home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 157.4 KB | 3,110 lines |
-
- THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
- ======================================================================
- ISSN 1074-3111 Volume One, Issue Three April 30, 1994
- ======================================================================
-
- Editor-in-Chief: Scott Davis (dfox@fennec.com)
- Technology Editor: Max Mednick (kahuna@bga.com)
- Consipracy Editor: Gordon Fagan (flyer@fennec.com)
- Network Security: George Phillips (ice9@bga.com)
-
- ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC
-
- U.S. Mail:
- The Journal Of American Underground Computing
- 10111 N. Lamar #25
- Austin, Texas 78753-3601
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- IMPORTANT ADDRESSES -
- ============================================================================
- To Subscribe to "TJOAUC", send mail to: sub@fennec.com
- All questions/comments about this publication to: comments@fennec.com
- Send all articles/info that you want published to: submit@fennec.com
- Commercial Registration for Profitable Media: form1@fennec.com
- ============================================================================
-
- "The underground press serves as the only effective counter to a growing
- power, and more sophisticated techniques used by establishment mass media
- to falsify, misrepresent, misquote, rule out of consideration as a priori
- ridiculous, or simply ignore and blot out of existence: data, books,
- discoveries that they consider prejudicial to establishment interest..."
-
- (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Contents Copyright (C) 1994 The Journal Of American Underground Computing
- and/or the author of the articles presented herein. All rights reserved.
- Nothing may be reproduced in whole or in part without written permission
- of the Editor-In-Chief and/or the author of the article. This publication
- is made available periodically to the amateur computer hobbyist free of
- charge. Any commercial usage (electronic or otherwise) is strictly
- prohibited without prior consent of the Editor, and is in violation of
- applicable US Copyright laws. To subscribe, send email to sub@fennec.com
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- DISCLAIMER AND NOTICE TO DISTRIBUTORS -
-
- NOTE: This electronic publication is to be distributed free of charge
- without modifications to anyone who wishes to have a copy. Under NO
- circumstances is any issue of this publication, in part or in whole,
- to be sold for money or services, nor is it to be packaged with other
- computer software, including, but not limited to CD Rom disks, without
- the express written or verbal consent of the author and/or editor.
- To obtain permission to distribute this publication under any of the
- certain circumstances stated above, please contact the editor at one of
- the addresses above. If you have intentions of publishing this journal
- in any of the ways described above, or you are in doubt about whether or
- not your intentions conflict with the restrictions, please contact the
- editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
- This publication is provided without charge to anyone who wants it.
- This includes, but is not limited to lawyers, government officials,
- cops, feds, hackers, social deviants, and computer hobbyists. If anyone
- asks for a copy, please provide them with one, or mail the subscription
- list so that you may be added.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 3
-
- TABLE OF CONTENTS
-
- 1) Visa Establishes International Consortium... NewsWire
- 2) Cyberspace Cowboy Maureen Harrington
- 3) A Message From The Vice President Al Gore
- 4) Legion Of Doom T-Shirts Chris Goggans
- 5) Computers Tnd The Second Amendment Carl Guderian
- 6) How To Survive The First Year Of Law School.. Mike Godwin
- 7) Notes From Cyberspace - 2nd Edition Readers
- 8) Editorial Of The Month [A Humorous Diddy] Marco Landin
- 9) Whitehouse Electronic Publications FAQ Stanton McCandlish
- 10) Redefining The Modem User Ed Cavazos
- 11) Texas ISDN - Request For Comments Public Util. Comm.
- 12) Test Scores, Funny, But Makes You Wonder Anonymous
- 13) An Interview With Tom Jennings Jon Lebkowsky
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- J.R. "Bob" Dobbs - The Ultimage SubGenius
- @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
- @@@@@@@^^~~~~~~~~~~~~~~~~~~~~^^@@@@@@@@
- @@@@@@^ ~^ @ @@ @ @ @ I ~^@@@@@@
- @@@@@ ~ ~~ ~I @@@@@
- @@@@' ' _,w@< @@@@
- @@@@ @@@@@@@@w___,w@@@@@@@@ @ @@@
- @@@@ @@@@@@@@@@@@@@@@@@@@@@ I @@@
- @@@@ @@@@@@@@@@@@@@@@@@@@*@[ i @@@
- @@@@ @@@@@@@@@@@@@@@@@@@@[][ | ]@@@
- @@@@ ~_,,_ ~@@@@@@@~ ____~ @ @@@
- @@@@ _~ , , `@@@~ _ _`@ ]L J@@@
- @@@@ , @@w@ww+ @@@ww``,,@w@ ][ @@@@
- @@@@, @@@@www@@@ @@@@@@@ww@@@@@[ @@@@
- @@@@@_|| @@@@@@P' @@P@@@@@@@@@@@[|c@@@@
- @@@@@@w| '@@P~ P]@@@-~, ~Y@@^'],@@@@@@
- @@@@@@@[ _ _J@@Tk ]]@@@@@@
- @@@@@@@@,@ @@, c,,,,,,,y ,w@@[ ,@@@@@@@
- @@@@@@@@@ i @w ====--_@@@@@ @@@@@@@@
- @@@@@@@@@@`,P~ _ ~^^^^Y@@@@@ @@@@@@@@@
- @@@@^^=^@@^ ^' ,ww,w@@@@@ _@@@@@@@@@@
- @@@_xJ~ ~ , @@@@@@@P~_@@@@@@@@@@@@
- @@ @, ,@@@,_____ _,J@@@@@@@@@@@@@
- @@L `' ,@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
- @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
-
-
- THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - April 30,1994 ISSN 1074-3111
- ============================================================================
-
- EDITOR'S NOTES:
-
- FREE-NET: I had intended to do some kind of informative article on
- the Free-Net systems around the world for this issue. In my attempts to
- get information, I mailed about 60 individuals/groups requesting information
- on their organization. I contacted persons in several countries as well as
- many, many people here in the states. ...and low and behold, only 2 people
- responded offering information. Half did not reply at all, and the other
- half (minus the two brave souls mentioned above) replied saying that they
- had not developed an organization, had no info, no volunteers, etc...
- Go figure...(Is Free-Net the Vapor-Ware of the 90's??)
-
- PUBLISHING: Our original publishing schedule has gone to hell-in-a-handbasket
- to say the least. We will probably release 2 or 3 times per quarter.
-
- Order some Legion Of Doom T-Shirts!
-
- Share this issue with all of the little boys and girls that you know who
- have an e-mail address.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- VISA ESTABLISHES INTERNATIONAL CONSORTIUM FOR
- ELECTRONIC PURSE SPECIFICATIONS
-
- /PRNEWSWIRE (C)opyright 1994
-
- SAN FRANCISCO, March 22 /PRNewswire/ -- Visa today formed an international
- consortium of market leaders in the consumer payments industry to develop
- common specifications for a new way to pay -- an "Electronic Purse," a card
- with a micro chip that can be used instead of cash and coins for everything
- from vending machines to public transportation.
-
- The Electronic Purse would consist of a micro-chip embedded in a credit
- card, debit card, or stand alone card to store value electronically.
- The card would replace cash and coins for small-ticket purchases (less than
- U.S. $10), such as gasoline stations, pay phones, road/bridge tolls, video
- games, school cafeterias, fast food restaurants, convenience stores, and
- cash lanes at supermarkets. Cardholders can "reload" the micro-chip and
- control the amount of value stored in the card's memory. The Electronic
- Purse provides cardholders with the security and convenience of carrying
- less cash and coins, eliminating the need for exact change. Many
- participants in this worldwide effort are currently pilot testing electronic
- purse products, additional pilots are expected in late 1995.
-
- Joining forces with Visa to develop international technical specifications
- for the Electronic Purse are: Banksys; Electronic Payment Services, Inc.,
- (EPS); Financial Information Systems Center, (FISC); Groupement des Cartes
- Bancaires, (CB); NationsBank Corporation; Sociedad Espanola de Medios de
- Pago, (SEMP); Sociedade Interbancaria de Servicos, S.A., (SIBS); and
- Wachovia Corporation. To ensure worldwide representation, limited additional
- payment systems that have invested energies in open-market electronic purse
- projects, will be invited to join. In addition, Visa will form a parallel
- group with technology companies to ensure the specifications support low-cost,
- efficient production of necessary equipment.
-
- "The goal of our combined efforts is to lead the market into the next
- frontier of payment processing -- the automation of cash and coins," said Ed
- Jensen, president and chief executive officer, Visa International. "The
- highly complementary capabilities of the participating companies will allow
- us to address issues for all aspects of smart card-based electronic purse
- solutions, including the cards themselves, point-of-sale systems, networks
- and back-end interchange and settlement systems."
-
- This announcement reflects Visa's commitment to providing superior,
- convenient payment services to its member financial institutions who serve
- consumers and merchants around the globe. The consortium was formed in
- response to member requests that Visa take the lead in facilitating the
- addition of an electronic purse to existing credit and debit cards, as well
- as the introduction of a stand alone card. Visa will leverage its global
- brand presence by teaming up with strategic partners to develop common
- standards.
-
- "The most critical step in making this concept a global market reality is
- the definition of open standards that can be shared among all participants,"
- said Wesley Tallman, president, Visa Products and Information Services.
- "Recognizing that important domestic electronic purse developments are
- underway, the consortium will leverage the expertise of all participants.
- Group 'knowledge sharing,' especially with our European participants that
- have made significant advancements in the chip card arena, will facilitate
- the development of a specification that is relevant to markets worldwide."
- The technological specifications will govern the standards needed to
- establish an infrastructure that supports electronic purse payments.
-
- The worldwide market for automating cash transactions remains virtually
- untapped. According to the Bank for International Settlement, consumer cash
- transactions in the U.S. alone exceed 300 billion per year. By contrast,
- bank-facilitated consumer transactions, such as credit and debit cards,
- checks, and wire transfers total only 60 billion per year. As these figures
- indicate, there is a vast market potential for automating cash transactions.
- "EPS has been investing significant resources to develop smart card solutions
- since 1991," stated David Van Lear, chairman and chief executive officer of
- Electronic Payment Services, Inc. "Combining the resources of these industry
- leaders will accelerate market acceptance."
-
- Just as the standard operating environments have fueled the growth of the
- personal computer industry, the specifications that emerge from this
- collective effort will provide the essential framework to ensure
- compatibility, reduce development time and cost, and open up the market for
- others.
-
- International payment system participants included in this cooperative
- effort are:
-
- Banksys -- based in Brussels, Belgium, is a leading European specialist in
- electronic funds transfer (EFT) and payment security. Banksys operates the
- automated teller machine (ATM) and point-of-sale (POS) network on behalf of
- all card issuing banks in Belgium. Besides Belgium, 10 other countries are
- equipped with the Banksys system. Banksys is entrusted with the development
- of the Belgian Electronic Purse project, with pilot testing expected to begin
- in December 1994.
-
- Electronic Payment Services, Inc.(EPS) -- based in Wilmington, Del., is the
- leading electronic funds transfer company in the United States with an annual
- transaction volume of 1.7 billion. EPS is the holding company for BUYPASS
- Corporation and MONEY ACCESS SERVICE INC., operator of the MAC(R) network.
-
- Financial Information Systems Center (FISC) -- based in Taipei, Taiwan, is a
- government organization that supports electronic purse initiatives in that
- country. Through its members, FISC has issued 80 thousand integrated circuit
- cards and has installed more than one thousand point-of-sale systems with
- integrated circuit card readers.
-
- Groupement des Cartes Bancaires (CB) -- based in Paris, is the country's
- payment cards organization that has succeeded in launching the world's
- largest integrated circuit card program, with more than 22 million cards in
- circulation generating 2.2 billion transactions per year.
-
- NationsBank Corporation -- headquartered in Charlotte, N.C., is the third
- largest banking company in the United States with approximately $158 billion
- in assets, more than 1,900 retail banking centers in nine states and the
- District of Columbia, and consumer offices in 33 states. NationsBank is a
- financial services company providing products and services nationally and
- internationally to individuals, businesses, corporations, institutional
- investors and government agencies.
-
- Sociedad Espanola de Medios de Pago (SEMP) -- based in Madrid, SEMP is a
- sister company of Visa Espana, a group member of Visa banks in Spain. SEMP
- operates Sermepa, the card processing company of Visa Espana.
-
- Sociedade Interbancaria de Servicos, S.A., (SIBS) -- based in Lisbon,
- Portugal, is the country's leading bank payments company which provides
- electronic clearing services and operates the national Multibanco ATM and
- EFT/POS networks. As an extension to its service offerings, SIBS, is
- introducing the Multibanco Electronic Purse, (MEP).
-
- Visa International -- headquartered in the United States, is the world's
- leading consumer payments system with more than 333 million cards issued,
- more than 11 million acceptance locations, and the largest global ATM
- network.
-
- Wachovia Corporation -- with dual headquarters in Atlanta, and
- Winston-Salem, N.C., is one of the United States' leading debit card issuers
- and provides credit card services to three million cardholders nationwide.
-
- /NOTE TO EDITORS: In December 1993 Visa International, MasterCard
- International and Europay announced an agreement to form a joint working
- group to develop a common set of technical specifications for the
- integration of microprocessor chips in payment cards -- commonly known as
- "Integrated Circuit," "Chip," and "Smart" cards. The electronic currency
- specifications referenced in this release will enable the electronic purse
- application to be added to the integrated circuit cards./
-
- /CONTACT: Albert Coscia of Visa, 415-432-2039/
-
- 03/28 VISA TECHNOLOGY GROUP SUPPORTS ELECTRONIC PURSE SPECIFICATIONS
-
- SAN FRANCISCO, /PRNewswire/ -- Visa today announced the formation
- of a technology group of international manufacturers to support the
- adaptation of specifications for a variety of technologies that will
- facilitate the issuance and acceptance of the "Electronic Purse" -- a payment
- card that stores value electronically and is designed to replace cash and
- coins for a wide range of low-value (under U.S. $10) consumer payments.
-
- The technology group will work with Visa who recently formed an
- international consortium of payment systems that will develop common
- specifications for Electronic Purse programs. Because plans are underway
- for the card to be used globally in a variety of venues -- including,
- gas/petrol stations, grocery stores, convenience stores, fast food
- restaurants, school cafeterias, and for such routine items as telephone calls
- from pay phones, road/bridge tolls and video games -- a number of
- technologies required to support card acceptance in global markets will be
- examined by the group.
-
- The first suppliers to join the international technology group are
- VeriFone, Inc., the leading global provider of point-of-sale transaction
- systems, and Gemplus, SCA, the world's leading manufacturer of smart cards. VeriFone and
- Gemplus have formed a joint venture, called VeriGem, to pursue electronic
- purse opportunities. To ensure worldwide representation, additional
- technology leaders who have invested energies in electronic purse
- applications will be invited to join the group.
-
- In addition to acceptance technologies, "loading" systems that enable
- cardholders to restore currency value into the micro chip will also be
- analyzed. Automated Teller Machines (ATMs) are expected to play an important
- role in loading value into the electronic purse. Future loading methods, such
- as specialized devices located at merchant locations or in the home, will
- also be explored. Operating both the largest international consumer payment
- network, VisaNet, and the world's largest ATM network puts Visa in a unique
- position to lead this global effort.
-
- "As with all emerging technologies, consultation with suppliers responsible
- for physically implementing the technology is critical to ensuring the
- viability of the product design," said Wesley Tallman, president, Visa
- Products and Information Services. "As market leaders in the payment systems
- field, all of those who have joined us in this initiative are truly partners
- in paving this 'express lane' of the electronic payment superhighway."
-
- Tallman emphasized that the technology group will be charged with ensuring
- that the specifications developed by the consortium support low-cost,
- efficient production of necessary systems and equipment.
- This group approach has been a key tool in support of Visa's product and
- market development efforts. In December 1992, Visa formed a manufacturer's
- group to support development efforts for security specifications of
- integrated circuits on payment cards. Still active today, this group lends
- critical on-going support and expertise to Visa's chip card efforts.
- Participants in this international group include: Bull, CPS (France);
- Gemplus, (France); Giesecke and Devrient (Germany); Schlumberger Industries
- (France); and Toshiba Corporation (Japan). Visa expects and welcomes the
- participation of these and other technology partners in the electronic purse
- effort.
-
- Hatim Tyabji, chairman, president and chief executive officer of VeriFone,
- agreed with the need for a supplier's group that would lend systems expertise
- to this effort. "Establishing worldwde specifications is the essential first
- step in the global standardization of the electronic purse, uniting all
- industry participants on a common playing field with a common set of rules.
- The endorsement and support of the electronic purse by Visa, its member banks
- and leading worldwide payment systems send a strong message to the industry
- -- the electronic purse is no longer merely a possibility, but a real market
- direction," said Tyabji.
-
- "With their high storage capacity, programmability and increasing
- affordability, smart cards are now poised to move beyond specialized
- applications and become a truly universal payment medium," said Dr. Marc
- Lassus, president and chief executive officer of Gemplus. "We share the
- consortium's vision of the electronic purse, and are excited about helping
- to bring speed, reliability and efficiency of smart card-based electronic
- cash to markets around the globe."
-
- Visa International, headquartered in San Francisco, California, is the
- world's leading consumer payments system with more than 333 million cards
- issued, more than 11 million acceptance locations, and the largest global
- ATM network.
-
- VeriFone, Inc., based in Redwood City, California, is a leading global
- provider of Transaction Automation solutions used to deliver payment
- processing and other transaction services to various retail market segments,
- as well as the healthcare and government benefits market. The company has
- more than 30 facilities located throughout Asia, Europe and the United States.
- To date, VeriFone has shipped more than 3.4 million Transaction Automation
- systems, which have been installed in more than 70 countries. Net revenues
- in 1993 were U.S. $258.9 million.
-
- Gemplus Card International, based in Gemenos, France, is the leading
- worldwide manufacturer of smart cards. Gemplus' cards are used for secure
- transactions in public and cellular telephone, banking, pay TV,
- transportation, healthcare and defense applications. The company has three
- manufacturing facilities: two near Marseilles, France, and one near
- Stuttgart, Germany. Current Gemplus production exceeds 14 million cards
- per month. The company has direct sales offices in 12 countries and a
- distribution network covering an additional 50 countries worldwide. The
- company's 1993 revenues were U.S. $130 million.
-
- NOTE: Gemplus is a registered trademark of Gemplus Card International.
- VeriFone is a registered trademark of VeriFone, Inc. Visa is a registered
- trademark of Visa International, Inc.
-
- /NOTE TO EDITORS: On March 22, 1994, Visa announced the formation of an
- international consortium to develop worldwide technical specifications for
- the Electronic Purse. The supplier's group discussed in this release is a
- complementary effort, serving Visa in a consultative or advisory capacity.
-
- /CONTACT: Albert Coscia of Visa, 415-432-2039/
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CYBERSPACE COWBOY
-
- John Perry Barlow rides the range on the electronic frontier
-
- By Maureen Harrington
-
- PINEDALE WY- John Perry Barlow isn't exactly your average
- computer big shot. Burly and bearded, prone to an eccentric mix
- of gaudy cowboy shirts and Italian leather jackets, he's a far
- cry from a pencil neck geek with a pocket protector and a Mensa
- membership. His interest in technology tends less to megabytes
- than toward souping up the V-8 in his pickup.
-
- But neither is he cut out for a corporate dance card. Barlow's
- sarcasm would get him tossed out of most boardrooms.
-
- Despite his unusual resume'- lyricist for the Grateful Dead,
- former Students for a Democratic Society organizer with an
- impeccable Republican pedigree, and failed Wyoming cattle rancher
- with the heart of an environmentalist- Barlow, 46, found a niche
- in computers. Accidentally.
-
- He's an outlaw at heart who lost his home on the range and found
- another. Barlow intends to keep the electronic frontier free of
- rustlers, ruffians and the strong and long arm of the feds. Just
- as he fought to keep the West free of polluters, developers and
- the strong and long arm of the law.
-
- The computer community has its first cultural historian, critic
- and social activist. Barlow has set out to watchdog the goings
- on in cyberspace- the intangible place between the computer key
- board and the dots that appear on the computer screen.
-
- He's become, by dint of his megaverbal skills and nontechnical
- point of view, the cowboy conscience of the computer culture.
- He's regarded by computer CEO's, journalists who follow the
- industry and the wildcatters who swoop through systems as the man
- to ask about the future of technology.
-
- Barlow not only writes and speaks about the future that is racing
- down the information highway, he puts his talent where his mouth
- is: he helped found the Electronic Frontier Foundation (EFF) in
- 1991, along with Mitch Kapor, inventor of Lotus 1-2-3, the best-
- selling spreadsheet software in the world and with an assist from
- Steve Wozniak, Apple computer's onetime whiz kid.
-
- Kapor and Barlow started the foundation to protect the right to
- privacy in cyberspace. They had both been visited by federal
- agents looking for the second-story men of the computer industry-
- hackers. They became alarmed.
-
- The tale of Kapor and Barlow's friendship has become one of the
- first cyberspace legends.
-
- "I was sitting here in Pindale, enjoying this new found world on
- my computer, when an FBI agent shows up asking me what I might be
- doing on it," said Barlow.
-
- At the time, Barlow was unaware of a growing government concern
- about what they considered computer crimes of the most heinous
- nature.
-
- "A nice guy, but he was expert in cattle rustling, not in high-
- tech crime," recalled Barlow. "I tried to explain it to him, but
- he didn't really understand computers. He went on back to the
- office."
-
- Barlow got on the techies' horn- the WELL, a computer bulletin
- board- and alerted users all over the country to what happened.
- In Connecticut, at about the same time, Kapor also had been
- visited by the feds. Like Barlow, Kapor was concerned about
- government invasion in this newly forming world.
-
- He and Barlow got together via computers, naturally. Later
- Kapor, on the way to the West Coast from his home on the East
- Coast, dropped into Wyoming in his private jet to talk with
- Barlow.
-
- As Barlow tells it, "Here we are two very different guys- one
- from Long Island, who has been a leader in this field for years
- and me, a small town Wyoming rancher who just figured out how to
- turn these things on. I felt like I'd known Mitch all my life."
-
- In a few hours at a kitchen table in Wyoming, the two men
- conceived the first civil rights group for high-tech's new age.
-
- EFF, now headquartered in Washington, D.C., raises money for
- lobbying and provides funds for the defense of so-called
- "computer criminals." Their first projects were helping with the
- legal defense of hackers who the founders don't think deserved
- such harsh treatment by the feds.
-
- "Oh, hell, these were kids mostly," said Barlow. "Just fooling
- around. They were being treated like major criminals. This
- hacking is a lot like boys going out to abandoned buildings and
- looking around. Yeah, the property owners don't like it, but
- it's part of a boy's life as far as I can tell."
-
- Barlow and Kapor have been bitterly criticized for their support
- of what many in corporate America- the software and telephone
- companies, in particular- say are serious criminals.
-
- Barlow takes that into consideration: "Crimes should be
- prosecuted. There are some real bad things being done on these
- machines. But that doesn't mean that we shouldn't be watching
- out for misuse of (government) power and helping to protect the
- innocent. We're into educating people about this stuff, as much
- as anything."
- -----------
-
- Barlow doesn't fit, by nature or training, into either the
- techno-wonk category or the big money elite that has developed
- around the technology. Nonetheless, both factions of the
- computer culture listen to him.
-
- He's preaching the sermon of change, from his high-tech pulpit:
- the computer bulletin board. Barlow can be read on The WELL (one
- of the first and largest bulletin boards) as well as in the op-ed
- pages of the New York Times and the slick computer-lifestyle
- magazines, Wired and Mondo 2000.
-
- He's been profiled in the New York Times and quoted as an expert
- on the computer culture in scores of newspapers and
- newsmagazines. Remarkably, Barlow had never used a computer
- until four years ago. He caught on fast.
-
- "Oh, Jesus," he said, rolling his eyes, impatient with ordinary
- definitions of jobs. "I'm a techno-crank. I've got all kinds of
- hats on and most of them don't fit exactly. But let's just say I
- came into computers late, but I was able to see fairly quickly
- some of the possibilities and problems of this new reality.
-
- "I got my first computer to do some of the accounting work for
- the ranch (The Bar Cross, outside Pinedale), in the late '80's.
- I discovered that you could talk to people on it. I got
- fascinated."
-
- "Fascinated," for most of us, constitutes a hobby.
-
- For Barlow, fascination turned into a new career. Caught in the
- double bind of rising taxes and expenses and lower prices for
- cattle, Barlow had to sell the Bar Cross, which had been in the
- family for three generations. Just as that part of his life was
- ending, he was catapulted into cyberspace. And his future.
-
- Barlow is one of the few nontechnoids who has caught the
- attention of the citizenry of cyberspace. In fact, he was the
- first to co-opt the word "cyberspace" from sci-fi novelist
- William Gibson and use it in everyday language.
-
- According to Bruce Sterling, a journalist, novelist and
- accomplished chronicler of computer culture, "Barlow saw that the
- world of electronic communications, now made visible through the
- computer screen, could no longer be regarded as just a tangle of
- high-tech wiring. Instead it had become a place, cyberspace,
- which demanded a new set of metaphors, a new set of rules and
- behaviors."
-
- Sitting in his mothers home in Pinedale, wearing a short kimono
- over jeans and boots, Barlow had been on the phone, fax and modem
- all morning. Mim Barlow, from whom he inherited his
- conversational skills, was decked out in bright red lipstick and
- matching rhinestone earrings.
-
- She has no problem, pointing out that although her son "was a
- brilliant child- quite interesting to raise- I thought for sure
- he was doomed.
-
- "His father and grandfather were alcoholics, and he was going
- down the same road."
-
- Barlow no longer drinks.
-
- "Hell, he was headed for juvenile delinquency," said Mim Barlow.
- "No question.
-
- "We got him out of town. Sent him to Fountain Valley, a prep
- school outside of Colorado Springs. Best thing that ever
- happened to this town."
-
- The best thing that happened to her son, too, he freely admitted:
-
- "I'm forever in debt to that school. It saved me. I hope my
- three girls will be able to go there, if I can afford it."
-
- (Barlow is divorced from his wife Elaine, who remains in Pinedale
- with their three children. Barlow commutes between Wyoming and
- New York City. He serves on the board of Fountain Valley.)
-
- Barlow met his fate at prep school: Bob Weir, a co-founder of the
- Grateful Dead and life-long friend. Barlow has been writing for
- the Grateful Dead since 1970, including the lyrics for "Hell In a
- Bucket," "Picasso Moon," and "I need a Miracle." The royalties
- kept the family ranch afloat for years and pay Barlow's bills
- now.
-
- "There's a resurgence in interest in the band and I'm actually
- picking up the pace a little," said Barlow.
-
- "You know I saw Bobby Weir last year," interjected Barlow's
- eighty something mother. "He didn't look so good.
-
- "This one," she nodded at her son like he's a questionable head
- of beef, "looks better."
-
- Barlow shot his mother a look of mild disgust. "Hell, Ma, Bob's
- had a *life*. It shows, that's all."
-
- Barlow has had quite a life, too.
-
- After graduating from Wesleyan University in Connecticut, he was
- swept into the counterculture. He went to India. Rode
- motorcycles around Europe and was in and out of Haight-Ashbury.
- He wandered back to the United States, in the early '70's, and
- was headed to Hollywood for a job, when he stopped at the family
- ranch on the way to Glamourville. He didn't get out of Wyoming.
-
- "The ranch was in a mess. My dad had been sick. We were in
- debt. I found something I could put my hand to. I was a hippie
- that was running cattle and trying to keep the land. I got
- married and had kids."
-
- Along the way, true to his deep Republican roots, he became an
- activist. Two generations of Barlows were in the Wyoming Senate.
- John Perry may have gotten there too, but he narrowly missed
- winning a Senate seat in 1987 running as a Republican.
-
- Instead, he became involved in the small town life. He set out
- to protect that way of life by becoming an environmentalist-
- rancher, which is considered a bit of an oxymoron in the West.
- But environmentalism is, in Barlow's estimation, "inevitable.
- You've got to conserve the land."
-
- The loss of his land still rankles. Driving through the Bar
- Cross acreage, now owned, as many ranches around Pinedale are, by
- a wealthy "weekend rancher," Barlow tightens up a little: "I did
- the best I could. I just couldn't make a go of it."
-
- Barlow sold his land at, "about break-even."
-
- He's been living mostly in New York for the past several years,
- writing for various magazines and becoming more and more famous
- on the electronic grapevine. He travels constantly and is as
- provocative a speaker as he is writer. While his income is still
- largely from royalties, he's commanding more attention and fees
- as a speaker. He's spoken in China to a scientific congress and
- has been asked to help explain the future of information to the
- CIA.
-
- Barlow doesn't find that such an odd task for a social activist:
- "Like so many organizations, the CIA is waking up to the fact
- that they know nothing about this technology. And, they are
- realizing that if they don't know about the revolution in
- information, they will be left behind.
-
- "People who don't accept this change are going to be left behind.
- What we once thought of as power and wealth is changing. Who's
- in charge is changing."
-
- Barlow's business card may say it all: There are nine phone,
- fax, modem, and beeper numbers. Under his name, his title reads,
- "cognitive dissident."
-
- In a new book, "The Hacker Crackdown: Law and Disorder on the
- Electronic Frontier" (Bantam $23), Sterling calls Barlow, "a
- computer networker of truly stellar brilliance. He has a poet's
- gift of concise, colorful phrasing. He also has a journalist's
- shrewdness, an off-the-wall, self deprecating wit and a
- phenomenal wealth of simple personal charm."
-
- Sterling adds that Barlow is "a gifted critic...who coins the
- catchphrases and the terms of debate that become the common
- currency of the period."
-
- John Perry Barlow has become the poet laureate of technologies
- new age.
-
- He's the hackers' hero- patrolling the borders of the newly
- discovered frontiers of technology. If anyone is going to
- explain the social, legal and personal implications of all the
- megachange coming down the high-tech pike, it's Barlow.
-
- As he has written in the latest edition of Wired: "In the little
- hick town I come from, they don't give you much credit for just
- having ideas. You are judged by what you make of them."
-
- Using that criterion, Barlow may just have a future in
- cyberspace.
-
- *** Maureen Harrington is a Denver Post staff writer. ***
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- A MESSAGE FROM THE VICE PRESIDENT
- ON NETWORK ACCESS REFORM
-
- By Al Gore (vice.president@whitehouse.gov)
-
- Greetings. I'll leave it to others to carry on the important work
- former president Clinton started in health care reform after discovering
- that 37 million Americans have no health insurance.
-
- Now that Clinton has magnanimously stepped down, rather than embroil the
- US in lengthy Whitewater hearings, and I'm president, I plan to make it
- my top priority to deal with a really serious problem. As horrifying
- and unthinkable as it is in this day and age, 212 million Americans
- don't have network access.
-
- The current network situation is an intolerable and inefficient
- hodgepodge of private, university, and government access providers.
- People in different parts of the country pay different amounts for
- network access. Different providers give different levels of service.
- There's no excuse for this. Access to the net -- *equal* access to the
- net -- is a fundamental human right.
-
- Tipper and I have developed a program which will guarantee equal access
- to the information superhighway to all Americans, tall or poor, rich or
- thin, white or non-smokers.
-
- All access to the net will be through one's employer. Employers will
- deal only with large centralized network access providers. There will
- be only one provider in each area of the country, cutting down on
- wasteful duplication. All providers will be heavily regulated, and
- will be required to offer the exact same services for the exact same
- prices. All employers will be required to participate, and to pay the
- full costs.
-
- Unemployed people's access will be paid for by the government. This
- is not expected to require any tax increase. At least, not a very large
- tax increase. At least, not before the next election.
-
- Since individuals will not be charged for the services, some may be
- tempted to abuse the privilege. Especially because many newsgroups are
- known to be highly addictive. To prevent this, newsgroup access will be
- available only by prescription.
-
- For instance, if someone wants access to alt.sex, they would schedule
- an appointment with their Primary Network Consultant. In a few weeks,
- when the appointment comes up, they'd come in at 8 am and get to speak
- briefly with their Consultant at some time that day or evening. The
- Consultant would refer them to a sex consulatant or other specialist,
- as appropriate. After a few weeks, they'd have a similar appointment
- with the specialist, who would then prescribe alt.sex or some other
- newsgroup as appropriate. They would take the prescription to their
- Network Access Provider to get the prescribed newsgroup added to their
- .newsrc. To prevent fraud and corruption, all prescriptions will be
- carefully tracked by the government in large databases, closely secured
- against everyone who doesn't have the carefully guarded top secret
- phone number for modem access (202-456-1414). Also, all prescriptions
- automatically expire after 30 days. They can be renewed only after
- another appointment with one's Primary Network Consultant and the
- specialist he refers one to.
-
- FTP, IRC, Gopher, WAIS, World Wide Web, Archie, telnet, rlogin, finger,
- and e-mail, may also be made available by prescription, if they are
- approved by the Federal Data Administration (FDA). For reasons of
- public safety, network services and newsgroups not approved by the
- FDA will be strictly banned. Anyone caught owning, using, producing,
- providing, or advocating unapproved services, mailing lists, or
- newsgroups, will be subject to zero tolerance -- everything they
- own will be forfeited to the government, without a trial.
-
- Also, anyone who rents an apartment or gives a job to a suspected
- network abuser will be subject to zero tolerance. Of course, this
- being a free country, nobody will actually be sent to prison without
- a fair trial. Since nobody who's accused will be able to afford an
- attorney, the government will provide them with an attorney of our
- choice without charge. And anyone guilty of three offenses will serve
- a mandatory life sentence without parole.
-
- Similarly with anyone who writes, posesses, distributes, manufactures,
- sells, uses, posts, backs up, saves, promulgates, perpetrates, forwards,
- or laughs at, a spoof that makes official government policies or
- proposals look ridiculous.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- LEGION OF DOOM T-SHIRTS!!
-
- By Chris Goggans <phrack@well.sf.ca.us>
-
- After a complete sellout at HoHo Con 1993 in Austin, TX this past
- December, the official Legion of Doom t-shirts are available
- once again. Join the net luminaries world-wide in owning one of
- these amazing shirts. Impress members of the opposite sex, increase
- your IQ, annoy system administrators, get raided by the government and
- lose your wardrobe!
-
- Can a t-shirt really do all this? Of course it can!
-
- ------------
-
- "THE HACKER WAR -- LOD vs MOD"
-
- This t-shirt chronicles the infamous "Hacker War" between rival
- groups The Legion of Doom and The Masters of Destruction. The front
- of the shirt displays a flight map of the various battle-sites
- hit by MOD and tracked by LOD. The back of the shirt
- has a detailed timeline of the key dates in the conflict, and
- a rather ironic quote from an MOD member.
-
- (For a limited time, the original is back!)
-
- "LEGION OF DOOM -- INTERNET WORLD TOUR"
-
- The front of this classic shirt displays "Legion of Doom Internet World
- Tour" as well as a sword and telephone intersecting the planet
- earth, skull-and-crossbones style. The back displays the
- words "Hacking for Jesus" as well as a substantial list of "tour-stops"
- (internet sites) and a quote from Aleister Crowley.
-
- All t-shirts are sized XL, and are 100% cotton.
-
- Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for
- postage.
-
- Send checks or money orders. Please, no credit cards, even if
- it's really your card.
-
-
- Name: __________________________________________________
-
- Address: __________________________________________________
-
- City, State, Zip: __________________________________________
-
-
- I want ____ "Hacker War" shirt(s)
-
- I want ____ "Internet World Tour" shirt(s)
-
- Enclosed is $______ for the total cost.
-
-
- Mail to: Chris Goggans
- 603 W. 13th #1A-278
- Austin, TX 78701
-
- These T-shirts are sold only as a novelty items, and are in no way
- attempting to glorify computer crime.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Computers and the Second Amendment: An Opening Volley
-
- By Carl Guderian (bjacques@cypher.com)
-
- A friend and I were talking the other night about needing to defend
- oneself against one's own government. He was talking about guns; I was
- talking about encryption. We were talking about the same thing. I read a lot
- of debates in which the arguments for restricting computing are strikingly
- similar to those for gun control. Am I the only one who sees the parallels?
- It's certainly forced me to take another look at the gun issue.
-
- The last few years have given us all an appreciation for the
- Constitution, or what's left of it. Most of the action in the personal
- computer user community is centered around the First Amendment, particularly
- the rights to free expression and peaceable assembly. We've also had our
- noses rubbed in official disregard for the Fourth, Fifth, and Sixth
- Amendments. All of this has been (and is still being) discussed elsewhere.
- Tonight's topic is the Second Amendment, the people's right to keep and bear
- arms (a well regulated militia being essential to the security of a free
- state), in relation to personal computers and private networks.
-
- Until recently, I didn't give much thought to the gun issue, since I
- don't own a gun and probably won't be getting one anytime soon. Unless I
- move to Arizona, I can't pack heat everywhere I go, so I probably won't
- have a shooting iron handy when I really need it to shoo away a mugger if I
- run into one. The best way for me to win such an encounter is to prevent it
- from ever taking place. According to Sun Tzu, a battle is won or lost
- before it is ever fought. I don't hide out in the suburbs, but I don't
- stroll down Main at midnight with my wallet hanging around my neck, either.
- Weapons are better than nakedness, but wits are better than
- both. The existence of priests and businessmen proves it. So much for that.
-
- Freedom of computing, it now turns out, has a lot in common with the
- citizen's right to own a gun. Both rights are being attacked in a similar
- manner.
-
- Proponents of restrictions love to wave a bogeyman in our faces to get
- us to blindly go along with their hastily cooked-up bills. George Hennard
- helped a bill restricting "assault" weapons get more attention than it
- deserved. Likewise, Sen. Joe Biden touts Senate Bill 266 as protection from
- crazed hackers who might trigger World War III or, worse, steal corporate
- secrets and sell them to the Japanese. And let's not forget the drug
- kingpins who might keep their communications secret from the Law. As a law-
- abiding citizen, you've got nothing to hide so this doesn't affect you
- <grin>.
-
- S.B. 266 essentially mandates a government backdoor into any encryption
- scheme marketed for public use. Secrecy becomes the exclusive domain of the
- government and its partners, such as corporations doing work of vital
- military or economic importance. The rest of us have to endure possible
- casual surveillance or be proscribed for daring to keep secrets from Uncle
- Sam.
-
- Not just no, but No, Goddammit! Privacy is scarce enough as it is.
- Every day my file gets passed around the federal and corporate nets like a
- cheerleader at a frat party. Cheap, widespread encryption is one of the few
- physical methods available for enforcing privacy, just as in the private
- ownership of guns kept the government honest in the past. Encryption is a
- window blind pulled down in the face of the hotel dick.
-
- "A well-regulated militia necessary to the security of a free State,
- the right of the people to keep and bear arms, shall not be infringed."
-
- Historically, citizen ownership of guns has been useful for repelling
- invaders, enforcing Manifest Destiny, and keeping central government from
- getting too many ideas about control. There have been some problems in the
- past. The Whiskey Rebellion, Shays' Rebellion, and Quantrill's Raiders spring
- to mind, but no one has seriously considered disposing of the Second
- Amendment. The last real invasion was in 1815 and we've killed off most of
- the Indians, so what does that leave?
-
- Guns in the house are no match for a government determined to do you
- ill (though they may slow down a death squad). That's probably why
- Republicans can lust for control over everyone else yet fight gun control.
- Even the Tuff-On-Crime bill making it's way through the pipeline has no real
- provision for gun control (it may, however, okay warrantless searches made
- in "good faith" and further weaken habeas corpus). Republicans know as well
- as anyone else that guns are small potatoes when someone else has all the
- money and information.
-
- Rights, even those guaranteed by the Constitution, are really
- guaranteed only to the extent that they are hard for a government to
- violate. Early Americans were either well-armed or westward bo
- und, qualities needed in citizens opening a new frontier. However, the 1900
- census found America with no more frontiers; there was no more West to go to.
- The previous census, in 1890, was the first automated census, using punched
- Hollerith cards to perform a ten-year job in six weeks. For the first time,
- the government could use machines to track its citizens' movements. Control
- began where the frontier ended. Modern American history has been a running
- battle between individual rights and government control.
-
- Cheap, widely available data encryption is one of two new developments
- that are tipping the scales in the citizen's favor. Explosive growth of
- computer network use (the number of Internet users grew by 90% last year) is
- the other, enabling small groups to get the political jump on big ones by
- getting vital information over the wire quickly to just about anyone who
- needs it. Data encryption enforces privacy by keeping your e-mail from
- prying eyes. It represents the first physical
- means of keeping the Fed's nose out of your private business.
-
- It's too bad encryption is not widely used outside of businesses.
- Because so few people use encryption, agencies such as the NSA have an easy
- job of spying on American citizens. I'm not giving away any secrets, but
- here is how I would do it. Though it's theoretically possible to parse
- every phone conversation and data transmission, doing so is a waste of
- resources. Profiling and other tools tell an agency which 10% of the
-
- population is the real threat (90% of the threat comes from 10% of the
- population). Encryption used by other than corporations and government
- agencies is considered suspect and bears cracking by agency supercomputers.
- Fortunately for the NSA, unofficial secure traffic is not very large.
- However, this could change if, say , companies marketed secure
- communications as an alternative to the postal system (Feds can't open your
- e-mail, but you can't fax drugs eitherDlife is full of tradeoffs), or
-
- Americans started using encryption as a matter of course just because it's
- s imply none of the government's damned business what a private citizen
- does if he or she is not the subject of an actual criminal investigation
- (instead of a fishing expedition). Either or both of these developments
- would severely tax the government's ability to casually spy on its own
- people. It might even force the Feds to wonder if it's really worth it.
- Maybe.
-
- A problem with encryption is that there are very few good schemes out
- there. The DES algorithm is best known, but it was created by the NSA. No
- comment. The RSA (Rivest-Shamir-Adelman) algorithm is superior to DES, but
- MIT owns it and licenses cost money (DES is free). There is supposed to be
- a freeware package based on or comparable to RSA, but it could also be NSA
- suckerware. It's easy to get paranoid about this. A bigger problem with
- encryption is that most Americans don't value privacy enough to make the
- extra effort to secure their communications.
-
- The government may or may not be systematically running small networks
- and bbs's out of business by busting them right and left. That's open to
- debate. The No Such Agency is almost certainly tapping their lines,
- though. In the short term, it would be stupid not to. That is its job. In
- the long run, though, this speeds the collapse of the Republic by dangerously
- concentrating power.
-
- Power tends to accumulate. The more power one group has, the more it
- can get. Eventually, one group gets too much of it and spends most of its
- time securing it at the expense of others, whether it needs to or not
- (eventually it needs to). The firs t impulse of one of the other groups is
- to usurp the power from the first group, all with the highest of motives, of
- course. This leads to exactly the same problems. The only way to prevent an
- endless succession of power grabs is to disperse power as widely as
- possible, among people interested in limiting it for everyone. This is where
- checks and balances come in. "All power to the people (soviets)" is a
- disastrous substitute, as (thankfully) other people learned in 1798 and
- 1917. All of this is explained at length and more clearly in On Power: Its
- Nature and the History of its Growth, by Bertrand de Jouvenel (Viking Press,
- New York, 1949). The book is long out of print, but it's well worth your
- while to check it out and photocopy it somewhere. Other good references
- include Democracy in America (1835) and The Old Regime and the
- French Revolution (1856), both written by Alexis de Tocqueville. You can find
- those at a used bookstore.
-
- Theory aside, it can be shown that a people completely dependent on
- their government for security lose their ability to come to that
- government's aid in times of external danger. At that time, the people
- further drain those resources by requiring protection from themselves. The
- less capable a people become, the more fearful they get, eventually voting
- in a police state. Hitler was elected.
-
- Computer users face similar dangers. Additionally, economics play a
- large role. A person with a computer is a nearly self-sufficient engine of
- wealth. Economic competition is constant. Denial of personal rights to
- privacy of information removes the individual's ability to protect an idea
- before bringing it to the market. Computer users are thus unable to create.
- All they can do is consume or, at best, labor for someone else.
- Entrepreneurs and small business owners, both key agents of pr
- ogress , are effectively locked out. A nation of employees economically
- dependent on bosses is an economic nonstarter. Freedom of computer use and
- the right to privacy are thus essential to the economic security of a free
- state.
-
- The kind of power bestowed by guns, personal computers and absolute
- data privacy implies a need for a personal sense of responsibility. Both
- viruses and encryption programs are far easier to make and distribute than
- plastic Glock-11 automatic pistols. Some sort of regulation is required.
- This is where the "well-regulated militia" part of the Second Amendment
- comes in and this is the most difficult part of the issue.
-
- My definition of a "well-regulated militia" falls somewhere between
- the NRA and the National Guard. If there were an NRA for computer network
- users I'd probably be in it. I think the stakes are higher with computers
- than they are with guns. I want to see more people with computers and
- modems, to ensure the widest possible dispersal of computing power. For
- this to work, all users should be made aware of the power and
- responsibility of owning a computer ("Only a madman would give a loaded
- revolver to an idiot"DFredric Brown). If there are kids in the house, they
- must be taught to respect guns and computers as early as possible. In a
- well-defended, well-connected house, one can live without fear. Only then
- can a citizen look past the distracting horrorshows put on by the
- politicians and pundits to hide the real issues. Who will see to it that
- responsibilities accompany rights? Part of the answer, believe it or not
- comes from the government. Laws already exist to cover most serious crimes
- committed with a computer.
-
- Where the law is insufficient, professional/lobbying groups such as the
- Electronic Frontier Foundation, the Computer Professionals for Social
- Responsibility, and the Association for Computing Machinery are helping to
- draw up new laws to deal with new kinds of crimes. It's early in the game,
- but the above organizations seem to be working for fairness.
-
- For the control addicts in government, this may not be enough. Tough.
- Computer user organizations are working hard to approach government the way
- we all were taught to do it in high school civics, and they seem to be
- making it work. Can the EFF, CPSR, or the ACM control hackers? Of course
- not. That's what the law is for (demographics suggest that the rapid growth
- of network use will not be accompanied by an equally rapid rise in hacking
- incidents. The hacking scene is maturing with the rest of the population.
- Most hacker heroes are born-again capitalists who might make even better
- role models as long as they don't forget where they came from).
-
- Computer user groups educate while seeking to disperse power, which the
- NRA also does to some extent. The EFF especially tries to reach out to
- potential allies by demystifying computer technology for nonusers and even
- the cops. Let's face itDthe nervous man with the gun is not going to go
- away, so we might as well try to calm him down a little.
-
- Finally, computer network users have their talents to use as
- negotiating chips. A government that refuses to respect their rights will
- lose their economic cooperation. The network-based economy makes an Atlas
- Shrugged-style withdrawal very feasible. The government will have its
- illusion of control while computer users work ordinary jobs while
- moonlighting in the Netherlands and piling up ones and zeroes (Swiss francs)
- in Brunei, all in the comfort of one's suburban home. The result will be an
- Italian-style economyDlackluster on the surface and lively underground.
- Germany lost the A-bomb by chasing out a half-dozen geniuses in the
- Thirties. If America wants to be a player in the global economic contest, it
- needs to treat its citizens with respect.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- HOW TO SURVIVE THE FIRST YEAR OF LAW SCHOOL
- AT THE UNIVERSITY OF TEXAS
-
- by Mike Godwin (mnemonic@eff.org)
-
- (Copyright 1988,1992. This article may be freely distributed on any
- computer forum, including commercial online services. To reproduce it
- in print or in any other non-computer medium, please seek permission
- from the author.)
-
- You went to a decent college, you scored well on your Law School
- Admission Test, and you ranked in the top 10 percent of your class. So,
- now that you're here at The University of Texas School of Law, you can
- look forward to an unbroken string of acadernic successes, right?
-
- Not so fast. No matter how easy you found undergraduate school to be,
- law school is a different story. And the sooner you learn that, the
- better your chances of coming out of the law-school game a winner.
-
- First, disabuse yourself of any notions about your natural academic
- superiority. Sure, you're good, but so is everyone else in your class.
- And since everyone is graded against everyone else on a curve, the
- chances are nine out of 10 that you'll be in the bottom 90 percent of
- your class, regardless of your undergraduate performance.
-
- This means that law-school success doesn't come merely from knowing the
- law; you have to know it better than most of your peers. So you can't
- be complacent.
-
- If you start heeding the following hints early in your first semester,
- they'll improve your chances of hot job offers...and maybe even an
- editorship on the law review.
-
- Class Participation
-
- If you saw the movie "The Paper Chase" (and odds are that you did, or
- you wouldn't be here), you probably know that large classes in law
- school normally are run by "the Socratic method." Rather than
- lecturing, the professor will assign some reading for the day and
- conduct the class by asking students questions about the material.
-
- Watching the movie, you probably got the impression that the best
- law students are those who are eager and able to answer the
- professor's questions. Don't be fooled. Glibness and self-possession
- in class are only roughly correlated to exam performance, and your
- grades are based almost entirely on final exams, not on your
- quickness in the classroom. Because the finals are graded
- anonymously, the professor won't even be able to link your
- classroom participation with the exam.
-
- It's far wiser to spend your time mastering the principles behind
- each case you read rather than memorizing its facts. If you try the
- latter tactic, your brain will be too muddled with facts at exam time
- to allow you to apply the law. Don't worry about the inevitable
- instances in which a professor tries to embarass you for knowing
- less than he does. (I refer to the professor as "he" because almost all
- UT law professors are male. Most are white, too). You can get your
- revenge by earning an honors grade in the course.
-
- Class Preparation
-
- Keep up with the assigned reading. Onerous though the reading may
- be, it's easier to keep up than to catch up. And reading the cases for
- the day will enable you to answer most of the questions any
- professor tries to throw at you.
-
- If for some reason you do get behind on the reading, however, don't
- panic. This happens to some of the best law students. Attend class
- anyway, even if you haven't read that day's class materials. The
- professor's Socratic questions will clue you in to the issues he expects
- you to know for the exam.
-
- Professors
-
- Some law professors are frightening; others are charming.
- Ultimately, however, their personalities don't matter very much.
- Whether he likes you or not, each professor will grade your exam
- according to the curve. There's no such thing as an "easy" law course,
- although you may find some lectures more tolerable than oothers. If
- the material is easy for you, it may well be easy for everybody, so the
- curve can get you anyway.
-
- While some law professors make a pretense of keeping office hours,
- most of them don't really want to see you outside the classroom, a
- milieu they prefer because that's where they have all the control.
- Any question you want to ask a professor probably can be answered
- by a "hornbook" (legal treatise) anyway, and library is full of
- hornbooks.
-
- Don't expect too much sympathy from your professors. After all, law
- school is a game they've *won.* They may have some sort of abstract
- pity for the poor contracts student who's agonizing over Sec. 2-207 of
- the Uniform Commercial Code, but under no cirumstances will you be able to
- persuade them to change your grade.
-
- Briefing your cases
-
- The rule here is "Condense, condense, condense." Nothing's more
- pathetic than the law nerd whose brief is longer than the case
- excerpt in the casebook. Remember this rule: Each case has one or
- two main ideas. Find them, and you'll have what you need to know
- for the exam.
-
- And good, *brief* briefs can be easily incorporated in your study
- outline.
-
- Some professors like to ask tricky questions about the fact pattern of
- a case during the lecture, but don't write these details down.
-
- Instead, make notes in the margin or highlight key facts of your
- casebook. If you've read the case, you should be able to remember
- the facts long enough to get through the class period. And if the
- professor stresses a particular type of fact pattern in the lecture,
- he's signalling to you a possible exam issue. Note the issue, not the
- facts of the particular case.
-
- Buying study aids
-
- Basically, there are two types of study aids you can buy for first-
- year courses: commercial outlines and hornbooks. A commercial
- outline is a prepackaged, detailed skeleton of the material you
- need to know for a particular course. There are several brands of
- outlines, and each has something to recommend it. The Legalines
- outlines track particular casebooks, while the Emanuel Law Outlines
- and Gilbert Law Summaries are more general, although they will
- include many of the cases in your casebook.
-
- You may find it best to buy Legalines outlines for each of your
- courses except contracts. (The UT professors who wrote the contracts
- casebook designed it in a way that makes it difficult to produce a
- commercial outline for it.) Then you can supplement the Legalines
- with general-purpose outlines like Emanuel's and Gilbert's for
- courses you're having trouble with. Be aware that occasionally the case
- summaries and discussions in the commercial outlines are *mistaken*--
- let your professor and your classmates supplement your take on a given
- case or issue.
-
- Some students buy "hornbooks" for particular
- subjects, but for a first-year student the treatises often go into too
- much unnecessary detail. Theyre also very expensive, and in general
- it's best not to buy them; but you may want to make an exception for
- contracts, which many students find a particularly subtle and
- difficult branch of law. The Calamari and Perillo hornbook is good for
- general contract law, while the White and Summers hornbook is
- necessary for a thorough understanding of the parts of your
- contracts course that deal with the Uniform Commercial Code. You
- may also want to consult UT Professor Charles Alan Wright's treatise
- on the law of federal courts for your civil-procedure class.
- Finally, if you signed up early for a bar-review course (believe it
- or not, some people do this during their first year), some bar-review
- courses will allow you to "check out" their reviews of black-letter
- law.
-
- Study Groups
-
- Try to get into one. When you find a likely group, make sure that
- most of the people in the group are dedicated enough to stick with it.
- Discussing difficult ideas with other law students is a good way of
- making sure you understand them. In general, study groups work
- best with about five people, with each person concentrating on one of
- the five first-year courses you'll be taking each semester. If you
- have a choice about which course to concentrate on, choose the
- course you think you'll find most difficult; your responsibility to
- your friends in the study group will give you an added incentive to
- master that material.
-
- Computers
-
- Buy a computer--you can purchase them at near-wholesale cost at
- the Texas Union MicroCenter on 21st Street. Only if you own a
- computer will you be able to produce and edit a legible course outline
- in a hurry. You'll need two types of software: a good word
- processing program to help you with the briefs and memos you have
- to produce for your legal research and writing seminar, and an
- outline program to produce the course outlines you'll need for exams.
- (Some word processors include outlining capability--in general, those
- word processors are not as good at outlining as programs designed for just
- that purpose.)
-
- If you buy a Macintosh, the outlining software of choice is MORE; if you
- own an IBM PC, buy Thinktank or Grandview.. Both products are available
- at local computer stores.
-
- Exam-taking strategy
-
- Your heart's beating rapidly, your palms are sweaty, and your mind is a
- blank. Yes, you're taking your first law-school exam. How on earth do
- you handle those exam questions?
-
- The first thing to remember is that all law-exam questions are more or
- less alike. Each describes an invented and often quite complex situation
- that, had it occurred in real life, would probably generate one or more
- lawsuits. Following the fact situation is usually a question or
- instruction such as "Describe the potential legal claims and liabilities
- of each party."
-
- Your best strategy, when you outline your answer, is to pretend you're
- the lawyer for each party in turn. Pretending to be Smith's lawyer,
- quickly list all the legal principles from your course outline that
- could advance Smith's case against Jones. Now play the part of Jones'
- lawyer how would you answer each of these legal arguments or claims? What
- counterclaims could you use against Smith? What will Smith say in
- response to your responses? What other parties in the fact situation
- could sue or be sued? And so on.
-
- Inevitably, you'll see some obvious legal issues in the fact pattern.
- You have to deal with them, of course, but don't make the fatal mistake
- of assuming that by handling the obvious or major issues you've written
- a good exam answer. After all, your peers probably share your gift for
- seeing the obvious.
-
- So, how do you make sure you catch the subtle issues as well as the
- straightforward ones? When you're preparing for the exam, condense your
- outline into a checklist of one- or two-word shorthand expressions for
- legal principles. Memorize the checklist, and recite it in your head
- each time you pretend to be the attorney for one of the parties. (Better
- yet--write it down on your scratch paper at the beginning of your exam
- as soon as you're allowed to start writing, before you even read the
- first question. The checklist will remind you of issues you'd otherwise
- overlook.
-
- Practice Exams
-
- Besides creating a legal-issues outline, the best way to prepare for
- exams is to take practice exams. Almost all professors keep their old
- exams on file in the lbirary. After you've done the bulk of your study
- outlines, photocopy your professors' exams from the last couple of
- years. Then sit down with a friend and practice outlining exams answers
- based on the old questions. Don't bother writing a full exam answer!
- Time yourself, and give yourself about as much time to outline each
- answer as you would during a real exam. YOu should budget about a third
- of the time you're given to answer an essay question for outlining your
- answer (e.g., 20 minutes for a 60-minute question).
-
- After each question, compare your outlined answer with your friend's.
- He or she will have seen some points you missed, and vice versa. This
- pinpoints issues you may tend to overlook during the real exam.
-
- Other matters
-
- Four of your first-year law courses -- contracts, torts, civil procedure,
- and property -- will last your entire first year. You'll also take two
- semester-long courses: criminal law in the fall and constitutional law
- in the spring.
-
- Thus, if you have to concentrate on any particular exam during winter
- midterms, concentrate on criminal law; that's the only exam you'll take
- in your first semester that counts as a grade for an entire course.
- Conversely, the exam for the three-hour constitutional-law course in the
- spring will count less toward your average than the exams for your
- year-long courses, which are each worth five or six hours' credit.
-
- Don't get too competitive. It's the friends you make during your first
- few months as a law student who'll help you get through the year. Don't
- be deluded into thinking that other students are the enemy; they're not.
- It's the system you've got to beat, and you can do it with the right
- attitude. A vicious competitive streak, however, tends to undermine
- your karma in the long run.
-
- Finally, try to enjoy yourself. The law really can be fun to learn if
- you let yourself relax. Most people who make it through the first year
- look back at it as a time of rapid intellectual growth and the building
- of mental discipline. Don't regard law school as just the
- stepping-stone to a career. A law-school education has value in itself
- -- it will teach you a lot about what makes our society tick.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- NOTES FROM CYBERSPACE
- 2nd Edition
-
- Notes From Cyberspace will be a feature of every issue of this publication.
- They are little tidbits, notes, comments, etc... from people like you.
- If you have any comments, we certainly encourage you to send them in.
- (comments@fennec.com)
-
- ============================================================================
-
- NOTES FROM CYBERSPACE - ARTICLE 1
- By Rodney Perkins
- Subject: THEY ARE OUT TO GET YOU! A piece of POST-LOGIC.
-
- Is that tuna fish I smell? No, its the CONSPIRACY. As avid readers of this
- magazine probably already know, the conspiracy has tried to use its poison
- tentacles to steal eggs from our snake pit. For now, our eggs are safe. One
- day, however, they might try it again. We will be there, knife in hand,
- ready to chop off their offending appendages. Yes, they will probably try
- to squirt their government ink in our eyes but we will continue to fight
- with the weapons given to us by (insert savior here). We must take a stand
- against the pervasive eye of the conspiracy's octopi (yes, it rhymes). You
- must ask yourself "What can I do to help stop this reign of tyranny from
- the unseens and the who-whats-its?" You must continue to fight against the
- shickelgrubers, the boot boys and the LOGIC-WEAVERS! You must never fall
- for LOGIC, you must always use POST-LOGIC (real men always think in POST-
- LOGIC). Confusion and ambiguity are the weapons in this war. Turn their
- MEDIASPEAK, GOOBLEDYGOOK and BAFFLEGAB against them! Weave great webs of
- Orwellian nightmare language! Master the art of circular logic! When they
- ask you what you believe, tell them "I believe what you believe. Just don't
- practice it". Are you confused yet? Good! You get "it"!
-
- ===========================
-
- NOTES FROM CYBERSPACE - ARTICLE 2
- By John Logan (ice9@bga.com)
- Subject: ON THE SUBJECT OF GOVERNMENT...
-
- Welcome to a new age! Yes this is a world where technology has hit an all
- time high. It seems there is no other way to go but up. Funny, that
- includes taxes, cost of living, and trouble in government. Yes, this is the
- day and age that we are subjected to, by our wonderful president Mr. William
- Jefferson Clinton, successor to the New World Order... Most Americans are
- probably still wondering "Just what is this 'New World Order?'" Well, lets
- talk about that:
-
- The New World Order is a product of the Trilateral Committee, made up of the
- World's key leaders. In this form of government, the entire world will be
- broken up into 3 'Nation States': Europe, The Asias, and The Americas.
- The worlds decisions will be made by the 'elected' presidents of each nation
- state. The entire world will be on a common market with a universal currency.
- I'm sure we have all heard of - the 'credit.' Yes for years we have been
- getting oriented to this system, whether in movies, or by our banking system.
- Well, in the near future, there will be very few private banks, we will
- store our credits (for a small fee) in the World Bank. We will be forced to
- carry around credit chips that, when inserted into a machine, will access
- our account number, list what is to be purchased, and the price. Forget
- about tax evasion!! It will all be AUTOMATICALLY DEDUCTED from out accounts.
- Yes, the new government will be a cross between Capitalism and Communism.
- They will know our every move. Business owners will still be allowed to keep
- their businesses but they will have to pay exorbitant taxes. State security
- will be at an all time high. There will be no middle class. Citizens will
- be either very rich or very poor. The machine has already started. Our
- wonderful government does not want a car on the road that is over 10 years
- old. A bill has already been passed limiting parts for the cars that fit in
- this 'danger zone.' It is now impossible to get manufacturer parts for
- these cars. If you have a problem, you must use after-market parts and hope
- that it fits specifications. Todays cars are built to last 10 years or less.
- Its a sad thing that more people do not understand what is coming down the
- proverbial 'road.' The governing machine is going to run right over the
- common people like a steam roller. People won't even know what happened.
- Take a look around! The New World Order is not nearly as wonderful as our
- government would like us to think. Don't worry, it won't be long and we won't
- have to worry about what they want us to think. They will soon control that
- too! WE HAVE BEEN WARNED. NOW ITS TIME TO DO SOMETHING ABOUT IT!
-
- =============================
-
- NOTES FROM CYBERSPACE - ARTICLE 3
- By Dan Wilson
- Subject: Fight the Power!
-
- As I sit here writing this, I can't help wondering what the hell is going on.
- Why is it that every time a group a people find some new freedom or form of
- expression, the government steps in to suffocate it? Just look at the
- National Endowment for the Arts controversy or the PMRC. Why must a small
- group of paranoid people try to force their fears down all of our throats?
- I must admit that when these things first began happening, I just sat by
- thinking to myself that it was a crock of sh*t without doing anything about
- it. It didn't strike close enough to home for me to get involved. Recently,
- however, there's been a series of events that have struck close to home and
- have forced me to take action. The events to which I'm referring are none
- other than the government's recent attempts at bringing the computer world
- to justice (as they define it, of course).
-
- It's really disturbing to hear about the methods the feds used to crack down
- on "dangerous" users. Unsigned search warrants have been used to gain entry
- to homes where all sorts of equipment, computer related or not, was
- confiscated while no charges were specified. There have also been cases of
- holding guns to children's heads while a raid was going on. What kind of
- gestapo tactics are these? Have these guys never heard of the Bill of
- Rights? This isn't the America I was told about as a kid; it sounds a
- helluva lot more like those "evil" communist countries that I was taught to
- hate. The only logical conclusion that can be drawn here is that the
- government is very afraid. Why else would they dedicate so much effort to
- something they know so little about? These guys don't have a clue as to
- what's going on out here in cyberspace. That's the source of the problem.
- Here we sit with these marvelous machines in front of us. Touch a few keys
- and any information that we want to exchange can be sent anywhere in minutes.
- This must seem like a pretty major threat to a government that so often
- relies on misinformation and cover-ups in order to scam the public into
- believing what it wants them to believe. We can't be controlled like the
- media bozos who drone bullsh*t through the idiot box at us. We can't be
- censored like the newspaper or the radio. In fact, this is probably the
- truest form of information exchange we have available today. That alone is
- worth fighting for.
-
- It could also be that they are afraid of a society where people are judged
- solely on their thoughts and ideas. We have no style whores here. Race,
- creed, color and religion are insignificant and pointless in cyberspace;
- they serve no purpose. There can be no discrimination, there can only be
- disagreement with someone's opinions. To me, this is pretty close to a
- perfect society. It is refreshing to judged on what I think and how I
- express myself rather than by the color of my skin or the origin of my
- birth. In a society like this, the government cannot play people off
- against one another. They have no ground on which to stand. Perhaps it's
- this lack of footing that makes them nervous. Whatever it is, it's got them
- thinking that they need to put a stop to it and "bring it under control".
- We are a far too dangerous force for them to just ignore. This fact should
- be remembered and taken advantage of, information is the key! Less than an
- hour ago, I posted issue number six of this magazine on Internet along with
- messages urging others to read it. In a matter of minutes it was all over
- the world. Maybe this will draw others into the fold, maybe not.
- Regardless, it'll force them to think and maybe to take action themselves.
-
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- NOTES FROM CYBERSPACE - ARTICLE 4
- By Anonymous Attorney
- Subject: POCKET LAW...Quick Reference Card
-
- Hey, copy this down and keep it in your wallet for those situations where
- you might be suppressed by the power-hungry infidels of humanity.
-
- My lawyer has instructed me not to talk to anyone about my case or anything
- else, and not to answer any questions or reply to accusations. On advice of
- counsel and on the ground of my rights under the State and Federal
- Constitutions, I shall talk to no one in the absence of counsel. I shall
- not give any consents or make any waivers of my legal rights. Any request
- for information or for consent to conduct searches, papers, property,
- or effects should be addressed to my lawyer. I request that my lawyer
- be notified and allowed to be present if any identification, confrontations,
- tests, examinations, or investigations of any sort are conducted in my case,
- and I do not consent to any such identification, confrontations, tests,
- examinations, or investigations.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- EDITORIAL OF THE MONTH
-
- By Marco Landin
-
- [This article is fiction/humor]
- (Excerpt from INdigest, Feb 1994, Interview with
- the Elusive and Unintelligible Mfactor)
-
- INd: In your most recent book, "I Don't Want My Children To Grow Up
- Around Those Filthy UNIX", you seemed to display a sense of farce that isn't
- too commonly seen amongst the Great Internet Poets of the Apocalypse. Tell
- us, why do you see the 21st century as the Golden Age of Lunacy?
-
- Mf: [wearing pajamas and Mickey Mouse ears] Well, it's like this. In
- the early 80's we perfected the concept of an international communications
- database. It was populated solely by research personnel. MIT grads,
- military, Elvis. Purely serious study going on. Then, in the late 80's and
- mid-90's, there was a practical applications boom, where savvy businessfolk
- rolled up their sleeves and sank their elbows into the datastream. Now, as
- we near the End Times, we find that the greatest structure ever created by
- man -the Internet- is being vacated by its corporate and research personnel
- and a whole buttload of social misfits and weirdos are moving in by the
- droves. Look at me for instance. No, you better not. Wanna jawbreaker?
-
- INd: No, thank you. Are you saying that the new computer literacy is
- making this once rich and fertile forest of intellect and commerce into a
- vast mental wasteland where the only thing that stirs is an occasional,
- barbed, tumbleweed of a pun based on bathroom jokes?
-
- Mf: Well, yes, and I'm thankful for it! I mean, have you SEEN what
- happens to the human body when the brain is used too much? Glasses,
- unsocial behavior, a goofy voice, and insatiable masturbatory compulsions
- become the trademark of the computer genius. Why if I had to choose between
- looks and brains, I'd sure as hell pick looks, cause looks can get you
- brains, and the corollary is not as true. I feel very lucky to have both.
-
- INd: In the book, you mention a few extreme cases of individuals who have
- no business on UNIX and who yet not only live in it, they can't do without
- it.
-
- Mf: Indeed, there seem to be many odd cases. Take for example Cherry,
- the erotic dancer from Norway who has an Internet Address. She works out 36
- hours a day, dances every night, goes out with friends, HAS FRIENDS!!! And
- yet she still finds time to moderate a newsgroup, cherry.pop.tart, I mean,
- how does she do that? Then there's the Internet node for the Eskimo Len
- Terrorist With Teret's Syndrome Association. What does THAT have to do with
- worldwide communications? Then of course, there's the newsgroup
- alt.binaries.pictures.bestiality. Need more be said??? The freaks are
- moving in as the contractors and architects move out. Isn't it beautiful?
-
- INd: What's your plan in life, Mr. Mfactor?
-
- Mf: In this day and age, making plans is dangerous. That's why I have
- several.
-
- INd: Please, share with us your most visionary.
-
- Mf: Moving to Norway and finding Cherry. Soon. Like NOW.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- WHITE HOUSE ELECTRONIC PUBLICATIONS AND PUBLIC ACCESS EMAIL
- FREQUENTLY ASKED QUESTIONS
-
- By Stanton McCandlish (mech@eff.org)
-
- Updated April 2, 1994
- Table Of Contents
-
- I. Searching and Retrieving White House documents.
- - Publications@WhiteHouse.GOV
- - WAIS
- - GOPHER
- - FedWorld BBS
-
- II. Signing up for Daily Electronic Publications.
- A. Widely Available Sources.
- B. Notes on Widely Available Sources.
- C. Direct Email Distribution.
- D. Email Summary Service.
-
- III. Sending Email to the White House.
- - Internet Direct
-
- IV. Sending Email to Congress
- - Internet Direct
-
- V. Submitting Updates to the FAQs.
-
-
- I. HOW DO I SEARCH AND RETRIEVE WHITE HOUSE ELECTRONIC PUBLICATIONS?
-
- The White House is pleased to announce the establishment of an Internet
- address for retrieving White House publications. We have set up an
- Almanac server to process requests by email. To receive instructions on
- using this server, send a message to:
-
- Publications@WhiteHouse.GOV
-
- In the body of the message, type:
-
- send info
-
- Various additional sites are archiving the press releases as distributed.
- What follows is an incomplete list of some of the sites containing the
- documents that have been released to date. This FAQ will be updated to
- reflect new sites as they become known.
-
- SITE DIRECTORY
-
- 1. SUNSITE.UNC.EDU pub/academic/political-science/whitehouse-papers
- 2. FTP.CCO.CALTECH.EDU /PUB/BJMCCALL
- 3. FTP MARISTB.MARIST.EDU
- 4. CPSR.ORG /CPSR/CLINTON
- 5. FedWorld Online System 703-321-8020 8-N-1 or:
- Telnet fedworld.doc.gov
- 6. GOPHER.TAMU.EDU 11/.dir/president.dir
-
-
- Notes: The following are notes on how to log in and get
- information from the above sites.
-
- 1. Office for Information Technology at the University of
- North Carolina maintains the full collection of White
- House electronic releases available for search with WAIS and
- also accessible via Gopher and FTP.
- 1.a WAIS
- (:source
- :version 3
- :database-name "/home3/wais/White-House-Papers" :ip-
- address "152.2.22.81"
- :ip-name "sunsite.unc.edu"
- :tcp-port 210
- :cost 0.00
- :cost-unit :free
- :maintainer "pjones@sunsite.unc.edu"
-
- :description "Server created with WAIS release 8 b5 on
- Feb 27 15:16:16 1993 by pjones@sunsite.unc.edu These are the
- White House Press Briefings and other postings dealing with
- William Jefferson Clinton and Albert Gore as well as members
- of the President's Cabinet and the first lady Hillary Rodham
- Clinton, Chelsea, Socks and others in Washington DC. Dee Dee
- Meyers and George Stephanopoulos. Other good words:
- United States of America, Bill Al Tipper Democrats USA
- US These files are also available via anonymous ftp
- from sunsite.unc.edu The files of type filename used in
- the index were:
- /home3/ftp/pub/academic/political-science/whitehouse-
- papers/1993 ")
-
- Folks without WAIS clients or gophers that act as WAIS
- clients may telnet to sunsite.unc.edu and login as swais
- to access this information via WAIS.
-
- 1.b GOPHER is a distributed menu system for information access on the
- Internet developed at the University of Minnesota. gophers are
- client-server implementations and various gopher clients are
- available for nearly any computing platform. You may now use
- gopher clients to access the White House Papers and other
- political information on SunSITE.unc.edu's new gopher server.
- You may also add links from your local gopher server to
- SunSITE for access to the White House Papers.
-
- For gopher server keepers and adventurous clients to access
- SunSITE you need only know that we use the standard gopher
- port 70 and that our internet address is SunSITE.unc.edu
- (152.2.22.81). Point there and you'll see the references to
- the Politics areas.
-
- For folks without gopher clients can telnet to sunsite.unc.edu
- to try out gopher access. You need to have access to internet
- telnet and:
-
- telnet sunsite.unc.edu
- login: gopher
- The rest is very straight forward. Browsing options end with a
- directory mark (/), searching options end with an question mark
- (?).
- There's plenty of on-line help available.
-
- 2. No special instructions.
-
- 3. The CLINTON@MARIST log files which contain all the official
- administration releases distributed through the MIT servers
- are available via anonymous FTP. These logs contain in
- addition to the official releases, the posts that comprise the
- ongoing discussion conducted by the list subscribers.
- To obtain the logs:
- FTP MARISTB.MARIST.EDU - the logs are in the CLINTON directory
- and are named CLINTON LOG9208 thru CLINTON LOGyymm where yymm
- stands for the current year and month. Problems should be
- directed to my attention: URLS@MARISTC.BITNET or
- URLS@VM.MARIST.EDU.
- Posted by Lee Sakkas - owner, CLINTON@MARIST
-
- 4. Computer Professionals for Social Responsibility is
- providing all Clinton documents on technology and privacy
- at the CPSR Internet Library, available via
- FTP/WAIS/Gopher at cpsr.org /cpsr/clinton (and in other
- folders as relevant). For email access, send a message
- with the word "help" at the 1st line of text to
- listserv@cpsr.org.
-
- 5. The FedWorld Computer System, operated by the National Technical
- Information Service, archives White House papers in a
- traditional BBS type file library. Connect to FedWorld by
- calling (703) 321-8020. No parity, eight data bits and one stop
- bit (N-8-1). FedWorld accommodates baud speeds of up to 9,600.
- It is also possible to Telnet to FedWorld at FedWorld.doc.gov.
- White House papers are located in the W-House library of files.
- To access this library from the main FedWorld menu,
- enter <f s w-house>. Files are named with the first four digits
- being the release month and day (e.g. 0323XXX.txt). Some
- standard abbreviations after the date include:
-
- rem - Remarks by the President
- pc - Press Conference transcript
- pr - Press Release
- AM - AM Press Briefing
- PM - PM Press Briefing
- sch - The President's public schedule
- spch- Text of major speeches.
-
- These files are saved in ASCII format. Files can be viewed
- online by requesting to download a file and then selecting
- (L)ist as the download protocol. This will display the file a
- screen at a time. White House papers are kept in the above
- format for up to two months. Papers more than two months old
- are compressed using Pkzip into a single file that contains all
- of the files for that month (e.g. 0193.zip contains all papers
- released during January 1993). In addition to White Documents,
- FedWorld also provides a gateway to more than 100 government
- funded BBSs and computer systems.
-
- 6. Texas A&M University GOPHER Server makes available White House
- press releases and other documents. This archive includes
- information from 1992 until the present time and is updated
- as new documents are released. Gopher users can reach the
- Texas A&M server by choosing it from their local server's list
- of other gophers, or by pointing their gopher clients to
- GOPHER.TAMU.EDU.
-
- After connecting to the A&M server, take the following path to
- reach the White House menus:
-
- "Browse Information by Subject" -->
- "Political Science" -->
- "Information from the White House"
-
- Gopher maintainers and other intrepid souls are welcome to point
- directly to the A&M White House archive. The server is
- GOPHER.TAMU.EDU and the path is 11/.dir/president.dir.
-
-
- II. HOW DO I SIGN UP FOR ELECTRONIC PUBLICATIONS BY THE WHITE HOUSE?
-
- The White House Communications office is distributing press releases
- over an experimental system developed during the campaign at the MIT
- Artificial Intelligence Laboratory.
-
- You can obtain copies of all the press releases from a wide variety of
- on-line services or discussion groups devoted to either national
- politics in general or President Clinton in particular. These are
- listed in sections I and II.
-
- Section IIc explains how you can sign up to receive press releases
- directly from the experimental MIT system by using an automated email
- server. The present system was not designed to handle high levels of
- message traffic. A more powerful system will become available in due
- course, and in the meantime, it would be appreciated if you used this
- service sparingly. One appropriate current use is secondary
- redistribution and archiving. If you use it, you will be carried forward
- when the more powerful system that replaces it.
-
-
- IIa. WIDELY AVAILABLE SOURCES
-
- 1. On USENET/NETNEWS, electronic publications are found on a variety
- of groups:
-
- Direct Distribution
-
- alt.politics.clinton
- alt.politics.org.misc
- alt.politics.reform
- alt.politics.usa.misc
- alt.news-media
- alt.activism
- talk.politics.misc
-
- Indirect Distribution
-
- misc.activism.progressive
- cmu.soc.politics
- assocs.clinton-gore-92
-
- 2. On CompuServe: GO WHITEHOUSE
- 3. On America Online: keyword WHITEHOUSE or THE WHITEHOUSE or CLINTON
- 4. On The WELL: type whitehouse
- 5. On MCI: type VIEW WHITE HOUSE
- 6. On Fidonet: See Echomail WHITEHOUSE
- 7. On Peacenet or Econet: See pol.govinfo.usa.
- 8. On The Meta Network: Go Whitehouse
- 9. On GEnie: Type WHITEHOUSE or WHRT, or MOVE 1600
- 10. On CompuServe, see the Democratic Forum: Go Democrats
-
- IIb. NOTES ON WIDELY AVAILABLE SOURCES
-
- 2. CompuServe's White House Forum (GO WHITEHOUSE) is devoted to
- discussion of the Clinton administration's policies and
- activities. The forum's library consists of news releases and
- twice daily media briefings from the White House Office of Media
- Affairs. CompuServe members can exchange information and
- opinions with each other in the 17 sections in the forum's
- message area. The message board spans a broad range of topics,
- including international and United Nations activities, defense,
- health care, the economy and the deficit, housing and
- urban development, the environment, and education and national
- service.
-
- 3. On America Online, the posts are sent to the White House Forum,
- located in the News & Finance Department of the service or
- accessible via keywords: "white house" or "clinton". The White
- House Forum on America Online contains the press releases from
- the White House, divided into the categories "Appointments",
- "Budget", "Congress", "Education", "Economy", "Foreign Policy",
- "Health Care", "Housing", "Labor", "Law and Order", "Meetings &
- Speeches", "Proclamations", "Technology", and "Vice President".
- The area features a message board so you can discuss the
- releases with other AOL members, a searchable database for easy
- retrieval of releases that interest you, a Library for longer
- releases from the White House, and a library that members can
- upload files of interest for other members.
-
- 4. MCI Mail users access daily information on the administration's
- programs provided by the White House through MCI Mail bulletin
- boards. The available boards are: WHITE HOUSE ECONOMIC, WHITE
- HOUSE FOREIGN, WHITE HOUSE SOCIAL, WHITE HOUSE SPEECHES and
- WHITE HOUSE NEWS. A listing of these boards can also be
- obtained by simply typing VIEW WHITE HOUSE at the COMMAND
- prompt.
-
- 5. On The Meta Network, material is posted in the White house
- conference and is accessible via keywords (matching on document
- titles and subject categories) as well as full text search.
- Discussions on specific initiatives take place in special
- interest forums, e.g. health, technology, and reinventing
- government.
-
- 9. GEnie's White House RoundTable has been established to
- distribute and discuss the official press releases and files
- relating to the White House and the Clinton Administration. The
- files library holds all of the press releases on the official
- mailing list, and the Bulletin Board has Categories set up with
- topics relating to all aspects of the Administration and
- Executive Branch of government. Letters to the White House can
- be entered easily online with a menu option on the WHITEHOUSE
- page.
-
- 10. CompuServe's Democratic Forum (GO DEMOCRATS) is the Democratic
- Party's online information service covering the activities of
- the Clinton administration. The sysops of the Democratic Forum
- work for the Democratic National Committee, and are directly
- involved in managing the forum and responding to online
- questions. The Democratic Forum provides access to documents
- from the White House Office of Media Affairs, with vigorous
- discussion and debate in the message sections about the impact
- of the Clinton Administration's policies and proposals. The
- Democratic Forum also holds a regular weekly online conference
- with special guests on current topics.
-
-
- IIc. DIRECT EMAIL DISTRIBUTION
-
- If you don't have access to the these accounts or if you would prefer to
- receive the releases via email, then this section details how to
- sign up for this service. The server is not set up to answer email
- letters, comments or requests for specific information. To reach this
- MIT server, send email:
-
- To: Clinton-Info@Campaign92.Org
- Subject: Help
-
- The server works by reading the subject line of the incoming message and
- taking whatever action that line calls for. If you want to sign up to
- automatically receive press releases, then your subject line would begin
- with the word RECEIVE. You can then specify what kind of information
- you are interested in receiving. The categories of information are:
-
- ECONOMY
- Get releases related to the economy such as budget
- news, technology policy review, etc.
-
- FOREIGN
- Get releases related to foreign policy such as
- statements on Bosnian airdrop, Haitian refugee status,
- etc.
-
- HEALTH Get releases related to health care policy, without
- receiving any other social issues. Use this instead
- of social.
-
- SOCIAL
- Get releases related to social issues like National
- Service (Student Loan) program, abortion, welfare
- reform, etc.
-
- SPEECHES
- All speeches made by the President and important
- speeches made by other Administration officials.
-
- NEWS
- Transcripts of press conferences released by the White
- House Communications office, as well as the
- President's remarks in photo ops and other Q&A
- sessions.
-
- ALL All of the above
-
- So, if you wanted to sign up to get releases related to the economy
- your email message would look like this:
-
- To: Clinton-Info@Campaign92.Org
- Subject: RECEIVE ECONOMY
-
- When you send a signup message to the clinton-info server, it sends you
- back a status message letting you know what distribution streams you are
- signed up for. If you ever want to check on what groups you are signed
- up for send the following message:
-
- To: Clinton-Info@Campaign92.Org
- Subject: STATUS
-
- *****You can stop receiving email releases by sending a REMOVE message
- to the clinton-info server. The word REMOVE would be followed by
- whatever distribution stream you wanted to drop. If you wanted to stop
- receiving message about the ECONOMY then your mail would look like this:
-
- To: Clinton-Info@Campaign92.Org
- Subject: REMOVE ECONOMY
-
- You could substitute SOCIAL, FOREIGN, HEALTH, SPEECHES, NEWS or ALL for
- ECONOMY in the above message and you would be dropped from that
- distribution list. If you send the subject line REMOVE ALL, then you
- will be taken off the email distribution system all together and will
- not receive further releases of any kind.
-
- You can also ask for help from the automated server. Send an email
- query as follows:
-
- To: Clinton-Info@Campaign92.Org
- Subject: HELP
-
- The server will respond by sending you a detailed form that will guide
- you through the process of signing up for the various distribution
- streams. As you will quickly discover, there is a automatic form
- processing interface that parallel the quick and easy subject line
- commands discussed here. More detailed help is available by sending an
- email query as follows:
-
- To: Clinton-Info@Campaign92.Org
- Subject: Please Help!
-
- Finally, if you want to search and retrieve documents, but you do not
- have access to the retrieval methods discussed in section II, you can do
- this via email through the MIT server. You can obtain the WAIS query
- form by sending an email query as follows:
-
- To: Clinton-Info@Campaign92.Org
- Subject: WAIS
-
- Once you have identified the documents that you want, be careful not
- to request them all at once, because you may be sent a message
- containing all the documents and this message may be too big for some
- mail delivery systems between the email server and you.
-
- D. EMAIL SUMMARY SERVICE
-
- The Extension Service of the U.S. Department of Agriculture provides a
- daily summary of White House electronic publications.
-
- 1. Subscriptions
-
- To subscribe to the USDA Extension Service White House Summary service,
- send a message to:
-
- almanac@ESUSDA.GOV
-
- In the body of the message, type:
-
- subscribe wh-summary
-
- To Unsubscribe from the USDA Extension Service White House Summary
- service, send a message to:
-
- almanac@ESUSDA.GOV
-
- In the body of the message, type:
-
- unsubscribe wh-summary
-
- 2. Document Retrieval
-
- To request a specific document from the daily summaries, send a message
- to:
-
- almanac@ESUSDA.GOV
-
- In the body of the message, type:
-
- send white-house #####
- (where ##### is the request number for the document)
-
- 3. Document Search
-
- A user-friendly search facility is also available to search the
- white-house documents archived at ESUSDA.GOV. To search, send a message
- to:
-
- almanac@ESUSDA.GOV
-
- In the body of the message, type:
-
- search white-house keyword1 keyword2
-
- 4. Catalogue of Summaries and Documents
-
- Back issues and the catalog of the summaries or the documents contained
- at ESUSDA.GOV can also be retrieved through our almanac server. To get
- the summary catalog, send a message
-
- To: almanac@ESUSDA.GOV
-
- In the body of the message, type:
-
- send wh-summary catalog
-
- 5. Further Information
-
- If you have any questions about Almanac, please contact:
-
- wh-admin@ESUSDA.GOV
-
- III. HOW DO I SEND EMAIL TO THE WHITE HOUSE?
-
- We are pleased to introduce this new form of communication with the
- White House for the first time in history. As we work to reinvent
- government and streamline our processes, this electronic mail project
- will help put us on the leading edge of progress. Please remember,
- though, this project is still very much under construction. The Office
- of Correspondence is currently working on defining what this system
- will do, as well as addressing equipment and staffing needs.
-
- When you send a message to the White House you will receive an immediate
- acknowledgment that your message has been received. This is the only
- electronic response you will receive at this stage of development; if
- you include your street address in your message, you may receive a
- response by U.S. Mail. Please be assured that every electronic mail
- message received is read and analyzed by staff. Your concerns, your
- praise, your suggestions, and your ideas are carefully recorded and
- reported to the President and Vice President weekly.
-
- You can send email to the following addresses:
-
- Internet Direct: President@WhiteHouse.GOV
- Vice.President@WhiteHouse.GOV
-
-
- IV. HOW DO I SEND EMAIL TO CONGRESS?
-
- The House and the Senate are conducting electronic communications
- projects. You can access Congressional information via the protocols
- listed below. For additional information, please contact the offices of
- your Representative or Senators.
-
-
- Site Protocol Host/connection
-
- House
-
- Email Congress@hr.House.GOV
- Gopher Gopher.House.GOV
- [URL: "Gopher://Gopher.House.GOV/11"]
-
- Senate
-
- Gopher Gopher.Senate.GOV
- [URL: "Gopher://Gopher.Senate.GOV/11"]
- FTP FTP.Senate.GOV
-
- Library of Congress
-
- Gopher Marvel.LOC.GOV
- [URL: "Gopher://Marvel.LOC.GOV/11"]
- FTP seq1.LOC.GOV
- Telnet LOCIS.LOC.GOV
-
-
-
- Please note that these are not connected in any way to any White House
- online projects, so if you have any problems with Congressional systems,
- you will need to contact their system administrators for assistance.
-
- V. HOW DO I SUBMIT UPDATES FOR THIS FAQ?
-
- Please send corrections, deletion and additions to this FAQ to:
-
- Publications-Comments@WhiteHouse.GOV
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
- REDEFINING THE MODEM USER:
- HOW THE MEDIA TOOK TWO PERFECTLY HARMLESS WORDS AND RUINED THEM
-
- By Ed Cavazos
-
- Computer telecommunication hobbyists always seem to find themselves
- being labeled by the media in ways which help spread fear and
- misunderstanding. For some reason, there is no term in the vernacular to
- describe someone who uses their computer and modem not as a tool to
- perpetrate illegal activities, but as an electronic link to the world.
- Whenever one comes along, it gets used in a way which always implies
- illicit behavior.
-
-
- "Hacker": From Computer Guru to Computer Terrorist
-
- The word "hacker" is already lost. When Stephen Levy's 1984 book
- "Hackers: Heroes of the Computer Revolution" was published, the word was
- used in a way that was devoid of the negative associations prevalent today.
-
- In fact, the blurb on the back cover of the paperback described hackers as:
-
- "Spellbound explorers totally committed to
- experimenting with the infinite new possibilities
- of the computer.."
-
- And Levy himself (in the Preface) described his subjects as "those computer
- programmers and designers who regard computing as the most important thing
- in the world." Levy was concerned that some were using the term as a
- derogatory one to describe someone who wrote bad code. This innocent
- definition of the word could be traced back to the days when MIT Model
- Railroad enthusiasts were described that way.
-
- But those days are gone. Listen to what the National Law Journal
- (September 16, 1991) noticed:
-
- "...there is a widespread public perception that so-called
- computer hackers get their kicks out of breaking into top-secret
- government computer systems and wreaking havoc with destructive
- programs called computer viruses."
-
- And Katie Hafner a computer crime journalist was quoted in Waldensoftware's
- Computer Newslink,( Autumn 1991, Vol. 6, Issue 1) as remarking:
-
- "With the release of the movie "War Games" in 1983, in which a
- teenager almost triggers World War III from his little home
- computer, the definition of hacker changed overnight. Suddenly,
- hacker took on a very negative connotation. Now it's defined in
- Webster's as somebody who tries to break into computers."
-
- The media has helped turn what was at one time considered a complimentary
- term into something that connotes violence, illegality and destruction.
- To be called a hacker today is an accusation. Through misuse, the media is
- warping the word even further. When Geraldo Rivera interviewed Craig
- Neidorf for his television show "Now it Can Be Told" he referred to Craig
- (an electronic publisher) as "The Mad Hacker." Geraldo's loose usage of
- the term ignores the fact that Craig was never accused of breaking into a
- system, or gaining illegal access anywhere.
-
-
- Cyberpunk: From Science Fiction to Sensationalism
-
- When William Gibson, Bruce Sterling and other science fiction writers
- began writing a new type of science fiction in the 1980's, critics searched
- for a way to describe it. They settled (to the disappointment of some of
- the very writers they were describing) on "Cyberpunk." The term still
- refers to a genre of science fiction. "Science fiction with an attitude,"
- is how the April 20, 1990 Washington Post described it. At the stretches of
- its usage, it describes a new world view which is composed of a collage of
- computers and information, of countercultural electronic expression.
-
- But, as happened before, the media decided that definition wasn't good
- enough. When Katie Hafner and John Markoff decided to write a book on
- computer crime, they stole the term for their cover. "Cyberpunk: Outlaws
- and Hackers on the Computer Frontier" was the result. Now, all of a sudden,
- Cyberpunk doesn't refer to a sci-fi or cultural movement, it refers to a
- cynical hacker. When asked to describe a "typical Cyberpunk" Hafner
- explains:
-
- "They are typically alienated suburban teenage boys who find an
- alternative world in computers. Pengo, who we wrote about in the book,
- is a pretty good example. He lives in Berlin and dresses in black.
- Then again, who in Berlin doesn't? But he was almost a caricature of
- himself. He smoked hand-rolled cigarettes. When he worked at his
- computer, he had his headphones on all the time listening to
- synthesized music. He started hacking when he was fifteen and by
- seventeen he started spying for the KGB by hacking over the networks."
- (Waldensoftware's Computer Newslink, August 1991)
-
- Even William Gibson, Cyberpunk's founding father, who wrote of
- cyberspace and a new society noticed it. "I've been credited of inspiring a
- whole new generation of techno-delinquents," he remarks in the February 19,
- 1989 Boston Globe. If only we could hear Gibson's reaction two years
- later, when the term which once described his writing style is now being
- used to describe computer criminals.
-
- The word "Cyberpunk" had a real mystique to it. To turn it into a
- term to describe the "alienated suburban teenage boy" is to ruin some of
- that feel. Moreover, it serves to confuse and concern a public which is
- already paranoid and somewhat hysterical about anybody who admits to using
- a computer and modem for long periods of time. Responsible journalists
- should shy away from sensationalistic tactics like misusing an already well
- defined term like this.
-
-
- The Need for A New Word
-
- What is needed is new terminology. There are a myriad of totally
- legal and legitimate uses for modems and personal computers. People do
- everything online from perusing library card catalogs to meeting their
- perfect romantic match. On BBS's there are livid discussions of issues
- ranging from politics to religion -- from art to science. And online
- services like Prodigy and Compuserve are watching their user base swell
- annually. Soon, perhaps the media will accept a word that describes a
- person interested in communicating electronically without implying illegal
- activity. "Hacker" and "Cyberpunk" are ruined. "Modem Enthusiast" sounds
- too much like a term fresh from the pages of Reader's Digest. Hopefully,
- someone will provide us with a new term which truly describes the millions
- of modem users who "live, play and thrive" in cyberspace. Until that time,
- we can only sit and watch as the mainstream media stumbles along trying to
- understand and describe a phenomenon one gets the feeling it knows very
- little about.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- PUBLIC UTILITY COMMISSION OF TEXAS
- REQUESTS COMMENTS ON INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
-
- The Public Utility Commission of Texas (the Commission) has
- established a project (Project No. 12756) to examine Integrated
- Services Digital Network (ISDN) issues. The Commission seeks comments
- from interested parties in response to the following questions. If
- your answers would differ depending upon time-frame considerations,
- please provide answers for each time-frame. Parties are requested to
- organize their comments to address the specific questions asked in the
- order asked and are encouraged to include an executive summary
- emphasizing the main points of their comments to each question.
-
- Comments (13 paper copies) should contain a reference to Project No.
- 12756 and should be submitted to John M. Renfrow, Secretary of the
- Commission, Public Utility Commission of Texas, 7800 Shoal Creek
- Boulevard, Austin, Texas 78757, no later than April 30, 1994.
-
- Informal comments may be sent to Ms. Pam Whittington at the Commission
- via e-mail addressed to:
-
- pam.tel@email.puc.texas.gov
-
- Or you may call her at (512) 458-0100.
-
- 1. To which local exchange carriers (LECs) should a rule on ISDN
- apply? Why?
-
- 2. Should ISDN-based services be considered to be a replacement of or
- successor for "plain old telephone service"? Why?
-
- 3. Should all Texas customers and customer classes have access to
- ISDN? Why? If not, why not? What policies should be adopted by the
- Commission regarding customer access to ISDN? Why?
-
- 4. What are the policies which the Commission should adopt regarding
- the determination of costs and the pricing of ISDN and ISDN-based
- services? Explain why. Provide detailed cost information for each
- position if available.
-
- 5. Should the manner in which ISDN is deployed affect the price? How?
-
- 6. Should the Commission grant regulatory incentives, penalties, or
- flexibility in exchange for a LEC's provision of ISDN? Why? If yes,
- describe the incentives, penalties, or flexibility.
-
- 7. Does the Commission have jurisdiction to compel the provision of
- ISDN? Why? Explain the legal basis for your position.
-
- 8. Should the LECs be required to provide ISDN services in a manner
- that is conducive to competition in the provision of ISDN? Why? If
- so, how?
-
- 9. What policies should the Commission adopt regarding the deployment
- of ISDN? Should the Commission directly mandate deployment, require
- deployment to be driven by customer demand, or require deployment in
- some other manner? Why? Describe in detail how.
-
- 10. Describe in detail how these policies regarding deployment should
- be implemented and enforced.
-
- 11. If customer driven demand deployment was ordered by the Commission,
- should the trigger for deployment be thirty customer requests for ISDN
- per central office? Why? If not, why not, and provide evidence to
- support your position. If thirty requests is not the appropriate
- number, explain what is.
-
- 12. Should LEC compliance with deployment requirements be monitored on
- a periodic basis by the Commission? If so, explain in detail how and
- why.
-
- 13. What are the appropriate time frames for completion of deployment
- of ISDN in a LEC's service territory and in the entire state respectively?
- Why?
-
- 14. What are the technological options of the LECs with respect to the
- system upgrades necessary to deploy ISDN within their service areas?
- Explain in detail how the costs should be determined and reported to
- the Commission.
-
- 15. Are there any other policies, aspects, technical characteristics,
- costs, or obstacles (e.g. switch architecture, software, or SS7)
- regarding deployment that the Commission should consider? If yes,
- list and describe each and explain why. Provide detailed cost
- information for each item if available.
-
- 16. What policies regarding ISDN standards should be adopted by the
- Commission? Why?
-
- 17. To what standards (e.g. National ISDN, ITU-T standards, etc.)
- should the Commission require ISDN be deployed and provided? Why?
-
- 18. What specific service capabilities (e.g. bearer services,
- teleservices, supplementary services, etc.) should be required to be
- provided to customers? Why?
-
- 19. How should the policies regarding ISDN be implemented by the
- Commission? Why? If tariff filings were required, what should they
- contain? Why?
-
- 20. What end-user applications (e.g. telemedicine, distance learning,
- telecommuting, and video conferencing) using ISDN are available? Will
- these applications be available using technology other than ISDN?
- Should the Commission consider this in its rulemaking? Why?
-
- 21. Does Texas need ISDN to compete with other states? Why?
-
- 22. Would the widespread availability of ISDN have a beneficial impact
- (e.g., through telecommuting, video conferencing, etc.) on Texas'
- compliance with the Clean Air Act? Explain how.
-
- 23. Are there any other aspects or characteristics of providing ISDN
- that should be considered by the Commission? If yes, describe each
- and explain why.
-
- Parties interested in providing additional comments are welcome to do
- so. The Commission also welcomes data and documentation supporting
- the parties' comments. General Counsel and staff will review the
- comments and use them in preparing a recommendation to the Commission.
-
- Comments (13 paper copies) should contain a reference to Project No.
- 12756 and should be submitted to John M. Renfrow, Secretary of the
- Commission, Public Utility Commission of Texas, 7800 Shoal Creek
- Boulevard, Austin, Texas 78757, by April 30, 1994.
-
- Informal comments may be sent to Ms. Pam Whittington at the Commission
- via e-mail addressed to:
-
- pam.tel@email.puc.texas.gov
-
- Or you may call her at (512) 458-0100.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- EXAM PAPERS
-
- [Editor's Note: These are supposed to be actual answers from the tests of
- some students. There were no indications as to which grade-level they were
- in...but just between me and you, I hope that they weren't college kids.
- If so, ...I weep for the future.]
-
- ACTUAL EXCERPTS FROM STUDENT EXAM PAPERS:
-
- - Charles Darwin was a naturalist who wrote the organ of the species.
- - Benjamin Franklin produced electricity by rubbing cats backwards
- - The theory of evolution was greatly objected to because it made man think.
- - Three kinds of blood vessels are arteries, vanes, and caterpillars.
- - The dodo is a bird that is almost decent by now.
- - To remove air from a flask, fill it with water, tip the water out, and
- put the cork in quick before the air can get back in.
- - The process of turning steam back into water again is called conversation.
- - A magnet is something you find crawling over a dead cat.
- - The Earth makes one resolution every 24 hours.
- - The cuckoo bird does not lay his own eggs.
- - To prevent conception when having intercourse, the male wears a
- condominium.
- - To collect fumes of sulfur, hold a deacon over a flame in a test tube.
- - Parallel lines never meet, unless you bend one or both of them.
- - Algebraical symbols are used when you do not know what you are talking
- about.
- - Geometry teaches us to bisex angles.
- - A circle is a line which meets its other end without ending.
- - The pistol of a flower is its only protection against insects.
- - The moon is a planet just like the Earth, only it is even deader.
- - Artificial insemination is when the farmer does it to the cow instead of
- the bull.
- - An example of animal breeding is the farmer who mated a bull that gave a
- great deal of milk with a bull with good meat.
- - We believe that the reptiles came from the amphibians by spontaneous
- - generation and the study of rocks.
- - English sparrows and starlings eat the farmers grain and soil his corpse.
- - By self-pollination, the farmer may get a flock of long-haired sheep.
- - If conditions are not favorable, bacteria go into a period of adolescence.
- - Dew is formed on leaves when the sun shines down on them and makes them
- perspire.
- - Vegetative propagation is the process by which one individual manufactures
- another individual by accident.
- - A super-saturated solution is one that holds more than it can hold.
- - A triangle which has an angle of 135 degrees is called an obscene
- triangle.
- - Blood flows down one leg and up the other.
- - A person should take a bath once in the summer, and not quite so often in
- the winter.
- - The hookworm larvae enters the human body through the soul.
- - When you haven't got enough iodine in your blood you get a glacier.
- - It is a well-known fact that a deceased body harms the mind.
- - Humans are more intelligent than beasts because human branes have more
- convulsions.
- - For fainting: rub the person's chest, or if a lady, rub her arm above the
- hand, instead.
- - For fractures: to see if the limb is broken, wiggle it gently back and
- forth.
- - For a dog bite: put the dog away for several days. If he has not
- recovered, then kill it.
- - For a nosebleed: put the nose much lower than the body.
- - For drowning: climb on top of the person and move up and down to make
- artificial perspiration.
- - To remove dust from the eye, pull the eye down over the nose.
- - For head colds: use an agonizer to spray the nose until it drops into
- your throat.
- - For snakebites: bleed the wound and rape the victim in a blanket for shock.
- - For asphixiation: apply artificial respiration until the patient is dead.
- - Before giving a blood transfusion, find out if the blood is affirmative or
- negative.
- - Bar magnets have north and south poles, horseshoe magnets have east and west
- poles.
- - When water freezes you can walk on it. That is what Christ did long ago in
- wintertime.
- - When you smell an odorless gas, it is probably carbon monoxide.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Interview with Tom Jennings
- by Jon Lebkowsky, jonl@io.com
- reprinted with permission
-
- Originally published in Fringe Ware Review #1, ISSN 1069-5656.
- Copyright (c)1993 by the author. All rights reserved.
- For more details, contact: fringeware@io.com
-
- Our FWI prez recently had a chance to chat with Tom Jennings, who commented
- afterwards: "Think you can mention somewhere that I'm a fag anarcho nerd
- troublemaker/activist? It is important, and to me as well. It always gets
- buried. Lots of people like to know, especially scared people with no
- images of people who are gay and reasonably functional in some way." Tis
- our pleasure to honor Tom, whose work has been so brilliant and so far out
- on the Fringe, that when the US gov't precluded computer technology exports
- during the Cold War, they basically forgot/ignored a certain fag anarcho
- nerd from the Bay Area... As a result, Tom's FidoNet now provides the basis
- for computer networking in Eastern Europe, former USSR and most of the
- Third World, as well as a extraordinary conduit throughout the rest of the
- world.
-
- Tom: This people tracking stuff... what little I know of it sounds very
- creepy. I don't want a box that reports where the hell I am all the time,
- when I walk in the room, it can tell some local machine I'm there. It's
- none of anyone's goddamn business. It's the corporate culture invasion on
- real life, like the top 1% who make all the money, and think everyone's
- gonna live like them.
-
- Jon: Well, if you're living in an ivory tower, after you live there for a
- while, you start to think, not that it's YOUR environment, but it's THE
- environment.
-
- T: Yeah, it is reality, but it's a local one. Everyone they know is like
- that... well, they don't know everybody.
-
- J: In a conversation I had the other day with Allucquere Rosanne Stone, she
- talked about ubiquitous computing, that computers or computing will be
- invisible, it will be so omnipresent...
-
- T: That's what Alan Kay pointed out years ago, that when technology gets
- done right, you don't even see it. When you walk in a room, your hand
- flicks a switch... how much thought do you give to that stupid light
- switch? Hopefully very little. The light comes on, and... Telephones are
- getting close to that.
-
- J: Even better, there's some rooms you walk into and the light switches on
- automatically, because there's motion detectors.
-
- T: Yeah.
-
-
- Anarchy In The A-C-K
-
- J: Tell me about FidoNet. As I said, I'm sorta ignorant on the subject...
-
- T: I have a weird point of view on it, of course, having designed it...
- February or March of '94 will be it's tenth year. It is a network, a
- collection of bulletin boards. It is a loose confederation, and it is
- completely and thoroughly and utterly decentralized. There is literally no
- top. Most of it's members have a narrow view of it because they have this
- particular reality filter on all the time from living amongst hierarchy
- addicts. But FidoNet's most basic element is a bulletin board. What FidoNet
- is, is a set of protocols that lets the bulletin boards communicate.
- FidoNet started as a bunch of bulletin boards, running my Fido software.
- FidoNet was added later, to allow point-to-point email between Fido boards.
-
- J: Did you start with just a single BBS?
-
- T: It started with my system. I was writing software for Phoenix Software,
- which is now Phoenix Technologies. I was their first employee. I did all
- their portable MS-DOS stuff prior to the ROM BIOS they did, which was
- partly based on my previous work with "portable" MS-DOS... we were doing
- MS-DOS installations in three days, and charging exorbitant sums... and
- delivering really good stuff, people got their money's worth, and got it
- damn fast! We had it down to an art of just totally portable stuff. So I
- had this portable attitude toward hardware, and wrote a bulletin board sort
- of based on it.
-
- FidoNet is more importantly a social mechanism. It was pretty obvious from
- the start that it was going to be a social monster, almost more so than a
- technical thing. And it had to do with the original environment of bulletin
- boards, which were around for quite a while by the time I got around to
- doing Fido. Every bulletin board was completely different, run by some
- cantankerous person who ran their board the way that they saw fit, period.
- So FidoNet had to fit in that environment.
-
- J: A very anarchic environment.
-
- T: Yes, explicitly anarchic. Most people just ran them for their own
- reasons, and they were just separated by large distances of time and space,
- so they remained locally oriented. I just ran across old interviews and old
- documentation from '83 - '84, and we were saying it then. It was just...
- people didn't hear it, it just went in one ear and out the other. They
- think 'Oh, anarchism, that means throwing rocks at the cops!' Well
- sometimes, I suppose, but that's mostly a cop's definition of it.
-
-
- The Revolution Will Be Packetized
-
- J: The sense of the bomb throwing anarchist, I guess, is sort of in the
- sense of political disorder...
-
- T: ...which was a specific event in the 20's in San Francisco having to do
- with union labor busts. And blackmail... this guy Tom Mooney, a bomb was
- planted and blame arranged to fall on Tom Mooney, tossing his ass in jail,
- putting the blame squarely on the anarchists.
-
- J: Anarchy has this sorta bad connotation, but anarchy itself is not unlike
- what so many seem to want to embrace now. I think the libertarian
- philosophy is fairly anarchic, and you find it widespread throughout the
- net. It's basically a hands-off philosophy.
-
- T: I think people often take it too seriously, like various anarchist camps
- that have more rules than not. I consider it a personal philosophy, not a
- political thing at all. It has nothing to do with party-type politics.
-
- J: If it becomes overtly political, it ceases to be anarchy...
-
- T: Yeah, more or less, and I don't really care about what's considered
- politics per se, it's personal interaction, how I treat other people and
- how they treat me, and my relations to other people, it's anarchism... I
- always call it Paul Goodman style, which is the principle that people work
- together better if they're cooperating than if they're coerced. Very
- simple, nothing to do with goddamn party politics. It has to do with how
- you treat people that you have to work with. And that's what FidoNet was
- based on, very explicitly. It was sort of laid over the top of a lot of
- Fido bulletin boards, and let them talk to each other in a straightforward
- point-to-point manner.
-
-
- Just How Big Is It?
-
- J: Was it just Fido boards?
-
- T: Just Fido at the time, because it required a fairly low-level of
- restructuring of the innards, message bases and stuff. And Fido is a pretty
- good bulletin board, has been for years, though now it's definitely old
- fashioned. I haven't done a revision to Fido for over two years.
-
- J: Are you thinking about doing that?
-
- T: No, I'm thinking about dropping it. <laughter> I've thought about it,
- and it's over. So FidoNet started up in spring of '84 with two systems, me
- and my friend John Madill and within four months there were twenty or
- fifty... by the end of the year, it was approaching 100 by the next
- February, in nine months. It started growing really fast. And every single
- one was run by somebody for their own reasons in their own manner for their
- own purposes, so FidoNet had to accommodate this. And this is nothing
- unusual, in one sense. All computer networks are essentially run this way.
- The Internet is. There's no central Internet authority where you go to get
- a system in Internet, you just put it online, and find people to help you,
- register with the NIC [Network Information Center] which is just a
- convention for handling names.
-
- J: Sort of ideally cooperative.
-
- T: Yeah, it's quite cooperative, and you don't really get kicked out unless
- you technically screw up, or do something massively illegal or glaringly
- obvious. Most likely technical, like don't answer mail for a long time.
- Most electronic things are like that. It didn't start to take off until
- Echomail came by, which was done by this guy named Jeff Rush in Dallas as a
- way to talk among Dallas sysops about organizing pizza parties. It's a
- fully distributed, redundant database using FidoNet netmail to transport
- the records in the distributed database. It's functionally equivalent to
- Usenet, they gate back and forth very easily.
-
- J: Can you link FidoNet very easily to Internet or UUCP Mail?
-
- T: There's gateways between [FidoNet and UUCP] operating. You can just set
- up the UFGate package... [FidoNet and the Internet] they have totally
- different paradigms. IP, the Internet stuff, is fully connected all the
- time. When you want to connect to a system in Finland, you just rub packets
- with them and they come back in generally under a second. FidoNet is all
- store and forward, offline processing...
-
- J: How big is it now?
-
- T: Just short of 20,000 systems.
-
- J: Wow, that's a lot...
-
- T: It's doubled in a year... I think more than doubled in a year. It's been
- doubling every year for a long time <laughs>.
-
-
- QQBEGIN PGP PUBLIC KEY BLOCKQQ
-
- J: There's a lot of discussion today of encryption schemes, are you
- involved in that?
-
- T: Actually, yeah, I use it routinely.
-
- J: Using PGP?
-
- T: Yeah. FidoNet was pretty intentionally involved in getting PGP
- ubiquitous the first time around... an intentional, conscious quick-dump of
- about 10,000 copies in a week, starting on a Monday, just to be sure that
- it was unstoppable, and it spread very quickly. Now there's all kinds of
- arguments over whether it's legal, or whether it's going to incriminate me
- to use PGP, and the traffic into the network itself...
-
- J: It wouldn't be a criminal issue...
-
- T: People believe all kinds of crazy nonsense.
-
- J: Somebody has a patent on the algorithm, is that it?
-
- T: Yeah, and some people are afraid that if they send or pass encrypted
- data, that the police will bust into the house and steal the computer, all
- this kind of stuff... FidoNet sprung up fully-formed out of seeming nowhere
- into the rest of the computer world. Most people on the Internet have
- access to it through schools or industry. They went to school, then they
- got a job, and they grew up with maintained Internet connectivity... they
- were brought up into the sort of Internet-hood.
-
- J: I think that's changing a bit...
-
- T: Oh, it is changing, it will continue to change, and someday it will be
- incomprehensible that it was this way, but as of today, it's sort of how it
- is. FidoNet did not come from that direction at all. It came from... the
- usual white guys who could afford a computer :-), but in the best tradition
- of radio and astronomy, they were at least amateurs, it's truly an amateur
- network. It is not professional, as in "profession"... "professional" is
- frequently used to mean legitimate, as opposed to amateur...
-
- J: You mean "hobbyist?"
-
- T: Yeah, amateur as a word became disparaging, but we mean it actually in
- the older sense, like the radio amateur sense. We don't do it for money,
- it's done for the sake of itself. So for the most part, FidoNet members
- never had that traditional kind of connectivity, and also didn't have the
- corporate culture, and didn't have the computer network culture, so it
- basically formed in the dark, on its own.
-
-
- 550 Flavors of Culture
-
- J: Speaking of the word "culture," do you find that within the FidoNet
- universe, there's a particular set of cultural predilections? Does there
- tend to be a general kind of group or community that uses FidoNet?
-
- T: Well, it's like any of those things, it's really subjective. But, yeah,
- there do seem to be, in my travels on Internet and FidoNet, distinct
- flavors. One is not better than the other, I can tell you that, culturally
- speaking. The Internet people say, "Oh, but the flame level on FidoNet is
- so awful." Bullshit. The flame level on the Internet is just as high. It's
- in loftier language, five line signatures, and all that kind of crap... but
- I'm sorry, it's not any better, it's just different. What it is, is less
- alien to them, more comfortable... and vice-versa from the FidoNet side.
- It's more comfortable, it's more familiar, the language used and the
- acronyms and the smiley faces, all of that junk.
-
- There is a FidoNet flavor, through the usual sociological things. The
- people who originally populated it defined this vague common set, and
- people who come onto it self-select ("Oh, I like that!") and join it, and
- then enhance it, or they're sort of neutral and they come in and they just
- absorb it because... you know, you start hanging out with people, and you
- pick up their manner of speaking. And there are people, of course, who are
- utterly opposed to this, and want to make it professional and some just
- don't care, and live in a corner of it.
-
- But yeah, there are things in common, and I have a hard time putting my
- finger on what they are. It is fiercely independent, utterly, fiercely
- independent. It is viciously anti-commercialization. It has a long history
- of some nasty politics, some really enlightened politics, and I think in a
- lot of ways they have more pragmatic view, and a better view Q better
- meaning more functional in today's world Q than people who haven't had to
- pay their own phone bills.
-
- J: Some people argue that you can't have strictly online community, and
- others believe that you can. Some feel that there has to be some kind of
- face-to-face interaction. In the Internet there has not been as much of
- that until it began to become more broadly accessible to regular people...
-
- T: The Internet is still completely and thoroughly inaccessible... I'm
- sorry, it is simply not accessible. You have to have a large amount of
- hardware or an intimate relationship with someone who does, like you have
- to go to school or something. Otherwise you're paying money... and there
- are people who fall through the cracks...
-
- J: How about public access Internet?
-
- T: Yeah, but if there's more than 100 terminals in the U.S. that any
- average person could walk up to and figure out how to use in less than a
- week, I would be surprised. It still takes huge amounts of specialized
- knowledge.
-
- J: But the technical side is fairly dense...
-
- T: Oh, yeah... I've been an SWTP, CP/M, DOS hacker and hardware hacker for
- fifteen fucking years, twenty years, and UNIX is so intimidating,
- arbitrarily difficult to use... a lot of the users have this macho attitude
- that "Well, you should have to plow through it, I did." The whole
- priesthood nonsense. It's stupid. And the argument whether online culture
- is possible or not, that ain't where it's gonna get decided. It either gets
- made or it doesn't. I think there are online communities. The people who
- are doing it aren't asking themselves, "Are we an online community?"
- They're just going about their business. They're not tangible enough to
- really get documented except in hindsight, you look back and say "Oh, yeah,
- those people are" or "No, they really weren't, when push came to shove,
- they didn't stay together."
-
- J: At EFF-Austin we've been a little more self-conscious about it, we've
- actually been trying to do some community-building, to try to structure an
- online community in Austin where we'd have some force to get things done,
- various projects. One of the things we're doing that other EFF-related
- groups haven't been doing is arts projects, and in doing those things, in
- talking to some of the people who are interested in doing that, I realized
- that there are a lot of writers and artists who are hungry to get online.
- They know it's there, they'd like to be using it, but they can't get access
- to it because they can't, unless they stumble into it, find a system
- that'll give them an account. It's kind of like what you were saying about
- barriers... but I wonder if, in the FidoNet world, you find writers and
- artists using FidoNet to share information and to form arts communities?
-
- T: Well, there's a lot more less-technical people involved, because you can
- put a $300 system together, line cord to phone jack. That just means that
- the entry level is a lot lower. And it's functional as hell! I mean, So
- what if it's slow? 5 seconds or 100 milliseconds, what's the difference to
- most people?
-
-
- All Look Completely Different
-
- J: The link, the network, is strictly for email? Or do you have some other
- stuff, file transfer... ?
-
- T: Oh, there's lots of file transfer stuff. In some ways it's a lot more
- sophisticated than the FTP stuff from the user's point of view. There's
- this thing called the SDN, the Software Distribution Network, which looks
- like a conference for files, where the objects are not messages, but files.
- And they're stored in a redundant manner, some locally concentrated, some
- far away and scattered. It's kind of nebulous, like most network things
- are. They do monthly announcements of new files, and most of it's
- shareware, or free. You can do things like file attach (send with a
- message), and file requests (file fetch via message).
-
- FidoNet doesn't have the problem that a lot of older networks have, with
- seven bit channels and all that crap. We have eight bit channels with 32
- bit CRCs. We do run into the alien system problems... ASCII character sets
- vs. the cyrillic alphabets and all that kinda stuff. Those problems are
- about as chaotic as they are anywhere else.
-
- J: How about remote login?
-
- T: No... the systems in FidoNet are radically different. There's Radio
- Shack color computers, there's CP/M machines, Apple IIs, giant DOS
- machines, giant LANs of UNIX boxes, all running common protocols in a far
- broader hardware base than most, even UNIX boxes. There's no unified
- operating system, there's a set of protocols, there's 40 or 50 different
- mailers, and FidoNet interfaces in bulletin boards, and they all look
- completely different. So it's at a much higher level of abstraction than
- the FidoNet gets defined at. I bet a lot of the Internet, some huge
- proportion, is UNIX...
-
- J: You certainly need some kind of standard to be interoperable to the
- extent that the Internet is, don't you?
-
- T: No, where the real compatibility is is the TCP/IP layer, and that's rock
- solid, and that's the thing in common. All the rlogin, telnet, and ftp
- stuff partly user paradigm, rather than just a set of protocols. It's well,
- and fine, and wonderful, and I love it, but it does put a real crimp on
- style.
-
- [Ed Cavazos, almost-attorney and vice-prez of EFF-Austin, shows up and
- settles in to listen. The conversation continues.]
-
- The Color Of Money
-
- T: A lot of FidoNet is so radically different, you can't get people to
- either hear it or understand what's going on, because it's NOT like any of
- the others, and it was intentionally not made like the others, and some of
- the really basic principles that seem random are intentional... they're in
- writing, and have been in writing for seven years. The strictly American
- anarchist principles that it's based on are written into the policy
- documents.
-
- We actually had in '85, '86, '87 an attempted takeover by a corporation
- that was formed from within, it was like a cancer that became a giant boil
- on the surface, called IFNA, the International FidoNet Association, that
- was sort of a good idea, or a potentially good idea, when we started it at
- the 200 node level. By the time it got around to being implemented, at 500
- nodes, the world had utterly changed. With 200 people, you can run it like
- a club. It was 90% U.S., 90% white guys with computers, and at the 500 node
- level, it was about 20% European and definitely, obviously growing. It
- hopped the puddle, with systems appearing in South America, scattered, but
- you know how that goes... when you get one, then you get two, and then
- four, and they start to grow.
-
- We were very naive, and I was right in the middle of it. Some of us learned
- quickly, this isn't going to work! But this corporation grew, and became a
- 501(c)(3), and like all of those things, they get power-hungry, and they
- get grabby of territory, and we had to fight it off, and it was fought off
- by the constituents of the network... and it was killed off. They had
- gained control of the copyright and the trademarks, and they were fought
- off. The network, instead of dying, like everyone predicted, thrived.
-
- J: So how did this fight go?
-
- T: It was fought by lawyers and proxy votes and all the usual crap, in a
- goddamn hotel in San Jose, was the final straw...
-
- J: Were you a part of this corporation at all?
-
- T: Well, a bunch of us started it... at first, we were brainstorming what
- we could do... deals on modems, some obvious stuff. And we'd have a
- spokesperson from FidoNet who'd attend the EMA meetings once a year and
- represent bulletin board operators and FidoNet members in electronic
- privacy things and the technical trade stuff and the obvious things. And
- those are still lacking, we still need them. But it was established really
- early that everyone not only retains control of their system, but they're
- expected to do their part to run it, because there is no one else to run
- it. And as simple as it sounds, it's a really radical act to get that
- across, so that people don't just sit on their butts. And of course, the
- usual 10% does the work, and 90% sits on their butts, but that's fine, too.
-
-
- Double Plus Plus Good
-
- T: FidoNet's a little odd, unlike the Internet, which has a domain name
- system... you say "Connect to toad.com," it says, ".com, okay, over there,
- toad... here's the address," and you go after it. FidoNet has what appears
- to be a centralized database that every system in the net has, a copy of
- this at the moment 2 megabyte long ASCII database, with 20,000 records in
- it. And it's updated every week, it contains the full physical and logical
- information about the entire network... phone number, system name,
- restrictions on use, protocols supported, some ASCII text, like system
- name, and city, all that kind of junk. It contains the hierarchical
- addressing scheme of the network, and it contains a lot of redundancy.
-
- J: Given that there's no central authority, who maintains this database?
-
- T: A local autonomous unit in FidoNet... First... the terminology in
- FidoNet is point-node-net-zone. Points aren't really part of FidoNet,
- they're a peculiar thing... a node is the basic unit, it is a bulletin
- board or a mail-only site, generally a phone number with a modem on it. A
- net is a cluster of Fidos, a cluster of nodes, like San Francisco has Net
- 125, SFBay Net, 75-80 systems. A node in a net is the basic social
- organizational unit. It was designed to be small enough to comprehend in
- regular old terms, like we all know and love, clubs and that kind of
- group... when they get too big they tend to fragment into pieces, which
- become autonomous units, then nets are collected into the real-life
- geography of continents.
-
- The North American phone system is alien to the Western European ones, and
- they have lots of mutually-alien phone systems. The North Americans tend to
- be a lot less political... Zone 1 encompasses Mexico, U.S., and Canada, and
- nobody ever batted an eye over it. It's like, "Oh, okay, that makes sense."
- In Europe, they're fiercely defensive of the political boundaries, and it's
- really silly. Local autonomy was the critical thing to make it work,
- because who's going to allow somebody in New Jersey to dictate how they're
- going to run their system? There'd be no way to exert any kind of control,
- and once you start getting into control wars, you spend all your time doing
- that.
-
- So the way the node list is made is that every net fragment makes its own
- chunk of the node list, which is a very straightforward task, even though
- it ends up being work. They're passed up through regional coordinators who
- take these fragments, and everybody gets a copy of everybody else's weekly
- list, and each of them compiles a giant list, then they do a difference,
- this week from last week, and mail out that difference back down the tree.
- So if you chopped off half the network and smashed it flat, it would
- regenerate itself. It's a balance of terror, that's what it is. It's a
- genuine balance of terror in responsibility and power. What you get for
- that redundancy is that no one can cut you out of the network, no one can
- declare that you can't communicate.
-
- In the UUCP world none of this happens because the social environment is
- much more substantial... universities, Hewlett Packard... Your neighbors,
- in theory, can cut you off, and you disappear, no one knows about you, if
- you're eliminated from the bang path, no one can talk to you, and that's
- it, you don't exist, it's as simple as that.
-
- In FidoNet, and this has happened recently in England... a bunch of
- religious fundamentalists by just hammering away gained control of large
- chunks of the FidoNet in the U.K., and they started having fits... "Why,
- there's perverts on this board, and we're not gonna have 'em in FidoNet!"
- <laughter> And they clipped them out of the goddamn list, they removed the
- entries from the U.K. list. You sort of noticed they disappeared, but those
- people can still communicate, they can mail you their fragment,
- hand-generated if necessary, and all the node list processors let you
- incorporate private lists, and you can reply back, just like that. No one
- can be cut out of the network.
-
- If you start thinking about it, you realize that there are a number of good
- and bad side effects from this. Like, if you have some real asshole
- troublemaker, there's nothing you can do about it. Like, unless somebody
- comes in and pulls out a gun or something, it's kinda hard to get someone
- kicked out of a more or less public place... well, [here in] the hotel
- would be relatively easy, but out in the street, you've just gotta live
- with your neighbors. And the same is true in the FidoNet. You have to learn
- to live with your neighbors, and vice versa. The flaming assholes have to
- learn how to behave well enough to not be utterly censured. Which is what
- generally happens to them... people just ignore them.
-
- There was one guy, he was another fundamentalist Christian nut case. He was
- amusing, actually. He was a "true Bible" believer, this was called
- pre-rapture, or something or other, some pre-rapture network... he was
- persecuted by all sides, and he loved it. He was mailing everybody this
- gibberish, pages and pages of gibberish. And there's programs that just
- filter out mail, and you say, I don't wanna see mail from this address...
-
- J: A bozofilter.
-
- T: Yeah, basically, it's a bozofilter, we've had 'em for a long time. And
- there's also another one that's called bounce... whenever you get anything
- from this guy, bounce it back. It appends a bit of text that says "This
- message is refused at site so-and-so, have it back," which IRRITATES
- people! But it just works out that people, even the crazy ones are social
- organisms. We don't really like to be disliked too widely, we like to have
- an audience, if nothing else. So that's the underpinnings...
-
- FidoNet has been very flexible technically. When technological changes or
- opportunities come by, within a year half the net supports them. In about
- '85 U.S.JRobotics very smartly discovered bulletin boards, and they
- realized the way it works is, even though there's a relatively small number
- of bulletin board sysops, if you're bulletin board caller, who do you look
- to to see what hardware to buy? The sysop. And they ask, "What kind of
- modem do you have... oh, it must be pretty good if you use it," because
- when it's bad, they mouth off to hundreds of people about it.
-
- So USR basically courted the FidoNet, and said "What do you want to see in
- a modem?" The first modem they did this with was the Courier 2400, which
- was 600 bucks new at the time, or 700 bucks. They offered a 50% off deal,
- down to about 300 or 400 dollars, which was a bargain, relatively speaking.
- We wanted true flow control, and a symmetrical modem with basic AT command
- set, and they did it. It was an instant success. And then they did the HST,
- much to most of the industry's annoyance, they did this kludgey proprietary
- asymmetrical protocol 9600 one way, 300 baud the other way... they came to
- us again, and we worked out more handshake stuff, and started changing
- protocols on our side.
-
- FidoNet was originally based on xmodem, which is amazingly similar to
- X.25's packet ack, like Kermit, only much more efficient than Kermit, and
- very much like UUCP-G, only it's not windowed... block ack block ack block
- ack... it's fine at 2400 baud and below, above 2400 baud it was not good.
- We had asymmetrical modems that collapsed. So there had been another
- protocol called Wazoo around, and it instantly became hot, because it did
- protocol negotiation when you started a session, and it could pick ZMODEM
- [trademark Chuck Forseberg], which is fully-windowed, screaming fast, you
- can run it ackless. You could work the hell out of an HST in ways that
- other protocols couldn't. Internet protocols and UUCP-G were just useless,
- in other words, the modem was useless for existing protocols. So FidoNet's
- historically been very flexible, technology-wise.
-
- McLuhanites: Myopy, My Opium
-
- Ed: Are you familiar with John Quarterman? Have you seen his maps of
- FidoNet?
-
- T: No, I haven't seen his maps of FidoNet. [Quarterman did show 'em off
- later in the conference.] I talk to him occasionally, I republished one of
- his articles in FidoNews a while ago... FidoNews is a weird phenomenon in
- itself... a 20,000 circulation weekly newsletter in its tenth year. It sort
- of goes unacknowledged... FidoNet has a giant credibility problem, because
- it sprang forth fully-formed 'way outside all traditional computer things,
- and because it works on PCs and Radio Shack Color Computers (which actually
- turns out to be a nice processor, it runs OS9 on a 6809... you can run
- multiusers on a $99 packaged machine). It's really some amazing software.
-
- FidoNews was designed in '84 in the first year as the meta-net, to discuss
- the net itself, to discuss the social end of the net. In the first issue
- was a retired Air Force colonel or something, whining about the military
- retirement process, and people instantly said, "This is supposed to be a
- technical newsletter, this is FidoNet..." and I said, "No, bullshit, it's
- not. I'm tired of just this techie crap. Do you talk on the phone about
- your telephone all the time? 'Gee, I've got a great new phone, it's got all
- these pushbuttons...' and you get bored very quickly. It's like radio
- amateurs talking about their goddamn antennas." Who wants to put up with
- that stuff?
-
- J: We've been talking about that a lot. There's three or four magazines
- devoted to online cultures, cultures of the Matrix, that focus on the
- Internet a lot. Wired is one, Mondo in a real different way, and
- bOING-bOING, of course, in a REAL different way. And we realized that a lot
- of the articles are preoccupied with the carrier, with the technology for
- carrying messages, and not so much with the messages themselves or the
- cultures themselves, the sorts of cultures that are evolving.
-
- T: Yeah, they forget that what we're making is a goddamn conduit; it's a
- medium, it's not content! A content comes with it, because they're brand
- new mediums, they fail a lot, and they need to be developed... all software
- sucks, and all hardware sucks, so you end up talking about it a lot, but
- yeah, that's not the point.
-
- J: What's really more fascinating is what's at either end of the conduit...
-
- T: Yeah, the telephone proved that. It's actually a way to convey social
- information, emotion, that's why telephones worked, you can talk over them.
- How many ways can you say "No" with a keyboard? Not very many. 25 or 50 if
- you're incredibly ingenious. Smiley faces and uppercase... All the cultural
- information is stripped. And a lot of it has simply been access. Those at
- the gates determine who comes in. If you own the $5,000 PC...
-
- J: Is that what brings you here [to the fourth conference on Computers,
- Freedom, and Privacy), access issues?
-
- T: Yeah, that's why I'm always skeptical of large-scale networks. While I'm
- on the Internet, I don't have any pretensions of being... "Why, the world
- is connected!" No, one percent of one percent is connected, barely, and the
- tools really suck. Through no fault of the authors, they're incredible
- works, the foundation to a world. But they're hardly accessible to everyone
- in the world.
-
- J: I had to buy my access to the Internet, at first. The WELL...
-
- T: Mine I get because I'm managing a small IP cooperative, and I get it
- sort of as a perk to my $400 to $500 salary for what is essentially a
- full-time job.
-
- J: Actually, I've been able to pick up other accounts since, but the only
- way that I could have got in in the first place was by buying access,
- because I'm not really very technical. My interests are more
- sociopolitical, I guess...
-
- T: I don't really have any serious problems with the way things exist. For
- better or worse, that's the way that all complicated things have been
- developed in our little Western history timeline. It takes resources and
- effort and energy, and they do spread out, eventually. And they get defined
- along the way, they definitely have basic cultural assumptions glued into
- them at the very base.
-
- J: It allows a more distributed way of organizing and doing things...
-
- T: We'll see if it's ever as good as the telephone is. It doesn't get much
- better than the telephone, when you think about its position in society.
- Like Bruce said in his Hacker Crackdown, you notice them when you don't
- have one, they're so ubiquitous, they're like light switches. You don't
- think of a telephone, it's not an exciting object.
-
- J: I can remember when there was a single phone in the house, and it was a
- big deal to have a second phone, which was usually on the same line. And
- now I have three phone lines, and one is a dedicated data line. I don't
- think I know many people who don't have at least two or three phones in
- their house.
-
- T: I'm down to two, and I consider that rarefied... I only need two lines
- now, after having six at one point, all these bulletin boards and data
- lines, now it's like, oh, a voice line, and a data line...
-
- J: I prefer asynchronous text swapping, but I'm not sure why, maybe a
- personal idiosyncrasy. It seems funny to me, because Matisse Enzer, the
- support guy on the WELL... when we're having a problem, and we can't quite
- figure out how to communicate about it, he always says, "Well look, why
- don't I call you up, and we'll talk about it." And I always say, "No, wait,
- I don't wanna talk, I just wanna text!" <laughter>
-
- -----
- Originally published in Fringe Ware Review #1, ISSN 1069-5656.
- Copyright (c)1993 by the author. All rights reserved.
- For more details, contact: fringeware@io.com
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
- Download Complete. 158958 total bytes, 1499 bytes/sec
-