home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 156.6 KB | 3,132 lines |
-
- THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
- ======================================================================
- ISSN 1074-3111 Volume One, Issue Four June 7, 1994
- ======================================================================
-
- Editor-in-Chief: Scott Davis (dfox@fennec.com)
- Technology Editor: Max Mednick (kahuna@fennec.com)
- Consipracy Editor: Gordon Fagan (flyer@fennec.com)
- Network Security: George Phillips (ice9@fennec.com)
-
- ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC
-
- U.S. Mail:
- The Journal Of American Underground Computing
- 10111 N. Lamar #25
- Austin, Texas 78753-3601
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- IMPORTANT ADDRESSES -
- ============================================================================
- To Subscribe to "TJOAUC", send mail to: sub@fennec.com
- All questions/comments about this publication to: comments@fennec.com
- Send all articles/info that you want published to: submit@fennec.com
- Commercial Registration for Profitable Media: form1@fennec.com
- ============================================================================
-
- "The underground press serves as the only effective counter to a growing
- power, and more sophisticated techniques used by establishment mass media
- to falsify, misrepresent, misquote, rule out of consideration as a priori
- ridiculous, or simply ignore and blot out of existence: data, books,
- discoveries that they consider prejudicial to establishment interest..."
-
- (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Contents Copyright (C) 1994 The Journal Of American Underground Computing
- and/or the author of the articles presented herein. All rights reserved.
- Nothing may be reproduced in whole or in part without written permission
- of the Editor-In-Chief and/or the author of the article. This publication
- is made available periodically to the amateur computer hobbyist free of
- charge. Any commercial usage (electronic or otherwise) is strictly
- prohibited without prior consent of the Editor, and is in violation of
- applicable US Copyright laws. To subscribe, send email to sub@fennec.com
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- DISCLAIMER AND NOTICE TO DISTRIBUTORS -
-
- NOTE: This electronic publication is to be distributed free of charge
- without modifications to anyone who wishes to have a copy. Under NO
- circumstances is any issue of this publication, in part or in whole,
- to be sold for money or services, nor is it to be packaged with other
- computer software, including, but not limited to CD Rom disks, without
- the express written or verbal consent of the author and/or editor.
- To obtain permission to distribute this publication under any of the
- certain circumstances stated above, please contact the editor at one of
- the addresses above. If you have intentions of publishing this journal
- in any of the ways described above, or you are in doubt about whether or
- not your intentions conflict with the restrictions, please contact the
- editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
- This publication is provided without charge to anyone who wants it.
- This includes, but is not limited to lawyers, government officials,
- cops, feds, hackers, social deviants, and computer hobbyists. If anyone
- asks for a copy, please provide them with one, or mail the subscription
- list so that you may be added.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 4
-
- TABLE OF CONTENTS
-
- 1) We've tried To Be Nice... Carl Guderian
- 2) Defcon Convention Update Dark Tangent
- 3) Obituary / Mimsey Unknown
- 4) Call For Papers / Neural Networks Readers
- 5) Press Release: Spyglass/NCSA Agreement Readers
- 5) The Real Story Carl Guderian
- 6) Legion Of Doom T-Shirt Ad Chris Goggans
- 7) Libertarian Party / Opposition To DTA Libertarian Pty
- 8) Unabom - 1 Million $ Reward William Tafoya
- 9) The Massachusetts Encryption Bill Unknown
- 10) Book Review: Information Warfare Scott Davis
- 11) Whisper Who, A Unix Tool (Source Code) Editors
- 12) Hacker Barbie Readers
- 13) The Well: A Small Town... Cliff Figillo
- 14) The Feminization Of Cyberspace Doctress Neutopia
- 15) Response To The Feminization Of Cyberspace Jason Webb
- 16) Easy-to-Use Kennedy Conspiracy Chart Gordon Fagan
- 17) Meeks Defense Fund MDF
- 18) HOPE - Hackers On Planet Earth Emmanual Goldstein
- 19) TV & Movie Mania Radio Show Lauren Weinstein
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- Special thanks to the anonymous reader who sent the software to my US Mail
- address...it was very cool. -Scott
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- The Journal Of American Underground Computing supports DEFCON II in Vegas!!
- We will be there, and we encourage you to do the same.
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- We've Tried to Be Nice: Other Ways to Fight Clipper
-
- by Carl Guderian (bjacques@cypher.com)
-
- (You've read about Clipper ad nauseam elsewhere, so refer to other sources
- if you still don't know about Clipper, the Digital Telephony Act, and
- everything else that will be lumped together here under the rubric of
- "Clipper." Start with John Perry Barlow's excellent "Jackboots on the
- Infobahn" in issue 2.04 of Wired Magazine. If you want balance, ask the NSA
- for its opinion and weigh it against our position that Clipper obviously
- blows. Onward.)
-
- The Situation, Spring 1994
-
- The Clinton White House is apparently steaming ahead on Clipper despite our
- perfectly reasonable arguments and well-mannered campaign against it. To
- John Perry Barlow (see intro) it plays like Invasion of the Body Snatchers
- II: The White House Years--formerly sensible folks replaced by pod people
- blandly assuring us that if "I could tell you what I know, you'd agree with
- me." No help there.
-
- Various industry consortia were ready to sell us down the slippery slope
- until the feds double-crossed them at the last minute by rescinding the
- offer to lift export controls on encryption in exchange for support for
- Clipper. An attempt to make RSA/PGP encryption a politico-economic fait
- accompli by sheer numbers of users is moving slowly, if at all (PGP really
- requires direct internet access, it's hard to use, and RSA's suing Phil
- Zimmerman so nobody else is going to dress it up for the market). The White
- House spooks may make a bigger splash in the market by ordering their
- 50,000 electronic keyholes than we can by passing out copies of PGP for
- free. We're fighting the enemy on its own turf and terms and we could lose.
- It's time to fight dirty. Below are a couple of suggestions.
-
- Mutt and Jeff
-
- Just as for every civil rights Freedom Rider there was a Black Panther, for
- every Pat Schroeder there's a Riot Grrl, and for every polished Dixiecrat
- Senator there was a KKK Nightrider, so must we field media streetfighters
- to complement our sincere and polite public spokesmen. The history of social
- progress (and, unfortunately, reaction) is that of good cop and bad cop.
- Opponents of Clipper must employ these Siamese twins of persuasion in order
- to get anywhere. If you've never been interrogated by police, customs
- officials, school principals, or corporate investigators, a little
- explanation of good cop/bad cop may help.
-
- In interrogations conducted in civilized countries, the object is to crack
- the interviewee without resorting to physical torture. The most effective
- method is good cop/bad cop. The bad cop, sent in first, acts enraged and
- threatens to beat the truth out of the suspect. He gleefully enumerates all
- the terrible things that can happen to an uncooperative suspect. Sometimes
- this alone works. If the prisoner stands firm (or is frozen with fear), the
- good cop comes to the rescue, radiating sympathy and bonhomie. He offers a
- cigarette, a friendly ear, and assurances that, he and the suspect are
- really on the same side.
-
- The good cop plays on the suspect's pride, suspicions, or other
- psychological weaknesses in order to get a voluntary confession. The good
- cop's presence carries the implied threat of the return of the bad cop if
- no confession is forthcoming. To accuse the good cop of waging psychological
- warfare is to miss the point. Psychological warfare is waged by adept
- deployment of both good and bad cops in order to break the prisoner.
- It's very effective against folks who don't know any better, especially
- young hackers, schoolkids, and Seattle scenesters en route to Vancouver.
-
- The Occult Technology of Power
-
- The point of the above digression is that a tool well-known to the
- authoritaries can be, and has been, used against them as well. As gays have
- learned, neither the noisy AIDS Die-ins by ACT-UP nor lobbying by advocacy
- groups is alone sufficient to win public support. Together the tactics work
- because they offer different levels on which the public can deal with issues
- (and people) that clearly won't go away.
-
- Clipper advocates already know the weakness of their position, so arguments
- are useless. They repeat the same arguments in hopes the public will get
- tired of hearing about it and simply sign the blank check. We must pre-empt
- the argument with bite-sized zingers. In the economy of attention, the
- market goes to the side with the pithiest arguments. When they say "law and
- order" we respond with "ATF." Such sound bites are Patriot Missiles that
- shoot down the other side's forensic Scuds. Channel the spirits of Dorothy
- Parker and Oscar Wilde. Give their straw man a hotfoot; they summon up
- nuclear terrorism, we resurrect the Branch Davidians. The issue doesn't lend
- itself to riotous demonstrations, but with a really good negative media
- campaign we can whip up a good hate frenzy against Clipper. We already do
- this somewhat, but we need to go further, with high concept slogans and
- catch phrases.
-
- "Clinton chip," like "Hooverville," has a dry, sharp ring to it, commanding
- attention like the snap of a bone. Plus, it yokes the President personally
- to the issue. If that sounds lame, try something else. The ancient
- techniques of propaganda apply here, wedded to the black art of meme/
- information virus theory. It's a media war, so we'll use a little McLuhan.
- (If you've read his stuff, you know his writing style was really disjointed,
- but sounded great! Which may be the point.) Slick attack ads, sound bites,
- rants to the editor, whisper campaigns, and other forms of media
- manipulation are in order. Anything short of gross distortion or outright
- lies is acceptable. The truth is scary enough and can be made to sound
- positively Lovecraftian, if we succeed in seizing the metaphors. Detourned
- ads such as "big brother inside" are a good start. The opportunities for
- satire are boundless, especially given the history of government projects.
- Emphasize how much more a Clippered future will play like "Brazil" than
- "1984."
-
- Why assume things will always work out for the Bad Guys Conspiracy? Want to
- bet that when the government buys Clipper chips the Secret Service, FBI,
- CIA, NSA, and State Department will probably spy on each other (since no one
- else will use it)? Or that when Clipper charges out the fortress gate its
- broken carcass will likely be flung back over the wall (i.e., it will be
- cracked and posted to the net)? How will they know I haven't sold my
- Clippered cellular phone at a garage sale? And so on.
-
- Negative campaigns don't by themselves win support, but reasonable words
- don't win much attention either. Both tricks must be played in their turn.
- Not good cop or bad cop, but good cop AND bad cop. A diverse battle plan
- gives sympathizers more options for action. Some folks like to lobby and
- others like to sling mud. Hey, we're a big tent. And the streetfighters can
- keep the lobbyists honest.
-
- Useful Idiots
-
- In order for an issue to get attention it should demonstrably arouse the ire
- of a number of large and unrelated groups. Right wing fundamentalist
- screwheads as well as flaming liberals stand to lose if Clipper becomes the
- law, so we put a bug in their respective ears in hopes of getting a
- response. Support for one's position comes from surprising places.
- Cyberpagans, for example, will be shocked to learn that Phyllis
- "Church Lady" Schlafly denounced Clipper in a syndicated column a couple of
- months back (she got a few details wrong, but you have to expect that).
- Equally shocking (at least to this writer) is Rush Limbaugh, avid computer
- user, so far passing up an opportunity to savage Clinton on Clipper. Liberal
- groups can be persuaded that a conservative Republican administration armed
- with Clipper would make J. Edgar Hoover look like Norbert the Narc.
-
- This strategy is aimed primarily at right wing groups for a number of
- reasons. They already hate the present Democratic administration. They're
- best at marshalling money and "good-ole-boy" clout. Right-wing paranoia is
- more entertaining than the left-wing variety, so it is more likely to be
- heard. To the Christian Right, for instance, Clipper carries the musky scent
- of the Beast 666, and they expect Clinton to spend a second term stamping
- our hands at the door of the Hellfire Club. And did you ever notice how
- many cypherpunks own guns? Play up the gun analogy.
-
- This avenue to political action is time-critical. If 1997 sees a Republican
- administration in place, right-wing groups will lose interest in attacking
- it. And since it was the Bush White House (or spooks within it) that
- proposed Clipper, you can bet the rent that President Dole, Quayle (!), or
- whoever will make it a fact of life quicker than you can say "national
- security." So much for looking to the Republicans for relief from Clipper.
-
- The Golden Apple of Discord
-
- Thank the Deist god of the Founding Fathers that our government is not a
- monolithic entity possessed of a single will. Battles are already underway
- over which agency gets the secret skeleton key to the Clipper escrow vault
- to bypass the official safeguards that won't work anyway. Getting the Crips
- and Bloods to make peace was a cakewalk compared to Clinton's efforts to get
- the Three Letter Agencies to talk to each other. As long as they must
- compete for funding it will be so.
-
- Not quite the end
-
- With a bit of work we can play up Clipper so that it attracts as much
- attention as the abortion, gun control, or gay rights issues have. Getting
- the cover of Newsweek was good; mainstream coverage in a proposal normally
- of interest only to propeller heads and conspiracy buffs is gratifying.
- Remember the fallout after the Hacker Crackdown of 1990? But sustained
- pressure is needed. Clinton's people need their noses rubbed in the sheer
- breadth of opposition to Clipper. If a White House aide hears "Clinton Chip"
- or something similar on the street, the President will hear of it and
- realize we're serious.
-
- Really the end
-
- According to a recent issue of Federal Computer Week, the NSA is adopting as
- it's mascot the armadillo. Maybe we can thank Bobby Ray Inman for this one.
- FCW recently ran a contest to name the "dillo." Entrants were asked to
- consider the NSA's reputation for prurience and the animal's best known
- habitat (the freeway center stripe). The contest is probably over by now,
- but "Roadkill" seemed to be the winner paws down. "Road rash," "Winston
- [Smith]," and "Harry Buttle" (the poor sap whose erroneous arrest and
- subsequent death under torture--er, information retrieval--trigger the
- events of "Brazil") were this author's favorites.
-
- Credits
-
- Many thanks go posthumously to Marshall McLuhan for his theory of
- perception, which states that most people see either the figure or the
- background (a vase or two faces?) but that true perception is seeing both
- figure and background. This seemed pretty wacky a year ago, but it makes a
- lot more sense now. Backhanded thanks go to a trio of Canadian customs
- guards at the Peace Bridge connecting Buffalo, NY to Ft. Erie, Ontario for
- personal instruction in the tactics of "good cop/bad cop". Thanks also to
- ReSearch (for PRANKS!), the Situationist International (including King Mob),
- Richard Dawkins (meme theory) and the late Count Alfred Korzybski (general
- semantics), for inspiration.
-
- Please wash your hands before leaving the 20th century.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- DEFCON UPDATE
-
- by Dtangent (dtangent@defcon.org)
-
-
- XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement
- XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement
- XXXXXXxxxxxxXXXXXX X X DEF CON II Convention Update Announcement
- XXXXXxxxxxxxxXXXXXXX X DEF CON II Convention Update Announcement
- XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON II Convention Update Announcement
- XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON II Convention Update Announcement
- XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON II Convention Update Announcement
- XXXxxxxxxxxxxxxXXXXXXXX DEF CON II Convention Update Announcement
- XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON II Convention Update Announcement
- XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON II Convention Update Announcement
- XXXXXXxxxxxxXXXXXXXXX X DEF CON II Convention Update Announcement
- XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement
- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement
-
- READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE
- DISTRUBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ
- ============================================================================
-
- What's this? This is an updated announcement and invitation to DEF CON II,
- a convention for the "underground" elements of the computer culture. We try
- to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
- Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
- Groups, CypherPunks, Futurists, Artists, Etc..
-
- WHO: You know who you are, you shady characters.
- WHAT: A convention for you to meet, party, and listen to some speeches
- that you would normally never hear.
- WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th)
- WHERE: Las Vegas, Nevada @ The Sahara Hotel
-
- So you heard about DEF CON I, and want to hit part II? You heard about the
- parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
- check it out in person? Load up your laptop muffy, we're heading to Vegas!
-
- Here is what Three out of Three people said about last years convention:
-
- "DEF CON I, last week in Las Vegas, was both the strangest and the best
- computer event I have attended in years." -- Robert X. Cringely, Info World
-
- "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas
-
- "Soon we were at the hotel going through the spoils: fax sheets, catalogs,
- bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds.
- The documents disappeared in seconds." -- Gillian Newson, New Media Magazine
-
- DESCRIPTION:
-
- Last year we held DEF CON I, which went over great, and this year we are
- planning on being bigger and better. We have expanded the number of
- speakers to included midnight tech talks and additional speaking on Sunday.
- We attempt to bring the underground into contact with "legitimate" speakers.
- Sure it's great to meet and party with fellow hackers, but besides that we
- try to provide information and speakers in a forum that can't be found at
- other conferences.
-
- While there is an initial concern that this is just another excuse for the
- evil hackers to party and wreak havok, it's just not the case. People come
- to DEF CON for information and for making contacts. We strive to distinguish
- this convention from others in that respect.
-
- WHAT'S NEW THIS YEAR:
-
- This year will be much larger and more organized (hopefully) than last year.
- We have a much larger meeting area, and have better name recognition.
- Because of this we will have more speakers on broader topics. Expect
- speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new
- things expected include:
-
- o An Internet connection with sixteen ports will be there, _BUT_ will only
- provide serial connections because terminals are too hard to ship. So
- bring a laptop with communications software if you want to connect to the
- network. Thanks to cyberlink communications for the connection.
-
- o There will be door prizes, and someone has already donated a Cell Phone
- and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead
- Addict.
-
- o Dr. Ludwig will present his virus creation awards on Sunday.
-
- o A bigger and better "Spot The Fed" contest, which means more shirts to
- give away.
-
- o More room, we should have tables set up for information distribution.
- If you have anything you want distributed, feel free to leave it on the
- designated tables. Yes, this year there will be a true 24 hour
- convention space.
-
- o A 24 hour movie / video suite where we will be playing all type of
- stuff.
- VHS Format. Mail me with suggested titles to show, or bring your own.
- We'll use a wall projector when not in use by speakers.
-
- o Midnight Tech Talks on Friday and Saturday night to cover the more
- technical topics and leave the days free for more general discussions.
-
- WHO IS SPEAKING:==========================================================
-
- This list represents almost all of the speakers verified to date. Some
- people do not want to be announced until the event for various reasons, or
- are waiting for approval from employers. A speaking schedule will go out
- in the next announcement.
-
-
- Phillip Zimmerman, Notorious Cryptographer & author of PGP.
- Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and
- "Computer Viruses, Artificial Life and Evolution"
- Loyd Blankenship (The Mentor), Net Running in the 90's and RPG.
- Padgett Peterson, Computer Enthusiest, Anti-Virus Programmer.
- The Jackal, A Radio Communications Overview, Digital Radio and the Hack
- Angle.
- Judi Clark, Computer Professionals for Social Responsibility.
- Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced.
- To be Announced, The Software Publishers Association, Topic to be Announced.
- Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics.
- Mark Lotter, Cellular Enthusiest, Hacking Cell Phones.
- Lorax, The Lighter Side of VMBs.
- Peter Shipley, Unix Stud, Q&A on Unix Security.
- George Smith, Crypt Newsletter, Virus Topic to be Announced.
- Cathy Compton, Attorney, Q&A Surrounding Seisure Issues, Etc.
- John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal.
- Red Five & Hellbender, Madmen With a Camcorder, Who Knows?
- Chris Goggans (Erik Bloodaxe), Wierd Wireless Psycho Shit.. Stay Tuned..
-
- There should be a few round table discussions on Virus, Cellular, Unix and
- something else surrounding the industry.
-
- I'll name the rest of the the speakers as they confirm. I'm still working
- on a few (Two?) people and groups, so hopefully things will work out and I
- can pass the good news on in the next announcement, or over our List Server.
-
- ============================================================================
-
- WHERE THIS THING IS:
-
- It's in Las Vegas, the town that never sleeps. Really. There are no clocks
- anywhere in an attempt to lull you into believing the day never ends. Talk
- about virtual reality, this place fits the bill with no clunky hardware. If
- you have a buzz you may never know the difference. It will be at the Sahara
- Hotel. Intel is as follows:
-
- The Sahara Hotel: 1.800.634.6078
- Room Rates: Single/Double $55, Tripple $65, Suite $120
- (Usually $200) + 8% tax
-
- Transportation: Shuttles from the airport for cheap.
-
- NOTE: Please make it clear you are registering for the DEF CON II
- convention to get the room rates. Our convention space price is
- based on how many people register. Register under a false name if
- it makes you feel better, 'cuz the more that register the better for
- my pocket book. No one under 21 can rent a room by themselves, so
- get your buddy who is 21 to rent for you and crash out. Try to contact
- people on the Interactive Mailing List (More on that below) and
- hook up with people. Don't let the hotel people get their hands on
- your baggage, or there is a mandatory $3 group baggage fee. Vegas
- has killer unions.
-
- OTHER STUFF:
-
- I'll whip up a list of stuff that's cool to check out in town there so if
- for some reason you leave the awesome conference you can take in some unreal
- sites in the city of true capitalism. If anyone lives in Las Vegas, I
- would appreciate it if you could send a list of some cool places to check
- out or where to go to see the best shows and I'll post it in the next
- announcement or in the program
-
- -o I am asking for people to submit to me any artwork, pictures, drawings,
- logos, etc. that they want me to try and include in this years program.
- I am tring to not violate any copywrite laws, but wat cool shit. Send
- me your art or whatever and I'll try and use it in the program, giving
- you credit for the work, of course. Please send it in .TIF format if it
- has more than eight bit color. The program will be eight bit black and
- white.
- -o in case you want to make adjustments on your side.
-
- *** NEW MAILING LIST SERVER ***
-
- We've finally gotten Major Dommo List Serv software working (Kinda) and it
- is now ready for testing. MTV spent alot of time hacking this thing to work
- with BSDi, and I would like to thank him. The purpose of the list is to
- allow people interested in DEF CON II to chat with one another. It would
- be very sueful for people over 21 who want to rent hotel space, but split
- costs with others. Just mention you have room for 'x' number of people, and
- I'm sure you'll get a response from somone wanting to split costs. Someone
- also suggested that people could organize a massive car caravan from
- Southern Ca. to the Con. My attitude is that the list is what you make of
- it. Here are the specifics:
-
- Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to
- technical problems, etc. I'll do another mass mailing to everyone letting
- them know that the list is up and how to access it. Sorry for the delay!
-
- MEDIA:
-
- Some of the places you can look for information from last year include:
-
- New Media Magazine, September 1993
- InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely
- Gray Areas Magazine, Vol 2, #3 (Fall 1993)
- Unix World, ???,
- Phrack #44
-
- COST:
-
- Cost is whatever you pay for a hotel room split however many ways, plus
- $15 if you preregister, or $30 at the door. This gets you a nifty 24 bit
- color name tag (We're gonna make it niftier this year) and your foot in the
- door. There are fast food places all over, and there is alcohol all over
- the place but the trick is to get it during a happy hour for maximum
- cheapness.
-
- ==========================================================================
-
- I wanted to thank whoever sent in the anonymous fax to Wired that
- was printed in issue 1.5 Cool deal!
-
- ===========================================================================
-
- FOR MORE INFORMATION:
-
- For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com
- in /pub/defcon. There are digitized pictures, digitized speeches and text
- files with the latest up to date info available.
-
- For email users, you can email dtangent@defcon.org for more information.
-
- For non-net people call:
-
- For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102,
- Seattle, WA, 98112
-
- For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone.
-
- A DEF CON Mailing list is maintained, and the latest announcements are
- mailed automatically to you. If you wish to be added to the list just send
- email to dtangent@defcon.org. We also maintain a chat mailing list where
- people can talk to one another and plan rides, talk, whatever. If you
- request to be on this list your email address will be shown to everyone,
- just so you are aware.
-
- STUFF TO SPEND YOUR MONEY ON:
-
- o Tapes of last years speakers (four 90 minute tapes) are available for $20
-
- o DEF CON I tee-shirts (white, large only) with large color logo on the
- front, and on the back the Fourth Amendment, past and present. This is
- shirt v 1.1 with no type-o's. These are $20, and sweatshirts are $25.
-
- o DEF CON II tee-shirts will be made in various colors this year, including
- a few long sleeve shirts. Sizes will be in large only again, with a
- few white mediums made. Shirts will be $15, Long Sleve $17, Sweat shirts
- will be $20.
-
- o We will have a few (ten maybe?) embroidered hats with this years logo.
- Not shure how much they will be.. like $10 maybe.
-
- o Full sized 4 color DEF CON II wall posters will be for sale for about $5.
-
- o Pre-Register for next year in advance for $15 and save half.
-
- o Make all checks/money orders/etc. out to DEF CON, and mail to the address
- above. Way above.
-
- If you have any confidential info to send, use this PGP key to encrypt:
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.3
-
- mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo
- dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf
- uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ
- hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50
- IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
- =ko7s
- -----END PGP PUBLIC KEY BLOCK-----
-
- - The Dark Tangent
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
- TO: EDITORS@FENNEC.COM
- Subject: OBITUARY - VAX 8600, aka Mimsy, dead at age 8
-
- An era of computing in the University of Maryland Computer Science
- Department came to an end Sunday, March 20th, when the Department's last
- VAX, an 8600, peacefully died in its sleep. After a power-down, the VAX,
- which had been off maintenance since July, 1993, was not able to boot as
- a result of a disk/controller that finally went bad.
-
- The 8600 had arrived in 1986 as the Department's most powerful machine
- and had been named "Brillig"; in November 1990, when the Department's VAX
- 11/785 was retired, the 8600 assumed the name and duties of "Mimsy" and
- had served in that capacity until its semi-retirement in July, 1994. At
- that time, the 8600 was renamed "Imladris" and the "Mimsy" moniker was
- bestowed upon a Sun SPARC 10/30.
-
- Along with being the last VAX, the 8600 was also the last UMD machine
- running the mutoid 4.3/4.3tahoe/4.3reno/Net-2 conglomeration (4.3BSD Torix,
- as it was called here) that emerged over the span of a decade of working
- with Unix. Although it is now gone, the hacks it helped inspire live on
- in locally-changed versions of the SunOS, Ultrix, OSF/1 and BSDI offerings
- in hundreds of other systems here.
-
- It is somewhat ironic that the VAX ended the way it did. Its demise
- was originally scheduled for earlier that week, when the 8600, after a short
- ceremony, was to have committed suicide. The machine would have, under its
- own free will and volition, executed (through the "cron" facility) a shell
- script prepared by Dr. Vax Kevorkian which would have issued an "rm -rf /"
- command. Onlookers were to have watched the process until the machine seized
- up, and would have then powered the machine down and gone to dinner.
-
- However, an earlier problem with the building Uninterruptible Power
- Supply (UPS) necessitated a load test for the 20th, and as a large consumer
- of power, it was decided the 8600 would remain on for this one last task. As
- a result of a short power-down during the UPS load test, the machine's
- mighty heart (ummm, disk) gave out.
-
- Funeral arrangements are not yet complete, but tentative plans call
- for shipping the remains to Chris Torek's apartment in Berkeley, as a token
- of the staff's appreciation. The staff has requested that all gifts of
- condolence be made to the University of Maryland's Dinner-for-Wayword-
- Hackers Fund; checks may be made payable to Pete Cottrell.
-
- MIMSY IS DEAD! LONG LIVE MIMSY!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CALL FOR PAPERS: Neural Networks for Automatic Target Recognition
-
- By Dept of Cognitive and Neural Systems (announce@retina.bu.edu)
-
- ATR is a many-faceted problem of tremendous importance in industrial and
- defense applications. Biological systems excel at these tasks, and neural
- networks may provide a robust, real-time, and compact means for achieving
- solutions to ATR problems. ATR systems utilize a host of sensing modalities
- (visible, multispectral, IR, SAR, and ISAR imagery; radar, sonar, and acoustic
- time series; and fusion of multiple sensing modalities) in order to detect
- and track targets in clutter, and classify them. This Special Issue will
- bring together a broad range of invited and contributed articles that
- explore a variety of software and hardware modules and systems, and
- biological inspirations, focused on solving ATR problems. We particularly
- welcome articles involving applications to real data, though the journal
- cannot publish classified material. It will be the responsibility of the
- submitting authors to insure that all submissions are of an unclassified
- nature.
-
- Co-Editors:
- -----------
- Professor Stephen Grossberg, Boston University
- Dr. Harold Hawkins, Office of Naval Research
- Dr. Allen Waxman, MIT Lincoln Laboratory
-
- Submission:
- -----------
- Deadline for submission: October 31, 1994
- Notification of acceptance: January 15, 1995
- Format: as for normal papers in the journal (APA format) and no longer
- than 10,000 words
-
- Address for Papers:
- -------------------
- Professor Stephen Grossberg
- Editor, Neural Networks
- Boston University
- Department of Cognitive and Neural Systems
- 111 Cummington Street
- Room 244
- Boston, MA 02215 USA
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- PRESS RELEASE: SPYGLASS/NCSA AGREEMENT
-
- From: Eric W. Sink (eric@spyglass.com)
-
- The following press release announces our new relationship with NCSA
- and Mosaic. I would like to prepend a clarification or two:
- Initially, Spyglass will sell Mosaic to volume users requiring a
- minimum of 5000 licenses per year. It is our intention to let the
- needs of smaller volume customers, including end-users, be met thru
- other channels.
-
- Also, remember that NCSA Mosaic, for Windows, Mac, and UNIX will
- continue to be freely available from NCSA. Development of the free
- versions will continue at NCSA, and Spyglass will be in collaboration
- with the NCSA development team.
-
- At Internet World Booth #609:
- For Immediate Release
-
- Spyglass Signs Agreement with NCSA to Enhance and Broadly Relicense
- Mosaic Graphical Browser for the Internet
- (C)1994 Internet World
- Commercial Windows and Macintosh Versions Available in June; X Windows
- Version to Follow in July
-
- INTERNET WORLD, SAN JOSE, Calif., June 1 -- Spyglass, Inc. and the
- National Center for Supercomputing Applications (NCSA) at the
- University of Illinois/Urbana-Champaign have entered into an agreement
- that will get Mosaic, NCSA's graphical browser for the Internet, to
- the desktops of millions of people. The agreement gives Spyglass full
- rights to enhance, commercialize and broadly relicense
- Mosaic. Spyglass is making a multimillion-dollar commitment to NCSA
- and will focus initially on developing a commercially enhanced version
- of Mosaic that other companies will incorporate with their products
- for distribution to their customers. The announcement was made today
- in San Jose, on the opening day of exhibits at the Spring '94 Internet
- World conference.
-
- Developed by NCSA, Mosaic gives users point-and-click access to the
- World Wide Web (WWW), an information retrieval system on the Internet
- with more than 2,300 graphical, multimedia databases of "hyperlinked"
- documents. The Internet is a vast "supernetwork" of public and private
- networks connecting thousands of organizations and an estimated 20
- million individual users. New users are joining the Internet at the
- rate of 2 million each month, and hundreds of new WWW servers are
- coming online every month. Because of the reach of the Internet, it
- offers an attractive vehicle for electronic publishing and for
- conducting business globally.
-
- "Mosaic and World Wide Web are two key ingredients for successful
- electronic publishing and commerce on the Internet. But, to date,
- businesses have tapped only a fraction of the Internet's potential
- because these tools haven't been commercially available. Working with
- NCSA, we're going to change this," said Douglas Colbeth, president of
- Spyglass, which was formed in 1990 and has commercialized other NCSA
- technologies.
-
- "We're committed to evolving Mosaic so it becomes a robust, commercial
- tool with complete documentation, technical support and advanced
- features," explained Tim Krauskopf, co-founder of Spyglass and
- developer of NCSA Telnet. "We'll be collaborating with NCSA and other
- key partners to create new tools and establish standards that will
- help organizations build robust World Wide Web information servers
- quickly and inexpensively."
-
- "It has been thrilling to see the universal acceptance of NCSA Mosaic
- as an interactive window into cyberspace," said Larry Smarr, director
- of the NCSA. "I am very pleased to see Spyglass making such a
- financial commitment to the commercialization of Mosaic, which frees
- NCSA up to develop the next level of functionality for the public
- domain. Spyglass has been a terrific technology partner for us in the
- past and we look forward to an even closer working relationship in the
- future."
-
- "We welcome Spyglass as our partner in this effort because of the
- company's track record in commercializing other NCSA technologies and
- our rapidly developing close working relationship with the people at
- Spyglass," said Joseph Hardin, associate director of NCSA's software
- program. "Spyglass gives us the cross-platform development, global
- distribution and ongoing financial resources we need to take the
- Mosaic environment to the next level. With this commercialization
- arrangement with Spyglass in place, NCSA is freed to continue to
- develop core technologies for Mosaic as well as new technologies that
- leverage the Internet. We encourage companies to take advantage of
- this new relationship with Spyglass and contact them about volume
- licensing arrangements for Mosaic technology."
-
- Mosaic has been called the "killer application" for the Internet
- because it lets users navigate the Internet by browsing through a
- series of graphical, multimedia documents. The WWW was developed
- several years ago by CERN, a European consortium of scientists based
- in Switzerland, to keep track of researchers' information and to
- provide an easy method of sharing data. Subsequently, WWW has grown
- into one of the world's most open and widely used environments for
- information publishing, browsing and retrieval.
-
- WWW servers contain eye-catching documents with built-in links to
- other documents, allowing the user to move easily and naturally around
- the Internet. With Mosaic, users can browse through page after page of
- menus, hyperlinked to data dispersed all over the world, without
- having to know the location or network address of the information they
- are seeking.
-
- Spyglass has re-architected Mosaic so it will be a more robust and
- full-featured tool. Enhancements available in Enhanced NCSA Mosaic
- from Spyglass include improved installation, better memory management,
- increased performance, new forms capabilities, online hypertext-based
- help, support for a proxy gateway and user interface improvements such
- as support for multiple windows. Future versions will include enhanced
- security and authentication, which will enable credit-card and other
- business transactions to take place on the Internet; filters that will
- enable documents from popular document readers to be read seamlessly
- by Mosaic; and integration with emerging editing and document
- management tools. A number of businesses are already using Mosaic and
- WWW to publish magazines, deliver goods and services, provide
- technical support to customers and conduct other forms of business
- electronically. For example, Mosaic and WWW are part of the recently
- announced $12 million CommerceNet project, a public- and
- private-sector-backed initiative exploring various ways to conduct
- commerce over the Internet and other data networks. NCSA will continue
- to maintain a public-with-copyright version of Mosaic, which Internet
- users can download for free from the Internet. NCSA, which began
- distributing Mosaic in the late fall, estimates that more than one
- million people use Mosaic and that more than 30,000 copies are being
- downloaded each month.
-
- Spyglass will be targeting the following types of customers as initial
- prospects for large-scale Mosaic client licensing agreements: computer
- systems and communications vendors, publishers and content providers,
- and online information service providers. For example, a publisher
- might want to include Mosaic with a subscription to an online magazine
- or a computer vendor might want to include Mosaic with each system
- sold. By building WWW servers themselves and distributing Mosaic
- clients to their customers, businesses can easily use this system for
- communicating with customers, providing technical support,
- distributing product and marketing information and other kinds of
- commerce.
-
- Enhanced NCSA Mosaic from Spyglass will be available for Microsoft
- Windows and Apple Macintosh desktop computers this month and for X
- Windows computers in July. To navigate the Internet, Mosaic users
- require a direct connection to the Internet or a PPP or SLIP
- connection. Enhanced NCSA Mosaic from Spyglass will be priced
- aggressively for high-volume distribution, enabling licensees to
- incorporate Mosaic into their products and services for a modest
- cost. For more information about Enhanced NCSA Mosaic from Spyglass,
- contact Spyglass directly at (217) 355-6000, mosaic@spyglass.com or
- http://www.spyglass.com/.
-
- The National Center for Supercomputing Applications, based at the
- University of Illinois at Urbana-Champaign, is supported by grants
- from the National Science Foundation, other federal agencies, the
- State of Illinois, the University of Illinois and corporate partners.
-
- Founded in 1990, Spyglass, Inc. is the leading developer of visual
- data analysis tools for the engineering and scientific marketplace,
- which support Windows, Macintosh and UNIX platforms. The company's
- venture-capital partners include Greylock Management of Boston,
- Mass. and Venrock Associates of New York City.
-
- Spyglass is a registered trademark of Spyglass, Inc. All other brands
- or products are trademarks or registered trademarks of their
- respective holders and should be treated as such.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- THE REAL STORY
-
- By Carl Guderian (bjacques@cypher.com)
-
- The Real Story
-
- (The following report is a compilation of printed materials and transcripts
- of personal interviews conducted by the author(s). In the course of this
- exhaustive research we have come to feel that, given the controversial
- nature of the subject matter, it is best that the authors as well as their
- primary sources be kept confidential. Perhaps it is just as well, as the
- events depicted in the report are years or decades in the past. Many of the
- principals are retired or dead and, therefore, beyond any earthly reward or
- revenge. The author(s) may be dead, too. In this line of journalism, that is
- very likely.
-
- 1994, Leopold & Loeb, Media Consultants)
-
-
- Employee Motivation Seminars
-
- Employee motivational seminars are a modern management tool, predicated on
- the assumption that external motivation, whether carrot or stick or
- combination thereof, is insufficient to move employees to give 110% to the
- job; rather, internal motivation must be cultivated in the employees
- somehow. Motivational seminars, usually conducted by outside consulting
- firms, employ a variety of techniques, from survey questionnaires to group
- exercises to meditation. These seminars have become enormously popular since
- their introduction in the 1950s (mostly in sales-related fields then), as
- they present a real advance over basic reward/punishment systems (-Theories
- X and Y+) or even Frederick W. Taylor's scientific methods. More
- importantly, they have actually worked. Workplace productivity has markedly
- increased since the introduction of motivational seminars.
-
- However, no innovation is universally welcomed. Recently, deeply religious
- employees have begun to level serious accusations against motivational
- seminars, declaring the programs promote a socialistic or New Age ethic. A
- socialistic attitude, they argue, will lead otherwise sensible people to
- embrace a world government under the Anti-Christ, as predicted in the Book
- of Revelation in the Christian Bible (as interpreted by fundamentalist
- Christians). A related and more serious charge is that the meditation
- techniques (such as those used in the Krone program) open employees to
- possession by demons. The latter charge is the focus of this report.
-
- The diabolical connection is real. Employee motivational seminars did indeed
- spring from an arrangement between American industry and the Prince of
- Darkness. Satan respects Americans like he respects no other people because
- it was an American, Daniel Webster, who defeated him in court, using his
- wits. Others have beaten the Devil, but only through invoking the powers of
- Heaven, a tactic akin to bringing in grownups to restrain a schoolyard
- bully. American corporate executives cut a deal with the Devil to deliver
- the souls of underlings in exchange for the usual favors. Though the souls
- of corporate employees are industrial grade, and therefore not worth as much
- as the souls of the elite, an executive must deliver a number of them in
- exchange for infernal favors. Paradoxically, the worth of elite American
- souls has risen in direct proportion to the degradation in the worth of
- those of followers. The perfect mechanism for delivering B-grade souls by
- the bushel is, of course, an employee motivational seminar, in which large
- numbers of workers are possessed at once (By the way, television evangelists
- work the same way; their mass public healings are actually mass
- possessions).
-
- This cozy arrangement between American leaders and Satan has served both
- sides well. Demons consider possession of Americans to be a kind of working
- vacation, a welcome relief from tormenting the damned souls toiling
- eternally in the flaming dung-pits of Hell. Not that this isn't enjoyable
- work, but even a demon likes a change of scenery. Satan and his lieutenants
- can dole out plum earthside assignments for demonic devotion, thus
- reinforcing the infernal hierarchy. American leaders, of course, get the
- usual rewards of power, sexual potency (or firm breasts and derriere), and
- that Christmas bonus for boosting corporate productivity while laying off
- excess workers.
-
- Lately, however, the system's inherent problems have begun to manifest
- themselves. As motivational seminars have gained in popularity, they have
- increased the demand for demons. As the innovation has become more
- widespread, it has ceased to be a competitive advantage. In Hell, too, the
- system's success has presented similar problems, and Satan is now seems
- ready to pull out of the deal.
-
- The shortage of demons is a Hellish fact. Present-day demons, of course, are
- the same ones who participated in the original rebellion of Lucifer (now
- Satan). All the angels were created at once, and no new ones have been made
- since. The pool of demons, then, is a subset of that group. Occasionally a
- truly wicked soul is promoted to demon status, but equally often a demon is
- devoured by an angry superior (a la C. S. Lewis' The Screwtape Letters). On
- the whole, the supply of demons should be considered to be fixed.
-
- In the early years of the program, American executives were pleased to see
- their employees possessed by only the most hard-working demons. Today,
- however, all the good ones are taken. Latter-day possessions by demons of
- procurement fraud, office-supply theft, and general loafing on the job have
- taken their toll on the system. Worse, even the best and brightest demons
- seem to have gone native or become Americanized, becoming easily distracted
- by the attractions of our post-industrial society or falling dangerously
- into sympathy with the modern worker. One formerly trustworthy (!) demon
- was even caught committing workplace sabotage in solidarity with his
- co-workers! An embarrassed Satan had to deal personally with the matter.
- All in all, the phrase working like a demon has begun to lose its cachet.
-
- As more corporations jumped on the infernal bandwagon, they found that the
- employees of their competitors were performing equally well (or recently,
- equally poorly). Worse, as the quality of the everyday American soul has
- declined, many hapless executives have found themselves caught short. In one
- company, the worth of the workers' souls had fallen drastically between the
- signing of the contract and the possession of the workers. The contracting
- executive killed a fellow executive (who was his wife - also on the infernal
- take) over the shrinking soul pie at their company in order to hold up his
- end of the bargain, lest he be forced to hand over his own soul. It didn't
- help. The wife caught up with him in Hell.
-
- Meanwhile, in Hell the situation has also deteriorated. Eventually all
- demons have been recruited earthside, so the dream ticket has ceased to be a
- credible reward for exemplary effort. Furthermore, production in the Satanic
- Mills is down. Temporarily out of sight of their demon overseers, damned
- souls have begun shirking on the eternal job.
-
- By piecing together accounts channeled through trance mediums (leaks are now
- worse than ever!), the authors have been able to determine that Satan has
- begun revoking all contracts dealing with motivational seminars, releasing
- the possessed workers and taking back favors bestowed on contractees. This
- may partly explain the recent decline of the old industrial corporations in
- favor of information technology firms, in which traditional religious values
- are relatively absent.
-
- Thus, the era of employee motivation seminars seems to be drawing to a
- close. The heyday of private economic deals with the Devil seems to be over
- as well. Overheard executive conversatons reveal that Satan is simply not
- interested in any more such contracts. Though some may be tempted to see the
- above episode as another case of the power elite enlisting the powers of
- Hell to fuck over the little guy, they should look at the larger picture and
- realize the system seems to have taken care of itself according to the laws
- of the Free Market. The Invisible Hand really does seem to work.
-
-
- Postscript
-
- It now appears that Satan plans to compete in the world labor market after
- having seen the prevailing trend toward cheaper labor. He has an advantage
- over the Chinese, who lead the market using convict/slave labor. Political
- prisoners have to be fed bread and water and must be allowed 3 or 4 hours of
- sleep a day. The damned souls of Hell, of course, eat nothing and work
- tirelessly twenty-four hours a day, seven days a week. The Devil now knows
- quite a bit about management theory (in relation to his demonic supervisors)
- and wants to recall them to Hell to oversee the re-engineering of Hell's
- production lines. Modern world leaders thinking to hold off this development
- are doomed to failure. Hell has on its side such notables as Albert Speer,
- Josef Stalin, Adolf Eichmann, and Roy Cohn (to handle the legal work) and
- will soon have Henry Kissinger to handle international relations. Given a
- team like that, it's only a matter of time.
-
- Post-postscript
-
- The original (now void) contracts are sought-after collectors items, not the
- least for their blackmail value. Even when the signatories are beyond
- blackmail, as in the case of the aforementioned executive and his wife,
- their contracts are worth a lot simply as works of art. The Devil is a
- traditionalist at heart, and insists that contracts be handwritten by demons
- noted for their calligraphic skill and that the documents bear his seal and
- those of major demons acting as witnesses. The early contracts (pre-1983)
- are worth the most, as they are the most visually stunning and bear the
- names of America's best and brightest of the time, as well as the seals of
- Hell's best known demons and devils.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
- LEGION OF DOOM T-SHIRTS!! Get 'em
-
- By Chris Goggans <phrack@well.sf.ca.us>
-
- After a complete sellout at HoHo Con 1993 in Austin, TX this past
- December, the official Legion of Doom t-shirts are available
- once again. Join the net luminaries world-wide in owning one of
- these amazing shirts. Impress members of the opposite sex, increase
- your IQ, annoy system administrators, get raided by the government and
- lose your wardrobe!
-
- Can a t-shirt really do all this? Of course it can!
-
- --------------------------------------------------------------------------
-
- "THE HACKER WAR -- LOD vs MOD"
-
- This t-shirt chronicles the infamous "Hacker War" between rival
- groups The Legion of Doom and The Masters of Destruction. The front
- of the shirt displays a flight map of the various battle-sites
- hit by MOD and tracked by LOD. The back of the shirt
- has a detailed timeline of the key dates in the conflict, and
- a rather ironic quote from an MOD member.
-
- (For a limited time, the original is back!)
-
- "LEGION OF DOOM -- INTERNET WORLD TOUR"
-
- The front of this classic shirt displays "Legion of Doom Internet World
- Tour" as well as a sword and telephone intersecting the planet
- earth, skull-and-crossbones style. The back displays the
- words "Hacking for Jesus" as well as a substantial list of "tour-stops"
- (internet sites) and a quote from Aleister Crowley.
-
- --------------------------------------------------------------------------
-
- All t-shirts are sized XL, and are 100% cotton.
-
- Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for
- postage.
-
- Send checks or money orders. Please, no credit cards, even if
- it's really your card.
-
-
- Name: __________________________________________________
-
- Address: __________________________________________________
-
- City, State, Zip: __________________________________________
-
-
- I want ____ "Hacker War" shirt(s)
-
- I want ____ "Internet World Tour" shirt(s)
-
- Enclosed is $______ for the total cost.
-
-
- Mail to: Chris Goggans
- 603 W. 13th #1A-278
- Austin, TX 78701
-
-
- These T-shirts are sold only as a novelty items, and are in no way
- attempting to glorify computer crime.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- LIBERTARIAN PARTY ANNOUNCES OPPOSITION TO DIGITAL TELEPHONY ACT
-
- NEWS FROM THE LIBERTARIAN PARTY
- 1528 Pennsylvania Avenue SE
- Washington DC 20003
-
- For additional information:
- Bill Winter, Director of Communications
- (202) 543-1988
-
-
-
- Calling it a "serious infringement of civil liberties and a
- gross violation of property rights," the Libertarian Party National
- Committee unanimously voted to oppose the Digital Telephony and
- Communications Act of 1994.
-
- At their quarterly meeting in Kansas City, Missouri, the
- governing body of America's third-largest political party charged that
- "the Digital Telephony Act would make furnishing the FBI with easy
- wiretapping capability the overriding priority for designers of
- telephone equipment and related software."
-
- "It is a lie to call this legislation a 'Privacy Improvement
- Act,'" said Bill Evers, the National Committee member from California
- who sponsored the resolution.
-
- The Digital Telephony Act, noted the resolution, "requires
- telephone, cable television, and computer network companies to ensure
- that the government can conduct surveillance while private communication
- is going on. It requires the installation of surveillance-facilitating
- software in telephone switching equipment to expose personal information --
- such as telephone-calling patterns, credit card purchases, banking
- records, and medical records -- to the view of the government."
-
- "Such personal information should be the private property of
- either the company that assembles it or the individual to whom it
- pertains," said Evers.
-
- Libertarians also oppose the Digital Telephony Act because it
- "would require a fundamental re-engineering of the communications
- infrastructure at great expense to American taxpayers, and to the
- owners of private communications systems," said Evers.
-
- The Libertarian National Committee also unanimously voted to
- oppose the National Security Agency's Escrowed Encryption Standard -
- the so-called Clipper Chip system - or any "government policies
- promoting or requiring specific encryption methods for civilian use."
- The party also urged the "repeal of the U.S. ban on export abroad of
- Clipper-free encryption devices produced by American companies."
-
- "Government-mandated encryption standards will foster
- indiscriminate surveillance of private communications by the
- government," charged Evers.
-
- The resolution said "the Clinton Administration plans to induce
- American manufacturers to install government-readable encryption devices
- in every telephone, fax machine, and computer modem made in the United
- States."
-
- "The Clinton Administration is explicitly denying that the
- American people have the right to communicate in private," said Evers.
- By contrast, he said, "The Libertarian Party has long upheld the civil
- liberties of the American citizen."
-
- Approximately 120 Libertarians serve in elected and appointed
- office around the country, including four State Representatives in New
- Hampshire and two mayors in California. The Libertarian Party platform
- calls for vigorous defense of the Bill of Rights, free enterprise,
- civil liberties, free trade, and private charity.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
-
- UNABOM
- $1,000,000 Reward
- SERIES OF 14 UNSOLVED BOMBINGS
-
-
- William L. Tafoya, Ph.D. Special Agent, FBI
- UNABOM Task Force, San Francisco, CA (btafoya@orion.arc.nasa.gov)
-
-
- Beginning in May, 1978, a series of 14 bombing incidents have
- occurred across the United States for which there is no apparent
- explanation or motive. No person or group has been identified as
- the perpetrator(s) of these incidents. The explosions have taken
- place in seven states from Connecticut to California. As a result
- of these bombings, one person has been killed and 23 others
- injured, some grievously. There had been no incidents identified
- with this series of bombings since 1987. However that changed in
- late June, 1993, when a well known geneticist residing in Tiburon,
- California, and a renown computer scientist from Yale University,
- New Haven, Connecticut, opened packages which had been mailed to
- them and both were severely injured when these packages exploded.
-
- In the past, targets of the bomber have been associated with
- the computer industry, the aircraft and airline industry and
- universities. Seven of these devices have been mailed to specific
- individuals and the other seven have been placed in locations
- which suggest there was no specific intended victim. All but two
- of the explosive devices functioned as designed and exploded. All
- 14 crimes, dubbed "UNABOM", have had common effects: all have
- caused terror, grief, and fear. On September 11, 1985, Hugh
- Scrutton, the owner of the Rentech Computer Company, in
- Sacramento, California, was killed by one of these diabolic
- devices. The two most recent victims narrowly escaped death.
-
- In response to the June, 1993, events, the Attorney General
- directed that a task force of federal law enforcement agencies be
- reestablished to urgently investigate and solve these crimes. The
- UNABOM Task Force, consisting of investigators from the FBI, ATF,
- and the U.S. Postal Inspection Service, has been operational in
- San Francisco and Sacramento, California, since July 12, 1993, and
- is dedicated exclusively to the investigation of these crimes.
-
- Among the clues in the case are the following words in what
- appears to be a note possibly written by the bomber as a reminder
- to make a telephone call: "call Nathan R--Wed 7PM." The UNABOM
- Task Force believes that "Nathan R" may be associated, perhaps
- innocently, with the bomber and that "Nathan R" may have received
- a telephone call from the bomber on a Wednesday prior to the June,
- 1993 bombings.
-
- The two most recent tragic bombings illustrate the senseless
- and tragic consequences of these crimes and demonstrate the urgent
- necessity of solving this case. This serial bomber will strike
- again. We do not know who the next victim will be. We do believe
- that there is someone out there who can provide the identity of
- the person or persons responsible for these crimes. This person
- may be a friend, a neighbor, or even a relative of the bomber(s).
-
- UNABOM's chronology is as follows:
-
- 1) Northwestern University
- Evanston, Illinois
- May 25, 1978
-
- A package was found in the Engineering Department parking lot
- at the Chicago Circle Campus of the University of Illinois. The
- package was addressed to an Engineering Professor at Rensselaer
- Polytechnic Institute in Troy, New York. The package had a return
- address of a Professor at Northwestern's Technological Institute.
- The package was returned to the addressor who turned it over to
- the Northwestern University Police Department because he had not
- sent the package. On May 26, 1978 the parcel was opened by a
- police officer who suffered minor injuries when the bomb
- detonated.
-
- 2) Northwestern University
- Evanston, Illinois
- May 9, 1979
-
- A disguised explosive device which had been left in a common
- area in the University's Technological Institute, slightly injured
- a graduate student on May 9, 1979, when he attempted to open the
- box and it exploded.
-
- 3) Chicago, Illinois
- November 15, 1979
-
- An explosive device disguised as a parcel was mailed from
- Chicago for delivery to an unknown location. The bomb detonated
- in the cargo compartment of an airplane, forcing it to make an
- emergency landing at Dulles Airport. Twelve individuals were
- treated for smoke inhalation. The explosion destroyed the
- wrapping to such an extent that the addressee could not be
- determined.
-
- 4) Chicago, Illinois
- June 10, 1980
-
- A bomb disguised as a parcel postmarked June 8, 1980 was
- mailed to an airline executive at his home in Lake Forest,
- Illinois. The airline executive was injured in the explosion.
-
- 5) University of Utah
- Salt Lake City, Utah
- October 8, 1981
-
- An explosive device was found in the hall of a classroom
- building and rendered safe by bomb squad personnel.
-
- 6) Vanderbilt University
- Nashville, Tennessee
- May 5, 1982
-
- A wooden box containing a pipe bomb detonated on May 5, 1982,
- when opened by a secretary in the Computer Science Department.
- The secretary suffered minor injuries. The package was initially
- mailed from Provo, Utah on April 23, 1982, to Pennsylvania State
- University and then forwarded to Vanderbilt.
-
- 7) University of California
- Berkeley, California
- July 2, 1982
-
- A small metal pipe bomb was placed in a coffee break room of
- Cory Hall at the University's Berkeley Campus. A Professor of
- Electrical Engineering and Computer Science was injured when he
- picked up the device.
-
- 8) Auburn, Washington
- May 8, 1985
-
- A parcel bomb was mailed on May 8, 1985, to the Boeing
- Company, Fabrication Division. On June 13, 1985, the explosive
- device was discovered when employees opened it. The device was
- rendered safe by bomb squad personnel without injury.
-
- 9) University of California
- Berkeley, California
- May 15, 1985
-
- A bomb detonated in a computer room at Cory Hall on the
- Berkeley Campus. A graduate student in Electrical Engineering
- lost partial vision in his left eye and four fingers from his
- right hand. The device was believed to have been placed in the
- room several days prior to detonation.
-
- 10) Ann Arbor, Michigan
- November 15, 1985
-
- A textbook size package was mailed to the home of a
- University of Michigan Professor in Ann Arbor, Michigan from Salt
- Lake City. On November 15, 1985, a Research Assistant suffered
- injuries when he opened the package. The Professor was a few feet
- away but was not injured.
-
-
- 11) Sacramento, California
- December 11, 1985
-
- Mr. Hugh Scrutton was killed outside his computer rental
- store when he picked up a device disguised as a road hazard left
- near the rear entrance to the building. Metal shrapnel from the
- blast ripped through Scrutton's chest and penetrated his heart.
-
- 12) Salt Lake City, Utah
- February 20, 1987
-
- On February 20, 1987, an explosive device disguised as a road
- hazard was left at the rear entrance to CAAMs, Inc. (computer
- store). The bomb exploded and injured the owner when he attempted
- to pick up the device.
-
- 13) Tiburon, California
- June 22, 1993
-
- On June 22, 1993, a well known geneticist received a parcel
- postmarked June 18, 1993, at his residence. The doctor attempted
- to open the package at which time it exploded severely injuring
- him. It has been determined that this parcel was mailed from
- Sacramento, California.
-
- 14) Yale University
- New Haven, Connecticut
- June 24, 1993
-
- On June 24, 1993, a Professor/Computer Scientist at Yale
- University attempted to open a parcel which he had received at his
- office. This parcel exploded severely injuring him. It has been
- determined that this parcel was mailed from Sacramento, California
- on June 18, 1993.
-
- At this time, the UNABOM Task Force would appeal to the
- public for assistance. For this purpose, a one million dollar
- reward is being offered for information which results in the
- identification, arrest and conviction of the person(s)
- responsible. Contact the UNABOM Task Force at 1-(800) 701-
- 2662.
-
-
-
- William L. Tafoya, Ph.D.
- Special Agent, FBI
- UNABOM Task Force
- San Francisco, CA
- btafoya@orion.arc.nasa.gov
-
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
-
- MASSACHUSETTS ENCRYPTION BILL
-
-
- THE STATE OF MASSACHUSETTS
-
- MASSACHUSETTS 179TH GENERAL COURT -- 1994 REGULAR SESSION
-
- HOUSE NO. 4491
- BY MR. COHEN OF NEWTON, PETITION OF DAVID B. COHEN AND ANOTHER RELATIVE
- TO ESTABLISHMENT OF THE PRIVACY OF PERSONAL RECORDS LAW AND REGULATING THE
- TECHNOLOGY OF DATA ENCRYPTION. THE JUDICIARY.
-
-
- February 25, 1994
-
- AN ACT RELATIVE TO THE TECHNOLOGY OF DATA ENCRYPTION.
- Be it enacted by the Senate and House of Representatives in General
- Court assembled, and by the authority of the same, as follows:
-
- SECTION 1. The General Laws are hereby amended by inserting after
- chapter sixty-six A the following chapter:
-
- CHAPTER 66B. MASSACHUSETTS PRIVACY OF PERSONAL RECORDS ACT.
-
- Section 1. For the purposes of this chapter the following terms shall
- have the following meanings:
-
- "Personal data files", any machine readable information or information
- in a state of electronic, optic, or other computer based transmission
- which is capable of being read, stored, copied, transmitted, changed,
- or deleted by or through computer or telecommunications devices and
- which relates to or describes any person, including a corporation,
- partnership or sole proprietorship, or such person's real or personal
- property. It shall include, but not be limited to, magnetic tapes,
- disks, cartridges, floppy disks, CD-ROM's, optical cubes or other
- optical storage devices, documents printed in magnetic ink or OCR
- symbol sets, and any other medium capable of being read or stored at
- high speed, in large volume, or without substantial human
- intervention. The term denotes the substance of the information as
- distinguished from the incidental medium of its storage or
- transmission.
-
- " Encrypted" , changed in form by programmed routines or algorithms so
- as to be unintelligible to any person without employing a suitable
- decryption routine or algorithm.
-
- "Decryption", the reverse process of encryption, so as to restore any
- data so encrypted to its original, human readable form.
-
- "Routine or algorithm", any series of discrete steps in a computer,
- microprocessor, or calculator native machine language which is
- performed as a unit to encrypt or decrypt data, or to present such
- decrypted data on an end user display medium; provided, however, that
- it shall not include source code written in any human readable
- language.
-
- "End user display medium", a video display terminal or paper.
-
- "Source code", any programming language used to produce the native
- machine language described in the definition of "routine or
- algorithm".
-
- "Authorized end user", any person, including a corporation,
- partnership, sole proprietorship, or governmental body for whose
- specific use the data in question is produced. If shall specifically
- exclude any person, including a corporation, partnership, sole
- proprietorship, or governmental body into or through whose possession
- said data may pass before reaching said authorized end user.
-
- "Numeric data", symbols representing exclusively quantities. It shall
- specifically exclude expressions containing number which represent
- nonnumeric entities including, but not limited to, social security
- numbers, license numbers, bank account numbers, street addresses, and
- the like.
-
- "Custodian", a person, including a corporation, partnership, sole
- proprietorship, or governmental body, that has access of any kind
- whatsoever to personal data files.
-
- "Live data", any personal data which currently represents or at any
- time in the past had represented any actual person, including a
- corporation, partnership, or sole proprietorship or such person's
- property.
-
- SECTION 2. Personal data files within the commonwealth shall be
- encrypted.
-
- SECTION 3. Decryption of encrypted data may be accomplished only by,
- for, or on behalf of the authorized end user of such data, and only to
- render such data into human readable form for the use of such
- authorized end user or an end user display medium. Any intermediate
- storage or transmission of decrypted data in machine readable form
- shall be a violation of this chapter.
-
- SECTION 4. Machine executable routines or algorithms used to decrypt
- encrypted data shall reside only in those routines or algorithms which
- present the data to authorized end users upon end user media. Source
- code for such routines or algorithms shall reside only at the situs of
- the authorized end user or at the situs of a party engaged in the
- development or maintenance of said source code. No party so engaged
- may use live data for any purpose whatsoever except as provided in this
- chapter.
-
- SECTION 5. Any copy, excerpt, summary, extension, transmission, or
- other transfer of any personal data, whether or not originally
- encrypted, shall be encrypted during such transfer until it reaches
- the authorized end user.
-
- SECTION 6. Notwithstanding any other provision of this chapter,
- numeric data may be stored in decrypted form during testing of summary
- or other numeric routines or algorithms in connection with development
- or maintenance of software whose purpose is the processing or display
- of such data for the use of the authorized end user, where such testing
- would be rendered impossible or unreasonably burdensome using
- encrypted data. For the purposes of this section, amounts used to
- calculate simple algebraic sums shall not qualify for decrypted storage
- under this section.
-
- SECTION 7. Notwithstanding any other provision of this chapter, any
- personal data which is stored and maintained exclusively or generally
- for the purpose of providing access to such data by the public shall be
- exempted for the encryption requirements this chapter. The exemption
- provided hereby shall extend to excerpts, and compilations of such
- data, however and by whomever used. Any and all other data from other
- sources which are not specifically exempted under this section or under
- sections nine or ten shall be encrypted, whether or not merged,
- appended, inserted, or otherwise attached to exempted data, and are
- subject to all of the provisions of this chapter in the same manner as
- if such exempted data did not exist.
-
- SECTION 8. Notwithstanding any other provision of this chapter, any
- routines or algorithms used for the decryption of encrypted data may
- be provided to the appropriate law enforcement agencies for the purpose
- of assuring compliance with various national, state, and local laws.
- For the purposes of this section, such law enforcement agencies shall
- be considered authorized end users.
-
- SECTION 9. Notwithstanding any other provision of this chapter, any
- person may waive the protections afforded by this chapter. Evidence of
- such waiver must be given in writing by such person to each custodian
- of data pertaining to said person. When more than one person is
- entitled to protection under this chapter, by virtue of joint ownership
- or other such relationship, no waiver shall be effective unless signed
- by all parties so involved. Such waiver shall be construed to waive
- protection only with respect to the specific kinds or elements of
- information enumerated on its face, and shall operate to exclude only
- encryption of said data by the particular custodian of such data as is
- named in said waiver and in whose possession to waiver is kept. The
- waiver may operate in perpetuity or be limited to a particular time.
- Any ambiguities in any waiver given under this section shall be
- resolved in favor of encryption of the most data colorable under its
- terms.
-
- SECTION 10. Notwithstanding any other provision of this chapter,
- decrypted data may be stored in a secure location apart from the situs
- of any user of such data, provided that the sole purpose to which such
- data shall be put shall be to restore data which has been lost or
- corrupted. Any routines or algorithms used to restore used files using
- said decrypted data shall employ encryption rountines or algorithms as
- required by this chapter. For the purposes of this section, decryption
- routines or algorithms may be considered lost or corrupted if a
- reasonable belief exists that security employed in the custody of such
- routines or algorithms has been breached.
-
- SECTION 11. Reasonable security shall be employed by persons in the
- management of the routines and algorithms used for the encryption and
- decryption of data, as required by this chapter. Such secuirty shall
- consist as a minimum in the storage of such routines and algorithms at
- one situs and the nature and location of its associated data at
- another.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- BOOK REVIEW: INFORMATION WARFARE
- CHAOS ON THE ELECTRONIC SUPERHIGHWAY
- By Winn Schwartau
-
- INFORMATION WARFARE - CHAOS ON THE ELECTRONIC SUPERHIGHWAY
- By Winn Schwartau. (C)opyright 1994 by the author
- Thundermouth Press, 632 Broadway / 7th floor / New York, NY 10012
- ISBN 1-56025-080-1 - Price $22.95
- Distributed by Publishers Group West, 4065 Hollis St. / Emeryville, CA 94608
- (800) 788-3123
-
- Review by Scott Davis (dfox@fennec.com)
-
- If you only buy one book this year, make sure it is INFORMATION WARFARE!
- In my 10+ years of existing in cyberspace and seeing people and organizatons
- debate, argue and contemplate security issues, laws, personal privacy,
- and solutions to all of these issues...and more, never have I seen a more
- definitive publication. In INFORMATION WARFARE, Winn Schwartau simply
- draws the line on the debating. The information in this book is hard-core,
- factual documentation that leaves no doubt in this reader's mind that
- the world is in for a long, hard ride in regards to computer security.
- The United States is open to the world's electronic terrorists.
- When you finish reading this book, you will find out just how open we are.
-
- Mr. Schwartau talks about industrial espionage, hacking, viruses,
- eavesdropping, code-breaking, personal privacy, HERF guns, EMP/T bombs,
- magnetic weaponry, and the newest phrase of our generation...
- "Binary Schizophrenia". He exposes these topics from all angles. If you
- spend any amount of time in Cyberspace, this book is for you.
-
- How much do you depend on technology?
-
- ATM machines, credit cards, toasters, VCR's, televisions, computers,
- telephones, modems...the list goes on. You use technology and computers
- and don't even know it! But the point is...just how safe are you from
- invasion? How safe is our country's secrets? The fact is - they are NOT
- SAFE! How easy is it for someone you don't know to track your every move
- on a daily basis? VERY EASY! Are you a potential victim to fraud,
- breech of privacy, or general infractions against the way you carry
- on your daily activities? YES! ...and you'd never guess how vulnerable
- we all are!
-
- This book will take you deep into places the government refuses to
- acknowledge. You should know about INFORMATION WARFARE. Order your
- copy today, or pick it up at your favorite book store. You will not
- regret it.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- WHISPER WHO: A Unix tool
-
- Here is a handy little tool for you to use on your Unix machine. Follow the
- instructions provided!
-
- -------cut here-------------------cut here---------------cut here------------
-
- /*****************************************************************************
- * This program can be changed without too much trouble to a program *
- * that logs everybody in and out of a system. Need to add *
- * signal(SIGHUP,SIG_IGN) to it though, so it continues after you are gone. *
- * This program whispers to you when somebody logs on or off, and is pretty *
- * hard to kill. ( you have to send SIGKILL to kill this one.) *
- * As is right now, it will not stay active after you logoff. To prevent *
- * annoying anyone, just put it in your .profile. *
- * *
- * CUT THIS PART OUT OF THIS FILE AND NAME THE TEXT: wwho_1.c *
- * *
- * To compile: cc -o wwho wwho_1.c *
- * or gcc -o wwho wwho_1.c *
- *****************************************************************************/
-
- #include <signal.h>
- #include <stdio.h>
- #include <sys/types.h>
- #include <utmp.h>
- #include <sys/stat.h>
- #include <fcntl.h>
-
- #define MAXPROCESSES 40
-
- struct utmp who[MAXPROCESSES]; /* list of all rembered users on-line */
- struct utmp u[MAXPROCESSES]; /* list of all users in the utmp file */
- int counter = 0; /* number of users in memory */
-
- void sig_hand(int sig) {
- register int x;
- x=0;
- switch(sig) {
- case 15: signal(SIGTERM,sig_hand);
- case 3: signal(SIGINT,sig_hand);
- for(x=0; x<counter; x++)
- printf(": Name: %s, Device: %s.\n",who[x].ut_name,who[x].ut_line);
- break;
- }
- }
-
- void main(int argc,char *argv) {
- int prio, /* process id of 'child' process */
- u_handle, /* handle for the /etc/utmp file */
- z; /* loop control varriable*/
- int pid; /* process id of 'forked' process */
-
- if(argc>=2) prio = atoi(argv[1]); /* if arg, then new prio = arg */
- if(argc < 2) prio = 20; /* if no arg, then prio = 20 */
- pid = fork(); /* create new process */
- if(pid==-1) { /* Cannot create new process error */
- printf(": cannot create process\n");
- exit(-1);
- }
-
- if(pid > 0 ) { /* if initial program then print intro and exit */
-
- printf(": Wisper Who is now in effect.\n");
- printf(": Created process id %i\n",pid);
- exit(0); /* exit copy of program that YOU ran */
- }
- nice(prio); /* make low priority, be nice */
- signal(SIGQUIT,SIG_IGN); /* Ignore QUIT signal */
- signal(SIGINT,sig_hand); /* ignore INTERRUPT signal */
- signal(SIGTERM,sig_hand); /* Ignore TERMINATE signal */
-
- while(1) { /* Main part of program. Never ends */
- int x;
- register int y;
-
- if((u_handle = open("/etc/utmp",O_RDONLY))==-1) { /* open utmp for reading */
- printf(": Cannot Open /etc/utmp\n"); /* error in opening */
- exit(0);
- }
-
-
- x = 0; /* reset thr number of utmp entries to 0 */
-
- while(read(u_handle,&u[x],sizeof(u[x])) != 0) { /* Read utmp file
- * until EOF */
- if(u[x].ut_type == USER_PROCESS) { /* if not an user, then read next entry */
- z = new_user(x); /* check to see if new */
- if(z==1) warn_em(x,0,0); /* if new, then warn */
- }
- x++;
- if(x>=MAXPROCESSES) { /* TOO many process logged in. */
- printf(": Error -- More process are running than there are spaces\n");
- printf(": Error -- allocated for.\n");
- printf(": Error -- change 'MAXPROCESSES xx' to 'MAXPROCESSES %i'.\n",x+10);
- exit(-1); /* Quit */
- }
- }
-
- close(u_handle); /* close utmp */
-
- for(z=0; z<counter; z++) { /* compare list to see if anybody */
- int c; /* logged out */
-
- c = 0; /* varriable that holds a 1 if *
- * still here, else a zero */
-
- for(y=0; y<x; y++) { /* Loop to compare utmp file to *
- * remembered users */
- if(u[y].ut_type==USER_PROCESS) { /* if process is a user...*/
- if(strcmp(who[z].ut_name,u[y].ut_name)==0) { /* compare */
- c=1; /* if same, break */
- break;
- }
- }
- }
- if(c!=1) warn_em(z,1,z); /* if gone, warn */
-
- }
- sleep(10);
- }
- }
-
- /* new_user -- function that returns either a 1 or a 0 depending on
- whether that user is in the who list
- -- Pass it the entry number of the user in the utmp file */
-
- int new_user(int y) {
- register int x;
-
- for(x=0; x<counter; x++) { /* check to see if just logged in */
- if(strcmp(u[y].ut_name,who[x].ut_name)==0) return(0);
- }
- who[counter] = u[y];
- counter++;
- return(1);
- }
-
- /* warn_em returns a 1 always. Prints Messages to your device telling you
- whether somebosy logged in or out.
- All Normal Output, besides errors and intro */
-
- int warn_em(int x,int code,int n_who) {
- char buff[9];
- buff[8]=0;
- if(code==0) {
- strncpy(buff,u[x].ut_name,8);
- printf(": %s has just logged in on device /dev/%s.\n",buff,u[x].ut_line);
- } else {
- strncpy(buff,who[x].ut_name,8);
- printf(": %s has just logged off.\n",buff);
- pack_who(n_who); /* make who list smaller */
- }
- return(1); /* return OK */
- }
-
- /* pack_who -- Packs the list of users on-line, and deletes the one that
- logged out.
- -- Pass it the number that the user was in the on-line list */
-
- int pack_who(int dead) { /* pack the who list of users on-line */
- register int z; /* loop control */
-
- for(z=dead; z<counter-1; z++) { /* loop to delete use that logged out */
- who[z] = who[z+1];
- }
- counter--; /* decrement counter */
- return(1); /* return OK */
- }
-
- --------cut here-------------cut here---------------cut here---------------
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- HACKER BARBIE
-
- TO: Editors@fennec.com
- Subject: 'Hacker' Barbie...
-
- (LA, California) Mattel announces their new line of Barbie products, the
- "Hacker Barbie." These new dolls will be released next month. The aim of
- these dolls is to revert the stereotype that women are numerophobic,
- computer-illiterate, and academically challenged.
-
- This new line of Barbie dolls comes equipped with Barbie's very own
- xterminal and UNIX documentation as well as ORA's "In a Nutshell" series.
- The Barbie is robed in a dirty button-up shirt and a pair of worn-out jeans
- with Casio all-purpose watches and thick glasses that can set ants on fire.
- Pocket protectors and HP calculators optional. The new Barbie has the
- incredible ability to stare at the screen without blinking her eyes and to
- go without eating or drinking for 12 hours straight. Her vocabulary mainly
- consists of technical terms such as "IP address," "TCP/IP," "kernel,"
- "NP-complete," and "Alpha AXP's."
-
- "We are very excited about this product," said John Olson, Marketting
- Executive, "and we hope that the Hacker Barbie will offset the damage
- incurred by the mathophobic Barbie." A year ago, Mattel released Barbie
- dolls that say, "Math is hard," with condescending companions Ken. The
- Hacker Barbie's Ken is an incompetent consultant who frequently asks Barbie
- for help.
-
- The leading feminists are equally excited about this new line of Barbie
- dolls. Naomi Wuuf says, "I believe that these new dolls will finally
- terminate the notion that women are inherently inferior when it comes to
- mathematics and the sciences. However, I feel that Ken's hierarchical
- superiority would simply reinforce the patriarchy and oppress the masses."
- Mattel made no comment.
-
- Parents, however, are worried that they would become technologically behind
- by comparison to the children when the Hacker Barbie comes out. "My daughter
- Jenny plays with the prototype Hacker Barbie over yonder for two days," says
- Mrs. Mary Carlson of Oxford, Mississippi, "and as y'all know, she now pays
- my credit card bill. Ain't got no idea how she duz it, but she surely duz
- it. I jus don't wanna be looked upon as a dumb mama." Mattel will be
- offering free training courses for those who purchase the Hacker Barbie.
-
- The future Hacker Barbie will include several variations to deal with the
- complex aspects of Barbie. "Hacker Barbie Goes to Jail" will teach computer
- ethics to youngsters, while "BARB1E R1TES L1KE BIFF!!!" will serve as an
- introduction to expository writing.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- The WELL:
- Small Town on the Internet Highway System
-
- by Cliff Figallo (fig@well.sf.ca.us)
-
- [This document was adapted from a paper presented to the "Public
- Access to the Internet" meeting sponsored by the John F. Kennedy
- School of Government at Harvard University in May, 1993.
- You may distribute and quote from this piece as you wish, but
- please include the request that my name and contact information be
- included with any quotations or distribution.
- Thank you. -- C.F.]
-
- Introduction
-
- The Internet serves as a routing matrix for electronic mail
- messages, file transfers and information searches. Internet
- sites, those machines and sub-networks that are "internetworked",
- have thus far served mostly as file archives, email
- addresses and administrative caretakers for their locally
- serviced users. Historically, these sites have been universities,
- corporations or military and government installations. With
- the popularization and commercialization of the Internet, new
- models of Internet sites are connecting to the web of high
- speed data lines.
-
- One unique Internet site, accessible by anyone with an Internet
- account, is The Whole Earth Lectronic Link (hereafter referred to
- by its popular name, The WELL). In the future, the Internet will
- certainly feature many small, homegrown, regional commercial
- systems like The WELL. Such systems will pay for their own
- operations and for their Internet connections through user fees,
- handling all of the billing and administrative tasks relating to their
- users, developing their own local community standards of behavior
- and interaction. Their users will often leave the "home" system,
- going out through Internet gateways to other regional systems or
- searching for information in the myriad databases of the Net. Internet
- voyagers will drop in to visit the unique communities they find
- outside their home systems, sampling the local cultural flavors and
- meeting and conversing with the individuals who inhabit those
- systems.
-
- The main attractions of these local Internet "towns" will prove to be
- their characteristic online conversations and social conventions and
- their focus on specialized fields of knowledge or problem solving.
- The WELL is a seminal example of what these small pioneering
- towns on the Internet highway system will be like.
-
- The WELL is a computer-mediated public conferencing and
- email system linked to the Internet through BARRNet, the
- regional Internet vendor. The WELL's headquarters are
- located in Sausalito, California. It is co-owned by Point
- Foundation (producers of Whole Earth Review and the Whole
- Earth Catalogs) and Rosewood Stone, a financial investment
- company owned the founder and ex-owner of Rockport Shoes.
-
- The WELL was, from its founding in 1985 until January of
- 1992, accessible to its users only via direct or packet switched
- dialup. It had carried stored-and-forwarded USENET news
- groups since soon after startup. These files were imported via
- regular phone links with Internet-connected sites. Among its
- users were some small minority of students, academics and
- technical professionals with Internet accounts on other
- systems. The feasibility of the WELL connecting to the Internet
- increased steadily through the 1980s until financial, technical
- and political conditions allowed it to happen. It is significant,
- though, that the character of the WELL developed under
- conditions of relative network isolation. Indeed, part of the
- justification given by BARRNet, the regional Internet service
- provider, for allowing a commercial system like the WELL to
- connect through their facilities was the unique character of the
- WELL as an established system with thriving and interesting
- discussion, and its perceived value as a an information-
- generating resource for the Net. The WELL would, they
- figured, make an interesting and potentially rewarding
- stopover on any user's Internet Tour.
-
- The WELL is often associated with the term "online
- community". The idea that community can develop through
- online interaction is not unique to the WELL. But the WELL,
- because of its organizational and technical history, has survived
- primarily through the online personal interaction of its
- subscribers and staff rather than through successful business
- strategy developed by its owners and managers. The
- discussion and dialog contained and archived on the WELL are
- its primary products. The WELL "sells its users to each other"
- and it considers its users to be both its consumers and its
- primary producers. Databases of imported information and
- libraries full of downloadable software are scarcely present.
- Third-party services such as stock-trading news, wire services,
- airline reservation access and software vendor support have
- never been offered to any significant extent.
-
- The WELL today counts around 7,000 paying subscribers. It
- has a growing staff of over 12 and a gross annual income
- approaching $2 million. It is a small but healthy business and
- has historically spent very little on advertising and promotion.
- It gets far more than its share of free publicity and notoriety
- through the Press coverage as compared to much larger
- commercial systems. This is so in spite of what most people
- would consider a "user-hostile" interface and relatively high
- pricing.
-
- The WELL had a rather unique upbringing. I will describe its
- early growth and the foundations of its character in the rest of
- this paper. I do this from the point of view of having been the
- person in charge for six years, though I took great pains to de-
- emphasize the "in charge" part whenever possible. I tried to
- focus more on maintenance and the distribution of responsibility
- through the user community rather than on control. Though my
- record for making the WELL a technical showpiece is not
- without blemish, my main emphasis was in preserving
- and supporting the exercise of freedom and creativity by the
- WELL's users through providing an open forum for their interaction.
-
- It is my assertion that the actual exercise of free speech and
- assembly in online interaction is among the most significant
- and important uses of electronic networking; and that the value
- of this practice to the nation and to the world may prove
- critical at this stage in human history. I regard the WELL as a
- sample of the kind of small, diverse, grassroots service
- provider that can and should exist in profusion, mutually accessible
- through the open channels on the Internet.
-
- The possibility that the future "Internet" (or whatever replaces
- it) may be dominated by monolithic corporate-controlled
- electronic consumer shopping malls and amusement parks is
- antithetical to the existence and activity of free individuals in
- the electronic communications world, each one able to interact
- freely with other individuals and groups there.
-
- A Very Brief Biography of the WELL
-
- Founded in 1985 by Stewart Brand and Larry Brilliant as a
- partnership of Point and NETI , the WELL came online in
- February of 1985 and began taking paying customers April 1,
- 1985. It's initial staff of one full-time and one part-time
- employee grew to 12 paid employees and well over one
- hundred online volunteers by 1992. As of this date, The WELL
- runs on a Sequent multi- processor mini-computer located in a
- cramped room in a small office building next to the houseboat
- docks in Sausalito, California. The WELL has full Internet
- connectivity which is currently offered for the use of its
- subscribers at no surcharge. Most users call in to the WELL
- over regular phone lines and modems., and most long distance
- customers reach the WELL using an X.25 commercial packet
- network for an additional $4.00 per hour. An increasing
- number of users are logging in to the WELL via the Internet,
- many using Internet accounts on commercial gatewayed
- systems rather than the packet switching nets.
-
- The WELL's notable achievements are many, not the least of
- which is that it has survived for eight years while so many
- other startup systems, though much better-funded, have failed.
- The Electronic Frontier Foundation was born largely out of the
- free speech ferment that exists on the WELL and out of
- discussions and debate that go on there concerning the unique
- legal and regulatory paradoxes that confront users, managers
- and owners of systems in this new communications medium.
- These discussions also attract a population of journalists who
- find cutting edge ideas and concepts arising constantly in the
- WELL's forums. Many other formal and informal organizations
- and collaborations that are effecting the world today call the
- WELL home.
-
- The WELL Story -- a Less Brief Biography
-
- Birth
-
- The WELL was the conceptual and partnered creation of Larry
- Brilliant and Stewart Brand. They agreed to have their
- respective organizations cooperate in establishing and
- operating a computer conferencing network that could serve as
- a prototype for many regional (as opposed to national)
- commercial systems. "Let a thousand CompuServe's bloom," is
- how Brilliant put it.
-
- Initial funding came from Brilliant's company, Networking
- Technologies International (NETI) in the form of a leased VAX
- 11/750 computer and hard disks, UNIX system software, a
- "conferencing" program called Picospan, and a loan of $90,000.
- Point Foundation, the non-profit parent corporation of Whole
- Earth Review, contributed the name recognition of "Whole
- Earth", the personal attraction of having Stewart Brand to
- converse with online and the modest but important
- promotional value of constant mention in the small circulation
- but influential "Whole Earth Review" magazine.
-
- Business goals for The WELL were, from its inception,
- purposefully flexible. But the idea that interesting discussion
- would attract interesting discussants was at the core of the
- theory that drove the WELL's growth. Initially, many free
- accounts were offered to people who had, at one time or
- another, been associated with Whole Earth publications and
- events, or who were known by Whole Earth staff to be likely
- productive and attractive participants (referred to, tongue-in-
- cheek, as "shills"). In April of 1985, the WELL began offering
- subscriptions at $8 per month plus $3 per hour.
-
- Initial Design and Rule making
-
- The WELL presented its first users with the sole disclaimer:
- "You own your own words." The owners of the WELL sought to
- distance themselves from liability for any text or data posted
- or stored online by WELL users while, at the same time,
- providing a free space for creative, experimental and
- unfettered communication. An alternative interpretation of the
- original disclaimer (now referred to as YOYOW) held that rather
- than only laying responsibility for WELL postings at the feet of
- the author, the phrase also imparted copyrighted ownership of
- postings to the author under the implied protection and
- enforcement of the WELL. Management and ownership
- resisted the onus of their serving as legal agent for the WELL's
- users, recognizing the potential expense and futility of pursuing
- people for electronically copying and using customers' words.
- Thus, the evolving interpretation of YOYOW provided fuel for
- years' worth of discussion on the topics of copyright,
- intellectual property and manners in electronic space.
-
- A general aversion to the making and enforcement of rigid
- rules has continued at the WELL although incendiary incidents
- and distressing situations have occasionally brought calls for
- "more Law and Order" or absolute limits to speech. WELL
- management rejected these calls, resisting being put in the role
- of policeman and judge except where absolutely necessary, and
- espousing the view that the medium of online interpersonal
- communication was (and still is) too immature, too formative to
- be confined by the encumbrances of strict rules and
- restrictive software. The imposition by management of
- arbitrary limitations on language and speech, aimed at
- protecting the feelings or sensibilities of small groups of people
- could not possibly protect all people's feelings and sensibilities.
- Besides, by stifling free and open dialog, we might have lost
- our chance to discover what kinds of interaction really worked
- in this medium. Interaction in public access systems seemed to
- be much more productive, innovative, educational and
- entertaining where there were fewer prohibitions imposed by
- system management. If limitations were to be imposed and
- enforced, they could be handled best from within the user
- population on a "local", not system wide basis. The creation of
- private interactive areas where such local rules held sway
- allowed public forums to retain their openness while providing
- more regulated "retreats" for those who felt they needed them.
-
- Staff-Customer Collaboration
-
- Immediately after opening the system to public access, the
- small WELL staff and the original participants began the
- collaborative process of designing of a more friendly interface
- from the raw Picospan software. Picospan included a toolbox of
- customization utilities that could be used to make changes on a
- system-wide or at-user's-option basis. Picospan was tightly-
- integrated with the UNIX operating system and could therefore
- provide transparent access to programs written to operate in
- the UNIX environment. The libertarian, anti-authoritarian
- philosophy of Picospan's author, Marcus Watts, showed through
- in its design which prevented un-acknowledged censorship by
- system administrators, forum moderators (hosts) or authors
- themselves. Picospan also allowed topics (discussion threads)
- to be "linked" into several forums at once...a feature that aids
- the cross-pollination of ideas and groups through the system.
- The influence that Picospan has had on the WELL's
- development as a community and hotbed of discussion cannot
- be underestimated. Its display of topics as continuously-
- scrolling dialog documents (rather than as fragmented
- collections of individually-displayed responses) had a
- tremendous effect on user involvement in ongoing discourse.
-
- Staff Background
-
- The background of four of The WELL's non-technical senior
- managers--people who worked there during its first seven
- years--must be considered very significant to the formation of
- the WELL's open and independent culture.
-
- The first director of the WELL, Matthew McClure and myself,
- his successor, both spent the decade of the 1970's living in an
- intentional community of some renown called The Farm as did
- the WELL's first customer service manager, John Coate, and his
- successor, Nancy Rhine.. Undoubtedly, this experience of living
- cooperatively in multi-family situations in a community that
- reached a peak population of over 1500 adults and children,
- had a profound influence on the style of management of The
- WELL. Principles of tolerance and inclusion, fair resource
- allocation, distributed responsibility, management by example
- and influence, a flat organizational hierarchy, cooperative
- policy formulation and acceptance of a libertarian-bordering-
- on-anarchic ethos were all carryovers from our communal
- living experience. John Coate is known for having been integral
- to the setting of a tone of the WELL where users and staff
- intermingled both online and at the WELL's monthly office
- parties. He has authored a widely-distributed essay on
- "Cyberspace Innkeeping" based on lessons learned in dealing
- with customers in his time at the WELL..
-
- Maintaining a History
-
- An important component to the establishment of community in
- any setting or medium is a historical record of its environs, its
- people, and their works and the relationships and organizations
- that defined the direction of the collective entity. For a variety
- of reasons besides the security of backups, the WELL still has a
- significant portion of its online interaction saved on archived
- tape, on its user-accessible disks and in the possession of many
- of its conference hosts who have made a practice of backing up
- topics on their home machines before retiring them from the
- WELL. WELL users were always vocal in their insistence that a
- history be kept and went so far as to create an Archives
- conference where topics judged of historical significance from
- other areas of the WELL were linked and eventually "frozen"
- for future reference. These valuable conversational threads,
- this "history" of the WELL, contributes to its depth and feeling
- of place and community. New users and veterans alike can
- refer to these archives for background to current discussion
- and to sample the flavor of the WELL from its early days.
- When new users, experiencing the same revelations that
- stirred WELL veterans years ago, bring up their own
- interpretations of "you own your words", they are referred to
- the several preserved topics in Archives where lengthy online
- deliberations on the subject have been preserved..
-
- Connections
-
- Originally, only direct dial modems could be used to reach the
- WELL, but by the end of its first year of operation, an X.25
- packet system was in place allowing long distance users to
- reach the WELL at reasonable cost. The WELL kept its San
- Francisco focus because local callers had cheaper access and
- could stay online longer for the same cost, but national and
- international participants were now more encouraged to join in.
-
- Also, in 1986, Pacific Bell conducted a test of a regional packet-
- switched network for which the WELL was enrolled as a "beta"
- site. For most of a year, users from most of the San Francisco
- Bay Area were able to dial in to the WELL without phone toll
- charges. This fortuitous circumstance helped boost the WELL's
- subscription base and connected many valuable customers
- from the Silicon Valley area into the growing user pool.
-
- Over time, the percentage of users from outside of the Bay
- Area climbed slowly but steadily. As word spread through
- frequent unsolicited articles in the press, the WELL became
- known as a locus for cutting edge discussion of technical,
- literary and community issues, and it became even more
- attractive to long distance telecommunicators.
-
- On January 2, 1992, the WELL opened its connection to the
- Internet through the regional provider, BARRNet. After much
- debugging and adjustment and a complete CPU upgrade, full
- Internet service access was offered to WELL customers in June
- of 1992. Staff and users opened an Internet conference on the
- WELL where discussions and Q&A take place and where new
- features, discoveries and tools are shared. The Internet
- conference serves as a "living manual" to the resources, use and
- news of the Net.
-
- Community
-
- In a medium where text is the only means of communication,
- trust becomes one of the most difficult but essential things to
- build and maintain. With no audible or visual clues to go by,
- the bandwidth for interpersonal communication is quite thin.
- There are, though, ways in which trust can be built even
- through the small aperture of telecommunicated text.
-
- By being deliberately non-threatening, owners and managers can
- eliminate one of the major barriers to trust on the system. One of the
- most menacing conditions experienced by new users of public
- conferencing systems is that of hierarchical uncertainty. Who holds
- the Power? What is their agenda? What are The Rules? Who is
- watching me and what I do? Do I have any privacy? How might a
- "Big Brother" abuse me and my rights? The WELL Whole Earth
- parentage brought with it a historical reputation of collaboration
- between publisher and reader. Whole Earth catalogs and magazines
- were widely-known for soliciting and including articles and reviews
- written by their readers. Whole Earth customers knew that the
- publications had no ulterior motives, were not owned and controlled
- by multi-national corporations and did not spend their revenues on
- making anyone rich. Readers supported the publications and the
- publications featured and came clean with the readers. We strove to
- continue that kind of relationship with our customers on the WELL
- although the immediacy of feedback often made openness a tricky
- proposition.
-
- We realized that we were in a position of ultimate power
- as operators of the system; able to create and destroy user
- accounts, data, communications at will. It was incumbent on
- us, then, to make clear to all users our assumptions and the
- ground rules of the WELL in order to minimize any concerns
- they might have about our intentions. Our aim was to be as
- much out front with users as possible. Indeed, John Coate
- and I took the initiative, posting long autobiographical stories
- from our communal past, inviting users to join us in problem-
- solving discussions about the system and the business around
- it, confessing to areas of ignorance and lack of experience in the
- technical end of the business, and actively promoting the users
- themselves as the most important creators of the WELL's
- product.
-
- Staff members were encouraged to be visible online and to be
- active listeners to user concerns in their respective areas of
- responsibility. Staff took part in discussions not only about
- technical matters and customer service, but about
- interpersonal online ethics. When the inevitable online
- quarrels surfaced, staff participated alongside users in
- attempts to resolve them. Over time, both staff and users
- learned valuable lessons and a "core group" of users began to
- coalesce around the idea that some kind of community was
- forming and that it could survive these periodic emotional
- firestorms. The ethical construct that one could say whatever
- one wanted to on the WELL, but that things worked best if it
- was said with consideration of others in mind, became
- ingrained in enough peoples' experience that community
- understandings developed. These "standards" were not written
- down as rules, but are noted conspicuously in the WELL's User
- Manual and are mentioned online as observations of how
- things really seem to work. Productive communication in this
- medium can take place if it is done with care.
-
- Beginning in 1986, the WELL began sponsoring monthly face-
- to-face gatherings open to all, WELL user or not. Initially,
- these Friday night parties were held in the WELL's small
- offices, but as attendance grew and the offices became even
- more cramped, the potluck gatherings, still called WELL Office
- Parties (or WOPs) moved to other locations, eventually finding
- a regular home at the Presidio Yacht Club near the foot of the
- North end of the Golden Gate Bridge. These in-person
- encounters have been an integral and important part of the
- WELL's community-building. They are energetic, intense,
- conversation-saturated events where people who communicate
- through screen and keyboard day after day get to refresh
- themselves with the wider bandwidth of physical presence.
- Often, the face to face encounter has served to resolve
- situations where the textual communications have broken
- down between people.
-
- Collaboration Part II
-
- The WELL was a bootstrap operation from its initial investment
- in 1985. As a business venture, it was undercapitalized and
- struggled constantly to stay ahead of its growth in terms of its
- technical infrastructure and staffing. At the same time, it stuck
- to the ideal of charging its users low fees for service. The
- undercapitalization of the WELL and the low user charges
- combined to force management into a constant state of creative
- frugality. From the first days of operation, the expertise and
- advice of users was enlisted to help maintain the UNIX
- operating system, to write documentation for the conferencing
- software, to make improvements in the interface and to deal
- with the larger problems such as hardware malfunctions and
- upgrades.
-
- Over the years, many tools have been invented, programmed
- and installed at the suggestion of or through the actual labor of
- WELL users. In an ongoing attempt to custom design the
- interface so as to offer a comfortable environment for any user,
- the WELL has become, if not a truly user-friendly environment,
- a very powerful tool kit for the online communications
- enthusiast. One of the basic tenets of the WELL is that "tools,
- not rules" are preferred solutions to most people-based
- problems. Menu-driven tools were created to give control of
- file privacy to users, allowing them to make their files
- publicly-readable or invisible to others. The "Bozo filter",
- created by a WELL user, allows any user to choose not to see
- the postings of any other user. Some WELL veterans, after
- years of teeth-gritting tolerance of an abrasive individual, can
- now be spared any online exposure to or encounter with that
- individual.
-
- Other tools have been written to facilitate file transfers, to
- allow easy setup of USENET group lists, to find the cheapest
- ways to access the WELL, and to extract portions of online
- conversations based on a wide range of criteria. These tools
- have all been written by WELL users, who received only free online
- time in exchange for their work, or by WELL employees who were
- once customers.
-
- Free time on the WELL (comptime) has always been awarded
- liberally by WELL management in exchange for services. At
- one time, half of the hours logged on the WELL in a month was
- uncharged, going to comptime volunteers or staff. Hosting
- conferences, writing software, consulting on technical issues
- and simply providing interesting and provocative conversation
- have all earned users free time on the WELL. Much as we
- would have liked to pay these valuable people for their
- services, almost to a person they have continued to contribute
- to the WELL's success as a business and public forum,
- demonstrating to us that they considered the trade a fair one.
-
- Conclusion
-
- As can be seen, the WELL developed from its unusual roots in
- some unique ways. The purpose of this piece is not to advocate
- more WELL clones on the Net, but to demonstrate that if the
- WELL could make it, other systems of the WELL's size and
- general description could spawn from equally unique
- circumstances around the country and offer their own special
- cultural treasures to the rest of the world through the Internet.
- What has been learned at the WELL can certainly be of value
- when planning new systems because the WELL experiment has
- demonstrated that big funding bucks, elegant interface design,
- optimum hardware and detailed business planning are not
- essential to growing a thriving online community and, in the
- WELL's case, a successful for-profit business. More important
- is that the owners and managers of the systems openly foster
- the growth of online community and that there be a strong
- spirit of open collaboration between owners, managers and
- users in making the system succeed. These critical elements of
- viable community systems are attainable by local and regional
- civic networks, small organizations and entrepreneurs with
- limited funding and technical skills... and some heart.
-
- *****************************
-
- Cliff Figallo (fig@eff.org) is a Wide Area Community Agent who
- also works part time as Online Communications Coordinator
- for the Electronic Frontier Foundation. Before coming to work
- at EFF, Cliff was Director of the Whole Earth Lectronic Link for
- six years (Aug '86 through July '92). Cliff now lives in the San
- Francisco area and works remotely at his job using the
- Internet, Pathways, the WELL, CompuServe and America Online daily.
- He can be reached via email at the following addresses:
- fig@well.sf.ca.us fig@eff.org fig@path.net fig@aol.com
- 76711,320@compuserve.com
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- THE FEMINIZATION OF CYBERSPACE
-
- by Doctress Neutopia (neutopia@educ.umass.edu)
-
- During the final year of my doctoral work I discovered the new
- world of Cyberspace. Having been involved in utopian thought for
- more than fifteen years, inventing my own utopia from the ideas of
- such futurists and architects as Charlotte Perkins Gilman,
- Starhawk, Eiane Eisler, Paolo Soleri, Buckminster Fuller, etc,
- which I call Neutopia, I find the world of virtual reality is the
- perfect place for my Neutopian imagination be to born into reality.
- The central nervous system of Neutopia is the evolving Global Brain
- which we are now seeing come about through information technologies
- and the world of Cyberspace.
-
- Cyberspace is changing the very nature of text. Electronic
- text takes us into the age of non-text which means writing has
- become solely an electronic experience requiring no paper form.
- Printed matter is no longer necessary in the world of Cyberspace.
- In this world today, the power of ideas, and to some degree one's
- writing style and skills is the persuader. In the ideal sense,
- Cyberspace becomes a place for the autonomous individual, a place
- where the integrity of the Self is the determining factor of social
- prestige. With the elimination of printed matter and the
- decentralized nature of email, a new relationship between
- authoress/author and audience is opening up. Editors who have had
- the centralized control over the printed word are no longer the all
- powerful controller of literature since in Cyberspace the unknown
- poetess can post a message along side a literary giant. Because of
- the democratizing aspects of the Usenet open forum, the matter in
- which one gains social status is also changing. In Cyberspace,
- literary merit is achieved through the depth and sincerity of one's
- message. In other words, the old hierarchal structures of language
- and the old gatekeepers of ideas are being broken down as you read
- these words.
-
- Nevertheless, Cyberspace is no paradise on Earth. Quite the
- contrary! I don't believe I am being an extremist to say that
- there is a war against the feminist voice occurring in Cyberspace.
- The Net term for such activity, which most of the postings of the
- discussion groups reflect, is called "flaming." For me, the flames
- symbolize the "Burning Times" when civilization was moving from the
- Medieval Ages into the Renaissance and the rise the market economy.
- It was during this rebirth of classical thought when thousands of
- innocent women healers and religious leaders were being burned as
- heretics.
-
- A biologist friend has also pointed out to me that in his
- laboratory "flaming" means to sterilized a test tube from bacteria.
- In that sense, I feel that the "flaming" of my posts have been an
- attempt by some people to cleanse the Net from my non-conformist
- "disease". After all, the Gaia Religion which I have been
- researching is about the role bacteria play in regulating life and
- love!
-
- Entering into the Computer Age, we find ourselves in another
- social transition. The technological possibilities for
- revolutionary change on a world-wide level are now available to us.
- That is, if feminist ideology can come to the forefront of the
- dialogue. Now, of course, as in the "real" world, the patriarchal
- religion of Capitalism is the dominant thought. Anyone who opposes
- this thought are "flamed" for their "inappropriate behavior". On
- many occasions, I have been "flamed" for my alternative Neutopian
- Vision, not by one individual, but by various Usenet and Listserve
- groups.
-
- For example, I am subscribed to a Listserve called
- Leri@pyramid.com. This group has about 200 people who are
- subscribed. There are two kinds of people on the myriad of
- Listserves, the Writers and the Lurkers. Lurkers are people who
- compose the reading audience who occasionally voice an opinion, but
- for the most part, they are silent observers. Of the writers, the
- majority are white upperly-mobile middle-class young men who are
- computer literate. Many of them are from the scientific class who
- are busy creating the Technocracy. When I began to point out the
- blatant sexist language and attitudes on Leri, I was "flamed" by
- members of this so called "virtual love commune."
-
- We are seeing here a rise of a new form of tribalism. If the
- tribal leaders (the Patriarchal Writers) sense a voice which might
- be threatening to the tribal harmony of the old-boys network, then
- the group attempts to eliminate that voice in opposition.
- Unfortunately, for the most part, the educational system has not
- taught these young men to analyze and understand the reason why the
- feminist voice is annoying to their Establishment prevailing
- thought. Consequently, the Net has become but another sophisticated
- toy for rich minded college kids to entertain each other as the
- rest of the world starves to death and the global ecology
- collapses.
-
- There was much discussion which arose on Listserve Leri as to
- what to do about me. Several writers declared my vision to be a
- "case of insanity." They even were discussing whether it was a case
- of biological or psychological aberration. Others suggested that
- I needed to go to the self-help section of a book store and find a
- book which would help me fit into the society. Others felt my
- "unhappy and depressed" character was a result of "inner confusion"
- and that if I changed myself [conform to their way of thinking],
- then I would be "liberated from oppression". Still others believed
- that I would be saved if I found my way back to Christ or began to
- practice Buddhist meditation or yoga.
-
- Finally, it was decided that the best thing they could do with
- my heresy was to follow the example of the Shaker Community. The
- worst punishment the Shakers did to a dissenting personality was to
- shun them and so this was what Listserve Leri proceeded to do to
- me. Other technicians proposed to bar me by setting up the
- technology called "kill filters" so that my email messages would
- not even appear on their screens.
-
- There is also a IRC #leri channel where I began to go to
- explain my philosophy to the students in Real Time. When the
- conversation began to become controversial and conflicting ideas
- were pecking, the boys and the girls who think like boys, would
- type in an /ignore all neutopia messages so that I was blocked from
- the public dialogue. Another tactic of censorship in IRC is the
- /kick ban which several of the boys threaten to set up so that I
- would not be kicked off the channel if I tried to enter it. So
- much for democracy on the Net!
-
- During the holidays, Leri was going to hold a "fleshmeet" in
- New Mexico which all the members of the Leri Listserve were invited
- to so that people could meet one another in the living flesh.
- However, when I expressed interested in attending the party, the
- hostess said that if I came "she would have me shot." Then she
- wrote me a personal email with a one line message to the effect of
- "The Patriarchy Wins." I was experiencing social ostracism for my
- feminist beliefs and it was a very loney and painful experience.
-
- But the worst treatment of all occurred on a sister list of
- Leri called Aleph@pyramid.com when the archivist said that he was
- deleting my posts from the archives. This action was so malicious
- because I know this is what has happened to feminist thought
- throughout recorded history. Women who resist the patriarchy are
- eliminated from the collective memory. I recall a past life when
- I was being burned at the stake and the governmental/religious
- officials laughed at me as my flesh burned. Before I fell
- unconscious from the smoke, the sinister officials took out my
- manuscripts which they had confiscated and threw them in the fire.
- The messages of my life burned along with my body...my soul
- forgotten....my work unacknowledged...my poetic love verse
- destroyed.
-
- The point is that there is a serious ideological war in
- progress in this underworld of Cyberspace, a place which also
- controls the nuclear weapons of the world through the Computer
- Empire. This war is the same war which women have been struggling
- against for thousands of years. As the millennium changes, so too
- is it time to end this war which is draining our vital resources
- that are needed to save the Biosphere from total destruction. It is
- time that women be acknowledged as the natural sovereigns of the
- species so that we will be in a position to use our knowledge and
- wisdom we have in creating a world where all our benevolent dreams
- find a way to self-actualize.
-
- My mission is to encourage Feminists to play an active role in
- the future of Cyberspace. Here is a window of opportunity open for
- us to play our role essential in forming the future social
- architecture of Cyberspace. If we, Feminists, do not act now and
- recruit other like minded Earthlings to take up the cause of the
- "Global Feminization of Cyberspace," then we will be caught in the
- same trap that we are in today. It is time for us to demand a new
- world where everyone has access to the global resources...a world
- where everybody's spiritual and physical needs are met. Only then
- will the Net become a vehicle of global emancipation and a home of
- the Neutopian thinker.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- RESPONSE TO THE FEMINIZATION OF CYBERSPACE
-
- By Jason Webb (jwebb@world.std.com)
-
- I am writing in response to the article THE FEMINIZATION OF
- CYBERSPACE by Doctress Neutopia (neutopia@educ.umass.edu). The issues
- raised and the accusations made in the article are very serious and
- deserve some discussion.
-
- The author cites cases in which her opinions were repressed in several
- different ways ranging from individual kill files to having her messages
- elminiated from the archives of the group. It seems to me that the real
- issue at stake is what the purpose of the Listserve groups is.
-
- Clearly, if the purpose of the group is to promote the free expression
- of ideas they are not succeeding. It is true that the internet does eliminate
- discrimination based on physical characteriscics. Predictably, however,
- technology alone cannot create a better world: we have to be active in trying
- to create an environment where all ideas can be expressed without the fear of
- being ostracized.
-
- On the flip side, a few of the authors statements are disturbing
- because they imply that the male species is to blame for all of these
- problems. For example:
-
- >When the conversation began to become controversial and conflicting ideas
- >were pecking, the boys and the girls who think like boys, would
- >type in an /ignore all neutopia messages so that I was blocked from
- >the public dialogue.
-
- >It is time that women be acknowledged as the natural sovereigns of the
- >species so that we will be in a position to use our knowledge and
- >wisdom we have in creating a world where all our benevolent dreams
- >find a way to self-actualize.
-
- Girls who think like boys? Natural soverigns of the species?
-
- It seems hypocritical that the author complains of experiencing
- ostracism for voicing her feminist beliefs and then goes on to make
- such exclusionary statements herself.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- THE EASY-TO-USE SOLVE THE KENNEDY ASSASSINATION THEORY CHART
-
- By Gordon Fagan (flyer@fennec.com)
-
- Instructions:
- Write down the total # of persons involved. Then write down the approximate
- frame number of the Zapruder film that matches where you believe each shot
- occurred. Then it's a simple matter of going through the list and putting
- an X under each shot number and beside each item that applies to that
- particular shot. If it doesn't apply, mark nothing. If the item applies
- but not to any particular shot number, then use the 0 shot#. Mark it with
- an X for "conspiracy to kill" or an "O" for involved in the coverup (:It
- also comes in handy for the "a tiger got him" crowd.:) I've tried to be as
- thorough as possible, but to make sure everything was covered, I did leave
- an "others" category with a fill-in-the-blank at the end of each section.
- As for the exactness of your answers, use as close of approximations as you
- feel comfortable with. Include all overlap, ie: if you believe Oswald fired
- shot #4 but was under the command/control of Naval Intelligence - mark
- Oswald and Naval Intelligence for shot #4. For simultaneous shots, give
- them both the same frame number. It's pretty much self-explanatory once
- you get into it. Enjoy.
-
-
- The JFK Conspiracy Theory Outline Form
- ---------------------------------------------------------------------------|
- Total number of persons involved
- ---------------------------------------------------------------------------|
- Conspiracy to Assassinate: __________
- ---------------------------------------------------------------------------|
- Conspiracy to Coverup: __________
- ---------------------------------------------------------------------------|
- ||||Shot# Reference line|||||||| 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
- ----------------------------------------------------------------------------|
- Approx. Zapruder frame of shot#| | | | | | | | | |
- ----------------------------------------------------------------------------|
- -------(:note: if you believe in more than 8 shots, see your doctor:)-------|
- shot# fired from:
- (0 means spotter/involved non-shooter)
- ----------------------------------------------------------------------------|
- TSBD-6th floor - east end | | | | | | | | | |
- ----------------------------------------------------------------------------|
- TSBD-6th floor-other | | | | | | | | | |
- ----------------------------------------------------------------------------|
- TSBD-roof | | | | | | | | | |
- ----------------------------------------------------------------------------|
- TSBD-other | | | | | | | | | |
- ----------------------------------------------------------------------------|
- GK-black dog man position | | | | | | | | | |
- ----------------------------------------------------------------------------|
- GK-badgeman position | | | | | | | | | |
- ----------------------------------------------------------------------------|
- GK-other | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Dal-Tex | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Dal. County Records Bldg | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Dallas County Court Bldg | | | | | | | | | |
- ----------------------------------------------------------------------------|
- storm drain | | | | | | | | | |
- ----------------------------------------------------------------------------|
- umbrella man | | | | | | | | | |
- ----------------------------------------------------------------------------|
- other:_______________________ | | | | | | | | | |
- ----------------------------------------------------------------------------|
- other:_______________________ | | | | | | | | | |
- ----------------------------------------------------------------------------|
-
- shot# Fired by: (Include all overlap)
- (0 means involved in/knew about but fired no shots)
- ----------------------------------------------------------------------------|
- Lee Harvey Oswald | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Cuban (anti-Castro) | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Cuban (pro-Castro) | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Russian (anti-communist) | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Russian (KGB/Pro-communist) | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Marseille professional | | | | | | | | | |
- ----------------------------------------------------------------------------|
- other professional | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Mafia | | | | | | | | | |
- ----------------------------------------------------------------------------|
- CIA | | | | | | | | | |
- ----------------------------------------------------------------------------|
- FBI | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Naval Intelligence | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Lyndon Johnson | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Clay Shaw | | | | | | | | | |
- ----------------------------------------------------------------------------|
- David Ferrie | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Roscoe White | | | | | | | | | |
- ----------------------------------------------------------------------------|
- J.D Tippit | | | | | | | | | |
- ----------------------------------------------------------------------------|
- Jack Ruby | | | | | | | | | |
- ----------------------------------------------------------------------------|
- umbrella man | | | | | | | | | |
- ----------------------------------------------------------------------------|
- George Hickey (S.S) - AR-15 | | | | | | | | | |
- ----------------------------------------------------------------------------|
- William Greer (S.S) - driver | | | | | | | | | |
- ----------------------------------------------------------------------------|
- nazis | | | | | | | | | |
- ----------------------------------------------------------------------------|
- UFO's/MJ-12,etc. | | | | | | | | | |
- ----------------------------------------------------------------------------|
- government conspiracy/coverup | | | | | | | | | |
- ----------------------------------------------------------------------------|
- non-govt. conspiracy/coverup | | | | | | | | | |
- ----------------------------------------------------------------------------|
- other:_______________________ | | | | | | | | | |
- ----------------------------------------------------------------------------|
- other:_______________________ | | | | | | | | | |
- ----------------------------------------------------------------------------|
-
- shot# to hit:
- ----------------------------------------------------------------------------|
- John Kennedy | | | | | | | | | |
- ----------------------------------------------------------------------------|
- John Connally | | | | | | | | | |
- ----------------------------------------------------------------------------|
- James Tague | | | | | | | | | |
- ----------------------------------------------------------------------------|
- grass | | | | | | | | | |
- ----------------------------------------------------------------------------|
- sidewalk/road | | | | | | | | | |
- ----------------------------------------------------------------------------|
- limousine | | | | | | | | | |
- ----------------------------------------------------------------------------|
- street sign | | | | | | | | | |
- ----------------------------------------------------------------------------|
- targetting "rice" bag | | | | | | | | | |
- ----------------------------------------------------------------------------|
- other:_______________________ | | | | | | | | | |
- ----------------------------------------------------------------------------|
- other:_______________________ | | | | | | | | | |
- ----------------------------------------------------------------------------|
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- The original Hacker Crackdown text file, hacker.crackdown, has been expanded
- and worked upon, and is now available in many formats, including ASCII (as
- before), TeX DVI, PostScript, etc. Look in:
-
- ftp://ftp.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/
- gopher://gopher.eff.org/00/Publications/Bruce_Sterling/Hacker_Crackdown/
- http://www.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- MEEKS DEFENSE FUND
-
- From Meeks Defense Fund <fund@idi.net>
- Subject: Details on Brock Meeks Case
-
- Dear Net Citizen:
-
- The recent Internet posting launching a fund raising drive in
- order to help Brock Meeks defray the legal expenses of a lawsuit
- brought against his news wire, CyberWire Dispatch, has drawn
- several inquiries for a summary of the issues involved in this
- case. In response, we have put together the following summary.
- (Please note, too, that the case was featured in the April 22
- (Fri.) issue of the Wall St. Journal (page B1))
-
- Sometime during February of this year, an electronic solicitation
- began appearing on the Internet from a company identified only as
- the "Electronic Postal Service" (EPS).
-
- The solicitation from EPS said the service, "will pay you money
- to receive commercial e-mail. EPS estimates you will be paid an
- average of 6.5 cents per commercial e-mail message. It is
- estimated that the average commercial e-mail receiver can make
- $200.00 to $500.00 a year and likely more. There is absolutely
- no charge, periodic charge, hourly charge or phone charge to
- receive or review EPS commercial e-mail. The sender bears all of
- the cost.
-
- You are provided with a free EPS mailbox and you may access this
- EPS mailbox through a toll free phone number so there are no
- phone line charges... In addition... EPS offers you... full
- Internet access including network Internet e-mail remote log-in,
- file transfer capability and much more."
-
- To sign up you were required to call an 800 number or send for
- information to the EPS Internet account (eps@world.std.com). You
- had to include your name and address.
-
- Brock called and asked for the EPS information. It never came.
- Instead, he received an unwanted and unsolicited direct mailing
- from a company called Suarez Corporation Industries (SCI). The
- mailing came in the form of a 6 page letter signed by Benjamin
- Suarez. That mailing claimed that for a price of $159, Suarez
- would send you a book and software that could help you create a
- "net profit generation system" capable of earning anywhere from
- $30,000 to $1 million per year.
-
- Brock began investigating why he received the SCI mailing and
- soon found out that Suarez had obtained his name from the request
- for EPS information. More investigation found that the EPS
- account was registered to Suarez Corporation Industries. Brock
- then looked into the background of this company.
-
- During his investigation into SCI, Brock discovered that state
- and federal enforcement agencies had brought actions against SCI
- result of their direct mailing practices.
-
- In his article, Brock expressed his personal disapproval of the
- SCI business activities. SCI objected to the article and has
- filed a defamation lawsuit claiming Brock made defamatory remarks
- and sought to disparage his products "and otherwise tortiously
- (sic) interfere with the plaintiff's ability to develop" EPS.
- Suarez claims the Dispatch article lost him business and he is
- seeking compensatory and punitive damages and demanding an
- injunction to block Brock from writing further about SCI or its
- founder, Benjamin Suarez.
-
- The April 22 (page B1) issue of the Wall St. Journal says lawsuit
- "is one of the first U.S. libel cases to arise out of the
- free-for-all on the Internet... If it succeeds, some legal
- experts say it could spawn other complaints."
-
- For those who don't know Brock, he has a long history as a
- journalist writing in the on-line field, having written for Byte,
- Wired and other journals over the years. He lives and works
- today in the Washington, D.C. area writing during the day for a
- communications trade journal. Cyberwire Dispatch is his own
- creation. The suit against him was filed in Ohio. Without
- the generous offer of legal support from his current lawyers, who
- have offices in Ohio, Brock's situation would be even more dire.
-
- The Meeks case raises legal issues that may have far-reaching
- implications for freedom of speech and free expression on the
- internet. If journalists are unable to pursue important
- investigative issues without fear of reprisal, then
- all of us will suffer. This is exactly the type of chilling
- effect hat the First Amendment was intended to avoid and the
- reason we need your support.
-
- Of course defamation laws are to be applied to the Net, but how
- they are applied -- and this case will be an important first step
- in that process -- could determine just how open and free people
- will feel to speak their minds.
-
- This is NOT a case in which a writer on the Internet has, in
- fact, libeled someone else. Brock absolutely denies the charges
- against him. And every lawyer that Brock has consulted and
- looked at the text Brock wrote, and the charges against him,
- believe that he ha not written anything that can fairly be
- characterized as libelous.
-
- The Legal Defense Fund is formed to assure that Brock is well
- defended.
-
- As a reminder, contributions can be made in two ways, either
- tax-deductible or non-deductible.
-
- A special thanks goes to the Point Foundation for agreeing early
- on in the process to assist in organizing and serving as a
- collection agent for the Fund.
-
-
- If you have any questions, you can contact the Fund at
- Fund@idi.net.
-
-
- For tax-deductible contributions send those checks to:
-
- Meeks Defense Fund
- c/o Point Foundation
- 27 Gate Five Road
- Sausalito, CA 94965
-
- For those who don't care about the tax deductible status, send
- contributions to:
-
- Meeks Defense Fund
- c/o IDI
- 901 15th St. NW
- Suite 230
- Washington, DC 20005
-
- THE BROCK MEEKS DEFENSE FUND COMMITTEE
-
- Samuel A. Simon
- President, Issue Dynamics, Inc.*
- ssimon@idi.net
-
- John Sumser
- Editor/Executive Director
- Whole Earth Review/ Point Foundation
- jrsumser@well.sf.ca.us
-
- Mitch Kapor
- Chair, Electronic Frontier Foundation*
- mkapor@eff.org
-
- David Farber
- The Alfred Fitler Moore Professor of Telecommunications Systems
- University of Pennsylvania*
- farber@central.cis.upenn.edu
-
- Philip Elmer-DeWitt
- Senior Writer
- TIME Magazine*
- ped@panix.com
-
- Marc Rotenberg
- Electronic Privacy Information Center*
- Rotenberg@epic.org
-
- Nicholas Johnson
- Former FCC Commissioner*
- 1035393@mcimail.com
-
- Jerry Berman
- Electronic Frontier Foundation*
- jberman@eff.org
-
- Mike Godwin
- Electronic Frontier Foundation*
-
- ####################################################################
- # Meeks Defense Fund | Internet: fund@idi.net #
- # ---------------------------------------------------------------- #
- # c/o IDI c/o Point Foundation #
- # 901 15th St. NW 27 Gate Five Road #
- # Suite 230 Sausalito, CA 9465 #
- # Washington, DC 20005 #
- ####################################################################
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- HACKERS ON PLANET EARTH
-
- From: Emmanuel Goldstein (emmanuel@well.sf.ca.us)
- To: Editors@fennec.com
-
- HACKERS ON PLANET EARTH
-
- The First U.S. Hacker Congress
-
- Yes, it's finally happening. A hacker party unlike anything ever seen
- before in this country. Come help us celebrate ten years of existence
- and meet some really interesting and unusual people in the process.
- We've rented out the entire top floor of a midtown New York hotel,
- consisting of several gigantic ballrooms. The conference will run
- around the clock all weekend long.
-
- SPEAKERS AND SEMINARS: Will there be famous people and celebrity
- hackers? Of course, but the real stars of this convention will be
- the hundreds of hackers and technologically inclined people journeying
- from around the globe to share information and get new ideas.
- That is the real reason to show up. Seminars include:
- social engineering, cellular phone cloning, cable TV security,
- stealth technology and surveillance, lockpicking, boxing of all sorts,
- legal issues, credit cards, encryption, the history of 2600,
- password sniffing, viruses, scanner tricks, and many more in the
- planning stages. Meet people from the Chaos Computer Club, Hack-Tic,
- Phrack, and all sorts of other k-rad groups.
-
- THE NETWORK: Bring a computer with you and you can tie into the huge
- Ethernet we'll be running around the clock. Show off your system and
- explore someone else's (with their permission, of course). We will
- have a reliable link to the Internet in addition. Finally, everyone
- attending will get an account on our hope.net machine. We encourage
- you to try and hack root. We will be giving away some valuable prizes
- to the successful penetrators, including the keys to a 1994 Corvette.
- (We have no idea where the car is, but the keys are a real
- conversation piece.) Remember, this is only what is currently planned.
- Every week, something new is being added so don't be surprised to find
- even more hacker toys on display. We will have guarded storage areas
- if you don't want to leave your equipment unattended.
-
- VIDEOS: We will have a brand new film on hackers called
- "Unauthorized Access", a documentary that tells the story from
- our side and captures the hacker world from Hamburg to Los Angeles
- and virtually everywhere in between. In addition, we'll have
- numerous foreign and domestic hacker bits, documentaries,
- news stories, amateur videos, and security propaganda. There
- has been a lot of footage captured over the years - this will
- be a great opportunity to see it all. We will also have one
- hell of an audio collection, including prank calls that put
- The Jerky Boys to shame, voice mail hacks, and even confessions
- by federal informants! It's not too late to contribute material!
-
- WHERE/WHEN: It all happens Saturday, August 13th and Sunday,
- August 14th at the Hotel Pennsylvania in New York City
- (Seventh Avenue, between 32nd and 33rd Streets, right across
- the street from Penn Station). If you intend to be part of
- the network, you can start setting up Friday night.
- The conference officially begins at noon on Saturday and will
- run well into Sunday night.
-
- ACCOMMODATIONS: New York City has numerous cheap places to stay.
- Check the update sites below for more details as they come in.
- If you decide to stay in the hotel, there is a special discounted
- rate if you mention the HOPE Conference. $99 is their base rate
- (four can fit in one of these rooms, especially if sleeping bags
- are involved), significantly larger rooms are only about $10 more.
- Mini-suites are great for between six and ten people - total cost
- for HOPE people is $160. If you work with others, you can easily
- get a room in the hotel for between $16 and $50.
- The Hotel Pennsylvania can be reached at (212) PEnnsylvania 6-5000
- (neat, huh?). Rooms must be registered by 7/23/94 to get the
- special rate.
-
- TRAVEL: There are many cheap ways to get to New York City in August
- but you may want to start looking now, especially if you're coming
- from overseas. Travel agencies will help you for free. Also look in
- various magazines like Time Out, the Village Voice, local alternative
- weeklies, and travel sections of newspapers. Buses, trains, and
- carpools are great alternatives to domestic flights. Keep in touch
- with the update sites for more information as it comes in.
-
- WANTED: Uncommon people, good music (CD's or cassettes), creative
- technology. To leave us information or to volunteer to help out,
- call us at (516) 751-2600 or send us email on the Internet at:
- 2600@hope.net.
-
- VOICE BBS: (516) 473-2626
-
- INTERNET:
- info@hope.net - for the latest conference information
- travel@hope.net - cheap fares and advisories
- tech@hope.net - technical questions and suggestions
- speakers@hope.net - for anyone interested in speaking at the
- conference
- vol@hope.net - for people who want to volunteer
-
- USENET NEWSGROUPS:
- alt.2600 - general hacker discussion
- alt.2600.hope.announce - the latest announcements
- alt.2600.hope.d - discussion on the conference
- alt.2600.hope.tech - technical setup discussion
-
- REGISTRATION: Admission to the conference is $20 for the entire weekend
- if you preregister, $25 at the door, regardless of whether you stay for
- two days or five minutes. To preregister, fill out this form, enclose $20,
- and mail to: 2600 HOPE Conference, PO Box 848, Middle Island, NY 11953.
- Preregistration must be postmarked by 7/31/94. This information is only
- for the purposes of preregistration and will be kept confidential. Once
- you arrive, you can select any name or handle you want for your badge.
-
- NAME: _______________________________________________________________
-
- ADDRESS: ____________________________________________________________
-
- CITY, STATE, ZIP, COUNTRY: __________________________________________
-
- PHONE (optional): ____________ email (optional): ____________________
-
- IMPORTANT: If you're interested in participating in other ways or
- volunteering assistance, please give details on the reverse side.
- So we can have a better idea of how big the network will be, please
- let us know what, if any, computer equipment you plan on bringing and
- whether or not you'll need an Ethernet card. Use the space on the back
- and attach additional sheets if necessary.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- TV & MOVIE MANIA RADIO SHOW HITS THE INFORMATION SUPERHIGHWAY
-
- By Lauren Weinstein (lauren@vortex.com)
-
- LOS ANGELES -- In a first for an entertainment-oriented show, a
- version of the popular "Professor Neon's TV & Movie Mania" radio
- program begins worldwide distribution directly to listeners this
- week via the Internet (or as it is becoming popularly known,
- the "Information Superhighway").
-
- "The Internet now includes over 20 million users in more than 30
- countries, and is growing at an enormous rate," pointed out the
- show's producer, Lauren Weinstein of Vortex Technology.
- "Professor Neon's TV & Movie Mania has also broadcast via
- over-the-air stations, but it's apparent that the time has finally
- arrived when the global facilities of the Internet can bring this
- audio show to an even wider audience. Nobody has ever used the
- Internet to transmit a show like this before," he added.
-
- "Professor Neon's TV & Movie Mania" is a unique show which
- features a look at a broad universe ranging from classic to
- current television, films, and videos, with a special emphasis on
- the unusual, odd, silly, strange, bizarre, cult, surreal, and
- weird. The shows include reviews, interviews, and a wide range of
- special audio clips, trailers, and many other features.
-
- The interview guest for the debut Internet version of the show is
- Robert Justman, a man whose work has greatly influenced classic
- television programs ranging from "The Outer Limits" (on which he
- was assistant director) to both the original "Star Trek" and "Star
- Trek: The Next Generation" (on which he was associate producer and
- co-producer, respectively). Many of the most familiar aspects of
- these programs were the result of his ideas, and he speaks
- candidly with the show's enigmatic host, Professor Neon, about the
- production of these programs in this fascinating interview.
-
- Professor Neon has featured programs focusing on topics ranging
- from "Plan 9 From Outer Space" (with guest "Vampira" who starred
- in the classic cult film), to Forrest J. Ackerman (publisher of
- "Famous Monsters" magazine), to shows focused on topics from "The
- Twilight Zone" to "The Three Stooges".
-
- The half hour Internet version of the program is being distributed
- biweekly on the Internet via the Internet Multicasting Service in
- Washington D.C., on the "Internet Town Hall" channel, and is also
- available as a file for retrieval by any Internet user from the
- many Internet Multicasting / Internet Talk Radio archive sites
- around the world. Users retrieving the audio files can then play
- them on virtually any workstation, PC, Mac, or other computer
- with even simple audio facilities.
-
- The most recent show, as well as other information regarding the
- program, can also be heard by calling Professor Neon's TV & Movie
- Mania Machine" on (310) 455-1212.
-
- The Internet version of the show is freely distributable via
- computer networks and BBS systems. Use by over-the-air
- broadcasters requires the permission of Vortex Technology. For
- more information regarding accessing the show via the Internet,
- please use the contact below. Inquiries regarding other access
- and versions of the show for broadcast use are also invited.
-
- CONTACT: Lauren Weinstein at Vortex Technology, Woodland Hills, CA.
- (818) 225-2800 (9:30-5:30 PDT)
- lauren@vortex.com
-
- Notes to Internet folks:
-
- Information regarding the show, including current guest schedule, etc.
- is also available via FTP from site "ftp.vortex.com" (in the "tv-film-video"
- subdirectory) or via gopher from site "gopher.vortex.com" (under the
- "TV/Film/Video" menu item).
-
- For a list of Internet Multicasting Service / Internet Talk Radio archive
- sites to obtain (via FTP) the audio file for playback, send a message
- (content is not important) to:
-
- sites@radio.com
-
- The debut of the Internet version of the show will run via Internet
- Multicast from Interop on Thursday, May 5. FTP to site "ftp.media.org"
- or "www.media.org" for schedule information. The audio file of the show
- should become available in the archive sites for retrieval within a few
- days, though exact timing is variable. The filenames will probably
- be "mania1.au" for the audio and "mania1.txt" for the accompanying
- descriptive text file, though the archive maintainers may change
- the names at some point to fit their overall naming system. If you
- have trouble locating the files after a few days, please let us know.
- If you have any other questions regarding the program, feel free to
- email or call.
-
- In two weeks, our interview guest for the next show will be Joel Engel, the
- author of the definitive Rod Serling biography: "The Dreams and Nightmares
- of Life in the Twilight Zone," and of the newly released and highly
- controversial new book, "Gene Roddenberry: The Myth and the Man
- Behind Star Trek."
-
- If you have any questions for Mr. Engel please email them to:
-
- neon@vortex.com
-
- as soon as possible. Thanks much!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
-