWORK ACCESS REFORM + + + + By Al Gore (vice.president@whitehouse.gov) + + + + Greetings. I'll leave it to others to carry on the important work + + former president Clinton started in health care reform after discovering + + that 37 million Americans have no health insurance. + + + + Now that Clinton has magnanimously stepped down, rather than embroil the + + US in lengthy Whitewater hearings, and I'm president, I plan to make it + + my top priority to deal with a really serious problem. As horrifying + + and unthinkable as it is in this day and age, 212 million Americans + + don't have network access. + + + + The current network situation is an intolerable and inefficient + + hodgepodge of private, university, and government access providers. + + People in different parts of the country pay different amounts for + + network access. Different providers give different levels of service. + + There's no excuse for this. Access to the net -- *equal* access to the + + net -- is a fundamental human right. + + + + Tipper and I have developed a program which will guarantee equal access + + to the information superhighway to all Americans, tall or poor, rich or + + thin, white or non-smokers. + + + + All access to the net will be through one's employer. Employers will + + deal only with large centralized network access providers. There will + + be only one provider in each area of the country, cutting down on + + wasteful duplication. All providers will be heavily regulated, and + + will be required to offer the exact same services for the exact same + + prices. All employers will be required to participate, and to pay the + + full costs. + + + + Unemployed people's access will be paid for by the government. This + + is not expected to require any tax increase. At least, not a very large + + tax increase. At least, not before the next election. + + + + Since individuals will not be charged for the services, some may be + + tempted to abuse the privilege. Especially because many newsgroups are + + known to be highly addictive. To prevent this, newsgroup access will be + + available only by prescription. + + + + For instance, if someone wants access to alt.sex, they would schedule + + an appointment with their Primary Network Consultant. In a few weeks, + + when the appointment comes up, they'd come in at 8 am and get to speak + + briefly with their Consultant at some time that day or evening. The + + Consultant would refer them to a sex consulatant or other specialist, + + as appropriate. After a few weeks, they'd have a similar appointment + + with the specialist, who would then prescribe alt.sex or some other + + newsgroup as appropriate. They would take the prescription to their + + Network Access Provider to get the prescribed newsgroup added to their + + .newsrc. To prevent fraud and corruption, all prescriptions will be + + carefully tracked by the government in large databases, closely secured + + against everyone who doesn't have the carefully guarded top secret + + phone number for modem access (202-456-1414). Also, all prescriptions + + automatically expire after 30 days. They can be renewed only after + + another appointment with one's Primary Network Consultant and the + + specialist he refers one to. + + + + FTP, IRC, Gopher, WAIS, World Wide Web, Archie, telnet, rlogin, finger, + + and e-mail, may also be made available by prescription, if they are + + approved by the Federal Data Administration (FDA). For reasons of + + public safety, network services and newsgroups not approved by the + + FDA will be strictly banned. Anyone caught owning, using, producing, + + providing, or advocating unapproved services, mailing lists, or + + newsgroups, will be subject to zero tolerance -- everything they + + own will be forfeited to the government, without a trial. + + + + Also, anyone who rents an apartment or gives a job to a suspected + + network abuser will be subject to zero tolerance. Of course, this + + being a free country, nobody will actually be sent to prison without + + a fair trial. Since nobody who's accused will be able to afford an + + attorney, the government will provide them with an attorney of our + + choice without charge. And anyone guilty of three offenses will serve + + a mandatory life sentence without parole. + + + + Similarly with anyone who writes, posesses, distributes, manufactures, + + sells, uses, posts, backs up, saves, promulgates, perpetrates, forwards, + + or laughs at, a spoof that makes official government policies or + + proposals look ridiculous. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LEGION OF DOOM T-SHIRTS!! + + + + By Chris Goggans + + + + After a complete sellout at HoHo Con 1993 in Austin, TX this past + + December, the official Legion of Doom t-shirts are available + + once again. Join the net luminaries world-wide in owning one of + + these amazing shirts. Impress members of the opposite sex, increase + + your IQ, annoy system administrators, get raided by the government and + + lose your wardrobe! + + + + Can a t-shirt really do all this? Of course it can! + + + +------------ + + + + "THE HACKER WAR -- LOD vs MOD" + + + + This t-shirt chronicles the infamous "Hacker War" between rival + + groups The Legion of Doom and The Masters of Destruction. The front + + of the shirt displays a flight map of the various battle-sites + + hit by MOD and tracked by LOD. The back of the shirt + + has a detailed timeline of the key dates in the conflict, and + + a rather ironic quote from an MOD member. + + + + (For a limited time, the original is back!) + + + + "LEGION OF DOOM -- INTERNET WORLD TOUR" + + + + The front of this classic shirt displays "Legion of Doom Internet World + + Tour" as well as a sword and telephone intersecting the planet + + earth, skull-and-crossbones style. The back displays the + + words "Hacking for Jesus" as well as a substantial list of "tour-stops" + + (internet sites) and a quote from Aleister Crowley. + + + + All t-shirts are sized XL, and are 100% cotton. + + + + Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for + + postage. + + + + Send checks or money orders. Please, no credit cards, even if + + it's really your card. + + + + + + Name: __________________________________________________ + + + + Address: __________________________________________________ + + + + City, State, Zip: __________________________________________ + + + + + + I want ____ "Hacker War" shirt(s) + + + + I want ____ "Internet World Tour" shirt(s) + + + + Enclosed is $______ for the total cost. + + + + + + Mail to: Chris Goggans + + 603 W. 13th #1A-278 + + Austin, TX 78701 + + + + These T-shirts are sold only as a novelty items, and are in no way + + attempting to glorify computer crime. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Computers and the Second Amendment: An Opening Volley + + + + By Carl Guderian (bjacques@cypher.com) + + + + A friend and I were talking the other night about needing to defend + + oneself against one's own government. He was talking about guns; I was + + talking about encryption. We were talking about the same thing. I read a lot + + of debates in which the arguments for restricting computing are strikingly + + similar to those for gun control. Am I the only one who sees the parallels? + + It's certainly forced me to take another look at the gun issue. + + + + The last few years have given us all an appreciation for the + + Constitution, or what's left of it. Most of the action in the personal + + computer user community is centered around the First Amendment, particularly + + the rights to free expression and peaceable assembly. We've also had our + + noses rubbed in official disregard for the Fourth, Fifth, and Sixth + + Amendments. All of this has been (and is still being) discussed elsewhere. + + Tonight's topic is the Second Amendment, the people's right to keep and bear + + arms (a well regulated militia being essential to the security of a free + + state), in relation to personal computers and private networks. + + + + Until recently, I didn't give much thought to the gun issue, since I + + don't own a gun and probably won't be getting one anytime soon. Unless I + + move to Arizona, I can't pack heat everywhere I go, so I probably won't + + have a shooting iron handy when I really need it to shoo away a mugger if I + + run into one. The best way for me to win such an encounter is to prevent it + + from ever taking place. According to Sun Tzu, a battle is won or lost + + before it is ever fought. I don't hide out in the suburbs, but I don't + + stroll down Main at midnight with my wallet hanging around my neck, either. + + Weapons are better than nakedness, but wits are better than + + both. The existence of priests and businessmen proves it. So much for that. + + + + Freedom of computing, it now turns out, has a lot in common with the + + citizen's right to own a gun. Both rights are being attacked in a similar + + manner. + + + + Proponents of restrictions love to wave a bogeyman in our faces to get + + us to blindly go along with their hastily cooked-up bills. George Hennard + + helped a bill restricting "assault" weapons get more attention than it + + deserved. Likewise, Sen. Joe Biden touts Senate Bill 266 as protection from + + crazed hackers who might trigger World War III or, worse, steal corporate + + secrets and sell them to the Japanese. And let's not forget the drug + + kingpins who might keep their communications secret from the Law. As a law- + + abiding citizen, you've got nothing to hide so this doesn't affect you + + . + + + + S.B. 266 essentially mandates a government backdoor into any encryption + + scheme marketed for public use. Secrecy becomes the exclusive domain of the + + government and its partners, such as corporations doing work of vital + + military or economic importance. The rest of us have to endure possible + + casual surveillance or be proscribed for daring to keep secrets from Uncle + + Sam. + + + + Not just no, but No, Goddammit! Privacy is scarce enough as it is. + + Every day my file gets passed around the federal and corporate nets like a + + cheerleader at a frat party. Cheap, widespread encryption is one of the few + + physical methods available for enforcing privacy, just as in the private + + ownership of guns kept the government honest in the past. Encryption is a + + window blind pulled down in the face of the hotel dick. + + + + "A well-regulated militia necessary to the security of a free State, + + the right of the people to keep and bear arms, shall not be infringed." + + + + Historically, citizen ownership of guns has been useful for repelling + + invaders, enforcing Manifest Destiny, and keeping central government from + + getting too many ideas about control. There have been some problems in the + + past. The Whiskey Rebellion, Shays' Rebellion, and Quantrill's Raiders spring + + to mind, but no one has seriously considered disposing of the Second + + Amendment. The last real invasion was in 1815 and we've killed off most of + + the Indians, so what does that leave? + + + + Guns in the house are no match for a government determined to do you + + ill (though they may slow down a death squad). That's probably why + + Republicans can lust for control over everyone else yet fight gun control. + + Even the Tuff-On-Crime bill making it's way through the pipeline has no real + + provision for gun control (it may, however, okay warrantless searches made + + in "good faith" and further weaken habeas corpus). Republicans know as well + + as anyone else that guns are small potatoes when someone else has all the + + money and information. + + + + Rights, even those guaranteed by the Constitution, are really + + guaranteed only to the extent that they are hard for a government to + + violate. Early Americans were either well-armed or westward bo + + und, qualities needed in citizens opening a new frontier. However, the 1900 + + census found America with no more frontiers; there was no more West to go to. + + The previous census, in 1890, was the first automated census, using punched + + Hollerith cards to perform a ten-year job in six weeks. For the first time, + + the government could use machines to track its citizens' movements. Control + + began where the frontier ended. Modern American history has been a running + + battle between individual rights and government control. + + + + Cheap, widely available data encryption is one of two new developments + + that are tipping the scales in the citizen's favor. Explosive growth of + + computer network use (the number of Internet users grew by 90% last year) is + + the other, enabling small groups to get the political jump on big ones by + + getting vital information over the wire quickly to just about anyone who + + needs it. Data encryption enforces privacy by keeping your e-mail from + + prying eyes. It represents the first physical + + means of keeping the Fed's nose out of your private business. + + + + It's too bad encryption is not widely used outside of businesses. + + Because so few people use encryption, agencies such as the NSA have an easy + + job of spying on American citizens. I'm not giving away any secrets, but + + here is how I would do it. Though it's theoretically possible to parse + + every phone conversation and data transmission, doing so is a waste of + + resources. Profiling and other tools tell an agency which 10% of the + + + + population is the real threat (90% of the threat comes from 10% of the + + population). Encryption used by other than corporations and government + + agencies is considered suspect and bears cracking by agency supercomputers. + + Fortunately for the NSA, unofficial secure traffic is not very large. + + However, this could change if, say , companies marketed secure + + communications as an alternative to the postal system (Feds can't open your + + e-mail, but you can't fax drugs eitherDlife is full of tradeoffs), or + + + + Americans started using encryption as a matter of course just because it's + + s imply none of the government's damned business what a private citizen + + does if he or she is not the subject of an actual criminal investigation + + (instead of a fishing expedition). Either or both of these developments + + would severely tax the government's ability to casually spy on its own + + people. It might even force the Feds to wonder if it's really worth it. + + Maybe. + + + + A problem with encryption is that there are very few good schemes out + + there. The DES algorithm is best known, but it was created by the NSA. No + + comment. The RSA (Rivest-Shamir-Adelman) algorithm is superior to DES, but + + MIT owns it and licenses cost money (DES is free). There is supposed to be + + a freeware package based on or comparable to RSA, but it could also be NSA + + suckerware. It's easy to get paranoid about this. A bigger problem with + + encryption is that most Americans don't value privacy enough to make the + + extra effort to secure their communications. + + + + The government may or may not be systematically running small networks + + and bbs's out of business by busting them right and left. That's open to + + debate. The No Such Agency is almost certainly tapping their lines, + + though. In the short term, it would be stupid not to. That is its job. In + + the long run, though, this speeds the collapse of the Republic by dangerously + + concentrating power. + + + + Power tends to accumulate. The more power one group has, the more it + + can get. Eventually, one group gets too much of it and spends most of its + + time securing it at the expense of others, whether it needs to or not + + (eventually it needs to). The firs t impulse of one of the other groups is + + to usurp the power from the first group, all with the highest of motives, of + + course. This leads to exactly the same problems. The only way to prevent an + + endless succession of power grabs is to disperse power as widely as + + possible, among people interested in limiting it for everyone. This is where + + checks and balances come in. "All power to the people (soviets)" is a + + disastrous substitute, as (thankfully) other people learned in 1798 and + + 1917. All of this is explained at length and more clearly in On Power: Its + + Nature and the History of its Growth, by Bertrand de Jouvenel (Viking Press, + + New York, 1949). The book is long out of print, but it's well worth your + + while to check it out and photocopy it somewhere. Other good references + + include Democracy in America (1835) and The Old Regime and the + + French Revolution (1856), both written by Alexis de Tocqueville. You can find + + those at a used bookstore. + + + + Theory aside, it can be shown that a people completely dependent on + + their government for security lose their ability to come to that + + government's aid in times of external danger. At that time, the people + + further drain those resources by requiring protection from themselves. The + + less capable a people become, the more fearful they get, eventually voting + + in a police state. Hitler was elected. + + + + Computer users face similar dangers. Additionally, economics play a + + large role. A person with a computer is a nearly self-sufficient engine of + + wealth. Economic competition is constant. Denial of personal rights to + + privacy of information removes the individual's ability to protect an idea + + before bringing it to the market. Computer users are thus unable to create. + + All they can do is consume or, at best, labor for someone else. + + Entrepreneurs and small business owners, both key agents of pr + + ogress , are effectively locked out. A nation of employees economically + + dependent on bosses is an economic nonstarter. Freedom of computer use and + + the right to privacy are thus essential to the economic security of a free + + state. + + + + The kind of power bestowed by guns, personal computers and absolute + + data privacy implies a need for a personal sense of responsibility. Both + + viruses and encryption programs are far easier to make and distribute than + + plastic Glock-11 automatic pistols. Some sort of regulation is required. + + This is where the "well-regulated militia" part of the Second Amendment + + comes in and this is the most difficult part of the issue. + + + + My definition of a "well-regulated militia" falls somewhere between + + the NRA and the National Guard. If there were an NRA for computer network + + users I'd probably be in it. I think the stakes are higher with computers + + than they are with guns. I want to see more people with computers and + + modems, to ensure the widest possible dispersal of computing power. For + + this to work, all users should be made aware of the power and + + responsibility of owning a computer ("Only a madman would give a loaded + + revolver to an idiot"DFredric Brown). If there are kids in the house, they + + must be taught to respect guns and computers as early as possible. In a + + well-defended, well-connected house, one can live without fear. Only then + + can a citizen look past the distracting horrorshows put on by the + + politicians and pundits to hide the real issues. Who will see to it that + + responsibilities accompany rights? Part of the answer, believe it or not + + comes from the government. Laws already exist to cover most serious crimes + + committed with a computer. + + + + Where the law is insufficient, professional/lobbying groups such as the + + Electronic Frontier Foundation, the Computer Professionals for Social + + Responsibility, and the Association for Computing Machinery are helping to + + draw up new laws to deal with new kinds of crimes. It's early in the game, + + but the above organizations seem to be working for fairness. + + + + For the control addicts in government, this may not be enough. Tough. + + Computer user organizations are working hard to approach government the way + + we all were taught to do it in high school civics, and they seem to be + + making it work. Can the EFF, CPSR, or the ACM control hackers? Of course + + not. That's what the law is for (demographics suggest that the rapid growth + + of network use will not be accompanied by an equally rapid rise in hacking + + incidents. The hacking scene is maturing with the rest of the population. + + Most hacker heroes are born-again capitalists who might make even better + + role models as long as they don't forget where they came from). + + + + Computer user groups educate while seeking to disperse power, which the + + NRA also does to some extent. The EFF especially tries to reach out to + + potential allies by demystifying computer technology for nonusers and even + + the cops. Let's face itDthe nervous man with the gun is not going to go + + away, so we might as well try to calm him down a little. + + + + Finally, computer network users have their talents to use as + + negotiating chips. A government that refuses to respect their rights will + + lose their economic cooperation. The network-based economy makes an Atlas + + Shrugged-style withdrawal very feasible. The government will have its + + illusion of control while computer users work ordinary jobs while + + moonlighting in the Netherlands and piling up ones and zeroes (Swiss francs) + + in Brunei, all in the comfort of one's suburban home. The result will be an + + Italian-style economyDlackluster on the surface and lively underground. + + Germany lost the A-bomb by chasing out a half-dozen geniuses in the + + Thirties. If America wants to be a player in the global economic contest, it + + needs to treat its citizens with respect. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + HOW TO SURVIVE THE FIRST YEAR OF LAW SCHOOL + + AT THE UNIVERSITY OF TEXAS + + + + by Mike Godwin (mnemonic@eff.org) + + + + (Copyright 1988,1992. This article may be freely distributed on any + + computer forum, including commercial online services. To reproduce it + + in print or in any other non-computer medium, please seek permission + + from the author.) + + + + You went to a decent college, you scored well on your Law School + + Admission Test, and you ranked in the top 10 percent of your class. So, + + now that you're here at The University of Texas School of Law, you can + + look forward to an unbroken string of acadernic successes, right? + + + + Not so fast. No matter how easy you found undergraduate school to be, + + law school is a different story. And the sooner you learn that, the + + better your chances of coming out of the law-school game a winner. + + + + First, disabuse yourself of any notions about your natural academic + + superiority. Sure, you're good, but so is everyone else in your class. + + And since everyone is graded against everyone else on a curve, the + + chances are nine out of 10 that you'll be in the bottom 90 percent of + + your class, regardless of your undergraduate performance. + + + + This means that law-school success doesn't come merely from knowing the + + law; you have to know it better than most of your peers. So you can't + + be complacent. + + + + If you start heeding the following hints early in your first semester, + + they'll improve your chances of hot job offers...and maybe even an + + editorship on the law review. + + + + Class Participation + + + + If you saw the movie "The Paper Chase" (and odds are that you did, or + + you wouldn't be here), you probably know that large classes in law + + school normally are run by "the Socratic method." Rather than + + lecturing, the professor will assign some reading for the day and + + conduct the class by asking students questions about the material. + + + + Watching the movie, you probably got the impression that the best + + law students are those who are eager and able to answer the + + professor's questions. Don't be fooled. Glibness and self-possession + + in class are only roughly correlated to exam performance, and your + + grades are based almost entirely on final exams, not on your + + quickness in the classroom. Because the finals are graded + + anonymously, the professor won't even be able to link your + + classroom participation with the exam. + + + + It's far wiser to spend your time mastering the principles behind + + each case you read rather than memorizing its facts. If you try the + + latter tactic, your brain will be too muddled with facts at exam time + + to allow you to apply the law. Don't worry about the inevitable + + instances in which a professor tries to embarass you for knowing + + less than he does. (I refer to the professor as "he" because almost all + + UT law professors are male. Most are white, too). You can get your + + revenge by earning an honors grade in the course. + + + + Class Preparation + + + + Keep up with the assigned reading. Onerous though the reading may + + be, it's easier to keep up than to catch up. And reading the cases for + + the day will enable you to answer most of the questions any + + professor tries to throw at you. + + + + If for some reason you do get behind on the reading, however, don't + + panic. This happens to some of the best law students. Attend class + + anyway, even if you haven't read that day's class materials. The + + professor's Socratic questions will clue you in to the issues he expects + + you to know for the exam. + + + + Professors + + + + Some law professors are frightening; others are charming. + + Ultimately, however, their personalities don't matter very much. + + Whether he likes you or not, each professor will grade your exam + + according to the curve. There's no such thing as an "easy" law course, + + although you may find some lectures more tolerable than oothers. If + + the material is easy for you, it may well be easy for everybody, so the + + curve can get you anyway. + + + + While some law professors make a pretense of keeping office hours, + + most of them don't really want to see you outside the classroom, a + + milieu they prefer because that's where they have all the control. + + Any question you want to ask a professor probably can be answered + + by a "hornbook" (legal treatise) anyway, and library is full of + + hornbooks. + + + + Don't expect too much sympathy from your professors. After all, law + + school is a game they've *won.* They may have some sort of abstract + + pity for the poor contracts student who's agonizing over Sec. 2-207 of + + the Uniform Commercial Code, but under no cirumstances will you be able to + + persuade them to change your grade. + + + + Briefing your cases + + + + The rule here is "Condense, condense, condense." Nothing's more + + pathetic than the law nerd whose brief is longer than the case + + excerpt in the casebook. Remember this rule: Each case has one or + + two main ideas. Find them, and you'll have what you need to know + + for the exam. + + + + And good, *brief* briefs can be easily incorporated in your study + + outline. + + + + Some professors like to ask tricky questions about the fact pattern of + + a case during the lecture, but don't write these details down. + + + + Instead, make notes in the margin or highlight key facts of your + + casebook. If you've read the case, you should be able to remember + + the facts long enough to get through the class period. And if the + + professor stresses a particular type of fact pattern in the lecture, + + he's signalling to you a possible exam issue. Note the issue, not the + + facts of the particular case. + + + + Buying study aids + + + + Basically, there are two types of study aids you can buy for first- + + year courses: commercial outlines and hornbooks. A commercial + + outline is a prepackaged, detailed skeleton of the material you + + need to know for a particular course. There are several brands of + + outlines, and each has something to recommend it. The Legalines + + outlines track particular casebooks, while the Emanuel Law Outlines + + and Gilbert Law Summaries are more general, although they will + + include many of the cases in your casebook. + + + + You may find it best to buy Legalines outlines for each of your + + courses except contracts. (The UT professors who wrote the contracts + + casebook designed it in a way that makes it difficult to produce a + + commercial outline for it.) Then you can supplement the Legalines + + with general-purpose outlines like Emanuel's and Gilbert's for + + courses you're having trouble with. Be aware that occasionally the case + + summaries and discussions in the commercial outlines are *mistaken*-- + + let your professor and your classmates supplement your take on a given + + case or issue. + + + + Some students buy "hornbooks" for particular + + subjects, but for a first-year student the treatises often go into too + + much unnecessary detail. Theyre also very expensive, and in general + + it's best not to buy them; but you may want to make an exception for + + contracts, which many students find a particularly subtle and + + difficult branch of law. The Calamari and Perillo hornbook is good for + + general contract law, while the White and Summers hornbook is + + necessary for a thorough understanding of the parts of your + + contracts course that deal with the Uniform Commercial Code. You + + may also want to consult UT Professor Charles Alan Wright's treatise + + on the law of federal courts for your civil-procedure class. + + Finally, if you signed up early for a bar-review course (believe it + + or not, some people do this during their first year), some bar-review + + courses will allow you to "check out" their reviews of black-letter + + law. + + + + Study Groups + + + + Try to get into one. When you find a likely group, make sure that + + most of the people in the group are dedicated enough to stick with it. + + Discussing difficult ideas with other law students is a good way of + + making sure you understand them. In general, study groups work + + best with about five people, with each person concentrating on one of + + the five first-year courses you'll be taking each semester. If you + + have a choice about which course to concentrate on, choose the + + course you think you'll find most difficult; your responsibility to + + your friends in the study group will give you an added incentive to + + master that material. + + + + Computers + + + + Buy a computer--you can purchase them at near-wholesale cost at + + the Texas Union MicroCenter on 21st Street. Only if you own a + + computer will you be able to produce and edit a legible course outline + + in a hurry. You'll need two types of software: a good word + + processing program to help you with the briefs and memos you have + + to produce for your legal research and writing seminar, and an + + outline program to produce the course outlines you'll need for exams. + + (Some word processors include outlining capability--in general, those + + word processors are not as good at outlining as programs designed for just + + that purpose.) + + + + If you buy a Macintosh, the outlining software of choice is MORE; if you + + own an IBM PC, buy Thinktank or Grandview.. Both products are available + + at local computer stores. + + + + Exam-taking strategy + + + + Your heart's beating rapidly, your palms are sweaty, and your mind is a + + blank. Yes, you're taking your first law-school exam. How on earth do + + you handle those exam questions? + + + + The first thing to remember is that all law-exam questions are more or + + less alike. Each describes an invented and often quite complex situation + + that, had it occurred in real life, would probably generate one or more + + lawsuits. Following the fact situation is usually a question or + + instruction such as "Describe the potential legal claims and liabilities + + of each party." + + + + Your best strategy, when you outline your answer, is to pretend you're + + the lawyer for each party in turn. Pretending to be Smith's lawyer, + + quickly list all the legal principles from your course outline that + + could advance Smith's case against Jones. Now play the part of Jones' + + lawyer how would you answer each of these legal arguments or claims? What + + counterclaims could you use against Smith? What will Smith say in + + response to your responses? What other parties in the fact situation + + could sue or be sued? And so on. + + + + Inevitably, you'll see some obvious legal issues in the fact pattern. + + You have to deal with them, of course, but don't make the fatal mistake + + of assuming that by handling the obvious or major issues you've written + + a good exam answer. After all, your peers probably share your gift for + + seeing the obvious. + + + + So, how do you make sure you catch the subtle issues as well as the + + straightforward ones? When you're preparing for the exam, condense your + + outline into a checklist of one- or two-word shorthand expressions for + + legal principles. Memorize the checklist, and recite it in your head + + each time you pretend to be the attorney for one of the parties. (Better + + yet--write it down on your scratch paper at the beginning of your exam + + as soon as you're allowed to start writing, before you even read the + + first question. The checklist will remind you of issues you'd otherwise + + overlook. + + + + Practice Exams + + + + Besides creating a legal-issues outline, the best way to prepare for + + exams is to take practice exams. Almost all professors keep their old + + exams on file in the lbirary. After you've done the bulk of your study + + outlines, photocopy your professors' exams from the last couple of + + years. Then sit down with a friend and practice outlining exams answers + + based on the old questions. Don't bother writing a full exam answer! + + Time yourself, and give yourself about as much time to outline each + + answer as you would during a real exam. YOu should budget about a third + + of the time you're given to answer an essay question for outlining your + + answer (e.g., 20 minutes for a 60-minute question). + + + + After each question, compare your outlined answer with your friend's. + + He or she will have seen some points you missed, and vice versa. This + + pinpoints issues you may tend to overlook during the real exam. + + + + Other matters + + + + Four of your first-year law courses -- contracts, torts, civil procedure, + + and property -- will last your entire first year. You'll also take two + + semester-long courses: criminal law in the fall and constitutional law + + in the spring. + + + + Thus, if you have to concentrate on any particular exam during winter + + midterms, concentrate on criminal law; that's the only exam you'll take + + in your first semester that counts as a grade for an entire course. + + Conversely, the exam for the three-hour constitutional-law course in the + + spring will count less toward your average than the exams for your + + year-long courses, which are each worth five or six hours' credit. + + + + Don't get too competitive. It's the friends you make during your first + + few months as a law student who'll help you get through the year. Don't + + be deluded into thinking that other students are the enemy; they're not. + + It's the system you've got to beat, and you can do it with the right + + attitude. A vicious competitive streak, however, tends to undermine + + your karma in the long run. + + + + Finally, try to enjoy yourself. The law really can be fun to learn if + + you let yourself relax. Most people who make it through the first year + + look back at it as a time of rapid intellectual growth and the building + + of mental discipline. Don't regard law school as just the + + stepping-stone to a career. A law-school education has value in itself + + -- it will teach you a lot about what makes our society tick. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + NOTES FROM CYBERSPACE + + 2nd Edition + + + + Notes From Cyberspace will be a feature of every issue of this publication. + + They are little tidbits, notes, comments, etc... from people like you. + + If you have any comments, we certainly encourage you to send them in. + + (comments@fennec.com) + + + + ============================================================================ + + + + NOTES FROM CYBERSPACE - ARTICLE 1 + + By Rodney Perkins + + Subject: THEY ARE OUT TO GET YOU! A piece of POST-LOGIC. + + + + Is that tuna fish I smell? No, its the CONSPIRACY. As avid readers of this + + magazine probably already know, the conspiracy has tried to use its poison + + tentacles to steal eggs from our snake pit. For now, our eggs are safe. One + + day, however, they might try it again. We will be there, knife in hand, + + ready to chop off their offending appendages. Yes, they will probably try + + to squirt their government ink in our eyes but we will continue to fight + + with the weapons given to us by (insert savior here). We must take a stand + + against the pervasive eye of the conspiracy's octopi (yes, it rhymes). You + + must ask yourself "What can I do to help stop this reign of tyranny from + + the unseens and the who-whats-its?" You must continue to fight against the + + shickelgrubers, the boot boys and the LOGIC-WEAVERS! You must never fall + + for LOGIC, you must always use POST-LOGIC (real men always think in POST- + + LOGIC). Confusion and ambiguity are the weapons in this war. Turn their + + MEDIASPEAK, GOOBLEDYGOOK and BAFFLEGAB against them! Weave great webs of + + Orwellian nightmare language! Master the art of circular logic! When they + + ask you what you believe, tell them "I believe what you believe. Just don't + + practice it". Are you confused yet? Good! You get "it"! + + + + =========================== + + + + NOTES FROM CYBERSPACE - ARTICLE 2 + + By John Logan (ice9@bga.com) + + Subject: ON THE SUBJECT OF GOVERNMENT... + + + + Welcome to a new age! Yes this is a world where technology has hit an all + + time high. It seems there is no other way to go but up. Funny, that + + includes taxes, cost of living, and trouble in government. Yes, this is the + + day and age that we are subjected to, by our wonderful president Mr. William + + Jefferson Clinton, successor to the New World Order... Most Americans are + + probably still wondering "Just what is this 'New World Order?'" Well, lets + + talk about that: + + + + The New World Order is a product of the Trilateral Committee, made up of the + + World's key leaders. In this form of government, the entire world will be + + broken up into 3 'Nation States': Europe, The Asias, and The Americas. + + The worlds decisions will be made by the 'elected' presidents of each nation + + state. The entire world will be on a common market with a universal currency. + + I'm sure we have all heard of - the 'credit.' Yes for years we have been + + getting oriented to this system, whether in movies, or by our banking system. + + Well, in the near future, there will be very few private banks, we will + + store our credits (for a small fee) in the World Bank. We will be forced to + + carry around credit chips that, when inserted into a machine, will access + + our account number, list what is to be purchased, and the price. Forget + + about tax evasion!! It will all be AUTOMATICALLY DEDUCTED from out accounts. + + Yes, the new government will be a cross between Capitalism and Communism. + + They will know our every move. Business owners will still be allowed to keep + + their businesses but they will have to pay exorbitant taxes. State security + + will be at an all time high. There will be no middle class. Citizens will + + be either very rich or very poor. The machine has already started. Our + + wonderful government does not want a car on the road that is over 10 years + + old. A bill has already been passed limiting parts for the cars that fit in + + this 'danger zone.' It is now impossible to get manufacturer parts for + + these cars. If you have a problem, you must use after-market parts and hope + + that it fits specifications. Todays cars are built to last 10 years or less. + + Its a sad thing that more people do not understand what is coming down the + + proverbial 'road.' The governing machine is going to run right over the + + common people like a steam roller. People won't even know what happened. + + Take a look around! The New World Order is not nearly as wonderful as our + + government would like us to think. Don't worry, it won't be long and we won't + + have to worry about what they want us to think. They will soon control that + + too! WE HAVE BEEN WARNED. NOW ITS TIME TO DO SOMETHING ABOUT IT! + + + + ============================= + + + + NOTES FROM CYBERSPACE - ARTICLE 3 + + By Dan Wilson + + Subject: Fight the Power! + + + + As I sit here writing this, I can't help wondering what the hell is going on. + + Why is it that every time a group a people find some new freedom or form of + + expression, the government steps in to suffocate it? Just look at the + + National Endowment for the Arts controversy or the PMRC. Why must a small + + group of paranoid people try to force their fears down all of our throats? + + I must admit that when these things first began happening, I just sat by + + thinking to myself that it was a crock of sh*t without doing anything about + + it. It didn't strike close enough to home for me to get involved. Recently, + + however, there's been a series of events that have struck close to home and + + have forced me to take action. The events to which I'm referring are none + + other than the government's recent attempts at bringing the computer world + + to justice (as they define it, of course). + + + + It's really disturbing to hear about the methods the feds used to crack down + + on "dangerous" users. Unsigned search warrants have been used to gain entry + + to homes where all sorts of equipment, computer related or not, was + + confiscated while no charges were specified. There have also been cases of + + holding guns to children's heads while a raid was going on. What kind of + + gestapo tactics are these? Have these guys never heard of the Bill of + + Rights? This isn't the America I was told about as a kid; it sounds a + + helluva lot more like those "evil" communist countries that I was taught to + + hate. The only logical conclusion that can be drawn here is that the + + government is very afraid. Why else would they dedicate so much effort to + + something they know so little about? These guys don't have a clue as to + + what's going on out here in cyberspace. That's the source of the problem. + + Here we sit with these marvelous machines in front of us. Touch a few keys + + and any information that we want to exchange can be sent anywhere in minutes. + + This must seem like a pretty major threat to a government that so often + + relies on misinformation and cover-ups in order to scam the public into + + believing what it wants them to believe. We can't be controlled like the + + media bozos who drone bullsh*t through the idiot box at us. We can't be + + censored like the newspaper or the radio. In fact, this is probably the + + truest form of information exchange we have available today. That alone is + + worth fighting for. + + + + It could also be that they are afraid of a society where people are judged + + solely on their thoughts and ideas. We have no style whores here. Race, + + creed, color and religion are insignificant and pointless in cyberspace; + + they serve no purpose. There can be no discrimination, there can only be + + disagreement with someone's opinions. To me, this is pretty close to a + + perfect society. It is refreshing to judged on what I think and how I + + express myself rather than by the color of my skin or the origin of my + + birth. In a society like this, the government cannot play people off + + against one another. They have no ground on which to stand. Perhaps it's + + this lack of footing that makes them nervous. Whatever it is, it's got them + + thinking that they need to put a stop to it and "bring it under control". + + We are a far too dangerous force for them to just ignore. This fact should + + be remembered and taken advantage of, information is the key! Less than an + + hour ago, I posted issue number six of this magazine on Internet along with + + messages urging others to read it. In a matter of minutes it was all over + + the world. Maybe this will draw others into the fold, maybe not. + + Regardless, it'll force them to think and maybe to take action themselves. + + + + + + @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@ + + + + NOTES FROM CYBERSPACE - ARTICLE 4 + + By Anonymous Attorney + + Subject: POCKET LAW...Quick Reference Card + + + + Hey, copy this down and keep it in your wallet for those situations where + + you might be suppressed by the power-hungry infidels of humanity. + + + + My lawyer has instructed me not to talk to anyone about my case or anything + + else, and not to answer any questions or reply to accusations. On advice of + + counsel and on the ground of my rights under the State and Federal + + Constitutions, I shall talk to no one in the absence of counsel. I shall + + not give any consents or make any waivers of my legal rights. Any request + + for information or for consent to conduct searches, papers, property, + + or effects should be addressed to my lawyer. I request that my lawyer + + be notified and allowed to be present if any identification, confrontations, + + tests, examinations, or investigations of any sort are conducted in my case, + + and I do not consent to any such identification, confrontations, tests, + + examinations, or investigations. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + EDITORIAL OF THE MONTH + + + + By Marco Landin + + + + [This article is fiction/humor] + + (Excerpt from INdigest, Feb 1994, Interview with + + the Elusive and Unintelligible Mfactor) + + + + INd: In your most recent book, "I Don't Want My Children To Grow Up + + Around Those Filthy UNIX", you seemed to display a sense of farce that isn't + + too commonly seen amongst the Great Internet Poets of the Apocalypse. Tell + + us, why do you see the 21st century as the Golden Age of Lunacy? + + + + Mf: [wearing pajamas and Mickey Mouse ears] Well, it's like this. In + + the early 80's we perfected the concept of an international communications + + database. It was populated solely by research personnel. MIT grads, + + military, Elvis. Purely serious study going on. Then, in the late 80's and + + mid-90's, there was a practical applications boom, where savvy businessfolk + + rolled up their sleeves and sank their elbows into the datastream. Now, as + + we near the End Times, we find that the greatest structure ever created by + + man -the Internet- is being vacated by its corporate and research personnel + + and a whole buttload of social misfits and weirdos are moving in by the + + droves. Look at me for instance. No, you better not. Wanna jawbreaker? + + + + INd: No, thank you. Are you saying that the new computer literacy is + + making this once rich and fertile forest of intellect and commerce into a + + vast mental wasteland where the only thing that stirs is an occasional, + + barbed, tumbleweed of a pun based on bathroom jokes? + + + + Mf: Well, yes, and I'm thankful for it! I mean, have you SEEN what + + happens to the human body when the brain is used too much? Glasses, + + unsocial behavior, a goofy voice, and insatiable masturbatory compulsions + + become the trademark of the computer genius. Why if I had to choose between + + looks and brains, I'd sure as hell pick looks, cause looks can get you + + brains, and the corollary is not as true. I feel very lucky to have both. + + + + INd: In the book, you mention a few extreme cases of individuals who have + + no business on UNIX and who yet not only live in it, they can't do without + + it. + + + + Mf: Indeed, there seem to be many odd cases. Take for example Cherry, + + the erotic dancer from Norway who has an Internet Address. She works out 36 + + hours a day, dances every night, goes out with friends, HAS FRIENDS!!! And + + yet she still finds time to moderate a newsgroup, cherry.pop.tart, I mean, + + how does she do that? Then there's the Internet node for the Eskimo Len + + Terrorist With Teret's Syndrome Association. What does THAT have to do with + + worldwide communications? Then of course, there's the newsgroup + + alt.binaries.pictures.bestiality. Need more be said??? The freaks are + + moving in as the contractors and architects move out. Isn't it beautiful? + + + + INd: What's your plan in life, Mr. Mfactor? + + + + Mf: In this day and age, making plans is dangerous. That's why I have + + several. + + + + INd: Please, share with us your most visionary. + + + + Mf: Moving to Norway and finding Cherry. Soon. Like NOW. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WHITE HOUSE ELECTRONIC PUBLICATIONS AND PUBLIC ACCESS EMAIL + + FREQUENTLY ASKED QUESTIONS + + + + By Stanton McCandlish (mech@eff.org) + + + + Updated April 2, 1994 + + Table Of Contents + + + + I. Searching and Retrieving White House documents. + + - Publications@WhiteHouse.GOV + + - WAIS + + - GOPHER + + - FedWorld BBS + + + + II. Signing up for Daily Electronic Publications. + + A. Widely Available Sources. + + B. Notes on Widely Available Sources. + + C. Direct Email Distribution. + + D. Email Summary Service. + + + + III. Sending Email to the White House. + + - Internet Direct + + + + IV. Sending Email to Congress + + - Internet Direct + + + + V. Submitting Updates to the FAQs. + + + + + + I. HOW DO I SEARCH AND RETRIEVE WHITE HOUSE ELECTRONIC PUBLICATIONS? + + + + The White House is pleased to announce the establishment of an Internet + + address for retrieving White House publications. We have set up an + + Almanac server to process requests by email. To receive instructions on + + using this server, send a message to: + + + + Publications@WhiteHouse.GOV + + + + In the body of the message, type: + + + + send info + + + + Various additional sites are archiving the press releases as distributed. + + What follows is an incomplete list of some of the sites containing the + + documents that have been released to date. This FAQ will be updated to + + reflect new sites as they become known. + + + + SITE DIRECTORY + + + + 1. SUNSITE.UNC.EDU pub/academic/political-science/whitehouse-papers + + 2. FTP.CCO.CALTECH.EDU /PUB/BJMCCALL + + 3. FTP MARISTB.MARIST.EDU + + 4. CPSR.ORG /CPSR/CLINTON + + 5. FedWorld Online System 703-321-8020 8-N-1 or: + + Telnet fedworld.doc.gov + + 6. GOPHER.TAMU.EDU 11/.dir/president.dir + + + + + + Notes: The following are notes on how to log in and get + + information from the above sites. + + + + 1. Office for Information Technology at the University of + + North Carolina maintains the full collection of White + + House electronic releases available for search with WAIS and + + also accessible via Gopher and FTP. + + 1.a WAIS + + (:source + + :version 3 + + :database-name "/home3/wais/White-House-Papers" :ip- + + address "152.2.22.81" + + :ip-name "sunsite.unc.edu" + + :tcp-port 210 + + :cost 0.00 + + :cost-unit :free + + :maintainer "pjones@sunsite.unc.edu" + + + + :description "Server created with WAIS release 8 b5 on + + Feb 27 15:16:16 1993 by pjones@sunsite.unc.edu These are the + + White House Press Briefings and other postings dealing with + + William Jefferson Clinton and Albert Gore as well as members + + of the President's Cabinet and the first lady Hillary Rodham + + Clinton, Chelsea, Socks and others in Washington DC. Dee Dee + + Meyers and George Stephanopoulos. Other good words: + + United States of America, Bill Al Tipper Democrats USA + + US These files are also available via anonymous ftp + + from sunsite.unc.edu The files of type filename used in + + the index were: + + /home3/ftp/pub/academic/political-science/whitehouse- + + papers/1993 ") + + + + Folks without WAIS clients or gophers that act as WAIS + + clients may telnet to sunsite.unc.edu and login as swais + + to access this information via WAIS. + + + + 1.b GOPHER is a distributed menu system for information access on the + + Internet developed at the University of Minnesota. gophers are + + client-server implementations and various gopher clients are + + available for nearly any computing platform. You may now use + + gopher clients to access the White House Papers and other + + political information on SunSITE.unc.edu's new gopher server. + + You may also add links from your local gopher server to + + SunSITE for access to the White House Papers. + + + + For gopher server keepers and adventurous clients to access + + SunSITE you need only know that we use the standard gopher + + port 70 and that our internet address is SunSITE.unc.edu + + (152.2.22.81). Point there and you'll see the references to + + the Politics areas. + + + + For folks without gopher clients can telnet to sunsite.unc.edu + + to try out gopher access. You need to have access to internet + + telnet and: + + + + telnet sunsite.unc.edu + + login: gopher + + The rest is very straight forward. Browsing options end with a + + directory mark (/), searching options end with an question mark + + (?). + + There's plenty of on-line help available. + + + + 2. No special instructions. + + + + 3. The CLINTON@MARIST log files which contain all the official + + administration releases distributed through the MIT servers + + are available via anonymous FTP. These logs contain in + + addition to the official releases, the posts that comprise the + + ongoing discussion conducted by the list subscribers. + + To obtain the logs: + + FTP MARISTB.MARIST.EDU - the logs are in the CLINTON directory + + and are named CLINTON LOG9208 thru CLINTON LOGyymm where yymm + + stands for the current year and month. Problems should be + + directed to my attention: URLS@MARISTC.BITNET or + + URLS@VM.MARIST.EDU. + + Posted by Lee Sakkas - owner, CLINTON@MARIST + + + + 4. Computer Professionals for Social Responsibility is + + providing all Clinton documents on technology and privacy + + at the CPSR Internet Library, available via + + FTP/WAIS/Gopher at cpsr.org /cpsr/clinton (and in other + + folders as relevant). For email access, send a message + + with the word "help" at the 1st line of text to + + listserv@cpsr.org. + + + + 5. The FedWorld Computer System, operated by the National Technical + + Information Service, archives White House papers in a + + traditional BBS type file library. Connect to FedWorld by + + calling (703) 321-8020. No parity, eight data bits and one stop + + bit (N-8-1). FedWorld accommodates baud speeds of up to 9,600. + + It is also possible to Telnet to FedWorld at FedWorld.doc.gov. + + White House papers are located in the W-House library of files. + + To access this library from the main FedWorld menu, + + enter . Files are named with the first four digits + + being the release month and day (e.g. 0323XXX.txt). Some + + standard abbreviations after the date include: + + + + rem - Remarks by the President + + pc - Press Conference transcript + + pr - Press Release + + AM - AM Press Briefing + + PM - PM Press Briefing + + sch - The President's public schedule + + spch- Text of major speeches. + + + + These files are saved in ASCII format. Files can be viewed + + online by requesting to download a file and then selecting + + (L)ist as the download protocol. This will display the file a + + screen at a time. White House papers are kept in the above + + format for up to two months. Papers more than two months old + + are compressed using Pkzip into a single file that contains all + + of the files for that month (e.g. 0193.zip contains all papers + + released during January 1993). In addition to White Documents, + + FedWorld also provides a gateway to more than 100 government + + funded BBSs and computer systems. + + + + 6. Texas A&M University GOPHER Server makes available White House + + press releases and other documents. This archive includes + + information from 1992 until the present time and is updated + + as new documents are released. Gopher users can reach the + + Texas A&M server by choosing it from their local server's list + + of other gophers, or by pointing their gopher clients to + + GOPHER.TAMU.EDU. + + + + After connecting to the A&M server, take the following path to + + reach the White House menus: + + + + "Browse Information by Subject" --> + + "Political Science" --> + + "Information from the White House" + + + + Gopher maintainers and other intrepid souls are welcome to point + + directly to the A&M White House archive. The server is + + GOPHER.TAMU.EDU and the path is 11/.dir/president.dir. + + + + + + II. HOW DO I SIGN UP FOR ELECTRONIC PUBLICATIONS BY THE WHITE HOUSE? + + + + The White House Communications office is distributing press releases + + over an experimental system developed during the campaign at the MIT + + Artificial Intelligence Laboratory. + + + + You can obtain copies of all the press releases from a wide variety of + + on-line services or discussion groups devoted to either national + + politics in general or President Clinton in particular. These are + + listed in sections I and II. + + + + Section IIc explains how you can sign up to receive press releases + + directly from the experimental MIT system by using an automated email + + server. The present system was not designed to handle high levels of + + message traffic. A more powerful system will become available in due + + course, and in the meantime, it would be appreciated if you used this + + service sparingly. One appropriate current use is secondary + + redistribution and archiving. If you use it, you will be carried forward + + when the more powerful system that replaces it. + + + + + + IIa. WIDELY AVAILABLE SOURCES + + + + 1. On USENET/NETNEWS, electronic publications are found on a variety + + of groups: + + + + Direct Distribution + + + + alt.politics.clinton + + alt.politics.org.misc + + alt.politics.reform + + alt.politics.usa.misc + + alt.news-media + + alt.activism + + talk.politics.misc + + + + Indirect Distribution + + + + misc.activism.progressive + + cmu.soc.politics + + assocs.clinton-gore-92 + + + + 2. On CompuServe: GO WHITEHOUSE + + 3. On America Online: keyword WHITEHOUSE or THE WHITEHOUSE or CLINTON + + 4. On The WELL: type whitehouse + + 5. On MCI: type VIEW WHITE HOUSE + + 6. On Fidonet: See Echomail WHITEHOUSE + + 7. On Peacenet or Econet: See pol.govinfo.usa. + + 8. On The Meta Network: Go Whitehouse + + 9. On GEnie: Type WHITEHOUSE or WHRT, or MOVE 1600 + + 10. On CompuServe, see the Democratic Forum: Go Democrats + + + + IIb. NOTES ON WIDELY AVAILABLE SOURCES + + + + 2. CompuServe's White House Forum (GO WHITEHOUSE) is devoted to + + discussion of the Clinton administration's policies and + + activities. The forum's library consists of news releases and + + twice daily media briefings from the White House Office of Media + + Affairs. CompuServe members can exchange information and + + opinions with each other in the 17 sections in the forum's + + message area. The message board spans a broad range of topics, + + including international and United Nations activities, defense, + + health care, the economy and the deficit, housing and + + urban development, the environment, and education and national + + service. + + + + 3. On America Online, the posts are sent to the White House Forum, + + located in the News & Finance Department of the service or + + accessible via keywords: "white house" or "clinton". The White + + House Forum on America Online contains the press releases from + + the White House, divided into the categories "Appointments", + + "Budget", "Congress", "Education", "Economy", "Foreign Policy", + + "Health Care", "Housing", "Labor", "Law and Order", "Meetings & + + Speeches", "Proclamations", "Technology", and "Vice President". + + The area features a message board so you can discuss the + + releases with other AOL members, a searchable database for easy + + retrieval of releases that interest you, a Library for longer + + releases from the White House, and a library that members can + + upload files of interest for other members. + + + + 4. MCI Mail users access daily information on the administration's + + programs provided by the White House through MCI Mail bulletin + + boards. The available boards are: WHITE HOUSE ECONOMIC, WHITE + + HOUSE FOREIGN, WHITE HOUSE SOCIAL, WHITE HOUSE SPEECHES and + + WHITE HOUSE NEWS. A listing of these boards can also be + + obtained by simply typing VIEW WHITE HOUSE at the COMMAND + + prompt. + + + + 5. On The Meta Network, material is posted in the White house + + conference and is accessible via keywords (matching on document + + titles and subject categories) as well as full text search. + + Discussions on specific initiatives take place in special + + interest forums, e.g. health, technology, and reinventing + + government. + + + + 9. GEnie's White House RoundTable has been established to + + distribute and discuss the official press releases and files + + relating to the White House and the Clinton Administration. The + + files library holds all of the press releases on the official + + mailing list, and the Bulletin Board has Categories set up with + + topics relating to all aspects of the Administration and + + Executive Branch of government. Letters to the White House can + + be entered easily online with a menu option on the WHITEHOUSE + + page. + + + + 10. CompuServe's Democratic Forum (GO DEMOCRATS) is the Democratic + + Party's online information service covering the activities of + + the Clinton administration. The sysops of the Democratic Forum + + work for the Democratic National Committee, and are directly + + involved in managing the forum and responding to online + + questions. The Democratic Forum provides access to documents + + from the White House Office of Media Affairs, with vigorous + + discussion and debate in the message sections about the impact + + of the Clinton Administration's policies and proposals. The + + Democratic Forum also holds a regular weekly online conference + + with special guests on current topics. + + + + + + IIc. DIRECT EMAIL DISTRIBUTION + + + + If you don't have access to the these accounts or if you would prefer to + + receive the releases via email, then this section details how to + + sign up for this service. The server is not set up to answer email + + letters, comments or requests for specific information. To reach this + + MIT server, send email: + + + + To: Clinton-Info@Campaign92.Org + + Subject: Help + + + + The server works by reading the subject line of the incoming message and + + taking whatever action that line calls for. If you want to sign up to + + automatically receive press releases, then your subject line would begin + + with the word RECEIVE. You can then specify what kind of information + + you are interested in receiving. The categories of information are: + + + + ECONOMY + + Get releases related to the economy such as budget + + news, technology policy review, etc. + + + + FOREIGN + + Get releases related to foreign policy such as + + statements on Bosnian airdrop, Haitian refugee status, + + etc. + + + + HEALTH Get releases related to health care policy, without + + receiving any other social issues. Use this instead + + of social. + + + + SOCIAL + + Get releases related to social issues like National + + Service (Student Loan) program, abortion, welfare + + reform, etc. + + + + SPEECHES + + All speeches made by the President and important + + speeches made by other Administration officials. + + + + NEWS + + Transcripts of press conferences released by the White + + House Communications office, as well as the + + President's remarks in photo ops and other Q&A + + sessions. + + + + ALL All of the above + + + + So, if you wanted to sign up to get releases related to the economy + + your email message would look like this: + + + + To: Clinton-Info@Campaign92.Org + + Subject: RECEIVE ECONOMY + + + + When you send a signup message to the clinton-info server, it sends you + + back a status message letting you know what distribution streams you are + + signed up for. If you ever want to check on what groups you are signed + + up for send the following message: + + + + To: Clinton-Info@Campaign92.Org + + Subject: STATUS + + + + *****You can stop receiving email releases by sending a REMOVE message + + to the clinton-info server. The word REMOVE would be followed by + + whatever distribution stream you wanted to drop. If you wanted to stop + + receiving message about the ECONOMY then your mail would look like this: + + + + To: Clinton-Info@Campaign92.Org + + Subject: REMOVE ECONOMY + + + + You could substitute SOCIAL, FOREIGN, HEALTH, SPEECHES, NEWS or ALL for + + ECONOMY in the above message and you would be dropped from that + + distribution list. If you send the subject line REMOVE ALL, then you + + will be taken off the email distribution system all together and will + + not receive further releases of any kind. + + + + You can also ask for help from the automated server. Send an email + + query as follows: + + + + To: Clinton-Info@Campaign92.Org + + Subject: HELP + + + + The server will respond by sending you a detailed form that will guide + + you through the process of signing up for the various distribution + + streams. As you will quickly discover, there is a automatic form + + processing interface that parallel the quick and easy subject line + + commands discussed here. More detailed help is available by sending an + + email query as follows: + + + + To: Clinton-Info@Campaign92.Org + + Subject: Please Help! + + + + Finally, if you want to search and retrieve documents, but you do not + + have access to the retrieval methods discussed in section II, you can do + + this via email through the MIT server. You can obtain the WAIS query + + form by sending an email query as follows: + + + + To: Clinton-Info@Campaign92.Org + + Subject: WAIS + + + + Once you have identified the documents that you want, be careful not + + to request them all at once, because you may be sent a message + + containing all the documents and this message may be too big for some + + mail delivery systems between the email server and you. + + + + D. EMAIL SUMMARY SERVICE + + + + The Extension Service of the U.S. Department of Agriculture provides a + + daily summary of White House electronic publications. + + + + 1. Subscriptions + + + + To subscribe to the USDA Extension Service White House Summary service, + + send a message to: + + + + almanac@ESUSDA.GOV + + + + In the body of the message, type: + + + + subscribe wh-summary + + + + To Unsubscribe from the USDA Extension Service White House Summary + + service, send a message to: + + + + almanac@ESUSDA.GOV + + + + In the body of the message, type: + + + + unsubscribe wh-summary + + + + 2. Document Retrieval + + + + To request a specific document from the daily summaries, send a message + + to: + + + + almanac@ESUSDA.GOV + + + + In the body of the message, type: + + + + send white-house ##### + + (where ##### is the request number for the document) + + + + 3. Document Search + + + + A user-friendly search facility is also available to search the + + white-house documents archived at ESUSDA.GOV. To search, send a message + + to: + + + + almanac@ESUSDA.GOV + + + + In the body of the message, type: + + + + search white-house keyword1 keyword2 + + + + 4. Catalogue of Summaries and Documents + + + + Back issues and the catalog of the summaries or the documents contained + + at ESUSDA.GOV can also be retrieved through our almanac server. To get + + the summary catalog, send a message + + + + To: almanac@ESUSDA.GOV + + + + In the body of the message, type: + + + + send wh-summary catalog + + + + 5. Further Information + + + + If you have any questions about Almanac, please contact: + + + + wh-admin@ESUSDA.GOV + + + + III. HOW DO I SEND EMAIL TO THE WHITE HOUSE? + + + + We are pleased to introduce this new form of communication with the + + White House for the first time in history. As we work to reinvent + + government and streamline our processes, this electronic mail project + + will help put us on the leading edge of progress. Please remember, + + though, this project is still very much under construction. The Office + + of Correspondence is currently working on defining what this system + + will do, as well as addressing equipment and staffing needs. + + + + When you send a message to the White House you will receive an immediate + + acknowledgment that your message has been received. This is the only + + electronic response you will receive at this stage of development; if + + you include your street address in your message, you may receive a + + response by U.S. Mail. Please be assured that every electronic mail + + message received is read and analyzed by staff. Your concerns, your + + praise, your suggestions, and your ideas are carefully recorded and + + reported to the President and Vice President weekly. + + + + You can send email to the following addresses: + + + + Internet Direct: President@WhiteHouse.GOV + + Vice.President@WhiteHouse.GOV + + + + + + IV. HOW DO I SEND EMAIL TO CONGRESS? + + + + The House and the Senate are conducting electronic communications + + projects. You can access Congressional information via the protocols + + listed below. For additional information, please contact the offices of + + your Representative or Senators. + + + + + + Site Protocol Host/connection + + + + House + + + + Email Congress@hr.House.GOV + + Gopher Gopher.House.GOV + + [URL: "Gopher://Gopher.House.GOV/11"] + + + + Senate + + + + Gopher Gopher.Senate.GOV + + [URL: "Gopher://Gopher.Senate.GOV/11"] + + FTP FTP.Senate.GOV + + + + Library of Congress + + + + Gopher Marvel.LOC.GOV + + [URL: "Gopher://Marvel.LOC.GOV/11"] + + FTP seq1.LOC.GOV + + Telnet LOCIS.LOC.GOV + + + + + + + + Please note that these are not connected in any way to any White House + + online projects, so if you have any problems with Congressional systems, + + you will need to contact their system administrators for assistance. + + + + V. HOW DO I SUBMIT UPDATES FOR THIS FAQ? + + + + Please send corrections, deletion and additions to this FAQ to: + + + + Publications-Comments@WhiteHouse.GOV + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + + + REDEFINING THE MODEM USER: + + HOW THE MEDIA TOOK TWO PERFECTLY HARMLESS WORDS AND RUINED THEM + + + + By Ed Cavazos + + + + Computer telecommunication hobbyists always seem to find themselves + + being labeled by the media in ways which help spread fear and + + misunderstanding. For some reason, there is no term in the vernacular to + + describe someone who uses their computer and modem not as a tool to + + perpetrate illegal activities, but as an electronic link to the world. + + Whenever one comes along, it gets used in a way which always implies + + illicit behavior. + + + + + + "Hacker": From Computer Guru to Computer Terrorist + + + + The word "hacker" is already lost. When Stephen Levy's 1984 book + + "Hackers: Heroes of the Computer Revolution" was published, the word was + + used in a way that was devoid of the negative associations prevalent today. + + + + In fact, the blurb on the back cover of the paperback described hackers as: + + + + "Spellbound explorers totally committed to + + experimenting with the infinite new possibilities + + of the computer.." + + + + And Levy himself (in the Preface) described his subjects as "those computer + + programmers and designers who regard computing as the most important thing + + in the world." Levy was concerned that some were using the term as a + + derogatory one to describe someone who wrote bad code. This innocent + + definition of the word could be traced back to the days when MIT Model + + Railroad enthusiasts were described that way. + + + + But those days are gone. Listen to what the National Law Journal + + (September 16, 1991) noticed: + + + + "...there is a widespread public perception that so-called + + computer hackers get their kicks out of breaking into top-secret + + government computer systems and wreaking havoc with destructive + + programs called computer viruses." + + + + And Katie Hafner a computer crime journalist was quoted in Waldensoftware's + + Computer Newslink,( Autumn 1991, Vol. 6, Issue 1) as remarking: + + + + "With the release of the movie "War Games" in 1983, in which a + + teenager almost triggers World War III from his little home + + computer, the definition of hacker changed overnight. Suddenly, + + hacker took on a very negative connotation. Now it's defined in + + Webster's as somebody who tries to break into computers." + + + + The media has helped turn what was at one time considered a complimentary + + term into something that connotes violence, illegality and destruction. + + To be called a hacker today is an accusation. Through misuse, the media is + + warping the word even further. When Geraldo Rivera interviewed Craig + + Neidorf for his television show "Now it Can Be Told" he referred to Craig + + (an electronic publisher) as "The Mad Hacker." Geraldo's loose usage of + + the term ignores the fact that Craig was never accused of breaking into a + + system, or gaining illegal access anywhere. + + + + + + Cyberpunk: From Science Fiction to Sensationalism + + + + When William Gibson, Bruce Sterling and other science fiction writers + + began writing a new type of science fiction in the 1980's, critics searched + + for a way to describe it. They settled (to the disappointment of some of + + the very writers they were describing) on "Cyberpunk." The term still + + refers to a genre of science fiction. "Science fiction with an attitude," + + is how the April 20, 1990 Washington Post described it. At the stretches of + + its usage, it describes a new world view which is composed of a collage of + + computers and information, of countercultural electronic expression. + + + + But, as happened before, the media decided that definition wasn't good + + enough. When Katie Hafner and John Markoff decided to write a book on + + computer crime, they stole the term for their cover. "Cyberpunk: Outlaws + + and Hackers on the Computer Frontier" was the result. Now, all of a sudden, + + Cyberpunk doesn't refer to a sci-fi or cultural movement, it refers to a + + cynical hacker. When asked to describe a "typical Cyberpunk" Hafner + + explains: + + + + "They are typically alienated suburban teenage boys who find an + + alternative world in computers. Pengo, who we wrote about in the book, + + is a pretty good example. He lives in Berlin and dresses in black. + + Then again, who in Berlin doesn't? But he was almost a caricature of + + himself. He smoked hand-rolled cigarettes. When he worked at his + + computer, he had his headphones on all the time listening to + + synthesized music. He started hacking when he was fifteen and by + + seventeen he started spying for the KGB by hacking over the networks." + + (Waldensoftware's Computer Newslink, August 1991) + + + + Even William Gibson, Cyberpunk's founding father, who wrote of + + cyberspace and a new society noticed it. "I've been credited of inspiring a + + whole new generation of techno-delinquents," he remarks in the February 19, + + 1989 Boston Globe. If only we could hear Gibson's reaction two years + + later, when the term which once described his writing style is now being + + used to describe computer criminals. + + + + The word "Cyberpunk" had a real mystique to it. To turn it into a + + term to describe the "alienated suburban teenage boy" is to ruin some of + + that feel. Moreover, it serves to confuse and concern a public which is + + already paranoid and somewhat hysterical about anybody who admits to using + + a computer and modem for long periods of time. Responsible journalists + + should shy away from sensationalistic tactics like misusing an already well + + defined term like this. + + + + + + The Need for A New Word + + + + What is needed is new terminology. There are a myriad of totally + + legal and legitimate uses for modems and personal computers. People do + + everything online from perusing library card catalogs to meeting their + + perfect romantic match. On BBS's there are livid discussions of issues + + ranging from politics to religion -- from art to science. And online + + services like Prodigy and Compuserve are watching their user base swell + + annually. Soon, perhaps the media will accept a word that describes a + + person interested in communicating electronically without implying illegal + + activity. "Hacker" and "Cyberpunk" are ruined. "Modem Enthusiast" sounds + + too much like a term fresh from the pages of Reader's Digest. Hopefully, + + someone will provide us with a new term which truly describes the millions + + of modem users who "live, play and thrive" in cyberspace. Until that time, + + we can only sit and watch as the mainstream media stumbles along trying to + + understand and describe a phenomenon one gets the feeling it knows very + + little about. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PUBLIC UTILITY COMMISSION OF TEXAS + + REQUESTS COMMENTS ON INTEGRATED SERVICES DIGITAL NETWORK (ISDN) + + + + The Public Utility Commission of Texas (the Commission) has + + established a project (Project No. 12756) to examine Integrated + + Services Digital Network (ISDN) issues. The Commission seeks comments + + from interested parties in response to the following questions. If + + your answers would differ depending upon time-frame considerations, + + please provide answers for each time-frame. Parties are requested to + + organize their comments to address the specific questions asked in the + + order asked and are encouraged to include an executive summary + + emphasizing the main points of their comments to each question. + + + + Comments (13 paper copies) should contain a reference to Project No. + + 12756 and should be submitted to John M. Renfrow, Secretary of the + + Commission, Public Utility Commission of Texas, 7800 Shoal Creek + + Boulevard, Austin, Texas 78757, no later than April 30, 1994. + + + + Informal comments may be sent to Ms. Pam Whittington at the Commission + + via e-mail addressed to: + + + + pam.tel@email.puc.texas.gov + + + + Or you may call her at (512) 458-0100. + + + + 1. To which local exchange carriers (LECs) should a rule on ISDN + + apply? Why? + + + + 2. Should ISDN-based services be considered to be a replacement of or + + successor for "plain old telephone service"? Why? + + + + 3. Should all Texas customers and customer classes have access to + + ISDN? Why? If not, why not? What policies should be adopted by the + + Commission regarding customer access to ISDN? Why? + + + + 4. What are the policies which the Commission should adopt regarding + + the determination of costs and the pricing of ISDN and ISDN-based + + services? Explain why. Provide detailed cost information for each + + position if available. + + + + 5. Should the manner in which ISDN is deployed affect the price? How? + + + + 6. Should the Commission grant regulatory incentives, penalties, or + + flexibility in exchange for a LEC's provision of ISDN? Why? If yes, + + describe the incentives, penalties, or flexibility. + + + + 7. Does the Commission have jurisdiction to compel the provision of + + ISDN? Why? Explain the legal basis for your position. + + + + 8. Should the LECs be required to provide ISDN services in a manner + + that is conducive to competition in the provision of ISDN? Why? If + + so, how? + + + + 9. What policies should the Commission adopt regarding the deployment + + of ISDN? Should the Commission directly mandate deployment, require + + deployment to be driven by customer demand, or require deployment in + + some other manner? Why? Describe in detail how. + + + + 10. Describe in detail how these policies regarding deployment should + + be implemented and enforced. + + + + 11. If customer driven demand deployment was ordered by the Commission, + + should the trigger for deployment be thirty customer requests for ISDN + + per central office? Why? If not, why not, and provide evidence to + + support your position. If thirty requests is not the appropriate + + number, explain what is. + + + + 12. Should LEC compliance with deployment requirements be monitored on + + a periodic basis by the Commission? If so, explain in detail how and + + why. + + + + 13. What are the appropriate time frames for completion of deployment + + of ISDN in a LEC's service territory and in the entire state respectively? + + Why? + + + + 14. What are the technological options of the LECs with respect to the + + system upgrades necessary to deploy ISDN within their service areas? + + Explain in detail how the costs should be determined and reported to + + the Commission. + + + + 15. Are there any other policies, aspects, technical characteristics, + + costs, or obstacles (e.g. switch architecture, software, or SS7) + + regarding deployment that the Commission should consider? If yes, + + list and describe each and explain why. Provide detailed cost + + information for each item if available. + + + + 16. What policies regarding ISDN standards should be adopted by the + + Commission? Why? + + + + 17. To what standards (e.g. National ISDN, ITU-T standards, etc.) + + should the Commission require ISDN be deployed and provided? Why? + + + + 18. What specific service capabilities (e.g. bearer services, + + teleservices, supplementary services, etc.) should be required to be + + provided to customers? Why? + + + + 19. How should the policies regarding ISDN be implemented by the + + Commission? Why? If tariff filings were required, what should they + + contain? Why? + + + + 20. What end-user applications (e.g. telemedicine, distance learning, + + telecommuting, and video conferencing) using ISDN are available? Will + + these applications be available using technology other than ISDN? + + Should the Commission consider this in its rulemaking? Why? + + + + 21. Does Texas need ISDN to compete with other states? Why? + + + + 22. Would the widespread availability of ISDN have a beneficial impact + + (e.g., through telecommuting, video conferencing, etc.) on Texas' + + compliance with the Clean Air Act? Explain how. + + + + 23. Are there any other aspects or characteristics of providing ISDN + + that should be considered by the Commission? If yes, describe each + + and explain why. + + + + Parties interested in providing additional comments are welcome to do + + so. The Commission also welcomes data and documentation supporting + + the parties' comments. General Counsel and staff will review the + + comments and use them in preparing a recommendation to the Commission. + + + + Comments (13 paper copies) should contain a reference to Project No. + + 12756 and should be submitted to John M. Renfrow, Secretary of the + + Commission, Public Utility Commission of Texas, 7800 Shoal Creek + + Boulevard, Austin, Texas 78757, by April 30, 1994. + + + + Informal comments may be sent to Ms. Pam Whittington at the Commission + + via e-mail addressed to: + + + + pam.tel@email.puc.texas.gov + + + + Or you may call her at (512) 458-0100. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + EXAM PAPERS + + + + [Editor's Note: These are supposed to be actual answers from the tests of + + some students. There were no indications as to which grade-level they were + + in...but just between me and you, I hope that they weren't college kids. + + If so, ...I weep for the future.] + + + + ACTUAL EXCERPTS FROM STUDENT EXAM PAPERS: + + + +- Charles Darwin was a naturalist who wrote the organ of the species. + +- Benjamin Franklin produced electricity by rubbing cats backwards + +- The theory of evolution was greatly objected to because it made man think. + +- Three kinds of blood vessels are arteries, vanes, and caterpillars. + +- The dodo is a bird that is almost decent by now. + +- To remove air from a flask, fill it with water, tip the water out, and + + put the cork in quick before the air can get back in. + +- The process of turning steam back into water again is called conversation. + +- A magnet is something you find crawling over a dead cat. + +- The Earth makes one resolution every 24 hours. + +- The cuckoo bird does not lay his own eggs. + +- To prevent conception when having intercourse, the male wears a + + condominium. + +- To collect fumes of sulfur, hold a deacon over a flame in a test tube. + +- Parallel lines never meet, unless you bend one or both of them. + +- Algebraical symbols are used when you do not know what you are talking + + about. + +- Geometry teaches us to bisex angles. + +- A circle is a line which meets its other end without ending. + +- The pistol of a flower is its only protection against insects. + +- The moon is a planet just like the Earth, only it is even deader. + +- Artificial insemination is when the farmer does it to the cow instead of + + the bull. + +- An example of animal breeding is the farmer who mated a bull that gave a + + great deal of milk with a bull with good meat. + +- We believe that the reptiles came from the amphibians by spontaneous + +- generation and the study of rocks. + +- English sparrows and starlings eat the farmers grain and soil his corpse. + +- By self-pollination, the farmer may get a flock of long-haired sheep. + +- If conditions are not favorable, bacteria go into a period of adolescence. + +- Dew is formed on leaves when the sun shines down on them and makes them + + perspire. + +- Vegetative propagation is the process by which one individual manufactures + + another individual by accident. + +- A super-saturated solution is one that holds more than it can hold. + +- A triangle which has an angle of 135 degrees is called an obscene + + triangle. + +- Blood flows down one leg and up the other. + +- A person should take a bath once in the summer, and not quite so often in + + the winter. + +- The hookworm larvae enters the human body through the soul. + +- When you haven't got enough iodine in your blood you get a glacier. + +- It is a well-known fact that a deceased body harms the mind. + +- Humans are more intelligent than beasts because human branes have more + + convulsions. + +- For fainting: rub the person's chest, or if a lady, rub her arm above the + + hand, instead. + +- For fractures: to see if the limb is broken, wiggle it gently back and + + forth. + +- For a dog bite: put the dog away for several days. If he has not + + recovered, then kill it. + +- For a nosebleed: put the nose much lower than the body. + +- For drowning: climb on top of the person and move up and down to make + + artificial perspiration. + +- To remove dust from the eye, pull the eye down over the nose. + +- For head colds: use an agonizer to spray the nose until it drops into + + your throat. + +- For snakebites: bleed the wound and rape the victim in a blanket for shock. + +- For asphixiation: apply artificial respiration until the patient is dead. + +- Before giving a blood transfusion, find out if the blood is affirmative or + + negative. + +- Bar magnets have north and south poles, horseshoe magnets have east and west + + poles. + +- When water freezes you can walk on it. That is what Christ did long ago in + + wintertime. + +- When you smell an odorless gas, it is probably carbon monoxide. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Interview with Tom Jennings + + by Jon Lebkowsky, jonl@io.com + + reprinted with permission + + + + Originally published in Fringe Ware Review #1, ISSN 1069-5656. + + Copyright (c)1993 by the author. All rights reserved. + + For more details, contact: fringeware@io.com + + + + Our FWI prez recently had a chance to chat with Tom Jennings, who commented + + afterwards: "Think you can mention somewhere that I'm a fag anarcho nerd + + troublemaker/activist? It is important, and to me as well. It always gets + + buried. Lots of people like to know, especially scared people with no + + images of people who are gay and reasonably functional in some way." Tis + + our pleasure to honor Tom, whose work has been so brilliant and so far out + + on the Fringe, that when the US gov't precluded computer technology exports + + during the Cold War, they basically forgot/ignored a certain fag anarcho + + nerd from the Bay Area... As a result, Tom's FidoNet now provides the basis + + for computer networking in Eastern Europe, former USSR and most of the + + Third World, as well as a extraordinary conduit throughout the rest of the + + world. + + + + Tom: This people tracking stuff... what little I know of it sounds very + + creepy. I don't want a box that reports where the hell I am all the time, + + when I walk in the room, it can tell some local machine I'm there. It's + + none of anyone's goddamn business. It's the corporate culture invasion on + + real life, like the top 1% who make all the money, and think everyone's + + gonna live like them. + + + + Jon: Well, if you're living in an ivory tower, after you live there for a + + while, you start to think, not that it's YOUR environment, but it's THE + + environment. + + + + T: Yeah, it is reality, but it's a local one. Everyone they know is like + + that... well, they don't know everybody. + + + + J: In a conversation I had the other day with Allucquere Rosanne Stone, she + + talked about ubiquitous computing, that computers or computing will be + + invisible, it will be so omnipresent... + + + + T: That's what Alan Kay pointed out years ago, that when technology gets + + done right, you don't even see it. When you walk in a room, your hand + + flicks a switch... how much thought do you give to that stupid light + + switch? Hopefully very little. The light comes on, and... Telephones are + + getting close to that. + + + + J: Even better, there's some rooms you walk into and the light switches on + + automatically, because there's motion detectors. + + + + T: Yeah. + + + + + + Anarchy In The A-C-K + + + + J: Tell me about FidoNet. As I said, I'm sorta ignorant on the subject... + + + + T: I have a weird point of view on it, of course, having designed it... + + February or March of '94 will be it's tenth year. It is a network, a + + collection of bulletin boards. It is a loose confederation, and it is + + completely and thoroughly and utterly decentralized. There is literally no + + top. Most of it's members have a narrow view of it because they have this + + particular reality filter on all the time from living amongst hierarchy + + addicts. But FidoNet's most basic element is a bulletin board. What FidoNet + + is, is a set of protocols that lets the bulletin boards communicate. + + FidoNet started as a bunch of bulletin boards, running my Fido software. + + FidoNet was added later, to allow point-to-point email between Fido boards. + + + + J: Did you start with just a single BBS? + + + + T: It started with my system. I was writing software for Phoenix Software, + + which is now Phoenix Technologies. I was their first employee. I did all + + their portable MS-DOS stuff prior to the ROM BIOS they did, which was + + partly based on my previous work with "portable" MS-DOS... we were doing + + MS-DOS installations in three days, and charging exorbitant sums... and + + delivering really good stuff, people got their money's worth, and got it + + damn fast! We had it down to an art of just totally portable stuff. So I + + had this portable attitude toward hardware, and wrote a bulletin board sort + + of based on it. + + + + FidoNet is more importantly a social mechanism. It was pretty obvious from + + the start that it was going to be a social monster, almost more so than a + + technical thing. And it had to do with the original environment of bulletin + + boards, which were around for quite a while by the time I got around to + + doing Fido. Every bulletin board was completely different, run by some + + cantankerous person who ran their board the way that they saw fit, period. + + So FidoNet had to fit in that environment. + + + + J: A very anarchic environment. + + + + T: Yes, explicitly anarchic. Most people just ran them for their own + + reasons, and they were just separated by large distances of time and space, + + so they remained locally oriented. I just ran across old interviews and old + + documentation from '83 - '84, and we were saying it then. It was just... + + people didn't hear it, it just went in one ear and out the other. They + + think 'Oh, anarchism, that means throwing rocks at the cops!' Well + + sometimes, I suppose, but that's mostly a cop's definition of it. + + + + + + The Revolution Will Be Packetized + + + + J: The sense of the bomb throwing anarchist, I guess, is sort of in the + + sense of political disorder... + + + + T: ...which was a specific event in the 20's in San Francisco having to do + + with union labor busts. And blackmail... this guy Tom Mooney, a bomb was + + planted and blame arranged to fall on Tom Mooney, tossing his ass in jail, + + putting the blame squarely on the anarchists. + + + + J: Anarchy has this sorta bad connotation, but anarchy itself is not unlike + + what so many seem to want to embrace now. I think the libertarian + + philosophy is fairly anarchic, and you find it widespread throughout the + + net. It's basically a hands-off philosophy. + + + + T: I think people often take it too seriously, like various anarchist camps + + that have more rules than not. I consider it a personal philosophy, not a + + political thing at all. It has nothing to do with party-type politics. + + + + J: If it becomes overtly political, it ceases to be anarchy... + + + + T: Yeah, more or less, and I don't really care about what's considered + + politics per se, it's personal interaction, how I treat other people and + + how they treat me, and my relations to other people, it's anarchism... I + + always call it Paul Goodman style, which is the principle that people work + + together better if they're cooperating than if they're coerced. Very + + simple, nothing to do with goddamn party politics. It has to do with how + + you treat people that you have to work with. And that's what FidoNet was + + based on, very explicitly. It was sort of laid over the top of a lot of + + Fido bulletin boards, and let them talk to each other in a straightforward + + point-to-point manner. + + + + + + Just How Big Is It? + + + + J: Was it just Fido boards? + + + + T: Just Fido at the time, because it required a fairly low-level of + + restructuring of the innards, message bases and stuff. And Fido is a pretty + + good bulletin board, has been for years, though now it's definitely old + + fashioned. I haven't done a revision to Fido for over two years. + + + + J: Are you thinking about doing that? + + + + T: No, I'm thinking about dropping it. I've thought about it, + + and it's over. So FidoNet started up in spring of '84 with two systems, me + + and my friend John Madill and within four months there were twenty or + + fifty... by the end of the year, it was approaching 100 by the next + + February, in nine months. It started growing really fast. And every single + + one was run by somebody for their own reasons in their own manner for their + + own purposes, so FidoNet had to accommodate this. And this is nothing + + unusual, in one sense. All computer networks are essentially run this way. + + The Internet is. There's no central Internet authority where you go to get + + a system in Internet, you just put it online, and find people to help you, + + register with the NIC [Network Information Center] which is just a + + convention for handling names. + + + + J: Sort of ideally cooperative. + + + + T: Yeah, it's quite cooperative, and you don't really get kicked out unless + + you technically screw up, or do something massively illegal or glaringly + + obvious. Most likely technical, like don't answer mail for a long time. + + Most electronic things are like that. It didn't start to take off until + + Echomail came by, which was done by this guy named Jeff Rush in Dallas as a + + way to talk among Dallas sysops about organizing pizza parties. It's a + + fully distributed, redundant database using FidoNet netmail to transport + + the records in the distributed database. It's functionally equivalent to + + Usenet, they gate back and forth very easily. + + + + J: Can you link FidoNet very easily to Internet or UUCP Mail? + + + + T: There's gateways between [FidoNet and UUCP] operating. You can just set + + up the UFGate package... [FidoNet and the Internet] they have totally + + different paradigms. IP, the Internet stuff, is fully connected all the + + time. When you want to connect to a system in Finland, you just rub packets + + with them and they come back in generally under a second. FidoNet is all + + store and forward, offline processing... + + + + J: How big is it now? + + + + T: Just short of 20,000 systems. + + + + J: Wow, that's a lot... + + + + T: It's doubled in a year... I think more than doubled in a year. It's been + + doubling every year for a long time . + + + + + + QQBEGIN PGP PUBLIC KEY BLOCKQQ + + + + J: There's a lot of discussion today of encryption schemes, are you + + involved in that? + + + + T: Actually, yeah, I use it routinely. + + + + J: Using PGP? + + + + T: Yeah. FidoNet was pretty intentionally involved in getting PGP + + ubiquitous the first time around... an intentional, conscious quick-dump of + + about 10,000 copies in a week, starting on a Monday, just to be sure that + + it was unstoppable, and it spread very quickly. Now there's all kinds of + + arguments over whether it's legal, or whether it's going to incriminate me + + to use PGP, and the traffic into the network itself... + + + + J: It wouldn't be a criminal issue... + + + + T: People believe all kinds of crazy nonsense. + + + + J: Somebody has a patent on the algorithm, is that it? + + + + T: Yeah, and some people are afraid that if they send or pass encrypted + + data, that the police will bust into the house and steal the computer, all + + this kind of stuff... FidoNet sprung up fully-formed out of seeming nowhere + + into the rest of the computer world. Most people on the Internet have + + access to it through schools or industry. They went to school, then they + + got a job, and they grew up with maintained Internet connectivity... they + + were brought up into the sort of Internet-hood. + + + + J: I think that's changing a bit... + + + + T: Oh, it is changing, it will continue to change, and someday it will be + + incomprehensible that it was this way, but as of today, it's sort of how it + + is. FidoNet did not come from that direction at all. It came from... the + + usual white guys who could afford a computer :-), but in the best tradition + + of radio and astronomy, they were at least amateurs, it's truly an amateur + + network. It is not professional, as in "profession"... "professional" is + + frequently used to mean legitimate, as opposed to amateur... + + + + J: You mean "hobbyist?" + + + + T: Yeah, amateur as a word became disparaging, but we mean it actually in + + the older sense, like the radio amateur sense. We don't do it for money, + + it's done for the sake of itself. So for the most part, FidoNet members + + never had that traditional kind of connectivity, and also didn't have the + + corporate culture, and didn't have the computer network culture, so it + + basically formed in the dark, on its own. + + + + + + 550 Flavors of Culture + + + + J: Speaking of the word "culture," do you find that within the FidoNet + + universe, there's a particular set of cultural predilections? Does there + + tend to be a general kind of group or community that uses FidoNet? + + + + T: Well, it's like any of those things, it's really subjective. But, yeah, + + there do seem to be, in my travels on Internet and FidoNet, distinct + + flavors. One is not better than the other, I can tell you that, culturally + + speaking. The Internet people say, "Oh, but the flame level on FidoNet is + + so awful." Bullshit. The flame level on the Internet is just as high. It's + + in loftier language, five line signatures, and all that kind of crap... but + + I'm sorry, it's not any better, it's just different. What it is, is less + + alien to them, more comfortable... and vice-versa from the FidoNet side. + + It's more comfortable, it's more familiar, the language used and the + + acronyms and the smiley faces, all of that junk. + + + + There is a FidoNet flavor, through the usual sociological things. The + + people who originally populated it defined this vague common set, and + + people who come onto it self-select ("Oh, I like that!") and join it, and + + then enhance it, or they're sort of neutral and they come in and they just + + absorb it because... you know, you start hanging out with people, and you + + pick up their manner of speaking. And there are people, of course, who are + + utterly opposed to this, and want to make it professional and some just + + don't care, and live in a corner of it. + + + + But yeah, there are things in common, and I have a hard time putting my + + finger on what they are. It is fiercely independent, utterly, fiercely + + independent. It is viciously anti-commercialization. It has a long history + + of some nasty politics, some really enlightened politics, and I think in a + + lot of ways they have more pragmatic view, and a better view Q better + + meaning more functional in today's world Q than people who haven't had to + + pay their own phone bills. + + + + J: Some people argue that you can't have strictly online community, and + + others believe that you can. Some feel that there has to be some kind of + + face-to-face interaction. In the Internet there has not been as much of + + that until it began to become more broadly accessible to regular people... + + + + T: The Internet is still completely and thoroughly inaccessible... I'm + + sorry, it is simply not accessible. You have to have a large amount of + + hardware or an intimate relationship with someone who does, like you have + + to go to school or something. Otherwise you're paying money... and there + + are people who fall through the cracks... + + + + J: How about public access Internet? + + + + T: Yeah, but if there's more than 100 terminals in the U.S. that any + + average person could walk up to and figure out how to use in less than a + + week, I would be surprised. It still takes huge amounts of specialized + + knowledge. + + + + J: But the technical side is fairly dense... + + + + T: Oh, yeah... I've been an SWTP, CP/M, DOS hacker and hardware hacker for + + fifteen fucking years, twenty years, and UNIX is so intimidating, + + arbitrarily difficult to use... a lot of the users have this macho attitude + + that "Well, you should have to plow through it, I did." The whole + + priesthood nonsense. It's stupid. And the argument whether online culture + + is possible or not, that ain't where it's gonna get decided. It either gets + + made or it doesn't. I think there are online communities. The people who + + are doing it aren't asking themselves, "Are we an online community?" + + They're just going about their business. They're not tangible enough to + + really get documented except in hindsight, you look back and say "Oh, yeah, + + those people are" or "No, they really weren't, when push came to shove, + + they didn't stay together." + + + + J: At EFF-Austin we've been a little more self-conscious about it, we've + + actually been trying to do some community-building, to try to structure an + + online community in Austin where we'd have some force to get things done, + + various projects. One of the things we're doing that other EFF-related + + groups haven't been doing is arts projects, and in doing those things, in + + talking to some of the people who are interested in doing that, I realized + + that there are a lot of writers and artists who are hungry to get online. + + They know it's there, they'd like to be using it, but they can't get access + + to it because they can't, unless they stumble into it, find a system + + that'll give them an account. It's kind of like what you were saying about + + barriers... but I wonder if, in the FidoNet world, you find writers and + + artists using FidoNet to share information and to form arts communities? + + + + T: Well, there's a lot more less-technical people involved, because you can + + put a $300 system together, line cord to phone jack. That just means that + + the entry level is a lot lower. And it's functional as hell! I mean, So + + what if it's slow? 5 seconds or 100 milliseconds, what's the difference to + + most people? + + + + + + All Look Completely Different + + + + J: The link, the network, is strictly for email? Or do you have some other + + stuff, file transfer... ? + + + + T: Oh, there's lots of file transfer stuff. In some ways it's a lot more + + sophisticated than the FTP stuff from the user's point of view. There's + + this thing called the SDN, the Software Distribution Network, which looks + + like a conference for files, where the objects are not messages, but files. + + And they're stored in a redundant manner, some locally concentrated, some + + far away and scattered. It's kind of nebulous, like most network things + + are. They do monthly announcements of new files, and most of it's + + shareware, or free. You can do things like file attach (send with a + + message), and file requests (file fetch via message). + + + + FidoNet doesn't have the problem that a lot of older networks have, with + + seven bit channels and all that crap. We have eight bit channels with 32 + + bit CRCs. We do run into the alien system problems... ASCII character sets + + vs. the cyrillic alphabets and all that kinda stuff. Those problems are + + about as chaotic as they are anywhere else. + + + + J: How about remote login? + + + + T: No... the systems in FidoNet are radically different. There's Radio + + Shack color computers, there's CP/M machines, Apple IIs, giant DOS + + machines, giant LANs of UNIX boxes, all running common protocols in a far + + broader hardware base than most, even UNIX boxes. There's no unified + + operating system, there's a set of protocols, there's 40 or 50 different + + mailers, and FidoNet interfaces in bulletin boards, and they all look + + completely different. So it's at a much higher level of abstraction than + + the FidoNet gets defined at. I bet a lot of the Internet, some huge + + proportion, is UNIX... + + + + J: You certainly need some kind of standard to be interoperable to the + + extent that the Internet is, don't you? + + + + T: No, where the real compatibility is is the TCP/IP layer, and that's rock + + solid, and that's the thing in common. All the rlogin, telnet, and ftp + + stuff partly user paradigm, rather than just a set of protocols. It's well, + + and fine, and wonderful, and I love it, but it does put a real crimp on + + style. + + + + [Ed Cavazos, almost-attorney and vice-prez of EFF-Austin, shows up and + + settles in to listen. The conversation continues.] + + + + The Color Of Money + + + + T: A lot of FidoNet is so radically different, you can't get people to + + either hear it or understand what's going on, because it's NOT like any of + + the others, and it was intentionally not made like the others, and some of + + the really basic principles that seem random are intentional... they're in + + writing, and have been in writing for seven years. The strictly American + + anarchist principles that it's based on are written into the policy + + documents. + + + + We actually had in '85, '86, '87 an attempted takeover by a corporation + + that was formed from within, it was like a cancer that became a giant boil + + on the surface, called IFNA, the International FidoNet Association, that + + was sort of a good idea, or a potentially good idea, when we started it at + + the 200 node level. By the time it got around to being implemented, at 500 + + nodes, the world had utterly changed. With 200 people, you can run it like + + a club. It was 90% U.S., 90% white guys with computers, and at the 500 node + + level, it was about 20% European and definitely, obviously growing. It + + hopped the puddle, with systems appearing in South America, scattered, but + + you know how that goes... when you get one, then you get two, and then + + four, and they start to grow. + + + + We were very naive, and I was right in the middle of it. Some of us learned + + quickly, this isn't going to work! But this corporation grew, and became a + + 501(c)(3), and like all of those things, they get power-hungry, and they + + get grabby of territory, and we had to fight it off, and it was fought off + + by the constituents of the network... and it was killed off. They had + + gained control of the copyright and the trademarks, and they were fought + + off. The network, instead of dying, like everyone predicted, thrived. + + + + J: So how did this fight go? + + + + T: It was fought by lawyers and proxy votes and all the usual crap, in a + + goddamn hotel in San Jose, was the final straw... + + + + J: Were you a part of this corporation at all? + + + + T: Well, a bunch of us started it... at first, we were brainstorming what + + we could do... deals on modems, some obvious stuff. And we'd have a + + spokesperson from FidoNet who'd attend the EMA meetings once a year and + + represent bulletin board operators and FidoNet members in electronic + + privacy things and the technical trade stuff and the obvious things. And + + those are still lacking, we still need them. But it was established really + + early that everyone not only retains control of their system, but they're + + expected to do their part to run it, because there is no one else to run + + it. And as simple as it sounds, it's a really radical act to get that + + across, so that people don't just sit on their butts. And of course, the + + usual 10% does the work, and 90% sits on their butts, but that's fine, too. + + + + + + Double Plus Plus Good + + + + T: FidoNet's a little odd, unlike the Internet, which has a domain name + + system... you say "Connect to toad.com," it says, ".com, okay, over there, + + toad... here's the address," and you go after it. FidoNet has what appears + + to be a centralized database that every system in the net has, a copy of + + this at the moment 2 megabyte long ASCII database, with 20,000 records in + + it. And it's updated every week, it contains the full physical and logical + + information about the entire network... phone number, system name, + + restrictions on use, protocols supported, some ASCII text, like system + + name, and city, all that kind of junk. It contains the hierarchical + + addressing scheme of the network, and it contains a lot of redundancy. + + + + J: Given that there's no central authority, who maintains this database? + + + + T: A local autonomous unit in FidoNet... First... the terminology in + + FidoNet is point-node-net-zone. Points aren't really part of FidoNet, + + they're a peculiar thing... a node is the basic unit, it is a bulletin + + board or a mail-only site, generally a phone number with a modem on it. A + + net is a cluster of Fidos, a cluster of nodes, like San Francisco has Net + + 125, SFBay Net, 75-80 systems. A node in a net is the basic social + + organizational unit. It was designed to be small enough to comprehend in + + regular old terms, like we all know and love, clubs and that kind of + + group... when they get too big they tend to fragment into pieces, which + + become autonomous units, then nets are collected into the real-life + + geography of continents. + + + + The North American phone system is alien to the Western European ones, and + + they have lots of mutually-alien phone systems. The North Americans tend to + + be a lot less political... Zone 1 encompasses Mexico, U.S., and Canada, and + + nobody ever batted an eye over it. It's like, "Oh, okay, that makes sense." + + In Europe, they're fiercely defensive of the political boundaries, and it's + + really silly. Local autonomy was the critical thing to make it work, + + because who's going to allow somebody in New Jersey to dictate how they're + + going to run their system? There'd be no way to exert any kind of control, + + and once you start getting into control wars, you spend all your time doing + + that. + + + + So the way the node list is made is that every net fragment makes its own + + chunk of the node list, which is a very straightforward task, even though + + it ends up being work. They're passed up through regional coordinators who + + take these fragments, and everybody gets a copy of everybody else's weekly + + list, and each of them compiles a giant list, then they do a difference, + + this week from last week, and mail out that difference back down the tree. + + So if you chopped off half the network and smashed it flat, it would + + regenerate itself. It's a balance of terror, that's what it is. It's a + + genuine balance of terror in responsibility and power. What you get for + + that redundancy is that no one can cut you out of the network, no one can + + declare that you can't communicate. + + + + In the UUCP world none of this happens because the social environment is + + much more substantial... universities, Hewlett Packard... Your neighbors, + + in theory, can cut you off, and you disappear, no one knows about you, if + + you're eliminated from the bang path, no one can talk to you, and that's + + it, you don't exist, it's as simple as that. + + + + In FidoNet, and this has happened recently in England... a bunch of + + religious fundamentalists by just hammering away gained control of large + + chunks of the FidoNet in the U.K., and they started having fits... "Why, + + there's perverts on this board, and we're not gonna have 'em in FidoNet!" + + And they clipped them out of the goddamn list, they removed the + + entries from the U.K. list. You sort of noticed they disappeared, but those + + people can still communicate, they can mail you their fragment, + + hand-generated if necessary, and all the node list processors let you + + incorporate private lists, and you can reply back, just like that. No one + + can be cut out of the network. + + + + If you start thinking about it, you realize that there are a number of good + + and bad side effects from this. Like, if you have some real asshole + + troublemaker, there's nothing you can do about it. Like, unless somebody + + comes in and pulls out a gun or something, it's kinda hard to get someone + + kicked out of a more or less public place... well, [here in] the hotel + + would be relatively easy, but out in the street, you've just gotta live + + with your neighbors. And the same is true in the FidoNet. You have to learn + + to live with your neighbors, and vice versa. The flaming assholes have to + + learn how to behave well enough to not be utterly censured. Which is what + + generally happens to them... people just ignore them. + + + + There was one guy, he was another fundamentalist Christian nut case. He was + + amusing, actually. He was a "true Bible" believer, this was called + + pre-rapture, or something or other, some pre-rapture network... he was + + persecuted by all sides, and he loved it. He was mailing everybody this + + gibberish, pages and pages of gibberish. And there's programs that just + + filter out mail, and you say, I don't wanna see mail from this address... + + + + J: A bozofilter. + + + + T: Yeah, basically, it's a bozofilter, we've had 'em for a long time. And + + there's also another one that's called bounce... whenever you get anything + + from this guy, bounce it back. It appends a bit of text that says "This + + message is refused at site so-and-so, have it back," which IRRITATES + + people! But it just works out that people, even the crazy ones are social + + organisms. We don't really like to be disliked too widely, we like to have + + an audience, if nothing else. So that's the underpinnings... + + + + FidoNet has been very flexible technically. When technological changes or + + opportunities come by, within a year half the net supports them. In about + + '85 U.S.JRobotics very smartly discovered bulletin boards, and they + + realized the way it works is, even though there's a relatively small number + + of bulletin board sysops, if you're bulletin board caller, who do you look + + to to see what hardware to buy? The sysop. And they ask, "What kind of + + modem do you have... oh, it must be pretty good if you use it," because + + when it's bad, they mouth off to hundreds of people about it. + + + + So USR basically courted the FidoNet, and said "What do you want to see in + + a modem?" The first modem they did this with was the Courier 2400, which + + was 600 bucks new at the time, or 700 bucks. They offered a 50% off deal, + + down to about 300 or 400 dollars, which was a bargain, relatively speaking. + + We wanted true flow control, and a symmetrical modem with basic AT command + + set, and they did it. It was an instant success. And then they did the HST, + + much to most of the industry's annoyance, they did this kludgey proprietary + + asymmetrical protocol 9600 one way, 300 baud the other way... they came to + + us again, and we worked out more handshake stuff, and started changing + + protocols on our side. + + + + FidoNet was originally based on xmodem, which is amazingly similar to + + X.25's packet ack, like Kermit, only much more efficient than Kermit, and + + very much like UUCP-G, only it's not windowed... block ack block ack block + + ack... it's fine at 2400 baud and below, above 2400 baud it was not good. + + We had asymmetrical modems that collapsed. So there had been another + + protocol called Wazoo around, and it instantly became hot, because it did + + protocol negotiation when you started a session, and it could pick ZMODEM + + [trademark Chuck Forseberg], which is fully-windowed, screaming fast, you + + can run it ackless. You could work the hell out of an HST in ways that + + other protocols couldn't. Internet protocols and UUCP-G were just useless, + + in other words, the modem was useless for existing protocols. So FidoNet's + + historically been very flexible, technology-wise. + + + + McLuhanites: Myopy, My Opium + + + + Ed: Are you familiar with John Quarterman? Have you seen his maps of + + FidoNet? + + + + T: No, I haven't seen his maps of FidoNet. [Quarterman did show 'em off + + later in the conference.] I talk to him occasionally, I republished one of + + his articles in FidoNews a while ago... FidoNews is a weird phenomenon in + + itself... a 20,000 circulation weekly newsletter in its tenth year. It sort + + of goes unacknowledged... FidoNet has a giant credibility problem, because + + it sprang forth fully-formed 'way outside all traditional computer things, + + and because it works on PCs and Radio Shack Color Computers (which actually + + turns out to be a nice processor, it runs OS9 on a 6809... you can run + + multiusers on a $99 packaged machine). It's really some amazing software. + + + + FidoNews was designed in '84 in the first year as the meta-net, to discuss + + the net itself, to discuss the social end of the net. In the first issue + + was a retired Air Force colonel or something, whining about the military + + retirement process, and people instantly said, "This is supposed to be a + + technical newsletter, this is FidoNet..." and I said, "No, bullshit, it's + + not. I'm tired of just this techie crap. Do you talk on the phone about + + your telephone all the time? 'Gee, I've got a great new phone, it's got all + + these pushbuttons...' and you get bored very quickly. It's like radio + + amateurs talking about their goddamn antennas." Who wants to put up with + + that stuff? + + + + J: We've been talking about that a lot. There's three or four magazines + + devoted to online cultures, cultures of the Matrix, that focus on the + + Internet a lot. Wired is one, Mondo in a real different way, and + + bOING-bOING, of course, in a REAL different way. And we realized that a lot + + of the articles are preoccupied with the carrier, with the technology for + + carrying messages, and not so much with the messages themselves or the + + cultures themselves, the sorts of cultures that are evolving. + + + + T: Yeah, they forget that what we're making is a goddamn conduit; it's a + + medium, it's not content! A content comes with it, because they're brand + + new mediums, they fail a lot, and they need to be developed... all software + + sucks, and all hardware sucks, so you end up talking about it a lot, but + + yeah, that's not the point. + + + + J: What's really more fascinating is what's at either end of the conduit... + + + + T: Yeah, the telephone proved that. It's actually a way to convey social + + information, emotion, that's why telephones worked, you can talk over them. + + How many ways can you say "No" with a keyboard? Not very many. 25 or 50 if + + you're incredibly ingenious. Smiley faces and uppercase... All the cultural + + information is stripped. And a lot of it has simply been access. Those at + + the gates determine who comes in. If you own the $5,000 PC... + + + + J: Is that what brings you here [to the fourth conference on Computers, + + Freedom, and Privacy), access issues? + + + + T: Yeah, that's why I'm always skeptical of large-scale networks. While I'm + + on the Internet, I don't have any pretensions of being... "Why, the world + + is connected!" No, one percent of one percent is connected, barely, and the + + tools really suck. Through no fault of the authors, they're incredible + + works, the foundation to a world. But they're hardly accessible to everyone + + in the world. + + + + J: I had to buy my access to the Internet, at first. The WELL... + + + + T: Mine I get because I'm managing a small IP cooperative, and I get it + + sort of as a perk to my $400 to $500 salary for what is essentially a + + full-time job. + + + + J: Actually, I've been able to pick up other accounts since, but the only + + way that I could have got in in the first place was by buying access, + + because I'm not really very technical. My interests are more + + sociopolitical, I guess... + + + + T: I don't really have any serious problems with the way things exist. For + + better or worse, that's the way that all complicated things have been + + developed in our little Western history timeline. It takes resources and + + effort and energy, and they do spread out, eventually. And they get defined + + along the way, they definitely have basic cultural assumptions glued into + + them at the very base. + + + + J: It allows a more distributed way of organizing and doing things... + + + + T: We'll see if it's ever as good as the telephone is. It doesn't get much + + better than the telephone, when you think about its position in society. + + Like Bruce said in his Hacker Crackdown, you notice them when you don't + + have one, they're so ubiquitous, they're like light switches. You don't + + think of a telephone, it's not an exciting object. + + + + J: I can remember when there was a single phone in the house, and it was a + + big deal to have a second phone, which was usually on the same line. And + + now I have three phone lines, and one is a dedicated data line. I don't + + think I know many people who don't have at least two or three phones in + + their house. + + + + T: I'm down to two, and I consider that rarefied... I only need two lines + + now, after having six at one point, all these bulletin boards and data + + lines, now it's like, oh, a voice line, and a data line... + + + + J: I prefer asynchronous text swapping, but I'm not sure why, maybe a + + personal idiosyncrasy. It seems funny to me, because Matisse Enzer, the + + support guy on the WELL... when we're having a problem, and we can't quite + + figure out how to communicate about it, he always says, "Well look, why + + don't I call you up, and we'll talk about it." And I always say, "No, wait, + + I don't wanna talk, I just wanna text!" + + + + ----- + + Originally published in Fringe Ware Review #1, ISSN 1069-5656. + + Copyright (c)1993 by the author. All rights reserved. + + For more details, contact: fringeware@io.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + +. + diff --git a/textfiles.com/magazines/JOAUC/jauc04.txt b/textfiles.com/magazines/JOAUC/jauc04.txt new file mode 100644 index 00000000..c39f66eb --- /dev/null +++ b/textfiles.com/magazines/JOAUC/jauc04.txt @@ -0,0 +1,6262 @@ + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically + + ====================================================================== + + ISSN 1074-3111 Volume One, Issue Four June 7, 1994 + + ====================================================================== + + + + Editor-in-Chief: Scott Davis (dfox@fennec.com) + + Technology Editor: Max Mednick (kahuna@fennec.com) + + Consipracy Editor: Gordon Fagan (flyer@fennec.com) + + Network Security: George Phillips (ice9@fennec.com) + + + + ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC + + + + U.S. Mail: + + The Journal Of American Underground Computing + + 10111 N. Lamar #25 + + Austin, Texas 78753-3601 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + IMPORTANT ADDRESSES - + + ============================================================================ + + To Subscribe to "TJOAUC", send mail to: sub@fennec.com + + All questions/comments about this publication to: comments@fennec.com + + Send all articles/info that you want published to: submit@fennec.com + + Commercial Registration for Profitable Media: form1@fennec.com + + ============================================================================ + + + + "The underground press serves as the only effective counter to a growing + + power, and more sophisticated techniques used by establishment mass media + + to falsify, misrepresent, misquote, rule out of consideration as a priori + + ridiculous, or simply ignore and blot out of existence: data, books, + + discoveries that they consider prejudicial to establishment interest..." + + + + (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Contents Copyright (C) 1994 The Journal Of American Underground Computing + + and/or the author of the articles presented herein. All rights reserved. + + Nothing may be reproduced in whole or in part without written permission + + of the Editor-In-Chief and/or the author of the article. This publication + + is made available periodically to the amateur computer hobbyist free of + + charge. Any commercial usage (electronic or otherwise) is strictly + + prohibited without prior consent of the Editor, and is in violation of + + applicable US Copyright laws. To subscribe, send email to sub@fennec.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + DISCLAIMER AND NOTICE TO DISTRIBUTORS - + + + + NOTE: This electronic publication is to be distributed free of charge + + without modifications to anyone who wishes to have a copy. Under NO + + circumstances is any issue of this publication, in part or in whole, + + to be sold for money or services, nor is it to be packaged with other + + computer software, including, but not limited to CD Rom disks, without + + the express written or verbal consent of the author and/or editor. + + To obtain permission to distribute this publication under any of the + + certain circumstances stated above, please contact the editor at one of + + the addresses above. If you have intentions of publishing this journal + + in any of the ways described above, or you are in doubt about whether or + + not your intentions conflict with the restrictions, please contact the + + editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com + + This publication is provided without charge to anyone who wants it. + + This includes, but is not limited to lawyers, government officials, + + cops, feds, hackers, social deviants, and computer hobbyists. If anyone + + asks for a copy, please provide them with one, or mail the subscription + + list so that you may be added. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 4 + + + + TABLE OF CONTENTS + + + + 1) We've tried To Be Nice... Carl Guderian + + 2) Defcon Convention Update Dark Tangent + + 3) Obituary / Mimsey Unknown + + 4) Call For Papers / Neural Networks Readers + + 5) Press Release: Spyglass/NCSA Agreement Readers + + 5) The Real Story Carl Guderian + + 6) Legion Of Doom T-Shirt Ad Chris Goggans + + 7) Libertarian Party / Opposition To DTA Libertarian Pty + + 8) Unabom - 1 Million $ Reward William Tafoya + + 9) The Massachusetts Encryption Bill Unknown + + 10) Book Review: Information Warfare Scott Davis + + 11) Whisper Who, A Unix Tool (Source Code) Editors + + 12) Hacker Barbie Readers + + 13) The Well: A Small Town... Cliff Figillo + + 14) The Feminization Of Cyberspace Doctress Neutopia + + 15) Response To The Feminization Of Cyberspace Jason Webb + + 16) Easy-to-Use Kennedy Conspiracy Chart Gordon Fagan + + 17) Meeks Defense Fund MDF + + 18) HOPE - Hackers On Planet Earth Emmanual Goldstein + + 19) TV & Movie Mania Radio Show Lauren Weinstein + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + Special thanks to the anonymous reader who sent the software to my US Mail + + address...it was very cool. -Scott + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + The Journal Of American Underground Computing supports DEFCON II in Vegas!! + + We will be there, and we encourage you to do the same. + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + We've Tried to Be Nice: Other Ways to Fight Clipper + + + + by Carl Guderian (bjacques@cypher.com) + + + + (You've read about Clipper ad nauseam elsewhere, so refer to other sources + + if you still don't know about Clipper, the Digital Telephony Act, and + + everything else that will be lumped together here under the rubric of + + "Clipper." Start with John Perry Barlow's excellent "Jackboots on the + + Infobahn" in issue 2.04 of Wired Magazine. If you want balance, ask the NSA + + for its opinion and weigh it against our position that Clipper obviously + + blows. Onward.) + + + + The Situation, Spring 1994 + + + + The Clinton White House is apparently steaming ahead on Clipper despite our + + perfectly reasonable arguments and well-mannered campaign against it. To + + John Perry Barlow (see intro) it plays like Invasion of the Body Snatchers + + II: The White House Years--formerly sensible folks replaced by pod people + + blandly assuring us that if "I could tell you what I know, you'd agree with + + me." No help there. + + + + Various industry consortia were ready to sell us down the slippery slope + + until the feds double-crossed them at the last minute by rescinding the + + offer to lift export controls on encryption in exchange for support for + + Clipper. An attempt to make RSA/PGP encryption a politico-economic fait + + accompli by sheer numbers of users is moving slowly, if at all (PGP really + + requires direct internet access, it's hard to use, and RSA's suing Phil + + Zimmerman so nobody else is going to dress it up for the market). The White + + House spooks may make a bigger splash in the market by ordering their + + 50,000 electronic keyholes than we can by passing out copies of PGP for + + free. We're fighting the enemy on its own turf and terms and we could lose. + + It's time to fight dirty. Below are a couple of suggestions. + + + + Mutt and Jeff + + + + Just as for every civil rights Freedom Rider there was a Black Panther, for + + every Pat Schroeder there's a Riot Grrl, and for every polished Dixiecrat + + Senator there was a KKK Nightrider, so must we field media streetfighters + + to complement our sincere and polite public spokesmen. The history of social + + progress (and, unfortunately, reaction) is that of good cop and bad cop. + + Opponents of Clipper must employ these Siamese twins of persuasion in order + + to get anywhere. If you've never been interrogated by police, customs + + officials, school principals, or corporate investigators, a little + + explanation of good cop/bad cop may help. + + + + In interrogations conducted in civilized countries, the object is to crack + + the interviewee without resorting to physical torture. The most effective + + method is good cop/bad cop. The bad cop, sent in first, acts enraged and + + threatens to beat the truth out of the suspect. He gleefully enumerates all + + the terrible things that can happen to an uncooperative suspect. Sometimes + + this alone works. If the prisoner stands firm (or is frozen with fear), the + + good cop comes to the rescue, radiating sympathy and bonhomie. He offers a + + cigarette, a friendly ear, and assurances that, he and the suspect are + + really on the same side. + + + + The good cop plays on the suspect's pride, suspicions, or other + + psychological weaknesses in order to get a voluntary confession. The good + + cop's presence carries the implied threat of the return of the bad cop if + + no confession is forthcoming. To accuse the good cop of waging psychological + + warfare is to miss the point. Psychological warfare is waged by adept + + deployment of both good and bad cops in order to break the prisoner. + + It's very effective against folks who don't know any better, especially + + young hackers, schoolkids, and Seattle scenesters en route to Vancouver. + + + + The Occult Technology of Power + + + + The point of the above digression is that a tool well-known to the + + authoritaries can be, and has been, used against them as well. As gays have + + learned, neither the noisy AIDS Die-ins by ACT-UP nor lobbying by advocacy + + groups is alone sufficient to win public support. Together the tactics work + + because they offer different levels on which the public can deal with issues + + (and people) that clearly won't go away. + + + + Clipper advocates already know the weakness of their position, so arguments + + are useless. They repeat the same arguments in hopes the public will get + + tired of hearing about it and simply sign the blank check. We must pre-empt + + the argument with bite-sized zingers. In the economy of attention, the + + market goes to the side with the pithiest arguments. When they say "law and + + order" we respond with "ATF." Such sound bites are Patriot Missiles that + + shoot down the other side's forensic Scuds. Channel the spirits of Dorothy + + Parker and Oscar Wilde. Give their straw man a hotfoot; they summon up + + nuclear terrorism, we resurrect the Branch Davidians. The issue doesn't lend + + itself to riotous demonstrations, but with a really good negative media + + campaign we can whip up a good hate frenzy against Clipper. We already do + + this somewhat, but we need to go further, with high concept slogans and + + catch phrases. + + + + "Clinton chip," like "Hooverville," has a dry, sharp ring to it, commanding + + attention like the snap of a bone. Plus, it yokes the President personally + + to the issue. If that sounds lame, try something else. The ancient + + techniques of propaganda apply here, wedded to the black art of meme/ + + information virus theory. It's a media war, so we'll use a little McLuhan. + + (If you've read his stuff, you know his writing style was really disjointed, + + but sounded great! Which may be the point.) Slick attack ads, sound bites, + + rants to the editor, whisper campaigns, and other forms of media + + manipulation are in order. Anything short of gross distortion or outright + + lies is acceptable. The truth is scary enough and can be made to sound + + positively Lovecraftian, if we succeed in seizing the metaphors. Detourned + + ads such as "big brother inside" are a good start. The opportunities for + + satire are boundless, especially given the history of government projects. + + Emphasize how much more a Clippered future will play like "Brazil" than + + "1984." + + + + Why assume things will always work out for the Bad Guys Conspiracy? Want to + + bet that when the government buys Clipper chips the Secret Service, FBI, + + CIA, NSA, and State Department will probably spy on each other (since no one + + else will use it)? Or that when Clipper charges out the fortress gate its + + broken carcass will likely be flung back over the wall (i.e., it will be + + cracked and posted to the net)? How will they know I haven't sold my + + Clippered cellular phone at a garage sale? And so on. + + + + Negative campaigns don't by themselves win support, but reasonable words + + don't win much attention either. Both tricks must be played in their turn. + + Not good cop or bad cop, but good cop AND bad cop. A diverse battle plan + + gives sympathizers more options for action. Some folks like to lobby and + + others like to sling mud. Hey, we're a big tent. And the streetfighters can + + keep the lobbyists honest. + + + + Useful Idiots + + + + In order for an issue to get attention it should demonstrably arouse the ire + + of a number of large and unrelated groups. Right wing fundamentalist + + screwheads as well as flaming liberals stand to lose if Clipper becomes the + + law, so we put a bug in their respective ears in hopes of getting a + + response. Support for one's position comes from surprising places. + + Cyberpagans, for example, will be shocked to learn that Phyllis + + "Church Lady" Schlafly denounced Clipper in a syndicated column a couple of + + months back (she got a few details wrong, but you have to expect that). + + Equally shocking (at least to this writer) is Rush Limbaugh, avid computer + + user, so far passing up an opportunity to savage Clinton on Clipper. Liberal + + groups can be persuaded that a conservative Republican administration armed + + with Clipper would make J. Edgar Hoover look like Norbert the Narc. + + + + This strategy is aimed primarily at right wing groups for a number of + + reasons. They already hate the present Democratic administration. They're + + best at marshalling money and "good-ole-boy" clout. Right-wing paranoia is + + more entertaining than the left-wing variety, so it is more likely to be + + heard. To the Christian Right, for instance, Clipper carries the musky scent + + of the Beast 666, and they expect Clinton to spend a second term stamping + + our hands at the door of the Hellfire Club. And did you ever notice how + + many cypherpunks own guns? Play up the gun analogy. + + + + This avenue to political action is time-critical. If 1997 sees a Republican + + administration in place, right-wing groups will lose interest in attacking + + it. And since it was the Bush White House (or spooks within it) that + + proposed Clipper, you can bet the rent that President Dole, Quayle (!), or + + whoever will make it a fact of life quicker than you can say "national + + security." So much for looking to the Republicans for relief from Clipper. + + + + The Golden Apple of Discord + + + + Thank the Deist god of the Founding Fathers that our government is not a + + monolithic entity possessed of a single will. Battles are already underway + + over which agency gets the secret skeleton key to the Clipper escrow vault + + to bypass the official safeguards that won't work anyway. Getting the Crips + + and Bloods to make peace was a cakewalk compared to Clinton's efforts to get + + the Three Letter Agencies to talk to each other. As long as they must + + compete for funding it will be so. + + + + Not quite the end + + + + With a bit of work we can play up Clipper so that it attracts as much + + attention as the abortion, gun control, or gay rights issues have. Getting + + the cover of Newsweek was good; mainstream coverage in a proposal normally + + of interest only to propeller heads and conspiracy buffs is gratifying. + + Remember the fallout after the Hacker Crackdown of 1990? But sustained + + pressure is needed. Clinton's people need their noses rubbed in the sheer + + breadth of opposition to Clipper. If a White House aide hears "Clinton Chip" + + or something similar on the street, the President will hear of it and + + realize we're serious. + + + + Really the end + + + + According to a recent issue of Federal Computer Week, the NSA is adopting as + + it's mascot the armadillo. Maybe we can thank Bobby Ray Inman for this one. + + FCW recently ran a contest to name the "dillo." Entrants were asked to + + consider the NSA's reputation for prurience and the animal's best known + + habitat (the freeway center stripe). The contest is probably over by now, + + but "Roadkill" seemed to be the winner paws down. "Road rash," "Winston + + [Smith]," and "Harry Buttle" (the poor sap whose erroneous arrest and + + subsequent death under torture--er, information retrieval--trigger the + + events of "Brazil") were this author's favorites. + + + + Credits + + + + Many thanks go posthumously to Marshall McLuhan for his theory of + + perception, which states that most people see either the figure or the + + background (a vase or two faces?) but that true perception is seeing both + + figure and background. This seemed pretty wacky a year ago, but it makes a + + lot more sense now. Backhanded thanks go to a trio of Canadian customs + + guards at the Peace Bridge connecting Buffalo, NY to Ft. Erie, Ontario for + + personal instruction in the tactics of "good cop/bad cop". Thanks also to + + ReSearch (for PRANKS!), the Situationist International (including King Mob), + + Richard Dawkins (meme theory) and the late Count Alfred Korzybski (general + + semantics), for inspiration. + + + + Please wash your hands before leaving the 20th century. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + DEFCON UPDATE + + + + by Dtangent (dtangent@defcon.org) + + + + + + XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement + + XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement + + XXXXXXxxxxxxXXXXXX X X DEF CON II Convention Update Announcement + + XXXXXxxxxxxxxXXXXXXX X DEF CON II Convention Update Announcement + + XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON II Convention Update Announcement + + XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON II Convention Update Announcement + + XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON II Convention Update Announcement + + XXXxxxxxxxxxxxxXXXXXXXX DEF CON II Convention Update Announcement + + XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON II Convention Update Announcement + + XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON II Convention Update Announcement + + XXXXXXxxxxxxXXXXXXXXX X DEF CON II Convention Update Announcement + + XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement + + XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement + + + +READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE + +DISTRUBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ + + ============================================================================ + + + + What's this? This is an updated announcement and invitation to DEF CON II, + + a convention for the "underground" elements of the computer culture. We try + + to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies, + + Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties + + Groups, CypherPunks, Futurists, Artists, Etc.. + + + + WHO: You know who you are, you shady characters. + + WHAT: A convention for you to meet, party, and listen to some speeches + + that you would normally never hear. + + WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th) + + WHERE: Las Vegas, Nevada @ The Sahara Hotel + + + + So you heard about DEF CON I, and want to hit part II? You heard about the + + parties, the info discussed, the bizarre atmosphere of Las Vegas and want to + + check it out in person? Load up your laptop muffy, we're heading to Vegas! + + + + Here is what Three out of Three people said about last years convention: + + + + "DEF CON I, last week in Las Vegas, was both the strangest and the best + + computer event I have attended in years." -- Robert X. Cringely, Info World + + + + "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas + + + + "Soon we were at the hotel going through the spoils: fax sheets, catalogs, + + bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds. + + The documents disappeared in seconds." -- Gillian Newson, New Media Magazine + + + + DESCRIPTION: + + + + Last year we held DEF CON I, which went over great, and this year we are + + planning on being bigger and better. We have expanded the number of + + speakers to included midnight tech talks and additional speaking on Sunday. + + We attempt to bring the underground into contact with "legitimate" speakers. + + Sure it's great to meet and party with fellow hackers, but besides that we + + try to provide information and speakers in a forum that can't be found at + + other conferences. + + + + While there is an initial concern that this is just another excuse for the + + evil hackers to party and wreak havok, it's just not the case. People come + + to DEF CON for information and for making contacts. We strive to distinguish + + this convention from others in that respect. + + + + WHAT'S NEW THIS YEAR: + + + + This year will be much larger and more organized (hopefully) than last year. + + We have a much larger meeting area, and have better name recognition. + + Because of this we will have more speakers on broader topics. Expect + + speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new + + things expected include: + + + + o An Internet connection with sixteen ports will be there, _BUT_ will only + + provide serial connections because terminals are too hard to ship. So + + bring a laptop with communications software if you want to connect to the + + network. Thanks to cyberlink communications for the connection. + + + + o There will be door prizes, and someone has already donated a Cell Phone + + and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead + + Addict. + + + + o Dr. Ludwig will present his virus creation awards on Sunday. + + + + o A bigger and better "Spot The Fed" contest, which means more shirts to + + give away. + + + + o More room, we should have tables set up for information distribution. + + If you have anything you want distributed, feel free to leave it on the + + designated tables. Yes, this year there will be a true 24 hour + + convention space. + + + + o A 24 hour movie / video suite where we will be playing all type of + + stuff. + + VHS Format. Mail me with suggested titles to show, or bring your own. + + We'll use a wall projector when not in use by speakers. + + + + o Midnight Tech Talks on Friday and Saturday night to cover the more + + technical topics and leave the days free for more general discussions. + + + + WHO IS SPEAKING:========================================================== + + + + This list represents almost all of the speakers verified to date. Some + + people do not want to be announced until the event for various reasons, or + + are waiting for approval from employers. A speaking schedule will go out + + in the next announcement. + + + + + + Phillip Zimmerman, Notorious Cryptographer & author of PGP. + + Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and + + "Computer Viruses, Artificial Life and Evolution" + + Loyd Blankenship (The Mentor), Net Running in the 90's and RPG. + + Padgett Peterson, Computer Enthusiest, Anti-Virus Programmer. + + The Jackal, A Radio Communications Overview, Digital Radio and the Hack + + Angle. + + Judi Clark, Computer Professionals for Social Responsibility. + + Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced. + + To be Announced, The Software Publishers Association, Topic to be Announced. + + Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics. + + Mark Lotter, Cellular Enthusiest, Hacking Cell Phones. + + Lorax, The Lighter Side of VMBs. + + Peter Shipley, Unix Stud, Q&A on Unix Security. + + George Smith, Crypt Newsletter, Virus Topic to be Announced. + + Cathy Compton, Attorney, Q&A Surrounding Seisure Issues, Etc. + + John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal. + + Red Five & Hellbender, Madmen With a Camcorder, Who Knows? + + Chris Goggans (Erik Bloodaxe), Wierd Wireless Psycho Shit.. Stay Tuned.. + + + + There should be a few round table discussions on Virus, Cellular, Unix and + + something else surrounding the industry. + + + + I'll name the rest of the the speakers as they confirm. I'm still working + + on a few (Two?) people and groups, so hopefully things will work out and I + + can pass the good news on in the next announcement, or over our List Server. + + + + ============================================================================ + + + + WHERE THIS THING IS: + + + + It's in Las Vegas, the town that never sleeps. Really. There are no clocks + + anywhere in an attempt to lull you into believing the day never ends. Talk + + about virtual reality, this place fits the bill with no clunky hardware. If + + you have a buzz you may never know the difference. It will be at the Sahara + + Hotel. Intel is as follows: + + + + The Sahara Hotel: 1.800.634.6078 + + Room Rates: Single/Double $55, Tripple $65, Suite $120 + + (Usually $200) + 8% tax + + + + Transportation: Shuttles from the airport for cheap. + + + + NOTE: Please make it clear you are registering for the DEF CON II + + convention to get the room rates. Our convention space price is + + based on how many people register. Register under a false name if + + it makes you feel better, 'cuz the more that register the better for + + my pocket book. No one under 21 can rent a room by themselves, so + + get your buddy who is 21 to rent for you and crash out. Try to contact + + people on the Interactive Mailing List (More on that below) and + + hook up with people. Don't let the hotel people get their hands on + + your baggage, or there is a mandatory $3 group baggage fee. Vegas + + has killer unions. + + + + OTHER STUFF: + + + + I'll whip up a list of stuff that's cool to check out in town there so if + + for some reason you leave the awesome conference you can take in some unreal + + sites in the city of true capitalism. If anyone lives in Las Vegas, I + + would appreciate it if you could send a list of some cool places to check + + out or where to go to see the best shows and I'll post it in the next + + announcement or in the program + + + + -o I am asking for people to submit to me any artwork, pictures, drawings, + + logos, etc. that they want me to try and include in this years program. + + I am tring to not violate any copywrite laws, but wat cool shit. Send + + me your art or whatever and I'll try and use it in the program, giving + + you credit for the work, of course. Please send it in .TIF format if it + + has more than eight bit color. The program will be eight bit black and + + white. + + -o in case you want to make adjustments on your side. + + + + *** NEW MAILING LIST SERVER *** + + + + We've finally gotten Major Dommo List Serv software working (Kinda) and it + + is now ready for testing. MTV spent alot of time hacking this thing to work + + with BSDi, and I would like to thank him. The purpose of the list is to + + allow people interested in DEF CON II to chat with one another. It would + + be very sueful for people over 21 who want to rent hotel space, but split + + costs with others. Just mention you have room for 'x' number of people, and + + I'm sure you'll get a response from somone wanting to split costs. Someone + + also suggested that people could organize a massive car caravan from + + Southern Ca. to the Con. My attitude is that the list is what you make of + + it. Here are the specifics: + + + + Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to + + technical problems, etc. I'll do another mass mailing to everyone letting + + them know that the list is up and how to access it. Sorry for the delay! + + + + MEDIA: + + + + Some of the places you can look for information from last year include: + + + + New Media Magazine, September 1993 + + InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely + + Gray Areas Magazine, Vol 2, #3 (Fall 1993) + + Unix World, ???, + + Phrack #44 + + + + COST: + + + + Cost is whatever you pay for a hotel room split however many ways, plus + + $15 if you preregister, or $30 at the door. This gets you a nifty 24 bit + + color name tag (We're gonna make it niftier this year) and your foot in the + + door. There are fast food places all over, and there is alcohol all over + + the place but the trick is to get it during a happy hour for maximum + + cheapness. + + + + ========================================================================== + + + + I wanted to thank whoever sent in the anonymous fax to Wired that + + was printed in issue 1.5 Cool deal! + + + + =========================================================================== + + + + FOR MORE INFORMATION: + + + + For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com + + in /pub/defcon. There are digitized pictures, digitized speeches and text + + files with the latest up to date info available. + + + + For email users, you can email dtangent@defcon.org for more information. + + + + For non-net people call: + + + + For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102, + + Seattle, WA, 98112 + + + + For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone. + + + + A DEF CON Mailing list is maintained, and the latest announcements are + + mailed automatically to you. If you wish to be added to the list just send + + email to dtangent@defcon.org. We also maintain a chat mailing list where + + people can talk to one another and plan rides, talk, whatever. If you + + request to be on this list your email address will be shown to everyone, + + just so you are aware. + + + + STUFF TO SPEND YOUR MONEY ON: + + + + o Tapes of last years speakers (four 90 minute tapes) are available for $20 + + + + o DEF CON I tee-shirts (white, large only) with large color logo on the + + front, and on the back the Fourth Amendment, past and present. This is + + shirt v 1.1 with no type-o's. These are $20, and sweatshirts are $25. + + + + o DEF CON II tee-shirts will be made in various colors this year, including + + a few long sleeve shirts. Sizes will be in large only again, with a + + few white mediums made. Shirts will be $15, Long Sleve $17, Sweat shirts + + will be $20. + + + + o We will have a few (ten maybe?) embroidered hats with this years logo. + + Not shure how much they will be.. like $10 maybe. + + + + o Full sized 4 color DEF CON II wall posters will be for sale for about $5. + + + + o Pre-Register for next year in advance for $15 and save half. + + + + o Make all checks/money orders/etc. out to DEF CON, and mail to the address + + above. Way above. + + + + If you have any confidential info to send, use this PGP key to encrypt: + + + + -----BEGIN PGP PUBLIC KEY BLOCK----- + + Version: 2.3 + + + + mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo + + dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf + + uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ + + hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50 + + IDxkdGFuZ2VudEBkZWZjb24ub3JnPg== + + =ko7s + + -----END PGP PUBLIC KEY BLOCK----- + + + +- The Dark Tangent + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + + + TO: EDITORS@FENNEC.COM + + Subject: OBITUARY - VAX 8600, aka Mimsy, dead at age 8 + + + + An era of computing in the University of Maryland Computer Science + + Department came to an end Sunday, March 20th, when the Department's last + + VAX, an 8600, peacefully died in its sleep. After a power-down, the VAX, + + which had been off maintenance since July, 1993, was not able to boot as + + a result of a disk/controller that finally went bad. + + + + The 8600 had arrived in 1986 as the Department's most powerful machine + + and had been named "Brillig"; in November 1990, when the Department's VAX + + 11/785 was retired, the 8600 assumed the name and duties of "Mimsy" and + + had served in that capacity until its semi-retirement in July, 1994. At + + that time, the 8600 was renamed "Imladris" and the "Mimsy" moniker was + + bestowed upon a Sun SPARC 10/30. + + + + Along with being the last VAX, the 8600 was also the last UMD machine + + running the mutoid 4.3/4.3tahoe/4.3reno/Net-2 conglomeration (4.3BSD Torix, + + as it was called here) that emerged over the span of a decade of working + + with Unix. Although it is now gone, the hacks it helped inspire live on + + in locally-changed versions of the SunOS, Ultrix, OSF/1 and BSDI offerings + + in hundreds of other systems here. + + + + It is somewhat ironic that the VAX ended the way it did. Its demise + + was originally scheduled for earlier that week, when the 8600, after a short + + ceremony, was to have committed suicide. The machine would have, under its + + own free will and volition, executed (through the "cron" facility) a shell + + script prepared by Dr. Vax Kevorkian which would have issued an "rm -rf /" + + command. Onlookers were to have watched the process until the machine seized + + up, and would have then powered the machine down and gone to dinner. + + + + However, an earlier problem with the building Uninterruptible Power + + Supply (UPS) necessitated a load test for the 20th, and as a large consumer + + of power, it was decided the 8600 would remain on for this one last task. As + + a result of a short power-down during the UPS load test, the machine's + + mighty heart (ummm, disk) gave out. + + + + Funeral arrangements are not yet complete, but tentative plans call + + for shipping the remains to Chris Torek's apartment in Berkeley, as a token + + of the staff's appreciation. The staff has requested that all gifts of + + condolence be made to the University of Maryland's Dinner-for-Wayword- + + Hackers Fund; checks may be made payable to Pete Cottrell. + + + + MIMSY IS DEAD! LONG LIVE MIMSY! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CALL FOR PAPERS: Neural Networks for Automatic Target Recognition + + + + By Dept of Cognitive and Neural Systems (announce@retina.bu.edu) + + + + ATR is a many-faceted problem of tremendous importance in industrial and + + defense applications. Biological systems excel at these tasks, and neural + + networks may provide a robust, real-time, and compact means for achieving + + solutions to ATR problems. ATR systems utilize a host of sensing modalities + + (visible, multispectral, IR, SAR, and ISAR imagery; radar, sonar, and acoustic + + time series; and fusion of multiple sensing modalities) in order to detect + + and track targets in clutter, and classify them. This Special Issue will + + bring together a broad range of invited and contributed articles that + + explore a variety of software and hardware modules and systems, and + + biological inspirations, focused on solving ATR problems. We particularly + + welcome articles involving applications to real data, though the journal + + cannot publish classified material. It will be the responsibility of the + + submitting authors to insure that all submissions are of an unclassified + + nature. + + + + Co-Editors: + + ----------- + + Professor Stephen Grossberg, Boston University + + Dr. Harold Hawkins, Office of Naval Research + + Dr. Allen Waxman, MIT Lincoln Laboratory + + + + Submission: + + ----------- + + Deadline for submission: October 31, 1994 + + Notification of acceptance: January 15, 1995 + + Format: as for normal papers in the journal (APA format) and no longer + + than 10,000 words + + + + Address for Papers: + + ------------------- + + Professor Stephen Grossberg + + Editor, Neural Networks + + Boston University + + Department of Cognitive and Neural Systems + + 111 Cummington Street + + Room 244 + + Boston, MA 02215 USA + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PRESS RELEASE: SPYGLASS/NCSA AGREEMENT + + + + From: Eric W. Sink (eric@spyglass.com) + + + + The following press release announces our new relationship with NCSA + + and Mosaic. I would like to prepend a clarification or two: + + Initially, Spyglass will sell Mosaic to volume users requiring a + + minimum of 5000 licenses per year. It is our intention to let the + + needs of smaller volume customers, including end-users, be met thru + + other channels. + + + + Also, remember that NCSA Mosaic, for Windows, Mac, and UNIX will + + continue to be freely available from NCSA. Development of the free + + versions will continue at NCSA, and Spyglass will be in collaboration + + with the NCSA development team. + + + + At Internet World Booth #609: + + For Immediate Release + + + + Spyglass Signs Agreement with NCSA to Enhance and Broadly Relicense + + Mosaic Graphical Browser for the Internet + + (C)1994 Internet World + + Commercial Windows and Macintosh Versions Available in June; X Windows + + Version to Follow in July + + + + INTERNET WORLD, SAN JOSE, Calif., June 1 -- Spyglass, Inc. and the + + National Center for Supercomputing Applications (NCSA) at the + + University of Illinois/Urbana-Champaign have entered into an agreement + + that will get Mosaic, NCSA's graphical browser for the Internet, to + + the desktops of millions of people. The agreement gives Spyglass full + + rights to enhance, commercialize and broadly relicense + + Mosaic. Spyglass is making a multimillion-dollar commitment to NCSA + + and will focus initially on developing a commercially enhanced version + + of Mosaic that other companies will incorporate with their products + + for distribution to their customers. The announcement was made today + + in San Jose, on the opening day of exhibits at the Spring '94 Internet + + World conference. + + + + Developed by NCSA, Mosaic gives users point-and-click access to the + + World Wide Web (WWW), an information retrieval system on the Internet + + with more than 2,300 graphical, multimedia databases of "hyperlinked" + + documents. The Internet is a vast "supernetwork" of public and private + + networks connecting thousands of organizations and an estimated 20 + + million individual users. New users are joining the Internet at the + + rate of 2 million each month, and hundreds of new WWW servers are + + coming online every month. Because of the reach of the Internet, it + + offers an attractive vehicle for electronic publishing and for + + conducting business globally. + + + + "Mosaic and World Wide Web are two key ingredients for successful + + electronic publishing and commerce on the Internet. But, to date, + + businesses have tapped only a fraction of the Internet's potential + + because these tools haven't been commercially available. Working with + + NCSA, we're going to change this," said Douglas Colbeth, president of + + Spyglass, which was formed in 1990 and has commercialized other NCSA + + technologies. + + + + "We're committed to evolving Mosaic so it becomes a robust, commercial + + tool with complete documentation, technical support and advanced + + features," explained Tim Krauskopf, co-founder of Spyglass and + + developer of NCSA Telnet. "We'll be collaborating with NCSA and other + + key partners to create new tools and establish standards that will + + help organizations build robust World Wide Web information servers + + quickly and inexpensively." + + + + "It has been thrilling to see the universal acceptance of NCSA Mosaic + + as an interactive window into cyberspace," said Larry Smarr, director + + of the NCSA. "I am very pleased to see Spyglass making such a + + financial commitment to the commercialization of Mosaic, which frees + + NCSA up to develop the next level of functionality for the public + + domain. Spyglass has been a terrific technology partner for us in the + + past and we look forward to an even closer working relationship in the + + future." + + + + "We welcome Spyglass as our partner in this effort because of the + + company's track record in commercializing other NCSA technologies and + + our rapidly developing close working relationship with the people at + + Spyglass," said Joseph Hardin, associate director of NCSA's software + + program. "Spyglass gives us the cross-platform development, global + + distribution and ongoing financial resources we need to take the + + Mosaic environment to the next level. With this commercialization + + arrangement with Spyglass in place, NCSA is freed to continue to + + develop core technologies for Mosaic as well as new technologies that + + leverage the Internet. We encourage companies to take advantage of + + this new relationship with Spyglass and contact them about volume + + licensing arrangements for Mosaic technology." + + + + Mosaic has been called the "killer application" for the Internet + + because it lets users navigate the Internet by browsing through a + + series of graphical, multimedia documents. The WWW was developed + + several years ago by CERN, a European consortium of scientists based + + in Switzerland, to keep track of researchers' information and to + + provide an easy method of sharing data. Subsequently, WWW has grown + + into one of the world's most open and widely used environments for + + information publishing, browsing and retrieval. + + + + WWW servers contain eye-catching documents with built-in links to + + other documents, allowing the user to move easily and naturally around + + the Internet. With Mosaic, users can browse through page after page of + + menus, hyperlinked to data dispersed all over the world, without + + having to know the location or network address of the information they + + are seeking. + + + + Spyglass has re-architected Mosaic so it will be a more robust and + + full-featured tool. Enhancements available in Enhanced NCSA Mosaic + + from Spyglass include improved installation, better memory management, + + increased performance, new forms capabilities, online hypertext-based + + help, support for a proxy gateway and user interface improvements such + + as support for multiple windows. Future versions will include enhanced + + security and authentication, which will enable credit-card and other + + business transactions to take place on the Internet; filters that will + + enable documents from popular document readers to be read seamlessly + + by Mosaic; and integration with emerging editing and document + + management tools. A number of businesses are already using Mosaic and + + WWW to publish magazines, deliver goods and services, provide + + technical support to customers and conduct other forms of business + + electronically. For example, Mosaic and WWW are part of the recently + + announced $12 million CommerceNet project, a public- and + + private-sector-backed initiative exploring various ways to conduct + + commerce over the Internet and other data networks. NCSA will continue + + to maintain a public-with-copyright version of Mosaic, which Internet + + users can download for free from the Internet. NCSA, which began + + distributing Mosaic in the late fall, estimates that more than one + + million people use Mosaic and that more than 30,000 copies are being + + downloaded each month. + + + + Spyglass will be targeting the following types of customers as initial + + prospects for large-scale Mosaic client licensing agreements: computer + + systems and communications vendors, publishers and content providers, + + and online information service providers. For example, a publisher + + might want to include Mosaic with a subscription to an online magazine + + or a computer vendor might want to include Mosaic with each system + + sold. By building WWW servers themselves and distributing Mosaic + + clients to their customers, businesses can easily use this system for + + communicating with customers, providing technical support, + + distributing product and marketing information and other kinds of + + commerce. + + + + Enhanced NCSA Mosaic from Spyglass will be available for Microsoft + + Windows and Apple Macintosh desktop computers this month and for X + + Windows computers in July. To navigate the Internet, Mosaic users + + require a direct connection to the Internet or a PPP or SLIP + + connection. Enhanced NCSA Mosaic from Spyglass will be priced + + aggressively for high-volume distribution, enabling licensees to + + incorporate Mosaic into their products and services for a modest + + cost. For more information about Enhanced NCSA Mosaic from Spyglass, + + contact Spyglass directly at (217) 355-6000, mosaic@spyglass.com or + + http://www.spyglass.com/. + + + + The National Center for Supercomputing Applications, based at the + + University of Illinois at Urbana-Champaign, is supported by grants + + from the National Science Foundation, other federal agencies, the + + State of Illinois, the University of Illinois and corporate partners. + + + + Founded in 1990, Spyglass, Inc. is the leading developer of visual + + data analysis tools for the engineering and scientific marketplace, + + which support Windows, Macintosh and UNIX platforms. The company's + + venture-capital partners include Greylock Management of Boston, + + Mass. and Venrock Associates of New York City. + + + + Spyglass is a registered trademark of Spyglass, Inc. All other brands + + or products are trademarks or registered trademarks of their + + respective holders and should be treated as such. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE REAL STORY + + + + By Carl Guderian (bjacques@cypher.com) + + + + The Real Story + + + + (The following report is a compilation of printed materials and transcripts + + of personal interviews conducted by the author(s). In the course of this + + exhaustive research we have come to feel that, given the controversial + + nature of the subject matter, it is best that the authors as well as their + + primary sources be kept confidential. Perhaps it is just as well, as the + + events depicted in the report are years or decades in the past. Many of the + + principals are retired or dead and, therefore, beyond any earthly reward or + + revenge. The author(s) may be dead, too. In this line of journalism, that is + + very likely. + + + + 1994, Leopold & Loeb, Media Consultants) + + + + + + Employee Motivation Seminars + + + + Employee motivational seminars are a modern management tool, predicated on + + the assumption that external motivation, whether carrot or stick or + + combination thereof, is insufficient to move employees to give 110% to the + + job; rather, internal motivation must be cultivated in the employees + + somehow. Motivational seminars, usually conducted by outside consulting + + firms, employ a variety of techniques, from survey questionnaires to group + + exercises to meditation. These seminars have become enormously popular since + + their introduction in the 1950s (mostly in sales-related fields then), as + + they present a real advance over basic reward/punishment systems (-Theories + + X and Y+) or even Frederick W. Taylor's scientific methods. More + + importantly, they have actually worked. Workplace productivity has markedly + + increased since the introduction of motivational seminars. + + + + However, no innovation is universally welcomed. Recently, deeply religious + + employees have begun to level serious accusations against motivational + + seminars, declaring the programs promote a socialistic or New Age ethic. A + + socialistic attitude, they argue, will lead otherwise sensible people to + + embrace a world government under the Anti-Christ, as predicted in the Book + + of Revelation in the Christian Bible (as interpreted by fundamentalist + + Christians). A related and more serious charge is that the meditation + + techniques (such as those used in the Krone program) open employees to + + possession by demons. The latter charge is the focus of this report. + + + + The diabolical connection is real. Employee motivational seminars did indeed + + spring from an arrangement between American industry and the Prince of + + Darkness. Satan respects Americans like he respects no other people because + + it was an American, Daniel Webster, who defeated him in court, using his + + wits. Others have beaten the Devil, but only through invoking the powers of + + Heaven, a tactic akin to bringing in grownups to restrain a schoolyard + + bully. American corporate executives cut a deal with the Devil to deliver + + the souls of underlings in exchange for the usual favors. Though the souls + + of corporate employees are industrial grade, and therefore not worth as much + + as the souls of the elite, an executive must deliver a number of them in + + exchange for infernal favors. Paradoxically, the worth of elite American + + souls has risen in direct proportion to the degradation in the worth of + + those of followers. The perfect mechanism for delivering B-grade souls by + + the bushel is, of course, an employee motivational seminar, in which large + + numbers of workers are possessed at once (By the way, television evangelists + + work the same way; their mass public healings are actually mass + + possessions). + + + + This cozy arrangement between American leaders and Satan has served both + + sides well. Demons consider possession of Americans to be a kind of working + + vacation, a welcome relief from tormenting the damned souls toiling + + eternally in the flaming dung-pits of Hell. Not that this isn't enjoyable + + work, but even a demon likes a change of scenery. Satan and his lieutenants + + can dole out plum earthside assignments for demonic devotion, thus + + reinforcing the infernal hierarchy. American leaders, of course, get the + + usual rewards of power, sexual potency (or firm breasts and derriere), and + + that Christmas bonus for boosting corporate productivity while laying off + + excess workers. + + + + Lately, however, the system's inherent problems have begun to manifest + + themselves. As motivational seminars have gained in popularity, they have + + increased the demand for demons. As the innovation has become more + + widespread, it has ceased to be a competitive advantage. In Hell, too, the + + system's success has presented similar problems, and Satan is now seems + + ready to pull out of the deal. + + + + The shortage of demons is a Hellish fact. Present-day demons, of course, are + + the same ones who participated in the original rebellion of Lucifer (now + + Satan). All the angels were created at once, and no new ones have been made + + since. The pool of demons, then, is a subset of that group. Occasionally a + + truly wicked soul is promoted to demon status, but equally often a demon is + + devoured by an angry superior (a la C. S. Lewis' The Screwtape Letters). On + + the whole, the supply of demons should be considered to be fixed. + + + + In the early years of the program, American executives were pleased to see + + their employees possessed by only the most hard-working demons. Today, + + however, all the good ones are taken. Latter-day possessions by demons of + + procurement fraud, office-supply theft, and general loafing on the job have + + taken their toll on the system. Worse, even the best and brightest demons + + seem to have gone native or become Americanized, becoming easily distracted + + by the attractions of our post-industrial society or falling dangerously + + into sympathy with the modern worker. One formerly trustworthy (!) demon + + was even caught committing workplace sabotage in solidarity with his + + co-workers! An embarrassed Satan had to deal personally with the matter. + + All in all, the phrase working like a demon has begun to lose its cachet. + + + + As more corporations jumped on the infernal bandwagon, they found that the + + employees of their competitors were performing equally well (or recently, + + equally poorly). Worse, as the quality of the everyday American soul has + + declined, many hapless executives have found themselves caught short. In one + + company, the worth of the workers' souls had fallen drastically between the + + signing of the contract and the possession of the workers. The contracting + + executive killed a fellow executive (who was his wife - also on the infernal + + take) over the shrinking soul pie at their company in order to hold up his + + end of the bargain, lest he be forced to hand over his own soul. It didn't + + help. The wife caught up with him in Hell. + + + + Meanwhile, in Hell the situation has also deteriorated. Eventually all + + demons have been recruited earthside, so the dream ticket has ceased to be a + + credible reward for exemplary effort. Furthermore, production in the Satanic + + Mills is down. Temporarily out of sight of their demon overseers, damned + + souls have begun shirking on the eternal job. + + + + By piecing together accounts channeled through trance mediums (leaks are now + + worse than ever!), the authors have been able to determine that Satan has + + begun revoking all contracts dealing with motivational seminars, releasing + + the possessed workers and taking back favors bestowed on contractees. This + + may partly explain the recent decline of the old industrial corporations in + + favor of information technology firms, in which traditional religious values + + are relatively absent. + + + + Thus, the era of employee motivation seminars seems to be drawing to a + + close. The heyday of private economic deals with the Devil seems to be over + + as well. Overheard executive conversatons reveal that Satan is simply not + + interested in any more such contracts. Though some may be tempted to see the + + above episode as another case of the power elite enlisting the powers of + + Hell to fuck over the little guy, they should look at the larger picture and + + realize the system seems to have taken care of itself according to the laws + + of the Free Market. The Invisible Hand really does seem to work. + + + + + + Postscript + + + + It now appears that Satan plans to compete in the world labor market after + + having seen the prevailing trend toward cheaper labor. He has an advantage + + over the Chinese, who lead the market using convict/slave labor. Political + + prisoners have to be fed bread and water and must be allowed 3 or 4 hours of + + sleep a day. The damned souls of Hell, of course, eat nothing and work + + tirelessly twenty-four hours a day, seven days a week. The Devil now knows + + quite a bit about management theory (in relation to his demonic supervisors) + + and wants to recall them to Hell to oversee the re-engineering of Hell's + + production lines. Modern world leaders thinking to hold off this development + + are doomed to failure. Hell has on its side such notables as Albert Speer, + + Josef Stalin, Adolf Eichmann, and Roy Cohn (to handle the legal work) and + + will soon have Henry Kissinger to handle international relations. Given a + + team like that, it's only a matter of time. + + + + Post-postscript + + + + The original (now void) contracts are sought-after collectors items, not the + + least for their blackmail value. Even when the signatories are beyond + + blackmail, as in the case of the aforementioned executive and his wife, + + their contracts are worth a lot simply as works of art. The Devil is a + + traditionalist at heart, and insists that contracts be handwritten by demons + + noted for their calligraphic skill and that the documents bear his seal and + + those of major demons acting as witnesses. The early contracts (pre-1983) + + are worth the most, as they are the most visually stunning and bear the + + names of America's best and brightest of the time, as well as the seals of + + Hell's best known demons and devils. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + + + LEGION OF DOOM T-SHIRTS!! Get 'em + + + + By Chris Goggans + + + +After a complete sellout at HoHo Con 1993 in Austin, TX this past + +December, the official Legion of Doom t-shirts are available + +once again. Join the net luminaries world-wide in owning one of + +these amazing shirts. Impress members of the opposite sex, increase + +your IQ, annoy system administrators, get raided by the government and + +lose your wardrobe! + + + +Can a t-shirt really do all this? Of course it can! + + + +-------------------------------------------------------------------------- + + + +"THE HACKER WAR -- LOD vs MOD" + + + +This t-shirt chronicles the infamous "Hacker War" between rival + +groups The Legion of Doom and The Masters of Destruction. The front + +of the shirt displays a flight map of the various battle-sites + +hit by MOD and tracked by LOD. The back of the shirt + +has a detailed timeline of the key dates in the conflict, and + +a rather ironic quote from an MOD member. + + + +(For a limited time, the original is back!) + + + +"LEGION OF DOOM -- INTERNET WORLD TOUR" + + + +The front of this classic shirt displays "Legion of Doom Internet World + +Tour" as well as a sword and telephone intersecting the planet + +earth, skull-and-crossbones style. The back displays the + +words "Hacking for Jesus" as well as a substantial list of "tour-stops" + +(internet sites) and a quote from Aleister Crowley. + + + +-------------------------------------------------------------------------- + + + +All t-shirts are sized XL, and are 100% cotton. + + + +Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for + +postage. + + + +Send checks or money orders. Please, no credit cards, even if + +it's really your card. + + + + + +Name: __________________________________________________ + + + +Address: __________________________________________________ + + + +City, State, Zip: __________________________________________ + + + + + +I want ____ "Hacker War" shirt(s) + + + +I want ____ "Internet World Tour" shirt(s) + + + +Enclosed is $______ for the total cost. + + + + + +Mail to: Chris Goggans + + 603 W. 13th #1A-278 + + Austin, TX 78701 + + + + + +These T-shirts are sold only as a novelty items, and are in no way + +attempting to glorify computer crime. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LIBERTARIAN PARTY ANNOUNCES OPPOSITION TO DIGITAL TELEPHONY ACT + + + + NEWS FROM THE LIBERTARIAN PARTY + + 1528 Pennsylvania Avenue SE + + Washington DC 20003 + + + + For additional information: + + Bill Winter, Director of Communications + + (202) 543-1988 + + + + + + + + Calling it a "serious infringement of civil liberties and a + + gross violation of property rights," the Libertarian Party National + + Committee unanimously voted to oppose the Digital Telephony and + +Communications Act of 1994. + + + + At their quarterly meeting in Kansas City, Missouri, the + + governing body of America's third-largest political party charged that + + "the Digital Telephony Act would make furnishing the FBI with easy + + wiretapping capability the overriding priority for designers of + + telephone equipment and related software." + + + + "It is a lie to call this legislation a 'Privacy Improvement + + Act,'" said Bill Evers, the National Committee member from California + + who sponsored the resolution. + + + + The Digital Telephony Act, noted the resolution, "requires + + telephone, cable television, and computer network companies to ensure + + that the government can conduct surveillance while private communication + + is going on. It requires the installation of surveillance-facilitating + + software in telephone switching equipment to expose personal information -- + + such as telephone-calling patterns, credit card purchases, banking + + records, and medical records -- to the view of the government." + + + + "Such personal information should be the private property of + + either the company that assembles it or the individual to whom it + + pertains," said Evers. + + + + Libertarians also oppose the Digital Telephony Act because it + + "would require a fundamental re-engineering of the communications + + infrastructure at great expense to American taxpayers, and to the + + owners of private communications systems," said Evers. + + + + The Libertarian National Committee also unanimously voted to + + oppose the National Security Agency's Escrowed Encryption Standard - + + the so-called Clipper Chip system - or any "government policies + + promoting or requiring specific encryption methods for civilian use." + + The party also urged the "repeal of the U.S. ban on export abroad of + + Clipper-free encryption devices produced by American companies." + + + + "Government-mandated encryption standards will foster + + indiscriminate surveillance of private communications by the + + government," charged Evers. + + + + The resolution said "the Clinton Administration plans to induce + + American manufacturers to install government-readable encryption devices + + in every telephone, fax machine, and computer modem made in the United + + States." + + + + "The Clinton Administration is explicitly denying that the + + American people have the right to communicate in private," said Evers. + + By contrast, he said, "The Libertarian Party has long upheld the civil + + liberties of the American citizen." + + + + Approximately 120 Libertarians serve in elected and appointed + + office around the country, including four State Representatives in New + + Hampshire and two mayors in California. The Libertarian Party platform + + calls for vigorous defense of the Bill of Rights, free enterprise, + + civil liberties, free trade, and private charity. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + + + + + UNABOM + + $1,000,000 Reward + + SERIES OF 14 UNSOLVED BOMBINGS + + + + + + William L. Tafoya, Ph.D. Special Agent, FBI + + UNABOM Task Force, San Francisco, CA (btafoya@orion.arc.nasa.gov) + + + + + + Beginning in May, 1978, a series of 14 bombing incidents have + + occurred across the United States for which there is no apparent + + explanation or motive. No person or group has been identified as + + the perpetrator(s) of these incidents. The explosions have taken + + place in seven states from Connecticut to California. As a result + + of these bombings, one person has been killed and 23 others + + injured, some grievously. There had been no incidents identified + + with this series of bombings since 1987. However that changed in + + late June, 1993, when a well known geneticist residing in Tiburon, + + California, and a renown computer scientist from Yale University, + + New Haven, Connecticut, opened packages which had been mailed to + + them and both were severely injured when these packages exploded. + + + + In the past, targets of the bomber have been associated with + + the computer industry, the aircraft and airline industry and + + universities. Seven of these devices have been mailed to specific + + individuals and the other seven have been placed in locations + + which suggest there was no specific intended victim. All but two + + of the explosive devices functioned as designed and exploded. All + + 14 crimes, dubbed "UNABOM", have had common effects: all have + + caused terror, grief, and fear. On September 11, 1985, Hugh + + Scrutton, the owner of the Rentech Computer Company, in + + Sacramento, California, was killed by one of these diabolic + + devices. The two most recent victims narrowly escaped death. + + + + In response to the June, 1993, events, the Attorney General + + directed that a task force of federal law enforcement agencies be + + reestablished to urgently investigate and solve these crimes. The + + UNABOM Task Force, consisting of investigators from the FBI, ATF, + + and the U.S. Postal Inspection Service, has been operational in + + San Francisco and Sacramento, California, since July 12, 1993, and + + is dedicated exclusively to the investigation of these crimes. + + + + Among the clues in the case are the following words in what + + appears to be a note possibly written by the bomber as a reminder + + to make a telephone call: "call Nathan R--Wed 7PM." The UNABOM + + Task Force believes that "Nathan R" may be associated, perhaps + + innocently, with the bomber and that "Nathan R" may have received + + a telephone call from the bomber on a Wednesday prior to the June, + + 1993 bombings. + + + + The two most recent tragic bombings illustrate the senseless + + and tragic consequences of these crimes and demonstrate the urgent + + necessity of solving this case. This serial bomber will strike + + again. We do not know who the next victim will be. We do believe + + that there is someone out there who can provide the identity of + + the person or persons responsible for these crimes. This person + + may be a friend, a neighbor, or even a relative of the bomber(s). + + + + UNABOM's chronology is as follows: + + + + 1) Northwestern University + + Evanston, Illinois + + May 25, 1978 + + + + A package was found in the Engineering Department parking lot + + at the Chicago Circle Campus of the University of Illinois. The + + package was addressed to an Engineering Professor at Rensselaer + + Polytechnic Institute in Troy, New York. The package had a return + + address of a Professor at Northwestern's Technological Institute. + + The package was returned to the addressor who turned it over to + + the Northwestern University Police Department because he had not + + sent the package. On May 26, 1978 the parcel was opened by a + + police officer who suffered minor injuries when the bomb + + detonated. + + + + 2) Northwestern University + + Evanston, Illinois + + May 9, 1979 + + + + A disguised explosive device which had been left in a common + + area in the University's Technological Institute, slightly injured + + a graduate student on May 9, 1979, when he attempted to open the + + box and it exploded. + + + + 3) Chicago, Illinois + + November 15, 1979 + + + + An explosive device disguised as a parcel was mailed from + + Chicago for delivery to an unknown location. The bomb detonated + + in the cargo compartment of an airplane, forcing it to make an + + emergency landing at Dulles Airport. Twelve individuals were + + treated for smoke inhalation. The explosion destroyed the + + wrapping to such an extent that the addressee could not be + + determined. + + + + 4) Chicago, Illinois + + June 10, 1980 + + + + A bomb disguised as a parcel postmarked June 8, 1980 was + + mailed to an airline executive at his home in Lake Forest, + + Illinois. The airline executive was injured in the explosion. + + + + 5) University of Utah + + Salt Lake City, Utah + + October 8, 1981 + + + + An explosive device was found in the hall of a classroom + + building and rendered safe by bomb squad personnel. + + + + 6) Vanderbilt University + + Nashville, Tennessee + + May 5, 1982 + + + + A wooden box containing a pipe bomb detonated on May 5, 1982, + + when opened by a secretary in the Computer Science Department. + + The secretary suffered minor injuries. The package was initially + + mailed from Provo, Utah on April 23, 1982, to Pennsylvania State + + University and then forwarded to Vanderbilt. + + + + 7) University of California + + Berkeley, California + + July 2, 1982 + + + + A small metal pipe bomb was placed in a coffee break room of + + Cory Hall at the University's Berkeley Campus. A Professor of + + Electrical Engineering and Computer Science was injured when he + + picked up the device. + + + + 8) Auburn, Washington + + May 8, 1985 + + + + A parcel bomb was mailed on May 8, 1985, to the Boeing + + Company, Fabrication Division. On June 13, 1985, the explosive + + device was discovered when employees opened it. The device was + + rendered safe by bomb squad personnel without injury. + + + + 9) University of California + + Berkeley, California + + May 15, 1985 + + + + A bomb detonated in a computer room at Cory Hall on the + + Berkeley Campus. A graduate student in Electrical Engineering + + lost partial vision in his left eye and four fingers from his + + right hand. The device was believed to have been placed in the + + room several days prior to detonation. + + + + 10) Ann Arbor, Michigan + + November 15, 1985 + + + + A textbook size package was mailed to the home of a + + University of Michigan Professor in Ann Arbor, Michigan from Salt + + Lake City. On November 15, 1985, a Research Assistant suffered + + injuries when he opened the package. The Professor was a few feet + + away but was not injured. + + + + + + 11) Sacramento, California + + December 11, 1985 + + + + Mr. Hugh Scrutton was killed outside his computer rental + + store when he picked up a device disguised as a road hazard left + + near the rear entrance to the building. Metal shrapnel from the + + blast ripped through Scrutton's chest and penetrated his heart. + + + + 12) Salt Lake City, Utah + + February 20, 1987 + + + + On February 20, 1987, an explosive device disguised as a road + + hazard was left at the rear entrance to CAAMs, Inc. (computer + + store). The bomb exploded and injured the owner when he attempted + + to pick up the device. + + + + 13) Tiburon, California + + June 22, 1993 + + + + On June 22, 1993, a well known geneticist received a parcel + + postmarked June 18, 1993, at his residence. The doctor attempted + + to open the package at which time it exploded severely injuring + + him. It has been determined that this parcel was mailed from + + Sacramento, California. + + + + 14) Yale University + + New Haven, Connecticut + + June 24, 1993 + + + + On June 24, 1993, a Professor/Computer Scientist at Yale + + University attempted to open a parcel which he had received at his + + office. This parcel exploded severely injuring him. It has been + + determined that this parcel was mailed from Sacramento, California + + on June 18, 1993. + + + + At this time, the UNABOM Task Force would appeal to the + + public for assistance. For this purpose, a one million dollar + + reward is being offered for information which results in the + + identification, arrest and conviction of the person(s) + + responsible. Contact the UNABOM Task Force at 1-(800) 701- + + 2662. + + + + + + + + William L. Tafoya, Ph.D. + + Special Agent, FBI + + UNABOM Task Force + + San Francisco, CA + + btafoya@orion.arc.nasa.gov + + + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + + + + + MASSACHUSETTS ENCRYPTION BILL + + + + + + THE STATE OF MASSACHUSETTS + + + + MASSACHUSETTS 179TH GENERAL COURT -- 1994 REGULAR SESSION + + + + HOUSE NO. 4491 + + BY MR. COHEN OF NEWTON, PETITION OF DAVID B. COHEN AND ANOTHER RELATIVE + + TO ESTABLISHMENT OF THE PRIVACY OF PERSONAL RECORDS LAW AND REGULATING THE + + TECHNOLOGY OF DATA ENCRYPTION. THE JUDICIARY. + + + + + + February 25, 1994 + + + + AN ACT RELATIVE TO THE TECHNOLOGY OF DATA ENCRYPTION. + + Be it enacted by the Senate and House of Representatives in General + + Court assembled, and by the authority of the same, as follows: + + + + SECTION 1. The General Laws are hereby amended by inserting after + + chapter sixty-six A the following chapter: + + + + CHAPTER 66B. MASSACHUSETTS PRIVACY OF PERSONAL RECORDS ACT. + + + + Section 1. For the purposes of this chapter the following terms shall + + have the following meanings: + + + + "Personal data files", any machine readable information or information + + in a state of electronic, optic, or other computer based transmission + + which is capable of being read, stored, copied, transmitted, changed, + + or deleted by or through computer or telecommunications devices and + + which relates to or describes any person, including a corporation, + + partnership or sole proprietorship, or such person's real or personal + + property. It shall include, but not be limited to, magnetic tapes, + + disks, cartridges, floppy disks, CD-ROM's, optical cubes or other + + optical storage devices, documents printed in magnetic ink or OCR + + symbol sets, and any other medium capable of being read or stored at + + high speed, in large volume, or without substantial human + + intervention. The term denotes the substance of the information as + + distinguished from the incidental medium of its storage or + + transmission. + + + + " Encrypted" , changed in form by programmed routines or algorithms so + + as to be unintelligible to any person without employing a suitable + + decryption routine or algorithm. + + + + "Decryption", the reverse process of encryption, so as to restore any + + data so encrypted to its original, human readable form. + + + + "Routine or algorithm", any series of discrete steps in a computer, + + microprocessor, or calculator native machine language which is + + performed as a unit to encrypt or decrypt data, or to present such + + decrypted data on an end user display medium; provided, however, that + + it shall not include source code written in any human readable + + language. + + + + "End user display medium", a video display terminal or paper. + + + + "Source code", any programming language used to produce the native + + machine language described in the definition of "routine or + + algorithm". + + + + "Authorized end user", any person, including a corporation, + + partnership, sole proprietorship, or governmental body for whose + + specific use the data in question is produced. If shall specifically + + exclude any person, including a corporation, partnership, sole + + proprietorship, or governmental body into or through whose possession + + said data may pass before reaching said authorized end user. + + + + "Numeric data", symbols representing exclusively quantities. It shall + + specifically exclude expressions containing number which represent + + nonnumeric entities including, but not limited to, social security + + numbers, license numbers, bank account numbers, street addresses, and + + the like. + + + + "Custodian", a person, including a corporation, partnership, sole + + proprietorship, or governmental body, that has access of any kind + + whatsoever to personal data files. + + + + "Live data", any personal data which currently represents or at any + + time in the past had represented any actual person, including a + + corporation, partnership, or sole proprietorship or such person's + + property. + + + + SECTION 2. Personal data files within the commonwealth shall be + + encrypted. + + + + SECTION 3. Decryption of encrypted data may be accomplished only by, + + for, or on behalf of the authorized end user of such data, and only to + + render such data into human readable form for the use of such + + authorized end user or an end user display medium. Any intermediate + + storage or transmission of decrypted data in machine readable form + + shall be a violation of this chapter. + + + + SECTION 4. Machine executable routines or algorithms used to decrypt + + encrypted data shall reside only in those routines or algorithms which + + present the data to authorized end users upon end user media. Source + + code for such routines or algorithms shall reside only at the situs of + + the authorized end user or at the situs of a party engaged in the + + development or maintenance of said source code. No party so engaged + + may use live data for any purpose whatsoever except as provided in this + + chapter. + + + + SECTION 5. Any copy, excerpt, summary, extension, transmission, or + + other transfer of any personal data, whether or not originally + + encrypted, shall be encrypted during such transfer until it reaches + + the authorized end user. + + + + SECTION 6. Notwithstanding any other provision of this chapter, + + numeric data may be stored in decrypted form during testing of summary + + or other numeric routines or algorithms in connection with development + + or maintenance of software whose purpose is the processing or display + + of such data for the use of the authorized end user, where such testing + + would be rendered impossible or unreasonably burdensome using + + encrypted data. For the purposes of this section, amounts used to + + calculate simple algebraic sums shall not qualify for decrypted storage + + under this section. + + + + SECTION 7. Notwithstanding any other provision of this chapter, any + + personal data which is stored and maintained exclusively or generally + + for the purpose of providing access to such data by the public shall be + + exempted for the encryption requirements this chapter. The exemption + + provided hereby shall extend to excerpts, and compilations of such + + data, however and by whomever used. Any and all other data from other + + sources which are not specifically exempted under this section or under + + sections nine or ten shall be encrypted, whether or not merged, + + appended, inserted, or otherwise attached to exempted data, and are + + subject to all of the provisions of this chapter in the same manner as + + if such exempted data did not exist. + + + + SECTION 8. Notwithstanding any other provision of this chapter, any + + routines or algorithms used for the decryption of encrypted data may + + be provided to the appropriate law enforcement agencies for the purpose + + of assuring compliance with various national, state, and local laws. + + For the purposes of this section, such law enforcement agencies shall + + be considered authorized end users. + + + + SECTION 9. Notwithstanding any other provision of this chapter, any + + person may waive the protections afforded by this chapter. Evidence of + + such waiver must be given in writing by such person to each custodian + + of data pertaining to said person. When more than one person is + + entitled to protection under this chapter, by virtue of joint ownership + + or other such relationship, no waiver shall be effective unless signed + + by all parties so involved. Such waiver shall be construed to waive + + protection only with respect to the specific kinds or elements of + + information enumerated on its face, and shall operate to exclude only + + encryption of said data by the particular custodian of such data as is + + named in said waiver and in whose possession to waiver is kept. The + + waiver may operate in perpetuity or be limited to a particular time. + + Any ambiguities in any waiver given under this section shall be + + resolved in favor of encryption of the most data colorable under its + + terms. + + + + SECTION 10. Notwithstanding any other provision of this chapter, + + decrypted data may be stored in a secure location apart from the situs + + of any user of such data, provided that the sole purpose to which such + + data shall be put shall be to restore data which has been lost or + + corrupted. Any routines or algorithms used to restore used files using + + said decrypted data shall employ encryption rountines or algorithms as + + required by this chapter. For the purposes of this section, decryption + + routines or algorithms may be considered lost or corrupted if a + + reasonable belief exists that security employed in the custody of such + + routines or algorithms has been breached. + + + + SECTION 11. Reasonable security shall be employed by persons in the + + management of the routines and algorithms used for the encryption and + + decryption of data, as required by this chapter. Such secuirty shall + + consist as a minimum in the storage of such routines and algorithms at + + one situs and the nature and location of its associated data at + + another. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + BOOK REVIEW: INFORMATION WARFARE + + CHAOS ON THE ELECTRONIC SUPERHIGHWAY + + By Winn Schwartau + + + + INFORMATION WARFARE - CHAOS ON THE ELECTRONIC SUPERHIGHWAY + + By Winn Schwartau. (C)opyright 1994 by the author + + Thundermouth Press, 632 Broadway / 7th floor / New York, NY 10012 + + ISBN 1-56025-080-1 - Price $22.95 + + Distributed by Publishers Group West, 4065 Hollis St. / Emeryville, CA 94608 + + (800) 788-3123 + + + + Review by Scott Davis (dfox@fennec.com) + + + + If you only buy one book this year, make sure it is INFORMATION WARFARE! + + In my 10+ years of existing in cyberspace and seeing people and organizatons + + debate, argue and contemplate security issues, laws, personal privacy, + + and solutions to all of these issues...and more, never have I seen a more + + definitive publication. In INFORMATION WARFARE, Winn Schwartau simply + + draws the line on the debating. The information in this book is hard-core, + + factual documentation that leaves no doubt in this reader's mind that + + the world is in for a long, hard ride in regards to computer security. + + The United States is open to the world's electronic terrorists. + + When you finish reading this book, you will find out just how open we are. + + + + Mr. Schwartau talks about industrial espionage, hacking, viruses, + + eavesdropping, code-breaking, personal privacy, HERF guns, EMP/T bombs, + + magnetic weaponry, and the newest phrase of our generation... + + "Binary Schizophrenia". He exposes these topics from all angles. If you + + spend any amount of time in Cyberspace, this book is for you. + + + + How much do you depend on technology? + + + + ATM machines, credit cards, toasters, VCR's, televisions, computers, + + telephones, modems...the list goes on. You use technology and computers + + and don't even know it! But the point is...just how safe are you from + + invasion? How safe is our country's secrets? The fact is - they are NOT + + SAFE! How easy is it for someone you don't know to track your every move + + on a daily basis? VERY EASY! Are you a potential victim to fraud, + + breech of privacy, or general infractions against the way you carry + + on your daily activities? YES! ...and you'd never guess how vulnerable + + we all are! + + + + This book will take you deep into places the government refuses to + + acknowledge. You should know about INFORMATION WARFARE. Order your + + copy today, or pick it up at your favorite book store. You will not + + regret it. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WHISPER WHO: A Unix tool + + + + Here is a handy little tool for you to use on your Unix machine. Follow the + + instructions provided! + + + + -------cut here-------------------cut here---------------cut here------------ + + + +/***************************************************************************** + + * This program can be changed without too much trouble to a program * + + * that logs everybody in and out of a system. Need to add * + + * signal(SIGHUP,SIG_IGN) to it though, so it continues after you are gone. * + + * This program whispers to you when somebody logs on or off, and is pretty * + + * hard to kill. ( you have to send SIGKILL to kill this one.) * + + * As is right now, it will not stay active after you logoff. To prevent * + + * annoying anyone, just put it in your .profile. * + + * * + + * CUT THIS PART OUT OF THIS FILE AND NAME THE TEXT: wwho_1.c * + + * * + + * To compile: cc -o wwho wwho_1.c * + + * or gcc -o wwho wwho_1.c * + + *****************************************************************************/ + + + +#include + +#include + +#include + +#include + +#include + +#include + + + +#define MAXPROCESSES 40 + + + +struct utmp who[MAXPROCESSES]; /* list of all rembered users on-line */ + +struct utmp u[MAXPROCESSES]; /* list of all users in the utmp file */ + +int counter = 0; /* number of users in memory */ + + + +void sig_hand(int sig) { + + register int x; + + x=0; + + switch(sig) { + + case 15: signal(SIGTERM,sig_hand); + + case 3: signal(SIGINT,sig_hand); + + for(x=0; x=2) prio = atoi(argv[1]); /* if arg, then new prio = arg */ + + if(argc < 2) prio = 20; /* if no arg, then prio = 20 */ + + pid = fork(); /* create new process */ + + if(pid==-1) { /* Cannot create new process error */ + + printf(": cannot create process\n"); + + exit(-1); + + } + + + + if(pid > 0 ) { /* if initial program then print intro and exit */ + + + + printf(": Wisper Who is now in effect.\n"); + + printf(": Created process id %i\n",pid); + + exit(0); /* exit copy of program that YOU ran */ + + } + + nice(prio); /* make low priority, be nice */ + + signal(SIGQUIT,SIG_IGN); /* Ignore QUIT signal */ + + signal(SIGINT,sig_hand); /* ignore INTERRUPT signal */ + + signal(SIGTERM,sig_hand); /* Ignore TERMINATE signal */ + + + + while(1) { /* Main part of program. Never ends */ + + int x; + + register int y; + + + +if((u_handle = open("/etc/utmp",O_RDONLY))==-1) { /* open utmp for reading */ + +printf(": Cannot Open /etc/utmp\n"); /* error in opening */ + +exit(0); + + } + + + + + + x = 0; /* reset thr number of utmp entries to 0 */ + + + + while(read(u_handle,&u[x],sizeof(u[x])) != 0) { /* Read utmp file + + * until EOF */ + +if(u[x].ut_type == USER_PROCESS) { /* if not an user, then read next entry */ + +z = new_user(x); /* check to see if new */ + +if(z==1) warn_em(x,0,0); /* if new, then warn */ + + } + + x++; + + if(x>=MAXPROCESSES) { /* TOO many process logged in. */ + + printf(": Error -- More process are running than there are spaces\n"); + + printf(": Error -- allocated for.\n"); + + printf(": Error -- change 'MAXPROCESSES xx' to 'MAXPROCESSES %i'.\n",x+10); + + exit(-1); /* Quit */ + + } + + } + + + + close(u_handle); /* close utmp */ + + + + for(z=0; zWhen the conversation began to become controversial and conflicting ideas + + >were pecking, the boys and the girls who think like boys, would + + >type in an /ignore all neutopia messages so that I was blocked from + + >the public dialogue. + + + + >It is time that women be acknowledged as the natural sovereigns of the + + >species so that we will be in a position to use our knowledge and + + >wisdom we have in creating a world where all our benevolent dreams + + >find a way to self-actualize. + + + + Girls who think like boys? Natural soverigns of the species? + + + + It seems hypocritical that the author complains of experiencing + + ostracism for voicing her feminist beliefs and then goes on to make + + such exclusionary statements herself. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE EASY-TO-USE SOLVE THE KENNEDY ASSASSINATION THEORY CHART + + + + By Gordon Fagan (flyer@fennec.com) + + + + Instructions: + + Write down the total # of persons involved. Then write down the approximate + + frame number of the Zapruder film that matches where you believe each shot + + occurred. Then it's a simple matter of going through the list and putting + + an X under each shot number and beside each item that applies to that + + particular shot. If it doesn't apply, mark nothing. If the item applies + + but not to any particular shot number, then use the 0 shot#. Mark it with + + an X for "conspiracy to kill" or an "O" for involved in the coverup (:It + + also comes in handy for the "a tiger got him" crowd.:) I've tried to be as + + thorough as possible, but to make sure everything was covered, I did leave + + an "others" category with a fill-in-the-blank at the end of each section. + + As for the exactness of your answers, use as close of approximations as you + + feel comfortable with. Include all overlap, ie: if you believe Oswald fired + + shot #4 but was under the command/control of Naval Intelligence - mark + + Oswald and Naval Intelligence for shot #4. For simultaneous shots, give + + them both the same frame number. It's pretty much self-explanatory once + + you get into it. Enjoy. + + + + + + The JFK Conspiracy Theory Outline Form + + ---------------------------------------------------------------------------| + + Total number of persons involved + + ---------------------------------------------------------------------------| + + Conspiracy to Assassinate: __________ + + ---------------------------------------------------------------------------| + + Conspiracy to Coverup: __________ + + ---------------------------------------------------------------------------| + +||||Shot# Reference line|||||||| 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | + +----------------------------------------------------------------------------| + +Approx. Zapruder frame of shot#| | | | | | | | | | + +----------------------------------------------------------------------------| + +-------(:note: if you believe in more than 8 shots, see your doctor:)-------| + +shot# fired from: + + (0 means spotter/involved non-shooter) + +----------------------------------------------------------------------------| + +TSBD-6th floor - east end | | | | | | | | | | + +----------------------------------------------------------------------------| + +TSBD-6th floor-other | | | | | | | | | | + +----------------------------------------------------------------------------| + +TSBD-roof | | | | | | | | | | + +----------------------------------------------------------------------------| + +TSBD-other | | | | | | | | | | + +----------------------------------------------------------------------------| + +GK-black dog man position | | | | | | | | | | + +----------------------------------------------------------------------------| + +GK-badgeman position | | | | | | | | | | + +----------------------------------------------------------------------------| + +GK-other | | | | | | | | | | + +----------------------------------------------------------------------------| + +Dal-Tex | | | | | | | | | | + +----------------------------------------------------------------------------| + +Dal. County Records Bldg | | | | | | | | | | + +----------------------------------------------------------------------------| + +Dallas County Court Bldg | | | | | | | | | | + +----------------------------------------------------------------------------| + +storm drain | | | | | | | | | | + +----------------------------------------------------------------------------| + +umbrella man | | | | | | | | | | + +----------------------------------------------------------------------------| + +other:_______________________ | | | | | | | | | | + +----------------------------------------------------------------------------| + +other:_______________________ | | | | | | | | | | + +----------------------------------------------------------------------------| + + + +shot# Fired by: (Include all overlap) + + (0 means involved in/knew about but fired no shots) + +----------------------------------------------------------------------------| + +Lee Harvey Oswald | | | | | | | | | | + +----------------------------------------------------------------------------| + +Cuban (anti-Castro) | | | | | | | | | | + +----------------------------------------------------------------------------| + +Cuban (pro-Castro) | | | | | | | | | | + +----------------------------------------------------------------------------| + +Russian (anti-communist) | | | | | | | | | | + +----------------------------------------------------------------------------| + +Russian (KGB/Pro-communist) | | | | | | | | | | + +----------------------------------------------------------------------------| + +Marseille professional | | | | | | | | | | + +----------------------------------------------------------------------------| + +other professional | | | | | | | | | | + +----------------------------------------------------------------------------| + +Mafia | | | | | | | | | | + +----------------------------------------------------------------------------| + +CIA | | | | | | | | | | + +----------------------------------------------------------------------------| + +FBI | | | | | | | | | | + +----------------------------------------------------------------------------| + +Naval Intelligence | | | | | | | | | | + +----------------------------------------------------------------------------| + +Lyndon Johnson | | | | | | | | | | + +----------------------------------------------------------------------------| + +Clay Shaw | | | | | | | | | | + +----------------------------------------------------------------------------| + +David Ferrie | | | | | | | | | | + +----------------------------------------------------------------------------| + +Roscoe White | | | | | | | | | | + +----------------------------------------------------------------------------| + +J.D Tippit | | | | | | | | | | + +----------------------------------------------------------------------------| + +Jack Ruby | | | | | | | | | | + +----------------------------------------------------------------------------| + +umbrella man | | | | | | | | | | + +----------------------------------------------------------------------------| + +George Hickey (S.S) - AR-15 | | | | | | | | | | + +----------------------------------------------------------------------------| + +William Greer (S.S) - driver | | | | | | | | | | + +----------------------------------------------------------------------------| + +nazis | | | | | | | | | | + +----------------------------------------------------------------------------| + +UFO's/MJ-12,etc. | | | | | | | | | | + +----------------------------------------------------------------------------| + +government conspiracy/coverup | | | | | | | | | | + +----------------------------------------------------------------------------| + +non-govt. conspiracy/coverup | | | | | | | | | | + +----------------------------------------------------------------------------| + +other:_______________________ | | | | | | | | | | + +----------------------------------------------------------------------------| + +other:_______________________ | | | | | | | | | | + +----------------------------------------------------------------------------| + + + +shot# to hit: + +----------------------------------------------------------------------------| + +John Kennedy | | | | | | | | | | + +----------------------------------------------------------------------------| + +John Connally | | | | | | | | | | + +----------------------------------------------------------------------------| + +James Tague | | | | | | | | | | + +----------------------------------------------------------------------------| + +grass | | | | | | | | | | + +----------------------------------------------------------------------------| + +sidewalk/road | | | | | | | | | | + +----------------------------------------------------------------------------| + +limousine | | | | | | | | | | + +----------------------------------------------------------------------------| + +street sign | | | | | | | | | | + +----------------------------------------------------------------------------| + +targetting "rice" bag | | | | | | | | | | + +----------------------------------------------------------------------------| + +other:_______________________ | | | | | | | | | | + +----------------------------------------------------------------------------| + +other:_______________________ | | | | | | | | | | + +----------------------------------------------------------------------------| + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + The original Hacker Crackdown text file, hacker.crackdown, has been expanded + + and worked upon, and is now available in many formats, including ASCII (as + + before), TeX DVI, PostScript, etc. Look in: + + + + ftp://ftp.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/ + + gopher://gopher.eff.org/00/Publications/Bruce_Sterling/Hacker_Crackdown/ + + http://www.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/ + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + MEEKS DEFENSE FUND + + + +From Meeks Defense Fund + +Subject: Details on Brock Meeks Case + + + +Dear Net Citizen: + + + + The recent Internet posting launching a fund raising drive in + + order to help Brock Meeks defray the legal expenses of a lawsuit + + brought against his news wire, CyberWire Dispatch, has drawn + + several inquiries for a summary of the issues involved in this + + case. In response, we have put together the following summary. + + (Please note, too, that the case was featured in the April 22 + + (Fri.) issue of the Wall St. Journal (page B1)) + + + + Sometime during February of this year, an electronic solicitation + + began appearing on the Internet from a company identified only as + + the "Electronic Postal Service" (EPS). + + + + The solicitation from EPS said the service, "will pay you money + + to receive commercial e-mail. EPS estimates you will be paid an + + average of 6.5 cents per commercial e-mail message. It is + + estimated that the average commercial e-mail receiver can make + + $200.00 to $500.00 a year and likely more. There is absolutely + + no charge, periodic charge, hourly charge or phone charge to + + receive or review EPS commercial e-mail. The sender bears all of + + the cost. + + + + You are provided with a free EPS mailbox and you may access this + + EPS mailbox through a toll free phone number so there are no + + phone line charges... In addition... EPS offers you... full + + Internet access including network Internet e-mail remote log-in, + + file transfer capability and much more." + + + + To sign up you were required to call an 800 number or send for + + information to the EPS Internet account (eps@world.std.com). You + + had to include your name and address. + + + + Brock called and asked for the EPS information. It never came. + + Instead, he received an unwanted and unsolicited direct mailing + + from a company called Suarez Corporation Industries (SCI). The + + mailing came in the form of a 6 page letter signed by Benjamin + + Suarez. That mailing claimed that for a price of $159, Suarez + + would send you a book and software that could help you create a + + "net profit generation system" capable of earning anywhere from + + $30,000 to $1 million per year. + + + + Brock began investigating why he received the SCI mailing and + + soon found out that Suarez had obtained his name from the request + + for EPS information. More investigation found that the EPS + + account was registered to Suarez Corporation Industries. Brock + + then looked into the background of this company. + + + + During his investigation into SCI, Brock discovered that state + + and federal enforcement agencies had brought actions against SCI + + result of their direct mailing practices. + + + + In his article, Brock expressed his personal disapproval of the + + SCI business activities. SCI objected to the article and has + + filed a defamation lawsuit claiming Brock made defamatory remarks + + and sought to disparage his products "and otherwise tortiously + + (sic) interfere with the plaintiff's ability to develop" EPS. + + Suarez claims the Dispatch article lost him business and he is + + seeking compensatory and punitive damages and demanding an + + injunction to block Brock from writing further about SCI or its + + founder, Benjamin Suarez. + + + + The April 22 (page B1) issue of the Wall St. Journal says lawsuit + + "is one of the first U.S. libel cases to arise out of the + + free-for-all on the Internet... If it succeeds, some legal + + experts say it could spawn other complaints." + + + + For those who don't know Brock, he has a long history as a + + journalist writing in the on-line field, having written for Byte, + + Wired and other journals over the years. He lives and works + + today in the Washington, D.C. area writing during the day for a + + communications trade journal. Cyberwire Dispatch is his own + + creation. The suit against him was filed in Ohio. Without + + the generous offer of legal support from his current lawyers, who + + have offices in Ohio, Brock's situation would be even more dire. + + + + The Meeks case raises legal issues that may have far-reaching + + implications for freedom of speech and free expression on the + + internet. If journalists are unable to pursue important + + investigative issues without fear of reprisal, then + + all of us will suffer. This is exactly the type of chilling + + effect hat the First Amendment was intended to avoid and the + + reason we need your support. + + + + Of course defamation laws are to be applied to the Net, but how + + they are applied -- and this case will be an important first step + + in that process -- could determine just how open and free people + + will feel to speak their minds. + + + + This is NOT a case in which a writer on the Internet has, in + + fact, libeled someone else. Brock absolutely denies the charges + + against him. And every lawyer that Brock has consulted and + + looked at the text Brock wrote, and the charges against him, + + believe that he ha not written anything that can fairly be + + characterized as libelous. + + + + The Legal Defense Fund is formed to assure that Brock is well + + defended. + + + + As a reminder, contributions can be made in two ways, either + + tax-deductible or non-deductible. + + + + A special thanks goes to the Point Foundation for agreeing early + + on in the process to assist in organizing and serving as a + + collection agent for the Fund. + + + + + + If you have any questions, you can contact the Fund at + + Fund@idi.net. + + + + + + For tax-deductible contributions send those checks to: + + + + Meeks Defense Fund + + c/o Point Foundation + + 27 Gate Five Road + + Sausalito, CA 94965 + + + + For those who don't care about the tax deductible status, send + + contributions to: + + + +Meeks Defense Fund + + c/o IDI + + 901 15th St. NW + + Suite 230 + + Washington, DC 20005 + + + +THE BROCK MEEKS DEFENSE FUND COMMITTEE + + + + Samuel A. Simon + + President, Issue Dynamics, Inc.* + + ssimon@idi.net + + + + John Sumser + + Editor/Executive Director + + Whole Earth Review/ Point Foundation + + jrsumser@well.sf.ca.us + + + + Mitch Kapor + + Chair, Electronic Frontier Foundation* + + mkapor@eff.org + + + + David Farber + + The Alfred Fitler Moore Professor of Telecommunications Systems + + University of Pennsylvania* + + farber@central.cis.upenn.edu + + + + Philip Elmer-DeWitt + + Senior Writer + + TIME Magazine* + + ped@panix.com + + + + Marc Rotenberg + + Electronic Privacy Information Center* + + Rotenberg@epic.org + + + + Nicholas Johnson + + Former FCC Commissioner* + + 1035393@mcimail.com + + + + Jerry Berman + + Electronic Frontier Foundation* + + jberman@eff.org + + + + Mike Godwin + + Electronic Frontier Foundation* + + + +#################################################################### + +# Meeks Defense Fund | Internet: fund@idi.net # + +# ---------------------------------------------------------------- # + +# c/o IDI c/o Point Foundation # + +# 901 15th St. NW 27 Gate Five Road # + +# Suite 230 Sausalito, CA 9465 # + +# Washington, DC 20005 # + +#################################################################### + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + HACKERS ON PLANET EARTH + + + + From: Emmanuel Goldstein (emmanuel@well.sf.ca.us) + + To: Editors@fennec.com + + + + HACKERS ON PLANET EARTH + + + + The First U.S. Hacker Congress + + + + Yes, it's finally happening. A hacker party unlike anything ever seen + + before in this country. Come help us celebrate ten years of existence + + and meet some really interesting and unusual people in the process. + + We've rented out the entire top floor of a midtown New York hotel, + + consisting of several gigantic ballrooms. The conference will run + + around the clock all weekend long. + + + + SPEAKERS AND SEMINARS: Will there be famous people and celebrity + + hackers? Of course, but the real stars of this convention will be + + the hundreds of hackers and technologically inclined people journeying + + from around the globe to share information and get new ideas. + + That is the real reason to show up. Seminars include: + + social engineering, cellular phone cloning, cable TV security, + + stealth technology and surveillance, lockpicking, boxing of all sorts, + + legal issues, credit cards, encryption, the history of 2600, + + password sniffing, viruses, scanner tricks, and many more in the + + planning stages. Meet people from the Chaos Computer Club, Hack-Tic, + + Phrack, and all sorts of other k-rad groups. + + + + THE NETWORK: Bring a computer with you and you can tie into the huge + + Ethernet we'll be running around the clock. Show off your system and + + explore someone else's (with their permission, of course). We will + + have a reliable link to the Internet in addition. Finally, everyone + + attending will get an account on our hope.net machine. We encourage + + you to try and hack root. We will be giving away some valuable prizes + + to the successful penetrators, including the keys to a 1994 Corvette. + + (We have no idea where the car is, but the keys are a real + + conversation piece.) Remember, this is only what is currently planned. + + Every week, something new is being added so don't be surprised to find + + even more hacker toys on display. We will have guarded storage areas + + if you don't want to leave your equipment unattended. + + + + VIDEOS: We will have a brand new film on hackers called + + "Unauthorized Access", a documentary that tells the story from + + our side and captures the hacker world from Hamburg to Los Angeles + + and virtually everywhere in between. In addition, we'll have + + numerous foreign and domestic hacker bits, documentaries, + + news stories, amateur videos, and security propaganda. There + + has been a lot of footage captured over the years - this will + + be a great opportunity to see it all. We will also have one + + hell of an audio collection, including prank calls that put + + The Jerky Boys to shame, voice mail hacks, and even confessions + + by federal informants! It's not too late to contribute material! + + + + WHERE/WHEN: It all happens Saturday, August 13th and Sunday, + + August 14th at the Hotel Pennsylvania in New York City + + (Seventh Avenue, between 32nd and 33rd Streets, right across + + the street from Penn Station). If you intend to be part of + + the network, you can start setting up Friday night. + + The conference officially begins at noon on Saturday and will + + run well into Sunday night. + + + + ACCOMMODATIONS: New York City has numerous cheap places to stay. + + Check the update sites below for more details as they come in. + + If you decide to stay in the hotel, there is a special discounted + + rate if you mention the HOPE Conference. $99 is their base rate + + (four can fit in one of these rooms, especially if sleeping bags + + are involved), significantly larger rooms are only about $10 more. + + Mini-suites are great for between six and ten people - total cost + + for HOPE people is $160. If you work with others, you can easily + + get a room in the hotel for between $16 and $50. + + The Hotel Pennsylvania can be reached at (212) PEnnsylvania 6-5000 + + (neat, huh?). Rooms must be registered by 7/23/94 to get the + + special rate. + + + + TRAVEL: There are many cheap ways to get to New York City in August + + but you may want to start looking now, especially if you're coming + + from overseas. Travel agencies will help you for free. Also look in + + various magazines like Time Out, the Village Voice, local alternative + + weeklies, and travel sections of newspapers. Buses, trains, and + + carpools are great alternatives to domestic flights. Keep in touch + + with the update sites for more information as it comes in. + + + + WANTED: Uncommon people, good music (CD's or cassettes), creative + + technology. To leave us information or to volunteer to help out, + + call us at (516) 751-2600 or send us email on the Internet at: + + 2600@hope.net. + + + + VOICE BBS: (516) 473-2626 + + + + INTERNET: + + info@hope.net - for the latest conference information + + travel@hope.net - cheap fares and advisories + + tech@hope.net - technical questions and suggestions + + speakers@hope.net - for anyone interested in speaking at the + + conference + + vol@hope.net - for people who want to volunteer + + + + USENET NEWSGROUPS: + + alt.2600 - general hacker discussion + + alt.2600.hope.announce - the latest announcements + + alt.2600.hope.d - discussion on the conference + + alt.2600.hope.tech - technical setup discussion + + + + REGISTRATION: Admission to the conference is $20 for the entire weekend + + if you preregister, $25 at the door, regardless of whether you stay for + + two days or five minutes. To preregister, fill out this form, enclose $20, + + and mail to: 2600 HOPE Conference, PO Box 848, Middle Island, NY 11953. + + Preregistration must be postmarked by 7/31/94. This information is only + + for the purposes of preregistration and will be kept confidential. Once + + you arrive, you can select any name or handle you want for your badge. + + + + NAME: _______________________________________________________________ + + + + ADDRESS: ____________________________________________________________ + + + + CITY, STATE, ZIP, COUNTRY: __________________________________________ + + + + PHONE (optional): ____________ email (optional): ____________________ + + + + IMPORTANT: If you're interested in participating in other ways or + + volunteering assistance, please give details on the reverse side. + + So we can have a better idea of how big the network will be, please + + let us know what, if any, computer equipment you plan on bringing and + + whether or not you'll need an Ethernet card. Use the space on the back + + and attach additional sheets if necessary. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + TV & MOVIE MANIA RADIO SHOW HITS THE INFORMATION SUPERHIGHWAY + + + + By Lauren Weinstein (lauren@vortex.com) + + + + LOS ANGELES -- In a first for an entertainment-oriented show, a + + version of the popular "Professor Neon's TV & Movie Mania" radio + + program begins worldwide distribution directly to listeners this + + week via the Internet (or as it is becoming popularly known, + + the "Information Superhighway"). + + + + "The Internet now includes over 20 million users in more than 30 + + countries, and is growing at an enormous rate," pointed out the + + show's producer, Lauren Weinstein of Vortex Technology. + + "Professor Neon's TV & Movie Mania has also broadcast via + + over-the-air stations, but it's apparent that the time has finally + + arrived when the global facilities of the Internet can bring this + + audio show to an even wider audience. Nobody has ever used the + + Internet to transmit a show like this before," he added. + + + + "Professor Neon's TV & Movie Mania" is a unique show which + + features a look at a broad universe ranging from classic to + + current television, films, and videos, with a special emphasis on + + the unusual, odd, silly, strange, bizarre, cult, surreal, and + + weird. The shows include reviews, interviews, and a wide range of + + special audio clips, trailers, and many other features. + + + + The interview guest for the debut Internet version of the show is + + Robert Justman, a man whose work has greatly influenced classic + + television programs ranging from "The Outer Limits" (on which he + + was assistant director) to both the original "Star Trek" and "Star + + Trek: The Next Generation" (on which he was associate producer and + + co-producer, respectively). Many of the most familiar aspects of + + these programs were the result of his ideas, and he speaks + + candidly with the show's enigmatic host, Professor Neon, about the + + production of these programs in this fascinating interview. + + + + Professor Neon has featured programs focusing on topics ranging + + from "Plan 9 From Outer Space" (with guest "Vampira" who starred + + in the classic cult film), to Forrest J. Ackerman (publisher of + + "Famous Monsters" magazine), to shows focused on topics from "The + + Twilight Zone" to "The Three Stooges". + + + + The half hour Internet version of the program is being distributed + + biweekly on the Internet via the Internet Multicasting Service in + + Washington D.C., on the "Internet Town Hall" channel, and is also + + available as a file for retrieval by any Internet user from the + + many Internet Multicasting / Internet Talk Radio archive sites + + around the world. Users retrieving the audio files can then play + + them on virtually any workstation, PC, Mac, or other computer + + with even simple audio facilities. + + + + The most recent show, as well as other information regarding the + + program, can also be heard by calling Professor Neon's TV & Movie + + Mania Machine" on (310) 455-1212. + + + + The Internet version of the show is freely distributable via + + computer networks and BBS systems. Use by over-the-air + + broadcasters requires the permission of Vortex Technology. For + + more information regarding accessing the show via the Internet, + + please use the contact below. Inquiries regarding other access + + and versions of the show for broadcast use are also invited. + + + + CONTACT: Lauren Weinstein at Vortex Technology, Woodland Hills, CA. + + (818) 225-2800 (9:30-5:30 PDT) + + lauren@vortex.com + + + + Notes to Internet folks: + + + + Information regarding the show, including current guest schedule, etc. + + is also available via FTP from site "ftp.vortex.com" (in the "tv-film-video" + + subdirectory) or via gopher from site "gopher.vortex.com" (under the + + "TV/Film/Video" menu item). + + + + For a list of Internet Multicasting Service / Internet Talk Radio archive + + sites to obtain (via FTP) the audio file for playback, send a message + + (content is not important) to: + + + + sites@radio.com + + + + The debut of the Internet version of the show will run via Internet + + Multicast from Interop on Thursday, May 5. FTP to site "ftp.media.org" + + or "www.media.org" for schedule information. The audio file of the show + + should become available in the archive sites for retrieval within a few + + days, though exact timing is variable. The filenames will probably + + be "mania1.au" for the audio and "mania1.txt" for the accompanying + + descriptive text file, though the archive maintainers may change + + the names at some point to fit their overall naming system. If you + + have trouble locating the files after a few days, please let us know. + + If you have any other questions regarding the program, feel free to + + email or call. + + + + In two weeks, our interview guest for the next show will be Joel Engel, the + + author of the definitive Rod Serling biography: "The Dreams and Nightmares + + of Life in the Twilight Zone," and of the newly released and highly + + controversial new book, "Gene Roddenberry: The Myth and the Man + + Behind Star Trek." + + + + If you have any questions for Mr. Engel please email them to: + + + + neon@vortex.com + + + + as soon as possible. Thanks much! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + +. + diff --git a/textfiles.com/magazines/JOAUC/jauc05.txt b/textfiles.com/magazines/JOAUC/jauc05.txt new file mode 100644 index 00000000..394e4a98 --- /dev/null +++ b/textfiles.com/magazines/JOAUC/jauc05.txt @@ -0,0 +1,4644 @@ + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically + + ====================================================================== + + ISSN 1074-3111 Volume One, Issue Five August 1, 1994 + + ====================================================================== + + + + Editor-in-Chief: Scott Davis (dfox@fc.net) + + Co-Editor/Technology: Max Mednick (kahuna@fc.net) + + Consipracy Editor: Gordon Fagan (flyer@fennec.com) + + Information Systems: Carl Guderian (bjacques@usis.com) + + Computer Security: John Logan (ice9@fennec.com) + + + + ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC + + + + U.S. Mail: + + The Journal Of American Underground Computing + + 10111 N. Lamar #25 + + Austin, Texas 78753-3601 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + IMPORTANT ADDRESSES - + + ============================================================================ + + To Subscribe to "TJOAUC", send mail to: sub@fennec.com + + All questions/comments about this publication to: comments@fennec.com + + Send all articles/info that you want published to: submit@fennec.com + + Commercial Registration for Profitable Media: form1@fennec.com + + Advertising Rates: rates@fennec.com + + ============================================================================ + + + + "The underground press serves as the only effective counter to a growing + + power, and more sophisticated techniques used by establishment mass media + + to falsify, misrepresent, misquote, rule out of consideration as a priori + + ridiculous, or simply ignore and blot out of existence: data, books, + + discoveries that they consider prejudicial to establishment interest..." + + + + (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Contents Copyright (C) 1994 The Journal Of American Underground Computing + + and/or the author of the articles presented herein. All rights reserved. + + Nothing may be reproduced in whole or in part without written permission + + of the Editor-In-Chief and/or the author of the article. This publication + + is made available periodically to the amateur computer hobbyist free of + + charge. Any commercial usage (electronic or otherwise) is strictly + + prohibited without prior consent of the Editor, and is in violation of + + applicable US Copyright laws. To subscribe, send email to sub@fennec.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + DISCLAIMER AND NOTICE TO DISTRIBUTORS - + + + + NOTE: This electronic publication is to be distributed free of charge + + without modifications to anyone who wishes to have a copy. Under NO + + circumstances is any issue of this publication, in part or in whole, + + to be sold for money or services, nor is it to be packaged with other + + computer software, including, but not limited to CD Rom disks, without + + the express written or verbal consent of the author and/or editor. + + To obtain permission to distribute this publication under any of the + + certain circumstances stated above, please contact the editor at one of + + the addresses above. If you have intentions of publishing this journal + + in any of the ways described above, or you are in doubt about whether or + + not your intentions conflict with the restrictions, please contact the + + editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com + + This publication is provided without charge to anyone who wants it. + + This includes, but is not limited to lawyers, government officials, + + cops, feds, hackers, social deviants, and computer hobbyists. If anyone + + asks for a copy, please provide them with one, or mail the subscription + + list so that you may be added. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LET THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING ADVERTISE FOR YOU. + + + + Computer services, Online access, Books, Software, Video, Music, + + Wierdness, Publishing, Hardware, Anything! + + + + For more information, send electronic mail to: rates@fennec.com + + You will be mailed a detailed list of rates and other information. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + COMING SOON!!! The Journal's own World-Wide Web Home Page. You will be + + notified by mail when it is ready for use. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 5 + + + + TABLE OF CONTENTS + + + + 1) The Next Thirty Years: Sociolegal Implications + + Of The Information Technology Explosion Steve Ryan + + + + 2) Advertising On The Net Fawn Fitter + + 3) Availability Of TJOAUC; Overseas Fido Gateways Editors + + 4) Cyberpasse Manifesto Don Webb + + 5) AA BBS Convicted! Anon News Svc + + 6) Open Platform Under Threat By Monopoly Interests Anonymous + + 7) House Opens Vote Results; HR 3937 Shabbir Safdar + + 8) High-Speed Internet Access Expanded; Minnesota Dennis Fazio + + 9) Internet Access Now Available For All Minn. Teachers Dennis Fazio + + 10) Legion Of Doom T-Shirt Ad Chris Goggans + + 11) White House Retreats On Clipper Stanton McCandlish + + 12) Why Cops Hate Civilians Unknown + + 13) Public Space On Info Highway Ctr. Media Ed. + + 14) Software Key Escrow - A New Threat? Tim May + + 15) Hoods Hit The Highway Charlotte Lucas + + 16) The Internet And The Anti-Net Nick Arnett + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + The Computer Is Your Friend -Unknown + + Send Money, Guns, And Lawyers -H. S. Thompson + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE NEXT THIRTY TEARS: SOCIOLEGAL IMPLICATIONS + + OF THE INFORMATION TECHNOLOGY EXPLOSION + + + + By Steve Ryan (blivion@nuchat.sccsi.com) + + + + [EDITOR'S NOTE: This is facinating reading! It is a college thesis + + written by an attorney who is a friend of the JAUC staff. Please + + keep in mind that it was written in *1980* and is a fantastic + + and accurate look into the future from his perspective in 1980. + + Feel free to mail the editors with any comments on this one and + + especially feel free to drop Steve a note with your opinions.] + + + + + + I do romance the law. It's alive, it's vibrant, its' bubling. Every time + + society tries something, we have new laws. + + + + --Hon. Jack Pope, Associate Justice Supreme Court of Texas + + + + INTRODUCTION + + + + The purpose of this paper is twofold. First, an attempt is made to + + acquaint the reader with current trends in computer technology which are + + likely to have a major impact on American life in the forseeable future, + + and to provide an overview of the staggering dimensions of the information- + + handling revolution now in progress. Second, the response of the American + + legal system to this explosive growth in the application of computer + + technology is examined critically and areas of current and future legal + + concern are outlined. No attempt has been made to provide an in-depth + + legal analysis of the current state of the law in any single area; + + the reader in search of such is reffered to the numerous excellent legal + + periodicals presently published in this field. + + + + I. DATA-HANDLING SYSTEMS OF THE FUTURE + + + + It is difficult to overstate the rapidity oand magnitude of the + + technological advances occurring every year in the data processing industry. + + New developments and applications of those developments are announced with + + bewildering rapidity. Enormous amounts of dollars are poured into research + + and development every year by the American data processing industry, and + + the pace of change is so rapid that those who work with customers must keep + + current or risk having their knowledge and skills become obsolescent within + + a year or two. + + + + HARDWARE + + + + This near-exponential rate of technical progress can be quantiativley + + expressed through several different conceptual "handles." The number of + + additions per second performed by computers in the U.S. every year grew by + + three orders of magnitude (factor 1,000) between 1955 and 1965, and again + + by the same factor in the decade 1965-1975. This number appears to be still + + growing at the rate of 100% per year. Between 1955 and 1975 C. P. U. + + memory size shrank by over four orders of magnitude (factor 10,000) and + + this trend continues. Speed of operation has been rising more linearly, + + at the rate of two orders of magnitude (factor 100) per decade, and the + + ultimate limiting speed (dictated by the speed with which the electrical + + impulses propagate through conductors) is still almost two and a one-half + + orders of magnitude away. The cost of computer storage devices is plunging + + at the rate of nearly three orders of magnitude per decade. The density + + with which intergrated circuit chips can be packed with electronic + + components is now measured in the millions devices per square inch. It + + has been projected that during this decade the percentage of the gross + + national product contributed by the data processing industry (broadly + + defined) will outstrip that contributed by the auto industry. + + + + COMMUNICATIONS + + + + Similar advances have been occurring in the communications industry, + + slashing the cost of maintaining computer-to-user and computer-to-computer + + information links. The major trends are development of satellite, fiber + + optic, and laswer methods of data transmission. As initially developed, + + the cost to lease a 900-channel transponder on a satellite was between on + + and one-half and two million dollars per year. In the first half of this + + decade , this cost is expected to drop to $250,000 per year. The greatest + + expense of satellite utilization is the cost of placing it in orbit; this + + will become cheaper by at least this tak. The new generation of satellites + + launched by reusable shuttle will offer a greater number of data channels + + and perform switching functions as well as relay tasks; and all of this + + greatly reduced cost. Annual growth of data communiccations through the + + middle of this decade is projected to be 35 percent. Additionally, federal + + deregulation of and new competitor entry into the communications industry + + is expected to lower data communications costs in the future. + + + + ECONOMICS + + + + This author believes that the rapidly falling costs of computer hardware + + and data links carry tremendous implications for the future. Economic + + barriers to computer utilization are falling, and the end result will be + + an exlosive profilferation of small personal and business computers and + + intelligent terminals in an incredible variety of application. The + + structure of business relations and transactions will change radically + + as corporate America discovers that they cannot afford not to utilize + + the new technology. + + + + It will simply become bad business to process most transactions through + + human hands and the mails in the form of paper of documents, when powerful + + microprocessors having large memories are available for literally pennies + + per chip. Speed-of-light datalinks cheaply available for these machines + + will eliminate time lags as a source of inefficiency and boost productivity. + + + + PERSONAL COMPUTING + + + + The same factors that make widespread use of data handling equipment + + inevitable in the business world will also have the effect of placing + + small, cheap computers by the millions in nonbusiness or personal + + applications. Computers are possibly the most versatile tool human beings + + have ever invented to extend their capabilities. Because they deal with + + pure information, their potential applications are limitless, or rather + + limited only by the ingenuity of their users. Nowhere is this more + + evident than in the brand-new field of personal computers. For better or + + worse, the personal computer revolution is upon us. The first true + + personal computer was brought out in 1974 by M.I.T.S. Corporation. + + Baded on the Intel 8080 Comuter-on-a-chip, the Model T of microprocessors, + + it was sold by mail in kit form for $420.00. Customer response was + + overwhelming, and M.I.T.S. was unable to to keep up with demand. At the + + time of this writing, six years later, the American consumer is the + + target of an enormous marketing effort for similar small computers mounted + + by such corparate giants as Texas Instruments, Tandy Corp. (Radio Shack), + + Sears & Roebuck, and a host of smaller competitors. Clearly, these + + corporations believe in the market for and future of home computing enough + + to back their beliefs with large capital investments. + + + + The home computer, with appropriate interfaces and accessory hadware, can + + play games, balance its owner's checkbook, optimize household energy usage, + + play music, store information, show movies, do typing, draw pictures, + + give its owner access to any database or other systems accessible by phone, + + send mail, and let the cat out. Some enthusiasts predict that the home + + computer will remake our way of life as drastically as the automobiles, and + + will be the most explosive consumer product in human history, having a more + + revolutionary effect than any other object ever sold. it is also predicted + + that home and personal uses of computers will dwarf the ordinary computer + + industry within five or ten years, and will do IBM great economic harm by + + destroying the IBM-fostered image of computers as enormous, centralized, + + horrendouly expensive machines requiring the services of a band of devoted + + priest-programmers. These things remain to be seen. This author believes + + that the most profound effects on American society created by the + + microcomputer revolution will not be the result of dedicating small + + computers to specific business and personal tasks but rather will result + + from the ability of these countless small C.P.U.'s to communicate with + + one another economically. + + + + THE CONCEPT OF "THE NET" + + + + In recent years, as communication technology began to catch up with advanced + + computer technology, a trend toward distributed computation has occured in + + systems design. Instead of a massive central computer linked to many + + unitelligent I/O terminals, this new method of system architecture links + + a number of central processing units into a network in which tasks can be + + distributed to different locations for maximum efficiency in processing. + + Networks are very efficient method of processing where the amount of + + processing needed increases faster than the amount of data to be + + transferred, and where a common specialized resouce is shared among + + geographically desperesed end users. Minicomputers linked into centralized + + computers in some applications, and they can be linked in such a manner that + + individual minicomputers can fail without affecting the operational status + + of the network. + + + + Given the above-forecasted situation of millions of small business and + + personal computers linked by common inexpensive communications channels, + + it is easy to see how a gigantic, highly flexible meta-network of + + minicomputers could be said to exist. The terms "network" and "distributed + + processin" have customarily been used to refer to relatively small, + + tightly interfaced groups of processors and are thus inadequate to use in + + reference to such a huge complex of computers as would be formed by the + + potential linkage of all the home and business computers of America. + + Therefore the term "The Net" will be used in this paper to refer to such + + a potential structure. This term has already gained currency with some + + writers who are concerned with the social implicaitons of such an + + electronic network. + + + + Persons who are fearful of suspicious of the advent of The Net for whatever + + reason, and persons who doubt that such a broadly-based and widely linked + + national (and transnational) EDP system wil become an operational reality + + in the near future will no doubt be suprised and/or dismayed to learn + + that two private information utilities which demonstrate the feasibility + + and usefulness of the Net concept are already on line and available to + + minicomputer users today. These are The Source and MicroNet, both about a + + year old. These services are accessed through telephone lines, which will + + be the primary method of Net linkage until new technology make satellite- + + based or fiber optic linkage economically competitive with ordinary + + landline and microwave channels. Accessing these services augments the + + computing power and usefulness of a home computer to and amazing extent. + + By linking to a large mainframe, the small ones gain the power to program + + in many languages ordinarily unavailable to them and gain the use of + + utility programs such as word processors and text editors. Large libraries + + of generally applicable business and financial programs and data are + + available to subscribers, as well as stock market information. Also + + available are game programs, UPI news wire service, New York Times news + + service, and the New York Times Consumer Data Base, which abstracts over + + 60 publications. + + + + The flexibility and broad utility of even these fledgling Net Linkage + + systems is demonstrated by other revolutionary services information + + utilities offer. The Source offers electonic mail service to its + + subscribers; when users log on, the system notifies them of any messages + + or mail it is holding for them. Users of the Source can also call a program + + named CHAT, which enables direct two-way between any users simultaneously + + logged on. MicroNet offers a fasicinating computerized version of CB radio + + in which the user selects a numbered "Channel" which, in effect is a + + "public airwave" of this small Net. All users linked on the same channel + + receive every message transmitted on that channel; they can either join + + the discourse or remain passive and watch the coversations of others on + + their CRT. A disadvantage is that like CB, two users cannot transmit on + + the same channel simultaneously without mutual interference. + + + + The Source and MicroNet are privately operated for profit and charge the + + subscriber for registration as a user and access time. An alternative + + mode of linking isolated home computers is provided by Computer Community + + Bulletin Boards (CCBBS), of which there are well over one hundred operating + + now in the U.S. These are free services operated by a variety of small + + computer users and related organizations, and are rapidly growing in + + popularity. Unlike the information utilities, which have phone exchanges in + + most large cities and therby spare their users high connect charges, CCBB + + users must pay long distance charges unless the usefulness of CCBBs is + + that no two-way communication is possible, only message posting within + + the system. The software package needed to establish a CCBB costs only + + about $65. + + + + One final, rather ominous aspect of the commercial information utilities + + is that it is required of applicants for user status to have a + + Mastercharge or Visa card account for billing purposes. In other words, + + person without identity in the presently existing credit subnet are denied + + access to these new private Net components. As the Net incorporates more + + data-handling subunits into itself and becomes more ubiquitous in American + + life, it may strike users as unfair and coercive to discover that routing + + one's financial transactions through the Net is a necessary prerequisite + + to enjoying certain limited uses and benefites of The Net. + + + + It is impossible to summarize or secribe all potential structures and + + applications of the net likley to impact our society in the future because + + of the amorphousness inherent in its conceptualization. For example, + + although every EDP device capable of linking to the Net must be considered + + a part of it, this linage may be "broad" or "Narrow": a sensitive + + Government EDP file system with heavy security would be only narrowly + + accessible from other Net components, whereas an individual's personal + + computer would of necessity be broadly accessible form almost all other + + Net components because of the wide variety of functions it performs (mail, + + entertainment access, retail buying and recordkeeping, phone message + + functions, etc.). As each new Net subunit goes online to the common Net, + + that subunit must determine (1) what it wants from the rest of the Net, + + and (2) what it is willing to make available to those who can now access + + it as part of the net. Thus, considerations of function and security + + determine what role each subunit will play in relation to The Net as a + + whole, and these considerations will be different for each subunit. + + The net must not be thought of as monolithic block of EDP devices joined + + together, but rater as a vast and turbulent population of dicrete subunits + + whose only common characteristic is a need for the efficient communication + + and optimal use of EDP technology provided by The Net's linkage. + + + + The Net will be far more than a group of computers exchanging data and + + software; widespread acceptance and utiliztion of Net linkage and + + effieciency concepts will probably eventually result in the routing of + + most current non-EDP methods of information transfer through the omnipresent + + microcomputers. It will become inefficient and unnecessary to have a TV + + set, or a newspaper, or a mailbox, or a radio in one's house when + + comprehensive Net access through an efficient, centralized home computer + + (whose sole design function is information handling) is just a keystroke + + away. One theme which home computer/Net enthusiasts frequently sound these + + days is that the Net will solve the petroleum crisis by making ti largely + + unnecessary for people to leave their homes. Why drive to an office when + + one can transact business, give a lecture, attend a class, generate + + documents, transfer information, access a huge variety of data bases, and + + receive all communications at one's home keyboard? The Net has the + + potential of becoming America's primary avenue of business and even social + + interaction in the forseeable future. + + + + One troubling question occurs as we examin the social consequence of the + + Net ethic of efficiency as the ultimate justification for change: what + + happens to individuals who, for economic or personal reasons, cannot or + + will not participate in the net society? Unless non-net modes of + + information handling are retained in all areas of Net pre-eminence, these + + individuals run the risk of effectibely becoming non-persons. One + + solution to this problem would be govermental maintenece of free public + + computer terminals, where those unfortunate enough to lack the cash or + + hardware necessary for net access could perform the necessary interactions + + with their electronic society. Hopefully, net Participants will keep open + + non-net channels of comminication to forestall the possiblity that the + + information revolution will create two classes of American citizens: + + Net-priviledged and invisible. Property utilized, The Net can be + + beneficial in countless ways. But even if its use becomes a new norm, + + legal protection is necessary to ensure that no citizen suffers injury or + + diadvantage as a result of failing to join The Net. This writer believes + + that economic considerations related to efficiency and the technology + + revolution now occurring cannot fail to propel us willingly down the road + + to a Net society, even in the face of the vague hostility most people feel + + toward the increasing intrusion of computers into their lives. The day + + may yet come when The Net is so central to American life that a person + + excluded from access to it by State action might successfully argue in + + court that his Constitutional rights to freedom of speech and assembly + + have been effectively abrogated. + + + + + + II. AREAS OF CONTINUING LEGAL CONCERN + + + + PRIVACY + + + + Privacy will continue to be a controversial issue as computer technology + + increases in impact on the daily life of Americans. The magnitude of the + + perceived threat to individuals created by computer recordkeeping will + + increase as the system-to-system network of computer linkages expands. + + The scope of future Federal protective legislation will almost certainly + + extend to regulate private data collectors as well as governmental ones. + + + + Efforts have already been made in this direction. In 1974, Congressional + + legislation was proposed containing provisions making all private personal + + record systems subject to F.O.I.A.- type controls on collection, accuracy, + + and dissemination. This bill also set up a Federal Privacy Board to + + monitor and enforce its provisions, and provided criminal penalties for + + its violation as well as vibil remedies for persons injured by unfair + + information practices. + + + + The gradual development of a Net-Type structure of data processors and + + their associated databases will surely result in extreme public concern + + about its possible harmful uses. It is thus a certainty that such a + + system would be very heavily regulated by the congress under its commerce + + and "federal media" powers. In fact, it is impossible to conceive of how + + the public would tolerate the existence of such an intimidating system + + without detailed privacy controls on it. The Privacy Act of 1974 is only + + the first halting step toward the creation of a comprehensive code of fair + + information practices necessary to let Americans enjoy the benefits of + + advanced computer technology without fear. + + + + + + PROTECTION OF ECONOMIC INTERESTS + + + + Since copyright protection of proprietary computer software is inadequate + + to protect novel ideas and algrorithms incorporated therein, and since + + the patenablility of software has been effectively denied by Supreme Court + + ruling, further protection of substantial financial investments made in + + the development of software would seem to be necessary in the future. + + Common law and State statutory protection of such programs as trade secrets + + will probably be inadequate in many respects to afford the degree of + + protection necessary to encourage heavy corporate investment in software + + research and development, as the industry grows in importance to all areas + + of economic life. Public policy will militate that further protection + + be granted by explicit statutory means. The most logical way to go about + + this would be by act of Congress, under either of the broad copyright or + + commerce powers. + + + + Congress has already realized that the trend toward the use of Electronic + + Funds Transfers and the computerization of economic activity will present + + unknown problems in the future. Current EFT legislation in force has + + established a commission charged with the duty of evaluating the future + + development of this area and reporting to the congress its findings and + + conclusions. Present legislation concering EFT can only be considered a + + skeleton of what will eventually prove necessary. + + + + + + THE PROBLEMS OF ABUSE AND VULNERABILITY + + + + The wide linkage capabilities of the components of The Net coupled with + + the computerization of business records and transactions creates an + + enormous potential for abuse in a variety of ways. Theft of CPU time and + + software, manipulation of financial records, destruction of datafiles, + + and even sabotage of whole systems are just a few of the potential abuses + + that might occur. Computer people often see the compromise of a security + + system designed to prevenet unauthorized access as a challenging + + intellectual game, and try it even without criminal motive. Already, one + + consequence of wide use of timesharing and networking techiniques is the + + widespread acceptance of the ethic that any programs which may be found to + + be somehow accessible from remote terminals can be treated as used as if + + in the public domain (the "Peninsula Ethic"). Security problems are the + + number-one concern in the design and establishment of The Net. The Net + + concept is unworkable without means of controlling access and limiting + + possible manupulations of data contained in Net subunits. Due to its + + flexibility of linkage, security control in the Net will not be physical + + in nature but will be provided by confidential coding and password + + techniques. Although generally speaking, what one person can do, another + + can undo, new "trapdoor" cryptological techniques have been discovered + + that make it possible to create an access control code system that cannot + + be cracked even by computers in a reasonable amount of time. This offers + + hope for the feasibility of a fairly abuse-free Net. + + + + Still, no security system can be said to be totally proof against + + compromise. Prevention of abuse is the job of computer sercurity + + specialist, but the law can play a large role in discouraging abuse by + + imposing sanctions for it. The currecnt Federal criminal law provisions + + applicable to computer abuse are a hodge-podge of miscellaneous statutes + + generally oriented around traditional fraud and misappropriation-of- + + property concepts that often present difficulties in application to + + computer-related wrongful activity. In the future it will become necessary + + to greatly refine our collective societal concepts of what contitutes + + impermissible conduct in relation to computers and their manifold + + applications. The deterrent effect on persons tempted to misuse the vast + + capbilities of computers would be greatly enhanced by the passage of + + legislation targeted specifically at computer abuse rather than framed in + + terms of traditional concepts of wrongdoing like fraud, theft, and + + misappropriation. Prosecutors, when confronted by an instance of computer + + abuse that clearly has damaged someone in a criminal manner, should not be + + forced to search among and "stretch" the applications of the miscellaneous + + batch of statutory provisions enacted when computers were a laboratory + + curiosty. + + + + Response to this problem has been made be Senator Abraham Ribibcoff of + + Connecticut, the Charman of the Senat Governmenatal Affairs Committee. + + In 1977, he sponsered legislation entitled The Federal Computer Systems + + Protection Act of 1977,which has never been enacted. This proposed law + + provides comprehensive santions against (1) introduction of fraudulent + + records into computer systems, (2) improper alteration of destruction of + + computer records, (3) unauthorized use of computer facilities, and (4) use + + of computers to steal property of data. The bill was drafted to apply to + + all computer systems used in interstate commerce, and not just those in + + use by the Federal Governmet. Additionally, the measure eases the + + jurisdictional and evidentiary burdens on prosecutors that make prosecution + + of computer crime so difficult. Specific thought was given by the framers + + of this legislation to the problems of unauthorized access and to the need + + to assure the integrity of the growing EFTS network. This bill is an + + outstinding attempt to deal now with the computer abuse problems that will + + become increasingly more threatening in the future, and it is an excellent + + example of how the response of the legal system should aggressively track + + the pace of technological development. + + + + CONCLUSION + + + + The next thirty years will be a time of swift and revolutionary change in + + American life related to computer usage on an uprecedented scale. At this + + point in time, the emerging outline of the social and legal changes this + + will inevitably cause are visible. The first halting steps have been + + taken by congress to enact legislation dealing with the problems caused + + by these changes, but the pace of progress is so rapid that there is + + substantial time lag between the time a problem comes into existence and + + the time our legal system turns its attention to the necessary solution. + + This lag time must be reduced by increased awareness of the capabilities + + and coming applications of computers on the respective parts of legislators, + + attorneys, and judges; it is the duty of the legal system to serve the + + needs of its society, and our society cannot wait until tomorrow to be + + given the legal safeguards and processes it needs today in the area of + + data processing. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + ADVERTISING ON THE NET + + + + By Fawn Fitter (fsquared@netcom.com) + + This article is copyright 1994 by Fawn Fitter + + + + A cybersavvy business owner could be forgiven for thinking of the + + Internet as an advertising opportunity like no other. After all, the Net, + + with its 6,000 discussion groups known as "newsgroups," connects -- at + + last count -- 2 million sites in 60 countries. That's 10 million + + potential customers already self-sorted into 6,000 demographic slots, a + + thought to make marketing executives weep with joy. + + + + But while many commercial online services like CompuServe and Prodigy + + have built electronic shopping malls where virtual vendors peddle their + + wares, advertising is a touchy subject on the Internet itself. + + + + Originally, commercial messages were banned on the government-funded + + portions of the Net. Today, while they aren't forbidden, they are still + + highly controversial. A practice known as "spamming" -- posting a message + + to all 6,000 newsgroups at once -- has infuriated longtime citizens of + + cyberspace. + + + + Not long ago, two Phoenix attorneys "spammed" the Net with a long post + + touting their expertise in U.S. immigration law. Mere weeks later, + + another advertiser followed suit, shilling thigh-reducing cream in every + + group from alt.pagan to comp.sys.mac.advocacy. Both were kicked off their + + respective Net access providers for inappropriate use. + + + + "The problem is not content, it's the appropriateness of the forum where + + the ad appears," explained Mike Godwin, staff counsel for the Electronic + + Frontier Foundation, which focuses on public interest and civil liberties + + issues as they relate to computer communications. "The value of the + + newsgroups lies in their being organized by subject matter. 'Spamming' is + + like reshelving all the books in a library -- the information is there, + + but it's impossible to find what's valuable." + + + + Although indiscriminate salesmanship is frowned upon, there are still + + ways to advertise online without crossing the bounds of netiquette. The + + simplest way is to keep ads short and tasteful, indicate in their subject + + headers that they are advertisements so people can skip them if they so + + choose, and post them only to appropriate groups. In other words, a legal + + advice newsgroup is the wrong place for an ad for couples workshops. + + + + Signature files, which provide a tagged-on signature (or .sig, pronounced + + "dot-sig") at the end of a user's post, are another inoffensive and + + discreet way to promote a product or service provider. Many programmers + + and consultants identify themselves in their .sigs, which are + + automatically appended to their every post in any group they frequent. + + + + The now-infamous "green card lawyers" have been dumped unceremoniously + + from several online systems and have been refused accounts by others. + + Despite the furor against them, they've defended their actions in + + postings and newspaper articles by claiming that mass-distributed + + advertising on the Net is convenient and therefore inevitable. They've + + even started their own Internet marketing company, Cybersell, to bring + + that day closer. One of the lawyers argued on CNN that "spamming" was + + like "picking up the newspaper and getting advertisements along with the + + sports pages." + + + + But Howard Rheingold, author of The Virtual Community and a well-known + + defender of the Net, thinks it's more like "going to your mailbox and + + finding two letters, a magazine, and 65,000 pieces of junk mail, + + postage-due." + + + + The Net works because people agree to give each other the minimal amount + + of cooperation necessary to keep information flowing in a free but + + organized way, Rheingold explained. "IIf people don't abide by an + + agreement to limit discussion to the appropriate group, the groups lose + + their function, and there will be no value in the system any more," he + + said. But, he added, "the day will pass when sleazebags who try to take + + advantage of the openness of the system will be shut out." + + + + Rheingold is executive editor of HotWired, an online magazine being + + launched this fall by the publisher of WIRED. HotWired will bring in + + revenue by soliciting "sponsors" rather than "advertisers," as the Public + + Broadcasting System does, he said. + + + + In the future, advertisers may also spread the word by subsidizing + + people's net usage, Godwin said. "They may say, 'look at our ads in + + e-mail and we'll give you an hour's free online time'," he speculated. + + "No one's actually done it yet, but companies are thinking about it." + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + AVAILIBILITY OF THIS MAGAZINE + + A Message from the editorial staff + + + + OVERSEAS FIDONET GATEWAYS NO LONGER SUPPORTED BY THIS MAGAZINE! + + + + We will do everything in our power to get this publication to you in + + a timely manner. And we certainly appreciate the hundreds of subscription + + requests that we have received. There is one slight issue regarding the + + distribution of this magazine that we must address. This new policy will + + take effect immediately. + + + + It is no longer feasable for us to add people to the mailing list who have + + OVERSEAS FIDONET GATEWAYS. The reason for this is that some administrators + + who operate these gateways are getting irate with the amount of traffic + + coming through their systems from the USA in the form of large electronic + + magazines. + + + + AS LONG AS YOUR E-MAIL ADDRESS DOES NOT HAVE A "%" IN IT, YOU'RE OK! + + + + The second reason is that our mailing system may not handle the address + + line properly due to the fact that Fido addresses overseas are usually + + very long. + + + + We are currently working on a way to set up an automatic mailing list + + for those who do fit into this catagory so that you can have the magazine + + mailed back to you when you know that the traffic in your area will be low. + + We will update you as the situation develops. + + + + Thank you for your understanding. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CYBERPASSE MANIFESTO + + + + By Don Webb (0004200716@mcimail.com) + + This has no Copyright, and may be reposted at will. + + + + We have long awaited the moment to release our manifesto, so that we would + + not appear guilty of the sin of vanguardism. Since Bart Nagle has noted + + that book publishers now note books bearing the suffix "Cyber" in the + + title passe, we realize that it is time to strike while the iron is cooling. + + The Cyberpasse movement began on October 8, 1966 when the BBC aired *The + + Tenth Planet* -- part of their popular %Dr. Who% series. The Cybermen have + + replaced their natural bodies with plastic and thus have become disease free + + and nearly immortal. They represent the ideal of the Cyberpasse movement. + + Cyberpasse will overtake cyberpunk, because we created it as a front. + + The movement has great wealth and power, and is an open conspiracy. Any + + number may play, provided that they obey the Cyberlaws. We are the rulers + + of the world, the makers of the zeitgeist, and the oatmeal of reality. + + + + These are the Cyberlaws, the key to Cyberpasse: + + + + 1. You must own a computer. It must be a boring computer with lots of + + capacity for upward and downward networking. You favorite phrase is + + "The computer is a tool." You must pretend incompetence with your + + computer, so that people explain things for you, and do things for you. + + Thus you learn to tap the skills of lots of experts. + + + + 2. You must belong to a frequent flyer plan. You'll travel a lot to see + + other Cybermen. You must own a futon to put up traveling Cybermen. + + You must make your visitors look as boring as possible, so as not to + + tip off your neighbors that you are a planetary ruler. + + + + 3. You must appear dull. This is essential. Everyone must view you as a + + harmless amateur. You must practice perfect manners, so you don't get + + thrown out of places for being too dull. + + + + 4. You must foster a myth of a long-term illness. + + Thusly you can call in sick for work, whenever a learning opportunity + + presents itself. Knowledge is power. + + + + 5. You must You must place yourself in the middle of various webs of + + information. Always share information, but always filter to extend + + the Cybervalues of logic, and of slow and steady change. You must deny + + that you are trying to improve the world, as always appear to be a + + shambling slow witted machine that just happens to pass along the + + correct information at one time. Remember humans are hostile to change + + agents. + + + + 6. You must make sure that they're a lot of cutting edge movements around + + to draw fire. As a long term way to secure this, be sure and strongly + + support civil liberties issues. + + + + 7. You must always deny the importance of new information technologies. + + This is not to stifle, but to make people think they are harmless. Always + + argue that there is nothing new going on. This will make people, less + + likely to fear/resist certain changes. + + + + 8. You must act every day to bring about the change into a cybersociety. + + Each act must may be downplayed, but it must be constant and quiet. + + Accumulate power to make your actions a little stronger. Afterall the + + boss can OK the T1 phone lines for the business, and she can allow + + personal Email accounts. Always have a boring explanation, economy, + + efficiency, whatever. But be sure you never allow a step backward. + + + + 9. You must deny there is an organized Cyberpasse movement. Even to + + yourself. + + + + 10. You must seek allies in all areas of society. + + + + 11. You must never act in anger, but only with logic + + and harmonious feelings. Our battles are not the day to day battles + + of the news. Our battle is that of the vegetable empire vast and slow. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + AA BBS - CONVICTED ! + + + + MEMPHIS, Tenn -- A federal jury convicted a California couple Thursday + + of transmitting obscene pictures over a computer bulletin board. + + + + The case has raised questions, in this age of international computer + + networks, about a 1973 U.S. Supreme Court ruling that defines obscenity + + by local community standards. + + + + ``This case would never have gone to trial in California,'' defense lawyer + + Richard Williams said. + + + + Prosecutor Dan Newsom, an assistant U.S. attorney, said the trial was the + + first he knows of for computer bulletin board operators charged under federal + + law with transmitting pornography featuring sex by adults. + + + + Robert and Carleen Thomas, both 38, of Milpitas, Calif., were convicted of + + transmitting sexually obscene pictures through interstate phone lines via + + their members-only Amateur Action Bulletin Board System. + + + + The Thomases were convicted on 11 criminal counts, each carrying maximum + + sentences of five years in prison and $250,000 in fines. + + + + Thomas was acquitted on a charge of accepting child pornography mailed to him + + by an undercover postal inspector. + + + + The Thomases refused to comment after the verdict. They remain free on + + $20,000 bond to await sentencing, for which no date was set. + + + + Williams said his clients will appeal, arguing the jury was wrongly + + instructed on how to apply the Supreme Court's standard on obscenity. + + + + The trial raised questions of how to apply First Amendment free-speech + + protections to ``cyberspace,'' the emerging community of millions of + + Americans who use computers and modems to share pictures and words on every + + imaginable topic. + + + + Williams argued unsuccessfully before trial that prosecutors sought out a + + city for the trial where a conservative jury might be found. + + + + During the weeklong trial jurors were shown photographs carried over the + + Thomases' bulletin board featuring scenes of bestiality and other sexual + + fetishes. Williams argued this was voluntary, private communication between + + adults who knew what they were getting by paying $55 for six months or $99 + + for a year. + + + + Their conviction also covers videotapes they sent to Memphis via United + + Parcel Service. The videotapes were advertised over the bulletin board. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + OPEN PLATFORM UNDER THREAT BY MONOPOLY INTERESTS!!! + + + + Anonymously Submitted + + + + First off, I apologise for sending this anonymously, but my company is + + sufficiently close to the center of this dispute that the usual personal + + disclaimers would not be enough. We have to do business with these people + + and public criticism of them could lead to disconnexion and the collapse of + + our business. + + + + Recently the CIX Association (a Non-Profit 501(c)6 Trade Association) has + + chosen to make a change to its policies that will make entry into the + + internet extremely hard if not impossible for small companies or individuals + + or cooperatives. + + + + Some background: first there was the Arpanet, and it was for government + + organizations and academics only. Slowly, private companies attached to the + + Arpanet, but only when they had legitimate reasons to communicate with the + + government organizations they connected to. Soon, enough private + + organizations were connected that they saw advantages in talking to each + + other, and they put in direct links to each other because they couldn't + + transit the NSF backbone. Sometimes the connexion agreements for these + + links were informally ad-hoc, other times the people connecting would come + + to a 'settlement agreement'. This meant that at the end of each year, they + + would work out the net flow of traffic over their link, and the side that + + got the most benefit from it was contracted to pay the other side a cash + + settlement. + + + + There were the bad old days, and getting full connectivity to non-academic + + sites by making lots of individual connexions was expensive. + + + + Then along came the group of big companies who formed the CIX. They wrote a + + contract that said that members would route each others packets without + + settlement. People still made their own arrangements about who they + + physically connected to, and their share of the cost of the wire etc, but + + once connected, they could send packets to _anyone_ who was a + + mutually-connected CIX member. And just to make sure there weren't pockets + + of unconnected members, every member had also to make sure they had a + + working path to the CIX backbone. That way A could talk to B even if it + + meant going all the way to the CIX backbone in Falls Church VA. + + + + In fact, most of the big vendors have direct connexions to each other, and + + the CIX backbone itself is seldom transited. It's not an expensive or long + + wire--just a couple of routers in Falls Church. + + + + Now, the arrangement that CIX has decided to enforce as of November is that + + they will route for their clients, and people directly connected to their + + clients, but not people a step further downstream than that. Which means + + that the clients of CIX clients who re-sell services will have to become + + members of the CIX themselves, at a cost of $10000. + + + + This isn't small change for the majority of sites that it affects, and it is + + particularly insidious in that it halts completely the process that was + + beginning to take place where bandwidth would be split into smaller and + + smaller units by smaller and smaller enterprises, until you got down to the + + level of a guy in his garage running 6 modems on his PC allowing access to + + local people over his SLIP or PPP line to his own access provider down his + + v.fast modem, that would be a small company running a 56K line up to their + + access provider, who might be a medium company running a T1 to a big + + provider. + + + + With this change in policy, "Mom & Pop" internet connexions are no longer + + possible. The game is for big players only. And I mean BIG--calculations + + show that to reach break-even, a new vendor needs something like 400 + + customers from the start. + + + + The CIX board justifies their change in policy by claiming it will actually + + increase mutual interconnectivity, by adding more people to the communal + + interoperability agreement. However, the facts are that the downstream + + sites who are affected by this would have routed all packets going through + + them anyway. It is, quite simply, an attempt by the big players to lock the + + small players out of the market, to consolidate their oligarchy. And the + + fact that they'll be collecting many many more $10,000 annual fees has not + + gone unnoticed either. + + + + This is one area where government interference _to ensure interoperability + + only and to stop restrictive practises_ would be welcome by we smaller + + players. All that the CIX contributes is a piece of paper saying that + + people will cooperate--the cost of their hardware is small beer. People + + who are in the CIX have an incentive to stay in because it keeps the + + competition out. People outside the CIX _could_ make their own mutual + + care because we can afford the fees (almost), and + + it keeps out up and coming competitors. I don't feel this way, which is why + + I'm posting, and why I have to post anonymously. But then, I don't own the + + company. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + HOUSE RULES VOTE RESULTS; HR 3937 A DEAD END THIS YEAR + + + + By Shabbir J. Safdar (shabbir@panix.com) + + Organization: Voters Telecomm Watch (vtw@vtw.org) + + + + + + INTRODUCTION + + + + Voters Telecomm Watch keeps scorecards on legislators' positions on + + legislation that affects telecommunications and civil liberties. + + If you have updates to a legislator's positions, from either: + + + + -public testimony, + + -reply letters from the legislator, + + -stated positions from their office, + + + + please contact vtw@vtw.org so they can be added to this list. + + + + General questions: vtw@vtw.org + + Mailing List Requests: vtw-list-request@vtw.org + + Press Contact: stc@vtw.org + + Gopher URL: gopher://gopher.panix.com:70/11/vtw + + WWW URL: We're working on it. :-) + + + + RESULT OF THE HOUSE RULES COMMITTEE VOTE ON HR 3937 + + + + Based on information gathered by volunteers, we've been able to + + piece together some of the positions of the House Rules Committee + + as to how they voted for/against opening up HR 3937 to amendments on + + the House floor. [This is now somewhat moot, as is explained in the + + next section.] + + + + Extensive kudos go to + + Joe Thomas + + gaj@portman.com (Gordon Jacobson) + + who both did extensive work to help find this information. + + + + Here are the results we were able to obtain: + + + + [The committee voted 5-4 to open the bill] + + + + HOUSE RULES COMMITTEE MEMBERS + + + + Dist ST Name, Address, and Party Phone + + ==== == ======================== ============== + + 9 MA Moakley, John Joseph (D) 1-202-225-8273 + + UNSPECIFIED POSITION + + + + 3 SC Derrick, Butler (D) 1-202-225-5301 + + UNSPECIFIED POSITION + + + + 24 CA Beilenson, Anthony (D) 1-202-225-5911 + + UNSPECIFIED POSITION + + + + 24 TX Frost, Martin (D) 1-202-225-3605 + + UNSPECIFIED POSITION + + + + 10 MI Bonior, David E. (D) 1-202-225-2106 + + UNSPECIFIED POSITION + + + + 3 OH Hall, Tony P. (D) 1-202-225-6465 + + UNSPECIFIED POSITION + + + + 5 MO Wheat, Alan (D) 1-202-225-4535 + + UNSPECIFIED POSITION + + + + 6 TN Gordon, Bart (R) 1-202-225-4231 + + UNSPECIFIED POSITION + + + + 28 NY Slaughter, Louise M. (D) 1-202-225-3615 + + Voted "open" + + + + 22 NY Solomon, Gerald B. (R) 1-202-225-5614 + + Voted "open" + + + + 1 TN Quillen, James H. (R) 1-202-225-6356 + + Told a constituent he would vote for "open". + + + + 28 CA Dreier, David (R) 1-202-225-2305 + + UNSPECIFIED POSITION + + + + 14 FL Goss, Porter J. (R) 1-202-225-2536 + + UNSPECIFIED POSITION + + + + It is probably not worth the trouble to ask the remaining legislators + + how they voted unless you happen to chat with their staff often. + + + + STATUS OF THE BILL (updated 7/21/94) + + + + If you read the appropriate newsgroups (or any major newspaper) you've + + seen the news about the Gore/Cantwell compromise. Since everyone + + has reprinted it already, we'll not reprint it again, though we'll + + happily send you a copy should you have missed it. + + + + The upshot of this is that Rep. Maria Cantwell will not be offering + + her amendment and therefore HR 3937 is a dead end this year for + + liberalizing cryptography exports. Since VTW is an organization dedicated + + to working on legislation, and there is no longer a piece of relevant + + legislation, we will be concentrating on other projects. The "cantwell" + + section of our archive will be reworked, and the records of legislators + + that voted will be kept there for future reference. [NOTE: these + + voting records will also be rolled into our 1994 Voters Guide] + + + + Here is the final schedule/chronology of the bill + + + + Jul 21, 94 Rep. Cantwell and Vice Pres. Al Gore compromise on seven + + principles, retreating on the Clipper chip; Rep. Cantwell + + chooses not continue to press the legislation or the amendment + + (see relevant articles in today's NY Times and Washington Post) + + Jul 20, 94 HR3937 comes to House floor; a "good" amendement will be offered + + Jul 11, 94 House Rules Committee marks HR3937 "open"; allowing amendments + + Jun 30, 94 [*** vote postponed, perhaps till the week of 7/11/94] + + House Rules Comm. decides whether to allow amendments + + on the bill when it reaches the House floor + + Jun 14, 94 Gutted by the House Select Committee on Intelligence + + May 20, 94 Referred to the House Select Committee on Intelligence + + May 18, 94 Passed out of the House Foreign Affairs Committee on May 18 + + attached to HR 3937, the General Export Administration Act + + Dec 6, 93 Referred to the Subcommittee on Economic Policy, Trade and + + Nov 22, 93 Referred to the House Committee on Foreign Affairs. + + + + 1994 VOTERS GUIDE + + + + Voters Telecomm Watch believes that you should be informed about your + + legislators' positions on key issues. We will be developing a survey + + to give to current legislators and their challengers that will gauge + + their positions on key issues involving telecommunications and civil + + liberties. These results will be made publicly available on the net + + for you to use in casting your vote in November. + + + + We'll be depending on you to help get legislative candidates to fill + + out and return their surveys. Please watch this space for the + + announcement of survey availability in the coming weeks. + + + + If you wish to participate in the development of the survey, feel free + + to join the working list by mailing a note to that effect to + + + + vtw@vtw.org + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + HIGH-SPEED INTERNET ACCESS EXPANDED THROUGHOUT MINNESOTA + + + + By Dennis Fazio (dfazio@mr.net) + + + + Contact: + + Dennis Fazio, Executive Director + + Minnesota Regional Network + + 511 11th Avenue South, Box 212 + + Minneapolis, MN 55415 + + (612) 342-2890 + + dfazio@MR.Net + + + + Minneapolis, MN, July 18, 1994 -- The Minnesota Regional Network (MRNet), a + + nonprofit corporation that provides connections to the burgeoning world-wide + + Internet in Minnesota, has implemented a major statewide expansion by + + installing several additional access sites around the state using a new data + + transport technology called Frame Relay. This new technology is available as + + a regular service by US WestÝs !nterPRISE Networking Services division. It + + allows MRNet to expand its central hub sites, which are locations where many + + customer connections are gathered together, to the four corners of + + Minnesota, providing a more economical means of connection for colleges, + + schools, libraries, government agencies and businesses in any city or town + + in the state. + + + + The Internet, a high-speed network of networks, is a current major component + + of what is coming to be called the "Information Superhighway". It is + + composed of a multitude of computer and information networks including + + international links, national backbones, regional and state distribution + + networks and campus or corporate networks. These are all connected in a + + seamless whole creating an information infrastructure containing several + + million individual computers used by ten to twenty million people around the + + globe. In Minnesota, the Minnesota Regional Network or MRNet, is the primary + + statewide distribution network for Internet access. + + + + "The deployment of these new network switching technologies has the + + potential to revolutionize the creation of wide-area networks," says Dennis + + Fazio, Executive Director of MRNet. "It has reduced the cost of providing + + high-speed connections to customer sites, not only within the US West Frame + + Relay service areas, but even in the outlying towns beyond the suburbs and + + in between the major state metropolitan areas." + + + + Previously, point-to-point phone circuits had to be connected and expensive + + multi-port hub equipment installed in hub sites. Frame Relay service allows + + MRNet to install smaller less complex and less expensive equipment since the + + aggregation of traffic from multiple customer connections is done within US + + WestÝs switching equipment. It is necessary to only have a single connection + + from the hub site into the Frame Relay service. Additionally, the end-site + + connection links are less expensive, since they now only need a termination + + point at the customer's site. The other end of the link is brought directly + + into the Frame Relay system and doesnÝt incur any termination charges, which + + are the most expensive portion of a digital circuit. This means that it is + + now more economical to cover the entire state by extending links to the + + nearest Frame Relay service area than it is to distribute many more hubs to + + cover the large number of communities necessary to provide full state-wide + + access. Finally, Frame Relay service is a much higher quality of service, + + since all links are monitored and maintained 24 hours a day by US WestÝs + + advanced engineers and technicians. + + + + With this new expansion, MRNet can provide lower cost direct Frame Relay + + access in Duluth, Hibbing, Thief River Falls, Bemidji, Brainerd, Moorhead, + + Willmar, St. Cloud, Marshall, Owatonna and Rochester in addition to the Twin + + Cities metro area. Those towns outside these areas can be served by + + extending a link to one of these 12 distributed sites. + + + + MRNet has established partnerships with the University of Minnesota in the + + Twin Cities and Duluth and the Minnesota State University System to share + + long distance trunk lines, which bring the outstate traffic to the Twin + + Cities for forwarding to the Internet, and to obtain space to house + + equipment. + + + + Beyond this initial new deployment, plans are being put in place to expand + + local calling access for dialup subscribers in other parts of the state. + + This will provide lower-cost links to the Internet for individuals and small + + organizations who cannot yet justify the effort and expense of a high-speed + + digital link. Presently, local calling access is available in the Twin + + Cities, Rochester and St. Cloud. Toll-free access is already available to + + Minnesota educators in all parts of the state through the InforMNs + + demonstration project, a joint effort implemented by MRNet, TIES and the + + Minnesota Department of Education. This effort is partially subsidized by + + the state to provide equal access to all state educators. There are now + + about 1,000 subscribers on the InforMNs system. + + + + The ability to provide this state-wide network expansion was helped in part + + with funds from the National Science Foundation via a grant to CICNet, a + + regional network comprised primarily of the Big-10 Universities in which + + several state networks including Minnesota, Wisconsin, Iowa, Illinois, + + Michigan and Indiana participated. This was a for a project titled "Rural + + Datafication" whose purpose was to extend Internet access to areas not + + easily served in the major metropolitan areas. + + + + The Minnesota Regional Network is an independent member-based nonprofit + + corporation that has been providing access to the Internet since 1988. Its + + mission is to enhance the academic, research and economic environment of the + + state through the use of computer and information networks. It is the + + leading provider of Internet access in Minnesota and now has more than 100 + + colleges, universities, libraries, school districts, nonprofit + + organizations, government agencies and businesses listed as connected + + members. Additionally, over 250 individuals and small organizations or + + businesses have access via various forms of dialup connections. MRNet works + + cooperatively with the stateÝs higher education community, the state + + government and several other service organizations of all types to expand + + and increase the level and quality of world-wide network access for the + + improvement of education, general research and commercial business + + operations. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + INTERNET ACCESS NOW AVAILABLE FOR ALL MINNESOTA TEACHERS + + + + By Dennis Fazio (dfazio@mr.net) + + + + + + MINNEAPOLIS-ST. PAUL, MN, July 24, 1994 -- Nearly 1,000 Minnesota teachers + + are cruising the information superhighway this summer via InforMNs - + + Internet for Minnesota Schools, a service offered to K-12 educators + + throughout the state. Using the direct full-function access to the Internet + + that InforMNs provides, teachers browse through on-line databases and + + library catalogs around the world; they have access to U.S. government + + information from a number of agencies including NASA, the Department of + + Education, and the National Institutes of Health; and they share lesson + + plans, ideas for more effective teaching, and thematic classroom activities + + with other teachers and students. + + + + For instance, the Wolf Studies Project of the International Wolf Center in + + Ely, Minnesota allows students and teachers around the world to hear, see, + + and track radio-collared wolves in the Superior National Forest via the + + Internet. They can read reports, see pictures and video images, and hear + + sound files about the wolves' movement and activity that are posted on the + + Wolf Studies Project Gopher server. In another project, students and + + teachers in Minnesota have been exchanging electronic mail with their + + counterparts in Kamchatka, Russia for the past year. This August the + + Kamchatka Ministry of Education is sponsoring the Second Annual Educational + + Travel Seminar to the Russian Far East with the help of the Minnesota + + Global Education Resource Center. These kinds of resources and activities, + + and the communication that happens between people, are what make the + + Internet what is -- a worldwide network of computers, resources, and the + + people that use them. + + + + InforMNs is available to teachers, administrators, and staff from any + + school district, public or private, in Minnesota. Subscriptions run for a + + 12-month period and can start at any time. The fee is $20 per month, paid + + annually, and provides up to 30 hours of toll free access per month. + + Software, user guides, and a toll free helpline for on-going support are + + included. In addition, the InforMNs service provides one day of training + + for one person in each subscribing school building to prepare that person + + to give on-site assistance to his or her colleagues. To subscribe or for + + more information, call InforMNs at (612) 638-8786 or send email to + + howe@informns.k12.mn.us. + + + + InforMNs is funded in part by an appropriation from the state legislature + + to the Minnesota Department of Education (MDE) to provide Internet access + + to all Minnesota schools. The appropriation subsidizes the cost of + + providing the service so that toll free dial-up access is ensured from any + + school in the state, regardless of its location. Of the 1,000 subscribers, + + approximately half connect to the network via local calls in St. Cloud, + + Rochester, and the Twin Cities, and half use the InforMNs 800 toll free + + access number. + + + + In addition to toll free access, InforMNs subscribers receive all the + + software they need to connect their Macintosh or IBM-compatible personal + + computers directly to the Internet. After making a dial-up connection with + + an ordinary phone line and a modem, the InforMNs user's computer becomes + + one of the estimated two million computers now on the Internet worldwide. + + This method of connection differs from the more familiar link to a bulletin + + board system or on-line service like Compuserve, where the user's access to + + the Internet is relayed through a central computer operated by the bulletin + + board owner or on-line service provider. The InforMNs direct connection + + allows teachers to use all the features and resources available on the + + Internet including news groups, discussion lists, electronic mail, + + Gopher-organized resources, the World Wide Web, and file transfer. + + Information flows from a distant Internet repository directly to the user's + + own Macintosh or PC. + + + + The InforMNs service is provided by a partnership of the Minnesota + + Department of Education, the Minnesota Regional Network (MRNet), and + + Technology Information and Educational Services (TIES). In addition, the + + University of Minnesota and the Minnesota State University System (MSUS) + + share use of their telecommunications infrastructure with the project, and + + InforMNs was launched with the support of the Minnesota Educational Media + + Organization (MEMO) and the Project for Automated Libraries (PALS) at + + Mankato State University. + + + + For more information, contact: + + Marla Davenport, davenpo@informns.k12.mn.us, (612)638-8793 + + Margo Berg, mberg@mr.net, (612)724-2705 + + + + InforMNs - Internet for Minnesota Schools + + 2665 Long Lake Road, Suite 250 + + Roseville, MN 55113-2535 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LEGION OF DOOM T-SHIRTS + + + + By Chris Goggans + + + + After a complete sellout at HoHo Con 1993 in Austin, TX this past + + December, the official Legion of Doom t-shirts are available + + once again. Join the net luminaries world-wide in owning one of + + these amazing shirts. Impress members of the opposite sex, increase + + your IQ, annoy system administrators, get raided by the government and + + lose your wardrobe! + + + + Can a t-shirt really do all this? Of course it can! + + + + + + "THE HACKER WAR -- LOD vs MOD" + + + + This t-shirt chronicles the infamous "Hacker War" between rival + + groups The Legion of Doom and The Masters of Destruction. The front + + of the shirt displays a flight map of the various battle-sites + + hit by MOD and tracked by LOD. The back of the shirt + + has a detailed timeline of the key dates in the conflict, and + + a rather ironic quote from an MOD member. + + + + (For a limited time, the original is back!) + + + + "LEGION OF DOOM -- INTERNET WORLD TOUR" + + + + The front of this classic shirt displays "Legion of Doom Internet World + + Tour" as well as a sword and telephone intersecting the planet + + earth, skull-and-crossbones style. The back displays the + + words "Hacking for Jesus" as well as a substantial list of "tour-stops" + + (internet sites) and a quote from Aleister Crowley. + + + + All t-shirts are sized XL, and are 100% cotton. + + + + Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for + + postage. + + + + Send checks or money orders. Please, no credit cards, even if + + it's really your card. + + + + + + Name: __________________________________________________ + + + + Address: __________________________________________________ + + + + City, State, Zip: __________________________________________ + + + + + + I want ____ "Hacker War" shirt(s) + + + + I want ____ "Internet World Tour" shirt(s) + + + + Enclosed is $______ for the total cost. + + + + Mail to: Chris Goggans + + 603 W. 13th #1A-278 + + Austin, TX 78701 + + + + + + These T-shirts are sold only as a novelty items, and are in no way + + attempting to glorify computer crime. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WHITE HOUSE RETREATS ON CLIPPER + + + + By Stanton McCandlish (mech@eff.org) + + + + Yesterday, the Clinton Administration announced that it is taking several + + large, quick steps back in its efforts to push EES or Clipper + + encryption technology. Vice-President Gore stated in a letter to + + Rep. Maria Cantwell, whose encryption export legislation is today being + + debated on the House floor, that EES is being limited to voice + + communications only. + + + + The EES (Escrowed Encryption Standard using the Skipjack algorithm, and + + including the Clipper and Capstone microchips) is a Federal Information + + Processing Standard (FIPS) designed by the National Security Agency, and + + approved, despite a stunningly high percentage anti-EES public comments on + + the proposal) by the National Institute of Standards and Technology. Since + + the very day of the announcement of Clipper in 1993, public outcry against + + the key "escrow" system has been strong, unwavering and growing rapidly. + + + + What's changed? The most immediate alteration in the White House's + + previously hardline path is an expressed willingness to abandon the EES + + for computer applications (the Capstone chip and Tessera card), and push + + for its deployment only in telephone technology (Clipper). The most + + immediate effect this will have is a reduction in the threat to the + + encryption software market that Skipjack/EES plans posed. + + + + Additionally, Gore's letter indicates that deployment for even the telephone + + application of Clipper has been put off for months of studies, perhaps + + partly in response to a draft bill from Sens. Patrick Leahy and Ernest + + Hollings that would block appropriation for EES development until many + + detailed conditions had been met. + + + + And according to observers such as Brock Meeks (Cyberwire Dispatch) and + + Mark Voorhees (Voorhees Reports/Information Law Alert), even Clipper is + + headed for a fall, due to a variety of factors including failure in + + attempts to get other countries to adopt the scheme, at least one state + + bill banning use of EES for medical records, loss of NSA credibility after + + a flaw in the "escrowed" key system was discovered by Dr. Matt Blaze of + + Bell Labs, a patent infringement lawsuit threat (dealt with by buying off + + the claimant), condemnation of the scheme by a former Canadian Defense + + Minister, world wide opposition to Clipper and the presumptions behind it, + + skeptical back-to-back House and Senate hearings on the details of the + + Administration's plan, and pointed questions from lawmakers regarding + + monopolism and accountability. + + + + One of the most signigicant concessions in the letter is that upcoming + + encryption standards will be "voluntary," unclassified, and exportable, + + according to Gore, who also says there will be no moves to tighten export + + controls. + + + + Though Gore hints at private, rather than governmental, key "escrow," the + + Administration does still maintain that key "escrow" is an important part of + + its future cryptography policy. + + + + EFF would like to extend thanks to all who've participated in our online + + campaigns to sink Clipper. This retreat on the part of the Executive + + Branch is due not just to discussions with Congresspersons, or letters + + from industry leaders, but in large measure to the overwhelming response from + + users of computer-mediated communication - members of virtual communities + + who stand a lot to gain or lose by the outcome of the interrelated + + cryptography debates. Your participation and activism has played a key + + role, if not the key role, in the outcome thus far, and will be vitally + + important to the end game! + + + + + + Below is the public letter sent from VP Gore to Rep. Cantwell. + + + + ****** + + + + July 20, 1994 + + + + The Honorable Maria Cantwell + + House of Representatives + + Washington, D.C., 20515 + + + + Dear Representative Cantwell: + + + + I write to express my sincere appreciation for your efforts to move + + the national debate forward on the issue of information security and export + + controls. I share your strong conviction for the need to develop a + + comprehensive policy regarding encryption, incorporating an export policy + + that does not disadvantage American software companies in world markets + + while preserving our law enforcement and national security goals. + + + + As you know, the Administration disagrees with you on the extent to + + which existing controls are harming U.S. industry in the short run and the + + extent to which their immediate relaxation would affect national security. + + For that reason we have supported a five-month Presidential study. In + + conducting this study, I want to assure you that the Administration will + + use the best available resources of the federal government. This will + + include the active participation of the National Economic Council and the + + Department of Commerce. In addition, consistent with the Senate-passed + + language, the first study will be completed within 150 days of passage of + + the Export Administration Act reauthorization bill, with the second study + + to be completed within one year after the completion of the first. I want + + to personally assure you that we will reassess our existing export controls + + based on the results of these studies. Moreover, all programs with + + encryption that can be exported today will continue to be exportable. + + + + On the other hand, we agree that we need to take action this year + + to assure that over time American companies are able to include information + + security features in their programs in order to maintain their admirable + + international competitiveness. We can achieve this by entering into an new + + phase of cooperation among government, industry representatives and privacy + + advocates with a goal of trying to develop a key escrow encryption system + + that will provide strong encryption, be acceptable to computer users + + worldwide, and address our national needs as well. + + + + Key escrow encryption offers a very effective way to accomplish our + + national goals, That is why the Administration adopted key escrow + + encryption in the "Clipper Chip" to provide very secure encryption for + + telephone communications while preserving the ability for law enforcement + + and national security. But the Clipper Chip is an approved federal + + standard for telephone communications and not for computer networks and + + video networks. For that reason, we are working with industry to + + investigate other technologies for those applications. + + + + The Administration understands the concerns that industry has + + regarding the Clipper Chip. We welcome the opportunity to work with + + industry to design a more versatile, less expensive system. Such a key + + escrow system would be implementable in software, firmware, hardware, or + + any combination thereof, would not rely upon a classified algorithm, would + + be voluntary, and would be exportable. While there are many severe + + challenges to developing such a system, we are committed to a diligent + + effort with industry and academia to create such a system. We welcome your + + offer to assist us in furthering this effort. + + + + We also want to assure users of key escrow encryption products that + + they will not be subject to unauthorized electronic surveillance. As we + + have done with the Clipper Chip, future key escrow systems must contain + + safeguards to provide for key disclosure only under legal authorization and + + should have audit procedures to ensure the integrity of the system. Escrow + + holders should be strictly liable for releasing keys without legal + + authorization. + + + + We also recognize that a new key escrow encryption system must + + permit the use of private-sector key escrow agents as one option. It is + + also possible that as key escrow encryption technology spreads, companies + + may established layered escrowing services for their own products. Having + + a number of escrow agents would give individuals and businesses more + + choices and flexibility in meeting their needs for secure communications. + + + + I assure you the President and I are acutely aware of the need to + + balance economic an privacy needs with law enforcement and national + + security. This is not an easy task, but I think that our approach offers + + the best opportunity to strike an appropriate balance. I am looking + + forward to working with you and others who share our interest in developing + + a comprehensive national policy on encryption. I am convinced that our + + cooperative endeavors will open new creative solutions to this critical + + problem. + + + + Sincerely, + + Al Gore + + AG/gcs + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WHY COPS HATE CIVILIANS + + + + Author Unknown + + Posted By Don Montgomery (donrm@sr.hp.com) + + + + Why Cops Hate You or If You Have to Ask, Get Out of the Way + + + + Have you ever been stopped by a traffic cop and, while he was + + writing a ticket or giving you a warning, you got the feeling he would + + just love to yank you out of the car, right through the window, and + + smash your face into the front fender? Have you ever had a noisy little + + spat with someone, and a cop cruising by calls, Everything all right + + over there? + + + + Did you maybe sense that he really hoped everything was not all + + right, that he wanted one of you to answer, No, officer, this idiot's + + bothering me? That all he was looking for was an excuse to launch + + himself from the cruiser and play a drum solo on your skull with his + + nightstick? + + + + Did you ever call the cops to report a crime, maybe someone stole + + something from your car or broke into your home, and the cops act as if + + it were your fault? That they were sorry the crook didn't rip you off + + for more? That instead of looking for the culprit, they'd rather give + + you a shot in the chops for bothering them with your bullshit in the + + first place? + + + + If you've picked up on this attitude from your local sworn + + protectors, it's not just paranoia. They actually don't like you. In + + fact cops don't just dislike you, they hate your fucking guts! + + Incidentally, for a number of very good reasons. + + + + First of all, civilians are so goddamn stupid. They leave things + + lying around, just begging thieves to steal them. They park cars in + + high crime areas and leave portable TVs, cameras, wallets, purses, + + coats, luggage, grocery bags and briefcases in plain view on the seat. + + Oh, sure maybe they'll remember to close all the windows and lock the + + doors, but do you know how easy it is to bust a car window? How fast + + can it be done? A ten-year-old can do it in less than six seconds! And + + a poor cop has another Larceny from Auto on his hands. Another crime to + + write a report on, waste another half hour on. Another crime to make + + him look bad. + + + + Meanwhile the asshole who left the family heirlooms on the back + + seat in the first place is raising hell about where were the cops when + + the car was being looted. He's planning to write irate letters to the + + mayor and the police commissioner complaining about what a lousy police + + force you have here; they can't even keep my car from getting ripped + + off! What, were they drinking coffee somewhere? + + + + And the cops are saying to themselves. Lemme tell ya, fuckhead, we + + were seven blocks away, taking another stupid report from another + + jerkoff civilian about his fucking car being broken into because he left + + his shit on the back seat too! + + + + These civilians can't figure out that maybe they shouldn't leave + + stuff lying around un-attended where anybody can just pick it up and + + boogie. Maybe they should put the shit in the trunk, where no one but + + Superman is gonna see it. Maybe they should do that before they get to + + wherever they're going just in case some riffraff is hanging around + + watching them while the car is being secured. + + + + Another thing that drives cops wild is the, "surely this doesn't + + apply to me" syndrome, which never fails to reveal itself at scenes of + + sniper or barricade incidents. There's always some asshole walking down + + the street (or jogging or driving) who thinks the police cars blocking + + off the area, the ropes marked Police Line: Do Not Cross, the cops + + crouched behind cars pointing revolvers and carbines and shotguns and + + bazookas at some building has nothing whatsoever to do with him, so he + + weasels around the barricades or slithers under the restraining ropes + + and blithely continues on his way, right into the field of fire. + + + + The result is that some cop risks his ass (or her's, don't forget, + + the cops include women now) to go after the cretin and drag him, usually + + under protest, back to safety. All of these cops, including the one + + risking his ass, devoutly hope that the sniper will get off one + + miraculous shot and drill the idiot right between the horns, which would + + have two immediate effects. The quiche-for-brains civilian would be + + dispatched to his just reward and every cop on the scene would + + instantaneously be licensed to kill the scumbag doing the sniping. + + Whereupon the cops would destroy the whole fucking building, sniper and + + all, in about 30 seconds, which is what they wanted to do in the first + + place, except the brass wouldn't let them because the motherfucker + + hadn't killed anybody yet. + + + + An allied phenomenon is the My isn't this amusing behavior + + exhibited, usually by Yuppies or other members of higher society, at + + some emergency scenes. For example, a group of trendy types will be + + strolling down the street when a squad car with lights flashing and + + siren on screeches up to a building. They'll watch the cops yank out + + their guns and run up to the door, flatten themselves against the wall, + + and peep into the place cautiously. Now, if you think about it, + + something serious could be happening here. Cops usually don't pull + + their revolvers to go get a cup of coffee. any five-year-old ghetto kid + + can tell you these cops are definitely ready to cap somebody. But do + + our society friends perceive this? Do they stay out of the cops way? + + Of course not! They think it's vastly amusing. And, of course, since + + they're not involved in the funny little game the cops are playing, they + + think nothing can happen to them! While the ghetto kid is hiding + + behind a car for the shooting to start, Muffy and Chip and Biffy are + + continuing their stroll, right up to the officers, tittering among + + themselves about how silly the cops look, all scrunched up against the + + wall, trying to look in through the door without stopping bullets with + + their foreheads. + + + + What the cops are hoping at that point is for a homicidal holdup + + man to come busting out the door with a sawed-off shotgun. They're + + hoping he has it loaded with elephant shot, and that he immediately + + identifies our socialites as serious threats to his personal well-being. + + They're hoping he has just enough ammunition to blast the shit out of + + the gigglers, but not enough to return fire when the cops open up on + + him. + + + + Of course, if that actually happens, the poor cops will be in a + + world of trouble for not protecting the innocent bystanders. The brass + + wouldn't even want to hear that the shitheads probably didn't have + + enough sense to come in out of an acid rain. Somebody ought to tell all + + the quiche eaters out there to stand back when they encounter someone + + with a gun in his hand, whether he happens to be wearing a badge or a + + ski mask. + + + + Civilians also aggravate cops in a number of other ways. One of + + their favorite games is Officer, can you tell me? A cop knows he's been + + selected to play this game whenever someone approaches and utters those + + magic words. Now, it's okay if they continue with How to get to so and + + so street? or Where such and such a place is located? After all, cops + + are supposed to be familiar with the area they work. But it eats the + + lining of their stomachs when some jerkoff asks, Where can I catch the + + number fifty-four bus? Or, Where can I find a telephone? + + + + Cops look forward to their last day before retirement, when they + + can safely give these douche bags the answer they've been choking back + + for 20 years: No, maggot, I can't tell you where the fifty-four bus + + runs! What does this look like an MTA uniform? Go ask a fucking bus + + driver! And, No, dog breath, I don't know where you can find a phone, + + except wherever your fucking eyes see one! Take your head out of your + + ass and look for one. + + + + And cops just love to find a guy parking his car in a crosswalk + + next to a fire hydrant at a bus stop posted with a sigh saying, Don't + + Even Think About Stopping, Standing, or Parking Here. Cars Towed Away, + + Forfeited to the Government, and Sold at Public Auction. And the jerk + + asks, Officer, may I park here a minute? + + + + What are you nuts? Of course ya can park here! As long as ya + + like! Leave it there all day! Ya don't see anything that says ya + + can't, do ya? You're welcome. See ya later. The cop then drives + + around the corner and calls a tow truck to remove the vehicle. Later, + + in traffic court, the idiot will be whining to the judge But, Your + + Honor, I asked an officer if I could park there, and he said I could! + + No, I don't know which officer, but I did ask! Honest! No, wait, Judge, + + I can't afford five hundred dollars! This isn't fair! I'm not creating + + a disturbance! I've got rights! Get your hands off me! Where are you + + taking me? What do you mean , ten days for contempt of court? What did + + I do? Wait, wait,... If you should happen to see a cop humming + + contentedly and smiling to himself for no apparent reason, he may have + + won this game. + + + + Wildly unrealistic civilian expectations also contribute to a cop's + + distaste for the general citizenry. An officer can be running his ass + + off all day or night handling call after call and writing volumes of + + police reports, but everybody thinks their problem is the only thing he + + has to work on. The policeman may have a few worries, too. Ever think + + of that? the sergeant is on him because he's been late for roll call a + + few days; he's been battling like a badger with his wife, who's just + + about to leave him because he never takes her anywhere and doesn't spend + + enough time at home and the kids need braces and the station wagon needs + + a major engine overhaul and where are we gonna get the money to pay for + + all that and we haven't had a real vacation for years and all you do is + + hang around with other cops and you've been drinking too much lately and + + I could've married that wonderful guy I was going with when I met you + + and lived happily ever after and why don't you get a regular job with + + regular days off and no night shifts and decent pay and a chance for + + advancement and no one throwing bottles or taking wild potshots at you? + + + + Meanwhile, that sweet young thing he met on a call last month says + + her period is late. Internal Affairs is investigating him on fucking up + + a disorderly last week; the captain is pissed at him for tagging a + + councilman's car; a burglar's tearing up the businesses on his post; and + + he's already handled two robberies, three family fights, a stolen auto, + + and a half dozen juvenile complaints today. + + + + Now here he is, on another juvenile call, trying to explain to some + + bimbo, who's the president of her neighborhood improvement association, + + that the security of Western Civilization is not really threatened all + + that much by the kids who hang around on the corner by her house. Yes, + + officer, I know they're not there now. They always leave when you come + + by. But after you're gone, they come right back, don't you see, and + + continue their disturbance. It's intolerable! I'm so upset, I can + + barely sleep at night. + + + + By now, the cops eyes have glazed over. What we need here, + + officer, she continues vehemently, Is greater attention to this matter + + by the police. You and some other officers should hide and stake out + + that corner so those renegades wouldn't see you. Then you could catch + + them in the act! Yes, ma'am, we'd love to stake out that corner a few + + hours every night, since we don't have anything else to do, but I've got + + a better idea, he'd like to say. Here's a box of fragmentation grenades + + the Department obtained from the Army just for situations like this. + + The next time you see those little fuckers out there, just lob a couple + + of these into the crowd and get down! + + + + Or he's got and artsy-craftsy type who's moved into a tough, + + rundown neighborhood and decides it's gotta be cleaned up. You know, + + Urban Pioneers. The cops see a lot of them now. Most of them are + + intelligent(?), talented, hard-working, well-paid folks with masochistic + + chromosomes interspersed among their otherwise normal genes. They have + + nice jobs, live in nice homes, and they somehow decide that it would be + + a marvelous idea to move into a slum and get yoked, roped, looted, and + + pillaged on a regular basis. What else do you expect? Peace and + + harmony? It's like tossing a juicy little pig into a piranha tank. + + + + Moving day: Here come the pioneers, dropping all their groovy gear + + from their Volvo station wagon, setting it on the sidewalk so everyone + + can get a good look and the food processor, the microwave, the stereo + + system, the color TV, the tape deck, etc. At the same time, the local + + burglars are appraising the goods unofficially and calculating how much + + they can get for the TV down at the corner bar, how much the stereo will + + bring at Joe's garage, who might want the tape deck at the barber shop, + + and maybe mama can use the microwave herself. + + + + When the pioneers get ripped off, the cops figure they asked for + + it, and they got it. You want to poke your arm through the bars of a + + tiger cage? Fuck you! Don't be amazed when he eats it for lunch! The + + cops regard it as naive for trendies to move into crime zones and + + conduct their lives the same way they did up on Society Hill. In fact, + + they can't fathom why anyone who didn't have to would want to move there + + at all, regardless of how they want to live or how prepared they might + + be to adapt their behavior. That's probably because the cops are + + intimately acquainted with all those petty but disturbing crimes and + + nasty little incidents that never make the newspapers but profoundly + + affect the quality of life in a particular area. + + + + Something else that causes premature aging among cops is the, I + + don't know who to call, so I'll call the police ploy. Why, the cops ask + + themselves, do they get so many calls for things like water leaks, sick + + cases, bats in houses, and the like, things that have nothing whatsoever + + to do with law enforcement or the maintenance of public order? They + + figure it's because civilians are getting more and more accustomed to + + having the government solve problems for them, and the local P.D. is the + + only governmental agency that'll even answer the phone a 3:00 am, let + + alone send anybody. + + + + So, when the call comes over the radio to go to such-and-such + + address for a water leak, the assigned officer rolls his eyes, + + acknowledges, responds, surveys the problem, and tells the complainant, + + Yep, that's a water leak all right! No doubt about it. Ya probably + + ought to call a plumber! And it might not be a bad idea to turn off + + your main valve for a while. Or, Yep, your Aunt Minnie's sick all + + right! Ya probably ought to get'er to a doctor tomorrow if she doesn't + + get any better by then.S Or, Yep, that's a bat all right! Mebbe ya + + ought to open the windows so it can fly outside again! + + + + In the meantime our hero is wasting his time on this bullshit call, + + maybe someone is having a real problem out there, like getting raped, + + robbed or killed. Street cops would like to work the phones just once + + and catch a few of these idiotic complaints: A bat in your house? No + + need to send an officer when I can tell ya what to do right here on the + + phone, pal! Close all your doors and windows right away. Pour gasoline + + all over your furniture. That's it. Now, set it on fire and get + + everybody outside! Yeah, you'll get the little motherfucker for sure! + + That's okay, call us anytime. + + + + Probably the most serious beef cops have with civilians relates to + + those situations in which the use of force becomes necessary to deal + + with some desperado who may have just robbed a bank, iced somebody, beat + + up his wife and kids, or wounded some cop, and now he's caught but won't + + give up. He's not going to be taken alive, he's going to take some cops + + with him, and you better say your prayers, you pig bastards! Naturally, + + if the chump's armed with any kind of weapon, the cops are going to + + shoot the shit out of him so bad they'll be able to open up his body + + later as a lead mine. If he's not armed, and the cops aren't creative + + enough to find a weapon for him, they'll beat him into raw meat and hope + + he spends the next few weeks in traction. They view it as a learning + + experience for the asshole. You fuck up somebody, you find out what it + + feels like to get fucked up. Don't like it? Don't do it again! It's + + called Street Justice, and civilians approve of it as much as cops do, + + even if they don't admit it. + + + + Remember how the audience cheered when Charles Bronson fucked up + + the bad guys in Death Wish? How they scream with joy every time Clint + + Eastwood's Dirty Harry makes his day by blowing up some rotten scumball + + with his .44 Magnum? What they applaud is the administration of street + + justice. The old eye-for-an-eye concept, one of mankind's most primal + + instincts. All of us have it, especially cops. + + + + It severely offends and deeply hurts cops when they administer a + + dose of good old-fashioned street justice only to have some bleeding- + + heart do-gooder happens upon the scene at the last minute, when the + + hairbag is at last getting his just deserts, and start hollering about + + police brutality. Cops regard that as very serious business indeed. + + Brutality can get them fired. Get fired from one police department, and + + it's tough to get a job as a cop anywhere else ever again. + + + + Brutality exposes the cop to civil liability as well. Also, his + + superior officers, the police department as an agency, and maybe even + + the local government itself. You've seen those segments on 60 Minutes, + + right? Some cop screws up, gets sued along with everybody else in the + + department who had anything to do with him, and the city or county ends + + up paying the plaintiff umpty-ump million dollars, raising taxes and + + hocking its fire engines in the process. What do think happens to the + + cop who fucked up in the first place? He's done for. + + + + On many occasions when the cops are accused of excessive force, the + + apparent brutality is a misperception by some observer who isn't + + acquainted with the realities of police work. For example, do you have + + any idea how hard it is to handcuff someone who really doesn't want to + + be handcuffed? Without hurting them? It's almost impossible for one + + cop to accomplish by himself unless he beats the hell out of the + + prisoner first, which would also be viewed a brutality! It frequently + + takes three or four cops to handcuff one son of a bitch who's determined + + to battle them. + + + + In situations like that, it's not unusual for the cops to hear + + someone in the crowd of onlookers comment on how they're ganging up on + + the poor bastard and beating him unnecessarily. This makes them feel + + like telling the complainer, Hey, motherfucker, you think you can + + handcuff this shithead by yourself without killing him first? C'mere! + + You're deputized! Now, go ahead and do it! + + + + The problem is that, in addition to being unfamiliar with how + + difficult it is in the real world to physically control someone without + + beating his ass, last-minute observers usually don't have the + + opportunity to see for themselves, like they do in the movies and on TV, + + what a fucking monster the suspect might be. If they did, they'd + + probably holler at the cops to beat his ass some more. They might + + actually even want to help! The best thing for civilians to do if + + they think they see the cops rough up somebody too much is to keep their + + mouths shut at the scene, and to make inquiries of the police brass + + later on. There might be ample justification for the degree of force + + used that just wasn't apparent at the time of the arrest. If not, the + + brass will be very interested in the complaint. If one of their cops + + went over the deep end, they'll want to know about it. Most of this + + comes down to common sense, a characteristic the cops feel most + + civilians lack. One of the elements of common sense is thinking before + + opening one's yap or taking other action. Just a brief moment of + + thought will often prevent the utterance of something stupid or the + + commission of some idiotic act that will, among other things, generate + + nothing but contempt from the average street cop. Think, and it might + + mean getting a warning instead of a traffic ticket. Or getting sent on + + your way rather than being arrested. Or continuing on to your original + + destination instead of to the hospital. It might mean getting some real + + assistance instead of the runaround. The very least it'll get you is a + + measure of respect cops seldom show civilians. Act like you've got a + + little sense, and even if the cops don't love you, at least they won't + + hate you. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PUBLIC SPACE ON INFO HIGHWAY: CALL CONGRESS ASAP! + + + +By The Center For Media Education (cme@access1.digex.net) + + + +People For the American Way is 300,000-member nonpartisan constitutional + +liberties public interest organization. 2000 M Street NW, Suite 400, + +Washington DC 20036. + + + + ACTION ALERT -- From People For the American Way (DC) + + + + SENATE TO ACT ON INFO-HIGHWAY BILL -- ACTIVISTS NEEDED TO ENSURE THAT + + PUBLIC ACCESS PROVISIONS ARE INCLUDED. + + + + The Issue + + + + - The "information superhighway" has the potential to give rise to a new + + era of democratic self governance by providing the means through which + + civic discourse can flourish. Turning this into a reality means that + + those committed to promoting this new marketplace of ideas must be given + + the tools to use new telecommunications networks. + + + + - A diverse coalition of public interest organizations is supporting + + legislation introduced by Senator Daniel Inouye (D-HI), Chairman of the + + Communications Subcommittee of the Senate Commerce Committee, to encourage + + this new marketplace of ideas by ensuring that the public has access to + + the information superhighway is protected (S. 2195). + + + + - Without reserved capacity, the ability of local governmental + + institutions, libraries, schools, public broadcasters and other nonprofit + + organizations to take advantage of new telecommunications technologies + + will be determined by private gatekeepers who have few economic incentives + + to permit those institutions without the means to pay commercial rates + + access to their networks. + + + + - Without Senator Inouye's legislation, the information superhighway will + + carry little more than video games, movies on demand and home shopping. + + + + - There has been a great deal of rhetoric about the telecommunications + + networks of the future being of unlimited capacity. This is certainly the + + goal. However, it is necessary to ensure that between now and the time + + that such capacity is unlimited, that there is meaningful access available + + for those entities proving important educational, cultural, informational, + + civic and charitable services to the public. + + + + - Senator Inouye's legislation must be included in the debate with the + + larger telecommunications legislation (S. 1822) introduced by Senator + + Ernest Hollings (D-SC), Chairman of the Senate Commerce Committee. + + + + + + LEGISLATIVE TIMING + + + + Senator Hollings (D-SC), Chairman of the Commerce Committee, and Senator + + Danforth (R-MO), Ranking Minority Member of the Commerce Committee are + + busily working on amendments to S. 1822, a major telecommunications reform + + bill. Next week, the full Committee is expected to consider these + + amendments. Therefore, a public access provision must be included now. + + + + ACTION REQUEST + + + + - Please call Senator Hollings at the Commerce Committee and Senator + + Danforth (Ranking Minority Member) immediately!! Ask them to support S. + + 2195 and guarantee that requirements are put in place for public access at + + low or no-cost rates are included in the Chairman's Mark. Phone calls on + + this issue by the public will have a profound effect on the outcome of + + this legislation--so please call! + + + + Senator Hollings 202-224-5115 + + Senator Danforth 202-224-6154 + + + + - Please also call Senator Inouye and encourage him to continue to push + + for passage of S. 2195 and to seek it's combination with S. 1822. + + + + Inouye (D-HI) 202-224-3934 + + + + - Please try to find the time to make a few calls and ask the other + + Senators on the Commerce Committee to support S. 2195 and ensure public + + access provisions are included in S. 1822. Other Senators on the Commerce + + Committee are: + + + + Exon (D-NB) 202-224-4224 + + Ford (D-KY) 202-224-4343 + + Rockefeller (D-WV) 202-224-6472 + + Kerry (D-MA) 202-224-2742 + + Breaux (D-LA) 202-224-4623 + + Bryan (D-NV) 202-224-6244 + + Robb (D-VA) 202-224-4024 + + Dorgan (D-ND) 202-224-2551 + + Matthews (D-TN) 202-224-4944 + + Packwood (R-OR) 202-224-5244 + + Pressler (R-SD) 202-224-5842 + + Stevens (R-AK) 202-224-3004 + + McCain (R-AZ) 202-224-2235 + + Burns (R-MT) 202-224-2644 + + Gorton (R-WA) 202-224-3441 + + Lott (R-Miss.) 202-224-6253 + + Hutchison (R-TX) 202-224-5922 + + + + - Calling these Senators *works*!! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SOFTWARE KEY ESCROW - A NEW THREAT? + + + + By Timothy May (tcmay@netcom.com) + + + + At the June Cypherpunks meeting, Whit Diffie (co-inventor of + + public-key crypto, as you should all know) filled us in on a workshop + + on "key escrow" held in Karlsruhe, Germany. All the usual suspects + + were there, and I gather that part of the purpose was to bring the + + Europeans "into the tent" on key escrow, to deal with their objections + + to Clipper, and so on. + + + + Diffie described in some detail a software-based scheme developed by + + NIST (and Dorothy Denning, if I recall correctly) that, as I recall + + the details, avoids public key methods. Perhaps this was also + + described here on the list. I know Bill Stewart has recently discussed + + it in sci.crypt or talk.politics.crypto. + + + + What has me worried about it now is evidence from more than one source + + that this program is actually much further along than being merely a + + "trial balloon" being floated. In fact, it now looks as though the + + hardware-based key escrow systems will be deemphasized, as Al Gore's + + letter seems to say, in favor of software-based schemes. + + + + While I've been skeptical that software-based schemes are secure (the + + bits are hardly secure against tampering), the addition of negotiation + + with another site (a lot like online clearing of digital cash, it + + seems) can make it nearly impossible for tampering to occur. That is, + + I'm now more persuaded that the NIST/NSA(?) proposal would allow + + software-based key escrow. + + + + Here's the rub: + + + + * Suppose the various software vendors are "incentivized" to include + + this in upcoming releases. For example, in 30 million copies of + + Microsoft's "Chicago" (Windows 4.0) that will hit the streets early in + + '95 (betas are being used today by many). + + + + * This solves the "infrastructure" or "fax effect" problem--key escrow + + gets widely deployed, in a way that Clipper was apparently never going + + to be (did any of you know _anybody_ planning to buy a "Surety" + + phone?). + + + + (Granted, this is key escrow for computers, not for voice + + communication. More on this later.) + + + + * Once widely deployed, with not talk of the government holding the + + keys, then eventual "mandatory key escrow" can be proposed, passed + + into law by Executive Order (Emergency Order, Presidential Directive, + + whatever your paranoia supports), an act of Congress, etc. + + + + I don't claim this scenario is a sure thing, or that it can't be + + stopped. But if in fact a "software key escrow" system is in the + + works, and is more than just a "trial balloon," then we as Cypherpunks + + should begin to "do our thing," the thing we've actually done pretty + + well in the past. To wit: examine the implications, talk to the + + lobbyist groups about what it means, plan sabotage efforts (sabotage + + of public opinion, not planting bugs in the Chicago code!), and + + develop ways to make sure that a voluntary key escrow system could + + never be made mandatory. + + + + (Why would _anyone_ ever use a voluntary key escrow system? Lots of + + reasons, which is why I don't condemn key escrow automatically. + + Partners in a business may want access under the right circumstances + + to files. Corporations may want corporate encryption accessible under + + emergencyy circumstances (e.g., Accounting and Legal are escrow + + agencies). And individuals who forget their keys--which happens all + + the time--may want the emergency option of asking their friends who + + agreed to hold the key escrow stuff to help them. Lots of other + + reasons. And lots of chances for abuse, independent of mandatory key escrow.) + + + + But there are extreme dangers in having the infrastructure of a + + software key escrow system widely deployed. + + + + I can't see how a widely-deployed (e.g., all copies of Chicago, etc.) + + "voluntary key escrow" system would remain voluntary for long. It + + looks to me that the strategy is to get the infrastructure widely + + deployed with no mention of a government role, and then to bring the + + government in as a key holder. + + + + (The shift of focus away from telephone communications to data is an + + important one. I can see several reasons. First, this allows wide + + deployment by integration into next-gen operating systems. A few + + vendors can be "incentivized." Second, voice systems are increasingly + + turning into data systems, with all the stuff surrounding ISDN, + + cable/telco alliances, "set-top" boxes, voice encryption on home + + computers, etc. Third, an infrastructure for software key escrow would + + make the backward extension to voice key escrow more palatable. And + + finally, there is a likely awareness that the "terrorist rings" and + + "pedophile circles" they claim to want to infiltrate are more than + + likely already using computers and encryption, not simple voice lines. + + This will be even more so in the future. So, the shift of focus to + + data is understandable. That it's a much easier system in which to get + + 40-60 million installed systems _almost overnight_ is also not lost on + + NIST and NSA, I'm sure.) + + + + In other words, a different approach than with Clipper, where + + essentially nobody was planning to buy the "Surety" phones (except + + maybe a few thousand) but the government role was very prominent--and + + attackable, as we all saw. Here, the scenario might be to get 40-60 + + million units out there (Chicago, next iteration of Macintosh OS, + + maybe Sun, etc.) and then, after some series of events (bombings, + + pedophile rings, etc.) roll in the mandatory aspects. + + + + Enforcement is always an issue, and I agree that many bypasses exist. + + But as Diffie notes, the "War on Drugs" enlistment of corporations was + + done with various threats that corporations would lose + + assets/contracts unless they cooperated. I could see the same thing + + for a software-based key escrow. + + + + A potentially dangerous situation. + + + + I was the one who posted the Dorothy Denning "trial balloon" stuff to + + sci.crypt, in October of 1992, six months before it all became real + + with the announcement of Clipper. This generated more than a thousand + + postings, not all of them useful (:-}), and helped prepare us for the + + shock of the Clipper proposal the following April. + + + + I see this software-based key escrow the same way. Time to start + + thinking about how to stop it now, before it's gone much further. + + + + Putting Microsoft's feet to the fire, getting them to commit to *not* + + including any form of software-based key escrow in any future releases + + of Windows (Chicago or Daytona) could be a concrete step in the right + + direction. Ditto for Apple. + + + + I'm sure we can think of other steps to help derail widespread + + deployment of this infrastructure. + + + + --Tim May + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + HOODS HIT THE HIGHWAY; COMPUTER USERS WARNED OF SCAMS + + + + By Charlotte-Anne Lucas + + Austin Bureau of The Dallas Morning News + + REPRINTED WITH PERMISSION OF THE DALLAS MORNING NEWS + + + + AUSTIN -- Computer users, beware: Driving on the information highway, + + it's possible to get fleeced. + + + + Scam artists have hit the cyberspace, offering high-tech ponzi schemes, + + sending illegal electronic chain letters and hyping virtually worthless + + stock, according to state securities regulators across the nation. + + + + In Texas, regulators say an Austin retiree lost $10,000 in a fake mutual + + fund deal sold by a man who promoted his "money managing" skills through + + an on-line computer service. + + + + "The danger here is that cyberspace, which could be a beneficial way for + + consumers to do a better job of informing themselves, will instead be + + discredited as a haven for fast-buck artists," said Denise Voigt + + Crawford, the Texas Securities Commissioner. + + + + In New Jersey and Missouri on Thursday, securities regulators filed + + cease and desist orders against promoters who used computer links to + + tout allegedly fraudulent deals. Texas regulators say it is likely that + + they will seek an indictment in the case of the nonexistent mutual fund. + + + + But with nearly 4 million computer users nationwide linked into + + commercial computer services and 20 million people on the internet, + + a world-wide computer network, "it is almost too big to police + + effectively," said Jared Silverman, chief of the New Jersey Bureau of + + Securities and chairman of a multi-state team that investigates computer + + fraud. + + + + In response, regulators in all 50 states issued a bulletin to + + investigators, describing the potential frauds and listing steps small + + investors can take to protect themselves. "We're trying to tell people + + to be careful," said Ms. Crawford, "there is a new fraud on the + + horizon." + + + + Although regulators are concerned about the problem, Ms. Crawford + + acknowledges enforcement will be a challenge. Because electronic + + conversations, or E-mail, are considered private, "we don't know what + + difficulties we are going to have getting subpoenas enforced or what + + kind of cooperation we will get from (commercial bulletin board + + systems)." [sic] + + + + Officials say promoters tend to advertise offers or stock tips on the + + financial bulletin board sections of on-line computer services such as + + CompuServe, America Online and Prodigy, or in the specialized discussion + + forums in the Internet. + + + + Regulators said that of 75,000 messages posted on one computer service + + bulletin board during a recent two-week period, 5,600 were devoted to + + investment topics. While some commercial computer bulletin board + + services try to control the publicly posted investment tips, most do not + + try to control most communications on the service. + + + + What begins as innocent E-mail can end with an unwary investor "getting + + cleaned out by high-tech schemers," said Ms. Crawford. + + + + In Texas, the case under investigation began when an Austin retiree + + posted a public note in a commercial bulletin board system looking for + + conversations about the stock market, according to John A. Peralta, + + deputy director of enforcement at the Texas Securities Board. + + + + "He was contacted. It turned into a private E-mail conversation, a + + telephone conversation and then exchanges through the mail," said + + Mr. Peralta. But the person who promoted himself on the computer as a + + skilled money manager turned out to be unlicensed -- and the mutual fund + + the retiree invested in turned out to be nonexistent. + + + + Mr. Peralta said at least one other person, not from Texas, invested + + $90,000 in the same deal, "We are aware of two, but we don't really + + know," he said. "There may be dozens of victims." + + + + Securities regulators began taking interest in on-line scams last fall, + + after Mr. Silverman -- a computer junkie -- raised the issue at a + + national meeting of regulators. "I heard stories about things going on + + on computer bulletin board services, and I have been monitoring these + + things for close to a year," he said. + + + + In fact, the New Jersey case came from Mr. Siverman's off-hours cruising + + of an on-line service. "I sit at a keyboard two hours a day -- to the + + chagrin of my wife -- scanning these things," he said. + + + + What he found was a promoter pushing an E-mail chain letter. The + + promoter, identified only as from San Antonio, claimed that in exchange + + for $5, investors could earn $60,000 in three to six weeks. + + + + Regulators said participants were told to send $1 to each of five people + + on a list in the computer bulletin board, add their own name to the list + + and post it on 10 different computer bulletin board sites. + + + + That, regulators said in a statement, "amounted to a high-tech + + variation on the old pyramid scam, which is barred by federal and state + + laws." + + + + In Missouri, regulators Thursday moved against an unlicensed stockbroker + + for touting his services and "making duubious [sic] claims for stocks + + not registered for sale in the state." Among other things, regulators + + said, the promoter falsely claimed that Donald Trump was a "major, + + behind-the-scenes player in a tiny cruise line" whose stock he pitched. + + + + Ms. Crawford said that while computer users may be sophisticated in some + + ways, they still are attractive targets because they tend to have + + discretionary income and frequently are looking for ways to invest their + + money. + + + + Some of the commercial services also allow users to use various aliases, + + making it all the more difficult for investigators to figure out who + + they are really communication with. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE INTERNET AND THE ANTI-NET + + + + By Nick Arnett (nicka@mccmedia.com) + + + + Two public internetworks are better than one + + + + Networking policy debates tend to paint a future monolithic internetwork + + that will follow consistent policies despite a number of independent + + operators. Although that's how the interstate highway and telephone + + systems -- favorite metaphors for network futurists -- operate, historical + + comparisons suggest that it is probably not what the future holds. Two + + distinct, interconnected publicly accessible digital internetworks are + + likely to emerge, which is surely better than just one. + + + + One of the future internetworks will grow out of today's Internet, whose + + roots are in the technology and scientific/academic communities, funded by + + government, institutions and increasingly, corporate and individual users. + + Although the Internet will support commercial services, they rarely will + + depend on advertising. The other great internetwork will grow out of the + + technology and mass communications industries, especially cable and + + broadcast industries. The "Anti-net" will rely on advertising revenue to + + recoup the cost of the infrastructure necessary to create cheap, high-speed + + bandwidth. (I call this second network the Anti-net not to be a demagogue + + but to make a historical allusion, explained shortly.) All three + + communities -- technology, science and academia, and mass media -- will + + participate in many joint projects. The most successful new ventures often + + will arise from three-way collaborations; skills of each are essential to + + create and deliver network-based information products and services. + + + + The Internet community reacts with profound anger and resentment at + + Anti-net behavior on the Internet -- in net-speak, "spamming" advertising + + messages into hundreds of discussions. The outrage is based in part on the + + idealistic traditions of academic and scientific freedom of thought and + + debate, but there's more behind it. Anger and resentment fueled by the + + world's love-hate relationship with the mass media, particularly + + television, surface in many other contexts. Nearly everyone in the modern + + world and large segments of the third world watches television; nearly all + + think broadcast television is stupid, offering a homogenized, + + sensationalized point of view that serves advertising interests above all + + others. In competition with television's hypnotic powers, or perhaps + + simply due to the high cost of distribution, other mass media have followed + + suit. + + + + Idealistic defenders of the Internet's purity believe they are waging a + + humanitarian or even a holy war that pits a democracy of ideas against the + + mass media's empty promises and indulgences. Television and its kin offer + + the false idols and communities of soaps, sitcoms and sports. The mass + + media tantalize with suggestions of healing, wealth, popularity and + + advertising's other blessings and temptations. Internet idealists even + + question the U.S. administration's unclear proposal of an "information + + superhighway," suspecting that the masses will be taxed only to further + + expand the Anti-net's stranglehold on information. + + + + The same kind of stage was set 500 years ago. The convergence of + + inexpensive printing and inexpensive paper began to loosen the Roman + + Catholic church's centuries-old stranglehold on cultural information. The + + church's rise to power centuries earlier had followed the arrival of the + + Dark Ages, caused in Marshall McLuhan's analysis by the loss of papyrus + + supplies. The church quickly became the best customer of many of the early + + printer-publishers, but not to disseminate information, only to make money. + + The earliest dated publication of Johann Gutenberg himself was a "papal + + indulgence" to raise money for the church's defense against the Turk + + invasions. Indulgences were papers sold to the common folk to pay for the + + Pope's remission of their sins, a sort of insurance against the wrath of + + God. Indulgences had been sold by the church since the 11th century, but + + shortly after the arrival of printing, the pope expanded the market + + considerably by extending indulgences to include souls in purgatory. + + Indulgence revenue was shared with government officials, becoming almost a + + form of state and holy taxation. The money financed the church's holy + + wars, as well as church officials' luxurious lifestyles. + + + + Jumping on the new technology for corrupt purposes, the church had sown the + + seeds of its own undoing. The church had the same sort of love-hate + + relationship with common people and government that the mass media have + + today. The spark for the 15th-century "flame war," in net-speak, was a + + monk, Martin Luther. Outraged by the depth of the church's corruption, + + Luther wrote a series of short theses in 1517, questioning indulgences, + + papal infallibility, Latin-only Bibles and services, and other + + authoritarian, self-serving church practices. Although Luther had + + previously written similar theses, something different happened to the 95 + + that he nailed to the church door in Wittenburg. Printers -- the "hackers" + + of their day, poking about the geographic network of church doors and + + libraries -- found Luther's theses. + + + + As an academic, Luther enjoyed a certain amount of freedom to raise + + potentially heretical arguments against church practice. Nailing his + + theses to the Wittenburg door was a standard way to distribute information + + to his academic community for discussion, much like putting a research + + paper on an Internet server today. In Luther's time, intellectual property + + laws hadn't even been contemplated, so his papers were fair game for + + publication (as today's Internet postings often seem to be, to the dismay + + of many). Luther's ideas quickly became the talk of Europe. Heresy sells, + + especially when the questioned authority is corrupt. But the speed of + + printing technology caught many by surprise. Even Luther, defending + + himself before the pope, was at a loss to explain how so many had been + + influenced so fast. + + + + Luther's initial goal was to reform the church. But his ideas were + + rejected and he was excommunicated by his order, the pope and the emperor, + + convincing Luther that the Antichrist was in charge in Rome. Abandoning + + attempts at reform, but accepting Biblical prophecy, Luther resisted the + + utopian goal of removing the Antichrist from the papacy. Instead, as a + + pacifist, he focused on teaching and preaching his views of true + + Christianity. Luther believed that he could make the world a better place + + by countering the angst and insecurity caused by the Antichrist, not that + + he could save it by his own powers. + + + + Luther's philosophy would serve the Internet's utopians well, especially + + those who believe that the Internet's economy of ideas untainted by + + advertising must "win" over the mass media's Anti-net ideas. The + + Internet's incredibly low cost of distribution almost assures that it will + + remain free of advertising-based commerce. Nonetheless, if lobbying by + + network idealists succeeds in derailing or co-opting efforts to build an + + advertising-based internetwork, then surely commercial interests will + + conspire with government officials to destroy or perhaps worse, to take + + over the Internet by political and economic means. Historians, instead of + + comparing the Internet to the U.S. interstate highway system's success, may + + compare it with the near-destruction of the nation's railroad and trolley + + infrastructure by corrupt businesses with interests in automobiles and + + trucking. + + + + (which, like the Internet, was originally funded for military purposes) + + + + The printing press and cheap paper did not lead to widespread literacy in + + Europe; that event awaited the wealth created by the Industrial Revolution + + and the need for educated factory workers. Printing technology's immediate + + and profound effect was the destruction of the self-serving, homogenized + + point of view of a single institution. Although today's mass media don't + + claim divine inspiration, they are no less homogenized and at least as + + self-serving. The people drown in information overload, but one point of + + view is barely discernable from another, ironically encouraging + + polarization of issues. + + + + Richard Butler, Australia's ambassador to the United Nations, draws the + + most disturbing analogy of all. Butler, a leader in disarmament, compares + + the church's actions to the nuclear weapons industry's unwillingness to + + come under public scrutiny. Like the church and its Bible, physicists + + argued that their subject was too difficult for lay people. Medieval popes + + sold salvation; physicists sold destruction. Neither was questioned until + + information began to move more freely. The political power of nuclear + + weapons has begun to fall in part due to the role of the Internet and fax + + communications in the dissolution of the Soviet Union. + + + + The truly influential and successful early publishers, such as Aldus + + Manutius, were merchant technologists who formed collaborations with the + + scientific/academic community and even the church, especially those who + + dissented against Rome. Out of business needs for economies of scale, they + + brought together people with diverse points of view and created books that + + appealed to diverse communities. The Renaissance was propelled in part by + + books that allowed geniuses such as Copernicus to easily compare and + + contrast the many points of view of his predecessors, reaching + + world-changing conclusions. + + + + Today we are at a turning point. We are leaving behind a world dominated + + by easy, audiovisual, sensational, advertising-based media, beginning a + + future in which the mass media's power will be diluted by the low cost of + + distribution of many other points of view. Using the Internet is still + + something like trying to learn from the pre-Gutenberg libraries, in which + + manuscripts were chained to tables and there were no standards for + + organization and structure. But like the mendicant scholars of those days, + + today's "mendicant sysops," especially on the Internet, are doing much of + + the work of organization in exchange for free access to information. + + + + Today, the great opportunity is not to make copies of theses on the digital + + church doors. It is to build electronic magazines, newspapers, books, + + newsletters, libraries and other collections that organize and package the + + writings, photos, videos, sounds and other multimedia information from + + diverse points of view on the networks. The Internet, with one foot in + + technology and the other in science and academia, needs only a bit of help + + from the mass media in order to show the Anti-net how it's done. + + + + ------------ + + Nick Arnett [nicka@mccmedia.com] is president of Multimedia Computing + + Corporation, a strategic consulting and publishing company established in + + 1988. On the World-Wide Web: + + + + Recommended reading: "The printing press as an agent of change: + + Communications and cultural transformation in early-modern Europe," Vols. I + + and II. Elizabeth Eisenstein. Cambridge University Press, 1979. + + + + Copyright (c) 1994, Multimedia Computing Corp., Campbell, Calif., U.S.A. + + This article is shareware; it may be distributed at no charge, whole and + + unaltered, including this notice. If you enjoy reading it and would like + + to encourage free distribution of more like it, please send a contribution + + to Plugged In (1923 University Ave., East Palo Alto, CA 94303), an + + after-school educational program for children in under-served communities. + + + + Multimedia Computing Corp. + + Campbell, California + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + +. + diff --git a/textfiles.com/magazines/JOAUC/jauc06.txt b/textfiles.com/magazines/JOAUC/jauc06.txt new file mode 100644 index 00000000..06bd5a41 --- /dev/null +++ b/textfiles.com/magazines/JOAUC/jauc06.txt @@ -0,0 +1,11844 @@ + + + + + + + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically + + ====================================================================== + + ISSN 1074-3111 Volume One, Issue Six October 1, 1994 + + ====================================================================== + + + + Editor-in-Chief: Scott Davis (dfox@fc.net) + + Co-Editor/Technology: Max Mednick (kahuna@fc.net) + + Consipracy Editor: Gordon Fagan (flyer@fennec.com) + + Information Systems: Carl Guderian (bjacques@usis.com) + + Computer Security: John Logan (ice9@fennec.com) + + + + ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC + + + + U.S. Mail: + + The Journal Of American Underground Computing + + 10111 N. Lamar #25 + + Austin, Texas 78753-3601 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + IMPORTANT ADDRESSES - + + ============================================================================ + + To Subscribe to "TJOAUC", send mail to: sub@fennec.com + + All questions/comments about this publication to: comments@fennec.com + + Send all articles/info that you want published to: submit@fennec.com + + Commercial Registration for Profitable Media: form1@fennec.com + + Advertising Rates: rates@fennec.com + + ============================================================================ + + + + "The underground press serves as the only effective counter to a growing + + power, and more sophisticated techniques used by establishment mass media + + to falsify, misrepresent, misquote, rule out of consideration as a priori + + ridiculous, or simply ignore and blot out of existence: data, books, + + discoveries that they consider prejudicial to establishment interest..." + + + + (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Contents Copyright (C) 1994 The Journal Of American Underground Computing + + and/or the author of the articles presented herein. All rights reserved. + + Nothing may be reproduced in whole or in part without written permission + + of the Editor-In-Chief and/or the author of the article. This publication + + is made available periodically to the amateur computer hobbyist free of + + charge. Any commercial usage (electronic or otherwise) is strictly + + prohibited without prior consent of the Editor, and is in violation of + + applicable US Copyright laws. To subscribe, send email to sub@fennec.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + DISCLAIMER AND NOTICE TO DISTRIBUTORS - + + + + NOTE: This electronic publication is to be distributed free of charge + + without modifications to anyone who wishes to have a copy. Under NO + + circumstances is any issue of this publication, in part or in whole, + + to be sold for money or services, nor is it to be packaged with other + + computer software, including, but not limited to CD Rom disks, without + + the express written or verbal consent of the author and/or editor. + + To obtain permission to distribute this publication under any of the + + certain circumstances stated above, please contact the editor at one of + + the addresses above. If you have intentions of publishing this journal + + in any of the ways described above, or you are in doubt about whether or + + not your intentions conflict with the restrictions, please contact the + + editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com + + This publication is provided without charge to anyone who wants it. + + This includes, but is not limited to lawyers, government officials, + + cops, feds, hackers, social deviants, and computer hobbyists. If anyone + + asks for a copy, please provide them with one, or mail the subscription + + list so that you may be added. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LET THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING ADVERTISE FOR YOU. + + + + Computer services, Online access, Books, Software, Video, Music, + + Wierdness, Publishing, Hardware, Anything! + + + + For more information, send electronic mail to: rates@fennec.com + + You will be mailed a detailed list of rates and other information. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + COMING SOON!!! The Journal's own World-Wide Web Home Page. You will be + + notified by mail when it is ready for use. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + NOW AVAILABLE: If you do not have FTP access, and would like to get back + + issues of the Journal, please mail: info@fennec.com for more information + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + We are sorry for the bounce test problems for this issue...we have (had) + + a new way of mailing, but it obviously failed miserably. We have the + + issue corrected. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 6 + + + + TABLE OF CONTENTS + + + + Cyberdoggles And Virtual Pork Carl Guderian + + EFF Summary Of The Edwards/Leahy Digital Telephony Bill Stanton McCandlish + + Zine FAQ Jerod Pore + + Legion Of Doom T-Shirts Ad Chris Goggans + + A Point And Click Society Scott Davis + + Keynote Address: Crypto Conference Bruce Sterling + + Jackboots On The Infobahn John Perry Barlow + + Notes From Cyberspace, Volume 3 Readers + + Pornography Fouls Internet Paul Pihichyn + + Security / Coast FTP Unknown + + On the Subject of CyberCulture George Phillips + + A Comment On Clipper Azrael + + Sex, The Internet And The Idiots K.K. Campbell + + NBC's Anti-Net Campaign Alaric + + The Miami Device Project Marty Cyber + + Cybersell Michael Ege + + Some Info On Green Card Spam Unknown + + Cable Resources On The Net John Higgins + + IDS Announces New Rochelle, New York POP (AC 914) green@ids.net + + The Media List Adam M. Gaffin + + A TeleStrategies Event/Commercial Internet eXchange Unknown + + Scream Of Consciousness From WIRED 1.1 Stewart Brand + + Digital Cash Mini-FAQ For The Layman Jim Miller + + Patent Searching Email Server Now Open Gregory Aharonian + + Five "Hackers" Indicted for Credit Card/Computer Fraud CUD/AP Wire + + Clipper T-Shirts Norman Harman + + Cybernews Debuts Patrick Grote + + PC Magazine Declares The PIPELINE Best Internet Service James Gleick + + Scout Report Subscriptions Exceed 10,000 Internic + + The Future Of The Net Is At Hand James Parry + + Galactic Guide FAQ Steve Baker + + Employment Background Checks Agre/Harbs + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + The Computer Is Your Friend -Unknown + + Send Money, Guns, And Lawyers -H. S. Thompson + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CYBERDOGGLES AND VIRTUAL PORK - A SCENARIO FOR INTERNET II + + + + By Carl Guderian + + + + As one battle gets underway another is joined. While the EFF and others + + work to defend the noisy, colorful anarchy of the Net from the net.cops, + + the latter have begun gearing up for the endgame. If it's true that the + + electronic frontier is getting crowded while its newer colonists consider + + it too bare, then another system will be needed in a few years. That's the + + virtual Valley of Megiddo, the site of the (next) Final Battle between the + + techno-romantics and the corporate greyfaces. Internet II, or whatever + + they'll call it, is now only a vague idea in the minds of a few bureaucrats + + and infotainment industry execs, but it'll wind up a Mall of America, + + Panopticon, City of Quartz, or some other negative social metaphor (Brazil?). + + The first Internet grew up free because it was defined wholly by the users. + + Internet II, by contrast, will be a hybrid of corporate and government + + visions, combining the worst of both in a kind of Mendelian genetic + + distribution in which all offspring are defective. To the government it's + + a tax base and surveillance network; to industry it's a direct channel + + to a self-selecting, well-heeled market. To users the Internet is a + + community for which they've worked too hard to let it be taken away without + + a fight. + + + + The most obvious model for the Internet II standard is the U.S., or any + + other, civilian space program. It is about nothing so much as itself. The + + aerospace companies that are today inseparable from national space + + establishments make rockets or communications satellites. Like the designers + + of Internet II, they are concerned with delivering product (audiences) to + + the customers (advertisers). People generally support the space program + + because they hope it will open up space travel to everybody, from + + interplanetary honeymooners to lunar Libertarians (Jetsonian democracy!). + + Likewise, the Internet is popular because it's a vehicle for forming + + communities and getting free stuff. But Internet II will be about bandwidth, + + markets and security. The last item is emphasized because such a huge + + investment must be protected somehow, from the users of course. Whatever + + vision there might have been will be refocused instead on infrastructure. + + Call it information superhighway hypnosis, a trail of yellow stripes + + stretching to the horizon. Truly a vision to stir the soul. + + + + The pork barrel politics that characterize all big government projects will + + find a new arena on Internet II. The government can no longer pay for + + megaprojects like Internet II, but it can grant electronic Letters of + + Marque for companies to plunder the virtual seas under the federal colors. + + Obviously, the company or consortium that gets to write the new, none-dare- + + call-it-proprietary Internet protocols will have a leg up on competitors, + + sorta like the advantage Microsoft officially doesn't have over other + + developers for Windows. In the current and upcoming Congressional funding + + battles, watch for posturing by lawmakers from whatever states the + + infotainment conglomerates call their nominal homes (Austin? Provo? Los + + Gatos?). + + + + The relatively meager funding doled out by the government will become an + + instrument of control, and privacy and free expression on Internet II will + + be the first to go. While Reagan preached getting the government off the + + backs of the people, Transportation Secretary Elizabeth (Mrs. Bob) Dole + + ordered states to raise drinking ages and enforce seat-belt laws or else + + lose federal funding for highway development. The states meekly complied. + + Would-be government contractors will be told, adopt a Clipper-like standard + + or don't bother to apply. Infotainment industry execs will be grilled by + + Congress for allowing "pone" on the net. Subsequently, said execs will + + promise to read private e-mail and censor discussions in exchange for easy + + passage of whatever bill they're promoting at the time. In 1985, the Parents + + Music Resource Center, led by Tipper (Mrs. Albert) Gore and financed by the + + likes of Mike Love of the Beach Boys, instigated Senatorial hearings on + + raunchy rock lyrics. Recording studio heads and distributors agreed to + + label and categorize "offensive" music in hopes Congress would tax blank + + tapes to offset revenue losses the industry attributed to home taping. + + Happily, the bill died and the hearings degenerated into a circus. But + + community standards on Internet II may be those of Memphis, Tennessee, if a + + recent court decision stands, and the only cyber-sex will be the user + + squealing like a pig for multimedia producers, petty bureaucrats, and self- + + appointed moral watchdogs. Government attempts to rein in the Internet + + community will continue no matter which party is in power. Repression smells + + the same whether it's for "national security," "community standards," + + or raising PG kids in an X-rated world. + + + + Corporate plans for Internet II are even less palatable. The future dream + + is a shopping scheme, a Third Mall from the Sun. This corporate paradigm + + will kill the Internet as surely as will government interference and turn + + it into ²an Internet of shopkeepers. In a shopping mall the offerings are + + calculated to offend no one, so they please no one. Though a mall could, in + + theory, serve diverse interests, in reality it does not. Individual tastes + + being what they are, a customer could be offended by what it finds upon + + wandering into the wrong shop, and may leave the mall without buying + + anything. As a result, the mall loses the customer to a rival mall. To avoid + + this risk, the mall operator rents to shops with watered down selections, + + nothing too daring. Similarly, in a corporate online service, the range of + + allowable discussion topics is kept small to prevent users from who access + + the wrong discussion groups. Though itÿs possible to restrict access to the + + forum without censoring discussion within it, most services take the lazy way + + out and forbid them altogether, in case a user objects to their very + + existence. So much for open discussion on Internet II. + + + + The corporate vision accommodates shopkeepers who hate customers who browse + + but don't buy. Customers can turn a mall into a kind of public space for the + + price of a few sodas and pizza slices. Americans online on Internet II, + + however, will have to pay by the hour just to hang around. The ticking clock + + will prompt them to hurry up and pay for something to download. After being + + on the clock at work, consumers will get to log on and shop on the clock. + + Constant reminders of a rising bill will discourage idle chatting on the + + newsgroups, further restricting discussion on Internet II. + + + + Security will become an issue as cyberspace, once considered a kind of + + public space, becomes privatized. As with Los Angeles, Internet II will be + + vandalized by users who will take no pride in it because they will not own + + it. The Secret Service will work as mall cops for the owners of Internet II. + + The promise of "500 channels" betrays the limits of corporate vision. + + Internet II will be "one-to-many" like cable TV instead of the "many-to-many" + + structure of the common carriers, because the former facilitates billing and + + control by local monopolies. Also, customers are not accustomed to + + pay-per-call on a local line, but they're getting used to pay-per-view + + programming on cable. Will you cuss and spit when you drop offline during a + + rainstorm? You will...with [censored]. + + + + In the end, the corporate Internet will be designed for consumption, not + + community. Online services consider the latter an impediment to steady + + profits. Bovine consumers shop contentedly on 500 channels; discontented + + talkers just hog the lines. If corporate services had to destroy online + + communities that spring up like weeds in their well-kept yards, they would. + + Fortunately, they wonÿt have to; the Online Mall is barren ground. + + + + By some estimates, 1998 is the deadline to keep the Net from turning into + + the Third Mall from the Sun or that sanitized 1901 Kansas-style underground + + city in "A Boy and His Dog." Here are ways to kill that serpent in its + + shell. + + + + - Breathe down the necks of the architects of Internet II. + + Infotainment industry demands may require physical features that + + facilitate billing and copyright protection. The IRS and the cops will + + certainly want their own window into the Net. What the users want, + + assuming they know, is considered irrelevant. Change that by working + + through groups like the Electronic Frontier Foundation, but keep them from + + accepting "compromise" measures to wiretap "only" certain communications + + channels. It's like prison etiquette, in which the proper response to a + + proprietary hand on the shoulder is either a sock on the jaw or meek + + acceptance of what comes next. Given what's at stake, such a savage ethic + + applies. Freedom lent is freedom lost. + + + + - Boycott obvious government lapdogs. + + Do not surrender the Internet to the government; it has no legitimate + + claim to it. The Internet is like an abandoned military base built into a + + community by squatters. The original tenants have long ago gotten their + + money's worth from it and cannot take credit for the value added by the + + new settlers. The Internet communications standard, TCP/IP, which turned + + all the networks into the Internet, is public domain. The feds don't own + + it any more than they own the measurement of one U.S. gallon. The + + government still owns high-speed backbones, such as the National Science + + Foundation's NSFnet, and it can and does allow semi-private consortia like + + Merit to operate and maintain them. The users should claim the Internet, + + however, by usufruct ("fruitful use"), a legal concept under which + + squatters gain the right to occupy a structure in exchange for having + + improved it. If all else fails, boycott Internet II and go back to + + TCP/IP. The latter may not have the bandwidth and the bells and whistles + + of Internet II, but it works well enough and won't have wiretap-friendly + + features built into it. Most projected growth will come from the online + + services dumping settlers by the millions on Internet II, taking the load + + off the present Internet. Currently dedicated but unused Internet addresses + + can be redistributed. TCP/IP, the current protocol, can support 20+ million + + people worldwide, which is probably the proportion of the population + + willing and able to protect their freedom online. Even without an Internet, + + there are systems that will work in a pinch, like FIDOnet, invented by Tom + + Jennings and a few others. Using personal computers and ordinary phone + + lines, FIDOnet delivers e-mail to 30,000+ sites in the world. So + + alternatives exist, though it would be a shame to have to abandon a + + community just when it was starting to mature. De-evolution of the + + Internet community is a likely outcome but it's not inevitable. For the + + first time since the Whiskey Rebellion there's a chance to redirect + + American history from the seemingly endless march to centralized control. + + The technology is pretty cheap and widely available (unlike rockets), so + + it's a rare opportunity for real grass-roots action to create something + + that people can actually use. Internet doesn't have to go the way of other + + Big Science projects. But it will take a real fight; the other side won't + + deal if it doesn't think it has to. At stake is the future of the online + + community. Civilization built in an Autonomous Zone or pay-per-view + + surveillance (guess who pays?) in the Third Mall from the Sun: + + WHICH WILL IT BE? Those words fill the screen, accompanied by Raymond + + Massey whispering and chorus singing same, in "Things to Come." Fadeout). + + + + The Third Mall from the Sun concept belongs to late comic genius Bill Hicks. + + Burn joss money in his memory to help cover his bar tab in the afterlife. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM + + IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF + + YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR + + PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + EFF SUMMARY OF THE EDWARDS/LEAHY DIGITAL TELEPHONY BILL + + + + From Stanton McCandlish + + + + OVERVIEW + + -------- + + + + The Edwards/Leahy Digital Telephony bill places functional requirements on + + telecommunications carriers in order to enable law enforcement to continue + + to conduct authorized electronic surveillance. It allows a court to impose + + fines on carriers that violate the requirements, and mandates that the + + processes for determining capacity requirements and technical standards be + + open and public. The bill also contains significant new privacy + + protections; including an increased standard for government access to + + transactional data (such as addressing information contained in electronic + + mail logs), a requirement that information acquired through the use of pen + + registers or trap and trace devices not disclose the physical location of an + + individual, and an expansion of current law to protect the radio portion of + + cordless telephone conversations from unauthorized surveillance. + + + + + + SCOPE OF THE BILL. WHO IS COVERED? + + ----------------------------------- + + + + The requirements of the bill apply to "telecommunications carriers", which + + are defined as any person or entity engaged in the transmission or + + switching of wire or electronic communications as a common carrier for hire + + (as defined by section 3 (h) of the Communications Act of 1934), including + + commercial mobile services (cellular, PCS, etc.). The bill also applies to + + those persons or entities engaged in providing wire or electronic + + communication switching or transmission service to the extent + + that the FCC finds that such service is a replacement for a substantial + + portion of the local telephone exchange. + + + + The bill does not apply to online communication and information services + + such as Internet providers, Compuserve, AOL, Prodigy, and BBS's. It also + + excludes private networks, PBX's, and facilities which only interconnect + + telecommunications carriers or private networks (such as most long + + distance service). + + + + + + REQUIREMENTS IMPOSED ON CARRIERS + + -------------------------------- + + + + Telecommunications carriers would be required to ensure that they + + possess sufficient capability and capacity to accommodate law enforcement's + + needs. The bill distinguishes between capability and capacity + + requirements, and ensures that the determination of such requirements occur + + in an open and public process. + + + + + + CAPABILITY REQUIREMENTS + + ----------------------- + + + + A telecommunications carrier is required to ensure that, within four years + + from the date of enactment, it has the capability to: + + + + 1. expeditiously isolate the content of a targeted communication + + within its service area; + + + + 2. isolate call-identifying information about the origin and + + destination of a targeted communication; + + + + 3. enable the government to access isolated communications at a point + + away from the carrier's premises and on facilities procured by the + + government, and; + + + + 4. to do so unobtrusively and in such a way that protects the privacy + + and security of communications not authorized to be intercepted + + (Sec. 2601). + + + + However, the bill does not permit law enforcement agencies or officers to + + require the specific design of features or services, nor does it prohibit a + + carrier from deploying any feature or service which does not meet the + + requirements outlined above. + + + + + + CAPACITY REQUIREMENTS + + --------------------- + + + + Within 1 year of enactment of the bill, the Attorney General must + + determine the maximum number of intercepts, pen register, and trap and + + trace devices that law enforcement will require four years from the date of + + enactment. Notices of capacity requirements must be published in the + + Federal Register (Sec. 2603). Carriers have 4 years to comply with + + capacity requirements. + + + + PROCESS FOR DETERMINING TECH. STANDARDS TO IMPLEMENT CAPABILITY REQUIREMENTS + + ---------------------------------------------------------------------------- + + + + Telecommunications carriers, through trade associations or standards + + setting bodies and in consultation with the Attorney General, must + + determine the technical specifications necessary to implement the + + capability requirements (Sec. 2606). + + + + The bill contains a 'safe harbor' provision, which allows a carrier to meet + + its obligations under the legislation if it is in compliance with publicly + + available standards set through this process. A carrier may deploy a + + feature or service in the absence of technical standards, although in such + + a case the carrier would not be covered by the safe harbor provision and + + may be found in violation. + + + + Furthermore, the legislation allows any one to file a motion at the FCC in + + the event that a standard violates the privacy and security of + + telecommunications networks or does not meet the requirements of the bill + + (Sec. 2606). If petitioned under this section, the FCC may establish + + technical requirements or standards that: + + + + 1) meet the capability requirements (in Sec. 2602); + + + + 2) protect the privacy and security of communications not authorized + + to be intercepted, and; + + + + 3) encourage the provision of new technologies and services to the + + public. + + + + + + ENFORCEMENT AND PENALTIES + + ------------------------- + + + + In the event that a court or the FCC deems a technical standard to be + + insufficient, or if law enforcement finds that it is unable to conduct + + authorized surveillance because a carrier has not met the requirements of + + this legislation, the Attorney General can request that a court issue an + + enforcement order (an order directing a carrier to comply), and/or a fine + + of up to $10,000 per day for each day in violation (Sec. 2607). However, a + + court can issue an enforcement order or fine a carrier only if it can be + + determined that no other reasonable alternatives are available to law + + enforcement. This provision allows carriers to deploy features and + + services which may not meet the requirements of the bill. Furthermore, + + this legislation does not permit the government to block the adoption or + + use of any feature or service by a telecommunications carrier which does + + not meet the requirements. + + + + The bill requires the government to reimburse carriers for all reasonable + + costs associated with complying with the capacity requirements. In other + + words, the government will pay for upgrades of current features or + + services, as well as any future upgrades which may be necessary, pursuant + + to published notices of capacity requirements (Sec. 2608). + + + + There is $500,000,000 authorized for appropriation to cover the costs of + + government reimbursements to carriers. In the event that a smaller sum is + + actually appropriated, the bill allows a court to determine whether a + + carrier must comply (Sec. 2608 (d)). This section recognizes that + + telecommunications carriers may not be responsible for meeting the + + requirements if the government does not cover reasonable costs. + + + + The government is also required to submit a report to congress within four + + years describing all costs paid to carriers for upgrades (Sec. 4). + + + + + + ENHANCED PRIVACY PROTECTIONS + + ---------------------------- + + + + The legislation contains enhanced privacy protections for transactional + + information (such as telephone toll records and electronic mail logs) + + generated in the course of completing a communication. Current law permits + + law enforcement to gain access to transactional information through a + + subpoena. The bill establishes a higher standard for law enforcement + + access to transactional data contained electronic mail logs and other + + online records. Telephone toll records would still be available through a + + subpoena. Under the new standard, law enforcement is required to obtain a + + court order by demonstrating specific and articulable facts that electronic + + mail logs and other online transactional records are relevant and material + + to an ongoing criminal investigation (Sec. 10). + + + + Law enforcement is also prohibited from remotely activating any + + surveillance capability. All intercepts must be conducted with the + + affirmative consent of a telecommunications carrier and activated by a + + designated employee of the carrier within the carrier's facilities (Sec. + + 2604). + + + + The bill further requires that, when using pen registers and trap and trace + + devices, law enforcement will use, when reasonably available, devices which + + only provide call set up and dialed number information (Sec. 10). This + + provision will ensure that as law enforcement employs new technologies in + + pen register and trap and trace devices, it will not gain access to + + additional call setup information beyond its current authority. + + + + Finally, the bill extends the Electronic Communications Privacy Act (ECPA) + + protections against interception of wireless communications to cordless + + telephones, making illegal the intentional interception of the radio + + portion of a cordless telephone (the transmission between the handset + + and the base unit). + + + + + + CELLULAR SCANNERS + + ----------------- + + + + The bill makes it a crime to possess or use an altered telecommunications + + instrument (such as a cellular telephone or scanning receiver) to obtain + + unauthorized access to telecommunications services (Sec. 9). This + + provision is intended to prevent the illegal use of cellular and other + + wireless communications services. Violations under this section face + + imprisonment for up to 15 years and a fine of up to $50,000. + + + + + + IMPROVEMENTS OF THE EDWARDS/LEAHY BILL OVER PREVIOUS FBI PROPOSALS + + ------------------------------------------------------------------ + + + + The Digital Telephony legislative proposal was first offered in 1992 by the + + Bush Administration. The 1992 version of the bill: + + + + * applied to all providers of wire or electronic communications + + services (no exemptions for information services, interexchange + + carriers or private networks); + + + + * gave the government the explicit authority to block or enjoin a + + feature or service that did not meet the requirements; + + + + * contained no privacy protections; + + + + * contained no public process for determining the capacity + + requirements; + + + + * contained no government reimbursement (carriers were responsible + + for meeting all costs); + + + + * would have allowed remote access to communications by law + + enforcement, and; + + + + * granted telecommunications carriers only 18 months to comply. + + + + The Bush Administration proposal was offered on capitol hill for almost a + + year, but did attract any congressional sponsors. + + + + The proposal was again offered under the Clinton Administration's FBI in + + March of 1993. The Clinton Administration's bill was a moderated version + + of the original 1992 proposal: + + + + * It required the government to pay all reasonable costs incurred by + + telecommunications carriers in retrofitting their facilities in + + order to correct existing problems; + + + + * It encouraged (but did not require), the Attorney General to consult + + with telecommunications industry representatives and standards + + bodies to facilitate compliance, + + + + * It narrowed the scope of the legislation to common carriers, rather + + than all providers of electronic communications services. + + + + Although the Clinton Administration version was an improvement + + over the Bush Administration proposal, it did not address the + + larger concerns of public interest organizations or the + + telecommunications industry. The Clinton Administration version: + + + + * did not contain any protections for access to transactional + + information; + + + + * did not contain any public process for determining the capability + + requirements or public notice of law enforcement's capacity needs; + + + + * would have allowed law enforcement to dictate system design and + + bar the introduction of features and services which did not meet + + the requirements, and; + + + + * would have allowed law enforcement to use pen registers and trap and + + trace devices to obtain tracking or physical location information. + + + + + + Locating Relevant Documents + + =========================== + + + + ** Original 1992 Bush-era draft ** + + + + ftp.eff.org, /pub/EFF/Policy/FBI/Old/digtel92_old_bill.draft + + gopher.eff.org, 1/EFF/Policy/FBI/Old, digtel92_old_bill.draft + + http://www.eff.org/pub/EFF/Policy/FBI/Old/digtel92_old_bill.draft + + bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital + + Telephony; file: digtel92.old + + + + ** 1993/1994 Clinton-era draft ** + + + + ftp.eff.org, /pub/EFF/Policy/FBI/digtel94_bill.draft + + gopher.eff.org, 1/EFF/Policy/FBI, digtel94_bill.draft + + http://www.eff.org/pub/EFF/Policy/FBI/digtel94_bill.draft + + bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital + + Telephony; file: digtel94.dft + + + + + + ** 1994 final draft, as sponsored ** + + + + ftp.eff.org, /pub/EFF/Policy/FBI/digtel94.bill + + gopher.eff.org, 1/EFF/Policy/FBI, digtel94.bill + + http://www.eff.org/pub/EFF/Policy/FBI/digtel94.bill + + bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital + + Telephony; file: digtel94.bil + + + + + + ** EFF Statement on sponsored version ** + + + + ftp.eff.org, /pub/EFF/Policy/FBI/digtel94_statement.eff + + gopher.eff.org, 1/EFF/Policy/FBI, digtel94_statement.eff + + http://www.eff.org/pub/EFF/Policy/FBI/digtel94_statement.eff + + bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital + + Telephony; file: digtel94.eff + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + 'ZINE FAQ + + + + By Jerod Pore (jerod23@well.sf.ca.us) + + + + This file is Shareright 1994 by Jerod Pore; you may (and please do) copy, + + reproduce, replicate and distribute this information however, whereever + + and in whatever format, and as often as you wish, as long as this sentence + + is included. + + + + Answers to Frequently Asked Questions. + + + + What are zines? + + + + Zines are small press publications with a press run of 15 - 5,000. They + + often deal with obscure or controversial subjects, or they're about the + + life of the publisher, or they're about the latest underground muzak + + sensation. + + + + How does one find out about zines? + + + + The best place to start is with Factsheet Five or Factsheet Five-Electric. + + We review 1,000 - 1,500 zines every three months (more or less). We + + provide ordering information, size, quality of reproduction, contents and + + what we think about a zine. Once you get a few zines that sound + + interesting, you'll notice other zines referred to. Pretty soon you'll + + have more reading material then you know what to do with. + + + + + + How does one produce a zine? + + + + That's beyond the scope of this document. But my stock answer is go to + + lunch at 11:30 am, get back by 12:15 and you should have plenty of time + + to use the equipment at school or at work. Write down your thoughts (I + + suggest doing artwork on your own time), photocopy 40 or 50 copies, send + + one to us and to a few zines you think would be interested in yours. + + You may want to get the Zine Publishers' Resource guide, either $3.00 + + from Seth at the address below, or the prior version is available from + + the ftp and gopher sites. + + + + + + How does one get the zines? + + + + When ordering zines, cash is the best medium of exchange. Forget what + + your mother told you about evil thieves stealing one dollar bills out of + + mail boxes. If you absolutely must send a check or money order (and a + + money order is preferred over a check), then make it out to the name in + + the address portion of the reviews. However, many people publish zines + + under pseudonyms. Unless available only for a ridiculous amount of money, + + just send cash. + + + + Many zines, especially personal zines, science fiction fanzines and + + anarchist zines are available for what is quaintly known as "The Usual." + + "The Usual" is your zine or tape or record or calendar in trade, or a + + well-written Letter of Comment on the subject of the zine, or $2 - $3. + + Be warned about a few things. There are no guarantees. Checks are + + likely to be thrown away. Some zine names with especially offensive + + titles have often had their mail thrown away by self-righteous born- + + again postal workers, I kid you not! If the name of the zine is apt to + + offend your third-grade teacher, don't put it on the envelope. Some + + zines published in rather provincial parts of the world won't get their + + mail if the publisher's name isn't on the envelope, so whatever the name + + is in address, that's the name that should go on the envelope. I can + + work only with what information is provided me. I'll post any special + + requirements that are conveyed to me. If a zine is free, you may want + + to help out with some stamps. Free often translates as "The Usual," and + + many anarchists will accept food stamps. + + + + + + How to contact us with questions, etc. regarding F5 - either the paper + + or electronic versions. + + + + The email address for Factsheet Five and Factsheet Five - Electric is: + + jerod23@well.sf.ca.us + + + + Once upon a time, Seth had an email address. It may be reactivated in the + + future. The phone number for Factsheet Five (paper only) is +1-415-668-1781 + + + + + + Where should stuff be sent? + + + + For anything that can't be sent electronically, which is most of the + + stuff we deal with; comments, questions, feedback, donations, zines and + + other contributions to the defense of free expression rights around the + + world should be sent to either of these addresses: + + + + Factsheet Five + + Seth Friedman + + PO Box 170099 + + San Francisco CA 94117-0099 + + (This is the *only* address for subscriptions to the paper version) + + + + Factsheet Five + + Jerod Pore + + 1800 Market St. + + San Francisco CA 94102-6297 + + (This address is good for items that can't be sent to a PO Box) + + + + If you have a preference of reviewers, then send your zine to either of + + the above addresses as you see fit. Please, though, send your zine to + + just *ONE* address. Multiple copies just slow us down. I do most of + + the Fringe, Hate, Rant, SubGenius and Science Fiction/Fantasy zines. + + Seth either reviews or distributes the rest. + + + + We have a couple of long-time reviewers for two niches. They publish + + their own review zines so you get twice the coverage. We must stress that + + you send poetry to Luigi-Bob, because poetry sent to San Francisco won't + + be reviewed for a couple of issues. + + + + Send your queer, bi or especially prurient zines to: + + + + Larry-bob + + Queer Zine Explosion + + PO Box 591275 + + San Francisco CA 94159-1275 + + + + Send all poetry or prose/poetry zines with lots of poetry to: + + + + Luigi-Bob Drake + + Burning Press + + PO Box 585 + + Lakewood OH 44107 + + + + How does one obtain the reviews of zines? + + + + The files that comprise Factsheet Five - Electric are available for + + online reading or downloading from WELL or with a gopher client with + + gopher gopher.well.sf.ca.us. The files are also available via anonymous + + ftp from etext.archive.umich.edu in /pub/Factsheet.Five. The prior issue + + is in /pub/Factsheet.Five/Last.Issue. The WWW site is http://www.well.com/ + + You may subscribe to Factsheet Five - Electric by emailing me with + + "subscribe" in the subject line and your email address as the *entire* text. + + The files are sent out as they become available. Email subscriptions are + + sent out *last*, as it's a real pain in the ass for me to deal with. + + F5-E is available from other ftp and gopher sites, as well as BBS's around + + the world, but I don't track other locations. + + + + + + What is the best method of receiving the review files? + + + + The WELL is the "best" place. Not only is The WELL the greatest BBS in + + CyberSpace (no, I don't get a kickback; I pay $30-50 a month to be on + + WELL) it's the homebase for F5 - Electric. The most recent files are + + there. Online zines that are sent to me are there. News, gossip and + + rumours about zines and other underground media are there. 2600, Full + + Disclosure, bOING-bOING and other zinesters are there. The + + WELL is, however, somewhat expensive at $15.00 a month and $2.00 an + + hour. After WELL, ftp, gopher or WWW are the next best ways of getting + + the files. + + + + Our ftp sites accept anonymous as a login and your return address as a + + password. For some people, especially those of you on FidoNet, Compu$erve + + and other services with email-only gateways to The Internet, email is the + + *only* way to get the files. Unfornuately, the large file sizes (files + + range from 8 - 100k) prevent many locations from receiving them through + + email, especially uunet and uucp sites. + + + + + + + + How do ftp, gopher and WWW users know when new or updated files are + + available? + + + + For now, updates to F5-E will be announced in the newsgroups that + + attract people interested in zines: alt.zines and rec.mag + + An excellent suggestion was made about having an email service that + + announces just the names of the new or updated files to ftp users. + + I've juggled two email subscription lists, so this idea will be too much + + of a hassle to implement. I don't know if the zines-list is still active. + + If it is, I might send announcements out that way. + + + + What is alt.zines? + + + + alt.zines is a Usenet newsgroup about zines. It's where we discuss zine + + publishing, hype our zines, bitch about mainstream publications trying + + to coopt zines and so forth. It's unmoderated, but there's a few of us + + there most of the time to answer these questions over&over&over and to + + point out that your slick publication about Christian technology with a + + circulation of over 150,000 is *not* a zine. + + + + Much of the posts in alt.zines are xposted to rec.mag, to benefit people + + at sites where the anal-retentive administrators refuse to carry the + + alt. hierarchy. + + + + + + May the files be reprinted or posted elsewhere? + + + + All files (just like this one) are shareright. You may reproduce the + + information contained within them freely as long as others may reproduce + + that same information. In other words, you may use but not copyright + + these files. Shareright does not prevent you from charging money (or + + whatever your preferred medium of exchange is) for distribution. + + Including pertinent parts of this file, and giving credit to the + + reviewers is especially good for your karma, but not absolutely required + + to use what you wish of the review files. We're more interested in the + + widespread dissemination of the information. BBS operators are + + especially encouraged to make whatever files you deem appropriate + + available to your users. + + + + How does one submit reviews? + + + + For now, email the reviews to me. This could be subject to change, once + + we work out everything. Each file will have reviews of one or more + + zines that are somehow categorized together by subject matter or by + + reviewer. Also feel free to post to alt.zines reviews of zines you have + + come across or to hype your own zines. I've adopted the nerdy HTML format + + that is used for WWW browsing. + + + + While sticking to the format is nice, it is not necessary, as long as + + all pertinent information is included. However if the reviews are to be + + accessible by the Web, then you had better do them this way. + + Please keep all reviews in vanilla ASCII format. Also keep them shareright. + + + + We are especially in need of reviews ezines and of zines that are published + + outside of North America. Now, I get zines from Australia and, since I + + used to live there, I understand the dialect and cultural references. + + We don't have the resources to review zines that aren't published in + + English. I'd rather that F5-Electic not be an English only publication. + + If you get zines from other parts of the world and are willing to review + + them, please send the reviews to me. + + + + We are carrying a listing of ezines, thanks to johnl@netcom.com, but we + + would like to get more reviews of ezines, too. + + + + What are the subscription rates and/or sample copy prices for the print + + version of Factsheet Five? + + + + Single issues: + + US Newsstand Cover Price: $3.95 (Marketing sucks!) + + US via 1st Class: $6.00 + + Canada, Mexico: $6.00 + + Elsewhere in the world: $9.00 + + + + Six issue Subscription: + + US 3rd Class: $20.00 + + Friend Rate* $40.00 + + + + * First class, in an envelope, with the publisher's eternal gratitude AND + + the occassional subscriber goodie, like the Zine Publisher's Guide, or + + + + 2 pounds of zines for $3.00. + + Canada, Mexico: $35.00 + + UK, Europe, Latin America $45.00 + + Asia, Africa, Pacific $55.00 + + + + + + "We accept for payment cash (US or otherwise), check or money order drawn + + in US funds (payable to Factsheet Five), or IRCs (at the rate of $0.50 + + each). Prisoners may get single issues by paying in stamps." + + + + Please foward orders to: + + R. Seth Friedman + + P.O. Box 170099 + + San Francisco, CA 94117-0099 + + + + + + Will the subscription list (for the paper version) be sold? + + + + Seth plans making the list available to lots of cool companies like + + Archie McPhee, Blue Ryder, Co-Op America, and Kitchen Sink Press. If + + you have an aversion to receiving cool catalogs and other neat stuff in + + the mail, just mention it with your order. We'll be sure to keep your + + address private. + + + + What about the subscription list to the electronic version? + + + + The only thing I'll do with the email list is dump it when I get fed up + + with emailling huge files. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LEGION OF DOOM T-SHIRTS!! Get 'em + + + + By Chris Goggans + + + + After a complete sellout at HoHo Con 1993 in Austin, TX this past + + December, the official Legion of Doom t-shirts are available + + once again. Join the net luminaries world-wide in owning one of + + these amazing shirts. Impress members of the opposite sex, increase + + your IQ, annoy system administrators, get raided by the government and + + lose your wardrobe! + + + + Can a t-shirt really do all this? Of course it can! + + + + "THE HACKER WAR -- LOD vs MOD" + + + + This t-shirt chronicles the infamous "Hacker War" between rival + + groups The Legion of Doom and The Masters of Destruction. The front + + of the shirt displays a flight map of the various battle-sites + + hit by MOD and tracked by LOD. The back of the shirt + + has a detailed timeline of the key dates in the conflict, and + + a rather ironic quote from an MOD member. + + + + (For a limited time, the original is back!) + + + + "LEGION OF DOOM -- INTERNET WORLD TOUR" + + + + The front of this classic shirt displays "Legion of Doom Internet World + + Tour" as well as a sword and telephone intersecting the planet + + earth, skull-and-crossbones style. The back displays the + + words "Hacking for Jesus" as well as a substantial list of "tour-stops" + + (internet sites) and a quote from Aleister Crowley. + + + + All t-shirts are sized XL, and are 100% cotton. + + + + Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for + + postage. + + + + Send checks or money orders. Please, no credit cards, even if + + it's really your card. + + + + + + Name: __________________________________________________ + + + + Address: __________________________________________________ + + + + City, State, Zip: __________________________________________ + + + + + + I want ____ "Hacker War" shirt(s) + + + + I want ____ "Internet World Tour" shirt(s) + + + + Enclosed is $______ for the total cost. + + + + Mail to: Chris Goggans + + 603 W. 13th #1A-278 + + Austin, TX 78701 + + + + These T-shirts are sold only as a novelty items, and are in no way + + attempting to glorify computer crime. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + A POINT AND CLICK SOCIETY + + LEARN TO DRIVE, OR GET OFF THE ROAD + + + + An Editorial + + + + By Scott Davis (dfox@fc.net) + + + + As a computer support professional, I am unfortunate enough to see some + + of the developments pertaining to the Internet as they occur. I say + + "unfortunate" not because what I see is so terrible, but what I see never + + ceases to knock me off of my feet. What I am referring to is the massive + + wave of new people coming on to the "Inpho-s00per Highway" who if not for + + icons to click on and a mouse to click with, would not be able to use a + + personal computer...much less some global network. Uhh..uhh I thank I'm + + referrin' to that "Inter-Net" thang... + + + + People are being sucked into a revolution of digital "Everything". + + Computers do their taxes, balance their books, order groceries and other + + products, and deliver electronic mail...among other things. But, it bugs me + + to no end to see somebody with an e-mail address from AOL. It makes me + + want to mail them back and tell them "HEY! Did you know that you are on + + the dirt road that runs beside the Internet?" Or tell them to "Get out + + of the ghetto of the Internet." "Do you know what you're doing?" + + + + What the big companies have done is give the masses a loaded gun... and + + the masses have never fired a weapon in their life! They've given them + + a Porsche 944...and they've never driven a car. But I also question the + + common sense of the average computer user. "Do you know what this computer + + does?" The bottom line is that there are more things to do with this thing + + than point and click on all of your pretty applications. + + + + Services such as AOL promote things like "electronic mail" and "Access to + + the Internet". But how many people who purchased the software did any + + reading or research as to WHAT the Internet is. WHAT is electronic mail? + + I know that I'll probably get a thousand flames for this article, and + + they'll say 'We were all newbies once!" I am completely aware of that, + + but when we (people who have been on the Net for 5+ years) were new, + + we had to learn every aspect of what we were getting into. There was no + + point-and-click options. If we did not know command line operations, + + we didn't surf! One problem can be contributed to the press. This is + + the fact that they have made "The Internet" and Info-SuperHighway" + + buzz-phrases that people are going to be attracted to because they + + sound "cool". + + + + There are no PC-based computers being marketed without Dos and Windows + + to this editor's knowledge. When the customer sees "Dos and Windows", + + how many people do you think say, "Hey Look...it's got Dos too!" + + It simply does not happen. Who cares what an operating system is, right? + + Well, the fact is...you better care. Because without an operating system, + + you wouldn't be able to point and click on you pretty little icons. + + + + I commend AOL, Compuserve, Microsoft and others who develop software + + for the masses. They do a fine job and a great service to the world. + + Computing just would not be the same without them (I guess). + + + + Computers are being mass-marketed and distributed to the public like + + social security cards. For the big-boys in the industry, this is good. + + It means profit, jobs, and market-share...and that sometime soon, every + + household in America will have at least one computer (or doorstop) and the + + owner will not know the first thing about it. + + + + Commercial software manufacturers and Internet service providers are + + looking at this as a slaughter. Rounding up the cattle, as it were. + + This is fine with me, but it is the end-user's responsibility to + + do work on his/her own to know what this "Hi-Tek-Hiway" is. There are + + ways not to become sheep. And if you don't do your homework, you don't + + deserve better. + + + + I think that people should be required to attend some in-depth computer + + courses before being able to buy one. + + + + * Computer Basics: This class would last a total of 100 hours. Two hours + + a night, three nights a week. Windows and other applications would not + + be discussed. The students would have to prove that they are proficient + + in Dos, Unix, or whatever command-line operating system their PC used. + + At the end of the 100 hour course, if they passed the command-line stuff, + + they would be permitted to attend a class that provided instruction + + on GUI's and other software. + + + + * Internet Basics 101: If the sheep are so eager to get on this damn + + SuperHighway, learn what it is about. Learn where it origninated and + + what it can do. --- and learn how NOT to be a headache to others. + + Ethics would be a portion of the instruction. Learn who you are, + + evaluate your place on the Net, and know that no matter who you are... + + there are bigger and better hackers out there. + + + + * Learn the difference between the Highway and the shoulder. + + + + * What is "REAL" access and just a gateway to where you WISH you were. + + + + * Hardware Troubleshooting: If my floppy disk drive is not working, I'd + + kinda like to know what to do to see if it is actually broken. If you + + purchased a $30,000 car and there were no service centers in the world, + + wouldn't you like to know how to change your oil? + + + + * Telecommunications Instruction: What is a modem? What does it do? + + Learn how to use non-commercial telecom software. Find some modem + + software package that does not come from a major service provider + + or is not used with the most popular GUI in the world...and call up a + + few local bulletin board systems. Also, if my modem is not functioning, + + I'd like to know some of the reasons why, and try to correct them. + + + + These are some simple suggestions that I believe everyone should do before + + purchasing a computer system. Of course, if you have been using computers + + for an extended period of time and proclaim to know how they work, there + + would be a CLEP test for you. Answer 5 questions about hardware, three + + questions on Internet, and answer NO to the question "Do you use Windows?" + + and you'll be on your way home with that new system. This is certainly not + + an attempt to hammer commerical services and/or providers, certain + + software programs designed to make computing easier, or the people who + + use them. It's simply a statement saying "Know what you're doing, make + + yourself open to fluctuations in trends, educate yourself on global + + networking, and have a nice day." There is no excuse for ignorance. Open + + your documentation, go to the book store, whatever. Do your homework. + + Otherwise, pull over...you're going to jail for driving without a license. + + + + There are political fights going on right now over different aspects of + + this "SuperHighway" that you're so eager to get on. The decisions made + + will ultimately affect you. Do you care? You should. There are lawyers, + + lobbyists, organizations such as the Electronic Frontier Foundation, + + and many individuals fighting for your right to use the services that + + you use. They are fighting to keep it "usable." + + + + In closing, be alert, be aware...and get educated. The light at the end of + + the tunnel to success might be a locomotive! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM + + IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF + + YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR + + PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + + + KEYNOTE ADDRESS : CRYPTOGRAPHY CONFERENCE + + + + By Bruce Sterling (bruces@well.sf.ca.us) + + + + Hello everybody. It's quite an honor to be delivering the + + keynote address -- a *thankfully brief* keynote address -- at this + + conference. I hope to clear the decks in short order, and let you + + spend an engrossing afternoon, listening to an intense discussion of + + complex and important public issues, by highly qualified people, who + + fully understand what they're talking about. Unlike myself. + + + + Before all this begins, though, I do want to establish a + + context for this conference. Let me briefly put on my professional + + dunce-hat, as a popular-science writer, and try to make it clear to + + you exactly what the heck is going on here today. + + + + Cryptography. The science and study of secret writing, especially + + codes and cypher systems. The procedures, processes, measures and + + algorithms for making and using secret exchanges of information. + + *Secret* exchanges, done, made and conducted without the knowledge of + + others, whether those others be governments, competitors, local, state + + or federal police, private investigators, wiretappers, cellular + + scanners, corporate security people, marketers, merchandisers, + + journalists, public health officials, squads for public decency, + + snoopy neighbors, or even your own spouse, your own parents, or your + + own children. + + + + Cryptography is a way to confine knowledge to the initiated and + + the privileged in your circle, whatever that circle might be: + + corporate co-workers, fellow bureaucrats, fellow citizens, fellow + + modem-users, fellow artists, fellow writers, fellow + + influence-peddlers, fellow criminals, fellow software pirates, fellow + + child pornographers. + + + + Cryptography is a way to assure the privacy of digital way to + + help control the ways in which you reveal yourself to the world. It + + is also a way to turn everything inside a computer, even a computer + + seized or stolen by experts, into an utterly scrambled Sanskrit that + + no one but the holder of the key can read. It is a swift, powerful, + + portable method of high-level computer security. Electronic + + cryptography is potentially, perhaps, even a new form of information + + economics. + + + + Cryptography is a very hot issue in electronic civil liberties + + circles at the moment. After years of the deepest, darkest, + + never-say-anything, military spook obscurity, cryptography is out of + + the closet and openly flaunting itself in the street. Cryptography is + + attracting serious press coverage. The federal administration has + + offered its own cryptographic cure-all, the Clipper Chip. + + Cryptography is being discussed openly and publicly, and practiced + + openly and publicly. It is passing from the hands of giant secretive + + bureaucracies, to the desktop of the individual. Public-key + + cryptography, in particular, is a strange and novel form of + + cryptography which has some very powerful collateral applications and + + possibilities, which can only be described as bizarre, and possibly + + revolutionary. Cryptography is happening, and happening now. + + + + It often seems a truism in science and technology that it takes + + twenty years for anything really important to happen: well, + + Whitfield Diffie was publishing about public-key cryptography in 1975. + + The idea, the theory for much of what will be discussed today was + + already in place, theoretically, in 1975. This would suggest a target + + date of 1995 for this issue to break permanently out of the arid world + + of theory, and into the juicy, down-and-dirty real world of politics, + + lawsuits, and money. I rather think that this is a likely scenario. + + Personally, I think the situation's gonna blow a seam. And by + + choosing to attend this EFF and EFF-Austin conference in September + + 1993, you are still a handy two years ahead of the curve. You can + + congratulate yourself! + + + + Why do I say blow a seam? Because at this very moment, ladies + + and gentlemen, today, there is a grand jury meeting in Silicon Valley, + + under the auspices of two US federal attorneys and the US Customs + + Service. That grand jury is mulling over possible illegality, + + possible indictments, possible heaven-knows-what, relating to supposed + + export-law violations concerning this powerful cryptography + + technology. A technology so powerful that exporting cryptographic + + algorithms requires the same license that our government would grant + + to a professional armaments dealer. We can envision this federal + + grand jury meeting, in San Jose California, as a kind of dark salute + + to our conference here in Austin, a dark salute from the forces of + + the cryptographic status quo. I can guarantee you that whatever you + + hear at this conference today, is not gonna be the last you hear about + + this subject. + + + + I can also guarantee you that the people you'll be hearing from + + today are ideal people to tell you about these issues. I wrote a book + + once, partly about some of these people, so I've come to know some of + + them personally. I hope you'll forgive me, if I briefly wax all + + sentimental in public about how wonderful they are. There will be + + plenty of time for us to get all hardened and dark and cynical later. + + I'll be glad to help do that, because I'm pretty good at that when I + + put my mind to it, but in the meantime, today, we should feel lucky. + + We are lucky enough to have some people here who can actually tell us + + something useful about our future. Our real future, the future we can + + actually have, the future we'll be living in, the future that we can + + actually do something about. + + + + We have among us today the board of directors of the Electronic + + Frontier Foundation. They are meeting in Austin in order to pursue + + strategy for their own national organization, but in the meantime, + + they also have graciously agreed to appear publicly and share their + + expertise and their opinions with us Austinites. Furthermore, they + + are not getting a dime out of this; they are doing it, amazingly, out + + of sheer public-spiritedness. + + + + I'm going to introduce each of them and talk about them very + + briefly. I hope you will reserve your applause until the end. + + Although these people deserve plenty of applause, we are short on + + quality applause resources. In fact, today we will be rationing + + applause care, in order to assure a supply of basic, decent, + + ego-boosting applause for everyone, including those unable to + + privately afford top-quality applause care for the health of their own + + egos. A federal-policy in-joke for the many Washington insiders we + + have in the room today. + + + + Very well, on to the business at hand. Mitch Kapor is a + + cofounder of the Electronic Frontier Foundation, a software designer, + + a very prominent software entrepreneur, a philanthropist, a writer and + + journalist, and a civil liberties activist. In 1990, when Mr. Kapor + + co-founded EFF, there was very considerable legal and constitutional + + trouble in the world of cyberspace. Mitch spoke out on these + + sometimes-arcane, sometimes-obscure issues, and he spoke loudly, + + repeatedly, publicly, and very effectively. And when Mitch Kapor + + finished speaking-out, those issues were no longer obscure or arcane. + + This is a gift Mitch has, it seems. Mitch Kapor has also quietly done + + many good deeds for the electronic community, despite his full + + personal knowledge that no good deed goes unpunished. We very likely + + wouldn't be meeting here today, if it weren't for Mitch, and anything + + he says will be well worth your attention. + + + + Jerry Berman is the President and Director of Electronic + + Frontier Foundation, which is based in Washington DC. He is a + + longtime electronic civil liberties activist, formerly the founder and + + director of the Projects on Privacy and Information Technology for the + + American Civil Liberties Union. Jerry Berman has published widely on + + the legal and legislative implications of computer security and + + electronic communications privacy, and his expertise in networks and + + the law is widely recognized. He is heading EFF's efforts on the + + national information infrastructure in the very thick of the + + Clinton-Gore administration, and Mr Berman, as you might imagine, is a + + very busy man these days, with a lot of digital irons in the virtual + + fire. + + + + Mr. Kapor and Mr Berman will be taking part in our first panel + + today, on the topic of EFF's current directions in national public + + policy. This panel will last from 1:45 to 3PM sharp and should be + + starting about fifteen minutes after I knock it off and leave this + + podium. We will allow these well-qualified gentlemen to supply their + + own panel moderation, and simply tell us whatever is on their minds. + + And I rather imagine that given the circumstances, cryptography is + + likely to loom large. And, along with the other panels, if they want + + to throw it open for questions from the floor, that's their decision. + + + + There will be a fifteen-minute break between each panel to + + allow our brains to decompress. + + + + Our second panel today, beginning at 3:15, will be on the + + implications of cryptography for law enforcement and for industry, and + + the very large and increasingly dangerous areas where police and + + industry overlap in cyberspace. Our participants will be Esther Dyson + + and Mike Godwin. + + + + Esther Dyson is a prominent computer-industry journalist. + + Since 1982, she has published a well-known and widely-read industry + + newsletter called Release 1.0. Her industry symposia are justly + + famous, and she's also very well-known as an industry-guru in Central + + and Eastern Europe and the former Soviet Union. Ms Dyson is very + + knowledgeable, exceptionally well-informed, and always a healthy + + distance ahead of her time. When it comes to the computer industry, + + Esther Dyson not only knows where the bodies are buried, she has a + + chalk outline ready-and-waiting for the bodies that are still upright! + + She's on the Board of EFF as well as the Santa Fe Institute, the + + Global Business Network, the Women's Forum, and the Poynter Institute + + for Media Studies. + + + + Mike Godwin is the legal services council for EFF. He is a + + journalist, writer, attorney, legal theorist, and legal adviser to the + + electronically distressed. He is a veteran public speaker on these + + topics, who has conducted many seminars and taken part in many fora + + all over the United States. He is also a former Austinite, a graduate + + of the UT School of Law, and a minor character in a William Gibson + + novel, among his other unique distinctions. Mike Godwin is not only + + in EFF inside the beltway of Washington, but is on the board of the + + local group, EFF-Austin. Mike Godwin is a well-known, one might even + + say beloved, character in the electronic community. Mike Godwin is + + especially beloved to those among us who have had machinery sucked + + into the black hole of a federal search-and-seizure process. + + + + Our third panel today, beginning at 4:45, will be the uniquely + + appropriate Cypherpunk Panel. Our three barricade-climbing, + + torch-waving, veteran manifesto-writers will be John Perry Barlow, + + John Gilmore and Eric Hughes. + + + + Mr Eric Hughes is NOT a member of the EFF Board of Directors. + + Mr Hughes is the moderator of the well-known, notorious even, Internet + + cypherpunk mailing list. He is a private citizen and programmer from + + the Bay Area of California, who has a computer, has a modem, has + + crypto-code and knows how to use it! Mr Hughes is here today entirely + + on his own, very considerable, initiative, and we of EFF-Austin are + + proud to have him here to publicly declare anything and everything + + that he cares to tell us about this important public issue. + + + + Mr John Gilmore *is* a member of the EFF Board. He is a + + twenty-year veteran programmer, a pioneer in Sun Microsystems and + + Cygnus Support, a stalwart of the free software movement, and a + + long-term electronic civil libertarian who is very bold and forthright + + in his advocacy of privacy, and of private encryption systems. Mr + + Gilmore is, I must say, remarkable among UNIX and GNU programmers for + + the elegance and clarity of his prose writings. I believe that even + + those who may disagree with Mr Gilmore about the complex and important + + issues of cryptography, will be forced to admit that they actually + + understand what Mr Gilmore is saying. This alone makes him a + + national treasure. Furthermore, John Gilmore has never attended + + college, and has never bought a suit. When John Gilmore speaks his + + mind in public, people should sit up straight! + + + + And our last introductee is the remarkable John Perry Barlow. + + Journalist, poet, activist, techno-crank, manifesto-writer, WELLbeing, + + long-time lyricist for the Grateful Dead, co-founder of Electronic + + Frontier Foundation, member of the Wyoming Republican Party, a man who + + at last count had at least ten personal phone numbers, including two + + faxes, two cellulars and a beeper; bon vivant, legend in his own + + time, a man with whom superlatives fail, art critic, father of three, + + contributing editor of MONDO 2000, a man and a brother that I am proud + + to call truly *my kind of guy:* John Perry Barlow. + + + + So these are our panelists today, ladies and gentlemen: a fine + + group of public-spirited American citizens who, coincidentally, happen + + to have a collective IQ high enough to boil platinum. Let's give + + them a round of applause. + + + + (((frenzied applause))) + + + + Thank you. Ladies and gentlemen, EFF-Austin is not the EFF. + + We are a local group with our own incorporation and our own unique + + organizational challenges. We are doing things on a local scale, + + where the National EFF cannot operate. But we know them, and we + + *like* them, and we are proud to have them here. Furthermore, every + + time some Austin company, such as Steve Jackson Games Incorporated, or + + the currently unlucky Austin Codeworks, publishers of a program called + + "Moby Crypto," find themselves in some strange kind of federal hot + + water, we are not only proud to know the EFF, we are *glad* to know + + them. Glad, and *grateful!* They have a lot to tell us today, and + + they are going to tell us things they believe we really need to know. + + And after these formal panels, this evening from 8 to 10, we are + + going to indulge in a prolonged informal session of what we Austinites + + are best at: absorbing alcohol, reminiscing about the Sixties, and + + making what Mitch Kapor likes to call "valuable personal contacts." + + + + We of EFF-Austin are proud and happy to be making information + + and opinion on important topics and issues available to you, the + + Austin public, at NO CHARGE!! + + + + Of course, it would help us a lot, if you bought some of the + + unbelievably hip and with-it T-shirts we made up for this gig, plus + + the other odd and somewhat overpriced, frankly, memorabilia and + + propaganda items that we of EFF-Austin sell, just like every other + + not-for-profit organization in the world. Please help yourself to + + this useful and enlightening stuff, so that the group can make more + + money and become even more ambitious than we already are. + + + + And on a final note, for those of you who are not from Austin, + + I want to say to you as an Austinite and member of EFF-Austin, welcome + + to our city. Welcome to the Capital of Texas. The River City. The + + City of the Violet Crown. Silicon Hills. Berkeley-on-the-Colorado. + + The Birthplace of Cyberpunk. And the Waterloo of the Chicago Computer + + Fraud and Abuse Task Force. + + + + You are all very welcome here. + + + + So today, let's all learn something, and let's all have some + + fun. Thanks a lot. + + + + | Disclaimers : You are encouraged to re-distribute this | + + | document electronically. Any opinions expressed belong to | + + | the author and not the organization. (c) 1993. | + + [From the EFF-Austin online newsletter, _WORD_, Issue #9] + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + -Editor's Note: This is a little old...but still good and important reading! + + + + =-=-=-=-=-=-Copyright 1993,4 Wired USA Ltd. All Rights Reserved=-=-=-=-=-= + + -=-=For complete copyright information, please see the end of this file=-=- + + + + JACKBOOTS ON THE INFOBAHN + + + + By John Perry Barlow (WIRED 2.04) + + + + Clipper is a last ditch attempt by the United States, the last great power + + from the old Industrial Era, to establish imperial control over cyberspace. + + + + [Note: The following article appeared in the April 1994 issue of WIRED. + + We, the editors of WIRED, are net-casting it now in its pre-published form + + as a public service. Because of the vital and urgent nature of its message, + + we believe readers on the Net should hear and take action now. You are free + + to pass this article on electronically; in fact we urge you to replicate it + + throughout the net with our blessings. If you do, please keep the copyright + + statements and this note intact. For a complete listing of Clipper-related + + resources available through WIRED Online, send email to + + with the following message: "send clipper.index". - The Editors of WIRED] + + + + On January 11, I managed to schmooze myself aboard Air Force 2. It was + + flying out of LA, where its principal passenger had just outlined his + + vision of the information superhighway to a suited mob of television, show- + + biz, and cable types who fervently hoped to own it one day - if they could + + ever figure out what the hell it was. + + + + From the standpoint of the Electronic Frontier Foundation the speech had + + been wildly encouraging. The administration's program, as announced by Vice + + President Al Gore, incorporated many of the concepts of open competition, + + universal access, and deregulated common carriage that we'd been pushing + + for the previous year. + + + + But he had said nothing about the future of privacy, except to cite among + + the bounties of the NII its ability to "help law enforcement agencies + + thwart criminals and terrorists who might use advanced telecommunications + + to commit crimes." + + + + On the plane I asked Gore what this implied about administration policy on + + cryptography. He became as noncommittal as a cigar-store Indian. "We'll be + + making some announcements.... I can't tell you anything more." He hurried + + to the front of the plane, leaving me to troubled speculation. + + + + Despite its fundamental role in assuring privacy, transaction security, and + + reliable identity within the NII, the Clinton administration has not + + demonstrated an enlightenment about cryptography up to par with the rest of + + its digital vision. + + + + The Clipper Chip - which threatens to be either the goofiest waste of + + federal dollars since President Gerald Ford's great Swine Flu program or, + + if actually deployed, a surveillance technology of profound malignancy - + + seemed at first an ugly legacy of the Reagan-Bush modus operandi. "This is + + going to be our Bay of Pigs," one Clinton White House official told me at + + the time Clipper was introduced, referring to the disastrous plan to invade + + Cuba that Kennedy inherited from Eisenhower. + + + + (Clipper, in case you're just tuning in, is an encryption chip that the + + National Security Agency and FBI hope will someday be in every phone and + + computer in America. It scrambles your communications, making them + + unintelligible to all but their intended recipients. All, that is, but the + + government, which would hold the "key" to your chip. The key would + + separated into two pieces, held in escrow, and joined with the appropriate + + "legal authority.") + + + + Of course, trusting the government with your privacy is like having a + + Peeping Tom install your window blinds. And, since the folks I've met in + + this White House seem like extremely smart, conscious freedom-lovers - + + hell, a lot of them are Deadheads - I was sure that after they were fully + + moved in, they'd face down the National Security Agency and the FBI, let + + Clipper die a natural death, and lower the export embargo on reliable + + encryption products. + + + + Furthermore, the National Institutes of Standards and Technology and the + + National Security Council have been studying both Clipper and export + + embargoes since April. Given that the volumes of expert testimony they had + + collected overwhelmingly opposed both, I expected the final report would + + give the administration all the support it needed to do the right thing. + + + + I was wrong. Instead, there would be no report. Apparently, they couldn't + + draft one that supported, on the evidence, what they had decided to do + + instead. + + + + THE OTHER SHOE DROPS + + + + On Friday, February 4, the other jackboot dropped. A series of + + announcements from the administration made it clear that cryptography would + + become their very own "Bosnia of telecommunications" (as one staffer put + + it). It wasn't just that the old Serbs in the National Security Agency and + + the FBI were still making the calls. The alarming new reality was that the + + invertebrates in the White House were only too happy to abide by them. + + Anything to avoid appearing soft on drugs or terrorism. + + + + So, rather than ditching Clipper, they declared it a Federal Data + + Processing Standard, backing that up with an immediate government order for + + 50,000 Clipper devices. They appointed the National Institutes of Standards + + and Technology and the Department of Treasury as the "trusted" third + + parties that would hold the Clipper key pairs. (Treasury, by the way, is + + also home to such trustworthy agencies as the Secret Service and the Bureau + + of Alcohol, Tobacco, and Firearms.) + + + + They reaffirmed the export embargo on robust encryption products, admitting + + for the first time that its purpose was to stifle competition to Clipper. + + And they outlined a very porous set of requirements under which the cops + + might get the keys to your chip. (They would not go into the procedure by + + which the National Security Agency could get them, though they assured us + + it was sufficient.) + + + + They even signaled the impending return of the dread Digital Telephony, an + + FBI legislative initiative requiring fundamental reengineering of the + + information infrastructure; providing wiretapping ability to the FBI would + + then become the paramount design priority. + + + + INVASION OF THE BODY SNATCHERS + + + + Actually, by the time the announcements thudded down, I wasn't surprised by + + them. I had spent several days the previous week in and around the White + + House. + + + + I felt like I was in another remake of The Invasion of the Body Snatchers. + + My friends in the administration had been transformed. They'd been subsumed + + by the vast mindfield on the other side of the security clearance membrane, + + where dwell the monstrous bureaucratic organisms that feed on fear. They'd + + been infected by the institutionally paranoid National Security Agency's + + Weltanschauung. + + + + They used all the telltale phrases. Mike Nelson, the White House point man + + on the NII, told me, "If only I could tell you what I know, you'd feel the + + same way I do." I told him I'd been inoculated against that argument during + + Vietnam. (And it does seem to me that if you're going to initiate a + + process that might end freedom in America, you probably need an argument + + that isn't classified.) + + + + Besides, how does he know what he knows? Where does he get his information? + + Why, the National Security Agency, of course. Which, given its strong + + interest in the outcome, seems hardly an unimpeachable source. + + + + However they reached it, Clinton and Gore have an astonishingly simple + + bottom line, to which even the future of American liberty and prosperity is + + secondary: They believe that it is their responsibility to eliminate, by + + whatever means, the possibility that some terrorist might get a nuke and + + use it on, say, the World Trade Center. They have been convinced that such + + plots are more likely to ripen to hideous fruition behind a shield of + + encryption. + + + + The staffers I talked to were unmoved by the argument that anyone smart + + enough to steal a nuclear device is probably smart enough to use PGP or + + some other uncompromised crypto standard. And never mind that the last + + people who popped a hooter in the World Trade Center were able to get it + + there without using any cryptography and while under FBI surveillance. + + + + We are dealing with religion here. Though only ten American lives have been + + lost to terrorism in the last two years, the primacy of this threat has + + become as much an article of faith with these guys as the Catholic + + conviction that human life begins at conception or the Mormon belief that + + the Lost Tribe of Israel crossed the Atlantic in submarines. + + + + In the spirit of openness and compromise, they invited the Electronic + + Frontier Foundation to submit other solutions to the "problem" of the + + nuclear-enabled terrorist than key escrow devices, but they would not admit + + into discussion the argument that such a threat might, in fact, be some + + kind of phantasm created by the spooks to ensure their lavish budgets into + + the post-Cold War era. + + + + As to the possibility that good old-fashioned investigative techniques + + might be more valuable in preventing their show-case catastrophe (as it was + + after the fact in finding the alleged perpetrators of the last attack on + + the World Trade Center), they just hunkered down and said that when + + wiretaps were necessary, they were damned well necessary. + + + + When I asked about the business that American companies lose because of + + their inability to export good encryption products, one staffer essentially + + dismissed the market, saying that total world trade in crypto goods was + + still less than a billion dollars. (Well, right. Thanks more to the + + diligent efforts of the National Security Agency than to dim sales + + potential.) + + + + I suggested that a more immediate and costly real-world effect of their + + policies would be to reduce national security by isolating American + + commerce, owing to a lack of international confidence in the security of + + our data lines. I said that Bruce Sterling's fictional data-enclaves in + + places like the Turks and Caicos Islands were starting to look real-world + + inevitable. + + + + They had a couple of answers to this, one unsatisfying and the other scary. + + The unsatisfying answer was that the international banking community could + + just go on using DES, which still seemed robust enough to them. (DES is the + + old federal Data Encryption Standard, thought by most cryptologists to be + + nearing the end of its credibility.) + + + + More frightening was their willingness to counter the data-enclave future + + with one in which no data channels anywhere would be secure from + + examination by one government or another. Pointing to unnamed other + + countries that were developing their own mandatory standards and + + restrictions regarding cryptography, they said words to the effect of, + + "Hey, it's not like you can't outlaw the stuff. Look at France." + + + + Of course, they have also said repeatedly - and for now I believe them - + + that they have absolutely no plans to outlaw non-Clipper crypto in the US. + + But that doesn't mean that such plans wouldn't develop in the presence of + + some pending "emergency." Then there is that White House briefing + + document, issued at the time Clipper was first announced, which asserts + + that no US citizen "as a matter of right, is entitled to an unbreakable + + commercial encryption product." + + + + Now why, if it's an ability they have no intention of contesting, do they + + feel compelled to declare that it's not a right? Could it be that they are + + preparing us for the laws they'll pass after some bearded fanatic has + + gotten himself a surplus nuke and used something besides Clipper to + + conceal his plans for it? + + + + If they are thinking about such an eventuality, we should be doing so as + + well. How will we respond? I believe there is a strong, though currently + + untested, argument that outlawing unregulated crypto would violate the + + First Amendment, which surely protects the manner of our speech as clearly + + as it protects the content. + + + + But of course the First Amendment is, like the rest of the Constitution, + + only as good as the government's willingness to uphold it. And they are, as + + I say, in the mood to protect our safety over our liberty. + + + + This is not a mind-frame against which any argument is going to be very + + effective. And it appeared that they had already heard and rejected every + + argument I could possibly offer. + + + + In fact, when I drew what I thought was an original comparison between + + their stand against naturally proliferating crypto and the folly of King + + Canute (who placed his throne on the beach and commanded the tide to leave + + him dry), my government opposition looked pained and said he had heard + + that one almost as often as jokes about roadkill on the information + + superhighway. + + + + I hate to go to war with them. War is always nastier among friends. + + Furthermore, unless they've decided to let the National Security Agency + + design the rest of the National Information Infrastructure as well, we need + + to go on working closely with them on the whole range of issues like + + access, competition, workplace privacy, common carriage, intellectual + + property, and such. Besides, the proliferation of strong crypto will + + probably happen eventually no matter what they do. + + + + But then again, it might not. In which case we could shortly find ourselves + + under a government that would have the automated ability to log the time, + + origin and recipient of every call we made, could track our physical + + whereabouts continuously, could keep better account of our financial + + transactions than we do, and all without a warrant. Talk about crime + + prevention! + + + + Worse, under some vaguely defined and surely mutable "legal authority," + + they also would be able to listen to our calls and read our e-mail without + + having to do any backyard rewiring. They wouldn't need any permission at + + all to monitor overseas calls. + + + + If there's going to be a fight, I'd rather it be with this government than + + the one we'd likely face on that hard day. + + + + Hey, I've never been a paranoid before. It's always seemed to me that most + + governments are too incompetent to keep a good plot strung together all the + + way from coffee break to quitting time. But I am now very nervous about the + + government of the United States of America. + + + + Because Bill 'n' Al, whatever their other new-paradigm virtues, have + + allowed the very old-paradigm trogs of the Guardian Class to define as + + their highest duty the defense of America against an enemy that exists + + primarily in the imagination - and is therefore capable of anything. + + + + To assure absolute safety against such an enemy, there is no limit to the + + liberties we will eventually be asked to sacrifice. And, with a Clipper + + Chip in every phone, there will certainly be no technical limit on their + + ability to enforce those sacrifices. + + + + WHAT YOU CAN DO + + + + GET CONGRESS TO LIFT THE CRYPTO EMBARGO + + + + The administration is trying to impose Clipper on us by manipulating market + + forces. By purchasing massive numbers of Clipper devices, they intend to + + induce an economy of scale which will make them cheap while the export + + embargo renders all competition either expensive or nonexistent. + + + + We have to use the market to fight back. While it's unlikely that they'll + + back down on Clipper deployment, the Electronic Frontier Foundation + + believes that with sufficient public involvement, we can get Congress to + + eliminate the export embargo. + + + + Rep. Maria Cantwell, D-Washington, has a bill (H.R. 3627) before the + + Economic Policy, Trade, and Environment Subcommittee of the House Committee + + on Foreign Affairs that would do exactly that. She will need a lot of help + + from the public. They may not care much about your privacy in DC, but they + + still care about your vote. + + + + Please signal your support of H.R. 3627, either by writing her directly or + + e-mailing her at cantwell@eff.org. Messages sent to that address will be + + printed out and delivered to her office. In the subject header of your + + message, please include the words "support HR 3627." In the body of your + + message, express your reasons for supporting the bill. You may also express + + your sentiments to Rep. Lee Hamilton, D-Indiana, the House Committee on + + Foreign Affairs chair, by e-mailing hamilton@eff.org. + + + + Furthermore, since there is nothing quite as powerful as a letter from a + + constituent, you should check the following list of subcommittee and + + committee members to see if your congressional representative is among + + them. If so, please copy them your letter to Rep. Cantwell. + + + + > Economic Policy, Trade, and Environment Subcommittee: + + + + Democrats: Sam Gejdenson (Chair), D-Connecticut; James Oberstar, D- + + Minnesota; Cynthia McKinney, D-Georgia; Maria Cantwell, D-Washington; Eric + + Fingerhut, D-Ohio; Albert R. Wynn, D-Maryland; Harry Johnston, D-Florida; + + Eliot Engel, D-New York; Charles Schumer, D-New York. + + + + Republicans: Toby Roth (ranking), R-Wisconsin; Donald Manzullo, R-Illinois; + + Doug Bereuter, R-Nebraska; Jan Meyers, R-Kansas; Cass Ballenger, R-North + + Carolina; Dana Rohrabacher, R-California. + + + + > House Committee on Foreign Affairs: + + + + Democrats: Lee Hamilton (Chair), D-Indiana; Tom Lantos, D-California; + + Robert Torricelli, D-New Jersey; Howard Berman, D-California; Gary + + Ackerman, D-New York; Eni Faleomavaega, D-Somoa; Matthew Martinez, D- + + California; Robert Borski, D-Pennsylvania; Donal Payne, D-New Jersey; + + Robert Andrews, D-New Jersey; Robert Menendez, D-New Jersey; Sherrod Brown, + + D-Ohio; Alcee Hastings, D-Florida; Peter Deutsch, D-Florida; Don Edwards, + + D-California; Frank McCloskey, D-Indiana; Thomas Sawyer, D-Ohio; Luis + + Gutierrez, D-Illinois. + + + + Republicans: Benjamin Gilman (ranking), R-New York; William Goodling, R- + + Pennsylvania; Jim Leach, R-Iowa; Olympia Snowe, R-Maine; Henry Hyde, R- + + Illinois; Christopher Smith, R-New Jersey; Dan Burton, R-Indiana; Elton + + Gallegly, R-California; Ileana Ros-Lehtinen, R-Florida; David Levy, R-New + + York; Lincoln Diaz-Balart, R-Florida; Ed Royce, R-California. + + + + BOYCOTT CLIPPER DEVICES AND THE COMPANIES WHICH MAKE THEM. + + + + Don't buy anything with a Clipper Chip in it. Don't buy any product from a + + company that manufactures devices with Big Brother inside. It is likely + + that the government will ask you to use Clipper for communications with the + + IRS or when doing business with federal agencies. They cannot, as yet, + + require you to do so. Just say no. + + + + LEARN ABOUT ENCRYPTION AND EXPLAIN THE ISSUES TO YOUR UNWIRED FRIENDS + + + + The administration is banking on the likelihood that this stuff is too + + technically obscure to agitate anyone but nerds like us. Prove them wrong + + by patiently explaining what's going on to all the people you know who have + + never touched a computer and glaze over at the mention of words like + + "cryptography." + + + + Maybe you glaze over yourself. Don't. It's not that hard. For some hands-on + + experience, download a copy of PGP - Pretty Good Privacy - a shareware + + encryption engine which uses the robust RSA encryption algorithm. And learn + + to use it. + + + + GET YOUR COMPANY TO THINK ABOUT EMBEDDING REAL CRYPTOGRAPHY IN ITS PRODUCTS + + + + If you work for a company that makes software, computer hardware, or any + + kind of communications device, work from within to get them to incorporate + + RSA or some other strong encryption scheme into their products. If they say + + that they are afraid to violate the export embargo, ask them to consider + + manufacturing such products overseas and importing them back into the + + United States. There appears to be no law against that. Yet. + + + + You might also lobby your company to join the Digital Privacy and Security + + Working Group, a coalition of companies and public interest groups - + + including IBM, Apple, Sun, Microsoft, and, interestingly, Clipper phone + + manufacturer AT&T - that is working to get the embargo lifted. + + + + ENLIST! + + + + Self-serving as it sounds coming from me, you can do a lot to help by + + becoming a member of one of these organizations. In addition to giving you + + access to the latest information on this subject, every additional member + + strengthens our credibility with Congress. + + + + > Join the Electronic Frontier Foundation by writing membership@eff.org. + + + + > Join Computer Professionals for Social Responsibility by e-mailing + + cpsr.info@cpsr + + + + .org. CPSR is also organizing a protest, to which you can lend your support + + by sending e-mail to clipper.petition@cpsr.org with "I oppose Clipper" in + + the message body. Ftp/gopher/WAIS to cpsr.org /cpsr/privacy/ + + + + crypto/clipper for more info. + + + + In his LA speech, Gore called the development of the NII "a revolution." + + And it is a revolutionary war we are engaged in here. Clipper is a last + + ditch attempt by the United States, the last great power from the old + + Industrial Era, to establish imperial control over cyberspace. If they + + win, the most liberating development in the history of humankind could + + become, instead, the surveillance system which will monitor our + + grandchildren's morality. We can be better ancestors than that. + + + + San Francisco, California + + + + Wednesday, February 9, 1994 + + + + * * * + + + + John Perry Barlow (barlow@eff.org) is co-founder and Vice-Chairman of the + + Electronic Frontier Foundation, a group which defends liberty, both in + + Cyberspace and the Physical World. He has three daughters. + + + + + + =-=-=-=-=-=-=-=-=-=-=-=WIRED Online Copyright Notice=-=-=-=-=-=-=-=-=-=-=-= + + + + Copyright 1993,4 Wired USA Ltd. All rights reserved. + + + + This article may be redistributed provided that the article and this + + notice remain intact. This article may not under any circumstances + + be resold or redistributed for compensation of any kind without prior + + written permission from Wired Ventures, Ltd. If you have any questions + + about these terms, or would like information about licensing materials + + from WIRED Online, please contact us via telephone (+1 (415) 904 0660) + + or email (info@wired.com). + + + + WIRED and WIRED Online are trademarks of Wired Ventures, Ltd. + + + + =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + NOTES FROM CYBERSPACE + + VOLUME 3 + + + + By Jonathan Yarden (jyarden@iglou.iglou.com) + + Subject: Mosaic on Digital Satellite System + + + + Anyone else out there getting a serious hard-on on the Digital Satellite + + System? From what I have heard this puppy is doing IP via satellite. + + For that matter, I can't think of any other real way to do what it does. + + Here is a partial list of 'features:' + + + + 1. The DSS system is designed to asychronously receive data. Each DSS + + receiver has a unique ID allowing it to process packetized wide-band data + + (which in most cases is MPEG encoded video). This happens *whenever* the + + unit is operational. + + + + 2. The modem in the DSS receiver is for the sending of requests and + + receipt of data from a local or long distance 'service.' The majority of + + requests are for 'keys' to decode channels, but could also be used to send + + subscription requests for other services. + + + + 3. There is a magnetic 'card' used to hold information about the types of + + services currently subscribed to by the DSS user. The card is readable + + as well as writeable. + + + + THE BIG IDEA + + + + Knowing that data flow in Mosaic is almost 99% server to client, this + + opens up a rather fast way to do Mosaic. For that matter, since most of + + the people who surf are just passing thru or getting data, this is a fast + + data pipe to just about anything. The only catch would be that the + + sending speed would be maxed out at about 14.4kbps. But, if you are on + + the client end of a 2GB FTP session, well you get the picture... + + + + 2nd reason: + + + + According to TRACEROUTE (unix hamsters, try this at home...) CIX is + + basically 'metering' data traffic onto their routes. First 16K goes real + + fast, then you hit the bottom of the process queue (sounds VAXen, doesn't + + it?) and it's the loser in a snail race. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM + + IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF + + YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR + + PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PORNOGRAPHY FOULS INTERNET + + + + By Paul Pihichyn (pihichyn@freepress.mb.ca) + + + + There is a river of slime in the gutters of the information highway + + and it's giving cyberspace a bad name. The virtual community, it appears, + + has been invaded by the same scum that has slithered into the real + + communities across the land. We're talking pornography, with a capital P, + + right there on the Internet. + + + + Maybe you caught the report on CNN last week about the Lawrence Livermore + + Laboratory in California. It seems some sleezeball there had loaded several + + gigabytes of filth into a server that was connected to the Internet, and + + promptly made it available to all 20 million-plus 'Netsurfers. It's + + probably not surprising that in a community of 20 million, you are going to + + find the same sad mix that you will find in the general population. But, + + somehow, I though the Internet would attract a better class of humanity. + + + + Nevertheless, the Internet has become the largest and most accessable source + + of pornographic material on the planet - and the real danger is it's + + accessible to anyone with a PC and modem, even to children. + + + + Journalist Erik Lacitis (elak.news@times.com) said it best recently in the + + Seattle times: "... has there ever been a bigger collection of mean- + + spirited, emotionally-deficient, just plain-weird, and mostly utterly + + boring people?" He prefaced the remark by saying he was taking a vacation + + from the Internet and going back to the real world. Actually, it would make + + more sense for those 'Net-bound weirdos to be taking a reality check. + + + + Hiding behind their cloak of anonymity, these folks hurl hateful insults at + + those with whom they disagree or feel they can bully by virtue of their + + perceived superior knowledge of the nooks and crannies of the Internet. + + It is on the Usenet that these really dumb things often take place. Now tell + + me, does the world really need a forum called alt.sex.pictures.female, + + or alt.sex.bondage? Or maybe just plain old alt.sex? I think not. + + + + The crap on these forums is pretty crude. Obscene by many community + + standards. And also pretty silly. Racy stories written by pimply-faced + + adolescent boys pretending to be ravishingly over-sexed and under-loved + + young women is hardly the stuff on which to build a world-wide information + + superhighway. + + + + Remember, the Internet is a network of networks, each linked through a host + + site - often a university or some other educational facility. Some of these + + host sites have taken steps to clean up their little corner of the Internet. + + + + Troll Usenet through the server at the University of Manitoba, and you won't + + find the newsgroups alt.sex.pictures.female, or alt.sex.bondage. + + The U of M, along with several other Internet providers, has denied its + + users access to some of the more blatantly pornographic newsgroups. Though + + some people may complain that this is censorship, an infringement on the + + freedom of the Internet, I take my hat off to those who made the decision + + to try to keep the Internet decent place to work and play. + + + + There have been incidents reported of Internet users actually being stalked, + + electronically, by some of the weirder weirdoes out there. The really scary + + part is that some of the cyberstalkers have actually slithered into the real + + world and attempted face-to-face encounters. + + + + The 'Net anonymity also give a lot of jerks a chance to be mean. If there + + is a crude remark that has ever been made about women, you'll find it posted + + on the 'Net. It seems, as Lacitis wrote, the Internet is populated with + + men who never grew up. + + + + Big as it is, the Internet is still in its infancy. It will take time to + + gain some maturity, to find a way to weed out the cretins and perverts. + + Once you get around the crud on the Internet, you will find it a wonderful + + place to learn, work and do business. + + + + By Paul Pihichyn, pihichyn@freepress.mb.ca + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SECURITY / COAST FTP archive on-line + + + + Announcing the COAST Security FTP Archive! + + + + The COAST group at Purdue are happy to (finally) announce the + + availability of our security archive. The archive is currently + + available via FTP, with extensions to gopher and WWW planned soon. + + + + The archive currently contains software, standards, tools, and other + + material in the following areas: + + + + * access control + + * artificial life + + * authentication + + * criminal investigation + + * cryptography + + * e-mail privacy enhancement + + * firewalls + + * formal methods + + * general guidelines + + * genetic algorithms + + * incident response + + * institutional policies + + * intrusion detection + + * law & ethics + + * malware (viruses, worms, etc) + + * network security + + * password systems + + * policies + + * privacy + + * risk assessment + + * security related equipment + + * security tools + + * social impacts + + * software forensics + + * software maintenance + + * standards + + * technical tips + + * the computer underground + + + + The collection also contains a large set of site "mirrors" of + + interesting collections, many of which are linked by topic to the rest + + of the archive. + + + + You can connect to the archive using standard ftp to + + "coast.cs.purdue.edu". Information about the archive structure and + + contents is present in "/pub/aux"; we encourage users to look there, + + and to read the README* files located in the various directories. + + + + If you know of material you think should be added, please send mail to + + security-archive@cs.purdue.edu and tell us what you have and where we + + can get a copy. In order of preference, we would prefer to get: + + + + -- a pointer to the source ftp site for a package + + -- a pointer to a mirror ftp site for the package + + -- a uuencoded tar file + + -- a shar file + + -- a diskette or QIC tape + + + + If you are providing software, we encourage you to "sign" the software + + with PGP to produce a standalone signature file. This will help to + + ensure against trojaned versions of the software finding their way + + into the archive. + + + + Any comments or suggestions about the archive should be directed to + + "security-archive@cs.purdue.edu" -- please let us know what you think! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + ON THE SUBJECT OF CYBERCULTURE + + + + By George Phillips (ice9@fennec.com) + + + + I hate to be an asshole, but my friends will tell you I'm pretty good at it. + + I usually try to keep an open mind about a lot of things, but some things + + just get under my skin. Today, it's this damn cyberculture thingy! I + + thought the hype was subsiding, but now it seems to have sprouted back up + + like a festering pustule on the mouths of everyone. Let's just ask the + + question: What is cyberculture? Is it some coffee-shop hallucination + + romance dreamed up by some art-school boy with no social outlet? Is it some + + third-rate term developed by the editors of certain magazines to justify + + their existance? Was it created from a desperate attempt at giving a name to + + people who just don't fit in? ...or is there something real to all this + + fantasy? Let's take a closer look. + + + + I went out and looked for anything "cyber." Magazines, books, people, places, + + clothes, and things. I started out by picking up a magazine called + + "Mondo-2000". I'm sure I heard somewhere that this was a "cyber-oriented" + + magazine. The cover art did nothing for me as far as helping define what + + "cyber" was. After a time, I quickly realized that this magazine caters to + + junior/highschool children with Nintendos and acne. I saw nothing "cyber" + + about it. In fact, I really saw no real culture. Sure it had art, music, + + graphics, features, etc...but doesn't every magazine? What is keeping me + + from calling Time or Newsweek "Cyber-mags"? Could it be? Is "cyber" just + + another buzz-word like "virtual?" No! + + + + William Gibson writes about people in the future accessing a matrix called + + cyberspace. This is the "virtual" area between computer systems. No doubt + + one can see the parallels between his matrix and our Internet. But is this + + all there is to it? No. There are people called "cyberpunks" that access + + this matrix and exploit it to their own ends. These are very good books, by + + the way. I enjoyed reading them. There has got to be a parallel between + + his cyberpunks and the hackers of today. Although the books are excellent, + + I have yet to see what "Cyber-Culture" is. (Hearing theme song from + + Jeopardy in my head...) + + + + Billy Idol recorded an album called CyberPunk. Chained to my chair and + + threatened with death if I did not listen to this "K-Rad" CD, I formed the + + opinion that Billy Idol has too much free time on his hands. The makeup of + + this album has absolutely nothing to do with the title, or subjects in any + + William Gibson book. Thats not to say its not a good album. I'm sure there + + are many out there who like his work, but as far as my quest was concerned, + + this was a dead end. I just don't comprehend the reasoning behind such + + a venture. + + + + Exhausted with my household search for the eternal answer, I decided to + + hit the streets and find some real, live, cyber-people. I heard that this + + culture usually hangs out in clubs or raves that play loud alternative + + industrial dance music. I found a couple places like that in Houston and + + Austin, so I decided to give it a try. I chose a club in Houston, Texas. + + The lights were hypnotic. The smart-drinks were flowing. The people were + + dancing and zoning on the special effects of the club. I picked out the + + most "cyber-looking" people I could find. I knew what to look for because I + + just recently picked through a Mondo-2000 magazine to see what their be-all + + end-all definition of a cyber-person was. These people could barely figure + + out how to turn on a computer! How could they call themselves "cyber?" + + Am I wrong when I say that the whole term "Cyber" has at least SOMETHING to + + do with computers? Needless to say, I was rather disappointed in the + + ignorance of these lifeless wanna-bees and misled by all of the advertising + + of this ever-elusive "Cyber-Culture". Color me confused. + + + + Well, I figured that if anyone knew about "Cyber-Culture," it would have to + + be the computer underground. This is supposed to be one of the smartest, + + most alternitive, techno-literate group around. There was a convention going + + on in Las Vegas called DefCon II. Played-up to be one of the largest + + gatherings of computer underground enthusiasts, I had to go. Although it is + + sad that this term "Cyber", while used so widely today, is hard to define. + + I am sad that I had to go to Las Vegas to find "Cyber"...if it was even + + there. + + + + This was obviously a place where "cyber-culture" came together! I decided + + to attend and look around. What I found was a large group of people + + drinking, smoking, viewing porn and talking about the latest security holes. + + These people were nothing like the people in Mondo-2000 or any other + + Cyber-rags. Where was their strange, multi-color clothing? So this is + + cyber-culture? + + + + I hit a few coffee shops, followed a group that I would bet that I saw in + + Mondo, tried psudo-virtual-reality hangouts, tried their smart drinks, + + smoked their tobacco, attempted being "trendy", and contemplated art + + in the most cyber-sense. My return: ZIP! NADA! NOTHING! + + + + From all of my travels and studies, I came up with a few theories. Although + + possibly distorted, I feel they are, for the most part true. + + + + Cyberculture is: + + + + 1) A bunch of burn-outs in a coffee shop, reading trendy "alternative" magazines, analyzing "alternative" music, and going to raves. + + + + 2) A bunch of kids doing large amounts of drugs, drinking smart-drinks, + + wearing flanel, attending "alternative" concerts like Woodstock '94 + + hopelessly babbling on about topics that they know nothing about. + + + + 3) Cigarettes and alcohol. + + + + I find none of these interesting and frankly, I don't see whats so damn + + fascinating about them! ...and still cannot determine why it is called + + "Cyber". I am getting to hate this term more each time I have to write or + + say it...because it means NOTHING! + + + + So, if anyone finds "Mr. or Ms. Cyber" please let me know. I am not claiming + + to be a know-it-all, but when the press, the public, and society in general + + latches on to a term which evidently globally-defines a people or attitude, + + and THEN rams it down my throat on the front page of the newspaper and on + + the six o' clock news, I have the RIGHT to know what in the hell it means. + + + + Have a virtual-cyber-underground-mondo-networkable-fiber-opticable day! + + + + Alternative viewpoints are not welcome because this is my cyber-column. + + Get your own! Take a pill and get a life. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + A COMMENT ON CLIPPER + + + + By Azrael (reinoa@ccaix3.unican.es) + + + + Greetings to all fellow cyberpunks, hackers, modem enthusiasts, + + programmers, viri-coders, civil-rights activists, anarchists, crypto- + + mathematicians and all. + + + + The echoes of the Clipper polemics are heard even here in Spain, mainly + + thru a distorted view given by the pre-net mass media, and the very few + + people hooked to some kind of comms net. + + + + The way I see it, it is NOT that awful that the government of the USA is + + trying (in its best tradition) to limit liberty and privacy through the + + implantation of mandatory 'crippled' encryption or 'key escrows' or + + secure-phones or what have you. Remember the good old theory of the shield + + and the sword. If there is no enemy, there is no battle, and if there's + + no battle, there's no point in hacking, anarchism, sabotage, and public + + opinion campaigns. If there's no threat to our freedom or privacy, our + + skills will decay, weaken, and we'll submit in the end to the exigences + + of those in power. + + + + Security in computer systems should be improved upon, so that hackers have + + to keep up to it. Anti-virus packages have to get better, so that virus + + makers develop new techniques. In the same way, threatened privacy in + + electronic communications will be an incentive for enterprising people + + to create new methods of avoiding eavesdropping, by the development of + + new, better and faster cryptographic algorithms. + + + + As long as we keep 'en garde', they can't beat us. They just can't. But + + if they leave us alone for a time, we'll grow in pride and self-confidence + + and a false sense of security, while they have time to re-arm. In that + + way, they'll have us in the end. + + + + Fight the power! (and be glad you need to) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SEX, THE INTERNET AND THE IDIOTS + + + + By K.K. Campbell (eye@io.org) + + + + There are two breeds of moron attracted to the Internet's relation to sex + + -- reporters and wankers. These categories may overlap, but that's beside + + the point. + + + + Canadian newsmedia owe a great deal of Internet education to Judge Francis + + Kovacs and his infamous Karla Homolka trial publication ban. That elevated + + the Internet to headline material. It is humorous to watch reporters/ + + editors grope for net.literacy. + + + + Talk with Justin Wells (stem@sizone.pci.on.ca) and Ken Chasse + + (root@sizone.pci.on.ca), the chaps who created alt.fan.karla-homolka as a + + lark, then found themselves hounded by reporters asking for "banned + + information, please." Or check out The Star's early stories, where Usenet + + newsgroups are called "computer billboards" -- whatever the hell those are. + + + + MEDIA MORONS + + + + Mainstream journalists without a rallying issue like a trial ban invariably + + end up with nothing better to do then bang the drum about the 3 Ps: + + pedophilia, piracy and pornography. + + + + Take the recent Internet "child molesters" silliness. Some teen somewhere + + is enticed into sex with an adult -- through America On Line, not the + + Internet -- and we have an "epidemic." Chicago's Harlan Wallach + + (wallach@mcs.com) reported in alt.internet.media-coverage how some dink + + named James Coates wrote a column for the July 15 Chicago Tribune called + + "Beware cybercreeps lurking on the Internet." True enough. But Coates' + + purpose is to frighten the middle class with some probably made-up story + + about "Vito," who cruises the net hoping "to have sex with children in + + wheelchairs." + + + + I understand Coates' pain. I can't spend 10 minutes in Internet Relay Chat + + (IRC) before someone asks if I'm a child in a wheelchair looking for a sex + + partner. Wallach told eye Coates has been going like this for months now -- + + "a master at work." + + + + Couple of weeks ago, California nuclear research facility Lawrence + + Livermore Labs discovered one computer held some dirty pictures. An employee + + gave away a password. Someone used that access to store the images. People + + could connect and get them. Nothing was hacked. Big deal. + + + + But on July 13, CNN reporter Don Knapp swooped in to whip up + + hysteria. Doom was clearly imminent. + + + + "Computer security specialists were surprised to find what may be the + + largest computer collection ever of hardcore pornography at the nation's + + top nuclear weapons and research laboratory," Knapp intoned ominously. + + Almost 2000 megs! Gol-ly! (Incidentally, 99 per cent of it was individual + + shots of nude/semi-nude women, no sexually explicit acts. Playboy stuff.) + + + + CNN rang Wired magazine writer Brian Behlendorf (brian@wired.com) and woke + + him at home, excited about "a big break-in at Laurence Livermore." Hackers + + and porno! If CNN was lucky, the hacker was a child molester. Behlendorf + + consented to an interview. CNN immediately asked him to "find some pictures + + of naked women on the Net for us." Behlendorf recounted the incident: "I + + really wasn't interested in doing that. I don't know of any FSP/FTP sites + + off hand anyways, and really didn't want to be associated with pictures of + + NEKKID GRRLS."* + + + + But amiable Behlendorf slid over to alt.binaries.pictures.supermodels and + + grabbed a picture of a model in a swimsuit. He also picked up a landscape, + + a race car and a Beatles album cover "to show that other images get sent + + over Usenet as well," naively thinking this point would be made -- though + + he stresses he by no means condones distributing copyrighted images, + + "clean" or otherwise. Behlendorf was then made to sit beside a terminal + + displaying Ms String-Bikini throughout all his comments. "They made me keep + + returning to that damn bikini image ... over and over." + + + + But intrepid reporter Don Knapp assured us all is well -- for now. + + "Spokespeople for the national laboratories insist that at no time were the + + pornographers, nor the software pirates, able to cross over from the + + research network into the classified network. The labs say that, while they + + are embarrassed, national security was not breached." + + + + Whew. + + + + YOU'RE GETTING VERY STUP- ERR, SLEEPY... + + + + Then you have regular net.wankers. Whoever said, "Never underestimate the + + intelligence of the American public," must read alt.sex.* newsgroups. + + + + For instance, the charismatic Aabid (aabid@elm.circa.ufl.edu) wrote a + + touching post called "I would like an enema myself!" to newsgroup sci.chem + + (science: chemistry). "Looking for a Middle Eastern M or F to help me with + + my enema desires. If you can be of assistance please email me." Readers of + + sci.chem were very intrigued and Aabid has made many interesting new + + friends. + + + + The greatest example of alt.sex stupidity is: The Hypnosis Program. + + + + As a joke, Indiana's Steve Salter (ssalter@silver.ucs.indiana.edu) posted to + + alt.sex.stories that he had a "hypnosis program" -- which you cleverly slip + + onto another person's computer where it will so mesmerize the unsuspecting + + target, he/she becomes your SEXUAL PLAYTHING, BENDING TO YOUR EVERY WHIM! + + For weeks after, global village idiots pestered him for copies. + + + + "I must have received over a hundred requests via private email or in + + alt.sex.stories for a copy of the program," Salter told eye. He had to + + publicly post a reply to stem the tide: "No offense, but get a rather + + large clue. There is no such animal. That was a joke. I thought it was + + obvious. How many people out there really want to hypnotize someone + + secretly? What the fuck is wrong with all of you?! What age group are + + we dealing with here? There is no such program!!! Sheesh..." + + + + Personally, I'm in agreement with David Romm + + (71443.1447@compuserve.com) who wrote: "I really liked the hypnosis + + program. It was much better than Cats." + + + + MASSAGE MY MEDIUM + + + + To get your own porn, there are lots of sites. Ask for the latest in + + the alt.sex groups. Check out alt.binaries.pictures.erotica to grab a + + few images. For text erotica, read in alt.sex.stories . + + + + If you can't access alt.sex groups because, say, your university is run by + + prudes, write (ahem) "Hot Stuff" (anon1ea3@nyx10.cs.du.edu) for details + + about his mail-server. He makes available hundreds of stories. We at eye + + have yet to sample this collection but are intrigued by two items: "Perils + + of Red Tape," which we assume reveals the lust-riddled world of civil + + service, and "Tales from the Network," the story of lonely boys sitting + + around Friday nights fingering their groins in IRC, praying someone with a + + female-sounding alias drops by. + + + + + + * FootNote: NEKKID GRRLS is idiomatic fresh-off-the-BBS net.wanker- + + speak. This language can be learned by hanging around newsgroups + + like alt.2600 . To convince others you are a deadly cool net.cruiser, + + write: "HEY, elite pir-8 d00ds! I got more NEKKID GRRLS philes than + + ANY OF U!!!! And U censorship loosers can SUCK MY DICK!!!!!" Send it + + to alt.sex . Make sure to cross-post to the comp.sys.ibm.* hierarchy + + because PCs are the most common computer and you will reach a wider + + audience. If you can manage it, post through an anonymous account + + and leave your personal signature with real address in the text of + + the message. + + + + +++++++++++++++++++++++++++++++++++++++++++ + + Retransmit freely in cyberspace Author holds standard copyright + + Full issue of eye available in archive ==> gopher.io.org or ftp.io.org + + Mailing list available http://www.io.org/eye + + eye@io.org "Break the Gutenberg Lock..." 416-971-8421 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + JAUC For Windows Project + + SCHEDULED FOR JANUARY RELEASE + + + + + + By Scott Davis (dfox@fc.net) + + + + The development team at Fennec Information systems is currently working on + + a project called "JAUC for Windows". This software will be a large + + Windows-based help file with ALL the issues of The Journal Of American + + Underground Computing, Editor's page with tons of info on the editorial + + staff, as well as a LOT of other information regarding the Internet... + + all accessible with the click of a mouse in Windows. The scheduled release + + date for this piece of software is sometime in January. A furious effort + + is underway to provide you with this file as soon as possible. You will be + + required to have Windows 3.0, 3.1, or some other Windows-based product. + + It will work with Windows For Workgroups, NT, Chicago, Daytona, etc... + + The file will be available for FTP from TWO sites on the Internet. Those + + sites will more than likely be FC.NET and ETEXT.ARCHIVE.UMICH.EDU. + + You will be sent a small note (if you are on our mailing list) when this + + product becomes available. At this time, the only method of distribution + + is FTP. We are working on other ways to get this out. We will update you. + + If you have any questions regarding this product, please mail: + + + + jauc-win@fennec.com + + + + You will be mailed any updates automatically. + + + + Editor. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + NBC's ANTI-NET CAMPAIGN + + + + By Alaric (Alaric@f111.n106.z1.fidonet.org) + + + + A most heinous act of info-terrorism has beem committed against the net + + community by "Dateline", NBC's pseudo-news propaganda ministry. + + + + To further the government's need to destroy the haven of free speech known + + as cyberspace, NBC has successfully deluded much of their reactionary + + brain-dead audience into beleiving that NETWORKS ARE DANGEROUS - BBS's ARE + + CRIMINAL. Something must be done! (Something will be done - read on...) + + + + The September 1 episode of Dateline paraded adventursome youths who had + + lost the occasional finger while honing their pyrotechnical skills with + + anarcho-terrorist data gleaned from BBSs and the net. Forrest "Goebbels" + + Sawyer whined that the young and restless data-seekers of the 90's have easy + + access to exciting netware titles such as "Bomb Making For Fun and Profit" + + and "Anarchist's Cookbook" with no governmental interference of any kind! + + The existence of such networks and their accessibility by Gen-X misfits + + poses a clear and present danger to the national security of the United + + States. + + + + You may recall the first such attempt at an anti-net freedom propaganda + + campaign failed miserably and was aborted. Not enough concerned citizens + + fell for the ruse of nets being an unfettered sanctuary for child porn + + mongers, NAMBLA dating services and wily molesters. Since the first trial + + balloon was floated and quickly transpired, Plan-B has been put into action. + + Let's see how many suckers will fall for this one, "Computer networks are + + a dangerous source of subversive terrorist information and the children + + must be protected." (Janet Reno was conspicuously absent from said + + broadcast) + + + + A CongressMan-ic Oppresive named Ed Markey (Dem. Mass 7th Dist) is trying + + to hold hearings on the dangers of computer networking and supposedly try + + to draft some legislation that would allow the governmnet to regulate the + + nets or BBSs. Undoubtedly the legislation if passed will have a chilling + + effect on net traffic, which frankly is getting way out of hand if you ask + + any bureaucrat with something to hide. Severe penalties will be brought + + against any sysop who allows minors to access anything that might be + + contrued as dangerous. No doubt this definition will eventually receive + + a broad enough interpretation to forbid instructions on the manufacture of + + smoke bombs, casting of all lead ammunition, cleaning a .22 rifle, and even + + slingshot repair. The true goal of such legislation of course is not to + + "protect the children", but to stifle the grassroots organizing of anti- + + statist groups and to squash the tide of truth that is flooding cyberspace + + and often embarrassing government and corporate interests. + + + + Look for a "Child Protection Act" subtitled "concerning minors' access to + + dangerous information" to come before Congress within 18 months. Sysops + + will become responsible for what information gets to whom and what they do + + with it, regardless of the diligence they show in keeping the nets safe. + + Disclaimers and signed age statements will no longer suffice. You WILL be + + responsible for the information travelling though your board or newsgroup + + and you WILL be held accountable. + + + + Is the Pen more Powerful than the Sword? This question may never be + + answered fully, so why not hold on to both? Yet the propaganda forces and + + strong arm tactics forces that managed to squeak by the ban on assault + + swords will now be unleashed on the modern-day pamphleteers of the net. + + Al Gore wants to build a kinder and gentler super-information tollroad to + + keep your pens in line. + + + + Netters will be able to mount a powerful counter-attack that will surprise + + the hell out of Big Brother and Little Rock Sister. Notify Rep. Markey that + + we are watching and ready to fight. Fax-blast his office. Dig into his + + dirt and spread liberally. Likewise show NBC that we are listening. Reach + + out and touch these folks as follows: + + + + dateline@news.nbc.com + + + + Representative Edward J. Markey (D-7th) + + Malden, MA + + Office phone (in DC): 202-225-2836 + + Energy and Commerce + + + + Markey is the Chairman of the subcomittee on + + Telecommunications and Finance - under Energy and Commerce + + 202-226-2424 subcommitee phone + + 202-226-2447 subcommitee fax + + + + This post should be crossposted and distributed. + + + + "They can have my net access when they pry the 486 from my + + dead, carpel tunnel syndrome-infested hands." + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CYBERSPACE, MIAMI, CHAOS, AND CLINTON + + THE MIAMI DEVICE PROJECT + + + + By Marty Cyber (cyb@gate.net) + + + + From December 8-11, 1994, Prez Clinton and Veep Gore, the Administration's + + point-man on the Infobahn will be coming to Miami to host the 35 + + democratically elected heads of government of every country in the Western + + Hemisphere from Canada to Tierra del Fuego. + + + + The event is called the Summit of The Americas, and you folks who read Wired + + and ARE wired should plug into this event via the Internet and via any other + + bit-radiation-receiver-transmitter-device you have access too. I'd like to + + get your ideas on how Cyberspace and Cybertech could help make the Summit a + + success from the point-of-view of telecomm and info-technologies --- in a + + word, to try to begin building and operating a Global Brain and Nervous + + System for Planet Earth that can help us all in private, public, academic + + and community sectors use Cyberspace to create some kind of movement toward + + a New World Order out of the Chaos and Complexity we are now trying to surf + + on, without a truly functional "cybersurfboard." + + + + I'm attaching a couple of files that could stimulate some interesting + + exchanges --- and hoping to get the likes of Negroponte, Kelly, Kapor, + + Fields, Minsky, Schank, Bruckman, Clinton, Gore, Mesarovich, Forrester, + + Shannon, Wiener, Prigogine, Crowley, Castro, Mas Canosa, Irving, + + Brown, Chiles, Cuomo, Tyson, Simon, Beer, Gleick, --- and YOU --- + + to all kick in some ideas on how to use the Miami Summit as a kickoff + + environment for launching a World Summit on The Future via Cyberspace. + + + + + + Do give me some "negative feedback," as the cyberneticians have been known + + to say. + + + + And if any of you would like to warm your cybernetic buns in Miami in + + December --- real buns or virtual buns --- give me some "bit-radiations." + + I've got an Art Deco apartment building in the heart of Miami Beach's + + cyberhip South Beach, and might be able to put you up. + + + + Clinton's awareness of, and ability to use, the Principles of Chaos, + + Complexity, Cybernetics and other modern organizational management and + + learning techniques may be decisive in determining if his Administration + + is able to create a New World Order on the Edge of the Current Turbulent + + ORDER/CHAOS Meridian. + + + + Unfortunately, day-to-day decisiomaking and policy selection in the White + + House frequently has so much noise injected on its channels from Whitewater, + + Senator Damato-type ignoramus-based partisan-politics, that serious policy + + problems like Cuba, and other Foreign, Domestic and Economic matters tend + + toward more chaotic and less orderly states. + + + + What the White House could use --- perhaps initially placed within its + + Office of Science and Technology Policy --- is a National Cybernetics + + Council. This group would consist of the nation and the world's specialists + + in Complex Systems Theory, Chaos, Cybernetics, Cyberspace, and a new field + + which integrates all of the above: CYBERTECTURE: The design, construction, + + and operation of "cybernetic systems" for government, business, education + + and city-planning. + + + + Pete Nelson is correct in suggesting that we need politicians and polities + + that can "embrace change, uncertainty, paradox and contradiction," but we + + also must equip the public, private, academic and community sectors of + + American (and World) Society to deal with this new level of complexity. + + + + In December, if current White House plans stay in place, President Clinton + + and VP Al Gore, Clinton's point-man in advancing his Administration's high- + + level policy objective of building a National and Global Information + + Infrastructure (NII/GII) --- the highly publicized "Information Superhighway" + + --- both of American Government's top-managers will travel to Miami to host + + the Summit of The Americas December 8-11, 1994. + + + + Although the primary agenda topics for all the invited democratically elected + + leaders of every coutry in the Western Hemisphere from Canada to the southern + + tip of Latin America will be Economic Integration, Democratic Political + + Systems, and extending NAFTA into WHFTA (a Western Hemisperhic Free Trade + + Agreement), and important sub-topic will be infrastructure -- especially + + Telecommunications and Information Infratructure. + + + + With "the Cybertecture of Cybersystems, policy makers and their politiescan + + steer through the current chaotic turbulences of today into a new, and + + hopefully better, world order of tomorrow. + + + + Clinton and Gore, with the proper cybertools, may be just what the world + + needs now. Our non-profit consulting partnership in Miami Beach, "The MIAMI + + DEVICE PROJECT/RESEARCH AND DEVELOPMENT PARTNERSHIP, has developed a concept- + + paper for this December Summit of the Americas that could help Clinton, and + + the rest of use, develop and use the cybersystems we need to steer into our + + 21st Century Future. + + + + The following text is a summary of our first draft of the Miami Device + + Project concept. We'd appreciate your feedback, comments, critiques, and + + suggestions on how to create a World Summit on The Future during December + + 1994 and January 1995 on the Internet and other related media such as print, + + broadcast, multimedia, and face-to-face conferences. Also broadening the + + audiences for the work of the Santa Fe Institute, Bill Gleick, Ilya + + Prigogine, Mitchell Waldrop, and the other leading theorists and + + practitioners of Chaos/Complexity theory, and related researchers in + + Cybernetics and Management of Large Organizations, such as Barry Clemson, + + Jay Forrester, Stafford Beer, Mike Mesarovic, and the related work at US + + Government Research Labs as well as the great industrial research labs at + + IBM and ATT, could also bring the power of science to the problems of public + + policy and decision-making. + + + + + + THE MIAMI DEVICE PROJECT: + + AN AMERICAN AND INTERNATIONAL MISSION-QUEST + + FOR CYBERSPACE + + + + Something important, chaotic and with a hidden sense of latent order is + + happening in Cyberspace and Real-Space. + + + + Nobody who is honest can say they truly know, see, can predict or control + + what is happening with The Net, also known as: + + + + THE INFORMATION SUPERHIGHWAY. + + THE NATIONAL INFORMATION INFRASTRUCTURE. + + THE GLOBAL INFORMATION INFRASTRUCTURE. + + THE INFO BAHN. + + THE ELECTRONIC/DIGITAL SUPERHIGHWAY. + + CYBERSPACE. + + + + America and The World need models, mavens, moxie, methodologies and, last + + but not least, money --- to design, build, test, market and operate the + + National and Global Information Infrastructures. But most of all, the + + emerging Cyberspace Industry will need multimedia forums and discourse, + + even face-to-face conferences, that will clarify and shape the complex and + + relevant issues we must deal with as we enter the on-ramps to the Info + + Superhighway, and try to avoid the "road-kills" of entities both corporate + + and ideational that took the wrong turns. These forums and discourses may + + turn out to be the second most important set of discussions since the + + founding of the United States in 1776 in the shaping and shaping of America + + and the World as we approach the 21st Century. Adding to the complexity + + of the discussions about Cybernetic-Cyberspace technologies, applications + + and markets will be the fact that we will be using these ver same networks + + to discuss and develop their evolution ---- hopefully a democratic exchange + + of views from the many stakeholders and users of the Net who will design and + + live in the rapidly evolving civilization, societies and communities + + (virtual and real) that will be spawned by CyberTech, and the cultural, + + economic, political and community structures Cyberspace will enable. + + + + Cyberspace represents a new and irresistible era in the evolution of human + + culture and business under the sign of technology --- but what is turyly + + wonderful is that we still have the opportunity to shape the application of + + Cybertech toward an Age of Utopia rather than Dystopia. + + + + What is being born and can be shaped by discussion and effort is something + + that every normal child or animal possesses at birth, but has never fully + + existed intact over the entire face of the planet: + + + + A BRAIN FOR PLANET EARTH; A GLOBAL CENTRAL NERVOUS SYSTEM; + + A WORLD-WIDE SENSE AND PARTICIPATION IN A GLOBAL COMMUNITY; + + A CYBERNETIC CITY. + + + + The relevant discourses and forums must rationally and humanely deal with + + all the relevant issues connected with the new cybertechnologies and + + cybermedia --- and they are too important to the future of the planet to be + + left in the hands of government, business or universities alone. The + + community and the public but get informed and stay involved with the + + evolution of the Net. + + + + We have termed this multi-dimensional quest and process + + + + THE MIAMI DEVICE PROJECT TOWARD PARADISE REGAINED --- + + FOR GREATER MIAMI BEACH, SOUTH FLORIDA, AND THE + + WORLD-CLASS CITIES, CITIZENS, & NATIONS OF THE FUTURE. + + + + Why Miami? Why not Cambridge, or New York, or Chicago, or Los Angeles, + + or Milan, or Berlin or Paris London or Tokyo? + + + + In the history of the planet over the ages, from the time humankind first + + emerged from the primordial ooze, there have always been a succession of + + great city-regions that entered the world stage as truly world-class, + + international and cosmopolitan centers of trade, culture, education, + + technolgy, finance, transportation, and concentration of talent, dreams, + + wheels and deals. + + + + Just as the Central Florida region around Cape Canaveral and the Kennedy + + Space Center identified itself as America and the World's launch-pad and + + testbed for Aerospace, so is the Greater Miami Beach and South Florida + + region of the Sunshine State begun it movement toward center-stage as the + + nation and the planet's laboratory and test-bed for mankind's thrust into + + the truly Final and Next Frontier: Cyberspace. + + + + The Greater Miami Beach/South Florida region of 4 million, supported by a + + unique partnership of its private, public, academic and community sectors + + called The Miami Device Project, has been selected by the Clinton + + Administration to host in our region in December of 1994 the first, Western + + Hemisphere-Latin American Summit Conference, to be led by President + + Clinton and Vice-President Gore themselves. + + + + Greater Miami Beach's strategic geographic location and tropical, earthquake- + + free (though occasionally hurricane-prone) has positioned the region as an + + international gateway to not only Latin America and The Caribbean, but to + + Europe, Asia, and North America, also. A great airport .... the world's + + largest cruise-ship port and one of the most active seaports ... and coming + + soon, the world's first Cyberport-Teleport-Cyberspaceport ... a laboratory + + and crucible where the model Cybernetic City of The Future will be forged. + + + + Greater Miami Beach and it's multimedia links and partnerships with other + + sister cities, states, and nations intends to do for the science, art and + + business of cybernetic computer communications something similar, but much + + more benevolent for humanity, what the Manhattan Project did during World + + War II with the technology of thermonuclear energy, from which the atomic + + bomb was created. + + + + BUT THERE WILL BE A FUNDAMENTAL DIFFERENCE IN MISSION AND VISION IN THE MIAMI + + DEVICE PROJECT AS OPPOSED TO THE MANHATTAN PROJECT: The Miami Device + + Project's focus is to create and to provide universal access to knowledge + + tools and multimedia information systems for the human community, in both + + America and world-wide --- and to help design, build and sustain a truly + + Global Village and Cybernetic City where art, science, philosophy, + + technology and business can provide the human spirit with the lift of a + + driving dream into the 21st Century --- a Cybernetic Century of peace, + + prosperity and co-evolution for man, his systems, and our children. + + + + + + Norbert Wiener, the MIT professor of mathematics and inventor of the word + + and field of cybernetics, once commented in his book, "cybernetics and + + Society: the Human Use of Human Beings:" Mankind and society can only be + + truly understood by a study of the messages they transmit; in the future, + + messages between man and man, man and machine, and machine and machine + + will play an increasingly important role." + + + + If children can be considered messages we send to a future we may never see + + ourselves, the human children of our loins will themselves create new + + futures with the children of our minds --- our systems, networks and + + knowledge bases --- as humanity leaps toward the stars in our inner and + + outer universes. + + + + A First Draft on April 22, 1994, Friday Night, + + in Miami Beach, Florida, USA --- by Marty Cyber. + + + + (PS: Lab space and residential space grants are available in beautiful, + + sunny South Miami Beach's Art Deco District, where Miami Device is + + attempting to create a Science Deco District. if you cyberesearchers in + + Boston, New York, Washington or beyond are seeking weather-friendlier + + climates in December and afterwards, give me a call, e-mail, or letter + + outlining your own research interests and comments about the MDP Project. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM + + IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF + + YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR + + PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CYBERSELL (TM) + + + + From Michael Ege (Michael_Ege@designlink.com) + + + + [Editor's Note: I HAVE NO FUCKING IDEA why someone who, in my opinion, + + misused the net, disregarded the complaining of others, and vowed to + + do it again, gets off dictating their new-found policy to us. They + + evidently want this to be written in stone. I think the rules below + + are good...and have been obeyed for decades by those with any tact! + + Evidently, the "Green Card Spammers" are just now getting a clue + + and want to take credit for ethics that already exist. Get a + + life MARTHA! -Ed.] + + + + Contact: Martha Siegel + + Cybersell(tm) + + 602/661-5202 + + + + SUGGESTED INTERNET COMMERCIAL SPEECH GUIDELINES + + + + Explanatory Preface + + + + The Internet is the most powerful communication tool in the world, today + + and for the forseeable future. Recently the circulation of an advertisement + + by two lawyers for their legal services raised tremendous controversy as to + + the manner and location that ads should be placed on the Internet. + + + + Two years ago the National Science Foundation lifted the ban on Internet + + advertisements that they had previously imposed. Yet, the idea of + + commercialism an advertising in this increasingly pervasive medium is still + + controversial. The primary anti-ad forces can be found among the academics + + and technical workers who were the early residents of the Internet. Where + + advertising is an integral part of other mediums, this highly vocal faction + + is attempting, not without some success, publicly to characterize + + advertisers as inferior to others who supply information via computer. + + + + While the ad critics do not speak with a single voice, but rather express a + + diversity of opinions, several elements emerge with some consistency. + + First, there is an overall presumption that advertising is unwanted and + + useless. Even though those who who have made the pioneering forays into + + Internet advertising have met with financial success (proving that + + advertising messages are indeed accepted) the vocal minority continues to + + insist otherwise. Based on this faulty premises advertisers are told that + + custom demands that they approach customers only in an indirect manner. + + Specifically, advertisers are told that it is apropriate to to places ads + + only on channels set aside to carry nothing but advertising. Alternatively, + + an advertiser may place a message at a fixed locale in cyberspace but must + + use other mediums such as billboards and television ads to announce the + + computer location and ask the customer to go and look for it. + + + + It is unanimously agreed that noone controls the Internet and there is no + + legal requirment to follow these dictates. Nevertheless the vocal Internet + + minority that custom requires adherence to its outdated philospophy. + + + + The guidlines presented here refuse to recognize the unreasonable nature of + + those who are anti-advertising, Commercial activity on the Internet is a + + valuable and worthwhile use of this resource and advertising is a key + + element of such commercial use. It should be recognized that virtually no + + busines can be successful without advertising. The old-think view of some + + Net extremists that advertising is as an unwanted an unpleasant annoyance + + to be marginally tolerated is not good for the development of the Internet, + + nor healthy for the World economy. + + + + Recently special groups and networks devoted exclusively to product and + + service promotion have begun to be established. While these are an exciting + + pert of the development of the Information Superhighway, it is not + + acceptable or practical for advertising to be kept in a restricted area, + + separate from other Internet activities. Advertising is not relegated to + + such an inferior position in any other medium, thus it should not be so + + with respect to the Internet. + + + + Neither those who advertise on the Internet be forced to do so passively. + + In no ther medium is it required that a potential customer deliberately + + seek out an advertisement rather than having it placed before him or her. + + The idea that the only acceptable way to advertise on the Internet is a + + system where a non-computer medium is utilized to request that a potential + + customer look for such information at a particular site in cyberspace is a + + totally unacceptable limitation. Such convoluted methods are not effective + + or convenient for the advertiser or the consumer. + + + + The easy, free flow of information is the goal of the Internet. Advertising + + is valuable and useful information. It is the concept of free flow that + + should govern any Internet advertising policy. + + + + GUIDELINES + + + + * Usenet + + It is recognized that the Usenet is only public gathering place currently + + existing on the Internet. It is a legal and appropriate forum in which to + + place commercial messages. + + + + * Distribution + + Distribution of advertising messages to newsgroups on the Usenet will be + + based upon the demographic and /or interst of users of the newsgroups, + + ensuring that the newsgroups selected are those most often used by people + + likely to be interested in a particular commercial message. + + + + * Identity + + All commercial messages should be readiliy identifiable so users can read + + them in a fully informed manner. For example, a conventional, easily + + recognizable "AD" identifier in the title of all commercial message + + offerings may serve this purpose. + + + + * Filtering + + Advertisers shall respect the right of all individual Internet users to, + + though the use of existing or evolving technology, filter out commercial + + messages if they so choose. However, any upsteam provider short of the end + + users should refrain from making that decision for the individual, who may + + welcome a particular commercial message. Anything else would amount to + + censorship. + + + + * Sincerity + + Commercial messages should be offered only when there is a sincere belief + + that the information will prove useful to Internet users. The inclusion of + + useful information with the advertising copy is encouraged. However, it is + + als recognized that solicitation of purchases and directions on how to make + + such purchases are a validethical pursuit of the advertiser, as well as a + + useful convenience fot the consumer. + + + + (In addition to the above Internet-specific guidelines, the following + + suggestions are based upon time-tested, proven codes already in existence. + + {Sources are cited with each entry}) + + + + * Truth + + Advertising shall tell the truth and shall reveal significant facts, the + + concealment of which would mislead the public (AAF's Advertising Principle + + of American Business) + + + + * Responsibility + + Advertising agencies and advertisers shall be willing to provide + + substantiation of all claims made (WSJ Guide to Advertising Policy and + + Production) + + + + * Taste and Decency + + Advertising shall be free of statements, illustrations, or implications + + that are offensive to good taste or public decency (Same Source) + + + + * Substantiation + + Advertising claims shall be substantiated by evidence in possession of the + + advertiser and advertising agency, prior to making such claims. + + (Advertising Principles of American Business) + + + + * Omission + + An advertisement as a whole (ed. note: original says "shoe") may be + + misleading although every sentence separately considered is literally true. + + Misrepresentation may result not only from direct statements but from + + omission of material facts (Better Business Bureau Code of Advertising) + + + + * Testimonials + + Advertising containing testimonials shall be limited to those of competent + + witnesses who are reflecting a real and honest opinion or experience. + + (Advertising Principles of American Business) + + + + * Composition + + The composition and layout of advertisements should be such as to minimize + + the possibility of misundertanding. (BBB Code) + + + + * Price Claims + + Advertisers shall not knowingly create advertising that contains price + + claims which are misleading. (AAAA Standards and Practices) + + + + * Unprovable Claims + + Advertising shall avoid the use of exaggerated or uprovable claims. (WSJ + + Guide) + + + + * Claims by Authorities + + Advertisers will not knowingly create advertising that contains claims + + insufficiently supported or that distorts the true meaning or practical + + application of statements made by professional or scientific authority. + + (Standards and Practices) + + + + * Guarantees and Warranties + + Advertiser of such shall be explicit with sufficient information to apprise + + consumers of their principal terms and limitations, or, when space and time + + restrictions pleclude such disclosures, the advertisement shall clearly + + reveal where the full text of the guarantee or warranty can be examined + + before purchase. (Advertising Principles) + + + + * Bait Advertising + + Advertising shall not offer products or services for sale unless such offer + + is constitutes a bona fide effort to sell the advertised products or + + services and is not a device to switch consumers to other goods or + + services, usually higher price. (Same Source) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SOME INFO ON GREEN CARD SPAM + + + + The first surprise is that "pericles.com" has disappeared from the PSI + + name servers and from the "whois" database! But they have a new + + domain, "SELL.COM". The change happened just two days ago: + + + + % whois pericles.com + + No match for "PERICLES.COM". + + + + % whois pericles-dom + + No match for "PERICLES-DOM". + + + + % whois canter + + Canter & Siegel (SELL-DOM) SELL.COM + + Canter, Laurence A. (LC42) + + postmaster@SELL.COM + + (602) 661-3911 [and some other entries that are irrelevant here] + + + + % whois sell-dom + + Canter & Siegel (SELL-DOM) + + P.O.Box 13510 Scottsdale, AZ 85267 + + + + Domain Name: SELL.COM + + + + Administrative Contact: Canter, Laurence A. (LC42) postmaster@SELL.COM + + (602) 661-3911 Technical Contact, Zone Contact: Network Information and + + Support Center (PSI-NISC) hostinfo@psi.com (518) 283-8860 + + + + Record last updated on 09-Aug-94. + + + + Domain servers in listed order: + + + + NS.PSI.NET 192.33.4.10 NS2.PSI.NET 192.35.82.2 + + + + % whois lc42 + + Canter, Laurence A. (LC42) + + postmaster@SELL.COM + + Canter & Siegel P.O.Box 13510 Scottsdale, AZ 85267 (602) 661-3911 + + + + Record last updated on 09-Aug-94. + + + + Queries from nslookup asking for an IP address or MX record for + + sell.com yield no fruit. The query "ls sell.com" is refused by the PSI + + name servers. + + + + But it seems logical to ask about "cyber.sell.com", and sure enough, + + it's there: + + + + cyber.sell.com inet address = 199.98.145.99 cyber.sell.com preference = + + 5, mail exchanger = cyber.sell.com + + + + This is the same address that pericles.com had until a couple of days + + ago. It still has no backup mail exchanger, but that may not be so + + important any more, because.... + + + + The host at this address is no longer a PC running Microsoft Windows. + + It's now a Unix box! That's right: if you try to telnet to this host, + + at the customary port 23, you're greeted with this prompt: + + + + UNIX System V Release 4.2 (cybersell) (pts/0) + + + + login: + + + + There are also server processes listening on ports 512(rexecd), 513 + + (rlogind) and 514 (rshd). + + + + They've got an FTP server (port 21), but it doesn't accept "anonymous" + + or "ftp" as a user name. + + + + They've also got an SMTP server listening (port 25), but it apparently + + does not implement the "vrfy", "expn", or "help" commands--all of these + + yield "502 ... Not recognized" error replies. The "rcpt to" command + + seems to accept any recipient name as legitimate--any validity check + + must come later, after it has already accepted the mail. + + + + They don't have an NNTP(119), Gopher(70), or Web(80) server--at least + + not on the conventional ports for such services. + + + + They do have a few other active ports: echo(7), discard(9), + + daytime(13), ttytest(19), and time service (37). + + + + There's also something that answers a connection to port 199, but I + + have no idea what that service might be. Anyone else know? + + + + If you do a traceroute, you get this: .... 9 psi-nsf.psi.net + + (192.41.177.246) 27 ms 31 ms 27 ms 10 core.net155.psi.net (38.1.2.3) + + 145 ms 129 ms 145 ms 11 serial.phoenix.az.psi.net (38.1.10.37) 227 ms + + 195 ms 195 ms 12 38.2.37.6 (38.2.37.6) 230 ms 184 ms 238 ms 13 + + cyber.sell.com (199.98.145.99) 195 ms 215 ms 219 ms + + + + Someone who knows more about routing and networks than me might be able + + to analyze this for information about the nature of their connection. + + What is "38.2.37.6"? It has no hostname, and if you try to telnet to + + it, it asks for a password without first asking for a username. + + + + I hope all of the above information is useful to the rest of the Usenet + + community. If you've got your site aliased to "pericles.com", you + + should consider adding a new alias of "cyber.sell.com". I look forward + + to hearing more information from others more knowledgeable than myself. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CABLE RESOURCES ON THE NET + + + + By John Higgins (higgins@dorsai.dorsai.org) + + + + Updated September 1994 Compiled by Multichannel News. Copyrighted by + + John M. Higgins 1994. All rights reserved. Additional copyright information + + at bottom. + + + + Multichannel News Contacts: + + Marianne Paskowski, editor-in-chief (Mpcable@aol.com) + + John M. Higgins, finance editor: (higgins@dorsai.dorsai.org) + + + + Multichannel News subscription information: 800-247-8080. A bargain at + + $89/year. Editorial Department: Voice) 212-887-8390; Fax) 212-887-8384 + + + + -=-=-=-=-=-=-=THE BEST CABLE STUFF-=-=-=-=-=-=-= + + Telecomreg (mailing list); Cable Regulation Digest (newsletter); fcc.gov + + (document archive); FCC Daily Digest (finger); cablelabs.com (document + + archive); rec.video.cable-tv (Usenet newsgroup); Edupage (newsletter) + + -=-=-=-=-=-=- + + + + For a bunch folks wanting to rule the info highway, cable's status on the + + Internet echoes MTV:Unplugged. There are some signs of senior execs + + starting to tap in, but they're few and far between. There are domains + + listed in the name of cable companies (TCI, Cablevision Systems, Viacom) + + but many seem to be inactive. Comcast and Viacom are on hopelessly limited + + MCI Mail systems that regularly snarl. To steal a line, cable execs hope to + + build the highway but they can't drive. + + + + Example: Recently I needed a copy of the freshly revised Hollings bill + + S.1822. I couldn't get it out of the Senate, the National Cable Television + + Association or any cable source. But I surfed over to Bell Atlantic's + + Internet site (ba.com) and grabbed the whole thing (including amendments). + + The telcos are clearly hipper to this info highway stuff than the cable + + kids. + + + + The good news is that the number of Internet resources useful to cable + + professionals is growing. The bad news is that they're primarily provided + + by telcos and regulators. But it's a start. Here's a cluster of cable + + resources of all sorts that I've encountered. + + + + GIMME FEEDBACK! Send us updates, particularly on the technical side. (And + + not just how to pirate HBO and pay-per-view porno, please.) + + + + "Differently clued" cable newbies should feel free to contact us with any + + questions on how to navigate. Many of these resources are NOT accessible to + + subscribers of Prodigy, America On-Line and Compu$erve. + + + + A similar list of broadcasting resources on the net is compiled by Neil + + Griffin (ngriffin@nyx.cs.du.edu). + + + + ** Mailing Lists + + + + TELECOMREG: A mailing list focusing on telecomunications regulation. + + Subscribers got an early peek at the FCC's latest cable price formula, + + Founded by Barry Orton, a consultant to municipal regulators, TELECOMREG is + + very high volume and fairly high quality. + + How to get on it: E-mail (listserver@relay.adp.wisc.edu; SUBSCRIBE + + TELCOMREG YOUR NAME) + + + + SCTE-LIST: A mailing list on cable technology apparently tied to the + + Society of Cable Television Engineers that just cranked up. It's too new to + + judge the quality. + + How to get on it: E-mail (listserver@relay.adp.wisc.edu; SUBSCRIBE + + SCTE-LIST YOUR NAME) + + + + I-TV: Discussion list centered on two-way Interactive Television. Very + + new, and appears to be focusing mostly on education and community + + development. So far it's pretty lame, but that could change. Expect lots + + of public-access types to be kicking around, as opposed to folks actually + + trying to make a business of it. Uploading press releases is -- for some + + bizzare reason -- encouraged. + + How to get on it: E-Mail (listserv@knowledgework.com; SUB I-TV YOUR + + NAME). + + + + TELECOM DIGEST: Oriented toward voice telephony, but covers all sorts of + + telecommunications topics. Fairly techie. + + How to get on it: E-mail (telecom-request@eecs.nwu.edu; SUBSCRIBE + + YOUR@ADDRESS); Usenet (comp.dcom.telecom). + + + + ** Publications + + + + CABLE REGULATION DIGEST: A weekly summary of regulatory news from + + Multichannel News. The best way to obtain it each week is on the TELECOMREG + + list. + + How to get it: FTP (ftp.vortex.com: /tv-film-video/cable-reg) + + Gopher (gopher.vortex.com : /TV/Film/Video) + + + + FCC DAILY DIGEST: Washington telecom lawyer Robert Keller attaches the + + most recent edition and referenced documents to his "finger" file. A really + + nice effort by Keller. Be sure to open your capture buffer first, as the + + file is many screens long. + + Also available at the fcc.gov ftp and gopher site. (see below). + + How To Get It: Finger (finger rjk@telcomlaw.com). + + + + EDUPAGE: Tip sheet on information technology and media issued three + + times weekly. Quickie summaries primarily of newspaper articles, + + primarily from the majors. + + How to get it. E-Mail (listproc@educom.edu, SUB EDUPAGE YOUR NAME). + + + + FITZ'S SHOPTALK: Daily dispatches on the TV business, primarily networks + + and local stations put there's plenty of cable in there. Put out by media + + headhunter Don FitzPatrick. Primarily summaries of wire-service and major + + newspapers, but also includes some full-text reprints. + + How to get it: E-mail (shoptalk-request@gremlin.clark.net, SUBSCRIBE + + YOUR@ADDRESS). + + + + SKYGUIDE: This one's from a Brit that doubtless watches too much TV. The + + Euro cable and satellite television scene. Concentrates on BSkyB but also + + romps off onto the continent. + + How to get it: E-mail (bignoise@cix.compulink.co.uk), Usenet {preferred!} + + (alt.satellite.tv.europe). + + + + SATNEWS: A newsletter about satellite television broadcasting around the + + world. + + How to get it: E-mail: (listserv@orbital.demon.co.uk, SUBSCRIBE YOUR + + NAME). + + + + ** FTP, Gopher, and WWW Sites + + + + CABLELABS: Finally, a cable-specific document archive! CableLabs, the + + industry's R&D greenhouse, has established an anonymous FTP archive at + + cablelabs.com. It's still "under construction", as they say. There's a + + small collection of techie documents in it so far, but more is promised. + + How to get there: FTP (ftp.cablelabs.com); WWW (http://www.cablelabs.com/). + + + + FEDERAL COMMUNICATIONS COMISSION: Loads of documents, orders, etc. but + + they're poorly orgainized. + + How to get there: Gopher (fcc.gov); FTP (fcc.gov). + + + + PEPPER & CORAZZINI: A D.C. telecom law firm has put up an archive of + + documents and memos by their lawyers on related to broadcasting, cable, + + common carriers, PCS and information law. P&C's e-mail contact is Neal J. + + Friedman (nfriedma@clark.net) + + How to get there: Gopher (gopher.iis.com//11/p-and-c); FTP + + (ftp.iis.com/companies/p-and-c) WWW (http://www.iis.com/pandc-home.html). + + + + NTIA: National Telecommunications and Information Administration has a + + document site, notably from Clinton's National Info Infrastructure + + committe. Seems to be down frequently. + + How to get there: Gopher (ntia.doc.gov); FTP (ntia.doc.gov). + + + + BELL ATLANTIC: Telco propaganda (press releases, speeches, Congressional + + testimony) mixed in with lots of useful regulatory documents. + + How to get there: Gopher (ba.com); FTP (ba.com). + + + + MFJ TASK FORCE: More RBOC lobbying on-line. But it's a hell of a lot + + better than anything cable has to offer. + + How to get there: Gopher (bell.com). + + + + C-SPAN: The public-affairs network has a gopher site with a whole mess of + + programming info for viewers. + + How to get there: Gopher (c-span.org); ftp (c-span.org). + + + + CNN: For reasons I haven't quite figured out, the University of Maryland + + has a gopher site carrying the text of CNN's Headline News stories, putting + + up dozens of national and international news stories daily, with an archive + + going back several days. + + How to get there: Gopher (info.umd.edu). + + + + ** Usenet Groups + + + + The quality of cable info on Usenet newgroups is mixed. The most active + + cable group is rec.video.cable-tv. It once was dominated by tips on + + stealing cable. However, in recent months three cable system-level execs + + from Time Warner (Dean Stauffer), Continental (Scott Westerman) and Century + + (Lloyd Sanchez) have virtually turned the group around by patiently and + + respectfully responding to cable subscribers' questions, legit complaints + + and outright rants. Informed and informative answers, what a concept! Give + + them a raise. + + + + Usenet is one way to sample what subscribers are buzzing about. Is your + + company included on the recent list of "worst cable companies"? + + + + rec.video.cable-tv Most active. + + alt.cable-tv.re-regulate Traffic has really picked up. Lots of + + complaining subscribers. + + alt.satellite.tv.europe Active group on Euro cable and satellite + + programming. + + alt.politics.datahighway Not too bad. + + alt.tv.public-access Reportedly exists, but I've never seen it. + + comp.dcom.telecom Moderated discussion of telco issues. Telecom + + Digest appears here. + + alt.dcom.telecom Breakaway group started by telco folks + + irritated by the ones dominating + + comp.dcom.telecom + + alt.dcom.catv I've NEVER seen pertinent traffic on this group. + + alt.tv.comedy.central Dull. + + alt.tv.mst3k Comedy Central's Mystery Science Theater 3000. + + alt.tv.hbo Hardly any traffic. + + alt.tv.nickelodeon Fans of the kid's network. + + alt.fan.ren-and-stimpy 'Nuff said. + + + + ** FAQ's + + + + There's a few frequently-asked-questions lists kicking about. The Cable + + TV FAQ is all about pirating HBO (YAWN!), with many technical details. + + Can't find the archive site, however. The DBS and wireless cable FAQs are + + more useful to non-pirate professionals. + + + + All three are posted are posted in rec.video.cable-tv periodically. High- + + power DBS is in rec.video.satellite. I'll add archive sites as I find them. + + + + CABLE TV FAQ + + How to get it: Usenet (rev.video.cable-tv). + + + + WIRELESS CABLE FAQ How to get it: FTP (rtfm.mit.edu:/pub/usenet/ + + rec.video.cable-tv/Wireless_Cable_TV_FAQ); Usenet (rec.video.cable-tv). + + + + HIGH-POWER DBS FAQ: Not archived anywhere. + + How to get it: Usenet (rec.video.cable-tv, rec.video.satellite). + + + + ** Canada + + + + Mooseland has its own cluster of resources: + + + + USENET GROUPS: + + can.infohighway + + can.infobahn + + + + MAILING LISTS + + PAC-HIWAY: Run by Public Advisory Council on Information Highway Policy. + + How to get it: E-mail: (listprocessor@cunews.carleton.ca; SUBSCRIBE YOUR + + NAME) + + + + ISCNEWS: Mailing list of news releases, fact sheets, etc. from the + + federal agency Communications Canada + + How to get it: E-mail (listserv@debra.dgbt.doc.ca; SUBSCRIBE ISCNEWS + + YOUR NAME) + + + + THE INTERNET JOURNAL OF GOVERNMENT RELATIONS: Bi-weekly commentary on + + government action regarding information technology, trade and + + procurement in North America, but primarily Canada. + + How to get it: E-mail (pcanniff@fox.nstn.ns.ca) + + + + SITES + + INDUSTRY CANADA: Canada's equivalent to the U.S. Department of Commerce + + How To Get There: Gopher (debra.dgbt.doc.ca /Industry Canada Docs) + + FTP (debra.dgbt.doc.ca /pub look in both "gazette" and "isc" directories) + + WWW: (http://debra.dgbt.doc.ca/isc/isc.html) + + + + + + Copyright 1994 by John M. Higgins. This list may be redistributed + + provided that the article and this notice remain intact. This article may + + not under any circumstances be resold or redistributed for compensation of + + any kind without prior written permission from John M. Higgins. That + + includes publication by magazine or CD-ROM. But if you're interested, + + talk to me. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + IDS ANNOUNCES NEW ROCHELLE, NEW YORK POP (AC 914) + + + + From: green@ids.net + + + + + + InteleCom Data Systems, Inc, operators of the IDS World Network, the + + worlds first full-service Internet Access service geared towards end-users, + + announces the latest of its new Points of Presence to be brought online. + + + + New Rochelle, New York members may access IDS via (914) 637-6100 at speeds + + of up to 28.8k baud using the new V.FAST technology. + + + + IDS offers dialup Internet access for a low flat monthly fee, as well as + + PersonalSLIP - a dial-on-demand, low-cost SL/IP service starting at $20 + + per month. + + + + Here is our standard electronic brochure. For more information, contact + + IDS Customer Service at (800) IDS-1680. + + + + + + :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:. + + The IDS World Network + + Internet Access Service + + :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:. + + + + + + A great place for the beginner to start with, and an easy enough place for + + the experienced user to fully utilize the facilities on the Internet. + + + + Features: + + + + o Usenet NEWS + + o Internet Mail + + o TELNET, FTP, FINGER, TALK + + o Menu Driven Interface + + o UPI Newswire + + o VAX/VMS DCL Access + + o Low affordable prices + + + + The IDS World Network Internet Access Service is a great meeting place on + + the Internet. We offer free BBS service to everyone; message areas and + + local email are all free. Stop in - meet and talk with people from all + + over the world... from Albania to Zimbabwe. Yugoslavia... Russia... + + Germany... Australia... and all of them participate in our online message + + bases, providing inteligent discussion and an excellent way to make the + + world a bit smaller by bringing everyone together electronicly. Subjects + + range from local parking tickets to the global environment and possible + + solutions for world problems. + + + + The IDS World Network was the first system to obtain NSFnet access for + + members - we're the longest running Internet "public access" service, + + with years of experience providing easy access for beginners, and ease + + of use for experienced Internet gurus. + + + + We have a network of several machines handling the load at our Operations + + Center in Rhode Island, with dedicated NEWS servers, SL/IP servers and UUCP + + machines. + + + + Now we're reachable through the CompuServe Packet Network - for just $4 per + + hour on top of the regular monthly subscription rates, you can access the IDS + + World Network from any local number for the CompuServe Packet Network - for + + your nearest CPN number, call our customer service line at (800) IDS-1680. + + The rates for using IDS through the CompuServe network are just $4 per hour, + + day or night - no higher rate for peak usage. PersonalSLIP and other SL/IP + + services are not available through the CompuServe Packet Network, although + + IDS UUCP services are... + + + + INTERNET SERVICES + + + + Users have their own workspace with unlimited file size storage; files + + remain in the workspace for 24 hours (giving the user ample time to + + download files to their personal computer). + + + + Service types: + + + + Standard Account - All Internet functions, standard menu account, VAX/VMS + + DCL Access. Services arranged by category in an easy-to-use, menu + + driven interface. All for $15 per month ($17 per month when dialing + + through Miami). + + + + PersonalSLIP - Your own Internet SL/IP connection, Dial-On-Demand. $20/month + + for 20 hours, $2/hr each additional hour. POP Mail service included + + for mail storage and retrieval, for use with popular email programs + + such as Eudora, QVTnet, and others. Also includes NNTP server access + + for offline/online NEWS reading. + + + + Dedicated PersonalSLIP - Your own Internet SL/IP connection, 24 hours a day, + + 7 days a week, your own Single-Host IP address and Domain Name, $75/month + + There is a $450 startup charge for this service. + + + + Dedicated SL/IP - Network connections for multiple hosts and all of the above + + for $200/month. There is a $450 startup charge for this service. + + + + UUCP Services - Connect your BBS or your own private system. We support + + 14.4k baud modems on all of our UUCP lines. One-time setup fee of $25, plus + + $20/month for mail and up to 100 newsgroups, $35/month for up to 500, + + $45/month for a full feed. One time fee of $25 for those wishing to + + apply for their own domain. + + + + ATTENTION TEACHERS AND EDUCATORS + + + + IDS works heavily with teachers and educators around the world to help + + bring them together to utilize the Internet in the classroom. If you'd + + like more information, send electronic mail to info@ids.net. Rhode Island + + teachers: contact Reo Beaulieu at the RI Department of Education for your + + free account. + + + + CURRENT DIALUP CALLING AREAS + + + + Middle Rhode Island (401) 884-9002 + + Northern Rhode Island (401) 273-1088 + + Southern Rhode Island (401) 294-5779 + + Miami, Florida (305) 534-0321 + + Merrit Island, Florida (407) 453-4545 (Brevard County, FL) + + New Rochelle, New York (914) 637-6100 + + All CompuServe Packet Network numbers. + + + +Other Florida areas forthcoming. + + + + + + --> ALL USERS MUST ADHERE TO ACCEPTABLE USE POLICIES OF THE APPROPRIATE <-- + + --> NETWORKS <-- + + + + To access the IDS World Network; telnet to ids.net [155.212.1.2], or dial + + us via modem at (401) 884-9002. If you are dialing direct, type IDS at the + + first prompt and then sign on as GUEST when it asks for a Username. + + + + Web users, try the IDS Web Server. + + + + For Customer Service, send email to info@ids.net, or call (800) IDS-1680 + + voice. Within Rhode Island, call (401) 884-7856. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE MEDIA LIST + + + + By Adam M. Gaffin (adamg@world.std.com) + + + + This is a listing of newspapers, magazines, TV stations and other media + + outlets that accept electronic submissions from readers and viewers, along + + with their main e-mail addresses. It would be almost impossible to + + maintain a listing of individual reporters, editors and the like; if you + + want to reach a specific person, try sending a request to the given media + + outlet's general address (but see below for a one-time listing for the + + Ottawa Citizen). If you are submitting a letter to the editor or an op-ed + + piece, it's a good idea to include your mail address and a daytime phone + + number. Publications generally try to verify authorship and will not run + + submissions without some way to check whether you really wrote the item + + to which your name is attached. + + + + Please send any additions, deletions or corrections to the address at the + + end of this list. Look for new editions in the alt.journalism, + + alt.internet.services and comp.misc newsgroups. My thanks to all who have + + contributed! Because of these kind folks, this list is now substantially + + longer than it was just a week ago. + + + + SPECIAL NOTE: The last part of this list contains the e-mail addresses + + for reporters and editors at the Ottawa Citizen. Thanks to the Citizen for + + the information. + + + + + + DAILY NEWSPAPERS + + + + Middlesex News, Framingham, Mass. mnews@world.std.com + + Boston Globe + + Story Ideas news@globe.com + + Circulation Requests circulation@globe.com + + Letters to the Editor letter@globe.com + + Submissions to "Voxbox" column voxbox@globe.com + + Comments on Coverage/Ombudsman ombud@globe.com + + Ask the Globe ask@globe.com + + Thursdays Calendar Section list@globe.com + + Health & Science Section howwhy@globe.com + + Confidential Chat chat@globe.com + + City Weekly Section ciweek@globe.com + + Religion Editor religion@globe.com + + Arts Editor arts@globe.com + + + + Champaign-Urbana (Ill.) News-Gazette gazette@prairienet.org + + + + Chronicle-Telegram, Elyria, Ohio macroncl@freenet.lorain.oberlin.edu + + Colorado Daily, Boulder, Colo colorado_daily@onenet-bbs.org + + The Guardian, U.K. letters@guardian.co.uk + + Notes and Queries nandq@guardian.co.uk + + Morning Journal, Lorain, Ohio mamjornl@freenet.lorain.oberlin.edu + + Ottawa Citizen, Ottawa, Ont. ottawa-citizen@freenet.carleton.ca + + Portland Oregonian oreeditors@aol.com + + Sacramento Bee sacbedit@netcom.com + + Phoenix Gazette phxgazette@aol.com + + St. Petersburg (Fla.) Times 73174.3344@compuserve.com + + San Diego Union-Tribune computerlink@sduniontrib.com + + San Francisco Examiner sfexaminer@aol.com + + San Jose Mercury-News sjmercury@aol.com + + Santa Cruz County (Calif.) Sentinel + + Letters to the editor sented@cruzio.com + + News desk sentcity@cruzio.com + + Seattle Times edtimes@hebron.connected.com + + Tico Times, Costa Rica ttimes@huracon.cr + + Washington Square News, NYU nyuwsn@aol.com + + + + WEEKLY NEWSPAPERS + + + + Hill Times, Ottawa, Ont. ab142@freenet.carleton.ca + + Journal Newspapers, D.C. area thejournal@aol.com + + The Mirror, Montreal, Quebec mirror@fc.babylon.montreal.qc.ca + + Palo Alto Weekly, Palo Alto, Calif. paweekly@netcom.com. + + The Village Voice, New York, N.Y. voice@echonyc.com + + + + MAGAZINES + + + + American Journalism Review amerjourrv@aol.com + + Brown Alumni Monthly, Providence, R.I. bam@brownvm.brown.edu + + Business Week bwreader@mgh.com + + Chronicle of Higher Education editor@chronicle.merit.edu + + Details detailsmag@aol.com + + Frank Magazine, Ottawa, Ont. ag419@freenet.carleton.ca + + Focus, Germany 100335.3131@compuserve.com + + GQ gqmag@aol.com + + Illinois Issues, Springfield, Ill. wojcicki@eagle.sangamon.edu. + + Mother Jones x@mojones.com + + The New Republic editors@tnr.com + + New Scientist, U.S. bureau 75310.1661@compuserve.com + + Oberlin Alumni Magazine alummag@ocvaxc.cc.oberlin.edu. + + OutNOW!, San Jose, Calif. jct@netcom.com + + Playboy playboy@class.com + + S.F. Examiner Magazine sfxmag@mcimai.com + + Scientific American letters@sciam.com + + Soundprint soundprt@jhuvms.hcf.jhu.edu + + Der Spiegel, Germany 100064.3164@compuserve.com + + Stern, Hamburg, Germany 100125.1305@compuserve.com + + Sky & Telescope, Cambridge, Mass. skytel@cfa.harvard.edu + + Spectrum, New York, N.Y. n.hantman@ieee.org + + Stern, Hamburg, Germany 100125.1305@compuserve.com + + Time timeletter@aol.com + + Ultramarathon Canada an346@freenet.carleton.ca + + USA Weekend usaweekend@aol.com + + U.S. News and World Report 71154.1006@compuserve.com + + Wired editor@wired.com + + + + NEWS/MEDIA SERVICES + + + + Cowles/SIMBA Media Daily simba02@aol.com + + Media Page mpage@netcom.com + + Newsbytes newsbytes@genie.geis.com + + + + NEWSLETTERS + + + + Dealmakers Ted.Kraus@property.com + + Information Law Alert markvoor@phantom.com + + Multichannel News higgins@dorsai.dorsai.org + + Society of Newspaper Design fairbairn@plink.geis.com + + Spec-Com Journal spec-com@genie.geis.com + + Western Producer, Saskatoon fairbairn@plink.geis.com + + + + RADIO AND TV STATIONS AND NETWORKS + + + + CJOH-TV, Ottawa, Ont. Can. ab363@freenet.carleton.ca + + KARK, Little Rock, Ark. newsfour@aol.com + + KOIN, Portland, OR. koin06A@prodigy.com + + WBFO, Buffalo, N.Y. wbfo@ubvms.cc.buffalo.edu + + WBFO-FM, NPR, Buffola, NY. wbfo@ubvms.cc.buffalo.edu + + WCBS-AM, CBS, NYC. news88@prodigy.com + + WCVB-TV, Boston, Mass. wcvb@aol.com + + WCCO-TV, Minneapolis, Minn. wccotv@mr.net + + WDCB Radio, Glen Ellyn, Ill. scotwitt@delphi.com + + WEOL-AM, Elyria, Ohio maweol@freenet.lorain.oberlin.edu. + + WNWV-FM, Elyria, Ohio maweol@freenet.lorain.oberlin.edu. + + WNYC, New York, N.Y., "On the Line" 76020.560@compuserve.com + + WRVO-FM, Oswego, N.Y. wrvo@oswego.edu + + WTVF-TV, Nashville, Tenn. craig.owensby@nashville.com + + WVIT-TV, New Britian, Conn wvit30a@prodigy.com + + WXYZ-TV, ABC, Detroit. wxyztv@aol.com + + WWWE 1100 AM Cleveland, OH talk11a@prodigy.com + + BBC "Write On" iac@bbc-iabr.demon.com.uk + + CBC Radio, "Brand X" brandx@winnipeg.cbc.ca + + Fox TV foxnet@delphi.com + + Maine Public TV, "Media Watch" greenman@maine.maine.edu + + Monitor Radio Int'l "Letterbox" letterbox@wshb.csms.com + + NBC News, New York, N.Y. nightly@nbc.ge.com + + NBC News, "Dateline" dateline@nbc.ge.com + + NPR "Talk of the Nation" totn@aol.com + + NPR "Talk of the Nation/Sci. Friday" scifri@aol.com + + NPR "Fresh Air" freshair@hslc.org + + NPR "Weekend All Things Considered" watc@cap.gwu.edu + + NPR "Weekend Edition/Sunday" wesun@clark.net + + + + COMPUTER PUBLICATIONS + + + + Communications News 489-8359@mcimail.com + + Corporate Computing 439-3854@mcimail.com + + Computerworld computerworld@mcimail.com + + Communications Week 440-7485@mcimail.com + + Data Communications 416-2157@mcimail.com + + Datateknik, Sweden datateknik@dt.etforlag.se + + Enterprise Systems Journal 543-3256@mcimail.com + + Home Office Computing hoc@aol.com + + Information Week informationweek@mcimail.com + + Infoworld letters@infoworld.com + + The Internet Business Journal mstrange@fonorola.net + + The Internet Letter netweek@access.digex.net + + iX, Germany post@ix.de + + Journal of C Language Translation jclt@iecc.com + + LAN Times 538-6488@mcimail.com + + Network Computing network_computing@mcimail.com + + Network Management network@world.std.com + + PC Magazine 157.9301@mcimail.com + + PC Week 557-0379@mcimail.com + + Telecommunications 311-1693@mcimail.com + + Windows User 75300.3513@compuserve.com + + + + -------------- + + Ottawa Citizen (please note that all of these addresses save the last one + + are at Ottawa Freenet, which has a domain of freenet.carleton.ca; to + + reach Doug Yonson from outside the Freenet, for example, write + + af719@freenet.carleton.ca). + + + + af719 Doug Yonson The Citizen's FreeNet coordinator + + ac583 Peter Calamai Editorial Page Editor + + ae273 Johanne Vincent Editorial Page assistant + + ae836 Tony Cote Action Line columnist + + ah206 Alana Kainz High technology reporter/columnist + + ac806 Deborah Richmond High Priority editor + + ag955 Francine Dube Social trends reporter + + af391 Peter Hum Reporter + + ai997 Mike Shahin Outaouais Reporter + + ae451 William Speake Part-time reporter + + ag696 Hilary Kemsley Years Ahead columnist (seniors issues) + + ai379 Drew Gragg Assistant Photo Director + + af227 Jack Aubry National Reporter (aboriginal affairs) + + ae379 Daniel Drolet Reporter + + al715 Liisa Tuominen Librarian + + ak570 Michael Groberman Theatre critic + + am906 Robert Sibley Reporter + + an643 Dave Rogers Reporter + + ao096 Wanita Bates Consumer, fashion reporter + + an552 Tony Lofaro Reporter + + am100 Seymour Diener Asst news editor, real estate columnist + + ao483 Mark Richardson Reporter + + ap171 Karen Murphy-Mackenzie Copy staff + + ao450 Bernard Potvin Copy staff + + ap764 Massey Padgham Foreign editor + + aq148 Carolyn Abraham Police reporter + + aq438 Shelley Page Science reporter + + Rick Laiken, 71277.3651@compuserve.com Assistant managing editor + + (OCRINET contact, newsroom + + computer systems specialist + + & libel expert) + + + + + + What follows are new entries and corrections for the Media List, which is + + a listing of newspapers, radio stations, etc. that accept electronic + + submissions. This is NOT the complete list. You can obtain the entire + + list via ftp at ftp.std.com as customers/periodicals/Middlesex- + + News/medialist. If you'd rather receive the list and updates automatically + + via e-mail, write to + + + + majordomo@world.std.com + + + + Leave the "subject:" line blank. As your message, write: + + + + subscribe medialist + + + + To leave the list, write to majordomo@world.std.com with a message of + + + + unsubscribe medialist + + + + + + NOTES ON USING THIS LIST: If you want a publication to print your letter, + + include your postal address and phone number for verification purposes. + + Also, please consider NOT using this list to send a mass mailing to every + + single listed media outlet. A bicycling magazine is unlikely to be + + interested in your thoughts on abortion, no matter how cogent they are, + + for example. + + + + My thanks again to all who have contributed! Comments and suggestions -- + + and especially addresses of unlisted media organizations -- are most + + welcome. Please send them to adamg@world.std.com (please note the 'g' in + + adamg; adam@world.std.com is a very nice person who has been graciously + + forwarding mis-addressed e-mail, but he is not me). + + + + NEWSFLASH: The New York Times is planning a formal Internet connection, + + we read on the CARR-L mailing list, sometime this summer or early fall. + + Once in place, the domain will be nytimes.com. CARR-L is a list for + + talking about the use of computers in newsrooms and journalistic research. + + To subscribe, send e-mail to listserv@ulkyvm.bitnet. Leave the "subject:" + +line blank, and as your message, write: subscribe carr-l Your Name + +(substituting, of course, your name). + + + + NOTE: Listings marked with an asterisk are corrections. + + + + DAILY NEWSPAPERS + + + + The Baltimore Sun + + To reach reporters or comment + + on the paper (NO letters to the + + editor or subscription requests) baltsun@clark.net + + The Columbus (Ohio) Dispatch crow@cd.columbus.oh.us + + Letters to the editor letters@cd.columbus.oh.us + + Jerusalem (Israel) Post jpost@zeus.datasrv.co.il + + The Olympian, Olympia, Wash. olympian@halcyon.com + + + + WEEKLY NEWSPAPERS + + + + City Sun, New York, N.Y. + + Computer column sysop@f618.n278.z1.fidonet.org + + + + COLLEGE NEWSPAPERS + + + + The Muse, Memorial Univ., Newfoundland muse@morgan.ucs.mun.ca + + The Tech, MIT, Cambridge, Mass. + + Advertising ads@the-tech.mit.edu + + Arts arts@the-tech.mit.edu + + News news@the-tech.mit.edu + + Sports sports@the-tech.mit.edu + + Archive management archive@the-tech.mit.edu + + Circulation and subscriptions circ@the-tech.mit.edu + + Free calendar listings news-notes@the-tech.mit.edu + + General questions general@the-tech.mit.edu + + Letters to the editor letters@the-tech.mit.edu + + Photography department photo@the-tech.mit.edu + + + + MAGAZINES + + + + *American Journalism Review + + Letters to the editors/queries + + (NO press releases) editor@ajr.umd.edu + + Electric Shock Treatment, U.K. + + (innovative and experimental music) bd1@mm-croy.mottmac.co.uk + + *Inside Media mediaseven@aol.com + + Interrace Magazine, Atlanta 73424.1014@compuserve.com + + + + NEWS/MEDIA SERVICES AND PRESS ASSOCIATIONS + + + + Conus Washington/TV Direct conus-dc@clark.net + + + + RADIO AND TELEVISION NETWORKS + + + + CNN Global News cnnglobal@aol.com + + * NBC, "Dateline" dateline@news.nbc.com + + + + RADIO AND TELEVISION STATIONS + + + + KXTV-TV, Sacramento, Calif. kxtv@netcom.com + + + + COMPUTER PUBLICATIONS + + + + *Network Computing editor@nwc.com + + *Personal Computer World editorial@pcw.ccmail.compuserve.com + + 3W Magazine: The Internet with a + + Human Face 3W@ukartnet.demon.co.uk + + Windows Computer Shareware 5648326@mcimail.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM + + IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF + + YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR + + PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + A TeleStrategies Event co-chaired by the + + Commercial Internet eXchange (CIX) + + + + TeleStrategies' Internet Conference and Expo '94 + + Monday October 10 - Wednesday October 12 + + Sheraton Crystal City, Arlington VA + + + + Conference Track (Tue October 11 - Wed October 12):Publishing, Marketing + + and Advertising on the Internet + + + + Pre-Conference Tutorial (Mon October 10): Understanding Internet + + + + Technologies For Non-Engineers And Strategic Planners + + + + Demonstration Track (Mon October 10 - Wed October 12):Online Demonstrations + + Of Internet Services, Products And Access Technologies + + + + Workshop Track (Tue October 11 - Wed October 12):How To Do Business On The + + Internet + + + + Exhibitions (Mon October 10 - Wed October 12) + + + + CONFERENCE TRACK - Tuesday, October 11, 1994 + + Publishing , Marketing and Advertising on the Internet + + + + 8:00-9:00 Registration + + + + 9:00-10:00 - INTERNET: THE OUTLOOK FOR + + COMMERCIALIZATION AND GROWTH + + + + John Curran, Product Manager, BBN Technology Services + + Bill Washburn, Executive Director, Commercial Internet Exchange (CIX) + + + + 10:00-10:15 Coffee Break + + + + 10:15-12:00 - NEWSPAPER AND BOOK PUBLISHING ON + + THE INTERNET + + Jeff Crigler, Director, Market Development, Network Advanced Services + + Division, IBM + + + + Laura Fillmore, President, Online Bookstore + + William S. Johnson, Publisher, Palo Alto Weekly + + + + 12:00-2:00 Hosted Lunch and Exhibits + + + + 2:00-2:45 - INTERNET USERS: WHO ARE THEY? + + Magdalena Yesil, Partner, Management Forum + + + + 2:45-3:15 - INTERNET BILLING + + Gary Desler, Senior Vice President, Network Solutions + + + + 3:15-3:30 Coffee Break + + + + 3:30-5:30 - CREATING BUSINESS MODELS FOR THE INTERNET + + Gordon Cook, President, Cook Network Consultants + + Chris Locke, President, MecklerWeb Corporation + + Cathy Medich, Executive Director, CommerceNet + + Robert Raisch, President, The Internet Company + + + + 5:30-6:30 Reception and Exhibits + + + + + + CONFERENCE TRACK - Wednesday, October 12, 1994 + + Publishing , Marketing and Advertising on the Internet + + + + 8:30-10:00 - HOW TO MARKET AND ADVERTISE EFFECTIVELY + + Andrew Frank, Director, Software Development, Ogilvy & Mather Direct + + Erica Gruen, Senior Vice President, Television, Information + + and New Media, Saatchi & Saatchi Advertising Worldwide + + Judith Axler Turner, a head of the working group on advertising for the + + Coalition for Networked Information + + + + 10:00-10:30 Coffee Break and Exhibits + + + + 10:30-12:00 - COPYRIGHT AND LICENSING ISSUES + + Kathlene Krag, Assistant Director, Copyright and New Technology Association + + of American Publishers, Inc. + + + + Steve Metalitz, Vice President and General Counsel Information + + Industry Association + + Martha Whittaker, General Manager, The UnCover Company + + + + 12:00-12:30 - VIDEO VIA THE INTERNET + + Ed Moura, Vice President, Marketing and Sales Hybrid Networks, Inc. + + + + 12:30-2:00 Hosted Lunch and Exhibits + + + + 2:00-3:30 - INFORMATION SERVICES AND THE INTERNET + + Brad Templeton, President, ClariNet Communications + + Richard Vancil, Vice President, Marketing, INDIVIDUAL, Inc. + + Representative, America Online + + + + 3:30-3:45 Coffee Break + + + + 3:45-5:00 - INTERNET PUBLISHING AND MARKETING TOOLS + + Bruce Caslow, Systems Engineer, Mesa Technologies + + John Kolman, Vice President, NOTIS Systems, Inc. + + Kevin Oliveau, Engineer, WAIS, Inc. + + + + Pre-Conference Tutorial + + UNDERSTANDING INTERNET TECHNOLOGIES + + FOR NON-ENGINEERS AND STRATEGIC PLANNERS + + Monday, October 10, 1994 - 9:00 a.m. to 5:00 p.m. + + + + Presented By: John Curran, BBN Technology Services; + + Bruce Antleman, Information Express; + + Bruce Caslow, Mesa Technologies; and Stephen Crocker, + + Trusted Information Systems, Inc. + + + + This one-day tutorial is for the non-engineer, strategic planner, + + entrepreneur or anyone who has to understand the Internet in order to make + + business decisions about emerging commercial opportunities. This tutorial + + covers not only Internet technologies, economics and leading-edge + + opportunities, but also looks at operational issues such as security, + + addressing and network management from a business development perspective. + + + + 1. INTERNET OVERVIEW: What is the Internet? Who controls it? How do you get + + connected? What can you do with it? Who pays for it? Who are the players + + domestically and internationally? What is the role of the NII and NREN? Why + + are the RBOCs, cable TV companies, IXCs and PDA vendors interested in + + Internet? Why all the attention to commercialization? How is the Internet + + likely to evolve over the next few years? + + + + 2. INTERNET ACCESS, NAVIGATION AND APPLICATIONS: + + How to find, share and sell information on the Internet. The basic + + application tools and navigation/search systems (FTP, Telnet, Archie, Gopher, + + Mosaic, World Wide Web, WAIS, etc.). Access service providers (CIX, PSI, + + Sprint and others). Access options (dial-up, dedicated, frame relay, cable + + TV and wireless).New entrepreneurial developments. + + + + 3. INTERNET TECHNOLOGIES: Role of TCP/IP. MAC vs. PC products. LAN access + + (SLIP, PPP, frame relay, etc.) and WAN and ATM developments. IPX, DECNET and + + APPLETALK. Leading edge vendors and where their products are headed. IP + + addressing. How to obtain addresses (Class A,B,and C). CIDR, Internet DNS and + + how to register. Setting up an E-mail server, bulletin board and directory + + service. + + + + 4. INTERNET SECURITY AND MANAGEMENT: Security concerns, policies and + + procedures. Defeating password sniffing. Firewalls and available firewall + + toolkits. Encryption, authentication and Clipper Chip issues. Other + + operational concerns related to doing business on the Internet. Guidelines + + for managing a commercial Internet service. SNMP management tools and + + products. + + + + WORKSHOP TRACK - Tuesday, October 11, 1994 + + HOW TO DO BUSINESS ON THE INTERNET + + + + 9:00-10:15 - GETTING CONNECTED TO THE INTERNET + + Howard McQueen, President, CD Consultants + + + + 10:15-10:45 Coffee Break + + + + 10:45-12:00 - CREATING A BUSINESS PRESENCE ON THE INTERNET + + Duffy Mazan, Partner, Electric Press, Inc. + + + +12:00-2:00 Lunch and Exhibits + + + + 2:00-3:15 - MOSAIC + + Bruce Caslow, Systems Engineer, Mesa Technologies + + + + 3:15-3:30 Break + + + + 3:30-5:00 - BUSINESS USES OF THE INTERNET + + Al Dhir, President, Internet Access Group, Inc. + + + + 5:00-6:30 Reception and Exhibits + + + + + + WORKSHOP TRACK - Wednesday, October 12, 1994 + + HOW TO DO BUSINESS ON THE INTERNET + + + + 9:00-10:15 - SECURITY: SINGLE SIGN ON + + Tom McHale, Director of Marketing and Product Development for North America, + + ICL, Inc. + + + + 10:15-10:45 Coffee Break + + + + 10:45-12:00 - CORPORATE AND BUSINESS TRAINING OVER THE INTERNET + + Speaker to be announced + + + +12:00-2:00 Lunch and Exhibits + + + + 2:00-3:15 - NETIQUETTE: HOW TO DO BUSINESS ON THE INTERNET WITHOUT GETTING + + "FLAMED" Paul Kainen, President, Kainen Technology Services + + + + ONLINE INTERNET DEMONSTRATION TRACK + + Monday, October 10, 1994 + + + + 2:00-5:00 p.m. + + Track A: DEMYSTIFYING THE INTERNET + + Paul Kainen, President, Kainen Technology Services + + + + Track B: DEMONSTRATIONS BY WAIS, Inc. and Performance Systems International + + + + 5:00-6:30 Reception and Exhibits + + + + ONLINE INTERNET DEMONSTRATION TRACK + + Tuesday, October 11, 1994 + + + + 9:00 a.m.-12:00 p.m. + + Track A: DEMYSTIFYING THE INTERNET + + Bruce Caslow, Systems Engineer, Mesa Technologies + + + + Track B: DEMONSTRATIONS BY:Semaphore Communications - Internet security + + products - CD Consultants + + + + 12:00-2:00 Lunch and Exhibits + + + + 2:00-5:00 + + Track A: DEMONSTRATIONS BY Spry, Inc. "Internet in a Box" Online Bookstore + + + + Track B: DEMONSTRATIONS BY MecklerWeb + + Corporation and "Palo Alto Weekly," the first general circulation newspaper + + on the Internet + + + + 5:00-6:30 Reception and Exhibits + + + + ONLINE INTERNET DEMONSTRATION TRACK + + Wednesday, October 12, 1994 + + + + 9:00-12:00 + + Track A: DEMONSTRATIONS BY America Online - demo of their current + + information services and NOTIS Systems, Inc. - demo of new, easy-to-use + + publishing tool for the Internet + + + + Track B: DEMONSTRATION BY Hybrid Networks, Inc. and Mesa Technologies - + + MOSAIC at 56 KBPS + + + +12:00-2:00 Lunch and Exhibits + + + + 2:00-3:15 + + Track A: DEMONSTRATION BY LEGI-SLATE + + + + Track B: DEMONSTRATION BY Gestalt Systems, Inc. + + + + CURRENT ONLINE DEMONTRATIONS + + Monday, October 10 - Wednesday, October 12 + + + + Current Demonstrations Conducted By: WAIS, Inc., SemaphoreCommunications, + + CD Consultants, Spry, Inc., Online Bookstore,MecklerWeb Corporation, + + "Palo Alto Weekly," America Online, NOTIS Systems, Inc., Hybrid Networks, + + Inc., Mesa Technologies,Legi-Slate, Performance Systems International + + and Gestalt Systems, Inc. + + + + EXHIBIT HOURS + + Monday, October 10 - 5:00-6:30 p.m. + + Tuesday, October 11 - 12:00-6:30 p.m. + + Wednesday, October 12 - 10:00-2:00 p.m. + + + + For more information about exhibiting, call Jackie McGuigan at (703) + + 734-7050. For more information or registration call (703) 734-7050. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SCREAM OF CONSCIOUSNESS + + + + -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- + + =-=-=-=-=Copyright 1993,4 Wired Ventures, Ltd. All Rights Reserved-=-=-=-= + + -=-=For complete copyright information, please see the end of this file=-=- + + =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= + + + + WIRED 1.1 + + Scream of Consciousness + + *********************** + + + + Paglia: Brash, Self-Promoting and Possibly the next Marshall McLuhan + + + + Interviewed by Stewart Brand + + + + (Editor's note - Paglia's faxed corrections of this article became a + + critical part of the design and layout. Hence, it has lost much that + + cannot be conveyed in ASCII over the electronic BBS's or the Internet. We + + strongly suggest you refer to the original in the magazine itself for the + + complete context). + + + + Camille Paglia, bad girl of feminism, has a knack for outraging listeners + + one moment, and then having them nod their heads in agreement the next. In + + rapid-fire broadcast mode, Paglia jumps from Aristotle to Madonna, soap + + opera to cathedral, all in one sentence. A tape recorder has trouble + + picking out her cascading words (Paglia faxed the accompanying text + + corrections to WIRED's offices late one Saturday night) and makes + + absolutely no progress in capturing her total body animation as she acts + + out each phrase. A media creature through and through, Paglia has been + + cavorting in the limelight of network TV and sold-out lectures ever since + + her 1991 book, Sexual Personae (the first of two volumes), poked the eye + + of both conservatives and liberals. Intrigued by Paglia's intellectual + + resemblance to Marshall McLuhan - patron saint of WIRED magazine - Stewart + + Brand, the author of the Media Lab, caught up with Paglia in the court of + + a San Francisco hotel. + + + + BRAND: Have you mapped your success against Marshall McLuhan's? Remember + + how that happened? Here was a guy, like you he was on the fringe of + + academia, Catholic oriented, basically a literary creature. He starts + + holding forth in a epigrammatic way about culture and media, and suddenly + + AT&T and everybody else wants to talk to him. Paglia comes along, does + + what you've done... + + + + PAGLIA: ...Influenced by McLuhan. Neil Postman, who I had the Harper's + + magazine discussion with, said something that was very moving to me. He + + said at the end of that evening, "I was a student of Marshall McLuhan and + + I have never been with someone who reminded me more of McLuhan. When you + + were sitting with McLuhan in the middle of the night, all you would see + + was the tip of his cigar glowing, and you would hear him making these huge + + juxtapositions. Even his writing never captured the way McLuhan's mind + + worked. Your mind works exactly the same, the way you bring things + + together and they ssssizzle when you bring them together." + + + + BRAND: So you read McLuhan in college. + + + + PAGLIA: McLuhan was assigned in my classes. Everyone had a copy of his + + books. There were so many things that were happening at that moment - + + McLuhan, Norman O. Brown, Leslie Fiedler, Allen Ginsberg. There was + + enormous promise of something that was going to just blast everything open + + in cultural criticism. What the heck happened? It wasn't just a + + conservative administration in the '70s and '80s. That's not it. It was a + + failure on the part of the '60s generation itself. You feel it a little + + bit in "Blow Up," or just like reading about Jimi Hendrix and the way the + + women looked, the way the groupies looked - how fabulous the groupies + + were. They were so sexy and so ballsy! It was amazing how those '60s + + chicks talked. This was the real feminism. Even women got less powerful. + + We have had a general cultural collapse. + + + + BRAND: What did you make of McLuhan? + + + + PAGLIA: We all thought, "This is one of the great prophets of our time." + + What's happened to him? Why are these people reading Lacan or Foucault who + + have no awareness at all of mass media? Why would anyone go on about the + + school of Saussure? In none of that French crap is there any reference to + + media. Our culture is a pop culture. Americans are the ones who have to be + + interpreting the pop culture reality. + + + + When I was in England earlier this summer for the release of the Penguin + + paperback of Sexual Personae, I was having fits because of no TV there. I + + felt like I was in prison. Then I got to Amsterdam, and Amsterdam was + + better because they had everything on satellite. That was interesting in a + + kind of sociological way. They have German TV and Italian TV and French + + TV, but it is still not equivalent to what we have. What we have is total + + domination by the pop culture matrix, by the mass media matrix. That's the + + future of the world. + + + + BRAND: Is pop culture and mass media the same thing? + + + + PAGLIA: For me, yes. I teach a course called "Mass Media." I think that it + + should be required for every liberal arts graduate - the whole history of + + mass media, traced from the 1830s newspapers all the way to today. + + + + BRAND: Between Volume 1 and the forthcoming Volume 2 of Sexual Personae is + + the arrival of mass media. When you have mass media, is art different? + + + + PAGLIA: I call the 20th century "The Age of Hollywood." I believe that + + mass media and pop culture is the culture of the 20th century. There's a + + big break at World War II. The last great works of high art are with World + + War I. You have Picasso and T. S. Eliot, and I feel that modernism in + + literature exhausted itself in its first generation - Proust, Joyce, + + Wolfe; that was it. What else? That's why I have my provocative + + statements, such as for me the best novel after World War II is Auntie + + Mame. I mean that literally. The only writers of fiction interesting to me + + at all after World War II are decadent or comedic. These are to me the + + only modes that work literarily after World War II. So Genet and Tennessee + + Williams are major figures for me. + + + + My publisher is always trying to get me to read novels - Saul Bellow, A.S. + + Byatt. I say, "Why would I want to read a serious novel?" Because a + + serious novel today is already too reactionary, by trying to reinterpret + + contemporary reality in verbal terms, making a verbal structure - no, no, + + no. To me, the rhythms of our thinking in the pop culture world, the + + domination by image, the whole way the images are put together, and so on + + are way beyond the novel at this point. If a novelist does emerge now who + + is a product of pop culture and mass media, it's going to look quite + + different on the page. It won't necessarily look fragmented. I don't + + believe in that post-modernist thing of cutting things up. But the rhythms + + of it are going to be fast rhythms, and it's going to be surreal, flashing. + + + + In my famous encounter with Susan Sontag in 1973, I had a bitter + + disappointment when I invited her to Bennington and we tried to talk, and + + I couldn't talk to her. I had felt like "Finally, a woman on my level," + + and her mind seemed so sloooow. It took me ten years before I realized + + what it was. She was born before World War II. There's no way her brain is + + like my brain. I suddenly realized, half my brain is different. I mean, + + half my brain is the traditional Apollonian logo-centric side which was + + trained by the rigorous public schools of that period, but the other half + + is completely an electrified brain. Essentially, what I'm doing is what + + all the '60s was doing, which was exploring the way that brain works. I + + have been exploring both sides of the brain in my work. But we need both. + + Not having both I think is a disaster for the young today because I have + + them in my classes. + + + + BRAND: You agree with Neil Postman's Amusing Ourselves to Death on this? + + + + PAGLIA: I agree with Neil Postman that we need both. We cannot have one, + + or one over the other. These young kids, they're lost. + + + + BRAND: If somebody's got both sides of their brain electric, what happens? + + + + PAGLIA: I think that they become hysterical. They become very susceptible + + to someone's ideology. The longing for something structured, something + + that gives them a world view, is so intense that whatever comes along, + + whether it's fascism or feminist ideology (which to me are inseparable), + + they'll glom onto it and they can't critique it. You see the inability of + + the young to critique this can of worms that feminism gives them - + + "patriarchy" and all this stuff - the inability to think through issues + + like date rape. I was screamed at by girls at Brown about date rape. Later + + I encountered them by chance on the streets of Philadelphia - they + + happened to be touring the country registering voters this summer - and I + + said ask me some questions. These girls were juniors at Brown and their + + minds couldn't even focus long enough for a reply. (Paglia mimics + + fluttering inarticulate interruptions.) + + + + They didn't have the base of education that I did, the rigorous public + + school education. The consequence is my mind can play in the realm of the + + mass media and that's my creativity as a person, the solid, rigorous + + building of the Apollonian skills on one side of the brain, and then the + + free play. To me, this is the great model of the human mind. It's + + incredible to go back and forth between those two things. This is why I + + don't need anybody in my life, because I have so much in my brain playing + + with each other. It's fantastic. + + + + When I was in England early in the summer, I was interviewed by some + + Cambridge women and had an incredible intellectual conversation. They were + + full of knowledge and insight. There's no TV whatever in Cambridge. + + + + BRAND: So all they do is Neil Postman's long cool argument. + + + + PAGLIA: Well, no. Actually, drinking a lot is what they seem to be doing. + + I think it must be that their extreme, extreme development of words is so + + exhausting. The amount that the educated class is drinking there, I + + couldn't believe it. I saw the public drunkenness in Cambridge of + + university men, staggering drunkenness, and I thought, that's what they + + have instead of pop culture: alcohol. + + + + The minute I hit London I realized no one looks at each other. I asked + + people there, "How does anyone pick up anyone, how do you ever meet + + anyone?" I was told, "The men never look at you. They respect your + + privacy." Well, OK. I was near the British Museum and we were going to a + + lecture; I needed something to eat, and walked into a pub at 4 o'clock. It + + was respectable - intellectuals and so on. The drunkenness! You could feel + + the sex was in there, in the pubs and the drinking. We've got the sex in + + our popular culture, and the feminists hate it - "sex and violence!" - but + + I think ours is far healthier. + + + + This is a very healthy culture as long as we keep up the rigorous + + training. The kids' true culture is pop culture - they already live in + + that - so that's why I oppose all this use of TV in school. I want + + education movie-based, in the way that we had in college. From the moment + + I arrived in college in 1964 we were immersed in films. I saw something + + like 800 films. The true multiculturism is foreign films, foreign films + + with subtitles, so you hear the language. That's the way to teach sex, the + + way to talk about male/female sex roles: movies. The way to teach what + + Lacan or Foucault claim to be doing - the relativity of a memory - is + + "Last Year in Marienbad." Did they meet at Marienbad or not? The + + inflections of emotion on people's faces, interrelations of subtleties, of + + non verbal subtleties of interpersonal sexual relations, are shown by + + cinema. Date-rape feminists want to insist, "No always means no." You'd + + never believe that if you were seeing cinema. + + + + When I think about it, these were mint-condition films. I realize what an + + incredible gift I had. It was a magic moment. There had been the art + + houses in the '50s in the urban centers and suddenly my generation had + + film on the college campuses in the '60s. We were seeing films - Fellini, + + Antonioni - that were five years old. We saw prints in mint condition. No + + one anywhere has that now. The quality of the prints has degenerated, and + + the films are being shown as videos. The way you develop the eye is to see + + great photography, the great high-contrast black-and-white in those films. + + + + Here's my proposal. A proper job for funding of the arts is to underwrite + + a national consortium of archives of all the classic films. They are too + + expensive to maintain at individual colleges and universities. What I + + envision is, when you go to any college of four years, by your fourth + + year, by rotation, a superb print of every classic film will have been + + shown. We happen to have a very bad print of "Persona" at my school. I + + have to tell the class, "Remember that scene where Bibi Andersson is + + standing, wearing a black dress against a white wall? I have to describe + + to you what Sven Nykvist photography really looked like there. It's a + + blazing white, very rock textured stucco, deep textured. The glossy sun + + glints in her blond hair..." + + + + This is ridiculous. Classic films are major works of art, and this is + + where the funding should go. + + + + BRAND: Film had that depth and that quality. Would you also have a + + television course offered? + + + + PAGLIA: Well, a course in mass media to introduce the student to a history + + of the technologies, the way network news is put together, how different + + our advertisements are from those in Europe, and so on. + + + + BRAND: What about content? You watch soap operas, right? Which ones? + + + + PAGLIA: "The Young and the Restless" is my favorite. For 17 years I've + + been watching that. "As the World Turns" is my second favorite. I have the + + TV on with the sound off most of the day. Not early in the morning because + + at that point I'm still dreaming. I'm waking up and I want to remember my + + dreams, so I don't want too many images at that point. By mid-morning it + + is on, on for the rest of the day until 1. I've been poor up to now, and + + my dream is to have someday a bank of TVs, where all the different + + channels could be on and I could be monitoring them. I would love that. + + The more the better. I love the tabloid stuff. The trashier the program + + is, the more I feel it's TV. + + + + BRAND: Why? + + + + PAGLIA: Because that's TV's mode. That's the Age of Hollywood. The idea of + + PBS - heavy-duty "Masterpiece Theater," Bill Moyers - I hate all that. + + + + BRAND: How about the ads? + + + + PAGLIA: I love ads. There's a section on ads in Volume 2 of Sexual + + Personae. Like Andy Warhol, I have been in love with ads since my earliest + + childhood. That is the way I think. One of the reasons that I probably got + + this famous is because I think and talk in ad terms, in sound-bite terms. + + People say, "She promotes herself." When I was young, I thought in + + newspaper headline terms: "Paglia Falls Off Chair." I feel totally a part + + of mass media. Everyone knows ads are the best part of television, but the + + way the ads work - it's also the way MTV videos work - it's just flash + + flash flash images, symbol symbol symbol. You know, the way that ads are + + structured is not unlike the way the Catholic Church was plastered with + + ads, essentially, for saint this, saint that. To me there was an absolute + + continuity between the Catholic Church and ads. + + + + See, this is where I drew up my theory that popular culture is the + + eruption of the varied pagan elements in Western culture - that + + Judeo-Christianity never did defeat paganism as history books claim, but + + rather it was driven underground. We've had three major eruptions of + + paganism. One at the Renaissance, and most people would accept that. + + Another was Romanticism, when the chthonic or daemonic element came up + + with all those vampires and the nature cult. And now the third great + + eruption is the 20th century Age of Hollywood. Gore Vidal agrees. + + Hollywood is the great thing that America has done and given to the world. + + + + BRAND: What happens to those eruptions after a while? Do they eventually + + self-defeat? + + + + PAGLIA: Well, no, because each one of the eruptions became part of the + + fabric of the future. The eruption of paganism at the Renaissance led + + eventually to the recovery of science, and science has been the greatest + + challenge to Judeo-Christianity. Many want to get rid of the church and + + say it is the biggest source of evil. I hate that talk. A proper society + + will strengthen all its institutions. I want to strengthen the church and + + to strengthen the sex industry. I think they play off each other. Both + + should fight with each other and be strengthened. There will always be a + + craving for religion, and if we don't get it from Catholicism, which is a + + very profound system, you're going to get it from feminist ideology. + + + + BRAND: Are you glad of the Latin Mass coming back? + + + + PAGLIA: Where is it coming back? + + + + BRAND: A few Catholic churches apparently are bringing back the Latin + + Mass, and the hierarchy stopped forbidding it. People like it; they like + + the mysticism. + + + + PAGLIA: I thought that was a tremendous loss when the church dispensed + + with all that ceremony and imagery and beauty... + + + + BRAND: ...Priests turning their backs on the congregation... + + + + PAGLIA: ...Turning their backs. The hierarchy of it, the hieraticism of + + it, that sense of the holy, the mystical, the awesome. What they've got + + now is more authentically like early Christianity. You have a bunch of + + peasants sitting together and holding hands. But what I love is what + + Martin Luther saw was bad, which was the whole pagan element of the + + Italian Catholic Church, the heir of the Roman Empire. + + + + BRAND: You say pop culture is the third wave of pagan and chthonic stuff. + + You say chthonic stuff is dangerous, and you ride on its danger. Is pop + + culture dangerous? + + + + PAGLIA: Well, if the culture becomes only that, I think it is, because + + it's filled with hallucinations. Of course that's what I love about it. + + It's surreal. But there are practical realities in everyday life that have + + to be solved - the procedures of corporate life, of academic life, all of + + the boring things that have to be done in a systematic manner, and we have + + be taught those systems. The Apollonian systems also are a heritage of the + + Greco-Roman period. The Apollonian part of the brain is absolutely + + necessary for us to exist as rational citizens. The problem with the New + + Age stuff is it's like all up here, you know (gesturing vaguely aloft). As + + for the channelers, my acting students could do better accents. Credulity + + is a product of lack of rigorous education. + + + + Here's what I'm saying in my work. You need to pay homage to both Apollo + + and Dionysus. Both are great gods. Both must be honored. We need a balance + + between the two. That's all. + + + + * * * + + + + =-=-=-=-=-=-=-=-=-=-=-=WIRED Online Copyright Notice=-=-=-=-=-=-=-=-=-=-=-= + + + + Copyright 1993,4 Wired Ventures, Ltd. All rights reserved. + + + + This article may be redistributed provided that the article and this + + notice remain intact. This article may not under any circumstances + + be resold or redistributed for compensation of any kind without prior + + written permission from Wired Ventures, Ltd. + + + + If you have any questions about these terms, or would like information + + about licensing materials from WIRED Online, please contact us via + + telephone (+1 (415) 904 0660) or email (info@wired.com). + + + + WIRED and WIRED Online are trademarks of Wired Ventures, Ltd. + + + + =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= + + + + DIGITAL CASH MINI-FAQ FOR THE LAYMAN + + + + By Jim Miller (Jim-Miller@suite.com) + + + + [If you're on the cypherpunks mailing list, you've already seen this.] + + + + Here's a description of digital cash that I recently wrote up. I've + + intentionally generalized and oversimplified the descriptions to keep from + + getting bogged down in the details, but I feel the information is + + accurate. + + + + Q: How is digital cash possible? + + A: Public-key cryptography and digital signatures (both blind and + + non-blind signatures) make digital cash possible. It would take too long + + to go into detail how public-key cryptography and digital signatures work. + + But the basic gist is that banks and customers would have public-key + + encryption keys. Public-key encryption keys come in pairs. A private key + + known only to the owner, and a public key, made available to everyone. + + Whatever the private key encrypts, the public key can decrypt, and vice + + verse. Banks and customers use their keys to encrypt (for security) and + + sign (for identification) blocks of digital data that represent money + + orders. A bank "signs" money orders using its private key and customers + + and merchants verify the signed money orders using the bank's widely + + published public key. Customers sign deposits and withdraws using their + + private key and the bank uses the customer's public key to verify the + + signed withdraws and deposits. + + + + Q: Are there different kinds of digital cash? + + A: Yes. In general, there are two distinct types of digital cash: + + identified digital cash and anonymous digital cash. Identified digital + + cash contains information revealing the identity of the person who + + originally withdrew the money from the bank. Also, in much the same + + manner as credit cards, identified digital cash enables the bank to track + + the money as it moves through the economy. Anonymous digital cash works + + just like real paper cash. Once anonymous digital cash is withdrawn from + + an account, it can be spent or given away without leaving a transaction + + trail. You create anonymous digital cash by using numbered bank accounts + + and blind signatures rather than fully identified accounts and non-blind + + signatures. + + + + [To better understand blind signatures and their use with digital cash, I + + highly recommend skimming through chapters 1 - 6 of Bruce Schneier's book + + _Applied Cryptography_ (available at your favorite technical book store). + + Bruce does a very good job of describing the wide variety of interesting + + things you can do when you combine computers, networks, and cryptography. + + The first half-dozen chapters are quite readable, even to the layman. He + + doesn't get into the heavy-duty math until later in the book.] + + + + There are two varieties of each type of digital cash: online digital cash + + and offline digital cash. Online means you need to interact with a bank + + (via modem or network) to conduct a transaction with a third party. + + Offline means you can conduct a transaction without having to directly + + involve a bank. Offline anonymous digital cash is the most complex form + + of digital cash because of the double-spending problem. + + + + Q: What is the double-spending problem? + + A: Since digital cash is just a bunch of bits, a piece of digital cash is + + very easy to duplicate. Since the copy is indistinguishable from the + + original you might think that counterfeiting would be impossible to + + detect. A trivial digital cash system would allow me to copy of a piece + + of digital cash and spend both copies. I could become a millionaire in a + + matter of a few minutes. Obviously, real digital cash systems must be + + able to prevent or detect double spending. + + + + Online digital cash systems prevent double spending by requiring merchants + + to contact the bank's computer with every sale. The bank computer + + maintains a database of all the spent pieces of digital cash and can + + easily indicate to the merchant if a given piece of digital cash is still + + spendable. If the bank computer says the digital cash has already been + + spent, the merchant refuses the sale. This is very similar to the way + + merchants currently verify credit cards at the point of sale. + + + + Offline digital cash systems detect double spending in a couple of + + different ways. One way is to create a special smart card containing a + + tamper-proof chip called an "Observer" (in some systems). The Observer + + chip keeps a mini database of all the pieces of digital cash spent by that + + smart card. If the owner of the smart card attempts to copy some digital + + cash and spend it twice, the imbedded Observer chip would detect the + + attempt and would not allow the transaction. Since the Observer chip is + + tamper-proof, the owner cannot erase the mini-database without permanently + + damaging the smart card. + + + + The other way offline digital cash systems handle double spending is to + + structure the digital cash and cryptographic protocols so the identity of + + the double spender is known by the time the piece of digital cash makes it + + way back to the bank. If users of the offline digital cash know they will + + get caught, the incidents of double spending will be minimized (in + + theory). The advantage of these kinds of offline systems is that they + + don't require special tamper-proof chips. The entire system can be + + written in software and can run on ordinary PCs or cheap smart cards. + + + + It is easy to construct this kind of offline system for identified digital + + cash. Identified offline digital cash systems can accumulate the complete + + path the digital cash made through the economy. The identified digital + + cash "grows" each time it is spent. The particulars of each transaction + + are appended to the piece of digital cash and travel with it as it moves + + from person to person, merchant to vender. When the cash is finally + + deposited, the bank checks its database to see if the piece of digital + + cash was double spent. If the digital cash was copied and spent more than + + once, it will eventually appear twice in the "spent" database. The bank + + uses the transaction trails to identify the double spender. + + + + Offline anonymous digital cash (sans Observer chip) also grows with each + + transaction, but the information that is accumulated is of a different + + nature. The result is the same however. When the anonymous digital cash + + reaches the bank, the bank will be able to examine it's database and + + determine if the digital cash was double spent. The information + + accumulated along the way will identify the double spender. + + + + The big difference between offline anonymous digital cash and offline + + identified digital cash is that the information accumulated with anonymous + + digital cash will only reveal the identity of the spender if the cash is + + double spent. If the anonymous digital cash is not double spent, the bank + + can not determine the identity of the original spender nor can it + + reconstruct the path the cash took through the economy. + + + + With identified digital cash, both offline or online, the bank can always + + reconstruct the path the cash took through the economy. The bank will + + know what everyone bought, where they bought it, when they bought it, and + + how much they paid. And what the bank knows, the IRS knows. + + + + By the way, did you declare that $20 bill your Grandmother gave you for + + your birthday? You didn't? Well, you wont have to worry about forgetting + + those sorts of things when everybody is using fully identified digital + + cash. As a matter of fact, you wont even have to worry about filing a tax + + return. The IRS will just send you a bill. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PATENT SEARCHING EMAIL SERVER is now open for business + + + + By Gregory Aharonian (srctran@world.std.com) + + + + + + APS PATENT SEARCHING ARRIVES ON THE INTERNET!!!!!!!!!!!!!!!! + + (well only in a real limited way for the time being :-) + + + + A few weeks ago, I announced plans to provide limited patent searching + + over the Internet, where you can get a list of patents by specifying the + + class/subclass. + + + + I have decided to do this in two stages. To test out the email-server + + software I am writing, I first plan to allow email requests to retreive parts + + of the PTO classification manuals (see below). Once things are running + + smoothly, I will then add the capability to retrieve patent titles by + + class/subclass. + + + + So feel free to start sending in requests to the address listed below: + + + + search@world.std.com + + + + wish me luck, and start thinking philanthropic. By the way, if someone has a + + machine readable version of the WIPO international classification system, + + please send it to me so I can add it to the server. At some point when I + + have lots of equipment, I will sort US patents by their international + + classification. + + + + Greg Aharonian + + Internet Patent News Service + + + + ==================== + + + + Internet Patent News Service + + September 1994 + + + + PATENT TITLES EMAIL SERVER + + search@world.std.com + + + + The Internet Patent News Service is pleased to announced the availability + + of the Patent Titles email server, where people can retrieve lists of patent + + titles dating back to 1970 for any USPTO class/subclass, and patent numbers + + for additional patents dating back to the 1800's. The Patent Titles email + + server is the first step in our efforts to make the entire USPTO APS patent + + text database system accessible over the Internet. + + + + Approximately one gigabyte of data has been prepared and attached to the + + Internet. As all of the equipment and network access is borrowed, I am + + limiting access to an email server until I get a better feel for demand for + + the data, and until I can raise funding to set up a proper Internet server. + + + + Unless the bandwidth and processing load overwhelms the equipment I am + + borrowing, the service will be free. + + + + To use the email server, send requests to the Internet address: + + + + search@world.std.com + + + + using any of the following commands sent as text in the body of the email + + message: + + + + SENDTO account-name@internet.site.adr + + + + This command is mandatory of all requests and is where you specify the email + + address you want the information sent to. Occasionally From: lines in email + + addresses do not provide a correct return address (at least in my experience + + doing the Internet Patent News Service). + + + + SEND INTRO + + SEND HELP + + + + Either of these commands will return this message. + + + + SEND UCLASSES + + + + This command will return an index to the approximately 400 patent classes + + that are currently being used, for example: + + Class: 69 Leather Manufacturers + + + + SEND UCLASS XXX + + + + This command will return that section of the USPTO's Manual of Classification + + covering patent class XXX. For example, the command "SEND CLASS 69" would + + return a list of all of the subclasses in Class 69 by number and title. + + These files range in size from 5K to 120K. What follows is a section + + of Class 69: + + + + Subclass Subclass + + Number Title + + 1 MACHINES + + 1.5 .Belt-stretching + + 3 .Horse collar shaping + + 4 .Horse collar stuffing + + + + SEND UCLASS COMPUTING + + + + This command will return those sections of the USPTO's Manual of + + Classification covering patent classes 395 and 364, the two main classes + + dealing with hardware and software. + + + + SEND IPNSINFO + + + + This command will return an introductory message to my Internet Patent News + + Service. + + + + SEND CONSULT + + + + This command will return an introductory message to my patent searching + + consulting services I offer. + + + + SAVE COMMENT + + + + This command lets me know your request is actually a comment about the email + + server operation, or any inaccuracies you detect in the patent information + + being sent out. + + + + As I am parasiting the equipment to run the server (which basically means + + that I operate the server at nite and on weekends), please send your requests + + in at the end of the workday or on weekends. Within a day or so, you will + + receive back ny email whatever you requested. + + + + SECURITY + + A very important concern for anyone using this email server is secrecy, + + that what they are searching for is not revealed to others. As a potential + + inventor, I appreciate this as much as anyone else. While I plan to save the + + email addresses of people who use the server (but not their search request), + + no other information will be retained. The email address information will be + + saved to study who, and how often, people are using the server. I would + + appreciate any suggestions on how to ensure security beyond this. + + + + Please excuse any mishaps that occur as I get this service off the ground. + + This email server is a classic hack that will get better in time as people + + use it. In turn, the experience gathered in running the server will be + + invaluable in demonstrating the feasibility of making massive amounts of + + patent data available over the Internet. + + + + Also, get ready for that voluntary registration fee I mention in my intro + + piece to the Internet Patent News Service. If the Patent Titles email server + + is successful, and you all like it, this fall I plan to coordinate an effort + + to put all of the patent abstract information since 1970 onto the Internet, + + making it available through email servers, Gopher, WAIS and Mosaic. But first + + things first, getting the Patent Titles email server working. + + + +Greg Aharonian + +Internet Patent News Service + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Five "Hackers" Indicted for Credit Card/Computer Fraud + + + + From CuD Moderators + + Computer Underground Digest + + + + (AP WIRE - Thurs, Sept. 8, 1994) + + + + NEW ORLEANS (AP) -- "Dr. Demonicus," "Renegade" and four other + +hackers used computers to steal credit card numbers and used them to + +buy $210,000 in gold coins and high-tech hardware, federal prosecutors + +said Wednesday (Sept 8, '94). + + + +The nine-count indictment unsealed Wednesday charged five men from + +Louisana and one from New York with conspiracy, computer fraud, access + +device fraud and wire fraud, U.S. Attorney Eddie Jordan Jr. said. + + + +Some fo their hacker nicknames were included. They were identified as + +Dwayne "Dr. Demonicus" Comeger, 22; Brian Ursin, 21; John Christopher + +"Renegade" Montegut, 24; Timothy "Revelation" Thompson, 21; James + +McGee, 25; and Raymone "Wiseguy" Savage, 25, of Richmond Hills, N.Y. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CLIPPER T-SHIRTS + + + + By Norman Harman (normh@crl.com) + + + + Information and opposition to the Clipper proposal is strong on the + + Internet. But it is far too unknown to the 'outside' community. Everyone + + concerned by this issue should inform all the people they know of its + + implications. One way to increase awareness and show your opinion is to + + wear it:). + + + + I would like to offer an anti Clipper/Skipjack T-shirt. They would be white + + with black printing and cost approximately $5.00 plus $2.90 shipping to US + + locations. That is the cost to produce one shirt. I am trying to spread + + awareness not make money. + + + + I need to know if people are interested in this idea and what should the + + shirts say? + + + + Two quick ideas are: + + "Skip Skipjack" + + or + + "Just Say No to Clipper" + + + + Please send comments, suggestions, and questions to normh@crl.com. If more + + than a few people are interested I will go ahead and have the shirts made + + and post how to get one. + + + + A worthy cause is better if it benefits another good cause so the shirts + + will be silk-screened by Zerolith, part of a non-profit organization that + + employs, shelters, and assists homeless youth. If you would like to talk + + with Zerolith or donate money directly here is how to contact them. + + + + Zerolith + + 3075 21st Street + + San Francisco, CA 94110-2626 + + 415.641.1014 voice + + 415.641.1474 fax + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CYBERNEWS DEBUTS + + + + By Patrick Grote (patrick.grote@supportu.com) + + + + *** PRESS RELEASE *** + + + + CyberNews + + 11221 Manchester Rd., Suite 313, St. Louis, MO 63122 + + Contact: Patrick Grote, patrick.grote@supportu.com + + Phone: (314) 984-9691 + + FAX: (314) 984-9981 + + + + FOR IMMEDIATE RELEASE + + + + CyberNews, A Monthly Publication, Debuts With A Stunning + + Success for Readers/Advertisers + + + + St. Louis, MO, September 8 _ CyberNews, a new monthly electronic + + publication, debuted today featuring over 25 hard hitting, real world + + software reviews, a tell all interview with shareware king Scott Miller + + of Apogee Software, the people that brought the world Castle Wolfenstein + + and a feature by the leaders in the Work at Home field, Paul and Sarah + + Edwards. + + + + CyberNews is unique in electronic publications, commonly referred to + + as zines, due to the fact they are advertiser supported and 85% of the + + information is generated from everyday people. "Too many reviews today + + are done to please the advertiser. Heck, most of the traditional press + + basically reprint press releases. People need to know what + + software/hardware works and what problems may crop up. Unbiased reviews + + are what we strive for," detailed Patrick Grote, Publisher, Marketing. + + + + Available in three formats, CyberNews is readable by anyone. A + + Windows Help file format supports a color graphical excursion that + + anyone with Windows, Windows for Workgroups or WindowsNT can view. "We + + wanted to bring the electronic publication into a new era of color and + + production," notes Roger Klein, Publisher, Production. + + + + The ASCII version features the ability to be enjoyed by anyone with + + a PC, dumb terminal or device that has the ability to read standard + + ASCII text. According to Patrick Grote, Publisher, Marketing, "the goal + + was to make CyberNews as Internet friendly as possible. Since we use + + straight ASCII everyone who can access the Internet can read our + + publication." + + + + The ReadRoom format allows Sysops to add CyberNews to their BBS + + quickly without having to run a conversion program. "Sysops are the + + backbone of the information superhighway. They are engineer, designer, + + construction worker and user wrapped into one. We realized we can't + + ignore their needs," explained Publisher, Marketing, Patrick Grote. + + + + To grab latest issue of CyberNews, you can check these sources: + + + + Internet: wuarchive.wustl.edu:/pub/MSDOS_UPLOADS/zines + + polecat.law.indiana.edu:/pub/Incoming + + ftp.fonorola.net:/in.coming + + + + CompuServe: Work at Home (GO WORK in GENERAL LIBRARY), IBM APP + + (GO IBMAPP in ELECTRONIC PUBLICATIONS LIBRARY), + + Novell User (GO NOVUSER in NEW UPLOADS LIBRARY), + + International Trade Forum (GO TRADE in Section 1). + + + + FidoNet: You can freq the files 1:100/380: + + CYBER - All three versions + + CYBERR - The ReadRoom version. + + CYBERA - The ASCII version. + + CYBERW - The Windows version. + + + + Delphi: PCSIG + + + + America Online: Computing and Software + + + + Email: Send requests or questions to subscribe@supportu.com + + + + PG - Publisher, CyberNews, patrick.grote@supportu.com + + A Publication on the Leading Edge - 09/13/94 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PC MAGAZINE DECARES THE PIPELINE BEST INTERNET SERVICE + + + + By James Gleick (gleick@pipeline.com) + + + + We at the Pipeline are very pleased to announce that the editors of PC + + Magazine, comparing all the major Internet service providers from America + + Online and Delphi down to the Pipeline, have declared that our young + + service is the best choice. + + + + We have a lot of room for improvement, we know, but coming in our first + + year, this is gratifying. + + + + "A true beauty queen," Robin Raskin, PC Magazine's editor, writes in the + + October 11 issue. "The Pipeline is an elegantly conceived program; we've + + seldom seen a Version 1.x program that's as well thought out. Watch as the + + Pipeline continues to grow; the Internet will be a better place because of + + this package." + + + + We hope so. Anyway, we'd like to take the opportunity to offer Internet + + users (or would-be Internet users) a free copy of our software, to try + + out in demo mode. It's available for Windows or Macintosh. Send your + + address to windisk@pipeline.com or macdisk@pipeline.com. For general + + information, you may send email to info@pipeline.com. + + + + James Gleick + + The Pipeline + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SCOUT REPORT SUBSCRIPTIONS EXCEED 10,000 MARK + + + + From InterNIC Info Scout (scout@is.internic.net) + + + + To all InterNauts: + + + + Subscriptions for the Scout Report have exceeded 10,000! + + + + And 10,000 InterNauts can't be wrong! + + + + To celebrate this milestone, this week's Scout Report will be a double + + issue and include many resources you may have missed during the recent + + end-of-summer weeks. It's now Fall, so clean out those electronic + + closets and make room for some new 'Net resources ready for exploration! + + The September 16 issue will also include an expanded NetBytes section to + + accommodate a large number of recently released sources of information + + about using the Internet. + + + + If you haven't yet subscribed or told your friends and colleagues, now is + + the time. Spread the news by word-of-net. Below are instructions for + + subscribing or receiving a copy of this week's issue by email, gopher, and + + WWW. + + + + The Scout Report is a weekly publication provided by InterNIC Information + + Services to assist InterNauts in their ongoing quest to know what's new + + on and about the Internet. It focuses on those resources thought to be of + + interest to the InterNIC's primary audience, researchers and educators, + + however everyone is welcome to subscribe and there are no associated + + fees. + + + + The Scout Report is posted on the InterNIC InfoGuide's gopher and + + WorldWideWeb servers where you can easily follow links to the resources + + which interest you. Past issues are stored on the InfoGuide for quick + + reference, and you can search the InfoGuide contents to find the specific + + references you need. The Scout Report is also distributed in an HTML + + version for use on your own host, providing fast local access for yourself + + and other users at your site. + + + + Join thousands of your colleagues already using the Scout Report as a + + painless tool for tracking what's new on the 'Net! + + + + Best regards, + + InterNIC Info Scout + + + + Scout Report Contents + + + + Subject-oriented online resources are organized by access method: + + + + * WWW + + * Gopher + + * Email/FTP + + + + Resources and announcements related to the network are included in: + + + + * National Information Infrastructure + + * NetBytes + + + + Recreational resources for perusing after hours (of course) are listed + + here: + + + + * Weekend Scouting + + + + *** New section coming the week of September 23 -- a place for selected + + interesting services on the 'Net which are fee based, provided by + + commercial organizations, or best of all, offer virtual shopping: + + + + Commercial Services + + + + + + + + Scout Report Access Methods + + ------------------------------ + + + + ** To receive the special double-issue of the Scout Report by email + + (gopher and WWW access methods are listed below) send mail after + + September 16 to: + + + + mailserv@is.internic.net + + and in the body of the message type: + + send /scout-report/9-16-94 + + + + ** To receive the email version of the Scout Report automatically each + + weekend, subscribe to the scout-report mailing list which is used + + exclusively for one Scout Report message each week: + + + + send mail to: + + + + majordomo@is.internic.net + + + + in the body of the message, type: + + + + subscribe scout-report + + + + to unsubscribe to the list, repeat this procedure substituting the word + + "unsubscribe" for subscribe. + + + + + + ** To receive the Scout Report in HTML format for local posting, + + subscribe to the scout-report-html mailing list, used exclusively to + + distribute the Scout Report in HTML format once a week. Send mail to: + + + + majordomo@is.internic.net + + + + in the body of the message, type: + + + + subscribe scout-report-html + + + + + + ** To access the hypertext version of the Report, point your WWW client + + to: + + + + http://www.internic.net/infoguide.html + + + + + + >> Gopher users can tunnel to: + + + + is.internic.net + + + + select: Information Services/Scout Report. + + + + + + + + + + *---------------------------------------------------------------- + + Copyright 1994 General Atomics. + + + + The InterNIC provides information about the Internet and the resources on + + the Internet to the US research and education community under the + + National Science Foundation Cooperative Agreement No. NCR-9218749. The + + Government has certain rights in this material. + + + + Any opinions, findings, and conclusions or recommendations expressed in + + this publication are those of the author(s) and do not necessarily + + reflect the views of the National Science Foundation, General Atomics, + + AT&T, or Network Solutions, Inc. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + IMPORTANT PROCLAMATION: THE FUTURE OF THE NET IS AT HAND! + + + + By James "Kibo" Parry (kibo@world.std.com) + + + + P R O C L A M A T I O N & M A N I F E S T O + + *********************************************** + + + + WHEREAS, the computer network named USENET has insurmountable flaws: + + + + => It is cluttered with thousands of disorganized groups. + + => It is difficult to use due to the various software interfaces. + + => It is infected with viruses, especially in the .signatures. + + => There is no formal rulebook and no official administration. + + => Bozos abound. + + => Power-crazed maniacs frequently try to manipulate Usenet at their whim. + + + + These problems are most important. THEREFORE, in an official and secret + + democratic vote, Kibo has been duly elected LEADER OF THE NET. To correct + + this heinous situation, LEADER KIBO has decided to take bold measures, + + a brave new initiative, detailed herein. + + + + WAKE UP, IT'S 1994! THE FUTURE WILL NOT WAIT FOR A VOTE! + + + + Here is what Leader Kibo has decided--what MUST be done--what WILL be done: + + + + PHASE ONE. GLOBAL RMGROUPS FOR ALL USENET GROUPS WILL BE + + ISSUED ON 4/15/94, 06:00 GMT. + + + + A Day Without Usenet shall pass, and it will be a time of rest for + + government employees. Many will discover life, or at least television. + + Desperate soc.singles readers will have nervous breakdowns. ClariNet + + will go bankrupt. UUNET's modems will cool off. The world + + will rotate a full three hundred sixty degrees just the same. + + + + Every Usenet group, and all its associated problems, will have been + + wiped off the face of the Earth forever by the might of the rmgroup. + + Of course, to prevent any power-crazed maniacs from putting the + + groups back, the newsgroup `control' will be rmgrouped FIRST. Thus, + + the situation will be permanent. Nobody will undo the Pax Kibotica! + + + + PHASE TWO. NEWGROUPS FOR THE GROUPS IN THE NEW HIERARCHY WILL + + BE ISSUED ON 4/16/43, 06:00 GMT. + + + + The new network shall be named HAPPYNET, as it will be a Better Place. + + Usenet is dead. Long live HappyNet! + + + + ********* HAPPYNET: THE NET THAT'S HAPPIER THAN YOU! ********* + + + + UNDER THE AUSPICES OF THE ALL-WISE LEADER KIBO, + + THE NEW NETWORK SHALL BE ORGANIZED THUSLY: + + + + Three hierarchies encompassing ALL HUMAN DISCOURSE: + + + + => nonbozo.* + + + + => bozo.* + + + + => megabozo.* + + + + All topics discussed on Usenet, and even deeper topics which COULD + + be discussed on Usenet but AREN'T, will fit nicely in those three-- + + NO EXCEPTIONS. Extensive time and motion studies have been + + performed in the name of efficiency to maximize your pleasure! + + Existing groups will be moved into the new organization + + scheme, resulting in nonbozo.news.announce.newusers, bozo.rec.pets, + + megabozo.talk.bizarre, nonbozo.comp.virus, bozo.alt.sex, + + megabozo.alt.fan.lemurs, bozo.postmodern, megabozo.org.mensa, + + nonbozo.clari.news.urgent, megabozo.megabozo.megabozo.religion.kibology, + + etc., as determined by scientific measurements of the bozosity of the + + groups, measured by Leader Kibo's Council On Scientific Bozosity and the + + faculty of Rensselaer Polytechnic Institute (Troy, NY), world leaders in + + bozosity assessment. These truly scientific procedures were developed + + and pre-tested by Drs. Todd M. McComb and Tim Gallagher and are patented + + to prove that they are good! + + + + It is estimated that the statistical breakdown of HappyNet will be thus: + + + + 1.0000% nonbozo.* + + 90.0000% bozo.* + + 9.0000% megabozo.* (Computations courtesy of Bell Labs) + + + + Bozo.* will, of course, be subdivided logically: bozo.nerd.*, bozo.tv.*, + + bozo.inane.*, bozo.boring.*, bozo.sex.*, bozo.argue.*. + + + + New groups will also be added for MAXIMUM ENJOYMENT. The network would + + be a very unfair place if only Leader Kibo were allowed to propose new + + groups. Instead, because Leader Kibo is benevolent and omnisagaciously + + father-like, he will create WHATEVER GROUP YOU WANT (even, say, + + megabozo.kibo.is.a.blenny!) provided that (a) you follow the Official + + Procedure, filing all five copies of your request in triplicate and then + + making seven carbons of each, and (b) you pay Leader Kibo $160 for each + + letter in the new group's name, and $720 for each period. UNLIKE SOMEARCHAIC SYSTEMS, VOWELS DO NOT COST EXTRA. PAT SAJAK IS EVIL! + + + + Of course, thanks to Leader Kibo's awesome foresight, new groups will + + probably not be needed. A simple computer program will generate all + + groupnames from *.aaaaa.aaaaa.aaaaa.aaaaa to *.zzzzz.zzzzz.zzzzz.zzzzz. + + This will encompass ALL possibilities in a COMPLETELY LOGICAL FASHION, + + maximally efficient yet FUN! Prudence and foresight by LEADER KIBO! + + + + There will even be a .d group for every regular group. In fact, + + the .d groups will even have their own .d.d groups for metadiscussion + + of whether or not the new .d.d.d and .d.d.d.d groups are needed at all! + + + + The wealth of new groups will also cut down on those annoying egomaniacal + + posters who try to post the same article to EVERY group, because it will + + become physically impossible to post to ALL groups within a MORTAL LIFETIME! + + + + But wait, there's more--over six billion groups MORE will be added at + + HappyNet's inception--free of charge! + + + + ********* HAPPYNET: EVERYONE IS EQUALLY EQUAL! ********* + + + + To promote EQUALITY and POLITICAL CORRECTNESS (the good kind), Leader + + Kibo has decided to correct the inequality of the distribution of + + "personal" groups. Some people, or groups of people, currently are + + popular enough to have groups named in their honor: alt.weemba, + + alt.fan.john-palmer, alt.fan.monty-python, alt.fan.dave-barry, + + alt.fan.mike-jittlov, alt.fan.naked-guy, alt.religion.kibology, + + alt.fan.alok-vijayvargia, alt.fan.harry-mandel. Because everyone is + + equal before the eyes of wise Leader Kibo, it was decided that EVERYONE + + WILL HAVE THEIR OWN GROUP on HappyNet. This will celebrate the + + global diversity of our users, demonstrating for once and for all + + that they are all unique, but unique in exactly the same way! + + + + A scientific questionnaire developed specifically for the purpose will be + + mailed to everyone on the planet. It will read: + + + + Dear Citizen Of The New Network, + + + + You are being given your own HappyNet group. Its placement + + will depend on your answer to this simple question. + + + + ARE YOU A BOZO? (CHECK EXACTLY ONE) [] YES [] NO + + + + I care, + + Leader Kibo + + + + People who answer "yes" will be given groups in bozo.personal.*, and + + people who answer "no" will be given groups in megabozo.personal.*. + + People who refuse to answer, or show contempt for the process, will be + + taken (by the Network Security Patrol Force) to the Citadel Of Judgment + + to appear before the Council Of Bozosity, who will examine the person and + + assign them either bozo.weenie.* or megabozo.weenie.*. + + + + Of course, this would be POINTLESS if anyone in the world were DENIED + + ACCESS to HappyNet. + + + + ********* HAPPYNET: A NET IN EVERY POT! ********* + + + + Net access will be provided to EVERY SINGLE PERSON, LIVING, UNBORN, OR + + DEAD, thanks to the new TELESCREENS which will be installed in every room + + of every building on the planet. Not only will this encourage higher net + + communications volume, it will also help Leader Kibo be a good leader, as + + it will allow Leader Kibo to instantly broadcast to all his subjects, and + + to see how they are feeling and what they are doing. + + + + But simple TELESCREENS in LIVING ROOMS, BEDROOMS, and BATHROOMS are + + not enough to ensure FREEDOM and EQUALITY. Neural transceivers will + + be implanted, FREE, at BIRTH in all newborns, allowing them to "jack in" + + to HappyNet, transmitting articles, sounds, and even GIF files at + + the speed of thought! They won't even have to worry about spelling-- + + they'll just THINK and their EVERY THOUGHT will be broadcast into + + EVERYONE ELSE'S HEADS! + + + + And because Leader Kibo CARES and values YOUR opinion, this will even + + allow Leader Kibo to know what his subjects are THINKING, thanks to the + + heroic actions of the NETWORK SECURITY PATROL FORCE. + + + + ********* HAPPYNET: WE KNOW WHAT YOU'RE THINKING ********* + + + + The Network Security Patrol Force, or NSPF, will be composed of volunteer + + system administrators who wish to enforce the continued accuracy, + + relevance, and acceptability of HappyNet postings. They will monitor, + + censor, and cancel bad postings, made by EVIL SUBVERSIVES who attempt to + + DEPRIVE you of your HAPPINESS. These SUPPRESSIVE PERSONS will be + + hunted down and suppressed! + + + + NSPF officers have really spiffy uniforms, especially the shiny gas masks, + + well-balanced batons, six-inch-thick shoulder pads and twelve-inch cleats. + + + + And, of course, they will punish evildoers, night or day. HappyNet + + never sleeps. + + + + ******* HAPPYNET: SLEEP TIGHT WITH ALL THE SECURITY IN THE WORLD! ********* + + + + But what of those EVIL organizations that simply want to SPY on you? Well, + + the NSPF won't have to even TRY to prevent that, because the LOGICAL PLAN + + of HAPPYNET will defeat that automatically! If some three-letter government + + agency wants to SCAN all articles for WORDS LIKE "NUCLEAR BOMB" or + + "WHITEWATER", it will be IMPOSSIBLE because not even the fastest + + computer in the WORLD--the CRAY-9000--could search ALL THOSE GROUPS, EVER!!! + + + + ********* HAPPYNET: ACCURACY IS EVERYTHING ON HAPPYNET! ********* + + + + Here are examples of infractions against the unwritten rules of HappyNet, + + and the punishments the NSPF will bring against the villains. + + + + + + .signature longer than four lines: Forced to read "War And Peace" at 110 + + baud. + + + + .signature has giant ASCII graphic: Forced to read "War And Peace" at 110 + + baud on a Braille terminal after having fingers rubbed with sandpaper. + + + + Posting an article consisting solely of "Me too!": Poster's legal name is + + officially changed to "Me Too". + + + + Calling a newsgroup a "bboard" or "notesfile": Forced to memorize + + Webster's Ninth. + + + + Spelling "too" as "to", "it's" as "its", "lose" as "loose", "you're" + + as "your", or any of the following--"wierd", "Anti-Semetic", "senerio", + + or "masterbation": Forced to write out Webster's Ninth ten times. + + + + Asking what ":-)" means: Drawing, quartering, and turning sideways. + + + + Using "" instead of ":-)": being sent back to GEnie, AOL, Delphi, etc. + + + + Sending a newgroup message without permission of Leader Kibo: Poster is + + forced to adopt twelve wacky sitcom children. + + + + Posting flames outside of a *.flame group: Poster is allowed to read only + + groups about fluffy puppies. + + + + Posting "Please send e-mail, since I don't read this group": Poster is + + rendered illiterate by a simple trepanation. + + + + *Plonk*ing outside talk.bizarre: Poster is *plonked*--LITERALLY. + + + + Asking for people to send cards to Craig Shergold: Poster must answer + + all of Craig's mail. + + + + Posting the "Dave Rhodes: MAKE MONEY FAST" scam: Poster must answer all + + of Craig's and Dave's mail while also memorizing the script to every + + episode of "Knight Rider" and doing voice exercises like saying + + "NANCY, HAND THE MAN THE DANDY CANDY" ten million times and also + + being forced to eat cottage cheese we found piled up on the sidewalk. + + + + Posting to aus.* from the USA: Poster is deported to Australia after having + + a "Kick Me, Mate" sign glued to their forehead. + + + + Posting an article with a malformed address so that mail bounces when + + people reply: Poster and/or their admin are sent back to kindergarten. + + + + .signature huge script letters: Poster is forced to tattoo HappyNet + + slogans on their body in huge script letters. + + + + Excess CAPITALIZATION & PUNCTUATION!!!!!!!!!!!!!: Poster is issued a new + + keyboard without capitals or punctuation. The space bar will be clearly + + labelled. + + + + *Excess*asterisks*in*.signature*: Poster is hit with one shuriken for + + each asterisk. + + + + Articles quoted in followup, but no new semantic content appended: Poster + + is forced to watch a "Small Wonder" marathon on cable TV. + + + + Advertising on the net: Poster is forced to pay Leader Kibo for the + + advertising time. + + + + Asking help for some program but not saying what sort of computer you're + + using: Poster's computer is reduced to 1K RAM. + + + + Arguing over whose computer is better: Being introduced to Leader Kibo, + + whose custom Turbissimo MoNDO Zeugma 6866688786/XA/sxe/IV computer is far + + better than theirs and will make them cry in humiliation. + + + + Giving away the secret of "The Crying Game": No punishment. + + + + Making fools of people in rec.org.mensa with pranks: No punishment + + necessary for something that simple. After all, some people could + + even do it by accident. + + + + Referring to the NSPF as "The Thought Police": Execution. + + + + Humor impairment: Execution. + + + + Saying "Imminent death of the net predicted!": Imminent execution of + + poster predicted. + + + + Mentioning Star Trek outside of the Star Trek groups: "Star Trek: + + Deep Space Nine" is cancelled, and all tapes of the original series are + + burned. William Shatner will direct all future movies. + + + + + + There are other helpful rules and regulations, but they are double secret. + + + + Of course, various branches of the NSPF will specialize in various + + enforcements: the Spelling Squad, the Grammar Goons, the Definition + + Draconians, the Typo Tyrants, the Capitalization Captains, the Pedantic + + Patriots, the Cross-Post Crushers, the Cascade Commandos, and + + the .signature .specialforce. There will even be a special detail to + + track down, and burn, copies of the Green Golfball Joke. + + + + ********* HAPPYNET: MODERATION IN ALL THINGS! ********* + + + + The concept of moderated groups will be retained for a few groups, + + with minor changes. + + + + Alt.flame (renamed megabozo.alt.flame) will be moderated by Dave Lawrence, + + as his news.announce.newgroups duties have been assumed by Leader Kibo. + + Dick Depew will be assigned the task of making up an imaginative + + Message-ID for every article in the world. (He will also unleash random + + daemons onto the net to destroy the unpleasant signal to noise ratio + + completely.) + + + + A program that determines how funny an article is by measuring the + + frequency of the "k" sound (an elementary comedic principle discovered in + + Kukamonga, Arkansas) will replace rec.humor.funny moderator Maddi Hausmann, + + allowing her to devote full time to assisting Brad Templeton's + + nonbozo.clarinet.* duties. + + + + Serdar Argic will be the official underliner of HappyNet. Every time + + the word "turkey" is mentioned, he will post a followup underlining and + + circling it. This will be a tremendous help to people looking for + + low-fat recipes. + + + + Jay O'Connell has volunteered to personally deliver an envelope labelled + + THESE ARE ALL THE TOPLESS PICTURES OF MARINA SIRTIS THERE ARE to all + + users to prevent them from asking for them over and over. This should + + reduce the bandwidth by an estimated 90%. + + + + Iain Sinclair will ensure that the link between Australia and the rest of + + the world is down on a regular schedule, instead of an irregular one. + + He has also been commissioned to design the NSPF uniforms, with the + + blessings of the Florida Citrus Council and the California Leather Council. + + + + And, of course, a world-class anonymous-posting server will be + + established. Not only will it remove your name from your postings (so + + that you don't have to worry about defending your opinions) but it will + + also eliminate the opinions themselves. Thus, don't be surprised to see + + a lot of anonymous postings in bozo.alt.sex.stories saying simply + + "I have no opinion on homosexuality." HappyNet will help us all to get + + along, even the people with no names. + + + + But what about those disclaimers that state that your opinion is not + + that of IBM, McDonalds, MIT, Scientology, etc.? + + + + Disclaimers are NOT required on articles, therefore you MUST include + + the following: + + + + DISCLAIMER: THIS DISCLAIMER IS NOT REQUIRED BY LEADER KIBO. + + THIS ARTICLE DOES NOT NECESSARILY REPRESENT THE OPINIONS OF LEADER KIBO. + + THIS ARTICLE DOES NOT NECESSARILY DISAGREE WITH LEADER KIBO EITHER. + + HAVE A NICE DAY! + + + + Also, for your protection, Leader Kibo has filed a copyright claim on + + HappyNet. Thus, any postings without a copyright notice become the + + intellectual property of Kibo. This will keep random people from + + commercially exploiting your ideas, because they won't be + + YOUR ideas any more! It's THAT SIMPLE. STREAMLINE EVERYTHING! + + + + ******** HAPPYNET: A BLAST TO LIGHT OUR GLOWING FUTURE! ******** + + + + HappyNet as currently implemented is just one communications medium. + + But this will blast our way into the foundation of the future: + + Eventually, HappyNet will be expanded to replace the other + + `conventional' media, such as newspapers, television, radio, standup + + comedy, and sex. .signatures will be sixty-second commercials. Alt.sex + + (bozo.alt.sex) will be interactive and finally worth reading. + + + + A PBS series, "Great RFCs, Past and Present" will be filmed to replace + + the boring old text RFCs. A Fox series, hosted by Dr. Ruth Westheimer, + + will replace "Emily Postnews". + + + + The Sony Walkman will become obsolete thanks to the Sony rnman. The + + instructions will be on a separate device, the Sony manman. + + + + Once everyone in the world is hooked into the giant HappyNet neural + + network and their brains merge into one gigantic community of mind + + (with an IQ well over THREE HUNDRED!), local events will be instantly + + communicated everywhere in the world. For example, people in Sri Lanka + + will be able to INSTANTLY receive dozens of "Hey, we're having a minor + + earthquake here in San Francisco RIGHT NOW!" postings INSTANTLY, instead + + of having to wait weeks. Rumors of such important events as DeForest + + Kelley's death will also propagate instantly, but this is not really + + a drawback: it enables the NSPF to detect them and snuff them out faster! + + + + HappyNet is an important part of this well-balanced future. In fact, + + it is the ONLY part. Without HappyNet, there could be no future. + + Usenet paves the road to misery and ruin with its cascades, cross-posts, + + flame wars, forgeries, and .signature viruses. HappyNet does not pave + + this road--where it's going, we don't NEED roads! HappyNet bravely + + journeys into an unknown, but not unpleasant future. Everyone WILL + + be happy, happier than human beings can possibly be. + + + + Although it will take HappyNet months, maybe years, to improve all + + areas of daily existence in all possible ways, it will be obvious to + + the most casual reader that HappyNet is better than Usenet. + + Those who aren't casual readers--well, they will come to agree. + + In time, they will even love me. In fact, soon they will beg to + + love me! But I, Leader Kibo, want only the best for everyone. + + After all, I am one of the readers of Usenet, so I can make the + + readers of Usenet happy by making me happy FIRST. DEATH TO USENET! + + LONG LIVE HAPPYNET! TO THE MOON! + + + + ********* HAPPYNET: YOU CONTROL HOW IT CONTROLS YOU ********* + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + [Editor's Note: Here is a FAQ from a very cool program. It is like the + + ultimate information database, but has a humorus kick to it. I will + + soon be published in this program. So, here's the FAQ. I highly suggest + + that you ftp the software.] + + + + ALT.GALACTIC-GUIDE FAQ -- MONTHLY POSTING -- Mk. II Release 1.1 + + + + By Steve Baker (swbaker@vela.acs.oakland.edu) + + Organization: Project Galactic Guide Mothership + + + + _____ _____ _____ ______ ___ ____ + + | __ \ / ____|/ ____|\ | /| ____/ _ \ / __ \ + + | |__) | | __| | __ \|/ | |__ | |_| | | | | + + | ___/| | |_ | | |_ |--o--| __|| _ | | | | + + | | | |__| | |__| | /|\ | | | | | | |__| | + + |_| \_____|\_____|/ | \|_| |_| |_|\___\_\ + + Project Galactic Guide Frequently Asked Questions + + + + FAQ Mk. II Release 1.1 18 September 1994 + + + + + + This is the Mostly All-New FAQ (Frequently Asked Questions) information file + + for the Usenet group alt.galactic-guide. This file is intended to provide + + you with answers to your frequently asked questions and is 97% fat-free with + + no preservatives or artificial flavours. + + + + + + Contents + + -------- + + 1.0 What is this newsgroup? + + 2.0 Who's in charge around here? + + 2.1 So who do I send articles to? + + 3.0 Format of the articles + + 3.1 Article content and legal stuff + + 3.2 So where can I get article ideas then? + + 3.3 The article lifecycle + + 4.0 The PGG Mothership + + 4.1 Mothership mirror sites + + 4.2 Supported computer platforms + + 4.3 Other ways to get PGG materials + + 5.0 World-Wide Web (WWW) sites + + 6.0 Miscellaneous questions + + + + + + 1.0 What is this newsgroup? + + ---------------------------- + + This newsgroup was created for the sole purpose of allowing uninterrupted + + communication between people involved in Project Galactic Guide. What is + + this project, you ask? + + + + It all started back in, oh, November of 1991 in the alt.fan.douglas-adams + + newsgroup. For the uninformed, Douglas Adams is the author of a series + + of humourous s/f books centering on the Hitchhiker's Guide to the Galaxy. + + In these books, the characters write for and frequently consult a sort of + + electronic encyclopedia which has an entry on just about everything. + + + + Paul said, "Hey, why don't we create a REAL guide to the galaxy?" and + + everyone else said, "Sounds good, let's do it!". So, with great fervor + + we started working on the skeletal structure of Project Galactic Guide, + + although at that time, we often called it "The HitchHiker's Guide the Known + + Galaxy." + + + + It was originally supposed to be about REAL things (as opposed to made-up + + things), but we eventually broke down and decided to incorporate + + EVERYTHING. So, now we'll take humorous entries about fictitious things + + (done in the Douglas Adams style, of course), and humorous entries about + + real things (also done in the Douglas Adams style, of course). + + + + + + 2.0 Who's in charge around here? + + --------------------------------- + + Well, not anyone, really. Er, actually, I suppose there *are* a couple of + + froods who tend to have a bit more input about things than others, but + + really it's mostly chaotic. Well, not actually *chaotic* but instead maybe + + something a bit more like a good recess. + + + + The aforementioned Paul Clegg is one of PGG's Founding Fathers. He is + + easily identifiable by his "...Paul" signature. Paul wrote the first PGG + + FAQ, upon which this document is derived. Today, Paul's an Editor and has + + many Wise Things to say about topics, issues, concerns, thoughts, ideas, + + problems, suggestions, and comments. His action figure should be available + + for the holiday season (along with the PGG Mothership playset), and he is + + available via email at: cleggp@rpi.edu + + + + Steve Baker helped get the project rolling with his "The Guide!" software + + for IBM/MS-DOS machines in the spring of 1992. Steve usually answers to + + the nom de plume "Stevadelic." Today, Steve's an Editor, the Librarian, + + Captain of the PGG Mothership, and actively avoids doing required updates + + and bug fixes to the TG! system. (He claims to be too busy working on + + Klingon language translation software.) You can send email to Steve at + + the address: swbaker@vela.acs.oakland.edu + + + + Roel van der Meulen joined the project in the fall of 1993, and is an + + active PGG Field Researcher Recruiter (he finds new articles and authors + + for PGG, in addition to his own work). He also maintains the PGG archives + + contents file and one of the fine WWW sites. Roel's Internet email address + + is: vdmeulen@rulrol.leidenuniv.nl + + + + Jeff Kramer is compiling the "PGG Report," a regular newsletter with lots + + of great information about the Project and its activities. He also admin's + + one of the PGG WWW sites. Jeff is available at: lthumper@bga.com + + + + Ryan Tucker provides articles, ideas, and crazy text art (like the FAQ + + logo), as well as up-to-date Iowa weather reports (as long as there's a + + tornado). Ryan's available at: rtucker@worf.infonet.net + + + + There's a lot of others out there who have contributed t-shirt designs, + + press card information, articles, ideas, suggestions, comments, et al... + + but to avoid this becoming one of those "Hi folks"-type things, I'll just + + leave it at that. + + + + + + 2.1 So who do I send articles to? + + ---------------------------------- + + Paul is available from September until April or May (during the college + + school year), and Steve is on-line and available year-round. Both Paul + + and Steve also have America Online accounts, so they're available there + + as well. Now that I think about it, Steve actually collects email accounts + + (he's now up to six different active, on-line email accounts, which is + + quite a lot of passwords to get straight). + + + + To answer the question, however, let's just say that you should send + + articles to one of the PGG Editors: + + + + cleggp@rpi.edu -- Paul + + swbaker@vela.acs.oakland.edu -- Steve + + + + We also have a third editor, Michael Bravo, who handles articles written + + in the Russian language. If you have written an article in Russian, please + + send them to Michael (mbravo@octopus.spb.su). + + + + + + 3.0 Format of the articles + + --------------------------- + + The articles that are accepted are organized by category and compiled in + + article "archives." Each archive file contains 25 accepted Guide entries. + + These archives are stored and available for download from the PGG + + Mothership. + + + + We've decided upon a simple ASCII text format for the article entries. The + + specs on the format are contained in the "article.new" file. It's really + + pretty simple, with just a few header token-type things that define useful + + stuff. + + + + The fine folks at PGG spent about a year discussing, debating, formulating, + + postulating, configuring, finalizing, and neglecting a nifty but complex + + text format. It was complete with crazy text formatting things and lots of + + other fun and wonderful features, but it never really caught on. Oh well. + + + + We're currently investigating the possibilities of porting the article + + archives into HTML (HyperText Markup Language) for use with html and WWW + + viewers. For now, however, standard ASCII files are just fine! + + + + + + 3.1 Article content and legal stuff + + ------------------------------------ + + You're welcome to write about anything. Yes, no matter how bizarre or + + crazy, please write about it. Really. Anything. + + + + Er, except, we don't want you to regurgitate Adams' material. Not only is + + this very unoriginal, it's also known as plagiarism. (Unless DNA himself + + decides to write it for us!) + + + + In general, please do NOT copy other people's work or ideas. We don't want + + the project stopped because we violated some silly copyright law! + + + + + + 3.2 So where can I get article ideas then? + + ------------------------------------------- + + We have a PGG Idea Bank, chock full of great ideas that beg for exploring. + + They're frequently posted to the alt.galactic-guide newsgroup, and all are + + available on-line at the Mothership. + + + + When posting an idea, be sure to include your name and email address for + + proper credit down the road. Conversely, when using an idea, just go ahead + + and write your article and credit the idea's originator in the header + + information. + + + + + + 3.3 The article lifecycle + + -------------------------- + + This describes what your Friendly Neighbourhood PGG Editor does and presents + + "a day in the life of an article" so to speak. Erm, actually, the articles + + themselves don't really speak much; that's just an expression, so let's + + carry on. + + + + 1) A young, up-and-coming comedian/researcher/student/author/human/whatever + + stumbles across, gets hit with, becomes infected by, is arrested in, or + + otherwise has a great idea for an article (or consults the Ideabank, + + which is sometimes less painful). + + + + She/he/it/they then write an article about the person/place/thing and + + send the article to an editor via email. (Please see Section 2.1, + + above, for info on who the editors are and where to send stuff.) + + + + 2) The editor send a message back to the author, stating something like: + + "Blah blah, thanks for the article, blah blah blah, I'll edit it for + + format and stuff, blah blah, you'll get it back pretty soon for author + + confirmation, blah blah, give me all your money, etc. etc." + + + + This message is the author's "receipt" that the editor received the + + article submission. If you don't get one of these, then the editor + + hasn't received your article yet! + + + + 4) The editor edits the article and performs routine grammar and spell- + + checker things on the article. Note: if the editor thinks that the + + article (1) violates a copyright law, (2) is a copy of other work, or + + (3) is hopelessly lame, the editor may nix the article for good. + + + + 5) Assuming that everything is fine with the article, the editor then sends + + it back to the author for "author confirmation." (This is often times + + abbreviated as A/C. Humm, if the author and the editor had a Direct + + Connection, would this be AC/DC?) + + + + 6) The author reviews the modified article, and then lets the editor know + + that things are alright. If the author has additional changes with the + + article, they go back to step one and start over. + + + + 7) Once the article is approved, the editor assigns the unique Article ID + + information and sends the article to the PGG Librarian. The Librarian + + adds the approved article into the article archives and posts the + + article to alt.galactic-guide. + + + + + + 4.0 The PGG Mothership + + ----------------------- + + The Mothership is an Anonymous FTP site where you can download PGG info, + + articles, programs, t-shirt images, reports, and other great stuff. To + + get to the PGG Mothership, FTP to the following site: + + + + Lexical: vela.acs.oakland.edu + + Numeric: 141.210.10.2 + + URL: ftp://vela.acs.oakland.edu/pub/galactic-guide + + + + When you connect, use the [ anonymous ] user ID and specify your full + + Internet email address as the password. + + + + The Mothership is [ pub/galactic-guide ], which is actually just a link + + to [ pub/swbaker ]. Thus, if you're using an FTP server which doesn't show + + the logical links, go into the [ swbaker ] directory. + + + + Anyway, beneath this directory are additional directories for each of + + the particular computer programs and general Hitchhiker's Guide fan stuff. + + There is a separate FAQ file on the PGG Mothership which describes these + + directories and the files they contain in more detail. + + + + + + 4.1 Mothership mirror sites + + ---------------------------- + + If having all of the PGG archives, programs, gif files, and other goodies + + at one centralized location isn't good enough for you, you may be pleased + + to know that it isn't! That is to say, the stuff is available from more + + than one Anonymous FTP site. + + + + The PGG Mothership is mirrored at: + + + + Lexical: ftp.cs.city.ac.uk + + Numeric: 138.40.91.9 + + URL: ftp://ftp.cs.city.ac.uk/pub/galactic-guide + + + + + + 4.2 Supported computer platforms + + --------------------------------- + + While having the articles themselves is pretty fun, actually being able to + + do something with them is even better. The following computer platforms + + are supported with PGG article reader systems: + + + + o Acorn Archimedes + + Author contact: Alex McLintock (alexmc@biccdc.co.uk) + + + + o Amiga + + + + o Atari ST + + + + o IBM/MS-DOS (also works within Windows, OS/2, DESQview, etc.) + + Author contact: Steve Baker (swbaker@vela.acs.oakland.edu) + + + + o Macintosh + + Author contact: Rickard Andersson (rickard@softlab.se) + + + + o Unix + + Author contact: Dave Gymer (dpg@cs.nott.ac.uk) + + + + o X Windows + + Author contact: David Squire (squizz@cs.curtin.edu.au) + + + + Each of the programs is available in its own subdirectory on the Mothership. + + Questions about a particular program's use or functionality should be + + directed to the program's author or posted to alt.galactic-guide. + + + + + + 4.3 Other ways to get PGG materials + + ------------------------------------ + + There's a lot of BBS systems that carry Project Galactic Guide stuff. + + Honestly -- I'm positive there's a lot of them... although the FAQ file + + doesn't really reflect this. Yet. Just give us some time and soon + + this list will have a lot of numbers. Really. + + + + Area/Region BBS Name Number + + --------------- ------------------------------ ---------------- + + Mass., USA Sea of Noise +1 203 886 1441 + + + + + + In addition, you may contact one of the following hoopy froods who have + + volunteered to distribute PGG materials in their local countries: + + + + Country Contact + + --------------- ------------------------------ + + Denmark Christian Moensted + + Almindingen 66 + + 2860 Soeborg + + (email: moensted@diku.dk) + + + + + + 5.0 World-Wide Web (WWW) sites + + ------------------------------- + + For those who can view html documents (including users of Mosaic, Cello, + + and WinWeb), there are a number of froody WWW sites: + + + + URL: http://www.strw.leidenuniv.nl/~vdmeulen/index.html + + Operator: Roel van der Meulen + + + + URL: http://web.cs.city.ac.uk/pgg/guide.html + + Operator: Nick Williams + + + + URL: http://www.realtime.net/~lthumper/ + + Operator: Jeff Kramer + + + + URL: http://www.willamette.edu/pgg/ + + Operator: James Tilton + + + + These all have links to the Article Archives, the PGG Mothership, format + + and article information, and many have on-line archive search and article + + retrieval capabilities. + + + + + + 6.0 Miscellaneous questions + + ---------------------------- + + Q: What's with 42, who is Douglas Adams, and why should I carry a towel? + + A: Please see the alt.fan.douglas-adams Usenet group; they'll be happy to + + supply you with amplitudes of answers. + + + + Q: How can I get a PGG Press Card? + + A: As soon as they're finished, you'll be able to get an Official PGG + + Press Card from Jason Kohles (jason.kohles@m.cc.utah.edu). + + + + Q: What good are the PGG Press Cards? + + A: They may actually get you in some places, and besides they look cool. + + There's an article on what to do with your Press Card; check it out! + + + + Q: What's up with the PGG t-shirts? + + A: Among others, Stephane Lussier (stef@phoque.info.uqam.ca) has come + + up with some great graphics and motif ideas for the Official PGG + + t-shirt. They're available for review on the Mothership. As soon as + + we decide on how the shirts will look, and as soon as someone makes + + the shirts, then you'll be able to order them! For more information, + + just follow the t-shirt threads on alt.galactic-guide. + + + + Q: Do you need more editors? + + A: Not really. How can you become an editor? Well, lots of money would + + definitely help (just kidding). Anyway, until the project completely + + consumes both Paul and Steve to the point of exhaustion, we're probably + + all set. + + + + Q: Is there a Macintosh Guide Reader? + + A: YES! Please see Section 4.2, above. + + + + Q: Is there a Microsoft Windows-based Guide Reader? + + A: Sorta. It's being developed. Under construction. Something like that. + + + + Q: Is this the end of the PGG FAQ? + + A: Yes. + + + + Q: Really? + + A: I mean it this time. + + + + Q: Are you sure about that? + + A: Absolutely. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PRE-EMPLOYMENT BACKGROUND CHECKS + + + + From: Phil Agre (pagre@weber.ucsd.edu) + + and Christine Harbs (charbs@teetot.acusd.edu) + + + + Although the enclosed fact sheet from The Privacy Rights Clearinghouse only + + applies to California, it might provide a model for other jurisdictions + + worldwide. + + + + The Privacy Rights Clearinghouse has a new gopher of useful legal and + + practical stuff about privacy. Telnet to teetot.acusd.edu + + (or 192.55.87.19) and log in as "privacy". + + + + You can now reach the Privacy Rights Clearinghouse's useful gopher directly + + at gopher.acusd.edu. You'll find PRC under menu item 4, USD Campus-Wide + + Information System. + + + + + + ************************************** + + The Privacy Rights Clearinghouse + + The Center for Public Interest Law + + 5998 Alcala Park + + San Diego, CA 92110 + + (619) 260-4806 + + (619) 260-4753 (fax) + + e-mail prc@teetot.acusd.edu + + gopher gopher.acusd.edu + + Hotline: +1 800-773-7748 (Calif. only) +1 619-298-3396 + + *************************************** + + + + Fact sheet No. 16 Copyright 1994, Center for Public Interest Law + + August 1994 + + + + Employment Background Checks: A Jobseeker's Guide + + + + **Why would an employer want to do a background check? + + + + Whether you are hired or promoted for a job may depend on the information + + gathered by the employer in a background check. Employers use them to + + verify the accuracy of information provided by jobseekers. Background + + reports may also uncover information left out of the application or + + interview. + + + + Today, more employers are being sued for "negligent hiring" for not checking + + carefully enough into the background of a potential employee. If an + + employee's action hurts someone, the employer may be liable. That is one + + reason more background checks are being conducted. + + + + The "information age" also accounts for the increase in background checks-- + + the availability of computer databases containing millions of records of + + personal data. As the cost of searching these sources drops, employers are + + finding it more feasible to conduct background checks. + + + + **I don't have anything to hide. Why should I worry? + + + + While some people are not concerned about background investigations, others + + are uncomfortable with the idea of an investigator poking around in their + + personal history. In-depth background checks could unearth information + + that is irrelevant, taken out of context or just plain wrong. + + + + A further concern is that the report might include information that is + + illegal to use for hiring purposes or which comes from questionable + + sources. Since in most cases employers are not required to tell applicants + + that a background check is being done, jobseekers may not have the + + opportunity to respond to negative or misleading data. + + + + **What types of information might be included in a background check? + + + + Background reports can range from a verification of an applicant's Social + + Security number to a detailed account of the potential employee's history + + and acquaintances. Here are some of the pieces of information that might be + + included in a background check: + + + + - Driving records - Vehicle registration - Credit records + + - Criminal records - Social Security no. - Education records + + - Court records - Workers' compensation - Bankruptcy + + - Character references - Neighbor interviews - Medical records + + - Property ownership - Employment verification + + - Military service records - State licensing records + + + + **Which companies conduct background checks? + + + + There are many companies that specialize in conducting pre-employment + + background checks. They typically use public records databases to compile + + reports. The following is a partial list of companies that perform a + + variety of services for employment background checking: Avert, Interfact, + + Equifax Employment Services, CDB Infotek, Employers Mutual Assoc., + + Employers Information Service, Trans Union, Information Resource + + Service Co., Pinkerton Security & Investigation Services. + + + + With the information age upon us, it is easier for employers to gather + + background information themselves. Much of it is computerized, allowing + + employers to "log on" to public records and commercial databases directly + + through commercial online services. + + + + Employers may also create a "clearinghouse" of information about potential + + employees. A group of employers establish a data exchange program to screen + + applicants. The database is comprised of information submitted by the member + + companies about their employees. When a jobseeker submits an application + + to a member company, that employer will check with the clearinghouse for + + information on the applicant. + + + + **What types of information *can't* the employer consider? + + + + Federal and state laws limit the types of information employers can use in + + hiring decisions. + + + + o Arrest information. Although arrest record information is public record, + + in California employers cannot seek out the arrest record of a potential + + employee. However, if the arrest resulted in a conviction, or if the + + applicant is out of jail but pending trial, that information can be used. + + (California Labor Code @ 432.7) + + + + o Criminal history. In California, criminal histories or "rap sheets" + + compiled by law enforcement agencies are not public record. Only certain + + employers such as public utilities, law enforcement, security guard firms, + + and child care facilities have access to this information. With the advent + + of computerized court records and arrest information, however, there are + + private companies that compile virtual "rap sheets." (California Penal Code + + @@ 11105, 13300) + + + + o Workers' compensation. When an employee's claim goes through the state + + system or the Workers' Compensation Appeals Board, the case becomes public + + record. Only if an injury might interfere with one's ability to perform + + required duties may an employer use this information. Under the federal + + Americans with Disabilities Act, employers cannot use medical information + + or the fact an applicant filed a workers' compensation claim to + + discriminate against applicants. (42 USC @12101) + + + + o Bankruptcies. Bankruptcies are public record. However, employers cannot + + discriminate against applicants because they have filed for bankruptcy. + + (11 USC @525) + + + + **Aren't some of my personal records confidential? + + + + The following types of information may be useful for an employer to make a + + hiring decision. However, the employer is required to get your permission + + before obtaining the records. (For more information, see PRC Fact Sheet + + No. 11, "From Cradle to Grave: Government Records and Your Privacy.") + + + + o Education records. Under both federal and California law, transcripts, + + recommendations, discipline records and financial information are + + confidential. A school should not release student records without the + + authorization of the student or parent. However, a school may release + + *directory information*, which can include name, address, dates of + + attendance, degrees earned, and activities, unless the student has given + + written notice otherwise. (California Education Code @@ 67100, 76200; + + 20 USC @1232g) + + + + o Military service records. Under the federal Privacy Act, service records + + are confidential and can only be released under limited circumstances. + + Inquiries must be made under the Freedom of Information Act. Even without + + the applicant's consent, the military may release name, rank, salary, duty + + assignments, awards and duty status. (5 USC @@ 552, 552a) + + + + o Medical records. In California, medical records are confidential. There + + are only a few instances when a medical record can be released without your + + knowledge or authorization. If employers require physical examinations + + after they make a job offer, they have access to the results. The Americans + + with Disabilities Act allows a potential employer to inquire only about + + your ability to perform specific job functions. (California Civil Code @ + + 56.10;42 USC @12101) + + + + There are other types of questions such as age and marital status and + + certain psychological tests that employers cannot use when interviewing. + + These issues are beyond the scope of this fact sheet. If you have further + + questions, look under "For more information" at the end of this fact sheet + + or call the PRC Hotline. + + + + **What can my former employer say about me? + + + + Often a potential employer will contact an applicant's past employers. A + + former boss can say anything [truthful] about your performance. However, + + most employers have a policy to only confirm dates of employment, final + + salary, and other limited information. California law prohibits employers + + from intentionally interfering with former employees' attempts to find jobs + + by giving out false or misleading references. (California Labor Code @ 1050) + + + + Documents in your personnel file are not confidential and can be revealed + + by an employer. Only medical information in a personnel file is + + confidential. If you are a state or federal employee, however, your + + personnel file is protected under the California Information Practices Act + + or the federal Privacy Act of 1974 and can only be disclosed under limited + + circumstances. Under California law, employees have a right to review + + their own personnel files, and make copies of documents they have signed. + + (California Civil Code @ 56.20; California Labor Code @@432, 1198.5; + + California Government Code @ 1798; 5 USC @552a) + + + + **Does the applicant have a right to be told when a background check is + + requested? + + + + The *only* times an applicant must be told if a background check is + + conducted is if the employer requests an "investigative consumer report" + + or a credit report. The investigative consumer report may contain + + information about your character, general reputation, personal + + characteristics and lifestyle. The information in the report is typically + + compiled from interviews with neighbors, friends, associates and others who + + might have information about you. + + + + Under both California and federal law, the applicant must be notified if + + an employer requests an investigative consumer report. (California Civil + + Code @ 1786; 12 USC @1681d. Also see Fact Sheet No. 6, "How Private is My + + Credit Report?") + + + + An employer can also order a copy of your credit report, which is less + + detailed than an investigative report. However, a credit report can still + + tell an employer a lot about you. It may contain public records information + + such as court cases, judgments, bankruptcies and liens; also, outstanding + + credit accounts and loans, and the payment history for each account. Credit + + report entries remain in the report for up to ten years. + + + + In California, if an employer checks your credit file, you must be notified + + and given an opportunity to see the file. Also, when a report is requested + + for employment purposes, the credit bureau must block all references to age, + + marital status, race, religion and medical information. Although federal + + and state laws allow credit bureaus to include criminal record information, + + it is an industry policy not to do so. (California Civil Code @@ 1785.18, + + 1785.20.5) + + + + **What can the job applicant do to prepare? + + + + Although you cannot *prevent* an employer from doing a background check, + + you can take steps to be ready for questions the employer might ask once + + the investigation is conducted. + + + + o Order a copy of your credit report. If there is something you do not + + recognize or that you disagree with, dispute the information with the + + creditor or credit bureau before you have to explain it to the interviewer. + + (See PRC Fact Sheet No. 6, "How Private is My Credit Report?") + + + + o Check public records files. If you have an arrest record or have been + + involved in court cases, go to the county where this took place and inspect + + the files. Make sure the information is correct and up to date. Request a + + copy of your driving record from the Department of Motor Vehicles (DMV), + + especially if you are applying for a job that may involve driving. + + + + o Ask to see a copy of your personnel file from your old job. Even if you + + do not work there anymore, you have a right to see your file until at least + + a year from the last date of employment. You are allowed to make copies of + + documents in your file that have your signature on them. (California Labor + + Code @ 432.) You may also want to ask if your former employer has a policy + + about the release of personnel records. Many companies limit the amount of + + information they disclose. + + + + o Read the fine print carefully. When you sign a job application, you may + + also be signing a statement that waives your right to a copy of your credit + + report. You might also be authorizing the disclosure of other personal + + data, such as educational records, medical records and financial data. + + Unfortunately, jobseekers are in an awkward position, since refusing to + + authorize a background check may jeopardize the chances of getting the job. + + + + o Tell neighbors and work colleagues, past and present, that they might + + be asked to provide information about you. This helps avoid suspicion and + + alerts you to possible problems. + + + + o If you feel comfortable, ask the interviewer about the company's employee + + privacy policies. Find out if the potential employer plans to do a + + background check, and ask to see a copy. + + + + **For more information + + + + o Equal Employment Opportunity Commission (see the Government Pages in + + your phone book). + + + + o California Labor Commission (see the Government Pages in your phone + + book). + + + + o Pacific Disability and Business Technical Assistance Center for questions + + about the Americans with Disabilities Act, (800) 949-4232. + + + + o Documented Reference Check, (800) 742-3316 (verifies references of former + + employers; fee charged). + + + + If you have additional questions about privacy, contact the PRC Hotline + + at (800) 773-7748. + + + + Copyright 1994 Center for Public Interest Law August 1994 + + *************************************************************************** + + The Clearinghouse is a nonprofit organization dedicated to educating + + Californians about personal privacy issues. It is funded by a grant from the + + Telecommunications Education Trust and operates under the auspices of the + + University of San Diego School of Law's Center for Public Interest Law. + + *************************************************************************** + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM + + IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF + + YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR + + PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + +. + diff --git a/textfiles.com/magazines/JOAUC/jauc07.txt b/textfiles.com/magazines/JOAUC/jauc07.txt new file mode 100644 index 00000000..1d544b4d --- /dev/null +++ b/textfiles.com/magazines/JOAUC/jauc07.txt @@ -0,0 +1,16646 @@ +[all pieces of this issue of JAUC have been combined into one file for + +this archive + + + +From dfox@fc.net Wed Jan 18 09:48:08 1995 + +Date: Wed, 18 Jan 1995 08:45:02 -0600 + +From: JAUC + +Subject: JAUC-INDEX + + + + THERE ARE 13 FILES (INCLUDING THIS TITLE) IN THIS ISSUE... PLEASE ALLOW + + 3 DAYS BEFORE COMPLAINING ABOUT NOT RECEIVING THEM. THANK YOU. + + + + ======================================================================= + + + + THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Quarterly + + ====================================================================== + + ISSN 1074-3111 Volume One, Issue Seven January 17, 1994 + + ====================================================================== + + + + Editor-in-Chief: Scott Davis (dfox@fc.net) + + Co-Editor/Technology: Max Mednick (kahuna@fc.net) + + Conspiracy Editor: Gordon Fagan (flyer@io.com) + + Information Systems: Carl Guderian (bjacques@usis.com) + + Legal Editor Steve Ryan (blivion@sccsi.com) + + Computer Security: George Phillips (ice9@paranoia.com) + + Graphics/WWW Design Mario Martinez (digital@comland.com) + + + + ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC + + ** ftp site: ftp.fc.net /pub/tjoauc + + + + U.S. Mail: + + The Journal Of American Underground Computing + + or Fennec Information Systems + + 10111 N. Lamar - Suite 25 + + Austin, Texas 78753-3601 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + IMPORTANT ADDRESSES - + + ============================================================================ + + To Subscribe to "TJOAUC", send mail to: sub@fennec.com + + All questions/comments about this publication to: comments@fennec.com + + Send all articles/info that you want published to: submit@fennec.com + + Commercial Registration for Profitable Media: form1@fennec.com + + ============================================================================ + + + + "The underground press serves as the only effective counter to a growing + + power, and more sophisticated techniques used by establishment mass media + + to falsify, misrepresent, misquote, rule out of consideration as a priori + + ridiculous, or simply ignore and blot out of existence: data, books, + + discoveries that they consider prejudicial to establishment interest..." + + + + (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + Contents Copyright (C) 1995 The Journal Of American Underground Computing + + and/or the author of the articles presented herein. All rights reserved. + + Nothing may be reproduced in whole or in part without written permission + + of the Editor-In-Chief and/or the author of the article. This publication + + is made available periodically to the amateur computer hobbyist free of + + charge. Any commercial usage (electronic or otherwise) is strictly + + prohibited without prior consent of the Editor, and is in violation of + + applicable US Copyright laws. To subscribe, send email to sub@fennec.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + DISCLAIMER AND NOTICE TO DISTRIBUTORS - + + + + NOTE: This electronic publication is to be distributed free of charge + + without modifications to anyone who wishes to have a copy. Under NO + + circumstances is any issue of this publication, in part or in whole, + + to be sold for money or services, nor is it to be packaged with other + + computer software, including, but not limited to CD Rom disks, without + + the express written or verbal consent of the author and/or editor. + + To obtain permission to distribute this publication under any of the + + certain circumstances stated above, please contact the editor at one of + + the addresses above. If you have intentions of publishing this journal + + in any of the ways described above, or you are in doubt about whether or + + not your intentions conflict with the restrictions, please contact the + + editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com + + This publication is provided without charge to anyone who wants it. + + This includes, but is not limited to lawyers, government officials, + + cops, feds, hackers, social deviants, and computer hobbyists. If anyone + + asks for a copy, please provide them with one, or mail the subscription + + list so that you may be added. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + TABLE OF CONTENTS + + + + [File #1:] + + Is There A Santa Claus Unknown + + What Do People Think Unknown + + .SIG Heil K. K. Campbell + + WWW - The Junkyard Of The Internet Ram Samudrala + + Austin (Tx) Zeen Scene Josh Ronsen + + Object Technology In Cyberspace Chris Hand + + + + [File #2] + + Deadkat Deadkat + + EFF Personnel Announcement Stanton McCandlish + + Reader Feedback Our Reader(s) + + Call Security / Voice Crypto FAQ Neil Johnson + + There's A Body On The Internet Uncle Bob's NN #103 + + + + [File #3] + + Windows And TCP/IP For Internet Access Harry Kriz + + + + [File #4] + + Windows And TCP/IP For Internet Access (Cont...) Harry Kriz + + + + [File #5] + + Say What? Libel And Defamation On The Internet Eric Eden + + Jacking In From The "Back From The Dead" Port Brock Meeks + + Announcing Slipknot Felix Kramer + + + + [File #6] + + Telecommunications Security Howard Fuhs + + + + [File #7] + + Old Freedoms And New Technologies Jay Weston + + Information Superhighway: Reality Reid Goldsborough + + Internet Tools Summary John December + + LOD T-Shirts Chris Goggans + + + + [File #8] + + Interview With Erik Bloodaxe (Chris Goggans) Netta Gilboa + + + + [File #9] + + Review Of Slipknot 1.0 Scott Davis + + cDc GDU #18 Swamp Ratte + + My Letter To Wired Magazine Scott Davis + + + + [File #10] + + Caller ID FAQ Padgett Peterson + + The Pentium Bug War Ends As We Know It James/Ted Barr + + Pentium Non-Disclosure Agreement Of Dr. Nicely Thomas Nicely + + The Computer Nevermore [A Late Christmas Tale] Unknown + + Twas The Night Before Star Trek [Another One] Unknown + + Santa Claus Source Code [The Last Late X-Mas Tale] Unkown + + + + [File #11] + + My Life As An International Arms Courier Matt Blaze + + An Open Letter To Wired Magazine Chris Goggans + + When Bigotry Outpaces Technology Douglas Welch + + Letter From Steve Case: Child Porn On AOL Steve Case + + + + [File #12] + + Lee Harvey Oswald Died For Your Sins Gordon Fagan + + + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + + + + + + +Date: Wed, 18 Jan 1995 09:44:40 -0600 + +From: JAUC + +Subject: JAUC-File1 + + + + + + [Editor's note: Since we did not come out with an issue anytime near + + Christmas, I am throwing all of our holiday stuff in first. Have a + + great year] + + + + IS THERE A SANTA CLAUS? + + + + By: Unknown + + + + As a result of an overwhelming lack of requests, and with research help + + from that renown scientific journal SPY magazine (January, 1990) - I am + + pleased to present the annual scientific inquiry into Santa Claus. + + + + 1) No known species of reindeer can fly. BUT there are 300,000 + + species of living organisms yet to be classified, and while most of + + these are insects and germs, this does not COMPLETELY rule out flying + + reindeer which only Santa has ever seen. + + + + 2) There are 2 billion children (persons under 18) in the world. BUT + + since Santa doesn't (appear) to handle the Muslim, Hindu, Jewish and + + Buddhist children, that reduces the workload up to 15% of the total - + + 378 million according to Population Reference Bureau. At an average + + (census) rate of 3.5 children per household, that's 91.8 million + + homes. One presumes there's at least one good child in each. + + + + 3) Santa has 31 hours of Christmas to work with, thanks to the + + different time zones and the rotation of the earth, assuming he + + travels east to west (which seems logical). This works out to 822.6 + + visits per second. That is to say that for each Christian household + + with good children, Santa has 1/1000th of a second to park, hop out of + + the sleigh, jump down the chimney, fill the stockings, distribute the + + remaining presents under the tree, eat whatever snacks have been left, + + get back up the chimney, get back into the sleigh and move on to the + + next house. Assuming that each of these 91.8 million stops are evenly + + distributed around the earth (which, of course, we know to be false + + but for the purposes of our calculations we will accept), we are now + + talking about .78 miles per household, a total trip of 75-1/2 million + + miles, not counting stops to do what most of us must do at least once + + every 31 hours, plus feeding and etc. + + + + This means that Santa's sleigh is moving at 650 miles per second, + + 3,000 times the speed of sound. For purposes of comparison, the + + fastest man-made vehicle on earth, the Ulysses space probe, moves at + + a poky 27.4 miles per second - a conventional reindeer can run, tops, + + 15 miles per hour. + + + + 4) The payload on the sleigh adds another interesting element. + + Assuming that each child gets nothing more than a medium-sized lego + + set (2 pounds), the sleigh is carrying 321,300 tons, not counting + + Santa, who is invariably described as overweight. On land, + + conventional reindeer can pull no more than 300 pounds. Even granting + + that "flying reindeer" (see point #1) could pull TEN TIMES the normal + + amount, we cannot do the job with eight, or even nine. We need + + 214,200 reindeer. This increases the payload - not even counting the + + weight of the sleigh - to 353,430 tons. Again, for comparison - this + + is four times the weight of the Queen Elizabeth. + + + + 5) 353,000 tons travelling at 650 miles per second creates enormous + + air resistance - this will heat the reindeer up in the same fashion as + + spacecrafts re-entering the earth's atmosphere. The lead pair of + + reindeer will absorb 14.3 QUINTILLION joules of energy. Per second. + + Each. In short, they will burst into flame almost instantaneously, + + exposing the reindeer behind them, and create deafening sonic booms in + + their wake. The entire reindeer team will be vaporized within 4.26 + + thousandths of a second. Santa, meanwhile, will be subjected to + + centrifugal forces 17,500.06 times greater than gravity. A 250-pound + + Santa (which seems ludicrously slim) would be pinned to the back of + + his sleigh by 4,315,015 pounds of force. + + + + In conclusion - If Santa ever DID deliver presents on Christmas Eve, + + he's dead now. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WHAT DO PEOPLE THINK? + + + + [Editor's Note: This was sent to us from a person who thought this + + was funny...and indeed it was. But I was blown back by trying to + + discover how (or WHAT) this person was thinking... In order not to + + reveal any company or the stupidity of some people, I have deleted + + the name of the author, and removed the name of the computer company + + and replaced their name with [COMPUTER COMPANY]. The + + company is a Fortune 500 company in Texas. + + + + Subj: [COMPUTER COMPANY] Suggestion Box + + Date: 94-11-11 18:49:05 EST + + From: xxxxxxxxx + + To: [COMPUTER COMPANY] Sysop + + To: Sysop + + Sent on: America Online (using WAOL 1.5) + + + + Field 3 = I would like for [COMPUTER COMPANY] to send me a free + + MultiMedia Computer, Monitor, printer, mouse, and modem. I need the + + equipment to start my own Charter business, but I am furloughed (pilot) + + and can't afford the equipment. I'll be happy to pay for it when I am + + able. + + + + Please send the equipment to: + + + + [name and address deleted to avoid terminally embarrassing the poor idiot] + + + + I thank [COMPUTER COMPANY] in advance for its generosity. + + + + xxxxx + + + + Here is their response: + + + + Subj: Re: [COMPUTER COMPANY] Suggestion Box + + Date: 94-11-11 23:22:00 EST + + From: xxxxxxxxxx + + To: AirLnPilot + + CC: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx + + Sent on: America Online (using WAOL 2.0) + + + + While [COMPUTER COMPANY] understands your situation completely, + + certain regulations delineate proper handling of requests of this nature. + + Therefore I am forwarding your message to the appropriate agency. You may + + want to follow up with them - the address is: + + + + Mr. S. Claus + + North Pole, Earth + + + + Please direct any addition requests of this nature directly to this + + department to avoid unnecessary delays, especially here at the end of + + the fiscal year. + + + + Glad I was able to help, + + + + Sincerely, + + + + xxxxxxxxxxx + + [COMPUTER COMPANY] + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + .SIG HEIL + + + + Holocaust revisionism goes up in flame wars + + + + By K.K. Campbell + + + + It was 56 years ago today that Germans awoke to find the Nazis had + + spent the night terrorizing Jews and destroying property in something + + called "Crystal Night." It was a trial-run pogrom for the Holocaust to + + follow. + + + + Once upon a time, net.news (the Internet's public discussion forums) + + was swamped with flame wars about the Holocaust. They'd be found + + anywhere -- in newsgroups like alt.conspiracy, soc.history, + + soc.culture.canada, misc.headlines, alt.individualism etc. + + + + One of the most persistent Nazi-apologists, Dan Gannon + + (dgannon@banished.com), wildly spammed Holocaust-denying material, + + either not understanding or not caring about netiquette -- that is, you + + post appropriate material to appropriate groups. Thousands, from dozens + + of newsgroups, complained. Gannon's posts were bad enough, but they + + always brought rebuttal and endlessly repeated arguments. + + + + Today, most of these debates are found in one newsgroup: + + alt.revisionism -- dedicated to discussing "Holocaust revisionism," the + + claim that the Nazi extermination of Jews and other distinct peoples is + + a "hoax" exacted upon millions of unwary non-Jews. + + + + Anti-racist and anti-fascist online activists continue to track Gannon + + and his pals around the 9,000-odd newsgroups. One such hunter is + + Canada's Ken McVay (kmcvay@oneb.almanac.bc.ca). McVay, 53, came to + + Canada in 1967 from the U.S. and is now a Canadian citizen (holds dual + + citizenship). He's Canada's foremost online anti-revisionist warrior. + + + + I've been reading his stuff for years. + + + + TRUE COLORS + + + + "When I first got started on this, everyone was sort of out there on + + their own," McVay told eye in a phone interview from his Vancouver + + Island home. "Almost by accident, working groups started coordinating + + their efforts." McVay works closely with Danny Keren (dzk@cs.brown.edu) + + and Jamie McCarthy (k044477@hobbes.kzoo.edu), among others. + + + + The goal is not censorship. "I am absolutely, unequivocally opposed to + + any kind of censorship," McVay says. + + + + This is a real shift in McVay's thinking. I vividly recall reading + + McVay his posts from about two years ago, where he'd vehemently defend + + Canadian anti-hate speech laws. + + + + "I don't anymore. I think it's the biggest possible mistake." What + + changed his mind? "Dealing with these guys on a daily basis for over + + two years. Seeing how easy it is to shoot them down. And it is. The + + most intellectual among them are stupid and completely inept when it + + comes to historical research. And, of course, they are liars. That + + being the case, why on Earth would anyone want to shut them up or force + + them underground? I want to know who I'm dealing with. I want to know + + where they are. And I want to know how their minds work." + + + + To see their true colors, McVay and compatriots badger and prod + + revisionists until they drop the scholarly pretense by, say, calling + + McVay a "Jew-lover" or complaining Hitler unfortunately missed the + + parents of some Jewish netter. It happens regularly. + + + + "These online discussions are not aimed at getting Gannon and his pals + + to change their minds," McVay says. "That ain't gonna happen. It's to + + reach the rest - - such as the new users that pop up every September in + + universities and stumble on this stuff. Many don't know how Nazis + + operate. Most racists don't go around with a little patch on their + + shoulder proclaiming: `I hate Jews, or blacks, or natives.' But it's + + there. We work to bring it out in the open." + + + + A.R. AS TESTING GROUND + + + + McVay and company are working on putting together a book, a primer on + + Holocaust-denial techniques. (He hasn't approached a publisher yet.) + + You often see the results of this ongoing research in alt.revisionism . + + McVay chuckles about having rabid anti-Semites ever at hand to help + + write it. + + + + "We throw out a chapter when we think it's done, content-wise. If the + + revisionists ignore it completely, then we know it's finished. If they + + respond, we say, `Ah! We missed that trick, calling a maple tree a + + Porsche.' So we add that argument in." A month later, they upload the + + chapter again. + + + + McVay says the "classic" revisionist tactic is misrepresentation of + + text. Outright lies. + + + + "They'll cite a historical text: `K.K. Campbell says on page 82 of his + + famous book that nobody died at Auschwitz.' Then you go to the Library + + of Congress and look up K.K. Campbell, page 82, and what you find he + + really said was, `It was a nice day at Dachau.' They get away with this + + because they know goddamn well most people don't have time to rush off + + to the Library of Congress. But people read that and say to themselves, + + `Who would lie about such a thing when it's so easy to prove them + + wrong? They must be telling the truth.' " + + + + The years of refutation have resulted in anti-revisionists transcribing + + mass amounts of death camp evidence and testimony into computer text + + files. McVay saved them. Soon netters requested the material. It began + + to take up so much time, he automated the process. You send an email + + request, the computer sends you back the file(s). + + + + The archive is now maybe 60 megs and may swell to over a gig in 1995. + + Write email to listserv@almanac.bc.ca with the message GET HOLOCAUST/INDEX -- + + you'll be sent a huge index of Holocaust files (other files, too, on + + fascist racist-right groups). If you like the convenience of gopher, + + check out jerusalem1.datasrv.co.il . + + + + Revisionists often assert McVay "secretly" gets operating funds from + + Jews. + + + + "I don't," McVay says. "The hard-drives are spread out on a table with + + a Canadian Tire fan blowing right at them. I can't afford to replace + + things, if it breaks, it's gone. However, I'm upfront -- if I get + + support money, I'll take it, Jewish or not. The fact that a Jewish + + organization would offer several grand to help wouldn't change the + + value of the historical data." He'd like to put it all on CD-ROM. + + + + "The Internet has to be a revisionist's worst communications + + nightmare," McVay says. "They can't ignore it, because, as you and I + + know, in 10-15 years everyone in North America is going to read stuff + + through the Internet. + + + + "And that's the beauty of the Internet: once it's refuted in an honest + + and academic fashion, you can't run away from it," McVay says. + + + + When the latest revisionist recruit charges in with the same old + + pamphlets, it's almost effortless for anyone to request a file and + + reply: "We covered this two years ago. Here is the massive refutation + + of that so-called scholarly report." + + + + It's there. For everyone. Forever. + + + + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + + Retransmit freely in cyberspace Author holds standard copyright + + Full issues of eye in archive gopher://interlog.com + + Coupla Mailing lists available http://www.interlog.com/eye + + eye@interlog.com "Break the Gutenberg Lock..." 416-971-8421 + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE WORLD WIDE WEB - The JUNKYARD OF THE INTERNET + + + + By Ram Samudrala (ram@mbisgi.umd.edu) + + + + [Author's Note:] + + I am not completely happy with this, especially the second part, + + because when I started writing this I had a lot of ideas about it and + + now I seem to have run dry. But I went ahead and finished it anyway, + + before I lost all interest. Feel free to post this wherever... + + For those of you who are familiar with the workings of the web, you + + can skip to The Junkyard of the Internet. + + ------ + + + + The World Wide Web + + + + About a year or so ago, there were about 500 HyperText Transfer Protocol + + (HTTP) servers on the World Wide Web (www). Now, every other person on + + the Internet with some basic computing experience can install their own + + server and provide information (I'm using the world quite liberally here) + + to the web. I wonder if Tim Berniers-Lee, the person who started the + + www project at CERN, really thought it would become the thing that + + revolutionized the Internet and end-user computing. + + + + And this issue, the ability to put yourself on a soapbox and be heard by + + the world, and the subsequent consequences, is what I will attempt to + + address here. First, what does the www give us that we didn't have before? + + By posting on USENET news, for example, you're probably heard by a lot + + more people than having a web server. Well, the main difference is that + + anything you posted normally was lost within in a few days, so your ideas + + didn't stay around long enough for everyone to assimilate. On the web, + + your pages are permanent, and you can promote them as much as you want + + and people will continue increasing the accesses made. But the www + + project would probably be doomed without the software that keeps + + everything working. Almost every w^3 browser I've used has been of high + + quality (which is absolutely crucial), but one of them, NCSA's Mosaic, + + stands out in terms of availability and accessibility for a variety of + + problems. Marc Andreessen wrote Mosaic for X and it spread like wildfire + + when NCSA released free versions of mosaic not just for X, but for a + + variety of other platforms, again, about a year ago (September). A friend + + of mine referred to it as "The Program of the Gods". + + + + I happened to get seriously addicted to the www at the beginning of this + + year, but I got over it soon. I then realized that all one needed was an + + anonymous FTP server set up and they could serve documents to the www. + + I did this initially, and this is yet another design decision that has been + + crucial---the www incorporates several existing information retrieval + + mechanisms out on the net, primarily gopher and ftp. I never thought + + gopher would be a big hit, and with the advent of the numerous w^3 browsers + + for almost any imaginable platform, there really is no need for gopher + + clients and why have a gopher server if you can get a http one up running + + just as easily? There is only a small (depending on how aesthetically + + pleasing you want your pages to look like---one can waste hours making + + things look pretty) overhead involved in converting plain documents to the + + HyperText Markup Language (HTML), the language that www browsers understand + + and use to format your text. + + + + Philosophically, the idea behind the www simply takes Unix philosophy to + + the extreme. The whole Internet is abstracted as a gigantic file system, + + and HTML allows you to specify any object on the Internet, be it a movie + + of comet Shoemaker colliding with Jupiter, gifs of paintings by Dali, a + + song you recorded on your 4-track that you have a soundfile of, or things + + you should know before you delve into linear and non-linear programming, + + by linking the locations of these objects to an anchor of your choice. + + And like Unix, a link could be anything, including other programs, telnet + + /news/mail/ftp/gopher ports, or just another section of a document. The + + touch of button that activates the anchor is all you need to access any + + particular link---the software figures out the rest for you---if it's a + + soundfile, it'll play it. If it's a movie or a picture, it will bring up + + the appropriate viewer, and so on. + + + + The Junkyard of the Internet + + + + This is all very nice, but what it lets you do is also access the latest + + porn clip, let you see gifs of Kurt Cobain's shotgunned face, contact your + + favourite astrologer for a consultation on-line, and do on-line shopping. + + I'm not going to pass judgement on whether these things are "wrong", but + + as the web grows, it is clear that it is the entertainment side of the web + + that is thriving. Megadeth is probably is one of the first groups to + + commercial go all out to advertise a release on the w^3 (the CD comes with + + a sticker saying "check out Megadeth, Arizona at through the www at + + http://bazaar.com or through FTP" (or something like that), and while + + Megadeth, Arizona is a cool place to visit, it is akin to the junk mail + + with colourful pictures that you receive in your postbox. It is propaganda. + + + + There are a lot of advantages to having entertainment information + + available on the net---but it also results in a lot of spam. And this + + is evident not only on the w^3, but also in the USENET newsgroups, + + where the commercial Internet provider industry thrives as millions of + + subscribers come on line and run amok. A few months ago, an advertisement + + on the net would've been flamed to ashes. Now there is a weak response, + + but the people who opposed this are fighting a losing war. Advertisers + + continue to spam the net. Not to mention the increase in the number "job + + wanted" or "items for sale" ads in completely inappropriate newsgroups. + + The number of inane USENET groups created for local objects of worship + + (I am guilty of this) are numerous. The ease with which computers can + + transmit hypermedia (pictures/movies/sounds) has not only furthered the + + www revolution but is pushing bandwidth to its limits (a state that we + + may perpetually exist in). All this has contributed to an increase in + + the noise:signal ratio on the net as a whole, but particularly in USENET + + newsgroups and the www. + + + + As w^3 usage increases, and it becomes more flexible to incorporate + + some sort of a BBS-type system, like USENET, or USENET itself, in www + + browsers, then we will see a exodus from the traditional forms of + + Internet use to w^3 use, just as there is a movement from people typing + + stuff at the prompt to clicking buttons on the mouse to perform local + + tasks. In fact, I predict that many people simply won't even figure out + + how to FTP or read news from the prompt, just like many people don't + + figure out how to do send mail from the prompt and instead type in a number + + or click on the mail icon for their favourite mailer, since they can do + + this at the click of a button. Again, this isn't necessarily A Bad Thing. + + + + What this means, however, is that there will be a dichotomy that will + + exist on the Internet. There will be people who can navigate the + + Internet only with help of the www and there will be those who can do + + both, i.e., use the prompt to do stuff. The advantages that the + + people who do have access to the internal workings of the system is + + left to your imagination. But what this is also leading to is the + + concentration of all the spam on the several networks that compose the + + Internet to the w^3, and hopefully it will leave the traditional forms + + of Internet use as it were. Commercial advertisers are more likely to + + find the w^3 a more viable medium to display their wares than making + + ephemeral postings on USENET newsgroups, especially given the + + capability for multimedia plugs. People, visionaries and otherwise, + + can put forth their agenda with ease. Real information will be much + + harder to find even with tools like the Web Crawler. All this will + + result in The Program of the Gods becoming a metal detector. + + + + Not everything has to be negative: the ability to reach the masses in + + an unprecedented way will also hopefully lead to an information + + revolution, where information will be made available free (this is + + evident in the www pages of the two camps of the San Francisco + + newspaper strike). It will lead to independent reporting of events, + + and even though these will be biased, the perceiver, facing many + + alternatives, can discern the relevant bits themselves. The www, more + + than anything else, will lead to a society where information is free. + + While I have always been for this, I just realized it comes with a + + price---lots of noise. But this might push us to developing better + + software that will allow one to filter signal from noise in a + + efficient manner. + + + + And then of course, there's the issue of speed---there is nothing like + + the net for receiving the latest information on the fly. Sure, it + + might be tainted, but when one's working and if, for example, one + + wants to check what the latest election results are (why one would + + want to do this is another issue), just get on your local newsgroup + + and post a message, if there isn't already a continuous thread going + + on. And of course, we all know how the www let us view the pictures + + of Shoemaker/Jupiter collision almost as it happened. This is + + probably the greatest advantage of maintaining a net-lifestyle. No + + longer do we have to rely on one or two view points---you can select + + among several and information is made available as soon as it is + + disseminated. + + + + And what about the incorporation of computers and networking into our + + lifestyle? We're holding the First Protein Folding Competition in + + Asilomar, CA, and the top priority is making sure we have access to + + the Internet. We would be basically lost without this access, i.e., + + without being "plugged in". It is interesting how life has changed + + for some of us. 5 years ago, I hated computers and now I cannot go + + for a few hours without having access to one. Visions of cyberspace + + as portrayed in the cyberpunk genre are still far away in reality, but + + a similar affect seems to have been achieved by the people who exist + + on the net. + + + + Disclaimers: the Internet isn't just about the USENET or the w^3. I'm + + addressing only certain aspects of it. + + + + ram@elan1.carb.nist.gov ...because you believe that science is the + + greatest achievement so far of the human race + + and its long term best hope for survival and enlightenment. + + ---John Moult + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + AUSTIN ZEEN SCENE + + + + By Josh Ronsen (rons@quads.uchicago.edu) + + + + Here are some Austin zeens I've read recently. I am somewhat surprised + + on how good so many of these are, considering the somewhat stale + + nature of Austin's music scene. I've recently posted to alt.zines the + + Austin Zine Guild's "Scratch Paper" #2, which is more of an overall + + commentary on Austin Publications rather than reviews of individual + + zeens as this is. Email me if you missed SP #2, and I will send it to + + you. + + + + PEEK-A-BOO #10: This marks the recovery of Peek-A-Boo from a + + flirtation with blandness in recent issues, the sex issue, the + + Halloween issue, back to the glory of it's first bunch of issues. Lots + + of personality and personalities in here. An interview with Blast Off + + Country Style, a "scene girl" report (hopefully to become a regular + + column) on cute boys at a Jon Spencer show (which I missed, damnit!), + + and a page of stuff from the women who do the wonderful zeen MTM (see + + below), including a dream featuring Joan Jett, are my faves in this + + ish. Plus cool comic and xerox artwork. P-A-B is free in Austin, so I + + guess send them a dollar at 305 W. 39th St #107, Austin, TX 78751. + + They also claim to have email at boo-key@mail.utexas.edu + + + + SAD #1: I just picked this up today, and I like it lots. It's kinda + + tiny and is all about (surprise) sadness: people who are sad, music + + that is sad, and three pages of the sadder entries in Kafka's diaries + + (really!). Very well done. The four music reviews, Joy Division, + + Idaho, Bedhead and Timco, are rated by how likely their members are to + + off themselves. Nice touch. Cheer up the sad publisher and send 2 + + stamps to 704 W. North Loop, Austin, TX 78751 + + + + MTM #3: Another really fine Austin zeen! What's going on here? Is it + + something in the water? I missed #'s 1 and 2, and deeply regret it. A + + number of interviews here, with 7 Year Bitch, Glorium and two guys + + from Ken's Donuts. I love the witty, irrelevant questions and answers + + in the interviews. The other stuff has some very humorous and spirited + + writing, including the two editors, Lula and Alabama, trading stories + + of weird incidents in their lives, a page of "Uppity Women" you might + + not be aware of, but should (I didn't, but now I do), and an expose on + + a local strip club. This is another freebie, so sent $1 or stamps for + + this or a future issue to 2834 Salado B, Austin, TX 78705. + + + + RETICENCE AND ANXIETY #3: I think #4 just came out, but this is the + + first one that I've gotten (for the somewhat slimy reason that it was + + the cheapest). Written by lesbian lovers (is that really important for + + me to mention? They refer to the two interviews in #3 as being with + + "queer men", so I can call them "lesbians", can't I? Well, I will and + + there's nothing you can do about it!) who write under the pseudonyms + + R. and A. (this *is* Texas, you know, not that there is any bigotry or + + intolerance around these parts, not here!) This is very well written, + + with moving and interesting accounts of their first days after moving + + to Austin, coming out to one's grandmother, dealing with unsympathetic + + (and downright hostile!) parents and... Having two wonderful, + + intelligent, loving parents, I am always surprised to hear how shitty + + other parents can be. Anyways, interviews with film-maker Todd Haynes + + (after reading this I really want to see his film "Poison") and David + + Wojnarowicz (whose interview I have not read yet). Some political + + articles, A.'s liking for some Heavy Metal, and a photo and commentary + + of Chris Carter of Throbbing Gristle round everything up. All in all, + + an interesting look into two people's lives. Sometimes it is difficult + + to separate writing like this from fiction (I read a lot of fiction). + + After all, what is the difference between writing from someone you do + + not know and a first-person fictional narrative? R&A makes clear this + + difference. $2 and 2 stamps to PO Box 2552, Austin, TX 78768. The + + other issues have differing prices, so just send them lots of cash, + + that's all I'm saying. + + + + ALCOHOL, DRUGS, AND DRIVING #1: There are more issues, but I haven't + + read any, and I'm not very thrilled with this, and not just because of + + the multi-page feature on the guy who gunned down 40 people from the + + UT Tower years and years ago. I think this is unequivocally inferior + + to my zeen, unlike everything mentioned above and probably below, and + + I have a problem with anyone who does something worse than me. I mean, + + if I can do something, surely you can do it better. Also they guy's + + address is not in the issue, so I have to look it up in Scratch Paper + + #2: oops, it's not in their either, so if you really want this, you + + have to come down to Austin and get it for yourself. + + + + MONK MINK PINK PUNK #2: This is my zeen, and it is not out yet despite + + rumors to the contrary. When it does come out (don't hold your + + breath), expect interviews with prolific punkers God Is My Co-Pilot, + + and story-teller Juliana Leuking. Also expect a unique and exciting + + format, which is under secret development in what is only known as + + "Josh's Bedroom" (it's worth spending a night there) (anyone who gets + + this reference I'll send you a prize). Email me for details on #1, of + + which I am quite proud of, and of which I have, well, more than a few + + copies left. I have been getting a lot of promo stuff in the mail from + + MMPP's not unfavorable Factsheet 5 review, including anti-rock + + Christian literature (wow, those arguments were really convincing; I'm + + burning my record collection tomorrow!), lollipops from Atlantic + + records to entice me to go see a Melvins show, and a few actually good + + records! + + + + ASIAN GIRLS ARE RAD #'s 1-10: A very amusing fetish zeen on the beauty + + and wonder of Asian chicks. Sounds disgusting and perverted? Well, + + it's actually quite cute and endearing. I always enjoy this...as an + + anthropological study into intercultural relations, not because + + I'm...you know...you're not buying this, are you? Anyways, Dave writes + + a lot about his life, cool moms, astronomy, taking classes, + + dishwashing, washing dishes with Asian girls and... Like an old + + friend, but only $1 a back issue. #7 has a Shonen Knife review, and a + + picture of them reading AGAR...wow! (When God Is My Co-Pilot read my + + zeen, they verbally harassed me for not liking Elliott Sharp, really!) + + AGAR c/o David O'Dell, 707 W. 21st St, Austin, TX 78705 + + + + LAZY WAYS #1 (?): Marc just sent me his zeen as a trade for mine, so + + right off the bat you know he is cool, although he does not live in + + Austin. Lots of gloriously positive admiration for many indie-pop + + bands that don't seem to get mentioned very often, something which I + + really admire. One more article on Sebadoh and I will barf! Stuff here + + on Allen Clapp, Bomb Pops, Musical Chairs and many more bands I have + + never even heard of (and I read every issue of the Indie-(Music + + Mailing)-List). Hurrah! Marc really likes this stuff and his + + enthusiasm only infects me with the same, despite the fact that I've + + probably listened to too much of this kind of music already. $2 to + + Lazy Ways, PO Box 17861, Plantation, FL 33318. + + + + BLIND STUMBLING AFTERLIFE by Elisabeth Belile: This is not a zine and + + is not from Texas, but is so marvelously wonderful that I must rant + + and rave about it. Belile writes/produces some of the best and most + + rewarding poetry that I've read in years, if not ever. Her stuff is + + very dada/surreal, and seems to be the product of some cut-up process + + that is not explained. Not stream-of-consciousness, but cut-up. I + + would quote the entire thing if I could, but my fave (since getting + + this just today): + + + + "These are the politics of my dream: + + 1. Crush Beauty + + 2. Spit It Out! + + 3. Plagiarize -- go naked for a sign! + + 4. Appropriate when appropriate + + 5. Follow and run on angel's clocks + + 6. Command them to call you, *now*." + + + + The book is one long four-part poem, with a (not meaning to make it + + sound trite) a strong feminist bent to it, esp the last two parts. I + + really have not pondered on it's meaning yet, just enjoyed the + + beautifully powerful juxtapositions of words and phrases. This is + + must-read stuff. $4 -> Broad Press, 2816 Avenel St, LA, CA 90039. + + + + While on the subject, BSAL, good as it is, no where near approaches + + the power, the emotional malaise, the surrealness of the other book + + I've read from Belile, called "AFTER WITH HOPE", which is a chap book, + + and quite an amazing one at that. I do not have the words to describe + + how great this , so just trust me or email me for more info. $4 -> + + We Press, PO Box 1503, Santa Cruz, CA 95061 + + + + Thanks to anyone who has read any or all of this. I wrote this not + + only because I really like most of these publications, and want to see + + them thrive and prosper, but also because I am generally too shy to + + write to these people myself to praise their efforts. I figure if I + + can turn anyone on to any of these, and they send letters of praise, + + well, that's just about the same, right? + + + + Peace, + + Josh Ronsen + + rons@midway.uchicago.edu + + ps: I am in Austin despite the email address... + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + PRESS RELEASE: Object Technology in Cyberspace + + + + By Chris Hand (cph@dmu.ac.uk) + + + + FOR IMMEDIATE RELEASE + + + + Contact: Chris Hand, De Montfort University. Fax +44 116 254-1891. + + e-mail: cph@dmu.ac.uk + + + + ** A Hypertext version of this Press Release is on the World-Wide Web ** + + ** at http://www.cms.dmu.ac.uk/Research/OTG/Online/pr1.html ** + + ________________________________________________________________________ + + + + + + OBJECT TECHNOLOGY MOVES INTO CYBERSPACE + + + + Leicester, England -- 28th November 1994. + + + + De Montfort University's TaTTOO'95 conference to be held in January will + + feature the world's first commercial exhibition held in Cyberspace. + + + + A number of companies world-wide have already expressed an interest in + + sponsoring a stand in the Virtual Exhibition Hall, where anyone on the + + Internet will be able to browse on-line product information and chat in + + real time with company representatives. + + + + "This will be just like a `real-life' trade exhibition, but without the + + hassles of travelling long distances or struggling through the crowds", + + says Chris Hand, organizer of the Virtual Conference. "Exhibitors will + + benefit since they won't have to worry about travelling costs or time + + away from HQ. In fact, it will be possible for one exhibitor to work on + + several stands simultaneously. The potential for events of this kind is + + enormous." + + + + Advertising space will be available both in the Virtual Exhibition hall + + and on an integrated World-Wide Web server. Other on-line events planned + + to run alongside the real-life conference include a Virtual Press + + Conference and Discussion to be chaired by Eric Leach of the Object + + Management Group, and tutorials on working within object-oriented + + virtual environments. Internet users will be free to mingle on-line with + + the TaTTOO'95 delegates and speakers. + + + + Alan O'Callaghan, conference organizer, adds: "With the recent + + investments in Object Technology by giants such as IBM, it's now more + + important than ever that we bring the message to as many people as + + possible. The Virtual Conference will allow us to do this. OT is moving + + so quickly now that if you're not on-line to it you could easily miss + + the wave." + + + + More details on the on-line events are available from Chris Hand + + (e-mail: cph@dmu.ac.uk) and Mark Skipper (mcs@dmu.ac.uk), fax. +44 116 + + 254-1891. WWW: http://www.cms.dmu.ac.uk/Research/OTG/tattoo-online.html + + + + + + Background + + + + TaTTOO (Teaching and Training in The Technology of Objects) is an + + international conference which in 1995 will be held in the Queens + + Building, De Montfort University, Leicester on 4-6 January. TaTTOO'95 + + follows the highly successful inaugural event in 1994 which was attended + + by 185 delegates from academia and industry in the UK, USA, Sweden, + + France, Holland and Germany. + + + + More information: + + + + e-mail: tattoo@dmu.ac.uk + + WWW: http://www.cms.dmu.ac.uk/Research/OTG/tattoo.html + + + + + + De Montfort University is recognized by the World Bank as the fastest + + growing university in Western Europe. A distributed university with + + sites in Leicester, Milton Keynes, Bedford and Lincoln, DMU is + + pioneering the use of Video-Conferencing and Internet services by staff + + and students. The School of Computing Sciences, well-known for its + + expertise in Object Technology, has been operating a World-Wide Web + + server since 1993. + + + +Date: Thu, 19 Jan 1995 06:33:41 -0600 + +From: JAUC + +Subject: JAUC-File2 + + + + + + DEADKAT + + + + [Editor's note: This stuff here is published to humor you. We do not + + in any way condone cruelty to any animal. This was found when one of + + our editors randomly fingered an account. If you've been into the + + hacking/phreaking scene for a while (at least since the 80's) like + + us (the editors) you will understand all of this...if not, just read it.] + + + + [GeeK-Speak mode: ON] + + + + (#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#)(#) + + (#) (#) + + (#) /|narkiztik / \ ^ / ONE OF THOSE GREENPEACE OR SPCA FAGGOTZ THEN PHuCK YEW + + | | PANZIE, GO WATCH 101 DALMATIONS OR SUMTHING @!!@# + + / \ ====================================================== + + | . . | + + (" " + + ) + + + + ONE OF MY FAVOURiTE METHODZ OF KAT EXTERMINTATION IS A PLAY ON THE + + OLD HOCKEY KARD IN THE SPOKES OF YER BICYCLE TO MAKE A KEWL SOUND + + THING, IF YEW HAVE NEVER DONE THIS BEFORE WHAT ESSENTIALLY YOU DO + + IS AFFIX A HOCKEY KARD TO YER SPOKES AND AS YOU PEDAL IT MAKES A + + KEWL KLICKING SOUND.. WELL THIS IZ FOR PANZIE FAGGOTZ #@!@ IF YER + + KEWL WHAT YEW DO IZ TAKE A LiVE KAT aND AFFIX IT TO THE SPOKES OF + + YER BIKE AND PEDAL AROUND TOWN VIGOROUSLY, NOT ONLY DOEZ IT SOUND + + KEWL BUT ALSO YOU GET SUM CHOICE LOOKZ FROM ANYONE YOU HAPPEN TO + + PASS BY !@#@! + + + + [NoTe: Thiz method will not work on bikes without spokes, + + ie: big wheels, if you own a big wheel: get some skipping + + rope and tie one end to the kat and the other end to the back of + + your big wheel, position yourself at the top of a big hill and + + pedal downward vigorously] + + + + ANOTHER FAVOURITE OF MINE REQUIREZ ACCESS TO YER SCIENCE TEACHERS + + STOREROOM OR SOMEPLACE WHERE YOU KAN AQUIRE LARGE AMOUNTS OF PURE + + POTASSIUM. BASICALLY WHAT YOU DO IS SHOVE LARGE AMOUNTS OF PURE + + POTASSIUM DOWN THE CATS THROAT AND THEN ONCE IT IS SUFFICIENTLY + + STUFFED WHIP IT INTO THE BATHTUB WHEN YER MOTHER IS HAViNG A BATH + + OR EVEN INTO A PUBLIC SWIMMING POOL. YOU WILL REVEL IN THE XPLOSION + + OF KAT FUR AND INTESTINES THAT WILL RESULT FROM SUCH ELEETNEZZ.. + + IN KASE YOU DONT KNOW, POTASSIUM + h2o (water) kauses a minor xplosion. + + THE MORE PURE POTASSIUM YEW STUFF THE KAT WITH THE BETTER THE BOOM. + + + + [NoTe: Another play on this method iz to stuff the kat with the + + potassium and then remark to your mom that the kat looks like it + + needz a bath, when yer mom immerses the kat in water *B00M*.. hehe + + If you want to be elaborate, talk to your mom alot about spontaneous + + combustion, fill her head with lotz of horror stories about it then + + proceed with the plan... it will take her weekz to recover from + + the shock when FeFe goez BooM-BooM] + + [NoTe#2: ThiZ meth0d iz loadz of fun when you employ one of th0se + + panzie 'throw in yer quarterz' publik fountainz as yer detonator] + + + + DEW YEW HAVE A MIKROWAVE ?!?!? iF SO THiS NEXT MeTHOD IZ DEFINITELY + + THE THiNG TEW DEW ON THoZE RAiNY SUMMER DAZE WHEN YEW R BORED OUT OF + + YER MIND @!#@! EYE AM SURE BY NOW YEW R BORED OF MERELY JAMMiNG YER + + FAVOURiTE FELiNE iNTO THE MiCROWAVE ON HIGH FOR 10 MiNUTES, WELL HERE + + iZ A METHOD WHICH ADDZ SUM EXCiTEMENT !@#!@ WHAT YEW WiLL NEED BESiDES + + THE OBViOUS KAT AND MiCROWAVE iZ: a) YER MOTHERZ FAVOURiTE PEARL + + NECKLACE. b) A SHiTLOAD OF POPKORN KERNELZ !@#!@ STRiNG THE PEARLZ + + AROUND THE KAT, THROW IT IN THE MiCROWAVE AND THEN FiLL THE MiCROWAVE + + WiTH POPKORN... KLOSE THE DOOR, CRANK IT ON HIGH AND RUN LiKE HELL #@!# + + THiS METHoD iZ VERY MESSY #!@# THE RESULTANT EXPLOSION WiLL B MAMMOTH + + SEW MAKE SURE NOONE IZ AROUND BuT YEW WHEN YEW DEW THiS ONE !@#@! + + + + THiZ ENDZ PART ONE oF THE FELiS-MoRTiSiKON #@!# PHUCK YEW !@#@! + + WATCH FER MORE QUALiTY [ANuS] PHiLeZ KUMMING YER WAY SooN !@# + + GREETZ GOEZ OUT TEW: SKAR-TiSSUE, MuTiLaTeD-KaT [FEaR] + + SPECIAL GREETZ GOEZ OUT TEW ALL [FEaR] MEMBERZ @!#@! + + FeLiNe Exterminatorz/Anarkistik R0dentz 0H SHiT!@# THAT REMiNDZ + + ME, EYE FORGOT TO MENTION ANARKYKON @!# OK: + + + + ========================== + + = ANARKYKON '94 = + + ========================== + + + + EYE ARRiVED AT THE CONVENTION CENTER AROUND 5PM JUST AS SEVERED LiMB AND + + DEMONiKiZT WERE HEADiNG OUT TO GO TRASHiNG AT SMITH AND WESSON, LUCKiLY + + THEY HAD ROOM FOR ME, SO OFF WE WENT.. THE THREE OF US SPED OFF + + TOWARDZ THE SMITH AND WESSON BUILDING IN DEMONiKiZT's VAN AT QUITE + + A FRANTiC PACE ONLY STOPPING AT A RED LiGHT ONCE TO PuLL OVER AND MaCE + + AN OLD LADY WHO WUZ STaNDiNG ON A KURB.. OK, WE ARRiVED AT SMiTH AND + + WESSON JUST AZ THEY WERE KLOSING SO WE WAiTED OUTSIDE IN THE VAN UNTIL + + THE LAST EMPLOYEE HAD LEFT, AT WHICH POINT DEMONIKiZT LEAPED OUT WiTH + + SEVERED LiMB AND EYE IN TOW, WE MADE A QUIK B LiNE TO THE DUMPSTER AND + + EYE LEAPED iN.. SEVERED LiMB LiT A SMOKE BOMB TO PROViDE US WITH SUM + + DEGREE OF COVER AND QUICKLY JOINED ME iN THE DUMPZTER @!# WE SiFTED + + THROUGH THE MEZZ AND ALL WE GOT WERE A FEW SHELL CAZINGZ AND EYE FOUND + + SUM PRiNTOUTZ FER A LAZERSKOPE PLANS OR SUMTHiNG #@!# OK BACK TO THA + + KONVENTION CENTER #!@# WHEN WE ARRiVED WE WERE GiVEN OUR NAMETAGZ AND + + SHuFFLED OFF TEW A ROOM WHERE A FEW TALKZ WERE GIVEN ON TERRORIZM AND A + + FEW BORING LEKTUREZ ON SNEAKING INTO BUILDINGZ AND LOCK PICKING #!@ + + EYE RAN INTO RANCiD MEAT AT THE LEKTUREZ AND HE INVITED ME UP TO HIZ + + ROOM TO LOOK AT HIZ CHEMICAL WEAPONS, WHEN WE GOT UP THERE HE SUGGEZTED + + WE TEAR GAZ THE LOBBY, WHICH WE DID... NEEDLEZZ TO SAY THE POLIZE + + SHOWED AND THA KONVENTION ENDED EaRLY @!#!@ PHUCK YEW !@#@! EYE GOTTa + + GO NOW.. + + + + D-CeLLeRaTiON TRaUMA + + [ANuS] '94 + + $@#!$#@$@$^M + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + + + EFF PERSONNEL ANNOUNCEMENTS + + + + By Stanton McCandlish (mech@eff.org) + + + + FOR IMMEDIATE RELEASE + + + + Personnel Announcements at EFF. + + Contact: EFF: Andrew Taubman , +1 202 861 7700 + + + + The Electronic Frontier Foundation (EFF) announced today several + + significant personnel changes. EFF is a non-profit, public interest + + organization that seeks to protect and enhance the growth of "Cyberspace" + + (the Global Information Infrastructure) as a diverse, free, responsible + + and empowering environment. + + + + David Johnson has been named Chair of the EFF Board of Directors and + + Senior Policy Fellow of EFF. Johnson, an EFF Board member since 1993, + + has been practicing computer law with the Washington, DC, law firm of + + Wilmer, Cutler & Pickering. He has direct experience with computer networks + + as Chairman of LEXIS Counsel Connect (an on-line system for lawyers). + + He joins Andrew Taubman, Executive Director and Chief Operating Officer, + + who began at EFF in September of 1994. + + + + Esther Dyson has been named Vice-Chair and will serve on the EFF Executive + + Committee. Dyson is President of EDventure Holdings Inc., a venture + + capital firm focused on emerging information technologies, particularly in + + Eastern Europe. Dyson is a member of the US National Information + + Infrastructure Advisory Council, has board memberships at the Global + + Business Network, Perot Systems, the Santa Fe Institute, and is a founding + + member of the Software Publishers Association. + + + + Johnson and Dyson join David J. Farber and Rob Glaser on the EFF + + Executive Committee. Farber holds the Alfred Fitler Moore Professorship + + of Telecommunications at the University of Pennsylvania, is a fellow at the + + Annenberg School for Public Policy and at the Glocom Institute in Japan and + + was one of the creators of many of the parts that evolved into the modern + + Internet - such as CSNet, CREN, and NSFNet. Glaser is President and CEO of + + Progressive Networks, an interactive media and services company and serves + + on such boards as the Foundation for National Programs and the Washington + + Public Affairs Network. + + + + EFF co-founders Mitchell Kapor (immediate past Chair) and John Perry Barlow + + (immediate past Vice-Chair) remain Directors and will continue to + + participate actively in the development and implementation of EFF policy + + programs. + + + + Also announced, Jerry Berman, who held the position of Policy Director, has + + left EFF. Janlori Goldman and Daniel Weitzner, who have worked closely + + with Mr. Berman over the years, and other policy staff members, also have + + left to establish with Mr. Berman a new organization to be called the + + Center for Democracy and Technology (CDT). EFF wishes CDT success in its + + new venture and thanks Jerry and his colleagues for their substantial + + contributions over the past three years. + + + + In 1995, EFF will continue to pursue its policy mission of protecting the + + health and growth of the global computer networks. The 1995 policy agenda + + includes such projects as an innovative new "State of the Net" report; + + studies of the implications of the global nature of the net for + + jurisdictional and governance questions; a study of the protection of + + intellectual property on networks; and efforts to preserve the free + + flow of information across the Global Information Infrastructure. EFF + + expects to continue to intervene actively to counter threats to + + computer-mediated communications networks, and virtual communities, such + + as limitations on the use of cryptography and intrusions into personal + + privacy, as it has in previous years. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + READER FEEDBACK + + + + [Editor's note: This is a response form one of our readers in reply + + to the 'Porn On The Net' article we ran in the last issue] + + + + By Michael Stutz (at118@po.cwru.edu) + + + + Hello-- + + + + I didn't see a Letters section in this issue [vol i, issue 6] and I really + + hadn't intended on writing one, but that article -- Paul Pihichyn's rant + + on porn -- was so stupid I had to say *something*. + + + + Calling it all those names ("filth," "slime," etc) made it immediately + + suspect. What are these things he's talking about? Naked people. People + + without their clothes on. What's so filthy and slimy about that? Nothing. + + + + His fears about exposing porn to children are silly; what children know + + how to uudecode, assemble and view an image? None that *I* know. Besides, + + what would happen if a child saw a picture of a naked woman? + + + + What would happen? + + + + Probably nothing much. Maybe (s)he'd laugh, I don't know. While I'd + + hardly recommend throwing porn into the laps of kids, we have to remember + + that it doesn't do much for them, either. We're all naked and we all have + + sex. That this guy suggested that we don't 'need' groups like alt.sex + + is more than ridiculous -- it tells me that there's a lot of people out + + there (like him) who need help. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + CALL SECURITY, PUBLIC KEY VOICE CRYPTOGRAPHY FAQ + + + + By Neil Johnson (njj@pokey.mc.com) + + + + Call Security, Public Key Voice Cryptography FAQ + + ------------------------------------------------ + + + + Call Security is a shareware program which provides public key + + cryptography for voice telephone conversations. In other words private + + phone conversations. Like as in voice scrambling. All you need is a + + modem, a sound card, PC, and someone to talk to (with the same). + + + + This my first version of the Call Security FAQ. Its very brief but + + should get you going if you plan to use it. If you have suggestions, + + comments, or criticism, please let the current editors know by sending + + e-mail to njj@mc.com. Things like, bugs, sound card how to, modem + + init. strings etc... are especially welcome. + + + + Many thanks to David Colston, Charlie Merritt the authors of Call + + Security. These guys have been sharing info with me regarding this + + program in the many months prior to its release. + + + + This is the very first & rough draft version of this faq. Some things + + are sure to be missing, just plain wrong, etc... Your get the + + point. Trust only what can you verify yourself. This faq is actually + + bound to create more questions than it answers. Hopefully it gets you + + to use Call Security. + + + + Call Security FAQ Author Neil J. Johnson, email njj@mc.com + + + + Table of Contents + + ----------------- + + + + 1. Overview, what is Call Security? + + 2. How well does it sound? + + 3. What kind of hardware do I need? + + 4. Where do I Get Call Security? + + 5. Quick, can you tell me how to run it step by step? + + 5.1 Ok how do I stop talking now? + + 6. How Does It Work? + + 7. What public key algorithm does it use? + + 8. Is it really secure?, You, decide! + + 9. Is it safe to give them my public key when i upgrade from shareware + + (512 bit key) to the registered version (1024 bit key)?, Yes, + + its only the public key! + + 10. How do I set up my sound card? + + 10.1 How do I set up my Gravis Ultrasound? + + 11. My modem is full duplex why isn't Call Security? + + 12. Are there any bugs in the program? + + 13. Where do I get DSZ or GSZ for doing Zmodem transfers with Call Security? + + + + Answers to Questions + + -------------------- + + 1. Overview + + + + Well Call Security (CS) turns your ordinary PC into a very secure + + voice telephone. CS also works as a general purpose data + + comm. program with zmodem support, ansi/vt100 terminal, & regular + + unencrypted digital voice. Call Security is also a general purpose + + public key cryptography program for encrypting/decrypting any computer + + file (like email). + + + + 2. How well does it sound? + + + + The sound quality varies depending upon how many (compressed) samples + + per second your hardware can do. Here is a little chart. + + + + Sample rates: + + 7600 Acceptable + + 10000 sounds like good CB Radio (486 with 14.4bps modem) + + 16000 Real sweet + + + + 3. What kind of hardware do I need? + + + + The minimum recommended system is a 386sx with a 9600bps modem & a + + sound blaster compatible sound card. A 486 system with a 14.4bps modem + + is recommended. A 28.8bps modem is still even better! You should also have + + a copy of pkunzip to uncompress the program if you get a zipped copy off + + the Call Security BBS. + + + + 4. Where do I Get Call Security? + + Right now the only place to get it is at the following BBS phone number. + + Note I didn't see any support for kermit transfers. I recommend using zmodem + + protocol. + + + + Call Security BBS + + 1 (501) 839 - 8579 + + + + - Give your full name. + + - The password is "security" + + - Use the "d" command to download + + - select transfer type like "z" for zmodem (sorry no kermit support) + + - enter file name "callsec1.zip" + + - put your comm program in zmodem mode (automatic for most comm programs) + + + + 5. Quick, can you tell me how to run it step by step? + + + + - DOS stuff + + >mkdir callsec1 + + >pkunzip callsec1 + + >pkunzip software + + - I recommend printing the documents, readme.1st, security.doc, + + svterm.doc. + + + + - If your in windows exit now. + + + + - determine which comm port your modem is on & determine the address & + + IRQ. The DOS command msd.exe (Microsoft Diagnostic) can help with this + + task. Write this down for later. + + + + - determine the address of your sound card. Write down for later use. + + + + - If you don't have a sound blaster then put you sound card in sound + + blaster emulation mode. + + + + - type "security" at the dos prompt. + + + + - Your now in the security program. Select option A. Make My Own + + Secret & Public Keys (cursor to & hit return) + + + + - Now unfortunately CS makes public key exchange a hassle. You need to + + extract your public key from your key list it (& uu encode it + + optionally), and give it to the person you wish to talk to with + + CS. The first 2 steps can be done with the menu picks. The last part + + can be done with CS zmodem, if you happen to have the DSZ shareware + + program. + + + + Since this is a quick start guide lets skip this for now and use password + + encryption instead. If you don't want to skip the public key stuff read the + + documentation. + + + + - Use menu pick J. Go To Secure Voice Terminal + + You will be prompted for info on you modem set up & sound card setup. + + Just enter the info as it comes up. For sample rate select 10,000 samples + + per sec. for a 14.4 modem, 16,0000 for a 28.8, & 7,600 for a 9,600. Note: + + if you have a 386 16/SX machine don't go over 8,000 samples per second. + + + + - When your done setting the modem & sound card you will be a menu for + + where to go next. Hit the return key. You will be popped into the comm. + + program/terminal emulator. + + + + - Now it time for one person using CS select auto answer mode & the other CS + + to dial. + + + + - the auto answer person/side presses function key F8 + + + + - the caller does the following: + + press function key F6. Enter name & number of person you plan to dial. + + Note: field are separated with spaces, tab keys won't work. Now dial, + + directions are on the screen to do this (I think you just hit the return + + key). + + + + - The machines will now connect. Anything you type will go on their screen. + + Anything they type will go on your screen. Note, this text is not + + encrypted. + + + + - When your ready to talk hit alt-s on you key board. Then select + + password mode (or public key if you've done public key exchange). + + Each side now enters the same secret password (like hello). + + + + - On your screen it will either indicate that your listening or talking. + + to toggle listening/talking hit the space bar. To end the session hit + + the esc key. Note: it helps if you use it like a CB & say over while + + you hit the space key (when your done talking). + + + + 5.1 Ok how do I stop talking now? + + Well If your talking you must hit the space key to become the listener. + + To end a voice session & go back to the terminal chat mode, you must hit + + the key while you are in talk mode. + + + + 6. How Does It Work? + + + + In laymans terms, each person who uses CS has two keys, a matched + + pair. One is public & the other is private. The way program works is + + public key are used to encrypt voice (or computer + + files/email). Private keys are used to decrypt the voice. Hence know + + one can listen in on a conversation (or computer file/email) that was + + meant for you (encrypted with your public key). However you still have + + to trust the person you are talking to! + + + + 7. What public key algorithm does it use? + + + + No CS doesn't use the RSA [Rivest, Shamir, and Adleman] public key + + cryposystem as featured in PGP. A bonus feature of not using RSA is + + the avoidance of RSA patent restrictions. + + + + CS uses QPK Quick Public Keys by David Colston. This + + public key system has been reviewed by Whit Diffee, Gus Simmons + + (Sandia Labs), and posted on sci.crypt. + + + + On the plus side QPK is fast. On the down side the CS implementation + + of QPK does not support digital signatures. FYI, Digital signatures are + + signed with private keys & verified with public keys. + + + + Like virtually all public key systems CS uses QPK to encrypt a random + + (private) session key, The session key is then used to encrypt the voice + + conversation. This is because public key systems are too slow for + + realtime voice. + + + + The private (session) key encryption algorithm uses a very long many + + bit linear feedback shift register LFSR pattern which is xored with + + the voice data. To greatly increase the security, only short (many + + times less than the LSFR total length) sequences of this LFSR are used + + between transmission of a new (really) random seed for the LFSR. Hence + + a random seed constantly restarts the LFSR at truly random points in + + the sequence. + + + + Well I'm sure I didn't do justice to the crypto stuff, but its a start. + + If you want to know more general info read the cryptography-faq. It + + can be found in news groups sci.crypt, talk.politics.crypto, + + sci.answers, news.answers, talk.answers. Another good faq is pgp-faq + + found in news groups alt.security.pgp, alt.answers. Once you have read + + these faqs you will have to consult the authors of CS for more + + specific info on the various crypto features of CS and QPK. + + + + 8. Is it really secure?, You, decide! + + + + Well the public keys system used by Call Security, QPK ( Quick Public + + Keys) by Dave Colston has survived peer review. This is good. + + + + Charlie Merritt did the single private key stuff. I described this + + algorithm briefly (from a phone conversation) in question 7. Maybe + + this needs further public review? + + + + Also we don't have the source code so its hard to check for trap doors. + + I don't know what their motivation for a trap door is however. They want + + to make money off this thing. + + + + Plus all the normal stuff needs to be considered, like did some one + + put a bug (transmitter) in you sound card microphone, did they break in + + and steal the private key off your harddrive/ floppy drive, etc... + + + + Well you decide if you think call security is secure. I think it is + + but what do I know? Only time will tell how secure CS really is. + + + + 9. Is it safe to give them my public key when i upgrade from shareware + + (512 bit key) to the registered version (1024 bit key)?, Yes, + + its only the public key! + + + + Yes, the authors only want half of your public key. This public key is + + then used to create a file which enables receiving encrypted voice + + with your larger key. Note: Non-registered versions work just fine + + with registered users with large keys. + + + + 10. How do I set up my sound card? + + + + Well if you have an original mono 8 bit sound blaster you do nothing. + + If you don't have a classic sound blaster then you should put you sound card + + in sound blaster (8 bit mono) emulation. Please send me email njj@mc.com on + + how you set up your sound card to work with CS. I will add the info to this + + faq. + + + + 10.1 How do I set up my Gravis Ultrasound? + + + + Ultrasound cards have two sound blaster emulators. Only the SBOS emulator + + works with Call Security. Don't use MEGAEM. + + + + Before you run Call Security "SECURITY.EXE" Just exit windows & type + + SBOS at the DOS prompt. You should here the words SBOS installed on + + your sound card speakers, plus you will see confirmation of SBOS + + loading on your computer screen. + + + + If SBOS doesn't work consult your ultrasound documentation. Or read + + the gravis faq found on the news group + + comp.sys.ibm.pc.soundcard. Other sights for gravis sound card info + + include: + + + + FTP Sites Archive Directories + + --------- ------------------- + + Main N.American.Site: archive.orst.edu pub/packages/gravis + + wuarchive.wustl.edu systems/ibmpc/ultrasound + + Main Asian Site: nctuccca.edu.tw PC/ultrasound + + Main European Site: src.doc.ic.ac.uk /packages/ultrasound + + Main Australian Site: ftp.mpx.com.au /ultrasound/general + + /ultrasound/submit + + South African Site: ftp.sun.ac.za pub/packages/ultrasound + + Submissions: archive.epas.utoronto.ca pub/pc/ultrasound/submit + + Newly Validated Files: archive.epas.utoronto.ca pub/pc/ultrasound + + + + Mirrors: garbo.uwasa.fi mirror/ultrasound + + ftp.st.nepean.uws.edu.au pc/ultrasound + + ftp.luth.se pub/msdos/ultrasound + + + + Gopher Sites Menu directory + + ------------ -------------- + + Main Site: src.doc.ic.ac.uk packages/ultrasound + + + + WWW Pages + + --------- + + Main Site: http://www.cs.utah.edu/~debry/gus.html + + + + Main European Site: http://src.doc.ic.ac.uk/packages/ultrasound/ + + Main Australian Site: http://ftp.mpx.com.au/archive/ultrasound/general/ + + http://ftp.mpx.com.au/archive/ultrasound/submit/ + + http://ftp.mpx.com.au/gravis.html + + + + Mirrors: + + http://www.st.nepean.uws.edu.au/pub/pc/ultrasound/ + + + + 11. My modem is full duplex why isn't Call Security? + + + + The simple answer is sound blasters (and virtually every other sound + + card known to the program authors) are not full duplex. You can't + + sample digital sound at the same time you are playing digital sound! + + + + But if the authors, Dave & Charlie start making money off Call Security + + maybe they will be motivated to do a version with 2 sound cards, one + + for record the other for playback. + + + + 12. Are there any bugs in the program? + + + + Well one very minor bug is the wrong help file (security.doc) pops up + + when you request help in the terminal session of the program. What you + + really want to see is the svterm.doc file when trying to figure out + + how to send/receive voice messages. As I stated before print the + + documentation files svterm.doc, securty.doc, & readme.1st before + + running the program. Remember the Call Security is not windows + + compatible, so you can't have help in one window and call security in + + the other window! + + + + Another feature I find annoying is that public key exchange is not + + built in to the voice session. Okay maybe public key exchange is not + + something you want to do for every call (to prevent forgery) but at + + least make it a non-default menu pick! The best work around is to pull + + a copy of DSZ or GSZ off one of the shareware sights. This will allow + + Secure Voice to perform file exchange. Then use DSZ to exchange public + + keys prior to running a voice session. + + + + 13. Where do I get DSZ or GSZ for doing Zmodem transfers with Call Security? + + + + I haven't tried personally tried DSZ or GSZ yet. But here is one FTP + + sight (the SIMTEL primary mirror sight) I downloaded DSZ from while + + writing this faq: + + + + FTP Location: oak.oakland.edu: /pub/msdos/zmodem + + dsz-read.me A 516 890115 Explains what DSZ program is + + dsz0920.zip B 91253 940930 X/Y/Zmodem protocol file transfer pgm + + txzm241.zip B 42734 941005 Texas Zmodem: Fast/free Zmodem prot. driver + + gsz0920.zip B 112428 940930 X/Y/ZMODEM driver with graphic file xfer + + + + For more info on shareware sights read the news group + + comp.archives.msdos.announce. Other SIMTEL mirror sights include: + + + + St. Louis, MO: wuarchive.wustl.edu (128.252.135.4) + + /systems/ibmpc/msdos + + Corvallis, OR: archive.orst.edu (128.193.2.13) + + /pub/mirrors/simtel/msdos + + Australia: archie.au (139.130.4.6) + + /micros/pc/oak + + England: src.doc.ic.ac.uk (146.169.2.10) + + /pub/packages/simtel + + Finland: ftp.funet.fi (128.214.248.6) + + /pub/msdos/SimTel + + France: ftp.ibp.fr (132.227.60.2) + + /pub/pc/SimTel/msdos + + Germany: ftp.uni-paderborn.de (131.234.2.32) + + /SimTel/msdos + + Hong Kong: ftp.cs.cuhk.hk (137.189.4.57) + + /pub/simtel/msdos + + Israel: ftp.technion.ac.il (132.68.1.10) + + /pub/unsupported/dos/simtel + + Poland: ftp.cyf-kr.edu.pl (149.156.1.8) + + /pub/mirror/msdos + + South Africa: ftp.sun.ac.za (146.232.212.21) + + /pub/simtel/msdos + + Sweden: ftp.sunet.se (130.238.127.3) + + /pub/pc/mirror/SimTel/msdos + + Switzerland: ftp.switch.ch (130.59.1.40) + + /mirror/msdos + + Taiwan: NCTUCCCA.edu.tw (140.111.1.10) + + /PC/simtel + + Thailand: ftp.nectec.or.th (192.150.251.33) + + /pub/mirrors/SimTel/msdos + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THERE IS A BODY ON THE INTERNET + + + + From Uncle Bob's Network News #103 + + + + There is a body on the Internet! + + + + At the annual meeting of the Radiological Society of America in Chicago + + on November 18, 1994, the National Library of Medicine unveiled its + + "Visible Man," a three-dimensional, computer-generated cybernetic body, + + which is now available on the Internet. "Visible Man" is an atlas of + + the human body, assembled digitally from thousands of x-ray, magnetic, + + and photographic images of cross sections of the body of Joseph Paul + + Jernigan, who was executed in Texas for murder, and who had willed his + + body to medical science. + + + + Using digitalized radiological data from the cadaver, researchers at the + + Heath Science Center of the University of Colorado, under a project funded + + by the NLM, compiled a virtual human body that can be viewed on a screen + + from any angle, dissected and reassembled by anatomy students, or used as + + a model to study the growth of cancer cells, for example. + + + + First, the real body was photographed with CT scans, magnetic resonance + + imaging, and conventional x-rays. Then it was embedded in gelatin, + + frozen, and sliced with a laser knife into more than 1,800 cardboard-thin + + cross-sections. One by one, the cross-sections were removed from the + + cadaver and digitally photographed. Thousands of pictures were entered + + into the computer. + + + + The main users are expected to be medical schools and researchers at large + + medical centers. There is no charge for the access but users must sign + + a licensing agreement with the NLM. The library has already heard from + + about 300 applicants, including brain surgeons, clothing designers, and + + traffic safety crash testers. According to NLM director Donald A. B. + + Lindburg, "People are awestruck by how detailed and good the images are." + + + + Don't expect to download "Visible Man" at home: the program is so complex + + it will require up to two weeks of Internet time to download and a + + capacity on the receiving computer of 15 gigabytes--or 15,000 megabytes. + + + + The project, costing $1.4 million, will continue next year with phase two: + + "Visible Woman." + + + + (compiled from news reports in The Richmond Times-Dispatch, The + + Washington Post, and The New York Times) + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +  + + + +Date: Thu, 19 Jan 1995 06:55:18 -0600 + +From: JAUC + +Subject: JAUC-File3 + + + + + + WINDOWS AND TCP/IP FOR INTERNET ACCESS + + + + By Harry M. Kriz (hmkriz@vt.edu) + + University Libraries + + Virginia Polytechnic Institute & State University + + Blacksburg, VA 24061-0434 + + http://learning.lib.vt.edu/authors/hmkriz.html + + + + In response to popular demand, I am publishing a new release of my paper + + on using Microsoft Windows to access Internet resources. Thanks to + + everyone who has e-mailed me and called me over the past year. I am + + delighted that the paper has been useful. I have been even more delighted + + to give permission for distributing copies at Internet workshops, and for + + copies to be posted on Internet servers. Perhaps this new release will + + find it's way into the hands of all those folks who are getting their + + first computers this Christmas. I hope this paper can play some small + + part in getting them over the rough spots. + + + + A plain text version of this complete document is available by anonymous + + ftp from: nebula.lib.vt.edu in directory /pub/windows/winsock + + under filename wtcpip06.asc + + + + A hypertext version is available at: + + http://learning.lib.vt.edu/wintcpip/wintcpip.html + + + + -------- + + ABSTRACT + + + + Internet, the global network of computer networks, is arousing enormous + + popular interest. In part this interest is being driven by the + + availability of free or inexpensive shareware software for Microsoft + + Windows. It is now technically simple for a personal computer to become + + a host on the Internet. The casual user can find, retrieve, and view + + information gathered from around the world without having to learn + + complicated computer commands. In this paper I describe the principal + + functions and services available via the Internet. Then I outline the + + technical background and terminology needed by the beginner who wants to + + make his PC a host on the Internet. Finally, I describe several Windows + + software packages and programs that facilitate using Internet services. + + All the software is freely available over the Internet. + + + + ------------------- + + PUBLICATION HISTORY + + + + The most recent plain text (ascii) version of this paper is always + + available by anonymous FTP from nebula.lib.vt.edu in directory + + /pub/windows/winsock under the name wtcpip**.asc. For example, this + + version is available as wtcpip06.asc. A hypertext version of this paper + + that is maintained on a more regular basis is available through the + + World Wide Web at: http://learning.lib.vt.edu/wintcpip/wintcpip.html + + + + The first version of this paper was released via Internet news and BITNET + + listserv on November 15, 1993. Revised and expanded versions were released + + on January 16, February 9, and March 21, 1994. A version was published + + by O'Reilly Associates in the March 14, 1994 issue of the "Global Network + + Navigator Toolkit," which was then accessible at: + + http://nearnet.gnn.com/GNN-ORA.html. + + + + Release 05 (June 21, 1994) was a major revision that was published by the + + Virginia Tech College of Engineering on the CD-ROM "1994-95 VT Engineering + + Tools." A print copy of Release 05 was also published by the Computing and + + Systems Technology Division of the American Institute of Chemical + + Engineers in "CAST Communications," Vol. 17, No. 2, pp. 6-14 (Summer 1994). + + + + ------------ + + INTRODUCTION + + + + Internet, the world-wide network of computer networks, has captured the + + imagination of the general public. Eighteen months ago, the Internet was + + barely mentioned in the popular computing magazines. Now it is the topic + + of articles in national news magazines, local newspapers, and grocery-store + + tabloids. + + + + Awareness of the Internet has spread primarily by word of mouth. Computer + + pundits were not discussing the Internet in Spring 1993 when I first began + + investigating the Internet in my work as a librarian. Indeed, most pundits + + seem to have acquired Internet access only in the Spring of 1994. Thus, + + computer magazines have not been helpful for those wishing to learn about + + the Internet. + + + + Now, in December 1994, there is something of a feeding frenzy of interest + + in the Internet. Bookstores are flooded with guides to the Internet. + + Software vendors are rushing to market with collections of software + + designed for navigating the resources on the Internet. It is almost as if + + the crest of the Internet wave has passed. Pundits who did not have access + + to the Internet last year are already writing negative opinions about the + + difficulties of navigating Internet resources, and about the uselessness + + of those resources. + + + + Complaints about the Internet are many. Certainly it can be difficult to + + find information and resources on the Internet. A great deal of + + information is unvalidated, non-authoritative, or otherwise questionable. + + Some resources should not be available to children. Some would argue that + + some of the information should not be distributed even to adults. + + + + It is important to remember that the Internet is not a service. Rather, + + it is a means of gaining access to services and of retrieving information + + and other objects that can be represented electronically. In considering + + complaints about the Internet, one might draw an analogy between the + + Internet and New York City. + + + + New York is big, complicated, and disorganized. The city's myriad resources + + can be hard to find. Some of what happens or what is available in New York + + should not be seen by children. For those wishing to navigate the + + complexity of New York, there are guidebooks, phone directories, magazine + + articles, and individuals with expert knowledge about areas of particular + + interest. One can navigate the complexity of the city by subway, taxi, + + and bus. One can even hire a private guide to conduct a tour of the city. + + + + The Internet can be compared to the streets of New York City. The services + + available on the Internet have their analogies in the city's libraries, + + department stores, bookshops, art galleries, street vendors, and street- + + corner zealots passing out literature or lecturing the passing crowds. It + + is safe to assume that somewhere on the streets of the city there will be + + found information and services of interest to almost anyone. However, + + finding that information might take some time for someone who is new to + + the city and its resources. Similarly, somewhere on the Internet there + + also will be found information and services of interest to almost anyone. + + + + Traveling on the Internet requires only a few basic tools. First is a + + computer with a network connection to the Internet. A direct connection + + using a PC equipped with a network interface card that interfaces with a + + local area network linked to the Internet is common at universities, and + + becoming more common in businesses. If a direct network connection is not + + available, an alternative is to connect to the Internet through the + + computer's serial port. This involves a telephone connection to a terminal + + server that offers SLIP (Serial Line Internet Protocol) or PPP (Point + + to Point Protocol) service. Any of these connections can be used with a + + variety of commercial or shareware software to make your personal computer + + a host on the Internet and to access services and information from the + + entire earth. This paper will emphasize the use of freeware and shareware + + versions of software running under Microsoft Windows. + + + + ----------------- + + INTERNET SERVICES + + + + The Internet services of interest to most people consist of four basic + + functions. These are electronic mail (e-mail), Internet news, file + + transfer between computers (FTP), and remote login to another computer + + (telnet). Access systems like Gopher and World Wide Web now supplement + + these basic Internet functions by assisting the user in searching for + + and retrieving relevant information in a user-friendly manner. + + + + Until recently, Internet functions were accessible primarily through + + character-based interfaces using a variety of complex command sets. Thus, + + until recently, best-selling books on the Internet contained page after + + page of screen displays or command sequences captured from UNIX-based + + systems executing basic Internet functions. + + + + Affordable Internet software for Windows first became available in Spring + + 1993. Prior to that time, Windows users were dependent for Internet access + + on expensive, proprietary, commercial products in which each vendor's + + offerings were mutually incompatible with every other vendor's offerings. + + Publication of the Winsock applications programming interface provided a + + way for individual client software (such as a telnet or FTP client) to be + + compatible with every vendor's networking products. As a result, beginning + + in 1993 there was a blossoming of freeware, shareware, and commercial + + Internet software for Windows. + + + + Of special interest has been the development of Windows interfaces to the + + World Wide Web. Mosaic is the best known Web browser. Other choices + + include Cello, Netscape, and WinWeb. The Web was developed by the high + + energy physics community to distribute technical papers and other forms + + of data. WWW is now widely viewed as a means for educators, businesses, + + and hobbyists to distribute multimedia information to a world-wide + + audience. Graphical WWW clients enable publication of data over the + + Internet in a manner which allows the user to view text, color graphics, + + sound, and video in a manner that approaches the usability, and surpasses + + the functionality, of a printed magazine. Those interested in publishing + + WWW documents may find it useful to read my paper "Teaching and + + Publishing in the World Wide Web." A plain text version is available by + + anonymous FTP from: nebula.lib.vt.edu in directory /pub/www under the + + name websrv01.asc. A hypertext version is available through the Web at + + http:/learning.lib.vt.edu/webserv/webserv.html. + + + + ****** + + E-MAIL + + Electronic mail is probably the most widely used Internet function. A + + commonly used configuration requires that a user have an account on a + + POP (Post Office Protocol) mail server. The e-mail client software + + accesses the server and downloads any incoming messages to the user's + + PC. Mail composed at the user's PC is transmitted to the Internet through + + the mail server. + + + + ************* + + INTERNET NEWS + + Internet news, also referred to as USENET news, is a conferencing system + + made up of thousands of topical conferences known as news groups. Those + + familiar with electronic bulletin board systems will compare Internet + + news to echo conferences. Others will draw an analogy to mailing lists + + such as listserv on BITNET. The user reads the news by using client + + software to subscribe to a selection of news groups. When the client + + software accesses an NNTP (Network News Transfer Protocol) server, the + + server downloads to the client a list of subjects for all unread messages + + stored on the server for the selected news group. The user can then select + + any message for reading, post a response to the message to the group, or + + reply directly to the original poster of the message. The client software + + maintains on the user's PC a list of all available groups on the server, + + along with records of which messages have been read or skipped over. + + Only the messages selected for reading are actually downloaded to the + + user's PC. + + + + *** + + FTP + + FTP (File Transfer Protocol) allows the transfer of files between any two + + computers of any type. Files can be transferred from PC to PC, PC to + + mainframe, PC to Mac, PC to UNIX machine, and vice versa. Any kind of + + computer file, whether it be a text file or a binary file representing + + software, graphics images, or sounds, can be transferred. Of course, + + whether the file is usable on the receiving machine depends on the nature + + of the file and the availability of software to make use of the file. + + + + ****** + + TELNET + + Telnet enables the user of a PC to login to a host computer at another + + site on the Internet. The user's PC then acts as a dumb terminal attached + + to the remote host. Such access usually requires that the user have an + + account on the remote host. For instance, a student or faculty member at + + one university might have an account on a computer located at another + + university. An increasing number of commercial services are becoming + + available via telnet, including services such as the Dow Jones News + + Service and the Lexis/Nexis service. In addition, some services are + + available without charge. For example, hundreds of libraries in all parts + + of the world allow free remote access to their computerized catalogs and + + to some specialized databases. + + + + ****** + + GOPHER + + Gopher is a system that enables the user to find files and other Internet + + services by navigating a system of text menus and submenus. As a corollary, + + it provides a means for information providers to publish information on + + the Internet in a discoverable manner. Prior to the development of Gopher + + at the University of Minnesota, information on the Internet was located + + by asking friends and strangers where to look. + + + + The first step in using a Gopher client is to "point" the client at the + + address of a known Gopher server. The client then retrieves that Gopher's + + menu of topics. Typically, many of the topics on a Gopher menu are + + pointers to yet other menu items on other Gopher servers. The fact that + + items in the sequence of selections might come from different Gopher + + servers in widely scattered parts of the world is transparent to the user. + + The Gopher client software presents the many different Gopher servers + + as if they represented a single application on a single machine. + + Navigating such menus can lead the user to skip from one Gopher server to + + another, literally retrieving information from servers scattered around + + the world in just a few minutes. + + + + Items on Gopher menus can be of many different data types in addition to + + menus listing choices of topics. When an item such as a text, graphics, + + or sound file is selected, the Gopher client transfers the file to the + + user's PC. Then, as an option, it may load the file into an appropriate + + "viewer" selected by the user. A simple text file could be loaded into + + Windows Notepad. A graphics file in GIF or JPEG format might be loaded + + into LVIEW, a popular freeware graphics viewer for Windows. A binary + + program file would simply be downloaded into a designated directory for + + use at some other time. Finding relevant Gopher menu items is facilitated + + through the use of Veronica, which is a database of the text of Gopher + + menus. Most Gopher servers will include Veronica access as a menu + + selection. + + + + ************** + + WORLD WIDE WEB + + World Wide Web (WWW) is a system that enables users to find and retrieve + + information by navigating a system of hypertext documents. In a hypertext + + document, selecting a highlighted word or phrase causes a new document to + + be retrieved and displayed. Thus, WWW leads the user to skip from one + + document to another, retrieving information from servers scattered around + + the world. + + + + Viewing a WWW document with a Windows graphical client such as Cello, + + Mosaic, Netscape, or WinWeb is similar to reading a magazine. Information + + is displayed with typographic fonts and color graphics. Unlike a magazine, + + the static display can be supplemented by sound and video clips that are + + played by clicking an icon embedded in the document. Clicking on a + + highlighted word or phrase in the document may cause the reader to skip to + + another part of the displayed document, or it may cause yet another + + document to be retrieved. + + + + + + ----------------- + + TECHNICAL DETAILS + + + + It is helpful to know some Internet terminology when working with your + + local network specialist or Internet service provider to make your PC a + + host on the Internet. The two common modes of Internet access are through a + + direct network connection or through a serial connection to a SLIP or PPP + + server. + + + + A direct network connection involves installing a network interface card + + (NIC) in your PC. Most likely this will be an ethernet card. This card + + in turn is connected to your organization's local area network. Wiring + + usually consists of coaxial cable (as in thin-wire ethernet) or twisted + + pair telephone wiring (as in 10Base-T ethernet). The local network in + + turn must be connected to the Internet, and it must be capable of handling + + TCP/IP data packets. + + + + TCP/IP (Transmission Control Protocol/Internet Protocol) is the method by + + which data on the Internet is divided into packets of bytes. Each packet + + is delimited with header information that includes the destination address + + where the packet is to be routed when it is transmitted over the Internet. + + The local network and your PC may also be using other network protocols + + simultaneously with TCP/IP. For instance, your PC may already be connected + + to a network using Novell, LANtastic, or Windows for Workgroups network + + protocols. + + + + *************** + + SOFTWARE LAYERS + + Several layers of software are involved in implementing a direct network + + connection. A commonly used method is to first install a piece of software + + called a packet driver that deals directly with the network interface + + card. This is loaded under DOS from the AUTOEXEC.BAT file as a TSR + + (terminate and stay resident) program. A packet driver should be included + + with the software that comes with the card. If the manufacturer of the card + + does not supply a packet driver, free packet drivers are available in the + + Crynwr Packet Driver Collection as described at the end of this document. + + + + The next layer of software is the TCP/IP driver, which can be implemented + + in a variety of ways. Until recently, this was often another DOS TSR + + program loaded from the AUTOEXEC.BAT file. Increasingly this layer of + + software is implemented as a Windows dynamic link library (DLL) or virtual + + device driver (VxD). The DLL and VxD implementations do not require any + + modification of the boot files on the PC. + + + + The TCP/IP driver that implements TCP/IP functionality for the system is + + referred to as the TCP/IP protocol stack. The driver may be written to work + + with a specific network card, or it may be written to interface with a + + packet driver. In the latter case, a single TCP/IP driver can be used with + + any network card for which an associated packet driver is available. Thus, + + the packet driver specification eliminates the need for software vendors + + to customize their TCP/IP protocol stack for every network card with which + + it is used. When using a packet driver with Windows applications, another + + DOS TSR referred to as a virtual packet driver may be required to + + interface between the Windows-based TCP/IP protocol stack and the + + DOS-based packet driver. + + + + When a direct network connection is not available, Internet TCP/IP software + + can be used over serial lines to connect to a SLIP (Serial Line Internet + + Protocol) or PPP (Point to Point Protocol) server that provides a + + connection to the Internet. SLIP and PPP do not require the software + + drivers that are necessary with a direct network connection. The Trumpet + + Winsock shareware package to be described later has all SLIP and PPP + + functions included in the TCP/IP driver, which is configured through a + + Windows dialog box. + + + + SLIP and PPP are less transparent to the user than a direct network + + connection. The user first obtains an account on a SLIP or PPP server. + + Connecting to the Internet involves dialing the server using normal + + serial communications software and establishing a SLIP or PPP session. + + Once the session is established, TCP/IP software running on the PC can be + + used just as if the PC was connected directly to the Internet through a + + network card. SLIP and PPP users are well advised to settle for nothing + + less than transmission at 14,400 bits per second. World Wide Web + + especially transmits a great deal of data when images or sound are + + involved. Slow modems and slow connections will discourage anyone but the + + most dedicated user from exploring the possibilities of the Internet. + + + + TCP/IP client applications work at the top of the layers of software so + + far described. Client software runs independently of the type of connection + + to the Internet. TCP/IP applications frequently are referred to as clients + + because they access a corresponding server (a daemon in UNIX terminology) + + on another machine. An FTP client, for instance, is the application on the + + user's machine that accesses the FTP server running on a host computer + + located elsewhere on the Internet. + + + + Until recently, each TCP/IP client had to be written to interface with a + + particular vendor's TCP/IP protocol stack. Clients that worked with one + + vendor's TCP/IP driver would not work with a driver from another vendor. + + This restriction was eliminated with the development of the Windows + + Sockets Application Programming Interface, otherwise known as the Winsock + + API, or more simply Winsock. Winsock works in the layer between the + + TCP/IP client and the TCP/IP protocol stack. + + + +Date: Fri, 20 Jan 1995 06:38:14 -0600 + +From: Malik Al-Rashim + +Subject: JAUC-File4 + + + + + + ------- + + WINSOCK + + + + "Winsock" is the buzzword that dominates discussion about TCP/IPand Windows. + + All of the software to be described here is based on Winsock. The + + implementation of Winsock is transparent to the user, but it is helpful + + for the end-user to know how it supports Windows applications. + + + + Winsock (short for Windows sockets) is a technical specification that + + defines a standard interface between a Windows TCP/IP client application + + (such as an FTP client or a Gopher client) and the underlying TCP/IP + + protocol stack. The nomenclature is based on the Sockets applications + + programming interface model used in Berkeley UNIX for communications + + between programs. + + + + When you launch a Winsock compliant client like WSGopher, it calls + + procedures from the WINSOCK.DLL dynamic link library. These procedures in + + turn invoke procedures in the drivers supplied with the TCP/IP protocol + + stack. As described earlier, the TCP/IP driver communicates with the + + computer's ethernet card through the packet driver. + + + + The WINSOCK.DLL file is not a generic file that can be used on any system. + + Each vendor of a TCP/IP protocol stack supplies a proprietary WINSOCK.DLL + + that works only with that vendor's TCP/IP stack. + + + + The advantage of Winsock to the developer of a client is that the + + application will work with any vendor's Winsock implementation. Thus, the + + developer of an application such as a Gopher client has to understand the + + Winsock interface, but he does not have to know the details of each + + vendor's TCP/IP protocol stack in order to make his client application + + compatible with that stack. Winsock also eliminates the need for an + + application developer to include a custom TCP/IP protocol stack within the + + application program itself. This was a common means of implementing TCP/IP + + clients under DOS, and some early Windows TCP/IP clients also used this + + method. The use of protocol stacks internal to the client results in + + conflicts when two clients try to access the single packet driver that is + + communicating with the network card. The ability to create applications + + compatible with any vendor's Winsock compliant protocol stack resulted + + in a blossoming of Winsock compliant shareware applications beginning in + + Summer 1993. + + + + The Winsock standard also offers advantages to the end-user. One advantage + + is that several Winsock applications from different vendors can be used + + simultaneously. This is a marked improvement over earlier packet driver + + applications in which each application contained a built-in TCP/IP stack. + + Such applications cannot share the packet driver except through the added + + complexity of a packet multiplexer such as PKTMUX. A second advantage to + + the user is that any Winsock compliant application will run with any + + vendor's TCP/IP protocol stack and accompanying WINSOCK.DLL. + + + + Unfortunately, some commercial vendors of TCP/IP clients are not yet + + taking advantage of Winsock capabilities. There are still TCP/IP clients + + that require dedicated access to the packet driver, and there are clients + + that will run only with the TCP/IP protocol stack supplied by one + + particular vendor. Fortunately, the trend is for all commercial vendors + + to make their applications more usable and portable through the use of the + + Winsock standard. + + + + --------------------- + + SOFTWARE DESCRIPTIONS + + + + Once the required networking hardware is installed and an IP address is + + assigned, or once an account is obtained on a SLIP or PPP server, the user + + needs to install a TCP/IP protocol stack and a selection of TCP/IP clients. + + The remainder of this paper describes such software. + + + + For each application, I briefly outline the installation procedures. I do + + this primarily to illustrate the simplicity of using Windows for Internet + + access. Please be sure to read any text files included with each package + + in order to complete the configuration and to learn about all functions + + of the software. + + + + I have installed all the software described here for many of my colleagues + + in the Virginia Tech Libraries. With some practice I have found that I can + + install a complete suite of TCP/IP applications in about half an hour. + + Some individuals who read the previous versions of this document were up + + and running in less than an hour after obtaining the software. They + + expressed their delight at the ease of networking with Windows. + + + + ********************************** + + DISCLAIMERS AND LIMITED WARRANTIES + + + + I am not an expert on anything. I am just an enthusiastic end-user of these + + products in my daily work. I have used all of the client software with a + + direct connection to an ethernet network using a Western Digital or SMC + + ethernet card with the Trumpet Winsock shareware TCP/IP protocol stack + + and WINSOCK.DLL. In addition, I have used most of the clients with FTP + + Software's commercial package PC/TCP version 2.2. In the latter case I + + obtained the most recent version of FTP Software's WINSOCK.DLL file by + + anonymous FTP from ftp.ftp.com in directory /support/ftpsoft/winsock under + + the name winsock.exe (a self-extracting ZIP file)(November 16, 1994 + + | 46,375 bytes). The Trumpet and FTP products both use a packet driver + + interface to the network card. I have also used most of the clients on a + + Windows for Workgroups network using Microsoft's add-on TCP/IP package. + + This package is available by anonymous FTP from ftp.microsoft.com in the + + directory /peropsys/windows/public/tcpip under the filename WFWT32.EXE + + (November 29, 1994 | 680,621 bytes), a self-extracting archive file. + + I also have used most of the client software through a SLIP server using + + the Trumpet Winsock. Both a dialup connection to the SLIP server and a + + modemless connection through an IBM/ROLM digital switch were used at + + various times. + + + + I have no experience with PPP connections. + + + + As discussed above, the client software described here should run with any + + TCP/IP protocol stack that offers Winsock support. If your PC is already + + using a network operating system that does not include Winsock support, + + you should check with your vendor to find out if Winsock support is + + available. If Winsock support is not available from your vendor, then it + + may be possible to install the Trumpet Winsock TCP/IP protocol stack over + + your existing network drivers using a small program known as a packet + + driver shim. Instructions for this configuration are included in the + + Trumpet Winsock documentation. + + + + In the following descriptions, information about version numbers, file + + sizes, and dates was verified on December 20, 1994. + + + + + + *************** + + TRUMPET WINSOCK (TCP/IP protocol stack and basic clients, ) + + (including telnet, ping, and Archie ) + + + + Comment: You need this package (or some other TCP/IP protocol stack that + + supports Winsock) before you can use any of the client software described + + later. Trumpet Winsock does not require any additional network software. + + Its TCP/IP functions can be installed over other network software such as + + Novell or Windows for Workgroups using a packet driver shim. Instructions + + for such installations are included in the ZIP file. + + + + Author: Peter Tattam, Trumpet Software International + + Fee: $25 shareware fee. + + Version: 2.0 Revision B + + File name: twsk20b.zip (November 3, 1994 | 179,015 bytes) + + (includes the TCP/IP protocol stack) + + winapps2.zip (November 29, 1994 | 162,023 bytes) + + (includes basic clients) + + + + Available by anonymous FTP from: + + ftp.trumpet.com.au in directory /ftp/pub/winsock + + or by Gopher from + + gopher.trumpet.com.au under menu item winsock. + + + + The Australian hosts can be slow. An alternative gopher site is + + biochemistry.bioc.cwru.edu under the menu item CWRU Biochemistry FTP + + Archive/trumpwsk. You can also FTP to this address and access the + + directory /gopher/pub/trumpwsk. However, only one anonymous FTP user is + + permitted weekdays during normal working hours from 9:00 AM to 5:00 PM + + local time. Note that this site may not contain the latest version of the + + files. For example, at this writing it did not contain the most recent + + winapps2.zip file. + + + + Installation: + + + + 1.) Create directory C:\TRUMPWSK and unzip TWSK20B.ZIP and + + WINAPPS2.ZIP into this directory. + + + + 2.) Install software drivers. + + + + Ethernet network: + + + + a.) Install packet driver for your ethernet card. + + The entry in my AUTOEXEC.BAT file is: + + C:\ETHERNET\8003PKDR.EXE /B:240 /R:D000 /I:10 /E:61 + + b.) Install WINPKT.COM virtual packet driver included in + + TWSK20B.ZIP. The entry in my AUTOEXEC.BAT file is: + + C:\TRUMPWSK\WINPKT.COM 0x61 + + + + SLIP or PPP: + + + + No special drivers are needed because SLIP and PPP support + + are built into the Trumpet Winsock TCPMAN.EXE program. + + + + 3.) In Program Manager, create a program group named Network. + + Use File Manager to drag and drop the EXE files in + + C:\TRUMPWSK into the Network program group. + + + + 4.) Edit the PATH statement in AUTOEXEC.BAT to include + + C:\TRUMPWSK. This enables Winsock applications to find + + WINSOCK.DLL when they are launched. + + + + 5.) Reboot the computer and start Windows. + + + + 6.) Launch TCPMAN from the Network program group. + + Select Setup on the menu bar. Enter your IP address, + + gateway address, and nameserver address as assigned by + + your local network administrator. (Some SLIP and PPP + + servers, as well as some direct network connections, do + + not use permanent IP addresses. Instead, the server + + assigns a temporary IP address at the start of each + + session. If the server provides a bootp service, then + + enter the text "bootp" (without the quotes) in place of + + the IP address. On some servers it may be necessary to + + enter the dummy IP address 0.0.0.0. Some servers report + + the assigned IP address during session startup, requiring + + the user to manually enter the assigned address in the + + Setup dialog box before proceeding into SLIP mode.) If you + + are using ethernet, enter the software interrupt used by + + the packet driver. If you are using SLIP or PPP, check the + + appropriate box and enter the appropriate COM port number + + in the SLIP port box. Exit from TCPMAN. The file + + TRUMPWSK.INI will be created in the C:\TRUMPWSK directory. + + + + 7.) Launch any Winsock compliant application. TCPMAN.EXE will + + start automatically if it is not already running. (If you + + are using SLIP or PPP, you must first connect to the + + server and start a session. This can be done with the + + dialing function in TCPMAN.) Several clients are included + + with the Trumpet Winsock, including TRMPTEL.EXE version + + 0.07 for telnet, WINARCH.EXE for searching Archie + + databases, and PINGW.EXE to ping another machine on the + + network. PINGW provides the simplest means of verifying + + that you have a network connection. Launch PINGW and enter + + the name of an Internet host at the prompt. For example, + + you might try to PING ftp.trumpet.com.au. If your + + connection is working, and if the host is operating, you + + will receive a response from the remote host. + + + + Note: The WINSOCK.DLL file for the Trumpet Winsock remains in the + + C:\TRUMPWSK directory. Some vendors may require that their WINSOCK.DLL be + + copied to the C:\WINDOWS directory. If you have used Winsock software + + from another vendor, but now want to try the Trumpet Winsock, be sure to + + remove the other vendor's WINSOCK.DLL so that it will not interfere with + + the Trumpet Winsock implementation. + + + + Tip: The WINARCH client for Archie searching that is supplied in + + WINAPPS2.ZIP defaults to searching the Archie server at archie.au. You can + + access a different Archie server by using a command line argument. For + + instance, to use the Archie server run by AT&T, use the command line + + winarch.exe -archie=ds.internic.net. + + + + SLIP or PPP usage: Trumpet Winsock includes a simple dialing function. + + You can connect to your server by manually issuing the dialing commands. + + You can also write a script that will dial and start your session + + automatically. + + + + PITFALL: After dialing with TCPMAN.EXE and establishing the SLIP or PPP + + session, you must press the key to escape from dialing mode and to + + re-enable the TCP/IP mode in TCPMAN.EXE. + + + + You may want to dial your server automatically without writing a custom + + dialing script for TCPMAN.EXE. A utility named DIALER can be set up to + + automatically issue the commands and passwords needed to start a session + + on your server. DIALER version 2.0A is available by anonymous FTP from: + + + + ftp.demon.co.uk + + /pub/ibmpc/windows/utilities/dialexe.zip + + (May 27, 1994 | 31,072 bytes) + + + + + + ******* + + WSGOPHER (Gopher client) + + + + Comment: A fast client with a useful system for saving bookmarks + + in a subject classified arrangement and a good help system. + + + + Author: Dave Brooks + + License: Free + + Version: 1.2 + + File name: wsg-12.exe (December 13, 1994 | 367,860 bytes) + + Available by anonymous FTP from: + + dewey.tis.inel.gov in directory /pub/wsgopher + + + + Installation: + + + + 1.) Create the directory C:\WSGOPHER and copy the file + + WSG-12.EXE to this directory. This file is a self- + + extracting ZIP file. + + 2.) Execute WSG-12.EXE. The files will be extracted to the + + directory. + + 3.) Create a new program item in the Network program group for + + the program C:\WSGOPHER\WSGOPHER.EXE. + + 4.) Launch WSGopher and read the Help file. + + 5.) Select the Configuration menu and set the various + + parameters and options as desired. The WSGOPHER.INI file + + and bookmark files are kept in the C:\WSGOPHER directory. + + + + ******************* + + TRUMPET FOR WINDOWS (Internet news reader and POP mail client) + + + + Comment: To read Internet news, you need access to an NNTP(Network News + + Transfer Protocol) server. To use the mail functions, you need an account + + on a POP (Post Office Protocol) mail server. (I have not tested the mail + + functions in this application because I prefer to use PC Eudora for mail.) + + + + Author: Peter Tattam, Trumpet Software International + + Fee: $40.00 shareware fee. TSI has extended the free + + trial period until the final release of version + + 1.0B, which is in beta testing at this time. + + Version: 1.0 Revision A + + File name: wtwsk10a.zip (August 28, 1993 | 167,601 bytes) + + + + Available by anonymous FTP from: + + ftp.trumpet.com.au in directory /ftp/pub/wintrump + + or by Gopher from gopher.trumpet.com.au under menu item wintrump. + + + + Installation: + + 1.) Create the directory C:\WINTRUMP and unzip WTWSK10A.ZIP + + into this directory. + + 2.) Create a new program item in the Network program group for + + the program C:\WINTRUMP\WT_WSK.EXE. + + 3.) Launch the program. + + 4.) Supply the address and other information in the dialog + + boxes for the menu selections File Setup and File Network + + Setup. NEWS.PRM and other configuration files will be + + created and stored in C:\WINTRUMP. + + + + PITFALL: The list of available news groups on your news server is stored + + by Trumpet in the file NEWS.GRP. At times, Trumpet fails to fully update + + this file as new groups become available from the news server. You can + + force Trumpet to create a new and complete list of available groups by + + erasing NEWS.GRP before starting Trumpet. + + + + + + ****************** + + EUDORA FOR WINDOWS (full featured mail client) + + + + Comment: You will need an account on a POP mail server to send and receive + + mail at your PC. QUALCOMM sells a commercial version of Eudora for both + + Windows and the Macintosh. + + + + Author: Jeff Beckley, Jeff Gehlhaar, and Mark Erikson, + + QUALCOMM, Inc. + + License: Shareware version is free. The author, Jeff Beckley, + + requests that you send him a postcard at QUALCOMM, + + Inc., 6455 Lusk Blvd., San Diego, CA 92121-2779 USA + + if you find the program useful. Information about + + the commercial version is available through + + QUALCOMM's QUEST group World Wide Web page at + + http://www.qualcomm.com/quest/QuestMain.html or from + + QUALCOMM's FTP server at ftp.qualcomm.com in + + directory /quest/eudora/windows. Questions about + + Eudora can be sent by e-mail to + + eudora-sales@qualcomm.com + + Version: Shareware: 1.4.4 + + File name: eudor144.exe (December 7, 1994 | 292,942 bytes) + + (self extracting archive file) + + + + Available by anonymous FTP from: + + ftp.qualcomm.com in directory /quest/windows/eudora/1.4 + + + + Installation: + + 1.) Copy the file EUDOR144.EXE to the directory C:\EUDORA. + + 2.) Execute EUDOR144.EXE to unarchive the program files. + + 3.) Create a new program item in the Network program group for + + the program C:\EUDORA\WEUDORA.EXE. + + 4.) Launch the program. + + 5.) Select Special Configuration from the menu bar and supply + + the required information. + + 6.) Select Special Switches and set characteristics as + + desired. + + 7.) Create mailboxes and nicknames to taste. + + 8.) The file EUDORA.INI and other configuration files will be + + created in the C:\EDUORA directory. + + + + ******* + + WS_FTP (FTP client) + + WS_PING (ping client) + + + + Author: John Junod + + + + License: Free to individuals for any non-commercial use and + + for any U. S. Government Organization. Others should + + contact Ipswitch, Inc., 669 Main Street, Wakefield, + + MA, 01880, (617)246-1150, info@ipswitch.com. + + + + Version: 94.10.18 (WS_FTP) + + 94.10.20 (WS_PING) + + + + File names: ws_ftp.zip (October 20, 1994 | 113,252 bytes) + + ws_ping.zip (October 21, 1994 | 60,496 bytes) + + + + Available by anonymous FTP from: + + ftp.usma.edu in directory /pub/msdos/winsock.files + + + + Installation: + + 1.) Create the directory C:\WS_. + + 2.) Unzip WS_FTP.ZIP into this directory. + + 3.) Unzip the file WS_PING.EXE from its ZIP file into this + + directory also. (Full source code for WS_PING is included + + in the ZIP file with the name WSPI_SRC.ZIP. Source code + + for the current version of WS_FTP is not distributed. + + However, source code for the 93-12-05 version of WS_FTP + + can be downloaded from directory /pub/msdos/winsock.files + + under the name ws_ftp_s.zip.) + + 4.) Create new program items in the Network program group for + + the programs C:\WS_\WS_FTP.EXE and C:\WS_\WS_PING.EXE. + + 5.) Launch the programs. + + 6.) The WS_FTP.INI file remains in the C:\WS_ directory. A + + file named WINSOCK.INI is created by WS_PING in the + + C:\WINDOWS directory. + + + + + + ***** + + CELLO (World Wide Web browser) + + + + Comment: Despite its age, Cello version 1.01a performs well. It continues + + to be more stable than Mosaic, and it is the best client for printing. + + It includes a useful Help system. Configuration is done from within the + + application, not by directly editing the CELLO.INI file. Unfortunately, + + Cello does not understand forms. Users of Diamond Stealth video cards + + report problems with the mouse cursor, which virtually disappears while + + the mouse is moving. The listserv CELLO-L is busy with messages about + + CELLO development and about shareware for creating HTML documents for use + + on Web servers. Instructions for subscribing to CELLO-L are included in + + the Cello Help file. Version 2.0 is now in the hands of alpha testers. + + + + Author: Thomas R. Bruce + + License: Free + + Version: 1.01a + + File name: cello.zip (March 17, 1994 | 328,429 bytes) + + Available by anonymous FTP from: + + ftp.law.cornell.edu in directory /pub/LII/Cello + + + + Installation: + + 1.) Create the directory C:\CELLO and unzip CELLO.ZIP into + + this directory. + + 2.) Create a new program item in the Network program group for + + the program C:\CELLO\CELLO.EXE. + + 3.) Launch the program. + + + + + + *********** + + NCSA MOSAIC for Microsoft Windows (World Wide Web browser) + + + + Comment: Users should note the alpha version designation and use caution + + about saving work in any other running applications before launching + + Mosaic. As in previous versions over the past year, simply launching and + + then exiting from Mosaic permanently reduces by some 3 percentage points + + the Windows user.exe resources on my machine. Launching Mosaic and exiting + + several times can lead to conditions that require you to restart Windows. + + However, Mosaic's previous problem of overwriting text when displaying + + large files seems to be fixed in this version. + + + + Mosaic is a 32-bit application that will run under Windows NT, Microsoft's + + advanced workstation operating system. Most users will be using Windows 3.1 + + or Windows for Workgroups, which are 16-bit applications. To use Mosaic + + with these systems, you must first install Win32s version 1.20 with OLE or + + later. This addition to the Windows operating system enables current + + versions of Windows to run 32-bit code that is not Windows NT specific. + + + + NCSA recommends a 33MHz 486 with 8MB of RAM for running this version. + + + + Authors: NCSA (National Center for SuperComputing + + Applications) + + License: Free + + Version: 2.0.0a8 + + File name: mos20a8.exe (December 20, 1994 | 955,546 bytes) + + w32sole.exe (December 20, 1994 | 2,240,650 bytes) + + + + Available by anonymous FTP from: + + ftp.ncsa.uiuc.edu in directory /Web/Mosaic/Windows + + + + Installation: + + 1.) Copy W32SOLE.EXE to a temporary directory and execute the + + program. This will extract the two component files + + INSTALL.BAT and WIN32DSK.EXE. The latter is another self + + extracting archive file. + + 2.) Execute INSTALL.BAT. + + (This batch file issues the command + + WIN32DSK.EXE -d + + to extract the component files into the subdirectories + + DISK1, DISK2, and DISK3. These subdirectories will be + + created below the temporary directory containing + + INSTALL.BAT.) + + 3.) Change to the DISK1 subdirectory and execute SETUP.EXE. + + This will install Win32s version 1.20 with OLE. Many of + + the files will be installed in the directory + + C:\WINDOWS\SYSTEM\WIN32S. If you have an older version of + + WIN32S already installed, it will be removed. You should + + allow installation of the game FreeCell in order to test + + that Win32s is properly installed on your machine. Once + + this is verified, you can erase the files and directories + + in the temporary installation directory. + + 4.) Copy MOS20A8.EXE to the temporary installation directory. + + Remember to erase any files and subdirectories left in the + + temporary directory from the installation of Win32s. + + 5.) Execute MOS20A8.EXE to extract the component files, + + including SETUP.EXE. + + 6.) Execute SETUP.EXE to install Mosaic version 2.0 alpha 8 in + + the directory of your choice. MOSAIC.INI will be copied to + + the C:\WINDOWS directory. + + 7.) Launch the program. Read the files README.WRI and + + RELNOTES.HTM to learn how to fully configure Mosaic to + + your needs. + + 8.) When installation is complete, you can remove the + + temporary installation directory. + + + + NOTE: You can avoid the added complexity of installing Win32s and + + the substantial demands it places on your PC by using the older + + Mosaic version 2.0 alpha 2 (June 27, 1994 | 243,749 bytes). + + + + + + ******** + + NETSCAPE (World Wide Web browser) + + + + Comment: Netscape Navigator is generating enormous interest at this + + writing as the logical successor to Mosaic. FTP sites designated as + + sources for Netscape frequently are inaccessible. + + + + Author: Netscape Communications Corporation + + License: Free for academic or not-for-profit use. Others, + + including government users, should contact Netscape + + Communications Corporation. + + Version: 1.0N + + File name: ns16-100.exe (December 17, 1994 | 706,929 bytes) + + + + Available by anonymous FTP from: + + ftp.mcom.com in directory /netscape/windows or + + ftp2.mcom.com in directory /netscape/windows. + + Frequently it is impossible to connect by anonymous FTP to + + servers distributing Netscape. The best mode of access is to + + use a World Wide Web browser and load the URL + + http://home.mcom.com/info/how-to-get-it.html. + + + + Installation: + + 1.) Copy the file NW16-100.EXE to a temporary directory and + + run it. This will extract the component files, including + + SETUP.EXE. + + 2.) Run the program SETUP.EXE by selecting the file in File + + Manager or by using the menu selection File Run in Program + + Manager. SETUP will install Netscape in a directory of + + your choice, and it will create a program icon in the + + group you designate. + + 3.) Launch the program. Configure Options and Preferences to + + taste. The file NETSCAPE.INI is kept in the Netscape + + program directory. + + + + + + ****** + + WINWEB (World Wide Web browser) + + Comment: A fast and easy browser from EINet. + + Author: MCC-EINet (Microelectronics and Computer Technology + + Corporation) + + License: Free + + Version: 1.0 Alpha 2.2 + + File name: winweb.zip (December 19, 1994 | 598,873 bytes) + + + + Available by anonymous FTP from: + + ftp.einet.net in directory /einet/pc + + + + Installation: + + 1.) Create the directory C:\WINWEB and unzip WINWEB.ZIP into + + this directory. + + 2.) Move the included file VBRUN300.DLL to the windows system + + directory, usually C:\WINDOWS\SYSTEM. (This file is a + + runtime library for Microsoft Visual Basic. If you already + + have a copy installed from some other application, you can + + simply delete it from the \WINWEB directory. + + 2.) Create a new program item in the Network program group for + + the program C:\WINWEB\WINWEB.EXE. + + 3.) Launch the program and configure to taste. The file + + WINWEB.INI will be created in the C:\WINDOWS directory. + + + + ***** + + WFTPD (FTP server) + + + + Comment: I had not imagined I would want or need to use my PC as an FTP + + server. However, I have found this product useful on a couple of occasions + + to transfer files from an IBM mainframe to my PC. This is far easier than + + trying to FTP to the mainframe from my PC. Note that WinQVT/Net, which is + + described later, has an FTP server function also. However, the server in + + WinQVT/Net would not work when I tried to use Fetch on my PowerMac to + + retrieve a file from my Windows machine. WFTPD had no problems serving + + files to Fetch. + + + + Author: Alun Jones + + License: $15.00. The unregistered shareware version displays + + a message to anyone accessing the server that the + + owner is unable or unwilling to pay the shareware + + fee. The shareware version is limited to five file + + transfers per session. + + Version: 1.95 + + File name: wftpd195.zip (October 20, 1994 | 147,612 bytes) + + + + Available by anonymous FTP from: + + ftp.cica.indiana.edu in /pub/pc/win3/winsock + + or by gopher from: + + ftp.cica.indiana.edu under menu item PC and CICA Windows Files/ + + CICA Windows Files/Winsock Compliant Apps + + + + Installation: + + 1.) Create the directory C:\WFTPD and unzip WFTPD195.ZIP into + + this directory. + + 2.) Create a new program item in the Network program group for + + the program C:\WFTPD\WFTPD.EXE. + + 3.) Launch the program. + + 4.) Complete the information in the Security dialog box to + + establish security control using access passwords and + + restricted home directories for those you authorize to + + access your PC. The file WFTPD.INI will be created in the + + C:\WINDOWS directory. + + + + ------ + + TELNET + + + + The glaring deficiency in the Winsock pantheon of Internet clients is the + + absence of a good stand-alone telnet client. Here is a brief description + + of some alternatives I have tried. + + + + ********** + + WinQVT/Net + + + + Comment: WinQVT/Net is an integrated package that includes telnet, FTP, + + FTP server, mail, and news reader functions. These separate client and + + server functions are normally launched from a console window. The telnet + + client is probably the best shareware Winsock telnet client available. + + You can select terminal emulations and customize the keyboard. The + + resizable telnet window includes scrollback and session logging. A + + deficiency is that telnet cannot be launched independently of the console + + window. However, if WinQVT/Net is already running, then an instance of the + + telnet client can be launched from another application by invoking the + + TNSTART.EXE program that comes with WinQVT/Net. This makes it possible to + + use this telnet client as the telnet viewer or helper with Gopher or + + World wide Web clients. + + + + Author: QPC Software + + License: Shareware registration is $40 ($20 for students). + + There has been discussion in alt.winsock and other + + news groups about the difficulty of getting any + + response to e-mail and fax messages from the author + + of WinQVT/Net. Paying the license fee may be + + difficult as a result. + + Version: 3.98 + + File name: qvtws398.zip (December 16, 1994 | 390,960 bytes) + + + + Available by anonymous FTP from: + + biochemistry.bioc.cwru.edu in directory /gopher/pub/qvtnet + + or by Gopher from + + biochemistry.cwru.edu under the menu selection + + CWRU Biochemistry FTP Archive/qvtnet. + + Gopher access is preferable as only one anonymous user is + + permitted weekdays during normal working hours from 9:00 AM to + + 5:00 PM local time. + + + + + + ************** + + TRUMPET TELNET + + + + Comment: This simple client is my favorite for use as a telnet viewer or + + helper with Gopher or World Wide Web clients. Unfortunately, it lacks + + sophisticated features needed by heavy users of telnet. + + + + Author: Peter Tattam + + License: Free beta version + + Version: 0.07 + + File name: trmptel.exe (October 13, 1994 | 71,168 bytes) + + + + This file is included in the WINAPPS2.ZIP file distributed as part of the + + Trumpet Winsock package. + + + + **** + + EWAN + + + + Comment: EWAN (Emulator Without a Good Name) is a more complete Winsock + + telnet client than Trumpet Telnet. It allows printing the screen, printing + + the scrollback buffer, and logging a session to a file. It can be used as + + a telnet viewer with Gopher or World Wide Web clients. + + + + Author: Peter Zander + + License: Free + + Version: 1.04 + + File name: ewan104.zip (November 23, 1994 | 221,051 bytes) + + + + Available by anonymous FTP from: + + ftp.lysator.liu.se in directory /pub/msdos/windows + + + + ******* + + QWS3270 + + + + Comment: Telnet clients usually emulate a VT100 terminal or one of its + + variations, the standard for connecting to a UNIX host. However, + + telneting to an IBM mainframe requires emulation of an IBM 3270 terminal. + + QWS3270 provides this functionality. I was especially pleased with the + + easily-configured, four-color capability that makes it easier to + + distinguish protected, unprotected, and highlighted text on a VM screen. + + + + Author: Jim Rymerson + + License: Free + + Version: 3.2e + + File name: qws3270.zip (November 14, 1994 | 73,365 bytes) + + + + Available by anonymous FTP from: + + ftp.ccs.queensu.ca in directory /pub/msdos/tcpip + + + + + + ------------------------------------- + + OTHER SOURCES FOR WINSOCK INFORMATION + + + + It remains true that the best guide to the Internet is the Internet itself. + + The best software for navigating the Internet is freely available on the + + Internet. + + + + Considerable information about the Winsock API, along with some application + + programs, is available by anonymous FTP at sunsite.unc.edu in directory + + /pub/micro/pc-stuff/ms-windows/winsock. + + + + The anonymous FTP sites that I list throughout this paper as sources for + + programs are the sites designated by the software authors as their home + + sites. These sites will always have the latest version of the software. + + + + In addition, copies of the software may usually be obtained by anonymous + + FTP from CICA (Center for Innovative Computer Applications) at + + ftp.cica.indiana.edu in directory /pub/pc/win3/winsock. Files are also + + available from this same address using a Gopher client. Gopher access is + + preferable because the CICA FTP server is the main Internet site for + + Windows applications. It is usually busy, and you may have difficulty + + establishing an FTP connection. + + + + It is the case that the collection at CICA will NOT always contain the + + latest version of software, even if a newer version has been uploaded to + + CICA by the author. CICA does not allow anonymous users to view or + + download program files from the uploads directory, where the newest + + version might still be in the holding pattern. Also, the versions at + + CICA may not have the same file dates as those at the home sites. + + + + There is a listserv that provides a daily listing of new uploads to CICA. + + Included in the mailing are the content of any text files accompanying + + those uploads and a list of files that have been moved from the uploads + + directory to the public directories so as to be available for downloading. + + You can subscribe to CICA-L by sending e-mail with no subject and the + + message sub CICA-L Your Name to listserv@ubvm.cc.buffalo.edu. + + + + There are several other Internet sites that provide mirror copies of the + + Windows collection at CICA. These are listed in the message displayed if + + you are denied access to CICA. The list of mirror sites also is included + + in the file README in CICA's directory /pub/pc/win3. These mirrors can be + + just as busy as CICA. As an example, the mirror at polecat.law.indiana.edu + + was recently removed due to overload on the server. + + + + When using CICA, it is helpful to download the file INDEX (ascii, about + + 285,000 bytes) or INDEX.ZIP (about 122,000 bytes) from the directory + + /pub/pc/win3. INDEX contains one-line descriptions of each file in the + + collection. + + + + The news groups alt.winsock, and comp.protocols.tcp-ip.ibmpc carry + + discussions of the Winsock specification and Winsock compliant + + applications, as do the groups in the comp.os.ms-windows.networking + + hierarchy. Trumpet Winsock and related clients are discussed in several + + news groups in the trumpet hierarchy. + + + + Information about specific clients may be found in groups devoted to that + + class of client. For instance, WSGopher is discussed in alt.gopher and + + in comp.infosystems.gopher. Cello, Mosaic, Netscape, and WinWeb are + + discussed in the sections of the comp.infosystems.www hierarchy. + + + + The BITNET listserv WIN3-L@UICVM carries discussions about all topics + + relating to Windows, including Winsock applications. Some news servers + + carry this listserv under the news group name bit.listserv.win3-l. + + + + A comprehensive list of FTP'able Winsock applications is available from + + Larsen Consulting and Sales, Phoenix, Arizona, USA. To get a copy of the + + list, send an e-mail message to info@lcs.com with the Subject: FAQ. + + Nothing else should be in the message. The list is also available on the + + World Wide Web at http://www.lcs.com/. + + + + Frequently Asked Questions about TCP/IP on PC-compatible computers are + + answered in a FAQ written by Bernard D. Adoba. The text is posted monthly + + on the news group comp.protocols.tcp-ip.ibmpc. A copy of the newsgroup + + posting is available as three separate files from rtfm.mit.edu in the + + directory /pub/usenet-by-hierarchy/comp/protocols/tcp-ip/ibmpc. The + + complete text of the files dated November 3, 1994 contains over 214,000 + + bytes. The filenames are decidedly non-DOS, so you will want to assign + + filenames if you download from this source. The FAQ is also available + + as a single ZIP file named ibmtcp.zip (79,454 bytes | October 29, 1994) + + from ftp.netcom.com in the directory /pub/mailcom/IBMTCP. Each of these + + sites can be troublesome. They frequently are busy or unresponsive to + + commands. + + + + Finally, the FAQ, and other publications about Internet software for the + + PC, can be accessed on the World Wide Web page maintained by Bernard Adoba. + + The page entitled "Internaut: The PC-Internet Connection Update Page" is + + located at http://www.zilker.net/users/internaut/update.html. + + + + The Crynwr packet drivers collection is available by anonymous FTP in the + + well-known Simtel20 collection, as well as through a variety of other + + methods. The primary publicly available site for Simtel20 files is at + + oak.oakland.edu. The packet drivers are in directory SimTel/msdos/pktdrvr + + pktd11.zip (November 23, 1993 | 435420 bytes) + + pktd11a.zip (November 23, 1993 | 326152 bytes) + + pktd11b.zip (November 23, 1993 | 344847 bytes) + + pktd11c.zip (December 14, 1993 | 81834 bytes). + + + + + + An early version of this document (dated February 9, 1994) was published in + + the "Toolkit" section of the March 14, 1994 issue of "Global Network News." + + GNN is part of the "Global Network Navigator," a World Wide Web publication + + of O'Reilly Associates. Articles in GNN are aimed at the reader with a + + general interest in the Internet and networked information. You can read + + GNN by pointing Mosaic or Cello at http://www.wimsey.com/gnn/gnn.html. + + + + The most recent plain text version of "Windows and TCP/IP for Internet + + access" is available by anonymous FTP from nebula.lib.vt.edu in the + + directory /pub/windows/winsock under the name wtcpip**.asc. For instance, + + this version has the name wtcpip06.asc. A more frequently revised hypertext + + version is available at http://learning.lib.vt.edu/wintcpip/wintcpip.html. + + + + + + ================================================================ + + I thank each of you who sent me personal messages following the postings + + of earlier versions of this evolving document. I have now received e-mail + + about this document from individuals on seven continents. Thanks to AJO + + at McMurdo Station for sending me a message from Antarctica. + + + + I am grateful that I have been able to help many of you, and I appreciate + + the suggestions and information you have sent me. My efforts in producing + + this document can be only a small and indirect repayment of the debt I owe + + to the developers who produce this software and to the many Internet users + + who are so willing to share information and expertise. + + + + Please send error reports to me at hmkriz@vt.edu. I would be grateful for + + suggestions for improvements and additions to this document. Thanks again + + to everyone who replied to my beginner's questions over the past eighteen + + months. I greatly appreciate your patience, and your willingness to share + + your knowledge. + + + + --Harry + + ================================================================= + + + +Date: Fri, 20 Jan 1995 07:03:19 -0600 + +From: Malik Al-Rashim + +Subject: JAUC-File5 + + + + + + SAY WHAT? LIBEL & DEFAMATION ON THE INTERNET + + + + By Eric Eden (r3eje@vm1.cc.uakron.edu) + + + + On the Internet, where abnormal behavior is the status quo, tempers + + can flare in the heat of debate and word wars can last for days or even + + weeks. It's not uncommon for users to ridicule, harass or insult those + + who disagree with them. + + + + But if you damage someone's reputation by trying to embarrass them in + + a public forum, you could be sued for libel or defamation. After all, + + there's no reason to assume that the messages you send through + + cyberspace are immune from lawsuits. + + + + "The Internet culture right now is for users to refute speech with + + speech," says Dave Marburger, the attorney who represented Brock + + Meeks in one of the first defamation lawsuits in the United States + + involving the Internet. "But as the Internet culture gets more diverse, + + users will start refuting speech with lawsuits." + + + + There have only been a handful of libel and defamation lawsuits filed + + involving the Internet so far, but as the Net grows, the number of + + lawsuits will probably increase. If the few court battles that have been + + decided involving libel and defamation on the Net are any indication of + + how the law will be applied to the Internet in the future, it's worth your + + time to learn what's libelous or defamatory on the Internet and what's + + not. + + + + Other users have the right to sue you for defamation if they can prove + + you damaged their reputation or good name with false information. + + You can be sued for libel if another user can prove you have distributed + + defamatory statements about them in a public area -- such as a news + + group or mailing list. + + + + In April of 1993 Gil Hardwick, an anthropologist in Australia, was + + ordered by the Australian Supreme Court to pay David Rindos $40,000 + + in damages because he defamed Rindos on an international mailing list. + + + + After Rindos lost his job at the University of West Australia, Hardwick + + posted a message in a discussion group for anthropologists that suggested + + Rindos was fired because he was a bully and had sexually molested a + + local boy. + + + + Rindos filed a defamation lawsuit against Hardwick because he felt the + + message had hurt his chances of finding a new job. In a letter to + + Rindos's attorney, Hardwick wrote "Let this matter be expedited and + + done with....I can do nothing to prevent it, lacking any resources + + whatsoever to defend myself." Like most people, Hardwick didn't have + + the money to hire a lawyer or finance an expensive legal battle. + + + + "He (Rindos) suffered a great deal of personal hurt because of the + + message," said Supreme Court Justice David Ipp in the West + + Australian. "The damages award must compensate him and vindicate + + his reputation to the public." + + + + The Internet is an informal forum and people often write personal things + + about other users, but you can be held accountable in court for making + + libelous or defamatory remarks in public forums just like Hardwick was. + + + + "We know that as the Internet grows, there will be more and more + + lawsuits involving libel and defamation," says attorney David H. + + Donaldson, editor of Legal Bytes, an electronic magazine that + + discusses legal issues involving computers and networking. "The only + + question is if the number of cases will grow steadily or if there will be + + an explosion of lawsuits all at once." + + + + Anybody can sue you for libel or defamation if they think you damaged + + their reputation, but if you can prove what you say is true, chances are + + that you won't end up in court. + + + + "Make it clear when you are stating your opinion," says Donaldson, + + "Always state the facts that your opinions are based on just to be safe. + + You probably won't lose a libel or defamation lawsuit if you can back up + + what you write with solid facts." + + + + For example, Brock Meeks, a full-time journalist who also distributes his + + own electronic magazine, avoided losing a defamation lawsuit largely + + because he could prove an article that he sent over the Net was true. + + + + Meeks was sued by Suarez Corporation Industries in April of 1994 for + + writing an investigative story about the company and its services in his + + electronic newsletter -- the CyberWire Dispatch. Meeks had no libel + + insurance, no publishing company backing him up and a lot of legal + + fees to cover. (His lawyer charged him $200 an hour.) The only thing + + Meeks had was his house -- and he didn't want to sell it to pay off a + + lawsuit. + + + + Meeks defended his article in numerous posts on the Net, "All of my + + facts were rock solid. Although the article was delivered with a fair + + amount of attitude, I don't believe that I'm in dangerous waters," he + + wrote. + + + + Benjamin Suarez, owner of Suarez Corp., filed the suit because he felt + + that Meeks had damaged his reputation and hurt his business by + + saying he was "infamous for his questionable direct marketing scams," + + and saying "he (Suarez) has a mean streak." To back up his opinion, + + Meeks cited accusations made by the Washington state attorney + + general's office concerning Suarez's direct marketing practices. + + + + In August of 1994 Suarez Corp. made Meeks an offer he couldn't + + refuse. They agreed to settle the case for $64 -- to cover + + administrative court costs. The company refused to comment on why + + they agreed to settle the lawsuit. + + + + If the case had gone to trial, Meeks's lawyer thinks Meeks would have + + been able to win anyway. "The defendants in libel or defamation suits + + involving the Internet have enhanced First Amendment rights," says + + Marburger. "The plaintiff has to prove actual malice. In other words, + + the plaintiff has to show that the defendant made false statements or + + was negligent." Marburger's only regret is that they didn't get to set + + that precedent in court. + + + + Although the Meeks case doesn't really mean anything in the law + + books, it does show that if you're responsible and can prove what you + + write on the Net is true, people will be less likely to take you to court. + + If + + you just make something up and your sources aren't reliable, you could + + lose big like Hardwick did. + + + + "You have to follow the same rules that journalists do if your going to + + write and distribute controversial material about other people," says + + Donaldson. + + + + The increasingly common phenomenon of online forums creates the + + possibility for you to reach large audiences, but it also creates the + + ability for you to commit defamation or libel -- something that an + + ordinary citizen didn't have to worry about in the past. before the + + growth of online communication, people who didn't work in the media + + usually didn't have to worry about libel or defamation. "Libel laws apply + + to the Internet the same way they do to newspapers and TV stations," + + explains former Federal Communications Commissioner Nicholas + + Johnson, a professor at the Iowa University school of law. "The same + + technology that gives you the power to share your opinion with + + thousands of people also qualifies you to be a defendant in a lawsuit." + + + + Like a newspaper or TV station, you are responsible for making sure + + the material you distribute -- or broadcast -- over the Internet is not + + libelous or defamatory. Lani Teshia-Miller never meant to defame + + anyone, but when she took over the distribution of a tattoo FAQ she + + almost ended up in court. The rec.arts.bodyart FAQ she inherited + + contained a lot of generalizations based on contributions from + + unattributed sources. Although she listed her name on the FAQ, she + + didn't edit out several defamatory statements. One review of a San + + Francisco tattoo artist in the FAQ said, "He's getting old and having + + problems with his eyesight. His quality is really bad and he hurts + + people." + + + + After the artist hired a lawyer and threatened to sue, Teshia- Miller + + changed the FAQ's wording to reflect a more factually-based and + + less-hysterical view. The review now says, "His eyesight is not what it + + used to be." + + + + After the FAQ was changed and Teshia-Miller apologized, the artist + + dropped the lawsuit. "It turned out to be a good experience for me," + + said Teshia- Miller. "I'm a lot more careful about what I allow on the + + artist list, and I now have a very long disclaimer at the beginning of the + + FAQ." + + + + Every person you write something negative about won't sue you for + + defamation or libel, they might flame you or just try to set the record + + straight by replying to the message. But if you post false information + + about another user and disgrace them in public, they have the right to + + take you to court -- and they could win a big settlement if they can + + prove you were negligent. + + + + Medphone, a Fortune 500 company that manufactures medical + + instruments, has filed a $200 million lawsuit against Prodigy user Peter + + DeNigis. Medphone filed a "systematic program for defamation and + + trade disparagement" lawsuit against DeNigis after a stockholder + + reported that he was making several negative posts about Medphone a + + day on Prodigy's Money Talk Forum. DeNigis, a former Medphone + + stockholder, lost more than $9,000 last year by selling off his + + investment in the company. In one post DeNigis wrote, "My research + + indicated the company is really having a difficult time. No case, no + + sales, no profits and terrible management. This company appears to be + + a fraud. Probably will cease operations soon." + + + + Although the accusation that Medphone is a "fraud" is very serious -- + + and potentially defamatory -- DeNigis might be able to win the lawsuit if + + he can prove what he wrote is true in court. + + + + "The Medphone case is a clear indication that libel and defamation is + + something for Internet users to think about," says Johnson. + + + + There are court cases in progress right now that will decide if access + + providers such as Prodigy, America Online and Compuserve are + + responsible for defamatory remarks broadcast over their services, but + + there is no legal ambiguity about whether individual users can be sued + + for making defamatory or libelous statements. Individual users are + + responsible for making sure the information they distribute is not + + libelous or defamatory. + + + + The Internet has made world wide, instantaneous communication easy. + + The average user now has the power to be heard by hundreds or even + + thousands of other users, but in terms of libel and defamation, the Net + + is not a new world of freedom. The reality is that libel and defamation + + laws are enforceable in the virtual world just like they are in the real + + world. + + + + # # # + + + + You may distribute this article freely for non-profit purposes. Otherwise + + contact the author (Eric Eden -- R3eje@vm1.cc.uakron.edu) for reprint + + permission. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + JACKING IN FROM THE "BACK FROM THE DEAD" PORT + + + + By Brock N. Meeks (brock@well.sf.ca.us) + + CyberWire Dispatch Copyright (c) 1994 + + + + Washington, DC -- Nothing chills -- or inflames -- the Net faster than + + when word of the dreaded "FCC Modem Tax" begins ooze through Cyberspace. + + + + Well... it's back. Sort of. + + + + Ruth Milkman, legal advisor to Federal Communications Commission Chairman + + Reed Hundt, said during a recent question and answer session that the + + agency might again take up the issue of the so-called modem tax. + + + + "Some years down the road I can see access fees [for enhanced service + + providers] being considered by the FCC," Milkman said during a phone + + interview. "But only under the scenario when access charges are reformed." + + + + These access charges are a kind of trip wire phrase which online activists + + have dubbed a "modem tax" when applied to enhanced service providers, + + which is another catch phrase meaning services like America Online and + + CompuServe. + + + + Milkman said the FCC would only consider an access charge under a very + + narrow scenario which would play out only if "enhanced service providers + + felt that by paying the access charges they weren't contributing to a + + subsidy scheme set up for (long distance phone companies)," Milkman said. + + + + So, what the hell is an "access charge"? Take a deep breath. Here goes: + + + + Access charges are paid by long distance companies to local telephone + + companies. Every time a company such as AT&T connects a caller in Des + + Moines with Uncle Bert in New York, it has to pay Nynex, the local + + telephone company, a fee for the privilege of carrying that long distance + + call over their facilities, commonly known as the "local loop." + + + + Long distance companies pay up to 40% of their entire revenues to local + + telephone companies. That's billions and billions of dollars each year + + that flow into the hands of the Baby Bells, just for completing the calls. + + + + The access fees are set at artificially high rates because they contain a + + mind numbing set of complex subsidies, the most obvious one is that which + + underwrites the public policy known as "Universal Service." + + + + Back in the days when the FCC only had rotary dial phones (circa 1987) + + someone came up with the brilliant idea that because modem use was + + increasing at such a rapid pace, that maybe services such as Sprintlink + + (then known as telenet) and CompuServe should have to pay these access + + charges, too. + + + + After all, the FCC wonks postured, they carry long distance (modem) + + traffic over the phone lines? It would only be fair to have these + + "enhanced service providers" as they are known in FCC-speak, also help + + out the impoverished long distance phone companies underwrite Universal + + Service. + + + + Bingo. The hue and cry that went up from the online community (it wasn't + + yet called "the Net") was enormous. The major players -- Telenet and + + CompuServe -- quickly branded the plan as a "tax" and thus the phrase + + "modem tax" was born. + + + + Dire warnings went out: If the FCC succeeded in making enhanced service + + providers chip in for access fees, it would increase the cost of each hour + + of online time by at least $6 per hour. + + + + And remember, this was in the days when a 2,400-bps modem was the hottest + + thing going. Six bucks an hour would have demolished the struggling + + online industry. + + + + The fallout among the nascent online community was astounding. For the + + first time in history, the "net" community rose up with a single voice and + + FLOODED the FCC with protests. + + + + FCC official "filing kits" made the rounds, teaching people how to file + + official comments of protest. + + + + The ground swell of opposition worked. The FCC was buried in responses. + + At the time, the FCC said it was the hottest item in its history, garnering + + more response than any issue in history. + + + + The FCC eventually backed off. The reason: It was persuaded that enhanced + + service providers were still entrepreneurial companies and couldn't afford + + the burden of access fees. + + + + The proposal was officially dropped. It was the first major victory for + + the Net. And it was empowering. The online community became educated and + + enlightened almost over night to the ways of an arcane governmental agency. + + And this community was drunk with a heady kind of power: It could + + sufficiently affect the outcome of governmental regulation. + + + + Small catch: The damn "modem tax" issue wouldn't die. + + + + Someone with the brains of a trout began to circulate the now infamous + + "modem tax" file. The file claims that Jim Eason, a San Francisco radio + + talk show host had aired a segment in which he claimed to have inside + + information that the FCC was about to relaunch its "modem tax" proposal. + + + + The message was and is a HOAX. + + + + But it also has never died. It's the Net's first "urban myth" and like + + Freddie, it refuses to die, even to this day. + + + + Milkman, who was on-board at the FCC during the 1987 modem tax firefight, + + sighed when explaining the complex issue: "Part of the problem is that + + nobody is exactly sure what all the subsidies are. Most people agree that + + there are subsidies in the access charges, but you can't break out those + + subsidies exactly." + + + + Another factor in play: Sometimes enhanced service providers are really + + just reselling long distance transport after having bought large blocks of + + time from a major carrier like AT&T. Thus, to have these enhanced service + + providers also pay an access fee amounts to a kind of double-dipping, + + Milkman said. + + + + As it turns out, Congress might have as much to say about a future "modem + + tax" as the FCC. This twisted scenario turns on the tenuous grasp that + + everyone from the Vice President to Commerce Department to the FCC has on + + exactly what constitutes "Universal Service," in the era of the Information + + Superhighway. + + + + Revamping the 60 year old Communications Act of 1934 will be up to Congress + + this year. And they will likely do it. But how universal service is + + defined remains a big mystery. And who ends up paying for and maintaining + + that public policy (which isn't about to be abolished) also remains a + + mystery. + + + + Don't be surprised if, when the legislative smoke clears, not only do + + enhanced service providers -- America Online, CompuServe and Prodigy, et al + + -- have to pay access fees, but also your Internet provider and your cable + + company. + + + + And who do you think will end up catching those cost increases?? Right. + + Your wallet. + + + + But for now? Rest easy, Milkman says: "I want to make this very clear: + + There is NO docket [open] in which the Commission is proposing making + + enhanced service providers pay access charges. And I don't anticipate it + + coming up." + + + + Meeks out... + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + ANNOUNCING SLIPKNOT: Shareware dialup Web browser for Windows + + + + By Felix Kramer (felixk@panix.com) + + + + Dear Electronic Journalist + + + + How long will the World Wide Web be accessible to only a small fraction + + of dial-up users? + + + + I'm writing to tell you about a new and important application for Internet + + users that's was released last week, and that I think should be of + + interest to you (and perhaps to your readers.) + + + + In one sentence, it's a graphical Windows-based browser for the World + + Wide Web, for users with dial-up UNIX accounts -- but one that doesn't + + require SLIP, PPP or TCP/IP access. (You'll find a longer description + + below.) + + + + It's intended to expand and democratize access to the WWW to those with + + ordinary dial-up accounts -- at a time when TCP/IP access is available + + only to a small fraction of the online population. + + + + Until now, access to the hypermedia-based Web has been limited to those + + with SLIP, PPP or TCP/IP access, using Mosaic and similar browsers. That's + + only a small fraction of the online population--a few million at most, + + worldwide. Unless they were willing to go through considerable technical + + acrobatics, most people with dial-up UNIX accounts were locked out of the + + Web. Many of these people are accustomed to their UNIX tools for reading + + mail and news, and don't want to switch to SLIP even if their systems offer + + the option. (We may be talking about something over 20 million people + + worldwide, with service through their companies, schools, universities, + + or Internet Service providers.) + + + + In journalistic terms, there are several stories here: + + + + 1) As discussed above, SlipKnot will expand the population of users who + + can use the Web. + + + + 2) SlipKnot is pioneering in its distribution/sale policy. SlipKnot is + + restricted shareware in its first version from MicroMind, Inc. Until now, + + shareware has generally been distributed with a simple request for users to + + register; SlipKnot takes that one step further. It is restricted + + shareware. That means it is free for evaluation but with strong + + incentives to frequent users to register. After a period of frequent + + reminders, the software eventually turns itself off for nonregistering + + users. + + + + 3) Registration fees or on a sliding scale. For most, the cost is $29.95. + + But individuals outside Northern America, Europe and Japan will pay $20 to + + register. A portion of the receipts will go to support refugee + + organizations (Peter Brooks, the developer, came to the U.S. as a + + refugee). + + + + + + 4) SlipKnot is a case study in the new technology of virtual commerce. All + + promotion, distribution, and registration is being done online. No physical + + shrink-wrapped disk or manual is produced: users download the product with + + documentation. There is no paid advertising or direct mail: potential + + purchasers learn about it through online newsgroups, user groups, mailing + + lists, and through the press. There is no printed and mailed press kit: + + the media hears about it through electronic means -- e-mailed press + + materials and announcements. Registrants send in their addresses and + + payments through fax or encrypted e-mail, and their personal codes are + + returned to them by e-mail. All this is rapid, efficient, and economical. + + + + Below you'll find info on where to get it. If you want to see what others + + are saying about SlipKnot, we've attached some early reactions. + + + + **NOTE** This press kit is incomplete. To keep down the size of this + + message, and ensure that you get the most recent information, AT ANY TIME, + + you can automatically retrieve SlipKnot's features, list of limitations, + + and technical specifications for what SlipKnot requires on the user's + + computer and at the service provider, by sending a blank e-mail message to + + our autoreplying infobot: + + slipknot@micromind.com + + + + I'm a consultant to institutions interested in publishing on the net, and + + author of a book on electronic publishing as a business. I'm doing + + promotion for the release of SlipKnot. + + + + Feel free to forward this message to other journalists, movers and shakers + + on the net. + + + + If possible, please let me know if you're planning to run a story; if it's + + in online form, I'd be very grateful to get an e-mail copy; if in printed + + form, I'd appreciate getting a tear sheet mailed to me at 310 Riverside + + Drive, Suite 1519, New York, NY 10025. Please contact me or Peter Brooks + + (the developer, pbrooks@micromind.com) if you have any questions. In any + + stories, please do not publish my phone number; you can give out my e-mail + + address and fax number. + + + + Thanks in advance--Felix Kramer + + + + * * * * * * * * * * * * * * * * * * + + HOW TO GET SLIPKNOT + + * * * * * * * * * * * * * * * * * * + + + + SlipKnot 1.0, the World Wide Web browser for Windows dial-up users from + + MicroMind,Inc., is now available (right on schedule!) for anonymous ftp + + download at: + + + + ftp://oak.oakland.edu/SimTel/win3/internet/slnot100.zip + + + + or, if it's not too busy, from: + + + + ftp://ftp.netcom.com/pub/pbrooks/slipknot/slnot100.zip + + + + oak.oakland.edu has numerous mirror sites, so if you have any trouble + + getting it directly from there, please try the mirror sites. + + + + One mirror site is: + + ftp.uoknor.edu/mirrors/SimTel/win3/internet/slnot100.zip + + + + In the U.K. try: + + src.doc.ic.ac.uk/computing/systems/ibmpc/simtel-win3/internet/slnot100.zip + + + + In Australia try: + + + + ftp.bf.rmit.edu.au /pub/pc/www/slnot100.zip + + + + (If you don't get to it for a while, please look at the distribution site + + for the latest version file, that is, slnotxxx.zip -- where "xxx" indicates + + the Version of SlipKnot. So, for instance, Version 1.0 is slnot100.zip, + + and Version 1.35 will be slnot135.zip.) + + + + You can also get a FAQ, focusing primarily on common installation problems, + + at: ftp://interport.net/pub/pbrooks/slipknot/sntfaq1.txt + + + + + + * * * * * * * * * * * * * * * * * * * * + + WHAT PEOPLE HAVE SAID ABOUT SLIPKNOT + + SINCE ITS RELEASE IN LATE NOVEMBER + + (INDIVIDUALS FOLLOWED BY PRESS) + + (AFFILIATIONS FOR IDENTIFICATION ONLY) + + * * * * * * * * * * * * * * * * * * * * + + + + * * * * * * * * * * * * * * * * * * * * + + UNSOLICITED COMMENTS FROM BETA TESTERS + + * * * * * * * * * * * * * * * * * * * * + + + + "SlipKnot is a godsend for those without slip."--Walter Rice, 11th grade + + student at Central High School, Philadelphia + + + + "I have really enjoyed SlipKnot. After trying for over a year to get + + Mosaic to work on my PC at home, I found SlipKnot easy to install and use. + + "--Mike McKee + + + + "This is a fun program. A LOT of magazines lately have been talking about + + Internet and the world wide web - and almost all of them say something like + + "To really delve into Internet - you'll need a SLIP or PPP connection." + + Get the word out about SlipKnot.. cause they're dead wrong. I have a shell + + account and it's got everything most people could want. I can read + + newsgroups, send/receive email, use telnet/ftp, download files, and (with + + SlipKnot) browse the World Wide Web! To be honest.. what else is + + there?"--Steve Crawford, MIS Manager for SpectraLink, Inc., Boulder, + + Colorado + + + + "I can use it with my dial-up and the price is certainly right--so I'm no + + longer lusting for a SLIP/PPP connection....If *I* can use this program so + + easily, anybody can....."--Kristi Olesen, author and parent + + + + "SlipKnot is simple to install, use and configure and wonderful in the + + sense that the wonders of the Internet are now truly available to me. As + + you can tell, I love this product. Thanks!"--Tami Duggan, Commonwealth + + Clinical Systems, Inc., Virginia + + + + "Keep up the good work. You've got a winner."--Steven Pitzl + + + + "Real slick....In general, the look and feel of SlipKnot is well-integrated + + & tight....Very cool setup....After looking at many web browsers, I must + + say y'all have a very unique browser, with a gorgeous interface, + + well-thought out and tightly integrated. And smooth. SlipKnot. I'm + + certainly telling everyone I know about it...."--Mark Garland, Civil + + Engineering Office, Santa Fe National Forest + + + + * * * * * * * * * * * * * * * * * * * * * + + REVIEWS FROM USENET AND MAIL TO MICROMIND + + * * * * * * * * * * * * * * * * * * * * * + + + + "Excellent software got it running with almost no problems. + + Congratulations."--Alan from United Kingdom + + + + "For a first release, Slipknot is amazing. It installed easily and worked + + first time."--Will from netcom + + + + "Overall, a really cool program, and quite clever."--SteveG from neosoft + + + + "This is exactly the program I've been searching for these past few + + months....While I loved the web browsing, I found I much preferred the + + Unix programs on my shell account. Now you've given me the best of both + + worlds. Thank you!"--Nelia from netcom + + + + "Solid as a rock."--Rajesh from Temple University + + + + "A really neat program! Saves me time charges on my SLIP account."--Larry + + from netcom + + "-- + + "Great Job Mr. Brooks ! well done !"--Amir from Bremen University, Germany + + + + "You've done an amazing job, without requiring the usual add-ons. I have + + spent hours with SlipKnot in many Web adventures and love the ability to + + toggle it when I want it and to use 'trn' and 'lynx' (the latter for form + + searches and for fastest text-response) and pine. So I'll get a check in + + the mail this week. Absolutely no GPF's, and your keyboard unfreeze + + resolved my one freeze in terminal."--Andrys from netcom + + + + ">One of the most exciting software programs I have seen lately."--Harald + + from Univ of Cincinnati + + + + "A major thumbs up!"--Darren from digex + + + + "Bravo!! What can I say? Seems to be a very stable, and actually pretty + + quick little program."--Mark from Pipeline + + + + "Wow! I've been spreading the word about Slipknot--I don't know when I've + + been more impressed with software in terms of the ease of use. Thanks + + again. I really think you've got a winner on your hands."--Steve from + + netcom + + + + "It worked! This is fantastic! I'm registering my copy ASAP. NOW I can see + + what everyone's so excited about."--Chris from tenet.edu + + + + "We are working on our Internet CD-ROM disc and would include your program + + as the user interface."--Stefan from Germany + + + + "Terrific work and a real contribution to the Internet community."--William + + from George Washington University + + + + "I've been using your software for the past five days and I just wanted to + + say how much I enjoy using it. BTW, I sent in my + + registration/check"--Warren from ncsc.mil + + + + "I think it's terrific, especially the ability to download WWW pages and + + group in folders for future reference off-line!"--Deb from digex + + + + "I'm very happy with SlipKnot and am enjoying seeing for the first time + + what all the fuss is about regarding the WWW."--Phil from panix + + + + "I can't say whether it's better than Mozilla, TIA, etc., but it sure turns + + a shell account into a multimedia banquet!"--Daniel Dern from world.std.com + + + + "I want to roundly condemn you for making and distributing this program. It + + is so simple and easy to use, has so many useful functions and works so + + flawlessly that I will probably spend many more hours in front of my + + computer than I should :-). Anyway, thank you for a superb web browser. + + Give yourself a gold star."--Mark from netcom + + + + "This is so cool, you could get frostbite from it."--William from Denver + + + + + + * * * * * * * * * * * * * * * * * * * * + + EARLY COMMENTS IN THE PRESS + + * * * * * * * * * * * * * * * * * * * * + + + + "Pure, unadulterated magic"--Daniel Dern, noted Internet analyst and + + author, "The Internet Guide For New Users" (McGraw-Hill, 1993) + + + + "Will SlipKnot cause a Web traffic explosion? SlipKnot is a MS-Windows Web + + browser that can be used with a dial-up shell account. Could this be the + + answer for those without a direct or Slip/PPP connection? SlipKnot is a + + very welcome addition to the Web tool box. It will make available the Web's + + graphical displays to a whole new group of Internet users.--Bob Stewart, + + The Virtual Mirror -- http://mirror.wwa.com/mirror/ + + + + "Its chief author, Peter Brooks...plans to sell SlipKnot as shareware. That + + means you download it free from an on-line service, try it out and if you + + decide to keep it, mail the programmer a check. Brooks plans to ask for + + $29.95. It's a steal....At the touch of a button, SlipKnot turned into a + + World Wide Web browser that in some ways worked better than Mosaic. It ran + + a little slower than Mosaic, but not much. And it works without the expense + + and trouble of a PPP account....SlipKnot is going to be a strong + + competitor."--Hiawatha Bray, Detroit Free Press, DFP Forum on Compuserve + + + + "Spurred by a desire to share the wonders of the Web with the vast + + dial-up population, developer Peter Brooks created SlipKnot....'We have a + + small lifetime worth of work in terms of features to include in the + + product,' Brooks confided. 'We will continue to improve it as time goes + + on.' "--Dianna Husum, WEBster, the Cyberspace Surfer + + + + "...A major technological breakthrough. SlipKnot is, as people used to say, + + 'for the manor woman on the street,' and it, and its successor software, + + will invite millions more people to the Web's vibrant new culture."--Joyce + + Lain Kennedy, LA Times Syndicate author, in Hookup/Get Hired, forthcoming + + from John Wiley & Sons in 1995 + + + + "One of the best features of this browser is its ability to retrieve + + documents in the background. According to MicroMind, SlipKnot is more than + + just a Web browser. This program allows for complete navigation of the Net + + and promises to bring Web access to almost all Internet users."--Patrick + + McKenna, Newsbytes + + + + "...for those trapped with terminal-emulation access to the Internet and + + salivating at the new stuff they hear is on the Web, this product is simply + + miraculous.--Richard Seltzer, Internet-on-a-Disk + + + + "One advantage is that whatever Web pages it gets, it keeps them until you + + decide to delete them. Once you're offline, you can go back and review + + pages you had browsed while online. You can keep as many pages as your + + available computer memory allows. SlipKnot is amazing. When it was first + + announced on Internet, I was skeptical whether such a program could work. + + Now, I'm a beiever."--John Fisher, Bucks County Times Courier + + + + SlipKnot has appeared in the National Center for Supercomputing + + Applications (NCSA) "What's New Page", Computer Underground Digest, and the + + Usenet moderated newsgroups comp.newprod & comp.internet.net-happenings + + + + * * * * * * * * * * * * * * * * * * + + SLIPKNOT AS SHAREWARE + + * * * * * * * * * * * * * * * * * * + + + + SlipKnot is published as restricted shareware, free for evaluation but with + + strong incentives to frequent users to register at a cost of $29.95 to most + + people. Individuals outside Northern America, Europe and Japan will be + + asked to pay $20 to register. And 10% of the receipts will go to support + + refugee organizations. + + + + Our shareware evaluation policy is that users who have displayed/retrieved + + over 300 documents are no longer evaluating the software (this should take + + about 2 months of typical usage) and will be asked to register within 30 + + days -- with an additional 21-day grace period if they start the + + registration process. We hope that few users will object to the policy, + + given the price of the software. + + + + * * * * * * * * * * * * * * * * * * * * * * + + NOTE FROM PETER BROOKS, SLIPKNOT DEVELOPER + + * * * * * * * * * * * * * * * * * * * * * * + + + + SlipKnot was created because there was, at that time, no other alternative + + to accessing the World Wide Web graphically if you did not have SLIP or PPP + + or TCP/IP access. Having analyzed Mosaic and some of its competitors, I + + concluded that all of these browsers were designed for people with very + + rapid communications channels into the Internet, not modem users. Even if + + you have SLIP access, most of these browsers do not allow you to save + + entire documents (with the included pictures), forcing you to retrieve the + + documents again whenever you wish to take a full look at them -- + + eliminating the possibility of demonstrating WWW without being online. + + It takes a while to retrieve any document by modem with any browser, and + + you shouldn't have to do this more than once. + + + + The Web is a remarkable human construct and a truly a wondrous place. I + + hope that SlipKnot brings you the magic of the Web, and that you become + + as astounded by it as I am. + + + + + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + + ABOUT MICROMIND + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + + + + MicroMind, Inc. is a New York City-based software development company with + + six major products developed and released for the international market, + + including: + + + + * RUN/C -- the world's first interpreter for the C language -- sold in the + + U.S. and Japan. 20,000 copies sold at $250. + + + + * OL2 -- a product to duplicate the functionality of Sharp Electronics' + + Wizard Electronic Organizer on a desktop computer -- marketed by Sharp + + worldwide. Over 150,000 copies sold at $100. + + + + PETER BROOKS, President of MicroMind and author of SlipKnot, has over 25 + + years of software development experience. + + + + * * * * * * * * * * * * * * * * * * + + FEEDBACK + + * * * * * * * * * * * * * * * * * * + + + + To facilitate communication and support, we are asking users to post + + comments and responses about SlipKnot only to the following Usenet + + newsgroup: comp.infosystems.www.users. + + + + At any time, for the latest SlipKnot information and a list of features, + + either point your WWW browser (lynx is fine) to: + + + + http://www.interport.net/slipknot/slipknot.html + + + + or send a blank e-mail message to: + + + + slipknot@micromind.com. + + + + Please direct any press or distribution questions to + + felixk@panix.com. + + vox: 212/866-4864. fax: 212/866-5527 + + + + Please direct any technical questions to: slpstaff@micromind.com + + + + Mail to Peter Brooks can be sent to: pbrooks@micromind.com + + fax: 212/864-0436 + + + + SlipKnot is Trademarked by MicroMind, Inc. + + This document (c) 1994 by MicroMind, Inc. + + + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + + Felix Kramer/Kramer Communications + + NYC-based electronic publishing & journalism + + Online promotion & marketing + + e-mail: felixk@panix.com or felixkramr@aol.com + + voice: 212/866-4864 fax: 212/866-5527 + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + + + +Date: Sat, 21 Jan 1995 01:10:45 -0600 + +From: Malik Al-Rashim + +Subject: JAUC-File6 + + + + + + SAY WHAT? LIBEL & DEFAMATION ON THE INTERNET + + + + By Eric Eden (r3eje@vm1.cc.uakron.edu) + + + + On the Internet, where abnormal behavior is the status quo, tempers + + can flare in the heat of debate and word wars can last for days or even + + weeks. It's not uncommon for users to ridicule, harass or insult those + + who disagree with them. + + + + But if you damage someone's reputation by trying to embarrass them in + + a public forum, you could be sued for libel or defamation. After all, + + there's no reason to assume that the messages you send through + + cyberspace are immune from lawsuits. + + + + "The Internet culture right now is for users to refute speech with + + speech," says Dave Marburger, the attorney who represented Brock + + Meeks in one of the first defamation lawsuits in the United States + + involving the Internet. "But as the Internet culture gets more diverse, + + users will start refuting speech with lawsuits." + + + + There have only been a handful of libel and defamation lawsuits filed + + involving the Internet so far, but as the Net grows, the number of + + lawsuits will probably increase. If the few court battles that have been + + decided involving libel and defamation on the Net are any indication of + + how the law will be applied to the Internet in the future, it's worth your + + time to learn what's libelous or defamatory on the Internet and what's + + not. + + + + Other users have the right to sue you for defamation if they can prove + + you damaged their reputation or good name with false information. + + You can be sued for libel if another user can prove you have distributed + + defamatory statements about them in a public area -- such as a news + + group or mailing list. + + + + In April of 1993 Gil Hardwick, an anthropologist in Australia, was + + ordered by the Australian Supreme Court to pay David Rindos $40,000 + + in damages because he defamed Rindos on an international mailing list. + + + + After Rindos lost his job at the University of West Australia, Hardwick + + posted a message in a discussion group for anthropologists that suggested + + Rindos was fired because he was a bully and had sexually molested a + + local boy. + + + + Rindos filed a defamation lawsuit against Hardwick because he felt the + + message had hurt his chances of finding a new job. In a letter to + + Rindos's attorney, Hardwick wrote "Let this matter be expedited and + + done with....I can do nothing to prevent it, lacking any resources + + whatsoever to defend myself." Like most people, Hardwick didn't have + + the money to hire a lawyer or finance an expensive legal battle. + + + + "He (Rindos) suffered a great deal of personal hurt because of the + + message," said Supreme Court Justice David Ipp in the West + + Australian. "The damages award must compensate him and vindicate + + his reputation to the public." + + + + The Internet is an informal forum and people often write personal things + + about other users, but you can be held accountable in court for making + + libelous or defamatory remarks in public forums just like Hardwick was. + + + + "We know that as the Internet grows, there will be more and more + + lawsuits involving libel and defamation," says attorney David H. + + Donaldson, editor of Legal Bytes, an electronic magazine that + + discusses legal issues involving computers and networking. "The only + + question is if the number of cases will grow steadily or if there will be + + an explosion of lawsuits all at once." + + + + Anybody can sue you for libel or defamation if they think you damaged + + their reputation, but if you can prove what you say is true, chances are + + that you won't end up in court. + + + + "Make it clear when you are stating your opinion," says Donaldson, + + "Always state the facts that your opinions are based on just to be safe. + + You probably won't lose a libel or defamation lawsuit if you can back up + + what you write with solid facts." + + + + For example, Brock Meeks, a full-time journalist who also distributes his + + own electronic magazine, avoided losing a defamation lawsuit largely + + because he could prove an article that he sent over the Net was true. + + + + Meeks was sued by Suarez Corporation Industries in April of 1994 for + + writing an investigative story about the company and its services in his + + electronic newsletter -- the CyberWire Dispatch. Meeks had no libel + + insurance, no publishing company backing him up and a lot of legal + + fees to cover. (His lawyer charged him $200 an hour.) The only thing + + Meeks had was his house -- and he didn't want to sell it to pay off a + + lawsuit. + + + + Meeks defended his article in numerous posts on the Net, "All of my + + facts were rock solid. Although the article was delivered with a fair + + amount of attitude, I don't believe that I'm in dangerous waters," he + + wrote. + + + + Benjamin Suarez, owner of Suarez Corp., filed the suit because he felt + + that Meeks had damaged his reputation and hurt his business by + + saying he was "infamous for his questionable direct marketing scams," + + and saying "he (Suarez) has a mean streak." To back up his opinion, + + Meeks cited accusations made by the Washington state attorney + + general's office concerning Suarez's direct marketing practices. + + + + In August of 1994 Suarez Corp. made Meeks an offer he couldn't + + refuse. They agreed to settle the case for $64 -- to cover + + administrative court costs. The company refused to comment on why + + they agreed to settle the lawsuit. + + + + If the case had gone to trial, Meeks's lawyer thinks Meeks would have + + been able to win anyway. "The defendants in libel or defamation suits + + involving the Internet have enhanced First Amendment rights," says + + Marburger. "The plaintiff has to prove actual malice. In other words, + + the plaintiff has to show that the defendant made false statements or + + was negligent." Marburger's only regret is that they didn't get to set + + that precedent in court. + + + + Although the Meeks case doesn't really mean anything in the law + + books, it does show that if you're responsible and can prove what you + + write on the Net is true, people will be less likely to take you to court. + + If + + you just make something up and your sources aren't reliable, you could + + lose big like Hardwick did. + + + + "You have to follow the same rules that journalists do if your going to + + write and distribute controversial material about other people," says + + Donaldson. + + + + The increasingly common phenomenon of online forums creates the + + possibility for you to reach large audiences, but it also creates the + + ability for you to commit defamation or libel -- something that an + + ordinary citizen didn't have to worry about in the past. before the + + growth of online communication, people who didn't work in the media + + usually didn't have to worry about libel or defamation. "Libel laws apply + + to the Internet the same way they do to newspapers and TV stations," + + explains former Federal Communications Commissioner Nicholas + + Johnson, a professor at the Iowa University school of law. "The same + + technology that gives you the power to share your opinion with + + thousands of people also qualifies you to be a defendant in a lawsuit." + + + + Like a newspaper or TV station, you are responsible for making sure + + the material you distribute -- or broadcast -- over the Internet is not + + libelous or defamatory. Lani Teshia-Miller never meant to defame + + anyone, but when she took over the distribution of a tattoo FAQ she + + almost ended up in court. The rec.arts.bodyart FAQ she inherited + + contained a lot of generalizations based on contributions from + + unattributed sources. Although she listed her name on the FAQ, she + + didn't edit out several defamatory statements. One review of a San + + Francisco tattoo artist in the FAQ said, "He's getting old and having + + problems with his eyesight. His quality is really bad and he hurts + + people." + + + + After the artist hired a lawyer and threatened to sue, Teshia- Miller + + changed the FAQ's wording to reflect a more factually-based and + + less-hysterical view. The review now says, "His eyesight is not what it + + used to be." + + + + After the FAQ was changed and Teshia-Miller apologized, the artist + + dropped the lawsuit. "It turned out to be a good experience for me," + + said Teshia- Miller. "I'm a lot more careful about what I allow on the + + artist list, and I now have a very long disclaimer at the beginning of the + + FAQ." + + + + Every person you write something negative about won't sue you for + + defamation or libel, they might flame you or just try to set the record + + straight by replying to the message. But if you post false information + + about another user and disgrace them in public, they have the right to + + take you to court -- and they could win a big settlement if they can + + prove you were negligent. + + + + Medphone, a Fortune 500 company that manufactures medical + + instruments, has filed a $200 million lawsuit against Prodigy user Peter + + DeNigis. Medphone filed a "systematic program for defamation and + + trade disparagement" lawsuit against DeNigis after a stockholder + + reported that he was making several negative posts about Medphone a + + day on Prodigy's Money Talk Forum. DeNigis, a former Medphone + + stockholder, lost more than $9,000 last year by selling off his + + investment in the company. In one post DeNigis wrote, "My research + + indicated the company is really having a difficult time. No case, no + + sales, no profits and terrible management. This company appears to be + + a fraud. Probably will cease operations soon." + + + + Although the accusation that Medphone is a "fraud" is very serious -- + + and potentially defamatory -- DeNigis might be able to win the lawsuit if + + he can prove what he wrote is true in court. + + + + "The Medphone case is a clear indication that libel and defamation is + + something for Internet users to think about," says Johnson. + + + + There are court cases in progress right now that will decide if access + + providers such as Prodigy, America Online and Compuserve are + + responsible for defamatory remarks broadcast over their services, but + + there is no legal ambiguity about whether individual users can be sued + + for making defamatory or libelous statements. Individual users are + + responsible for making sure the information they distribute is not + + libelous or defamatory. + + + + The Internet has made world wide, instantaneous communication easy. + + The average user now has the power to be heard by hundreds or even + + thousands of other users, but in terms of libel and defamation, the Net + + is not a new world of freedom. The reality is that libel and defamation + + laws are enforceable in the virtual world just like they are in the real + + world. + + + + # # # + + + + You may distribute this article freely for non-profit purposes. Otherwise + + contact the author (Eric Eden -- R3eje@vm1.cc.uakron.edu) for reprint + + permission. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + JACKING IN FROM THE "BACK FROM THE DEAD" PORT + + + + By Brock N. Meeks (brock@well.sf.ca.us) + + CyberWire Dispatch Copyright (c) 1994 + + + + Washington, DC -- Nothing chills -- or inflames -- the Net faster than + + when word of the dreaded "FCC Modem Tax" begins ooze through Cyberspace. + + + + Well... it's back. Sort of. + + + + Ruth Milkman, legal advisor to Federal Communications Commission Chairman + + Reed Hundt, said during a recent question and answer session that the + + agency might again take up the issue of the so-called modem tax. + + + + "Some years down the road I can see access fees [for enhanced service + + providers] being considered by the FCC," Milkman said during a phone + + interview. "But only under the scenario when access charges are reformed." + + + + These access charges are a kind of trip wire phrase which online activists + + have dubbed a "modem tax" when applied to enhanced service providers, + + which is another catch phrase meaning services like America Online and + + CompuServe. + + + + Milkman said the FCC would only consider an access charge under a very + + narrow scenario which would play out only if "enhanced service providers + + felt that by paying the access charges they weren't contributing to a + + subsidy scheme set up for (long distance phone companies)," Milkman said. + + + + So, what the hell is an "access charge"? Take a deep breath. Here goes: + + + + Access charges are paid by long distance companies to local telephone + + companies. Every time a company such as AT&T connects a caller in Des + + Moines with Uncle Bert in New York, it has to pay Nynex, the local + + telephone company, a fee for the privilege of carrying that long distance + + call over their facilities, commonly known as the "local loop." + + + + Long distance companies pay up to 40% of their entire revenues to local + + telephone companies. That's billions and billions of dollars each year + + that flow into the hands of the Baby Bells, just for completing the calls. + + + + The access fees are set at artificially high rates because they contain a + + mind numbing set of complex subsidies, the most obvious one is that which + + underwrites the public policy known as "Universal Service." + + + + Back in the days when the FCC only had rotary dial phones (circa 1987) + + someone came up with the brilliant idea that because modem use was + + increasing at such a rapid pace, that maybe services such as Sprintlink + + (then known as telenet) and CompuServe should have to pay these access + + charges, too. + + + + After all, the FCC wonks postured, they carry long distance (modem) + + traffic over the phone lines? It would only be fair to have these + + "enhanced service providers" as they are known in FCC-speak, also help + + out the impoverished long distance phone companies underwrite Universal + + Service. + + + + Bingo. The hue and cry that went up from the online community (it wasn't + + yet called "the Net") was enormous. The major players -- Telenet and + + CompuServe -- quickly branded the plan as a "tax" and thus the phrase + + "modem tax" was born. + + + + Dire warnings went out: If the FCC succeeded in making enhanced service + + providers chip in for access fees, it would increase the cost of each hour + + of online time by at least $6 per hour. + + + + And remember, this was in the days when a 2,400-bps modem was the hottest + + thing going. Six bucks an hour would have demolished the struggling + + online industry. + + + + The fallout among the nascent online community was astounding. For the + + first time in history, the "net" community rose up with a single voice and + + FLOODED the FCC with protests. + + + + FCC official "filing kits" made the rounds, teaching people how to file + + official comments of protest. + + + + The ground swell of opposition worked. The FCC was buried in responses. + + At the time, the FCC said it was the hottest item in its history, garnering + + more response than any issue in history. + + + + The FCC eventually backed off. The reason: It was persuaded that enhanced + + service providers were still entrepreneurial companies and couldn't afford + + the burden of access fees. + + + + The proposal was officially dropped. It was the first major victory for + + the Net. And it was empowering. The online community became educated and + + enlightened almost over night to the ways of an arcane governmental agency. + + And this community was drunk with a heady kind of power: It could + + sufficiently affect the outcome of governmental regulation. + + + + Small catch: The damn "modem tax" issue wouldn't die. + + + + Someone with the brains of a trout began to circulate the now infamous + + "modem tax" file. The file claims that Jim Eason, a San Francisco radio + + talk show host had aired a segment in which he claimed to have inside + + information that the FCC was about to relaunch its "modem tax" proposal. + + + + The message was and is a HOAX. + + + + But it also has never died. It's the Net's first "urban myth" and like + + Freddie, it refuses to die, even to this day. + + + + Milkman, who was on-board at the FCC during the 1987 modem tax firefight, + + sighed when explaining the complex issue: "Part of the problem is that + + nobody is exactly sure what all the subsidies are. Most people agree that + + there are subsidies in the access charges, but you can't break out those + + subsidies exactly." + + + + Another factor in play: Sometimes enhanced service providers are really + + just reselling long distance transport after having bought large blocks of + + time from a major carrier like AT&T. Thus, to have these enhanced service + + providers also pay an access fee amounts to a kind of double-dipping, + + Milkman said. + + + + As it turns out, Congress might have as much to say about a future "modem + + tax" as the FCC. This twisted scenario turns on the tenuous grasp that + + everyone from the Vice President to Commerce Department to the FCC has on + + exactly what constitutes "Universal Service," in the era of the Information + + Superhighway. + + + + Revamping the 60 year old Communications Act of 1934 will be up to Congress + + this year. And they will likely do it. But how universal service is + + defined remains a big mystery. And who ends up paying for and maintaining + + that public policy (which isn't about to be abolished) also remains a + + mystery. + + + + Don't be surprised if, when the legislative smoke clears, not only do + + enhanced service providers -- America Online, CompuServe and Prodigy, et al + + -- have to pay access fees, but also your Internet provider and your cable + + company. + + + + And who do you think will end up catching those cost increases?? Right. + + Your wallet. + + + + But for now? Rest easy, Milkman says: "I want to make this very clear: + + There is NO docket [open] in which the Commission is proposing making + + enhanced service providers pay access charges. And I don't anticipate it + + coming up." + + + + Meeks out... + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + ANNOUNCING SLIPKNOT: Shareware dialup Web browser for Windows + + + + By Felix Kramer (felixk@panix.com) + + + + Dear Electronic Journalist + + + + How long will the World Wide Web be accessible to only a small fraction + + of dial-up users? + + + + I'm writing to tell you about a new and important application for Internet + + users that's was released last week, and that I think should be of + + interest to you (and perhaps to your readers.) + + + + In one sentence, it's a graphical Windows-based browser for the World + + Wide Web, for users with dial-up UNIX accounts -- but one that doesn't + + require SLIP, PPP or TCP/IP access. (You'll find a longer description + + below.) + + + + It's intended to expand and democratize access to the WWW to those with + + ordinary dial-up accounts -- at a time when TCP/IP access is available + + only to a small fraction of the online population. + + + + Until now, access to the hypermedia-based Web has been limited to those + + with SLIP, PPP or TCP/IP access, using Mosaic and similar browsers. That's + + only a small fraction of the online population--a few million at most, + + worldwide. Unless they were willing to go through considerable technical + + acrobatics, most people with dial-up UNIX accounts were locked out of the + + Web. Many of these people are accustomed to their UNIX tools for reading + + mail and news, and don't want to switch to SLIP even if their systems offer + + the option. (We may be talking about something over 20 million people + + worldwide, with service through their companies, schools, universities, + + or Internet Service providers.) + + + + In journalistic terms, there are several stories here: + + + + 1) As discussed above, SlipKnot will expand the population of users who + + can use the Web. + + + + 2) SlipKnot is pioneering in its distribution/sale policy. SlipKnot is + + restricted shareware in its first version from MicroMind, Inc. Until now, + + shareware has generally been distributed with a simple request for users to + + register; SlipKnot takes that one step further. It is restricted + + shareware. That means it is free for evaluation but with strong + + incentives to frequent users to register. After a period of frequent + + reminders, the software eventually turns itself off for nonregistering + + users. + + + + 3) Registration fees or on a sliding scale. For most, the cost is $29.95. + + But individuals outside Northern America, Europe and Japan will pay $20 to + + register. A portion of the receipts will go to support refugee + + organizations (Peter Brooks, the developer, came to the U.S. as a + + refugee). + + + + + + 4) SlipKnot is a case study in the new technology of virtual commerce. All + + promotion, distribution, and registration is being done online. No physical + + shrink-wrapped disk or manual is produced: users download the product with + + documentation. There is no paid advertising or direct mail: potential + + purchasers learn about it through online newsgroups, user groups, mailing + + lists, and through the press. There is no printed and mailed press kit: + + the media hears about it through electronic means -- e-mailed press + + materials and announcements. Registrants send in their addresses and + + payments through fax or encrypted e-mail, and their personal codes are + + returned to them by e-mail. All this is rapid, efficient, and economical. + + + + Below you'll find info on where to get it. If you want to see what others + + are saying about SlipKnot, we've attached some early reactions. + + + + **NOTE** This press kit is incomplete. To keep down the size of this + + message, and ensure that you get the most recent information, AT ANY TIME, + + you can automatically retrieve SlipKnot's features, list of limitations, + + and technical specifications for what SlipKnot requires on the user's + + computer and at the service provider, by sending a blank e-mail message to + + our autoreplying infobot: + + slipknot@micromind.com + + + + I'm a consultant to institutions interested in publishing on the net, and + + author of a book on electronic publishing as a business. I'm doing + + promotion for the release of SlipKnot. + + + + Feel free to forward this message to other journalists, movers and shakers + + on the net. + + + + If possible, please let me know if you're planning to run a story; if it's + + in online form, I'd be very grateful to get an e-mail copy; if in printed + + form, I'd appreciate getting a tear sheet mailed to me at 310 Riverside + + Drive, Suite 1519, New York, NY 10025. Please contact me or Peter Brooks + + (the developer, pbrooks@micromind.com) if you have any questions. In any + + stories, please do not publish my phone number; you can give out my e-mail + + address and fax number. + + + + Thanks in advance--Felix Kramer + + + + * * * * * * * * * * * * * * * * * * + + HOW TO GET SLIPKNOT + + * * * * * * * * * * * * * * * * * * + + + + SlipKnot 1.0, the World Wide Web browser for Windows dial-up users from + + MicroMind,Inc., is now available (right on schedule!) for anonymous ftp + + download at: + + + + ftp://oak.oakland.edu/SimTel/win3/internet/slnot100.zip + + + + or, if it's not too busy, from: + + + + ftp://ftp.netcom.com/pub/pbrooks/slipknot/slnot100.zip + + + + oak.oakland.edu has numerous mirror sites, so if you have any trouble + + getting it directly from there, please try the mirror sites. + + + + One mirror site is: + + ftp.uoknor.edu/mirrors/SimTel/win3/internet/slnot100.zip + + + + In the U.K. try: + + src.doc.ic.ac.uk/computing/systems/ibmpc/simtel-win3/internet/slnot100.zip + + + + In Australia try: + + + + ftp.bf.rmit.edu.au /pub/pc/www/slnot100.zip + + + + (If you don't get to it for a while, please look at the distribution site + + for the latest version file, that is, slnotxxx.zip -- where "xxx" indicates + + the Version of SlipKnot. So, for instance, Version 1.0 is slnot100.zip, + + and Version 1.35 will be slnot135.zip.) + + + + You can also get a FAQ, focusing primarily on common installation problems, + + at: ftp://interport.net/pub/pbrooks/slipknot/sntfaq1.txt + + + + + + * * * * * * * * * * * * * * * * * * * * + + WHAT PEOPLE HAVE SAID ABOUT SLIPKNOT + + SINCE ITS RELEASE IN LATE NOVEMBER + + (INDIVIDUALS FOLLOWED BY PRESS) + + (AFFILIATIONS FOR IDENTIFICATION ONLY) + + * * * * * * * * * * * * * * * * * * * * + + + + * * * * * * * * * * * * * * * * * * * * + + UNSOLICITED COMMENTS FROM BETA TESTERS + + * * * * * * * * * * * * * * * * * * * * + + + + "SlipKnot is a godsend for those without slip."--Walter Rice, 11th grade + + student at Central High School, Philadelphia + + + + "I have really enjoyed SlipKnot. After trying for over a year to get + + Mosaic to work on my PC at home, I found SlipKnot easy to install and use. + + "--Mike McKee + + + + "This is a fun program. A LOT of magazines lately have been talking about + + Internet and the world wide web - and almost all of them say something like + + "To really delve into Internet - you'll need a SLIP or PPP connection." + + Get the word out about SlipKnot.. cause they're dead wrong. I have a shell + + account and it's got everything most people could want. I can read + + newsgroups, send/receive email, use telnet/ftp, download files, and (with + + SlipKnot) browse the World Wide Web! To be honest.. what else is + + there?"--Steve Crawford, MIS Manager for SpectraLink, Inc., Boulder, + + Colorado + + + + "I can use it with my dial-up and the price is certainly right--so I'm no + + longer lusting for a SLIP/PPP connection....If *I* can use this program so + + easily, anybody can....."--Kristi Olesen, author and parent + + + + "SlipKnot is simple to install, use and configure and wonderful in the + + sense that the wonders of the Internet are now truly available to me. As + + you can tell, I love this product. Thanks!"--Tami Duggan, Commonwealth + + Clinical Systems, Inc., Virginia + + + + "Keep up the good work. You've got a winner."--Steven Pitzl + + + + "Real slick....In general, the look and feel of SlipKnot is well-integrated + + & tight....Very cool setup....After looking at many web browsers, I must + + say y'all have a very unique browser, with a gorgeous interface, + + well-thought out and tightly integrated. And smooth. SlipKnot. I'm + + certainly telling everyone I know about it...."--Mark Garland, Civil + + Engineering Office, Santa Fe National Forest + + + + * * * * * * * * * * * * * * * * * * * * * + + REVIEWS FROM USENET AND MAIL TO MICROMIND + + * * * * * * * * * * * * * * * * * * * * * + + + + "Excellent software got it running with almost no problems. + + Congratulations."--Alan from United Kingdom + + + + "For a first release, Slipknot is amazing. It installed easily and worked + + first time."--Will from netcom + + + + "Overall, a really cool program, and quite clever."--SteveG from neosoft + + + + "This is exactly the program I've been searching for these past few + + months....While I loved the web browsing, I found I much preferred the + + Unix programs on my shell account. Now you've given me the best of both + + worlds. Thank you!"--Nelia from netcom + + + + "Solid as a rock."--Rajesh from Temple University + + + + "A really neat program! Saves me time charges on my SLIP account."--Larry + + from netcom + + "-- + + "Great Job Mr. Brooks ! well done !"--Amir from Bremen University, Germany + + + + "You've done an amazing job, without requiring the usual add-ons. I have + + spent hours with SlipKnot in many Web adventures and love the ability to + + toggle it when I want it and to use 'trn' and 'lynx' (the latter for form + + searches and for fastest text-response) and pine. So I'll get a check in + + the mail this week. Absolutely no GPF's, and your keyboard unfreeze + + resolved my one freeze in terminal."--Andrys from netcom + + + + ">One of the most exciting software programs I have seen lately."--Harald + + from Univ of Cincinnati + + + + "A major thumbs up!"--Darren from digex + + + + "Bravo!! What can I say? Seems to be a very stable, and actually pretty + + quick little program."--Mark from Pipeline + + + + "Wow! I've been spreading the word about Slipknot--I don't know when I've + + been more impressed with software in terms of the ease of use. Thanks + + again. I really think you've got a winner on your hands."--Steve from + + netcom + + + + "It worked! This is fantastic! I'm registering my copy ASAP. NOW I can see + + what everyone's so excited about."--Chris from tenet.edu + + + + "We are working on our Internet CD-ROM disc and would include your program + + as the user interface."--Stefan from Germany + + + + "Terrific work and a real contribution to the Internet community."--William + + from George Washington University + + + + "I've been using your software for the past five days and I just wanted to + + say how much I enjoy using it. BTW, I sent in my + + registration/check"--Warren from ncsc.mil + + + + "I think it's terrific, especially the ability to download WWW pages and + + group in folders for future reference off-line!"--Deb from digex + + + + "I'm very happy with SlipKnot and am enjoying seeing for the first time + + what all the fuss is about regarding the WWW."--Phil from panix + + + + "I can't say whether it's better than Mozilla, TIA, etc., but it sure turns + + a shell account into a multimedia banquet!"--Daniel Dern from world.std.com + + + + "I want to roundly condemn you for making and distributing this program. It + + is so simple and easy to use, has so many useful functions and works so + + flawlessly that I will probably spend many more hours in front of my + + computer than I should :-). Anyway, thank you for a superb web browser. + + Give yourself a gold star."--Mark from netcom + + + + "This is so cool, you could get frostbite from it."--William from Denver + + + + + + * * * * * * * * * * * * * * * * * * * * + + EARLY COMMENTS IN THE PRESS + + * * * * * * * * * * * * * * * * * * * * + + + + "Pure, unadulterated magic"--Daniel Dern, noted Internet analyst and + + author, "The Internet Guide For New Users" (McGraw-Hill, 1993) + + + + "Will SlipKnot cause a Web traffic explosion? SlipKnot is a MS-Windows Web + + browser that can be used with a dial-up shell account. Could this be the + + answer for those without a direct or Slip/PPP connection? SlipKnot is a + + very welcome addition to the Web tool box. It will make available the Web's + + graphical displays to a whole new group of Internet users.--Bob Stewart, + + The Virtual Mirror -- http://mirror.wwa.com/mirror/ + + + + "Its chief author, Peter Brooks...plans to sell SlipKnot as shareware. That + + means you download it free from an on-line service, try it out and if you + + decide to keep it, mail the programmer a check. Brooks plans to ask for + + $29.95. It's a steal....At the touch of a button, SlipKnot turned into a + + World Wide Web browser that in some ways worked better than Mosaic. It ran + + a little slower than Mosaic, but not much. And it works without the expense + + and trouble of a PPP account....SlipKnot is going to be a strong + + competitor."--Hiawatha Bray, Detroit Free Press, DFP Forum on Compuserve + + + + "Spurred by a desire to share the wonders of the Web with the vast + + dial-up population, developer Peter Brooks created SlipKnot....'We have a + + small lifetime worth of work in terms of features to include in the + + product,' Brooks confided. 'We will continue to improve it as time goes + + on.' "--Dianna Husum, WEBster, the Cyberspace Surfer + + + + "...A major technological breakthrough. SlipKnot is, as people used to say, + + 'for the manor woman on the street,' and it, and its successor software, + + will invite millions more people to the Web's vibrant new culture."--Joyce + + Lain Kennedy, LA Times Syndicate author, in Hookup/Get Hired, forthcoming + + from John Wiley & Sons in 1995 + + + + "One of the best features of this browser is its ability to retrieve + + documents in the background. According to MicroMind, SlipKnot is more than + + just a Web browser. This program allows for complete navigation of the Net + + and promises to bring Web access to almost all Internet users."--Patrick + + McKenna, Newsbytes + + + + "...for those trapped with terminal-emulation access to the Internet and + + salivating at the new stuff they hear is on the Web, this product is simply + + miraculous.--Richard Seltzer, Internet-on-a-Disk + + + + "One advantage is that whatever Web pages it gets, it keeps them until you + + decide to delete them. Once you're offline, you can go back and review + + pages you had browsed while online. You can keep as many pages as your + + available computer memory allows. SlipKnot is amazing. When it was first + + announced on Internet, I was skeptical whether such a program could work. + + Now, I'm a beiever."--John Fisher, Bucks County Times Courier + + + + SlipKnot has appeared in the National Center for Supercomputing + + Applications (NCSA) "What's New Page", Computer Underground Digest, and the + + Usenet moderated newsgroups comp.newprod & comp.internet.net-happenings + + + + * * * * * * * * * * * * * * * * * * + + SLIPKNOT AS SHAREWARE + + * * * * * * * * * * * * * * * * * * + + + + SlipKnot is published as restricted shareware, free for evaluation but with + + strong incentives to frequent users to register at a cost of $29.95 to most + + people. Individuals outside Northern America, Europe and Japan will be + + asked to pay $20 to register. And 10% of the receipts will go to support + + refugee organizations. + + + + Our shareware evaluation policy is that users who have displayed/retrieved + + over 300 documents are no longer evaluating the software (this should take + + about 2 months of typical usage) and will be asked to register within 30 + + days -- with an additional 21-day grace period if they start the + + registration process. We hope that few users will object to the policy, + + given the price of the software. + + + + * * * * * * * * * * * * * * * * * * * * * * + + NOTE FROM PETER BROOKS, SLIPKNOT DEVELOPER + + * * * * * * * * * * * * * * * * * * * * * * + + + + SlipKnot was created because there was, at that time, no other alternative + + to accessing the World Wide Web graphically if you did not have SLIP or PPP + + or TCP/IP access. Having analyzed Mosaic and some of its competitors, I + + concluded that all of these browsers were designed for people with very + + rapid communications channels into the Internet, not modem users. Even if + + you have SLIP access, most of these browsers do not allow you to save + + entire documents (with the included pictures), forcing you to retrieve the + + documents again whenever you wish to take a full look at them -- + + eliminating the possibility of demonstrating WWW without being online. + + It takes a while to retrieve any document by modem with any browser, and + + you shouldn't have to do this more than once. + + + + The Web is a remarkable human construct and a truly a wondrous place. I + + hope that SlipKnot brings you the magic of the Web, and that you become + + as astounded by it as I am. + + + + + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + + ABOUT MICROMIND + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + + + + MicroMind, Inc. is a New York City-based software development company with + + six major products developed and released for the international market, + + including: + + + + * RUN/C -- the world's first interpreter for the C language -- sold in the + + U.S. and Japan. 20,000 copies sold at $250. + + + + * OL2 -- a product to duplicate the functionality of Sharp Electronics' + + Wizard Electronic Organizer on a desktop computer -- marketed by Sharp + + worldwide. Over 150,000 copies sold at $100. + + + + PETER BROOKS, President of MicroMind and author of SlipKnot, has over 25 + + years of software development experience. + + + + * * * * * * * * * * * * * * * * * * + + FEEDBACK + + * * * * * * * * * * * * * * * * * * + + + + To facilitate communication and support, we are asking users to post + + comments and responses about SlipKnot only to the following Usenet + + newsgroup: comp.infosystems.www.users. + + + + At any time, for the latest SlipKnot information and a list of features, + + either point your WWW browser (lynx is fine) to: + + + + http://www.interport.net/slipknot/slipknot.html + + + + or send a blank e-mail message to: + + + + slipknot@micromind.com. + + + + Please direct any press or distribution questions to + + felixk@panix.com. + + vox: 212/866-4864. fax: 212/866-5527 + + + + Please direct any technical questions to: slpstaff@micromind.com + + + + Mail to Peter Brooks can be sent to: pbrooks@micromind.com + + fax: 212/864-0436 + + + + SlipKnot is Trademarked by MicroMind, Inc. + + This document (c) 1994 by MicroMind, Inc. + + + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + + Felix Kramer/Kramer Communications + + NYC-based electronic publishing & journalism + + Online promotion & marketing + + e-mail: felixk@panix.com or felixkramr@aol.com + + voice: 212/866-4864 fax: 212/866-5527 + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + + + +Date: Sat, 21 Jan 1995 01:39:03 -0600 + +From: Malik Al-Rashim + +Subject: JAUC-File7 + + + + + + OLD FREEDOMS AND NEW TECHNOLOGIES: + + The Evolution of Community Networking + + + + By Jay Weston (jweston@ccs.carleton.ca) + + + + This paper, with only minor variations, was delivered as a talk at the + + FREE SPEECH AND PRIVACY IN THE INFORMATION AGE Symposium, + + University of Waterloo, Canada, November 26, 1994. + + + + ---------------------------------------------------------------------- + + Copyright: This text is released to the public domain. No copyright + + restrictions apply. J. Weston + + ---------------------------------------------------------------------- + + + + North American society has had a lot to say on the distributed public + + media that we call the Internet, or simply the Net. And, in the past + + year or so, we have started to have a lot to say about what we've been + + saying. However, we haven't quite heard what we've been saying. We + + haven't heard because we are inexperienced in listening to each other + + this way. We are listening to the wrong things. Or, as Karl Popper + + once put it, we have been "like my dog, staring at my finger when I + + point to the door."(1) But, we can be forgiven for our misplaced + + attention to the Net. + + + + Since it was first observed that there just was not enough available + + bandwidth to let everybody send smoke signals or bang drums, we've + + been organizing and reorganizing to determine who would, and who would + + not, get their hands on the blankets and the drums -- and the presses, + + the microphones, and the cameras. As we moved through a few + + millennia, successive public communication technologies either began + + as, or very quickly were made to conform to, the extreme send:receive + + imbalances that, somewhere along the line, we started calling the mass + + media, or simply the media. + + + + It would be pedantic in the extreme to do more than note that these + + access restrictions now define all of the social relations of modern + + societies. Whole disciplines are organized around the understanding + + that all public and private institutions, all local and external + + spaces are bent by the constricted and compressed discourses of the + + mass media. Whether the analyses are celebratory or critical, whether + + their mass media interdependencies are made explicit or not, all + + analyses of modern society take the access constraints of the mass + + media as immutable. Public access to these media is simply not + + problematical. On the one hand, there are the media and, on the + + other, there are their audiences, consumers, constituents, and + + publics. + + + + Until very recently, there was no reason to imagine that questions + + would ever have to be asked about societies with abundant access to + + the means of media production, exhibition, distribution, and + + reproduction of cultural offerings. Suddenly, it is time to start + + imagining the questions. That is what the Internet is about. + + + + Some usually astute observers, among them Internet Society President + + Vinton Cerf and Microsoft CEO Bill Gates, are predicting that the + + twenty million now on the Net is only the beginning. Cerf predicts + + 100 million by 1998 (2) and Gates, in a recent interview, confided + + that his big mistake so far had been in underestimating the importance + + of the Internet (3). If they are right, if the hordes are going to + + start beating their drums in public, absolutely everything about the + + existing social order is about to be challenged. Not simply the mass + + media institutions, but all institutions. Everything is at stake. + + + + [If they are wrong, if the Internet is only the latest gizmology, then + + there is nothing to get intellectually excited about. We've been + + there before. For, as exciting or as terrifying as the prospect of a + + tiny 500 channel universe may be, it is just mass media business as + + usual, albeit new and unusual business.] + + + + Whether or not there will be 100 million or so people on the Internet + + by 1998 or so, will depend first, upon whether they want to be there + + and secondly, if they do, who will likely be trying to stop them, why + + will they be trying to stop them, and how will they be trying to stop + + them. + + + + As to the question of whether they will want to be, the Internet + + growth figures are familiar to us all. Steeply up to the right and + + getting steeper. This should be more than enough evidence that, given + + a chance, people are eager to be there. Curiously, this inconceivable + + growth has occurred despite the equally familiar observations that the + + Internet is difficult to access, hard to use, slow to respond and, + + what is mostly to be found there is banal or otherwise offensive, and + + hopelessly disorganized. + + + + This apparent contradiction of millions actively embracing cyberjunk + + cannot be resolved within the vocabulary of the mass media with their + + well-organized, familiar, marvellously honed content packages, that + + are so quickly and effortlessly available. Dismissive statements + + about the potential of the Internet that are based on the quality and + + delivery of content, cannot be resolved by debates about whether such + + statements are accurate or inaccurate. For some, judging the Internet + + by its content, the quality of its information, and the accuracy of + + its databases, is relevant and for others it is not. + + + + For those for whom it is not, the Internet is less about information + + or content, and more about relations. For the mass media, it is + + always just the opposite. The mass media are almost pure content, the + + relationship a rigidly frozen non-transaction, that insulates the few + + content producers or information providers from their audiences. This + + is how we experience and understand the mass media. If it were not + + so, we would not call them the mass media. Five hundred or 5,000 more + + unswitched, asymmetrical, "smart" channels will not change that. + + + + It is, on the other hand, impossible to understand much about the + + Internet's appeal by analyzing its content. The Internet is mostly + + about people finding their voice, speaking for themselves in a public + + way, and the content that carries this new relationship is of + + separate, even secondary, importance. The Internet is about people + + saying "Here I am and there you are." Even the expression of + + disagreement and hostility, the "flames" as they are called, at least + + says "You exist. I may disagree with you, or even dislike you, but + + you do exist." Mass media do not confirm existence, and cannot. + + The market audience exists, but the reader, listener or viewer does + + not.(4) + + + + This is not to argue that the content of the Internet is irrelevant. + + The content defines the relationship. People not only want to + + represent themselves, they ordinarily want to present themselves as + + well as they can. It would be cynical in the extreme to devalue + + these representations, the texts, the exhibited cultural products of + + tens of millions. It is rather to argue that the relational aspects + + of the transactions qualify and define the content in ways that need + + to be understood if the Internet it to be comprehended. + + + + Whatever the reason for millions speaking publicly, this condition was + + not part of the mass media problematic. It is unreasonable to think + + that merely tinkering with paradigms grounded in technologies of + + restricted access will permit a rich interrogation of the range of + + social relations provided for by technologies of unrestricted access. + + + + This call for a vocabulary that directly addresses the centrality of + + distributed public media is not a suggestion that paradigms that + + centrally situate mass media are somehow of less importance than they + + once were. If anything, their questions of access, production and + + representation are more critical, and even more challenging, than they + + were before distributed media raised the complexity of social + + relations. However, an expanded universe of mass media discourse that + + merely attempts to overlay distributed public networks upon the + + structured relationships of a mass mediated society, will lead us to + + misunderstand a society evolving with distributed public media. + + + + It is well-understood that, all social institutions have their + + relative certainties made possible by the centralizing power of the + + technologies of mass communication. The relative certainties that + + accompany attenuated access to the means of symbolic production is + + welded into the fabric of all institutional policies and practices. + + Assuming, then, that access to the means of cultural expression will + + be increasingly distributed, it follows that all of the institutions + + of modern society will be threatened or at least inconvenienced by + + this development. While expressions like "public involvement", and + + "participative democracy", are imbedded in our rhetorical traditions, + + their unquestionable acceptability has always been conditional upon + + their equally unquestionable non-attainability. The technologies of + + mass communication always ensured that involvement and participation + + would not be overdone. + + + + When the institutions that rose to power in the wake of the industrial + + revolution began to speak of the "information revolution", they only + + meant to digitize the modern industrial state. This non-revolution + + was Phase II of the old boys' operation, another remodeling of the + + modern apparatus. The "Information Highway" is the updated codeword + + for the modern retrofit. This was not supposed to be about a + + technological adventure that would reconfigure social relations or + + blur the well-constructed boundaries between the public and the + + private ground. This was supposed to be about a five hundred, not a + + one hundred million channel universe. + + + + The becoming Internet, this decentered polity, is an accident that + + happens to expand the locus of direct, self-mediated, daily political + + involvement. Those who previously had to make themselves presentable + + to the agencies of mass communication technologies in order to be + + represented by the technologies, have begun to publicly represent + + themselves. What was previously local, domestic, idiosyncratic and + + private can, for the first time, become external and public. This is + + an abrupt reversal of the mass media's progressive appropriation of + + the idiosyncratic and private for their own institutional purposes. + + + + Since this reversal was unimaginable, no contingency plans had been + + imagined for dealing with it. But, to the extent that the expansion + + of the public ground challenges become identified for any segment of + + the established order, these challenges will be met. It is axiomatic + + that the Internet and, by extension, public community networks can + + expect massive pressure to diminish or eliminate the identified + + destabalizing influences that these distributed media exert. If the + + Internet, with its changed relations of production and related + + exigencies, is signaling a coming Accidental Revolution, the contests + + and the casualties will be enormous. + + + + This symposium is about the skirmishes, battles and wars that have + + already started. All of these encounters are around the legitimacy of + + public self-expression, assembly, examination and privacy. These are + + the problematic of distributed public media, not of the mass media. + + Beyond our noting that they were lamentably unimportant, the concerns + + relating to freedom of speech were not central to a mass mediated + + society. Our familiarity with freedom of speech was almost entirely + + abstracted from the mass media accounts of their own experiences and + + the performances of their own legal departments. The mass media + + tested the limits of those freedoms for the speechless public. + + + + We are now in the beginning stages of defining the legitimacy of + + self- expression for ourselves. This represents a new set of + + concerns about the circumstance and substance of distributed media + + texts in all of their modes, the bases upon how it comes to happen + + that people 'speak' publicly, and what it is that they 'say'. The + + idea of 'assembly' and how it will happen that groups come to + + occupy territory and how they are distributed globally and locally + + assumes original importance, as decisions get made about what + + 'virtual communities' will be, and where they will situate. The + + privacy puzzles about the availability and use of all those + + sophisticated watching, listening, storing, sifting and intrusive + + devices are a humbling reminder of just how much our reach has + + exceeded our understanding of these technologies. How these + + matters are resolved will shape the distributed media and decide + + their social relevance. + + + + Community networks are contributing a broader distribution of voices + + as these puzzles begin to get worked out on the distributed media + + themselves, rather than only in the exclusive enclaves of special + + interests. This must continue and expand or the awakening of self- + + representation will be short lived. It would be wise to assume that + + there are not yet any 'rights', or that the old freedoms that were + + often hard won by the mass media, are now enshrined and will + + automatically transfer to distributed public media. + + + + + + Situating Community Networks + + + + + + If, as Bruce Sterling observed in the Afterward to his earlier work + + The Hacker Crackdown, "Three years in cyberspace is like thirty years + + anyplace real" (5) and, as events from thirty years past are often + + dimmed or forgotten, I hope you can forgive me for reminding + + you this morning that way back in November, 1991 the Canadian public + + had no access to the Internet. Moreover, there were no signs that the + + public would have any access. + + + + The steepness, even then, of that now overly familiar Internet growth + + curve was entirely attributable to new users from within their + + formal institutional settings. The universities, research institutes + + of the telecommunication giants, and a few government departments had + + the Internet as their private preserve and tightly controlled access + + to it, often denying entry to even their own (6). This control + + existed, even although the administration of these institutions were + + still marvellously unaware of what was going on in their basements. + + Though unintentional, the Internet was still a well-kept secret, its + + threat to the status quo still largely unrecognized. + + + + The commercial online services were busily avoiding the Internet, + + still building the firewalls around their own proprietary + + networks. Their fees were so high, and their services so meagre, + + that they were providing little incentive for the general public + + to even begin to experiment with their narrow networking + + offerings. + + + + The recurring telco dream of local metered service was a constant + + reminder that the Canadian public might never experience the Internet. + + Failure of poorly conceived commercial network services like Bell + + Canada's "Alex" and Australia Telecom's "Discovery" had convinced the + + telcos that not even the business community was ready for network + + services. + + + + The Canadian Network for the Advancement of Research, Industry and + + Education (CANARIE), as its name implied, betrayed no awareness that + + there might be people in this country. Even by the end of 1992 when + + CANARIE released its business and marketing plans, the hundreds of + + written pages devoted to its vision made almost no reference to the + + Internet, and carefully avoided the 'public' as serious participants + + in what the partners had in mind for the country.(7) + + + + These are but a few isolated examples of the evidence that the + + Internet had either not yet penetrated the collective institutional + + consciousness or was enjoying a brief period of benign neglect. For + + those who had experienced the Internet and begun to internalize even a + + small amount of what was happening, the general inattention seemed + + amazing, even eerie. + + + + One thing was very clear. With no public or private restrictive + + policies in place, if there was ever a brief moment when it might be + + possible to unleash the Internet in Canada, to really unconditionally + + distribute this distributed capability to the Canadian public, it was + + 1991. (The National Capital FreeNet and the Victoria Free-Net were + + not actually unleashed until late 1992, but the idea was developing in + + the autumn of 1991.)(8) + + + + The full stories of how the first Canadian community networks managed + + to uncage the Internet should probably be told some day. These + + stories need to be told to fill in the historical record, and to + + preempt any misconceptions that the development was simply blind + + luck or simply technology running its inevitable course. For now, it + + is enough to say that the freenet initiative in Canada was understood + + and intended from the very beginning as political action. At least, + + it was in the instance of the National Capital FreeNet, the community + + network where I live and, about which I am best able to speak. + + + + It was understood from the first, for instance, that the relatively + + narrow and concrete act of having electronic mail and Usenet + + newsgroups available, and at their real cost to the community, would + + ensure widespread acceptance, and that the acceptance rate would be + + stunning. It was also understood that once these were made freely + + available, it would be difficult to take global electronic mail away, + + or to introduce it at the leisurely rate and higher tariffs that are + + customary with market driven services. + + + + More importantly, it was understood that the inclusionary ideals and + + vocabulary of the Freenet would both protect and sustain the + + initiative after the private sector realized that a public market for + + networked services was being created for them. + + + + The National Capital FreeNet was an imagined public space, a dumb + + platform where all individuals, groups and organizations could + + represent themselves, where conflict and controversy could occur + + as the manifestation of conflict and controversy already occurring + + within the community. As a public space, no one, and certainly no + + group or institution, would be held responsible for another's + + ideology, moral standards, expectations or motivations. On the + + other hand, each person or organization would be accountable for + + themselves. Such a space could be constructed only by the + + community acting as a community, and not by any public or private + + organization acting on behalf of the community. At least that was + + the idea in 1991. + + + + Just three years later, the Net situation has changed dramatically. + + Although still unreasonably expensive, commercial Internet access is + + fairly readily available, and very shortly community networks like the + + National Capital FreeNet will not be needed, or even wanted, as + + Internet access points. FreeNets will have to become the vital, local + + public spaces they originally promised to be. + + + + Just calling the facility a community network does not make it + + one. The label does not ensure an unconditional public terrain + + where the whole community can celebrate its commonalities and + + diversities, and work through its differences. In 1991, there was + + not much urgency to focus on these ideals. Access to the existing + + and emerging Internet services, and at no involuntary cost, was + + enough to ensure a community network's success. It was not then + + understood by the community networks that this powerful Internet + + access lever would slip away so quickly. + + + + Community networks must now understood that they must be community + + networks. This means that they cannot be financed or run for the + + community by one or another institution. Although networks run by + + such organizations as universities, hospitals, telephone + + companies, or governments, often do not charge a fee, and always + + provide an array of valuable services, these are not the criteria + + by which community network can be usefully defined. + + + + Community networks run by other organizations are always + + conditionally invested with the values, missions, mandates, + + policies and procedures and other constraints necessarily imposed + + by the host institutions and, therefore, cannot ever provide a + + public terrain. No institution has a primary mandate to provide a + + public space where public opinion can be under construction. When + + freedom of expression is a secondary add-on, it is just that, and + + will be encouraged only so long as it is not in conflict with what + + the institution is primarily about. + + + + Today's youthful community networks, are better than they have any + + right to be this soon and are still our best hope, maybe our only + + hope, for a more participative, more self-representative democracy. + + It is too bad that they will have to mature so quickly if they are to + + reach adulthood. While they are still critical Internet access + + points, still the bridge between the vast diversity of the Internet + + and the more homogeneous organic community, they must take that + + opportunity to learn how to celebrate the vast diversity that is + + also the local community. The local community is where people live + + their social and political lives and that is where differences must be + + publicly worked through. This is most important where the differences + + are the most acute and where the latitudes of tolerance are the + + narrowest. Community networks must be up to letting everyone speak, + + as painful as this will be for some, some of the time. + + + + Children, and others unequipped to make safe judgments when + + encountering the most extreme clashes of values, opinions and + + advocacy, must be protected from these conflicts, but the community + + network cannot be their guardian. The family, the school, the place + + of worship and other societal structures are their guardians. + + + + Finally, and most importantly, the part-time, short-term stewards of + + the community networks, usually called the 'board', must understand + + that the public terrain is not their institution, and not their moral + + preserve. The construction of Public Sphere, Inc. is a betrayal of + + the promise community networks have for becoming a public terrain. As + + community networks develop and mature, they are becoming more + + exclusionary, more restrictive, more like any other organization. + + They begin to see themselves as providing something for the community, + + rather than as caretakers of a space created by the community. This + + needs to be reversed. A commitment to defending and expanding this + + public ground will determine whether community networks will survive + + more than a few more year and, what is more, whether their survival + + will be a matter of importance. + + + + + + + + Endnotes + + + + (1) Popper made the statement at a public lecture at Michigan State + + University in the mid-sixties. Ironically, he was arguing that + + the then popular social science translations of the electrical + + engineering 'information theory' model were misguided attempts + + to understand social communication by what he termed 'bucket + + theories', where the transactions are comprehended only as buckets + + of content, devoid of any human consideration. + + + + (2) Written testimony to United States House of Representatives, + + Committee on Science, Space and Technology, March 23, 1993. + + + + When asked what he thought about the reliability of Cerf's + + estimate of 100 million Internet users by 1998, Gerry Miller, + + Chairman of CA*net, the non-profit company that manages and + + operates the Canadian Internet backbone network, responded wryly + + "Try 100 million hosts." While Miller might not have meant that + + literally, it was clear that he felt Cerf's earlier estimate to + + now be a significant underestimate of expected Internet growth. + + Private conversation, Ottawa, November, 1994. + + + + (3) PC Magazine, "Bill Gates Ponders the Internet" by Michael Miller, + + October 11, Volume 13, Number 17, 1994 p79. + + + + (4) An explication of framing human communication as the inevitable + + interplay of content and relational components of symbolic + + transaction was provided by Paul Watzlawick, Janet Beavin and Don + + Jackson in PRAGMATICS OF HUMAN COMMUNICATION. This 1967 monograph + + has attracted little attention from media scholars and other + + social theorists, probably because the unidirectional + + producer/consumer relationship between the mass media and their + + audiences is fixed, thereby eliminating or greatly inhibiting the + + metacommunication interplay. + + + + (5) Bruce Sterling, "Afterwards: The Hacker Crackdown Three Years + + Later", January 1, 1994. Found on the WELLgopher + + URL: gopher://gopher.well.sf.ca.us:70/11/Publications/authors/ + + Sterling + + + + (6) For example, undergraduate students in most programs at most + + Canadian universities could not get computer accounts in 1991. + + Also, many of the first cohort of National Capital FreeNet + + subscribers were federal civil servants from departments and + + ministries where Internet access was available, but only to a + + selected few. + + + + (7) CANARIE Associates, "CANARIE Business Plan" and "CANARIE Marketing + + Plan", July 15, 1992. + + + + (8) The National Capital FreeNet was inspired by the Cleveland + + Free-Net, founded in 1986 by Tom Grundner at Case Western Reserve + + University. "Free-Net" is a registered servicemark of the + + National Public Telecomputing Network. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + INFORMATION SUPERHIGHWAY: REALITY + + + + By Reid Goldsborough (reidgold@netaxs.com) + + + + Here's some information on the information superhighway you may find + + interesting. These are excerpts from the first chapter of a new book I've + + written, published by Macmillan Publishing/Alpha Books and titled + + "Straight Talk About the Information Superhighway." The book discusses in + + detail how this national network will affect all aspects of our lives, + + from interpersonal relationships to jobs, from health care and education + + to entertainment and shopping. + + + + In the book I try to present both plusses and minuses, honestly and + + without either hype or cynacism. In addition to covering the likely near- + + and medium- term future, the book also discusses the current state of + + Internet culture. + + + + *** + + + + "Information superhighway" is really just a shorthand term for many + + different networks that will be used for the delivery of information, + + communications, and entertainment. Once the kinks get worked out, it's + + expected -- or at least hoped -- that most of these networks will connect + + with one another, leading to a seamless national, or international, + + communications matrix. + + + + -- + + + + When the movers and shakers talk of the information superhighway, most of + + them think in terms of one of two visions. The first is of a cerebral + + highway, where information and communications are the key commodities + + transferred. The second is of an entertainment highway -- sometimes + + disparagingly referred to as a "couch potato highway" -- where movies, + + TV shows, interactive games, and home shopping offerings are the more + + prevalent content. + + + + Those who see the information superhighway as an extension of the Internet + + see additional types of information being made available to personal + + computer users -- voice, music, and full-motion video. Those who favor the + + entertainment-based vision see the information superhighway as an extension + + of cable TV. Only instead of waiting for movies or programs to come on, + + you'd be able to watch just about anything you wanted anytime you wished. + + + + The entertainment vision is favored by those who would profit from it -- + + cable TV companies and telephone companies, both of whom will be building + + the broadband pipelines and delivering the multimedia content into homes + + over the coming years. The information vision, on the other hand, is + + favored by the computer industry and particularly by the online community, + + which views the cable TV and telephone companies as threats to the low-cost + + sharing of information that exists today. + + + + -- + + + + Not everybody is enamored with the idea of the information superhighway. + + The information superhighway, say critics, is a bad metaphor for a + + boondoggle that big business wants to build with your tax dollars. If it's + + ever finished, you'll pay big bucks for ten times more channels to watch + + reruns of The Lucy Show. If it ever is finished. Critics contend the + + technology won't be ready for prime time for years to come. + + + + -- + + + + The uncertainty surrounding an undertaking as large as the information + + superhighway in many ways *is* frightening. "I guess the scariest part is + + that you don't know where it's going to lead," says John C. Malone, + + president and CEO of Tele-Communications Inc., the country's largest cable + + TV company and a major information superhighway player. "This is a + + technological and business structure revolution. Nobody can sit here today + + and predict where it's going and what its impact is going to be on any + + particular industry, any particular company, or any particular individual." + + + + Fortunately, fear of change isn't stopping our forward momentum. As you'll + + see in the following pages, people are using communications technology + + today -- and planning to use enhanced services tomorrow -- in a host of + + fascinating ways. The changes happening now truly represent a revolution, + + a revolution that will transform jobs, education, relationships, + + entertainment, shopping, health care, and politics, a revolution in which + + you can play a part. + + + + *** + + + + If you'd like to read more, the following will help you decide if it's + + worth it to you to buy the book. Please note that I mention specifics, + + including price, so if you object to commercialism of any sort, don't read + + the rest of this message. + + + + In writing the book, I interviewed key industry leaders such as Bell + + Atlantic Chair and CEO Ray Smith and former Apple Chair and CEO John + + Sculley; top government officials such as FCC Chair Reed Hundt; industry + + and government watchdogs such as Ralph Nader; social commentators such as + + Dr. Joyce Brothers (on relationships and sex on the Internet today and + + information superhighway tomorrow); and people like you using today's + + online services. + + + + I also relied on demonstrations of emerging information superhighway + + technology; important government white papers; key speeches and + + Congressional testimony by politicians, company CEOs, and community + + leaders; and my own explorations of today's online and multimedia worlds. + + + + "Straight Talk About the Information Superhighway" covers topics + + relevant to online users, including: + + + + * The top sources of online information and entertainment today + + * Online shopping, advertising, and the commercialization of cyberspace + + * Online job searching + + * First-hand accounts of love in cyberspace and tips on how to find it + + * Computer-enhanced sex + + * The spiritual underpinnings of cyberspace + + * The psychology of flamewars + + * Computer nerd jokes + + * Computer addiction + + * How interactive TV will differ from today's passive offerings + + * The combination PC/TVs of tomorrow + + * The telephone/cable wars + + * Privacy, access, and freedom of speech + + * Avoiding infoglut with intelligent agents + + * The future of multimedia and virtual reality + + * Distance education + + * Telemedicine + + * Personalized news + + * Direct democracy + + * Grass-roots organizing over the Internet + + * New trends in telecommuting + + + + "Straight Talk About the Information Superhighway" by Reid Goldsborough + + is published by Macmillan Publishing/Alpha Books (ISBN: 1-56761-513-9). + + You should be able to find a copy in your local bookstore. If not, you + + can ask them to order a copy or you can order the book directly from + + Macmillan Publishing by phoning (800) 428-5331. The cost is $19.99. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + INTERNET TOOLS SUMMARY + + + + By John Arthur December (decemj@jec310.its.rpi.edu) + + + + Hello, + + + + I've updated my list summarizing Internet tools for Network + + Information Retrieval (NIR) and Computer-Mediated Communication + + (CMC). This list gives definitions and references to + + documentation and demonstrations of these tools. + + + + The list is available in several formats: text, 80-column text, + + compressed postscript, html, tex, or dvi. + + + + These files are available via anonymous ftp: + + + + Anonymous ftp host: ftp.rpi.edu + + Directory: pub/communications/ + + Files: internet-tools {.txt .ps.Z .dvi .html} + + + + See file: internet-tools.readme for more information. + + + + For Web access, see the "segmented" hypertext version at: + + + + http://www.rpi.edu/Internet/Guides/decemj/internet-tools.html + + + + FILES + + ===== + + Basically, + + o internet-tools.ps looks best for reading on paper. + + o internet-tools.txt is good if you want the 80-column constraint. + + o internet-tools is great for manipulating with Unix scripts. + + o internet-tools.html is useful in a WWW browser; + + Connect to URL: + + http://www.rpi.edu/Internet/Guides/decemj/internet-tools.html + + + + CONTENTS: + + ========= + + * Section -0- HOW TO USE THIS DOCUMENT + + * Section -1- ABOUT THIS INFORMATION + + o Notes + + o Formats + + * Section -2- NIR = NETWORK INFORMATION RETRIEVAL + + o Utilities + + - Finger + + - Netfind + + - Nslookup + + - Ping + + - Shepherd + + - TIA = The Internet Adapter (tm) + + - WHOIS + + - X.500 + + o Tools + + - Alibi = Adaptive Location of Internetworked Bases of Information + + - Archie + + - Astra + + - Bitftp + + - Essence + + - FSP = File Service Protocol + + - FTP = File Transfer Protocol + + - Jughead + + - Knowbot + + - Maltshop + + - Netserv + + - Soft-Pages + + - Spiders + + - Telnet + + - Trickle + + - Veronica + + o Systems + + - Alex + + - GN + + - Gopher + + - Prospero + + - WAIS = Wide Area Information Server + + - WWW = World Wide Web + + o Interfaces + + - Lists + + - Biomix + + - Chimera + + - Cello + + - Compass + + - Emacs-WWW-browser + + - Fred + + - GINA + + - Hyper-G + + - Hytelnet + + - Internet-in-a-box + + - Minuet + + - Mosaic + + - Lynx + + - Netscape + + - Samba + + - SlipKnot + + - Viola + + - Willow + + * Section -3- CMC = COMPUTER-MEDIATED COMMUNICATION + + o Interpersonal + + - Email + + - Talk + + - ZTalk + + o Group + + - Collage + + - CU-SeeMe + + - Haven + + - Lily + + - Listproc + + - LISTSERV + + - Majordomo + + - Maven + + - MU* = Multiple-User Dialogue/Domain/Dungeon + + - Procmail + + - WIT = Web Interactive Talk + + - WW = Web World + + - Yarn + + o Mass + + - ICB = Internet Citizen's Band + + - IW = Interactive Webbing + + - IRC = Internet Relay Chat + + - ITR = Internet Talk Radio + + - Mbone + + - Usenet + + o Interfaces + + - exMOO + + - htMUD + + * Section -4- STANDARDS + + o Collections + + o Internet + + o Other + + * Section -5- REFERENCES + + * Section -6- DESCRIPTION OF ITEMS + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LEGION OF DOOM T-SHIRTS!! Get 'em + + + + By Chris Goggans + + + + After a complete sellout at HoHo Con 1993 in Austin, TX this past + + December, the official Legion of Doom t-shirts are available + + once again. Join the net luminaries world-wide in owning one of + + these amazing shirts. Impress members of the opposite sex, increase + + your IQ, annoy system administrators, get raided by the government and + + lose your wardrobe! + + + + Can a t-shirt really do all this? Of course it can! + + + + "THE HACKER WAR -- LOD vs MOD" + + + + This t-shirt chronicles the infamous "Hacker War" between rival + + groups The Legion of Doom and The Masters of Destruction. The front + + of the shirt displays a flight map of the various battle-sites + + hit by MOD and tracked by LOD. The back of the shirt + + has a detailed timeline of the key dates in the conflict, and + + a rather ironic quote from an MOD member. + + + + (For a limited time, the original is back!) + + + + "LEGION OF DOOM -- INTERNET WORLD TOUR" + + + + The front of this classic shirt displays "Legion of Doom Internet World + + Tour" as well as a sword and telephone intersecting the planet + + earth, skull-and-crossbones style. The back displays the + + words "Hacking for Jesus" as well as a substantial list of "tour-stops" + + (internet sites) and a quote from Aleister Crowley. + + + + All t-shirts are sized XL, and are 100% cotton. + + + + Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for + + postage. + + + + Send checks or money orders. Please, no credit cards, even if + + it's really your card. + + + + + + Name: __________________________________________________ + + + + Address: __________________________________________________ + + + + City, State, Zip: __________________________________________ + + + + + + I want ____ "Hacker War" shirt(s) + + + + I want ____ "Internet World Tour" shirt(s) + + + + Enclosed is $______ for the total cost. + + + + Mail to: Chris Goggans + + 603 W. 13th #1A-278 + + Austin, TX 78701 + + + + These T-shirts are sold only as a novelty items, and are in no way + + attempting to glorify computer crime. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + +Date: Sat, 21 Jan 1995 02:13:10 -0600 + +From: Malik Al-Rashim + +Subject: JAUC-File8 + + + + + + INTERVIEW WITH ERIK BLOODAXE + + + + By Netta Gilboa + + + + Interview with Erik Bloodaxe (GRAY AREAS REPRINT) + + The following are portions of an interview with "Erik Bloodaxe" by Netta + + Gilboa of Gray Areas Magazine. Gray Areas is an eclectic arts and culture + + magazine that focuses on the fringes of society. It's one of the best + + sources for information on rock and alternative music, controversial + + social issues, computer culture, and other topics that aren't covered + + elsewhere. It's a steal $18 for four issues, or $50 for three years. For + + information, write: + + + + Gray Areas + + PO Box 808 + + Broomall, PA 19008-0808 + + + + Or, e-mail them at grayarea@well.sf.ca.us + + + + For those new to computer culture, "erik bloodaxe" was a member of + + the original "Legion of Doom," a modest media celebrity, and + + more recently, the editor of Phrack)). + + + + ((Excerpts from interview with Chris Goggans at Pumpcon, 1993. From: + + GRAY AREAS, Fall, 1994 (Vol 3, #2): pp 27-50)) + + + + By Netta Gilboa + + + + Netta Gilboa: What is Phrack magazine? + + + + Chris Goggans: Phrack is the longest running underground publication. + + I don't really know how to describe Phrack. Phrack just sort of is. + + Phrack is an electronic magazine that deals with topics of interest to + + the computer underground; different types of operating systems, + + weaknesses in system architectures; telephony; anything of any + + relevance to the community in which it was intended for, that being + + the computer underground. It has always tried to paint a picture of + + the social aspects of the computer underground rather than focus + + entirely on technical issues. So in that way it adds a lot of color to + + what's going on. + + + + GA: How did you get involved with publishing Phrack? + + + + CG: Well, I got involved when the person who was editing it at the + + time, Dispater, got into a motorcycle accident and as a result of + + this, had a lot of other financial hardships, so he wasn't going to be + + able to do it any longer. Its original editors, Craig Neidorf (Knight + + Lightning) and Taran King, had no interest in doing it themselves any + + longer for, at least in Craig's case, obvious personal reasons, and + + there really was no one else who could take it over. I was of the + + mind set that Phrack had been around so long that it had almost become + + something of an institution. I, being so ridiculously nostalgic and + + sentimental, didn't want to see it just stop, even though a lot of + + people always complain about the content and say, "Oh, Phrack is lame + + and this issue didn't have enough info, or Phrack was great this + + month, but it really sucked last month." You know, that type of thing. + + Even though some people didn't always agree with it and some people + + had different viewpoints on it, I really thought someone needed to + + continue it and so I kind of volunteered for it. And there was a + + little bit of discussion amongst some people. + + + + First Craig was really hesitant to say, "Yeah, well maybe you should + + take it over." A lot of this was being held up by Taran King who said, + + "Well, we just don't want your politics getting involved." Because, + + apparently, I have some hidden political agenda that differed with + + what they thought the role of Phrack should play. Eventually they + + decided that there is really no one else who could do a job well + + enough to continue it in the spirit in which it had been formed and I + + started with issue 42. And I think that one went over very well. That + + issue was pretty hilarious because it had a lot of stuff about packet + + switching networks, and it was a big slap in the face to B.T. Tymnet. + + I had a whole lot of fun with that issue. Since then, it's gone over + + really well, at least from everyone I've talked to. Of course there' + + have always been a few dissenters that say, Oh, Phrack sucks, but + + these are the same people who won't tell you why. They're just saying + + it to try to get a rise out of me or something, but everybody seems to + + appreciate the time and effort that goes into putting this out and + + especially since I'm getting nothing out of it. + + + + There's kind of a funny side to that. After I took it over, I went + + ahead and I registered it with the Library of Congress and I filed a + + DBA as Phrack magazine and for the first issue I put out a license + + agreement, sort of, at the beginning saying that any corporate, + + government or law enforcement use or possession of this magazine + + without prior registration with me was a violation of the Copyright + + Law, blah, blah, blah, this and that and Phrack was free to qualified + + subscribers; however, in order to qualify as a qualified subscriber, + + one must be an amateur computer hobbyist with no ties to such a thing. + + And this really went over like a ton of bricks with some people. A + + lot of corporate people immediately sent back, "Please remove my name + + from the list." I had a few other people say, well, "We're going to + + pay, but don't tell anybody we're going to pay." Of course, they never + + did. There was only one person who actually did pay, so, you know, I + + used that as wonderful ammunition for the next issue saying that all + + of them are lying, cheating scums and they have no respect for our + + information so why should they think it odd that we have any respect + + for theirs. + + + + GA: And you actually named a few people. + + + + CG: Yeah, I named several people who were not only getting the + + magazine but in one case, they were spreading it around and, of + + course, none of them even contacted me for registration. It was all, + + I had a riot with it. It was a lot of fun. And, I'm still going to + + include that in every issue because I still expect them, if they're + + going to be reading my magazine, to please have some shred of decency + + and pay the registration fee, since it's a lot less than any other + + trade publication that they'd be buying regardless, and certainly a + + lot more voluminous and contains a lot more information than they're + + going to find in any other magazine dealing with computer security. + + + + GA: Is the agenda for that decision to get publicity, to have grounds + + to sue people who you don't like, or to gain financially? + + + + CG: Well, I never expected to gain anything financially. You know, a + + lot of the people who are still in the so-called "underground" are + + also working in various fields which might put them in conflict with + + the registration agreements, and we're very liberal about that. I + + mean, if someone just because they're working at, let's say... + + + + GA: Gray Areas, Inc. + + + + CG: Yeah, Gray Areas, Inc. or the people who might be independent, + + like LAN consultants, you know, just 'cause someone's working in the + + field, I'm real flexible about that. Then if someone sends me mail, + + and I get a lot like that, which says, "Well, I'm assistant + + administrator here at the university and there's no way they'll pay + + for it." I'm like, "Don't worry about it." You know, "We'll make an + + exemption in your case." But it's the people, the Gene Stafford's of + + the world, the Ed DeHart's of the world. Those are the people who + + have always pointed the finger at the people who this information is + + intended for and called them bad. They're the ones who don t register + + their subscriptions and the people of their mind set and the people of + + their ilk, I guess. + + + + As far as publicity, it didn't gain any publicity. It wasn't any kind + + of stunt. My biggest concern in doing this was to try to protect this + + information and I didn't want to see it being resold. With the prior + + Phracks up 'til 41, there are companies out there, for example Onion + + Press who sells hard copies of Phrack, and I don't want anything that + + I'm putting time and effort into being resold. I don't want it in the + + CD-ROMs. There's are several CD-ROMs out right now with a bunch of + + text files from the computer underground. + + + + So, I wanted to copyright this information, put it out. It's a + + magazine, I'm doing it, it's my magazine. The DBA is in my name, I + + hold the copyright and no one's going to resell this. If it's going to + + be presented in some other format, I want to be able to control that. + + And, it's not necessarily a kind of power play. It's just I want to + + protect it. I mean, I don't think you'd appreciate people all of a + + sudden saying, "Now I'm going to put up the electronic version of Gray + + Areas." + + + + ======================= + + + + GA: Many years ago, Phrack had a problem with a telephone company + + regarding a document that they printed, and a lot of people have said + + that if it was a paper publication as opposed to an electronic + + publication, that might never have happened. + + + + CG: Yeah, well, I mean, that's obvious. You look at magazines like + + 2600 and just because they're black letters on a white page instead of + + white letters on a black screen, they get away with a lot of stuff. + + They get threatening letters from Bell Cores. They like to publish + + them in their magazine, but they haven't been taken to task for any of + + that. You don't see them in any sort of court for this and the mere + + fact that the very document that they are saying was so proprietary + + was available for $19.95 from the Bell Core order line. That sort of + + stands to prove that they were just looking for a scapegoat, a + + figurehead in the underground community to use as an example for the + + rest of the people to say, "Well, we'll take down Phrack. That'll + + show them. That'll scare them." + + + + It's the same kind of thing that they tried to do with The Legion of + + Doom. They said, "Well, we took down the Legion of Doom." I heard it + + from one person, you know, you cut off the head, the body will die. + + It's like, AT&T or somebody had somebody map out the computer + + underground, they had Phrack magazine in the middle of a hub and the + + Legion of Doom above that; arrows going and pointing out how the + + computer underground networks together, and obviously, these people + + think there's a little more structure to it than there is. They don't + + realize that it's complete anarchy. I mean, no one's controlling + + anybody else's actions. To set out one example and hope that everybody + + else is going to learn from that one example is ludicrous. + + + + GA: What sort of problems do you encounter publishing it? + + + + CG: It takes up a lot of my time, my spare time, which is growing + + incredibly smaller and, I mean, I've overextended myself on a number + + of projects and since I've definitely got a commitment to Phrack, it's + + one that I can certainly shirk if I decided to since I'm not indebted + + to anybody to do it really. I'm not going to pass it up because I + + really want to make sure it continues to be published. That's the + + biggest problem I face, time. Then there are people who say, "Oh, I'm + + going to send you a file on this," and they don't. You know, thanks a + + lot. And I always rag on those people. In fact, in the beginning of + + Phrack 44, I said, "Yeah, and for the people who said they're going to + + send me a file and didn't, you know who you are, and you always have + + to live with your own guilt." I mean, it's typical hacker stuff. "I'm + + going to do this." And they start it and they forget about it. + + + + GA: It's funny though because I've had incredible cooperation from + + those people; more than I've had from any other community that we deal + + with. Do you think it's because I'm a girl or because it's on paper? + + + + CG: Well, it might be a little of both. The kind of files that go in + + Phrack, I don't think Gray Areas is going to publish. You know, how to + + use the Role 9000 CBX, or here's how to hack system 75's, or secret + + sectors and units, or publish C programs. You get a different type of + + thing. Maybe there are people who feel a lot more comfortable writing + + cultural type pieces or special interest pieces than they would + + writing technical stuff. And to try to compensate for that. I've put + + in a lot more stuff in the issues that I've been dealing with, to deal + + with the culture. Like I started something last issue trying to get + + people from different countries to write about what it's like in that + + country. And I had a file in from Ireland; I had a file in from + + Germany; I had a file in from Canada. This issue I've got another one + + from a different part of Canada and I've got one from Sweden and I'm + + waiting on a couple of others. Because, as the computer underground + + goes, it's, people like to have this idea that it's this closely knit + + thing of all these hackers working together, and see how they're + + trading information. But it's not. I don't know anything that's going + + on in other countries except for what the few, select people from + + those countries who hang out in the same areas that I do tell me. But + + there's so many people and so many countries doing things. + + + + They've got their own little pirate wares, trading scenes, they've got + + their own little virus scenes, they've got their freaking things. + + Stuff that works on their own system, only works in their country; and + + they have their own secret ways of doing things, and their own + + networks that they like to hack, and they all hang out on certain + + deals and they have their own little lore about the busts, or super + + hackers from their country, and that's the kind of stuff that's just + + great to find out. Because, otherwise, you would never know. And it's + + really, really interesting to read what these people are up to and no + + one names names. They're just talking about what it's like to be a + + hacker in their country, and that's the kind of cool stuff that I + + want to continue to do. + + + + ======================= + + + + GA: I suppose we should get into your background and how you became + + qualified to run Phrack. + + + + CG: I don't know if it's a qualification to run Phrack... + + + + GA: Well, obviously, there are an awful lot of people who could have + + been considered but weren't. + + + + CG: Yeah, well, I guess so. + + + + GA: What sort of stages did you go through? From the time that you + + first discovered computers and so on until today? + + + + CG: I kind of went through an exponential learning curve from the very + + beginning and it plateaued out for a while and it's just been a steady + + growth since then. At least I tried to maintain that because there's + + so many new developments that come out and I try to stay abreast of + + everything that's going on. I started messing around with computers a + + very long time ago. For any number of reasons, I always have problems + + trying to place the exact date. + + + + GA: What sort of computers were there? That dates it a little. + + + + CG: Well, the very first computer I did anything on with a modem was + + an Apple II, and a micro modem II. It was a friend of mine's dad's. + + He was a lawyer. He got it so he could get on Dialogue, because it + + was like the brand new service for lawyers. They could go on and look + + up legal briefs and it was all exciting. So, this friend of mine was + + showing it off, I guess maybe 5th grade, 6th grade, somewhere around + + there? A long time ago. And, in order to get on Dialogue, you had to + + dial this special number. Well, we got on, followed the instructions, + + got on Dialogue, looked at it, said, "This is really cool." And we + + noticed that, "Well, gee, in order to get on Dialogue, you have to + + dial this number" which was 415 something. Well, what happens if you + + type in a different number? So we typed a different number somewhere + + else. And, that was sort of it. + + + + We spent the vast majority of that night trying different addresses on + + Telenet and actually got into a system. And, this was the first time I + + had ever been on a modem and, I mean, it was just natural. We were + + like, wow! We didn't have any concept of what a network was, we + + couldn't imagine what this meant. The concept of being able to call + + one little number and connect to computers around the entire country + + was so mind boggling, so strange to us that we were sucked into it. + + + + As a little bit of background to this, I had already been messing + + around with telephones before this and this is a ridiculous story that + + a lot of people give me a lot of s--- about but, I mean, I don't + + really care. A friend of mine and I had stolen a dirty magazine from a + + convenience store and rifling through it, it was like a High Society + + or something like that. + + + + GA: Probably not. There were no such things then. They didn't start + + until 1975-76. + + + + CG: Well, this is back in 1980. I'm not that old. I turned 25 in May, + + so it wasn't that long ago I guess in the grand scheme of things. + + But, to me it was a hell of a long time ago. So anyway, we had stolen + + a High Society from them and in it, it said, "Call this number right + + now." It was 212-976-2626 or 212-976-2727, a brand new service. I + + said, "We got to call that number. We can't call that number, that's a + + long distance number, we'll get in trouble." It was like, "No, we + + gotta call that." So, we went back over to his house, and his Mom + + works. She was working, it's funny, she was actually working at + + Datapoint. She was at work, it was the summer, so we got there and + + dialed it up, listened to if for, like you know, some phone sex + + recording. Wow! You're a little punk kid, of course, that's just great + + to hear some crazy recording like that. + + + + We hung up after it was over and were like, "Man, that's great. We're + + going to have to call that other one. No we can't call the other + + one. He says, "Well, actually maybe we can, but if we're going to + + call it, we need to use this thing that my Mom's got." What thing? He + + said, "Well, it's this thing that's supposed to make her phone bill + + cheaper." And, it was a company that started up way back then called + + LDS. It was a Watts re-seller and they had a local dial-up number, you + + call up and you gave the operator who answered the phone a code, you + + read it out to her and she connected the call. I think at that time it + + was a four or five digit code. So we called up, gave it to her, gave + + her the number, the call went through. So, next time you call her + + back, give her someone else's number. Goes, "nah." So we called up, + + added ten to the number we had and placed the call. It was like, + + "Well, that's really cool." And it's funny that I've done that prior + + to doing anything on the computer because shortly thereafter, after + + being on the computer and discovering networks and after that, + + discovering bulletin boards, it became readily apparent to me how the + + marriage of the two was inevitable because there was no way in hell + + I'd be able to call a bulletin board any place other than down the + + street and not get beat to death by my parents for raking up very + + large phone bills. And after that, it kind of just shot up + + exponentially like I said before. From such humble beginnings. + + + + ======================= + + + + CG: Which connected, at the time, I think now they have limits as to + + how many people. At the time, it was basically unlimited. You could + + take as many people as you wanted on your conference. And they had a + + lot of different features that they don't have now. Like, you could + + transfer control. And we used to do all sorts of ridiculous stuff. + + One of my favorite tricks was to call up Directory Assistance and, at + + the time, I don't think they do this any more, I haven't really + + bothered to check in about five years, but at the time, Western + + Digital who made all the automatic call distribution systems for + + Directory Assistance since they were still the Bell system; they had a + + feature in there that would send it into a test mode. If you called + + up and just as the ACD system kicked in, it started to cue a call for + + the next available operator if you held down a D tone. A lot of your + + readers might not know this, but on a standard touch tone phone, there + + are really four rows and four columns and not three rows and four + + columns. There's an extra column that's left out and that's A, B, C, + + and D. Well, I had a phone that had A, B, C, and D on it. There's a + + number of different ways to build a tone generator, they'll do that + + and a lot of modems will make those tones or what have you. But, + + anyway, there was a trick at one time by holding down the D tone, if + + you called Directory Assistance, it'd throw the ACD into its + + maintenance mode. And, one of the features on this was to do a test of + + a circuit by establishing basically a loop so, if someone would call, + + hold down a D, get thrown into the maintenance mode, get the 5 key, + + they'd get onto one side of the mode. Someone else could call back + + in, hold down the D key, hit 6, get on the other side of loop, and + + then you could talk. + + + + Well, I used to call Directory Assistance from the conference, hold + + down the D key, hit 5, add that into the conference, the loop, + + transfer control to Directory Assistance and then call back in on the + + other side of the loop and then take control of the conference that + + way. So, if any of the test people who were working on the software + + for Alliance and working on getting the bugs worked out of everything, + + if any of the engineers would go back to look and see why these + + circuits were active and they'd look to see who was running control of + + this conference, they'd see it was Directory Assistance and it really + + used to confuse the hell out of them. We got a great deal of mileage + + out of that because, you know, I don't really think they knew how, but + + somehow it kept going. But anyway, on these conferences, I got hooked + + up with a group of really, really, really, really smart people and by + + sitting and talking with these people, and learning what they knew, + + because like I said before, everyone was really open and everybody + + wanted everybody to learn. If more people were working on a project, + + everybody had a better chance of learning and succeeding then if just + + one person decided to hoard it all to themselves. + + + + >From being on these conferences and talking about to all of these + + people and sharing information with all of these people, I was + + eventually asked to join a group that was being formed at that time + + and it ended up being called The Legion of Doom. + + + + GA: How did it get called Legion of Doom? Who named it? + + + + CG: I don't know. The person whose idea it was to start the group, his + + handle was Lex Luther and from the DC Comics, Lex Luther's infamous + + group of anti-heroes was The Legion of Doom, so it was pretty a + + natural choice. A lot of stuff has been attributed to it lately, such + + as it being a sinister type name. Well, Lex Luther couldn't possibly + + have called his group anything other than the Legion of Doom. Anybody + + who has every read a Super Friends comic knows that's exactly what it + + was called. + + + + As The Legion of Doom continued on in its growth and its endless quest + + of knowledge about different operating systems and networking + + technologies and phone systems and everything else, the reps of + + everybody involved in the group sort of kind of sky rocketed because + + everybody by us all working together, we had a better resource of + + knowledge to provide the people and by continuing to do so, everybody, + + I guess, built up a sort of respect for the group and some of it has + + even lasted to today, even though the group is no longer around. A lot + + of things that it affected still linger on in the community. + + + + GA: There's been a lot of debate about who was in that group. Seems + + like everybody in the world wanted to be. Ha, ha. So many of the + + hackers I meet say they were. + + + + CG: There are always going to be people who want to run around and + + say, "Yeah, I was in the Legion of Doom." And I know everybody who + + was in it. I've got a list of everybody who was in it and written + + about everybody who was in it. We all know who was in it, so it really + + does not make any difference. If some joker off the street is going + + to come up and say, "I was in The Legion of Doom," who really cares, + + you know, what's it going to get him today? It doesn't mean anything, + + because the group is not around anymore. Um, if they know something, + + well, their knowledge alone should speak for itself and should not + + have to relay on the name of some group that does not exist to try to + + perpetrate some sort of false image to other people, so it really + + doesn't happen that often. We see people like Ian Murphy, for + + instance. I've still got newspaper articles with him in it saying that + + he was in Legion of Doom, and in fact, he has told some people, and + + some business acquaintances of mine, I guess in some desperate attempt + + to generate revenue, that not only was he in Legion of Doom, but he + + founded it, ha, ha, so, that's nice and he can continue to delude + + himself in a lot of things. If anybody wants to live in delusion, + + well that's their right, I suppose. It doesn't mean anything to me. + + + + GA: Isn't there a new Legion of Doom now? + + + + CG: Well, I really don't want to get into that too much. There was a + + young Canadian fellow who decided that it might be a good idea to + + start the new Legion of Doom and within like say an hour after that + + got posted to the Net, we were on the phone with him, telling him what + + a bad idea that was. It was myself and Scott Chasin who called him up + + first and he said, "Well, I think The Legion of Doom was a real + + important thing for the community and I just want to see it continue" + + and this and that. I said, "Who are you to come out of nowhere and + + think that not only do you have enough knowledge to say that you could + + have been associated with The Legion of Doom, much less to usurp the + + name? The name is dead, we put the group to rest and we want it to + + stay that way. He said, Well I'm not going to change it and as soon as + + you see the type of journal I put out, you will be really impressed." + + I said, "If your magazine is good, it will stand on its own merit and + + you don't need our name." He said, "Well you retired the name and that + + means it's fair game for anybody else." Okay, well so there is no + + talking to this guy, so I said, "Well I want to tell you this Cameron, + + Scott and I are the first to call you, there will be many others. We + + are the nicest. It's not going to be pretty for you and I just want + + you to know that." + + + + And let's just say there is no more New Legion of Doom. It was kind of + + an interesting experience for everybody because it did get a lot of + + the members back in contact with one another. A lot of us had gone our + + separate ways. The members grew older. The group was founded in '84 and + + here it is almost '94, I mean that's a long time for, you know, a + + bunch of people to stay in contact, regardless of whether or not it + + was for some silly little computer group to form a net. So it was + + nice to catch back up with a lot of people. It's really refreshing to + + see that damn near everybody who was ever involved in the group is + + doing very well for themselves in their chosen careers or professions, + + or graduating with high graduate degrees, Ph.D.s, Master Degrees, and + + things; it's certainly not what one would expect from the world's most + + infamous hacker group, but that certainly is what happened. But, you + + know, the whole Cameron Smith New Legion of Doom thing, it didn't + + accomplish anything for him, but it certainly did accomplish something + + for us. It got a bunch of us back together again. I don't want to + + sound grateful to him for it, but it worked out pretty well. + + + + GA: How did The Legion of Doom originally break up? + + + + CG: Well, The Legion of Doom kind of went through three different + + waves. You can kind of chart the history of the computer underground, + + it sort of runs parallel to the history of The Legion of Doom, because + + you can see as the new members came in, that's when all the busts + + happened. People would either get nervous about the busts and move on + + and go to college and try to get a life, or they would be involved in + + some of the bust and some of them would leave that way. So it kind of + + went through three different membership reorganizations. You can tell + + who came in where because of what was going on. It finally kind of + + folded. I had talked to a bunch of members somewhat recently, within + + the past three or four years and I said, "Well maybe we ought to try + + to do something, we need to get some more members in and try to work + + towards a different end." At the time, there was still the infant of + + an idea about going into consulting by building together this last + + insurgence of Legion of Doom. I talked to several people and wanted + + to try to track down newer people, so I talked to the members who were + + still active and asked are you still interested in doing this again, + + because we've got some other things that we want to try to focus on + + and as stuff starts to progress, something might come out of it. I'm + + doing something with some other people, and we got people who are + + experts in different types of fields, and we were talking to people + + who are experts in mainframes, in telephony, in Unix, and all sorts of + + different stuff and as that started to progress, we got a bunch of + + people in the last new membership drive for the group, did a few + + things, and as that started to go on, most of my main focus started + + dealing in with a few people from the last insurgence about trying to + + form this consulting company, which ended up being Comsec. + + + + We finally decided that's what we were going to do and we were serious + + about it, we said okay well then maybe we should just dissolve the + + group, because if we are going to have Comsec, we don't need Legion of + + Doom, 'cause this is what we want to do. Instead of spreading the + + knowledge around the net in the form of text files free, we were going + + to spread the knowledge around the corporate world for money. It + + really was a logical progression to us, because, you are not going to + + be 35 years old and still trying to break into the systems somewhere; + + the thrill doesn't last that long and if it does, well, you need to + + get a life or a pet or something. There is no reason why someone who + + even has an inkling of maturity, not to say that I do in the least, + + should be wasting away their life gathering up how many university + + systems they broke into. + + + + So after we finally made the formal decision, we talked to some people + + and said well, we were just going to say goodbye to the group. + + Everybody who was still active or interested from the group was like + + look, you know, when this thing takes off, we want all of you to be + + there. When we need more consultants, you're the best, and everyone + + was all up for it. That's what happened. + + + + GA: Let's stick with The Legion of Doom for awhile. What was the + + relationship between The Legion of Doom Technical Journals and Phrack + + and Phun? + + + + CG: Well, it's kind of funny. Originally, I think this was something + + that Craig and Lex had done. Originally, there was going to be a + + Phrack issue that was going to be the Legion of Doom Phrack Issue. It + + was going to be Phrackful, nothing would follow us but Legion of Doom + + members and it went on and on and on. I guess Lex had collected + + enough files, he was like, "I don't want to give these to Phrack." + + So, he stuck them together in the Legion of Doom Technical Journals, + + since it was all Legion of Doom stuff anyway, might as well go ahead + + and put it out ourselves. And I don't know if that was something + + personal against Craig, I really doubt it because Craig and Lex have + + always been friendly enough. I just think that is something he decided + + to do. From that there were three others published, so there was a + + total of four Tech Journals. They didn't come out in any sort of + + organized order, they just sort of came out when they wanted to come + + out. It was like they were done when they were done and they appeared + + when we were finished and that's why there were only four for a group + + that was around for so long, but they were fairly timely when they + + were all released and I guess everybody really appreciated the kind of + + knowledge that was in them when they came out. + + + + Looking back, I don't know how much interest someone is going to get + + on how to hack Tops 20. I d like to find the Tops 20 right now. It + + doesn't exist. So the knowledge that was in those things is fairly + + dated, but at the time, it was very timely and people appreciated it. + + + + ======================= + + + + GA: You were busted in 1990, right? + + + + CG: Nope. + + + + GA: How did that go down? + + + + CG: On March 1 1990, I was raided by the Secret Service, but I wasn't + + busted. There is a big distinction there. Just because they came in + + my house and dug through my stuff, that doesn't mean anything + + happened. + + + + Let me give a little preface to that. Several months prior, I received + + notification from the University of Texas that my school records + + (specifically mentioning my computer accounts) were being subpoenaed + + by a federal district court judge in Chicago. I knew very well that + + was the district that William Cook was in, so I trotted on down to the + + Dean's office at the University of Texas and said, "Hi, I understand + + my records have been subpoenaed. I need a copy of that for my lawyer." + + So they ran me off a copy of it and sure enough there's William Cook's + + name. So, okay, I was right, and I went home and vacuumed the house + + and cleaned everything up nice and neat for them, started placing + + little notes in various places. I had little notes that said, "Nope, + + nothing in here," put that in a drawer and a little note that said, + + "Wrong, try again," put that in there and little things everyplace + + that someone might look to try to find the secret hacker notes. I + + printed out a copy of the 911 document, nice laser printed copy, laid + + that out and fan folded it over my desk. I went down to the Federal + + Building, picked up brochures on how to became an FBI agent and a + + Secret Service Agent, set those out on my desk. I got a printout of + + several different things, laid those out all nice and neat, had some + + Phrack issues, I had some messages off of the Phoenix Project, I had + + all this stuff laid out. It looked like a little alter, a shrine to + + the FBI. + + + + Well, sure enough a couple months later, there they were. And I also + + put some notes on my computer account at UT. I made some really large + + files, like cordons and named them dot master, dot password, dot zip, + + just stupid names, you know that tack ID's, and left these sitting in + + my account. All this noise. And then I made this one that said, + + "Secret Info." If anybody would have bothered to read that, it was + + like a 10K file of me saying, "Anybody who would take the time to + + search through my files and try to find illegal information is a + + complete scumbag." Sure enough when they came to visit my house that + + morning, I woke up to the sound of people running up my stairs and + + their screaming, "Federal Agents - warrant," then they came in my + + room, "Out of the bed." Leading the pack is Special Agent Tim Foley, + + and he's got his service revolver out, and he's got it pointed at me. + + He's a pretty big guy and I'm me. I don't present a menacing figure to + + most and especially at 6 in the morning in boxer shorts, ha, ha. It + + just looked like I'm going to jump right out and start ripping + + peoples' heads off, so he quickly put his gun away. Nonetheless, he + + did have it drawn. I like to point that out. Hackers are a notoriously + + violent group of people who are known for their physical prowess, so + + guns are definitely always necessary. (said sarcastically) + + + + So, they ordered me downstairs and held me in the kitchen. I + + immediately said, "Let me call my lawyer," and they said, "You'll get + + your chance." So, they started going through all my stuff. I heard + + them up in my room, rifling all though my drawers and about an hour or + + so later, one comes down and hands over one of the Secret Service + + Brochures that I had. He says, "So, thinking about joining up?" I + + said, "Well, I think I could probably do better than some people." He + + didn't like that remark. He said, "Well, I think our requirements are + + a little more stringent than to let in the likes of you." I said, + + "Well, it shows." He didn't like that very much either. I said, "So, + + what's your degree in?" He said, "Well, I'm not going to tell you." + + I said "I'm just making conversation." So they continued on in the + + search of my house and when they found absolutely nothing having + + anything to do with computers, they started digging through other + + stuff. The found a bag of cable and wire and they decided they better + + take that, because I might be able to hook up my stereo, so they took + + that. I have an arcade size PacMan machine, which of course, one of + + the agents decided was stolen, because a lot of people slip those + + into their backpacks on the way home from school. So they started + + calling up all the arcade vendors around town trying to see if this + + had indeed been stolen. The thought of me wheeling an arcade size + + PacMan machine down the street, just didn't occur to them. So, + + finally, I said "Look, I bought it, here's the guy, call him." So + + they finally gave that up, so then they started harassing me about + + some street signs I had in my house. I had a Stop sign. I had a No + + Dumping sign over the toilet. "You need to get rid of those, it's + + state property, if we come back here and you have those, we are taking + + you downtown." I go like, "Okay." So then they started looking for + + drugs, and one guy is digging through a big box of, like a jumbo + + family size deal of Tide we bought at Sam's, it was about three feet + + tall and it was one of the monster size things. This guy is just + + digging through it, just scooping it out, his hands are all turning + + blue and sudsy from digging through this detergent and Foley walks + + over to him and says, "Well, I think we can safely assume that that's + + laundry detergent." + + + + So, Foley comes back in to where I'm sitting in the kitchen and I've + + been freezing my ass off, so they had let me get a jacket, and put on + + some jeans, and he says to me, "Well, I want to show you something." + + He whips out some business cards that I had printed up for SummerCon a + + few years ago, that said, "Erik Bloodaxe, Hacker." It had a little + + treasury logo on it and he says, "Impersonating a Federal official?" + + "Well, it doesn't say anywhere on there, 'Chris Goggans, Special + + Agent.' It says, 'Erik Bloodaxe, Hacker.' Whoever this Erik Bloodaxe + + character is. It might be me, it might not. I'm Chris Goggans and that + + says, Erik Bloodaxe, Hacker. Just because the seals there, it doesn't + + mean anything." He says, "Well, if you don't tell us everything that + + there is to know about all your higher ups, we are going to be + + pressing state, local and federal charges against you." I said, "On + + what grounds?" He goes, "We want to know everything about your higher + + ups." Which I'm thinking, gosh, I'm going to have to turn in the big + + man, which is ludicrous, because there is no such thing as a higher + + up, but apparently they thought we were a part of some big + + organization. So, I said, "Well, I'm not saying anything to you, I'm + + calling my lawyer." And I already had told my lawyer previously that I + + would be raided shortly and that I would be needing to call him. So I + + called him and said, "Hi, this is Chris and the Secret Service is here + + and I'd like you to speak to the agent in charge." And he said that + + my client declines any sort of interviews until such a time that I can + + arrange to be there to represent him in an official capacity and I'll + + need your name and I need all the information. The agent said, "We + + will be in touch." And that was it. They gathered the bag of wire and + + the printouts of the 911 document, how to be an FBI agent, the + + printouts of the Phoenix Project messages, and they trotted on off. As + + they were walking out the door, one of the guys kind of looks over at + + my television set and he says, "Hey, why is that video game plugged + + into the phone line?" And it was kind of like a Homer Simpson, cause + + Foley trots over and I had a 300v terminal, which is what I had been + + using to get on bulletin boards with. It was plugged into the phone. + + It was a little membrane keyboard box. All it was was a modem. So they + + bundled that up and stuck that in there, and they went on their merry + + way, and I followed them out to the car, and wished them well, and + + wrote down their license plate, and went back into the house, and got + + into my car, and went driving around calling up everybody else around + + town to see if anybody else had been raided. + + + + GA: Had they? + + + + CG: Yeah, at the same time as what was going on in my house, the house + + of Lloyd Blankenship was being raided, The Mentor, as well as the + + office place of Steve Jackson Games, where Lloyd worked, which ran + + into a huge fiasco later on down the road for these hapless agents, + + but that's an entirely different story. + + + + ======================= + + + + GA: Did you ever do any malicious hacking? + + + + CG: No. To be honest, there were a couple of times I actually + + considered such a thing. At one point in time, we had access to South + + African Government computers, like South African Treasury, things like + + that and we were thinking, should we take it down? Nah, we better not + + do that, can we just change the message of the day to something like + + some anti-apartheid statement, some sort of politically correct thing. + + It was all a big joke to us, we certainly weren't thinking about that, + + we just figured it would really piss them off, but we never did it. + + When the Russian x25 network went up, we were right there on it. They + + can't bust us for hacking Russia, I mean, who would? What were they + + going to say? It's like, "You should hack them, because they are our + + enemies, well maybe you should hack them," so, we were just going + + after the Russian network pretty hardcore. + + + + Malicious hacking pretty much stands against everything that I adhere + + to. You always hear people talking about this so called hacker ethic + + and I really do believe that. I would never wipe anything out. I would + + never take a system down and delete anything off of a system. Any time + + I was ever in a system, I'd look around the system, I'd see how the + + system was architectured, see how the directory structures differed + + from different types of other operating systems, make notes about this + + command being similar to that command on a different type of system, + + so it made it easier for me to learn that operating system. Because + + back then you couldn't just walk down the street to your University + + and jump right on these different computer systems, because they + + didn't have them and if they did have them only several classes would + + allow you access to them. Given the fact that I was certainly not of + + college age, it wasn't really an option. You didn't have public access + + to systems. All you had to do was call up and ask for an account and + + you'd get one. So, the whole idea of doing anything destructive or + + malicious or anything even with malcontents using computer systems to + + track information about people or harass people, that just goes + + against the grain of anything that's me. I find it pretty repulsive + + and disgusting. I am certainly not blind to the fact that there are + + people out there that do it, but obviously these people have a s---ty + + upbringing or they are just bad people. + + + + ======================= + + + + GA: How about books that have come out about hackers? + + + + CG: Well, I'll take a stab at that. The Hacker Crackdown I found to be + + a very schizophrenic piece of writing. I still to this day have not + + read it completely. I found it very hard to follow and I was there. It + + is very hard for me to read that book and follow the chronology. + + Everything is on the money and he did a very good job of making sure + + the facts were correct, but it's just hard for me to read. Maybe + + that's just a criticism of his writing style. + + + + Approaching Zero, I didn't really care for that too much, more + + specifically because they just basically out and out called me a + + traitor and said I was keen on selling secrets to the Soviet Union. + + Maybe you ought to ask the IRS about all that money I got from the + + Soviet Union, because I haven't seen it, but I'm sure I'll be taxed on + + that too. But I found that rather disgusting and after that book, I + + actually had a conversation with one of the people who was writing the + + book. A guy named Brian, actually called us up at Comsec and I talked + + to him for about 30-45 minutes about things and next thing I know, + + nothing we really said ended up in the book. A bunch of people were + + misquoted, left and right. All the stuff about the American hacking + + scenes, off the mark. People were quoted as saying stuff that they + + never said, things supposedly from bulletin boards that were not on + + bulletin boards. I don't know where this information came from, but + + it's really just off the money. I guess if you know something so + + intimately, you are always going to be critical of anything someone + + says about it because they don't know it as well as you do, so you are + + always going to find fault in something. So maybe I'm just being + + overly critical. + + + + ======================= + + + + GA: While on the subject of Comsec, you have said that you have gotten + + bad press. From where? + + + + CG: Well, I think an article saying that I have been arrested in the + + past for breaking into Bell South, or books being published saying + + myself of The Legion of Doom destroyed the 911 Network in nine states + + just to see if we could do it. Things like that which are just out and + + out lies. I'd say that was pretty bad press. + + + + GA: Did Comsec fold because of personality problems, or a lack of + + business? + + + + CG: Comsec folded for a number of reasons. The press aspect weighed + + heavy. We were basically blacklisted by the security community. They + + wouldn't allow me a forum to publish any of my articles. It + + essentially boiled down to, with the trade magazines, at least, they + + were told by certain members of large accounting firms that they would + + pull their advertising if they associated with us, and when you are a + + trade magazine that is where all of your revenue comes from, because + + no one is paying for subscriptions and they can't afford that loss. + + They were more interested in making money then they were in spreading + + the gospel of truth in security. But hey, it's a business, I guess you + + have to take that. I had speaking engagements pulled. A head of a very + + large security association promised me a speaking engagement and then + + decided to cancel it and didn't bother to tell me until a month before + + the conference. I talked to him and he said, "Oh, well I should have + + called you." This is like one of the largest security associations in + + the country and the second largest. So we had that kind of treatment. + + + + Some of these conferences, since we were not speaking at them, we + + could not really justify spending thousand of dollars to fly out there + + and attend. We were cut off from a lot of things and since we did not + + have a presence at these conferences, a lot of our competitors used + + this to target the companies that we were marketing. You would have + + these MIS directors from large oil companies out there, and you would + + have other people going up to them and saying, "You're from Houston. + + You are not dealing with those Comsec folks, are you? Well, you know + + that they are nothing but a bunch of crooks out there." So, one very + + large oil company, we had already had all of our paperwork passed + + though all of their legal departments and it was just waiting to be + + signed; it had already been approved and money was allocated in the + + budget and we were ready to rock. This would have meant a large amount + + of money over a period of several years. Well from going though all + + of these friendly happy negotiations and papers ready to be signed, to + + XYZ oil company does not do business with criminals, Click! Who talked + + to this guy? Who feed him this nonsense? + + + + Well, we got a lot of that, certainly that weighed heavy. The fear + + that came from companies like DeLloyd Touche.I will single them out + + especially because some of their larger consultants were very vocal in + + speaking out against us, in the very forums they denied us. They used + + the magazines as a place where one particular consultant said + + something like, "Can we lie down with dogs and be surprised when we + + get up with fleas?" I mean, I don't deserve that type of commentary. I + + don't think anybody does. It is certainly not a mature attitude for + + somebody who is supposed to be an upstanding ethical consultant to use + + a trade publication to vent his frustration against his competition. + + But, hey, it's a free market and if he has a forum and they gave him a + + column, well I think he can write whatever the hell he wants. + + + + Sure, I was in The Legion of Doom. I have been in everybody's system. + + But I have never been arrested. I have never broken anything, I have + + never done anything really, really, criminally bad. There is a + + difference in doing something illegal, you like walk across the street + + at the wrong place and you are committing a crime, but that does not + + make you a criminal, and there is a big difference between different + + types of behavior. By all these different forces saying so many + + negative things about us, we had our work cut out for us. + + + + To be honest, they had us beat. They had the deep pockets. They could + + wait us out. They could keep saying bad things about us forever. They + + had hundreds of millions of dollars so that even if they weren't + + making money they could sit on it. We didn't. Eventually we could not + + do it any more. I had overextended myself. I sold off all my stock, + + all my personal stock. I had a bunch of stock in energy companies and + + things like that, that was in the past supposed to be paying for my + + college education, and I gambled it away on Comsec and I ran out of + + money. I needed to eat, I needed to get a job, I had to move, I + + couldn't afford it anymore. And everybody was basically saying the + + same thing. Scott didn't have any money, Rob didn't have any money, + + our sales guys were getting really antsy because they were having a + + real hard time closing sales, so we just had to shut down. + + + + ======================= + + + + GA: Any thoughts on where technology is going and how hacking might + + change in the next couple of years? + + + + CG: Well, like I said earlier, the Internet is a very scary place with + + a very, very limited set of knowledge. One person could take down a + + majority of the network and for so much trust and need to be placed in + + a network that is so inherently unstable because of the protocol that + + drives it. I mean you don't plan a trip across country in a 1957 + + jalopy! You go out and get a new car, or you rent a good car, you + + don't put all your trust in something that ain't gonna work. And it + + works well enough for a lot of things, but for people to trust their + + entire enterprise network to stuff over the Internet, they are asking + + for trouble. And as people become more familiar with the entire + + protocol sweep, they are going to find out that there is a world of + + hurt about to happen, and in the next few years, people are going to + + be real surprised when stuff starts going down like crazy. That's + + going to be the biggest thing to happen. + + + + I would imagine that all the cellular problems are going to disappear + + because the advent of digital caller is going to remove all this + + problem. A lot of things are going to change. I imagine people, + + hopefully, will once again get more and more into writing software and + + doing more productive stuff. With all the wealth of knowledge that is + + coming out of every community, even in the underground, because people + + are exposing bugs and people are changing things, so eventually people + + are going to be able to make all types of systems, robust enough to + + survive different things. So out of all this turmoil, some good is + + going to come. And from that, once all the problems have been + + corrected, people will be able to direct their energies into a more + + positive thing, like developing applications, writing software and + + focusing their attention on doing neat, nifty tricks, rather than + + doing neat nifty stupid tricks, ha, ha. + + + + You are going to see some really, really cool stuff that is going to + + blow your mind and you are going to be able to carry it around in your + + hand. You are never going to be out of touch anywhere in the world, + + so, I think that will be very cool. + + + + ======================= + + + + GA: We should certainly tell people how to subscribe to Phrack, and + + the prices on the LOD disks. + + + + CG: Yeah, people who want information about Phrack can mail me at: + + Phrack@well.sf.ca.us and for information about the BBS Archive Project + + mail: LODCOM@Mindvox.Phantom.com + + + + GA: Thanks Chris! + + + + G: Thank you. + + + +Date: Sat, 21 Jan 1995 04:39:00 -0600 + +From: Malik Al-Rashim + +Subject: JAUC-File9 + + + + + + REVIEW OF SLIPKNOT 1.0 + + + + By Scott Davis, Editor (dfox@fc.net) + + + + SLIPKNOT 1.00 By Peter Brooks. + + Tested version 1.00 on a Dell 466/XPS + + 16 meg of RAM, Windows for Workgroups + + #9 GXE 64 Pro video card (2 Meg Vram) + + Boca 28.8 Vfast external modem + + + + On December 23, 1994, I contacted Felix Kramer (felix@panix.com) to let + + him know that I would be happy to run his article/promotion for the + + software called 'SlipKnot'. At that time, he asked me to ftp the + + software and test it out, and follow up with a review of the software + + in this issue of the magazine. So, here it is... + + + + The software was designed by Peter Brooks. SlipKnot is a graphical + + World-Wide-Web browser for PC users running Windows 3.1+ or a higher level + + of Windows. It is designed for modem users with ordinary dial-up UNIX + + shell accounts. It does NOT require SLIP or PPP or TCP/IP services in any + + form (no TIA or remosock, etc. if you are familiar with these products). + + + + The system requirements are Windows 3.1, Windows for Workgroups or + + higher, running in 386 Enhanced Mode (SlipKnot cannot be used on 286 + + processors). Not yet tested with Windows NT. You must have at least + + 4 MB of memory, recommended 8MB. We have noticed memory deficiency + + errors at 4 MB. Also, at least 2 MB of available hard disk space is + + required. SlipKnot itself takes approx. 1.5 MB. When working, SlipKnot's + + job will be to download documents for you from the Internet, and these + + may require plenty of hard disk space. Mouse or other pointing device + + required (cannot control SlipKnot via only the keyboard). + + + + Your UNIX system must have either the program "lynx" (version 2.2 or + + later) or the program "www" available. If in doubt, log in to your + + host, and try to execute either of these programs. You will then know + + immediately whether they are available. To find the version of lynx on + + your UNIX host, execute the UNIX command: "lynx -version". + + + + Your UNIX host must have a program to send files to you via either the + + Xmodem or Ymodem protocol. The actual name of the programs that perform + + these file transfers changes from system to system, but try the commands + + "sx" (for XModem) or "sb" (for YModem). If these fail, ask your system + + administrator or some other knowledgeable person. Likewise, you will + + need to know the name of the UNIX program that will receive files from + + your PC using Xmodem or Ymodem. Your UNIX system must be able to display + + individual file sizes using the "ls -l filename" command. If "ls" has + + been renamed or works differently from normal, SlipKnot will fail. + + + + SlipKnot was created because, at that time, there was no other alternative + + to accessing the World Wide Web graphically if you did not have SLIP or + + PPP or TCP/IP access. Having analyzed Mosaic and some of its competitors, + + I concluded that all of these browsers were designed for people with very + + rapid communications channels into the Internet, not modem users. Even if + + you have SLIP access, most of these browsers do not allow you to save + + entire documents (with the included pictures), forcing you to retrieve the + + documents again whenever you wish to take a full look at them. It takes a + + while to retrieve any document by modem with any browser, and you shouldn't + + have to do this more than once. + + + + Now the good stuff: + + + + First of all, Slipknot is a fantastic idea. To be able to use the World + + Wide Web and only requiring the end user to maintain a normal account + + on his/her provider is great. This allows the user to have Web access + + without paying those occasionally high rates for a SLIP or PPP connection. + + + + I ftp'd the Slipknot software and installed it. I was very happy that + + it installed without any problems. + + + + Configuring the software was fairly painless. The biggest part was + + taking the time to edit the login script for my service provider... + + and that step is not even necessary since Slipknot allows you to + + conduct manual logins of you so choose. + + + + I was finally ready to dial out. Everything was working like a champ until + + about 10 minutes into my session when my entire system locked up. I had + + to do a complete shutdown and start over. No big deal, I thought. + + I attempted again, as the 10 minutes that I did use it was a great + + experience. I had never seen an application that could do WWW over a + + normal user account. It connected perfectly and was working fine for + + another few minutes...then it locked up again. I began to worry. + + I noticed that both times it locked up I was accessing the Federal Bureau + + Of Investigation home page (FBI). Maybe Slipknot was not compatible with + + sites who promote the Clipper chip...Hahahaha. Not the case, unfortunately. + + + + During the course of the day, it locked up at random. I tested my + + computer hardware to see what the issue might be. There was no hardware + + problem. My computer has never locked up on my under any circumstances + + before. + + + + I am not going to give this software a bad review because it locked up + + on my system. I polled some users on the Internet regarding their + + experiences with the software and here's what some of them said; + + + + SLIPKNOT version 1.0 really works without a SLIP/PPP acct. In my case it + + installed quite easily, with minimum tweaking (certainly less than to + + install TIA). It opened the WWW to me. Next versions, should have FORMS + + support. That is a must and is urgently needed, because many WWW pages + + contain forms. Other than that, SLIPKNOT is highly recommended for a + + low-budget approach to WWW. [one@netcom.com] + + + + ========================================================================= + + + + I find it to be a an incredibly clever idea, and it works quite well + + with direct dial. Some problems with images and sound via telnet/rlogin, + + but not a big problem. The idea of being able to web-surf without SLIP + + is very attractive, especially for the dial-up user as so many of us are. + + With the "load images" turned off, it is much faster, and you can + + selectively load them. but since it uses Lynx as its engine, why not use + + Lynx for imageless surfing. + + + + Speed: I compared it to my SLIP account with NCSA Mosaic and Netscape. + + It loads images, etc. a bit slower than Mosaic and a lot slower than + + Netscape. + + + + Installation and Set up: simple, esp as compared to the fun you can have + + installing say Netscape and all the winsockets stuff, and IP/DNS + + configuring. + + + + Look and Feel: I'd like a larger document window, but the pulldown menus, + + etc. will make surfing easier for the newbies. + + + + Overall - a nice, inexpensive alternative to SLIP/PPP, especially for + + those fairly new to the net and like that point and click feel. + + + + NB: another alternative for an "on the cheap" approach to the Web is The + + Internet Adaptor -- I have it installed in my dial-up unix account, and it + + is slick: it emulates SLIP, and works very well. I'm getting rid of my + + SLIP account because I have TIA. If you have ever set up a SLIP, it is + + pretty easy to install and set-up. If not, you'll spend some time. Cheap + + too. - Jill Ellsworth + + + + ========================================================================= + + + + Very nice and easy to use developmental software. Web works well and the + + terminal mode is functional and adequate for most users. everything + + available from your Internet provider can be accessed, just as with a + + full blown commercial package like ProCom, etc. Some limitations on + + bells and whistles apply. + + + + Inability to support ftp and gopher from within the html page is a + + bother, but as development continues I hope Peter Brooks will be able to + + add that capability. + + + + Direct link to obtain upgrades and the automated upgrade installation + + built into Slipknot is a neat touch. + + + + I am currently using Version 1.00 and have sent in my registration fee + + because I want to encourage continued development. + + + + I really appreciated the opportunity to evaluate the fully functional + + application. - Steve Seteroff (seteroff@kendaco.telebyte.com) + + + + ========================================================================= + + + + You're a brave man to ask for opinions on the Internet! + + + + I got SlipKnot right after it was released. It is a wonder. Last night I + + got the latest version "g". I am so pleased. Peter Brooks and Felix + + Kramer (?) have a winner on their hands. I had tried to install netscape, + + tia, and winsockets about two weeks before I saw the announcement, and + + failed. The only problems I had in the installation of SlipKnot were ones + + anticipated in the help screens. (RTFM, dummy!) Peter Brooks was on the + + newsnet answering questions almost 24 hours a day. + + + + 1. Easy to install. + + 2. Cheap. + + 3. Easy to use. + + 4. Fun! + + + + And all this praise from a DOS command line freak. I told PBrooks in an + + email that I hate Windoze and had been threatening my son to take it off + + my computer (he uses my printer and MSWord). I complained to PBrooks that + + now Brendan knew I wouldn't follow through on the threat. I have an + + indispensable program that needs Windoze. + + + + Now some cautionary notes. ... Sorry I don't have any reservations. + + BTW, I am not Peter's mother, nor do I have any affiliation with anyone + + associated with MicroMind (a moronic name...like, encephalitis, dude!). + + If you have any particular questions, I would be glad to respond. My + + guess, judging by the activity in WWW newsgroup, is that you'll have more + + response than you can handle. + + + + Good luck with the story. Happy holidays. (BTW I tipped off the LATimes + + computer technology reporter and he just responded that he'd heard about + + it. Here mosaic applications are bringing the Web to millions and it's + + news, but a shell account enabler is ignored. Go figure.) Go SLIP not! + + + + Mike Howard (mikeh@netcom.com) + + + + ========================================================================= + + + + I think Peter has a good product. It is still in Beta Version. For + + example I can not Down Load large files (over 19,456 Bytes). I am sure + + Peter will find a fix but for now SK is for the experienced user. + + + + John Hammond (jhammond@unicomp.net) + + + + ========================================================================= + + + + I found it easy to install; unfortunately it crashes every time I try to + + get something off the web and I must do a hard reboot - thus Dr.Watson + + can save nothing, nor can slipknot's built-in debugger. I haven't yet + + contacted the authors. + + + + Bennett Price (bjprice@itsa.ucsf.edu) + + + + ========================================================================= + + + + I have used SlipKnot for about six weeks and have come to rely on it for + + an easy alternative to mistyped Unix commands. Since I work in a high + + school that does not yet have Internet access, I foresee SlipKnot as a way + + to hook the uninitiated into the 'Net. Teachers and administrators who are + + not already convinced about the utility of the Internet would probably be + + turned off by a Unix command line. Although downloading graphics through + + SlipKnot is slow even at 14.4, for the inexperienced user, this wait time + + is surely preferable to using a straight text-based Web browser. + + + + While I approve of Version 1.0e as far as it goes, I can certainly suggest + + a number of needed improvements: + + + + 1. gopher support + + 2. telnet support + + 3. forms support + + 4. better resource management (I run SlipKnot on a Pentium with 16 Mb of + + RAM and yet often run low on GDI resources) + + 5. improved error handling when the 'Net is busy or a page cannot be found + + 6. automatic redial in the terminal mode (Maybe this can be done with a + + script, but I could not see how.) + + 7. Z-modem or Y-modem batch transfer support in terminal mode. + + + + Don't get me wrong. I like SlipKnot. Everything can be improved. I am sure + + at Micromind. they are already at work (at least mentally) on these + + suggestions. + + + + Jeff Ratliff (tratliff@whale.st.usm.edu) + + + + ========================================================================= + + + + I have found Slipknot to be a very worthwhile product. Its ease of + + set-up is a definite plus. I downloaded Slipknot and had it installed + + and running in a very short time. The installation instructions + + addressed the few problems I had getting it running and then I was off -- + + surfing the Web. My main dislikes of the software are the small window + + size and the ability to open only five documents at the same time. I + + understand that these two complaints are being addressed by the next + + version. If you don't have direct access (i.e. you connect through a + + dial-up shell) and don't have a SLIP or PPP connection, Slipknot is + + definitely worth it. + + + + Kenyon Jon Michael (mkenyon@jove.acs.unt.edu) + + + + ========================================================================= + + + + I've been using Slipknot for a while now, and I'm very glad it's + + around. I think it's seriously necessary, because there are a huge + + number of people who get their net.access through shell accounts, and + + this allows you to get a fuller Web experience than with Lynx. + + + + However, the program has it's problems, and there is a lot of + + advancement that can be made in the future revisions. For example, forms + + are not supported, so your Web use only goes one way; you can't reply + + to things, write mail, make suggestions, etc., or for that matter, be + + verified for logins like on HotWired. That's a huge pain. + + + + Another problem is the inability to use gopher servers, something + + that's still widely implemented and integrated with the Web. And, of + + course, Slipknot is also a bit buggy; any errors, and the program quits + + rather than moving on, it displays certain dialog boxes more than once in + + a row, etc. + + + + IOW, it's a good idea and good start for a much-needed program, but it + + still needs work. However, with some more tweaking and advancement, it + + will be a very solid program. + + + + Bill Pena (billpena@genesis.nred.ma.us) + + + + ========================================================================= + + + + I got (and paid) for Slipknot, and am currently running v1.0 with the + + "g" patch. My host is a "pay" unix system that I call in to + + get my mail on my "term" account. I am using the program on a + + 486 cryix 40mhz system. + + + + The program is not perfect. It still has some bugs to work out, and + + lots of features to be developed (forms, gopher, etc do not work at + + this time). But!!! even with though the program is still in its early + + stages of development, I find it VERY useful, and it DOES allow me + + to view http documents with the graphics. + + + + I get good 14400/v42bis connections via the automatic log-in script (that + + must be user customized) and acceptable download speed of the http. With + + the program running under Windows 3.1, it does take a moment to analyze + + the downloaded text to "find" the embedded graphics, then download the + + graphics, plot the series of files, then display the document. + + + + With the program currently costing $30, the difference in the cost of my + + term account and a slip/ppp account is a lot more than the cost of + + Slipknot. + + + + I use the internet for e-mail and netnews more than a place to surf just + + to look at images. As such, my primary access to the net is via term with + + a text editor for mail/news replies. When I want to check out some + + http/url, I just hang up and call back via Slipknot. I don't use it all + + the time, so when I need it, it is there for me. + + + + Being shareware, it is perfect for the user to "play" with to determine + + if he/she wants to continue to use it, prior to paying for the program... + + and even with its limitations, it is still a deal at $30. and with the + + authors still working on it, it is sure to get better and better. + + + + Tom Stangler (stangle@infi.net) + + + + ========================================================================= + + + + It works as advertised. Last I checked, it doesn't do forms or telnet + + connection links It has trouble handling some inline images. + + + + Just like TIA, your provider can tell if you are using SlipKnot, and if + + they wanted to, could ban it's use as going beyond the services provided + + with your class of account. RCI doesn't have any restrictions on TIA or + + SlipKnot... + + + + Kevin Kadow (kadokev@rci.ripco.com) + + + + ========================================================================= + + + + (Slipknot review continued...) + + + + As you see, we have a wide range of comments here. I believe that most + + people realize that it still a very young project and has not yet + + attained it's full potential. If you will note, there was one other + + person who replied to my request for comments who is having the same + + problem I am having with system lock ups. I mailed the author of the + + program and they are getting right on the issue. + + + + The bottom line is that Slipknot is a great idea and a nice software + + package. And with end users submitting comments, complaints, and other + + information directly to the author or the press, the issues will be + + worked out. I suggest that you keep an eye on Slipknot. It's really + + going somewhere! + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + cDc GDU #18 + + + + By Swamp Ratte (sratte@phantom.com) + + _ _ + + ((___)) + + [ x x ] cDc communications + + \ / Global Domination Update #18 + + (' ') November 1st, 1994 + + (U) + + Est. 1986 + + + + NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for November, 1994: + + + + _________________________________/Text + + Files\_________________________________ + + + + 281: "Official cDc Press Release Concerning President Reagan" by Reid + + Fleming. The Cult influences the international political climate of + + opinion! We just want what we've got coming to us, mister. + + + + 282: "Argument" by Markian Gooley. Positivity and happy sunshine and + + neato stuff. + + + + 283: "Possibilities" by Obscure Images. Once again, Oi brings the + + linguistics for the nine deuce deuce. This one's got crazy subliminal + + tapes and a hippy chick. + + + + 284: "Sanford's Calico" by James Cazamias. It's just like Disney's + + _That Darn Cat!_, but different. + + + + 285: "Concise Guide to Forgetting How Much You Suck" by Jason Farnon. + + Courtesy + + of the cool _I Bleed For This?_ 'zine, here we go with a cDc edit/ + + distribution. Lots of practical advice to improve your standard of living. + + + + 286: "The Divine Masters" by Shriek Broomstraw. Particle physics and alien + + overlords and why you should be concerned with all this. You should. + + Really. + + + + 287: "Shotgun" by Swamp Ratte'. Never mind _Where's Waldo?_, where's the + + shotgun? Oh my. Fills out this release's angst quota. + + + + 288: "Rejection Letter Blues" by Jeff Swanson. Some people just can't + + appreciate good literature. Fun-eeEe. + + + + 289: "Can There Be Artificial Intelligence?" by Tequila Willy. Another + + scholarly scab for you to pick at. That Willsie, what a smart guy. + + + + 290: "Bob Takes a Trip" by Special Agent Finerty. Bob's a mechanical dog + + and he's NUTS. CRAZY. Watch out. Zany hi-jinx. + + + + __________________________________/cDc + + Gnuz\__________________________________ + + _ _ + + |\ /^\ /^\ + + / / / @ )^ -| @ )^ - _ + + / / 666 ( \/-^-^^| /--^-^-~ + + \o \ \ o \ / /@ )^ - _ + + | o| _ - _ \ / o /| /--^-^-~ + + / / / O o ^ - / ( O |/ / /\ + + | o \__ _/ O o O o ( o \ o \ /_/@ | + + \ o o o / |__ _ \\ + + \ o O \ O ( o - o / . ^ \S + + - - \ o ) \ ( ) /(_ / /^ + + | / - _ - - \ \ -_ -- - + + | / \ / \ | \ \. + + / | | \ | \ + + /_ \ / | \ / _ \ + + | \ - | \ - + + + + "This low-go you've received is the image of the be east. Whatever + + you do, do not hold this image in your write hand or receive its image by + + foe-ton trance Miss-shun through your I balls into your mined full crane + + he um or you've received the mark of the bee east. Stung, by buy bull + + revel lay shun. Keep your clothes on and don't follow the be eastly bare + + whoreds." + + -Philip Heggie + + + + --x X x-- + + + + New things? Yep. There's now a Usenet newsgroup for you to discuss the + + All-Powerfulness of cDc. It's "alt.fan.cult-dead-cow" and if your + + newsfeed isn't getting it, mail news@yersite and say, "GET WITH THE + + PROGRAM, PAL! HUP HUP!" + + + + Tell me about the time you were in the 7th grade and had to do a #2 really + + bad and those blind special ed. kids were in the bathroom swinging their + + canes around and saying bad words. You were SCARED, weren't you. HA! + + + + The world is filled with WIMPS. You go to a large public restroom, into a + + stall. All the other people in the stalls, you can see their feet. They + + make no noise. They sit and wait and clutch their tiny little genitals in + + FEAR. But I am NOT LIKE THEM. I MAKE MY DISGUSTING NOISES AS I PLEASE. + + I clean up, I exit my stall, I wash my hands and I LEAVE. I AM DONE. + + I AM RELIEVED. They remain, cowering, wishing they had the GUTS to CRAP + + but they do not and their bowels TREMBLE with gasses. They are but + + INSECTS because they cannot CRAP FREELY. LEARN FROM MY ACTIONS and you + + too can be POWERFUL. + + + + Lady Carolin is now running the Official cDc Internet Dumpster: ftp or + + gopher to cascade.net for all the cDc stuff, all the time. Cascade.net + + gets 'em first and fast. The secondary site is ftp.eff.org as usual. + + + + The other day I finally got The Beatles' _Abbey Road_ album and this + + "I Want You (She's So Heavy)" song is amazing. So I'm thinking, why + + should I be concerned with this week's indie-certified alterna-wonder- + + weenie when I DON'T EVEN HAVE A GOOD COPY OF BARRY MANILLOW'S "MANDY"? + + MY 8-TRACK SUFFERS FROM EXTREME WOW AND FLUTTER. + + + + HOW CAN I EVEN _THINK_ ABOUT JAWBREAKER WHEN MY JACKSON 5 COLLECTION IS + + SADLY INCOMPLETE!!?? + + + + If your writings have CLASS and STYLE, we want 'em. Dig the address at the + + bottom of this file, daddy-o. + + + + + + "What's good for cDc is good for America." - President Calvin Coolidge + + + + S. Ratte' + + cDc/Editor and P|-|Ear13zz |_3@DeRrr + + "We're into t-files for the groupies and money." + + Middle finger for all. + + + + Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453. + + Internet: sratte@phantom.com. + + + + cDc Global Domination Update #18-by Swamp Ratte'-"Hyperbole is our + + business" Copyright (c) 1994 cDc communications. All Rights Reserved. + + + + ALL FILES LEECHABLE *NOW* BY WWW/GOPHER/FTP FROM CASCADE.NET: pub/cDc/New + + _ _ + + ((___)) + + [ x x ] cDc communications + + \ / Global Domination Update #19 + + (' ') December 1st, 1994 + + (U) + + Est. 1986 + + + + NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for December, 1994: + + + + _________________________________/Text + + Files\_________________________________ + + + + 291-299: Nine Christmas/Holiday/Cold Arctic Wasteland-related stories. + + Some are funny, some are disturbing, and some will make you VERY AWARE of + + every single PORE on your NOSE. + + + + * cDc - DOWN HOME FOR THE HOLIDAYS (1994). Dolly Parton, Kenny Rogers, + + Olivia Newton-John, Clint Black. Gather 'round the tree and enjoy a + + rousing duet of Kenny and Olivia singing "Jingle Bell Rock" while Ms. + + Parton gets drunk and embarrasses herself. Directed by Martin Scorsese. + + (Drug Use, Adult Language, Graphic Violence, Strong Sexual Content). + + + + __________________________________/cDc + + Gnuz\__________________________________ + + + + "In their workshops, the elves toil under the oppressive eyes of the + + redshirts. The Eskimos are all but extinct, and the dentists pull tooth + + after whalebone tooth from the charred skulls of their remnants. + + + + Oh, the twinkling blue Aryan eyes! There is blood on his cheeks! + + + + He trains mighty legions in his impregnable northern fortress. The Lapps + + have come to fear the sound of marching boots and jingling bells. + + + + With his newest sleigh, he can strike any European city in under twenty + + minutes. + + + + Good children get a switch in their stocking. The bad ones disappear. + + + + LONG LIVE THE FOURTH REICH!" + + -Andrew Solberg + + + + - x X x - + + + + + + Conspicuous consumption of cDc products will fill the empty, gnawing + + voids you may or may not feel in your life... which become all the more + + apparent at ridiculous hours of the night as carbonated beverages + + gradually wear away your stomach lining and ulcers work their own little + + brand of magic. + + + + Things to look forward to in 1995: + + + + cDc #300 - Cow Beat #3: "Teen Idling on the Inphomashun Hi-Mom-I'm-on-TV- + + way" + + + + cDc FACK: "Frequently Anointed Cows are K-rad." Or something. + + + + + + I could give you promises of Twinkies and a cool, like, Yaga t-shirt. + + Will you be happy then? From here to eternity we will shop. We will shop + + at The Mall and buy only the finest in fashions and Rage Against the + + Toaster will provide the aural motivation. "Fuck you, Mom, I won't clean + + my room like you tell me." + + + + Go to HoHoCon and it'll be cool. Ramada Inn South. 1212 West Ben White + + Blvd. Austin, Texas. Friday, December 30th through Sunday the 1st. + + + + Shop! Shop! Do the booty hop! The leather store has a sale on biker + + jackets, Harley accessories optional and in-stock. New tats shine with + + gleaming disinfectant. Bright red-skinned jolly pierceings, and sparkling + + sterling silver! On the tongue, through the lip. Susy's got a charming + + new necklace, and Little Johnny has a delightful new nose ring! "Come over + + here, Johnny, so Aunty Emma can see your newest hole." + + + + Make new holes and fill 'em up. + + + + As cDc stalks around, hunting the logical conclusions. Ho. + + + + + + S. Ratte' + + cDc/Editor and P|-|Ear13zz |_3@DeRrr + + "We're into t-files for the groupies and money." + + Middle finger for all. + + + + Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453. + + Internet: sratte@phantom.com. + + _____________________________________________________________________________ + + + + cDc Global Domination Update #19-by Swamp Ratte'-"Hyperbole is our + + business" Copyright (c) 1994 cDc communications. All Rights Reserved. + + + + ALL FILES LEECHABLE *NOW* BY WWW/GOPHER/FTP FROM CASCADE.NET: pub/cDc/New + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + MY LETTER TO WIRED RE: WWW PAGE + + + + [Editor's note: I mailed this to Wired...and they said that they would + + print it in the February 1995 issue. We'll see] + + + + By Scott Davis (dfox@fc.net) + + + + Dear Wired, + + + + I have taken it upon myself to do an informal poll regarding your + + new WWW page on the Internet. I recall that not so long ago, the + + Wired WWW page was a great thing. It was easy to use and contained + + a wealth of information. Now, it appears that one must have some + + type of psudo-government security clearance to get into this WWW page. + + It is my guess that the purpose for having to enter one's name, + + e-mail address, special-secret-multi-digit-code, and other requested + + information is for the purpose of demographics. No matter the reason + + behind all of this...IS IT WORTH IT? Please allow me to explain the + + frustrations of some of the net-community. + + + + In announcing my informal poll, I stated my opinion on the new WWW + + page. It was not favorable to Wired. I asked others to mail me their + + opinions also. I will edit some of these for brevity only. I assure + + you that I did not receive a single good comment about the new page. + + + + And from what I understand, it seems like that there was some debate + + regarding the creation and operation of the HotWired page. One + + net-denizen replied to me, "Three weeks ago Jane Metcalfe came to + + UCDavis to talk about Hotwired and to give the first public demo of + + it. She told us that they had debated for quite some time about how + + to set it up--wanting a balance between looking 'friendly' and 'not + + allowing anonymous logins'. Sounds like the balance has tipped a bit + + further than she wanted, given commentary on the net." + + + + Another frustrated user says, "I gave up after 2 go arounds with the + + login problems. To bad as I liked to read the old hotwired. Oh well, at + + least the magazine is still easy to open!" + + + + Other comments from disgruntled users include "I am getting nowhere with + + this new interface. Requiring usernames, passwords, verification codes, + + etc, ad nauseum has not yet induced me to like this new Web page." and + + "Everytime I try to send my Hotwired Account Verification, it goes into + + an endless loop, with the Mosaic icon spinning endlessly. If this is a + + problem with using the Windows Mosaic 2.0a7 browser, I suggest that Wired + + get rid of the verification, because I'm not getting rid of Mosaic." + + + + More graphic comments include "Looks like HotWired has become the living, + + throbbing, thrashing (whatever other adverbs they like) pulse of a + + self-important, jargon-speaking, head-up-someplace-where-it-is-very-dark + + entity." and "...not to mention one that has security measures like NORAD! + + People go to www.wired.com for one thing: BACK ISSUES OF WIRED. End of + + story." And the be-all-end-all comment that fits this WWW page perfectly + + came from an avid reader. He says "I'd have to say this new setup has + + become TIRED before it was ever WIRED..." + + + + In running a large operation such as Wired, you are going to get + + complaints about "something" all the time. And as the best publications + + of it's kind, I am sure that you address the issues as much as possible + + ...just as you have this one. And many of the complaints you receive + + probably carry "less priority" than others. However I certainly hope + + this does not fall into that category of "less priority". I could + + understand if maybe 50 or 100 people complained. But over the past + + several months, I have seen numerous people complain about the + + procedures required to gain access to your WWW page. + + + + When I first sent my rough draft of this article into Wired, I received + + a polite response from Andrew Anker of Wired Magazine. He was very + + informative and perhaps his response seemed 'typical' to me because I + + failed to provide him with much of the necessary information that I had + + collected in order to do this article. I certainly do appreciate his + + response to our concerns. Mr. Anker replied, "...over 20,000 people have + + logged into the HotWired since we launched last Thursday, so it's very + + possible that the people you polled didn't read the text of the intro + + pages into HotWired that explain that certain browsers don't work with + + HotWired." + + + + Giving Wired the benefit of the doubt and assuming that some browsers may + + not work or could be outdated (which I now know to be true), my next step + + was to get the latest copy of one of the more popular browsers and try + + again. And once again, I ran into more problems. I was not about to + + attempt to troubleshoot more problems with this WWW page. I had obtained + + the proper hardware and software to accomplish the task. It was no longer + + my problem. It's Wired's problem. + + + + After this last-ditch attempt to prove ourselves wrong in theory and + + technique, one of my close friends stated, "Why the hell are they trying + + to make it so hard to get at? Are they experimenting with someone's + + cockamamie scheme for the Web equivalent of pay-TV?" + + + + It appears that many people are getting TIRED of this WWW page. + + Many end users do not see the purpose of having to enter all this + + information, and in the end, it causes nothing more than a headache + + when it does not work. I certainly do not want people to think that + + I am some 'Privacy Hound' who disagrees with the concept of entering + + my personal information on some WWW page. My name, number and address + + are of public record to anyone who wishes to dial 512-555-1212. + + The fact is that I have spoken to several people who cannot seem + + to get the interface to work. And I seriously doubt that each of them + + have an ill-configured Moasic. + + + + Of all the people and companies on the net with Web pages, I would + + venture to assume that Wired, of all people would promote accessibility + + and ease before subjecting it's users to a verification procedure that many + + feel is lacking, to say the least. I might go so far as to suggest that + + Wired might want to resort back to the good 'ole days and have a WWW page + + that is easily accessible and easy to use. Including the page where you + + are requesting that the user input information can still remain on the + + WWW site, but make it optional, and don't make it the home page. You + + can ask people to fill out the requested information. I am sure that + + many, if not most would comply. And by switching back, you are opening + + doors for people who may not want to update their software, or just want + + access for a short time obtain specific information. + + + + As far as updating browsing software, my theory is "if it's not broken, + + don't fix it", and just because somebody can't get on Wired's page, does + + not mean that their software is broken and should be updated. + + + + I must be honest and admit that I did FINALLY gain access to HotWired. + + Nut not until I had tried every "compatible" version of Mosaic and + + finally was forced to upgrade to NetScape for the sole purpose of + + getting on HotWired. Was all that necessary? + + + + Please fix this problem by making Wired easier to access. We end users + + have to jump through enough obstacles as it is, and there is no point + + in having to do this to get our favorite magazine on our screen. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + +Date: Sat, 21 Jan 1995 05:34:47 -0600 + +From: Malik Al-Rashim + +Subject: JAUC-File10 + + + + + + CALLER ID FAQ + + + + By Padgett Peterson (padgett@tccslr.dnet.mmc.com) + + + + Frequently Asked Questions About Caller-ID v1.1 Mar. 1994 + + + + 1) What is Caller-ID ? + + + + First ask "What is ANI" + + + + 2) OK, What is ANI ? + + + + ANI or Automatic Number Identification is a mechanism by which the + + different telephone companies determine what account is to be charged for + + a call, This information is passed between Telcos and was originally + + for billing purposes and predated both SS7 (Signaling System 7) + + and (C)LASS (Local Area Signaling Services was the original AT&T + + designations, the "C" was added by Bellcore after divesture) services + + which make CNID or Calling Number IDentification as Caller-ID is more + + properly known, possible. + + + + Since the Telcos had ANI, the decision was made to make it available + + to authorized parties such as 911 service and law enforcement agencies. + + ANI is also used to let a Telco operator know who is calling. + + + + More recently, ANI is used to report to 800 and 900 subscribers, + + who made the calls they have received, in the first case so that + + the 800 subscriber knows who the charge is for, and so that 900 + + number subscribers know who to charge. + + + + Thus while ANI is similar to CALLER-ID and may provide the same + + information, they are actually two different services and ANI information + + is not necessarily the same as what will appear on a CALLER-ID display. + + + + 3) Now (maybe) what is Caller-ID ? + + + + Caller-ID is a Telco offering that is a byproduct of (C)LASS services. + + In this case, only those numbers reported by participating exchanges are + + returned, exactly which are and which are not is currently (March 1994) + + at the Telco's discretion. + + + + The Federal Government has stated that it is their intent that nationwide + + CNID be available by mid-1995. The full text of this decision may be + + found FCC Report No. DC-2571 issued on March 8, 1994. + + + + The biggest effect of the ruling is to mandate transport of CPN (customer + + provided number) information between interconnecting networks eliminating + + the effective inter-LATA-only limitation that exists today in most areas. + + + + Currently there are two types of Caller-ID. The first (often referred + + to as "basic" service) just returns the calling number or an error + + message and the date/time of the call. + + + + The second ("enhanced" Caller-ID) also may return the directory + + information about the calling number. At a minimum, the name of the + + subscriber is returned (the subscriber is not the same as the caller, + + the phone company has no way to determine who is actually on the line). + + + + 4) How is the Caller-ID information provided ? + + + + As a 1200 baud, 7 data bits, 1 stop bit data stream usually transmitted + + following the first and before the second ring signal on the line. Note + + that this is not a standard Bell 212 or CCITT v22 data format so a + + standard modem will probably not be able to receive it. Further, the + + serial information exists as such only from the recipient's switch to + + the callee's location. Between carriers the signal exists as data packets. + + + + The signal is provided before the circuit is complete: picking up the + + receiver before the data stream is finished will stop/corrupt the + + transmission. + + + + Currently there are two types of information returned: a "short form" + + which contains the date/time (telco and not local) of the call and the + + calling number or error message. The "long form" will also contain the + + name and possibly the address (directory information) of the calling phone. + + + + The "short form" stream consists of a set of null values, followed + + by a two byte prefix, followed by the DATE (Month/Day), TIME (24 hour + + format), and number including area code in ASCII, followed by a 2s + + compliment checksum. Most modems/caller id devices will format the data + + but the raw stream looks like this : + + 0412303232383134333434303735353537373737xx + + or (prefix)02281334407555777(checksum) + + + + A formatted output would look like this: + + Date - Feb 28 + + Time - 1:34 pm + + Number - (407)555-7777 + + + + 5) Can a Caller-ID signal be forged/altered ? + + + + Since the signal is provided by the local Telco switch and the calling + + party's line is not connected until after the phone is answered, generally + + the signal cannot be altered from the distant end. Manipulation would + + have to take place either at the switch or on the called party's line. + + + + However, the foregoing applies only to a properly designed CNID unit. + + For instance the Motorola M145447 chip has a "power down" option that + + wakes the Chip up when the phone rings for just long enough to receive, + + process, and deliver the CNID signal after which it shuts down until the + + next call. + + + + Should this option be disabled, the chip will be in a "listen always" + + state and it is theoretically possible to "flood" a line making a + + vulnerable box record successive erroneous numbers. + + + + I have received a report of a device called "Presto Chango" that + + can transmit an extra ADSI modem tone after the call has been picked up + + that will cause a susceptible box to display the later information. It + + was also reported to me that CNID boxes marketed by US-West as their + + brand and made by CIDCO have been used to demonstrate the "Presto Chango" + + box. + + + + 6) What is "ID Blocking" ? + + + + Most Telco's providing Caller-ID have been required to also provide the + + ability for a calling party to suppress the Caller-ID signal. Generally + + this is done by pressing star-six-seven before making the call. In most + + cases this will block the next call only however some Telcos have decided + + to implement this in a bewildering array of methods. The best answer is + + to contact the service provider and get an answer in writing. + + + + Currently this is supplied as either by-call or by-line blocking. By-Call + + is preferred since the caller must consciously block the transmission + + on each call. By-Line blocking as currently implemented has the + + disadvantage that the caller, without having a second caller-id equipped + + line to use for checking, has no way of knowing if the last star-six-seven + + toggled blocking on or off. + + + + Note that blocking is provided by a "privacy" bit that is transmitted + + along with the CNID information and so is still available to the Telco + + switch, just not to the subscriber as a CNID signal. Consequently related + + services such as call trace, call return, & call block may still work. + + + + 7) What happens if a call is forwarded ? + + + + Generally, the number reported is that of the last phone to forward the + + call. Again there are some Telco differences so use the same precaution + + as in (6). If the forwarding is done by customer owned equipment there + + is no way of telling but will probably be the last calling number. + + + + Note that as specified, CNID is *supposed* to return the number of the + + originating caller but this is at the mercy of all forwarding devices, + + some of which may not be compliant. + + + + 8) What happens if I have two phone lines and a black box to do + + the forwarding ? + + + + If you have two phone lines or use a PBX with outdialing features, the + + reported number will be that of the last line to dial. Currently there + + is no way to tell a black box from a human holding two handsets together. + + + + 9) I called somebody from a company phone (555-1234) but their Caller-ID + + device reported 555-1000. + + + + Often a company with multiple trunks from the Telco and their own + + switch will report a generic number for all of the trunks. + + + + There is a defined protocol for PBXs to pass true CNID information on + + outgoing lines but it will be a long time before all existing COT + + (Customer Owned Telephone) equipment is upgraded to meet this standard + + unless they have a reason to do so. + + + + 10) I run a BBS. How can I use Caller-ID to authenticate/log callers ? + + + + There are two ways. The first utilizes a separate Caller-ID box + + with a serial cable or an internal card. This sends the information + + back to a PC which can then decide whether to answer the phone and what + + device should respond. Some of these are available which can handle + + multiple phone lines per card and multiple cards per PC. + + + + The second (and most common) is for the capability to be built in a modem + + or FAX/modem. While limited to a single line per modem, the information + + can be transmitted through the normal COM port to a program that again + + can decide whether or not to answer the phone and how. There is a + + FreeWare Caller-ID ASP script for Procomm Plus v2.x available for FTP + + from the Telecom archive. Most such software packages will also log each + + call as it is received and the action taken. + + + + Of course for true wizards, there are chips available (one of the first + + was the Motorola MC145447) that can recognize the CNID signal and + + transform it into a proper RS-232 (serial) signal. + + + + 11) How is security enhanced by using Caller-ID over a Call-Back + + service or one-time-passwords for dial-up access ? + + + + Caller-ID has one great advantage over any other mechanism for telephone + + lines. It allows the customer to decide *before* picking up the receiver, + + whether to answer the call. + + + + Consider hackers, crackers, and phreaks. Their goal in life is to forcibly + + penetrate electronic systems without permission (sounds like rape doesn't + + it ?). They employ demon dialers and "finger hacking" to discover + + responsive numbers, often checking every number in a 10,000 number + + exchange. + + + + If they get a response such as a modem tone, they have a target and + + will often spend days or weeks trying every possible combination of codes + + to get in. With Caller-ID answer selection, the miscreant will never + + get to the modem tone in the first place, yet for an authorized number, + + the tone will appear on the second ring. Previously the best solution + + for dial-ups was to set the modem to answer on the sixth ring (ats0=6). + + Few hackers will wait that long but it can also irritate customers. + + + + 12) What error messages will Caller-ID return ? + + + + a) "Out of Area" - (Telco) the call came from outside the Telco's + + service area and the Telco either has no available information or + + has chosen not to return what information it has. + + + + b) "Blocked" or "Private" - (Telco) the caller either has permanent + + call blocking enabled or has dialed star-six-seven for this call. You do + + not have to answer either. + + + + c) "Buffer Full" - (device manufacturer) there are many Caller-ID devices + + on the market and exactly how they have chosen to implement storage is up + + to the manufacturer. This probably means that the divide has a limited + + buffer space and the device is either losing the earliest call records or + + has stopped recording new calls. + + + + d) "Data Error" or "Data Error #x" - (device manufacturer) signal was + + received that was substandard in some way or for which the checksum did + + not match the contents. + + + + e) "No Data Sent" - (device manufacturer) Signal was received consisting + + entirely of nulls or with missing information but a proper checksum. + + + + 13) Why are so many people against Caller-ID ? + + + + FUD - Fear, Uncertainty, & Doubt or 10,000,000 lemmings can't be wrong. + + There were some justifiable concerns that some people (battered wives, + + undercover policemen) might be endangered or subject to harassment + + (doctors, lawyers, celebrities) by Caller-ID. As mentioned above there + + are several legitimate ways to either block Caller-ID or to have it return + + a different number. It is up to the caller. The advantage is that with + + Caller-ID, for the first time, the called party has the same "right of + + refusal". + + + + Expect yet another Telco service (at a slight additional charge) to be + + offered to return an office number for calls made from home. Crisis + + centers could return the number of the local police station. + + + + + + Compiled by Padgett Peterson. Constructive comments to: + + padgett@tccslr.dnet.mmc.com Brickbats >nul. + + + + Thanks for additional material to: + + + + David J. Kovan + + Robert Krten + + John Levine + + David G. Lewis + + Karl Voss + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE PENTIUM BUG WAR ENDS AS WE KNOW IT + + + + By James Baar and Theodore Baar + + + + The real long-term significance of the Great Intel Pentium Flaw + + Imbroglio is the imminent demise of the current practice of public + + relations and corporate and government communications as we know them. + + + + Ironically caught unaware of the communications world it helped create, + + Intel suffered a public relations near-disaster. Intel's arch competitor, + + IBM, wandered bubba-like into a public relations bog the future depths + + of which are still to be determined. + + + + Clearly we soon will see on the boneyard of history such communications + + artifacts as: + + + + --The lengthy, well-spun news release or official statement + + explaining what "really" happened or why a product "really" is a + + breakthrough for all mankind. + + + + --The news conference where the news is that what the media said + + yesterday or last week is "really" not the news at all. + + + + --The necessity to convince rushed and often ill-informed + + journalists and beautiful and much more ill-informed TV anchors that your + + truth is "really" true. + + + + The Internet is doing to public relations what CSPAN, CNN Forums + + and talk radio are doing to news coverage: When you are there, the + + messenger is extraneous. And, on the Internet, you are there and you are + + the messenger as well.. + + + + The Pentium Flaw War was the first major corporate war to be fought + + primarily in cyberspace. The initial, very scattered shots were fired + + more than five months ago on the Internet; major engagements got underway + + in October; and a worldwide battle raged through November and early + + December. + + + + Little of this was noted particularly in the general or trade media + + until near the end. And then it was reported as a highly technical + + problem of limited general interest. Only when IBM found it convenient + + to drop the equivalent of a small nuclear weapon did most of the major + + national media take note that something much more than an academic, + + technically obscure brawl was underway. + + + + Only then did the WALL STREET JOURNAL shout from it's front page: + + + + Chip Shot + + Computer Giants' War + + Over Flaw in Pentium + + Jolts the PC Industry + + + + And, on the same day, the NEW YORK TIMES shouted from it's front page: + + + + I.B.M. HALTS SALES + + OF IT'S COMPUTERS + + WITH FLAWED CHIP + + + + Both stories were inspired belatedly by an IBM announcement that it was + + suspending sales (sort of) of any of it's personal computers that included + + the Intel Pentium chip because the chip had a flaw. + + + + Well, ho-hum: Except for the IBM announcement, this was old news along + + the Information Highway. And the IBM announcement was immediately + + discounted by many of the veteran cyberspace combatants of the Pentium + + War as highly suspect: something similar to Parliament coming out against + + slavery in America after Lexington and Concord. + + + + Most great military engagements begin quite casually if not accidentally: + + A sniper picks off a poacher stealing a chicken. A nervous platoon leader + + calls in a little artillery fire on a bunker. A lost company stumbles + + on a tank column. + + + + Back in June, Intel and some of it's customers already knew about the bug + + that was preventing the new Pentium microprocessors to divide accurately + + out to more than nine or 10 decimal places in some cases. Intel did not + + publish the information. If any messages about the bug appeared here and + + there in various newsgroups on the Internet for the next few months, + + they initially attracted little attention. + + + + This was not the kind of consumer problem that causes a lot of excitement + + at your neighborhood 24-hour store. But this bug was of interest -- and + + in some cases importance to parts of the world technical community + + engaged in major mathematical calculations: This is a community that also + + appreciates that such a flaw is not the first nor will be the last in + + the increasing complexity of computer components and software; exalts + + technical openness; recognizes quickly when it is being stonewalled; and + + has a biting specialized sense of outrage and humor. + + + + Prof. Thomas Nicely of Lynchburg College reports that when he began + + running into a potential flaw in the Pentium in June he started a three + + month effort to determine whether the problem was the Pentium or something + + else. For example, his own calculations; or possibly known bugs in other + + hardware such as the Borland C Compiler. And in Copenhagen mathematicians + + developed a T-shirt satirizing the Intel chip logo "Intel Inside" as "No + + Intelligence Inside" and published memos saying "We knew about it early + + in June..." + + + + Intel managed to downplay and contain word of the bug for the most part + + through the next three months. Any callers were told at first that a fix + + was underway and that the bug affected only very special situations. + + + + Then, on Oct. 30, Dr. Nicely posted a message to "whom it may concern" + + on the Internet, reporting his findings and his frustrations with getting + + Intel to pay serious attention to him. In the succeeding weeks, the war + + between Intel and it's users exploded. Each day there were more reports + + about the bug and Intel's truculence. + + + + The number of the strings of messages on the Internet increased and grew + + longer as users at universities, laboratories and corporations around the + + world reported the same bug and it's potential variations; discussed + + their research for possibly more bugs; and reported on their + + unsatisfactory and frustrating phone calls to Intel. + + + + And here was where the war was really fought. + + + + Intel treated each caller as an individual, linear event to be dealt with + + in isolation; turned around or at least mollified. Intel's position was + + that this was a routine bug that was being taken care of and was of no + + major importance to most of it's customers. The Intel position essentially + + remained that there was no need for a general replacement on demand; that + + the problem was relatively minor; that if a user was engaged in the kind + + of heavy mathematics that could be affected by the bug then Intel, if + + it agreed, would replace a Pentium. + + + + Meantime, Intel and it's commercial allies continued to promote and sell + + Pentiums. More than four million Pentiums were reported sold. + + + + The words "greedy" and "arrogance" became popular on the Internet among + + customers describing Intel's position. The Internet discussion was highly + + technical and profane. It also included useful suggestions for + + broadening the discussion. For example, participants were provided + + with the Fax number of the New York Times. And more and more of the + + callers to Intel shared their mostly frustrating experiences on the + + Internet with a worldwide audience of customers. An angry mob -- slowly + + recognized as a major threat by Intel -- began to assemble in cyberspace + + + + Intel CEO Andrew Grove issued a statement on the Internet Nov. 27 seeking + + to quiet the mob. Instead the roar in cyberspace increased. Intel's + + Software Lab Technology Lab Director Richard Wirt on Dec. 8 issued a + + statement on the Internet describing Intel plans to provide a fix for the + + flaw. The roar continued and spread and Intel's weakening protests were + + increasingly drowned out as the users reinforced each other with new data + + and complaints around the clock around the world. + + + + It was at this point on Dec.12 that IBM -- a reported minor player in the + + sale of Pentiums, but the developer of a competitive chip, the PowerPC -- + + decided to announce both on the Internet and to the major national media + + the halting of it's shipments of Pentium-based IBM PCs. + + + + The war was now spread to the major national media where the problem was + + easily confused with various consumer product recalls and the Internet + + where IBM's move was both discounted as self-serving and used + + simultaneously to pummel Intel further. + + + + By Dec. 20 Intel had had enough. It agreed to a general recall and + + apologized for not doing so sooner. + + + + The public relations lessons are clear. + + + + People -- particularly customers -- are no longer isolated waiting to + + learn sooner or later what is happening through the third party media + + screen and, in turn, relying on the third party media to screen and + + sooner or later report their reaction. Even when the third party media + + is accurate this process can take many days. + + + + Through the Internet, people -- particularly customers -- can tell a + + corporation or organization exactly what they think and why and share that + + simultaneously and instantaneously with all concerned around the world. + + The Internet returns the world to the agora where everyone hears what was + + said; and everyone hears all comments and reactions; everyone knows who + + is talking and can make credibility judgments. + + + + The first Intel error was not to spot the issue stirring on the Internet + + months ago when the commentary was helpful and understanding. At that + + time and for several months later, Internet commentators could have been + + embraced and thanked for their efforts; immediate plans for a work-around + + fix could have been disclosed; and work on a permanent fix could have + + been described: all in cyberspace among sophisticated customers who well + + understand the complex nature of the technology. + + + + Intel's second error was not to recognize that because of the Internet it + + no longer could reason at least semi-privately with customers and advance + + rational technical arguments. In pre-cyberspace days, that could be + + effective: the customer is grudgingly mollified until the issue is + + eventually resolved. But in this case, as it's customers shared both + + their problems and experiences with each other in real time, they fed + + each others frustrations; were empowered as a group to demand better + + treatment; and built mutual strength with each day for new battles to + + come. + + + + Intel's third error was not to go directly on line with it's customers and + + deal with the issue interactively. Instead, Intel pursued the classic + + static public relations mode of issuing statements and news releases. + + These were turned into blackened ruins by Internet flame messages in a + + matter of hours. + + + + Meantime, IBM by it's announcement, uncorked the Law of Unanticipated + + Consequences. The Internet mob really understood the issue; the general + + public for the most part did not. IBM, with motives already under + + suspicion, opened the bottle labeled "Doubt about Technology" to the + + overall potential future detriment of the Information Technology Industry + + in general. + + + + As more people around the world join the millions already using the + + Internet for communications, corporations and government will be forced + + if they wish to succeed to function within the new realities of cyberspace: + + information is shared and sifted by thousands of knowledgeable people; + + time is collapsed; facts are quickly checked; loss of credibility can be + + instantaneous; second chances are rare and harder to effect; grandstand + + plays better be perfect; and the playing off of one audience against + + another is far more easily detected. + + + + Above all else, a smattering of obscure messages or even a random one or + + two can no longer be automatically disregarded as mere technical mumbling. + + For example, is anyone following up on a recent Internet potential bug + + message regarding AMD DX-80 chips or another regarding "something about a + + conditional loop" in the Pentium? + + + + One final cyberspace reality of note: instant corrosive humor is abundant + + and effective. (If they really are laughing about you, you can't be taken + + seriously anymore.) This was ably demonstrated by the Internet author + + who wrote for the delectation of Intel customers and potential customers + + everywhere a Star Trek parody. He called it: "BBUUGGS IINN + + SSPPAACCEE!!". + + + + (This article is from a forthcoming issue of Knowledge Tools News, an + + electronic newsletter of Omegacom, Inc. James Baar (jimbar@omegacom.com) + + is president/managing consultant. Theodore Baar (tedbar@omegacom.com.) + + is vice president/chief technologist.) + + + + ----------- + + Copyright (c) 1994 Omegacom, Inc., all rights reserved. This article may + + be posted to any USENET newsgroup, on-line service, or BBS as long as it + + is posted in it's entirety and includes this copyright statement. All + + other rights reserved. This article may not be included in commercial + + collections or compilations without express permission from Omegacom, + + Inc. jimbar@omegacom.com. For all other uses you must seek permission + + of Omegacom, Inc. jimbar@omegacom.com + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + NON-DISCLOSURE AGREEMENT OF DR. NICELY + + + + The following message was posted to the Internet by Dr. Thomas Nicely, + + discover of the Pentium Floating Point Unit Flaw. The first part deals + + with a question regarding Dr. Nicely's signing of a non-disclosure + + agreement with Intel. + + + + TO: Whomever It May Concern + + FROM: Dr. Thomas R. Nicely, Lynchburg College, Lynchburg, Virginia + + (nicely@acavax.lynchburg.edu) + + RE: Pentium Bug and Intel NDA + + DATE: 94.11.25.1400 EST + + + + This is in reply to Paul Rubin's (phr@netcom.com) inquiry of 23 November. + + + + * I signed a temporary nondisclosure agreement with Intel on 10 November. + + + + * There was no coercion or threat of any kind, by either party. + + + + * The NDA was signed in the course of discussions to determine + + whether or not an agreement (such as a consultancy) could be reached + + which would prove beneficial in the long term to myself, to the Intel + + Corporation, and to my employer, Lynchburg College. + + + + * From 10 November until 22 November, I deflected all inquiries regarding + + the Pentium FPU to Intel's representatives. This was a consequence of + + my own mistaken interpretation of the NDA; I was treating it in the + + manner of a security clearance; I once held a clearance for secret + + restricted data in X-division (nuclear weapon design and analysis) + + at Los Alamos National Laboratory, and that clearance treated most + + information concerned as "born secret," even if the information was + + acquired prior to the clearance and/or independently. In the same + + spirit, I removed from the College's VAX anonymous FTP directory + + copies of the codes used to analyze the Pentium chip for the bug. + + + + * After receiving some complaints in this regard, Intel (on its own + + initiative) informed me on 22 November that I was free to discuss + + publicly the discovery and nature of the Pentium FPU bug, since this was + + my own work, accomplished prior to signing the NDA and without + + assistance from Intel; and that the primary purpose of the NDA was to + + insure confidentiality of information exchanged in the course of any + + consulting I might do for Intel in the future. + + + + * To this date, Intel has been most cooperative in alleviating difficulties + + caused for my own research (computational number theory; distribution of + + twin primes and other constellations, and the sums of their reciprocals) + + by the presence of the bug. They have shipped replacement chips for the + + CPUs in the machines I am using, and I have verified that the new chips + + are free of the bug (zero errors in > 1e15 simulated random divisions). + + + + * I cannot speak for Intel regarding its policies on CPU replacement for + + Pentium systems having the bug; that is a management decision which + + obviously must take into account the constraints of supply, inventory, + + logistics, expense, and public relations. To date, I believe Intel has + + handled the affair in essentially the manner that could usually be + + expected of most businesses operating in a highly competitive, low-margin + + capitalistic economy. Any Pentium owner who feels the need for a + + replacement CPU should contact Intel Customer Service and Tech + + Support at 800-628-8686, or Intel representative John Thompson at + + 408-765-1279. + + + + * I probably have a somewhat different perspective on the bug than most + + users. It is my opinion that the current generation of microprocessors + + (and possibly all of them since, say, the 8080) has become so complex + + that it is no longer possible to completely debug them, or even to + + determine every bug that exists in one. Thus, the discovery of this + + particular bug should not be any great surprise. There have been many + + well-publicized bugs in the past (e.g., the 32-bit multiply bug in the + + early 80386s, the arctangent bug in the early 80486s, the stack-handling + + bug in the early 8088s, and the Motorola 68K revision F bug). + + Furthermore, in view of this, all mission-critical computations should + + be performed multiple times, in settings as independent as possible--- + + preferably with different CPUs, operating systems, and software + + algorithms. Where different platforms are not available, the same + + computation should be performed using algorithms as independent as + + possible; this was in fact how I pinpointed the Pentium bug---the + + sums of the reciprocals of the twin primes were being done in both + + long double floating point (64 significant bits) and in extended + + precision using arrays of integers (26 decimal digits at that time, + + 53 decimal digits currently). Dual calculations were also being run + + on 486 and Pentium systems. + + + + * Note that the bug can be temporarily circumvented by locking out + + the FPU. For most DOS applications, this can be done by means of the + + DOS commands SET 87=NO (for executables created by Borland compilers) + + and SET NO87=NO87 (for executables created by Microsoft compilers). + + Of course, this is at best a performance-killing band-aid; some + + applications require an FPU, while Windows and most DOS extenders + + ignore these environmental variables. In theory, it should be + + possible to write a fairly short (100 lines?) utility code which + + enters protected mode (ring 0), sets up a valid global descriptor table + + (and perhaps a valid interrupt descriptor table), resets the emulation + + bit in the machine status word of control register 0, and then re-enters + + real mode. Running such a code at boot time should lock out the FPU + + even for Windows and DOS extended applications; a similar code could + + reactivate the FPU at will. Unfortunately, I haven't had the time to + + write the code yet! + + + + * To date, my analysis indicates that the bug will appear in about 1 in + + 31 billion random divisions and 1 in 1.26 billion random reciprocals. + + These figures are similar to the rate of 1 in 9.5 billion attributed to + + Intel. In my own application (distribution of twin primes and the sum + + of their reciprocals) no error appeared for values < 824e9. Most users + + will find these values reassuring; those of us doing computational + + number theory, chaos theory, or analysis of ill-conditioned matrices + + may still want a new, bug-free CPU. + + + + * To date, the worst-case error of which I am aware is an example + + apparently posted by Tim Coe of Vitesse Semiconductors on 14 November, + + indicating that the quotient 4195835.0/3145727.0 is returned correctly + + to only 14 significant bits (5 significant decimal digits). I have not + + yet had a chance to verify this example. + + + + * Copies of some of the codes I have used to analyze the bug (updated to + + reflect later developments) will be restored to the anonymous FTP + + directory [anonymous.nicely.pentbug] of Lynchburg College's VAX server + + (machine ID acavax.lynchburg.edu) as soon as I get time to update and + + post them. + + + + * Feel free to transmit this communication as you wish. + + + + Sincerely, + + + + Dr. Thomas R. Nicely + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + THE COMPUTER NEVERMORE (The Raven) + + + + By Unknown + + + + Once upon a midnight dreary, fingers cramped and vision bleary, + + System manuals piled high and wasted paper on the floor + + Longing for the warmth of bedsheets, + + Still I sat there, doing spreadsheets; + + Having reached the bottom line, + + I took a floppy from the drawer. + + Typing with a steady hand, then invoked the SAVE command + + But I got a reprimand: it read 'Abort, Retry, Ignore.' + + + + Was this some occult illusion? Some maniacal intrusion? + + These were choices Solomon himself had never faced before. + + Carefully, I weighed my options. + + These three seemed to be the top ones. + + Clearly I must now adopt one: + + Choose 'Abort, Retry, Ignore.' + + + + With my fingers pale and trembling, + + Slowly toward the keyboard bending, + + Longing for a happy ending, hoping all would be restored, + + Praying for some guarantee + + Finally I pressed a key-- + + But on the screen what did I see? + + Again: 'Abort, Retry, Ignore.' + + + + I tried to catch the chips off-guard-- + + I pressed again, but twice as hard. + + Luck was just not in the cards. + + I saw what I had seen before. + + Now I typed in desperation + + Trying random combinations + + Still there came the incantation: + + Choose: 'Abort, Retry, Ignore.' + + + + There I sat, distraught exhausted, by my own machine accosted + + Getting up I turned away and paced across the office floor. + + And then I saw an awful sight: + + A bold and blinding flash of light-- + + A lightning bolt had cut the night and shook me to my very core. + + I saw the screen collapse and die + + 'Oh no--my data base,' I cried + + I thought I heard a voice reply, + + 'You'll see your data Nevermore!' + + + + To this day I do not know + + The place to which lost data goes + + I bet it goes to heaven where the angels have it stored + + But as for productivity, well + + I fear that IT goes straight to hell + + And that Us the tale I have to tell + + Your choice: 'Abort, Retry, Ignore.' + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + TWAS THE NIGHT BEFORE STAR TREK... + + + + 'Twas the night before Christmas, when all through the ship + + Not a circuit was buzzing, not one microchip; + + The phasers were hung in the armory securely, + + In hope that no alien would get up that early. + + + + The crewmen were nestled all snug in their bunks + + (Except for the few who were partying drunks); + + And Picard in his nightshirt, and Bev in her lace, + + Had just settled down for a neat face to face... + + + + When out in the hall there arose such a racket, + + That we leapt from our beds, pulling on pant and jacket. + + Away to the lifts we all shot like a gun, + + Leapt into the cars and yelled loudly "Deck One!" + + + + The bridge red-alert lights, which flashed through the din, + + Gave a lustre of Hades to objects within. + + When, what on the viewscreen, our eyes should behold, + + But a weird kind of sleigh, and some guy who looked old. + + + + But the glint in his eyes was so strange and askew, + + That we knew in a moment it had to be Q. + + His sleigh grew much larger as closer he came. + + Then he zapped on the bridge and addressed us by name: + + + + "It's Riker, It's Data, It's Worf and Jean-Luc! + + It's Geordi, And Wesley, the genetic fluke! + + To the top of the bridge, to the top of the hall! + + Now float away! Float away! Float away all!" + + + + As leaves in the autumn are whisked off the street, + + So the floor of the bridge came away from our feet, + + And up to the ceiling, our bodies they flew, + + As the captain called out, "What the Hell is this, Q?!" + + + + The prankster just laughed and expanded his grin, + + And, snapping his fingers, he vanished again. + + As we took in our plight, and were looking around, + + The spell was removed, and we crashed to the ground. + + + + Then Q, dressed in fur from his head to his toe, + + Appeared once again, to continue the show. + + "That's enough!" cried the captain, "You'll stop this at once!" + + And Riker said, "Worf, take aim at this dunce!" + + + + "I'm deeply offended, Jean-Luc" replied Q, + + "I just wanted to celebrate Christmas with you." + + As we scoffed at his words, he produced a large sack. + + He dumped out the contents and took a step back. + + + + "I've brought gifts," he said, "just to show I'm sincere. + + There's something delightful for everyone here." + + He sat on the floor, and dug into his pile, + + And handed out gifts with his most charming smile: + + + + "For Counselor Troi, there's no need to explain. + + Here's Tylenol-Beta for all of your pain. + + For Worf I've some mints, as his breath's not too great, + + And for Geordi LaForge, an inflatable date." + + + + For Wesley, some hormones, and Clearasil-plus; + + For Data, a joke book, For Riker a truss. + + For Beverly Crusher, there's sleek lingerie, + + And for Jean-Luc, the thrill of just seeing her that way." + + + + And he sprang to his feet with that grin on his face + + And, clapping his hands, disappeared into space. + + But we heard him exclaim as he dwindled from sight, + + "Merry Christmas to all, and to all a good flight!" + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + SANTA SOURCE CODE + + + + By Unknown + + + + #bash + + + + better !pout !cry + + better watchout + + lpr why + + santa claus town + + + + cat /etc/passwd >list + + ncheck list + + ncheck list + + cat list | grep naughty >nogiftlist + + cat list | grep nice >giftlist + + santa claus town + + + + who | grep sleeping + + who | grep awake + + who | egrep 'bag|good' + + for (goodnes sake) { + + be good + + } + + + + better !pout !cry + + better watchout + + lpr why + + santa claus town + + + + + + [original source unknown] + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + +Date: Sat, 21 Jan 1995 05:37:20 -0600 + +From: Malik Al-Rashim + +Subject: JAUC-File11 + + + + + + MY LIFE AS AN INTERNATIONAL ARMS COURIER + + + + By Matt Blaze (mab@research.att.com) + + + + Under an obscure provision of US law, devices and computer programs + + that use encryption techniques to hide information from prying eyes + + and ears are considered ``munitions'' and subject to the same rules + + that govern the international arms trade. In particular, taking such + + items out of this country requires the approval of the State + + Department, which decides whether exporting something might endanger + + national security. In the past, these restrictions were of little + + concern to the average citizen; encryption found most of its + + application in military and diplomatic communications equipment. + + Today, however, growing concern over electronic fraud and privacy + + means that encryption techniques are starting to find their way into + + more conventional commercial products like laptop computers and + + portable phones. + + + + Mostly to find out what the process was like, I recently applied for a + + temporary export license for a portable telephone encryption product + + that I wanted to take with me on a business trip to England and + + Belgium. + + + + The item in question is more properly called a ``telephone security + + device.'' This is a little box that scrambles telephone conversations + + to protect them against eavesdroppers; this sort of protection is + + sometimes important when discussing confidential business matters from + + faraway places. The particular model I bought was already approved + + for export; it employs a cipher algorithm that the government has + + already decided is not a threat to national security even should it + + fall into the hands of some rogue government. This model is aimed + + primarily, I presume, at international business travelers who want to + + communicate in a reasonably secure manner with their home offices in + + the states. In other words, a typical user buys two of them, leaving + + one at the home office and carrying the other when traveling abroad. + + The options that came with my device included a James Bond-ish looking + + acoustic coupler and handset to facilitate its connection to the + + hardwired phones that are still common in European hotel rooms. + + + + It turns out that there was recently some discussion in the government + + about exempting products like my secure phone from the licensing + + paperwork requirements. Unfortunately, however, this exemption never + + actually took effect. So even though the device I had was already + + approved for sale abroad, I still needed to get a temporary export + + license before I could take it with me. But I was assured that ``this + + is an easy, routine process''. Well, sure enough, about two weeks + + before I was to leave I got back my official US State Department + + ``license for the temporary export of unclassified defense articles''. + + So far, so good. + + + + From what I was able to figure out by reading the license (and having + + a few conversations with an export lawyer), I'm required to leave from + + an international airport with a Customs agent present (no problem + + there, although Customs is geared to arriving, rather than departing, + + travelers). At the airport, I'm supposed to fill out a form called a + + ``shipper's export declaration'' (SED) on which I have to declare that + + ``these commodities are authorized by the US government for export + + only to Belgium and the United Kingdom. They may not be resold, + + transshipped, or otherwise disposed of in any country, either in their + + original form or incorporated into other end-items without the prior + + written approval of the US Department of State''. Then I'm to present + + the SED and export license to a Customs official at the airport before + + I leave. The Customs officer is supposed to take my SED and endorse + + my license to show what I'm actually taking out of the country. + + + + On the way back in, I'm supposed to ``declare'' my item at Customs + + (even though it was manufactured in the US) and show them my license, + + and they're supposed to endorse the license again as proof that I + + have, in fact, returned the ``defense article'' to the safety of the + + United States. + + + + The first hitch I ran into was that no one could actually tell me + + where I could get an SED form. But when I called Customs they assured + + me that this was no big deal. ``Just come by when you get to the + + airport and we stamp the license. I guess you can just fill out the + + SED there,'' they said. + + + + I made sure to get to the airport early anyway. + + + + Although there was moderately heavy traffic near the airport, I made + + it to JFK two and a half hours before my 10pm flight. I was flying + + United, which has their own terminal at JFK, so Customs has an office + + right there in the same building from which I was to depart (JFK is + + awful to get around, so I was glad for this). I checked in for my + + flight (and got upgraded to first class, which bolstered my + + expectation that everything was going to be really easy from here on). + + Then, luggage, license and phone in hand, I made my way downstairs to + + Customs, expecting to fill out the SED form and ``just have my license + + stamped'' as they had assured me earlier on the telephone. I + + explained my situation to the security guard who controls entry to the + + Customs area, and he led me to ``the back office'' without much + + argument or delay. The head uniformed Customs guy in the back office + + (which I think is same office where they take the people suspected of + + being ``drug mules'' with cocaine-filled condoms in their stomaches) + + looked approachable enough. He had a sort of kindly, grandfatherly + + manner, and he was playing a video game on a laptop computer. I got + + the impression that most of the people he encounters are suspected + + drug smugglers, and he seemed pleased enough to be dealing with + + something a little different from the norm. When I explained what I + + was doing he looked at me as if I had just announced that I was a + + citizen of Mars who hadn't even bothered to obtain a visa. + + + + He explained, carefully, that a) I really do need the SED form; b) not + + only that, I should have already filled it out, in duplicate; c) he + + doesn't have blank SED forms; d) he, like everyone else in the entire + + US government that I had spoken to, has no idea where one gets them + + from, but people must get them from somewhere; and e) it doesn't + + really matter, because I'm in the wrong place anyway. + + + + I asked him where the right place is. ``The cargo building, of + + course,'' he told me, patiently. I remembered the cargo building + + because I passed it in the taxi just as the traffic jam began, about + + half an hour before I got to the United terminal. The airport shuttle + + bus doesn't stop there. I'd have to call a taxi. ``But I think + + they're closed now, and even if they were open you'd never make it + + before your flight'' he helpfully added, saving me the trip. He also + + complemented me for going to the trouble to get the license. + + + + I must have looked hurt and confused. Eventually he called in some + + fellow in a suit who I presume to have been his boss. + + + + ``Are you the guy who wants to export the fancy gun?'' the fellow in + + the suit asked me. + + + + ``It's not a gun, it's a telephone,'' I responded, with a straight + + face. + + + + ``Why do you have a license to export a telephone?'' Good question, I + + thought. I explained about the export law and showed him the thing. + + He agreed that it looked pretty harmless. + + + + The fellow in the suit reiterated points a through e almost verbatim + + (do they rehearse for these things?) and explained that this isn't + + really their department, since my license was issued by the State + + Department, not Customs, and my situation doesn't come up very often + + because exports usually go via the cargo building. He'd love to help + + me, but the computer in which these things get entered is over in + + Cargo. ``That's how the records get made. But you do have a valid + + license, which is nice.'' He also suggested that I would have had an + + easier time had I shipped the device instead of carrying it with me. + + + + I asked what I should do, given that my plane was scheduled to leave + + in less than an hour. Neither was sure, but the fellow in the suit + + seemed willing leave it to the discretion of the uniformed guy. ``How + + does this thing work, anyway?'' he asked. I explained as best as I + + could, trying to make it sound as harmless as it is. ``You mean like + + that Clipper chip?'' he asked. + + + + At this point, given that he has a computer and knows something about + + the Clipper chip, I figured that maybe there was some hope of making + + my flight. Or maybe I was about to spend the night in jail. In my + + mind, I put it at about a 90:10 hope:jail ratio. + + + + Then he asked, ``Do you know about this stuff?'' + + + + So we chatted about computers and cryptography for a while. Finally, + + the two of them decided that it wouldn't really hurt for them to just + + sign the form as long as I promised to call my lawyer and get the SED + + situation straightened out ASAP. They assured me that I won't be + + arrested or have any other trouble upon my return. + + + + I made my flight, validated license in hand. + + + + An aside: Throughout my trip, I discovered an interesting thing about + + the phone and the various options I was carrying with it. Under X-ray + + examination, it looks just like some kind of bomb. (I suspect it was + + the coiled handset cords). Every time I went through a security + + checkpoint, I had to dig the thing out of my luggage and show it to + + the guard. I almost missed the new ``Eurostar'' chunnel train (3hrs + + 15mins nonstop from London to Brussels, airport-style check-in and + + security) as the guards were trying to figure out whether my telephone + + was likely to explode. + + + + Coming back to the US was less eventful, though it did take me an + + extra hour or so to get through Customs. Expecting a bit of a hassle + + I didn't check any luggage and made sure to be the first person from + + my flight to reach the Customs line. The inspector was ready to + + wordlessly accept my declaration form and send me on my way when I + + opened my mouth and explained that I needed to get an export license + + stamped. That was obviously a new one for him. He finally decided + + that this had to be handled by something called the ``Ships Office''. + + I was sent to an unoccupied back room (a different back room from + + before) and told to wait. I thought about the recent Customs + + experiences of Phil Zimmermann. (Zimmermann, the author of a popular + + computer encryption program, was recently detained, questioned and + + searched by Customs officials investigating whether he violated the + + same regulations I was trying so hard to follow.) After about half an + + hour, an officer came in and asked me what I needed. I explained + + about my export license that had to be endorsed. She just shrugged + + and told me that she had to ``process the flight'' first. As best as + + I could tell, her job was to clear the airplane itself through + + Customs, that being, technically speaking, a very expensive import. + + It would take a little while. She was pleasant enough, though, and at + + least didn't look at me as if she intended to send me to jail or have + + me strip searched. + + + + Finally, she finished with the plane and asked me for my form. She + + studied it carefully, obviously never having seen one before, and + + eventually asked me what, exactly, she was supposed to do. I + + explained that I had never actually gone through this process before + + but I understood that she's supposed to record the fact that I was + + re-importing the device and stamp my license somewhere. She told me + + that she didn't know of any place for her to record this. After some + + discussion, we agreed that the best thing to do was to make a Xerox + + copy of my license and arrange for it to go wherever it had to go + + later. She stamped the back of the license and sent me on my way. It + + was a little over an hour after I first reached the Customs desk. + + + + My conclusion from all this is that it just isn't possible for an + + individual traveler to follow all the rules. Even having gone through + + the process now, I still have no idea how to obtain, let alone file, + + the proper forms, even for a device that's already been determined to + + be exportable. The export of export-controlled items is ordinarily + + handled by cargo shipment, not by hand carrying by travelers, and the + + system is simply not geared to deal with exceptions. Technically + + speaking, everyone with a laptop disk encryption program who travels + + abroad is in violation of the law, but since no one actually knows or + + checks, no mechanism exists to deal with those who want to follow the + + rules. While (fortunately) everyone I dealt with was sympathetic, no + + one in the government who I spoke with was able to actually help me + + follow the rules. I was permitted to leave and come back only because + + everyone involved eventually recognized that my telephone was pretty + + harmless, that my intentions were good, and that the best thing to do + + was be flexible. If anyone had taken a hard line and tried to enforce + + the letter of the law, I simply wouldn't have been able to take the + + thing with me, even with my license. Had I just put my telephone in + + my suitcase without telling anyone instead of calling attention to + + myself by trying to follow the rules, chances are no one would have + + noticed or cared. + + + + Unfortunately, however, these absurd rules carry the full force of + + law, and one ignores them only at the risk of being prosecuted for + + international arms trafficking. While it may seem far-fetched to + + imagine US citizens prosecuted as arms smugglers simply for carrying + + ordinary business products in their luggage, the law as written allows + + the government to do just that. At the same time, anyone who is aware + + of and who tries to follow the regulations is made to jump through + + pointless hoops that are so obscure that even the people charged with + + enforcing them don't know quite what to make of them. + + + + Copyright 1995 by Matt Blaze. All rights reserved. + + + + Electronic redistribution permitted provided this article is reproduced + + in its entirety. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + OPEN LETTER TO WIRED MAGAZINE + + + + By Chris Goggans (phrack@well.sf.ca.us) + + + + To Whom It May Concern: + + + + I am writing this under the assumption that the editorial staff at + + Wired will "forget" to print it in the upcoming issue, so I am + + also posting it on every relevant newsgroup and online discussion forum + + that I can think of. + + + + When I first read your piece "Gang War In Cyberspace" I nearly choked on + + my own stomach bile. The whole tone of this piece was so far removed + + from reality that I found myself questioning what color the sky must be + + in Wired's universe. Not that I've come to expect any better from Wired. + + Your magazine, which could have had the potential to actually do + + something, has become a parody...a politically correct art-school project + + that consistently falls short of telling the whole story or making a solid + + point. (Just another example of Kapor-Kash that ends up letting everyone + + down.) + + + + I did however expect more from Josh Quittner. + + + + I find it interesting that so much emphasis can be placed on an issue of + + supposed racial slurs as the focus of an imaginary "gang war," especially + + so many years after the fact. + + + + It's also interesting to me that people keep overlooking the fact that + + one of the first few members of our own little Legion of Doom was black + + (Paul Muad'dib.) Maybe if he had not died a few years back that wouldn't + + be so quickly forgotten. (Not that it makes a BIT of difference what color + + a hacker is as long as he or she has a brain and a modem, or these days + + at least a modem.) + + + + I also find it interesting that a magazine can so easily implicate someone + + as the originator of the so-called "fighting words" that allegedly sparked + + this online-battle, without even giving a second thought as to the damage + + that this may do to the person so named. One would think that a magazine + + would have more journalistic integrity than that (but then again, this IS + + Wired, and political correctness sells magazines and satisfies + + advertisers.) Thankfully, I'll only have to endure one month of the + + "Gee Chris, did you know you were a racist redneck?" phone calls. + + + + It's further odd that someone characterized as so sensitive to insults + + allegedly uttered on a party-line could have kept the company he did. + + Strangely enough, Quittner left out all mention of the MOD member who + + called himself "SuperNigger." Surely, John Lee must have taken umbrage to + + an upper-middle class man of Hebrew descent so shamefully mocking him and + + his entire race, wouldn't he? Certainly he wouldn't associate in any way + + with someone like that...especially be in the same group with, hang out + + with, and work on hacking projects with, would he? + + + + Please, of course he would, and he did. (And perhaps he still does...) + + + + The whole "racial issue" was a NON-ISSUE. However, such things make + + exciting copy and garner many column inches so keep being rehashed. In + + fact, several years back when the issue first came up, the statement was + + cited as being either "Hang up, you nigger," or "Hey, SuperNigger," but + + no one was sure which was actually said. Funny how the wording changes + + to fit the slant of the "journalist" over time, isn't it? + + + + I wish I could say for certain which was actually spoken, but alas, I was + + not privy to such things. Despite the hobby I supposedly so enjoyed + + according to Quittner, "doing conference bridges," I abhorred the things. + + We used to refer to them as "Multi-Loser Youps" (multi-user loops) and + + called their denizens "Bridge Bunnies." The bridge referred to in the + + story was popularized by the callers of the 5A BBS in Houston, Texas. + + (A bulletin board, that I never even got the chance to call, as I had + + recently been raided by the Secret Service and had no computer.) Many + + people from Texas did call the BBS, however, and subsequently used the + + bridge, but so did people from Florida, Arizona, Michigan, New York and + + Louisiana. And as numbers do in the underground, word of a new place to + + hang out caused it to propagate rapidly. + + + + To make any implications that such things were strictly a New York versus + + Texas issue is ludicrous, and again simply goes to show that a "journalist" + + was looking for more points to add to his (or her) particular angle. + + + + This is not to say that I did not have problems with any of the people + + who were in MOD. At the time I still harbored strong feelings towards + + Phiber Optik for the NYNEX-Infopath swindle, but that was about it. + + And that was YEARS ago. (Even I don't harbor a grudge that long.) + + Even the dozen or so annoying phone calls I received in late 1990 and + + early 1991 did little to evoke "a declaration of war." Like many people, + + I know how to forward my calls, or unplug the phone. Amazing how + + technology works, isn't it? + + + + Those prank calls also had about as much to do with the formation of + + Comsec as bubble-gum had to do with the discovery of nuclear fission. + + (I'm sure if you really put some brain power to it, and consulted Robert + + Anton Wilson, you could find some relationships.) At the risk of sounding + + glib, we could have cared less about hackers at Comsec. If there were no + + hackers, or computer criminals, there would be no need for computer + + security consultants. Besides, hackers account for so little in the real + + picture of computer crime, that their existence is more annoyance than + + something to actually fear. + + + + However, when those same hackers crossed the line and began tapping our + + phone lines, we were more than glad to go after them. This is one of my + + only rules of action: do whatever you want to anyone else, but mess with + + me and my livelihood and I will devote every ounce of my being to paying + + you back. That is exactly what we did. + + + + This is not to say that we were the only people from the computer + + underground who went to various law enforcement agencies with information + + about MOD and their antics. In fact, the number of hackers who did was + + staggering, especially when you consider the usual anarchy of the + + underground. None of these other people ever get mentioned and those of + + us at Comsec always take the lead role as the "narks," but we were far + + from alone. MOD managed to alienate the vast majority of the computer + + underground, and people reacted. + + + + All in all, both in this piece, and in the book itself, "MOD, The Gang That + + Ruled Cyberspace," Quittner has managed to paint a far too apologetic piece + + about a group of people who cared so very little about the networks they + + played in and the people who live there. In the last 15 years that I've + + been skulking around online, people in the community have always tended + + to treat each other and the computers systems they voyeured with a great + + deal of care and respect. MOD was one of the first true examples of a + + groupthink exercise in hacker sociopathy. Selling long distance codes, + + selling credit card numbers, destroying systems and harassing innocent + + people is not acceptable behavior among ANY group, even the computer + + underground. + + + + There have always been ego flares and group rivalries in the underground, + + and there always will be. The Legion of Doom itself was FOUNDED because of + + a spat between its founder (Lex Luthor) and members of a group called The + + Knights of Shadow. These rivalries keep things interesting, and keep the + + community moving forward, always seeking the newest bit of information in + + a series of healthy one-upsmanship. MOD was different. They took things + + too far against everyone, not just against two people in Texas. + + + + I certainly don't condemn everyone in the group. I don't even know + + a number of them (electronically or otherwise.) I honestly believe + + that Mark Abene (Phiber) and Paul Stira (Scorpion) got royally screwed + + while the group's two biggest criminals, Julio Fernandez (Outlaw) and + + Allen Wilson (Wing), rolled over on everyone else and walked away free + + and clear. This is repulsive when you find out that Wing in particular + + has gone on to be implicated in more damage to the Internet (as Posse and + + ILF) than anyone in the history of the computing. This I find truly + + disgusting, and hope that the Secret Service are proud of themselves. + + + + Imagine if I wrote a piece about the terrible treatment of a poor prisoner + + in Wisconsin who was bludgeoned to death by other inmates while guards + + looked away. Imagine if I tried to explain the fact that poor Jeff Dahmer + + was provoked to murder and cannibalism by the mocking of adolescent boys + + who teased and called him a faggot. How would you feel if I tried to + + convince you that we should look upon him with pity and think of him as a + + misunderstood political prisoner? You would probably feel about how I do + + about Quittner's story. + + + + 'Hacker' can just as easily be applied to "journalists" too, and with this + + piece Quittner has joined the Hack Journalist Hall of Fame, taking his + + place right next to Richard Sandza. + + + + Quittner did get a few things right. I do have a big cat named Spud, I do + + work at a computer company and I do sell fantastic t-shirts. Buy some. + + + + With Love, + + + + Chris Goggans + + aka Erik Bloodaxe + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + WHEN BIGOTRY OUTPACES TECHNOLOGY + + + + By Douglas Welch dewelch@pop.com + + + + Previously published in the Los Angeles Times, Monday, December 19, 1994. + + Page B15 + + + + Note: Electronic re-posting is ALLOWED but NO PAPER REPRINTS or inclusion + + in online digests without written permission from the author. All postings + + must retain this notice. + + + + Copyright (c) 1994 Douglas E. Welch + + dewelch@pop.com + + 76625,3301 + + + + * Communications: We need to attack the message, not the modem, to ensure + + on-line services are free from censorship. + + + + As each new technology marches onto the scene, there are some who instantly + + blame all the ills of society on it. Groups calling for the censorship of + + computer networks are forgetting that it is not the technology that is + + causing the problem, but the people using the technology. Instead of + + targeting the authors of hate speech on the computer networks, they are + + targeting the networks themselves. This only reinforces the immediate need + + for on-line computer services to be protected by the federal government + + as "common carriers," like telephone utilities. + + + + Hatemongers and bigots have always been a part of human society. Through + + ignorance and bullying, they gather their flock, but it is through open + + debate, education and reasoned discourse that they are best confronted. + + Instead, professed anti-hate groups are attacking the providers of on-line + + services in an effort to force them to remove offensive messages or prevent + + their posting. Rather than using the technology to fight back and denounce + + hate speech, they are seeking to remove the freedom of speech altogether. + + Were the situation reversed, I am sure you would hear them decrying the + + evils of censorship as loudly as they call for it now. + + + + Telephone companies cannot be sued when offensive or illegal calls are + + placed through their systems. On-line services deserve the same kind of + + "common carrier" status. There is no reason on-line services should have to + + be both provider and policeman. This places them in danger of being a + + censor. + + + + On-line users have several simpler options. They can merely ignore the + + message with the press of a key or set their "kill file" to ignore + + messages of certain content or from a certain user. Ultimately, on-line + + services provide users the chance to engage these hatemongers in a forum + + free of physical threat with hopes of liberating their narrow focus. The + + immediacy of posting a response can only be found in the on-line world. + + + + On-line services are no passing fad. they are rapidly gaining popularity + + on par with telephone and fax service. We need to stop treating on-line + + services like something new and ensure that they are free from censorship + + pressures. + + + + Censorship has always been defined as a "slipperly slope" that can easily + + lead to a repression of ideas and a lower quality of life. Whether we + + communicate via paper, phone lines or on-line computer services, our + + freedom of speech should be protected. Hate groups should be targeted for + + their messages, not how they send them. + + + + Douglas E. Welch is a computer consultant. He can be reached at + + dewelch@pop.com. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + + LETTER FROM STEVE CASE; RE: CHILD PORN ON AOL + + + + By Steve Case + + + + Ever since we first launched America Online we've remained committed to + + fostering an electronic community that provides a fun, enjoyable and + + enriching experience for all members. We've asked our members to honor + + the privilege of interactivity, and we've strictly enforced our Terms of + + Service to help foster the kind of community of which we can all be proud. + + Recently, however, some material has been brought to our attention by some + + of our members which involves illegal activity -- the trading of images in + + electronic mail which appear to be child pornography. Upon receiving the + + material, and verifying that it was a violation of our Terms of Service, + + and in all likelihood illegal, we immediately contacted the FBI and + + terminated the accounts of the senders. + + + + While we recognize that any community around the United States with more + + than 1.5 million citizens will have its share of illegal activity, we were + + nonetheless disheartened to find that some members are abusing the + + communications features of AOL in this way. We simply will not tolerate + + such illegal activity on America Online. To anyone who may be using + + America Online for illegal purposes, be advised that we will terminate the + + accounts of those participating and we will notify the proper authorities + + of any illegal activity that is brought to our attention. + + + + Our policy is that all private communications -- including e-mail, instant + + messages, and private chat rooms -- are strictly private. We do not, will + + not, and legally cannot monitor any private communications. But if we + + are alerted to a potential offense and we are sent evidence, as we were + + recently, we will vigorously pursue the matter. In this case, electronic + + mail was forwarded to our attention by our members, and as recipients of + + the mail we were able to turn the material over to the authorities. + + + + We have over 250 people who help us provide assistance in the public areas + + of the service and give guidance to members who are new or who have + + questions. Of late, we've had a growing problem with member-created rooms + + whose title and discussion violate our Terms of Service. Member-created + + rooms have always been a unique and much-valued aspect of America Online. + + Often, these rooms provide the seeds for new special interest forums that + + later emerge. But as more members abuse the privilege and establish rooms + + that suggest illegal activity, or detract from the enjoyment of others + + with offensive titles, we are faced with looking at a higher level of + + safeguards as it relates to member-created rooms. We simply cannot keep + + up with the sheer volume of rooms created, and as a result, from time to + + time rooms that violate TOS remain open for some period of time. We're + + looking at several alternatives to improve the situation. We don't want + + to see our members denied the privilege of this fun and creative + + interactive environment due to the abuses of a few, but at the same time + + we do feel some action is warranted to safeguard this popular + + "neighborhood" in our community. + + + + Unfortunately, this is not the first time we have encountered this + + problem, nor is it unique to AOL. In 1991, we were faced with a similar + + situation. At that time, we went to our members -- as we're doing now -- + + advised them of the situation and asked for their help. And recently, + + recognizing the potential for abuses in this emerging medium, online + + service providers banded together to sponsor a "child safety" brochure + + that gives parents tips and guidelines to foster a productive and safe + + environment for children online. A copy of this brochure can be found in + + the Parents Information Center, keyword: Parents. We encourage parents + + to take the time to review it. In addition we strongly encourage parents + + to monitor their children's use of this medium, much as they would any + + other medium such as television, magazines, etc. We've also implemented + + "parental controls" which allow parents to restrict their children's + + online access. + + + + Each one of us needs to respect and honor the privileges of this + + electronic community. If you haven't reviewed our Terms of Service, take + + a few minutes now and do so. If you observe what you believe may be + + illegal activity on AOL, bring it to our attention. The problem is not + + widespread -- we believe only a mere fraction of this community is + + involved. Let's work together to insure that America Online remains the + + kind of community that you want your friends and family to enjoy. + + + + Thanks for your continued support. + + + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + + +Date: Sat, 21 Jan 1995 06:26:32 -0600 + +From: Malik Al-Rashim + +Subject: JAUC-File12 + + + + + + + + LEE HARVEY OSWALD DIED FOR YOUR SINS + + + + By Gordon Fagan, Conspiracy Editor (flyer@io.com) + + + + + + With all the hubbub over the OJ Simpson trial currently getting + + under way, I thought it would be a good idea to get people to rethink + + their conception of what justice is about in another matter. Where there + + was no trial, not even real charges - just accusations, a bullet and 30+ + + years of government approved postmortem derision as an insane killer. + + We've all seen the movie JFK which is probably more than most of you want + + to hear on the subject in the first place, so I'll just leave each of you + + - in particular, those who have no interest in the JFK assassination + + conspiracy but can't get enough of that OJ, with the following... + + + + + + + + It has been said that the American people are the only jury that + + Lee Harvey Oswald will ever have. It is our responsibility, then, to + + examine with utmost care and objectivity the evidence for and against him, + + and to reach an independent verdict - Sylvia Meagher + + + + + + + + Jim Garrison's closing statement to the jury + + + + State of Louisiana vs. Clay Shaw, 1969 + + + + May it please the court. Gentlemen of the jury: + + + + I know you're very tired. You've been very patient. This final + + day has been a long one, so I'll speak only a few minutes. + + + + In his argument, Mr. Dymond posed one final issue which raises the + + question of what we do when the need for justice is confronted by power. + + + + So, let me talk to you about a question of whether or not there + + was government fraud in this case. A question Mr. Dymond seems to want us + + to answer. + + + + A government is a great deal like a human being. It's not + + necessarily all good, and it's not necessarily all bad. We live in a good + + country. I love it and you do, too. Nevertheless, the fact remains that + + we have a government which is not perfect. + + + + There have been since November the 22nd of 1963, and that was not + + the last, indications that there is an excessive power in some parts of + + our government. It is plain that the people have not received all of the + + truth about some of the things which have happened, about some of the + + assassinations which have occurred, and more particularly about the + + assassination of John Kennedy. + + + + Going back to when we were children, I think most of us, probably + + all of us in this courtroom, once thought that justice came into being of + + its own accord, that that virtue was its own regard, that good would + + triumph over evil. In short, that justice occurred automatically. Later, + + when we found that this wasn't quite so, most of us still felt hopeful + + that at least occurred frequently of its own accord. + + + + Today, I think that almost all of us would have to agree that + + there is really no machinery, not on this earth at least, which causes + + justice to occur automatically. Men still have to make it occur. + + Individual human beings have to make it occur. Otherwise, it doesn't come + + into existence. This is not always easy. As a matter of fact, it's + + always hard, because justice presents a threat to power. In order to make + + justice come into being, you often have to fight power. + + + + Mr. Dymond raised the question; "Why don't we say it's all a fraud + + and charge the government with fraud, if that is the case?" + + + + Let me be explicit, then, and make myself very clar on this point. + + The goverment's handling of the investigation of John Kennedy's murder was + + a fraud. It was the greatest fraud in the history of our country. It + + probably was the greatest fraud ever perpetrated in the history of + + humankind. + + + + That doesn't mean that we have to accept the continued existence + + of the kind of government which allows this to happen. We can do + + something about it. We're not forced either to leave this country or + + accept the authoritarianism that has developed. The authoritarianism that + + tells us that in the year 2039 we can see the evidence about what happened + + to John Kennedy. + + + + Government does not consist only of secret police and domestic + + espionage operations and generals and admirals. Government consists of + + people. It also consists of juries. And in the cases of murder, whether + + the poorest individual or the most distinguished citizen in the land, + + should be looked at openly in a court of law, where juries can pass on + + them and not be hidden, not be buried like the body of the victim beneath + + concrete for countless years. + + + + You men in recent weeks have heard witnesses that no one else in + + the world has heard. You've seen the Zapruder film. You've seen what + + happened to your President. I suggest to you that you know right now + + that, in that area at least, a fraud has been perpetrated. + + + + That does not mean that our government is entirely bad - and I + + want to emphasize that. It does mean, however that in recent years, + + through the development of excessive power because of the Cold War, forces + + have developed in our government over which there is no control and these + + forces have an authoritarian approach to justice; meaning, they will let + + you know what justice is. + + + + Well, my reply to them is that we already know what justice is. + + It is the decision of the people passing on the evidence. It is the jury + + system. In the issue which is posed by the government's conduct in + + concealing the evidence in this case, in the issue of humanity as opposed + + to power, I have chosen humanity, and I will do it again without + + hesitation. I hope every one of you will do the same. I do this because + + I love my country and because I want to communicate to the government that + + we will not accept unexplained assassinations with the casual information + + that if we live seventy-five years longer, we might be given more + + evidence. + + + + In this particular case, massive power was brought to bear to + + prevent justice from ever coming into the courtroom. The power to make + + authoritarian pronouncements, the power to manipulate the news media by + + the release of false information, the power to interfere with an honest + + inquiry and the power to provide an endless variety of experts to testify + + in behalf of that power, repeatedly was demonstrated in this case. + + + + The American people have yet to see the Zapruder film. Why? The + + American people have yet to see and hear from real witnesses to the + + assassination. Why? Because, today in America too much emphasis is given + + to secrecy, with regard to the assassination of our President, and not + + enough emphasis is given to the question of justice and to the question of + + humanity. + + + + These dignified deceptions will not suffice. We have had enough + + of power without truth. We don't have to accept power without truth or + + else leave the country. I don't accept power without truth or else leave + + the country. I don't accept either of these two alternatives. I don't + + intend to leave the country and I don't intend to accept power without + + truth. + + + + I intend to fight for the truth. I suggest that not only is this + + not un-American, but it is the most American thing we can do, because if + + truth does not endure, then our country will not endure. + + + + In our country the worst of all crimes occurs when the government + + murders truth. If it can murder truth, it can murder freedom. If it can + + murder freedom it can murder your own sons, if they should dare to fight + + for freedom, and then it can announce that they were killed in an + + industrial accident, or shot by the "enemy" or God knows what. + + + + In this case, finally, it has been possible to bring the truth + + about the assassination into a court of law, not before a commission + + composed of important and politically astute men, but before a jury of + + citizens. + + + + Now, I suggest to you that yours is a hard duty, because in a + + sense what you're passing on is the equivalent to a murder case. The + + difficult thing about passing on a murder case is that the victim is out + + of your sight and buried a long distance away, and all you can see is the + + defendant. It's very difficult to identify with someone you can't see, + + and sometimes it's hard not to identify to some extent with the defendant + + and his problems. + + + + In that regard, every prosecutor who is at all humane is concious + + of feeling sorry for the defendant in every case he prosecutes. But he is + + not free to forget the victim who lies buried out of sight. I suggest to + + you that, if you do your duty, you also are not free to forget the victim + + who is buried out of sight. + + + + Tennyson once said that "authority forgets a dying king." This + + was never more true than in the murder of John Kennedy. The strange and + + deceptive conduct of the government after his murder began while his body + + was still warm, and has continued for five years. You have even seen in + + this courtroom indications of interest of part of the government power + + structure in keeping truth down, in keeping the grave closed. + + + + We presented a number of eyewitnesses as well as an expert witness + + as well as the Zapruder film, to show that the fatal wound of the + + President came from the front. A plane landed from Washington and out + + stepped Dr. Finck for the defense, to counter the clear and apparent + + evidence of a shot from the front. I don't have to go into Dr. Finck's + + testimony in detail for you to show that it simply does not correspond to + + the facts. He admitted that he did not complete the autopsy because a + + general told him to not complete the autopsy. + + + + In this conflict between power and justice, to put it that way, + + just where do you think Dr. Finck stands? A general who is not a + + pathologist, told him not to complete the autopsy, so he didn't complete + + it. This is not the way I want my country to be. When our president is + + killed he deserves the kind of autopsy that the ordinary citizens get + + every day in the state of Louisana. And the people deserve the facts + + about it. We can't have the government power suddenly interjecting itself + + and preventing the truth from coming to the people. + + + + Yet, in this case, before the sun rose the next morning, power had + + moved into the situation and the truth was being concealed. And now, five + + years later in this courtroom the power of the government in concealing + + the truth is continuing in the same way. + + + + We presented eyewitnesses who told you of the shots coming from + + the grassy knoll. A plane landed from Washington, and out came ballistics + + expert Frazier for the defense. Mr. Frazier explanation of the sound of + + the shots coming frm the front, which was heard by eyewitness after + + eyewitness, was that Lee Oswald created a sonic boom in his firing. Not + + only did Oswald break all of the world's records for marksmanship, but he + + broke the sound barrier as well. + + + + I suggest to you, that if any of you have shot on a firing range, + + and most of you probably in the service, you were shooting rifles in which + + the bullet travelled faster than the speed of sound. I ask you to recall + + if you ever heard a sonic boom. If you remember when you were on the + + firing line, and they would say, "ready on the left - ready on the right - + + ready on the firing line - commence firing," you heard the shots coming + + from the firing line, to the left of you and to the right of you. If you + + had heard as a result of Mr. Frazier's fictional sonic boom, firing coming + + at you from the pits, you would have had a reaction which you would still + + remember. + + + + Mr. Frazier's sonic boom simply doesn't exist. It's a part of the + + fraud, a part of the continuing government fraud. + + + + The best way to make this country the kind of country it's + + supposed to be is to communicate to the government that no matter how + + powerful it may be, we do not accept these frauds. We do not accept these + + false announcements. We do not accept the concealment of evidence with + + regard to the murder of President Kennedy. + + + + Who is the most believable? A Richard Randolph Carr, seated here + + in a wheelchair and telling you what he saw and what he heard and how he + + was told to shut his mouth, or Mr. Frazier and his sonic booms? + + + + Do we really have to actually reject Mr. Newman and Mrs. Newman + + and Mr. Carr and Roger Craig and the testimony of all those honest + + witnesses, reject all this and accept the fraudulent Warren Commission, or + + else leave the country? + + + + I suggest to you that there are other alternatives. Once of them + + has been put in practice in the last month in the State of Louisiana, and + + that is to bring out the truth in a proceeding where attorneys can + + cross-examine, where the defendant can be confronted by testimony against + + him, where the rules of evidence are applied and where a jury of citizens + + can pass on it, and where there is no government secrecy. Above all, + + where you do not have evidence concealed for seventy-five years in the + + name of "national security." + + + + All we have in this case are the facts. Facts which show that the + + defendant participated in the conspiracy to kill the President and that + + the President was subsequently killed in an ambush. + + + + The reply of the defense has been the same as the early reply of + + the government in the Warren Commission. It has been authority, + + authority, authority. The President's seal outside of each volume of the + + Warren Commission Report, made necessary because there is nothing inside + + these volumes. Men of high position and prestige sitting on a board, and + + announcing the results to you, but not telling you what the evidence is, + + because the evidence has to be hidden for seventy-five years. + + + + You heard in this courtroom in recent weeks, eyewitness after + + eyewitness after eyewitness and, above all, you saw one eyewitness which + + was indifferent to power, the Zapruder film. The lens of the camera is + + totally indifferent to power and it tells what happened as it saw it + + happen, and that is one of the reasons 200 million Americans have not seen + + the Zapruder film. They should have seen it many times. They should know + + exactly what happened. They all should know what you know now. + + + + Why hasn't all of this come into being if there hasn't been + + government fraud? Of course there has been fraud by the government. + + + + But I'm telling you now that I think we can do something about it. + + I think that there are still enough Americans left in this country to make + + it continue to be America. I think that we can still fight + + authoritarianism, the government's insistence on secrecy, government force + + used in counterattacks against an honest inquiry, and when we do that, + + we're not being un-American, we're being American. It isn't easy. You're + + sticking your neck out in a rather permanent way, but it has to be done + + because truth does not come into being automatically. Justice does not + + happen automatically. Individual men, like the members of my staff here, + + have to work and fight to make it happen, and individual men like you have + + to make justice come into being because otherwise it doesn't happen. + + + + What I'm trying to tell you is that there are forces in America + + today, unfortunately, which are not in favor of the truth coming out about + + John Kennedy's assassination. As long as our government continues to be + + like this, as long as such forces can get away with such actions, then + + this is no longer the country in which we were born. + + + + The murder of John Kennedy was probably the most terrible moment + + in the history of our country. Yet, circumstances have placed you in the + + position where not only have you seen the hidden evidence but you are + + actually going to have the opportunity to bring justice into the picture + + for the first time. + + + + Now, you are here sitting in judgement on Clay Shaw. Yet you, as + + men, represent more than jurors in an ordinary case because the victims in + + this case. You represent, in a sense, the hope of humanity against + + government power. You represent humanity, which yet may triumph over + + excessive government power. If you will cause it to be so, in the course + + of doing your duty in this case. + + + + I suggest that you ask not what your country can do for you but + + what you can do for your country. + + + + What can you do for your country? You can cause justice to happen + + for the first time in this matter. You can help make our country better + + by showing that this is still a government of the people. And if you do + + that, as long as you live, nothing will ever be more important. + + + + --------------------------- + + + + Since you read all the way through, you might be interested in + + more information. You can check out alt.conspiracy.jfk at your favourite + + USENET site and see the still active coverup covering up. Now including a + + phoney "Oswald did it alone" FAQ posting from a .mil address. The + + internet equivalent to Gerald Posner's "Case Closed." Though less well + + written, it includes about the same amount of real research. There are + + some good people on the newsgroup as well and they have a large and + + growing body of info on display regularly. Another excellent source is + + the web site for Fair Play magazine: http://www.kaiwan.com/~ljg/fp.html + + + + -31 and counting- + + + + + + + + + +. + diff --git a/textfiles.com/magazines/JONAS.1 b/textfiles.com/magazines/JONAS.1 new file mode 100644 index 00000000..6d3affb6 --- /dev/null +++ b/textfiles.com/magazines/JONAS.1 @@ -0,0 +1,31 @@ + +T E X T F I L E S + +

+ +

+

+ + +
+
Filename +Size +Description of the Textfile
jonas_11.txt 37304
Jonas Issue #11 +
jonas_12.txt 27206
Jonas Issue #12 (October 8, 1995) +
jonas_13.sur 5021
Jonas Issue #13 Information +
jonas_13.txt 39532
Jonas Issue #13 (November 13, 1995) +
jonas_14.txt 58343
Jonas Issue #14 (December, 1995) +
jonas_15.txt 32255
Jonas Issue #15 (February 17, 1996) +
jonas_16.txt 27539
Jonas Issue #16 (April 2, 1996) +
jonas_17.txt 36642
Jonas Issue #17 (April 2, 1996) +
jonas_18.txt 35483
Jonas Issue #18 (May 27, 1996) +
jonas_19.txt 48357
Jonas Issue #19 (1996) +
jonas_20.txt 56584
Jonas Issue #20 (July 28, 1996) +
jonas_21.txt 55369
Jonas Issue #21 (August 28, 1996) +
jonas_22.txt 29610
Jonas Issue #22 (November 25, 1996) +
jonas_23.txt 46010
Jonas Issue #23 (March 13, 1996) +
jonas_24.txt 38524
Jonas Issue #24 (April 30, 1997) +

There are 15 files for a total of 573,779 bytes.

+ + + diff --git a/textfiles.com/magazines/JONAS/.windex.html b/textfiles.com/magazines/JONAS/.windex.html new file mode 100644 index 00000000..21d24bc3 --- /dev/null +++ b/textfiles.com/magazines/JONAS/.windex.html @@ -0,0 +1,31 @@ + +T E X T F I L E S + +

+ +

+

+ + +
+
Filename +Size +Description of the Textfile
jonas_11.txt 37304
Jonas Issue #11 +
jonas_12.txt 27206
Jonas Issue #12 (October 8, 1995) +
jonas_13.sur 5021
Jonas Issue #13 Information +
jonas_13.txt 39532
Jonas Issue #13 (November 13, 1995) +
jonas_14.txt 58343
Jonas Issue #14 (December, 1995) +
jonas_15.txt 32255
Jonas Issue #15 (February 17, 1996) +
jonas_16.txt 27539
Jonas Issue #16 (April 2, 1996) +
jonas_17.txt 36642
Jonas Issue #17 (April 2, 1996) +
jonas_18.txt 35483
Jonas Issue #18 (May 27, 1996) +
jonas_19.txt 48357
Jonas Issue #19 (1996) +
jonas_20.txt 56584
Jonas Issue #20 (July 28, 1996) +
jonas_21.txt 55369
Jonas Issue #21 (August 28, 1996) +
jonas_22.txt 29610
Jonas Issue #22 (November 25, 1996) +
jonas_23.txt 46010
Jonas Issue #23 (March 13, 1996) +
jonas_24.txt 38524
Jonas Issue #24 (April 30, 1997) +

There are 15 files for a total of 573,779 bytes.

+ + + diff --git a/textfiles.com/magazines/JONAS/jonas_11.txt b/textfiles.com/magazines/JONAS/jonas_11.txt new file mode 100644 index 00000000..a3407193 --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_11.txt @@ -0,0 +1,720 @@ +//01Welcome to Jonas, Biznatch. (Edicius) + + $&a. .a&$$$&a. .a&$$$&a. .a&$$$&a. .a&$$$&a. + $$$$ $$$$ $$$$ $$$$ $$$$ $$$$^$$$$ $$$$^$$$$ + $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ + aaa. $$$$ $$$$ $$$$ $$$$ $$$$ .a&$$$$$$ $$$$$&aa. + $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$^$$$$ aaaa $$$$ + $$$$.$$$$ $$$$.$$$$ $$$$ $$$$ $$$$.$$$$ $$$$ $$$$ + `$$$$$$$' `$$$$$$$' `$$$ $$$' `$$$$$$$' `$$$$$$$' + jonas?! $&' lf + $' + + Here it is, Jonas 11. WOO - FUCKING - HOO. Its out, its out, its + out!@^*!$%^ + + Nothing much is news-worthy with Jonas. Oh yeah, Jonas is taking an + indefinate leave of absence for alittle while. + + You heard it, bitch. On your back, no excuses. + + Um. Yeah. Basically, what I'm saying, is that Jonas won't be out + for awhile. SO DON'T BUG ME FOR IT (cough time killer cough. :>) + + Um. Here's the reason. + + I'm becoming a real 'zine. Yup. I'm becoming a paper 'zine, + jeah!@# + + Hopefully. I need the money, so I can get a Post Office Box (I + don't want you sickos having my home address (181 Ridgemount Drive, Salt + Lake City, UT). I also need a legitamate internet account, too. :> + + Anyway, as far as the paper Jonas goes, I'll be releasing a + information file before the end of September regarding the future. + + As far as real news for this month: + + o. Belial did us two Articles, and an ascii. + + o. Also, Lucifer did us a few radIk0w asciis. + + o. I had a few sites, but like, um, I forget them. + + o. EDICIUS IS YOUR LOVE GOD. OH YES. OH YES. OH YES. + + Read the 'zine, enlighten yourself, and drink Pepsi (c). + +edicius. +jonas vmb @ 800/314/8885::585. + +//02Edicius' Editorial (Edicius) +From masturbate.at.the.jonas.org!edicius Mon Sep 4 13:04:49 1995 +Return-Path: +Recieved: by masturbate.at.the.jonas.org (5.61 / 25) + id AA01437; Mon, 4 Sep 95 13:02:12 -0500 +Date: Mon, 4 Sep 95 13:02:12 -0500 +From: edicius@masturbate.at.the.jonas.org +Message-Id: <9509040808.AA01437@masturbate.at.the.jonas.org> +Aparently-To: sandyb@aol.com +Cc: mogel@hoe.org, willyc@whitehouse.gov, jgoleb@injersey.com +Status: 0 + + One day, April 1st, 1995, to be exact, I was bored. (Well, not just + on this day, but follow me here.) I looked around at all the different + 'zines around. Back then, I was involved with the ansi art scene alittle + more then I am now. I looked at Infinity, I looked at Bitchslap, I + looked at Undergrown. I also looked at Hoe, cDc, and all the other poppa + 'zines out there. + I said to myself, "Tom, you too can achieve fame, fortune, and asian + girls in bikinis if you make your own electronic magizine." + So, I sat down, wrote an article or two, drew up some asciis, and + boom, "Bee-Gee" Issue One was almost done. + +[----] + + WAIT A FUCKING SECOND EDI. BEE GEE? + + Yes, "Bee-Gee". I _almost_ named my magizine Bee-Gee, after the + infamous 70's group. I got bored, and didn't feel like working on it + anymore. So I scraped the whole thing. Sorta. + The next day, a typical Saturday night for me, I sat down, and + around eight o'clock, I started work on Jonas. I used some of the stuff + I had from the night before, drew new asciis, and finished the coding. + I released an issue that night, about 5 hours after I originially + started working on it. (Deeply Disturbed (I think it was DeepStah) put + out some magizine that he said was done in 5 hours. HAH. JONAS COPY + CAT.) + The reviews of the 'zine were very mixed. So, I put out an issue + the next day (Sunday), about 12 hours after I released issue one, and + then, I released issues 3 and 4 the next weekend. + +[----] + + "Is your main objective to be a simple magizine, or are you just an + inexperienced coder looking for fun?" -- Asphixia. + + It was a mixture of both. I was just an angstful person looking for + a way to vent my frustrations at the art scene, or something. I love + writing, so I felt like putting together my own magizine. + I also know very little about coding. :> + No matter what I did, I also had Jonas under my belt. Jonas is me. + Without me, Jonas is no more. (Sounds like Eerie and Undergrown. :>) + What I've done with Jonas, is exactly what I've wanted to do with it. + I've never had any senior staff, no co editors, _nothing_. I have very + rarely been influenced by other people, as far as Jonas is concerned. + Jonas is me. Jonas is about 5 months, 11 issues, and countless + hours of hard work. I've put alot into Jonas, and only want the best for + it. Making it into a paper 'zine is what I want to do. Its how I can + reach alot more people, then I can now. + +[----] + + Over the course of Jonas' history, it's main theme has changed + _greatly_. I started out as a small Ansi mag, without ansi, only ascii. + (Pretty neat concept, eh?) I had the interviews with the big people in + the ansi scene. Rad Man, Wizard of Id, and others. + As time progressed, I changed. Its range of coverage was very wide. + Music, Computers, Politics, amoung many other topics. I still had the + ansi in it, to a small extent. One of my favorite things I've done for + Jonas is the Eerie interview in issue 10. + Its theme has changed, but the heart and spirit of Jonas never + swayed one bit. Jonas would always release, no matter how lame people + thought it would be. + +[----] + + "Serious content in a magizine quoted as 'a joke' but its creator. + The road to today's cult phenomenom leads to Jonas." -- Diehard + + True, very true. Jonas has a pretty strange following. I mean, its + nothing like Deadheads, but I have had alot of people tell me how much + they look forward to Jonas, which pleases me. Jonas was started out as a + joke, I was very shocked when people told me they liked it. + Jonas may, or may not, stop electronic releases, but it will live + on. The spirit of Jonas will remain in the minds of many, forever. + Maybe. + +[----] + + "Jonas, its more then a 'zine, its a lifestyle." -- Edicius. + + I've said those words before in the past, without really thinking + never have they meant more then me, then they do now. + +-- + +tom m. sullivan - edicius@masturbate.at.the.jonas.org +office: (800)314/8885::585 / home: see office / fax: see office +"Jonas, Its more then a 'zine, its a lifestyle." -- Edicius. +"pHEAR mE." -- Mogel +"Nine, or ten, thousand times a day." -- Pip the Angry Conservative. + +-- + +//03A Day in the Life of Edicius (Edicius) + + Here's a day in the life of me, Edicius/Tom Sullivan, for September + 2nd, 1995. + + I woke up around noon, after going to bed around 2:30am. Brushed + myself off, got something to drink, and went to the bathroom. I think I + read the paper, not really sure. I came into my room, played alittle + Sega (Hardball '95, *GREAT* game), and watched TNBC. (Saved by the bell + ROCKS.) + + I talked alittle bit on the phone, and started cleaning my room + around 1 or so. Nothing too special there. Around 2:30 or so, I left, + hopped on my bike, and rode to my friends house. Hung out at his house, + watched alittle bit of "Interview with a Vampire", and then took a 3 mile + ride on my bike to taco bell. + + After a hearty meal (2 double decker tacos, a steak soft taco, 10 + packets of hot sauce, and about 4 refills of Dr. Pepper), I go to the + Wawa (7-11 type store), got a cherry Icee (c) and a pack of Starburst. + Played around with the payphone (I called my answering machine to check + my messages, and tried out a loop number I found, then, the phone was + fucky with me, and tricked me into thinking I could get free calls (I + dial a number for the hell of it, without a coin, and the fone rang, but + after 4 rings, an operator came on asking for change, bitch.)) Being + pissed off at the phone, I covered it with Cherry Icee (c). h0h0. + + I rode down the highway to a record store, saw a few cd's I wanted + (newest Teenage Fanclub $4.99 (it was used, and didn't have the front + cover on it), but I bought a Pavement sticker, and got 2 free music + newspapers. + + Rode back to my friend's house, hung out, he showed me how to play + the sport "hurling". (Its an major Irish sport, he just came back from + Ireland, and the sport totally rocks. Its like a mixture of field hockey + and rugby.) Played with some hot wheels (I NEEDED MATCHES TO MAKE A + TOTALLY REALISTIC ACCIDENT SCENE, but _no_, my friend wouldn't let me use + them.) + + I went to a local shopping center with my friend around 5 or so, got + a big can of Arizona Ice Tea, a can of Dr. Pepper, and a Choco-taco, went + to a playground nearby, and just sat, ate, and went down the slides + backwords and did flips and cool stuff like that. + + I came home around 7 or so, did nothing besides watch tv. I + masturbated around 8 or so (a mixture of Alt.sex.stories, and a really + nice looking Meterologist on The Weather Channel (Yes, it was a chick. + Sharon Reseultan.)) Finished cleaning my room and watched the news at + Ten. There was a punk rock riot in New York City today, too. + + The only thing that I regret about the day, is "hacking" my friends + answering machine. + + Around 11 or so, I was deafly bored. She has been in Hong Kong + since last Saturday, and doesn't come back for a few more days. I called + up, starting pressing keys, and after about 15-20 calls, I got the code. + + *PROBLEM* + + I got through, and hear, "You have 29 new messages." + + Uh-oh. + + *ANOTHER PROBLEM* + + 20 of the messages are, "DOO DOO DEE DAA DOO". (Me hitting the + telephone keypads.) + + AND I CAN'T DELETE THE 20 MESSAGES. I EITHER RESET THE WHOLE + FUCKING TAPE, OR LET THEM BE. + + Now I don't know what to do. Let them stay, and just totally lie to + her come Tuesday. She may already know that I like to fool around with + phones, I might have mentioned it to her before. I do remember that i + tried doing that to her phone before in the past. Also, another time, + she was pissed off at her sister, and her sister just got a new phone and + answering machine, and I _might_ (I stress "might", I really can't + remember) have said to her something like, "get me her new phone number, + and I can crack her answering machine." + + I used *67 before each call, even though I know she doesn't have + caller ID. I just hope she can't find out it was me. + + LAMER I AM, FOR I AM THE LAMER. + + I don't know, I don't know, I just don't fucking know what to do. + ARG. This is pissing me off. + + AND TO TOP IT OFF, I HAVE A FUCKING MISQUITO BITE ON THE BACK OF MY + LEG. + + Ah. Fuck it all, I'll get through it. + + Thats my angstful life that I lead. + +//04Hiroshima: 50 Years After (Terminal V.) + + It's August, and as everyone should know, the month of the + bombing of Hiroshima. It was the month that Eisenhower made the + fateful descision to bomb not one, but two major civilian + centers in Japan. The names Hiroshima and Nagasaki are often + used to describe descenes of mass death and destruction. The + bombings of these two cities were the startling conclusion to + the war in the Pacific with Japan. Now, almost 50 years after + the bombing of Japan, many people look back on the incident and + wonder if maybe we didn't go to far in bombing the homes of + innocent civilians and that maybe the price of our win was much + higher than we ever should have allowed it to go. It seems now + that the popular sentiment is to bash the US's decision to bomb + Japan. + Often I bash the US for various decisions and policies, however + it must be known that I totally agree with Eisenhowers descision + to bomb Japan. However horrible it be that over 300,000 + innocents died in the two blasts, I think that it would have + been more horrible had many millions died. Millions of soldiers + continuing to fight the war, the blood of many more people would + have been shed had we not forced Japan to stop and surrender. It + is often said that the needs of the many outweight the needs of + the few, and many people agree that this statement is both + callous and coldly logical, however it is most appropriate in + this case. It was worth the lives of 300,000 men, women and + children in order to save the lives of millions of soldiers. + It is often at this juncture that people get up on their + soapboxes quivering with moral outrage, that innocents never + asked to be involved in a war and that soldiers are paid to die + for their countries, shouting that the deaths of innocent + children are inexcusable. True as these words may be, it should + be said that the deaths of soldiers are no less tragic or + terrible than the deaths of pregnant women and small children. + These men who were brothers, fathers, husbands, and uncles went + off and died by the millions in foreign lands. It was the deaths + of innocents which helped to bring about needless death on a + larger scale. Just because they are soldiers doesn't mean their + lives are any less valuable than a woman or childs. + + Note: All facts and figures used in the artical were obtained + from the August 7th, 1995 issue of Time magazine. + + +//05Vampire Part I (Terminal Velocity) + + Morius looked out upon the fogged over San Franciso bay. Longing +filled his eyes and the ever present cloud of depression hung low about +him, thicker than the mist which enshrouded the bay. He had been a vampire, +or as they call themselves, the Kindred for far too long he felt. He felt +weary of the constant hunger which gnawed away at his soul and slowly +turned him in to something much more evil than any human could ever imagine, +slowly turning him in to the evil, amoral creature know to every one of the +Kindred and the Beast. It was because of his weariness that he felt it was +time for him to seek the respite from the horrors of his curse of living +death, a respite known as Golconda. Unfortunatly for Morius, he lacked the +will and the motivation required to reach that blessed state. He had however, +heard that if one sought out Caine, father of all vampires, and asked him, +tha Caine would reveal the secret to Golconda and allow the seeker to be +spared the journey of self discover which often marks the first part of the +ordeal required to reach Golconda. Morius shook himself out of his thoughtful +revere and calmly awaited the arrival of his first candidate for being one of +his seekers. + Finally as the moon began it's descent which would herald the comming +of dawn, Morius' patience was rewarded by the sound of the soft footsteps of +his first candidate. Stepping into view, intent upon the young man he had been +tracking for several blocks, the hunter stopped to sniff the air so that he +might orient once again on the location of his victem. Finally after a few +moments of sniffing the air he caught the scent of his victem and started to +go off when the sudden appearence of a tall dark man stopped him. Before +speaking Morius looked over this man. A tall man, with a lean muscular build, +walked with the gait of a cat stalking it's prey and could almost be taken +for human until you saw his face. Like some many who are members of the +vampire clan Nosferatu, the man was hideously ugly and even expecting it +Morius was still aghast at this man's looks. + " Finally you have arrived," Morius said. " I was hoping you would +have arrived sooner than this, but beggers or course, may not be choosers." + " Who are you to be awaiting my arrival?", the man asked. + " I sir am Morius and you, if I am not mistaken, are non other than +the Nosferatu named Jasper," Morius replied. + " And to what do I owe the honour of your interest?" the man replied. + " I am seeking a strong man, capable in both mind and body to seek out +something very dear to me. I would ask that you would search for our fabled +father known as Caine. Do not worry, I plan on rewarding you for work by +offering you all my worldly goods, which if the reputation of the knowledge of +the Nosferatu is overstated, you must assuredly know the amount, " Morius said + " Indeed your wealth is known to me, and a considerable amoun it is. +However the task you request of me boarders on impossible as know one, human, +Kindred or otherwise, save Caine, knows his location. I fear that you would be +wasting my time and your money on this fools errand as surely you know that my +sense of honour would not allow me to stop looking for him until I have +completed the terms of our contract, and I hate to breake it to you, but I +have better ways to spend the rest of eternity," Jasper replied. + Looking down at the ground, seemingly contemplating the cracks in the +pavement Morius let loose a deep sigh and looked to the sky as if asking some +divine power to give him the strength to continue the conversation. After a +few moments spent collecting his thoughts and his patience, he turned around +and gazed at Jasper. Finally he spoke. + " I am privy to information that there is a journal which contains +the last know whereabouts of Caine and which will allow for you to check +the most recent location in it, following a trail of sorts," Morius answered. +After a moment he said, " With this information the quest would become +feasble and you and the others would be able to find him for me. In exchange +I will give you a share of my worldly goods." + " Others," Jasper replied in a questioning tone. " What others would +these be? I thought you meant me and me alone." + " I highly doubt you would be able to accomplish such a formidable +task on your own. What I am asking you to do would require a large array of +varying talents. There are two others. A man from the Gangrel beast clan +know as Argos, and the other is a rather petite woman who is from the +Tremere wizard clan and she is called Simone. It is with those two you shall +be traveling and with those two you shall be sharing the money, " Morius +explained. + " I see, " Jasper said, " but when do we get this information?" + " You shall receive the information for your objective when I have +brought all of you together in one place," replied Morius in quiet tones. + " And when is that? " + " Tomorrow night, " replied Morius and with that he walked off in +to the shadows of the alley disappearing from view. + Jasper looked at the sky and cursed when he saw it was slowly getting +lighter with the impending dawn. Angry that he would be going to bed hungry, +he ran down the street towards his haven so that he might be protected by the +suns killing light and live to see the night once more. + + To be continued.... + +//06How to Piss Off Someone (Belial) + +The first thing that you can do to totally piss someone off is to +take a can of spray paint, (red is a nice color), and spray racial +slurs all over their house... Now this is a great way to insult and to +piss a lot of people off at the same time... and your true enjoyment +comes when the home owners get jumped by the linch mob that saw all your +slurs spraypainted in red all over the house... + +The next way to piss someone off real bad is to slaughter their +animals in strange, abnormal ways... But, in order to do this you have +to make sure that the people you plan on angering have animals to +slaughter... Now, what you can do is, if the animal is small, feed it to +the blender and the put it in a plastic bag and set it on the persons +porch with a simple note saying, "Fluffy", or whatever the animals name is. +If the animal is big (horse) then get an good, sharp axe and do what the +blender would do to the smaller animal... then get a garbage bag and stuff +the animal inside of it, and once again leave a small note saying, "Big +Fluffy", or whatever the large animals name was... This will have the effect +of really pissing the person off so make sure you are out of the area when +the people find the bag or bags if they have more than 1 animal... + +3. Kinda old fashioned, but you can set a burning cross on the persons +front yard... Then, for effect, dress up in a white sheet, make sure the +sheet is white because a pink and flowery sheet won't work right at all, +then prop a pillow case on your head, dance around singing songs full of +racial insults... Now, if the person, or people you are trying to piss off +are black then wear a bullet-proof vest under the sheet, because you are +going to get shot... If the people/person you plan on pissing off are from +"the country" then wear two bullet-proof vests, because you are going to +get shot with a bigger gun, probably a shot gun... Now this really pisses +a lot of people so count on getting shot a bunch of times.. In fact, what +you can do is have one of your friends, one that you don't really like all +that much, dress up for you, that way you don't have to get shot and you +can piss the people off, as well as your friend... + +4. For the next way to piss someone off you are going to need a few +supplies... here is a short list: + +a. few boards (about 4 or 5) +b. a bunch of two-by-fours (40 or so) +c. a few boxes of nails (10 penny would do it) +d. a hammer +e. a car with a loud stereo +f. a small log (about 2-3 inches think. 3 feet tall) +g. a old t-shirt +h. some gas +i. a lighter + +ok, now, real late at night go to persons house, park your car +across the street and blast some music, not rap, most suburban family's +don't like it and they may call the cops on you and that would piss you +off, not the desired effect... Some Chicago would be great... maybe some +Journey, even a little White Snake would do the job... Ok, the music is +going to distract the people from what you are going to do... First take +the boards, the nails, and the hammer... Nail a board up over the front +and back door, and over any big windows... Next, use the two-by-fours and +nail them up over all the remaining windows except one... Make sure the +house is totally secure from anyone getting in or out, except from the +one window you left open... (make sure the music is still on) Alright, +your almost done... take your old t-shirt and wrap it around the log you +got... then drench the t-shirt in the gas and set it on fire... Now take +your torch and throw it into the window you left alone... now really fast +board up the window... run to your car, turn the music down and yell real +loud, "Do you smell something burning dear?" then skid out and drive away. +This is really really really really going to piss these people off, why +cuz they are stuck inside of a burning house, with NO escape, so try to +be out of the state, or even better the country within the hour... + +That ends part one of this small but enlightening series of "Ways to Piss +People Off Really Really Bad!" Written and produced solely for your enjoyment +by the hand of belial...for more crazy ways to piss people off call: +Avalon at 9o8.739.4274... + +//07To Live is to Die (Belial) + + What is this life? What is the answer? Can you answer, you, do +you have the power to answer this? Take care and word this properly, for +in my opinion there is no answer to this question. Why ask then, why not? + + Life. It is beautiful, in its savage glory. But, when does it go to +far? What gives another man, man being mankind, the power to tell another man +what to do, or how to act. What makes one man more powerful than another? + + These are all questions I ask the world and myself. Do I know the +answer? In my heart, I know what's right to me. I am a man and I am an +individual, my ways are not your ways and my answers are not the same as +yours, but does that make my answers any less valid? + + This life, in my opinion, is great, great because of what it is. +Man isn't evil or good, man is both. Man is the perfect union of total evil +and total good. That is how we survive and prosper. In my opinion there is +no good at all, because somewhere it has been effected by evil. Evil is not +bad, evil is natural, just as natural as good. + + With life there always follows death. Leading me to ask, what is +death? And, where does the soul, if there is a soul, go when the body dies? +This question is just as complex as life itself, and probably, as in life, +there is no answer to death. And, with the little knowledge I have, I know +that life, great as it is, and death, great as it is, has no real meaning +for me at all. I am born, I live, and I die, all with no meaning. Maybe the +meaning will be shown to me when I die, maybe not, but I am secure knowing +that life is no more than death, and with death a life without meaning, +ends... + +(------) + +These are just a few thoughts I have had... No, I am not suicidal or anything +like that... =) Anyway, if you would like to get in contact with me just +call my board, Avalon at .908.739.4274. Thanx, laterz... + +//08Jump on the Bandwagon (Edicius) + + I just sat down, and re-read alot of old issues of Pez. Pez is + definally one of the best 'zines ever created. Pez was just the epitome + of a text file 'zine. Editorials and Commentary's on a range of + subjects, great short stories, and little rants and ramblings on + everything. Anyway, thats not the point. I just re-read Murmur's + article on Liberalism in Pez # 24. I'm not going to re-write it, read it + yourself. But the one part that struck me the most, summerized of + course, is when he said that "no one has any balls, no one will go out + and buy an album without hearing anything from it beforehand. alot of + people follow a blind trend." thats basically what he said in one part. + (sorry to murmur if i totally missed the point. :>) + +[----] + + i find this to be _very_ true. in my area, very few people know the + hell half of the bands i listen to are. i've had my friends look at my + cd's and basically go "duuh." + the other day, i went to a record store near my house, one of the + few places i can get smaller records (dead milkmen, they might be giants, + etc), basically, anything i can't get at the wiz. (the big record store + around here.) i only had about 3 bucks on me, and i saw a pavement + sticker i wanted to get. these two chicks walk in, and buy the new + michael jackson single, "you are not alone", and some jodeci single. + they looked at the sticker, gave me a strange look, and had no idea who + the hell pavement was. + in my yearbook last year, they had a survey. one of the questions + was "what is your favorite album". the top four picks were: pearl jam; + vitalogy, green day; dookie, nirvana; unplugged, pearl jam; ten. with an + "honarable mention" going to nirvana; nevermind. + ACK. pearl jam, green day, and nirvana? what the hell is this + crud? where's frank black? where's pavement? where's they might be + giants? WHERE'S WEEZER GOD DAMNIT? + those bands aren't on there, for one simple reason: no one has heard + of them. + alot of people in my school jumped on a bandwagon, at one point or + another. i admitantly have done that in the past, too. but i've seen + the light. um. yeah. + the worst part about bandwagons, is that they happen _very_ late. + matthew sweet didn't get overly popular until after his 5th album. blues + traveler had 4 albums before they made it big. everyone calls hootie and + the blowfish the "hottest new band", when they've been around for 10 + years. everyone thinks that "cracked rear view" is their only album, + when they've had 2 indie releases. + don't get me wrong. i love hootie and the blowfish. i heard them + on local radio stations about a year before they made mtv. last summer, + about 2 months before "hold my hand" became popular, i heard their album, + and loved it. if i had a cd player at that point, i would have gotten + the cd then. but i still got the cd before most of the people i know got + it. + (in febuary, when the new hootie album comes out, i'm the first to + buy it. :>) + i went out, bought my frank black albums, without ever hearing any + song. i bought pavement's wowie zowie, i didn't even know who pavement + was. the point is, i don't follow trends, the people are my school do, + thus, i am cooler. + well, take away the cooler part. i just have better taste in music. + +//09Edi's List o' Cd's (Edicius) + . .. a public service message from: + + $$$$$&ø ,&$$$&, + $$$$ ,&$$$&, $$$$$&. ,&$$$&, $$$^`$$ . + $$$ $$$^$$$ $$$^$$$ $$$^$$$ $$$ ` + .o&$$$^ $$$ $$$ $$$ $$$ $$$ $$$ $$$ `$$$$$, + $$$$$$, $$$ $$$ $$$ $$$ $$$ $$$ $$$ ,`$$$ $$, : + `$$$$$$$, $$$ $$$ $$$ $$$ $$$ $$$j$$$ ,$$ $$$ $^$$, & +____________ `$$$$$$$j$$$, $$$j$$$ $$$ $$$ $$$$$$$ $$$ $$$ . `$$,j$ _bl.blade!__ + `$$$'^`$$$$$,`$$$$$' $$$ $$$ $$$^$$$ $$$j$$$ `$$$' + $' `$$$$$&. `$$ $$' `$$$$$' `$' + : `$ $' `$$$' : + . : : `$' + . : + . . + . . + + Hi. I figured I should enlighten everyone out there reading this + 'zine. So, in my ongoing quest to help everyone, here is my list of cd's + you should go out and buy, and cd's you should go out and scrap, burn the + tape if you have them, too. (Yes, I know this is a semi ripoff of Black + Francis' list Pez # 22, sorry bF. :>) + +[----] + + Get these cd's, right now. + + Weezer; Weezer + Civ; Set Your Goals + Every Pixies Album ever made. + Frank Black; His self-tittled debut, Teenager of the Year is pretty + good too. + Every They Might Be Giants Album ever made. + Hootie and the Blowfish; Cracked Rear View (You can join the small + group of six million people to buy this record!) + Smashing Pumpkins; Siamese Dream + Violent Femmes; Violent Femmes & Add It Up + Swinging Utters; The Streets of San Fransico + The Soundtrack to the movie of Judgement Night + Better Then Ezra; Delux + Pavement; Wowie Zowie & Slanted and Enchanted + Cracker; Their self titled debut & Kerosene Hat + Chucklehead; Big Wet Kiss + Any U2 Album ever made. + Cranberries; No Need to Argue + Mighty Mighty Bosstones; Don't Know How to Party + + (There's more you should buy, but, well, this is a good start.) + +[----] + + Burn and avoid these cd's. + + Any Green Day or Offspring Cd. + That "Best of the 90's" Cd advertised on TV. (Including great 90's + hits like "Ice Ice Baby", "I'm Too Sexy", and "Unbelieveable".) + Hammer; The first one, with "Can't Touch This" on it, and Too Legit + To Quit. There's a few songs on The Funky Headhunter that I kinda like. + :>) + Every Hole Cd ever made. + All of the Nirvana Cd's, except for Nevermind. This includes + Incesticide, In Utero, and the Unplugged Cd. + Any Cd by Heavy D and the Boyz. + +[----] + + There, you are now enlighted. Your soul has been sanctified. + +//10My Favorite Messages (Edicius) +here's two messages that i captured a _long_ time ago, that i thought +were both pretty cool. :> + +[----] + +dATE: 10:40 pm Sat Jul 15, 1995 nUMBER : 69 oF 81 +fROM: Rattle bASE : [Phear] H/P Mags +tO : Hooch rEFER #: 43 +sUBJ: Re: Hootie rEPLIES: nONE +sTAT: sENT oRIGIN : lOCAL + +E> GOOD FOR LAUGHS?! ARE YOU JOKING?! ITS GREAT TO JERK OFF TO!@ +H> +H> why do i have the feeling you're not the kind of person i'd want to meet? hey you guys are good for jerking off..whoops i mean for laughs. +E> +E> hey baby. you know, if you come to dummercon, i'm sure you and me can g +E> a secluded place somewhere for a few minutes. +Yea.. you could go somewhere alone and you could make a move on her and she +could laugh at you.. + +btw-- that was really pathetic tom.. + +--- Renegade v10-05 Exp + * Origin: .oO) tLoRaH (Oo. [6o9]698-i358 - 2 Nodes - 5 Gigs (173:609/1) + +//11Review: The Warped Tour (Edicius) + + The Warped Tour/Stone Pony, Asbury Park, NJ/August 18th, 1995. + +[----] + + "Extreme music meets extreme sports." + + That was the theme of the concert, spawned from the promoters of the + Lollapaloza-type touring show. They summed up the concert to a key. + + 13 Bands, professional skaters and bikers, and great times, all for + 15 bucks. Can you ask for a better deal? Well, I can, I won the tickets + from a local radio station. :> + + Armed with my guest pass, my good friend Steve, and 2 packs of + Starburst, I make my way inside about 2 o'clock, about 2 hours after the + thing started. Luckily, I didn't miss much. Just Wizo (a second-stage + band from Germany), and I forget who played the main stage at the point, + I believe it was Fluf and Orange 9mm. + + A punk band from California, called Swinging Utters, took the stage. + They were pretty good, very interesting, to say the least. They played + many songs off of their last album, "Streets of San Fransico" "Teenage Genocide", "Tied down, spit on", and + "Storybook Disease", were three of their songs that got the most reaction + from the crowd, and well deserved, too. + + I hung around, watched the skaters and bikers doing some _very_ + impressive things, and finnally, 3:30 came. Civ would be coming on the + second stage in 20 minutes, so I got a good standing spot, about 10 feet + from the stage, and soon after, the place was packed. + + I came to the concert only really wanting to see Civ, so I was + estatic. They did a pretty quick, but intense, set, including their + songs "Boring Summer", "Set Your Goals", "Can't Wait One Minute More", + and a few others. Civ was definally the most anticipated band for the + second stage, and they showed everyone why. + + During "Can't Wait One Minute More", the lead singer, Civ, said, + "I'm old, and I'm fucking tired. If you want to sing, just hop over the + guys in blue in front of the stage (guards), do a belly roll onto the + stage, and grab the microphone." One person actually did go up there and + sang with the band. + + Civ left the stage, alittle earlier then most people would have + liked, but many people were pleased regardless. + + The next band to take the second stage, was "Tilt". A hardcore band + from California, I believe. Personally, I didn't like them very much, + but that is largely due to the fact that their audio was terrible, and + the microphone went out at least 5 times during their 40 minute set. + + "Sick of it all" was the last band that I stayed to see. They are a + very good hardcore band, and were highly anticipated, due to the fact + that they are originally from the area. They did alot of really good + songs, but during their last song (for the life of me, I forget the + name), someone only a few feet from me got trampled on. Scary stuff. + + Unfortunally I didn't see any of the tour headliners, L7, Quicksand, + and others. The concert was still very good, regardless. From what I + was told, the second stage bands, especially Civ and Sick of It All, put + on a better show then most of the main stage bands. + diff --git a/textfiles.com/magazines/JONAS/jonas_12.txt b/textfiles.com/magazines/JONAS/jonas_12.txt new file mode 100644 index 00000000..b63b35d2 --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_12.txt @@ -0,0 +1,557 @@ + + + ____ + | |________________________ __ + | | | | | | | | + ___| | | | | | | | | | | | + | | | | | | |__| | | | | | + | | | | | | | | |__| | | + =| | | | | | | | |___ | | |= + ===| | | | | | | | | | | | |=== + ==| | | | | | | | | | | | |== + ====| | | | | | | | | | | |__|==== + ===| | | | | | | | | | | __ === + =====|_____|_____|__| |_____|_____| |__|===== + ==================================|__|=========================(gh/cia)===== + + jonas - issue twelve - october eighth, 1995 + jonas is produced roughly monthly by edicius. copyrighted by edicius, + it may be freely redistributed as long as this copyright noticed is + included within the file. oh; make sure you don't charge people for this, + either, dummy. + + ============================================================================ + + well if you're friends with pee % then you're friends with me + if you're down with pee % then you're down with me + % the rentals (weezer side-project) % 'friends with pee' + + ============================================================================ + + -+ edicius' editorial +- + -+ written by the funk-e master, edicius +- + + it's been awhile, howdy. + + welcome to jonas, issue 12. its been a long time since i've released + an issue of jonas. reason for this being that i had this crazy notion that i + might be able to convert jonas, the electronic issue, to a paper 'zine. hah. + well, not quite. i'm gonna put that side project on hold for alittle bit. i'm + doing good in school for once, i don't have too much money, and i actually + have a life now. so, if/when jonas goes paper, it won't be until early '96 at + the earliest. + + but edi! we want to see jonas in a different print matter!@ + + "fuggoff." + + i also decided to change the format a bit. the whole coding bit was + getting a bit out of hand. it was too much trouble to gather all of the work, + and then code it all. bah. its easier to copy it all into one 'uge text + file. :) in case you're wondering, the fact that the 'zine looks a tad bit + like the way pEz monthly used to look, and sorta how dto looks now. well, it + was and wasn't on purpose. i looked at a variety of 'zines out there, pulled + the best characteristics out of them, and combined them into this. don't yell + at me or anything because you think i ripped your 'zine, b0tch. + + what else is on the agenda? well. oh, the world head quarters. + that pesky little thing. aneurysm, our former whq, went down. so, i + scowered the area far and wide (well, not really, i only call 3 boards), and + decided to give belial's board, avalon, the world head quarters position. + + wait a sec; belial? avalon? warez i hear that before? + + you probably heard of it if you ever read klunk. its belial's zine. + pretty good one at that. + + give avalon a call, the number is at the end of the editorial. there + is a jonas sub-menu located just off of the matrix. better yet, you can + always make an account on there. (good board. a helluva lot of text files + (i should know, i uploaded them all :).. ), 300-2400 baud _only_, with 5 + disk drives on-line, running waffle.) + + so, now that's cleared up. i don't believe there is anything else + noteworthy, as far as jonas goes. i believe this new 'era' of jonas should + be pretty good, in my opinion. the looks of this issue, so be it small, it + should be good. (hey, i actually wrote alot of stuff this issue. isn't + that a shocker? :> ) + + in case you are wondering, jonas 13 should be out about the 13th of + november. don't bug me for it until then. (13 on the 13th? eerie. thats + a julbilee.) + + time to go. see you later, 'net dweebs. + + elyte edi. + + [------] + + jonas can be reached via the following methods: + + electronic mail - belial@raven.cybercomm.net + bulletin board system - whq; avalon, (908) 739/4274 + -+ create a new account or use the guest account; + -+ name: jonas / pw: guest (log on via the matrix jonas option) + voice mail system - (800) 314/8885, box - 585 + web page - coming soon, probably. + + ============================================================================ + + -+ "we the jury, find the defendant orethal james simpson.." +- + -+ written by edicius +- + + know what? i don't know about you, but i'm pretty much sick of the + whole oj trial. thank god its over. + + the trial can be called a slap on the judicial system of america. it + can be used to show how bad our country is right now; but it doesn't matter. + our judicial system has been made fun of numerous times in the past, and + this won't be the last case of it. we've weathered it this far, we'll + weather it again. + + anyhoot, back to my original point; + + you get a high profile case -- william kennedy smith, mike tyson, the + menedez brothers, hell, even the lindbergh case back in the 30's -- and the + media has a field day. why? because the person that has been put up on a + pedistal, with people just waiting for them to fall down. the minute they + fall down, the police, prosecution, and news media are all there. + + we create the idols. we create their enviroment. then, we wonder why + they fall. we wonder why they did what they did; be it rape, murder, or + anything else. after the celebrity gets convicted, or aquitted, only then do + people say how bad our country is, how bad the judicial system is, and that + we need to reform. the key thing is; our country has been in a pile of shit + for a long time now, but no one realizes that fact. the media doesn't cover + very many trials like they did with the oj simpson trial. + + "quick! where are those damn menedez kids?" -- cnn + ==================================================== + + speaking of the news media. i feel bad for the television stations, + in a way. cnn totally rearranged their daily scheduale to air the trial in + its entirety. granted, cnn gained alot of ratings because of the trial, but + now what? most tv-news stations have 'expert legal analysists', specifically + for the trial. i turn on espn, of all stations, and see that they even have + a legal expert. (granted; i know oj is a big sports star, and that espn + should have covered it like they did, but a espn trial analyst? not + something i'd be proud of on my resume.) + + we live in a society where all we like to see is other people's + misery. if i was judge lance ito, i would have never even let the cameras in + the courtroom in the first place. thats what killed the whole trial. for + christ's sake, that was a trial that could decide the future for oj simpson. + had he been found guilty, he would be in prison. we, as a country, went too + far in the whole thing. + + t-shirts, bumperstickers, songs, courtroom tv analysts -- everything + was imaginable with this trial. it just went too damn far. we never should + have let the cameras in, in the first place. + + just to show you how big this trial actually was, here's an example. + in my school, we have a cable system, in which we have a small news show in + the morning with the daily announcments, instead of reading them over the pa + system. (before that comes on; we also air "channel one", a news program + specifically for schools. some of you reading this may be familar with it.) + + anyway; + + at one o'clock, when the verdict was to be read, the school thought + it would appease the students, and play a radio broadcast of the trial via + the television system. the period which i would be in at one o'clock, + happened to be history. i had a big test that period, which i was quite + anxious to get at. + + at the beginning of class, my teacher says that he won't be turning + on the tv because of the test. kids respond with the usual jeers to him, + saying stuff like, "but c'mon! we have to watch it! this is history in the + making, man!" i was fine with it, i personally didn't really care to listen + to the verdict. i would be content with finding out the verdict fifteen + minutes later, after i take my test. + + but no, the kids keep yelling, "we want to see the verdict!" i was + real pissed off, their yelling and childish bickering, was taking away the + precious time that i needed to take my test. to top it all off, one kid in + my class says, "we need to watch the trial. i have $250 riding on the + descion!" + + wait a sec; so lemme get this straight. you're betting, whether or + not a normal, innocent human being, is guilty of murdering two people? + you're betting on wheter he will be going to jail for the rest of his life, + or not? that's insane. i'm sure you also hang around the county courthouse + betting on the drunk driver sentences, too. asshole. + + thats one thing that pissed me off the most. + + anyway, bickering ends, i take my test, the teacher caves in and puts + the tv on for a few minutes, and lets us hear the verdict. i almost don't + finish because of all their bickering after the verdict is announced. + fucking assholes don't let me concentrate. + + the oj trial was a mockery, yes; the oj trial taught us a lesson, yes + and no. it did show us how bad our judicial system can be, it also showed us + how bad the media can be, but did we learn from that? nope. next big name + trial, let's see if we don't do to them, what we did with oj. + + [------] + + oh; in case you wonder, did oj _really_ do it? nope. i don't think + so. fred goldman did it, i'm sure. + + ============================================================================ + + -+ nato and the serbs +- + -+ written by superdave +- + + this one is a wee bit out of date. i originally got it sometime in + early september, but its written really well, i just can't let it go to + waste. thanks to superdave for an excellent article. + + [------] + + if you haven't been living in a cave, or the ansi scene for the past + year or so, you'd know about the contraversy over in europe. if you have + been living in a show, here's a little summary of the current events. just + behind the boot of italy there is a country called bosnia. it's capital, + sarajevo, was attacked and conqured by rebel serb forces -- about a year + or two ago. as usual the united nations stepped in to help the people of + bosnia (this is, of course, after the killings and the famine had come to + the eyes of the world). as pictures of injured and decapatated people came + into the news and everyday paper, people were outraged. of course the french + had to strike off thier jobs, and the united states had to insist of + helping. + + until about three weeks ago, the entire un involvement in bosnia was + a peaceful effort to supply bosnian citizens with food, water, aid and + shelter. there had been a few isolated incidents where rebel serbs had + attacked, and blocked access to un trucks and personal. since the early + pictures and stories that we have recieved from bosnia, there have been + countless shellings of the capitol, sarajevo. the most recient + attact/shelling was an open air market in down town sarajevo. this barbaric + and random act of violence forced the united nations to launch what the + world has pleaded for since the begining. nato air strikes. the command was + sent down to protect the people of bosnia, protect the un safe zones, and to + send a message that the rest of the world is not a paper tiger (in other + words, empty threats -- like the united states prior to wwii). the strikes + were also to a certian form of "punnishment" as a united nations rep told + reporters, for the shelling of sarajevo. + + royal air force harrier fighters left their base in gioia del colle, + italy, and abord the uss roseavelt around the 1st. thier mission was to + take out key serb military buildings, and supply houses (much like the + bombings of baghdad). many targets such as ammunition supply houses, + surface to air missle sites, and "heavy artillery" were destroyed in the + first string of attacks. the attacks were declaired as a victory, but for + who? the citizens of bosnia? the united nations? the world's concie(sp)? + + unfortanuately, like life, something went wrong. a french fighter + was shot down by a shoulder launched, heat seaking missile. i read an + article saying that a farmer with an old natzi pistol witnessed the plane + crash, and captured the french pilot. as his story goes, 5 minutes later an + armored jeep belonging to the serb army came down in search of the downed + pilots. the farmer handed them over, and hasn't heard anything since. the + rebel serbs have not disclosed their knowledge about the two missing pilots, + but the have encriminating remarks, sticking the united nation's with a + tough decision (and of course, the french outraged :). + + the un set a deadline for the troops and heavy equipment covering the + perimiter of sarajevo's "safe zone" to move. on the 5th of september, that + deadline had expired, and the air strikes were renewed. the losses to the + rebel serbs was aparently too great, so they moved some of their 300 + artillery pieces, tanks and other heavy weapons more than 12« miles outside + of sarajevo. what they moved was far short of all their heavy artillery. + this was considered noncompliance, so their punnishment was more airstrikes. + in reply to this, a bosnian serb general military commander said, "no one, + not even myself has the right to order the withdrawal. this is... not in the + jurisdiction of generals." needless to say, they're pissed. + + this is where we are. this situation resembles much of the battle + over palstien, where the serbs are the arabs returning to their holy land. + is history doomed to repeat it's self here? will the united nations decide + it's their buissness to deploy ground troops, and wipe out the rebel serbs? + what does the ec doing to help? what will become of this lavish area just + inside of europe? + + that's enough intelectual stimulation for today. :) + + ============================================================================ + + -+ hey adults!@ +- + -+ from edi's log file +- + + jesus, i'm just going log file happy today: + + ÖÄÄÄÄÄ¿ ÄÒÄÄÄÄ¿ Ò Â Ò ÖÄÄÒÄÄ¿ ÖÄÄÄÄÄ¿ + º ³ º ³ º ³ º º º + ÇÄÄÄÄÄ´ º ³ º ³ º º ÓÄÄÄÄÄ¿ + º ³ º ³ º ³ º º ³ + Ð Á ÄÐÄÄÄÄÙ ÓÄÄÄÄÄÙ ÐÄÄÄÄÄÙ Ð ÓÄÄÄÄÄÙ + + + STOP BY AND SAY HELLO TO LINDA OUR NEW CO-SYSOP + + + SHE IS HOSTING OUR TALK DIRTY TO ME CONFERENCE #69 + + + PLEASE MAKE HER FEEL AT HOME. SHE IS FAIRLY NEW TO THE AREA, + + AS WELL AS BBSING. I THINK YOU WILL FIND HER STORIES HOT!!!! + + ÒÄÄ¿ ÖÄÄ¿ ÄÂÄ ÖÄÄ¿ Ò Â Ò + ÇÄ º ³ ³ º ³ ÓÄÄ´ º + ÐÄÄÙ Ð Á ÓÄÙ ÓÄÄÙ ÓÄÄÙ o + + ============================================================================ + + -+ warez the paper jonas edi? +- + -+ answered by edicius +- + + well. i'm putting off releasing jonas as a paper 'zine for alittle + bit, probably untill early '96. 'why?' you ask, read on silly wanker honky + boy. + + the reason is simple. for once, in a few years, i am getting good + grades in school. i'm actually working hard, joining clubs and stuff, and + studying. i've got more 95's and 100's in the first 3 weeks of school, then + i got all of last year. with all of the clubs i'm doing, too, my weekday + scheduale is pretty packed. any 3 days a week i'm staying after school for + various stuff. i'm actually partcipating in school activities. + + another reason, you want? well, i also have a lack of funds. in + december i turn 16. then, i will get a job, earn some money, and have + enough financial backing to get the neccasary stuff for the 'zine, and i + will also be settled into enough of a routine at school, that i can work on + jonas more. + + see, silly? answer your question? + + ============================================================================ + + -+ celebrity stalking for fame and fortune +- + -+ written by edicius +- + + so, you wanna be a stalker? you can stalk anyone, but you won't get + the real fame until you stalk the celebrities. no one cares if you stalk + your 16 year old ex-girlfriend. nope-nope. you need to stalker someone + famous. celebrity stalkers get all the chicks. here's a simple step by step + guide to celebrity stalking: + + o. step one: find you victim. don't pick someone at random, you need a + reason to pick this person. pick someone in power, someone that can + easily influence other people, if need be. musicians and people in + government are both real good places to start. + + you can either pick someone you really like or someone you really hate. + it doesn't matter, stalkers pick both. just remember; pick someone big, + someone powerful. + + o. send them mail. lots of it. in the electronic age, this is easier then + ever, with more people having email addresses. send them lots of it. + get a script, and send them hundreds of pieces of mail an hour. if you + can, time it so they won't find out about it for a few days, that way + they have alot of mail to delete. if they're on compuserve, they have to + pay for all the mail they recieve after a set amount. haha. paying for + their own harassment. + + if you're going to send regular mail, write lots of it. make photocopies + of really gross and disgusting pictures. send them so much mail. you + will have to pay for postage, but so what? its in the name of being a + stalker, its all worth it. + + now: here's some addresses to help you out: + + courtney love trent reznor + 171 lake washington blvd east 10050 cielo drive + seattle, wa 98112 los angeles, ca + + 70277.2502@compuserve.com rush limbaugh + 71511.460@compuserve.com ross perot + 73136.3232@compuserve.com roger ebert (the fat one) + 76326.126@compuserve.com pat buchanan + mmbstn@aol.com mighty mighty bosstones + Bosstone10@aol.com dickey barret (mmb) + gregg@badreligion.com bad religion (not sure about this one) + Weezer999@aol.com weezer!@( + LesClPool@aol.com Les Claypool (Primus) + Lerlelonde@aol.com Ler, the bastard (Primus) + billg@microsoft.com billy g money gates + + (i got these from a variety of sources. thanks to them all :>) + + o. now, find out where they live. in some cases, this is easier then + others. if you live in new york city, you're in the vincinity of + mega-stars. just go and walk around, you're bound to see some, then + follow them home. easy, eh? (i know where madonna lives, ner ner.) + + if you live in kentucky, well, you're out of luck. no one really stalks + country music stars. :> but don't give up! think airline tickets, + train tickets, station wagon road trip! + + now, you go to their house, and repetedly, three to eight times a week, + break into their house. if they're not there, steal their stuff. you + can make quite a hefty profit hauking their stuff on the corner to + whinos. steal undergarments, there alot of perverse people out there that + are always looking for them, thus, a bigger profit. make a mess, piss on + the way, make sure they know you were there, and make sure they know that + its the same person breaking in to their house time after time. + + if they are home, well, go to the next step. + + o. kill them. yes, thats right, kill them. but not before torturing and + raping them beforehand. make them do weird things; for the musician, + have them release a cd in your honor. have all the procedes from the cd + go to you, and you only. no money-grubing managers here, eh-yup. + + make sure you kidnap them first tho, and make sure you leave alot of + ransom notes, each pointing in a different direction, as far as clues go. + make demands for awkward things. in the first note, you demand that all + south amazonian river monkies be freed from oppression. second note, + demand a monkey fur hat. let you mind flow on this one. + + make sure the method in which you kill them in really bizarre. shot + them. not with a gun, fire shoulder-propelled rockets at them. make a + big X in their stomach, and aim for that. odds are, no matter where you + hit them, there won't be much left over. + + after you kill them, dice them up in 'bite-sized' bits, and hauk them to + whinos on the corner. if bras and underware fetch a good bit of lettuce, + then imagine what the _actual celebrity_ will get. good, eh? + + [------] + + if you followed these steps, you're guarenteed fame from the media + (like they would let something like this slip by), fortune after you write + your book and after you sell the movie rights, and a very promising life + behind bars. + + =========================================================================== + + -+ aRE eWE a pUNX? +- + -+ from the capture files of edicius +- + + green day has a new album, insomnia, coming out. eeck. more stuff + for those big time radio stations to play. (that song, _geek stink breath_, + or whatever, sounds alot like everything on dookie -- sucky.) + + speaking of green day, i found this one on a local mbbs board. + + Ok, here's the info for Green Day... + + Real Name: Tre Cool Sex: M Age: 18 + Aliases: Billie Joe, Mike + City/State: nj + Voice Phone#: unlisted + Physical Description: earings, chains, green hair(dyed), your average punk + Comp. Phone#: unlisted Online Service: none + Favorite Movie: american graffiti Favorite TV Show: mtv + Favorite Music: punk rock Instrument Played: drums, guitar + Favorite Foods: green eggs + Favorite Sport: moshing + Other Hobbies/Interests: playing the drums, fiddlin on the ol guitar + General Info: kicking ass on the drums like tre + green day rules + Summary: im a punk, are you + + ahahahaahah. my insides are hurting. + + ============================================================================ + + -+ edi's tdd calls +- + + there's a service, its supposed to be used by the deaf. its the tdd + relay service. the normal user of it calls it via a special fone with a + keypad, and a screen, and thats how they place the call. funny thing is, + with a modem initialized down to 1200, you, yes YOU, can call this service + and make many calls with it. + + by law; whatever you say, the operator must say to the party at the + other end; no matter how vulgur or repulsive it is. i've done some pretty + interesting stuff with it. whatever the operator says back to you, is what + the other party says to you, and boy, they can be fun. oh, a bunch of + times, you won't get charged for the phone calls. you call an 800#, and all + of the states have a different #. when i've called places long distance, via + new jersey's (my states) #, i get billed; when i've dialed numbers in + michagan or oregon, i don't get billed. shrug. + + anyway, here's a little transcript from a few pranks that i was + doing, all in one call to the operator, and she didn't mind. just a few + sidenotes: + + ga: go ahead, you use that after you finish what you're saying. + sksk: good bye. + q: question mark; most tdd fones don't have a ? key. + + (also, i got the idea of using the tdd fones, and this prank call, + from the 'zine, phone losers of america. thanks rbcp. :> ) + + + oper: ca 1043 (f), another call q + + edi: ga surely, pls call 291 7474. thanks. ga. + + oper: sure thank you... dialing... RINGING 1... (answered) Mcdonalds (f) . + + edi: ga hello. i'd like to order some mcfood for mcdelivery. ga. + + oper: yes ..ga.. + + edi: you still mcdeliver right qq ga. + + (click)(silence) (hungup) (hung up) + + oper: ca 1043 (f), another call q ga + + edi: just hold on moment. i'm sorry about that ma'am, i just want to say, + you're the most chipper operator i've had so far. ga. + + oper: thank you is there another call for you q ga + + edi: ok, pls dial 671 0925. ga. + + oper: thank you... dialing... RINGING 1... (answered)Middletown + Mcdonalds..(m) ga + + edi: hello sir. i'd like to mcorder some mcfood for mcdelivery. i have your + mcad right here and it says perfectly in black and mcwhite that you deliver. + ga. + + oper: ..we are closed.. thats it! we are not open right now and we don't + deliver okay! thank you sksk (hung up) ca 1043 (f), another call q ga + + edi: geez, these mcdonalds people really dont like us very well. sigh, it was + gonna be funny too. :P thanks ma'am, thats all. ga. + + oper: sure you are welcome goodnight sksk thank you for using rc, bye sksk + + see? see how fun that was? i got those mcdonalds people piss off at + me. h0h0. what? you don't like it? ok, i admit, that was semi-lame. but + hey, i got a chuckle out of doing it. :) not to mention, that operator was + pretty cool. + + ============================================================================ + + + -+ ta ta, farewell my sweetheart +- + + thats it, its over, get out of here, get out, get out, get out. + + next issue will be better, i promise. i'm not saying that this issue + wasn't good, but it will be better, trust me. give me your feedback on it + and stuff, and i'll talk to you later, fucknut. + + remember, new smashing pumpkins album will be out october 24th. + yee-haw. + + ============================================================================ + + jonas e'zine issue twelve + all mail regarding jonas shall be sent to belial@raven.cybercomm.net + thanks to all my friends who've helped me out, i love you all. + get the latest jonas and text files at avalon, (908) 739/4274. + + "jonas -- its more then a 'zine, its a lifestyle." + + ============================================================================ + + diff --git a/textfiles.com/magazines/JONAS/jonas_13.sur b/textfiles.com/magazines/JONAS/jonas_13.sur new file mode 100644 index 00000000..3ee3506f --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_13.sur @@ -0,0 +1,148 @@ + + ßÜÜ + ÞÝßßßßÛßÜß߲߲ßßÜ ß²ßß߲߲ßßÜ ²ß߲߲ÜÜ ßß²ß߲߲ßß² + ܲÜÜ²Ü ² ÞÝÞÝ ² ² ÞÝ ² ² ² ÞÝ ²Üܲ ² ß² ² ² ßßßß + ßÛÛ Ý Û Û Û ² ² ² Û ² ² ² ÜÜÜÜܲ ² ßßßßß²ßß² + ÞÛ ² Û Û ² ² ² ² Û ² ² ² ² ² ² ² ²ßß² ² ² + Û ² ² Û Û ² ² Û Û ² ² ² ² ² ² ² ² ² ² ² + Û ÜÛÝÜÜþ ²ßÜ ²Ü ² ² Ü²Ý ² ² ² ÞÝ ² ² ² ² ² ² ² ² + ßÛß þß Ü Ü ßßßßß ßßßß ßßßß ßßßßßßßßßß ßßßßßßßßß + + +--- -- - ---+ jonas' first annual best of the year awards!@ +--- - -- ---+ + + here is a survey for everyone to fill out. it's our first annual best + of the year awards, for the year, duh, 1995. it mainly concerns itself with + music, but it does go into some other categories. you get the jist of it. + + after you're through filling it out, rename it .sur, and send it to me via a way listed in jonas_13.nfo. + + thanks alot!@ + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + (fill in information in space provided) + + handle: [..................................................................] + real name: [...............................................................] + age: [...] + email address (if any): [..................................................] + how did you like jonas issue 13? [.........................................] + what is the code for 30 men in contra? [...................................] + do you want some potassium? [..............................................] + + (mark an X in the brackets for selection. one selection per topic, unless + otherwise noted.) + + topic one: best band/album of 1995.. . + + [ ] silverchair, frogstomp + [ ] rem, monster + [ ] sonic youth, washing machine + [ ] pavement, wowee zowie + [ ] green day, insomniac + [ ] red hot chili pepers, one hot minute + [ ] primus, tales from the punchbowl + [ ] alanis morrissette, jagged little pill + [ ] other: [...............................................................] + + topic two: best new band/musician of 1995.. . + + (these may not neccassarly be new bands. my 'new' means bands that made it + big, or semi-big. you get my jist. some of these bands may have released + smaller indie/ep's in the past.) + + [ ] alanis morrissette, jagged little pill + [ ] silverchair, frogstomp + [ ] civ, set your goals + [ ] presidents of the united states of america, self titled + [ ] hum, you'd prefer an astronaut + [ ] other: [...............................................................] + + best single of 1995.. . + + [ ] alanis morrissette, you oughta know + [ ] presidents of the united states of america, lump + [ ] pavement, father to a sister of thought + [ ] silverchair, tommorow + [ ] primus, wynonna's big brown beaver + [ ] civ, can't wait one minute more + [ ] hootie and the blowfish, only wanna be with you + [ ] other: [...............................................................] + + best indie release of 1995.. . + + [ ] pavement, wowee zowie + [ ] 1000 mona lisas, the ep + [ ] civ, set your goals + [ ] presidents of the united states of america, self titled + [ ] dance hall crashers, lockjaw + [ ] other: [...............................................................] + + best punk/hardcore album of 1995.. . + + [ ] civ, set your goals + [ ] rancid, out come the wolves + [ ] green day, insomniac + [ ] 1000 mona lisas, the ep + [ ] other: [...............................................................] + + best tour of 1995.. . + + [ ] the warped tour + [ ] lollapalloza + [ ] live + [ ] hootie and the blowfish + [ ] rem + [ ] van hallen + + best movie of 1995.. . + + [ ] pulp fiction + [ ] mallrats + [ ] apollo 13 + [ ] hackers + [ ] seven + [ ] the net + [ ] other: [...............................................................] + + best radio station of 1995.. . + + (please give call letters, frequency, city that it is broadcasting from. + (eg; whtg/106.3/eatontown, nj)) + + [..........................................................................] + + who will be president in 1996? + + [ ] bill clinton + [ ] bob dole + [ ] other: (serious answers, only. :>) [..................................] + + computer based zine of 1995.. (don't answer if you don't read many computer + 'zines.. :)) + + [ ] doomed to obscurity + [ ] pEz monthly + [ ] hogs of entropy + [ ] jonas + [ ] fucked up college kids + [ ] klunk + [ ] gasp!@/1 + [ ] other: [...............................................................] + + paper magizine of 1995.. . + + [ ] 2600: the hacker's quarterly + [ ] hitch + [ ] all that + [ ] the 'net + [ ] rolling stone + [ ] wired + [ ] spin + [ ] other: [...............................................................] + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + + diff --git a/textfiles.com/magazines/JONAS/jonas_13.txt b/textfiles.com/magazines/JONAS/jonas_13.txt new file mode 100644 index 00000000..876de0ed --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_13.txt @@ -0,0 +1,858 @@ + + _____ __________ __________ + __________/ /_________/ /_________/ /___ + _____ / / / / / / /_________ + / / / / / / /____/ /____ / + / / / / / / / / / / + / / / / / / / / / / / + /_________/ / /____/ / / /_________/ + /_________/ gh /____/_________/ + + j o n a s : r e i n c a r n a t i o n + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + jonas - issue dirteen - november 13, 1995 + jonas is produced roughly monthly by edicius. jonas and the materials + contained therein, are all copyrighted by edicius, too. jonas may + be distributed freely as long as this copyright notice remains + in place, so don't move it, bucko! + + if you have no idea, change your religion. + if you have a religion, change your idea. + one thousand mona lisas % "green light" + + +---- --- -- - -----------+ edicius' editorial +------------- - -- --- ----+ + + in memory: yitzhak rabin, shannon hoon. + + hey-ho. i'm so big, i'm so cool, i'm just so fuckin' elite. "hey + man, you got the garbage file?!1 thats ELiTE!@1" anyhoo; i have a question + for you. + + since when did halloween become the most exploited holiday in the + history of mankind? all of a sudden, it seems that all of the rules of + halloween have been thrown out. the ethics of this hallowed day that i grew + up with as a kid, have been thrown out the window. + + let's go back to a different time. (cue wavy lines on your monitor + right now.) a few years ago, i was younger, you were younger. i lived in a + different town, not far away from where i live now. i was walking around + town, trudging a wet pillowcase filled with candy. my "jason" hockey mask + flung over my head. i was tired, wet, yet happy. + + they were simpler times. kids dressed up in creative constumes (hey, + don't knock "jason", its creative, read on..), getting candy, seldom seeing + a decorated house. it was all good, it was simple back then. + + suddenly, things changed. it didn't happen over a few years, you + didn't see it here, and then there, and then everywhere. it just happened. + maybe its because i'm older, and i notice more things now, but other people + have noticed it, too. it's not just me. + + suddenly, people are decorating their houses. sure, people did that + in the past for halloween, maybe a pumpkin and some corn stalks, but now, + people put ten tombstones, these big ass sheets that they call 'ghosts', + and a whole lot of other stuff. stores are making big bussiness off of it, + too. no more of this thanksgiving then christmas crud. now its halloween, + thanksgiving, and then christmas. they'll just extend it more, soon labor + day will be mass marketed and exploited, too. + + also, another thing that peeves me about the whole halloween dealy + deal, is that since when do kids get by without dressing up? i admit, it + gets annoying giving out candy and all, but then i think back a few years, + and remember how much fun it was to get the candy, thank the person, and + scamper off to the next house. + + something different is happening now. i notice that _alot_ of kids + that i go to school with, like high school sophomores, juniors, and seniors, + are going out trick or treating. i had one kid come to my house, regular + clothes, paper bag, must have been 16 or 17. my mom gave him candy, and + asked him what he was, he said "i'm an undercover fbi agent." dickhead. + + why don't kids dress up anymore? i see kids that are like 8 going out + in regular clothes, without dressing up. i've lost all faith in major + holidays now; they've exploited christmas, easter, and thankgiving. saint + nick, the easter bunny, and the turkey, yest we add the great pumpkin to + this list? i think not. + + STOP EXPLOITING ALL THE HOLIDAYS. LEAVE SOME FUN IN THEM FOR KIDS + STILL. DOWN WITH THE ARISTOCRATS WHO DAMAGE OUR HOLIDAYS. BAD BAD. + + wee-haw. that was fun. now, if you excuse me, i'll be gettin' my + prozac pills. now, for some news. + + this issue of jonas will be alittle longer then most previous issues. + i've done some capturing of messages that i've found, and typed up some + interesting newspaper articles. overall, its just longer. + + also; this issue will be the best issue jonas has ever put out. + "really?!@1", you ask yourself. really. i've done much more work then i + have the previous issues, i've been on a creative streak. i've had some + pretty good ideas for this issue too. i think this issue will redefine the + word "'zine". + + maybe it _won't_ redefine the word "'zine". oh-kay. maybe it won't + redefine anything, but i'm still pleased with how this issue is coming out + _so-far_. (yes, as always, i'm writing this way ahead of time.) + + thats weird. that last comment i put in here. most prior issues of + jonas, i got my articles that were submitted to me, wrote some stuff on my + own, and then put it all together. beginning to end time was maybe a week, + tops. but this issue, its different. i actually started writing this way + ahead of time. right after issue 12 came out, i started work on this. + + i think i like this method, too. i put down all of the different + story ideas in my head, and worked on them seperately. i'm really happy + with how my editorial came out, too. all and all, i'm really pleased with + this issue. except for one thing; + + as of _this_ writing of my editorial (note the 'this', i sometimes can + write parts or the whole editorial a bunch of times.) its about 2 weeks + before my target release date, and i have _no_ submissions. terminal + velocity said he would do some stuff, but thats it. i have _nothing_. + everything in here is written by me. ack!@ i should just go elite, and go + solo. yeah, thats an idea. + + (* late editorial note, terminal velocity _didn't_ contribute + anything, asshole *) + + i can change the name of the 'zine to "edicius". i'd be a solo 'zine. + i'd scoff at the non-believers, and just say that i'm leeter then them. + yeah, that'd be rad. i think i will do that. + + "ralph, get the guns. we have a lamer on the loose." + + ok, i get the point. i think i'll be leaving now. + + but before i go, i want to remind you of something that we're doing. + the next issue of jonas shall be out on december 14, yeah, exactly at that + time. there will be a really special issue of jonas that will be put + together, especially for a special person's birthday (hint, hint, nudge + nudge..) so, be waiting, it shall be a really good issue. submit for it, + too! you'll be pleased. + + also, take a few minutes, and fill out the survey. just use a regular + text editor, and fill it out. its not that hard. i'd like to get a real + good sampling of people for this survey, i want a really good survey result + article to write. so fill them out, fuckas! + + one last thing, i swear. if you're hep to the net and looking for the + ultimate in 'zine madness, point your web browsers to 'zineworld, the + ultimate experience - http://www.pla-net.net/~jwapienn/zineworld/ - got + that? you better. thanks to mercuri, this page lists an amazing and + growing number of links and web papges for many underground computer 'zines. + WE LOVE MERCURI! + + ok, thanks enough for now. + buhbye. + + xoxo + elite edi. + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + oh yeah, if you want to reach us here at jonas-land. here: + + world head quarter type board -- avalon, (908) 739 4274. check out + elyte jonas matrix option. + + email -- edi@raven.cybercomm.net + + web page -- http://www.vitinc.com/~rmini/jonas.html + (thanks to fat slayer. send inquiries to rmini@vitinc.com) + + you can also retreve the latest issues of jonas via ftp -- + ftp.etext.org /pub/Zines/Jonas + + more information about jonas can be found by fingering edicius.. (o0o, + you nasty boy).. -- finger edi@raven.cybercomm.net + + +-- - --+ + + AT&T AND MICROSOFT HEAR ME WALKING DOWN THE STREET WITH MY LINEMAN'S + HANDSET AND BETA VERSIONS OF WIN97, AND SAY TO THEMSELVES "DAMN HE'S FUCKIN' + ELiTE!@1" + + + +---- --- -- - ------+ open letter to michael stipe +-------- - -- --- ----+ + + dear mister stipe and rem: + + i am petitioning you and your band to change your lyrics. in one your + songs, "end of the world (and i feel fine)", you have a line that reads as + follows: + + "the other night i tripped a nice continental drift divide, mount saint + edelite, leonard bernstine" + + i am asking that you change the lyric to read: + + "the other night i tripped a nice continental drift divide, mount saint + EDICIUS, leonard bernstine" + + edelite? who's heard of 'mount saint edelite'? who's heard of 'mount + said edicius', for that matter. no one, really. but edicius, its the same + amount of letters and sounds like 'edelite'. the word edicius is ten times + cooler then the word edelite, too. you won't have to change _that_ much, + just one word. consider it. + + thank you for your time. i'm sure that you and rem will follow + through with this lyric change, for the better of mankind. + + edicius. + + +---- --- -- - ---+ i sold my soul to satan + by edicius +--- - -- --- ----+ + + "i've got a one-way ticket to hell on an amtrack train; and the sons + of gestapo won't be stopping me!@" -- edicius + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + "tom. wake up tom. come towards the light," the deep voice + beckons me in the nighttime. + + startled, i jump out of bed. the big lcd clock stares me in the face, + "two in the morning? who the hell is this?" i turn around, and see a mist + in the room. a ghoulish figure is standing near my closest. + + "hey, who the hell are you?", i ask. + + "me? well, i'm satan. i have a proposition for you," he replies, "i + would like you to join me." + + "join you? how?" + + "sell your soul to me, i will grant you immortality in hell." + + "really? that sounds good, how much?" + + "WHAT? he's actually going for it? no one actually goes for it," he + mumbles to himself, "uwhm. lemme think, how much would it cost you to sell + your soul to me?" + + "hm. lemme write down a figure, we'll play it from there." i grab a + piece of paper from the desk, and scribble down some numbers. i hand it to + the man, and by the smile on satan's face, i can tell its no dice. + + "six million dollars? this is properous. what do you think we do in + hell? we don't have that much money. geezus, who do you think i am?" + + "well, you're satan. ok, so no deal there, eh? lesse, here's another + figure. tell me how this looks." with that, i scribble another number down + on the paper, tear it off, and give it to him. + + "eighty-two cents? you're gonna sell your soul to me for eighty-two + cents?" + + "eh-yup. hey, everlasting immortality is something that only comes + along once in a lifetime, i'm not gonna be that stingy in trying to get it. + + "eighty-two fuckin' cents. wow. tom, you have a deal. welcome to + hell." + + "cool. okey, so, when do i get there?" + + "well, lemme look here," he grabs a notebook from his jacket, + "salvidor, sinclare, stevens, ah, here it is, sullivan, tom sullivna. ok, + you should be arriving into the firey pits of hell in twelve years. from + lung cancer, you'll be smoking too much. haha. i just made a hell joke! + haha. get it? smoke, fire, hell! haha." + + "wow," i say to him, "not only are you the demon of demons, but you + have a sense of humor too. pretty nifty, if you ask me." + + "well, you know, i try to be modest, but when you're the supreme ruler + of evil, you have to have some funny side in you." + + "hah. i hear you buddy, i hear you. ok, so tell me, when's the + presidental elections down there?" + + "what? presidental elections? what the hell is this rubbish? i'm + the dictator, there is no president down in hell. i'm the leader." + + "eech. that must suck. hey, here's an idea. when i get down there, + give me four years to run it, i promise you a bigger population, and more + money coming into the budget. hell will be the hep place to be." + + "really? a four year vacation? i never really thought about.. wait a + second, what the hell are you saying to me, the ruler of evil? i'm the + leader down there, you cannot take that away from me." + + "thats the problem, you're uptight. you have this whole + god-complex.." + + "god complex? sorry to interupt, but there is no god in hell." + + "uhm, sure, whatever. anyway; you have this whole ego thing. you're + uptight. you need some time off. no offense or anything, but people don't + think too highly of you." + + "really? i never knew that," satan says. his face grows deeper, and + looks to be saddened by this news. "i've always tried to keep my image + pretty good. i don't really know how this whole horns and red skin thing + came about, i'm not really that horrid looking, am i?" + + "no you're not, satan. we could have this whole big never-world going + down in hell, trust me. you and me, we'll do good." + + "really? hey, that could be good. wait a fucking second, you're sly + there tom. but i'm not buying into this. i'll come back at a later time." + + "but satan, wait!" but it was too late, he had already left. back to + sleep i went, still amazed about the transaction that took place. + + +-- - --+ + + the next few days were spent thining up ideas for the "new hell", that + i would create. since satan is the root of all evil, i really knew i had to + do a good job, or something horrid would be in store for me. i really + didn't want to find out exactly what would happen. + + i had ideas, visions of the new hell. something beautiful, something + that has been never seen before. swimming pools, casinos, hotels, family + entertainment. it all would be there. hell would surely become the hip + place to be. + + it happened again. right in the middle of my wet dream, satan + appeared to me. his vast, expressionless face staring at me in the middle + of the night. + + "tom, what do you wish of me? i can sense your mood, i know you need + to speak to me." + + "ok. i have these ideas, take a look at them. remember, its + still a rough draft, but take the things into consideration," i said, as i + took out a large portfolio of various plans, blueprints, and charts. "look + at them, tell me what needs to be changed, and i'll work on it." + + "what?? what is this crud? blueprints, charts.. hey, is there really + going to be a eight-teen hole golf course next to the tropworld casino? + hey, that could be pretty nice. i've been looking for a place to work on my + backswing." + + "but thats not all. i was planning on changing a few more things. + first off, we need to have a stable currency. we're not looking to compete + with the us dollar, or the japanese yen, just something that we can use. we + will be having a large population now, ya'know what i mean?" + + "true, very true." + + "but wait, thats not all. we'll have a full run of commenrative + stamps -- all the people in hell, joseph stallin, adolf hitler, jimmy buffet + -- a better postal system too, a recent survey showed that alot of the + population of hell was dissatisfied with the way the postal service was.." + + "dissatisfied my ass. give me names, i'll make their eternal + damnation even worse." + + "no! thats another thing we need to change; your attitude. many + people, well, you know. they're kinda scared of you." + + "they're supposed to fear me (not that pesky mogel guy.) i am the + death bearer, i'm not a real people person. i am eviler then evil. i'm not + supposed to be nice." + + "well, it looks like your attitude will be hard to change. i'll work + on that more later. i called all-state today, inquiring about an insurance + policy.." + + "insurance? why do we need insurance?" + + "with people coming, we need some type of tourist spot insurance + coverage, so when people get hurt, we don't get sued." + + "fuck them. cast them into the firery pits if they get hurt." + + "thats the thing that is hampering the whole insurance dealy-deal; the + fire. you know, hell is just one _huge_ firepit. did you ever notice it? + all-state said they can't insure a bad fire risk as ourselves. so, i told + them i'd start a few voulenter fire departments, have fire safety classes at + the ymca, and mcgruff and smokey the bear put on a really bitchin' + performance for the kids." + + "fire department? ymca? smokey the bear? enough of this bullshit, + tom. i do not want to hear this crud any much longer. you are banished + from hell!@ do not come down here! get out of my sight!@" + + "but satan.. what about me being president?" + + "get out of my sight you creaton!" + + "can i have my soul back?" + + "oh. that thing. yes, you can have it back.. here.. and my money?" + + "oh. that. i kinda spent it on gum. want a stick of big red?" + + "no! just take your soul, thats all i want. i don't need money. i + am the leader of hell!@ i make my own money." + + "well. ok, in that case, i don't want to go to hell, you asshole." + + "me? asshole? why you annoying little twirt," he says with a voice + full of anger. he runs, and lunged toward me. i duck, he hits the wall. + "pit pat spat. why you fucking asshole.." boom. he hits me square in the + jaw. so, i kick him. + + "don't fuck with me nigguh! i'll beat you; and i don't care if you + are the prince of darkness." i hit him again. he hits me. this escapade + continues for 5 minutes. we cease hitting each other while we catch our + breathe. + + i stand up in the middle of the room. "is that all you can do?! + the big and almighty satan can't even kick a fifteen year-old's ass? what + are you? like, a ga-zillion years old? HIT ME RIGHT HERE," i pound on my + chest, "right here you fuckin' asshole. NOW!" + + fists a-flyin', satan runs towards me screaming, "aaaahhh!@ you + little prick!" + + just before he is about to catch me, i knee him in the groin. he + falls to the ground in agony. "oouh. muh. muh.. ouuch. oww. muh nuts. + oww. yoou.. f-fuck.. in.. oww. oouuch. oww, my crotch. my crotch. my + crotch is on fire." + + "yeah, thats what i thought. hooo-pbbt," i spit on him. "some people + are just so fuckin' egotistical. you won't let someone else take over for + awhile, and look what you're doing now. on the ground, rolling around, in + wretched agony. you wuss." + + "vengence will be mine. oh yes, it will be mine." puff. smoke, he + disappears. a dark drool spot is easily noticed against the grainy blue of + the carpet where he fell. + + "a drool spot. just one big fucking drool spot is left." + + +---- ----- - -------+ music, smhusic + by edicius +-------- - -- --- ----+ + + is it just me, or is there a major conspiracy to ruin all of the good + music in the world? + + i think there is, if not, somethings tragically screwed up. now, one + of my favorite bands, currently, is civ. i got their 'debut' (if you want + to call it that) cd just after it came out, and a day after i saw them in + concert. i've loved it ever since, i think its a really rad cd. + + i happen to have a 'zine cover with a picture of civ (the leader + singer of civ - coincidence?) on it. i was bored the other day, so i + started drawing it in my sketchbook. soon enough, i had a pretty good + picture out of it. + + the next day, i was sitting in my art class. i was bored with the + project i was working on, so i whipped out the ole' sketchbook to finish the + picture. some kids asked me who it was, so i told them, "its the lead + singer of the band called 'civ'. ever hear of it?" out of the three or + four kids that i asked if they heard of civ, only one person said "yeah, i + think so, i think i've heard of them." + + god damnit. no one listens to anything if its not played on a big + time radio station, or mtv. civ has been being played on mtv, rarely + outside of 120 minutes, thank god, but today, i'm clicking around the + channels, and i hear a familar tune on the grind. yup. it was "can't wait + one minute more" by civ. these preppy wanna-be skinhead dancers are slam + dancing, almost definally choreographed, too. you could see that they + planned how they would dance to this particular song. + + afterwords, the music dies out, and idalis comes on; "hey, now wasn't + that groovey? thats right. that was civ with 'can't wait'. now, after the + commercials, we'll have a live performance from shaggy!@" + + c'mon, shaggy and civ in the same sentence? sigh. it just saddens + me. why the hell can't mtv leave the good stuff on "120 minutes"? why must + they do this? they do this with every good band, and then they promote the + bad bands, like greenday and offspring. fuckin' assholes. + + to create a format that appeals to all, they must play what 'everyone' + is listening to. or so they think. not everyone is listening to offspring + and green day. thats why radio stations like whtg 106.3 (eatontown, nj), do + good; they play what other stations _aren't_ playing. sure, they do play + some green day and offspring, but not to the extext that many other stations + play it. + + you have a major cable channel, and a million radio stations; all with + the same format -- boring and "alternative". you get a few stations that + play what the "minority" wants to hear -- mainly indie rock and punk, + generally "unheard" music anywhere else. both stations do well, in their + own aspects; they just get a different listening audience. + + +---- --- -- - -+ million man march? % by david letterman +-- - -- --- ----+ + + [.. from the david letterman show ..] + + > from the home office in grand rapids, michigan ... + + top ten signs you're not at the real million man march + + 10. everybody's singing john denver songs + + 9. keynote speaker: mark fuhrman + + 8. entire march consists of you and that urkel guy + + 7. you're surrounded by people dressed as their favorite "star trek" + characters + + 6. everywhere you look -- osmonds + + 5. you seem bumper stickers that say, "don't blame me, i voted for + pat buchanan" + + 4. it's held at the dmv and the "march" is moving very slowly + + 3 lots of handmade signs that say, "yanni!" + + 2. the marge schott t-shirt booth + + 1. grand marshall: kathie lee gifford + + +---- --- -- - --+ computers go hollywood -+- by edicius +-- - -- --- ----+ + + in our history, many movie makers have tried to make a movie revolving + around computer crimes, some have been successful; others have not. the + classics, such as wargames and sneakers, will live forever in the hearts of + computer enthusists around the globe. other movies, such as johnny + mnemonic, can be written off and forgotten. + + in jonas' ever expanding cultural emphasis, we would like to give you + now a review of the best, and worst, computer-related movies ever made. + there have been alot of computer-related movies made, specifically, the ones + we'll concern ourselves with are those that deal with some form of computer + hacking and/or phone phreaking. + + now, without further ado, edicius reviews computer movies. + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + "three days of the condor" (1976?) - robert redford plays an fbi agent on + the run from his own superiors after his whole office is gun downed and + killed while he is at lunch. story-line is pretty good. redford plays a + really good part in the movie. surpurb co-stars, also. + + as far as the computer-relatedness. they have _really_ big computers in the + office. redford 'boxes' his way into a hotel phone line, and uses a tape + recorder and dtmf decoder to figure out numbers a person is dialing. he + also picks a credit slip out of the garbage to figure out what a person's + name is, before he carjacks and kidnaps them. you cannot forget, either, + that at one point, kevin mitnick used the handle "condor" before he went + into hiding in the mid 80's. + + really great movie all around. if you can find it at your local + blockbuster, i would definally suggest renting this movie. + + rating: (out of four stars) ***1/2. + + +-- - --+ + + "wargames" (1982) - matthew broderick, alley shedy, and a "whopper" of a + computer. (te-he. i made a funny.) this is the clasic computer hacker + movie. kid breaks into school computer, changes grades, wardials, finds + governmental computer, and plays a game of "thermonuclear global war." now + is that just rad, or is it rad? + + personally, my favorite part of the movie, is when alley shedy's caracter + says to broderick's caracter, after he has been on the run from the + government, "is this about what you did to my grades?" har har. + + you have hacking and phreaking in this movie. movies just don't get cooler + then this without having an nc-17 rating. + + rating: (out of four stars) **** + + +-- - --+ + + "sneakers" (1989/1990. one of them) - not a particulary bad movie. + hacking, phreaking, carding, trashing, and a blind guy that can type really + fast!@ hell, these guys are _paid_ to hack your computer, if you want them + too. they're the best, dE\x/D. they're eXpERtZ. + + as i alluded to above, the only part in the movie that i was particularly + pissed off about, is the fact that the blind dude can type. ok. i can see + him typing -- they can have brail keyboards -- but how does he know what is + being done by the computer? it just didn't fit. + + if you want a real good flick night, rent this and "wargames" the same + night. watch the clerk look at you funny. + + rating: (out of four stars) *** + + +-- - --+ + + "johnny nmemonic" (1995) - i really don't know where to begin with this + movie. i saw it with fellow cybergeeks, rattle and tut, and well, i think + rattle sums it up best by saying, "it was the best comedy i've seen in + awhile, but it was meant to be a drama." + + let's just say, keanu reeves shouldn't have been casted for this part. if + it was another actor, the movie would have been better. keanu reeves just + cannot act for his life. + + henry rollins got killed in the movie, that was a cool part. :) + + rating: (out of four stars) * + + +-- - --+ + + "the net" (1995) - you have to divide this one up into two different + sections; as far as pure entertainment goes, this movie was pretty damn + good. _any_ movie with sandra bullock in a bikini is good in my book. as + far as computers go, it was a bad movie. i did like some of the things that + they did with the computers, tho. + + bullock is a pretty good actress. the movie, overall, was pretty decent. + storyline wise, it could have used some work, but still was good. accuracy + wise, it needed alot of work with the computers. + + if you can catch this still in the theraters (find a cheap second-run movie + near you), definally go there and watch it. you shalln't be disappointed. + + rating: (out of four stars) *** + + +-- - --+ + + "hackers" (1995) - "boot up or shut up." as far as the accuracy goes, this + is one of the most accurate, if not the most accurate, 'hacker' movie in a + long time. it was still pretty far-fetched in some aspects, others it was + pretty good. some of the computers they had, of course, were too advanced, + even for our own age. + + i've hung out with computer geeks in person, i don't think i've ever said + the word "ELITE" as much as they did in this movie. there is also a scene + in which some 'haqurs' are looking at a new computer, and they say, "whoa, + elite. she has a brand new laptop... 16 megabytes of ram.. a 28 point 8 bps + modem too!" + + they did make up for it by having an actual red box (that still does work in + some areas), and by reading "the hackers manifesto" by 'the mentor'. i was + surprised to see them go that far. + + with everything in, i think this movie will go down as being highly regarded + in the computer movie field as being one of the better movies of our time. + + rating: (out of four stars) ***1/2. + + +-- - --+ + + other stuff: + + "disclosure" (1995) - ok, so this really isn't a true computer movie. the + job that michael douglas and demi moore work at, makes cd-roms and other + computer equipment. plus, the terminals that they use on all the computers + for email and stuff is really rad. i'd love to have that type of software + on my computer. + + oh, seeing demi moore half-naked isn't bad, either. + + rating: (out of four stars) ***1/2. + + "masters of deception: the gang that ruled cyberspace" (1995) - it's a book. + not a fully accurate book, but it is an interesting read. i shelled out 20 + bucks for it, i'm not sure if it was really worth it, but it is worth the + read if you can get it. + + rating: (out of four stars) ** + + +-- - --+ + + i noticed something, something eerie. in "the net", they all drink a + martini-type drink called a "gibson". in "hackers", the name of the big + mainframe operating system, is "gibson". coincidence? maybe. + + +---- --- -- - -------+ 3Di'Z CaPTuRe F1LE izZ eLiTE +------- - -- --- ----+ + + from: "matthew b. wood" + posted to: alt.fan.cult-dead-cow + subject: re: his eyes were bleeding + + carrie@cascade.cascade.net (carrie) writes: + + ... + + >then one day we're driving through the onion fields of walla walla, + >washington, on this road that stretches farther than intestines, past the + >paper mill, and we come across this accident in the road, except it's not + >roadkill it's like humans, and this guy is there, laying on the road, and + >his eyes are bleeding (just like his face and arms) and we look at each + >other, and we grin, and scoop him up into the car, and drive off, kind of + >like thelma and louise except we can't take credit (yet) for any of the + >pain. + + wow. and i thought i was having fun when i got %15 off at foot locker + with one of those coke caps. + + -- + matthew b. wood mbwood@netcom.com + they can't play baseball, they don't wear sweaters + they're not good dancers, they don't play drums + + +-- - --+ + + from: rotiserrie + posted to: alt.sex.stories + subject: adult hot chats + + help needed: + + i am in the process of collecting materials relating to "hot chats" on + bbs's. this material is very important to a final research project i am + undertaking. i would appreciate hearing from any of you who have engaged + in adult "hot chats" on bbs's or on the internet. i especially am + interested in receiving through email transcripts of recorded hot chats + you may have had. complete confidentially of the source is guaranteed. + + jason + + +-- - --+ + + from: sekiried + subject: downtown julie brown + posted to 'people who shouldn't be famous' folder on america on-line. + + i swear to god, if i ever see this woman walking down broadway, i will + kindly ask her to go back to her native england. let's see if they will + take her back, cuz here in america--we are suitably annoyed with her + transparent clinging to the show biz/post-mtv world with a sad vehemence. + get a real job julie! + + +-- - --+ + + from: the-concourse-on-highthu + posted to: alt.fan.cult-dead-cow + subject: wed. oct. 11th is national coming out day come out! do it! life is + easier... + + have courage! life is so much easier when you're out of the closet. i'm + coming out because i went to the l.a. gay & lesbian parade this past summer + and of the more than 700,000 people there i personally counted fewer than 80 + in drag or leather or other outrageous get ups. + + when i turned on the news that night it was like my personal count had made + the news. every single one of those 80 or so people. the broadcast made it + seem like a couple thousand people had shown up, and showing only those in + drag or leather made it seem like that's all that showed up, like that's all + there is to gays and lesbians. the other 700,000 to 800,000 of us who are + boring and average didn't make it onto the tv. + + when you come out you give non-gay people and accurate picture and concept of + who and what gays and lesbians really are. since it's perfectly legal in 44 + states to fire us from our jobs or evict us from our homes just for saying + we're gay or lesbian, coming out is a very difficult thing to do. i know + that, and i have experienced all the fear and anxiety you have. please, + please, please come out!!! life really is so much better now. + + +-- - --+ + + from: tomviolent + subject: yanni + posted to the 'cybersex' folder on america on-line + + ..yanni is the best cyber-lover i've ever had.... + + +---- --- -- - ---------------+ news items +----------------- - -- --- ----+ + + here are a few news articles that i've found in the newspapers that i + thought were pretty interesting. + + +-- - --+ + + concert-goer sues love + + courtney love is being sued by a a man who says she beat him up during + a hole concert in palo alto, calif., last year. jonathan james hogan said + the widow of urt cobain lured him onstage, hinting of a dance, and instead + kicked him in the groin. love told police that he reached under he dress + and grabbed her crotch while she crowdsurfed above her fans. hogan, who + insists that he was out of grope range, says he suffered emotional stress at + being publicly humilated. + + +-- - --+ + + aclu joins high school discord over 'oi' vs. 'oy' + + newark -- three hasbrouck heights high school students who were + suspended from school for using a word some people interpreted as + anti-semitic were reinstated yesterday pending an appeal before the school + board, said david rocah, staff attorney for the american civil liberties + union of new jersey. + + rocah said the suspensions where ilegal and that he was surprised the + school board was continuing to pursue them. + + "there's no doubt in our minds that a violation of the students' + rights, under the federal and state constitution and state law, has + occured," rocah said. + + the school should drop the suspensions, apologize tothe students and + clear their records, roccah said. if neccessary, the school should provide + the students with tutors to help them catch up in courses they missed since + they were suspended last week. + + the three 16-year-old bous -- len longo, j.m. burr, and albert min -- + were suspended from school for a week after performing as the band utter + confusion at a high school talent show last thursday night. + + because the music they play is sometimes call "oi", the three band + members started yelling "oi!" to warm up the crowd. + + some people in the audience complained that "oi" was a play on the + yiddish expression of grief, "oy vey," and was anti-semetic. + + "oi" is a gritty subcurrent of punk rock born in british garages in + the late 1970's. a right-wing sub-cult of "oi" includes german skinhead + bands whose members sing about bashing black people, jews, turks and + leftists. + + rocah said the suspensions where unjustified, especially since the + concert was not a school-sponsored event but was part of an after-school, + student-sponsored talent show. + + "these kids should not have been suspended," said rocah, who is + representing one of the teen-agers, whom he declined to identify. "students + do not lose their free speech rights when they walk through the schoolhouse + door." + + although the students insisted their song was not intended to be + anti-semetic, rocah said that was not the issue. + + "speech by racists is just as protected as speech by nonracists," he + said. + + if school officials did not respond to the teen-agers' concers, the + students and their families could take them to court, rocah said. there was + no indication that would be necessary. + + "the issues here are clear. it's not a difficult case, and it can and + should be resolved amicably," rocah said. + + schools superintendent howard herbert did not immediately return a + telephone message from the associated press yesterday. + + the rabbi of the borough's only synagogue said the school overreacted + and that is actions could encourage an anti-semetic backlash. + + "it is a tempest in a teapot. i think the punishment is definitely + inappropriate," rabbi fredric dworkin of temple beth elohim told the record + of hackensack. "people make too much of an ordinary item. the word has no + significanes," he said. + + dworkin, who said he had received no complaints from temple members, + said a false alamr over racism could spark the real thing. + + [oh the same topic; on "the week in rock" on mtv, for the week of + october 21-27, they had a story about the above situation, and actually had + the band on at the end of the show. 'utter confusion' played the + song "oi is not a crime", now being boosted to stardom by their peers for + appearing on mtv. :) they weren't all that bad, for a group of 16 year + olds.] + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + jonas e'zine issue 13 + send all inquiries regarding jonas to edi@raven.cybercomm.net + jonas and klunk may be found at avalon, (908) 739/4274 + special thanks to belial and terminal velocity for their unending support + + "jonas -- it's more then a 'zine, its a lifestyle.." + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + diff --git a/textfiles.com/magazines/JONAS/jonas_14.txt b/textfiles.com/magazines/JONAS/jonas_14.txt new file mode 100644 index 00000000..15a357e8 --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_14.txt @@ -0,0 +1,1235 @@ + + $ssss$ $ssss$a$ssss$ $ssss$a$ssss$ $ssss$ $ssss$ $ssss$a$ssss$ + $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ + c$ssss$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ssss$ + i$ $ $ $ $ $ $ $ $ $ $ $ $ssss$ $ $ $ $ + d$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ssss$a$ssss$ + i$ $ $ $ $ $ $ $ $ $ $ $ $ssss$a$ $ $ $ + c$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ssss$ $ $ + a$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ + !$ssss$a$ssss$ $ssss$a$ $ $ssss$ $ $ $ $a$ssss$ $ $a$ssss$ + $ssss$ jonas $ssss$ $ssss$ $ssss$ + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + Jonas E'Zine Issue Fourteen -- December xx, 1995 + Jonas is produced semi-regularly by Edicius (Tom Sullivan). Jonas + and the materials therein are property of Edicius and Jonas Print Matter + Incorporated. Jonas may be freely distributed as long as this notice + remains in place, and no fee is charged for it. + + I'm feeling thankful for the small things today, + Happy- Happy Birthday to me, + Happy Birthday to me, and to you. + Cracker -- "Happy Birthday to Me" + + +---- --- -- - -----------+ Edicius' Editorial +------------- - -- --- ----+ + + (Written: December 12-13 1995) + + To start off with, this issue is being dedicated to They Might Be Giants, + Civ, and Jon Vena. TMBG and Civ are just plain out rad, and I would really + like to thank Jon Vena of WHTG-FM for being one of the driving forces behind + one of the best radio stations in the country (WHTG-FM/106.3/Eatontown, NJ), + and for his kind words about Jonas on the air one night. + + To be exact, it was around alittle after 10 PM, the Sunday after I released + Jonas 13. I asked him for a plug on the air, and he said this. (The + beginning notes to Weezer's "Undone-The Sweater Song" begin to play.) He + says, "Ya'know, I was just thinking, the information superhighway, thats + right kids, e-mail. It is taking over the universe. I just recently + recieved an e'zine written by a guy, a local guy from Middletown. His 'zine + is called Jonas. He originally wanted to hear 'My Name Is Jonas' by Weezer, + but I'm going to play this one for him instead, because this was easier to + find. Its the 'Sweater Song-Undone'. Its Weezer at Modern Rock at the + Jersey Shore, FM-106.3." (Yes, I have it on tape. I didn't write that down + from memory, and yes, I just had to type that out and let all of you know + about this tremendous event.) + + Thanks Jon. Now onto the bulk of my editorial.. + + Its Tuesday, and you know what that means, right? Well, don't worry. + Neither do I, but this Tuesday is special. This Tuesday, December 12th, + 1995, is special. Its my birthday. + + Frank Sinatra also celebrated his natal anniversary today, but we don't care + about that. ITS MY BIRTHDAY DAMNIT. + + Time for me to examine the things that I've done the last year. Lets go in + order in a big paragraph. Thats always fun, right kids? + + I failed Literature Honors, got my modem taken away for awhile. I then + recieved a lower phone bill, which pleased my parents and myself, but I soon + became friends with Brian (Terminal Velocity) who totally annihlated my + phone bill to this very day. I pulled a "C" average on all my midterms, did + better in school. Hung out, had fun, and created Jonas in April of '95. I + liked that so much, I released a second issue the next day. With more + issues the next week. Soonafter, I got out of school for the Summer, almost + got a part time job with a local newspaper (selling them, not writing for + them), which fell through. I saw Kitty In the Tree on a Boat Cruise, and + then I went to the Warped Tour in August. School came back too quickly, and + I was left with a better perspective on school. I did better, did some + after school activities, and felt better. I slacked off, did worse, + disliked some of the extra-curricular activities I was doing, and still felt + pretty damn good about myself. + + There, that was good. But thats only the tip of the things I've done in the + last 365 Days. I've lost friends, I've gained friends. I've learned things + about myself and others. I became a more secure individual, and learned not + to worry about what others say, just to be myself. I've found an outlet for + all of my writing via Jonas, and finally, I learned to like even more music, + meaning more CD's for good ole' Tom here. + + You learn alot as you progress through your high school years. I currently + have 114 kids, give or take, in my Sophmore class. Out of that 114, there + are about 20 kids that have a serious drinking problem, and about another 50 + or so that drink fairly regularly. I'd say 80 smoked at some point, some + more then others. Alot of kids do Pot regularly. There are alot of kids + that are complete and utter failures, and some that are so intelectual that + you would be amazed. You know what I learned from all of this? + + Not a whole lot. I know not to do drugs or smoke, because thats just paying + to kill yourself. I also know that I really shouldn't drink, at least at my + age. My idea of fun is one where I can remember it the next day. Call me + wacky. I much rather spend my time geeking out on the computer, then go to + a party and get wasted. + + I've been poked fun at, been the center of cruel jokes, been left out, been + harrassed, laughed at, and I'm often the guy in gym class that kids say "no + way, I don't want him, he sucks." But the whole thing is, I don't care. + I've come to the point where I can see that when others try to say stuff to + me, it is just a coverup for their failures. Let them say things, just be + original. + + Anyway, back to the point I was originally trying to convey. Over the last + year, I have grown much more sure in myself. A year ago, if someone would + say something to me and try and put me down, it would get me down. I let + even the smallest things get me down. Not anymore, tho. I'm a changed + person, changed for the better. I'm happier with myself, too. Its a great + feeling. + + At times like this, one of my favorite songs by Civ comes up. Go out, and + somehow listen to "Don't Got To Prove It" by Civ. It makes alot of sense. + + That's all she wrote, kids. Always remember, Jesus loves you, but not as + much as I do. (Ok, ok. I ripped that from Eve's Plumb.) + + Edicius + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + Oh yeah, if you want to reach us here at Jonas-Land. Here: + + World Head Quarter type board -- Avalon, (908) 739 4274. + + EMail -- edi@cybercomm.net + + Web Pages -- http://www.vitinc.com/~rmini/jonas.html + (Thanks to Fat Slayer. send inquiries to rmini@vitinc.com) + http://www.pla-net.net/~jwapienn/zineworld/ + (Thanks to Mercuri. send inquiries to jwapienn@pla-net.net) + http://www.cybercomm.net/~edi/jonas.html + (Thanks to me! Rad site! It has Jonas 13 on-line for reading, maybe + one day Jonas 14 will be there too!) + (Gee. I really have too many Web Pages. Yeeech..) + + You can also retreve the latest issues of Jonas via FTP -- + ftp.etext.org /pub/Zines/Jonas + + More information about jonas can be found by fingering + edi@raven.cybercomm.net + + +-----+ + + Happy Holidays to one and all from the staff of Jonas E'Zine. (Ok, Happy + Holidays from Edicius...) + + +---- --- -- - -------------+ America's Youth +-------------- - -- --- ----+ + + Where's the one place that there is a daily convergence of millions of young + people throughout America? School. So, through school, you get a pretty + good view of the youth of today. You see their good sides, you see the + dreams they have, and the places they may go. + + You also see their troubled side. You see their angst, you see their + problems, you see the places that they will likely wind up (dead or in + jail..) Whether or not you see it, there is a serious problem with us + teenagers. Alot of us just don't care, and are oblivious to everything the + world gives us, always putting ourselves in front. + + I don't boast, but I do my share to help others. I'm nice to alot of + people, I give money when I see people collecting, and I help anyone who + needs it. There are others like myself, maybe you reading this, but there + are alot of people that cross us out. + + Something recently hit me. I've never really been oblivious to the problems + of young people today, I see that there are _alot_ of things we're doing + wrong. You see in the newspapers about kids stabbing each other in school, + hitting teachers, and generally being miscreants. + + I go a small private Catholic high school, with about 400-450 kids over the + four grades. I'm a Sophomore, so I'm noticing more this year then last, at + least more then this time last year. I see that there are alot of kids that + would gladly spend their free time smoking pot, drinking, and doing nothing + majorly productive. Now, I don't have anything against drinking, I'm + against it when you're not legal. I mean, sure, 19-20 year old kids aren't + legally able to drink, but they've reached a more mature level then the 14 + and 15 year olds that drink the same amount. + + I have something against pot, tho. I see no apparent reason to try pot, or + any drug for that matter. Why would I want to waste my time smoking + something that I won't be able to remember tommorow? Thats just not for me. + + Back to my school. + + Recently, things have hit me, that show just how bad things have gotten. I + don't expect everyone in a Catholic School to be "goodie-goodies", but + they're usually a bit milder then some of the kids I know in public school + (usually. I'm not saying anything bad about Public School kids, I know alot + of kids that are in public schools that are much better then the kids in my + own school. You get my point, right?) Over the past two weeks, things have + gone downhill. + + There's one kid in my grade that has a major drinking problem. You know + that chick from "My So-Called Life", Rayanne, I believe her name is. He's + like that. When my school has a half day, he would go to a pizza shop, eat, + and then go to the woods to drink with some kids. The other kids would have + to carry him through the woods because he was so gone at that point. Pretty + stupid, don't you say? But wait, there's more. + + This year, he started taking bottles of rum and vodka into school so he + could drink even more. A swig of vodka before gym, some rum after lunch, + its all the same to him. He would put the bottle in his school bag, put his + head in his locker, and take some. Then he'd go into the bathroom just to + chew some smokeless tobacco. + + Just over a week ago, he had an idea of putting vodka, or some drink, inside + a Mountain Dew bottle, because they looked similar. He was drinking in the + bathroom, when the bell rang. Being already late, he took the bottle and + his books to his next class. He sat in the back of the room, and from time + to time, he would take a sip. After about 5 or 6 sips, the teacher got + annoyed, and said, "I let you drink that long enough. You're not supposed + to have any food or drink outside the cafeteria, go to the bathroom and dump + that." + + He got alittle scared, but got up and started to walk out. His teacher + stopped him, and poured some into a cup he had on his desk. Uh-oh, recipe + for disaster. He left, dumped it out, and came back. After a few moments, + the teacher took a sip, and, as he said, his "lips went numb." He kept the + kid after class. The kid gets sent home, gets a one day suspension and a + centeral detention. Pretty lenient, eh? + + Just yesterday, the last day of school before Christmas, two girls got + kicked out. They got into a fight (argument) with a senior outside of + school. They felt threatened, and decided to carry some knives in school. + Someone told on them, they get kicked out. + + During the week, a rumor started circulating that a Freshman girl was + pregnant. Last year there was a senior who was pregnant, and went on to + give birth to a baby girl. Supposally tho, this freshman started the rumor + to "get a senior guy to like her again." Thats just fucked up. + + One kid got kicked out for pot earlier in the year, another almost got + caught with it, but they only found a lighter. A senior and three juniors + got kicked out back in October for beating up a freshman, who subsequently + went to the hospital. + + All of this happening in one year in what used to be a calm Catholic high + school. It was only today, when I really thought about it, did I notice how + things are taking a turn for the worse. I never really expected things like + this to happen in "my school", no one does. Unfortunally, its happening in + my school, and countless others throughout America. + + It's a simple fact, countless numbers of kids today are belittling their + time with drugs, violence, and other harmful things. They are just not + taking the time to appreciate anything, being thus filled with "angst", + which in turn makes them more emotional to their needs. + + Do I think there is still hope for America's Youth? Yes, much hope. I + think we will, one day, unite and conquer. Through experience, we gain the + knowledge. + + +---- --- -- - ------------+ A Ch0Dy X-MaSS Carol +---------- - -- --- ----+ + + I found this on a local chat board over a month ago. It was written by a + guy named Chody, and yes, I did find it in the Literature Forum. Happy + Holidays. + + +-----+ + + This isn't intended to be stereotypical. + + A Ch0Dy X-MaSS Carol: + + T'was the night befo' Kwanzaa and down in the hood + All the Homey's were hopin the crack would be good + + The oozie's were hung where they'd just been used + Since the welfare system is so much abused + + With Kmase Nfume and Schmoke at the Hall + waiting around for fat clinton to call + + I in my color's, sat back with a case + after jackin grandma it was time to get faced + + After the tenth, I was totally waxed + and wondered aloud when will piss be taxed? + + When out on the porch there arose such a clatter + I slipped as I zipped my half empty bladder + + Then what to my wondering eyes did appear + a fat old negro - two gold rings in his ear + + he said, "I'm Father Kwanzaa, and Santa is DEAD" + "So git yo' cracker ass back into yo' bed" + + For Farrakhan rules and Bill is out man + so out of yo' pockets and into our hands! + + Your Money in taxes, empowerment grants + your lucky i dont take those baggy-ass pants" + + then he ransacked my house, even too my last beer + and said with a voice full of holiday cheer, + + Keep workin those days, keep workin those nights + Happy Kwanzaa to all - Dont it SUCK TO BE WHITE! + + + +---- --- -- - --+ Stan's Telephone Excursions; Chapter 1 +-- - -- --- ----+ + + "Hey baby.. If you're looking for a nice, firm, young girl like me, then + call.. We're waiting for you at 1-900 SEX 6969.. That's 1-900 SEX 6969.. + We're waiting, in the meantime, we'll masturbate thinking of you.." + + The ad he just saw was too much for him. Stan sat in his room, watching + Gilbert Godfrey and USA's "Up All Night", and there the ad was. There were + blondes, brunettes, even Asian girls. All waiting for him to talk to. He + could never get these girls in real life, so he decided to give it a try. + + He picked up the phone, and called. Of course he wasn't paying for it, he + was running a line from his neighbor's house into his room. "Here we go," + he thought, as he dialed. "Just one more minute, and I'll be talking to + beautiful women.." + + "Hey baby.. You've reached 1-900 SEX 6969.. We're just so HOT for you that + we can't wait. If you're under 18, or do not wished to be billed for this + call, please hang up now.." + + "I'm under 18," he said to himself, "fuck it. These chicks are ugly, but + they can lie and say they're beautiful. Why can't I lie and say I'm 19?" + + "Now that you've decided to join us, we're ready to get you off... to a good + time. Are you ready for the hottest in adult erotic entertainment in the + United States? I hope you are, you better.." + + "Oh baby.. Almost there," he thought. Not aware of the series of menus + that he would have to navigate soon. + + "Now, we need to know what you're looking for. Press 1 if you want kinky + sex, including domination, sadomasicism, bondage. Our girls will even act + out the kinkiest of fantisies for you," the warm, recorded voice told him. + + "Sadomasicism? What the hell is that?" The little 15 year old acted so + innocently. + + "Press 2 if you want regular straight sex with one of our hot girls.. This + is the normal, hot sex that you want.. Or, press 3 if you want one of our + hot muscle studs to show you how to-" + + "BEEP.." + + He pressed the two key, real quick. "I'm not a fag, nor do I want to be + tied up. I want my bitch, now!" he excaimed. + + "Ok, you have selected regular hot sex with one of our fine girls.. Press 1 + if you would like to talk to one girl, or press 2 if you would like to talk + to two of our bisexual nymphos who want to suck and fuck you all night + long." + + "Umn. Hmna. Two girls? For me? Hmm.. Could be interesting.." + + "BEEP.." + + "Ok, we're almost there. You said you want to have two of our bisexual + nymphos in a regular straight sex party.. Press 1 if you would like the + first girl to be a 19 year old all-American blonde.." + + "Whoa! I get to pick my girl?" + + "Press 2 if you want a hot oriental.." + + "Oriental's aren't bad, neither are blondes.." + + "Press 3 if you want a large chested brunette.." + + "BEEP.." + + "Large chests aren't bad, either.." + + "Now, for the second girl.. Press 1 if you want her to be a Latina.." + + "Damnit! When am I going to get my girls?!" + + "Press 2 if you want a blonde from the coldness of Scandinavia.." + + "BEEP.." + + "Now, you're almost there. Just wait one moment while we connect you to two + of our hot sex girls ready for you.." + + "Yes! Just another minute," he said as he grew eager with excitment. He + heard a minute click, and then a ring, and then it was picked up.. "Hello?" + he asked.. + + "Hi there, I'm Mandy.." + + "And I'm Melissa.. Are you ready?" + + "Uhm. Yeah.. Uhm," he stuttered out of anxiety.. What was he going to say? + Would this really be fun? Would they know he was under 18? "What are you + girls wearing?" + + "Well, I'm wearing a red see-through teddy, with red stilleto heels," said + Melissa. + + "I'm wearing nothing but a pair of white cotton briefs." + + "Cotton briefs? Like what men wear?" + + "Yeah.. Why? Are you surprised?" + + "Well, yeah, sorta. I mean, I didn't think women wore them.." + + "Women normally don't.. But I'm a transexual, I once was a man.. Old + habits are hard to break." + + "WHAT?! What kind of freak party is this?" + + "Is there something wrong with me.. Um.. I didn't catch your name.." + + "Stan. I mean, Sam. Sam.. Not Stan.." + + "Of course not.. Is this your first time?" + + "NO! I've had sex many times! Of course! Do you think I'm a 15 year old + virgin? Aha. Hah. Umm. Hah.." + + "I meant on a phone sex service.." + + "Oh, yeah, of course.. You know, when you get it like I do, you don't need + phone sex.." + + "And you're calling because?" + + "Because his dog's sick," Mandy interjected. + + "What? I don't need this kind of harrassment! I call here for sex, not + twenty questions!" + + *CLICK* + + "Hello?! Hello? Who the hell is this on my line? Hello?" + + "Who's that?" Melissa inquired. + + "It's his dog.." + + "Who the hell are you? And what are you doing on my phone line?" + + "Eeck. It's Mister Joel," Stan thought. "If he sees the phone line outside + his house, I'm dead.." + + "Sam? Are you still there?" + + "Sam?" + + "Yeah, thats the guy that called us.." + + "Hey Melissa, didn't he say his name was Stan?" + + "Stan?! Are you the same one who charged all those long distance calls to + my house? Hey, my neighbor's name is Stan!" + + *CLICK* + + Stan sat there, phone in hand, but he ripped the line out. He peered out + the window, and saw the line fall limply from his window, to the ground. + + "God.. I'm in deep shit now.." + + +---- --- -- - ---+ "Fire: A '90s Invention" + By Belial +--- - -- --- ----+ + + The wind whipped and thrashed all about Rofl as he stood shivering inside + the small cave. "Ugh." Rofl exclaimed stomping on the groud in an effort to + keep his feet from going totally numb. + + Rofl looked towards the cave entrance; almost completely covered by a thick + wall of snow. Sighing, he began chewing on a stick that he had found earlier + and dried for dinner. "Ugh, yuck!" Rofl spat, throwing the stick against the + cave wall. + + Finally, after months of seclusion and bitter cold meals of sticks, Rofl was + losing his temper. He wished it would just end. That the snow would go away + and that he would be left in peace. He missed hunting and fishing in the + country. He missed seeing his friends who like him, were stuck freezing in + small caves with little or nothing to eat or drink. + + Screaming, Rofl walked up the the cave wall and began smashing his skull + against it in uncontrolled fury. "Ugh, huh-gug, oof, mu-gug, m0g, ugh-huh!" + + The small cave shook with the impact of Rofl's skull. Losing consciousness, + Rofl started to notice something strange beginning to happen. His head was + getting hotter and hotter with each blow to the cave wall. + + All of the sudden, after one hard blow, a spark was sent shooting away from + Rofl's head, landing on the twig that he threw against the wall earlier. + After a minute, the twig began to smoke, then a tiny flame emerged, + gradually expanding as the seconds passed away. + + "Ugh, uh?!" Rofl exclaimed, looking at the burning twig. + + For a minute Rofl just looked at the twig, wondering what it was that he was + seeing. Never before had he seen anything so bright. Then he reached down to + touch it. + + "UGH! HOT!@" he screamed, quickly trying to wipe the flame off on his beard. + However, the flame wouldn't go out, and his beard caught on fire. + + "UGH! AHHHH!@" Rofl screamed; jumping around trying to get away from the + flame. + + "HOT!@" + + As the flame slithered its way up Rofl's beard, he ran to the cave entrance + and jumped out through the building wall of snow. A giant gust of wind + smashed into him, knocking him face first into the snow. Instantly the fire + hissed and went out. + + "Uh. C0LD!@" Rofl yelled, running back into the cave. + + As he stood shivering near the cave entrance, Rofl noticed in the corner of + his eye that the twig was still on fire. Afraid of catching on fire again, + he carefully walked over to the twig. + + "Ugh. Pretty stick!" Rofl thought aloud as he gently lowered his hand + towards the flame. As his fingers inched towards the flame, they began to + get warmer. Instinctively, Rofl drew his hand away, and it instantly began + to get cold again. "Ugh." Rofl mumbled as he reached for the flame one more + time. Again his hand began to get warm, and Rofl quickly brought it away. + + Then suddenly, Rofl had a thought. He raced to the back of the cave and + quickly grabbed some more sticks. Checking to see if he missed any, Rofl + bounded back to the burning twig. When he got there, Rofl cautiously dipped + one of the new sticks into the flame. Waiting a second, Rofl brought the + stick away and to his amazement, there was a tiny flame burning at the end + of it. + + "Hu-gug aha-huh!" Rofl laughed, dropping the rest of the sticks onto the + fire. As the fire built up, Rolf began to notice that the whole cave was + getting warmer. + + "Ugh. hmm." Rofl thought "Ugh. stuff hot. Cave cold. Stuff make cold cave + hot. Ugh," laughing as he began to dance around cave. + + The next day, Rofl gathered together all his gear and left his small cave in + search of other people trapped within their caves. He spent the next few + days searching until finally he found another cave. + + "Ugh, I brought you something." Rofl said as he entered the cave. + + A second later the world went black as a giant club smashed into his head. + He remembered waking up sometime during the night, but everything went dark + once again as the club crashed down on his skull. + + "Ugh. Sun pretty." Rofl mumbled as he began to wake up again. + + Then he saw the great club ready to bear down on his head again. + + "Ugh. NO!@$#%" Rofl yelled, realizing what was about to happen. + + "Uhm. Why?" the other asked. + + "Ugh. I bring something." Rofl pleaded. + + "Uhm. What!" said the other raising the club once again. + + "Ugh. I bring hot stuff." Rofl quicky said. + + "Uhm. Show Lol!" the other demanded. + + "Need stick. Ugh." + + Lol lowered the club and walked to the back of the cave where he picked up a + pile of sticks and brought them back and threw them at Rofl's feet. + + "Uhm. Hurry!" + + Rofl quickly picked up the pile of sticks and brought them to the cave wall. + He braced himself and began beating his skull repeatedly against the rocky + wall as he did just a few days earlier in his own cave. Once again Rofl felt + his head begin to heat up as he landed blow after blow against the cave + wall. + + Lol looked at Rofl like he was crazy, but decided to say nothing. + + Then the spark came. It flew away from Rofl's head and landed on one of the + sticks. After a minute the stick began to glow as the flame took control and + got hotter. + + "Uhm. What that!?" Lol demanded. + + "Ugh. Look!" replied Rofl. + + Lol stared at the stick for a minute and then reached out to touch the + flame. + + "Ugh. Don't. HOT!" Rofl yelled to Lol; remembering what happened to him when + he touched the flame. + + "Uhm. Then what do?" Lol asked. + + Rofl gathered up the rest of the sticks and fed them to the small fire. + After a while the fire began to grow. Soon the cave began to get warm also. + + "Ugh. Fire make cold cave hot!" said Rofl triumphantly. + + "Uhm. Huh-huh!" laughed Lol. + + The next day Rofl showed Lol how to make his own fire, and set out to + introduce his fire to more people. + + As time went by, Rofl had introduced his fire to many people, who, in turn + went out and intruduced Rofl's fire to other people. Thus it was that fire + was introduced to the world of man and even though Rofl has long since been + forgotten, his legacy shall remain forever. + + + +---- --- -- - --------+ An Interview With Jon Vena +-------- - -- --- ----+ + + Jonas - Whats your position at whtg/106.3? How long have you been working + there? + + JV - I am the Management Assistant and Promotions person at WHTG, which + means, basically, that I handle pretty much every giveaway and contest that + you hear at the station; also, I work on publicizing our events through + press releases, on-air promotional spots, even the Internet. I've been + working at the station exactly one year Christmas Day... I was hired over + the phone as I was calling in a request on Chris Rake's "Common Threads" + program, which just happened to be falling on Christmas day. Our general + manager was there, and I basically was given my request AND a full time job + in just over four minutes. I worked at the station during my remaining + Christmas Break, came back for Spring Break, and began working full time two + days following my graduation from East Stroudsburg University in + Pennsylvania last May. + + Jonas - WHTG was listed as one of the top ranked radio stations in the + country, in last years Rolling Stone reader survey. does that make working + at 106.3 any different? + + JV - The Rolling Stone thing blew our minds! The staff over at Compact Disc + World (Eatontown, NJ) sent us a fruit basket -- after that, I really cannot + say that it changed things. It made us proud, I can tell you that -- + especially since we never, ever solicited the votes. This year, I've even + heard Z-100 (NY, NY) offering to pay for your copy of Rolling Stone so long + as you vote for them. When the final tallies come up in the January issue, + I'll be sure to send in an email message to contest that fact -- as a + person, not an FM 106.3 employee. The fact that people would care enough to + send in an entry with our call letters on it is great -- that's why we try + and give so much back to our listeners. I think you would be really, really + out of luck if you tried to find as much new music, contests and the like on + any other station on the dial. You can definitely quote me on that!!!!! + + Jonas - How often do you DJ on the air? + + JV - I deejay when something really goes wrong -- like, when someone gets + sick or someone suddenly has tickets to see someone (or something to that + effect). I'm not a full time air staff, I am what they call a support + staffer -- I contribute to the on-air element without really having to be + the driving force in that contribution. I like that, though -- being an + "on-air personality" has its ups and downs. I like the feeling of being + behind the scenes -- so "Oz". + + Jonas - How did it all get started? Have you always wanted to work in the + music industry? + + JV - I've been a music fan all my life -- from the time I was a child. I + still remember being the happiest kid when I had enough money one Saturday + morning to actually buy a 45" by The Kinks ("Come Dancing"), I think I was + at PathMark with my mom -- she was food shopping and I was busy in the + record section... when PathMark **had** a record section. After that, it + was all Culture Club and The Human League. + + I have always wanted to, in some fashion, work in music. Right now, I look + at this as my starting point -- this is the first step for me. Do I plan an + entire career in radio? Certainly not -- there just is not enough money in + it (Yes, I am a sellout; this is what happens after you spend tons on + college...). However, I'm very honored to be a part of WHTG. Remember -- + while Z100 was too busy with Janet Jackson and Color Me Badd, FM 106.3 was + breaking these tiny little bands that no one had ever heard of -- bands like + Nine Inch Nails, The Smashing Pumpkins, etc. Now, it's everywhere. + + Matt Pinfield and Rob Acampora and I knew each other, and when the time came + to get an internship, I skewed my English Writing studies into something + worthwhile at the station - promotions- and Matty and Rob hooked me up. It + worked, and I owe Rob and Matt a ton for it. They've always been there for + me... Matt, even though he is at MTV now, still calls and gives me boosts. + Bruce McDonald, my current boss, is great as well. Bruce, Matt and Rob have + each given me so much to work with -- I'm very, very fortunate to have all + of their trust and confidence. + + Jonas - Did you go to college for a broadcasting-related degree? + + I went to college for a writing degree, which I somehow obtained in 4 years. + I want to enter the journalism field -- I have plans on returning to + graduate school for a Master's in the profession. However, I did take a lot + of media studies courses (3 credits shy of double majoring...). I started + tinkering in radio back in college -- for 90.3 FM WESS. + + Jonas - Do you do anything on the side? Any side-jobs, bands, school? + + JV - Occasionally, I'll deejay in a club. Also, I write a lot on the side... + for "SMUG" Magazine, hopefully, in the next few months, for SEVENTEEN (don't + laugh -- they break a lot of bands, believe it or not!) and DETAILS. I've + always wanted a band -- just never got the guts to actually sing in front of + someone or to show them lyrics that I've written. Instead, I've worked and + achieved more in printing poetry and short stories stemming from my moonlit + fascination with literature and the publishing field. + + Jonas - Where are you originally from? Grow up in the New Jersey area? + + JV - I was born in Pomona, California. I grew up in Matawan (NJ) and have + since moved from there. All of my friends still live there -- so I'm there + practically every night. + + Jonas - Did you work at any other radio stations before WHTG? + + JV - Only at my college station, WESS. I did do some tinkering with a Top 40 + in Stroudsburg (PA), but that's a long story that, well, is kind of boring! + + Jonas - With your line of work, do you go to alot of concerts? + + JV - Tons. And I get to meet a lot of bands, which I assume is everyone's + dream. Usually, a band is really, really cool or they're just a total bunch + of assholes. Rusted Root was cool as hell, and I had the opportunity to meet + Shannon Hoon about a month before he died, when Blind Melon played The + Tradewinds (Sea Bright, NJ). A really, really nice guy. I also met Chris + Isaak last week, and I think I'll have the chance to meet Elastica in + January (god I hope!). Bands are always coming to the station, so we all get + to meet and greet. I think if they had more time in their schedule, a lot of + bands would love to meet as many people as possible -- this is especially + the case with Belly, who we all met last September. They were tired as all + hell, but they went into our soundcheck party, took photos, signed things... + Tanya even kissed me on the cheek and gave me the flu. That's just about the + only really true claim-to-fame brush I can brag about. + + Jonas - Whats your favorite type of music? When on the air, do you normally + play anything that you utterly hate? + + JV - All the time! I had to play KoRn the other night -- yuck. We go by a + system, and that system naturlly dictates that we sometimes have to play + something we don't personally care for. However, when we are in the "big + chair," we are playing for an expansive audience -- so what if Mr. Deejay + doesn't care for KoRn???? They've sold nearly a million records with very + little radio and/or MTV airplay, and that speaks for itself. + + I am personally into modern rock. I went through a metal stage in the early + high school years (which, I think, is mandatory of all New Jersey 9th and + 10th graders). However, before that, I was really into the mid-80's British + Invasion, with Duran Duran, Culture Club, Human League, Pet Shop Boys, + etcetera. I also like some classic rock -- very little beyond Zeppelin and + The Beatles, though. Modern rock is where I lie now, though -- and have for + a very, very long time. I often wonder what I would have been into had I not + heard about this guy named Matt Pinfield that was breaking music on this FM + 106.3 station so long ago... + + Jonas - There's been a good number of bands spawned in this area recently, + Mars Needs Women, Psykidelic Oven Mit, and Fuzz The World, to name a few, in + your opinion, how's the New Jersey music scene looking? + + JV - Mars Need Women just put out one of the best records I have heard all + year. It's called "Sparking Ray Gun," and I had the chance to meet the band + for the first time Saturday night at The Stone Pony when they played with + the Goo Goo Dolls. They are awesome... I really don't like Oven Mit or Fuzz + The World that much, though -- but Rotator Cuff and The Gefkens are great. + The New Jersey music scene is one that, I think, relies too heavily on a + heavy metal-influenced past. Bands like Rotator Cuff are breaking this + trend, though... Eve's Plum did it single-handedly by borrowing more from + Debbie Harry than Joan Jett (even though I LOVE JOAN JETT!!!!) There are + some more bands that are going to make it from the area -- but if you're + looking for another Seattle, I think Austin, Texas is the place... + + Jonas - Whom do you think are the hottest bands right now? Who do you see + taking off very soon? + + JV - The Smashing Pumpkins cannot be denied. The CDs are amazing -- both of + 'em. Rancid's new disc is amazing, as are Blur and Oasis' latest projects. I + think the band Snapdrag are going to take off once their debut Elecktra + Records disc is released in April -- also, Solution AD just got signed to + TAG Recordings **today**. and, having seen their evolution first-hand (we + all went to college together), I know they are going to be huge. The new + Ministry CD ("Filth Pig") is out in January -- I have it now, and I cannot + say that I am too impressed, although they do a raucaus version of Dylan's + "Lay Lady Lay" that... well... is a shame and a blessing all in one. Self is + a great new band, as are No Doubt and For Squirrels (see later note on that + one...) + + Jonas - Do you use computers at the station? What kind are they, and what do + you use them for? + + JV - At this time, we only implement one computer in the whole station; it's + often referred to as "my" computer... all I use it for is word processing + and the like. In January, we will be converting to a completely + computer-based logging system for our commercial purposes... the field of + radio computing is ever changing, so we really held off until we knew our + needs would be taken care of. + + Jonas - I'm presuming you're dialing into your internet account from home, + so, what kind of computer setup do you have there? What do you use the 'net + for? + + JV - I have a Macintosh Performa 6112... which is used a lot for my writing + duties and the like. I use the net so that I can communicate with my friends + across the country (back up at schoool, people at other colleges, music + industry people.) I also use a lot of newsgroups and the like. Basically, I + use the net as a research tool as well... perfect for writing assignments + that may ever come up. + + Jonas - 'Zines -- read many? favorites? contribute to any? like Jonas? :) + + JV - I have only read one issue of JONAS -- and I liked what I saw. I read + CRANK and INSIGHT on a regular basis, and I think BEN IS DEAD is the most + intelligent piece of journalism out today. There stands a chance right now + that I may be contributing to BEN IS DEAD in April. I also enjoy HITCH, + which is out of Oklahoma. They even printed a letter I sent them last month + -- anyway, some of the stuff in there is absolutely hilarious. At the SNOW + BALL on December 16th, the station will have a zine -- a very polished, + play-programesque zine, but a zine nevertheless. Oh, and by the way, I think + I'm contributing to JONAS right now, huh??? + + Jonas - How are the people from the station? Do you hang out with any + outside of work? + + JV - We are all great friends. Chris Rake is very close to me... Bruce and I + go and get lunch everyday at the local supermarket and we constantly make + fun of people we see there.... for example, the one checkout girl that I am + dying to talk to that, well, I never do. Rob and I get along well... Mike + Sauter is a riot, and Missi, Molly, Sports Guy Glenn, Michele, Anya, Chris + Mailley, Andy G.... if you ever go to a show and see us all together, get + ready to see a lot of laughter as well. It's a funny thing..... + + Jonas - What do you think has been the best cd release of '95? + + JV - Radiohead's "The Bends" is simply amazing. There is a band out called + For Squirrels that have a CD on Sony called "Example"... the irony here is + that the band's guitarist and lead singer died, and their first single is + about Kurt Cobain. PJ Harvey's disc was good, Rancid and Smashing Pumpkins + amazed me, and well.... there was so much great music this year! Indie-wise, + K Records out of Olympia, Washington has a band called Kicking Giant who are + really, really great. I also liked CIV's disc, Wizo's CD, and, of course, + Belly's KING. Did I mention Prick's debut? Beautiful, fresh neo-industrial + buzz... did a great job opening for Bowie and Nails. + + Jonas - Will you vote for clinton in '96? + + JV - Well, that depends. This whole politician thing is pissing me off -- + especially that crap that went on last week. It pisses me off knowing that + the government is spending tax money on federal employees that, when they + ran out of money and hence the ability to pay 'em, were called "non + essential". Umm.... hmmm.... you get my point, I think. + + +---- --- -- - --------+ Convert, CD, 'Zine Reviews +-------- - -- --- ----+ + + Hey, I figured I'd go the way of almost every other 'zine out there, and + start reviewing stuff. I'm opinionated, I have my thoughts on alot of + things. So hey, why not review the few concerts I go to and the new (or + close to being new) cd's/tapes/records and 'zines I get. + + +--+ Concerts +--+ + + The WHTG-FM Snowball - Featuring Civ, They Might Be Giants, Del Amitri, Deep + Blue Something, Rusty, Solution A.D., & Whriling Dervishes - December 16, + 1995 - Count Basie Therater, Red Bank, NJ. + + +----+ + + Seven bands, five hours of intense music, and radio personalities coming out + the bezuka. All this for a mere twenty bucks. Not a bad deal by anyones + standards. + + Going into the concert, I really only wanted to see Civ (Whom I saw back in + August when the Warped Tour popped into town) and They Might Be Giants. The + rest of them have one or two songs that I've heard, and that was about it. + I wasn't all that excited to see them -- But I was wrong. + + The first band that started promptly at 7 PM was Solution A.D., a + Pennsylvania Based band that was pretty good. They played five songs, + including their current single "Fearless". Lead singer Toby Costa's voice + dominates the stage when they sing, added with a very good stage + personality, Solution A.D. turns out to be the surprise to me of the night. + + Rusty was out next. Lead singer Ken Macneil lost one of his vocal cords + during their set. With that in mind, I'd go see them again. They had to + skip out on the Post Snowball Party to be held at a local club. So, I'd go + see them again, just to see if they actually are good. With him being as + sick as he was, you just couldn't get a good feel for them. They did do a + rousing version of their hit "Take Me." + + Following Rusty were local favorites Whirling Dervishes. They were pretty + good, I'd consider going out and getting their new EP (Entitled "The Grinch + EP"). The final song that they did was a cover of Dr. Seuss' "The Grinch + Who Stole Christmas" that they did three years ago, on their "Wish It Would + Snow" EP. Its not Christmas without a performance from Whirling Dervishes. + + Next up was They Might Be Giants. This set just rocked the house. I was + especially lucky because I had friends who had seats in the first and second + row, in the center too. So, I got to see the Johns (along with bassist + Graham Maby and Brian Doherty on drums) real close. John Flansburgh was + close enough to touch. Yippie! + + Most bands only did about 5 or 6 songs, so TMBG did most of their hits. + Including "Snail Shell", "Spy", "Why Does The Sun Shine?", "Birdhouse In + Your Soul", "Twisting" and of course, "Instabul (Not Constantinople)". (I + believe that was the complete songlist.) Its amazing to see them live, + "Spy", being one of my favorite TMBG songs, is just great, if not alittle + worn out in the end. (On the CD Version, there is about 45 Seconds to a + Minute where they just hit one or two notes on the guitar and drums in + different order, they drag this out to about 3 or 4 minutes. Yikes!) + + They Might Be Giants rule, in concert or not. + + Next was Del Amitre, who I was surprised by. "Roll To Me" is about ten + times better in concert then it it normally. "Always the Last to Know" is + also a very good song. They also performed "Stone Cold Sober" impressivly. + + Deep Blue Something came up, and well. Aside from "Breakfast At Tiffany's", + I wasn't impressed by they. They were pretty decent, but nothing too + impressive. They did a long fairly long instrumental song called "Deep Blue + Something" which was a pretty bad note to go out on, being so long and all. + They did do alittle bit better then I thought they would, but they still + weren't anything too amazing. + + Finally, the band I had been waiting for. The headliner, the finale. Civ! + Yes. I of course moved back down to my friend's seat, but soon after the + music got moved around alot. Civ was the only band where there was a real + 'pit' in front of the stage. Kind of irritating with the seats and + everything in the way, but worked out fine. + + Civ, the lead singer of the aptly named band, high fived me about eight or + nine times. I also grabbed his shoe twice and grabbed his shirt, arm, leg, + and microphone one time each. God it was great. Oh, I also got to shout + "All Twisted!" into the microphone (he put it right in my face, baby. Right + there, and I sang with my hearts content.) + + Some kid jumped up on stage, did a funky little dance, and dove right off. + I tried grabbing him to keep him 'afloat', but it didn't work. He just + smacked into me and the back of my head hit the nice soft cushion of a + chair. I got back on my feat to see my best friend plant two feet on the + stage, and get yanked right off. It was a very thrilling time. + + I got a drumstick from one of the roadies, too. God, Civ is so rad. + + Also, one of the highlights of the night was seeing all of my favorite radio + people in person. I finally got to meet Jon Vena (Head of Promotions for + WHTG, see "An Interview With Jon Vena" in this issue), which was pretty rad. + Jon also did a very great job getting the whole concert organized. + + On a related side note, I'd just like to say that two of the DJ's, Chris + Rake and Michele Amabile, are very, very pretty. + + It was a great night of music, fun, and charities. The event raised over + 800 pounds of canned goods for a local foodbank, and raised money for the + Surfrider Foundation; a local organization that tries to preserve local + beaches, and keep them open for the public. + + WHTG-FM did a very good job with this night, and everyone involved should + feel very good right now. + + +----+ + + Age-9, Foil, Dirtnap - December 17 - TJK Stadium, Keansburg, NJ + + +----+ + + This was one of those local 'concerts' that you just have to go to. Well, + sort of. Age-9 was the 'headliner', they're a local band that just released + a CD and should really take off soon. Foil is my friend's friend's band. + Dirtnap, I never heard of before. There were two other bands there, but + they looked like side projects, they had like some of the members from Age-9 + playing with some other kids, nothing big. I won't review them. + + It was being held at a local bar that was offering an all-ages venue for $5. + It was supposed to start at 5PM, but due to technical problems, namely they + didn't have enough working microphones, it didn't start untill 6:30. + + Dirtnap came on first, they were ok. Nothing amazing, with some practice + they could get alot better. As they are now, they were mediocore at best. + Their songs were decent, but nothing amazingly special. They didn't have a + truely amazing hardcore style, they really could use some practice. + + I'll try not to be biased, but Foil was pretty good. It was their third + time playing live at a real venue, and they were good. They have a pretty + mean punk sound, but nothing amazingly special. Their lead singer/guitarist + was very good, the bassit (who coincidentally learned bass from the bassit + of Age-9) is very good, and the drummer was very good too. Overall, the + band is very good. Look to hear from them in the future, they have an + album, entittled "Yet To Be a Man" due out in April of '96. + + There were two other bands, but as I said, I didn't really catch their + names. They looked like they were just different people getting together to + jam, but I could be wrong. They were real good tho. + + Lastly, Age-9 came on. Age-9 just plain out rocked. They have a sound that + defines the meaning of hardcore. All of the members of the band come + together to form a very good sounding band that will definnally be heard + from in the future. Look to hear of their newly released CD called "Gross + Times", for it should take off very soon. + + Yes, I know this was a pretty sucky review, but I'm tired. + + +--+ 'Zines +--+ + + Big Geek (Vol 1, Issue 1) + PO Box 319 + Glenview, IL 60025-0319 + Price: 2 Stamps? + + +-----+ + + This is Kojak's paper 'Zine! You know Kojak, right? Well, he writes for a + few different E'zines, pretty well at that. He decided to venture into the + depths of paper 'Zines. After he decided against releasing another issue of + "Kojak's Really Hard To Read 'Zine", he took up the pen name Brian Geek, and + started this 'Zine. Did a mighty fine job of it too. + + Included in this issue are really good essays giving us his perspective of + the Chicago Music Scene, his thoughts on OJ and Jails in America, and a + really good interview with Tricky Dick and Brendan Kelly of Slapstick. He + also has some other very good articles, ranging from music to politics to + some minor computer stuff. + + Kojak did a very good job with this 'zine, and has some very good articles + written for it. I'm hoping there's a second issue sometime soon, which + should be just as good. + + +-----+ + + Moderate Rock E'Zine #8 + Email BlackPope7@aol.com for more info. + + This issue was pretty good. Full of year end wrap ups in the world of + music, it was helpful in remembering some of the things that had gone on in + the past year. + + Numerous collumns written by the Editor of the 'Zine, and different editors + from other 'Zines, topped off this issue. They were all, mostly, very well + written, and make this one of my favorite music-related E'Zines currently in + production. + + One of the only low notes of this issue was a pretty weak interview with the + band Explodee (I think that was the name..) It was only a 20 Questions + format interview, but it was pretty bad. Other then that, the rest of the + 'Zine was pretty rad. + + Jen (BlackPope7) has a pretty rad 'Zine, and I wish her luck with it. + + +--+ CDs/Tapes/And Other Music Stuff +--+ + + Rentals / Return of the Rentals (Maverick/Reprise) + + What do you get when you combine a violin, a guitar, bass, drums, and a + couple of moogs? You get the Rentals. With Matt Sharp of Weezer fame on + volcals, bass, and moog, and Pat Wilson, also of Weezer, on drums, you're + bound to get a good deal. Add in Petra Haden on violin, Rod Cervera on + Guitar, and Tom Grimley and Cherielynn Westrich on moog, you get a very + awkward collection of intruments, which come together to make a unique + sound. + + By now, you're familar with "Friends Of P.", but this album goes much + further then that. From track one, "The Love I'm Searching For", to the end + and "Sweetness and Tenderness", you have a ride filled of fun on this cd. + Every song on here is very good. Odd sounding intruments come together for + a very enjoyable melody. + + This cd is highly recomended to be picked up, and listened to numerous + times. + + +-----+ + + Oasis / (What's The Story) Mourning Glory? (Creation Songs Ltd/Sony Music) + + Called the "Beatles of the 90's", Oasis proves it with this CD. A style + that is influenced heavily by the Beatles, Oasis leads the new British + invasion. Slow, soothing songs, filled with acoustic guitar, and powerful + and moving songs, filled with great drum sets. This cd takes you on a + whirlwind tour through the minds of some young British men. + + The current single, "Wonderwall", and "Don't Look Back In Anger" are two + songs with very powerful and emotional lyrics. This is also very highly + recomended as one of the year's best new CDs. + + +---- --- -- - ---+ Jonas Best Of 1995 - Survey Results! +--- - -- --- ----+ + + Now, you may or may not remember that we did a survey last issue. It was a + seperate file then the main Jonas file, so you may not have gotten it.. But + here we are with the results.. Just a quick note: + + I didn't get alot of survey responses, besides myself, I got 4 replies. 4 + REPLIES?! Where the hell is everyone? Sheesh.. And 2 of the surveys were + ones that I did to friends while I was on the phone with them. Yeeck. So, + because of that, I had the final vote on everything, so on ones where I got + 5 different answers for, I just gave it to the one I liked the best.. Here + we go.. + + +-----+ + + Best Band/Album of 1995.. + + Nominees: + Silverchair/Frogstomp Red Hot Chili Peppers/One Hot Minute + REM/Monster Primus/Tales From The Punchbowl + Sonic youth/Washing Machine Alanis Morrisette/Jagged Little Pill + Pavement/Wowee Zowee Green Day/Insomniac + + And the winner is.. + Oasis/(Whats The Matter) Mourning Glory? -- What?! "Where was this one on + the survey sheet?" Well, there was a large (1) write in vote for this one, + and I changed my vote to this album, making it (with 2 votes) the most + popular choice. + + Oasis came out with a great followup to their debut album, and proved why + they are the Beatles of the '90s. + + +-----+ + + Best new band/musician of 1995.. + + Nominees: + Alanis Morrissette/Jagged Little Pill + Silverchair/Frogstomp + Civ/Set Your Goals + Presidents Of The US/Selt Titled + Hum/You'd Prefer And Astronaut + + And the winner is.. + Civ/Set Your Goals -- With some of the members of Gorilla Biscuits all back + together, this album just takes you on a half hour tour of great guitar, + amazing drums, and fulfilling lyrics. You can't deny it, Civ is hardcore. + + +-----+ + + Best single of 1995.. + + Nominees: + Alanis Morrissette/You Oughta Know + Presidents of the US/Lump + Pavement/Father To A Sister Of Thought + Silverchair/Tommorow + Primus/Wynonna's Big Brown Beaver + Civ/Can't Wait One Minute More + Hootie And The Blowfish/Only Wanna Be With You + + And the winner is.. + Civ/Can't Wait One Minute More -- Hey, look at the reason above.. Civ just + can't be stopped.. + + +-----+ + + Best Indie Release of 1995.. + + Nominees: + Pavement/Wowee Zowie + 1000 Mona Lisas/The EP + Civ/Set Your Goals + Presidents Of The US/Self Titled + Dance Hall Crashers/Lockjaw + + And the winner is.. + Civ/Set Your Goals -- Gee, that's a surprise. + + +-----+ + + Best Punk/Hardcore Album of 1995.. + + Nominees: + Civ/Set Your Goals + Rancid/Out Come The Wolves + Green Day/Insomniac + 1000 Mona Lisas/The EP + + And the winner is.. + Civ/Set Your Goals -- Hey, people besides me voted for Civ in all these + categories! + + +-----+ + + Best Tour of 1995.. + + Nominees: + The Warped Tour Hootie and the Blowfish + Lollapaloza REM + Live Van Hallen + + And the winner is.. + The Warped Tour -- You get Quicksand, L7, Sublime, Orange 9mm, No Use For A + Name, and Fluf on the Main Stage, and a great second stage including Civ, + Sick Of It All, Swinging Utters, and Tilt, amoung others, you get a great + tour. + + +-----+ + + Best movie of 1995.. + + Nominees.. + Pulp Fiction Hackers + Mallrats Seven + Apollo 13 The 'Net + + And the winner is.. + Hackers -- This was truely a great computer geek movie. Anyone that can + pick up girls by saying "Baby, you're elite" is cool in my book. + + +-----+ + + Best radio station of 1995.. + + WHTG/106.3/Eatontown, NJ -- It didn't hurt that 80% of the surveys came from + the Eatontown area.. :) + + +-----+ + + Who will be president in 1996? + + By a landslide -- Bill Clinton + + +---- --- -- - --------------+ See you in '96 +-------------- - -- --- ----+ + + Everyone: Have a safe and happy holiday, don't party too hard on New Year's + Eve, we want to see you reading Jonas again in '96.. + + If you want to get Edicius a great Christmas present, you can always pass + along copies of Jonas to your friends, co-workers, and your enemies! Print + out copies and pass them around! Spread the Jonas fever to everyone! Make + people at your job aware of Jonas.. Get a nice magic marker, and make your + own Jonas T-Shirt, and wear it with pride! + + "One day, Jonas will take over the world, by educating the ill-informed, + sparking intelectual thought in the darkest person, and teaching others the + evils that we live in, and how we can reform.. Edicius for President in + '96!" + + Happy holidays everyone, Jonas loves you. + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + + Jonas E'Zine Issue 14 + Send all inquires regarding Jonas to edi@cybercomm.net + Jonas and Slinky can be found at Avalon, (908) 739-4274 + Thanks to Belial and Terminal Velocity for their unending support + + "Jonas, it's more then a 'zine, it's a lifestyle." + + +---- --- -- - ---------------------------------------------- - -- --- ----+ + diff --git a/textfiles.com/magazines/JONAS/jonas_15.txt b/textfiles.com/magazines/JONAS/jonas_15.txt new file mode 100644 index 00000000..dc181f51 --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_15.txt @@ -0,0 +1,650 @@ + _____ + [J]----------+\tMM/+-----------------------------------------------------[J] + | ) \/ ( | + / """""""""$$$$ .s&$$$"$$$$$$$$$$$"$$$$&s. """"""""$&s. .s&$$$$$$&s. \ + ( | $$$$$$$$ $$$$ $$$$$$ $$$$$$ $$$$ $$$$$$$ .s&$$$$$"$$$$$$$$$$s"$$$$$ | ) + `|. $$$$$$$$ $$$$ $$$$$$ $$$$$$ $$$$ $$$$$$$ $$$$$$$$ $$$$ ."$$$$sssss. .|' + | )$$$$$$$$ $$$$ $$$$$$ $$$$$$ $$$$ $$$$$$$ $$$$$$$$ $$$$ $s "$$$$$$$$s( | + / $$$$$$$$ $$$$ $$$$$$ $$$$$$ $$$$ $$$$$$$ $$$$$$$$ $$$$ $$$s$$$$$$$$$ \ + ( | `Y$$$$$$s$$$$$$$$$$$s$$$$Y' $$$$ $C$C$C$$$$$$$$$$s$$$$ `Y$$$$$$$$$Y' | ) + `|. C|C|C|C .|' + : . |:|:|:| . : + . . : : : : . . + -------------------------------------------------------------------------- + + Jonas E'Zine -- Volume 1, Number 15 -- Released February 17, 1996 + Jonas is produced semi-regularly by Edicius (Tom Sullivan). Jonas + and the material therein are property of Edicius and Jonas Print Matter + Incorporated. Jonas may be freely distributed as long as this notice + remains in place, and there is no fee charged for its retrevial. + + I should be allowed to glue my poster, + I should be allowed to think.. + And I should be allowed to blurt the merest idea, + if by random whim, one occurs to me. + They Might Be Giants -- "I Should Be Allowed To Think" + + -------------------------------------------------------------------------- + Jonas E'Zine Volume 1, Number 15 February 17, 1996 + + Contents: + + (1) - Edicius' Editorial + (2) - Chronology of the Communications Decency Act, compiled by Edicius + (3) - Violation of our Guarenteed Rights, by Edicius + (4) - "Oh, Sorry", by Edicius + (5) - , by Edicius + (6) - Particle Man vs. Universe Man: The Great Debate, by Edicius + (7) - Reviews! + (8) - The End + + -------------------------------------------------------------------------- + (1) - Edicius' Editorial + + February 8, 1995 + + Did you ever have that one special teacher in school? The one person that + showed a true interest in how you did? The one who's class you did the + best in, or at least worked the hardest in, mainly because s/he knew you + could? + + I had that teacher, but I lost him last night. Alot of people lost him + last night. + + Last year, I had him for Algebra 1 Honors, and he wanted me to work really + hard, and he worked really hard with me so I got it. Unfortunally, I + didn't make the right grade, so this year I was placed in Geometry B. But + this year, I also changed. Every class, I would sit right in front of his + desk. I would pay extra attention during his class. Most importantly, I + had a A average in that class this year. + + When I would see him in the hallway, I would make an extra effort to say + hi to him, and maybe talk to him. I would go to class a few minutes + early, because I knew he would be there to talk to, and have a nice + conversation with. + + My sister's boyfriend had him a few years ago in school. His family and + his teacher's family have always been very good friends. Subsequently, I + paid alittle more attention to him, and was alittle bit nicer to him, then + my other teachers. I had a better student-teacher relationship with him + then any other teacher I've ever had. + + One day, years and years ago, he made a choice. He made a decision that + he would be a teacher. He didn't do it for the money, he was working at a + private school and had five children, he just did it because he was + devoted to it. He taught at school during the day, and then he would + tutor other kids at night. It wasn't just a job, it was his life. + + He did this until his last day. Last night, one of the spanish teachers + from my school dropped her duaghter off at his house. He was tutoring her + in Algebra/2. Alittle after five, he suffered a massive heartattack, and + died before he got to the hospital. + + I heard about this a few hours later, and was very distraught. School + today was very somber, very solemn. The guidance conselors were there if + we needed to talk, and the teachers were very supportive. Everyone you + would talk to would have something to say about him, be it an funny story + about him, or a familar saying, everyone was touched by him in some form + or another. + + I do not grieve for him. He lived his life here, and accomplished many + things. He would be happy knowing how many people he touched in his time + on this earth. He is in a better place right now, he's at peace with + himself now. I grieve for his family. They do not have a father, or a + husband there anymore, but they have the support of many. I wish them the + best of luck in the time ahead. + + Goodnite Mr. Rapolla. You taught me alot. About algebra, about geometry, + and about myself. You were a great teacher, and a great friend. Even + though our lives only intersected for such a short time, your memory will + live in my heart forever. Thank you Mr. Rapolla, with my entire heart. + + ------ + + This issue is going to be weird. I've been in a very lethargic/depressed + mood the last week or two, and it may or may not show in my writing. It + does, however, show up in my attitude. I'm annoyed at different things, + things that didn't piss me off in the past. But, I'll save that for my + Valentine's Day rant. + + Oh, about this issue. It may just be my perspective about things right + now, but I can't decide if this is a good issue, or a bad issue. I + normally get a feel for the issue before I release it, but right now, I + just have no idea. Ugh. We'll see in a few days, won't we? + + I made a few minute/major changes (it's all in your perspective of them). + First, for those of your that dialed into a bbs and downloaded the latest + issues, I don't have official bbs distribution sites anymore. I still + support the local bbses, but the Internet is giant, and I'd rather email + the new issues of Jonas to a gazillion people, then call long distance and + upload it somewhere. + + Anyway, there are no "official" distribution sites, but any bbs that + carries it can call itself a Jonas e'Zine Distribution Site. Happy now? + Good. The only "official" site, is the World Head Quarters. You can + always get the latest issue of Jonas from Avalon, reached at (908) + 739-4274. + + Also, way way back, back a few months ago. When I released Jonas Numero + Uno, I set one term. That term was, "this 'zine is all me! me me me me! + ha ha!" That translated to, "you can't write for it." + + I figure, I've been doing Jonas for 10 months now. The last few months, + I've recieved nearly nill as far as submissions go. Belial, aka Marc + Newman, is one of the only ones who actually has been writing anything for + me. So, this 'Zine is basically going to be "me, and my close knit group + of friends." If I like you, and you have something intellegent to write, + maybe I'll publish it. + + Hey, I've done the last 3 or 4 issues with little outside help, and I've + done fine with it. So, why not continue it. :) + + Lastly, I've jumped the ship, and become "Internet-trendy." Yes, I've + joined the millions of people who "web-surf", and put up my own. + Actually, I put up three of my own. Just a simple index page ("The + Unofficial Homepage of Tom Sullivan"), the official Jonas page, and an + unofficial homepage for WHTG-FM, located here in senic New Jersey. Check + the index page at: http://www.cybercomm.net/~edi/homepage.html, and you + can reach all the pages. + + Have a good day. + + -------------------------------------------------------------------------- + + Jonas contact information located at the end of this file. + + -------------------------------------------------------------------------- + (2) - Chronology of the Communications Decency Act - Edicius + + Here's a timeline of events for those of you who aren't fully familar with + the history of this very objectional bill. + + Taken from the "Campaign to Stop the Unconstitutional Communcations + Decency Act", put out by the Voters Telecommunications Watch (vtw@vtw.org) + + Feb. 1, 1995 - S314 introducted by Senator Exon (D-NE) and Gorton (R-WA). + + Feb. 1, 1995 - S314 referred to the Senate Commerce committe. + + Feb. 21, 1995 - HR1004 introduced by Rep. Johnson (D-SD). + + Feb. 21, 1995 - HR1004 referred to the House Commerce and Judiciary + committees. + + Mar. 23, 1995 - S314 amended and attached to the telecommunications reform + bill by Senator Gorton (R-WA). Language provides some provider + protection, but continues to infringe upon email privacy and free speech. + + Apr. 7, 1995 - Senator Leahy (D-VT) introduces S714, an alternative to + the Exon/Gorton bill, which commissions the Department of Justice to study + the problem to see if additional legislation (such as the CDA) is + neccassary. + + May 24, 1995 - The House Telecomm Reform bill (HR1555) leaves committe in + the House with the Leahy alternative attached to it, thanks to Rep. Ron + Klink of (D-PA). The Communications Decency Act is not attached to it. + + Jun. 14, 1995 - The Senate passes the CDA as attached to the Telecomm + reform bill (S652) by a vote of 84-16. The Leahy bill (S714) is not + passed, but is supported by 16 Senators who understand the Internet. + + Jun. 21, 1995 - Several prominent House members publicly announce their + opposition to the CDA, including Rep. Newt Gingrich (R-GA), Rep. Chris Cox + (R-CA), and Rep. Ron Wyden (D-OR). + + Jun. 30, 1995 - Cox and Wyden introduce the "Internet Freedom and Family + Empowerment Act" (HR1978) as an alternative to the CDA. + + Aug. 4, 1995 - House votes 421 - 4 to attach HR1978 to Telecommunications + Reform bill (HR1555) + + Aug. 4, 1995 - House votes to attach Managers Amendment (which contains + new crimincal penalties for speech online) to Telecommunications Reform + bill (HR1555). + + Aug. 4, 1995 - House passes HR1555 which goes into conference with S652. + + Sep. 26, 1995 - Sen. Russ Feingold urges committee members to drop + Managers Amendment and the CDA from the Telecommunications Deregulation + bill. + + Dec. 7, 1995 - The House half of the Telecomm conference committee votes + the "indecency" standard for online speech into the Telecomm Deregulation + Bill. + + Jan. 31, 1996 - The House and Senate prepare to signoff on the conference + report for the Telecomm bill and rush a vote to the floor. + + Feb. 1, 1996 - Telecommunications Deregulation bill overwhelmingly passes + the House 414 - 16, and passes the Senate 91 - 5. + + -------------------------------------------------------------------------- + (3) Violation of our guarenteed rights. - Edicius + + [See endnotes for additional information.] + + "Whoever -- in interstate or foreign communications, by means of a + telecommunications device knowingly .. makes, creates, or solicits, and + initiates the transmission of, any comment, request, suggestion, + proposal, image, or other communication which is obscene, lewd, + lascivious, filthy, or indecent, with intent to annoy, abuse, threaten, + or harass an other person .. shall be fined .. or imprisoned not more + than two years, or both .. " -- Section 502 (1) (a) + + If a group of breast cancer patients were not allowed to discuss their + cases with each other, would we not be mad? + + If we were not allowed to view such works as Michelangelo's Sistine Chapel + paintings, would we not be outraged? + + With the passage of the telecommunications "reform" legislation + overwhelmingly passed by Congress and signed last week by President + Clinton, these things, and more, are now described as "indecent" material + for online viewing. + + Our elected officials have gone out of their way to pass the most sweeping + U.S. telecommunications bill in over 60 years, and have violated our + Constitutional rights in the new medium of computer networking. This bill + contains a very vague and broad definition of what speech is unacceptable + online, criminal prosecution, and large monetary fines, which will set off + a tidal wave of censorship to avoid real and perceived liability. + + Internet providers will be forced to snoop and censor what their users do + while online, so they themselves will not face criminal prosecution. + Major corporations that have been started in the fields of Internet + service and online publishing, which have invested large amounts of money + into our economy, now face an Economic uncertainty. This will lead to the + closure of many of these buisinesses. + + The telecommunications bill encourages states to define their own + indecency laws. This legislation will lead to a legal tangle in the + courts, with contradictory local regulations enforced from afar against + providers and users in other areas. What's legal in New Jersey, may not + be legal in New York. + + In the future, other media will be affected by this as well. With the + expanse of newspaper, television, and radio, into the online communication + field, it will become expensive to create a censored version for the + online part, and a regular version. Hence, this will lead to a + combonation of the two, and a single, censored, version on all fields. + + Because of the broad definition of "indecent", the King James Bible could + be censored for the repeated use of the word "piss" (Kings II), a word + already defined by the Supreme Court as indecent. A "Schindler's List" + web site would earn an Internet service provider prison time. Anything + featuring nudity, in any context, including breast cancer information or + photos of Michelangeolo's Sistine Chapel paintings, could result in the + poster of the information facing large fines. We face a very bleak + future, when indecency applies to items of artistic talent, social value, + or medical necessity. + + Part of this bill also targets prank telephone calls. Section 502 (1) (d) + states, + + "Whoever -- makes repeated telephone calls or repeatedly initiates + communication with a telecommunications device, during which + conversation or communication ensues, soley to harass any person at the + called number or who recieves the communication; shall be fined under + title 18 .. or imprisoned not more than two years, or both." + + Is the Internet not covered by our First Amendment right? Do Internet + users not have the same rights as a person walking into a bookstore? Does + the government have the right to pass laws without having one public + hearing to hear what we, as American Citizens, have to say? + + Many civil liberties groups have already said no to this bill, and are + preparing a massive legal challenge to this bill. It is neccasary to + protect what we, as American Citizens, are guarenteed in the First + Amendment: The Freedom of Speech, Press, Association, Religion, and + Petition. + + ---------- + + Luckily, over the last few days, there has been a turn in the case. For + the best of Internet users. U.S. District Judge Ronald L. Buckwalter + ruled in Philadelphia on Thursday, February 15, that until further notice, + the government cannot enforce the "indecency" clause in the + Telecommunications Reform Bill. + + He says the government must come up with a definition of indecency. His + research indicates that the Supreme Court never defined the word, which + leaves many people wondering what is forbidden, and what is allowed. + + He also is hearing the cases of the ACLU, and 19 other groups who filed + suit against this bill the days after President Clinton signed it into + law. + + In my local area, a case has been brought to light over the last few days. + A woman living in the town of Long Branch, NJ, started recieving letters + from men wanting to have sex with her. + + Stephany Willman, 41, believes that her ex-boyfriend, who now lives in + Florida, scanned and posted nude pictures of her to "several erotic + newsgroups." The pictures also included her address, and asked that + lonely men write her. + + A South-Florida Internet provider, Icanet, has suspended the account of + the poster of the pictures. It is not known whether or not her + ex-boyfriend is using the account, but it is suspected. Icanet presidet, + Bob Hurwitz said, "I caught him doing it again, and we put a cancel on his + postings immediately." + + A man claiming to be Willman's ex-boyfriend called a local newspaper, the + Asbury Park Press (who have been covering this story) and said, "I want to + contact Bob Hurwitz and do anything I can to get Stephany's pictures off + the Internet. I'm not a computer whiz and I'm not the horrible person + everybody thinks I am." + + Of the 3 pictures posted, only one was nude. The other two were pictures + of Stephany in a bikini. + + Police say that a harrassment case against Willman's ex-boyfriend remains + open, but they will not pursue the case. It would be impossible to get + the main from Florida to New Jersey for a disorderly charge. If enough + evidence is found to prove that he really posted the pictures, then + Florida Police would have to handle the case. + + I swear, this whole "computer" thing gets stranger by the day. + + Notes: + + (1) Portions of this article were printed in the _Asbury Park Press_ on + February 13, 1996. + + (2) Some portions of this article were taken from "EFF Statement on 1996 + Telecommunications Regulation Bill", released February 1, 1996. + + -------------------------------------------------------------------------- + (4) "Oh, sorry." - Edicius + + "Here's your fucking coffee, asshole," said the greasy haired fifteen + year-old to the customer. + + "What was that you said, boy?" + + "I said, 'HERE IS YOUR FUCKING COFFEE, ASSHOLE.'" + + "Why'd you say that?" + + "Because people like you come in here all day, look down on me like you're + better or something, order a eggs and coffee, and leave a nickel tip. + Then you go home, for a rousing day of looking through the classifieds for + a new job, and new parts to your '78 Ford sitting on the cynderblocks on + your front lawn." + + "Oh, ok. Got anymore half and half?" + + Startled, the boy said, "Uhm.. Yeah, in the back. I'll get you some. + "Wait, you're not mad for what I said to you?" + + "Nope. Not at all. I'm used to it." + + "Used to it?" + + "Yeah. I'm James Exon, a senator from Nebraska. You wouldn't believe how + many people yell at me all day, all for this stupid Telecommunications + Bill. If I hurt you by my part in it, I'm sorry. I just had to get back + at those assholes on Compuserve. If they won't let me post naked pictures + of myself, no one can." + + "Uh. Ok. I'm gonna go cleanup in the kitchen now, nice meeting you." + + -------------------------------------------------------------------------- + (5) - Edicius + + In the past, I never really got down about Valentine's Day. The last few + days, however, I have gotten down about it, and alot of things. Being + that it's Valentine's Day and all, I figure I'll rant about love this + issue. It's always a fun topic to talk about, right? + + I never had a girlfriend, I've never been out on a date. I have liked + people, but I really like a girl right now. But its confusing. I've been + told by some that she isn't right for me, that she wouldn't even go out + with me. But I think she is right for me, I think she's pretty, I think + she has a good personality, but I do see the flaws in her. Maybe I'm + blind to certain things, maybe its just something deep-rooted in my mind + where I think I need to like someone to be normal, maybe I'd be considered + gay if I didn't like a girl at 16 ... + + Then again, I never really threw out the idea of being gay. + + I find that many guys, especially around my age, are very homophobic. So, + I play with this trait in them. I make passes at them, jokingly of + course, and make jokes about bestiality and incest. But there is a point + where I crossed the joking phase. I said to a friend recently, "I'm gay," + and then continued the conversation without a grin or anything. It seems + so casual to say it. Why not just bypass the whole girl phase, and just + go gay. Better yet, I'll just remain single for my life. + + Back to the girl I like. + + I've been told I should ask her out, but I never get the nerve to. Maybe + if I really, truely, liked her, then maybe I would ask her out. But I + have doubts at time. I never had a girlfriend yet, but right now I'm + looking for the perfect girl to go out with. So, sometimes I think that + maybe the whole reason I like her is because I don't like anyone else, and + she's the only one who I have a remote liking to, and it just becomes that + much bigger because of it. (Did you follow me there?) + + .. and that all goes back to the deep-rooted feelings about being gay and + things like that. + + I want to find a girl that I can have a deep love with. Not someone who's + love is superficial, but someone who is intellectual & funny, not to + mention pretty. It's the typical thing a guy looks for. I'm not looking + for sex. I wouldn't mind it, but that's still way back in my mind. + + I never experienced "love" first hand, so I may go on like a flaming + hyprocitical idiot. I see people and how they profess their "love" and + how great it is, but then a time comes and they break up, and then see how + silly & fake their "love" was. + + Sometimes I feel alienated and different because I never felt love. I + never felt the emotions that come with it, be it happiness or sadness. + I'm most happy that I've never experienced the sadness that goes along + with love, but I don't think I've ever truely been happy. + + I've been happy, but there just seems to be an intoxicating happiness that + accompanies love. It's just a different type of happiness, that you can't + reach without love .. + + .. or so it seems. + + As I said, I've never really felt love. + + I made a vow to myself, to ask the girl that I really like right now out + by the end of the school year. "Babysteps", just like Bill Murrary said + in _What About Bob?_. So, within the next few months, I will, or will + not, have a girlfriend. Whether or not I have one, I at least asked her + out. + + Wish me luck. :) + + -------------------------------------------------------------------------- + (6) Particle man vs. Universe man: The Great Debate - Edicius + + Recently, on the They Might Be Giants mailing list, a very important + question was raise: who would win in a fight between Particle Man and + Universe Man. (Two characters in the TMBG song, "Particle Man.") + + Now, you must consider all sides of this great debate. Let's analyze the + lyrics, and find the deeper meaning: + + Universe man, Universe man / Size of the entire universe man / usually + kind to smaller man / Universe man + + Now, according to this, Universe man is the size of the entire universe + and he is kind to smaller men. Knowing that, Particle Man must be smaller + then him and Universe man must be nice to him. Does that mean that + Universe man is instantly nice to him, and Particle man wins by default? + + .. or do they fight? In this case, let's look into the fight a bit. + + Universe man is big, he's the entire universe. The universe is infinate. + Does that mean that Universe man's size is neverending? Then where is he? + Is he above us? or below us? Are we him? Are we _on_ him? + + Particle man is small, but he might have the speed, but we're not sure. + Back to the lyrics, + + Particle man, particle man / Doing the things a particle can / What's + he like? / It's not important + + They never tell us what he can do, but he should be fast. He's small and + compact, like a particle. So, let's say he's fast. + + Now, we have the universe, versus a miniscule particle. Albeit, a fast + particle. I'd put my money on Universe man here. I mean, he is really + big, a gajillion times the size of Particle man. His reach must be + amazing. He could stand really far back, and never get touched by + Particle man. Alittle lobsided. The Vegas bookmakers would put this in + favor of Universe man. + + But, there is one chance for Particle man. What if he catches Universe + man while he's in happy land. Back to the lyrics, + + Universe man / He's got a watch with a minute hand, / millennium hand + and an eon hand / when they meet it's a happy land. + + We don't know how often he's in happy land, because we don't know how + often the minute, millennium, and eon hands all coincide. There still is + that chance that Particle man could come up with an upset. Buster Douglas + did it! + + But wait, what if we turn this into a tag team match? Triangle man and + Person man could team up with Particle man. + + Maybe, maybe not. + + Triangle man / Triangle man / Triangle man hates particle man / They + have a fight / Triangle wins / Triangle man + + Triangle is stronger then Particle man, so that's an advantage for the + Particle man/Triangle man combonation, but there's one key element that + we're missing here: cooporation! "Triangle man hates particle man." They + can't get along. Too much friction! + + What about Person man? + + Triangle man / Triangle man / Triangle man hates person man / They have + a fight / triangle wins / triangle man + + After this fight, that puts Person man on or about the same level as + Particle man. They both lost in a fight to Triangle man, and they both + must be bitter about it. They could team up! + + No they couldn't. Person man is a very bitter man. + + Person man, person man / hit on the head with a frying pan / lives his + life in a garbage can / Person man / is he depressed or is he a mess? / + does he feel totally worthless / who came up with Person man? / + degraded man, person man + + Person man is too bitter at life to team up with anyone. Look, first, + he's hit in the head with a fuckin' frying pan. I don't know about you, + but I'd be a tad pissed about that. Then, he lives in a garbage can! I + mean, we're not talking about Oscar the Grouch here, he's really living in + a garbage can here. + + Conclusion - + + Particle man could fight Universe man, but he'd get his ass kicked. With + no help of joining forces, there's really no hope for Particle man. Pity + him. + + Triangle man fighting Universe man? Well, I'd still put my money on + Universe man here. He's just huge. + + -------------------------------------------------------------------------- + (7) Reviews! + + eZINE: E-Weezer - Volume 2, Edition 5 + + Now this is the ultimate in 'Zines for the Weezer fanatic, like myself. + Every issue, a new one comes out almost every week, is packed with the + newest in information about Weezer, and related bands. Including, The + Rentals, That Dog, Space Twins, Spain, and 9 Iron. + + This issue, released February 15th, has a review of That Dog's concert at + Whiskey A Go-Go in Hollywood. It also introduces and gives information + about Space Twins (Brian Bell from Weezer's side project), Spain (Petra + and Rachel Haden from That Dog's brother's band :)), and 9 Iron (The side + project of Tony Maxwell from That Dog). There is also a good article + about bootlegging of concerts. + + They even mention Jonas in this issue, too. :) + + I highly suggest that you check this 'Zine out, it really has alot of + information. Tour dates, rumors, concert updates, everything you possibly + need to know about Weezer and related bands. + + To subscribe, send email to SPBumholio@aol.com, or check out the web site + at http://members.aol.com/WeezerDGB/eweezer.htm + + ---------- + + eZINE: I Want To Be a Rock and Roll Star - Issue 19 + + This e'Zine is the side project of Jen Jurgens (aka BlackPope7), the + editor of Moderate Rock E'Zine (see review in Jonas 14). This 'Zine comes + out between issues of ModRock, and is very good. + + This issue contains a very interesting comparision of television to music. + Her article, "Why Rock Music Is Like Television" compares the Fox Network, + to bands like Bush, Offspring, and "The Presidents of the United States of + Bands With Too Many Words in Them For Anyone to Say Their Name Without + Being Forced to Take 3 or 4 Breaths." CBS = Classic Rock? The list goes + on and on. Amazing, eerie coincidences between music and televsion! + + Remember Alf? I'm sure you do. Did you ever stop and think exactly what + Alf meant to us? What he taught us? If you didn't, you'll learn now. + Alf taught us alot, and Jen tells us exactly what it is he taught. + + This 'Zine, coupled with Moderate Rock E'Zine, is one of my favorite + 'Zines that I read regularly. Jen puts alot of work in this, and has a + very unique style of writing. This 'Zine is a must read. + + To subscribe, send email to Modrock@intele.net. + + ------------------------------------------------------------------------- + (7) The End + + I hope you enjoyed this issue. Please send all comments, be it good or + bad, to edi@cybercomm.net. Pass the word of Jonas around, I'll love you + for it. + + Oh, also, the next issue of Jonas will be coming out on April 1. Yes, I'm + totally skipping March. In 42 days, there will be a new issue. The + reason for this is simple: April 1 is the one year anniversary for Jonas. + Yes, that's right. For one whole year, I've been geeking out on this damn + computer, improving my writing, and bringing Jonas to you. + + I could rush, make a quick issue, and then do the big one year + anniversary issue. Then the big one year anniversary issue would become a + "not-so big one year anniversary issue." + + God, who would have thought? A year ago, I put out 4 issues in 8 days. + Now, I can't do 2 issues in 42 days. :) + + I will be emailling and contacting alot of different people for special + things I'm doing for the next issue. I will (hopefully) have a really big + surprise in the next issue. Just wait, you'll be happy. + + I'll stop the tangent here. I'll see you in 42 days. I'll be a stronger + and wiser man. I'm going to see Spacehog in a week! I hope you enjoyed + this issue. Have a great day. See you April 1st. + + -------------------------------------------------------------------------- + + Jonas E'Zine Issue 15 + Send all inquiries to edi@cybercomm.net + Visit the Jonas Website at http://www.cybercomm.net/~edi/jonas.html + Finger Edicius at edi@raven.cybercomm.net + Jonas, Slinky, and alot of radness - Avalon (908) 739/4274 + Thanks to Belial and everyone who has supported Jonas over time. + + "Jonas. It's more then a 'Zine, it's a lifestyle." + + + -------------------------------------------------------------------------- + diff --git a/textfiles.com/magazines/JONAS/jonas_16.txt b/textfiles.com/magazines/JONAS/jonas_16.txt new file mode 100644 index 00000000..58143fc0 --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_16.txt @@ -0,0 +1,556 @@ + + ____ + | |________________________ __ + | | | | | | | | + ___| | | | | | | | | | | | + | | | | | | |__| | | | | | + | | | | | | | | |__| | | + | | | | | | | | |___ | | | + | | | | | | | | | | | | | + | | | | | | | | | | | | | + | | | | | | | | | | | |__| + | | | | | | | | | | | __ + |_____|_____|__| |_____|_____| |__| + ----------------------------------|__|-------------------------(gh/cia)--- + + Jonas E'Zine -- Volume 2, Number 1 -- Released April 2, 1996 + Jonas is produced semi-regularly by Edicius (Tom Sullivan). Jonas + and the material therein are property of Edicius and Jonas Print Matter + Incorporated. Jonas may be freely distributed as long as this notice + remains in place, and there is no fee charged for its retrevial. + + Deep in my heart, I do believe / We're not gonna make it + No, no, we're not gonna to make it / Cuz' we don't have the talent + And we don't have the time / And we don't have the patience + And we don't know how to rhyme + Presidents of the USA - "We're Not Going To Make It" + + -------------------------------------------------------------------------- + Jonas E'Zine Volume 2, Issue 1 April 2, 1996 + + Contents: + + (1) - Edicius' Editorial + (2) - "Contentment" - by Cerkit + (3) - What Do You Think of Jonas? + (4) - Don Imus and the Political Barrier - by Edicius + (5) - "Salt Shaker Psycosis" - by Cerkit + (6) - "Barney and Friends" - by Edicius + (7) - Reviews: Edicius' Opinions on EVERYTHING! + (8) - Closing Notes + + -------------------------------------------------------------------------- + (1) Edicius' Editorial + + If you were to pick one particular year out of anyone's life, and examine + it, you would notice many changes in that person. These changes in their + personality effect everything and everyone around them. Everyone changes, + but many won't realize it. + + Over the last year, I have changed alot. I have had many new experiences, + as everyone has had, and I've learned alot about life and myself. I've + learned things I can do, things I can't do. Many won't realize that they + have changed, or refuse to admit it. I am one of the fortunate, or + unfortunate, however you see it, to have my last year pretty thoroughly + documentated. + + In a way, I have kept a diary of the last 366 days. The diary's name is + Jonas. As I look through the beginning stages of the 'zine, where I was + still new to the 'zine thing, and writing in general, I see a very scared + person. I admit it, during the first phase I was scared, as anyone would + be. I didn't know how I would do, where this would take me, or what + people would think of me. + + Then, I see a place where I liked what I was doing, and felt comfortable + with it, and my writing changes. Originally, the sole intent of this + 'zine was to be "the lamest thing ever created in 5 hours." (5 hours, for + your information, is the time it took me to think up the concept of Jonas, + write all the articles, and release issue one.) I wasn't happy with how + that was going, however. I was getting rave reviews, I had a large + audience, but it was for being dumb. I was writing in a stupid and sloppy + manner, and it sold. + + I knew, however, in all of the realative success that I was achieving with + that style, that I could accomplish much more. I made a few subtle + changes here and there, being more selective about the articles I took, + changing the format, and other small things. Then one day, after issue + 11, I totally changed the format, from programmed to ascii text. I also + changed the theme of it, from wacky and insane, to a more serious style. + + I changed alot in that time. I grew surer in myself. I started to + straighten out the things in my life that were going a wry. I saw the + rough outline of my future, and I knew what I wanted to do. What I have + done with Jonas is what I've wanted to do for along time. + + I've been thinking alot lately. I spend hours upon hours on the computer. + Hours and days pass by without my noticing at times. If it weren't for + my health, I might never sleep. I feel "dorky" because a good majority of + my friends that I hang out with are people I've met over the computer. I + feel like I'm doing this for nothing. + + Then, I think again. I realize that right now in my life, everything is + stable. I wish that things were going alittle better, but I can't + complain about one thing. School is going fine, I've brought my grades up + to a point where they are comendable. I have a group of my close friends + that I talk to almost every day, and hang out with quite often. My family + is great. I have my health. What do I have to complain about? The + computer thing? Meeting people over the computer is just like meeting + them over any other medium. + + You do what you feel most comfortable doing. If you are most comfortable + with a keyboard under your hands, so be it. If you are comfortable + walking around Midtown Manhattan with a tarzan outfit on, so be it. + + My point for the whole long winded editorial will be summed up here: + + The last year, I have gone through many changes, as everyone has. Jonas + has been there with me, and has changed alongside of me. I am very happy + with how everything is going right now. + + That editorial made very little sense? Well, what else have you come to + expect of Jonas? :) + + I would like to take a second out and thank the following people. Over + the last 366 days, many people have done many things for Jonas. They may + have written an article, or drawn a piece of artwork for it, but above + all, all of these people were there for Jonas and supported. They may + have supported it from Jonas' meager beginnings, or have only read one or + two issues, but show a current support of the 'zine.. To these people, I + extend my greatest thanks: + + Ace Lightning, Akira, Asphixia, Basehead, Belial, Black Francis, + Briangeek, Cerebral Neurosis, Cerkit, Christopher Robin, Cidica, Crank, + Creed, Crimson Tide, Daniel from e-weezer, Dark Phiber, Defective Mind, + Diehard, Eerie, Epidemic, Errant Angel, Fake Scorpion, Flood, Frost Byte, + Grey Hawk, Grimjack, Hooch, Ilsundal, Inner Chaos, James Hetfield, Jen + from Mod Rock, Jestapher, Kurdt, Lord Valgamon, Lucifer, The Masked + Marauder, Meep, Mercuri, Metal Chick, Mindcrime, Misfit, Mistawho, Mister + E., Mogel, Mojo, Morpheus, Murmur, Napalm, Nebula, Pale, Pip the Angry + Youth, Radigan, RaD MaN, Rattle, Chris Rake, sCandal, Shadow Tao, Shakti, + Spiff, Subconscious, SuperDave, Terminal Velocity, The Blunted One, The + Master, Time Killer, Traq, Trip, ts, Tut, Twisted Terrorist, Jon Vena, + vYrus, Whoops, Wizard of Id.. . + + .. and thanks to the following 'zines who show that people use the + computer to write about more then just erotic dreams.. These are a few of + the current 'zines that I read regularly and enjoy, to varing extents: + + Chemical Chocolate, Cooler Then You, Cult of the Dead Cow, Doomed To + Obscurity, Dreaming in Digital, e-weezer, Flashbyte, Fucked Up College + Kids, I Want To Be a Rock and Roll Star, Grill, Klunk, The Last Word, + Moderate Rock e'Zine, Phone Losers of America, Pork, Radioactive Aardvark + Dung, Relish, Slinky, Teenage Young Minds Expand, Underground eXperts + United, y0lk.. . + + Thank you for taking the time out to read Jonas. If this is the first + time you've read Jonas, or the 16th, we thank you just the same. + + "Jonas is more then a 'zine, its a lifestyle." + + ----- + + Update on past stories: + + In Jonas 15, in the article entitled "Against the Communications Decency + Act", I reporetd on a local story involving a woman who had her picture + posted to several alt.binaries newsgroups. The picture also had her + address, and asked men to write her. The latest news available on this + story is that her ex-boyfriend is still being investigated in connection + with this act. The interesting sidenote, however, is that her + ex-boyfriend that is being investigated turns out to be Bruce + Springsteen's brother-in-law. + + Mr. Springsteen declined to comment to Jonas about this case. + + About my Valentine's Day rant that appeared in the last issue of Jonas: + several readers offered their suggestions as to what I should do, mainly + they told me I should ask the girl I wanted out. I did, she said yes, and + two days before our date, she changed her mind. + + Love sucks. + + Oh, and I have a special news annoucement. LISTEN UP CHAPS; + + This is the last issue of Jonas. I'm not killing Jonas, but I am + continuing it under a different name, after some major changes. Namely, + we're merging with Slinky e'Zine. Sometime during May, the new e'Zine, + currently titled "Legacy", will be released. We will provide you with all + of the things you loved about Jonas and Slinky wrapped up into one big + issue, taken to the next level. We are the future of e'Zines. + + Dang, I never got to print up the Jonas t-shirts. + + If you wish to learn more about this, email me.. (MY EMAIL ADDRESS IS AT + THE BOTTOM OF THIS FILE, OK?) + + Have a good day, + Edicius. + + "We have found a common cause, and it's your money." + -- Johnny Rotten, of the Sex Pistols on why they decided + to reunite for a 20th-anniversary tour. + + -------------------------------------------------------------------------- + (2) "Contentment" - Cerkit + + contentment, qualifies, + in my life as a surprise. + + happiness, reigns + in my life as the thing that bring me pains. + + smiles, become + in my life, the things i consider dumb. + + frowns, become + in my life, what make me numb. + + depression, reigns + in my life, without retrains. + + discontent, qualifies, + in my life, made of lies. + + -------------------------------------------------------------------------- + (3) What do you think of Jonas? + + I spent a few days, and emailed a cross-section of the Jonas subscription + list. I emailed people that I know have been reading it since day one, + and I emailed people who have been reading it for the last day. I wanted + a good representation of my readers. Here are the replies that I got to + the question I posed: What do you think of Jonas? + + These are all of the replies that I got. I did not leave any one out + because I didn't like it. I wanted the truth, no (apperent) fluff. + Editing was only done for spelling and clarity sakes. + + ----- + + jonas e'zine has gone through so many changes since it's original + inception, it blows my mind. originally started as a lame e'zine for the + PURPOSE of being a lame e'zine, it was immediatly brought to me by my + friend spiff, & i noticed it's difference from all other products in the + stupid-ass "ansi 'zine" genre. over time, edicius has shown to be a + better writer more with every issue of jonas, & i mean that sincerly. + today's version of what was jonas has a wonderful & a very professional + look as compared to most text-based e'zines. the writing is serious, has + a lot to think about, & basically has a lot of meat to it. totally a flip + of what it used to be. i think today's jonas lacks a bit of the wit that + i miss from the old jonas, however, what it has gained towers above what + it's lost. perhaps this is a reflection of the changes that have happened + in edicius himself, & it's just related to the 'zine. that's where i'd + put my money. + + -- Mogel [Doomed To Obscurity Editor] + + ----- + + i think jonas is particularly different in its style & approach. not + better, just different. it's rather in my view a 'zine filled with your + own belief's, and is rather opinionated. however, since i do have + curiosities about how people view certain things in the world, i find + jonas to be a good read. though, its definetly not a 'zine i read for + entertainment. i read jonas to get the facts, and views of one tom + sullivan. period. + + -- Cerkit [Slinky Editor] + + ------ + + i've been reading jonas ever since issue one (as far as actual time, i + started reading jonas when you were on #5). anyway, jonas is like a + home-grown zine. when i read dto, it lacks the basic element of, "hey, im + here, i have nothing to do, blah." + + this isn't necessarily bad, mind you, but sometimes i miss it. jonas has + that element, which makes it "direct" and "human" or whatever. plus you + admitted to masturbating, which makes jonas an institution in itself. + + you've got GUTS man. + + -- Fake Scorpion [Doomed To Obscurity Writer] + + ------ + + Jonas, very simply put, **is** the meat. + + -- Jon Vena [WHTG-FM Promotions Director] + + ------ + + I have read jonas since the begining .. I have seen it go coded, to text + format. I liked it when it was wacky as hell (ie: issues like 1-10) maybe + even more .. but the new format Jonas has taken on (ie: serious, less + wackyness) is better for the zine.. more people will read and respect it.. + (many people already do ) I like a 'zine thats wacky, but doesn't exceed + the wackyness point of extreme.. + + -- Lucifer [Ganja Writer] + + ------------------------------------------------------------------------- + (4) Don Imus and the Political Barrier - Edicius + + At the annual White House Radio and TV Correspondent's Dinner, they invite + a speaker to poke fun at the current political stories. Nothing has ever + happened much like it did at this year's dinner, with guest speaker, + syndicated Shock Jock, Don Imus. Imus is also known as being a very good + political interviewer, with guests such as Bob Dole, Bill Bradley, and Dan + Rather appearing on his show. + + The correspondent's association, who invite the speaker to the dinner, + expects the speaker to poke mild fun at the president and policital + parties. Generally, they want him to lighten the mood. Imus, however, + took this as the opportunity past the line of decency. He was quoted as + saying, "When the First Lady laughed at my opening, I thought I was home + free." + + Telling jokes concerning Clinton's alleged extramarital affairs, Senator + Bob Kerrey's artifical leg, and Newt Gingrich's gay half-sister, brought + more stone faces then applause as the night wore on. + + When you are invited to speak for an event of this caliber, you generally + restrain yourself out of respect. You can say that Imus showed that he + was not afraid of anything by saying this in front of the President and + First Lady. However, when they are the hosts of the event, you show them + some courtesy and respect. + + Imus' did not feel he did anything wrong by saying, "Did they expect me to + say one thing on the radio and then go to Washington and be a weasel?" + This is true, to an extent. You can say that the correspondent's pool + should have expected this from him, but they also could have expected him + to be somewhat more respectable. The shock jock genre is nothing new, but + no person has discussed the First Lady's menstraul cycle at a formal + Washington dinner. + + Bob Dole, one who has been so open about his disregard for Hollywood's + culture problems, is a regular on Imus' show. This is a show in which the + material presented is normally the same type of material that he is + against. + + Hypocritical? + + Maybe. Imus is considered a popularity booster in Washington. Many + believe that an appearence on his show will raise your standing, make you + known, and possibly get you elected. This would explain why some aren't + angry at Imus for his remarks. + + .. either that, or they are just afraid of him. Imus is a very + intimidating man. He has been known to go off on people who disagree with + his views. When a Washington Post critic wrote a negative review of his + show, he was called a "homo" and a "Jew" for weeks on air. + + The bottom line in this -- no matter what happens, Imus has his style. + Whether or not people should have expected this beforehand can be debated. + We do know one thing, this is the way Imus is, and this is the way he will + continue to be. No amount of talk or negative press will change him. It + hasn't done it yet, and won't do it in the future. + + ------------------------------------------------------------------------- + (5) "Salt Shaker Psychosis" - Cerkit + + The constant drama played on. A darkness all around. Loud bangings. A + varitable utopia of opposing angry chants. A gaped grace & grassland + causing flaring. Deathly ill among the peasants, a sort of chill arose + them. A chill called pain. It shivered up and down their spines, and + destoryed every part of their souls. A nearly dominant figure stood tall, + within this and by those means kept monarchy over the shadowy inner + workings. Contemplating a template of output within what was considered + compliance to the very questioning of his existence. An "oh-so-good" + pleasure filled evening, filling what would be his next nights dream. + + A lacey spirit undressing for his soul to implicate in his path of + conquests. A rather serious joke. Coincidently overriding his mind's + protection, and removing all that was his memories of frowns and + depression so much so he was happy forever. This spirit filled his own. a + worthless and useless existence no less from what was once, a life, a point + & happiness. A pounding so thunderous the heavens sprawled apart like + unvirgin legs, to cast a shadow over the sleepings & restings of closed + eyes. + + The man awoke and turned the faucet off & went back to bed. + + -------------------------------------------------------------------------- + (6) Mischief on the Barney Set - by; Edicius + + Barney & Kids (in unison): .. you love me, and we're a happy fam-i-ly. + Barney (thinking out loud): My my, Wendy, you look + umh-scrumindly-dumscious in your denim skirt + today! + Wendy: Uh, aren't we supposed to play make believe + police officer now? + Barney: I think we'll play make believe doctor now! + Director (offstage): Oh shit, he's going for the kid again. + + Barney lunges toward Wendy, missing only slightly. + + Barney: Why are you running away from me Wendy? Are + you intimidated by my jurrasic size? + Wendy (screaming): Help! Help! Mommie! Daddie! + Other Kid #1: Wendy, towards the treehouse! Go to + neverland, he'll never get you in there! + Stagehand (offstage): Mr. Director, I have the tranquilizer gun. + Just tell me when to shoot. + Director (moving onstage): Shoot when you have a clear shot. Don't + worry about the kids, we're not paying them + much. Just shoot the jurrassic asshole in + the groin. + Wendy: Get off me! He's slobbering! Help! + + Barney takes off his mask, revealing a grotesque and hairy man of about + thirty-five. + + Director: Get off of her Barney! We'll send you back + to prison. You remember the shower incedent, + don't you? Do you want that to happen again? + Barney: Just one kiss, that's all. Owch! + + He is hit by the director, who lands a clean blow to the muppet-filled + temple. The stage hand readies himself with the gun just offstage. + + Director: Shoot, you fuckin' intern! Shoot! + + The stage hand shoots, and a dart whizzes through the air. + + Wendy: Ouuh.. Barney.. Ouuh.. + Barney: OUCH. MOTHERFUCKER. THAT FUC- (Ploop) + + Barney drops to the floor, passed out. + + Director: Thank god this wasn't a live broadcast! + Producer: Actually, the people from the National + Endowment of the Arts are here. I think we + just lost our funding. + Director: Doh! What else can go wrong? + Stage hand: I think Wendy is tramautized; or she just + experienced her first orgasm. + + -------------------------------------------------------------------------- + (7) Reviews: Edicius' Opinions on everything! + + CONCERT: + + Spacehog / God Lives Underwater / Mr. Mirainga + February 25, 1996 - Birch Hill Nite Club, Old Bridge, NJ + + I haven't been to that many concerts in my life, but I have been to some + pretty good ones. However, the show that I saw here was undoubtly one of + the best that I have ever been to. For seven bucks, Spacehog, imported + from England via the East Village of NYC, God Lives Underwater, and Mr. + Mirainga with a near sellout crowd. + + Mr. Mirainga, more or less, sucked. I didn't like what I heard of them + before hand. The lead singer has a really annoying voice, but aside from + that, he seemed very irritating on stage. Music wise, the band was pretty + good. Good basslines and drum beats. For some of their songs they used a + weird contraption that consisted of two bongo drums, a cymbal, tamborine, + and a cowbell. That made for a very interesting sound when added to the + normal guitar/bass/drums you hear. + + Lyric wise, they were tried too hard to be wacky. If they didn't try so + hard to be funny, and concentrated alittle more on the lyrics, maybe they + would have been alittle better.. As the bassist said, "This next song is + pretty heavy.. It's about my grandma.. If you ever saw her, you'd know how + heavy it is." + + God Lives Underwater just plain out rocked. This Philadelphian band with + their whole techno-ey/punk style, they played a very entertaining show. + With great songs like "No More Love" and "Drag Me Down", they are a band + with a style all of their own. + + The "headliner" of the show, Spacehog, "imported from England via the East + Village" played a show just short of amazing. Playing their hits "In the + Meantime" and "Spacehog", they were a crowd favorite. Attracting a + diverse crowd which ranged from the early teens to fourties, they had + everyone moving the entire time through. + + Spacehog constantly kept the crowd excited with little "conversations" + with the crowd. Spacehog pleased them by playing an extended version of + "In The Meantime" while members of Mr. Mirainga and God Lives Underwater + looked on from the side. They also have a great stage presence. Coming + out to begin their set with feather trimmed coats, and coming out for + their encore without the jackets, but with beers in their hands. They + showed that they were there for the crowd, and the crowd wasn't there for + them. + + CD: + + Presidents of the United States of America - "Peaches" single + Columbia/Pop Llama Records + 5 tracks / 12:37 + Overall: * * * * (out of 5) + + This single features "Peaches", the radio friendly, bass driven song. But + Chris Ballew's vocals and "two-string basitar", Dave Dederer's + "three-string guitbass", and Jason Finn's "no string" drums, all come + together to form four other great songs. Three of which were previously + b-sides to other singles and 7"'s. "Confusion" appeared on the Home + Alive: the Art of Self Defense CD. + + Track by track review: + Song: Peaches - A song that has a perfect blend of fast and slow parts + with strong a strong rythym lead by great drumwork by Jason Finn. + + Song: Candy Cigarette - The bassline at the beginning of this song set the + mood for this song, right in the middle of slow and fast. It's one of + those songs that you can listen to, without getting a headache or getting + bored. + + Song: Carolyn's Bootie - A fast "poppy" tune with very humuorus lyrics. + One of my personal favorites by the Presidents. + + Song: Confusion - This is one of the few songs in which they actually use + a guitar. The screeching guitar makes this the fastest, and possibly + best, song on the CD. + + Song: Wake Up - A slower song in which Chris and Dave's vocals are more + noticable then the instruments most of the times. + + TELEVISION: + + Squirt TV + MTV, Friday @ Midnight, Sunday @ 11:30pm + + This is a talk show hosted by Jake and filmed in his room. Originally run + as a public access show on New York City's Cablevision, this was picked up + by MTV and has been airing for 5 weeks now. + + Recent guests on the show have included Clerks/Mallrats Director Kevin + Smith, Jenny McCarthy, Adam Sandler, and Liz Phair, to name a few. Great + interviews combined with great music, wrapped up in a half hour. + + Did I mention that Jake is 16 or 17 years old, too? How's that for every + teenagers' dream: having your own show on MTV while hanging out with + famous celebrities. + + -------------------------------------------------------------------------- + (8) Closing Notes - Edicius + + I thank you profusely for reading this issue. I'm happy that I got it out + on time.. + + If you are upset by my decision regarding the merger of Jonas and Slinky + e'Zines, just wait. I believe that you will really like what you get with + Legacy. May is just around the corner, so, you won't have to wait that + long. + + I've been very bored with the computer thing lately. Email me. Let's + talk, send me your websites (I love them!). We can be cyber-pen pals. + + Email me, please! edi@cybercomm.net + + Well, good day. Jonas' LEGACY shall return in May. + + -------------------------------------------------------------------------- + + Jonas e'Zine Issue Sixteen + Send all inquiries to edi@cybercomm.net + Visit the new and expanded Jonas website at: + http://www.cybercomm.net/~edi/jonas.html + Visit Belial @ Avalon, (908) 739/4274 + + Thanks to everyone who has supported Jonas over the last year. + + "Jonas, it's more then a 'zine, its a lifestyle" + + ---------------------------------- eof ----------------------------------- + diff --git a/textfiles.com/magazines/JONAS/jonas_17.txt b/textfiles.com/magazines/JONAS/jonas_17.txt new file mode 100644 index 00000000..4f6fdc59 --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_17.txt @@ -0,0 +1,691 @@ + + ____ + | |________________________ __ + | | | | | | | | + ___| | | | | | | | | | | | + | | | | | | |__| | | | | | + | | | | | | | | |__| | | + | | | | | | | | |___ | | | + | | | | | | | | | | | | | + | | | | | | | | | | | | | + | | | | | | | | | | | |__| + | | | | | | | | | | | __ + |_____|_____|__| |_____|_____| |__| + ----------------------------------|__|-------------------------(gh/cia)--- + + Jonas E'Zine -- Volume 2, Number 1 -- Released April 2, 1996 + Jonas is produced semi-regularly by Edicius (Tom Sullivan). Jonas + and the material therein are property of Edicius and Jonas Print Matter + Incorporated. Jonas may be freely distributed as long as this notice + remains in place, and there is no fee charged for its retrieval. + + You can all just kiss off into the air + Behind my back I can see them stare + They'll hurt me bad but I won't mind + They'll hurt me bad they do it all the time + Violent Femmes / "Kiss Off" + + -------------------------------------------------------------------------- + Jonas E'Zine Volume 2, Issue 2 May 3, 1996 + + Contents: + + (1) - Edicius' Editorial + (2) - Tragic Death Calls For New Regulations (Essay) / by Edicius + (3) - Supernatural Powers (Story) / By Edicius + (4) - Reviews: Edicius' Opinions on EVERYTHING! + (5) - News Snippets + + In memory - Mystery Science Theater 3000 + -------------------------------------------------------------------------- + (1) - Edicius' Editorial + + You thought Jonas was gone, didn't you? Ha ha! I tricked you! It was an + April Fools Day joke all along! Didn't you know? Silly. + + No, not really. + + If you are just tuning in, last issue I announced that Jonas and Slinky + e'zines were merging together to form Legacy e'zine. Well, due to our + unfortunate timing, things came up between the four editors, and together + we didn't really have the time/energy/means to start a new e'zine. So, + we've gone back to our respective 'zines (with Mindcrime, who was the only + one who didn't have a 'zine of his own beforehand, and had the time to + start a new one, starting a new 'zine.) + + Phew. So here it is, your beloved Jonas. + + ---------- + + As far as the newsworthy material of this month, there is hardly any, as + normal. + + We didn't merge. + + The web site (http://www.cybercomm.net/~edi/jonas.html) has been updated + and changed somewhat. I added graphics! You can read the new issues + online! Get new news about Jonas.. _AND_ you can get up to the minute + news and weather! + + (You think I'm kidding about the news and weather?) + + I am starting a new guest column in Jonas. Since some of Jonas can be + considered personal (as in a personal/diary 'zine), I want to hear from + you. Each issue I will have (or at least hope to have) a different writer + write about their life. Currently titled "How I Got This Way", each + person will pull things from their own life that they think shaped the way + they are today. + + I've been doing this with almost every issue. I am constantly relating + things from my life that made me how I am. Maybe it was the relentless + teasing that I endured through 7th and 8th grade, or the time I made an + ass out of myself in front of the whole school; everything you do, no + matter how trivial it can seem to be, shapes our life or shows a different + side of you. + + So, pick up that keyboard. Write about your life. Tell the world (well, + not the _entire_ world) about your life. Tell us about the exciting + things that happen in your daily life. Tell us about the time someone + pulled your shorts down in gym class, and you weren't wearing underwear! + Don't be afraid, I haven't. + + If you are really interested in doing this, email me. I will publish it + anonymously, if you would like. If I really see something really + fascinating about you, or I get a tremendous response to your column, I + may give you a column in every issue! Just think about that! + + To prove exactly how _easy_ it is to write something like this, I will act + as your caring guide into this amazing jungle. I figure, no one will + write for this column is I don't have the guts to do it first.. So, here + it is. I am bearing my soul for one and all... + + ---------- + + It may seem silly, but everything that I am today -- my personality and + such -- can have it's origin traced back to one day. One day changed my + life forever, and made me who I am today. This day was in seventh grade. + Let me tell you about myself first. + + I was born December 12, 1979. In grand ole' New York City. I moved to + the New Jersey shore around my first birthday. La de da, I lived in a + somewhat white trash neighborhood for my first 13 years. + + The area was good. I always had somewhere to ride my bike to. I always + favored going on long bike rides, somewhere near the beach. I had this + routine down, basically. I would ride about 2 1/2 miles to this baseball + field near a marina. I don't know what it was about it, but there was + this one peach tree. Right off of the road, next to the outfield. Maybe + it was the way the wind blew in from the water, the view, or whatever. + But that place was my utopia, my refuge. I loved that place. Sometimes I + wish I could go back there. + + Growing up, I was always one of the smarter kids. Never _the_ smartest, + but I always did good enough. A's and B's.. However, I was always the + oddball. I had relativity few friends. My habits were always different + from the other kids. I just didn't have the same interests. I didn't + like playing sports, so I would always read. I look through some of the + books that I used to read when I was in third grade, and I'm amazed. I + also really liked maps. I could tell you every state and it's capital + when I was in third grade. I read, read, and read more. + + I wasn't really fat. Just a little chunky. I rode on my bike, on average, + about 2 miles a day, sometimes as much as 6. For a 10 year old, that's + pretty good. So, because of the bike riding, I had fairly strong legs. + Nothing incredible, but enough where I looked semi decent down there. The + rest of my body is hell. Pure flab. I dress around my body, so I don't + really show. I never go without wearing a shirt. Even if it's 100 + degrees, and I'm out at a pool or the beach swimming, I wear a t shirt. + Granted, I do have very fair Irish skin, so I have an excuse. + + Anyway, since I was moderately overweight, I dreaded recess. We would + play the same game every day- kickball. What a stupid sport that was. + Maybe if I was good, I would not have minded. But I sucked. I never + could hit the ball past the "infield." If I did, I couldn't run very + fast. Damn those fuckers that made it so competitive. I would have to go + through such torment after recess because I sucked at it so much. + + For about half of the fifth grade, three other kids and myself would sit + in the corner of the playyard and play with matchbox cars. Just making + roads in the dirt, driving the cars around, and then getting teased + because we weren't playing kickball. + + I could deal with the whole school thing until about seventh grade. + Granted, I had my fair share of times when I was spit on, thrown at with + rocks, and beat up. I just don't really see the need to go into them that + much right now. Maybe at a later date. To sum up my grades school life + up to and including sixth grade- I was an outcast, nerd, dork. Not really + liked. + + Boy, if I thought I wasn't liked in those years, wait until I moved! + + When I was twelve, my parents decided that it was time for us to move. We + had been renting this small house, with rent going up and three kids + getting older, we didn't need it anymore. So, we decided to move to a + "better" neighborhood, which included changing schools. + + Luckily, the school in which I was going to, I had one of my friends in. + Well, one of the two people I could consider a friend at that point. He + had been a grade ahead of me in my old school, and failed one year, so he + was forced to repeat the year. At that school, however, if you failed + after fifth grade, you had to leave the school. So, in the long run, it + helped me there. He helped me make friends and stuff, but I killed that + after two weeks. + + Let me tell you about this school, first. I went from a fairly + conservative school, to a majorly different school. My old school had + about 40 kids in my grade, this one had 90. The kids themselves were + different, too. Kids were already having sex, smoking pot, and drinking; + in the seventh grade. Needless to say, this was all new to me. + + I wasn't warmly accepted, either. My natural shyness, combined with the + new environment and the less then warm attitudes of the kids made me really + nervous. Man, I really hated it. I wanted to go back to my old school, + really bad. + + Then it happened. The day that changed my life forever. You wouldn't + believe how one incident can change your life. This incident did. + + One day, only about two weeks into my new school, I wasn't feeling so + good. Kind of sick, and very nervous. I don't know what really happened, + I just shit myself. I was feeling a little queasy, but thought it was + something in passing. I thought that I could hold it. But it happened + anyway, right in the middle of history class. + + It was not just a small thing, this was a big thing. It stunk up the + whole wing of the school. For the new kid to do that, it was a sin. At + first, no one really knew what it was. Then, when we switched classes, + and they saw the chair that I was in, well, then they knew what happened. + The ride home from school was hell. At that time I was taking a mini-bus + to school (I hadn't moved into my new home yet), and all four kids on the + bus sat in the front, while I was in the back. + + Stage one -- Denial. I had a lot of people, obviously, come up to me and + ask me if I did. I of course denied it, and not being the creative genius + I am today, I said it was some smell coming from the radiators. Obviously, + no one bought it. All alone, by myself. Setting the precedent which + would remain to this day. + + LIFE WAS FUCKING HELL. You don't know how many nights I cried myself + sleep. I had no friends. My best friend (the one I knew prior to + switching schools) hardly talked to me for awhile. I had insults thrown + at me from every direction. But I took it. I really had nothing to say + to them. I did it, I admitted it (to myself.) I just sunk lower and lower + into my desk, and didn't talk to anyone. + + For the rest of the seventh grade year, I was insulted pretty bad. But + after awhile, they did calm down. Eight grade, I was insulted _really_ + bad. My new nickname: "Sergeant Piles." It was really abbreviated, the + genius who thought it up named me "Sergeant Piles of Shit." The wounds + just dug deeper. I still don't look at my yearbook from that school. I + cry when I read what the kids wrote it in. For all I care, they can all + rot in a big vat in hell. Fucking assholes. + + I looked forward to high school. I figured it would be a clean canvas. I + was wrong. The 30 kids from my school that went to my high school soon + told the other 90 kids about my deep dark past. The torments went on + every single day. Everything from the kids saying "Man, I gotta take a + shit" as they walked past me, to people just blatantly walking up to me + and saying "YOU CRAPPED YOUR PANTS." + + Everything really hurt. I always thought that I was the one with the + problem. I felt like the grotesque outcast. I didn't think I really + belonged anymore. On several occasions I came very close to that suicide + point, but I never got the nerve to actually go through with it. + + Then, over a period of time, it hit me. I'm not really the one with the + problem; they are. Why the hell should I feel embarrassed? It was + something that has happened three years ago. Should I feel ashamed + because they're bringing up old garbage? No. It got boring after awhile, + actually. Always the same insults. Never anything new. So tedious. + + But when I reflect on the whole incident, I actually am thankful that it + happened. That one day, back in September of 1994, changed my life + forever. It made me the person whom I am today. + + I am a substantially stronger person. Look, if you had those kinds of + insults being thrown at you every five minutes, wouldn't you grow a little + stronger in yourself after awhile? Yes, it sounds very contradictory, but + somehow, it all unravels itself, and I'm the benefice in the end. Sure, + I would have wasted everything if I had killed myself a long time ago, but + I didn't. I'm here now, and that's what matters. + + I was able to see the flaws in other people. I'm not the only person with + a gross past. I saw the traits in other people. I'm very perceptive of a + person's personality. That helps me a lot today. + + Hell, if you really want to read into it. If I hadn't become so lonely, + when I got that modem in eight grade, I may not have geeked out on the + computer as much, and may not be sitting here right now writing this. + How's that for fate? + + One thing that always struck me, was something that one of my "friends" + said to me near the end of eighth grade.. We were talking, and he told + me, "Tom, just think. Right now, everyone knows you. Would you rather be + known, or a lonely nerd?" Well. He was right. Everyone did know me, + maybe not what I would want them to know me for, but they knew me + nonetheless. + + The really weird thing about the situation, is the fact that I have really + only talked about it to kids that I went to school with at the time. + Friends of mine from outside the school, I don't know if they know or not. + For some strange reason, however, I'm telling hundreds of strangers right + now. A year ago, I would never have even thought about this; right now, + I'm bearing my soul to all. + + It's odd how you can gain hope from what seems like the most humiliating + incidents. I'm glad I can. + + See how it all goes back to that one day? I might write a subsequent + article to this, and go into detail about other aspects of my life. For + now, I'll leave it at this, hopefully I'll have other people writing this + 'new' column. If you really want to hear more, you can always email me. + + ---------- + + See? If I had the guts to write that, with possible whiplash from + immature readers who may bring it back up in my face, I'm sure you can + write something like that too. C'mon, I know you can. + + As always.. Read, enjoy, send your comments to me. + + Have a nice day. + + -------------------------------------------------------------------------- + (2) - Tragic Death Calls For New Regulations - by Edicius + + "We need to begin by acknowledging our own contribution ... We feed one + another: those of you looking for publicity and those of us looking for + stories." "whether we in the media ... by our ravenous attention + contribute to this phenomenon ... We did." + + -- Ted Koppel on the questions posed by the death of Jessica Dubroff. + + ----- + + The death of Jessica Dubroff shows us, as Americans, just how competitive + we can be. This case brings to light new age parental teachers, a lax + government organization, and an overzealous American bond. + + If a seven year-old was out driving a Ford down the New Jersey Turnpike, + people would be afraid that she would cause an accident; when she's flying + across the country, she becomes a national hero. Why would the Federal + Aviation Administration allow this to go on, then? + + Granted, flying a plane is actually much safer then driving a car. You + have more informational gauges, easier controls, and less objects to + contend with. In theory, a seven year old should be able to fly a plane, + but do they have the mental capabilities to actually do so? + + When Jessica Dubroff left Half Moon Bay, California, on April 10, she set + out, along with her father, Lloyd, and her instruction, Joe Reid, to + become the youngest pilot to fly cross country. The Guiness Book of World + Records discontinued this category in 1989 to prevent a tragedy like this, + and "Flying" magazine refuses to acknowledge attempts like this because + they did not want to promote a stunt like this. J. Mac McClellan, editor + in chief of the magazine said, "It has no validity from an aviation + sense: the pilot in reality is the certified pilot." A certified pilot + has to be 16, and this Jessica was not. + + One can debate the clause(s) that let Jessica fly. The FAA won't review + their stand on flying age for about six months. At that time, the + results from the crash investigation will be in, and we will be able to + see who was really at the controls. + + The flight left from California and stopped at Cheyenne, Wyoming, before + continuing with the trip to Falmouth, Massachusetts, with one more stop to + refuel in Fort Wayne, Indiana. The landing in Cheyenne was tough. There + were strong crosswinds that made the plane wobble on it's approach. The + takeoff the next day was even tougher. + + With an approaching thunderstorm, the winds were whipping around at the + speed of 25 to 30 mph, which would make a veteran pilot cease flight. + In a push to keep on schedule, Jessica's father opted to continue on. + + In an interview before the takeoff, Jessica appeared as chipper as she was + supposed to seem. "I had two hours of sleep last night." As they were + taxing to the runway, Jessica spoke to her mother on a cellular phone and + said, "Mom, do you hear the rain?" + + The plane took off, and was noticeably overweight. The thin mountain air + (Cheyenne is 6,156 ft. above sea level) is a factor that adds extra time + to the take off. Many pilots who are used to flying at low-levels don't + compensate for this fact, and wind up in the golf course at the end of the + runway. As the plane went through it's sluggish and shaky takeoff, the + people on board must have instantly realized a problem. Reid's arms were + more fractured then anyone's, which leads investigators to believe he had + control of the plane. + + Jessica's parents typified the New Age idealism that makes people look + crazy and strung-out. She was born in a birthing tub without a doctor or + midwife present. Her parents kept her out of any formalized school, + because they saw the institution of school as being too restraining. + Instead of toys, they were giving tools to build their own furniture. + Jessica and her mother lived in a house without television. + + Her parents believed that the child's bliss should guide them. They + allowed Jessica to do whatever she wanted. According to them, after + taking a flight on her sixth birthday, flying was what Jessica truly + wanted to do. The idea of the cross-country trek was her father's, + presented to her as "her choice." + + Her father became the public relations director for the voyage. Printing + up specialty hats to remember the event, and making sure that the proper + media (tv, print, and radio) would be covering it. From the minute she + took off, the news covered every moment of it. They knew that if she made + it, it would become the typical uplifting American spirit story that would + make everyone feel better. If she crashed, just another accident to + lead off the newscast with. + + The parents, the FAA, and the media: All part of a large chain that fed + off of each other. The parents "fostered" their childrens' development, + without holding back anything. The FAA allowed this to go on, without + taking the proper precautions. The media covered the story, added the + fuel that her parents needed to push Jessica even further. + + If the media wasn't involved in this, it may never have happened. Why + else would her parents push her to do this? (Oh wait, I forgot. This is + something that she _wanted_ to do!) What would they get out of it all? A + few boasts here and there? Surely not enough to provoke a sane person to + do this. (Whoops. Talking about the Dubroffs, and I used the word + "sane"? Surely I jest.) It is just another in the line of parental + pressure that pushes children to the point of burnout. + + When her mother, Lisa Blair Hathaway, visited the crash site in Cheyanne, + Wyoming, she placed flowers on the spot. A young boy came up to her, and + attempted to give her a teddy bear. Her response was that her children do + not play with toys. + + This crash leads to many unanswered questions. This tragedy did not have + to happen, but it did. The only thing we can do is to prevent it from + happening again. That can only come through stronger regulations from the + FAA. + + The FAA can change the rules, but we can't change parental zealousness. + + -------------------------------------------------------------------------- + + (3) - Supernatural Powers - By Edicius + + "If you could be any X-Man", Mike began to say to his friend John across + the lunch table, "who would you be? Would you rather be Banshee or + Wolverine?" + + "Well", John began to reply, "that's a hard question. Banshee can fly at + the speed of sound, and Wolverine has those big claws. Plus, he can + reheal really quick. I would take Wolverine. You would get tired of + flying after awhile." + + "True, but if you could have a super-power, wouldn't it be flying?" + + "Not at all. If you're a superhero, you HAVE to fly. If you don't, well, + then you're not a superhero. I mean, did you ever see a superhero who + didn't fly? Superman, Spiderman, Wonderwoman; they could all fly through + the air, somehow." + + "Well, what about Hulk?" + + "Man, if you were that strong, would you want to fly?" + + "I guess not.. Well, what would your power be?" + + "I would take the ability to stop time. You know how great that would be? + I mean, you would be the smartest, wittiest, and awesomest person in the + world. A teacher calls on you in school, you can pause time, and do + research on the question. If someone insults you, stop time and think of + something really witty to say. If you don't like someone, embarrass them + by taking off their clothes! It would be so fun! So dominating! You + could walk across the ocean and go anywhere!" + + "Well, not really. I mean, the water wouldn't be still, because the water + molecules have to move still. If the air molecules are moving, so are the + water ones. If the air molecules weren't able to be moved, then you + couldn't move in the frozen time. It just wouldn't work. In that case, + you would need to be able to fly.. You would need that to get over the + oceans and stuff." + + "True, very true. But imagine the possibilities. All the free sex you + want!" He points his friend toward Janice, who was bending over to pick + up a sodacan that she dropped. "Take Janice for a second. Pretty, + well-endowed, and perky. You want to have sex with a girl like that. But + you could _never_ have sex with a girl like that. As she is in a position + like she is now, pause time, lift up the skirt, and have fun." + + "Wow. Good idea. You wouldn't have to worry about viruses, because + they're a living organism, and henceforth would be inactive at the time + you had sex. If you got her pregnant, no one would know who it was that + impregnated her! Two months down the road she starts getting sick in the + morning! Oh the joy.. Hey, you could also go into a bank, stop time, and + take all the money, too!" + + "But, my friend, you wouldn't need to. Why would you need money when you + can go into a store, stop time, and take everything you want without being + seen?" + + "Well, yeah. But you need some money to make some of the 'purchases' look + legitimate." + + "I guess." + + "Wait.. We agreed that the air and water molecules would be moving, + right?" + + "Yeah." + + "Well, if they're moving, then what is suspending the planes in the air? + The fish in the water? Whats to keep everything up? You could kill + thousands at a time by crashing every plane at the same time. You could + plan it, really- 'You leave for Florida Friday at four? Uh.. Have a nice + and safe trip'", Mike said with a sinister laugh. "Really, where would + gravity be? You would just float into the air. It would defeat the whole + purpose of stopping time. When you would reactivate time, you would just + fall back to Earth when gravity kicks back in.. or, you would burn + instantly if you floated all the way to space." + + "Good point. Man, stopping time sucks. I'd take flying now. Actually, + I'd take invisibility with the power to walk through walls, but that's + being a little picky." + + "Picky? You want to know picky? I'd take the invisibility with wall + walking option, but I would also have the power to slip out of my body, + and allow my body to keep functioning normally. Then I could slip into + someone elses'' body, and control them." + + "Just take mind-control in that regard." + + "I guess.. Hey, who would you rather be, Spiderman or Wonderwoman?" + + "I'd be Wonderwoman. I would fuck saving the world and play with myself + all day." + + -------------------------------------------------------------------------- + (4) - Reviews: Edicius' Opinions on EVERYTHING! + + Concert: Brutal Juice/Civ/Toadies - Stone Pony, Asbury Park, NJ - April 27 + + When I first heard that Civ was playing in my area, over a month ago, I + knew that I was going to that show. Over the course of a month, I had + about 18 different rides fall through on me. It wasn't until about 2:00 + AM, the day of the show, that I had a definite ride. + + I went to the show with fellow 'zinesters Mindcrime, Belial, and Lucifer. + We went there planning on buying tickets at the door. Unfortunately, a lot + of other people did too, and it was sold out when we got their. + + Mindcrime and Belial didn't really feel like scalping tickets, but Lucifer + and myself did. Unfortunately, no one had extra tickets. One of my + friend's friend would have an extra ticket, but she didn't show up for + awhile. The bouncer at the door told me that in twenty minutes, he would + sell Lucifer and myself tickets for $20. The tickets went for $12.50, $15 + with Ticketmaster charges, but we were willing to pay it. However, we + didn't have to wait, some guy had two extra tickets for $15 each. + + We get in, and after finding our way to a reasonably good spot, we waited. + Waited, and waited, and waited. After about 30 minutes (over an hour + since the doors first opened), the first band comes on. The band was + Brutal Juice, whom I never heard of before, and didn't know what they + would be like. + + They were actually really good. They turned out to be a pretty decent + punk band. Touring in support of their Interscope Records release, + entitled _Mutilation Makes Identification Difficult_, they played their + current single "Ugly on the Inside." After a few more dates with the + Toadies, they tour with Gwar in May. + + The crowd got into this one. A pretty intense mosh pit, with dozens of + crowd surfers. The lead singer of Brutal Juice came out during their last + song and hung from the water pipe that ran just over the crowd. Needless + to say the bouncers were pissed. There was one fight which was cause by a + dickhead. The guy had the nerve to kick and hit someone after they fell + in the middle of the pit. It was quickly ended. + + I promised Lucifer that I'd interject in my review that as he was getting + water between the Brutal Juice and Civ sets, a really hot girl was hitting + on him. + + Next came the crowd favorite, Civ. + + Near the end of the Brutal Juice set, I made sure that I made my way up to + front for the Civ set. If my past experiences with the band told me + anything, they told me that the place would erupt the second Sammy started + to pound on those drums. The place did when the first few notes of + "United Kids" were heard. + + Playing songs from their Lava Records release, _Set Your Goals_, Civ + filled the air for about an hour with many socially uplifting messages. + Both during and between songs. Before their song, "Don't Got to Prove + It", Civ (the lead singer of the same-named band) said, "This song goes + out to everyone .. if you want to be a punk, a skinhead, a metalhead .. + whatever you want to be .. if you want to be a freak .. if anyone says + anything, fuck them." + + Playing all of the songs on their CD, including "Can't Wait One Minute + More", "Choices Made", "State of Grace", and the title track, "Set Your + Goals", they also played a new song called "Social Climber." This song + was about the "very beautiful, very fabulous .. and the very annoying. + The kind I [Civ] fucking hate." + + As always, the pit was incredible. During "So Far.. So Good.. So What", + the place erupted into a monster circle pit and hundreds doing the pogo. + Civ was constantly near the crowd. He didn't let the gate in front of the + stage stop him, either. He used the water pipes and lighting hanging over + the front of the stage to his advantage and constantly hung over the + crowd. When one crowd surfer almost hit him as he was singing, Civ + quickly said, "Hey, nice to see you up here." + + The headliner of the night came on next. The Toadies are currently + touring in support of their current CD, _Rubberneck_. They were really + good, attracting a very diverse crowd age-wise. They played for nearly an + hour and a half. + + I'm going to totally skip over the rest of the Toadies set. Mainly + because at the beginning of the set, I got knocked over in the pit, and a + 400 pound guy fell on me. Luckily I was picked up before (too many) + people stepped on me. After that, I just slam danced and pogoed my way + across the floor, into the back of the club, and took a seat for awhile. + + I did go back in, but I never did get into the Toadies' set too much. + They played really good, however. I guess if I had known more about them + before the show, I would have had fun. + + Now, as I'm sitting here the next day, I see that I have something that + really looks like a bite mark on my wrist. I have no idea how that got + there. Eerie. + + eZINE: Doomed to Obscurity - Issue Nine + + For almost nine months now, Doomed to Obscurity has been releasing very + large issues. Many different writers with many different articles. The + last few issues prior to issue nine have been alittle less then what you + would expect from them, quality wise. This issue they changed that. + + I really enjoyed this issue. They changed the layout, with one of the + editors, Eerie, working on it this time. That was a nice sight. Also, + they had some really great articles. My personal favorites were Styx's + "Sliced and Diced Hookers in a Ziplock Bag", Mogel's "My Belly", Morpheus' + "Video Games Stole My Childhood", and as always, all of Eerie's work. + + The rest of the issue was good. The only things I didn't like were James + Hetfield's opening article called "Girls Can't Write", and Creed's "A + Multi-Cultural Spectrum of Anger." Dead Cheese's 'ascii toon' wasn't so + good, either. + + You contact DTO at their web site, http://www.thirdwave.net/~dto, or by + emailing them at doomed@voicenet.com. + + -------------------------------------------------------------------------- + (5) - News Snippets - Compiled by Edicius + + From the Middletown [NJ] Independent, 5/1/96: + + _Boy Injured in Explosion_ + (By Eileen Koutnik, Staff Writer) + + ABERDEEN-- An 11-year old boy was seriously injured last week while trying + to make an explosive using gunpowder, wire, a battery pack, and an + electrical switch, police said. + + The boy and at least two other boys -- one aged 12 and the other 14 -- were + at the victim's Cedar Place home in Cliffwood Beach section when the + accident occured at about 3:30 pm April 22. + + They removed the gunpowder from shotgun shells, and tried to assemble an + explosive, police said. + + The 11-year old suffered burns to his chest and the right side of his face. + He was airlifted to St. Barnabas Medical Center, Livingston Township and + released from the hospital April 25, a hospital spokeswoman said. + + Lt. John Powers said police recovered the shotgun shells on the property, + but are still looking into where they came from. + + Police said the victim was closest to the explosive when it exploded in the + living room of his house. The other boys were not injured. + + One of the boys said they were inspired by the movie, "The Specialist," + according to Powers. Powers did not know if they boys were being + supervised by an adult. + + Charges are pending and will be filed in family court against the boys + involved, Powers said. + + Aberdeen Police Detective Michael Vacaro and Detective Robert Mazur from + the New Jersey State Police are investigating. + + ---------- + + From the Middletown [NJ] Independent, 5/1/96, Letters to the Editor, + + _Local Boys Did the Right Thing_ + + On April 13, I was notified by several young boys that they had located a + bag of drugs. The three young boys, Michael Guadian, Stephen Woodford and + Joeseph Walling waited at the scene and kept the item in sight until our + arrival. Althought the bag turned out the more tobacco than narcotic, + there was trace elements of marijuana in it. + + According to Detective Stephen Wheeler, the course of action taken by the + youths was textbook according to what is taught in the DARE program. At + the minimum, the youngsters reconized the item for what it was -- + potentially dangerous -- and they made a very good decision. + + The detectives in this bureau would like to commend Michael Gaudian, + Stephen Woodford and Joseph Walling for th epositive actions they took on + April 13. Congratulations guys, you did a good job! + + Kevin J. Cassidy + Detective + Keyport Detective Bureau + Bayshore Narcotics Task Force + + -------------------------------------------------------------------------- + + Jonas e'Zine Issue Seventeen + Send all inquiries to edi@cybercomm.net + Visit the new and expanded Jonas website at: + http://www.cybercomm.net/~edi/jonas.html + Visit Belial @ Avalon, (908) 739/4274 + + "Jonas, it is more then a 'zine, its a lifestyle" + + ---------------------------------- eof ----------------------------------- + diff --git a/textfiles.com/magazines/JONAS/jonas_18.txt b/textfiles.com/magazines/JONAS/jonas_18.txt new file mode 100644 index 00000000..b1512d78 --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_18.txt @@ -0,0 +1,710 @@ + + ____ + | |________________________ __ + | | | | | | | | + ___| | | | | | | | | | | | + | | | | | | |__| | | | | | + | | | | | | | | |__| | | + | | | | | | | | |___ | | | + | | | | | | | | | | | | | + | | | | | | | | | | | | | + | | | | | | | | | | | |__| + | | | | | | | | | | | __ + |_____|_____|__| |_____|_____| |__| + ----------------------------------|__|-------------------------(gh/cia)--- + + Jonas e'Zine -- Volume 2, Number 3 -- Released May 27, 1996 + Jonas is produced semi-regularly by Edicius (Tom Sullivan). Jonas + and the material therein are property of Edicius and Jonas Print Matter + Incorporated. Jonas may be freely distributed as long as this notice + remains in place, and there is no fee charged for its retrieval. + + .. and in the end + we shall achieve in time + the thing which is divine. + Spacehog / "In The Meantime" + + -------------------------------------------------------------------------- + Jonas E'Zine Volume 2, Issue 2 May 27, 1996 + + Contents: + + (1) - Edicius' Editorial + (2) - How I Got This Way / by Mercuri + (3) - Internet Censorship Revisited / by Edicius + (4) - Snowglobes / by Funkdafied + (5) - Wacky Mall Excursions: Take One / by Edicius + (6) - Reviews: Edicius' Opinions on EVERYTHING! + (7) - News From The World + + -------------------------------------------------------------------------- + (1) - Edicius' Editorial + + [May 20, 1996] + + Another Monday, more things on my mind. This may turn out to be little + more "ranty" then my normal writings, but eh. So be it. + + There's less then 3 weeks left in the school year. Instead of jumping for + joy, I'm seeing the down side of it. Do you realize that a week from now, + the present seniors will be starting their exams. Soon after that, they + graduate. I won't see 90 percent of them again. + + That's good. Out of that 90 percent of the ones I'll never see again, + 99.9 percent I don't want to. However, there is one that I will utterly + miss. I've just fallen all over her in the last few months. Let me tell + you, it sucks. + + She's popular, but not overly popular. She isn't drop-dead gorgeous, but + instead she can be simply described as cute. There is nothing else that + fits her better. She isn't ugly, but she isn't one that would strike you + as overly beautiful. Her personality is great. She amazes me. I just + don't know why. + + I don't know how it really started, either. When my semester Art 2 class + started in January, she was in it. She wasn't in my Art 1 class early, so + I didn't know who she was. Two days into the class I looked in last + year's yearbook and found out exactly who she was. Since then, I've never + forgotten her name. + + She will actually stop by my table and converse with me (well, me and the + others sitting at the table). I don't know if she's doing it just to make + casual conversation and be nice, or whatever. But I do know I melt when I + am near her. + + She has a boyfriend. That hampers the whole situation. I saw his picture + one day, and he isn't that bad looking of a guy, and from what I hear, + he's not a bad person overall. So, basically, I don't have a chance with + her. + + Couple in the fact that after a week I will never see her again, it makes + for one depressed Tom. In a week or so the seniors graduate and leave the + halls of my school forever. In August she will start getting ready for + college in Pennsylvania. I just can't win. + + In two days, I have a rough draft for my history term paper due. I + haven't even started it. Well, I have the research and everything, I just + need to write it all out. Let me tell you how fun these next two days + will be. + + On the upside. I get home from school today, and check my mail that I got + today. Not only did I get the new issue of Us News & World Report, with + the cover story of "Wired Whiz Kids" (good reading, btw. it's the 5/27/96 + issue), but I have a big brown envelope sitting for me. Quickly I + recognize the return address as the Weezer Fan Club. Rock! Inside it + contained the spring '96 issue of Weezine (see review later in this + issue), but it also had an autographed picture of the band, along with + some other stuff. + + In case you still didn't know, I took the name "Jonas" from the Weezer + song, "My Name Is Jonas." So yes, I love the band. + + ---------- + + As far as news this issue .. + + The first installment in the new Jonas column, called "How I Got This + Way", was written by Mercuri. The goal of this column is to provide a + outlet for various people to talk about their lives. More specifically, + it is meant to show that the way we are today, personality wise, can + normally be traced to one single event in our lives. I believe Mercuri + captured this perfectly. You may know Mercuri as the editor of + Radioactive Aardvark Dung magazine. A million thanks go out to him. + + As always, the website is changing. This time, I changed the layout and + graphics and stuff, so it actually looks good! The address is at the + bottom of the file. (Hey, if you're reading this from the website, you + don't really need to know it, do you?) + + That is about it. Have a great day. + + -------------------------------------------------------------------------- + (2) - How I Got This Way - by Mercuri + + I was at a friend's birthday party back in eighth grade, now, we had + planned the whole time we were going to raise Hell that night. Whether it + was by terrorizing him in his sleep, or T-Ping. We played football in his + backyard, then we realized what we thought was mud was actually goose + crap, so we stopped. I poured a laxative in his drink, all in the name of + good- natured fun, it was his birthday =). + + Anyway, the night dragged on. We started playing "Risk," the board game + at about 2:00am, me and two other anonymous friends went out to T-P and + egg houses/cars, whatever crossed our path. We found the first house, + nestled tightly away in the woods, hit it with about two rolls of toilet + paper, shaving creamed their windows. it was a masterpiece of vandalism, + it brought tears to my eyes. =) Moving along, we went to the next house, + while the third musketeer got weak in the knees and decided to go back to + the house and play Risk with the rest of the people still their. + + This is where the destruction began, and basically my whole life is a + result of the consequences of the following actions. I myself, uprooted a + stop sign, and speed limit sign, stole a license plate and slashed two + tires. We together uprooted about eight to ten mail boxes. The adrenaline + was flowing that night. + + We went back to the house, where we played Risk until I fell asleep. I + woke up around 4:00am only to find myself covered in shaving cream. + "Those crazy kids!" + + I woke up the next morning with people shaking me. "The police are all + over the place!" "You should see what we did in the daylight! The tires + you slashed were on a Cadillac!" Not seeing any bright side to this whole + thing, I walked outside, threw my pocket knife into a pond, shoved the + license plate into the ground with my foot. + + "How could I have POSSIBLY thought I was going to get away with this?" + + "What the HELL was I going to do?" + + Like the police wouldn't suspect a sleep over as the cause of all this. I + have no idea what went through my head that night, but I do know that was + the end of all of my vandalization for a while. As well as my life. + + We had convinced the birthday boy's parents that we didn't do it, but boy, + did I ever feel low after I heard that the house that we T-P'd majorly was + a mixed marriage. "Great, now I'll be coined as a racist." + + So we had escaped, and we went home. I took a shower, praying to God on + my knee's, that He make the punishment nothing. And I went to bed, still + praying. I woke up at about 4:00pm, took another shower, and went down- + stairs. The rest of the day was normal until the phone rang. It was the + kid who went home before we did all the "bad" stuff. He told me that the + mother had just called His house, and that we were definitely, no doubt + about it, implicated into the whole thing. The call waiting beep sounded + while I was talking to him. Said "Hello," and the voice I heard was the + birthday boy's mother, wanting to talk to my mother. "Uhm, Mom! Phone!" + I yelled. She talked to my mom, and I listened in. We had more or less + been ratted out by the Birthday Boy's little sister who had seen us sneak + out. + + Wow, I had never seen my parents so absolutely pissed off and sad at the + same time. At the time, what they tried to get across from me didn't + really sink in. But it all hit me eventually. Had this entire escapade + not have happened, I would have definitely gotten into drugs heavier than I + had, I would have never began to weight lift, I would have never had any + dreams about going to VMI or West Point, like my role models did. I would + have never have had the grades I have now. This event, what seemed to be + the worst thing that had ever happened to me at the time, turned out to be + the greatest turning point of my life. I wouldn't trade what happened for + the World. Everything just seems to fall in place now. + + But something like this, you would think would make me be an angel. It + sounds like now that I have completely avoided trouble and all risk, not + true. You have to gain the ability to recognize what is worth the risk, + and what is not. You have to balance yourself in the medium's of right + and wrong. And remember, we are all made perfect through failure. + + -------------------------------------------------------------------------- + (3) - Internet Censorship Revisited - by Edicius + + [See endnotes for more information] + + How would you feel if censorship extended as far as your private phone + calls? You would feel offended, wouldn't you? Well, what if instead of + your private phone calls, your private email could earn you jail time? + + As long as the Internet is around, the topic of Internet Censorship won't + die. Recently we have seen several examples of this. From Germany's list + of explicit, and thereby illegal, newsgroups, to the United State's + Communications Decency Act, the Internet has suffered a few blows. + However, the biggest restriction may be in Australia. + + According to a press release put out by New South Wales (Australia) + State Attorney-General Jeff Shaw QC MLC, the NSW State Government has + proposed some very serious legislation. The bill has many parts "to + protect children and others from intentionally or accidentally accessing + abhorrent and objectionable material." (1) + + This bill goes farther then a bill proposed by Western Australia. The + similar bill had an irregularity which allowed the legal transmission of + computer games that contained any material containing violent and sexual + acts. + + The bill proposed by NSW goes much further then newsgroups and web sites- + some of the key components of the Communications Decency Act. In a + nutshell, this bill targets: + + - material that would be refused classifications; + - material that would be unsuitable for minors of any age, such as + a film classified X or R; + - a publication that would be classified Category 1 or 2 (including + explicit sexual or sexually related material) and; + - material unsuitable for minors under 15 (2) + + Material considered unsuitable for children, even if it is not directed + towards children, would be banned from everything- including private email. + Material available in libraries would be illegal if published + electronically. Also, conversations that are legal on the street or on + the telephone, would be illegal in chat rooms or email. (3) + + This bill targets Internet Service Providers with jail time and stiff + fines if any of their users violate this bill. ISPs would be legally + liable for everything, which would force many, if not nearly all, to close + down due to the fact that they can't monitor everything their users do. + Exceptions to this are two ISPs in New South Wales, Telstra and Optus, who + have "common-carrier" status and are protected under Federal Law. + + According to a press release by the Electronic Frontiers Australia (Inc.), + from Sunday May 19 1996, "existing laws against exploitative pornography, + defamation, and harassment have proved sufficient in dealing with abuses + of Internet services." The EFA also goes on to say, "the Office of Film + and Literature Classification itself has searched the Internet and + reported that 'restricted and refused classification material was + difficult to find.'" + + A May 27 rally at Sydney Hyde Park in Sydney, Australia, is planned. This + is to be followed be a march to the parliament House. This is meant to + give Internet users a chance to show their anger in person. Police and + City approval has been given to this event, and it is expected to be very + mild. Although at the current time no information regarding the outcome + of the event is available, Jonas will keep you informed in a later issue. + + ---------- + + Of course, all of this action in the land down under is due to our + wondering Senators and Congressmen. Thanks to their brilliant rendition of + "Let's Regulate the Internet", now other countries feel they should do the + same. + + Thanks guys, the world means it. + + --------- + + [Endnotes] + + (1) - taken from the press release from New South Wales Attorney + General Jeff Shaw, titled "NSW Clamps Down on Pornography on + the Internet." + + (2) - press release, Jeff Shaw. See above. + + (3) - taken from Electronic Frontiers Australia Press Release + (5/19/96), "Internet Uproar Over NSW Government's Censorship + Plans." + + -------------------------------------------------------------------------- + (4) - Snowglobes - by Funkdafied + + I sit here and look at this beautiful snowglobe my friend Scott and his + mother gave me for Christmas, and I start to cry, because I realize, that + is the only thing left I have to remember them by. + + Last week, my friend's house caught on fire.. My friend Jon went to the + store around 12:30 to get cigarettes (so he told the cops) and came back + and the house was a big flame, with his brother Scott and his mother still + inside. By the time the cops and fireman got there, the mother had passed + away and so had Scott.. Fortunately, they brought Scott back to life and + flew him to Livingston (NJ) burn center, because he was burned 85% percent + of his body. The mothers funeral and wake was this week and it was very + sad, everybody was crying, and I honestly thought I walked into the wrong + room because unfortunately it was an open casket and it didn't look like + her at all. As the week went on Scott got worse, he lost 40% of his + blood, his lungs stopped working and only 1/4 of his lungs worked, both of + his kidneys gave out and he died yesterday morning for 25 minutes, they + brought him back, but by then he was brain dead. There wasn't really much + of a chance of him suriving life too long, and he passed away last night + in his sleep.. + + No one knows if Jon did set the fire, or if he didn't.. they have him + under investagation, but nothing will come out of it, the only people who + know what really happen, is Scott and his mother.. + + It's especially sad because a week before this happen, his mother was in a + car accident and her car was totalled, and 3 days before the fire it was + Scott's birthday. + + Can you just imagine how *you* would feel if your mother and brother were + killed in a fire that *you* may or may not have started? Can you just + imagine how *you* would feel if you grew up with someone since + kindergarten and was best friends since then and he called your mother mom + and you called his mother mom, and both your friend and his mom died? + That's what my ex boyfriend is going through. + + Scott was only 14 years old, that is when life basically begins; when you + start knowing who your friends are, and what kind of music you actually + like, not the kind your parents listen to and you thought was "cool", what + clothes you actually wanted to wear, when you start going out with people. + Scott died never graduating the eighth grade, never knowing what high + school was like, he never had a girlfriend, him and his mother planned a + trip to the Bahamas they are never going to get to go on, he was looking + forward to a summer he is never going to have. Things like that make you + wonder.. + + Maybe after reading this you should give your mom, or dad or brother or + sister, a big hug and let them know you appreciate them, and look at what + you are doing in your life and how some of you do drugs and not realize + this could kill you and do a lot of other stupid stuff. Just think, some + investigators are saying this was arson and that Jon left a cigarette in + his room somewhere, whether he dropped it on his bed, or in the garbage, a + simple careless thing like that could have caused his whole family their + life. So maybe for those people who like to play with fire (you probably + are thinking, only 12 year olds do that, I know seniors in high school + that like to make bon fires in their backyard), or leave cigarettes around + the room, forget to ash it, dump the ashtray in the garbage or throw a + match when it still could be lit. You think, "that could never happen to + me", one week we are all over Scott and Jon's house watching a movie and + the next week, his house isn't even livable. It could happen to anyone. + Now I have to go to a funeral for a boys life who didn't even really begin + but it's already ended.. + + And even though most of you don't believe in God, I do. In my snowglobe + Scott and his mom gave me, It's a woman angel looking over a cherub in + Heaven, and I'd like to think of that as Scott and his mom, happy in + Heaven.. + + -------------------------------------------------------------------------- + (5) - Wacky Mall Excursions: Take One - by Edicius + + I was in the mall today, and I went to this fast-food place (Nathan's). + In my hand I had a CD I had just bought, Dead Milkmen, "Chaos Rules (Live + at the Trocadero.)" As I'm up getting my cheese fries and hot dog, the + manager-type said, "Oh, what CD did you get?" I said, "the Dead Milkmen." + + He just looked at me blankly. + + Now, I wasn't expecting a big fan from this guy, and I could deal with him + not even knowing who they were, but I just found it really funny when he + looked at me and said, "Who? Are they big? Like, have they made MTV + yet?" + + My sister, who was standing next to me, laughed in the guys face. At + least I waited until my back was turned to laugh. + + ---------- + + Now, I don't want to pass judgement on the guy or anything. Nor am I + trying to pull anything from this story in this article. I'm leaving you + to draw your own conclusion. I just felt like relaying something eventful + from my day to you. + + -------------------------------------------------------------------------- + (6) - Reviews: Edicius' Opinions on EVERYTHING! + + CDs/LPs + + Goldfinger/self titled/Mojo Records + + "You're probably thinking that we're some type of trendy punk rock band, + jumping on the bandwagon.." + + With the recent new wave of So Cal punk ska bands, you may get tired of + them. Well, myself, I like the punk with the ska influenced. This album + is no exception. + + The two tracks that you could tell would be the first two singles are + "Here In Your Bedroom" (which has been getting increasing airplay and a + video on MTV) and "Minds Eye." A lot of you are probably familiar with + "Here..", but "Minds Eye" happens to be a really good song. It has been + getting some airplay, but expect to hear it A lot more in due time. Then + again, most of the songs on here are catchy enough to remain in your head + easily enough. + + Most of the 16 tracks (14 listed, 2 "hidden") range from pretty good to + really good. There isn't much on here that I would really cut out. + However, there isn't much on here that I would say is excellent. + + Some of the highlights of this album, besides the aforementioned "radio + hits", include "Mable", "Answers", and "Stay." On the same note, they + could have cut out "The City With Two Faces" and "My Girlfriend's Shower + Sucks." + + ----- + + Love and Rockets/Sweet F.A./American Recordings + + Man oh man, this CD is definitely a great one. If you can get your hands + on a copy, definitely get it. A great mix of guitar, piano, organs, bass, + and "sound effects" produce an amazing album. Between the acoustic + and electric guitars, you also get a somewhat "techno-y" guitar sound. I + guess the best description for this is a part-acoustic, part-techno album. + + "Sweet Lover Hangover" is their first single. This is a really great + song. I really don't know how to describe it, but I'll try my best. + (Don't laugh) Take smooth acoustic guitar (a la softer Oasis?) and mix + with easy electric guitar solos, add organs and some wave sounds. + + For the most part, this is a very mellow sounding record. It would + definitely get my vote for one of the albums of the year. + + It is really hard to pull out the highlights of this album. Mainly + because every one is _GREAT_. This is well worth whatever you pay for it. + + ---------- + + 'Zines + + Weezine - Issue 6/Spring 1996 + (14 pages/half sized) + Weezer Fanclub + 9311 SE Foster Rd. #666 + Portland, OR 97266 + + This has to be one of the best 'zines I've ever read. It has great + information on Weezer and a fantastic layout. You really can't ask for + much more then this in a 'zine. + + The main editors of this 'zine are Mykel and Carli. They both run the + Weezer Fan Club, which is how this 'zine is obtained. To the best of my + knowledge, I don't believe you can get this without joining the fanclub. + Then again, if you want to read this 'zine for it's content (like you + should), wouldn't you be interested in the fan club as well? + + ANYWAY. + + This issue features an update from Rivers Cuomo (lead singer of Weezer), + in which they print a photocopy of a handwritten letter of his. He tells + us how Harvard life is, how his leg is feeling these days (he had an + operation last winter), and the status of the new album. Very interesting + reading. + + The bulk of the issue (6 out of the 14 pages) is a column written by Karl + Koch, who is Weezer's chief helpers (roadie duties, I presume?) He does + A lot of work for Weezer and The Rentals. In this column he answers a lot + of fan's questions about the band, reviews four Weezer bootlegs, and goes + through a very thorough instrument history. If you ever had the inkling + to find out exactly what type of bass Matt Sharp uses, or the type of + drums Pat Wilson uses, you will find that all in here. Very amazing. + + The design itself is pretty professional. They did a very good job with + the layout. The fonts are all perfect, nothing is hard to read. Nor are + there any blurry photocopies. + + Membership to the Weezer fanclub is $10. Send a SASE to the address + listed above. + + ----- + + Big*Geek (Issue 2) / Inverted Magazine (Issue 3) + (22 Pages/Full Sized) + + Big*Geek + PO Box 319 + Glenview, IL 60025 + + Inverted Magazine + 75 Grand St. #2e + New York, NY 10013 + + This is a split issue by two very good 'zines. Let's look at Big*Geek's + half first. + + This 'zine is run by Brian Geek (briang@ais.net). It is still somewhat + new, but shows A lot of potential. Let's hope it continues on it's present + track, and it will prove to be a very good read. As it has proven + already. + + This issue is really good. A thought-provoking article on short + attention spans, titled "what was i going to title this?" and a two page + diary-type article, both show us the inner workings and thoughts of Brian. + He also gives us a really good essay in "Red Kite". There is also an + interview with The Pist, and a messload of 'zine and record reviews. + + This was my first time reading Inverted, and I must say that I'm + impressed. Somewhat more "angsty" then most of my readings, Michelle + Chen's (editor/voxpop@pipeline.com) writing's are very good. + + She has an article, titled "A Confession", in which she admits to being a + dork (is that really hard to do? :)). A really interesting short + 'personal reflection' called "Shows" and "An Anecdote" are also very great + writings. The thing I didn't really like, mainly because I didn't get it, + was a short comic called "Pin Money" by Mimi Ilano. + + There are also some other short essays and stories in this issue. Most of + them are very good. + + Overall, both of these magazines are great. Good layout, great content. + Contact these editors and get their 'zines. + + ---------- + Relish e'Zine - Issue 3 + email: jlantz@netcom.com + + This has to be my favorite e'zine right now. It's such a lovely blend of + personal reflections with short stories and other essays. Man, The Masked + Marauder (editor) rocks. + + This issue has a really good rant-spew called "alterna-teen", a funny story + called "Lassie", and A lot of other really good things. Murmur has a great + piece called "Licking Stamps." TMM has other great stuff, Shadow Tao has + an article.. Man, this issue just _RULES_. It is so great. So great. + + ---------- + Slinky e'Zine - Issue 4 + email: b3lial@cybercomm.net + + This is definitely my second favorite e'zine in the world (see relish + review, above :)). This is also really great. This issue is the best + Slinky issue to date. + + With a really funny opening editorial ("Meet Russian Women!"), to great + stories by Belial, "Did You Love Her?", and Cerkit, "What Time Is It?", to + a great essay by Jestapher, "Intellect vs. Introspect." Cerkit also had + very good poetry this issue, especially "Shadows Conversing." + + This is a great 'zine. That's all that can be said. Keep looking towards + this 'zine in the future. If all holds well for the Slinky people, we + could be looking at a fierce 'zine. + + -------------------------------------------------------------------------- + (7) - News Snippets - Compiled by Edicius + + _Teens charged in credit card online scam_ + Asbury Park Press, 5/4/96 + + By Bernhard Warned, Staff Writer + + To an unsuspecting computer user on line, the message seemed legitimate + enough: "You're out of time. Please enter your name, credit card account + number and computer password to continue to operate on-line." + + Behind the message, however, were two South Brunswick Township [NJ] + teen-agers who retrieved the credit card account information and used it to + mail-order a cache of computer and music equipment, police said. + + In the end, the boys obtained $14,235 worth of merchandise -- including a + high-tech notebook computer, a CD-ROM drive, modem and drum cymbals -- + thanks to their home computer, police said yesterday. + + The two -- 16-year olds from the Dayton and Kendall Park sections -- + ultimately defrauded 15 subscribers of America Online, a computer service + with subscribers across the United States, police said. + + The boys have been released to the custody of their parents with a date + pending in Family Court in New Brunswick. + + Beginning perhaps in early March, the suspects had the merchandise + delivered to five township homes that were either unoccupied or in the + process of being sold. + + In an effort to cover their tracks, precise instructions were attached to + the front doors ordering the deliverymen to drop off the items in the + rear of the homes, presumably out of view of any suspicious neighbors. + + Their alleged scheme began to unravel on April 8, however, when township + detectives received a phone call from Wisconsin police. Wisconsin + authorities told police that an order for music equipment was to be sent + to a residence in the Kendall Park section of the township. What made it + suspicious was that the item was ordered with a credit card belonging to + a Flushing, N.Y., resident. + + In the following weeks, detectives learned of similar billing + arrangements identifying other township homes, police said. + + Finally, investigators spoke with a woman from the Franklin Park section + of South Brunswick who gave them a description of two young men who had + knocked on her door looking for a package. She told that boys that she + had it returned. + + With the use of United Parcel Service records, more credit card victims + surfaced, creating a paper trail that eventually led to the boys' homes. + + A search of the boys' homes revealed additionally merchandise and a + damming bit of evidence: the computer used to perpetrate the crimes -- and + a computer file in it detailing whom they had defrauded, police said. + + At the home of one of the culprits, police found a new $4,000 laptop + computer. The boy explained its existence by drafting a letter to his + father, which stated the boy won the computer for his scholarly + achievements, said Detective Ed George. + + In the end, the boys had been tied to seven different crimes, police said. + For their alleged roles, they were charged with a 39 counts of theft and + fraud, police said. + + Pirate software, the type the boys used to allegedly snatch up credit card + details, is readily available from hackers or via the Internet, police + say. + + In this case, the boys used a program called "AOHell," which permitted + them to fish for credit card account information of online users. + + "A lot of kids have it," Detective James Kennard said of the program. + "Not all of them use it, however." + + Kennard said the program could be used to irk online users by infiltrating + on-line chat sessions or even bumping them off the computer network all + together. + + Investigators suspect that as many as 12 students may have conspired to + commit the crimes. + + ---------- + + From Time magazine, 5/13/96: + + Just Too Much + + Is Newt Gingrich a punk-rock fan, particularly of "Theme Song", a tune by + the band Too Much Joy? As the story goes, Gingrich heard the single played + among G.O.P. staff members, then last month allegedly sent fan letters to + the irreverent musicians (once tried and acquitted of obscenity charges), + raving that they "had captured the entire essence of our 1994 campaign in a + single line: 'To create, you must destroy.'" The band's promoters used the + letters to help publicize its new album. Last week Gingrich's's office + claimed the letters were a hoax, despite being on the Speaker's stationery, + complete with signature, gold seal and watermark. Band member Jay + Blumenfield believes the letters are authentic. Still, he says, "it's + becoming more and more sinister." + + ----------- + + Posted to several newsgroups, including alt.zines and + alt.music.modern-rock, by Radical Records (radical@chesea.ios.com). + + _INDIE LABEL Inter-"NETS" SOUGHT-AFTER AUSTRALIAN BAND_ + + New York City-based Radical Records broke new ground this week, quite + possibly becoming the first label to sign a band without ever meeting or + speaking to them. + + The deal was set up by Eric Rosen, Director of A&R at Radical, who + discovered Bucket while scanning an Australian web page devoted to unsigned + bands. + + Eighty-six e-mails and 7 months later, Bucket signed a four year, four + record deal with Radical Records, a growing indie label, whose use of + modern day technology just sent a clear message to Bucket's many other + worldwide suitors: Hop aboard the information highway now, or lose the + race. + + The four piece has already had top picks from past recordings at worldwide + radio stations. They've also been nominated for several music awards back + home in Western Australia. + + "I never thought the internet would help us," Bucket's manager Kevin + Russeth wrote in one of his e-mails, "We thought it was something that was + going to steal our freedom, not help us get it!" + + There's definitely something special about these guys. Three of the four + bandmembers write the songs, resulting in a variety of sounds ranging from + melodic string arrangements to faster, dirtier rhythms. Their left handed + bass and guitar players not only play their guitars upside-down, they also + use a wealth of bizarre tuning configurations toproduce their own unique + sound. + + Their first American full-length, a mixture of previous Aussie releases + "Flounder" and "Muddle" will be released this fall on Radical, backed up by + a nationwide college tour. + + Also coming up on Radical this summer is a new release by New Jeresey + punksters BLANKS 77 and "Oi! Skampilation, Vol.2". Phew, it's a wonder all + those Radical guys and gals don't kick the "bucket"! No way, they're too + damn good! + + Call 212-475-3672 for more info.. + + -------------------------------------------------------------------------- + + Jonas e'Zine -- Issue 18 + This is line 700 + Send all inquiries to edi@cybercomm.net + .. or visit the website at: + http://www.cybercomm.net/~edi/jonas.html + .. or visit the ftp site at: + ftp.etext.org /pub/Zines/Jonas + + "Jonas. It's more then a 'zine, it is a lifestyle." + + -- eof ------------------------------------------------------------ eof -- + diff --git a/textfiles.com/magazines/JONAS/jonas_19.txt b/textfiles.com/magazines/JONAS/jonas_19.txt new file mode 100644 index 00000000..5bc8b9bd --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_19.txt @@ -0,0 +1,937 @@ + -------------------------------------------------------------------------- + + mmmmmmmmmm$$$$ .s&$P""""7$&s. $$$$"""""7$&s. s$$$P"""""$&s. .s&$P""""7$&s. + gggg $$$$ $$$$ $$$$ $$$$ $$$$ ggggp****q$$$$ `7$$bmmmmmgggg + $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ gggg $$$$ + tMM$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ + $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ + $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ + `7$$bmmmmd$$P' `7$$bmmmmd$$P' $$$$ $$$$ `7$$bmmmmd$$$$ `7$$bmmmmd$$P' + + -------------------------------------------------------------------------- + + Jonas E'Zine, Volume 2, Issue 4 (C) 1996 by Jonas Productions, + all rights reserved. Copyrights to stories, articles, and illustrations + are the property of their creators, unless otherwise noted. The + contents of this publication may not be reproduced in whole or in + part without consent of the copyright owner. Jonas may be freely + distributed as long as this notice remains in place, and + no fee is charged for it's retrieval. + + I'm in love with Josephine Baker, + there's a problem, she's 20 years dead. + It's so tragic that I, in the prime of my life, + cannot find someone living to love. + Fossil / "Josephine Baker" + + -------------------------------------------------------------------------- + Jonas E'Zine Volume 2, Issue 4 June 26, 1996 + + Contents: + + (1) - Edicius' Editorial + (2) - How I Got This Way [essay] / by The Masked Marauder + (3) - "Ivan" [story] / by Belial + (4) - Hillary Clinton: Why Bother? [essay] / by Edicius + (5) - Life's Greatest Gift [essay] / by Edicius + (6) - Talking About Our Generation [essay] / by Auren Hoffman + (7) - "Mornings Suck" [story] / by Eightball + (8) - My Future [essay] / [name withheld] + (9) - Reviews + (10) - News Snippets / compiled by Edicius + + -------------------------------------------------------------------------- + (1) - Edicius' Editorial + + I do not like to state my opinion on the dealings of any other magazine, + just because I feel it is rude. However, Time Magazine isn't my direct + "competition", so why the hell not. + + In the June 17, 1996 issue, they start a new annual issue, "America's 25 + Most Influential People." Included in this elite list are Al Gore, Sandra + Day O'Connor, Jerry Seinfield, Louis Farrakhan and -- Courtney Love? + + It seems that Time, when picking their 25 people, wanted people from a + variety of professions. They covered politics, business, arts, and other + aspects of entertainment. Maybe they were right when they picked Courtney + Love, the so-called "Punk Provocateur." For "Hole's success helped clear + the way for a wave of rageful women rockers, from Alanis Morissette to + Tracy Bonham to Garbage's Shirley Manson," according to Time. + + That's influential? Because she strapped on a guitar, yells for 45 + minutes about problems caused by her drug problems and late-husband? + Because of that, other women have followed and she becomes an icon of + capitalistic money makers? + + If that's influential, then I'm Oscar the Grouch. + + Wait, maybe it is influential. I mean, Alanis Morissette became more + angsty in her third album, "Jagged Little Pill", after being a dance + singer in her first two albums. Is this caused by Hole and Love? Maybe. + + Maybe it could be the fact that her first two albums were pretty dismal in + the record sales? I'd be pretty angsty after that. If I were a girl, I'd + become a riot grrrl. Angsty young female with a guitar, watch out! + + Anywho, back to my point. It is a sad day when a chain smoking, heroin + addict is influential. (Heroin? I guess there's an abundance of + 'influential' people in Philadelphia then.) Love, 31, is currently riding + the spotlight which was passed onto her after her husband, Kurt Cobain, + died. Unfortunately, as long as there are people who still 'like' her + music, we will still have to hear her useless drivel. + + May God have mercy on us now! + + ---------- + + Hey-ho, whaddya know? Slinky e'Zine went through a "falling out" period + this past month. Now, with no more Slinky e'Zine, the editors of the late + 'zine have gone on to seperate projects. Cerkit has gone on to start a + new e'zine, by the name of "Plastic." The other editor, Belial, is + currently working with me on Jonas e'Zine. (We can all see who the wiser + of the two editors was. ) + + Now, let's hear a few words from Belial himself. + + ----- + + As Edicius said, I am Belial. From the time that I first began to get + involved with the computer, which was around September of '95, Jonas and I + have had a very close relationship. The first two articles that I ever + wrote were given to Jonas -- and they even got in! Since that time, I've + gone on to write two of my own 'zines, Klunk and Slinky, and I've written + for 'zines such as Doomed to Obscurity, Yolk, and Deviate. However, all + through this time, Jonas was never far from my heart. It was the first + 'zine that I ever read and it remains to this day, my favorite. I have + always wanted to write for Jonas, and I'm more than happy to finally have + the opportunity to do so now on a regular basis. + + ----- + + Thanks Belial! + + But wait, there's more! Some kind words of regard from the other Slinky + editor, Cerkit! + + ----- + + Join me, I mean I'm a good guy. Read on, don't discriminate. Oh well, for + those of you that stayed, good luck, try to keep up. now, I've seen things + start forever. hell I've seen alot of them end. and in that time what I've + found important are new beginings. Jonas seems its at a new begining with + Belial involved now. + + Seemingly though it's going to take some work, of course. Unless I'm + mistaken it took Belial and I plenty of work to do our 'zine. Continuing, + I'd like to personally say I believe in Belial's abilities. Keeping with + the topic it's beginings like this that make things good. So, Belial and + Edi, Marc and Tom, good luck, from the bottom of my heart. + + ----- + + That's it. In the end, as always, is the Jonas contact information. + Email us anything you want. Questions, comments, or useless spam. We + like 'dem sex ad spams! + + Also, if you run a band, and are interested in having your recent cd or + demo or whatnot reviewed, email me. I'll be doing more full length + articles and interviews on and with bands in the future. I love indie + record labels! You guys are the best! + + Enjoy yourselves. + + -- Edicius (Tom Sullivan), with help from Belial (Marc Newman). + + ------------------------------------------------------------------------- + (2) - "How I Got This Way" - by The Masked Marauder + + I'm not altogether sure what "this way" is, or who I am, yet, but I think + that over the past few years, I have gone through some weird stuff that + made me this way. It's kind of a long explanation so bear with me. + + I began high school in Cincinnati, Ohio. The place I was brought up, and + the place I called home. From the first day, I loved it. There was more + responsibility, more freedom, and more fun; and I was experiencing it all. + I finally got 100 percent in with the popular crowd, I didn't do any- + thing bad, something I changed later, and I was making great grades. + before the first quarter was half-way through, I had lots of friends, and + a cheerleader girlfriend. + + Then my parents decided to prove how nice they were and in two weeks moved + me to Birmingham, Alabama, where I started school at a small and + conservative catholic school. I hated it. I hated my uniforms, the + people, the teachers, the school, the town, everything. It couldn't get + any worse. I drudged my way through my freshman year and spent most of my + summer in isolation, my only entertainment was mowing my yard. + + By some act of god, whom I had given up on at this point, my father got + another job, this one in Dallas, Texas. So we immediately shipped off, + because school started August eleventh. I started school at Shepton High + School, which fed Plano Senior High School. I was extremely nervous and + defensive about the whole thing, and while sitting in the counselor's + office awaiting my "buddy" that would guide me through the school, I kept + reciting the litany from _Dune_. "I must not fear. Fear is the + mindkiller. Fear is the little-death that brings total obliteration. I + will permit it to pass over me and through me and when it has past I will + look back on it. Only I will remain." + + The first few weeks were pretty much a blur, the people were extremely + nice, but I wasn't accustomed to it. As I began to get used to it, I + decided to play a sport, lacrosse. I had planned to play lacrosse in Ohio + but financial stuff got in the way. So I bought a stick four months + before the season started and began to get familiar with it. The first + day of practice changed my life. + + I met Jim Hamilton. + + Jim was a "party guy" who played politics and was one of the most popular + people in school. Popularity meant something back then, now it is just a + bunch of bullshit. Anyways, Jim Hamilton was nice to me. Casual + conversation was pretty much the extent of our interaction, until one + practice when he sprained his ankle and had no ride home. Attempting to + establish the groundwork for a friendship, I volunteered, and he accepted. + + During the ride home we casually talked about just regular stuff, but I + guess it was a little more than that, because after that, we were more + than just teammates. At school we said hello to each other in the halls + and kept talking. Soon he invited me to go out with him and his friends + and it took off from there. + + ------ + + Now, looking back at three years of friendship, it has been a long and + strange trip. Jim and I went through everything together. Love, sex, + drugs, high school, and this year as co-captains of the lacrosse team. We + meant everything to each other and we were always together. I went to my + counselor the second day of school and had two classes changed, lunch and + weightlifting, so that we could be together. + + We never had a fight, or even a disagreement. We had many discussions + about matters that extended beyond the things we had in common. We became + brothers, and we couldn't be separated by anything. + + Except for destiny. + + In two weeks, Jim ships off for the Merchant Marine Academy, a school + where he will learn to navigate and drive navy ships. He will spend seven + months out of the year at sea, and he will be there without me. + + I can't help feeling sad that this era of our lives is over. Nothing + punctuated that more than after the graduation ceremony, when we tossed + our hats in the air and the graduating class of 1,259 began celebrating. + The video cameras even caught Jim and I's moment when we walked up to each + other at the front of Moody Coliseum at Southern Methodist University and + hugged. + + That one moment was the culmination of it all. But in a way it was + special, because it wasn't our relationship that was over, it was our high + school years. That moment will live on in infamy in both my mind and on + the "Plano Senior High School class of '96 graduation" video, as the last + image on the screen with a big "goodbye" written across it. + + But it isn't over. We said that "friends like this don't lose touch" a + thousand times over the course of our friendship, and it still holds true + today. We have made arrangements to stay in touch at all times, he has + his laptop that he will keep with him at sea and his internet account, and + of course I have my computer and account. Email will be our mode of + communication for the next few years and after that, who knows. + + But for now, I wish him goodbye. He is the best friend I have in this + world and has had more to do with my growth and development than any other + human being on this planet, and I thank him for that. We had a good run. + + -------------------------------------------------------------------------- + (3) - "Ivan" - by Belial + + Ivan sat in his room, lost and out of touch with the rest of the kids his + age. He didn't care, though. He didn't need any friends, he didn't care + about going out, he didn't care about anything. He had the Internet and + that was all he needed. + + What was there that the Internet couldn't provide for him? + + He had found plenty of friends on the Internet. He had even found a girl + who had a lot in common with him. + + Why should he be Ivan, the social reject, when he could be Destroyer and + have lots and lots of friends, girls, and, more importantly, any game that + he ever wanted. He was popular on the Internet. Girls wouldn't even go + near him at school, but on the Internet, he met new girls everyday. For + the first time in his life he was popular, for the first time in his life, + he was happy. + + So why couldn't his parents understand this? + + Constantly, they would mock him. They would yell at him, they would even, + at times, threaten him. "You don't get out enough!", "When was the last + time you've seen the light of day?", "Hermit!", "Why don't you come out of + your cave and be like the rest of the kids your age?", "Don't you have any + friends?", "Get a job and quit wasting your time on the damn computer!", + "You're going to regret sitting in front of the computer all day when you + get older!" It never ended, they always had something to say, but he + silently endured it, because he knew that he had a better life waiting for + him on the computer, where people liked him and where he was happy. + + They could never understand what it was he was doing on the computer. All + they thought he was doing was playing games that were wasting his mind or + looking at pornography. No matter what it was, though, it wasn't + important. What was important, though, was that he get a job and go out + and meet some real friends. That's all that ever mattered to them. It + wasn't Ivan that mattered, it was Ivan getting a job that mattered to them + the most. + + "You need to get a job so you can have a taste of what the real world is + like and so you can learn to be more responsible." + + The real world? What was he living in? + + Why couldn't they just leave him alone and let him live his own life as he + wanted to? + + No, that would be too much, Ivan thought as he sat looking into the + computer screen, mulling over the same familiar thoughts. They couldn't + let him live his own life, they had to live it for him. + + All of the sudden, Ivan heard a knocking at his door, instantly snapping + him back to reality. + + "Yes?" he said, getting out of his chair and walking to the door. + + "Why is this door locked?" his father asked from the other side, jerking + the handle. + + "I don't know." Ivan answered, opening the door, letting his father walk + into the room. + + "Jesus Christ," his father began, "it's like a Goddamn cave in here! Open + those blinds and let some light in here. Christ, what are you? Some kind + of hermit? What the Hell are you doing on that computer anyway?" + + "I was just talking to one of my friends." Ivan answered, walking over to + the computer, turning off the screen. + + "Friends?" his father laughed. "You don't have any friends. Look at you, + you never even leave this room." + + "I met them over the computer." Ivan said. + + Instantly, his father broke out in a fit of laughing. "Over the Internet? + You?" he laughed, "They must all be dorks like you!" + + Saying nothing, Ivan just looked down at the floor. It was always the + same. The man would never get off his back. It always, always, had to be + something. + + Seeing his son say nothing, Ivan's father sobered up. "Here's the deal," + he said in all seriousness. "I'm giving you two weeks to get out of your + room and get a job. If you don't have a job in that time, then the + computer is gone." + + "Dad!" Ivan screamed. + + "If you don't have a job, then the computer is gone." Ivan's father said + one last time as he walked out of the room, shutting the door behind him. + + In a fit of anger, Ivan grabbed an empty glass and threw it against the + door as if he were throwing it at his father himself. "Damn you," he said + over and over again. + + It wasn't the fact that he had to get a job that bothered him, it was the + fact that having a job would take away from his time on the Internet. Of + course having money would be great, but what was he going to do with it? + Aside from a few CD's, there wasn't anything that he wanted or needed. It + would just be pointless, Ivan reasoned. + + It took Ivan about a week to find a job. Of couse he didn't like it, but + it was either this and nothing, and nothing was unacceptable. He would + not lose his computer. Ivan got a job in a small clothes store at one of + the malls down the street. From the first day, Ivan hated the job. It + didn't pay well (not well enough for his tastes, anyway), and he certainly + didn't get along with the people he worked with. They didn't like him + because he was quiet and didn't talk to them or laugh at their stupid + jokes, and he didn't like them because they were nothing like him and they + made no attempt to even try to get along with him. Not only that, but + his job, from the first instant, got in the way of his use of the computer + and the Internet. He had to go into work right after school and he didn't + get out until late at night. He had no time to himself, and when he did + actually have some time, he spent it sleeping, getting ready to go to work + once again. + + "I'm pround of you, boy." his father had said after he got the job. + + As the weeks dragged by, Ivan drifted further and further away from the + computer, the Internet, and his friends on it. + + Then something strange happened. + + One day at work, his manager walked up to him and asked to speak with him + in the back room. Nodding, Ivan followed his boss to the back room and + took a seat where the manager pointed. He didn't think much of it, he + thought that he was even hopeful that he was going to get a raise. He was + doing his job good and he always did what he was told. + + "Ivan, do you know why I've brought you back here?" his manager asked, + looking hard at Ivan who said he didn't know. + + "Well, I was approached by some of the other employees who claim that you + have been taking merchandise," he began, "I know you're a quiet worker and + that you keep mostly to yourself, so there is nothing that would lead me + to beli-- " + + Furious, Ivan cut in, "You're accusing me of theft!" + + "I'm not accusing you of anything, I was just relating facts." + + "I didn't steal anything!" Ivan protested. + + "I would like to take your word for it, Ivan, but more than one person, on + various occasions, have said that they have seen you taking merchandise + from the store. Now, as you know, this isn't a big store, and even losing + the smallest amount of merchandise affects us." + + "So what are you saying?" Ivan asked, confused. + + "I'm going to let you go, Ivan. Although you have always done what you + were told and you have done a good job and have always been on-time while + you have been with us, I can't afford to lose-- " + + "You're firing me!" + + "I'm afraid so, Ivan. I'm sorry, but I just can't afford to take any + risks." + + Depressed, Ivan took off his apron and handed it to the manager. Then he + left the store and started walking home. When he got home, he expected to + get yelled at by his father, but was suprised, and angry, when his father + only said, "Well, you better get up early and start looking for a new job + tommorrow." + + After that, Ivan went upstairs and booted up his computer. The sweet + sound of the fan and the testing of the harddrive soothing his mind. It's + been a long time, and Destroyer was ready to reconquer the Internet. + + Only this was a new, changed Internet. Ivan looked for all of his old + friends, but they were nowhere to be found. Nobody knew him, he was just + another forgotten identity. + + Alone, Ivan shut off the computer. + + -------------------------------------------------------------------------- + (4) - Hillary Clinton: Why Bother? - by Edicius + + According to a new book about the 1996 presidential campaign, called "The + Choice," Hillary Rodham Clinton consulted with a spiritual advisor who led + her through conversations with Eleanor Roosevelt. The book, written by + Bob Woodward, an assistant managing editor at the Washington Post, says + that Mrs. Clinton had several consultations with author Jean Houston and + an associate, Mary Catherine Bateson, in which she was able to talk to + Eleanor Roosevelt. + + These allegations are nothing new. Mrs. Clinton herself has admitted that + she had "meetings" with Eleanor Roosevelt while she was writing her book, + "It Takes a Village." In her syndicated column on June 4, she wrote, "I + occasionally have imaginary conversations with Mrs. Roosevelt to try to + figure out what she would do in my shoes. She usually responds by telling + me to buck up or at least to grow skin as thick as a rhinoceros." + + Senator Al D'amato, a stern opponant of the Clintons stemming from the + Whitewater investigation, was asked by a group of reporters what he + thought of this allegation. His reply, more or less, was "so what?" The + reporters went on to ask him if he would use any of this against her in + the Whitewater trial. He answered with a no. + + President Clinton and his wife have not commented on the new book. + + My question, why do we care? + + Hillary Clinton is a woman just like anyone else. Countless people talk + to a psychic, get their hand read, or go to tarot readings. Anything + related to the psychic field, as in those events already mentioned, can't + be relied on. So people look down on that. Since people look down on it, + they want Mrs. Clinton branded for her meetings. + + So answer this. How many of you make a decision based on intuition or + superstition. These are two things that aren't related to the psychic + field, and they can't be relied on. But how come we don't write them off + as a joke, or frivilous? That's because we all base some amount of our + decisions on them. + + Many may want to make Mrs. Clinton look like a horrible woman because of + this event, but they won't be able to. Luckily, this event will most + likely blow over soon enough. In my opinion, I really don't care what + they do. If they keep leading the country as good as they have been, they + can do whatever they want. + + -------------------------------------------------------------------------- + (5) - Life's Greatest Gift - by Edicius + + Madness is one of life's greatest gifts. + + I mean it, really. Did you ever stop and think? If you walk down the + street of any American town, and look out through the morning mist + glancing at the serene traquility, not everyone shares the same view. + Somewhere in that town, there is someone who may look out across the same + serene tranquility and see the last morning of their life. + + As we walk about in our daily lives, we will often take for granted the + peace that we feel. We take for granted the liberty and peace that we + have in our lives. We may know who we are, wherever we go, but do we know + who that person standing next to you is? + + The person next to us may be our friend, or it could be a vile enemy. The + thing, however, is that we may never know. We'll pass thousands upon + thousands of people in our lives. A very large majority of that, we will + never know for more then a few seconds. If circumstances allow, we may + say a few words to that person. Under more rare circumstances, we may + actually get to know who that person is. At this point, we will learn to + love or hate that person. Under different circumstances, we wouldn't have + known that person. + + Take a look into your memory. Out of the very few people that you knew + for a few mere moments, who are the ones that stick out in your mind? Is + it the one who was really courteus to you? Or is it the one who was mean? + More often than not, the persons that you will remember are normally the + ones who were somewhat less than nice to you. We, as a society, have + either become so adjusted to the assholes, grinches, and snobs, that we + place them on a "value" scale. Or, in actuality, we only meet so many + "mean" people, that we forget about the larger majority of nice people we + know. + + So, to my original point. If you want to be known, you have to be mean. + Wait, let me rephrase that. If you want to be _remembered_, you have to + be mean. As I already stated, people don't remember the person who held + the door open for them as they were walking into the store, they remember + the one who shut it in their face. That's because the person who shut it + in their face made them pissed off. Still, they're remembered longer then + the person who held it open. + + Girls don't want to date the nice boys. Most girls are stupid, and want + to be treated like shit. So, they'll find attractive those guys who are + shit. Sometimes the nice boys are too much for a girl to handle, + especially a girl who doesn't want a commitment. When the time comes for + the breakup, it's easier to break up with a boy who treated them like + shit. If that boy treated them like a goddess, then they will feel bad + about breaking off the relationship. Instead of having the guilt, they'll + take the easy way out, and go for the piece of shit. + + They say we all will get what we deserve in the end. Maybe they're right, + maybe the good and the bad will get what they deserve; or they could be + wrong. Being the optimistic one that I am, I believe I will get what I + deserve in the end.. but the end is just too far away. + + .. or is it? + + -------------------------------------------------------------------------- + (6) - Talking About Our Generation - by Auren Hoffman + + For those of us who grew up on MTV, video games, and microwave dinners, + "Generation X" is far from a complimentary term. The phrase "Baby Boomer" + has a nice ring to it, but "Generation X" suggests that my generation, + those people born in the United States between 1963 and 1983, are lost or + undefined. According to many pundits and modern philosophers, although we + might be the generation that can surf the Internet or program a VCR, we + lack the depth or direction to add value to society. Their "theory" + suggests we are lazy, apathetic, and care little about the world and even + more notable, we are lost. + + Needless to say, I have hope and pride in the generation that watches the + "Simpsons" but lives the life of "Friends." I heard another "theory" that + Gen X'ers are no different from boomers 20-30 years ago. Some people say + that all 22 year olds are "lost." + + Generation X is different from the boomers of yesteryear -- but not + because we are slackers, screw-ups, or schemers. The boomers tended to + be, in the 1960's and early 70's, ideologues that crusaded for their + causes and made love, not war. Then the boomers sold out their ideology + for BMW's, stock portfolios, and cable TV. The liberal boomers soon + became Reagan Democrats or fiscal Republicans. + + But Generation X is different. Though many of us have our government + causes, our campaigns, or strong ideology, the Gen X'er is (and will + always be) more libertarian than the Baby Boomer. We tend to distrust + government control of anything we don't want the government meddling in + our bedroom, our computer, or our income. Though socially liberal, like + the young people throughout history, young X'ers are far more fiscally + conservative than past generations. + + Though many Boomers may have lost faith in the federal government, X'ers + never had faith. We know that we are paying social security to support + our parents, Medicaid to support our grandparents, and taxes to support + wasteful projects like ethanol energy and corporate tax loopholes. We + never expect to benefit from large government programs. + + Many people think of the political spectrum as one-dimensional either + liberal or conservative. In a one-dimensional analysis, X'ers and Boomers + have roughly the same distribution of liberals and conservatives. However, + a real political spectrum is two dimensional (see graphic [sorry to the + ascii text readers, graphic is on the web page!]). On the graphic, each + person's political ideology is represented by a set of (x, y) coordinates. + The x-axis represents the traditional determination of liberal or + conservative while the y-axis represents a person's tendencies toward + libertarian or authoritarian policies. Here is where an X'er differs from + a Boomer. While Boomers tend to have an even distribution over the + y-axis, X'ers are skewed more toward the Libertarian end. Current + university students are more likely to agree with Milton Friedman than + with Franklin Roosevelt. + + Since Generation X is not yet a voting powerhouse, neither major political + party has worked to address our concerns. Both Republicans and Democrats, + with the exception of the Jack Kemp wing of the GOP, tend to support more + authoritarian government policies. Issues like immigration control and + the minimum wage have little appeal to knowledgeable Gen X'ers even though + they are the cornerstone of any Boomer campaign. But as Generation X + makes up a larger part of the electorate, Republican and Democrat + lawmakers will have to move "to the top" and address concerns like social + security, affirmative action, and remake other authoritarian government + programs. + + The generation of high-top Velcro sneakers, button-fly jeans, and + Y-necklaces is also the generation of smaller government, accountable + legislators, and rapid response. Though the left and the right of the + political spectrum is clearly defined, both parties must begin to push to + the top to survive. + + ---------- + + About the Author + + Auren Hoffman is an editor for the Internet Herald and a senior majoring + in Industrial Engineering and Operations Research at UC Berkeley. + + Auren is also a partner in Kyber Systems and built Guestimate, the highly + touted guestbook package. + + -------------------------------------------------------------------------- + (7) - "Mornings Suck" - by Eightball + + He reluctantly opened his eyes to a loud, irritating sound. His fist + slammed down on plastic, and the unwanted noise abated. He looked at the + object of his vexation and groaned, "oh shit, it's 8am. I'm late for + school." He dressed quickly, and flew down the stairs and out the door in + record time. + + Unlocking and opening the door to his car in one fluent motion, he jumped + in the driver's seat. After starting the car, he spent a few moments + selecting a tape. with the entrance of _Pigs on the Wing_, he sped up to + the traffic light at the top of the hill. Inevitably, it was red. He + hated this light. It always took so long to change when he was pressed + for time. He lit up a cigarette to keep occupied. He really hated + mornings. + + After a seeming eternity, the light turned green. He made a left, and + picked up speed on the main road. Gazing in the rearview mirror, he saw + flashing blue and red lights. He slammed on the breaks and pulled over. + The police car followed suit. "Damn. I'm late for school and now I'm + gonna get a fucking ticket!" The officer who stepped out of his squad car + was the last cop he wanted to see. It was the same one who stopped him a + month ago. + + "Alright, out of the car!" the policeman bellowed. He wasn't exactly in a + position to argue, so he did as he was asked. The officer recognized him, + and after he was given a sound talking-to, the cop smacked him around a + little to "teach him a lesson." + + Back in the car, a $120 ticket in hand, he was feeling sore. Painfully + sore. "Okay," he thought to himself, "its only 8 more miles to school. I + want to get there intact." However, no sooner than he had completed that + very thought, he got sideswiped by a Septa bus. "At least I still have + the right side," he said to himself, while attempting to concentrate on + driving without a door. + + He decided to stop at a convenience store, since his cigarettes had been + carried off by the wind. He bought some Cheetos and a Snapple, but was + carded for the cigarettes. He shot the clerk a nasty glance and left + without further comment. + + Arriving at school at approximately 8:45am, he suffered a nasty shock -- + the doors were locked! "Why the hell did they lock the doors?" he asked + no one in particular. Then he remembered. School was out for the summer. + "Well, now I know I had a good time last night," he mused as he hopped + back into his car and sped away. He laughed uproariously and lit up a + huge joint. + + "Mornings suck." + + -------------------------------------------------------------------------- + (8) My Future - [name withheld] + + I was asked by the author of this essay to publish it anonymously. + + ---------- + + It happened a little more than a year ago. My parents had gone away for a + three day weekend, leaving me in care of my brother. The first night was + a Thursday night, and I ended up passing out at 9:30 before I had had too + much to drink -- I just felt really tired. The next night "the fun began" + for me. I could have friends over, and we could basically get as much + beer as we wanted, and go out as late as we wanted, a rarity for + ninth-graders. + + My brother got my friends and I a case of Bud, I believe. We started + drinking at about 7pm, and I think we brought the rest of the case over to + another friend's house, who was having a party. I ended up walking home + at about 10pm with another friend of mine, who went home a little while + after. + + About that time there were about 20 of my brother's friends over, and I + went out on my front porch with my brother to have a beer. We were both + moderately drunk -- for me, to the point where I've completely opened up + and lost all my insecurities, and my brother to the point where he'll talk + relatively freely, yet still able to "keep his guard" and watch what he's + saying. + + We began to talk about school, talk about how he was when he was in high + school. We talked about alcohol, about marijuana, etc.. I told him that + I pretty much hated my high school, and 99% of the kids in my grade, + because they were so obsessed with drinking, and how cool it was, and how + cool they were in general (not to mention how un-cool everybody besides + themselves are, and wondering if those un-cool people know how un-cool + they are). These kids were my friends, and I was tired of it. Going out + on Friday and Saturday nights, getting fucked up, talking to lame girls. + I was growing tired of it, and I hadn't even been doing it very long. + + He began to tell me his High-School experience was very similar. He had a + solid group of friends, but they were by no means the "coolest" kids. I + was a little higher on the popularity scale then he had ever been, but + that was irrelevant. We talked on, for about a half hour. He told me to + fuck high-school, wait for college, when you will be redeemed. If you + work hard enough to get into a decent college in high school, you will + WIN, which is what his main message is. These kids in high school, a lot + of them are smart, but even if they're not, they're going out and getting + fucked up, getting high in school, etc.. And what will they have to show + for themselves in five years? The people that fuck the social scene in + high-school end up winning in the long run. You're not missing very much + (although it seems important at the time), and you've got the rest of your + life to look forward to. He was having a great time in college, academic + wise (where he was maintaining about an A- average, much better than he + did in High School), and he was smoking a lot of pot, drinking a lot of + beer, getting a lot of pussy, and doing it with COOL people. This sounded + too good to be true. + + Hell, he was even getting good grades. + + Next, to make matters even more "complicated," his friend that goes to + Princeton came outside and talked to me also. He had the same message that + my brother had, but his was just as effective. He had worked hard in high + school and was going to Princeton; and now he was "rocking." The decision + seemed simple. Fuck the pathetic high school social scene, and set my + sights on the future. My life changed forever. + + My grades in the fourth marking period of ninth-grade went up + dramatically, and since then I have been pulling about a 3.50 GPA; not as + good as I could do, but certainly much better than my 2.80 GPA of last + year (would've been worse if I hadn't done well fourth marking period). + And besides the occasional party I'll go to, or friend's house I'll go to + drink, I have basically "fucked" the high school social scene. + + It is for the best. I don't know if every town is like mine, but mine is + dominated by rich, daddy's girls, the *DEFINITION* of the term JAP (Jewish + American Princess). They are all worried about who's talking shit about + who, who just hooked up with who, and who they could hook up with to gain + the most points on the popularity scale. The guys are cooler; but they're + also very cliquish and "you're not cool enough to come and hang out with + us" kind of people. Fuck them. + + If you're reading this, I don't know what kind of a message you will take + from it. All I know is, if this event had not happened, I don't know + where I'd be right now. I *DO* know I would not be as happy as I will be + a few years down the line. That's all. + + -------------------------------------------------------------------------- + (9) - Reviews + + CD/LP + + Neglected Sheep/Geno Died/Livestock Music + + Imagine the Crash Test Dummies' lead singer in a blues-rock band. Well, + that's what you have with Neglected Sheep. Hailing from Charlotte, North + Carolina, this band gives us a very impressive debut CD on Livestock + Music. Self-produced, this 10 track, 47 minute CD never once losses it's + energy. + + Combining a mixture of Alternative Rock and Pop with a blues edge, this + band is destined for national spotlight. They don't bring a new musical + genre with them, but they bring the intensity and purposeful lyrics that + many up and coming bands lack. + + Their latest single, "Annie Brewster", is the crowning point on this + album. With a steady bluesy beat, and great lead vocals, this song is + definitely one of the best on this CD. Adding an organ to the guitar, + bass, and drums, gives it a very interesting sound. + + "Why", a seven-plus minute trip through a range of emotions, is another + high spot from this album. Even though it is the longest song, it keeps + the listener moving. Starting out with a slow, melodic rythym, then + moving into a more upbeat tempo with, in my opinion, early-Cracker guitar + riffs here and there. + + Overall, this CD is a very impressive debut. With an upcoming tour, they + are destined for national recognition. + + Grade: A+ + Contact: Abott Promotions at (804)272-7522. + + ---------- + + e'Zine + + Rice - Issue 2 + The RICE Militia is a top secret organization, so there is no email + address even though it is an e'zine. + + Send a SASE for more information to: + 6666 Pickwick Dr. + Bensalem, PA 19020 + + Rice & the Rice Militia, the newest creation from Black Francis and Dead + Cheese, ex-Doomed to Obscurity members. Releasing their first issue in + early June, and their second issue on June 26, they are really releasing + fast. Both issues are about the same in quality. + + This issue, as per the theme of the 'zine, was humor filled. Black + Francis had a good detective story called, "Frank Esposito, World's Worst + Detective, Does it Again!" Dead Cheese had a great poem called "Little + Johnny," and Styx had a very interesting graphic of his sister. It's too + much for words, really. + + Although this 'zine may have small issues, they are of high quality. + Let's hope Black Francis & Dead Cheese stick with this one. + + -------------------------------------------------------------------------- + (10) - News Snippets + + I'm not sure exactly what newspaper this appeared in, nor when. I'd + presume it is from a Floridian paper. I received this from someone on + IRC. + + _Teen Charged With Hacking FAU Computer_ + + By CHUCK McGINNES + + BOCA RATON- A recently graduated high school senior has been charged with + breaking into the computer system at Florida Atlantic State University's + College of Science and Engineering, destroying a professor's electronic + mail and transferring files to the internet. + + Thomas Robert Stromberg, 18, who just graduted from Olympic Heights High + School, was arrested Thursday at his home west of Boca Raton. He was + charged with two felonies- offenses against intellectual property and + offenses against computer users. + + Investigators from the Florida Department of Law Enforcement and FAU + seized a computer and related equipment and material from Stromberg's home + at 9596 Lancaster Place. + + FDLE agents also seized computers from other homes in the Boca Raton area. + Additional arrests are expected, FAU Detective Carl "Chuck" Aurin said. + + The investigation began in February after Elise Angiollilo, FAU's director + of tele-communications, discovered someone had gained access to the + computers in the science and engineering department. + + The hackers apparently used the account of a former FAU student to get + into the unversity's computer system. Once they had access, they twice + tried to crash the computer system and wiped out the electronic mail + system of Mahesh Neelakanta, the department's computer system coordinator. + + Information and copyrighted software from the computer files were + transferred to the Internet, where the data could be copied by anyone + using the Internet. FAU officials would not say what was in the files. + + "The university has very significant information in the computer. The + equipment is used by the state for a specific purpose: education and + research," said Tom Horton, a computer science and engineering professor. + + Neelakanta found and FAU computer account that was being used to request + information from an outside computer system. The outside system asked for + personal information and the individual using the account entered + Stromberg's name, according to an arrest report. + + Stromberg told the police he used a program to crack password files that + allowed him into several user accounts where he stored pirated software. + + This is not the first time hackers have broken into the computer system of + a government agency in Palm Beach County, + + In 1992, a 15-year-old Jupiter boy allegedely tinkered his way into a + South Florida Water Management District computer system. Sheryl Woodm a + district attorney, said she could not recall if criminal charges were + filed against the boy, but she remembered seeing a letter of apology from + the youth. + + Investigators said most hackers break into computer systems for the + bragging rights. They usually write bulletin boards and share the + information they obtain with other hackers. + + Stromberg, who was a member of his school's computer club, went by the + name Dr. Jekyll. He is being held at the county jail on $1,000 bail. + + ---------- + + From US News & World Report, 6/24/96: + + Eye on the '90s, page 20 + _Cyber Island_ + + This fall, Doug Patterson plans to launch the Rastafarian Internet Boot + Camp, a series of weeklong retreats in secluded Port Antonio, Jamaica. + "People don't want to sit on the beach and get drunk for a week," says + Patterson, a Net trainer for 10 years. "They want to be productive on + their vacations." For $3,500 per week, you can download some sun as you + bask in classes on Web programming or Java scripting. One pitfall: + getting sand out of the keyboards. + + ---------- + + From the Asbury Park Press, 6/24/96 + + Beer-craving cat burglar gets stuck in vent + + The Associated Press + + SAN ANTONIO -- Felix Rivera's late-night craving for a cold brew bought + him a ticket to the cooler. + + Rivera, 33, greased his body with used cooking oil, then tried to slide + through a 2-foot-wide rooftop air vent into Pik Nik, a convenience store + where he's a regular customer, police said. + + He tripped the burglar alarm early Friday when his upper body became + wedged in the vent with his legs dangling inside. + + It took eight firefighters an hour to free Rivera. + + "He walked up to me and said, 'Sorry, man. All I wanted was a beer.'," + store manager Joe Castellano said. "Because of the alarm, he was pretty + deaf after he left." + + Rivera was charged with burglary and held on $10,000 bond. + + Damage to the store was estimated at $1,000. + + -------------------------------------------------------------------------- + + Jonas would like to thank: + + Abott Productions, Livestock Records, Jon Vena and WHTG-FM, Auren Hoffman, + Eightball, The Masked Marauder, Seta, Kojak, Mindcrime, Cerkit, Mogel, + Black Francis, Crank, Oodles, Eerie, and a bunch of other people .. + + -------------------------------------------------------------------------- + + Jonas e'Zine -- issue 19 + Jonas e'Zine is produced somewhat monthly under Jonas Productions. + Tom Sullivan, Editor-in-Chief and Publisher + Marc Newman, Associate Editor + our website: http://www.cybercomm.net/~edi/jonas.html + our ftpsite: ftp://ftp.etext.org/pub/Zines/Jonas/ + our email addresses: edi@cybercomm.net (Tom Sullivan/Edicius) & + b3lial@cybercomm.net (Marc Newman/Belial) + we'll have a po box soon, we swear! + + "Jonas.. it is more then a 'zine, it is a lifestyle." + + -------------------------------------------------------------------------- + + diff --git a/textfiles.com/magazines/JONAS/jonas_20.txt b/textfiles.com/magazines/JONAS/jonas_20.txt new file mode 100644 index 00000000..76291fd1 --- /dev/null +++ b/textfiles.com/magazines/JONAS/jonas_20.txt @@ -0,0 +1,1111 @@ + -------------------------------------------------------------------------- + + mmmmmmmmmm$$$$ .s&$P""""7$&s. $$$$"""""7$&s. s$$$P"""""$&s. .s&$P""""7$&s. + gggg $$$$ $$$$ $$$$ $$$$ $$$$ ggggp****q$$$$ `7$$bmmmmmgggg + $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ gggg $$$$ + tMM$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ + $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ + $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ $$$$ + `7$$bmmmmd$$P' `7$$bmmmmd$$P' $$$$ $$$$ `7$$bmmmmd$$$$ `7$$bmmmmd$$P' + + -------------------------------------------------------------------------- + + Jonas E'Zine, Volume 2, Issue 5 (C) 1996 by Jonas Productions, + all rights reserved. Copyrights to stories, articles, and illustrations + are the property of their creators, unless otherwise noted. The + contents of this publication may not be reproduced in whole or in + part without consent of the copyright owner. Jonas may be freely + distributed as long as this notice remains in place, and + no fee is charged for it's retrieval. + + I try to run from things I can't face, + but I'm tripping on my shoelace. + Little John / "Shoelace" + + -------------------------------------------------------------------------- + Jonas E'Zine Volume 2, Issue 5 July 28, 1996 + + Contents: + + (1) - Edicius' Editorial + (2) - untitled #1 [poem] - by Oodles + (3) - How I Got This Way [essay] / by Oodles + (4) - "My Name Is Jonas" [story] / by The Masked Marauder + (5) - Truth in the Electronic Age [essay] / by Auren Hoffman + (6) - "End of Eternity" [story] / by Eerie + (7) - "The Day" [story] / by Edicius + (8) - "Deceptive Media Experience" [story] / by Jestapher + (9) - Reviews + (10) - News Clips + + ------------------------------------------------------------------------- + (1) - Edicius' Editorial + + Tonight, I made a revelation. + + I am going to stop fooling myself. I am going to stop shaping myself, + manipulating myself into someone who I'm not. + + For the last two weeks, I've been telling myself that there is something + wrong with me. If I want to do anything, if I want a girlfriend, I have + to change. Not a physical change, I don't care if I lose or gain ten + pounds at this point. No, a mental change. I feel that there is so much + wrong with me.. That if I am to succeed in anything, I have to change. + + But I don't need that anymore. If someone became friends with me, and + tried to manipulate me into something I wasn't, I would lose them so + quickly. Why can't I lose myself? Why can't I convince myself that I'm + perfectly fine? + + Tonight, I did. + + I had a good night, I have no complaints about anything I did. I came + home at one o'clock in the morning, and talked to my best friend, Maureen. + Right now, no one knows me better then my friend Maureen. I love her, + we're just really close. No one knows me better now, and no one has ever + known me this good. I help her with her problems, and she helps me with + my problems. + + Tonight, we talked as always. I don't know what it is, but something + happened tonight. Something majestic. During the course of our + conversation, I finally realized that I'm perfectly fine. I'm at an inner + peace right now, the war has stopped. There is, and was, no reason for me + to hate myself. + + I believe that love exists, but it's not going to touch everyone. You + also can't gain love, if you don't let it in your heart to begin with. I + don't know if I'm ever going to find love. Let me clarify, I don't know + if I ever _want_ to find love. I haven't found it yet, so I'm not going + out of my way to find it now. In the end, we will get what we all + deserve. + + ----- + + I don't want a relationship, I just want to hold someone. I want to hold + them in my arms, and have them know that they are safe and protected. I + don't want sex or any of the related things, I just want to hold a girl in + my arms. I can't hold her and make her feel safe all the time, but if she + keeps that image in her mind, I will be happy. If one day, she's feeling + bad, she can recall the fact that I held her in my arms, and how safe she + felt. I'll always be there for that person, and they have to know it. + + I'm a romantic at heart. I don't want to go out and get laid. I don't + care if a girl goes down on me or whatever. I want the simplier things. + I want to hold a girl, and never let go. I want to give her a simple kiss + on her neck. I believe that a simple kiss will convey so many more + emotions then anything else. I don't want head, I want to hold. + + ----- + + I may seem like an average sixteen year old, but these are my thoughts. + There's so much in this world right now, I'm going to conquer it. I'm + going to get it all, and never let go. I'm going to find someone who I + can really love, who I can love back, and never let go. + + One day, I'm going to get what I deserve. It could be tommorow, it could + be at my death; but one day, I will be truely happy. + + If I could ask for just one thing in life, I would ask that no one ever + feels uncomfortable, scared, or sad around me. I don't want people to be + intimidated around me, there's no reason to. I want people to respect me + and like me for who I am. + + ---------- + + As far as news this month, uh, I don't know much. I would like to thank + everyone who wrote this month. People who've written for Jonas in the + past, like The Masked Marauder and Auren Hoffman, and people who are 'new' + to the 'zine, like Oodles, Eerie, and Jestapher. + + I apologize for the fact that I didn't put the web version of Jonas 19 up. + I'm a fuckin' lazy ass, sue me, ok? I will have a web version of this one + up, so don't fret, cupcake. + + If you are in a band, or run a 'zine, contact me! Email me. I'm always + interested in recieving demos and cds and 'zines to review. I love them, + I am also interested in doing more interviews with bands and more + full-length articles on bands. So contact me, ok? + + Next issue, we should have a post office box, yippie! + + Have a nice day. + + -- Edicius + + -------------------------------------------------------------------------- + (2) - untitled #1 - by oodles + + in this dark deslote place which i call reality, + stands a young girl trying to break free. + from societies standards and expectations, + into who she dreams and hopes she can be + + they can not stop her, + they will not turn her away. + she will make her own decisions + and be happy one day. + + she will stand up on her own, + so that all may see. + in this dark deslote place, + that girl is me. + + -------------------------------------------------------------------------- + (3) - How I Got This Way - by Oodles + + How have I gotten this way? Well, I suppose it all started originally in + 1993. + + It was christmas, and the previous year my parents had bought me a + computer, so that year they decided to buy me a modem. It was a cheap + 2400 baud modem that came with a "Prodigy" startup pack, but it ran and it + changed my life forever. + + I first got onto Prodigy and quickly learned how to use the forums and I + could communicate with people through messages in forums and emails. I + started associating with some people, and soon they told me about this + thing they do called "bbsing." I wasn't really sure exactly what it was + or what I could do with it, let alone HOW to do it. But I followed their + advice and tried it out. + + The person who originally mentioned it to me, gave me the phone number of + a Pennsyvanian bbs and told me how to call it. It was a little one line + board in Pittsburgh. At the time, I didn't KNOW it was in Pittsburgh or I + would not have called, that is definitly NOT local. But I was young and + naive and believed everything this Prodigy kid told me. + + The board basically sucked, I could do nothing, it wasn't even a Macintosh + board so I couldn't use the files available. + + You can imagine how surprised I was, as well as my parents, when we got a + 300 dollar phone bill that month. I had no idea I had spent so much money + on a board that sucked so much. I had no idea there were MBBS chat boards + with 30 lines or even the internet, I thought that was the best it got. + + Of course I assumed all modeming sucked and the person on Prodigy was + stupid. I put the modem away in a closet, never used it again and went on + with my life. My computer was there to type up homework and do work for + my parents, that was the extent of it. + + One day, my father brought home a BBS list for me. He told me a friend at + work had given it to him, made sure all the numbers were local, and told me + I should try it out. + + It was the _Allen Joffes BBS List_. One of the numbers was a board called + Clockwork. I dialed it up. It had so many phone lines, I could talk to + other people while I was on, I was amazed. + + I had used all fake information as I had been told by my parents. They + told me to NEVER give out real information over a computer, that all the + people on it were psycho and would come after me, and I did not want that + to happen. + + I made up a fake identity for myself, from that day on I would be known as + Karen Southport. I had a fake address, phone number, birthday- everything. + to me, Karen became real because I always had to refer to her, I had to + become her to stay on the boards I called. + + At first the idea of having this fake identity was fun for me, i could be + whoever i wanted to be and no one would know the difference. Anything I + said, as far as others were concerned, was the truth about myself. But + soon I grew to lose myself in this identity and actually wanted to reveal + things about my life to these people, but following my parents strict + advice, I did not. + + From Clockwork I got banned for life, for some reasons which we will not + discuss today.. But, in the time I was on Clockwork, I did receieve some + other BBS phone numbers, such as Onix. + + Onix was the turning point for me, in a way you could say Onix changed my + life forever. It was the starting point of the real turnaround. I logged + on, with my fake info as always. The only difference being the handle + Karen was taken, so I shortened it to the first thing I could think of, + "kar". + + Day after day, I began talking to the other users. The people on Onix + seemed to know each other, and some were even my age. They were friends, + they hung out outside the modem. I was astonished by this, and I wanted a + part of it. I became closer and closer to these people who knew me as + Karen as the days went on. + + One day I decided to let it all go, I wanted to tell them the truth about + me. Despite what my parents had said, I had grown to trust them. They + accepted me despite my lies, it was wonderful. I let the sysop know who I + really was and he changed my account info immediately and just told me to + never do it again. + + From that day on, I was no longer Karen, I was Kim. I was me. I soon ran + out of days on Onix, and after mooching from the users on there, I decided + to move on, to Gamepower. I'm sure a lot of people had their modeming + start on Gamepower, and even met some of their best friends on there, I + know I did. + + I remmeber the first night I logged on there, two users, Iceman and Billie + Joe (whose name is Mark), were in the teleconference. It was a few days + after the Green Day concert, and me being an alterna-teen at the time + totally jumped all over the user Billie Joe. + + We started talking about became amazing friends. Soon we had decided to + meet. We met at a movie theatre one day, it was very awkward. We saw + that horrible movie where Adam Sandler goes back to school.. but i digress. We got along pretty well despite the awkwardness. We kept talking on the phone, and + met again a few more times in person. Then one day, he asked me to go + out with him. + + That user I had met one day logging onto a board, still a bit unsure of + myself and of modeming, was now my boyfriend. + + I was shocked at first that i could become so close to someone over a + modem, and that this someone had turned into a relationship for me. Even + though Mark and i eventually went our seperate ways and broke up, outgrew + my shyness of meeting new people by meeting many of his friends who soon + became my friends also, and became who I am today. + + I have experienced numerous things through the modem, met so many good + friends and have had so many interesting situations. I honestly think if + i did not take that step of meeting Mark in person and starting a real + relationship with him that i would be here talking to you all today, i + would still be a scared little girl behind her computer screen knowing no + one and afraid to reveal her true self to anyone. + + The day I logged onto Onix really did change my life forever. If it + wasn't for Onix I would not have called Gamepower, had not met Mark and + would not be me, the Kim I am today. I have had bad experiences, and + sometimes I have wished I had never turned on this damned modem, but the + good outweighs the bad, and I am very happy I have become who I am all + because of it. + + ----------------------------------------------------------------------- + (4) - "My Name Is Jonas" - by The Masked Marauder + + Fresh & clean, a new beginning. The ultimate chance to turn back time, to + undo all of the mistakes that had been made this far. To start over & + re-create what once was. But at the same time, be totally & unequivicably + whole. No pre-conceived notions of who he was, or what he stood for. Less + tangles to wade through in the never-ending search to connect, in the + machinery of night. + + This was it, Head & Shoulders was correct, live & let live. + + ----- + + The first day of school was always the hardest. He knew no one, & no one + knew him. It was scarey, being in a new place, with a whole bunch of new + faces all around him, talking & chattering in unison. It was exhilerating + too, it was a whole new world waiting for him. + + He looked down at the small print-out that his schedule was on & found his + first class, English. + + "Room 216? I didn't know there was a second level to this school." he + muttered as he wandered along through the hall. "I guess I should ask + someone, too bad I don't _know_ anyone." he said under his breath. + + So he just kept walking, now looking for someone he could ask. He didn't + want just anyone, he wanted someone that wouldn't take him at face value & + then push him away, he wanted someone he had things in common with, + someone that would know him without talking to him. + + "Who am I kidding? There is no one like that, no one could be that + perfect for him." he said. Oops, this time a group of girls saw him + talking to himself & gave him quizzical looks. Once he passed, he heard + their muffled laughter. Oh well. + + He was now insanely lost & had no earthly clue where room 216 was. With + no apparent alternative, he just continued to walk & search for someone + that looked like they would be cool about giving him directions. + + He had never been an extroverted person & when in a situation that + commanded him to associate expressly with others before thinking + everything through, he usually screwed up the situation quite royally. But + his current situation was getting him nowhere but late & lost, & it was + increasingly obvious that some action needed to be taken. + + Just as he made this decision, he walked up on someone that had a familiar + air to him, this guy was a pretty average person physically, but had an + intelligent look in his eyes. He realized that they guy reminded him of + him. Ladies & gentleman, we have our first candidate. + + ----- + + "Hi, uhm, sorry to bother you but, uhm, do you know where room 216 is?" he + stammered out. + + "Uh, hi. Yes, in fact, I do. Go up those stairs + & go left. Keep going for awhile & it will be like the sixth or seventh + door on your right." said the stranger. + + "Whoa, ok. Thanks for the help." he replied. + + "Hey, are you new here? I don't think I've seen you before." asked the + mystery socialite. + + "Yeah, I just moved here." he quickly answered. + + "Cool, I'm Adam. If you need anything else, just find me." said the + potentially cool guy named Adam. + + "Uhm, thanks, I just might do that." he said. + + "No problem, by the way, whats your name?" asked Adam. + + ----- + + Everything just seems so stilted. I don't understand why it has to be so + hard for me to meet new people. People have become the supreme judge of + me. & I don't know when I became so vulnerable. I feel like I let people + in so far, but not far enough. They feel me distance myself from them & + then leave. That small rejection of me hurts, even though I brought it + on. + + But it isn't only that I'm so extremely nervous about entering this new + social situation. I have so many opportunities, so many choices; but I am + so damn afraid of making the wrong ones. I don't want to end up hurt & + alone. What combination is going to make me happy? + + Doesn't he know how hard this is on me? I don't know how I should feel + right now. I'm so insanely confused about things. I am so relieved to be + starting over in a new situation but this is where I have to pick. Make or + break, so to speak. + + I've never been a terribly confident person, but I don't think it is fair + to me or to those around me to let social issues slide because I don't + feel comfortable enough with myself to be extroverted. I guess the most + important thing I should be asking myself is why. + + I don't have the luxury of blaming these types of feelings on any + traumatic experience from my childhood, for the most part, I've had a + pretty good life. Something has made me different from the others, I've + felt that strange separation from the beginning. There was always an air + of un- familiarity when others dealt with him, almost as if he was never a + part of them, he had never made the team. + + I think too much. Maybe that's it. I over-analyze & blow everything out + of proportion in every facet of my life, & I still haven't met one other + person that does the same way. It isn't that I can't find others just + like me, no, that would be too specific; I can't find others that + _resemble_ me. + + But maybe it isn't just my fault, maybe it isn't my own behavior that + causes this. I guess what I hope for in this move is a sort of + connection. If I could find someone that I could relate to, I would be + truly happy. + + Well, I don't think that is it either. Admittedly I am lonely, but making + a friend isn't going to immediately take all that pain away, not in a + million years. I think that my problem is that I try too hard & when I + fail, I fall to pieces & resort to feeling sorry for myself. + + So many questions, no answers. It is almost as if I have to start with + the most complex & soul-searching questions & work my way down from there. + I'll have to answer questions like "Who am I?" before I can answer little + questions like "What is my name?" + + ----- + + "My name is Jonas." + + -------------------------------------------------------------------------- + (5) - Truth in the Electronic Age - by Auren Hoffman + + People are too quick to accept someone's word as truth in today's world of + moving electrons and instant media. Every television station, newspaper, + magazine, and radio show is biased. There is no such thing as totally + objective, nonpartisan reporting. Media should be biased - but they + should be forthcoming about the bias. + + CNN news reports always defend Clinton at any cost while the Wall Street + Journal can always find the up-side to a Republican folly. The Washington + Times and the Washington Post usually report on the same story in two very + different ways. But the average reader, watcher, or listener does not + understand this. The average Joe needs to be taught that what the media + reports, and how it reports, reflects upon the personal views of those who + are doing the reporting (or those who own the media). + + Listening to news reports is almost like overhearing a locker-room + conversation about Sally sleeping with the football team and Jim killing + his math teacher. There is probably some truth to the report but rarely + is it fully accurate. Sally probably slept with only one football player + and Jim probably said that he wanted to beat up his math teacher. Every + time a story is reported it gets transformed. News reports are no + different from the game "telephone" that you used to play when you were a + kid. + + I discussed this topic with a friend of mine who said, "I don't believe + news stories immediately when I hear them, but, I tend to believe it after + hearing the same story from multiple sources." My friend has the wrong + attitude. How many times have you heard that the Republicans are cutting + Medicare? At least 1000. But the GOP proposed to increase Medicare - + they just want a smaller increase than the Democrats. Government + officials, sports figures, and businesspeople should always be innocent + until proven guilty. Remember, Sally's rumor probably got around her high + school too. + + All said, however, you have to believe in something -- though you can't + take a report only at face value. I never believe "facts" until I + complete the proper research and take some time to determine my opinion. + For instance, I believe the world is round and have not joined the "Flat + Earth Society." I don't have any real proof of the world's shape and I + never tried to sail around the world, but a preponderance of the evidence + suggests that the world is indeed round. + + With information overload coming at our population, many of us choose a + medium to filter the information for us. This is very dangerous. We + should take advantage of the availability of news from different sources + and determine our opinions after thought and rational decision making. + + -------------------------------------------------------------------------- + (6) - "Dead Star" - by Eerie-Kun + + 1 + + No matter was going to happen, he wouldn't let it go. + + Come on, it's his fuckin' destiny, after all. And who are we to even + think about screwing up with his destiny? + + That's even though we all know destiny is fake, of course. + + 'Cause yeah, sure, there's all this cause to effect gibberish in action. + It is there. We can't get rid of it. He being no more powerful than + anyone makes no exception. He's stuck with the causes. Stuck in pure + chaos. + + Many times he thought: "I'm so fuckin' alone." That was true. He + couldn't be closer to the truth, actually. By feeding his conscience with + that sole statement, he was giving himself the awareness of his own + nature. This, even if he hadn't the cleverness to understand it. Yet. + + He also possessed the essence of drama. He was blessed with the purity of + murder. The cause made him become a criminal. He was what he was, no + less, no more, as transparent as transparent could be. + + Maybe that's what led him to his loss. His lack of self-deformation. The + fact that he had nothing to exaggerate. The only notion he had the + knowledge of, that was related to the process of altering an outsider's + view of him, was his capacity to blur himself. Which, of course, didn't + help all that much. + + The state of panic, which had its hold on him on a regular basis, was + always striking in a cold, telegraphical fashion, except maybe for a + couple times when he simply couldn't control it. Violence sometimes + overcame his will. It was the only way to escape without drowning into + insanity. + + .. Or wasn't he already insane? As panic engulfed his mind so many times, + he could only wonder. 'Cause hey, maybe after all it's the insanity that + gets lost into himself. Just like so many lacks, so many losses, so many + holes would have left that many square miles of dead areas where unknown + residues of bad trips can sleep, ready to be awaken by the tiniest spark + of blatant panic lights - Just like hazard spots. + + But since those areas were dead, they wouldn't hurt. They would just + become significative. They would just get a name. They would just + provoke unwanted souvenirs. They would just recall otherwise long since + faded memories. He's lost everything about his past already. All he has + left is the blurring veil. & maybe, he thought, this one's fading as + well. + + And now he was about to do something terrible, & no one could ever + understand it because no one was aware of the whole cause to effect + process. People tend to think that you can set your life your own way. + They tend to believe that if you're doing wrong, it's your fault. They + might be right, but even they couldn't have any power over their destiny + even if they wanted to. They don't have the knowledge. They don't have + the patience. + + He has spent the whole afternoon trying to write the god damn letter. For + some reason he had to explain the unexplainable. Of course it was + impossible. Maybe he even knew it. Cause to effect. Had he sent it, he + could have hoped for something that was also impossible. That litterally + fucked him up. + + So instead, he did it. He went past that limit he thought he would never + get past. + + And when, on the day after, he realized the whole mess he was into now, he + was way beyond rationnality. The cops were gonna get his ass if he didn't + move, quick. Like, now. He knew he had only one place to go. The lack + of choice appeared as so obvious that the panic increased again, + fullfilling all the dead areas of his mind. As usual. + + --- + + 2 + + That specific morning, the outside weather was as bold as a drawing drawn + from an unsharpened pencil. + + The images were bigger than children images. They were strong, wide & + scraped. The whole city appeared as vague yet defined shapes, as if water + covered it. Its staticness was moving, swirling, crawling. He had no + fear at the moment, being way too busy with the contemplative state he's + almost consciously put himself in. + + There was too much caffeine & other types of speeders in his blood anyway. + Everytime he'd check his watch he'd notice how much his hand would shake. + That reminded him of how frail his body was. It was way less strong than + average Joe's & to some extent it was enough to scare him. Actually, + everything that reminded him of what he was, scared the shit outta him. + It came to a point where he was scared of being scared. + + But still he would keep on falling into nothingness, for no apparent reason. + + After "I'm so fuckin' alone" often came "I'm tired." + + He walked a couple blocks, not even thinking of hiding. There was no need + to hide. Admiring the highness of the cold buildings surrounding all of + him was way too important for now. And since it was so ephemere, there + was no way of getting back to it "later". + + As if there was a future anyway - That's bullshit for dreamers. + + As if there was a need to save for later use. He sure wasn't dumb. He + knew the basics of immediateness & temporal destruction. He had learned + many things from the day he grew up for real & killed the kid he was. One + of them was to never take anything as granted. And that philosophy + inconsciently morphing his mind, he never had any concrete gain, never + would. + + A sudden feeling of rapture filled him for a few seconds & it was so + terrible it almost made him cry. + + --- + + 3 + + - Alright, so what's up man? + + The fact that Rory would show up at his place at 8 in the morning didn't + seem to affect Eric too much. Maybe he was used to it. Maybe he didn't + mind being awaken that early. Or maybe didn't he even sleep last night. + Who knows. Who cares. Rory wouldn't even ask why. + + - I'm fucked up. + + - Why so? + + - I dunno. Weird shit. + + - Want some coffee? + + - Sure. + + - Well, go make some. + + The place was way too hot, as usual. There was a small fan in the corner + of the room & that was all. Eric didn't seem to care about the heat. + + - So what exactly did fuck you up? + + Rory drank some coffee, slowly. There was no point in increasing his + body's inner temperature. Well, not all of a sudden, like that. + + - You don't wanna know. + + - Well, if you say so .. + + Why did he come here, anyway? He had no clue. He knew eric would give + him nothing near a warm smile or a comprehensive ear. There was probably + nowhere else to go. He namechecked all the other places where he could + have went & it seemed to him that none of them would have provided what he + required. + + Of course he didn't know what exactly was his need. The definition of the + word "need" itself was far away from the exact unnamed, abstract concept + he'd be reffering to. It was beyond the limitations related to the human + ability to give names. + + The radio was turned on. Some guy talking about stuff. Morning shit he + didn't care about. When the guy stopped talking, Eric turned it off, + because he didn't want to hear the music. + + - Why don'tcha leave it on? + + - I don't care about music. + + - How come? + + - You gotta be weak to listen to music. It's a fuckin' crutch. + + Rory categorized the thought as "bizarre" & drank some more coffee. Maybe + Eric has evolved more than anyone else. It was possible. If evolution + shows, he thought, then he is way further than us in his way to perfection + - But then again what's the point in going that far if it makes you + distant, thus not perfect? + + ----- + + The rest of "Dead Star", a 25 chapter story, is being released soon by + Eerie-Kun and Doomed to Obscurity Productions. + + -------------------------------------------------------------------------- + (7) - "The Day" - by Edicius + + He felt a tremble in his arm, and quickly licked his lips. She was so + close to him, and he couldn't believe it. He'd never been this close to a + girl before. He wanted to reach out and kiss her, but deep inside, he + couldn't. He knew that would be too forward. Instead, he offered her a + sip from his Coke, and continued the small talk they had been making. + + Every minute that he thought of her, his heart would melt. He'd never + really liked a person as much as he liked this girl. Right here and now, + she was sitting next to him in ths small town Burger King. He liked + everything about her: her hair, her eyes, her hands .. he even liked the + way that the small dob of ketchup stuck to her cheek, just next to her + lips. + + "You have ketchup on your lips, dear." + + She quickly wiped it off, and they continued with their conversation. He + listened, as much as his heart would allow him to. Everytime he looked + into her eyes, his heart would just melt again. Everytime they talked, + he would think highly of her. He placed her on a pedistol above all + others.. His utmost desire in life was to have this girl right now. + + Then the realistic side of him jumped in and said, "wait a minute." + + As much as he wanted this girl, he knew he could never have her. No girl + would could want him, at least at their age. When people are young, + they're supposed to fall in love and just have sex. It's an unwritten + rule, no relationships until you're older. How old, he wasn't sure. He + just knew that right now, he couldn't have her. He wasn't funny, at least + all the time. He wasn't one that would make her laugh constantly. Hell, + he couldn't even make her laugh part of the time. Somewhere, he thought, + the joke always loses its funny-ness during the trip from his mind to his + mouth. + + He was also romantic. That wasn't something a girl his age would want. + Again, it goes back to the unwritten rule. Girls his age don't want to be + charmed and cared for, they're too independent for that. Especially since + that whole feminist movement. "Chivilry is dead," he thought. Girls, or + should he attempt to say, women his age don't want to be treated nice, + they want to be treated like shit. Simply because, no girl his age wants + a relationship. + + He had friends of his that were girls.. Sometimes he wondered how in the + world he ever managed to become friends with them. He felt so comfortable + around them, but this one girl was driving him nuts. Not the nuts that + would make a person commit suicide, but a nuts that would make a person + fall in love. All of the time he spent thinking about her was time he + loved. He loved to think about her.. He'd rehearse what he would say to + her a million times, but he could barely squeak out a "would you like some + of my fries?" Its easy to talk to someone when you don't want anything + else, maybe some guys are meant to be friends with girls, but never + anything more. He'd often think that he was that guy. + + He'd always look forward into the future, and know that one day he'll find + a girl that he could truely love. Actually, he already found her, and she + was sitting right next to him. He'd met the same type of girl a few + months before. He really liked her, but she didn't want him. Although he + was prepared to give her the world, and treat her like a princess, she + didn't want that. So, he'd always known that one day, he could would find + a girl that he could like, that would like him back. + + "How come that day isn't today," he thought. + + -------------------------------------------------------------------------- + (8) "Deceptive Media Experience" - by Jestapher + + I was ecstatic when my father allowed me to "christen" Television. It was + unlike anything I ever knew. As I pulled the knob, I encountered a + feeling I have yet to experience again in my life. It was a feeling of + comfort and joy. With this feeling, I knew Television was good. + + Every day after school, I would race home, throw my schoolbag on the + couch, and pull the knob that threw life into Television. I grew closer + to It every day. It was the only one to whom I could disclose my + thoughts. Television was my psychiatrist. Television was my friend. + Television was my entertainment. We lived in silent bliss. That is, + until that bliss was imposed upon. + + For his birthday that year, my brother received an Atari. It was a device + that threw a game onto Television's screen. Television didn't mind + invasion by the machine, and if It didn't mind, neither did I. It was a + Friday night when my parents went out to the theater. They had been + planning to see a performance of this certain opera for months now. They + asked if I wanted to attend, but I laughed at the idea. Why go to an + opera when I could spend an evening at home with Television? + + They left for the theater directly after dinner. My brother headed + straight for his Atari. Knowing I would have no luck trying to fight him + for control of Television, I decided to go to my room and wait patiently + for him to finish with his games. I looked out of my door -- from which I + could see a small portion of the living room including Television, the + Atari and my brother -- every five minutes. After what seemed like the + hundredth time I looked, I saw my brother cursing at Television for losing + his game. This angered me, and I continued to watch him play another + game. When he lost this game, he leaned forward and struck a blow against + the side of Television. At this point, I was infuriated. How could he + take his frustrations out on my one true friend when in reality, it was + his fault? Or was it the Atari's fault for encouraging these + frustrations? + + I ran to my brother's bedroom and took his baseball bat in hand. I crept + to the entrance of the living room and quickly plotted my attack. Without + hesitation, I burst into the room and brought a mighty blow upon the + Atari. Pieces of plastic flew in every direction. Television went from a + vision of Pong to a black and white chaos. I raised the bat over my head + and delivered another tremendous blow unto the Atari. At this point, my + brother had recovered from the shock of the attack. He lunged at me from + his position on the floor. I flew back and landed hard on the ground. The + momentum of my fall thrust my head backwards and it stopped only when it + met the floor. I opened my eyes to find my brother coming toward me like + a towering skyscraper -- an enraged skyscraper without an Atari. + + I was afraid. I had no idea what he intended to do. Rather than find + out, I took grip of the bat and with a single swing to the shin, I sent my + brother crumbling to the floor. As he fell, I rose. I clung to the bat. + It was the only defense I had. I had stopped recognizing the body on the + floor as my brother; it was now only a silhouette that threatened my + safety. The silhouette rose from the floor slowly. It stood ten feet + away from me and didn't move. It stood there as if it were waiting for + the pain I had inflicted to leave. Suddenly, it raced forward. In an + unconscious reaction, I brought the bat back, and in the same motion, + brought it forward with great might. As the bat flew toward my brother, + he charged toward the bat. The bat met my brother's head altering the + direction in which he charged. The silhouette soared passed me hitting + the floor with a "thud." + + Except for the sound of a scrambled Television channel, the room was + silent. My brother lied face down on the floor. What had I done? I + knelt down over my brother's body, and turned him onto his back. I did + all the things Television taught me to do in a time like this. I checked + his mouth for breathing -- nothing. Then I put my ear to his chest -- + nothing. Frantically, I checked his pulse--nothing. He couldn't be dead, + it wasn't a serious blow. At this point, I couldn't even remember cutting + my brother down, I was only trying to comfort my conscience. I could see + an enormous bruise on his head. Then a trickle of blood came from his + nose. I knew he was dead. + + I began to cry an angry cry. I searched for a reason behind it all. Then + it came to me -- Television. Television was the root of it all. It + betrayed me. I rose from the floor and took a swing at the television. + The screen shattered, and sparks flew out. With my swing forward, I + brought forth all my rage, and with my recoil, came sadness and + depression. I had killed my most precious gifts in all the world, + Television and my brother. I stood there, and the bat slipped from my + hands. Finally I collapsed onto the floor crying. + + My parents never knew the full truth of what happened. I told them my + brother and had argued and he started hitting me. In self defense, I took + up arms. Television was just an innocent casualty. I underwent + psychiatric therapy for "my benefit," which lasted many years. We never + replaced Television, or my brother. + + Many years later, when the hands of time covered our wounds, I received a + computer to help me with my low school grades. The actual effect was + exactly the opposite of the hypothesized effect, but with the computer, + came a modem, and with a modem, came the world. There was more to life + than school. The computer proved that to me. Now I use the Internet a + minimum of 10 hours a day. It would never betray me like my family or + Television. + + To know the Internet is to know love. + + -------------------------------------------------------------------------- + (9) - Reviews + + Concerts: + + Summerland Tour '96 - July 20, 1996, Garden State Arts Center, Holmdel, NJ + + The idea seems simple enough, and has been done before: get three bands + that currently have big-selling records out now, and a fourth band that + sucks to make them all look better. For the Summer of '96, those three + bands are Everclear, Spacehog, and Tracy Bonham. The fourth band would be + Seven Year Bitch, although, Everclear gets the "sucky" spot, too. + + You take a look at the lineup, and clearly, it's a lineup that is going to + attract a lot of alternateens. Especially considering the fact that this + show took place at a large (15,000 capacity) ampitherater, and not a one + or two thousand seat club. That way, parents feel safe dropping off their + kids at this place. + + You know, if I see one more twelve year old, with brand new Airwalks, + freshly died hair, and a Lollapalooza '96 t-shirt, I'm going to shoot + myself. + + Anyway, let's get to the bands. + + Seven Year Bitch is quite possibly one of the worst bands I've ever seen + in my life. They were too dependent on their bass drum & guitar and a + distorted guitar. Their lead singer's voice was really shrill, one of + those voices that went right through you. If they learned how to play + their instruments, maybe explored other parts of the drumset besides the + bass drum, and screamed a lot less, they could be better. But, they're + one of the worst things I've ever seen. + + During the set change, a man introduced himself to the crowd as Arthur + something or another, Japan's only one man band. It was a good way to + pass the normally boring time while the stage crew fixes the drums and + ampifliers and such. He played about two or three songs between each set + change, for a total of seven or so. Included in his cover songs were + "Pretty Woman", the Japanese version of "Achy-Breaky-Heart", and a mixture + of songs by Elvis and the Beatles. + + The next band, well, person to come up was Tracy Bonham. She walked out + with violin in hand, and just started screeching at it. She said a few + words, then her bassist and drummer joined her, and they went into an + amazing version of Pavement's "AT&T." It amazed me, because she played + the whole song without a guitarist, with her violin doing the guitar + parts. She then went on to play a number of songs, including her current + hits "The One" and her mega-hit "Mother Mother." She is a very impressive + musician, one some songs she switched the guitar she was playing for a + different guitar, then she would switch again for the violin, all in one + song. She really amazed me. + + After some more songs from the one man band, came the band I was wanting + to see, Spacehog. + + Lights turned off, you hear a distored robotic voice saying, "Ladies and + Gentlemen, Spacehog," and then some disco music, you have the four members + run out to shake everyone's hand before they played. Me, with my second + row seats, I got to shake guitarist Jonny Cragg's hand. Then they went + into a song by the name of "New Jack City." They went on to play their + hits from their current album, _Resident Alien_, like "In the Meantime", + "Cruel to be Kind", and "Space is the Place." + + Spacehog is a great live band. They don't just play for the audience, + they play with the audience. They do a sing along with the crowd, in + which everyone had to sing the words "la la la la lala la" along with the + band. They just had this general stage presence, they talked to the + crowd, made the crowd feel involved. It wasn't like you just put on a CD + really loud, and jumped around. They were there, and you could tell it. + + I was really upset when they left the stage, because I felt they weren't + there long enough. I saw them once before, and they played for over an + hour. That was because they were the headliner of the show. I really + suggest that Spacehog is the headliner of any tours they have in the + future. That is, if they're touring with bands of the caliber that + they're touring with on Summerland. + + Everclear came on, and got all the alternateens bopping. All the kids who + were drinking during Spacehog and Tracy Bonham, and missed great + performances, rushed the stage to try to mosh. The fact is, you just + can't mosh at a place that has seats and a lot of really well trained + security guards. I give the gaurds a lot of credit, they had the aisles + of the venue clear during the entire performance. So, I don't think there + was any serious "moshing", just a lot of people jumping up and down. + + I give Everclear a lot of credit. They played a really energetic + performance. However, they played too much _for_ the crowd. The complete + antithesis of Spacehog. They sang, ran around a lot, and that was it. + Hardly any interaction between them and the crowd. As a live band, I + thought they were really sub-par. The vocals were drowned out by the + guitars. Of course, they played their hits from their newest album, + _Sparkle and Fade_, including "Heroin Girl", "Heartspark Dollarsign", and + "Santa Monica." They butchered Tom Petty's "American Girl," during the + encore. You can't play that song with screeching guitars and bad vocals. + + On a good note, it was nice to see Art Alexakis (the lead singer of + Everclear) dancing with his four year old daughter during Tracy Bonham's + set. His daughter could be seen just offstage touting a Mickey Mouse doll + during Everclear's set, with his wife just behind her. It brought a real + family treat to the event. + + In a brief rundown, Seven Year Bitch is the worst thing I've ever seen, + Tracy Bonham is really good, Spacehog is great, and Everclear needs to + work on their stage act more. + + ---------- + + CDs/LPs: + + Brian Hartzog / The Smashing of Pictures / Hartzog Sound + + Simple guitar sounds, combined with a straight-forward funk sound and + great poetic lyrics. Brian Hartzog presents all of this in his debut + album, The Smashing of Pictures. + + Hartzog wrote, performed, and produced every track on this album. This is + a very talented man, his views are firmly shown through his lyrics. All + of his songs are simply amazing, there is no better way to put it. The + songs range from rock and pop-ish ("Oh! Yoko/Dear John" & "Common Ground") + to more funk and rap sounds ("The Thing You Love"). There are strong and + classic guitar riffs ("The Smashing of Pictures"), and songs that are + somewhat spoken word ("The Thing You Love"). + + Overall, this is an amazing album. Hartzog combines classic guitar riffs + with funk. For one man to write, perform, and produce every single track + on a simply _GREAT_ album, it astonishes me. Hartzog does in one album, + what many bands hope to do in their carears. + + Grade: A+ + + ----- + + Ted Holden / Killermyway / Tiki God Music + + In a time when mainstream music consists of hard-edge acts, it's great to + hear a good, back-to-basics, rock CD. Philadelphia-based musician, Ted + Holden, gives a great album that, unlike a lot of mainstream music, is + easy to listen to. + + Holden presents the listener with a wide range of sounds over the course + of a 11 track CD. He lures you in with Tom Petty-esque sounds in his + first track and single, "Too Good." He then goes into harder and darker + sounds in tracks like "4 Walls Down" and "Raw." While he goes into a + harder sound, he still keeps the same easy listening appeal evident + throughout the album. + + His lyrics are full of passion and darkness. "4 Walls Down" was inspired + by Quentin Tarantino's movie Reservoir Dogs. After reading two recent + books about serial killers, Holden wrote the bluesy song "Related." + "Related" poses the question, "What's it like to be related to a serial + killer?" + + My personal favorite track is "Poor Man's Picasso." This is a more + "poppy" song then the rest of the songs on the album, and it presents the + listener with the same passionate lyrics that heard throughout the record. + + Holden gives a solid follow-up to his 1993 release, What Pulls Gravity. + Killermyway is an amazing record, and it boggles my mind that a talented + musician like Holden gets passed up in the mainstream media to bands like + Green Day and Everclear. + + Soon, Holden will get what he deserves after putting out an album that + accomplishes the simple feat of having good music. + + Grade: A + + ---------- + + 'Zines: + + Big*Geek Magazine - Issue 3 (May/June '96) + + As always, my favorite print 'zine comes through with another great issue. + Brian Geek (aka Kojak) gives us amazingly good fiction ("Captavation"), a + story about how the punk scene in Glenview, Illinois was destroyed by one + person, stories from his trips to St. Louis and Nashville, and his normal + dose of music and 'zine reviews. This has been one of my favorite 'zines, + and with each issue B*G grows and becomes so much better. + + Plus, there's a nifty picture of Brian Geek on the cover! + + Cost: $.50 (and some stamps?) + Address: Big*Geek/PO Box 319/Glenview, IL 60025 + + -------------------------------------------------------------------------- + (10) - News Clips - compiled by Edicius + + Teen-ager charged in slaying of acquaintance he met online + + - The youth is accused of assaulting the victim, who was allegedly shot by + another man. + + The Associated Press + + TRENTON - A Hamilton Township teen-ager has been arrested in connection + with a murder case in which a man allegedly killed another man he met + through a sexually orientated chat room on a computer service, prosecutors + said. + + Reno Reali, 16, was arrested Wednesday and charged with assaulting murder + victim Jesse M. Unger, 39, of Hamilton, who was then allegdly shot and + killed by 38-year-old George H. Hemenway. + + Hemenway has been charged with murder, weapons offenses and tampering with + evidence. + + Mercer County Prosecutor Maryann Bielamowicz would no confirm the identity + of the arrested suspect, but Reali's father confirmed the name. + + Robert Reali said Hemenway invited Reno Reali and Unger to his East Windsor + Township home and ordered Reali to hit Unger with a pipe. Hemenway then + allegedly shot Unger. Hemenway allegedly was angry about a sexual + encounter Unger had with the juvenile about a month earlier, police said. + + "We can't believe these chargers against our son," Reali said. "He was + expected to be the star witness in the case against Hemenway. He helped + police understand the case and put the case together." + + Police were alerted to the killing Jan. 4 when another friend Hemenway met + through an online service called to report seeing the body of a white male + in Hemenway's basement. + + Michelle R. Benson, 24, of Trenton said Hemenway asked her and another + friend, later identified as 23-year-old Timothy R. Brown of Hightstown to + help remove the body from the house. She later said Hemenway told her he + had shot Unger on Jan. 3. + + Police went to Hemenway's house and, looking through a basement window, + saw what they believed was a body wrapped in a tarp lying on the flood, + police said. + + Hemenway and his 77-year-old father, Lowell T. Hemenway, were taken into + custody. The elder Hemenway was home at the time of the shooting, but + apparently was not involved in the slaying. + + Brown and Benson were charged with tampering with evidence and released on + their own recognizance. + + Following his arrest, Reali was taken to Mercer County Youth House in + Ewing Township to await a hearing. + + ---------- + + From "Dear Abby", 7/22/96, + + _Deceit surrounds online romance_ + + Dear Abby: I am a 45-year-old, divorced Michigan man who has been + communicating over the Internet with a 41-year-old Australian woman for + more than two months. Kate (not her real name) slated in our first + "meeting" (in an online chat room) that she was unhappy in her marriage. + Even though she was married, I thought it would be interesting to talk to + someone so far away. + + We seemed to really click, exchanged photos, and even talked on the + telephone a few times. Our online communication has always been leasant + and satisfying -- nothing sexual, just fliratious. + + We have reached the point where we feel we may have started something we + might want to continue. Kate has told her family and friends that she + wants to come to America to visit me for a month, and I have agreed to pay + half her airfare. + + Ordinarily I would not allow myself to get involved with a married woman, + but I can't deny I have strong feelings for Kate and want to see her. + + Does this sound like destiny or an online infatuation that has gone too + far? Kate is getting a passport and may arrive within the month. Have we + lost our common sense, or does this sond like two people taking a chance + on happiness? + + -- D.K. in Michigan + + Dear D.K.: It sounds like asking for trouble to me. Aside from the fact + that you are carrying on with a married woman, Kate may not be wat you + expect. I recently heard about a teen who was communicating online with a + female he thought was about his age; when they met, he found out she was a + 76-year-old granny! + + Before you spring for tickets, ask yourself if you could ever trust a + woman who cheats on her husband. + + -------------------------------------------------------------------------- + Jonas would like to thank the following people for their help, work, or + cooperation in this issue of Jonas e'Zine, + + Jon Vena and WHTG-FM, Abbott Promotions, Hartzog Sound, Tiki God Music, + Belial, Maureen V., Oodles, The Masked Marauder, Auren Hoffman, Eerie, + Jestapher, Mogel, Grey Hawk, Mindcrime, Seta, and a lot of others. + + Jonas loves you all. + + -------------------------------------------------------------------------- + + Jonas e'Zine -- Issue Twenty + Released July 28, 1996 + send all questions, comments, and other regards to - edi@cybercomm.net + send all mail to Edicius (Tom Sullivan) to - edi@cybercomm.net + if you'd like to exchange erotic email with someone named Belial, + then write - belial@cybercomm.net + Visit our WebSite - http://www.cybercomm.net/~edi/jonas.html + Visit our FTPSite - ftp://ftp.etext.org/pub/Zines/Jonas + + Jonas: It's more than a 'zine, it's a lifestyle. + + ---------------------------------+ eof +---------------------------------- +