home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Cuteskunk BBS
/
cuteskunk.zip
/
cuteskunk
/
Virus
/
Virus-Magazines
/
CryPt2
/
crypt25.txt
< prev
next >
Wrap
Text File
|
2003-06-29
|
47KB
|
1,062 lines
CRYPT NEWSLETTER 25
May 1994
Editor: Urnst Kouch (George Smith, Ph.D.)
Media Critic: Mr. Badger (Andy Lopez)
INTERNET: ukouch@delphi.com
COMPUSERVE: 70743,1711
Crypt Newsletter BBS: 818.683.0854
Crypt Newsletter voice: 818.568.1748
[The Crypt Newsletter is a monthly electronic magazine
distributed to approximately 12,000 readers
on the Internet. It features media handling of
issues dealing with computers and society, news in science
and technology, and satire.]
----------------------------------------------------------
IN THIS ISSUE:
A new uniquely stupid US fad: E-mail
death threats . . . The psycho death struggle
of one English programmer and his American
nemeses . . . Michael Milken and more breakthroughs
in mentufacturing . . . Reviewed: Philip Kerr's
"A Philosophical Investigation" . . . Mr. Badger
on supernerds and CD-ROM . . . much more.
THE NEWEST UNIQUELY STUPID AMERICAN FAD: E-MAIL
PRESIDENTIAL DEATH THREATS
When President Clinton and colleague Albert Gore
announced the opening of their electronic mail
addresses on the Internet, they probably did not
expect rude and threatening techno-riffraff to take
up anonymous death threats as a hobby.
In early December, Christopher J. Reincke, a University of
Illinois student sent President and Mrs. Clinton unfriendly
electronic mail.
"How would you feel about being the first president to be
killed on the same day as his wife? You will die soon.
You can run, but you cannot hide," warned Reinke balefully.
The Secret Service subsequently ran Reincke to ground, and the
local district attorney claimed he was content to let the
student off with probation, presumably because Reinke is only
a menace to himself and his parents' peace of mind.
On February 26, the Secret Service intercepted another e-mail
death threat, this time from the blind of a hacked computer
account at an undisclosed private school.
On April 2, the Secret Service commented such e-mail threats
against the president were "infrequent."
By April 22, another teenage student, Matthew M. Thomas of
Stephen F. Austin University in Nacogdoches, Texas, was
indicted on two counts of sending electronic mail threats
to the White House on April 7. His initial plea was not guilty.
The Secret Service visited Stephen F. Austin after it traced
the mail from the school's computer lab.
This fad, notes the Crypt Newsletter, is a pricey one as such
mail entails possible 5-year federal prison terms without
parole and $250,000 in fines per nastygram.
The Crypt Newsletter is curious, however, as to what kind of
diplomatic relations the US government has with the anonymous
Internet mail servers in places, like, uh, Finland.
We would also like to know how anyone got the stupid idea
that politicians personally read their electronic mail anymore
than they do the old-fashioned kind.
"DR. SOLOMON'S PC ANTI-VIRUS BOOK" EXPOSES
THE CREEPING EVIL OF PEOPLE WITH FUNNY NAMES WHOM
YOU WILL NEVER MEET
Sometime at the dawn of the personal computer age,
publishers reversed the laws of good writing for the
specialty niche of computer books. In place, readers
got anti-consumerism which mandated that, usually,
books about computers, computer issues, or software
would be written only by presidents or employees of
computer manufacturers, consulting firms peddling advice
on computer issues defined by the same consultants or
software developers and their publicity stooges.
This means that if you actually buy such books, you're
getting a pig in a poke. Nowhere is this more obvious
than the "DOS For Dummies" series, a line of
pamphlets so easy to sell competitors have rushed
out mimics written for "Idiots" and/or "Morons."
"Imbeciles" anyone?
And, in the true spirit of American mass marketing, you
can now purchase attractive yellow and black "DOS For
Dummies" baseball caps, suitable for wearing inside the
house, restaurant, bowling alley or local smart bar.
In reality, the hats are a fiendishly clever IQ test.
If you buy one, you fail, signalling to the corporate
office that you are the kind of Pavlovian consumer
ready to invest in a fax subscription to weekly company
press releases.
Which is a long way of bringing the reader to "Dr. Solomon's
Anti-Virus Book" (New-Tech/Reed Elsevier), which fits all
the, uh, _good_ characteristics of the _computer book_.
On the cover are always tip-offs. Look for concocted
venal plaudits and non-sequiturs. For instance, "The
Anti-Virus Book" is "THE book on how to eliminate
computer viruses" ". . . from the foremost anti-virus
experts" and exposes "computer games and viruses - the
truth!" The publishing inference is that readers have
somehow become too stupid in 1994 to recognize
something decent without a gratuitous amount of
pettifogging and boasting.
Alan Solomon and his co-author, Tim Kay, do realize the
bogus nature of computer literature. On page 26 they write,
"If you hadn't the money to start manufacturing, or the
knowledge to program, you could always aim at the book
market . . . Anyone who could persuade a publisher that he
had an area of expertise and could write, which wasn't
that difficult, could get into print. One author was reputed
to be writing four or five books at once by using several
different typists in different rooms. The story went that
he walked from room to room dictating a sentence to each
typist as he went. Looking at some of the output, there is
no reason to doubt this story."
That's a good tale. But rather ill-spirited when
considering "The Anti-Virus Book" is a higgledy-piggledy
assembly of reprints from the S&S International
(Solomon's company) corporate organ Virus News
International, Solomon interviewing himself and
bursts of writing which make absolutely zero sense.
For example:
"It would be difficult to create more [virus] experts, because
the learning curve is very shallow. The first time you
disassemble something like Jerusalem virus, it takes a
week. After you've done a few hundred viruses, you could
whip through something as simple as Jerusalem in 15 minutes."
Or:
" . . . the DOS virus will become as irrelevant as CPM
(an obsolete operating system). Except that DOS will still
be around 10 or 20 years from now, and viruses for the new
operating system will start to appear as soon as it is
worth writing them."
And this favorite:
". . . take the game of virus consequences:
"In the game of Consequences, you start with a simple
phrase, and build up to a convoluted and amusing story. In the
virus version of consequences, you start off with a false
alarm and build from there."
The computer underground also figures highly
in Solomon's book as he spent a great deal of time over
the past couple years attempting to track down and
telephone American hackers from the United Kingdom.
Nowhere Man - the author of the Virus Creation Laboratory -
is in the book. Although VCL viruses never seemed to make it
into the wild, mentioning the software without pointing this
out has always been in vogue. Members of the hacking group
phalcon/SKISM appear, as does John Buchanan, a Virginia Beach
resident, who sold his virus collection to numerous takers,
making about $6-7,000 in the process. Solomon didn't have
these numbers - they're mine. He also fails to mention that at
one point Buchanan contributed his virus collection to
S&S International and was nominated for membership in
the pan-professional Computer Anti-Virus Research Organization
by Solomon, one of its charter members.
Solomon's book wouldn't be complete if it didn't invoke the
creeping evil of virus exchange bulletin board systems.
"The Hellpit" [sic] near Chicago, is one.
And "Toward the end of 1992, the US Government
started offering viruses to people who called one of
their BBS's . . . In 1993 the Crypt newsletter blew the
whistle on the US Government [AIS bulletin board]
system . . . " Solomon writes.
Since I edit the newsletter, this is a surprise to me and I'm
sure, Kim Clancy, the AIS system supervisor. But it's almost
identical to the nutty claim made by American computer
security consultant Paul Ferguson when the black-balling
of AIS was featured news in Computer underground Digest. As
the story developed, Ferguson - egged on by Solomon - planted
complaints about AIS in RISKS Digest and, later, the Washington
Post. Solomon has been a reader of the Crypt Newsletter and it
must have seemed logical to embroider the story because a back
issue featured an interview with Clancy after she was profiled
in Computer underground Digest.
However, Clancy had been a target of CARO since opening
her system to hacker underground files. Finally, Solomon
and his colleague's negative publicity campaign did that
part of the AIS system in.
What a lot of people don't know is that other public systems
have been a target of the same people. About a year earlier,
Hans Braun's COM-SEC computer security BBS in San Francisco had
been a target of a similar smear campaign for carrying
issues of 40Hex, a phalcon/SKISM-edited virus-programming
electronic magazine. In a recent interview for the book "The
Virus Creation Labs," Braun mentioned security workers
David Stang (who has by turns been involved with or worked
for the National Computer Security Association in
Carlisle, Pennsylvania; the International Computer Security
Association - now defunct - in Washington, DC; and Norman
Data Defense of Falls Church, Virginia) and Alan Solomon as
responsible for the pressure. Since COM-SEC wasn't politically
sensitive like AIS, Braun said the efforts to tar him
were unsuccessful. COM-SEC still carries 40Hex magazine.
"The anti-virus software industry is going through a shake-out;
not everyone is successful anymore," said Braun. "It's my
opinion, most of these kinds of things are really attempts
to keep access to information from competitors."
"The Anti-Virus Book" also has annals of alleged virus-related
computer crime, which illustrates the same rush to seize
everything without leveling criminal charges as seen in the
United States.
In the book there is the case of an unnamed man in the town of
Rugby, who had his door broken down by a sledgehammer and all
his equipment grabbed by New Scotland Yard officers in December
of 1992 after taking out an ad selling a virus
collection in the English periodical Micro Computer
Mart. The charges were ethereal to non-existent.
The case remains open.
About the same time, a hacker was arrested for
stealing phone service from his neighbor's line and
his equipment confiscated, too. The hacker turned out
to be Apache Warrior, a member of the small United
Kingdom virus-writing group called ARCV (for
Association of Really Cruel Viruses).
Some background information not included in the book:
Alan Solomon was apparently able to convince New
Scotland Yard's computer crime unit that they should also
try to prosecute Apache Warrior as a virus-writer and that
the rest of the group should be rounded up, too. In
conversation, Solomon has said Apache Warrior turned over
the names of other group members. Subsequently, New
Scotland Yard and local constabularies conducted raids
at multiple sites in England, arresting another man.
Paradoxically, prior to the arrests, Solomon joked that
ARCV was better at cyber-publicity than
virus programming and its creations were little more
than petty menaces. The book offers no reported
incidences of ARCV viruses on the computers
of others, although Virus News International, by
extension S&S International, solicited readers for
such evidence in 1993.
Later in the year, Solomon telephoned John Buchanan to
tell him he had been implicated as a member of
ARCV - he was not - and that Scotland Yard might be
interested in extraditing him for trial. It turned
out to be so much air.
Apache Warrior settled with the telephone company for the
fraud and the virus-writing prosecutions remain unresolved.
Most of this is left out of "The Anti-Virus Book" except
parts about the necessity of jailing virus programmers.
The final part of "The Anti-Virus Book" is devoted to
around fifty pages of leaden legal boilerplate addressing
computer meddling supplied by a lawyer named
Wendy R. London. Only those required under penalty of death
or the mentally ill would be interested in paying
attention to it.
A computer book must also include poor reviews of the
author's competitors' products. "The Anti-Virus Book" toes
the line in this regard, criticizing McAfee Associates and
Central Point Software.
Also included is a diskette containing an extravagant
color advertisement for S&S International and
a poster-sized Virus Calendar for 1994 and 1995.
The calendar was fun. I'm thinking of sending it to
some middle manager in computer services at a large,
boring corporation (or an editor at a computer
magazine). Then they can vex their underlings
(or readers) every day with network e-mail
like, "It's May 31. Be on the lookout for
Tormentor-Lixo-Nuke, VCL-Diogenes, AntiCad-COBOL,
Month 4-6, Ital Boy, and Kthulhu computer
viruses."
Finally, it would be unfair not to mention
"The Anti-Virus Book's" GOOD parts. The technical
analyses of well known PC computer viruses were
fascinating as was Solomon's description of how he
developed specialized virus identification programming
for S&S International. Solomon's development project,
called Virtran, was capped when John Buchanan - the
same fellow who was denounced by him for selling
viruses in America - gave the programmer a copy of
the NuKE Encryption Device, or NED - a piece of code
written by Nowhere Man and designed to encrypt viruses
in an esoteric manner. At the time Solomon
received it, the NED code wasn't actually in any viruses.
It still isn't, in fact, except for one called
ITSHARD. And the story of the development of Solomon's
anti-virus software shows how the virus underground
and one developer in 1993 had each other in a weird
involuntary combination stranglehold and symbiosis.
". . . it does everything in a hundred different ways;
it uses word and byte registers, there are lots of
noisy nonsense bytes, little jumps . . . The NED looked
like something out of a Salvador Dali nightmare and I
thought it was going to take a month of programming
[to detect ITSHARD]," writes Solomon.
According to the book, Solomon threw up his hands and
decided to revive a stalled project called the Ugly
Duckling. The result was a major revision of his software,
the fruition of the proprietary Virtran programming
techniques used in it and a Queen's Award for
Technological Achievement in 1993. The one NED
virus - ITSHARD - still isn't in the wild almost two
years after Nowhere Man wrote the original encryption code.
These sections didn't suffer at the hands of the patchwork
editors who threw most of "The Anti-Virus Book" together.
Unfortunately, they comprise a small part of "The Anti-Virus
Book" and were written so that only someone already acquainted
with the field - not your average computer user - would get
much from them. Just like most of the dubious literature
marketed by computer book publishers.
BREAKTHROUGHS IN MENTUFACTURING, CONTINUED: MICHAEL
MILKEN JUMPS ON INFO HIGHWAY & THE RETURN OF
FICTUAL FACTS AND FACTUAL FICTIONS
In the first week of April, former imprisoned Drexel
Burnham Lambert financier Michael R. Milken conducted a
special public seminar for educators at the new Milken
Research Forum for the Reconstruction, Acquisition, and
Understanding of Data (MR-FRAUD) on the campus of UCLA
in Los Angeles.
Milken lectured educators on how computer-assisted teaching can
and must level the playing field for rich and poor students.
"Education can find you in South-Central Los Angeles, East
St. Louis, Newark, just as easy as it can find you
in Connecticut, Palo Alto or Beverly Hills," said Milken.
Joining Milken at the forum was Sega of America Vice-President
Douglas Glen who pledged one Sega game system to every public
school district in the state of California.
"Video games breed self-esteem by challenging kids," said Glen,
"I challenge the state of California to match my contribution
to the children of this great state by contributing an equal
number of Sega game systems - a few over 10,000. Our
kids are the ultimate resource. We cannot ransome
our future by being miserly with the technology of
it for the students of today. Not only does excellence
in Sega game-playing culture self-esteem,
confidence and strategic planning, it aclimates the children
to the in's and out's of silicon chip-based processing - the
universal on-ramp to the data superhighway. And everyone
knows kids, games and computers click."
The first school to receive Glen's Sega initiative is Greater
Northridge in the San Fernando Valley, due north of Los
Angeles. Los Angeles United School District superintendent
Beryl Ward accepted the system from Glen.
Milken also unveiled a new mathematical paradigm for the
handling of vast amounts of data, information and
communications.
"Based loosely on Claude Shannon's ground-breaking 1948
treatise 'A Mathematical Theory of Communication,' the
Milken Electro-data Sorting System (MESS) can be
licensed to corporations or schools and paid for under
the National Information Infrastructure
initiative," said Milken.
Milken stated that information glut is one of the
key obstacles to effective innovation. Presently,
separating the wheat from the chaff takes up
too much time, imposing a bottleneck on productivity.
The Milken Sorting System relies upon the fact that
no organization can any longer supervise every packet
of information flowing through its environment. So,
it introduces and manages a randomizing agent which
ensures that every bit of data, if circulated to every
point on the system, must eventually hit upon the
right one.
Milken said that the idea was based upon his recent
reading in the field of cosmology and how unknowable
quantities of near atomic dust move through the
intergalactic spaces.
REVIEWED: PHILIP KERR TOO PHIL-OH-ZAW-FI-GULL FOR
MR. BADGER
"Philip Kerr's ingenuity is unquestionable . . . This
is probably the crime story of the year for computer buffs,
amateur philosophers, and would-be time travelers."
--London Review of Books
"A Philosophical Investigation," by Philip Kerr (Penguin/Plume,
$10.95), is a futuristic detective/suspense story set in England
in the year 2013. To set the tone, the story is replete
with references to nicotine-free cigarettes, cholesterol-free
bacon, and voice controlled elevators
and hotel room doors. Portable computers have envelope-sized
screens, miniature keyboards, and cellular connections to
networks. Compact discs are now the size of a coin and
recordable on both sides. The European community has adopted
a standard currency - the EC dollar.
Serial killers are common, too. So common, that
Scotland Yard has a "Gynocide" division to track down those that
prey on women. Serial sex killings account for 20 per cent
of all murders - a total of 4,000 each year in the European
community. ID cards, carried by everyone, contain the
"genetic fingerprint" of their bearers. Instead of prison
sentences, criminals are put into "Punitive Coma," that
is, drugged into vegetation for the length of their
sentences.
Kerr's attempts to create a futuristic milieu are
doomed to failure, however, because he continually shoots
down his creations. "Punitive Comas" are used because jail
is too expensive. Yet consider Kerr's description of the
unit where the comatose inmates are stored:
"The sight of one open drawer, slightly larger than a coffin,
interrupted her step. Curious, she stopped to examine it
more closely. The bottom of the drawer was upholstered in
soft black calf leather, which was the only concession made
to prevention of pressure sores. A number of tubes and
catheters, which would be attached to the convict's body,
protruded from the drawer's sides. On the front of the
cabinet was a small flat screen on which the body functions
could be read and a card key lock to prevent anyone from
interfering with the drawer's occupant."
Right. Nothing but leather needed to prevent that tissue
breakdown. Mr. Badger has seen comatose patients under
hospital intensive care procedures develop bedsores clear
to the bone while on $10,000 Clinitron beds. All leather
would do is hold the really memorable aroma of . . . oh,
never mind. In any case, the medical costs of maintaining
a patient in a coma are horrendous. To believe
that the human body can be drugged up, plugged in, and
stored for several years as a cost cutting measure is
ludicrous. Hell, even canned ham doesn't last that long.
Even more silly - the same paragraph that gives us the 4,000
serial murders per year states that the "European Bureau of
Investigation" estimates 25 to 90 such killers are responsible.
Let's see. Twenty-five killers responsible for 4,000 deaths
per year works out to . . . each one killing
every 2-3 days. Even 90 killers works out to each one killing
every 8-9 days. With universal DNA fingerprinting, the police
can't catch these guys? That works out to 44-160 crime sites
per serial murderer, per year, and they _still_ can't catch
them? Bah, humbug!
Other issues are worse. The stupidest blunder - and you
have to remember, I'm a gun nut - is the actual murder
weapon, a .44 caliber "gas gun." The bullets are described
as weighing _forty_ grams apiece. They are fired from
a machined brass cartridge case with a self-contained,
reloadable, high pressure air reservoir, all designed to
fit in what appears to be a conventional handgun. When
fired, the gun has no recoil and makes "no more noise
than a hand slapping a desk top."
There are several problems with this, all of them having to do
with defying the laws of physics. The first is that a forty
gram bullet is two to three times heavier than those used in a
conventional .44 magnum. The air pressure needed to propel such
a bullet would be immense. This means that the "brass
cartridge" would have to be built to contain pressures
above 100,000 pounds per square inch - 50 tons! This means
the walls of the cartridge would be, of necessity, so large
there would be no room for the compressed air, much less the
necessary valve system.
[Ordinary cartridges don't have this problem, as the pressure
doesn't build up until the gunpowder within burns. When this
happens, the cartridge is inside a chamber that supports the
brass. In the case of this supposed "gas gun,"
the cartridges would have to be strong enough to take the air
pressure even before being placed in the firearm.] Both the noise
and the recoil when shooting a firearm are felt _after_ the
bullet has left the end of the barrel. Think about it. It's the
escaping gas out of the end of the gun that produces the backward
recoil. The sound is produced by the escaping gas as well (along
with the bullet, should it break the speed of sound). The gas gun,
as described, has the same retort as a standard firearm. Robert
Parker wouldn't screw up like this.
Some Crypt readers may be wondering why I dwell on such
things anal, because, after all, literary license is a
long-standing tradition. But, errors like these are the
hallmark of a lazy writer and editor. They could be
corrected in half a dozen ways, without damaging the
plot at all. The failure gives you a clue about the
computer-related portions of the text.
The actual plot begins with the government sponsored Lombroso
program, which attempts to identify potential serial killers
based on anatomical features of the brain. Lombroso is an
acronym for Localisation of Medullar Brain Resonations
Obliging Social Orthopraxy. It shares the same name as
the Victorian criminologist that attempted to classify
criminals by external physical measurements of the body.
Men are encouraged to come in for a brain scan and, if
found to be of the correct profile, offered hormonal
treatments and counseling under a pseudonym.
Their anonymity is guaranteed, as all employees know
them only by the computer-assigned pseudonym. The same
computer will release their actual name only if it is
cross-referenced by a police computer during the course
of a homicide investigation.
One of the men who is singled out by the process, code-named
Wittgenstein, takes exception, and succeeds in accessing the
Lombroso database with the goals of erasing himself and targeting
others in the program for assassination. The details make
for a turgid combination of fancy, conjecture and ignorance.
The author seems to understand one verity of hacking. In
Wittgenstein's words:
"The image of the computer-hacker spending many hours in front
of a screen trying to break into a system is a false one.
He is more often to be found scavenging in a company's refuse
bins in an attempt to find a piece of information that will
provide a clue as to the computer system's password."
Yet, how does the Wittgenstein get the password? While waiting for
his screening with Lombroso - before even knowing that he will be
singled out - he tinkers with a television set in the waiting room.
"The problem was a simple one -- a channel improperly tuned -
and I had just started to rectify this when I noticed that
the set, which was rather an old one, was picking up
electromagnetic radiation from one of the other computer
installations in the building. Somewhere in the Institute
a VDU was radiating out harmonics on the same frequency as
television set."
This interference, of course, turns out to be a terminal.
The villain ends up seeing the "basic entry code, an
individual operator's personal 'key' word, and the Lombroso
system's password for the day." While feasible, one can't
wonder if the much vaunted concept of HDTV hasn't come about yet,
or if it is simply so shoddy that it still can't ensure picture
quality. Still, the author threw in the comment about the
television being rather old, and I let it slide.
So having the necessary passwords, what tools are needed
to break into the network?
". . . I possessed . . . all the equipment for such
a task -- PC, modem, the telephone company's Jupiter
computer information system, [and] digital protocol
analyser . . . "
Say what! Just what in Sam Hill is a digital protocol
analyser, anyway?
"A protocol is a set of rules. An analyser is a portable
device with its own miniature screen and keyboard.
OK, but what about the Lombroso's security systems? Get
a load of the following, and bear in mind that RA, Reality
Approximation (aka Virtual Reality) is the buzzword of the day.
"They must have anticipated having to deal with unauthorized
entrants to the system, because the very first thing that
happened was that a nude Marilyn Monroe graphic appeared
on my screen and, with a wiggle of her lifelike bottom,
asked me if I felt lucky. 'Because if you can answer three
little old questions you and your reality approximation
software get to fuck my brains out.'
"Marilyn was referring to the software which controlled
the computer's optional body attachments and which
enabled one to enjoy an approximate physical sensation
of whatever kind of reality was being created . . . The
point of Marilyn was to trap the unwary schoolkid
hackers into wasting their time and not progressing
any further within the system. I knew the chances were
that if you did manage to answer Marilyn's questions
correctly . . . you were liable to discover that your own
computer software had been infected with a very nasty,
possibly terminal virus."
How droll. Computer security employees have the time and
will to generate "Reality Approximation" graphics. They feel
free to send viruses to suspected hackers. They have no
fear of public censure for sexist and other lewd and/or
politically incorrect themes. And they work for a bureaucracy.
In any case, Wittgenstein bypasses these security measures by
typing in "goodbye" and the Lombroso system password for the day.
His next hurdle is Cerberus:
". . . suddenly there he was on-screen, a three-headed black
dog graphic with blood-chilling sound effects, and guarding
the system . . . From the size and number of his teeth I was
very glad I had not been wearing my Reality Approximation
body suit. It was clear that I wasn't going any further
until I had dealt with him."
Yeah, you read right. Not only does computer security entail
designing "Reality Approximation" characters, but the makers can
arm them with the ability to actually hurt hackers wearing
appropriate suits.
"Exiting the system once more I tried to remember how dead
Greeks and Romans had been able to pass into Pluto's
kingdom without molestation . . . the trick would be to create
a cake that would enable Cerberus to fulfill a standard
legitimate routine . . . but which would hide a piece of
unorthodox active instruction, specifically to fall
asleep . . . the general effect was similar to a computer virus,
except that the basic premise was to limit the action of the
binary mechanism to Cerberus himself.
"Back in the super-op directory, I offered the shiny black
beast the cake and, to my delight, he snapped it up
greedily . . . almost as quickly as he had appeared, Cerberus
fell to the bottom of the screen with a very audible
computer SFX thud, and remained motionless."
Yeah, you read right, again. Computer security also encompasses
programming the graphics and sound effects for moments when your
security is bypassed. It is mandatory to program
defects in line with whatever theme is being used, as well.
Eight months and eight dead bodies later, it finally occurs to
someone to check the Lombroso database for signs of intrusion.
They have a log showing when and how the database was altered. At
this point, you would think that they simply compared the backups
from that and the previous day to find which records had been
deleted. Wrong! There are no backups. It's not that they are
missing, corrupt, or inaccessible. It's not that the database
managers were slack or inefficient. Even worse, while the best and
brightest from the Police Computer Crime Unit of New Scotland Yard
investigates and accidentally sets off a logic bomb left by
Wittgenstein, he hasn't made a backup either. Backups simply
don't exist.
Apparently databases can't be recreated. Nobody ever thinks
of going through the brain scans and rescheduling appointments to
recreate the data. The data is simply assumed to be -- GONE.
That "A Philosophical Investigation" could reap praise from
the Library Journal, the NY Times Book Review, and the Wall
Street Journal shows the state of modern fiction in the
English-speaking world . . . and something of the mental acuity of
its nincompoop reviewers. It doesn't need to be consistent,
believable, or well-researched. As long as it
joins in worship with the Church of the Twisted
Psyche, it's good.
You see, sometime in the Sixties, the praise of the bizarre
crossed from the medium of paint to writing. Where once we had
to suffer with surrealist's worship of the unconscious, we
now have the novelist's worship of the unconscionable.
"A Philosophical Investigation" has a man-hating, sexually
unresolved, robotic female investigator. It has a
sociopathic intellectual. It has half-baked philosophy like
what Nietzsche babbled when he broke down crying
over a horse and got carted away to rot in solitary madness.
It has sub-plots and supporting characters worthy of a
television movie. Heck, maybe it was written to be a TV
movie in America - on Sunday night right after SeaQuest DSV!
[A producer could even get someone from the MIT Media Lab
to chatter crazily at the audience near the end of the show
just like Bob Ballard does for Seaquest and Steven Spielberg.]
"Investigation" isn't about the year 2013 -- it's about
the 1990's.
In a different era work like this would have brought
its author hunger, neglect, and shameful death. The spirit
of man is now so poor that one gains praise for
pretentious inferiority.
MR. BADGER'S SATURDAY AFTERNOON MEXICAN
HORROR WRESTLING HOUR: ON SUPERNERDS AND CD-ROM
Stop the presses!
USA Today (March 28) just discovered
that hand-held "computers" are suffering major problems.
Those already on the market - like the Apple Newton - are
suffering because they're packed with features no one
cares about. Those in pre-production are still
plagued with bugs. Compaq is even questioning
the Holy Grail of hand-held computing: The ability
to process handwritten scribble. Just a hint to all those
manufacturers out there: It helps to know what the
product actually is _before_ you start marketing it.
You may recall my arrant jibe at The Village Voice last
month concerning the worth of drag queens as a hard
news topic. Well, Lord help us, life mimics art
as The Voice menacingly continues to insist on
assigning writers used to La Dolce Musto on cyberspace.
A March 15 copy featured a piece called "E-Male or
Female: Cross-Dressing Online." That's right! A whole
story on "The Politics of Online Gender Bending." Sigh.
I'd endorse kidnapping the editors of The Voice and flogging
them with rattan canes . . . but they would only enjoy it.
That magazine for the mentally ill aspiring upper-middle
class white social climber, TIME, put a malevolent Bill
Gatesian caricature on its April 11 cover, claiming
"high tech [Wall Street] supernerds are playing dangerous
games with your money."
The "supernerd" article was a mix of strong but
vague half-fabrication and jargon which editor James R. Gaines
must have cunningly sensed made snazzy, unverifiable copy.
"Swaptions . . . Caps . . . Floors . . . LEAPS . . . Yield-Curve
Notes . . . I/Os and P/Os . . ." were terms TIME threw at the
reader. Did the writer know what they meant? No. Maybe
TIME artists did since the terms were packed into an
illustration of what looked like a flame-spitting bowling ball
being shot at with dollar signs beaming out of radar dishes.
Yes, this _stuff_ is invented by "data miners" who
wear "high water pants" and "mate . . . in one night
stands." "The [data miners] are in prayerful communion
with the computer" and "[no one] knows what they're talking
about." Including TIME. Or you and me. But that's the
point. Ah, ah, help, help, start legislation, the sky is
falling, the sky is falling, meta-computing, Fourier transform,
eigenvalue.
What TIME's journalism by committee should really
be telling you - in English - is there are a bunch of young
Wall Street financiers experimenting in a non-real world
economy construct assigned the jargon-term "derivatives."
These goings on have no meaning for the average American
who couldn't affect any of it anyway. Which is the
real nub of the piece, something TIME has never had the talent
to get across.
These workers in "high water pants" trade in financial
computer-generated fictions created purely from the instantaneous
electronic technology of the information age. It's disruptive
to the world economy but decoupled from the bedrock of real
trade in which services are rendered, products produced and
the infrastructure built. "Data miners" is just another
stupid name which disguises what the phenomenon really
is: The work of assholes.
In the same issue TIME struck out to interview
outraged Americans who are pretending to have just discovered
what anyone with half a brain has known for the last three
decades: convicts lift weights in prison. The magazine
interviewed Roger Quindel, an amateur body-builder who should,
perhaps, bend his mind to the mental Soloflex a little more
before pegging statements like, "Do we really want stronger
criminals? I'd rather buy them computers . . . " with the
implication prisoners named "Maggit" are too stupid to
operate PC's.
Subscribe to TIME so you're always well-informed.
In the first week of April, Rolling Stone ran a piece on "ROM and
Roll." The contents page looked like this:
"It's difficult to love CD-ROM. Expecting slick machinery,
we get something cranky instead. Yet the significance
of this new medium lies not in pie-in-the-sky technology
but in the way we can use it to explore our own lives."
The story managed to gerrymander an intro/history of the format
with reviews of several current CD-ROMs and threw in vague
speculation on multimedia's future. Surprisingly however, Mr.
Badger is starting to share some of the optimism concerning
multimedia. I was much impressed with the Terminator 2
laser disc and have seen a couple of musical instruction CD-ROMs
that were quite interesting.
Unfortunately, we're still dealing with stillborn formats. Face
it. We're squeezing the last dregs of utility from the basic DOS
and PC frameworks. We have video and sound boards but
second rate animation and music. We have CD-ROMs but fall
asleep while they're loading. If Windows NT and OS/2 are to be
our salvation in this area, it's time to arrange for mass
seppuku.
The other end of the spectrum is filled with those attempting to
modify audio CD and game players, yet another instance of turbo-
charging antiquated technology. If and when something new
comes along that _is_ actually worth using, count on it to be
locked between the copyright claws of a money-mad megacorporation
bent only on manufacturing mind-numbingly boring video games for
the high school/collegiate idiot savant market.
For those not keeping track, U.S. Patent No. 5,241,671 was
essentially struck down - at least for the moment - last
month. Norman Bastin - who looks a little like the bleached
"What izzit" Bohemian in the Zima commercial - of Compton's
New Media has been stymied in his attempt to license all
general sort, retrieve and index functions for
CD-ROM multimedia. You could think of it as similar
to a grab at licensing the English language, which apparently
escaped the usual faceless dolts in government responsible for
keeping track of such things, namely the U.S. Patent Office.
Bastin, however, stormed on, telling the Los Angeles Times on
April 17 that Compton's wouldn't be stopped until it completed
a coffee-table book/CD-ROM [?] devoted to the TV program
"Babylon 5". Thank heaven for these small favors.
Gratifyingly, the supremacy of the written word looks assured
for the foreseeable future although, if Norm Bastin has his
way, CD-ROM will multiply to the point where it
eclipses regular television and videotape in triteness.
The few exceptions will still be meager promises of what
someday _might_ become reality. Until then, I demand we
rename "multimedia" into "Jack-of-all-trades-master-of-none-media."
Finally, Mr. Badger must apologize. Last time
I shamelessly flacked for my hometown newspaper, The State.
Needless to say, days later The State ambushed me and saw
fit to reinforce the first rule of the American press:
"If we didn't betray their trust, we simply weren't trying
hard enough!"
The March 22 edition contained a feature article in the
Health/Science section - I know, I know, it sounds awful
already - on Virtual Reality. As a piece of
journalism, it had the all the wit and savvy of Beaver
Cleaver on methaqualone. As a pro forma press release
extolling the amount of money Clemson University and
Georgia Tech are wasting in "research," it ignited a vicious
migraine. You, the Crypt Newsletter reader, will be spared.
I've run out of Percocet and Midrin, and I just can't bear
to repeat any details right now.
ODDS & ENDS: COMPUTER ETHICS BOOK MIRRORS THE VIRTUAL
BOSS AND OTHER STUFF RECEIVED
A revised edition of "Computer Ethics" (Prentice Hall)
by Deborah G. Johnson arrived on our doorstep.
The book is assembled around cases for discussion,
most of them rather interesting. Johnson explains
a student was actually enlisted to concoct some of
the ethical conundrums she feels worth discussing.
One from a chapter on computers and privacy is
worth mentioning here:
"Estelle Cavallo was recently hired to supervise a
large unit of a medical insurance company . . . One
of the first things [she] will do when she starts
this job is to install a software system that will
allow her to monitor the work of each and every
claims processor. The software will allow Estelle
to record the number of keystrokes made per minute
on any terminal in the unit. It will also allow
her to bring the work of others up on her computer
screen so that she can watch individual work as
it is being done. As well, Estelle
will be able to access copies of each employer's work
at the end of each day. She will find out how much
time each worker spends with the terminal off; she
will see what correspondence the person prepares;
she will review the e-mail that the worker sends
or recieves . . . "
Johnson's book invites the students to chew
this over, among others.
Anyway, the scenario formalizes one of the
major points of the best piece of computer fiction
in the last twelve months or so, Floyd
Kemske's "The Virtual Boss" (Catbird Press) which
tosses the reader into a nightmare of computer-enforced
management and bureaucratization. Since Kemske's book
isn't about computers, but people, it sucks the
reader into a totally believable America fucked up
beyond all recognition by the supremacy of corporate
paranoids, hermits, and psychopaths who've hitched
their drays to total computerization.
In fact, "The Virtual Boss" and "Computer Ethics"
would make a great pair of books for any course
covering controversial issues at the juncture
of computing and society - a pretty big field,
we think you've noticed. Someone should have
mercy on college students - let them at something
they'd enjoy - and take the Crypt Newsletter
seriously on this one. Leave all the dry crap from
the ACM legal briefs for optional reading.
Also received: "Computer Communications Security:
Principles, Standard Protocols and Techniques"
(PTR Prentice Hall) by Warwick Ford, a standard text
covering the current thinking on network security
from system architects.
FINDING/OBTAINING/READING THE CRYPT NEWSLETTER:
"I, too, hate Star Trek, WIRED and the National Security
Agency. Keep up the good work Crypt!"
---a satisfied Crypt Newsletter
reader
----Crypt Newsletter is distributed directly from the
Crypt InfoSystems BBS in Pasadena, CA.
Ph: 818-683-0854. Set your terminal to N-8-1, ANSI-BBS
or vanilla TTY emulation. Crypt InfoSystems can also
handle E-7-0, but transfer of files and newsletter archives
are restricted to straight ASCII (raw text) send and
receives or callers who can use PC KERMIT.
----A complete set of 24 back issues of The Crypt Newsletter
along with special editor's notes can be obtained on diskette
by sending $35 cash, check or m.o. to:
George Smith
1454 East Orange Grove, 7
Pasadena, CA 91104
Remember to include a good mailing address with any
correspondence.
----Want to ensure the Crypt Newsletter remains a good read?
SHOW YOUR SUPPORT. The Crypt Newsletter expects you to
subscribe if you read it regularly. Send $20 for twelve
issues to the address above. You'll
also receive an automatic account with full access
on the Crypt InfoSystems BBS! Urnst Kouch will laugh
at your jokes, even if they're not funny! Quite a deal.
Get used to the idea of paying reasonable cash money for
worthwhile digital publishing now.
If you've decided you're never going to honor copyright on
anything electronic, you're setting yourself up for a future
mandated only by giant corporate information
providers who will compel you to pay rates you
may not be comfortable with - and stick you with a lot of
forgettable drivel in the bargain. [Off the soapbox.]
----CryptNet - the Crypt Newsletter's exclusive mini-echo
is now up and running. Bouncing around in Southern
California, CryptNet has fresh news and comical gossip
about the latest issues of interest to alert Crypt
readers. Call Crypt InfoSystems to see it (818.683.0854).
For interested sysops, you can poll the CryptNet and extend
to interested users on your system. The set-up is particularly
user-friendly to sysops using the Synchronet bulletin board
system software. E-mail or call Crypt InfoSystems BBS for
details.
Readers can also wrestle with Arno Penzias, Crypt Newsletter's
artificially intelligent dummy. Arno incorporates a similar
approach to Microelectronics and Computer Technology
Corporation's Project Cyc. By assiduously attaching context
to every word Crypt Newsletter readers and editors use,
Arno can torment callers with a variety of complex and
superficially interesting non-sequiturs indistinguishable
from what passes for the majority of on-line communication.
----Hypertext readers of the latest issues of the newsletter
are also available only from Crypt InfoSystems.
They come in two flavors: DOS and Windows 3.1 for the
IBM-compatible PC. The Windows hypertext driver was made
using Visual Basic 3.0 and the Crescent Software QuickPack
Professional. (Kudos to Cassandra Birzes and Wallace Wang for
getting the ball rolling in this area.)
----FAX subscriptions to the newsletter are offered. They
are $45 for six issues. Generally, each newsletter
is a 18-25 page high resolution fax. The fax image file
itself is close to a megabyte of data, which is the reason
for the higher subscription rate. ****Special low rate for
818 area code subscribers, same as the electronic
edition: $20 for a year!***
Besides Crypt InfoSystems BBS (818.683.0854), there are many
other good places to retrieve the Crypt Newsletter,
particularly if you are a member of one of the mainstream
on-line services.
For the Apple Mac crowd in greater Los Angeles County and
the San Gabriel Valley, The Crypt Newsletter is also found
on Digital Popcorn, a FirstClass system software network
on-line with Internet connections at: 818-398-3303.
On COMPUSERVE, straight text editions of the newsletter
can be retrieved from:
The "CyberLit" library in CYBERFORUM (GO CYBERFORUM).
The "Papers/Magazines" and "Future Media" libraries in
the Journalism Forum (GO JFORUM).
On DELPHI, these versions are warehoused in The Writers
Group, General Info database and the Internet Services
Special Interest Group in the General Discussion
database.
On GENIE, the Crypt Newsletter can be found in the
DigiPub RT special interest group.
--------------------------------------------------------------
Editor George Smith edits The Crypt Newsletter from
Pasadena, CA, when not working on "The Virus
Creation Labs". Andy Lopez lives in Columbia, SC.
(c)opyright 1994 Crypt Newsletter. All rights reserved.