home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 285.6 KB | 5,921 lines |
-
-
- THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
- ======================================================================
- ISSN 1074-3111 Volume One, Issue Six October 1, 1994
- ======================================================================
-
- Editor-in-Chief: Scott Davis (dfox@fc.net)
- Co-Editor/Technology: Max Mednick (kahuna@fc.net)
- Consipracy Editor: Gordon Fagan (flyer@fennec.com)
- Information Systems: Carl Guderian (bjacques@usis.com)
- Computer Security: John Logan (ice9@fennec.com)
-
- ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC
-
- U.S. Mail:
- The Journal Of American Underground Computing
- 10111 N. Lamar #25
- Austin, Texas 78753-3601
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- IMPORTANT ADDRESSES -
- ============================================================================
- To Subscribe to "TJOAUC", send mail to: sub@fennec.com
- All questions/comments about this publication to: comments@fennec.com
- Send all articles/info that you want published to: submit@fennec.com
- Commercial Registration for Profitable Media: form1@fennec.com
- Advertising Rates: rates@fennec.com
- ============================================================================
-
- "The underground press serves as the only effective counter to a growing
- power, and more sophisticated techniques used by establishment mass media
- to falsify, misrepresent, misquote, rule out of consideration as a priori
- ridiculous, or simply ignore and blot out of existence: data, books,
- discoveries that they consider prejudicial to establishment interest..."
-
- (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Contents Copyright (C) 1994 The Journal Of American Underground Computing
- and/or the author of the articles presented herein. All rights reserved.
- Nothing may be reproduced in whole or in part without written permission
- of the Editor-In-Chief and/or the author of the article. This publication
- is made available periodically to the amateur computer hobbyist free of
- charge. Any commercial usage (electronic or otherwise) is strictly
- prohibited without prior consent of the Editor, and is in violation of
- applicable US Copyright laws. To subscribe, send email to sub@fennec.com
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- DISCLAIMER AND NOTICE TO DISTRIBUTORS -
-
- NOTE: This electronic publication is to be distributed free of charge
- without modifications to anyone who wishes to have a copy. Under NO
- circumstances is any issue of this publication, in part or in whole,
- to be sold for money or services, nor is it to be packaged with other
- computer software, including, but not limited to CD Rom disks, without
- the express written or verbal consent of the author and/or editor.
- To obtain permission to distribute this publication under any of the
- certain circumstances stated above, please contact the editor at one of
- the addresses above. If you have intentions of publishing this journal
- in any of the ways described above, or you are in doubt about whether or
- not your intentions conflict with the restrictions, please contact the
- editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
- This publication is provided without charge to anyone who wants it.
- This includes, but is not limited to lawyers, government officials,
- cops, feds, hackers, social deviants, and computer hobbyists. If anyone
- asks for a copy, please provide them with one, or mail the subscription
- list so that you may be added.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- LET THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING ADVERTISE FOR YOU.
-
- Computer services, Online access, Books, Software, Video, Music,
- Wierdness, Publishing, Hardware, Anything!
-
- For more information, send electronic mail to: rates@fennec.com
- You will be mailed a detailed list of rates and other information.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- COMING SOON!!! The Journal's own World-Wide Web Home Page. You will be
- notified by mail when it is ready for use.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- NOW AVAILABLE: If you do not have FTP access, and would like to get back
- issues of the Journal, please mail: info@fennec.com for more information
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- We are sorry for the bounce test problems for this issue...we have (had)
- a new way of mailing, but it obviously failed miserably. We have the
- issue corrected.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 6
-
- TABLE OF CONTENTS
-
- Cyberdoggles And Virtual Pork Carl Guderian
- EFF Summary Of The Edwards/Leahy Digital Telephony Bill Stanton McCandlish
- Zine FAQ Jerod Pore
- Legion Of Doom T-Shirts Ad Chris Goggans
- A Point And Click Society Scott Davis
- Keynote Address: Crypto Conference Bruce Sterling
- Jackboots On The Infobahn John Perry Barlow
- Notes From Cyberspace, Volume 3 Readers
- Pornography Fouls Internet Paul Pihichyn
- Security / Coast FTP Unknown
- On the Subject of CyberCulture George Phillips
- A Comment On Clipper Azrael
- Sex, The Internet And The Idiots K.K. Campbell
- NBC's Anti-Net Campaign Alaric
- The Miami Device Project Marty Cyber
- Cybersell Michael Ege
- Some Info On Green Card Spam Unknown
- Cable Resources On The Net John Higgins
- IDS Announces New Rochelle, New York POP (AC 914) green@ids.net
- The Media List Adam M. Gaffin
- A TeleStrategies Event/Commercial Internet eXchange Unknown
- Scream Of Consciousness From WIRED 1.1 Stewart Brand
- Digital Cash Mini-FAQ For The Layman Jim Miller
- Patent Searching Email Server Now Open Gregory Aharonian
- Five "Hackers" Indicted for Credit Card/Computer Fraud CUD/AP Wire
- Clipper T-Shirts Norman Harman
- Cybernews Debuts Patrick Grote
- PC Magazine Declares The PIPELINE Best Internet Service James Gleick
- Scout Report Subscriptions Exceed 10,000 Internic
- The Future Of The Net Is At Hand James Parry
- Galactic Guide FAQ Steve Baker
- Employment Background Checks Agre/Harbs
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- The Computer Is Your Friend -Unknown
- Send Money, Guns, And Lawyers -H. S. Thompson
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CYBERDOGGLES AND VIRTUAL PORK - A SCENARIO FOR INTERNET II
-
- By Carl Guderian <bjacques@usis.com>
-
- As one battle gets underway another is joined. While the EFF and others
- work to defend the noisy, colorful anarchy of the Net from the net.cops,
- the latter have begun gearing up for the endgame. If it's true that the
- electronic frontier is getting crowded while its newer colonists consider
- it too bare, then another system will be needed in a few years. That's the
- virtual Valley of Megiddo, the site of the (next) Final Battle between the
- techno-romantics and the corporate greyfaces. Internet II, or whatever
- they'll call it, is now only a vague idea in the minds of a few bureaucrats
- and infotainment industry execs, but it'll wind up a Mall of America,
- Panopticon, City of Quartz, or some other negative social metaphor (Brazil?).
- The first Internet grew up free because it was defined wholly by the users.
- Internet II, by contrast, will be a hybrid of corporate and government
- visions, combining the worst of both in a kind of Mendelian genetic
- distribution in which all offspring are defective. To the government it's
- a tax base and surveillance network; to industry it's a direct channel
- to a self-selecting, well-heeled market. To users the Internet is a
- community for which they've worked too hard to let it be taken away without
- a fight.
-
- The most obvious model for the Internet II standard is the U.S., or any
- other, civilian space program. It is about nothing so much as itself. The
- aerospace companies that are today inseparable from national space
- establishments make rockets or communications satellites. Like the designers
- of Internet II, they are concerned with delivering product (audiences) to
- the customers (advertisers). People generally support the space program
- because they hope it will open up space travel to everybody, from
- interplanetary honeymooners to lunar Libertarians (Jetsonian democracy!).
- Likewise, the Internet is popular because it's a vehicle for forming
- communities and getting free stuff. But Internet II will be about bandwidth,
- markets and security. The last item is emphasized because such a huge
- investment must be protected somehow, from the users of course. Whatever
- vision there might have been will be refocused instead on infrastructure.
- Call it information superhighway hypnosis, a trail of yellow stripes
- stretching to the horizon. Truly a vision to stir the soul.
-
- The pork barrel politics that characterize all big government projects will
- find a new arena on Internet II. The government can no longer pay for
- megaprojects like Internet II, but it can grant electronic Letters of
- Marque for companies to plunder the virtual seas under the federal colors.
- Obviously, the company or consortium that gets to write the new, none-dare-
- call-it-proprietary Internet protocols will have a leg up on competitors,
- sorta like the advantage Microsoft officially doesn't have over other
- developers for Windows. In the current and upcoming Congressional funding
- battles, watch for posturing by lawmakers from whatever states the
- infotainment conglomerates call their nominal homes (Austin? Provo? Los
- Gatos?).
-
- The relatively meager funding doled out by the government will become an
- instrument of control, and privacy and free expression on Internet II will
- be the first to go. While Reagan preached getting the government off the
- backs of the people, Transportation Secretary Elizabeth (Mrs. Bob) Dole
- ordered states to raise drinking ages and enforce seat-belt laws or else
- lose federal funding for highway development. The states meekly complied.
- Would-be government contractors will be told, adopt a Clipper-like standard
- or don't bother to apply. Infotainment industry execs will be grilled by
- Congress for allowing "pone" on the net. Subsequently, said execs will
- promise to read private e-mail and censor discussions in exchange for easy
- passage of whatever bill they're promoting at the time. In 1985, the Parents
- Music Resource Center, led by Tipper (Mrs. Albert) Gore and financed by the
- likes of Mike Love of the Beach Boys, instigated Senatorial hearings on
- raunchy rock lyrics. Recording studio heads and distributors agreed to
- label and categorize "offensive" music in hopes Congress would tax blank
- tapes to offset revenue losses the industry attributed to home taping.
- Happily, the bill died and the hearings degenerated into a circus. But
- community standards on Internet II may be those of Memphis, Tennessee, if a
- recent court decision stands, and the only cyber-sex will be the user
- squealing like a pig for multimedia producers, petty bureaucrats, and self-
- appointed moral watchdogs. Government attempts to rein in the Internet
- community will continue no matter which party is in power. Repression smells
- the same whether it's for "national security," "community standards,"
- or raising PG kids in an X-rated world.
-
- Corporate plans for Internet II are even less palatable. The future dream
- is a shopping scheme, a Third Mall from the Sun. This corporate paradigm
- will kill the Internet as surely as will government interference and turn
- it into M-San Internet of shopkeepers. In a shopping mall the offerings are
- calculated to offend no one, so they please no one. Though a mall could, in
- theory, serve diverse interests, in reality it does not. Individual tastes
- being what they are, a customer could be offended by what it finds upon
- wandering into the wrong shop, and may leave the mall without buying
- anything. As a result, the mall loses the customer to a rival mall. To avoid
- this risk, the mall operator rents to shops with watered down selections,
- nothing too daring. Similarly, in a corporate online service, the range of
- allowable discussion topics is kept small to prevent users from who access
- the wrong discussion groups. Though itM-Xs possible to restrict access to the
- forum without censoring discussion within it, most services take the lazy way
- out and forbid them altogether, in case a user objects to their very
- existence. So much for open discussion on Internet II.
-
- The corporate vision accommodates shopkeepers who hate customers who browse
- but don't buy. Customers can turn a mall into a kind of public space for the
- price of a few sodas and pizza slices. Americans online on Internet II,
- however, will have to pay by the hour just to hang around. The ticking clock
- will prompt them to hurry up and pay for something to download. After being
- on the clock at work, consumers will get to log on and shop on the clock.
- Constant reminders of a rising bill will discourage idle chatting on the
- newsgroups, further restricting discussion on Internet II.
-
- Security will become an issue as cyberspace, once considered a kind of
- public space, becomes privatized. As with Los Angeles, Internet II will be
- vandalized by users who will take no pride in it because they will not own
- it. The Secret Service will work as mall cops for the owners of Internet II.
- The promise of "500 channels" betrays the limits of corporate vision.
- Internet II will be "one-to-many" like cable TV instead of the "many-to-many"
- structure of the common carriers, because the former facilitates billing and
- control by local monopolies. Also, customers are not accustomed to
- pay-per-call on a local line, but they're getting used to pay-per-view
- programming on cable. Will you cuss and spit when you drop offline during a
- rainstorm? You will...with [censored].
-
- In the end, the corporate Internet will be designed for consumption, not
- community. Online services consider the latter an impediment to steady
- profits. Bovine consumers shop contentedly on 500 channels; discontented
- talkers just hog the lines. If corporate services had to destroy online
- communities that spring up like weeds in their well-kept yards, they would.
- Fortunately, they wonM-Xt have to; the Online Mall is barren ground.
-
- By some estimates, 1998 is the deadline to keep the Net from turning into
- the Third Mall from the Sun or that sanitized 1901 Kansas-style underground
- city in "A Boy and His Dog." Here are ways to kill that serpent in its
- shell.
-
- - Breathe down the necks of the architects of Internet II.
- Infotainment industry demands may require physical features that
- facilitate billing and copyright protection. The IRS and the cops will
- certainly want their own window into the Net. What the users want,
- assuming they know, is considered irrelevant. Change that by working
- through groups like the Electronic Frontier Foundation, but keep them from
- accepting "compromise" measures to wiretap "only" certain communications
- channels. It's like prison etiquette, in which the proper response to a
- proprietary hand on the shoulder is either a sock on the jaw or meek
- acceptance of what comes next. Given what's at stake, such a savage ethic
- applies. Freedom lent is freedom lost.
-
- - Boycott obvious government lapdogs.
- Do not surrender the Internet to the government; it has no legitimate
- claim to it. The Internet is like an abandoned military base built into a
- community by squatters. The original tenants have long ago gotten their
- money's worth from it and cannot take credit for the value added by the
- new settlers. The Internet communications standard, TCP/IP, which turned
- all the networks into the Internet, is public domain. The feds don't own
- it any more than they own the measurement of one U.S. gallon. The
- government still owns high-speed backbones, such as the National Science
- Foundation's NSFnet, and it can and does allow semi-private consortia like
- Merit to operate and maintain them. The users should claim the Internet,
- however, by usufruct ("fruitful use"), a legal concept under which
- squatters gain the right to occupy a structure in exchange for having
- improved it. If all else fails, boycott Internet II and go back to
- TCP/IP. The latter may not have the bandwidth and the bells and whistles
- of Internet II, but it works well enough and won't have wiretap-friendly
- features built into it. Most projected growth will come from the online
- services dumping settlers by the millions on Internet II, taking the load
- off the present Internet. Currently dedicated but unused Internet addresses
- can be redistributed. TCP/IP, the current protocol, can support 20+ million
- people worldwide, which is probably the proportion of the population
- willing and able to protect their freedom online. Even without an Internet,
- there are systems that will work in a pinch, like FIDOnet, invented by Tom
- Jennings and a few others. Using personal computers and ordinary phone
- lines, FIDOnet delivers e-mail to 30,000+ sites in the world. So
- alternatives exist, though it would be a shame to have to abandon a
- community just when it was starting to mature. De-evolution of the
- Internet community is a likely outcome but it's not inevitable. For the
- first time since the Whiskey Rebellion there's a chance to redirect
- American history from the seemingly endless march to centralized control.
- The technology is pretty cheap and widely available (unlike rockets), so
- it's a rare opportunity for real grass-roots action to create something
- that people can actually use. Internet doesn't have to go the way of other
- Big Science projects. But it will take a real fight; the other side won't
- deal if it doesn't think it has to. At stake is the future of the online
- community. Civilization built in an Autonomous Zone or pay-per-view
- surveillance (guess who pays?) in the Third Mall from the Sun:
- WHICH WILL IT BE? Those words fill the screen, accompanied by Raymond
- Massey whispering and chorus singing same, in "Things to Come." Fadeout).
-
- The Third Mall from the Sun concept belongs to late comic genius Bill Hicks.
- Burn joss money in his memory to help cover his bar tab in the afterlife.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
- IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
- YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
- PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- EFF SUMMARY OF THE EDWARDS/LEAHY DIGITAL TELEPHONY BILL
-
- From Stanton McCandlish <mech@eff.org>
-
- OVERVIEW
- --------
-
- The Edwards/Leahy Digital Telephony bill places functional requirements on
- telecommunications carriers in order to enable law enforcement to continue
- to conduct authorized electronic surveillance. It allows a court to impose
- fines on carriers that violate the requirements, and mandates that the
- processes for determining capacity requirements and technical standards be
- open and public. The bill also contains significant new privacy
- protections; including an increased standard for government access to
- transactional data (such as addressing information contained in electronic
- mail logs), a requirement that information acquired through the use of pen
- registers or trap and trace devices not disclose the physical location of an
- individual, and an expansion of current law to protect the radio portion of
- cordless telephone conversations from unauthorized surveillance.
-
-
- SCOPE OF THE BILL. WHO IS COVERED?
- -----------------------------------
-
- The requirements of the bill apply to "telecommunications carriers", which
- are defined as any person or entity engaged in the transmission or
- switching of wire or electronic communications as a common carrier for hire
- (as defined by section 3 (h) of the Communications Act of 1934), including
- commercial mobile services (cellular, PCS, etc.). The bill also applies to
- those persons or entities engaged in providing wire or electronic
- communication switching or transmission service to the extent
- that the FCC finds that such service is a replacement for a substantial
- portion of the local telephone exchange.
-
- The bill does not apply to online communication and information services
- such as Internet providers, Compuserve, AOL, Prodigy, and BBS's. It also
- excludes private networks, PBX's, and facilities which only interconnect
- telecommunications carriers or private networks (such as most long
- distance service).
-
-
- REQUIREMENTS IMPOSED ON CARRIERS
- --------------------------------
-
- Telecommunications carriers would be required to ensure that they
- possess sufficient capability and capacity to accommodate law enforcement's
- needs. The bill distinguishes between capability and capacity
- requirements, and ensures that the determination of such requirements occur
- in an open and public process.
-
-
- CAPABILITY REQUIREMENTS
- -----------------------
-
- A telecommunications carrier is required to ensure that, within four years
- from the date of enactment, it has the capability to:
-
- 1. expeditiously isolate the content of a targeted communication
- within its service area;
-
- 2. isolate call-identifying information about the origin and
- destination of a targeted communication;
-
- 3. enable the government to access isolated communications at a point
- away from the carrier's premises and on facilities procured by the
- government, and;
-
- 4. to do so unobtrusively and in such a way that protects the privacy
- and security of communications not authorized to be intercepted
- (Sec. 2601).
-
- However, the bill does not permit law enforcement agencies or officers to
- require the specific design of features or services, nor does it prohibit a
- carrier from deploying any feature or service which does not meet the
- requirements outlined above.
-
-
- CAPACITY REQUIREMENTS
- ---------------------
-
- Within 1 year of enactment of the bill, the Attorney General must
- determine the maximum number of intercepts, pen register, and trap and
- trace devices that law enforcement will require four years from the date of
- enactment. Notices of capacity requirements must be published in the
- Federal Register (Sec. 2603). Carriers have 4 years to comply with
- capacity requirements.
-
- PROCESS FOR DETERMINING TECH. STANDARDS TO IMPLEMENT CAPABILITY REQUIREMENTS
- ----------------------------------------------------------------------------
-
- Telecommunications carriers, through trade associations or standards
- setting bodies and in consultation with the Attorney General, must
- determine the technical specifications necessary to implement the
- capability requirements (Sec. 2606).
-
- The bill contains a 'safe harbor' provision, which allows a carrier to meet
- its obligations under the legislation if it is in compliance with publicly
- available standards set through this process. A carrier may deploy a
- feature or service in the absence of technical standards, although in such
- a case the carrier would not be covered by the safe harbor provision and
- may be found in violation.
-
- Furthermore, the legislation allows any one to file a motion at the FCC in
- the event that a standard violates the privacy and security of
- telecommunications networks or does not meet the requirements of the bill
- (Sec. 2606). If petitioned under this section, the FCC may establish
- technical requirements or standards that:
-
- 1) meet the capability requirements (in Sec. 2602);
-
- 2) protect the privacy and security of communications not authorized
- to be intercepted, and;
-
- 3) encourage the provision of new technologies and services to the
- public.
-
-
- ENFORCEMENT AND PENALTIES
- -------------------------
-
- In the event that a court or the FCC deems a technical standard to be
- insufficient, or if law enforcement finds that it is unable to conduct
- authorized surveillance because a carrier has not met the requirements of
- this legislation, the Attorney General can request that a court issue an
- enforcement order (an order directing a carrier to comply), and/or a fine
- of up to $10,000 per day for each day in violation (Sec. 2607). However, a
- court can issue an enforcement order or fine a carrier only if it can be
- determined that no other reasonable alternatives are available to law
- enforcement. This provision allows carriers to deploy features and
- services which may not meet the requirements of the bill. Furthermore,
- this legislation does not permit the government to block the adoption or
- use of any feature or service by a telecommunications carrier which does
- not meet the requirements.
-
- The bill requires the government to reimburse carriers for all reasonable
- costs associated with complying with the capacity requirements. In other
- words, the government will pay for upgrades of current features or
- services, as well as any future upgrades which may be necessary, pursuant
- to published notices of capacity requirements (Sec. 2608).
-
- There is $500,000,000 authorized for appropriation to cover the costs of
- government reimbursements to carriers. In the event that a smaller sum is
- actually appropriated, the bill allows a court to determine whether a
- carrier must comply (Sec. 2608 (d)). This section recognizes that
- telecommunications carriers may not be responsible for meeting the
- requirements if the government does not cover reasonable costs.
-
- The government is also required to submit a report to congress within four
- years describing all costs paid to carriers for upgrades (Sec. 4).
-
-
- ENHANCED PRIVACY PROTECTIONS
- ----------------------------
-
- The legislation contains enhanced privacy protections for transactional
- information (such as telephone toll records and electronic mail logs)
- generated in the course of completing a communication. Current law permits
- law enforcement to gain access to transactional information through a
- subpoena. The bill establishes a higher standard for law enforcement
- access to transactional data contained electronic mail logs and other
- online records. Telephone toll records would still be available through a
- subpoena. Under the new standard, law enforcement is required to obtain a
- court order by demonstrating specific and articulable facts that electronic
- mail logs and other online transactional records are relevant and material
- to an ongoing criminal investigation (Sec. 10).
-
- Law enforcement is also prohibited from remotely activating any
- surveillance capability. All intercepts must be conducted with the
- affirmative consent of a telecommunications carrier and activated by a
- designated employee of the carrier within the carrier's facilities (Sec.
- 2604).
-
- The bill further requires that, when using pen registers and trap and trace
- devices, law enforcement will use, when reasonably available, devices which
- only provide call set up and dialed number information (Sec. 10). This
- provision will ensure that as law enforcement employs new technologies in
- pen register and trap and trace devices, it will not gain access to
- additional call setup information beyond its current authority.
-
- Finally, the bill extends the Electronic Communications Privacy Act (ECPA)
- protections against interception of wireless communications to cordless
- telephones, making illegal the intentional interception of the radio
- portion of a cordless telephone (the transmission between the handset
- and the base unit).
-
-
- CELLULAR SCANNERS
- -----------------
-
- The bill makes it a crime to possess or use an altered telecommunications
- instrument (such as a cellular telephone or scanning receiver) to obtain
- unauthorized access to telecommunications services (Sec. 9). This
- provision is intended to prevent the illegal use of cellular and other
- wireless communications services. Violations under this section face
- imprisonment for up to 15 years and a fine of up to $50,000.
-
-
- IMPROVEMENTS OF THE EDWARDS/LEAHY BILL OVER PREVIOUS FBI PROPOSALS
- ------------------------------------------------------------------
-
- The Digital Telephony legislative proposal was first offered in 1992 by the
- Bush Administration. The 1992 version of the bill:
-
- * applied to all providers of wire or electronic communications
- services (no exemptions for information services, interexchange
- carriers or private networks);
-
- * gave the government the explicit authority to block or enjoin a
- feature or service that did not meet the requirements;
-
- * contained no privacy protections;
-
- * contained no public process for determining the capacity
- requirements;
-
- * contained no government reimbursement (carriers were responsible
- for meeting all costs);
-
- * would have allowed remote access to communications by law
- enforcement, and;
-
- * granted telecommunications carriers only 18 months to comply.
-
- The Bush Administration proposal was offered on capitol hill for almost a
- year, but did attract any congressional sponsors.
-
- The proposal was again offered under the Clinton Administration's FBI in
- March of 1993. The Clinton Administration's bill was a moderated version
- of the original 1992 proposal:
-
- * It required the government to pay all reasonable costs incurred by
- telecommunications carriers in retrofitting their facilities in
- order to correct existing problems;
-
- * It encouraged (but did not require), the Attorney General to consult
- with telecommunications industry representatives and standards
- bodies to facilitate compliance,
-
- * It narrowed the scope of the legislation to common carriers, rather
- than all providers of electronic communications services.
-
- Although the Clinton Administration version was an improvement
- over the Bush Administration proposal, it did not address the
- larger concerns of public interest organizations or the
- telecommunications industry. The Clinton Administration version:
-
- * did not contain any protections for access to transactional
- information;
-
- * did not contain any public process for determining the capability
- requirements or public notice of law enforcement's capacity needs;
-
- * would have allowed law enforcement to dictate system design and
- bar the introduction of features and services which did not meet
- the requirements, and;
-
- * would have allowed law enforcement to use pen registers and trap and
- trace devices to obtain tracking or physical location information.
-
-
- Locating Relevant Documents
- ===========================
-
- ** Original 1992 Bush-era draft **
-
- ftp.eff.org, /pub/EFF/Policy/FBI/Old/digtel92_old_bill.draft
- gopher.eff.org, 1/EFF/Policy/FBI/Old, digtel92_old_bill.draft
- http://www.eff.org/pub/EFF/Policy/FBI/Old/digtel92_old_bill.draft
- bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital
- Telephony; file: digtel92.old
-
- ** 1993/1994 Clinton-era draft **
-
- ftp.eff.org, /pub/EFF/Policy/FBI/digtel94_bill.draft
- gopher.eff.org, 1/EFF/Policy/FBI, digtel94_bill.draft
- http://www.eff.org/pub/EFF/Policy/FBI/digtel94_bill.draft
- bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital
- Telephony; file: digtel94.dft
-
-
- ** 1994 final draft, as sponsored **
-
- ftp.eff.org, /pub/EFF/Policy/FBI/digtel94.bill
- gopher.eff.org, 1/EFF/Policy/FBI, digtel94.bill
- http://www.eff.org/pub/EFF/Policy/FBI/digtel94.bill
- bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital
- Telephony; file: digtel94.bil
-
-
- ** EFF Statement on sponsored version **
-
- ftp.eff.org, /pub/EFF/Policy/FBI/digtel94_statement.eff
- gopher.eff.org, 1/EFF/Policy/FBI, digtel94_statement.eff
- http://www.eff.org/pub/EFF/Policy/FBI/digtel94_statement.eff
- bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital
- Telephony; file: digtel94.eff
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- 'ZINE FAQ
-
- By Jerod Pore (jerod23@well.sf.ca.us)
-
- This file is Shareright 1994 by Jerod Pore; you may (and please do) copy,
- reproduce, replicate and distribute this information however, whereever
- and in whatever format, and as often as you wish, as long as this sentence
- is included.
-
- Answers to Frequently Asked Questions.
-
- What are zines?
-
- Zines are small press publications with a press run of 15 - 5,000. They
- often deal with obscure or controversial subjects, or they're about the
- life of the publisher, or they're about the latest underground muzak
- sensation.
-
- How does one find out about zines?
-
- The best place to start is with Factsheet Five or Factsheet Five-Electric.
- We review 1,000 - 1,500 zines every three months (more or less). We
- provide ordering information, size, quality of reproduction, contents and
- what we think about a zine. Once you get a few zines that sound
- interesting, you'll notice other zines referred to. Pretty soon you'll
- have more reading material then you know what to do with.
-
-
- How does one produce a zine?
-
- That's beyond the scope of this document. But my stock answer is go to
- lunch at 11:30 am, get back by 12:15 and you should have plenty of time
- to use the equipment at school or at work. Write down your thoughts (I
- suggest doing artwork on your own time), photocopy 40 or 50 copies, send
- one to us and to a few zines you think would be interested in yours.
- You may want to get the Zine Publishers' Resource guide, either $3.00
- from Seth at the address below, or the prior version is available from
- the ftp and gopher sites.
-
-
- How does one get the zines?
-
- When ordering zines, cash is the best medium of exchange. Forget what
- your mother told you about evil thieves stealing one dollar bills out of
- mail boxes. If you absolutely must send a check or money order (and a
- money order is preferred over a check), then make it out to the name in
- the address portion of the reviews. However, many people publish zines
- under pseudonyms. Unless available only for a ridiculous amount of money,
- just send cash.
-
- Many zines, especially personal zines, science fiction fanzines and
- anarchist zines are available for what is quaintly known as "The Usual."
- "The Usual" is your zine or tape or record or calendar in trade, or a
- well-written Letter of Comment on the subject of the zine, or $2 - $3.
- Be warned about a few things. There are no guarantees. Checks are
- likely to be thrown away. Some zine names with especially offensive
- titles have often had their mail thrown away by self-righteous born-
- again postal workers, I kid you not! If the name of the zine is apt to
- offend your third-grade teacher, don't put it on the envelope. Some
- zines published in rather provincial parts of the world won't get their
- mail if the publisher's name isn't on the envelope, so whatever the name
- is in address, that's the name that should go on the envelope. I can
- work only with what information is provided me. I'll post any special
- requirements that are conveyed to me. If a zine is free, you may want
- to help out with some stamps. Free often translates as "The Usual," and
- many anarchists will accept food stamps.
-
-
- How to contact us with questions, etc. regarding F5 - either the paper
- or electronic versions.
-
- The email address for Factsheet Five and Factsheet Five - Electric is:
- jerod23@well.sf.ca.us
-
- Once upon a time, Seth had an email address. It may be reactivated in the
- future. The phone number for Factsheet Five (paper only) is +1-415-668-1781
-
-
- Where should stuff be sent?
-
- For anything that can't be sent electronically, which is most of the
- stuff we deal with; comments, questions, feedback, donations, zines and
- other contributions to the defense of free expression rights around the
- world should be sent to either of these addresses:
-
- Factsheet Five
- Seth Friedman
- PO Box 170099
- San Francisco CA 94117-0099
- (This is the *only* address for subscriptions to the paper version)
-
- Factsheet Five
- Jerod Pore
- 1800 Market St.
- San Francisco CA 94102-6297
- (This address is good for items that can't be sent to a PO Box)
-
- If you have a preference of reviewers, then send your zine to either of
- the above addresses as you see fit. Please, though, send your zine to
- just *ONE* address. Multiple copies just slow us down. I do most of
- the Fringe, Hate, Rant, SubGenius and Science Fiction/Fantasy zines.
- Seth either reviews or distributes the rest.
-
- We have a couple of long-time reviewers for two niches. They publish
- their own review zines so you get twice the coverage. We must stress that
- you send poetry to Luigi-Bob, because poetry sent to San Francisco won't
- be reviewed for a couple of issues.
-
- Send your queer, bi or especially prurient zines to:
-
- Larry-bob
- Queer Zine Explosion
- PO Box 591275
- San Francisco CA 94159-1275
-
- Send all poetry or prose/poetry zines with lots of poetry to:
-
- Luigi-Bob Drake
- Burning Press
- PO Box 585
- Lakewood OH 44107
-
- How does one obtain the reviews of zines?
-
- The files that comprise Factsheet Five - Electric are available for
- online reading or downloading from WELL or with a gopher client with
- gopher gopher.well.sf.ca.us. The files are also available via anonymous
- ftp from etext.archive.umich.edu in /pub/Factsheet.Five. The prior issue
- is in /pub/Factsheet.Five/Last.Issue. The WWW site is http://www.well.com/
- You may subscribe to Factsheet Five - Electric by emailing me with
- "subscribe" in the subject line and your email address as the *entire* text.
- The files are sent out as they become available. Email subscriptions are
- sent out *last*, as it's a real pain in the ass for me to deal with.
- F5-E is available from other ftp and gopher sites, as well as BBS's around
- the world, but I don't track other locations.
-
-
- What is the best method of receiving the review files?
-
- The WELL is the "best" place. Not only is The WELL the greatest BBS in
- CyberSpace (no, I don't get a kickback; I pay $30-50 a month to be on
- WELL) it's the homebase for F5 - Electric. The most recent files are
- there. Online zines that are sent to me are there. News, gossip and
- rumours about zines and other underground media are there. 2600, Full
- Disclosure, bOING-bOING and other zinesters are there. The
- WELL is, however, somewhat expensive at $15.00 a month and $2.00 an
- hour. After WELL, ftp, gopher or WWW are the next best ways of getting
- the files.
-
- Our ftp sites accept anonymous as a login and your return address as a
- password. For some people, especially those of you on FidoNet, Compu$erve
- and other services with email-only gateways to The Internet, email is the
- *only* way to get the files. Unfornuately, the large file sizes (files
- range from 8 - 100k) prevent many locations from receiving them through
- email, especially uunet and uucp sites.
-
-
-
- How do ftp, gopher and WWW users know when new or updated files are
- available?
-
- For now, updates to F5-E will be announced in the newsgroups that
- attract people interested in zines: alt.zines and rec.mag
- An excellent suggestion was made about having an email service that
- announces just the names of the new or updated files to ftp users.
- I've juggled two email subscription lists, so this idea will be too much
- of a hassle to implement. I don't know if the zines-list is still active.
- If it is, I might send announcements out that way.
-
- What is alt.zines?
-
- alt.zines is a Usenet newsgroup about zines. It's where we discuss zine
- publishing, hype our zines, bitch about mainstream publications trying
- to coopt zines and so forth. It's unmoderated, but there's a few of us
- there most of the time to answer these questions over&over&over and to
- point out that your slick publication about Christian technology with a
- circulation of over 150,000 is *not* a zine.
-
- Much of the posts in alt.zines are xposted to rec.mag, to benefit people
- at sites where the anal-retentive administrators refuse to carry the
- alt. hierarchy.
-
-
- May the files be reprinted or posted elsewhere?
-
- All files (just like this one) are shareright. You may reproduce the
- information contained within them freely as long as others may reproduce
- that same information. In other words, you may use but not copyright
- these files. Shareright does not prevent you from charging money (or
- whatever your preferred medium of exchange is) for distribution.
- Including pertinent parts of this file, and giving credit to the
- reviewers is especially good for your karma, but not absolutely required
- to use what you wish of the review files. We're more interested in the
- widespread dissemination of the information. BBS operators are
- especially encouraged to make whatever files you deem appropriate
- available to your users.
-
- How does one submit reviews?
-
- For now, email the reviews to me. This could be subject to change, once
- we work out everything. Each file will have reviews of one or more
- zines that are somehow categorized together by subject matter or by
- reviewer. Also feel free to post to alt.zines reviews of zines you have
- come across or to hype your own zines. I've adopted the nerdy HTML format
- that is used for WWW browsing.
-
- While sticking to the format is nice, it is not necessary, as long as
- all pertinent information is included. However if the reviews are to be
- accessible by the Web, then you had better do them this way.
- Please keep all reviews in vanilla ASCII format. Also keep them shareright.
-
- We are especially in need of reviews ezines and of zines that are published
- outside of North America. Now, I get zines from Australia and, since I
- used to live there, I understand the dialect and cultural references.
- We don't have the resources to review zines that aren't published in
- English. I'd rather that F5-Electic not be an English only publication.
- If you get zines from other parts of the world and are willing to review
- them, please send the reviews to me.
-
- We are carrying a listing of ezines, thanks to johnl@netcom.com, but we
- would like to get more reviews of ezines, too.
-
- What are the subscription rates and/or sample copy prices for the print
- version of Factsheet Five?
-
- Single issues:
- US Newsstand Cover Price: $3.95 (Marketing sucks!)
- US via 1st Class: $6.00
- Canada, Mexico: $6.00
- Elsewhere in the world: $9.00
-
- Six issue Subscription:
- US 3rd Class: $20.00
- Friend Rate* $40.00
-
- * First class, in an envelope, with the publisher's eternal gratitude AND
- the occassional subscriber goodie, like the Zine Publisher's Guide, or
-
- 2 pounds of zines for $3.00.
- Canada, Mexico: $35.00
- UK, Europe, Latin America $45.00
- Asia, Africa, Pacific $55.00
-
-
- "We accept for payment cash (US or otherwise), check or money order drawn
- in US funds (payable to Factsheet Five), or IRCs (at the rate of $0.50
- each). Prisoners may get single issues by paying in stamps."
-
- Please foward orders to:
- R. Seth Friedman
- P.O. Box 170099
- San Francisco, CA 94117-0099
-
-
- Will the subscription list (for the paper version) be sold?
-
- Seth plans making the list available to lots of cool companies like
- Archie McPhee, Blue Ryder, Co-Op America, and Kitchen Sink Press. If
- you have an aversion to receiving cool catalogs and other neat stuff in
- the mail, just mention it with your order. We'll be sure to keep your
- address private.
-
- What about the subscription list to the electronic version?
-
- The only thing I'll do with the email list is dump it when I get fed up
- with emailling huge files.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- LEGION OF DOOM T-SHIRTS!! Get 'em
-
- By Chris Goggans <phrack@well.sf.ca.us>
-
- After a complete sellout at HoHo Con 1993 in Austin, TX this past
- December, the official Legion of Doom t-shirts are available
- once again. Join the net luminaries world-wide in owning one of
- these amazing shirts. Impress members of the opposite sex, increase
- your IQ, annoy system administrators, get raided by the government and
- lose your wardrobe!
-
- Can a t-shirt really do all this? Of course it can!
-
- "THE HACKER WAR -- LOD vs MOD"
-
- This t-shirt chronicles the infamous "Hacker War" between rival
- groups The Legion of Doom and The Masters of Destruction. The front
- of the shirt displays a flight map of the various battle-sites
- hit by MOD and tracked by LOD. The back of the shirt
- has a detailed timeline of the key dates in the conflict, and
- a rather ironic quote from an MOD member.
-
- (For a limited time, the original is back!)
-
- "LEGION OF DOOM -- INTERNET WORLD TOUR"
-
- The front of this classic shirt displays "Legion of Doom Internet World
- Tour" as well as a sword and telephone intersecting the planet
- earth, skull-and-crossbones style. The back displays the
- words "Hacking for Jesus" as well as a substantial list of "tour-stops"
- (internet sites) and a quote from Aleister Crowley.
-
- All t-shirts are sized XL, and are 100% cotton.
-
- Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for
- postage.
-
- Send checks or money orders. Please, no credit cards, even if
- it's really your card.
-
-
- Name: __________________________________________________
-
- Address: __________________________________________________
-
- City, State, Zip: __________________________________________
-
-
- I want ____ "Hacker War" shirt(s)
-
- I want ____ "Internet World Tour" shirt(s)
-
- Enclosed is $______ for the total cost.
-
- Mail to: Chris Goggans
- 603 W. 13th #1A-278
- Austin, TX 78701
-
- These T-shirts are sold only as a novelty items, and are in no way
- attempting to glorify computer crime.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- A POINT AND CLICK SOCIETY
- LEARN TO DRIVE, OR GET OFF THE ROAD
-
- An Editorial
-
- By Scott Davis (dfox@fc.net)
-
- As a computer support professional, I am unfortunate enough to see some
- of the developments pertaining to the Internet as they occur. I say
- "unfortunate" not because what I see is so terrible, but what I see never
- ceases to knock me off of my feet. What I am referring to is the massive
- wave of new people coming on to the "Inpho-s00per Highway" who if not for
- icons to click on and a mouse to click with, would not be able to use a
- personal computer...much less some global network. Uhh..uhh I thank I'm
- referrin' to that "Inter-Net" thang...
-
- People are being sucked into a revolution of digital "Everything".
- Computers do their taxes, balance their books, order groceries and other
- products, and deliver electronic mail...among other things. But, it bugs me
- to no end to see somebody with an e-mail address from AOL. It makes me
- want to mail them back and tell them "HEY! Did you know that you are on
- the dirt road that runs beside the Internet?" Or tell them to "Get out
- of the ghetto of the Internet." "Do you know what you're doing?"
-
- What the big companies have done is give the masses a loaded gun... and
- the masses have never fired a weapon in their life! They've given them
- a Porsche 944...and they've never driven a car. But I also question the
- common sense of the average computer user. "Do you know what this computer
- does?" The bottom line is that there are more things to do with this thing
- than point and click on all of your pretty applications.
-
- Services such as AOL promote things like "electronic mail" and "Access to
- the Internet". But how many people who purchased the software did any
- reading or research as to WHAT the Internet is. WHAT is electronic mail?
- I know that I'll probably get a thousand flames for this article, and
- they'll say 'We were all newbies once!" I am completely aware of that,
- but when we (people who have been on the Net for 5+ years) were new,
- we had to learn every aspect of what we were getting into. There was no
- point-and-click options. If we did not know command line operations,
- we didn't surf! One problem can be contributed to the press. This is
- the fact that they have made "The Internet" and Info-SuperHighway"
- buzz-phrases that people are going to be attracted to because they
- sound "cool".
-
- There are no PC-based computers being marketed without Dos and Windows
- to this editor's knowledge. When the customer sees "Dos and Windows",
- how many people do you think say, "Hey Look...it's got Dos too!"
- It simply does not happen. Who cares what an operating system is, right?
- Well, the fact is...you better care. Because without an operating system,
- you wouldn't be able to point and click on you pretty little icons.
-
- I commend AOL, Compuserve, Microsoft and others who develop software
- for the masses. They do a fine job and a great service to the world.
- Computing just would not be the same without them (I guess).
-
- Computers are being mass-marketed and distributed to the public like
- social security cards. For the big-boys in the industry, this is good.
- It means profit, jobs, and market-share...and that sometime soon, every
- household in America will have at least one computer (or doorstop) and the
- owner will not know the first thing about it.
-
- Commercial software manufacturers and Internet service providers are
- looking at this as a slaughter. Rounding up the cattle, as it were.
- This is fine with me, but it is the end-user's responsibility to
- do work on his/her own to know what this "Hi-Tek-Hiway" is. There are
- ways not to become sheep. And if you don't do your homework, you don't
- deserve better.
-
- I think that people should be required to attend some in-depth computer
- courses before being able to buy one.
-
- * Computer Basics: This class would last a total of 100 hours. Two hours
- a night, three nights a week. Windows and other applications would not
- be discussed. The students would have to prove that they are proficient
- in Dos, Unix, or whatever command-line operating system their PC used.
- At the end of the 100 hour course, if they passed the command-line stuff,
- they would be permitted to attend a class that provided instruction
- on GUI's and other software.
-
- * Internet Basics 101: If the sheep are so eager to get on this damn
- SuperHighway, learn what it is about. Learn where it origninated and
- what it can do. --- and learn how NOT to be a headache to others.
- Ethics would be a portion of the instruction. Learn who you are,
- evaluate your place on the Net, and know that no matter who you are...
- there are bigger and better hackers out there.
-
- * Learn the difference between the Highway and the shoulder.
-
- * What is "REAL" access and just a gateway to where you WISH you were.
-
- * Hardware Troubleshooting: If my floppy disk drive is not working, I'd
- kinda like to know what to do to see if it is actually broken. If you
- purchased a $30,000 car and there were no service centers in the world,
- wouldn't you like to know how to change your oil?
-
- * Telecommunications Instruction: What is a modem? What does it do?
- Learn how to use non-commercial telecom software. Find some modem
- software package that does not come from a major service provider
- or is not used with the most popular GUI in the world...and call up a
- few local bulletin board systems. Also, if my modem is not functioning,
- I'd like to know some of the reasons why, and try to correct them.
-
- These are some simple suggestions that I believe everyone should do before
- purchasing a computer system. Of course, if you have been using computers
- for an extended period of time and proclaim to know how they work, there
- would be a CLEP test for you. Answer 5 questions about hardware, three
- questions on Internet, and answer NO to the question "Do you use Windows?"
- and you'll be on your way home with that new system. This is certainly not
- an attempt to hammer commerical services and/or providers, certain
- software programs designed to make computing easier, or the people who
- use them. It's simply a statement saying "Know what you're doing, make
- yourself open to fluctuations in trends, educate yourself on global
- networking, and have a nice day." There is no excuse for ignorance. Open
- your documentation, go to the book store, whatever. Do your homework.
- Otherwise, pull over...you're going to jail for driving without a license.
-
- There are political fights going on right now over different aspects of
- this "SuperHighway" that you're so eager to get on. The decisions made
- will ultimately affect you. Do you care? You should. There are lawyers,
- lobbyists, organizations such as the Electronic Frontier Foundation,
- and many individuals fighting for your right to use the services that
- you use. They are fighting to keep it "usable."
-
- In closing, be alert, be aware...and get educated. The light at the end of
- the tunnel to success might be a locomotive!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
- IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
- YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
- PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
- KEYNOTE ADDRESS : CRYPTOGRAPHY CONFERENCE
-
- By Bruce Sterling (bruces@well.sf.ca.us)
-
- Hello everybody. It's quite an honor to be delivering the
- keynote address -- a *thankfully brief* keynote address -- at this
- conference. I hope to clear the decks in short order, and let you
- spend an engrossing afternoon, listening to an intense discussion of
- complex and important public issues, by highly qualified people, who
- fully understand what they're talking about. Unlike myself.
-
- Before all this begins, though, I do want to establish a
- context for this conference. Let me briefly put on my professional
- dunce-hat, as a popular-science writer, and try to make it clear to
- you exactly what the heck is going on here today.
-
- Cryptography. The science and study of secret writing, especially
- codes and cypher systems. The procedures, processes, measures and
- algorithms for making and using secret exchanges of information.
- *Secret* exchanges, done, made and conducted without the knowledge of
- others, whether those others be governments, competitors, local, state
- or federal police, private investigators, wiretappers, cellular
- scanners, corporate security people, marketers, merchandisers,
- journalists, public health officials, squads for public decency,
- snoopy neighbors, or even your own spouse, your own parents, or your
- own children.
-
- Cryptography is a way to confine knowledge to the initiated and
- the privileged in your circle, whatever that circle might be:
- corporate co-workers, fellow bureaucrats, fellow citizens, fellow
- modem-users, fellow artists, fellow writers, fellow
- influence-peddlers, fellow criminals, fellow software pirates, fellow
- child pornographers.
-
- Cryptography is a way to assure the privacy of digital way to
- help control the ways in which you reveal yourself to the world. It
- is also a way to turn everything inside a computer, even a computer
- seized or stolen by experts, into an utterly scrambled Sanskrit that
- no one but the holder of the key can read. It is a swift, powerful,
- portable method of high-level computer security. Electronic
- cryptography is potentially, perhaps, even a new form of information
- economics.
-
- Cryptography is a very hot issue in electronic civil liberties
- circles at the moment. After years of the deepest, darkest,
- never-say-anything, military spook obscurity, cryptography is out of
- the closet and openly flaunting itself in the street. Cryptography is
- attracting serious press coverage. The federal administration has
- offered its own cryptographic cure-all, the Clipper Chip.
- Cryptography is being discussed openly and publicly, and practiced
- openly and publicly. It is passing from the hands of giant secretive
- bureaucracies, to the desktop of the individual. Public-key
- cryptography, in particular, is a strange and novel form of
- cryptography which has some very powerful collateral applications and
- possibilities, which can only be described as bizarre, and possibly
- revolutionary. Cryptography is happening, and happening now.
-
- It often seems a truism in science and technology that it takes
- twenty years for anything really important to happen: well,
- Whitfield Diffie was publishing about public-key cryptography in 1975.
- The idea, the theory for much of what will be discussed today was
- already in place, theoretically, in 1975. This would suggest a target
- date of 1995 for this issue to break permanently out of the arid world
- of theory, and into the juicy, down-and-dirty real world of politics,
- lawsuits, and money. I rather think that this is a likely scenario.
- Personally, I think the situation's gonna blow a seam. And by
- choosing to attend this EFF and EFF-Austin conference in September
- 1993, you are still a handy two years ahead of the curve. You can
- congratulate yourself!
-
- Why do I say blow a seam? Because at this very moment, ladies
- and gentlemen, today, there is a grand jury meeting in Silicon Valley,
- under the auspices of two US federal attorneys and the US Customs
- Service. That grand jury is mulling over possible illegality,
- possible indictments, possible heaven-knows-what, relating to supposed
- export-law violations concerning this powerful cryptography
- technology. A technology so powerful that exporting cryptographic
- algorithms requires the same license that our government would grant
- to a professional armaments dealer. We can envision this federal
- grand jury meeting, in San Jose California, as a kind of dark salute
- to our conference here in Austin, a dark salute from the forces of
- the cryptographic status quo. I can guarantee you that whatever you
- hear at this conference today, is not gonna be the last you hear about
- this subject.
-
- I can also guarantee you that the people you'll be hearing from
- today are ideal people to tell you about these issues. I wrote a book
- once, partly about some of these people, so I've come to know some of
- them personally. I hope you'll forgive me, if I briefly wax all
- sentimental in public about how wonderful they are. There will be
- plenty of time for us to get all hardened and dark and cynical later.
- I'll be glad to help do that, because I'm pretty good at that when I
- put my mind to it, but in the meantime, today, we should feel lucky.
- We are lucky enough to have some people here who can actually tell us
- something useful about our future. Our real future, the future we can
- actually have, the future we'll be living in, the future that we can
- actually do something about.
-
- We have among us today the board of directors of the Electronic
- Frontier Foundation. They are meeting in Austin in order to pursue
- strategy for their own national organization, but in the meantime,
- they also have graciously agreed to appear publicly and share their
- expertise and their opinions with us Austinites. Furthermore, they
- are not getting a dime out of this; they are doing it, amazingly, out
- of sheer public-spiritedness.
-
- I'm going to introduce each of them and talk about them very
- briefly. I hope you will reserve your applause until the end.
- Although these people deserve plenty of applause, we are short on
- quality applause resources. In fact, today we will be rationing
- applause care, in order to assure a supply of basic, decent,
- ego-boosting applause for everyone, including those unable to
- privately afford top-quality applause care for the health of their own
- egos. A federal-policy in-joke for the many Washington insiders we
- have in the room today.
-
- Very well, on to the business at hand. Mitch Kapor is a
- cofounder of the Electronic Frontier Foundation, a software designer,
- a very prominent software entrepreneur, a philanthropist, a writer and
- journalist, and a civil liberties activist. In 1990, when Mr. Kapor
- co-founded EFF, there was very considerable legal and constitutional
- trouble in the world of cyberspace. Mitch spoke out on these
- sometimes-arcane, sometimes-obscure issues, and he spoke loudly,
- repeatedly, publicly, and very effectively. And when Mitch Kapor
- finished speaking-out, those issues were no longer obscure or arcane.
- This is a gift Mitch has, it seems. Mitch Kapor has also quietly done
- many good deeds for the electronic community, despite his full
- personal knowledge that no good deed goes unpunished. We very likely
- wouldn't be meeting here today, if it weren't for Mitch, and anything
- he says will be well worth your attention.
-
- Jerry Berman is the President and Director of Electronic
- Frontier Foundation, which is based in Washington DC. He is a
- longtime electronic civil liberties activist, formerly the founder and
- director of the Projects on Privacy and Information Technology for the
- American Civil Liberties Union. Jerry Berman has published widely on
- the legal and legislative implications of computer security and
- electronic communications privacy, and his expertise in networks and
- the law is widely recognized. He is heading EFF's efforts on the
- national information infrastructure in the very thick of the
- Clinton-Gore administration, and Mr Berman, as you might imagine, is a
- very busy man these days, with a lot of digital irons in the virtual
- fire.
-
- Mr. Kapor and Mr Berman will be taking part in our first panel
- today, on the topic of EFF's current directions in national public
- policy. This panel will last from 1:45 to 3PM sharp and should be
- starting about fifteen minutes after I knock it off and leave this
- podium. We will allow these well-qualified gentlemen to supply their
- own panel moderation, and simply tell us whatever is on their minds.
- And I rather imagine that given the circumstances, cryptography is
- likely to loom large. And, along with the other panels, if they want
- to throw it open for questions from the floor, that's their decision.
-
- There will be a fifteen-minute break between each panel to
- allow our brains to decompress.
-
- Our second panel today, beginning at 3:15, will be on the
- implications of cryptography for law enforcement and for industry, and
- the very large and increasingly dangerous areas where police and
- industry overlap in cyberspace. Our participants will be Esther Dyson
- and Mike Godwin.
-
- Esther Dyson is a prominent computer-industry journalist.
- Since 1982, she has published a well-known and widely-read industry
- newsletter called Release 1.0. Her industry symposia are justly
- famous, and she's also very well-known as an industry-guru in Central
- and Eastern Europe and the former Soviet Union. Ms Dyson is very
- knowledgeable, exceptionally well-informed, and always a healthy
- distance ahead of her time. When it comes to the computer industry,
- Esther Dyson not only knows where the bodies are buried, she has a
- chalk outline ready-and-waiting for the bodies that are still upright!
- She's on the Board of EFF as well as the Santa Fe Institute, the
- Global Business Network, the Women's Forum, and the Poynter Institute
- for Media Studies.
-
- Mike Godwin is the legal services council for EFF. He is a
- journalist, writer, attorney, legal theorist, and legal adviser to the
- electronically distressed. He is a veteran public speaker on these
- topics, who has conducted many seminars and taken part in many fora
- all over the United States. He is also a former Austinite, a graduate
- of the UT School of Law, and a minor character in a William Gibson
- novel, among his other unique distinctions. Mike Godwin is not only
- in EFF inside the beltway of Washington, but is on the board of the
- local group, EFF-Austin. Mike Godwin is a well-known, one might even
- say beloved, character in the electronic community. Mike Godwin is
- especially beloved to those among us who have had machinery sucked
- into the black hole of a federal search-and-seizure process.
-
- Our third panel today, beginning at 4:45, will be the uniquely
- appropriate Cypherpunk Panel. Our three barricade-climbing,
- torch-waving, veteran manifesto-writers will be John Perry Barlow,
- John Gilmore and Eric Hughes.
-
- Mr Eric Hughes is NOT a member of the EFF Board of Directors.
- Mr Hughes is the moderator of the well-known, notorious even, Internet
- cypherpunk mailing list. He is a private citizen and programmer from
- the Bay Area of California, who has a computer, has a modem, has
- crypto-code and knows how to use it! Mr Hughes is here today entirely
- on his own, very considerable, initiative, and we of EFF-Austin are
- proud to have him here to publicly declare anything and everything
- that he cares to tell us about this important public issue.
-
- Mr John Gilmore *is* a member of the EFF Board. He is a
- twenty-year veteran programmer, a pioneer in Sun Microsystems and
- Cygnus Support, a stalwart of the free software movement, and a
- long-term electronic civil libertarian who is very bold and forthright
- in his advocacy of privacy, and of private encryption systems. Mr
- Gilmore is, I must say, remarkable among UNIX and GNU programmers for
- the elegance and clarity of his prose writings. I believe that even
- those who may disagree with Mr Gilmore about the complex and important
- issues of cryptography, will be forced to admit that they actually
- understand what Mr Gilmore is saying. This alone makes him a
- national treasure. Furthermore, John Gilmore has never attended
- college, and has never bought a suit. When John Gilmore speaks his
- mind in public, people should sit up straight!
-
- And our last introductee is the remarkable John Perry Barlow.
- Journalist, poet, activist, techno-crank, manifesto-writer, WELLbeing,
- long-time lyricist for the Grateful Dead, co-founder of Electronic
- Frontier Foundation, member of the Wyoming Republican Party, a man who
- at last count had at least ten personal phone numbers, including two
- faxes, two cellulars and a beeper; bon vivant, legend in his own
- time, a man with whom superlatives fail, art critic, father of three,
- contributing editor of MONDO 2000, a man and a brother that I am proud
- to call truly *my kind of guy:* John Perry Barlow.
-
- So these are our panelists today, ladies and gentlemen: a fine
- group of public-spirited American citizens who, coincidentally, happen
- to have a collective IQ high enough to boil platinum. Let's give
- them a round of applause.
-
- (((frenzied applause)))
-
- Thank you. Ladies and gentlemen, EFF-Austin is not the EFF.
- We are a local group with our own incorporation and our own unique
- organizational challenges. We are doing things on a local scale,
- where the National EFF cannot operate. But we know them, and we
- *like* them, and we are proud to have them here. Furthermore, every
- time some Austin company, such as Steve Jackson Games Incorporated, or
- the currently unlucky Austin Codeworks, publishers of a program called
- "Moby Crypto," find themselves in some strange kind of federal hot
- water, we are not only proud to know the EFF, we are *glad* to know
- them. Glad, and *grateful!* They have a lot to tell us today, and
- they are going to tell us things they believe we really need to know.
- And after these formal panels, this evening from 8 to 10, we are
- going to indulge in a prolonged informal session of what we Austinites
- are best at: absorbing alcohol, reminiscing about the Sixties, and
- making what Mitch Kapor likes to call "valuable personal contacts."
-
- We of EFF-Austin are proud and happy to be making information
- and opinion on important topics and issues available to you, the
- Austin public, at NO CHARGE!!
-
- Of course, it would help us a lot, if you bought some of the
- unbelievably hip and with-it T-shirts we made up for this gig, plus
- the other odd and somewhat overpriced, frankly, memorabilia and
- propaganda items that we of EFF-Austin sell, just like every other
- not-for-profit organization in the world. Please help yourself to
- this useful and enlightening stuff, so that the group can make more
- money and become even more ambitious than we already are.
-
- And on a final note, for those of you who are not from Austin,
- I want to say to you as an Austinite and member of EFF-Austin, welcome
- to our city. Welcome to the Capital of Texas. The River City. The
- City of the Violet Crown. Silicon Hills. Berkeley-on-the-Colorado.
- The Birthplace of Cyberpunk. And the Waterloo of the Chicago Computer
- Fraud and Abuse Task Force.
-
- You are all very welcome here.
-
- So today, let's all learn something, and let's all have some
- fun. Thanks a lot.
-
- | Disclaimers : You are encouraged to re-distribute this |
- | document electronically. Any opinions expressed belong to |
- | the author and not the organization. (c) 1993. |
- [From the EFF-Austin online newsletter, _WORD_, Issue #9]
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- -Editor's Note: This is a little old...but still good and important reading!
-
- =-=-=-=-=-=-Copyright 1993,4 Wired USA Ltd. All Rights Reserved=-=-=-=-=-=
- -=-=For complete copyright information, please see the end of this file=-=-
-
- JACKBOOTS ON THE INFOBAHN
-
- By John Perry Barlow (WIRED 2.04)
-
- Clipper is a last ditch attempt by the United States, the last great power
- from the old Industrial Era, to establish imperial control over cyberspace.
-
- [Note: The following article appeared in the April 1994 issue of WIRED.
- We, the editors of WIRED, are net-casting it now in its pre-published form
- as a public service. Because of the vital and urgent nature of its message,
- we believe readers on the Net should hear and take action now. You are free
- to pass this article on electronically; in fact we urge you to replicate it
- throughout the net with our blessings. If you do, please keep the copyright
- statements and this note intact. For a complete listing of Clipper-related
- resources available through WIRED Online, send email to <infobot@wired.com>
- with the following message: "send clipper.index". - The Editors of WIRED]
-
- On January 11, I managed to schmooze myself aboard Air Force 2. It was
- flying out of LA, where its principal passenger had just outlined his
- vision of the information superhighway to a suited mob of television, show-
- biz, and cable types who fervently hoped to own it one day - if they could
- ever figure out what the hell it was.
-
- From the standpoint of the Electronic Frontier Foundation the speech had
- been wildly encouraging. The administration's program, as announced by Vice
- President Al Gore, incorporated many of the concepts of open competition,
- universal access, and deregulated common carriage that we'd been pushing
- for the previous year.
-
- But he had said nothing about the future of privacy, except to cite among
- the bounties of the NII its ability to "help law enforcement agencies
- thwart criminals and terrorists who might use advanced telecommunications
- to commit crimes."
-
- On the plane I asked Gore what this implied about administration policy on
- cryptography. He became as noncommittal as a cigar-store Indian. "We'll be
- making some announcements.... I can't tell you anything more." He hurried
- to the front of the plane, leaving me to troubled speculation.
-
- Despite its fundamental role in assuring privacy, transaction security, and
- reliable identity within the NII, the Clinton administration has not
- demonstrated an enlightenment about cryptography up to par with the rest of
- its digital vision.
-
- The Clipper Chip - which threatens to be either the goofiest waste of
- federal dollars since President Gerald Ford's great Swine Flu program or,
- if actually deployed, a surveillance technology of profound malignancy -
- seemed at first an ugly legacy of the Reagan-Bush modus operandi. "This is
- going to be our Bay of Pigs," one Clinton White House official told me at
- the time Clipper was introduced, referring to the disastrous plan to invade
- Cuba that Kennedy inherited from Eisenhower.
-
- (Clipper, in case you're just tuning in, is an encryption chip that the
- National Security Agency and FBI hope will someday be in every phone and
- computer in America. It scrambles your communications, making them
- unintelligible to all but their intended recipients. All, that is, but the
- government, which would hold the "key" to your chip. The key would
- separated into two pieces, held in escrow, and joined with the appropriate
- "legal authority.")
-
- Of course, trusting the government with your privacy is like having a
- Peeping Tom install your window blinds. And, since the folks I've met in
- this White House seem like extremely smart, conscious freedom-lovers -
- hell, a lot of them are Deadheads - I was sure that after they were fully
- moved in, they'd face down the National Security Agency and the FBI, let
- Clipper die a natural death, and lower the export embargo on reliable
- encryption products.
-
- Furthermore, the National Institutes of Standards and Technology and the
- National Security Council have been studying both Clipper and export
- embargoes since April. Given that the volumes of expert testimony they had
- collected overwhelmingly opposed both, I expected the final report would
- give the administration all the support it needed to do the right thing.
-
- I was wrong. Instead, there would be no report. Apparently, they couldn't
- draft one that supported, on the evidence, what they had decided to do
- instead.
-
- THE OTHER SHOE DROPS
-
- On Friday, February 4, the other jackboot dropped. A series of
- announcements from the administration made it clear that cryptography would
- become their very own "Bosnia of telecommunications" (as one staffer put
- it). It wasn't just that the old Serbs in the National Security Agency and
- the FBI were still making the calls. The alarming new reality was that the
- invertebrates in the White House were only too happy to abide by them.
- Anything to avoid appearing soft on drugs or terrorism.
-
- So, rather than ditching Clipper, they declared it a Federal Data
- Processing Standard, backing that up with an immediate government order for
- 50,000 Clipper devices. They appointed the National Institutes of Standards
- and Technology and the Department of Treasury as the "trusted" third
- parties that would hold the Clipper key pairs. (Treasury, by the way, is
- also home to such trustworthy agencies as the Secret Service and the Bureau
- of Alcohol, Tobacco, and Firearms.)
-
- They reaffirmed the export embargo on robust encryption products, admitting
- for the first time that its purpose was to stifle competition to Clipper.
- And they outlined a very porous set of requirements under which the cops
- might get the keys to your chip. (They would not go into the procedure by
- which the National Security Agency could get them, though they assured us
- it was sufficient.)
-
- They even signaled the impending return of the dread Digital Telephony, an
- FBI legislative initiative requiring fundamental reengineering of the
- information infrastructure; providing wiretapping ability to the FBI would
- then become the paramount design priority.
-
- INVASION OF THE BODY SNATCHERS
-
- Actually, by the time the announcements thudded down, I wasn't surprised by
- them. I had spent several days the previous week in and around the White
- House.
-
- I felt like I was in another remake of The Invasion of the Body Snatchers.
- My friends in the administration had been transformed. They'd been subsumed
- by the vast mindfield on the other side of the security clearance membrane,
- where dwell the monstrous bureaucratic organisms that feed on fear. They'd
- been infected by the institutionally paranoid National Security Agency's
- Weltanschauung.
-
- They used all the telltale phrases. Mike Nelson, the White House point man
- on the NII, told me, "If only I could tell you what I know, you'd feel the
- same way I do." I told him I'd been inoculated against that argument during
- Vietnam. (And it does seem to me that if you're going to initiate a
- process that might end freedom in America, you probably need an argument
- that isn't classified.)
-
- Besides, how does he know what he knows? Where does he get his information?
- Why, the National Security Agency, of course. Which, given its strong
- interest in the outcome, seems hardly an unimpeachable source.
-
- However they reached it, Clinton and Gore have an astonishingly simple
- bottom line, to which even the future of American liberty and prosperity is
- secondary: They believe that it is their responsibility to eliminate, by
- whatever means, the possibility that some terrorist might get a nuke and
- use it on, say, the World Trade Center. They have been convinced that such
- plots are more likely to ripen to hideous fruition behind a shield of
- encryption.
-
- The staffers I talked to were unmoved by the argument that anyone smart
- enough to steal a nuclear device is probably smart enough to use PGP or
- some other uncompromised crypto standard. And never mind that the last
- people who popped a hooter in the World Trade Center were able to get it
- there without using any cryptography and while under FBI surveillance.
-
- We are dealing with religion here. Though only ten American lives have been
- lost to terrorism in the last two years, the primacy of this threat has
- become as much an article of faith with these guys as the Catholic
- conviction that human life begins at conception or the Mormon belief that
- the Lost Tribe of Israel crossed the Atlantic in submarines.
-
- In the spirit of openness and compromise, they invited the Electronic
- Frontier Foundation to submit other solutions to the "problem" of the
- nuclear-enabled terrorist than key escrow devices, but they would not admit
- into discussion the argument that such a threat might, in fact, be some
- kind of phantasm created by the spooks to ensure their lavish budgets into
- the post-Cold War era.
-
- As to the possibility that good old-fashioned investigative techniques
- might be more valuable in preventing their show-case catastrophe (as it was
- after the fact in finding the alleged perpetrators of the last attack on
- the World Trade Center), they just hunkered down and said that when
- wiretaps were necessary, they were damned well necessary.
-
- When I asked about the business that American companies lose because of
- their inability to export good encryption products, one staffer essentially
- dismissed the market, saying that total world trade in crypto goods was
- still less than a billion dollars. (Well, right. Thanks more to the
- diligent efforts of the National Security Agency than to dim sales
- potential.)
-
- I suggested that a more immediate and costly real-world effect of their
- policies would be to reduce national security by isolating American
- commerce, owing to a lack of international confidence in the security of
- our data lines. I said that Bruce Sterling's fictional data-enclaves in
- places like the Turks and Caicos Islands were starting to look real-world
- inevitable.
-
- They had a couple of answers to this, one unsatisfying and the other scary.
- The unsatisfying answer was that the international banking community could
- just go on using DES, which still seemed robust enough to them. (DES is the
- old federal Data Encryption Standard, thought by most cryptologists to be
- nearing the end of its credibility.)
-
- More frightening was their willingness to counter the data-enclave future
- with one in which no data channels anywhere would be secure from
- examination by one government or another. Pointing to unnamed other
- countries that were developing their own mandatory standards and
- restrictions regarding cryptography, they said words to the effect of,
- "Hey, it's not like you can't outlaw the stuff. Look at France."
-
- Of course, they have also said repeatedly - and for now I believe them -
- that they have absolutely no plans to outlaw non-Clipper crypto in the US.
- But that doesn't mean that such plans wouldn't develop in the presence of
- some pending "emergency." Then there is that White House briefing
- document, issued at the time Clipper was first announced, which asserts
- that no US citizen "as a matter of right, is entitled to an unbreakable
- commercial encryption product."
-
- Now why, if it's an ability they have no intention of contesting, do they
- feel compelled to declare that it's not a right? Could it be that they are
- preparing us for the laws they'll pass after some bearded fanatic has
- gotten himself a surplus nuke and used something besides Clipper to
- conceal his plans for it?
-
- If they are thinking about such an eventuality, we should be doing so as
- well. How will we respond? I believe there is a strong, though currently
- untested, argument that outlawing unregulated crypto would violate the
- First Amendment, which surely protects the manner of our speech as clearly
- as it protects the content.
-
- But of course the First Amendment is, like the rest of the Constitution,
- only as good as the government's willingness to uphold it. And they are, as
- I say, in the mood to protect our safety over our liberty.
-
- This is not a mind-frame against which any argument is going to be very
- effective. And it appeared that they had already heard and rejected every
- argument I could possibly offer.
-
- In fact, when I drew what I thought was an original comparison between
- their stand against naturally proliferating crypto and the folly of King
- Canute (who placed his throne on the beach and commanded the tide to leave
- him dry), my government opposition looked pained and said he had heard
- that one almost as often as jokes about roadkill on the information
- superhighway.
-
- I hate to go to war with them. War is always nastier among friends.
- Furthermore, unless they've decided to let the National Security Agency
- design the rest of the National Information Infrastructure as well, we need
- to go on working closely with them on the whole range of issues like
- access, competition, workplace privacy, common carriage, intellectual
- property, and such. Besides, the proliferation of strong crypto will
- probably happen eventually no matter what they do.
-
- But then again, it might not. In which case we could shortly find ourselves
- under a government that would have the automated ability to log the time,
- origin and recipient of every call we made, could track our physical
- whereabouts continuously, could keep better account of our financial
- transactions than we do, and all without a warrant. Talk about crime
- prevention!
-
- Worse, under some vaguely defined and surely mutable "legal authority,"
- they also would be able to listen to our calls and read our e-mail without
- having to do any backyard rewiring. They wouldn't need any permission at
- all to monitor overseas calls.
-
- If there's going to be a fight, I'd rather it be with this government than
- the one we'd likely face on that hard day.
-
- Hey, I've never been a paranoid before. It's always seemed to me that most
- governments are too incompetent to keep a good plot strung together all the
- way from coffee break to quitting time. But I am now very nervous about the
- government of the United States of America.
-
- Because Bill 'n' Al, whatever their other new-paradigm virtues, have
- allowed the very old-paradigm trogs of the Guardian Class to define as
- their highest duty the defense of America against an enemy that exists
- primarily in the imagination - and is therefore capable of anything.
-
- To assure absolute safety against such an enemy, there is no limit to the
- liberties we will eventually be asked to sacrifice. And, with a Clipper
- Chip in every phone, there will certainly be no technical limit on their
- ability to enforce those sacrifices.
-
- WHAT YOU CAN DO
-
- GET CONGRESS TO LIFT THE CRYPTO EMBARGO
-
- The administration is trying to impose Clipper on us by manipulating market
- forces. By purchasing massive numbers of Clipper devices, they intend to
- induce an economy of scale which will make them cheap while the export
- embargo renders all competition either expensive or nonexistent.
-
- We have to use the market to fight back. While it's unlikely that they'll
- back down on Clipper deployment, the Electronic Frontier Foundation
- believes that with sufficient public involvement, we can get Congress to
- eliminate the export embargo.
-
- Rep. Maria Cantwell, D-Washington, has a bill (H.R. 3627) before the
- Economic Policy, Trade, and Environment Subcommittee of the House Committee
- on Foreign Affairs that would do exactly that. She will need a lot of help
- from the public. They may not care much about your privacy in DC, but they
- still care about your vote.
-
- Please signal your support of H.R. 3627, either by writing her directly or
- e-mailing her at cantwell@eff.org. Messages sent to that address will be
- printed out and delivered to her office. In the subject header of your
- message, please include the words "support HR 3627." In the body of your
- message, express your reasons for supporting the bill. You may also express
- your sentiments to Rep. Lee Hamilton, D-Indiana, the House Committee on
- Foreign Affairs chair, by e-mailing hamilton@eff.org.
-
- Furthermore, since there is nothing quite as powerful as a letter from a
- constituent, you should check the following list of subcommittee and
- committee members to see if your congressional representative is among
- them. If so, please copy them your letter to Rep. Cantwell.
-
- > Economic Policy, Trade, and Environment Subcommittee:
-
- Democrats: Sam Gejdenson (Chair), D-Connecticut; James Oberstar, D-
- Minnesota; Cynthia McKinney, D-Georgia; Maria Cantwell, D-Washington; Eric
- Fingerhut, D-Ohio; Albert R. Wynn, D-Maryland; Harry Johnston, D-Florida;
- Eliot Engel, D-New York; Charles Schumer, D-New York.
-
- Republicans: Toby Roth (ranking), R-Wisconsin; Donald Manzullo, R-Illinois;
- Doug Bereuter, R-Nebraska; Jan Meyers, R-Kansas; Cass Ballenger, R-North
- Carolina; Dana Rohrabacher, R-California.
-
- > House Committee on Foreign Affairs:
-
- Democrats: Lee Hamilton (Chair), D-Indiana; Tom Lantos, D-California;
- Robert Torricelli, D-New Jersey; Howard Berman, D-California; Gary
- Ackerman, D-New York; Eni Faleomavaega, D-Somoa; Matthew Martinez, D-
- California; Robert Borski, D-Pennsylvania; Donal Payne, D-New Jersey;
- Robert Andrews, D-New Jersey; Robert Menendez, D-New Jersey; Sherrod Brown,
- D-Ohio; Alcee Hastings, D-Florida; Peter Deutsch, D-Florida; Don Edwards,
- D-California; Frank McCloskey, D-Indiana; Thomas Sawyer, D-Ohio; Luis
- Gutierrez, D-Illinois.
-
- Republicans: Benjamin Gilman (ranking), R-New York; William Goodling, R-
- Pennsylvania; Jim Leach, R-Iowa; Olympia Snowe, R-Maine; Henry Hyde, R-
- Illinois; Christopher Smith, R-New Jersey; Dan Burton, R-Indiana; Elton
- Gallegly, R-California; Ileana Ros-Lehtinen, R-Florida; David Levy, R-New
- York; Lincoln Diaz-Balart, R-Florida; Ed Royce, R-California.
-
- BOYCOTT CLIPPER DEVICES AND THE COMPANIES WHICH MAKE THEM.
-
- Don't buy anything with a Clipper Chip in it. Don't buy any product from a
- company that manufactures devices with Big Brother inside. It is likely
- that the government will ask you to use Clipper for communications with the
- IRS or when doing business with federal agencies. They cannot, as yet,
- require you to do so. Just say no.
-
- LEARN ABOUT ENCRYPTION AND EXPLAIN THE ISSUES TO YOUR UNWIRED FRIENDS
-
- The administration is banking on the likelihood that this stuff is too
- technically obscure to agitate anyone but nerds like us. Prove them wrong
- by patiently explaining what's going on to all the people you know who have
- never touched a computer and glaze over at the mention of words like
- "cryptography."
-
- Maybe you glaze over yourself. Don't. It's not that hard. For some hands-on
- experience, download a copy of PGP - Pretty Good Privacy - a shareware
- encryption engine which uses the robust RSA encryption algorithm. And learn
- to use it.
-
- GET YOUR COMPANY TO THINK ABOUT EMBEDDING REAL CRYPTOGRAPHY IN ITS PRODUCTS
-
- If you work for a company that makes software, computer hardware, or any
- kind of communications device, work from within to get them to incorporate
- RSA or some other strong encryption scheme into their products. If they say
- that they are afraid to violate the export embargo, ask them to consider
- manufacturing such products overseas and importing them back into the
- United States. There appears to be no law against that. Yet.
-
- You might also lobby your company to join the Digital Privacy and Security
- Working Group, a coalition of companies and public interest groups -
- including IBM, Apple, Sun, Microsoft, and, interestingly, Clipper phone
- manufacturer AT&T - that is working to get the embargo lifted.
-
- ENLIST!
-
- Self-serving as it sounds coming from me, you can do a lot to help by
- becoming a member of one of these organizations. In addition to giving you
- access to the latest information on this subject, every additional member
- strengthens our credibility with Congress.
-
- > Join the Electronic Frontier Foundation by writing membership@eff.org.
-
- > Join Computer Professionals for Social Responsibility by e-mailing
- cpsr.info@cpsr
-
- .org. CPSR is also organizing a protest, to which you can lend your support
- by sending e-mail to clipper.petition@cpsr.org with "I oppose Clipper" in
- the message body. Ftp/gopher/WAIS to cpsr.org /cpsr/privacy/
-
- crypto/clipper for more info.
-
- In his LA speech, Gore called the development of the NII "a revolution."
- And it is a revolutionary war we are engaged in here. Clipper is a last
- ditch attempt by the United States, the last great power from the old
- Industrial Era, to establish imperial control over cyberspace. If they
- win, the most liberating development in the history of humankind could
- become, instead, the surveillance system which will monitor our
- grandchildren's morality. We can be better ancestors than that.
-
- San Francisco, California
-
- Wednesday, February 9, 1994
-
- * * *
-
- John Perry Barlow (barlow@eff.org) is co-founder and Vice-Chairman of the
- Electronic Frontier Foundation, a group which defends liberty, both in
- Cyberspace and the Physical World. He has three daughters.
-
-
- =-=-=-=-=-=-=-=-=-=-=-=WIRED Online Copyright Notice=-=-=-=-=-=-=-=-=-=-=-=
-
- Copyright 1993,4 Wired USA Ltd. All rights reserved.
-
- This article may be redistributed provided that the article and this
- notice remain intact. This article may not under any circumstances
- be resold or redistributed for compensation of any kind without prior
- written permission from Wired Ventures, Ltd. If you have any questions
- about these terms, or would like information about licensing materials
- from WIRED Online, please contact us via telephone (+1 (415) 904 0660)
- or email (info@wired.com).
-
- WIRED and WIRED Online are trademarks of Wired Ventures, Ltd.
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- NOTES FROM CYBERSPACE
- VOLUME 3
-
- By Jonathan Yarden (jyarden@iglou.iglou.com)
- Subject: Mosaic on Digital Satellite System
-
- Anyone else out there getting a serious hard-on on the Digital Satellite
- System? From what I have heard this puppy is doing IP via satellite.
- For that matter, I can't think of any other real way to do what it does.
- Here is a partial list of 'features:'
-
- 1. The DSS system is designed to asychronously receive data. Each DSS
- receiver has a unique ID allowing it to process packetized wide-band data
- (which in most cases is MPEG encoded video). This happens *whenever* the
- unit is operational.
-
- 2. The modem in the DSS receiver is for the sending of requests and
- receipt of data from a local or long distance 'service.' The majority of
- requests are for 'keys' to decode channels, but could also be used to send
- subscription requests for other services.
-
- 3. There is a magnetic 'card' used to hold information about the types of
- services currently subscribed to by the DSS user. The card is readable
- as well as writeable.
-
- THE BIG IDEA
-
- Knowing that data flow in Mosaic is almost 99% server to client, this
- opens up a rather fast way to do Mosaic. For that matter, since most of
- the people who surf are just passing thru or getting data, this is a fast
- data pipe to just about anything. The only catch would be that the
- sending speed would be maxed out at about 14.4kbps. But, if you are on
- the client end of a 2GB FTP session, well you get the picture...
-
- 2nd reason:
-
- According to TRACEROUTE (unix hamsters, try this at home...) CIX is
- basically 'metering' data traffic onto their routes. First 16K goes real
- fast, then you hit the bottom of the process queue (sounds VAXen, doesn't
- it?) and it's the loser in a snail race.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
- IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
- YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
- PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- PORNOGRAPHY FOULS INTERNET
-
- By Paul Pihichyn (pihichyn@freepress.mb.ca)
-
- There is a river of slime in the gutters of the information highway
- and it's giving cyberspace a bad name. The virtual community, it appears,
- has been invaded by the same scum that has slithered into the real
- communities across the land. We're talking pornography, with a capital P,
- right there on the Internet.
-
- Maybe you caught the report on CNN last week about the Lawrence Livermore
- Laboratory in California. It seems some sleezeball there had loaded several
- gigabytes of filth into a server that was connected to the Internet, and
- promptly made it available to all 20 million-plus 'Netsurfers. It's
- probably not surprising that in a community of 20 million, you are going to
- find the same sad mix that you will find in the general population. But,
- somehow, I though the Internet would attract a better class of humanity.
-
- Nevertheless, the Internet has become the largest and most accessable source
- of pornographic material on the planet - and the real danger is it's
- accessible to anyone with a PC and modem, even to children.
-
- Journalist Erik Lacitis (elak.news@times.com) said it best recently in the
- Seattle times: "... has there ever been a bigger collection of mean-
- spirited, emotionally-deficient, just plain-weird, and mostly utterly
- boring people?" He prefaced the remark by saying he was taking a vacation
- from the Internet and going back to the real world. Actually, it would make
- more sense for those 'Net-bound weirdos to be taking a reality check.
-
- Hiding behind their cloak of anonymity, these folks hurl hateful insults at
- those with whom they disagree or feel they can bully by virtue of their
- perceived superior knowledge of the nooks and crannies of the Internet.
- It is on the Usenet that these really dumb things often take place. Now tell
- me, does the world really need a forum called alt.sex.pictures.female,
- or alt.sex.bondage? Or maybe just plain old alt.sex? I think not.
-
- The crap on these forums is pretty crude. Obscene by many community
- standards. And also pretty silly. Racy stories written by pimply-faced
- adolescent boys pretending to be ravishingly over-sexed and under-loved
- young women is hardly the stuff on which to build a world-wide information
- superhighway.
-
- Remember, the Internet is a network of networks, each linked through a host
- site - often a university or some other educational facility. Some of these
- host sites have taken steps to clean up their little corner of the Internet.
-
- Troll Usenet through the server at the University of Manitoba, and you won't
- find the newsgroups alt.sex.pictures.female, or alt.sex.bondage.
- The U of M, along with several other Internet providers, has denied its
- users access to some of the more blatantly pornographic newsgroups. Though
- some people may complain that this is censorship, an infringement on the
- freedom of the Internet, I take my hat off to those who made the decision
- to try to keep the Internet decent place to work and play.
-
- There have been incidents reported of Internet users actually being stalked,
- electronically, by some of the weirder weirdoes out there. The really scary
- part is that some of the cyberstalkers have actually slithered into the real
- world and attempted face-to-face encounters.
-
- The 'Net anonymity also give a lot of jerks a chance to be mean. If there
- is a crude remark that has ever been made about women, you'll find it posted
- on the 'Net. It seems, as Lacitis wrote, the Internet is populated with
- men who never grew up.
-
- Big as it is, the Internet is still in its infancy. It will take time to
- gain some maturity, to find a way to weed out the cretins and perverts.
- Once you get around the crud on the Internet, you will find it a wonderful
- place to learn, work and do business.
-
- By Paul Pihichyn, pihichyn@freepress.mb.ca
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- SECURITY / COAST FTP archive on-line
-
- Announcing the COAST Security FTP Archive!
-
- The COAST group at Purdue are happy to (finally) announce the
- availability of our security archive. The archive is currently
- available via FTP, with extensions to gopher and WWW planned soon.
-
- The archive currently contains software, standards, tools, and other
- material in the following areas:
-
- * access control
- * artificial life
- * authentication
- * criminal investigation
- * cryptography
- * e-mail privacy enhancement
- * firewalls
- * formal methods
- * general guidelines
- * genetic algorithms
- * incident response
- * institutional policies
- * intrusion detection
- * law & ethics
- * malware (viruses, worms, etc)
- * network security
- * password systems
- * policies
- * privacy
- * risk assessment
- * security related equipment
- * security tools
- * social impacts
- * software forensics
- * software maintenance
- * standards
- * technical tips
- * the computer underground
-
- The collection also contains a large set of site "mirrors" of
- interesting collections, many of which are linked by topic to the rest
- of the archive.
-
- You can connect to the archive using standard ftp to
- "coast.cs.purdue.edu". Information about the archive structure and
- contents is present in "/pub/aux"; we encourage users to look there,
- and to read the README* files located in the various directories.
-
- If you know of material you think should be added, please send mail to
- security-archive@cs.purdue.edu and tell us what you have and where we
- can get a copy. In order of preference, we would prefer to get:
-
- -- a pointer to the source ftp site for a package
- -- a pointer to a mirror ftp site for the package
- -- a uuencoded tar file
- -- a shar file
- -- a diskette or QIC tape
-
- If you are providing software, we encourage you to "sign" the software
- with PGP to produce a standalone signature file. This will help to
- ensure against trojaned versions of the software finding their way
- into the archive.
-
- Any comments or suggestions about the archive should be directed to
- "security-archive@cs.purdue.edu" -- please let us know what you think!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- ON THE SUBJECT OF CYBERCULTURE
-
- By George Phillips (ice9@fennec.com)
-
- I hate to be an asshole, but my friends will tell you I'm pretty good at it.
- I usually try to keep an open mind about a lot of things, but some things
- just get under my skin. Today, it's this damn cyberculture thingy! I
- thought the hype was subsiding, but now it seems to have sprouted back up
- like a festering pustule on the mouths of everyone. Let's just ask the
- question: What is cyberculture? Is it some coffee-shop hallucination
- romance dreamed up by some art-school boy with no social outlet? Is it some
- third-rate term developed by the editors of certain magazines to justify
- their existance? Was it created from a desperate attempt at giving a name to
- people who just don't fit in? ...or is there something real to all this
- fantasy? Let's take a closer look.
-
- I went out and looked for anything "cyber." Magazines, books, people, places,
- clothes, and things. I started out by picking up a magazine called
- "Mondo-2000". I'm sure I heard somewhere that this was a "cyber-oriented"
- magazine. The cover art did nothing for me as far as helping define what
- "cyber" was. After a time, I quickly realized that this magazine caters to
- junior/highschool children with Nintendos and acne. I saw nothing "cyber"
- about it. In fact, I really saw no real culture. Sure it had art, music,
- graphics, features, etc...but doesn't every magazine? What is keeping me
- from calling Time or Newsweek "Cyber-mags"? Could it be? Is "cyber" just
- another buzz-word like "virtual?" No!
-
- William Gibson writes about people in the future accessing a matrix called
- cyberspace. This is the "virtual" area between computer systems. No doubt
- one can see the parallels between his matrix and our Internet. But is this
- all there is to it? No. There are people called "cyberpunks" that access
- this matrix and exploit it to their own ends. These are very good books, by
- the way. I enjoyed reading them. There has got to be a parallel between
- his cyberpunks and the hackers of today. Although the books are excellent,
- I have yet to see what "Cyber-Culture" is. (Hearing theme song from
- Jeopardy in my head...)
-
- Billy Idol recorded an album called CyberPunk. Chained to my chair and
- threatened with death if I did not listen to this "K-Rad" CD, I formed the
- opinion that Billy Idol has too much free time on his hands. The makeup of
- this album has absolutely nothing to do with the title, or subjects in any
- William Gibson book. Thats not to say its not a good album. I'm sure there
- are many out there who like his work, but as far as my quest was concerned,
- this was a dead end. I just don't comprehend the reasoning behind such
- a venture.
-
- Exhausted with my household search for the eternal answer, I decided to
- hit the streets and find some real, live, cyber-people. I heard that this
- culture usually hangs out in clubs or raves that play loud alternative
- industrial dance music. I found a couple places like that in Houston and
- Austin, so I decided to give it a try. I chose a club in Houston, Texas.
- The lights were hypnotic. The smart-drinks were flowing. The people were
- dancing and zoning on the special effects of the club. I picked out the
- most "cyber-looking" people I could find. I knew what to look for because I
- just recently picked through a Mondo-2000 magazine to see what their be-all
- end-all definition of a cyber-person was. These people could barely figure
- out how to turn on a computer! How could they call themselves "cyber?"
- Am I wrong when I say that the whole term "Cyber" has at least SOMETHING to
- do with computers? Needless to say, I was rather disappointed in the
- ignorance of these lifeless wanna-bees and misled by all of the advertising
- of this ever-elusive "Cyber-Culture". Color me confused.
-
- Well, I figured that if anyone knew about "Cyber-Culture," it would have to
- be the computer underground. This is supposed to be one of the smartest,
- most alternitive, techno-literate group around. There was a convention going
- on in Las Vegas called DefCon II. Played-up to be one of the largest
- gatherings of computer underground enthusiasts, I had to go. Although it is
- sad that this term "Cyber", while used so widely today, is hard to define.
- I am sad that I had to go to Las Vegas to find "Cyber"...if it was even
- there.
-
- This was obviously a place where "cyber-culture" came together! I decided
- to attend and look around. What I found was a large group of people
- drinking, smoking, viewing porn and talking about the latest security holes.
- These people were nothing like the people in Mondo-2000 or any other
- Cyber-rags. Where was their strange, multi-color clothing? So this is
- cyber-culture?
-
- I hit a few coffee shops, followed a group that I would bet that I saw in
- Mondo, tried psudo-virtual-reality hangouts, tried their smart drinks,
- smoked their tobacco, attempted being "trendy", and contemplated art
- in the most cyber-sense. My return: ZIP! NADA! NOTHING!
-
- From all of my travels and studies, I came up with a few theories. Although
- possibly distorted, I feel they are, for the most part true.
-
- Cyberculture is:
-
- 1) A bunch of burn-outs in a coffee shop, reading trendy "alternative" magazines, analyzing "alternative" music, and going to raves.
-
- 2) A bunch of kids doing large amounts of drugs, drinking smart-drinks,
- wearing flanel, attending "alternative" concerts like Woodstock '94
- hopelessly babbling on about topics that they know nothing about.
-
- 3) Cigarettes and alcohol.
-
- I find none of these interesting and frankly, I don't see whats so damn
- fascinating about them! ...and still cannot determine why it is called
- "Cyber". I am getting to hate this term more each time I have to write or
- say it...because it means NOTHING!
-
- So, if anyone finds "Mr. or Ms. Cyber" please let me know. I am not claiming
- to be a know-it-all, but when the press, the public, and society in general
- latches on to a term which evidently globally-defines a people or attitude,
- and THEN rams it down my throat on the front page of the newspaper and on
- the six o' clock news, I have the RIGHT to know what in the hell it means.
-
- Have a virtual-cyber-underground-mondo-networkable-fiber-opticable day!
-
- Alternative viewpoints are not welcome because this is my cyber-column.
- Get your own! Take a pill and get a life.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- A COMMENT ON CLIPPER
-
- By Azrael (reinoa@ccaix3.unican.es)
-
- Greetings to all fellow cyberpunks, hackers, modem enthusiasts,
- programmers, viri-coders, civil-rights activists, anarchists, crypto-
- mathematicians and all.
-
- The echoes of the Clipper polemics are heard even here in Spain, mainly
- thru a distorted view given by the pre-net mass media, and the very few
- people hooked to some kind of comms net.
-
- The way I see it, it is NOT that awful that the government of the USA is
- trying (in its best tradition) to limit liberty and privacy through the
- implantation of mandatory 'crippled' encryption or 'key escrows' or
- secure-phones or what have you. Remember the good old theory of the shield
- and the sword. If there is no enemy, there is no battle, and if there's
- no battle, there's no point in hacking, anarchism, sabotage, and public
- opinion campaigns. If there's no threat to our freedom or privacy, our
- skills will decay, weaken, and we'll submit in the end to the exigences
- of those in power.
-
- Security in computer systems should be improved upon, so that hackers have
- to keep up to it. Anti-virus packages have to get better, so that virus
- makers develop new techniques. In the same way, threatened privacy in
- electronic communications will be an incentive for enterprising people
- to create new methods of avoiding eavesdropping, by the development of
- new, better and faster cryptographic algorithms.
-
- As long as we keep 'en garde', they can't beat us. They just can't. But
- if they leave us alone for a time, we'll grow in pride and self-confidence
- and a false sense of security, while they have time to re-arm. In that
- way, they'll have us in the end.
-
- Fight the power! (and be glad you need to)
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- SEX, THE INTERNET AND THE IDIOTS
-
- By K.K. Campbell (eye@io.org)
-
- There are two breeds of moron attracted to the Internet's relation to sex
- -- reporters and wankers. These categories may overlap, but that's beside
- the point.
-
- Canadian newsmedia owe a great deal of Internet education to Judge Francis
- Kovacs and his infamous Karla Homolka trial publication ban. That elevated
- the Internet to headline material. It is humorous to watch reporters/
- editors grope for net.literacy.
-
- Talk with Justin Wells (stem@sizone.pci.on.ca) and Ken Chasse
- (root@sizone.pci.on.ca), the chaps who created alt.fan.karla-homolka as a
- lark, then found themselves hounded by reporters asking for "banned
- information, please." Or check out The Star's early stories, where Usenet
- newsgroups are called "computer billboards" -- whatever the hell those are.
-
- MEDIA MORONS
-
- Mainstream journalists without a rallying issue like a trial ban invariably
- end up with nothing better to do then bang the drum about the 3 Ps:
- pedophilia, piracy and pornography.
-
- Take the recent Internet "child molesters" silliness. Some teen somewhere
- is enticed into sex with an adult -- through America On Line, not the
- Internet -- and we have an "epidemic." Chicago's Harlan Wallach
- (wallach@mcs.com) reported in alt.internet.media-coverage how some dink
- named James Coates wrote a column for the July 15 Chicago Tribune called
- "Beware cybercreeps lurking on the Internet." True enough. But Coates'
- purpose is to frighten the middle class with some probably made-up story
- about "Vito," who cruises the net hoping "to have sex with children in
- wheelchairs."
-
- I understand Coates' pain. I can't spend 10 minutes in Internet Relay Chat
- (IRC) before someone asks if I'm a child in a wheelchair looking for a sex
- partner. Wallach told eye Coates has been going like this for months now --
- "a master at work."
-
- Couple of weeks ago, California nuclear research facility Lawrence
- Livermore Labs discovered one computer held some dirty pictures. An employee
- gave away a password. Someone used that access to store the images. People
- could connect and get them. Nothing was hacked. Big deal.
-
- But on July 13, CNN reporter Don Knapp swooped in to whip up
- hysteria. Doom was clearly imminent.
-
- "Computer security specialists were surprised to find what may be the
- largest computer collection ever of hardcore pornography at the nation's
- top nuclear weapons and research laboratory," Knapp intoned ominously.
- Almost 2000 megs! Gol-ly! (Incidentally, 99 per cent of it was individual
- shots of nude/semi-nude women, no sexually explicit acts. Playboy stuff.)
-
- CNN rang Wired magazine writer Brian Behlendorf (brian@wired.com) and woke
- him at home, excited about "a big break-in at Laurence Livermore." Hackers
- and porno! If CNN was lucky, the hacker was a child molester. Behlendorf
- consented to an interview. CNN immediately asked him to "find some pictures
- of naked women on the Net for us." Behlendorf recounted the incident: "I
- really wasn't interested in doing that. I don't know of any FSP/FTP sites
- off hand anyways, and really didn't want to be associated with pictures of
- NEKKID GRRLS."*
-
- But amiable Behlendorf slid over to alt.binaries.pictures.supermodels and
- grabbed a picture of a model in a swimsuit. He also picked up a landscape,
- a race car and a Beatles album cover "to show that other images get sent
- over Usenet as well," naively thinking this point would be made -- though
- he stresses he by no means condones distributing copyrighted images,
- "clean" or otherwise. Behlendorf was then made to sit beside a terminal
- displaying Ms String-Bikini throughout all his comments. "They made me keep
- returning to that damn bikini image ... over and over."
-
- But intrepid reporter Don Knapp assured us all is well -- for now.
- "Spokespeople for the national laboratories insist that at no time were the
- pornographers, nor the software pirates, able to cross over from the
- research network into the classified network. The labs say that, while they
- are embarrassed, national security was not breached."
-
- Whew.
-
- YOU'RE GETTING VERY STUP- ERR, SLEEPY...
-
- Then you have regular net.wankers. Whoever said, "Never underestimate the
- intelligence of the American public," must read alt.sex.* newsgroups.
-
- For instance, the charismatic Aabid (aabid@elm.circa.ufl.edu) wrote a
- touching post called "I would like an enema myself!" to newsgroup sci.chem
- (science: chemistry). "Looking for a Middle Eastern M or F to help me with
- my enema desires. If you can be of assistance please email me." Readers of
- sci.chem were very intrigued and Aabid has made many interesting new
- friends.
-
- The greatest example of alt.sex stupidity is: The Hypnosis Program.
-
- As a joke, Indiana's Steve Salter (ssalter@silver.ucs.indiana.edu) posted to
- alt.sex.stories that he had a "hypnosis program" -- which you cleverly slip
- onto another person's computer where it will so mesmerize the unsuspecting
- target, he/she becomes your SEXUAL PLAYTHING, BENDING TO YOUR EVERY WHIM!
- For weeks after, global village idiots pestered him for copies.
-
- "I must have received over a hundred requests via private email or in
- alt.sex.stories for a copy of the program," Salter told eye. He had to
- publicly post a reply to stem the tide: "No offense, but get a rather
- large clue. There is no such animal. That was a joke. I thought it was
- obvious. How many people out there really want to hypnotize someone
- secretly? What the fuck is wrong with all of you?! What age group are
- we dealing with here? There is no such program!!! Sheesh..."
-
- Personally, I'm in agreement with David Romm
- (71443.1447@compuserve.com) who wrote: "I really liked the hypnosis
- program. It was much better than Cats."
-
- MASSAGE MY MEDIUM
-
- To get your own porn, there are lots of sites. Ask for the latest in
- the alt.sex groups. Check out alt.binaries.pictures.erotica to grab a
- few images. For text erotica, read in alt.sex.stories .
-
- If you can't access alt.sex groups because, say, your university is run by
- prudes, write (ahem) "Hot Stuff" (anon1ea3@nyx10.cs.du.edu) for details
- about his mail-server. He makes available hundreds of stories. We at eye
- have yet to sample this collection but are intrigued by two items: "Perils
- of Red Tape," which we assume reveals the lust-riddled world of civil
- service, and "Tales from the Network," the story of lonely boys sitting
- around Friday nights fingering their groins in IRC, praying someone with a
- female-sounding alias drops by.
-
-
- * FootNote: NEKKID GRRLS is idiomatic fresh-off-the-BBS net.wanker-
- speak. This language can be learned by hanging around newsgroups
- like alt.2600 . To convince others you are a deadly cool net.cruiser,
- write: "HEY, elite pir-8 d00ds! I got more NEKKID GRRLS philes than
- ANY OF U!!!! And U censorship loosers can SUCK MY DICK!!!!!" Send it
- to alt.sex . Make sure to cross-post to the comp.sys.ibm.* hierarchy
- because PCs are the most common computer and you will reach a wider
- audience. If you can manage it, post through an anonymous account
- and leave your personal signature with real address in the text of
- the message.
-
- +++++++++++++++++++++++++++++++++++++++++++
- Retransmit freely in cyberspace Author holds standard copyright
- Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
- Mailing list available http://www.io.org/eye
- eye@io.org "Break the Gutenberg Lock..." 416-971-8421
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- JAUC For Windows Project
- SCHEDULED FOR JANUARY RELEASE
-
-
- By Scott Davis (dfox@fc.net)
-
- The development team at Fennec Information systems is currently working on
- a project called "JAUC for Windows". This software will be a large
- Windows-based help file with ALL the issues of The Journal Of American
- Underground Computing, Editor's page with tons of info on the editorial
- staff, as well as a LOT of other information regarding the Internet...
- all accessible with the click of a mouse in Windows. The scheduled release
- date for this piece of software is sometime in January. A furious effort
- is underway to provide you with this file as soon as possible. You will be
- required to have Windows 3.0, 3.1, or some other Windows-based product.
- It will work with Windows For Workgroups, NT, Chicago, Daytona, etc...
- The file will be available for FTP from TWO sites on the Internet. Those
- sites will more than likely be FC.NET and ETEXT.ARCHIVE.UMICH.EDU.
- You will be sent a small note (if you are on our mailing list) when this
- product becomes available. At this time, the only method of distribution
- is FTP. We are working on other ways to get this out. We will update you.
- If you have any questions regarding this product, please mail:
-
- jauc-win@fennec.com
-
- You will be mailed any updates automatically.
-
- Editor.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- NBC's ANTI-NET CAMPAIGN
-
- By Alaric (Alaric@f111.n106.z1.fidonet.org)
-
- A most heinous act of info-terrorism has beem committed against the net
- community by "Dateline", NBC's pseudo-news propaganda ministry.
-
- To further the government's need to destroy the haven of free speech known
- as cyberspace, NBC has successfully deluded much of their reactionary
- brain-dead audience into beleiving that NETWORKS ARE DANGEROUS - BBS's ARE
- CRIMINAL. Something must be done! (Something will be done - read on...)
-
- The September 1 episode of Dateline paraded adventursome youths who had
- lost the occasional finger while honing their pyrotechnical skills with
- anarcho-terrorist data gleaned from BBSs and the net. Forrest "Goebbels"
- Sawyer whined that the young and restless data-seekers of the 90's have easy
- access to exciting netware titles such as "Bomb Making For Fun and Profit"
- and "Anarchist's Cookbook" with no governmental interference of any kind!
- The existence of such networks and their accessibility by Gen-X misfits
- poses a clear and present danger to the national security of the United
- States.
-
- You may recall the first such attempt at an anti-net freedom propaganda
- campaign failed miserably and was aborted. Not enough concerned citizens
- fell for the ruse of nets being an unfettered sanctuary for child porn
- mongers, NAMBLA dating services and wily molesters. Since the first trial
- balloon was floated and quickly transpired, Plan-B has been put into action.
- Let's see how many suckers will fall for this one, "Computer networks are
- a dangerous source of subversive terrorist information and the children
- must be protected." (Janet Reno was conspicuously absent from said
- broadcast)
-
- A CongressMan-ic Oppresive named Ed Markey (Dem. Mass 7th Dist) is trying
- to hold hearings on the dangers of computer networking and supposedly try
- to draft some legislation that would allow the governmnet to regulate the
- nets or BBSs. Undoubtedly the legislation if passed will have a chilling
- effect on net traffic, which frankly is getting way out of hand if you ask
- any bureaucrat with something to hide. Severe penalties will be brought
- against any sysop who allows minors to access anything that might be
- contrued as dangerous. No doubt this definition will eventually receive
- a broad enough interpretation to forbid instructions on the manufacture of
- smoke bombs, casting of all lead ammunition, cleaning a .22 rifle, and even
- slingshot repair. The true goal of such legislation of course is not to
- "protect the children", but to stifle the grassroots organizing of anti-
- statist groups and to squash the tide of truth that is flooding cyberspace
- and often embarrassing government and corporate interests.
-
- Look for a "Child Protection Act" subtitled "concerning minors' access to
- dangerous information" to come before Congress within 18 months. Sysops
- will become responsible for what information gets to whom and what they do
- with it, regardless of the diligence they show in keeping the nets safe.
- Disclaimers and signed age statements will no longer suffice. You WILL be
- responsible for the information travelling though your board or newsgroup
- and you WILL be held accountable.
-
- Is the Pen more Powerful than the Sword? This question may never be
- answered fully, so why not hold on to both? Yet the propaganda forces and
- strong arm tactics forces that managed to squeak by the ban on assault
- swords will now be unleashed on the modern-day pamphleteers of the net.
- Al Gore wants to build a kinder and gentler super-information tollroad to
- keep your pens in line.
-
- Netters will be able to mount a powerful counter-attack that will surprise
- the hell out of Big Brother and Little Rock Sister. Notify Rep. Markey that
- we are watching and ready to fight. Fax-blast his office. Dig into his
- dirt and spread liberally. Likewise show NBC that we are listening. Reach
- out and touch these folks as follows:
-
- dateline@news.nbc.com
-
- Representative Edward J. Markey (D-7th)
- Malden, MA
- Office phone (in DC): 202-225-2836
- Energy and Commerce
-
- Markey is the Chairman of the subcomittee on
- Telecommunications and Finance - under Energy and Commerce
- 202-226-2424 subcommitee phone
- 202-226-2447 subcommitee fax
-
- This post should be crossposted and distributed.
-
- "They can have my net access when they pry the 486 from my
- dead, carpel tunnel syndrome-infested hands."
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CYBERSPACE, MIAMI, CHAOS, AND CLINTON
- THE MIAMI DEVICE PROJECT
-
- By Marty Cyber (cyb@gate.net)
-
- From December 8-11, 1994, Prez Clinton and Veep Gore, the Administration's
- point-man on the Infobahn will be coming to Miami to host the 35
- democratically elected heads of government of every country in the Western
- Hemisphere from Canada to Tierra del Fuego.
-
- The event is called the Summit of The Americas, and you folks who read Wired
- and ARE wired should plug into this event via the Internet and via any other
- bit-radiation-receiver-transmitter-device you have access too. I'd like to
- get your ideas on how Cyberspace and Cybertech could help make the Summit a
- success from the point-of-view of telecomm and info-technologies --- in a
- word, to try to begin building and operating a Global Brain and Nervous
- System for Planet Earth that can help us all in private, public, academic
- and community sectors use Cyberspace to create some kind of movement toward
- a New World Order out of the Chaos and Complexity we are now trying to surf
- on, without a truly functional "cybersurfboard."
-
- I'm attaching a couple of files that could stimulate some interesting
- exchanges --- and hoping to get the likes of Negroponte, Kelly, Kapor,
- Fields, Minsky, Schank, Bruckman, Clinton, Gore, Mesarovich, Forrester,
- Shannon, Wiener, Prigogine, Crowley, Castro, Mas Canosa, Irving,
- Brown, Chiles, Cuomo, Tyson, Simon, Beer, Gleick, --- and YOU ---
- to all kick in some ideas on how to use the Miami Summit as a kickoff
- environment for launching a World Summit on The Future via Cyberspace.
-
-
- Do give me some "negative feedback," as the cyberneticians have been known
- to say.
-
- And if any of you would like to warm your cybernetic buns in Miami in
- December --- real buns or virtual buns --- give me some "bit-radiations."
- I've got an Art Deco apartment building in the heart of Miami Beach's
- cyberhip South Beach, and might be able to put you up.
-
- Clinton's awareness of, and ability to use, the Principles of Chaos,
- Complexity, Cybernetics and other modern organizational management and
- learning techniques may be decisive in determining if his Administration
- is able to create a New World Order on the Edge of the Current Turbulent
- ORDER/CHAOS Meridian.
-
- Unfortunately, day-to-day decisiomaking and policy selection in the White
- House frequently has so much noise injected on its channels from Whitewater,
- Senator Damato-type ignoramus-based partisan-politics, that serious policy
- problems like Cuba, and other Foreign, Domestic and Economic matters tend
- toward more chaotic and less orderly states.
-
- What the White House could use --- perhaps initially placed within its
- Office of Science and Technology Policy --- is a National Cybernetics
- Council. This group would consist of the nation and the world's specialists
- in Complex Systems Theory, Chaos, Cybernetics, Cyberspace, and a new field
- which integrates all of the above: CYBERTECTURE: The design, construction,
- and operation of "cybernetic systems" for government, business, education
- and city-planning.
-
- Pete Nelson is correct in suggesting that we need politicians and polities
- that can "embrace change, uncertainty, paradox and contradiction," but we
- also must equip the public, private, academic and community sectors of
- American (and World) Society to deal with this new level of complexity.
-
- In December, if current White House plans stay in place, President Clinton
- and VP Al Gore, Clinton's point-man in advancing his Administration's high-
- level policy objective of building a National and Global Information
- Infrastructure (NII/GII) --- the highly publicized "Information Superhighway"
- --- both of American Government's top-managers will travel to Miami to host
- the Summit of The Americas December 8-11, 1994.
-
- Although the primary agenda topics for all the invited democratically elected
- leaders of every coutry in the Western Hemisphere from Canada to the southern
- tip of Latin America will be Economic Integration, Democratic Political
- Systems, and extending NAFTA into WHFTA (a Western Hemisperhic Free Trade
- Agreement), and important sub-topic will be infrastructure -- especially
- Telecommunications and Information Infratructure.
-
- With "the Cybertecture of Cybersystems, policy makers and their politiescan
- steer through the current chaotic turbulences of today into a new, and
- hopefully better, world order of tomorrow.
-
- Clinton and Gore, with the proper cybertools, may be just what the world
- needs now. Our non-profit consulting partnership in Miami Beach, "The MIAMI
- DEVICE PROJECT/RESEARCH AND DEVELOPMENT PARTNERSHIP, has developed a concept-
- paper for this December Summit of the Americas that could help Clinton, and
- the rest of use, develop and use the cybersystems we need to steer into our
- 21st Century Future.
-
- The following text is a summary of our first draft of the Miami Device
- Project concept. We'd appreciate your feedback, comments, critiques, and
- suggestions on how to create a World Summit on The Future during December
- 1994 and January 1995 on the Internet and other related media such as print,
- broadcast, multimedia, and face-to-face conferences. Also broadening the
- audiences for the work of the Santa Fe Institute, Bill Gleick, Ilya
- Prigogine, Mitchell Waldrop, and the other leading theorists and
- practitioners of Chaos/Complexity theory, and related researchers in
- Cybernetics and Management of Large Organizations, such as Barry Clemson,
- Jay Forrester, Stafford Beer, Mike Mesarovic, and the related work at US
- Government Research Labs as well as the great industrial research labs at
- IBM and ATT, could also bring the power of science to the problems of public
- policy and decision-making.
-
-
- THE MIAMI DEVICE PROJECT:
- AN AMERICAN AND INTERNATIONAL MISSION-QUEST
- FOR CYBERSPACE
-
- Something important, chaotic and with a hidden sense of latent order is
- happening in Cyberspace and Real-Space.
-
- Nobody who is honest can say they truly know, see, can predict or control
- what is happening with The Net, also known as:
-
- THE INFORMATION SUPERHIGHWAY.
- THE NATIONAL INFORMATION INFRASTRUCTURE.
- THE GLOBAL INFORMATION INFRASTRUCTURE.
- THE INFO BAHN.
- THE ELECTRONIC/DIGITAL SUPERHIGHWAY.
- CYBERSPACE.
-
- America and The World need models, mavens, moxie, methodologies and, last
- but not least, money --- to design, build, test, market and operate the
- National and Global Information Infrastructures. But most of all, the
- emerging Cyberspace Industry will need multimedia forums and discourse,
- even face-to-face conferences, that will clarify and shape the complex and
- relevant issues we must deal with as we enter the on-ramps to the Info
- Superhighway, and try to avoid the "road-kills" of entities both corporate
- and ideational that took the wrong turns. These forums and discourses may
- turn out to be the second most important set of discussions since the
- founding of the United States in 1776 in the shaping and shaping of America
- and the World as we approach the 21st Century. Adding to the complexity
- of the discussions about Cybernetic-Cyberspace technologies, applications
- and markets will be the fact that we will be using these ver same networks
- to discuss and develop their evolution ---- hopefully a democratic exchange
- of views from the many stakeholders and users of the Net who will design and
- live in the rapidly evolving civilization, societies and communities
- (virtual and real) that will be spawned by CyberTech, and the cultural,
- economic, political and community structures Cyberspace will enable.
-
- Cyberspace represents a new and irresistible era in the evolution of human
- culture and business under the sign of technology --- but what is turyly
- wonderful is that we still have the opportunity to shape the application of
- Cybertech toward an Age of Utopia rather than Dystopia.
-
- What is being born and can be shaped by discussion and effort is something
- that every normal child or animal possesses at birth, but has never fully
- existed intact over the entire face of the planet:
-
- A BRAIN FOR PLANET EARTH; A GLOBAL CENTRAL NERVOUS SYSTEM;
- A WORLD-WIDE SENSE AND PARTICIPATION IN A GLOBAL COMMUNITY;
- A CYBERNETIC CITY.
-
- The relevant discourses and forums must rationally and humanely deal with
- all the relevant issues connected with the new cybertechnologies and
- cybermedia --- and they are too important to the future of the planet to be
- left in the hands of government, business or universities alone. The
- community and the public but get informed and stay involved with the
- evolution of the Net.
-
- We have termed this multi-dimensional quest and process
-
- THE MIAMI DEVICE PROJECT TOWARD PARADISE REGAINED ---
- FOR GREATER MIAMI BEACH, SOUTH FLORIDA, AND THE
- WORLD-CLASS CITIES, CITIZENS, & NATIONS OF THE FUTURE.
-
- Why Miami? Why not Cambridge, or New York, or Chicago, or Los Angeles,
- or Milan, or Berlin or Paris London or Tokyo?
-
- In the history of the planet over the ages, from the time humankind first
- emerged from the primordial ooze, there have always been a succession of
- great city-regions that entered the world stage as truly world-class,
- international and cosmopolitan centers of trade, culture, education,
- technolgy, finance, transportation, and concentration of talent, dreams,
- wheels and deals.
-
- Just as the Central Florida region around Cape Canaveral and the Kennedy
- Space Center identified itself as America and the World's launch-pad and
- testbed for Aerospace, so is the Greater Miami Beach and South Florida
- region of the Sunshine State begun it movement toward center-stage as the
- nation and the planet's laboratory and test-bed for mankind's thrust into
- the truly Final and Next Frontier: Cyberspace.
-
- The Greater Miami Beach/South Florida region of 4 million, supported by a
- unique partnership of its private, public, academic and community sectors
- called The Miami Device Project, has been selected by the Clinton
- Administration to host in our region in December of 1994 the first, Western
- Hemisphere-Latin American Summit Conference, to be led by President
- Clinton and Vice-President Gore themselves.
-
- Greater Miami Beach's strategic geographic location and tropical, earthquake-
- free (though occasionally hurricane-prone) has positioned the region as an
- international gateway to not only Latin America and The Caribbean, but to
- Europe, Asia, and North America, also. A great airport .... the world's
- largest cruise-ship port and one of the most active seaports ... and coming
- soon, the world's first Cyberport-Teleport-Cyberspaceport ... a laboratory
- and crucible where the model Cybernetic City of The Future will be forged.
-
- Greater Miami Beach and it's multimedia links and partnerships with other
- sister cities, states, and nations intends to do for the science, art and
- business of cybernetic computer communications something similar, but much
- more benevolent for humanity, what the Manhattan Project did during World
- War II with the technology of thermonuclear energy, from which the atomic
- bomb was created.
-
- BUT THERE WILL BE A FUNDAMENTAL DIFFERENCE IN MISSION AND VISION IN THE MIAMI
- DEVICE PROJECT AS OPPOSED TO THE MANHATTAN PROJECT: The Miami Device
- Project's focus is to create and to provide universal access to knowledge
- tools and multimedia information systems for the human community, in both
- America and world-wide --- and to help design, build and sustain a truly
- Global Village and Cybernetic City where art, science, philosophy,
- technology and business can provide the human spirit with the lift of a
- driving dream into the 21st Century --- a Cybernetic Century of peace,
- prosperity and co-evolution for man, his systems, and our children.
-
-
- Norbert Wiener, the MIT professor of mathematics and inventor of the word
- and field of cybernetics, once commented in his book, "cybernetics and
- Society: the Human Use of Human Beings:" Mankind and society can only be
- truly understood by a study of the messages they transmit; in the future,
- messages between man and man, man and machine, and machine and machine
- will play an increasingly important role."
-
- If children can be considered messages we send to a future we may never see
- ourselves, the human children of our loins will themselves create new
- futures with the children of our minds --- our systems, networks and
- knowledge bases --- as humanity leaps toward the stars in our inner and
- outer universes.
-
- A First Draft on April 22, 1994, Friday Night,
- in Miami Beach, Florida, USA --- by Marty Cyber.
-
- (PS: Lab space and residential space grants are available in beautiful,
- sunny South Miami Beach's Art Deco District, where Miami Device is
- attempting to create a Science Deco District. if you cyberesearchers in
- Boston, New York, Washington or beyond are seeking weather-friendlier
- climates in December and afterwards, give me a call, e-mail, or letter
- outlining your own research interests and comments about the MDP Project.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
- IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
- YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
- PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CYBERSELL (TM)
-
- From Michael Ege (Michael_Ege@designlink.com)
-
- [Editor's Note: I HAVE NO FUCKING IDEA why someone who, in my opinion,
- misused the net, disregarded the complaining of others, and vowed to
- do it again, gets off dictating their new-found policy to us. They
- evidently want this to be written in stone. I think the rules below
- are good...and have been obeyed for decades by those with any tact!
- Evidently, the "Green Card Spammers" are just now getting a clue
- and want to take credit for ethics that already exist. Get a
- life MARTHA! -Ed.]
-
- Contact: Martha Siegel
- Cybersell(tm)
- 602/661-5202
-
- SUGGESTED INTERNET COMMERCIAL SPEECH GUIDELINES
-
- Explanatory Preface
-
- The Internet is the most powerful communication tool in the world, today
- and for the forseeable future. Recently the circulation of an advertisement
- by two lawyers for their legal services raised tremendous controversy as to
- the manner and location that ads should be placed on the Internet.
-
- Two years ago the National Science Foundation lifted the ban on Internet
- advertisements that they had previously imposed. Yet, the idea of
- commercialism an advertising in this increasingly pervasive medium is still
- controversial. The primary anti-ad forces can be found among the academics
- and technical workers who were the early residents of the Internet. Where
- advertising is an integral part of other mediums, this highly vocal faction
- is attempting, not without some success, publicly to characterize
- advertisers as inferior to others who supply information via computer.
-
- While the ad critics do not speak with a single voice, but rather express a
- diversity of opinions, several elements emerge with some consistency.
- First, there is an overall presumption that advertising is unwanted and
- useless. Even though those who who have made the pioneering forays into
- Internet advertising have met with financial success (proving that
- advertising messages are indeed accepted) the vocal minority continues to
- insist otherwise. Based on this faulty premises advertisers are told that
- custom demands that they approach customers only in an indirect manner.
- Specifically, advertisers are told that it is apropriate to to places ads
- only on channels set aside to carry nothing but advertising. Alternatively,
- an advertiser may place a message at a fixed locale in cyberspace but must
- use other mediums such as billboards and television ads to announce the
- computer location and ask the customer to go and look for it.
-
- It is unanimously agreed that noone controls the Internet and there is no
- legal requirment to follow these dictates. Nevertheless the vocal Internet
- minority that custom requires adherence to its outdated philospophy.
-
- The guidlines presented here refuse to recognize the unreasonable nature of
- those who are anti-advertising, Commercial activity on the Internet is a
- valuable and worthwhile use of this resource and advertising is a key
- element of such commercial use. It should be recognized that virtually no
- busines can be successful without advertising. The old-think view of some
- Net extremists that advertising is as an unwanted an unpleasant annoyance
- to be marginally tolerated is not good for the development of the Internet,
- nor healthy for the World economy.
-
- Recently special groups and networks devoted exclusively to product and
- service promotion have begun to be established. While these are an exciting
- pert of the development of the Information Superhighway, it is not
- acceptable or practical for advertising to be kept in a restricted area,
- separate from other Internet activities. Advertising is not relegated to
- such an inferior position in any other medium, thus it should not be so
- with respect to the Internet.
-
- Neither those who advertise on the Internet be forced to do so passively.
- In no ther medium is it required that a potential customer deliberately
- seek out an advertisement rather than having it placed before him or her.
- The idea that the only acceptable way to advertise on the Internet is a
- system where a non-computer medium is utilized to request that a potential
- customer look for such information at a particular site in cyberspace is a
- totally unacceptable limitation. Such convoluted methods are not effective
- or convenient for the advertiser or the consumer.
-
- The easy, free flow of information is the goal of the Internet. Advertising
- is valuable and useful information. It is the concept of free flow that
- should govern any Internet advertising policy.
-
- GUIDELINES
-
- * Usenet
- It is recognized that the Usenet is only public gathering place currently
- existing on the Internet. It is a legal and appropriate forum in which to
- place commercial messages.
-
- * Distribution
- Distribution of advertising messages to newsgroups on the Usenet will be
- based upon the demographic and /or interst of users of the newsgroups,
- ensuring that the newsgroups selected are those most often used by people
- likely to be interested in a particular commercial message.
-
- * Identity
- All commercial messages should be readiliy identifiable so users can read
- them in a fully informed manner. For example, a conventional, easily
- recognizable "AD" identifier in the title of all commercial message
- offerings may serve this purpose.
-
- * Filtering
- Advertisers shall respect the right of all individual Internet users to,
- though the use of existing or evolving technology, filter out commercial
- messages if they so choose. However, any upsteam provider short of the end
- users should refrain from making that decision for the individual, who may
- welcome a particular commercial message. Anything else would amount to
- censorship.
-
- * Sincerity
- Commercial messages should be offered only when there is a sincere belief
- that the information will prove useful to Internet users. The inclusion of
- useful information with the advertising copy is encouraged. However, it is
- als recognized that solicitation of purchases and directions on how to make
- such purchases are a validethical pursuit of the advertiser, as well as a
- useful convenience fot the consumer.
-
- (In addition to the above Internet-specific guidelines, the following
- suggestions are based upon time-tested, proven codes already in existence.
- {Sources are cited with each entry})
-
- * Truth
- Advertising shall tell the truth and shall reveal significant facts, the
- concealment of which would mislead the public (AAF's Advertising Principle
- of American Business)
-
- * Responsibility
- Advertising agencies and advertisers shall be willing to provide
- substantiation of all claims made (WSJ Guide to Advertising Policy and
- Production)
-
- * Taste and Decency
- Advertising shall be free of statements, illustrations, or implications
- that are offensive to good taste or public decency (Same Source)
-
- * Substantiation
- Advertising claims shall be substantiated by evidence in possession of the
- advertiser and advertising agency, prior to making such claims.
- (Advertising Principles of American Business)
-
- * Omission
- An advertisement as a whole (ed. note: original says "shoe") may be
- misleading although every sentence separately considered is literally true.
- Misrepresentation may result not only from direct statements but from
- omission of material facts (Better Business Bureau Code of Advertising)
-
- * Testimonials
- Advertising containing testimonials shall be limited to those of competent
- witnesses who are reflecting a real and honest opinion or experience.
- (Advertising Principles of American Business)
-
- * Composition
- The composition and layout of advertisements should be such as to minimize
- the possibility of misundertanding. (BBB Code)
-
- * Price Claims
- Advertisers shall not knowingly create advertising that contains price
- claims which are misleading. (AAAA Standards and Practices)
-
- * Unprovable Claims
- Advertising shall avoid the use of exaggerated or uprovable claims. (WSJ
- Guide)
-
- * Claims by Authorities
- Advertisers will not knowingly create advertising that contains claims
- insufficiently supported or that distorts the true meaning or practical
- application of statements made by professional or scientific authority.
- (Standards and Practices)
-
- * Guarantees and Warranties
- Advertiser of such shall be explicit with sufficient information to apprise
- consumers of their principal terms and limitations, or, when space and time
- restrictions pleclude such disclosures, the advertisement shall clearly
- reveal where the full text of the guarantee or warranty can be examined
- before purchase. (Advertising Principles)
-
- * Bait Advertising
- Advertising shall not offer products or services for sale unless such offer
- is constitutes a bona fide effort to sell the advertised products or
- services and is not a device to switch consumers to other goods or
- services, usually higher price. (Same Source)
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- SOME INFO ON GREEN CARD SPAM
-
- The first surprise is that "pericles.com" has disappeared from the PSI
- name servers and from the "whois" database! But they have a new
- domain, "SELL.COM". The change happened just two days ago:
-
- % whois pericles.com
- No match for "PERICLES.COM".
-
- % whois pericles-dom
- No match for "PERICLES-DOM".
-
- % whois canter
- Canter & Siegel (SELL-DOM) SELL.COM
- Canter, Laurence A. (LC42)
- postmaster@SELL.COM
- (602) 661-3911 [and some other entries that are irrelevant here]
-
- % whois sell-dom
- Canter & Siegel (SELL-DOM)
- P.O.Box 13510 Scottsdale, AZ 85267
-
- Domain Name: SELL.COM
-
- Administrative Contact: Canter, Laurence A. (LC42) postmaster@SELL.COM
- (602) 661-3911 Technical Contact, Zone Contact: Network Information and
- Support Center (PSI-NISC) hostinfo@psi.com (518) 283-8860
-
- Record last updated on 09-Aug-94.
-
- Domain servers in listed order:
-
- NS.PSI.NET 192.33.4.10 NS2.PSI.NET 192.35.82.2
-
- % whois lc42
- Canter, Laurence A. (LC42)
- postmaster@SELL.COM
- Canter & Siegel P.O.Box 13510 Scottsdale, AZ 85267 (602) 661-3911
-
- Record last updated on 09-Aug-94.
-
- Queries from nslookup asking for an IP address or MX record for
- sell.com yield no fruit. The query "ls sell.com" is refused by the PSI
- name servers.
-
- But it seems logical to ask about "cyber.sell.com", and sure enough,
- it's there:
-
- cyber.sell.com inet address = 199.98.145.99 cyber.sell.com preference =
- 5, mail exchanger = cyber.sell.com
-
- This is the same address that pericles.com had until a couple of days
- ago. It still has no backup mail exchanger, but that may not be so
- important any more, because....
-
- The host at this address is no longer a PC running Microsoft Windows.
- It's now a Unix box! That's right: if you try to telnet to this host,
- at the customary port 23, you're greeted with this prompt:
-
- UNIX System V Release 4.2 (cybersell) (pts/0)
-
- login:
-
- There are also server processes listening on ports 512(rexecd), 513
- (rlogind) and 514 (rshd).
-
- They've got an FTP server (port 21), but it doesn't accept "anonymous"
- or "ftp" as a user name.
-
- They've also got an SMTP server listening (port 25), but it apparently
- does not implement the "vrfy", "expn", or "help" commands--all of these
- yield "502 ... Not recognized" error replies. The "rcpt to" command
- seems to accept any recipient name as legitimate--any validity check
- must come later, after it has already accepted the mail.
-
- They don't have an NNTP(119), Gopher(70), or Web(80) server--at least
- not on the conventional ports for such services.
-
- They do have a few other active ports: echo(7), discard(9),
- daytime(13), ttytest(19), and time service (37).
-
- There's also something that answers a connection to port 199, but I
- have no idea what that service might be. Anyone else know?
-
- If you do a traceroute, you get this: .... 9 psi-nsf.psi.net
- (192.41.177.246) 27 ms 31 ms 27 ms 10 core.net155.psi.net (38.1.2.3)
- 145 ms 129 ms 145 ms 11 serial.phoenix.az.psi.net (38.1.10.37) 227 ms
- 195 ms 195 ms 12 38.2.37.6 (38.2.37.6) 230 ms 184 ms 238 ms 13
- cyber.sell.com (199.98.145.99) 195 ms 215 ms 219 ms
-
- Someone who knows more about routing and networks than me might be able
- to analyze this for information about the nature of their connection.
- What is "38.2.37.6"? It has no hostname, and if you try to telnet to
- it, it asks for a password without first asking for a username.
-
- I hope all of the above information is useful to the rest of the Usenet
- community. If you've got your site aliased to "pericles.com", you
- should consider adding a new alias of "cyber.sell.com". I look forward
- to hearing more information from others more knowledgeable than myself.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CABLE RESOURCES ON THE NET
-
- By John Higgins (higgins@dorsai.dorsai.org)
-
- Updated September 1994 Compiled by Multichannel News. Copyrighted by
- John M. Higgins 1994. All rights reserved. Additional copyright information
- at bottom.
-
- Multichannel News Contacts:
- Marianne Paskowski, editor-in-chief (Mpcable@aol.com)
- John M. Higgins, finance editor: (higgins@dorsai.dorsai.org)
-
- Multichannel News subscription information: 800-247-8080. A bargain at
- $89/year. Editorial Department: Voice) 212-887-8390; Fax) 212-887-8384
-
- -=-=-=-=-=-=-=THE BEST CABLE STUFF-=-=-=-=-=-=-=
- Telecomreg (mailing list); Cable Regulation Digest (newsletter); fcc.gov
- (document archive); FCC Daily Digest (finger); cablelabs.com (document
- archive); rec.video.cable-tv (Usenet newsgroup); Edupage (newsletter)
- -=-=-=-=-=-=-
-
- For a bunch folks wanting to rule the info highway, cable's status on the
- Internet echoes MTV:Unplugged. There are some signs of senior execs
- starting to tap in, but they're few and far between. There are domains
- listed in the name of cable companies (TCI, Cablevision Systems, Viacom)
- but many seem to be inactive. Comcast and Viacom are on hopelessly limited
- MCI Mail systems that regularly snarl. To steal a line, cable execs hope to
- build the highway but they can't drive.
-
- Example: Recently I needed a copy of the freshly revised Hollings bill
- S.1822. I couldn't get it out of the Senate, the National Cable Television
- Association or any cable source. But I surfed over to Bell Atlantic's
- Internet site (ba.com) and grabbed the whole thing (including amendments).
- The telcos are clearly hipper to this info highway stuff than the cable
- kids.
-
- The good news is that the number of Internet resources useful to cable
- professionals is growing. The bad news is that they're primarily provided
- by telcos and regulators. But it's a start. Here's a cluster of cable
- resources of all sorts that I've encountered.
-
- GIMME FEEDBACK! Send us updates, particularly on the technical side. (And
- not just how to pirate HBO and pay-per-view porno, please.)
-
- "Differently clued" cable newbies should feel free to contact us with any
- questions on how to navigate. Many of these resources are NOT accessible to
- subscribers of Prodigy, America On-Line and Compu$erve.
-
- A similar list of broadcasting resources on the net is compiled by Neil
- Griffin (ngriffin@nyx.cs.du.edu).
-
- ** Mailing Lists
-
- TELECOMREG: A mailing list focusing on telecomunications regulation.
- Subscribers got an early peek at the FCC's latest cable price formula,
- Founded by Barry Orton, a consultant to municipal regulators, TELECOMREG is
- very high volume and fairly high quality.
- How to get on it: E-mail (listserver@relay.adp.wisc.edu; SUBSCRIBE
- TELCOMREG YOUR NAME)
-
- SCTE-LIST: A mailing list on cable technology apparently tied to the
- Society of Cable Television Engineers that just cranked up. It's too new to
- judge the quality.
- How to get on it: E-mail (listserver@relay.adp.wisc.edu; SUBSCRIBE
- SCTE-LIST YOUR NAME)
-
- I-TV: Discussion list centered on two-way Interactive Television. Very
- new, and appears to be focusing mostly on education and community
- development. So far it's pretty lame, but that could change. Expect lots
- of public-access types to be kicking around, as opposed to folks actually
- trying to make a business of it. Uploading press releases is -- for some
- bizzare reason -- encouraged.
- How to get on it: E-Mail (listserv@knowledgework.com; SUB I-TV YOUR
- NAME).
-
- TELECOM DIGEST: Oriented toward voice telephony, but covers all sorts of
- telecommunications topics. Fairly techie.
- How to get on it: E-mail (telecom-request@eecs.nwu.edu; SUBSCRIBE
- YOUR@ADDRESS); Usenet (comp.dcom.telecom).
-
- ** Publications
-
- CABLE REGULATION DIGEST: A weekly summary of regulatory news from
- Multichannel News. The best way to obtain it each week is on the TELECOMREG
- list.
- How to get it: FTP (ftp.vortex.com: /tv-film-video/cable-reg)
- Gopher (gopher.vortex.com : /TV/Film/Video)
-
- FCC DAILY DIGEST: Washington telecom lawyer Robert Keller attaches the
- most recent edition and referenced documents to his "finger" file. A really
- nice effort by Keller. Be sure to open your capture buffer first, as the
- file is many screens long.
- Also available at the fcc.gov ftp and gopher site. (see below).
- How To Get It: Finger (finger rjk@telcomlaw.com).
-
- EDUPAGE: Tip sheet on information technology and media issued three
- times weekly. Quickie summaries primarily of newspaper articles,
- primarily from the majors.
- How to get it. E-Mail (listproc@educom.edu, SUB EDUPAGE YOUR NAME).
-
- FITZ'S SHOPTALK: Daily dispatches on the TV business, primarily networks
- and local stations put there's plenty of cable in there. Put out by media
- headhunter Don FitzPatrick. Primarily summaries of wire-service and major
- newspapers, but also includes some full-text reprints.
- How to get it: E-mail (shoptalk-request@gremlin.clark.net, SUBSCRIBE
- YOUR@ADDRESS).
-
- SKYGUIDE: This one's from a Brit that doubtless watches too much TV. The
- Euro cable and satellite television scene. Concentrates on BSkyB but also
- romps off onto the continent.
- How to get it: E-mail (bignoise@cix.compulink.co.uk), Usenet {preferred!}
- (alt.satellite.tv.europe).
-
- SATNEWS: A newsletter about satellite television broadcasting around the
- world.
- How to get it: E-mail: (listserv@orbital.demon.co.uk, SUBSCRIBE YOUR
- NAME).
-
- ** FTP, Gopher, and WWW Sites
-
- CABLELABS: Finally, a cable-specific document archive! CableLabs, the
- industry's R&D greenhouse, has established an anonymous FTP archive at
- cablelabs.com. It's still "under construction", as they say. There's a
- small collection of techie documents in it so far, but more is promised.
- How to get there: FTP (ftp.cablelabs.com); WWW (http://www.cablelabs.com/).
-
- FEDERAL COMMUNICATIONS COMISSION: Loads of documents, orders, etc. but
- they're poorly orgainized.
- How to get there: Gopher (fcc.gov); FTP (fcc.gov).
-
- PEPPER & CORAZZINI: A D.C. telecom law firm has put up an archive of
- documents and memos by their lawyers on related to broadcasting, cable,
- common carriers, PCS and information law. P&C's e-mail contact is Neal J.
- Friedman (nfriedma@clark.net)
- How to get there: Gopher (gopher.iis.com//11/p-and-c); FTP
- (ftp.iis.com/companies/p-and-c) WWW (http://www.iis.com/pandc-home.html).
-
- NTIA: National Telecommunications and Information Administration has a
- document site, notably from Clinton's National Info Infrastructure
- committe. Seems to be down frequently.
- How to get there: Gopher (ntia.doc.gov); FTP (ntia.doc.gov).
-
- BELL ATLANTIC: Telco propaganda (press releases, speeches, Congressional
- testimony) mixed in with lots of useful regulatory documents.
- How to get there: Gopher (ba.com); FTP (ba.com).
-
- MFJ TASK FORCE: More RBOC lobbying on-line. But it's a hell of a lot
- better than anything cable has to offer.
- How to get there: Gopher (bell.com).
-
- C-SPAN: The public-affairs network has a gopher site with a whole mess of
- programming info for viewers.
- How to get there: Gopher (c-span.org); ftp (c-span.org).
-
- CNN: For reasons I haven't quite figured out, the University of Maryland
- has a gopher site carrying the text of CNN's Headline News stories, putting
- up dozens of national and international news stories daily, with an archive
- going back several days.
- How to get there: Gopher (info.umd.edu).
-
- ** Usenet Groups
-
- The quality of cable info on Usenet newgroups is mixed. The most active
- cable group is rec.video.cable-tv. It once was dominated by tips on
- stealing cable. However, in recent months three cable system-level execs
- from Time Warner (Dean Stauffer), Continental (Scott Westerman) and Century
- (Lloyd Sanchez) have virtually turned the group around by patiently and
- respectfully responding to cable subscribers' questions, legit complaints
- and outright rants. Informed and informative answers, what a concept! Give
- them a raise.
-
- Usenet is one way to sample what subscribers are buzzing about. Is your
- company included on the recent list of "worst cable companies"?
-
- rec.video.cable-tv Most active.
- alt.cable-tv.re-regulate Traffic has really picked up. Lots of
- complaining subscribers.
- alt.satellite.tv.europe Active group on Euro cable and satellite
- programming.
- alt.politics.datahighway Not too bad.
- alt.tv.public-access Reportedly exists, but I've never seen it.
- comp.dcom.telecom Moderated discussion of telco issues. Telecom
- Digest appears here.
- alt.dcom.telecom Breakaway group started by telco folks
- irritated by the ones dominating
- comp.dcom.telecom
- alt.dcom.catv I've NEVER seen pertinent traffic on this group.
- alt.tv.comedy.central Dull.
- alt.tv.mst3k Comedy Central's Mystery Science Theater 3000.
- alt.tv.hbo Hardly any traffic.
- alt.tv.nickelodeon Fans of the kid's network.
- alt.fan.ren-and-stimpy 'Nuff said.
-
- ** FAQ's
-
- There's a few frequently-asked-questions lists kicking about. The Cable
- TV FAQ is all about pirating HBO (YAWN!), with many technical details.
- Can't find the archive site, however. The DBS and wireless cable FAQs are
- more useful to non-pirate professionals.
-
- All three are posted are posted in rec.video.cable-tv periodically. High-
- power DBS is in rec.video.satellite. I'll add archive sites as I find them.
-
- CABLE TV FAQ
- How to get it: Usenet (rev.video.cable-tv).
-
- WIRELESS CABLE FAQ How to get it: FTP (rtfm.mit.edu:/pub/usenet/
- rec.video.cable-tv/Wireless_Cable_TV_FAQ); Usenet (rec.video.cable-tv).
-
- HIGH-POWER DBS FAQ: Not archived anywhere.
- How to get it: Usenet (rec.video.cable-tv, rec.video.satellite).
-
- ** Canada
-
- Mooseland has its own cluster of resources:
-
- USENET GROUPS:
- can.infohighway
- can.infobahn
-
- MAILING LISTS
- PAC-HIWAY: Run by Public Advisory Council on Information Highway Policy.
- How to get it: E-mail: (listprocessor@cunews.carleton.ca; SUBSCRIBE YOUR
- NAME)
-
- ISCNEWS: Mailing list of news releases, fact sheets, etc. from the
- federal agency Communications Canada
- How to get it: E-mail (listserv@debra.dgbt.doc.ca; SUBSCRIBE ISCNEWS
- YOUR NAME)
-
- THE INTERNET JOURNAL OF GOVERNMENT RELATIONS: Bi-weekly commentary on
- government action regarding information technology, trade and
- procurement in North America, but primarily Canada.
- How to get it: E-mail (pcanniff@fox.nstn.ns.ca)
-
- SITES
- INDUSTRY CANADA: Canada's equivalent to the U.S. Department of Commerce
- How To Get There: Gopher (debra.dgbt.doc.ca /Industry Canada Docs)
- FTP (debra.dgbt.doc.ca /pub look in both "gazette" and "isc" directories)
- WWW: (http://debra.dgbt.doc.ca/isc/isc.html)
-
-
- Copyright 1994 by John M. Higgins. This list may be redistributed
- provided that the article and this notice remain intact. This article may
- not under any circumstances be resold or redistributed for compensation of
- any kind without prior written permission from John M. Higgins. That
- includes publication by magazine or CD-ROM. But if you're interested,
- talk to me.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- IDS ANNOUNCES NEW ROCHELLE, NEW YORK POP (AC 914)
-
- From: green@ids.net
-
-
- InteleCom Data Systems, Inc, operators of the IDS World Network, the
- worlds first full-service Internet Access service geared towards end-users,
- announces the latest of its new Points of Presence to be brought online.
-
- New Rochelle, New York members may access IDS via (914) 637-6100 at speeds
- of up to 28.8k baud using the new V.FAST technology.
-
- IDS offers dialup Internet access for a low flat monthly fee, as well as
- PersonalSLIP - a dial-on-demand, low-cost SL/IP service starting at $20
- per month.
-
- Here is our standard electronic brochure. For more information, contact
- IDS Customer Service at (800) IDS-1680.
-
-
- :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.
- The IDS World Network
- Internet Access Service
- :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.
-
-
- A great place for the beginner to start with, and an easy enough place for
- the experienced user to fully utilize the facilities on the Internet.
-
- Features:
-
- o Usenet NEWS
- o Internet Mail
- o TELNET, FTP, FINGER, TALK
- o Menu Driven Interface
- o UPI Newswire
- o VAX/VMS DCL Access
- o Low affordable prices
-
- The IDS World Network Internet Access Service is a great meeting place on
- the Internet. We offer free BBS service to everyone; message areas and
- local email are all free. Stop in - meet and talk with people from all
- over the world... from Albania to Zimbabwe. Yugoslavia... Russia...
- Germany... Australia... and all of them participate in our online message
- bases, providing inteligent discussion and an excellent way to make the
- world a bit smaller by bringing everyone together electronicly. Subjects
- range from local parking tickets to the global environment and possible
- solutions for world problems.
-
- The IDS World Network was the first system to obtain NSFnet access for
- members - we're the longest running Internet "public access" service,
- with years of experience providing easy access for beginners, and ease
- of use for experienced Internet gurus.
-
- We have a network of several machines handling the load at our Operations
- Center in Rhode Island, with dedicated NEWS servers, SL/IP servers and UUCP
- machines.
-
- Now we're reachable through the CompuServe Packet Network - for just $4 per
- hour on top of the regular monthly subscription rates, you can access the IDS
- World Network from any local number for the CompuServe Packet Network - for
- your nearest CPN number, call our customer service line at (800) IDS-1680.
- The rates for using IDS through the CompuServe network are just $4 per hour,
- day or night - no higher rate for peak usage. PersonalSLIP and other SL/IP
- services are not available through the CompuServe Packet Network, although
- IDS UUCP services are...
-
- INTERNET SERVICES
-
- Users have their own workspace with unlimited file size storage; files
- remain in the workspace for 24 hours (giving the user ample time to
- download files to their personal computer).
-
- Service types:
-
- Standard Account - All Internet functions, standard menu account, VAX/VMS
- DCL Access. Services arranged by category in an easy-to-use, menu
- driven interface. All for $15 per month ($17 per month when dialing
- through Miami).
-
- PersonalSLIP - Your own Internet SL/IP connection, Dial-On-Demand. $20/month
- for 20 hours, $2/hr each additional hour. POP Mail service included
- for mail storage and retrieval, for use with popular email programs
- such as Eudora, QVTnet, and others. Also includes NNTP server access
- for offline/online NEWS reading.
-
- Dedicated PersonalSLIP - Your own Internet SL/IP connection, 24 hours a day,
- 7 days a week, your own Single-Host IP address and Domain Name, $75/month
- There is a $450 startup charge for this service.
-
- Dedicated SL/IP - Network connections for multiple hosts and all of the above
- for $200/month. There is a $450 startup charge for this service.
-
- UUCP Services - Connect your BBS or your own private system. We support
- 14.4k baud modems on all of our UUCP lines. One-time setup fee of $25, plus
- $20/month for mail and up to 100 newsgroups, $35/month for up to 500,
- $45/month for a full feed. One time fee of $25 for those wishing to
- apply for their own domain.
-
- ATTENTION TEACHERS AND EDUCATORS
-
- IDS works heavily with teachers and educators around the world to help
- bring them together to utilize the Internet in the classroom. If you'd
- like more information, send electronic mail to info@ids.net. Rhode Island
- teachers: contact Reo Beaulieu at the RI Department of Education for your
- free account.
-
- CURRENT DIALUP CALLING AREAS
-
- Middle Rhode Island (401) 884-9002
- Northern Rhode Island (401) 273-1088
- Southern Rhode Island (401) 294-5779
- Miami, Florida (305) 534-0321
- Merrit Island, Florida (407) 453-4545 (Brevard County, FL)
- New Rochelle, New York (914) 637-6100
- All CompuServe Packet Network numbers.
-
- Other Florida areas forthcoming.
-
-
- --> ALL USERS MUST ADHERE TO ACCEPTABLE USE POLICIES OF THE APPROPRIATE <--
- --> NETWORKS <--
-
- To access the IDS World Network; telnet to ids.net [155.212.1.2], or dial
- us via modem at (401) 884-9002. If you are dialing direct, type IDS at the
- first prompt and then sign on as GUEST when it asks for a Username.
-
- Web users, try the <A HREF="http://www.ids.net">IDS Web Server</A>.
-
- For Customer Service, send email to info@ids.net, or call (800) IDS-1680
- voice. Within Rhode Island, call (401) 884-7856.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- THE MEDIA LIST
-
- By Adam M. Gaffin (adamg@world.std.com)
-
- This is a listing of newspapers, magazines, TV stations and other media
- outlets that accept electronic submissions from readers and viewers, along
- with their main e-mail addresses. It would be almost impossible to
- maintain a listing of individual reporters, editors and the like; if you
- want to reach a specific person, try sending a request to the given media
- outlet's general address (but see below for a one-time listing for the
- Ottawa Citizen). If you are submitting a letter to the editor or an op-ed
- piece, it's a good idea to include your mail address and a daytime phone
- number. Publications generally try to verify authorship and will not run
- submissions without some way to check whether you really wrote the item
- to which your name is attached.
-
- Please send any additions, deletions or corrections to the address at the
- end of this list. Look for new editions in the alt.journalism,
- alt.internet.services and comp.misc newsgroups. My thanks to all who have
- contributed! Because of these kind folks, this list is now substantially
- longer than it was just a week ago.
-
- SPECIAL NOTE: The last part of this list contains the e-mail addresses
- for reporters and editors at the Ottawa Citizen. Thanks to the Citizen for
- the information.
-
-
- DAILY NEWSPAPERS
-
- Middlesex News, Framingham, Mass. mnews@world.std.com
- Boston Globe
- Story Ideas news@globe.com
- Circulation Requests circulation@globe.com
- Letters to the Editor letter@globe.com
- Submissions to "Voxbox" column voxbox@globe.com
- Comments on Coverage/Ombudsman ombud@globe.com
- Ask the Globe ask@globe.com
- Thursdays Calendar Section list@globe.com
- Health & Science Section howwhy@globe.com
- Confidential Chat chat@globe.com
- City Weekly Section ciweek@globe.com
- Religion Editor religion@globe.com
- Arts Editor arts@globe.com
-
- Champaign-Urbana (Ill.) News-Gazette gazette@prairienet.org
-
- Chronicle-Telegram, Elyria, Ohio macroncl@freenet.lorain.oberlin.edu
- Colorado Daily, Boulder, Colo colorado_daily@onenet-bbs.org
- The Guardian, U.K. letters@guardian.co.uk
- Notes and Queries nandq@guardian.co.uk
- Morning Journal, Lorain, Ohio mamjornl@freenet.lorain.oberlin.edu
- Ottawa Citizen, Ottawa, Ont. ottawa-citizen@freenet.carleton.ca
- Portland Oregonian oreeditors@aol.com
- Sacramento Bee sacbedit@netcom.com
- Phoenix Gazette phxgazette@aol.com
- St. Petersburg (Fla.) Times 73174.3344@compuserve.com
- San Diego Union-Tribune computerlink@sduniontrib.com
- San Francisco Examiner sfexaminer@aol.com
- San Jose Mercury-News sjmercury@aol.com
- Santa Cruz County (Calif.) Sentinel
- Letters to the editor sented@cruzio.com
- News desk sentcity@cruzio.com
- Seattle Times edtimes@hebron.connected.com
- Tico Times, Costa Rica ttimes@huracon.cr
- Washington Square News, NYU nyuwsn@aol.com
-
- WEEKLY NEWSPAPERS
-
- Hill Times, Ottawa, Ont. ab142@freenet.carleton.ca
- Journal Newspapers, D.C. area thejournal@aol.com
- The Mirror, Montreal, Quebec mirror@fc.babylon.montreal.qc.ca
- Palo Alto Weekly, Palo Alto, Calif. paweekly@netcom.com.
- The Village Voice, New York, N.Y. voice@echonyc.com
-
- MAGAZINES
-
- American Journalism Review amerjourrv@aol.com
- Brown Alumni Monthly, Providence, R.I. bam@brownvm.brown.edu
- Business Week bwreader@mgh.com
- Chronicle of Higher Education editor@chronicle.merit.edu
- Details detailsmag@aol.com
- Frank Magazine, Ottawa, Ont. ag419@freenet.carleton.ca
- Focus, Germany 100335.3131@compuserve.com
- GQ gqmag@aol.com
- Illinois Issues, Springfield, Ill. wojcicki@eagle.sangamon.edu.
- Mother Jones x@mojones.com
- The New Republic editors@tnr.com
- New Scientist, U.S. bureau 75310.1661@compuserve.com
- Oberlin Alumni Magazine alummag@ocvaxc.cc.oberlin.edu.
- OutNOW!, San Jose, Calif. jct@netcom.com
- Playboy playboy@class.com
- S.F. Examiner Magazine sfxmag@mcimai.com
- Scientific American letters@sciam.com
- Soundprint soundprt@jhuvms.hcf.jhu.edu
- Der Spiegel, Germany 100064.3164@compuserve.com
- Stern, Hamburg, Germany 100125.1305@compuserve.com
- Sky & Telescope, Cambridge, Mass. skytel@cfa.harvard.edu
- Spectrum, New York, N.Y. n.hantman@ieee.org
- Stern, Hamburg, Germany 100125.1305@compuserve.com
- Time timeletter@aol.com
- Ultramarathon Canada an346@freenet.carleton.ca
- USA Weekend usaweekend@aol.com
- U.S. News and World Report 71154.1006@compuserve.com
- Wired editor@wired.com
-
- NEWS/MEDIA SERVICES
-
- Cowles/SIMBA Media Daily simba02@aol.com
- Media Page mpage@netcom.com
- Newsbytes newsbytes@genie.geis.com
-
- NEWSLETTERS
-
- Dealmakers Ted.Kraus@property.com
- Information Law Alert markvoor@phantom.com
- Multichannel News higgins@dorsai.dorsai.org
- Society of Newspaper Design fairbairn@plink.geis.com
- Spec-Com Journal spec-com@genie.geis.com
- Western Producer, Saskatoon fairbairn@plink.geis.com
-
- RADIO AND TV STATIONS AND NETWORKS
-
- CJOH-TV, Ottawa, Ont. Can. ab363@freenet.carleton.ca
- KARK, Little Rock, Ark. newsfour@aol.com
- KOIN, Portland, OR. koin06A@prodigy.com
- WBFO, Buffalo, N.Y. wbfo@ubvms.cc.buffalo.edu
- WBFO-FM, NPR, Buffola, NY. wbfo@ubvms.cc.buffalo.edu
- WCBS-AM, CBS, NYC. news88@prodigy.com
- WCVB-TV, Boston, Mass. wcvb@aol.com
- WCCO-TV, Minneapolis, Minn. wccotv@mr.net
- WDCB Radio, Glen Ellyn, Ill. scotwitt@delphi.com
- WEOL-AM, Elyria, Ohio maweol@freenet.lorain.oberlin.edu.
- WNWV-FM, Elyria, Ohio maweol@freenet.lorain.oberlin.edu.
- WNYC, New York, N.Y., "On the Line" 76020.560@compuserve.com
- WRVO-FM, Oswego, N.Y. wrvo@oswego.edu
- WTVF-TV, Nashville, Tenn. craig.owensby@nashville.com
- WVIT-TV, New Britian, Conn wvit30a@prodigy.com
- WXYZ-TV, ABC, Detroit. wxyztv@aol.com
- WWWE 1100 AM Cleveland, OH talk11a@prodigy.com
- BBC "Write On" iac@bbc-iabr.demon.com.uk
- CBC Radio, "Brand X" brandx@winnipeg.cbc.ca
- Fox TV foxnet@delphi.com
- Maine Public TV, "Media Watch" greenman@maine.maine.edu
- Monitor Radio Int'l "Letterbox" letterbox@wshb.csms.com
- NBC News, New York, N.Y. nightly@nbc.ge.com
- NBC News, "Dateline" dateline@nbc.ge.com
- NPR "Talk of the Nation" totn@aol.com
- NPR "Talk of the Nation/Sci. Friday" scifri@aol.com
- NPR "Fresh Air" freshair@hslc.org
- NPR "Weekend All Things Considered" watc@cap.gwu.edu
- NPR "Weekend Edition/Sunday" wesun@clark.net
-
- COMPUTER PUBLICATIONS
-
- Communications News 489-8359@mcimail.com
- Corporate Computing 439-3854@mcimail.com
- Computerworld computerworld@mcimail.com
- Communications Week 440-7485@mcimail.com
- Data Communications 416-2157@mcimail.com
- Datateknik, Sweden datateknik@dt.etforlag.se
- Enterprise Systems Journal 543-3256@mcimail.com
- Home Office Computing hoc@aol.com
- Information Week informationweek@mcimail.com
- Infoworld letters@infoworld.com
- The Internet Business Journal mstrange@fonorola.net
- The Internet Letter netweek@access.digex.net
- iX, Germany post@ix.de
- Journal of C Language Translation jclt@iecc.com
- LAN Times 538-6488@mcimail.com
- Network Computing network_computing@mcimail.com
- Network Management network@world.std.com
- PC Magazine 157.9301@mcimail.com
- PC Week 557-0379@mcimail.com
- Telecommunications 311-1693@mcimail.com
- Windows User 75300.3513@compuserve.com
-
- --------------
- Ottawa Citizen (please note that all of these addresses save the last one
- are at Ottawa Freenet, which has a domain of freenet.carleton.ca; to
- reach Doug Yonson from outside the Freenet, for example, write
- af719@freenet.carleton.ca).
-
- af719 Doug Yonson The Citizen's FreeNet coordinator
- ac583 Peter Calamai Editorial Page Editor
- ae273 Johanne Vincent Editorial Page assistant
- ae836 Tony Cote Action Line columnist
- ah206 Alana Kainz High technology reporter/columnist
- ac806 Deborah Richmond High Priority editor
- ag955 Francine Dube Social trends reporter
- af391 Peter Hum Reporter
- ai997 Mike Shahin Outaouais Reporter
- ae451 William Speake Part-time reporter
- ag696 Hilary Kemsley Years Ahead columnist (seniors issues)
- ai379 Drew Gragg Assistant Photo Director
- af227 Jack Aubry National Reporter (aboriginal affairs)
- ae379 Daniel Drolet Reporter
- al715 Liisa Tuominen Librarian
- ak570 Michael Groberman Theatre critic
- am906 Robert Sibley Reporter
- an643 Dave Rogers Reporter
- ao096 Wanita Bates Consumer, fashion reporter
- an552 Tony Lofaro Reporter
- am100 Seymour Diener Asst news editor, real estate columnist
- ao483 Mark Richardson Reporter
- ap171 Karen Murphy-Mackenzie Copy staff
- ao450 Bernard Potvin Copy staff
- ap764 Massey Padgham Foreign editor
- aq148 Carolyn Abraham Police reporter
- aq438 Shelley Page Science reporter
- Rick Laiken, 71277.3651@compuserve.com Assistant managing editor
- (OCRINET contact, newsroom
- computer systems specialist
- & libel expert)
-
-
- What follows are new entries and corrections for the Media List, which is
- a listing of newspapers, radio stations, etc. that accept electronic
- submissions. This is NOT the complete list. You can obtain the entire
- list via ftp at ftp.std.com as customers/periodicals/Middlesex-
- News/medialist. If you'd rather receive the list and updates automatically
- via e-mail, write to
-
- majordomo@world.std.com
-
- Leave the "subject:" line blank. As your message, write:
-
- subscribe medialist
-
- To leave the list, write to majordomo@world.std.com with a message of
-
- unsubscribe medialist
-
-
- NOTES ON USING THIS LIST: If you want a publication to print your letter,
- include your postal address and phone number for verification purposes.
- Also, please consider NOT using this list to send a mass mailing to every
- single listed media outlet. A bicycling magazine is unlikely to be
- interested in your thoughts on abortion, no matter how cogent they are,
- for example.
-
- My thanks again to all who have contributed! Comments and suggestions --
- and especially addresses of unlisted media organizations -- are most
- welcome. Please send them to adamg@world.std.com (please note the 'g' in
- adamg; adam@world.std.com is a very nice person who has been graciously
- forwarding mis-addressed e-mail, but he is not me).
-
- NEWSFLASH: The New York Times is planning a formal Internet connection,
- we read on the CARR-L mailing list, sometime this summer or early fall.
- Once in place, the domain will be nytimes.com. CARR-L is a list for
- talking about the use of computers in newsrooms and journalistic research.
- To subscribe, send e-mail to listserv@ulkyvm.bitnet. Leave the "subject:"
- line blank, and as your message, write: subscribe carr-l Your Name
- (substituting, of course, your name).
-
- NOTE: Listings marked with an asterisk are corrections.
-
- DAILY NEWSPAPERS
-
- The Baltimore Sun
- To reach reporters or comment
- on the paper (NO letters to the
- editor or subscription requests) baltsun@clark.net
- The Columbus (Ohio) Dispatch crow@cd.columbus.oh.us
- Letters to the editor letters@cd.columbus.oh.us
- Jerusalem (Israel) Post jpost@zeus.datasrv.co.il
- The Olympian, Olympia, Wash. olympian@halcyon.com
-
- WEEKLY NEWSPAPERS
-
- City Sun, New York, N.Y.
- Computer column sysop@f618.n278.z1.fidonet.org
-
- COLLEGE NEWSPAPERS
-
- The Muse, Memorial Univ., Newfoundland muse@morgan.ucs.mun.ca
- The Tech, MIT, Cambridge, Mass.
- Advertising ads@the-tech.mit.edu
- Arts arts@the-tech.mit.edu
- News news@the-tech.mit.edu
- Sports sports@the-tech.mit.edu
- Archive management archive@the-tech.mit.edu
- Circulation and subscriptions circ@the-tech.mit.edu
- Free calendar listings news-notes@the-tech.mit.edu
- General questions general@the-tech.mit.edu
- Letters to the editor letters@the-tech.mit.edu
- Photography department photo@the-tech.mit.edu
-
- MAGAZINES
-
- *American Journalism Review
- Letters to the editors/queries
- (NO press releases) editor@ajr.umd.edu
- Electric Shock Treatment, U.K.
- (innovative and experimental music) bd1@mm-croy.mottmac.co.uk
- *Inside Media mediaseven@aol.com
- Interrace Magazine, Atlanta 73424.1014@compuserve.com
-
- NEWS/MEDIA SERVICES AND PRESS ASSOCIATIONS
-
- Conus Washington/TV Direct conus-dc@clark.net
-
- RADIO AND TELEVISION NETWORKS
-
- CNN Global News cnnglobal@aol.com
- * NBC, "Dateline" dateline@news.nbc.com
-
- RADIO AND TELEVISION STATIONS
-
- KXTV-TV, Sacramento, Calif. kxtv@netcom.com
-
- COMPUTER PUBLICATIONS
-
- *Network Computing editor@nwc.com
- *Personal Computer World editorial@pcw.ccmail.compuserve.com
- 3W Magazine: The Internet with a
- Human Face 3W@ukartnet.demon.co.uk
- Windows Computer Shareware 5648326@mcimail.com
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
- IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
- YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
- PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- A TeleStrategies Event co-chaired by the
- Commercial Internet eXchange (CIX)
-
- TeleStrategies' Internet Conference and Expo '94
- Monday October 10 - Wednesday October 12
- Sheraton Crystal City, Arlington VA
-
- Conference Track (Tue October 11 - Wed October 12):Publishing, Marketing
- and Advertising on the Internet
-
- Pre-Conference Tutorial (Mon October 10): Understanding Internet
-
- Technologies For Non-Engineers And Strategic Planners
-
- Demonstration Track (Mon October 10 - Wed October 12):Online Demonstrations
- Of Internet Services, Products And Access Technologies
-
- Workshop Track (Tue October 11 - Wed October 12):How To Do Business On The
- Internet
-
- Exhibitions (Mon October 10 - Wed October 12)
-
- CONFERENCE TRACK - Tuesday, October 11, 1994
- Publishing , Marketing and Advertising on the Internet
-
- 8:00-9:00 Registration
-
- 9:00-10:00 - INTERNET: THE OUTLOOK FOR
- COMMERCIALIZATION AND GROWTH
-
- John Curran, Product Manager, BBN Technology Services
- Bill Washburn, Executive Director, Commercial Internet Exchange (CIX)
-
- 10:00-10:15 Coffee Break
-
- 10:15-12:00 - NEWSPAPER AND BOOK PUBLISHING ON
- THE INTERNET
- Jeff Crigler, Director, Market Development, Network Advanced Services
- Division, IBM
-
- Laura Fillmore, President, Online Bookstore
- William S. Johnson, Publisher, Palo Alto Weekly
-
- 12:00-2:00 Hosted Lunch and Exhibits
-
- 2:00-2:45 - INTERNET USERS: WHO ARE THEY?
- Magdalena Yesil, Partner, Management Forum
-
- 2:45-3:15 - INTERNET BILLING
- Gary Desler, Senior Vice President, Network Solutions
-
- 3:15-3:30 Coffee Break
-
- 3:30-5:30 - CREATING BUSINESS MODELS FOR THE INTERNET
- Gordon Cook, President, Cook Network Consultants
- Chris Locke, President, MecklerWeb Corporation
- Cathy Medich, Executive Director, CommerceNet
- Robert Raisch, President, The Internet Company
-
- 5:30-6:30 Reception and Exhibits
-
-
- CONFERENCE TRACK - Wednesday, October 12, 1994
- Publishing , Marketing and Advertising on the Internet
-
- 8:30-10:00 - HOW TO MARKET AND ADVERTISE EFFECTIVELY
- Andrew Frank, Director, Software Development, Ogilvy & Mather Direct
- Erica Gruen, Senior Vice President, Television, Information
- and New Media, Saatchi & Saatchi Advertising Worldwide
- Judith Axler Turner, a head of the working group on advertising for the
- Coalition for Networked Information
-
- 10:00-10:30 Coffee Break and Exhibits
-
- 10:30-12:00 - COPYRIGHT AND LICENSING ISSUES
- Kathlene Krag, Assistant Director, Copyright and New Technology Association
- of American Publishers, Inc.
-
- Steve Metalitz, Vice President and General Counsel Information
- Industry Association
- Martha Whittaker, General Manager, The UnCover Company
-
- 12:00-12:30 - VIDEO VIA THE INTERNET
- Ed Moura, Vice President, Marketing and Sales Hybrid Networks, Inc.
-
- 12:30-2:00 Hosted Lunch and Exhibits
-
- 2:00-3:30 - INFORMATION SERVICES AND THE INTERNET
- Brad Templeton, President, ClariNet Communications
- Richard Vancil, Vice President, Marketing, INDIVIDUAL, Inc.
- Representative, America Online
-
- 3:30-3:45 Coffee Break
-
- 3:45-5:00 - INTERNET PUBLISHING AND MARKETING TOOLS
- Bruce Caslow, Systems Engineer, Mesa Technologies
- John Kolman, Vice President, NOTIS Systems, Inc.
- Kevin Oliveau, Engineer, WAIS, Inc.
-
- Pre-Conference Tutorial
- UNDERSTANDING INTERNET TECHNOLOGIES
- FOR NON-ENGINEERS AND STRATEGIC PLANNERS
- Monday, October 10, 1994 - 9:00 a.m. to 5:00 p.m.
-
- Presented By: John Curran, BBN Technology Services;
- Bruce Antleman, Information Express;
- Bruce Caslow, Mesa Technologies; and Stephen Crocker,
- Trusted Information Systems, Inc.
-
- This one-day tutorial is for the non-engineer, strategic planner,
- entrepreneur or anyone who has to understand the Internet in order to make
- business decisions about emerging commercial opportunities. This tutorial
- covers not only Internet technologies, economics and leading-edge
- opportunities, but also looks at operational issues such as security,
- addressing and network management from a business development perspective.
-
- 1. INTERNET OVERVIEW: What is the Internet? Who controls it? How do you get
- connected? What can you do with it? Who pays for it? Who are the players
- domestically and internationally? What is the role of the NII and NREN? Why
- are the RBOCs, cable TV companies, IXCs and PDA vendors interested in
- Internet? Why all the attention to commercialization? How is the Internet
- likely to evolve over the next few years?
-
- 2. INTERNET ACCESS, NAVIGATION AND APPLICATIONS:
- How to find, share and sell information on the Internet. The basic
- application tools and navigation/search systems (FTP, Telnet, Archie, Gopher,
- Mosaic, World Wide Web, WAIS, etc.). Access service providers (CIX, PSI,
- Sprint and others). Access options (dial-up, dedicated, frame relay, cable
- TV and wireless).New entrepreneurial developments.
-
- 3. INTERNET TECHNOLOGIES: Role of TCP/IP. MAC vs. PC products. LAN access
- (SLIP, PPP, frame relay, etc.) and WAN and ATM developments. IPX, DECNET and
- APPLETALK. Leading edge vendors and where their products are headed. IP
- addressing. How to obtain addresses (Class A,B,and C). CIDR, Internet DNS and
- how to register. Setting up an E-mail server, bulletin board and directory
- service.
-
- 4. INTERNET SECURITY AND MANAGEMENT: Security concerns, policies and
- procedures. Defeating password sniffing. Firewalls and available firewall
- toolkits. Encryption, authentication and Clipper Chip issues. Other
- operational concerns related to doing business on the Internet. Guidelines
- for managing a commercial Internet service. SNMP management tools and
- products.
-
- WORKSHOP TRACK - Tuesday, October 11, 1994
- HOW TO DO BUSINESS ON THE INTERNET
-
- 9:00-10:15 - GETTING CONNECTED TO THE INTERNET
- Howard McQueen, President, CD Consultants
-
- 10:15-10:45 Coffee Break
-
- 10:45-12:00 - CREATING A BUSINESS PRESENCE ON THE INTERNET
- Duffy Mazan, Partner, Electric Press, Inc.
-
- 12:00-2:00 Lunch and Exhibits
-
- 2:00-3:15 - MOSAIC
- Bruce Caslow, Systems Engineer, Mesa Technologies
-
- 3:15-3:30 Break
-
- 3:30-5:00 - BUSINESS USES OF THE INTERNET
- Al Dhir, President, Internet Access Group, Inc.
-
- 5:00-6:30 Reception and Exhibits
-
-
- WORKSHOP TRACK - Wednesday, October 12, 1994
- HOW TO DO BUSINESS ON THE INTERNET
-
- 9:00-10:15 - SECURITY: SINGLE SIGN ON
- Tom McHale, Director of Marketing and Product Development for North America,
- ICL, Inc.
-
- 10:15-10:45 Coffee Break
-
- 10:45-12:00 - CORPORATE AND BUSINESS TRAINING OVER THE INTERNET
- Speaker to be announced
-
- 12:00-2:00 Lunch and Exhibits
-
- 2:00-3:15 - NETIQUETTE: HOW TO DO BUSINESS ON THE INTERNET WITHOUT GETTING
- "FLAMED" Paul Kainen, President, Kainen Technology Services
-
- ONLINE INTERNET DEMONSTRATION TRACK
- Monday, October 10, 1994
-
- 2:00-5:00 p.m.
- Track A: DEMYSTIFYING THE INTERNET
- Paul Kainen, President, Kainen Technology Services
-
- Track B: DEMONSTRATIONS BY WAIS, Inc. and Performance Systems International
-
- 5:00-6:30 Reception and Exhibits
-
- ONLINE INTERNET DEMONSTRATION TRACK
- Tuesday, October 11, 1994
-
- 9:00 a.m.-12:00 p.m.
- Track A: DEMYSTIFYING THE INTERNET
- Bruce Caslow, Systems Engineer, Mesa Technologies
-
- Track B: DEMONSTRATIONS BY:Semaphore Communications - Internet security
- products - CD Consultants
-
- 12:00-2:00 Lunch and Exhibits
-
- 2:00-5:00
- Track A: DEMONSTRATIONS BY Spry, Inc. "Internet in a Box" Online Bookstore
-
- Track B: DEMONSTRATIONS BY MecklerWeb
- Corporation and "Palo Alto Weekly," the first general circulation newspaper
- on the Internet
-
- 5:00-6:30 Reception and Exhibits
-
- ONLINE INTERNET DEMONSTRATION TRACK
- Wednesday, October 12, 1994
-
- 9:00-12:00
- Track A: DEMONSTRATIONS BY America Online - demo of their current
- information services and NOTIS Systems, Inc. - demo of new, easy-to-use
- publishing tool for the Internet
-
- Track B: DEMONSTRATION BY Hybrid Networks, Inc. and Mesa Technologies -
- MOSAIC at 56 KBPS
-
- 12:00-2:00 Lunch and Exhibits
-
- 2:00-3:15
- Track A: DEMONSTRATION BY LEGI-SLATE
-
- Track B: DEMONSTRATION BY Gestalt Systems, Inc.
-
- CURRENT ONLINE DEMONTRATIONS
- Monday, October 10 - Wednesday, October 12
-
- Current Demonstrations Conducted By: WAIS, Inc., SemaphoreCommunications,
- CD Consultants, Spry, Inc., Online Bookstore,MecklerWeb Corporation,
- "Palo Alto Weekly," America Online, NOTIS Systems, Inc., Hybrid Networks,
- Inc., Mesa Technologies,Legi-Slate, Performance Systems International
- and Gestalt Systems, Inc.
-
- EXHIBIT HOURS
- Monday, October 10 - 5:00-6:30 p.m.
- Tuesday, October 11 - 12:00-6:30 p.m.
- Wednesday, October 12 - 10:00-2:00 p.m.
-
- For more information about exhibiting, call Jackie McGuigan at (703)
- 734-7050. For more information or registration call (703) 734-7050.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- SCREAM OF CONSCIOUSNESS
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- =-=-=-=-=Copyright 1993,4 Wired Ventures, Ltd. All Rights Reserved-=-=-=-=
- -=-=For complete copyright information, please see the end of this file=-=-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- WIRED 1.1
- Scream of Consciousness
- ***********************
-
- Paglia: Brash, Self-Promoting and Possibly the next Marshall McLuhan
-
- Interviewed by Stewart Brand
-
- (Editor's note - Paglia's faxed corrections of this article became a
- critical part of the design and layout. Hence, it has lost much that
- cannot be conveyed in ASCII over the electronic BBS's or the Internet. We
- strongly suggest you refer to the original in the magazine itself for the
- complete context).
-
- Camille Paglia, bad girl of feminism, has a knack for outraging listeners
- one moment, and then having them nod their heads in agreement the next. In
- rapid-fire broadcast mode, Paglia jumps from Aristotle to Madonna, soap
- opera to cathedral, all in one sentence. A tape recorder has trouble
- picking out her cascading words (Paglia faxed the accompanying text
- corrections to WIRED's offices late one Saturday night) and makes
- absolutely no progress in capturing her total body animation as she acts
- out each phrase. A media creature through and through, Paglia has been
- cavorting in the limelight of network TV and sold-out lectures ever since
- her 1991 book, Sexual Personae (the first of two volumes), poked the eye
- of both conservatives and liberals. Intrigued by Paglia's intellectual
- resemblance to Marshall McLuhan - patron saint of WIRED magazine - Stewart
- Brand, the author of the Media Lab, caught up with Paglia in the court of
- a San Francisco hotel.
-
- BRAND: Have you mapped your success against Marshall McLuhan's? Remember
- how that happened? Here was a guy, like you he was on the fringe of
- academia, Catholic oriented, basically a literary creature. He starts
- holding forth in a epigrammatic way about culture and media, and suddenly
- AT&T and everybody else wants to talk to him. Paglia comes along, does
- what you've done...
-
- PAGLIA: ...Influenced by McLuhan. Neil Postman, who I had the Harper's
- magazine discussion with, said something that was very moving to me. He
- said at the end of that evening, "I was a student of Marshall McLuhan and
- I have never been with someone who reminded me more of McLuhan. When you
- were sitting with McLuhan in the middle of the night, all you would see
- was the tip of his cigar glowing, and you would hear him making these huge
- juxtapositions. Even his writing never captured the way McLuhan's mind
- worked. Your mind works exactly the same, the way you bring things
- together and they ssssizzle when you bring them together."
-
- BRAND: So you read McLuhan in college.
-
- PAGLIA: McLuhan was assigned in my classes. Everyone had a copy of his
- books. There were so many things that were happening at that moment -
- McLuhan, Norman O. Brown, Leslie Fiedler, Allen Ginsberg. There was
- enormous promise of something that was going to just blast everything open
- in cultural criticism. What the heck happened? It wasn't just a
- conservative administration in the '70s and '80s. That's not it. It was a
- failure on the part of the '60s generation itself. You feel it a little
- bit in "Blow Up," or just like reading about Jimi Hendrix and the way the
- women looked, the way the groupies looked - how fabulous the groupies
- were. They were so sexy and so ballsy! It was amazing how those '60s
- chicks talked. This was the real feminism. Even women got less powerful.
- We have had a general cultural collapse.
-
- BRAND: What did you make of McLuhan?
-
- PAGLIA: We all thought, "This is one of the great prophets of our time."
- What's happened to him? Why are these people reading Lacan or Foucault who
- have no awareness at all of mass media? Why would anyone go on about the
- school of Saussure? In none of that French crap is there any reference to
- media. Our culture is a pop culture. Americans are the ones who have to be
- interpreting the pop culture reality.
-
- When I was in England earlier this summer for the release of the Penguin
- paperback of Sexual Personae, I was having fits because of no TV there. I
- felt like I was in prison. Then I got to Amsterdam, and Amsterdam was
- better because they had everything on satellite. That was interesting in a
- kind of sociological way. They have German TV and Italian TV and French
- TV, but it is still not equivalent to what we have. What we have is total
- domination by the pop culture matrix, by the mass media matrix. That's the
- future of the world.
-
- BRAND: Is pop culture and mass media the same thing?
-
- PAGLIA: For me, yes. I teach a course called "Mass Media." I think that it
- should be required for every liberal arts graduate - the whole history of
- mass media, traced from the 1830s newspapers all the way to today.
-
- BRAND: Between Volume 1 and the forthcoming Volume 2 of Sexual Personae is
- the arrival of mass media. When you have mass media, is art different?
-
- PAGLIA: I call the 20th century "The Age of Hollywood." I believe that
- mass media and pop culture is the culture of the 20th century. There's a
- big break at World War II. The last great works of high art are with World
- War I. You have Picasso and T. S. Eliot, and I feel that modernism in
- literature exhausted itself in its first generation - Proust, Joyce,
- Wolfe; that was it. What else? That's why I have my provocative
- statements, such as for me the best novel after World War II is Auntie
- Mame. I mean that literally. The only writers of fiction interesting to me
- at all after World War II are decadent or comedic. These are to me the
- only modes that work literarily after World War II. So Genet and Tennessee
- Williams are major figures for me.
-
- My publisher is always trying to get me to read novels - Saul Bellow, A.S.
- Byatt. I say, "Why would I want to read a serious novel?" Because a
- serious novel today is already too reactionary, by trying to reinterpret
- contemporary reality in verbal terms, making a verbal structure - no, no,
- no. To me, the rhythms of our thinking in the pop culture world, the
- domination by image, the whole way the images are put together, and so on
- are way beyond the novel at this point. If a novelist does emerge now who
- is a product of pop culture and mass media, it's going to look quite
- different on the page. It won't necessarily look fragmented. I don't
- believe in that post-modernist thing of cutting things up. But the rhythms
- of it are going to be fast rhythms, and it's going to be surreal, flashing.
-
- In my famous encounter with Susan Sontag in 1973, I had a bitter
- disappointment when I invited her to Bennington and we tried to talk, and
- I couldn't talk to her. I had felt like "Finally, a woman on my level,"
- and her mind seemed so sloooow. It took me ten years before I realized
- what it was. She was born before World War II. There's no way her brain is
- like my brain. I suddenly realized, half my brain is different. I mean,
- half my brain is the traditional Apollonian logo-centric side which was
- trained by the rigorous public schools of that period, but the other half
- is completely an electrified brain. Essentially, what I'm doing is what
- all the '60s was doing, which was exploring the way that brain works. I
- have been exploring both sides of the brain in my work. But we need both.
- Not having both I think is a disaster for the young today because I have
- them in my classes.
-
- BRAND: You agree with Neil Postman's Amusing Ourselves to Death on this?
-
- PAGLIA: I agree with Neil Postman that we need both. We cannot have one,
- or one over the other. These young kids, they're lost.
-
- BRAND: If somebody's got both sides of their brain electric, what happens?
-
- PAGLIA: I think that they become hysterical. They become very susceptible
- to someone's ideology. The longing for something structured, something
- that gives them a world view, is so intense that whatever comes along,
- whether it's fascism or feminist ideology (which to me are inseparable),
- they'll glom onto it and they can't critique it. You see the inability of
- the young to critique this can of worms that feminism gives them -
- "patriarchy" and all this stuff - the inability to think through issues
- like date rape. I was screamed at by girls at Brown about date rape. Later
- I encountered them by chance on the streets of Philadelphia - they
- happened to be touring the country registering voters this summer - and I
- said ask me some questions. These girls were juniors at Brown and their
- minds couldn't even focus long enough for a reply. (Paglia mimics
- fluttering inarticulate interruptions.)
-
- They didn't have the base of education that I did, the rigorous public
- school education. The consequence is my mind can play in the realm of the
- mass media and that's my creativity as a person, the solid, rigorous
- building of the Apollonian skills on one side of the brain, and then the
- free play. To me, this is the great model of the human mind. It's
- incredible to go back and forth between those two things. This is why I
- don't need anybody in my life, because I have so much in my brain playing
- with each other. It's fantastic.
-
- When I was in England early in the summer, I was interviewed by some
- Cambridge women and had an incredible intellectual conversation. They were
- full of knowledge and insight. There's no TV whatever in Cambridge.
-
- BRAND: So all they do is Neil Postman's long cool argument.
-
- PAGLIA: Well, no. Actually, drinking a lot is what they seem to be doing.
- I think it must be that their extreme, extreme development of words is so
- exhausting. The amount that the educated class is drinking there, I
- couldn't believe it. I saw the public drunkenness in Cambridge of
- university men, staggering drunkenness, and I thought, that's what they
- have instead of pop culture: alcohol.
-
- The minute I hit London I realized no one looks at each other. I asked
- people there, "How does anyone pick up anyone, how do you ever meet
- anyone?" I was told, "The men never look at you. They respect your
- privacy." Well, OK. I was near the British Museum and we were going to a
- lecture; I needed something to eat, and walked into a pub at 4 o'clock. It
- was respectable - intellectuals and so on. The drunkenness! You could feel
- the sex was in there, in the pubs and the drinking. We've got the sex in
- our popular culture, and the feminists hate it - "sex and violence!" - but
- I think ours is far healthier.
-
- This is a very healthy culture as long as we keep up the rigorous
- training. The kids' true culture is pop culture - they already live in
- that - so that's why I oppose all this use of TV in school. I want
- education movie-based, in the way that we had in college. From the moment
- I arrived in college in 1964 we were immersed in films. I saw something
- like 800 films. The true multiculturism is foreign films, foreign films
- with subtitles, so you hear the language. That's the way to teach sex, the
- way to talk about male/female sex roles: movies. The way to teach what
- Lacan or Foucault claim to be doing - the relativity of a memory - is
- "Last Year in Marienbad." Did they meet at Marienbad or not? The
- inflections of emotion on people's faces, interrelations of subtleties, of
- non verbal subtleties of interpersonal sexual relations, are shown by
- cinema. Date-rape feminists want to insist, "No always means no." You'd
- never believe that if you were seeing cinema.
-
- When I think about it, these were mint-condition films. I realize what an
- incredible gift I had. It was a magic moment. There had been the art
- houses in the '50s in the urban centers and suddenly my generation had
- film on the college campuses in the '60s. We were seeing films - Fellini,
- Antonioni - that were five years old. We saw prints in mint condition. No
- one anywhere has that now. The quality of the prints has degenerated, and
- the films are being shown as videos. The way you develop the eye is to see
- great photography, the great high-contrast black-and-white in those films.
-
- Here's my proposal. A proper job for funding of the arts is to underwrite
- a national consortium of archives of all the classic films. They are too
- expensive to maintain at individual colleges and universities. What I
- envision is, when you go to any college of four years, by your fourth
- year, by rotation, a superb print of every classic film will have been
- shown. We happen to have a very bad print of "Persona" at my school. I
- have to tell the class, "Remember that scene where Bibi Andersson is
- standing, wearing a black dress against a white wall? I have to describe
- to you what Sven Nykvist photography really looked like there. It's a
- blazing white, very rock textured stucco, deep textured. The glossy sun
- glints in her blond hair..."
-
- This is ridiculous. Classic films are major works of art, and this is
- where the funding should go.
-
- BRAND: Film had that depth and that quality. Would you also have a
- television course offered?
-
- PAGLIA: Well, a course in mass media to introduce the student to a history
- of the technologies, the way network news is put together, how different
- our advertisements are from those in Europe, and so on.
-
- BRAND: What about content? You watch soap operas, right? Which ones?
-
- PAGLIA: "The Young and the Restless" is my favorite. For 17 years I've
- been watching that. "As the World Turns" is my second favorite. I have the
- TV on with the sound off most of the day. Not early in the morning because
- at that point I'm still dreaming. I'm waking up and I want to remember my
- dreams, so I don't want too many images at that point. By mid-morning it
- is on, on for the rest of the day until 1. I've been poor up to now, and
- my dream is to have someday a bank of TVs, where all the different
- channels could be on and I could be monitoring them. I would love that.
- The more the better. I love the tabloid stuff. The trashier the program
- is, the more I feel it's TV.
-
- BRAND: Why?
-
- PAGLIA: Because that's TV's mode. That's the Age of Hollywood. The idea of
- PBS - heavy-duty "Masterpiece Theater," Bill Moyers - I hate all that.
-
- BRAND: How about the ads?
-
- PAGLIA: I love ads. There's a section on ads in Volume 2 of Sexual
- Personae. Like Andy Warhol, I have been in love with ads since my earliest
- childhood. That is the way I think. One of the reasons that I probably got
- this famous is because I think and talk in ad terms, in sound-bite terms.
- People say, "She promotes herself." When I was young, I thought in
- newspaper headline terms: "Paglia Falls Off Chair." I feel totally a part
- of mass media. Everyone knows ads are the best part of television, but the
- way the ads work - it's also the way MTV videos work - it's just flash
- flash flash images, symbol symbol symbol. You know, the way that ads are
- structured is not unlike the way the Catholic Church was plastered with
- ads, essentially, for saint this, saint that. To me there was an absolute
- continuity between the Catholic Church and ads.
-
- See, this is where I drew up my theory that popular culture is the
- eruption of the varied pagan elements in Western culture - that
- Judeo-Christianity never did defeat paganism as history books claim, but
- rather it was driven underground. We've had three major eruptions of
- paganism. One at the Renaissance, and most people would accept that.
- Another was Romanticism, when the chthonic or daemonic element came up
- with all those vampires and the nature cult. And now the third great
- eruption is the 20th century Age of Hollywood. Gore Vidal agrees.
- Hollywood is the great thing that America has done and given to the world.
-
- BRAND: What happens to those eruptions after a while? Do they eventually
- self-defeat?
-
- PAGLIA: Well, no, because each one of the eruptions became part of the
- fabric of the future. The eruption of paganism at the Renaissance led
- eventually to the recovery of science, and science has been the greatest
- challenge to Judeo-Christianity. Many want to get rid of the church and
- say it is the biggest source of evil. I hate that talk. A proper society
- will strengthen all its institutions. I want to strengthen the church and
- to strengthen the sex industry. I think they play off each other. Both
- should fight with each other and be strengthened. There will always be a
- craving for religion, and if we don't get it from Catholicism, which is a
- very profound system, you're going to get it from feminist ideology.
-
- BRAND: Are you glad of the Latin Mass coming back?
-
- PAGLIA: Where is it coming back?
-
- BRAND: A few Catholic churches apparently are bringing back the Latin
- Mass, and the hierarchy stopped forbidding it. People like it; they like
- the mysticism.
-
- PAGLIA: I thought that was a tremendous loss when the church dispensed
- with all that ceremony and imagery and beauty...
-
- BRAND: ...Priests turning their backs on the congregation...
-
- PAGLIA: ...Turning their backs. The hierarchy of it, the hieraticism of
- it, that sense of the holy, the mystical, the awesome. What they've got
- now is more authentically like early Christianity. You have a bunch of
- peasants sitting together and holding hands. But what I love is what
- Martin Luther saw was bad, which was the whole pagan element of the
- Italian Catholic Church, the heir of the Roman Empire.
-
- BRAND: You say pop culture is the third wave of pagan and chthonic stuff.
- You say chthonic stuff is dangerous, and you ride on its danger. Is pop
- culture dangerous?
-
- PAGLIA: Well, if the culture becomes only that, I think it is, because
- it's filled with hallucinations. Of course that's what I love about it.
- It's surreal. But there are practical realities in everyday life that have
- to be solved - the procedures of corporate life, of academic life, all of
- the boring things that have to be done in a systematic manner, and we have
- be taught those systems. The Apollonian systems also are a heritage of the
- Greco-Roman period. The Apollonian part of the brain is absolutely
- necessary for us to exist as rational citizens. The problem with the New
- Age stuff is it's like all up here, you know (gesturing vaguely aloft). As
- for the channelers, my acting students could do better accents. Credulity
- is a product of lack of rigorous education.
-
- Here's what I'm saying in my work. You need to pay homage to both Apollo
- and Dionysus. Both are great gods. Both must be honored. We need a balance
- between the two. That's all.
-
- * * *
-
- =-=-=-=-=-=-=-=-=-=-=-=WIRED Online Copyright Notice=-=-=-=-=-=-=-=-=-=-=-=
-
- Copyright 1993,4 Wired Ventures, Ltd. All rights reserved.
-
- This article may be redistributed provided that the article and this
- notice remain intact. This article may not under any circumstances
- be resold or redistributed for compensation of any kind without prior
- written permission from Wired Ventures, Ltd.
-
- If you have any questions about these terms, or would like information
- about licensing materials from WIRED Online, please contact us via
- telephone (+1 (415) 904 0660) or email (info@wired.com).
-
- WIRED and WIRED Online are trademarks of Wired Ventures, Ltd.
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- DIGITAL CASH MINI-FAQ FOR THE LAYMAN
-
- By Jim Miller (Jim-Miller@suite.com)
-
- [If you're on the cypherpunks mailing list, you've already seen this.]
-
- Here's a description of digital cash that I recently wrote up. I've
- intentionally generalized and oversimplified the descriptions to keep from
- getting bogged down in the details, but I feel the information is
- accurate.
-
- Q: How is digital cash possible?
- A: Public-key cryptography and digital signatures (both blind and
- non-blind signatures) make digital cash possible. It would take too long
- to go into detail how public-key cryptography and digital signatures work.
- But the basic gist is that banks and customers would have public-key
- encryption keys. Public-key encryption keys come in pairs. A private key
- known only to the owner, and a public key, made available to everyone.
- Whatever the private key encrypts, the public key can decrypt, and vice
- verse. Banks and customers use their keys to encrypt (for security) and
- sign (for identification) blocks of digital data that represent money
- orders. A bank "signs" money orders using its private key and customers
- and merchants verify the signed money orders using the bank's widely
- published public key. Customers sign deposits and withdraws using their
- private key and the bank uses the customer's public key to verify the
- signed withdraws and deposits.
-
- Q: Are there different kinds of digital cash?
- A: Yes. In general, there are two distinct types of digital cash:
- identified digital cash and anonymous digital cash. Identified digital
- cash contains information revealing the identity of the person who
- originally withdrew the money from the bank. Also, in much the same
- manner as credit cards, identified digital cash enables the bank to track
- the money as it moves through the economy. Anonymous digital cash works
- just like real paper cash. Once anonymous digital cash is withdrawn from
- an account, it can be spent or given away without leaving a transaction
- trail. You create anonymous digital cash by using numbered bank accounts
- and blind signatures rather than fully identified accounts and non-blind
- signatures.
-
- [To better understand blind signatures and their use with digital cash, I
- highly recommend skimming through chapters 1 - 6 of Bruce Schneier's book
- _Applied Cryptography_ (available at your favorite technical book store).
- Bruce does a very good job of describing the wide variety of interesting
- things you can do when you combine computers, networks, and cryptography.
- The first half-dozen chapters are quite readable, even to the layman. He
- doesn't get into the heavy-duty math until later in the book.]
-
- There are two varieties of each type of digital cash: online digital cash
- and offline digital cash. Online means you need to interact with a bank
- (via modem or network) to conduct a transaction with a third party.
- Offline means you can conduct a transaction without having to directly
- involve a bank. Offline anonymous digital cash is the most complex form
- of digital cash because of the double-spending problem.
-
- Q: What is the double-spending problem?
- A: Since digital cash is just a bunch of bits, a piece of digital cash is
- very easy to duplicate. Since the copy is indistinguishable from the
- original you might think that counterfeiting would be impossible to
- detect. A trivial digital cash system would allow me to copy of a piece
- of digital cash and spend both copies. I could become a millionaire in a
- matter of a few minutes. Obviously, real digital cash systems must be
- able to prevent or detect double spending.
-
- Online digital cash systems prevent double spending by requiring merchants
- to contact the bank's computer with every sale. The bank computer
- maintains a database of all the spent pieces of digital cash and can
- easily indicate to the merchant if a given piece of digital cash is still
- spendable. If the bank computer says the digital cash has already been
- spent, the merchant refuses the sale. This is very similar to the way
- merchants currently verify credit cards at the point of sale.
-
- Offline digital cash systems detect double spending in a couple of
- different ways. One way is to create a special smart card containing a
- tamper-proof chip called an "Observer" (in some systems). The Observer
- chip keeps a mini database of all the pieces of digital cash spent by that
- smart card. If the owner of the smart card attempts to copy some digital
- cash and spend it twice, the imbedded Observer chip would detect the
- attempt and would not allow the transaction. Since the Observer chip is
- tamper-proof, the owner cannot erase the mini-database without permanently
- damaging the smart card.
-
- The other way offline digital cash systems handle double spending is to
- structure the digital cash and cryptographic protocols so the identity of
- the double spender is known by the time the piece of digital cash makes it
- way back to the bank. If users of the offline digital cash know they will
- get caught, the incidents of double spending will be minimized (in
- theory). The advantage of these kinds of offline systems is that they
- don't require special tamper-proof chips. The entire system can be
- written in software and can run on ordinary PCs or cheap smart cards.
-
- It is easy to construct this kind of offline system for identified digital
- cash. Identified offline digital cash systems can accumulate the complete
- path the digital cash made through the economy. The identified digital
- cash "grows" each time it is spent. The particulars of each transaction
- are appended to the piece of digital cash and travel with it as it moves
- from person to person, merchant to vender. When the cash is finally
- deposited, the bank checks its database to see if the piece of digital
- cash was double spent. If the digital cash was copied and spent more than
- once, it will eventually appear twice in the "spent" database. The bank
- uses the transaction trails to identify the double spender.
-
- Offline anonymous digital cash (sans Observer chip) also grows with each
- transaction, but the information that is accumulated is of a different
- nature. The result is the same however. When the anonymous digital cash
- reaches the bank, the bank will be able to examine it's database and
- determine if the digital cash was double spent. The information
- accumulated along the way will identify the double spender.
-
- The big difference between offline anonymous digital cash and offline
- identified digital cash is that the information accumulated with anonymous
- digital cash will only reveal the identity of the spender if the cash is
- double spent. If the anonymous digital cash is not double spent, the bank
- can not determine the identity of the original spender nor can it
- reconstruct the path the cash took through the economy.
-
- With identified digital cash, both offline or online, the bank can always
- reconstruct the path the cash took through the economy. The bank will
- know what everyone bought, where they bought it, when they bought it, and
- how much they paid. And what the bank knows, the IRS knows.
-
- By the way, did you declare that $20 bill your Grandmother gave you for
- your birthday? You didn't? Well, you wont have to worry about forgetting
- those sorts of things when everybody is using fully identified digital
- cash. As a matter of fact, you wont even have to worry about filing a tax
- return. The IRS will just send you a bill.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- PATENT SEARCHING EMAIL SERVER is now open for business
-
- By Gregory Aharonian (srctran@world.std.com)
-
-
- APS PATENT SEARCHING ARRIVES ON THE INTERNET!!!!!!!!!!!!!!!!
- (well only in a real limited way for the time being :-)
-
- A few weeks ago, I announced plans to provide limited patent searching
- over the Internet, where you can get a list of patents by specifying the
- class/subclass.
-
- I have decided to do this in two stages. To test out the email-server
- software I am writing, I first plan to allow email requests to retreive parts
- of the PTO classification manuals (see below). Once things are running
- smoothly, I will then add the capability to retrieve patent titles by
- class/subclass.
-
- So feel free to start sending in requests to the address listed below:
-
- search@world.std.com
-
- wish me luck, and start thinking philanthropic. By the way, if someone has a
- machine readable version of the WIPO international classification system,
- please send it to me so I can add it to the server. At some point when I
- have lots of equipment, I will sort US patents by their international
- classification.
-
- Greg Aharonian
- Internet Patent News Service
-
- ====================
-
- Internet Patent News Service
- September 1994
-
- PATENT TITLES EMAIL SERVER
- search@world.std.com
-
- The Internet Patent News Service is pleased to announced the availability
- of the Patent Titles email server, where people can retrieve lists of patent
- titles dating back to 1970 for any USPTO class/subclass, and patent numbers
- for additional patents dating back to the 1800's. The Patent Titles email
- server is the first step in our efforts to make the entire USPTO APS patent
- text database system accessible over the Internet.
-
- Approximately one gigabyte of data has been prepared and attached to the
- Internet. As all of the equipment and network access is borrowed, I am
- limiting access to an email server until I get a better feel for demand for
- the data, and until I can raise funding to set up a proper Internet server.
-
- Unless the bandwidth and processing load overwhelms the equipment I am
- borrowing, the service will be free.
-
- To use the email server, send requests to the Internet address:
-
- search@world.std.com
-
- using any of the following commands sent as text in the body of the email
- message:
-
- SENDTO account-name@internet.site.adr
-
- This command is mandatory of all requests and is where you specify the email
- address you want the information sent to. Occasionally From: lines in email
- addresses do not provide a correct return address (at least in my experience
- doing the Internet Patent News Service).
-
- SEND INTRO
- SEND HELP
-
- Either of these commands will return this message.
-
- SEND UCLASSES
-
- This command will return an index to the approximately 400 patent classes
- that are currently being used, for example:
- Class: 69 Leather Manufacturers
-
- SEND UCLASS XXX
-
- This command will return that section of the USPTO's Manual of Classification
- covering patent class XXX. For example, the command "SEND CLASS 69" would
- return a list of all of the subclasses in Class 69 by number and title.
- These files range in size from 5K to 120K. What follows is a section
- of Class 69:
-
- Subclass Subclass
- Number Title
- 1 MACHINES
- 1.5 .Belt-stretching
- 3 .Horse collar shaping
- 4 .Horse collar stuffing
-
- SEND UCLASS COMPUTING
-
- This command will return those sections of the USPTO's Manual of
- Classification covering patent classes 395 and 364, the two main classes
- dealing with hardware and software.
-
- SEND IPNSINFO
-
- This command will return an introductory message to my Internet Patent News
- Service.
-
- SEND CONSULT
-
- This command will return an introductory message to my patent searching
- consulting services I offer.
-
- SAVE COMMENT
-
- This command lets me know your request is actually a comment about the email
- server operation, or any inaccuracies you detect in the patent information
- being sent out.
-
- As I am parasiting the equipment to run the server (which basically means
- that I operate the server at nite and on weekends), please send your requests
- in at the end of the workday or on weekends. Within a day or so, you will
- receive back ny email whatever you requested.
-
- SECURITY
- A very important concern for anyone using this email server is secrecy,
- that what they are searching for is not revealed to others. As a potential
- inventor, I appreciate this as much as anyone else. While I plan to save the
- email addresses of people who use the server (but not their search request),
- no other information will be retained. The email address information will be
- saved to study who, and how often, people are using the server. I would
- appreciate any suggestions on how to ensure security beyond this.
-
- Please excuse any mishaps that occur as I get this service off the ground.
- This email server is a classic hack that will get better in time as people
- use it. In turn, the experience gathered in running the server will be
- invaluable in demonstrating the feasibility of making massive amounts of
- patent data available over the Internet.
-
- Also, get ready for that voluntary registration fee I mention in my intro
- piece to the Internet Patent News Service. If the Patent Titles email server
- is successful, and you all like it, this fall I plan to coordinate an effort
- to put all of the patent abstract information since 1970 onto the Internet,
- making it available through email servers, Gopher, WAIS and Mosaic. But first
- things first, getting the Patent Titles email server working.
-
- Greg Aharonian
- Internet Patent News Service
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Five "Hackers" Indicted for Credit Card/Computer Fraud
-
- From CuD Moderators <cudigest@mindvox.phantom.com>
- Computer Underground Digest
-
- (AP WIRE - Thurs, Sept. 8, 1994)
-
- NEW ORLEANS (AP) -- "Dr. Demonicus," "Renegade" and four other
- hackers used computers to steal credit card numbers and used them to
- buy $210,000 in gold coins and high-tech hardware, federal prosecutors
- said Wednesday (Sept 8, '94).
-
- The nine-count indictment unsealed Wednesday charged five men from
- Louisana and one from New York with conspiracy, computer fraud, access
- device fraud and wire fraud, U.S. Attorney Eddie Jordan Jr. said.
-
- Some fo their hacker nicknames were included. They were identified as
- Dwayne "Dr. Demonicus" Comeger, 22; Brian Ursin, 21; John Christopher
- "Renegade" Montegut, 24; Timothy "Revelation" Thompson, 21; James
- McGee, 25; and Raymone "Wiseguy" Savage, 25, of Richmond Hills, N.Y.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CLIPPER T-SHIRTS
-
- By Norman Harman (normh@crl.com)
-
- Information and opposition to the Clipper proposal is strong on the
- Internet. But it is far too unknown to the 'outside' community. Everyone
- concerned by this issue should inform all the people they know of its
- implications. One way to increase awareness and show your opinion is to
- wear it:).
-
- I would like to offer an anti Clipper/Skipjack T-shirt. They would be white
- with black printing and cost approximately $5.00 plus $2.90 shipping to US
- locations. That is the cost to produce one shirt. I am trying to spread
- awareness not make money.
-
- I need to know if people are interested in this idea and what should the
- shirts say?
-
- Two quick ideas are:
- "Skip Skipjack"
- or
- "Just Say No to Clipper"
-
- Please send comments, suggestions, and questions to normh@crl.com. If more
- than a few people are interested I will go ahead and have the shirts made
- and post how to get one.
-
- A worthy cause is better if it benefits another good cause so the shirts
- will be silk-screened by Zerolith, part of a non-profit organization that
- employs, shelters, and assists homeless youth. If you would like to talk
- with Zerolith or donate money directly here is how to contact them.
-
- Zerolith
- 3075 21st Street
- San Francisco, CA 94110-2626
- 415.641.1014 voice
- 415.641.1474 fax
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- CYBERNEWS DEBUTS
-
- By Patrick Grote (patrick.grote@supportu.com)
-
- *** PRESS RELEASE ***
-
- CyberNews
- 11221 Manchester Rd., Suite 313, St. Louis, MO 63122
- Contact: Patrick Grote, patrick.grote@supportu.com
- Phone: (314) 984-9691
- FAX: (314) 984-9981
-
- FOR IMMEDIATE RELEASE
-
- CyberNews, A Monthly Publication, Debuts With A Stunning
- Success for Readers/Advertisers
-
- St. Louis, MO, September 8 _ CyberNews, a new monthly electronic
- publication, debuted today featuring over 25 hard hitting, real world
- software reviews, a tell all interview with shareware king Scott Miller
- of Apogee Software, the people that brought the world Castle Wolfenstein
- and a feature by the leaders in the Work at Home field, Paul and Sarah
- Edwards.
-
- CyberNews is unique in electronic publications, commonly referred to
- as zines, due to the fact they are advertiser supported and 85% of the
- information is generated from everyday people. "Too many reviews today
- are done to please the advertiser. Heck, most of the traditional press
- basically reprint press releases. People need to know what
- software/hardware works and what problems may crop up. Unbiased reviews
- are what we strive for," detailed Patrick Grote, Publisher, Marketing.
-
- Available in three formats, CyberNews is readable by anyone. A
- Windows Help file format supports a color graphical excursion that
- anyone with Windows, Windows for Workgroups or WindowsNT can view. "We
- wanted to bring the electronic publication into a new era of color and
- production," notes Roger Klein, Publisher, Production.
-
- The ASCII version features the ability to be enjoyed by anyone with
- a PC, dumb terminal or device that has the ability to read standard
- ASCII text. According to Patrick Grote, Publisher, Marketing, "the goal
- was to make CyberNews as Internet friendly as possible. Since we use
- straight ASCII everyone who can access the Internet can read our
- publication."
-
- The ReadRoom format allows Sysops to add CyberNews to their BBS
- quickly without having to run a conversion program. "Sysops are the
- backbone of the information superhighway. They are engineer, designer,
- construction worker and user wrapped into one. We realized we can't
- ignore their needs," explained Publisher, Marketing, Patrick Grote.
-
- To grab latest issue of CyberNews, you can check these sources:
-
- Internet: wuarchive.wustl.edu:/pub/MSDOS_UPLOADS/zines
- polecat.law.indiana.edu:/pub/Incoming
- ftp.fonorola.net:/in.coming
-
- CompuServe: Work at Home (GO WORK in GENERAL LIBRARY), IBM APP
- (GO IBMAPP in ELECTRONIC PUBLICATIONS LIBRARY),
- Novell User (GO NOVUSER in NEW UPLOADS LIBRARY),
- International Trade Forum (GO TRADE in Section 1).
-
- FidoNet: You can freq the files 1:100/380:
- CYBER - All three versions
- CYBERR - The ReadRoom version.
- CYBERA - The ASCII version.
- CYBERW - The Windows version.
-
- Delphi: PCSIG
-
- America Online: Computing and Software
-
- Email: Send requests or questions to subscribe@supportu.com
-
- PG - Publisher, CyberNews, patrick.grote@supportu.com
- A Publication on the Leading Edge - 09/13/94
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- PC MAGAZINE DECARES THE PIPELINE BEST INTERNET SERVICE
-
- By James Gleick (gleick@pipeline.com)
-
- We at the Pipeline are very pleased to announce that the editors of PC
- Magazine, comparing all the major Internet service providers from America
- Online and Delphi down to the Pipeline, have declared that our young
- service is the best choice.
-
- We have a lot of room for improvement, we know, but coming in our first
- year, this is gratifying.
-
- "A true beauty queen," Robin Raskin, PC Magazine's editor, writes in the
- October 11 issue. "The Pipeline is an elegantly conceived program; we've
- seldom seen a Version 1.x program that's as well thought out. Watch as the
- Pipeline continues to grow; the Internet will be a better place because of
- this package."
-
- We hope so. Anyway, we'd like to take the opportunity to offer Internet
- users (or would-be Internet users) a free copy of our software, to try
- out in demo mode. It's available for Windows or Macintosh. Send your
- address to windisk@pipeline.com or macdisk@pipeline.com. For general
- information, you may send email to info@pipeline.com.
-
- James Gleick
- The Pipeline
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- SCOUT REPORT SUBSCRIPTIONS EXCEED 10,000 MARK
-
- From InterNIC Info Scout (scout@is.internic.net)
-
- To all InterNauts:
-
- Subscriptions for the Scout Report have exceeded 10,000!
-
- And 10,000 InterNauts can't be wrong!
-
- To celebrate this milestone, this week's Scout Report will be a double
- issue and include many resources you may have missed during the recent
- end-of-summer weeks. It's now Fall, so clean out those electronic
- closets and make room for some new 'Net resources ready for exploration!
- The September 16 issue will also include an expanded NetBytes section to
- accommodate a large number of recently released sources of information
- about using the Internet.
-
- If you haven't yet subscribed or told your friends and colleagues, now is
- the time. Spread the news by word-of-net. Below are instructions for
- subscribing or receiving a copy of this week's issue by email, gopher, and
- WWW.
-
- The Scout Report is a weekly publication provided by InterNIC Information
- Services to assist InterNauts in their ongoing quest to know what's new
- on and about the Internet. It focuses on those resources thought to be of
- interest to the InterNIC's primary audience, researchers and educators,
- however everyone is welcome to subscribe and there are no associated
- fees.
-
- The Scout Report is posted on the InterNIC InfoGuide's gopher and
- WorldWideWeb servers where you can easily follow links to the resources
- which interest you. Past issues are stored on the InfoGuide for quick
- reference, and you can search the InfoGuide contents to find the specific
- references you need. The Scout Report is also distributed in an HTML
- version for use on your own host, providing fast local access for yourself
- and other users at your site.
-
- Join thousands of your colleagues already using the Scout Report as a
- painless tool for tracking what's new on the 'Net!
-
- Best regards,
- InterNIC Info Scout
-
- Scout Report Contents
-
- Subject-oriented online resources are organized by access method:
-
- * WWW
- * Gopher
- * Email/FTP
-
- Resources and announcements related to the network are included in:
-
- * National Information Infrastructure
- * NetBytes
-
- Recreational resources for perusing after hours (of course) are listed
- here:
-
- * Weekend Scouting
-
- *** New section coming the week of September 23 -- a place for selected
- interesting services on the 'Net which are fee based, provided by
- commercial organizations, or best of all, offer virtual shopping:
-
- Commercial Services
-
-
-
- Scout Report Access Methods
- ------------------------------
-
- ** To receive the special double-issue of the Scout Report by email
- (gopher and WWW access methods are listed below) send mail after
- September 16 to:
-
- mailserv@is.internic.net
- and in the body of the message type:
- send /scout-report/9-16-94
-
- ** To receive the email version of the Scout Report automatically each
- weekend, subscribe to the scout-report mailing list which is used
- exclusively for one Scout Report message each week:
-
- send mail to:
-
- majordomo@is.internic.net
-
- in the body of the message, type:
-
- subscribe scout-report
-
- to unsubscribe to the list, repeat this procedure substituting the word
- "unsubscribe" for subscribe.
-
-
- ** To receive the Scout Report in HTML format for local posting,
- subscribe to the scout-report-html mailing list, used exclusively to
- distribute the Scout Report in HTML format once a week. Send mail to:
-
- majordomo@is.internic.net
-
- in the body of the message, type:
-
- subscribe scout-report-html
-
-
- ** To access the hypertext version of the Report, point your WWW client
- to:
-
- http://www.internic.net/infoguide.html
-
-
- >> Gopher users can tunnel to:
-
- is.internic.net
-
- select: Information Services/Scout Report.
-
-
-
-
- *----------------------------------------------------------------
- Copyright 1994 General Atomics.
-
- The InterNIC provides information about the Internet and the resources on
- the Internet to the US research and education community under the
- National Science Foundation Cooperative Agreement No. NCR-9218749. The
- Government has certain rights in this material.
-
- Any opinions, findings, and conclusions or recommendations expressed in
- this publication are those of the author(s) and do not necessarily
- reflect the views of the National Science Foundation, General Atomics,
- AT&T, or Network Solutions, Inc.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- IMPORTANT PROCLAMATION: THE FUTURE OF THE NET IS AT HAND!
-
- By James "Kibo" Parry (kibo@world.std.com)
-
- P R O C L A M A T I O N & M A N I F E S T O
- ***********************************************
-
- WHEREAS, the computer network named USENET has insurmountable flaws:
-
- => It is cluttered with thousands of disorganized groups.
- => It is difficult to use due to the various software interfaces.
- => It is infected with viruses, especially in the .signatures.
- => There is no formal rulebook and no official administration.
- => Bozos abound.
- => Power-crazed maniacs frequently try to manipulate Usenet at their whim.
-
- These problems are most important. THEREFORE, in an official and secret
- democratic vote, Kibo has been duly elected LEADER OF THE NET. To correct
- this heinous situation, LEADER KIBO has decided to take bold measures,
- a brave new initiative, detailed herein.
-
- WAKE UP, IT'S 1994! THE FUTURE WILL NOT WAIT FOR A VOTE!
-
- Here is what Leader Kibo has decided--what MUST be done--what WILL be done:
-
- PHASE ONE. GLOBAL RMGROUPS FOR ALL USENET GROUPS WILL BE
- ISSUED ON 4/15/94, 06:00 GMT.
-
- A Day Without Usenet shall pass, and it will be a time of rest for
- government employees. Many will discover life, or at least television.
- Desperate soc.singles readers will have nervous breakdowns. ClariNet
- will go bankrupt. UUNET's modems will cool off. The world
- will rotate a full three hundred sixty degrees just the same.
-
- Every Usenet group, and all its associated problems, will have been
- wiped off the face of the Earth forever by the might of the rmgroup.
- Of course, to prevent any power-crazed maniacs from putting the
- groups back, the newsgroup `control' will be rmgrouped FIRST. Thus,
- the situation will be permanent. Nobody will undo the Pax Kibotica!
-
- PHASE TWO. NEWGROUPS FOR THE GROUPS IN THE NEW HIERARCHY WILL
- BE ISSUED ON 4/16/43, 06:00 GMT.
-
- The new network shall be named HAPPYNET, as it will be a Better Place.
- Usenet is dead. Long live HappyNet!
-
- ********* HAPPYNET: THE NET THAT'S HAPPIER THAN YOU! *********
-
- UNDER THE AUSPICES OF THE ALL-WISE LEADER KIBO,
- THE NEW NETWORK SHALL BE ORGANIZED THUSLY:
-
- Three hierarchies encompassing ALL HUMAN DISCOURSE:
-
- => nonbozo.*
-
- => bozo.*
-
- => megabozo.*
-
- All topics discussed on Usenet, and even deeper topics which COULD
- be discussed on Usenet but AREN'T, will fit nicely in those three--
- NO EXCEPTIONS. Extensive time and motion studies have been
- performed in the name of efficiency to maximize your pleasure!
- Existing groups will be moved into the new organization
- scheme, resulting in nonbozo.news.announce.newusers, bozo.rec.pets,
- megabozo.talk.bizarre, nonbozo.comp.virus, bozo.alt.sex,
- megabozo.alt.fan.lemurs, bozo.postmodern, megabozo.org.mensa,
- nonbozo.clari.news.urgent, megabozo.megabozo.megabozo.religion.kibology,
- etc., as determined by scientific measurements of the bozosity of the
- groups, measured by Leader Kibo's Council On Scientific Bozosity and the
- faculty of Rensselaer Polytechnic Institute (Troy, NY), world leaders in
- bozosity assessment. These truly scientific procedures were developed
- and pre-tested by Drs. Todd M. McComb and Tim Gallagher and are patented
- to prove that they are good!
-
- It is estimated that the statistical breakdown of HappyNet will be thus:
-
- 1.0000% nonbozo.*
- 90.0000% bozo.*
- 9.0000% megabozo.* (Computations courtesy of Bell Labs)
-
- Bozo.* will, of course, be subdivided logically: bozo.nerd.*, bozo.tv.*,
- bozo.inane.*, bozo.boring.*, bozo.sex.*, bozo.argue.*.
-
- New groups will also be added for MAXIMUM ENJOYMENT. The network would
- be a very unfair place if only Leader Kibo were allowed to propose new
- groups. Instead, because Leader Kibo is benevolent and omnisagaciously
- father-like, he will create WHATEVER GROUP YOU WANT (even, say,
- megabozo.kibo.is.a.blenny!) provided that (a) you follow the Official
- Procedure, filing all five copies of your request in triplicate and then
- making seven carbons of each, and (b) you pay Leader Kibo $160 for each
- letter in the new group's name, and $720 for each period. UNLIKE SOMEARCHAIC SYSTEMS, VOWELS DO NOT COST EXTRA. PAT SAJAK IS EVIL!
-
- Of course, thanks to Leader Kibo's awesome foresight, new groups will
- probably not be needed. A simple computer program will generate all
- groupnames from *.aaaaa.aaaaa.aaaaa.aaaaa to *.zzzzz.zzzzz.zzzzz.zzzzz.
- This will encompass ALL possibilities in a COMPLETELY LOGICAL FASHION,
- maximally efficient yet FUN! Prudence and foresight by LEADER KIBO!
-
- There will even be a .d group for every regular group. In fact,
- the .d groups will even have their own .d.d groups for metadiscussion
- of whether or not the new .d.d.d and .d.d.d.d groups are needed at all!
-
- The wealth of new groups will also cut down on those annoying egomaniacal
- posters who try to post the same article to EVERY group, because it will
- become physically impossible to post to ALL groups within a MORTAL LIFETIME!
-
- But wait, there's more--over six billion groups MORE will be added at
- HappyNet's inception--free of charge!
-
- ********* HAPPYNET: EVERYONE IS EQUALLY EQUAL! *********
-
- To promote EQUALITY and POLITICAL CORRECTNESS (the good kind), Leader
- Kibo has decided to correct the inequality of the distribution of
- "personal" groups. Some people, or groups of people, currently are
- popular enough to have groups named in their honor: alt.weemba,
- alt.fan.john-palmer, alt.fan.monty-python, alt.fan.dave-barry,
- alt.fan.mike-jittlov, alt.fan.naked-guy, alt.religion.kibology,
- alt.fan.alok-vijayvargia, alt.fan.harry-mandel. Because everyone is
- equal before the eyes of wise Leader Kibo, it was decided that EVERYONE
- WILL HAVE THEIR OWN GROUP on HappyNet. This will celebrate the
- global diversity of our users, demonstrating for once and for all
- that they are all unique, but unique in exactly the same way!
-
- A scientific questionnaire developed specifically for the purpose will be
- mailed to everyone on the planet. It will read:
-
- Dear Citizen Of The New Network,
-
- You are being given your own HappyNet group. Its placement
- will depend on your answer to this simple question.
-
- ARE YOU A BOZO? (CHECK EXACTLY ONE) [] YES [] NO
-
- I care,
- Leader Kibo
-
- People who answer "yes" will be given groups in bozo.personal.*, and
- people who answer "no" will be given groups in megabozo.personal.*.
- People who refuse to answer, or show contempt for the process, will be
- taken (by the Network Security Patrol Force) to the Citadel Of Judgment
- to appear before the Council Of Bozosity, who will examine the person and
- assign them either bozo.weenie.* or megabozo.weenie.*.
-
- Of course, this would be POINTLESS if anyone in the world were DENIED
- ACCESS to HappyNet.
-
- ********* HAPPYNET: A NET IN EVERY POT! *********
-
- Net access will be provided to EVERY SINGLE PERSON, LIVING, UNBORN, OR
- DEAD, thanks to the new TELESCREENS which will be installed in every room
- of every building on the planet. Not only will this encourage higher net
- communications volume, it will also help Leader Kibo be a good leader, as
- it will allow Leader Kibo to instantly broadcast to all his subjects, and
- to see how they are feeling and what they are doing.
-
- But simple TELESCREENS in LIVING ROOMS, BEDROOMS, and BATHROOMS are
- not enough to ensure FREEDOM and EQUALITY. Neural transceivers will
- be implanted, FREE, at BIRTH in all newborns, allowing them to "jack in"
- to HappyNet, transmitting articles, sounds, and even GIF files at
- the speed of thought! They won't even have to worry about spelling--
- they'll just THINK and their EVERY THOUGHT will be broadcast into
- EVERYONE ELSE'S HEADS!
-
- And because Leader Kibo CARES and values YOUR opinion, this will even
- allow Leader Kibo to know what his subjects are THINKING, thanks to the
- heroic actions of the NETWORK SECURITY PATROL FORCE.
-
- ********* HAPPYNET: WE KNOW WHAT YOU'RE THINKING *********
-
- The Network Security Patrol Force, or NSPF, will be composed of volunteer
- system administrators who wish to enforce the continued accuracy,
- relevance, and acceptability of HappyNet postings. They will monitor,
- censor, and cancel bad postings, made by EVIL SUBVERSIVES who attempt to
- DEPRIVE you of your HAPPINESS. These SUPPRESSIVE PERSONS will be
- hunted down and suppressed!
-
- NSPF officers have really spiffy uniforms, especially the shiny gas masks,
- well-balanced batons, six-inch-thick shoulder pads and twelve-inch cleats.
-
- And, of course, they will punish evildoers, night or day. HappyNet
- never sleeps.
-
- ******* HAPPYNET: SLEEP TIGHT WITH ALL THE SECURITY IN THE WORLD! *********
-
- But what of those EVIL organizations that simply want to SPY on you? Well,
- the NSPF won't have to even TRY to prevent that, because the LOGICAL PLAN
- of HAPPYNET will defeat that automatically! If some three-letter government
- agency wants to SCAN all articles for WORDS LIKE "NUCLEAR BOMB" or
- "WHITEWATER", it will be IMPOSSIBLE because not even the fastest
- computer in the WORLD--the CRAY-9000--could search ALL THOSE GROUPS, EVER!!!
-
- ********* HAPPYNET: ACCURACY IS EVERYTHING ON HAPPYNET! *********
-
- Here are examples of infractions against the unwritten rules of HappyNet,
- and the punishments the NSPF will bring against the villains.
-
-
- .signature longer than four lines: Forced to read "War And Peace" at 110
- baud.
-
- .signature has giant ASCII graphic: Forced to read "War And Peace" at 110
- baud on a Braille terminal after having fingers rubbed with sandpaper.
-
- Posting an article consisting solely of "Me too!": Poster's legal name is
- officially changed to "Me Too".
-
- Calling a newsgroup a "bboard" or "notesfile": Forced to memorize
- Webster's Ninth.
-
- Spelling "too" as "to", "it's" as "its", "lose" as "loose", "you're"
- as "your", or any of the following--"wierd", "Anti-Semetic", "senerio",
- or "masterbation": Forced to write out Webster's Ninth ten times.
-
- Asking what ":-)" means: Drawing, quartering, and turning sideways.
-
- Using "<g>" instead of ":-)": being sent back to GEnie, AOL, Delphi, etc.
-
- Sending a newgroup message without permission of Leader Kibo: Poster is
- forced to adopt twelve wacky sitcom children.
-
- Posting flames outside of a *.flame group: Poster is allowed to read only
- groups about fluffy puppies.
-
- Posting "Please send e-mail, since I don't read this group": Poster is
- rendered illiterate by a simple trepanation.
-
- *Plonk*ing outside talk.bizarre: Poster is *plonked*--LITERALLY.
-
- Asking for people to send cards to Craig Shergold: Poster must answer
- all of Craig's mail.
-
- Posting the "Dave Rhodes: MAKE MONEY FAST" scam: Poster must answer all
- of Craig's and Dave's mail while also memorizing the script to every
- episode of "Knight Rider" and doing voice exercises like saying
- "NANCY, HAND THE MAN THE DANDY CANDY" ten million times and also
- being forced to eat cottage cheese we found piled up on the sidewalk.
-
- Posting to aus.* from the USA: Poster is deported to Australia after having
- a "Kick Me, Mate" sign glued to their forehead.
-
- Posting an article with a malformed address so that mail bounces when
- people reply: Poster and/or their admin are sent back to kindergarten.
-
- .signature huge script letters: Poster is forced to tattoo HappyNet
- slogans on their body in huge script letters.
-
- Excess CAPITALIZATION & PUNCTUATION!!!!!!!!!!!!!: Poster is issued a new
- keyboard without capitals or punctuation. The space bar will be clearly
- labelled.
-
- *Excess*asterisks*in*.signature*: Poster is hit with one shuriken for
- each asterisk.
-
- Articles quoted in followup, but no new semantic content appended: Poster
- is forced to watch a "Small Wonder" marathon on cable TV.
-
- Advertising on the net: Poster is forced to pay Leader Kibo for the
- advertising time.
-
- Asking help for some program but not saying what sort of computer you're
- using: Poster's computer is reduced to 1K RAM.
-
- Arguing over whose computer is better: Being introduced to Leader Kibo,
- whose custom Turbissimo MoNDO Zeugma 6866688786/XA/sxe/IV computer is far
- better than theirs and will make them cry in humiliation.
-
- Giving away the secret of "The Crying Game": No punishment.
-
- Making fools of people in rec.org.mensa with pranks: No punishment
- necessary for something that simple. After all, some people could
- even do it by accident.
-
- Referring to the NSPF as "The Thought Police": Execution.
-
- Humor impairment: Execution.
-
- Saying "Imminent death of the net predicted!": Imminent execution of
- poster predicted.
-
- Mentioning Star Trek outside of the Star Trek groups: "Star Trek:
- Deep Space Nine" is cancelled, and all tapes of the original series are
- burned. William Shatner will direct all future movies.
-
-
- There are other helpful rules and regulations, but they are double secret.
-
- Of course, various branches of the NSPF will specialize in various
- enforcements: the Spelling Squad, the Grammar Goons, the Definition
- Draconians, the Typo Tyrants, the Capitalization Captains, the Pedantic
- Patriots, the Cross-Post Crushers, the Cascade Commandos, and
- the .signature .specialforce. There will even be a special detail to
- track down, and burn, copies of the Green Golfball Joke.
-
- ********* HAPPYNET: MODERATION IN ALL THINGS! *********
-
- The concept of moderated groups will be retained for a few groups,
- with minor changes.
-
- Alt.flame (renamed megabozo.alt.flame) will be moderated by Dave Lawrence,
- as his news.announce.newgroups duties have been assumed by Leader Kibo.
- Dick Depew will be assigned the task of making up an imaginative
- Message-ID for every article in the world. (He will also unleash random
- daemons onto the net to destroy the unpleasant signal to noise ratio
- completely.)
-
- A program that determines how funny an article is by measuring the
- frequency of the "k" sound (an elementary comedic principle discovered in
- Kukamonga, Arkansas) will replace rec.humor.funny moderator Maddi Hausmann,
- allowing her to devote full time to assisting Brad Templeton's
- nonbozo.clarinet.* duties.
-
- Serdar Argic will be the official underliner of HappyNet. Every time
- the word "turkey" is mentioned, he will post a followup underlining and
- circling it. This will be a tremendous help to people looking for
- low-fat recipes.
-
- Jay O'Connell has volunteered to personally deliver an envelope labelled
- THESE ARE ALL THE TOPLESS PICTURES OF MARINA SIRTIS THERE ARE to all
- users to prevent them from asking for them over and over. This should
- reduce the bandwidth by an estimated 90%.
-
- Iain Sinclair will ensure that the link between Australia and the rest of
- the world is down on a regular schedule, instead of an irregular one.
- He has also been commissioned to design the NSPF uniforms, with the
- blessings of the Florida Citrus Council and the California Leather Council.
-
- And, of course, a world-class anonymous-posting server will be
- established. Not only will it remove your name from your postings (so
- that you don't have to worry about defending your opinions) but it will
- also eliminate the opinions themselves. Thus, don't be surprised to see
- a lot of anonymous postings in bozo.alt.sex.stories saying simply
- "I have no opinion on homosexuality." HappyNet will help us all to get
- along, even the people with no names.
-
- But what about those disclaimers that state that your opinion is not
- that of IBM, McDonalds, MIT, Scientology, etc.?
-
- Disclaimers are NOT required on articles, therefore you MUST include
- the following:
-
- DISCLAIMER: THIS DISCLAIMER IS NOT REQUIRED BY LEADER KIBO.
- THIS ARTICLE DOES NOT NECESSARILY REPRESENT THE OPINIONS OF LEADER KIBO.
- THIS ARTICLE DOES NOT NECESSARILY DISAGREE WITH LEADER KIBO EITHER.
- HAVE A NICE DAY!
-
- Also, for your protection, Leader Kibo has filed a copyright claim on
- HappyNet. Thus, any postings without a copyright notice become the
- intellectual property of Kibo. This will keep random people from
- commercially exploiting your ideas, because they won't be
- YOUR ideas any more! It's THAT SIMPLE. STREAMLINE EVERYTHING!
-
- ******** HAPPYNET: A BLAST TO LIGHT OUR GLOWING FUTURE! ********
-
- HappyNet as currently implemented is just one communications medium.
- But this will blast our way into the foundation of the future:
- Eventually, HappyNet will be expanded to replace the other
- `conventional' media, such as newspapers, television, radio, standup
- comedy, and sex. .signatures will be sixty-second commercials. Alt.sex
- (bozo.alt.sex) will be interactive and finally worth reading.
-
- A PBS series, "Great RFCs, Past and Present" will be filmed to replace
- the boring old text RFCs. A Fox series, hosted by Dr. Ruth Westheimer,
- will replace "Emily Postnews".
-
- The Sony Walkman will become obsolete thanks to the Sony rnman. The
- instructions will be on a separate device, the Sony manman.
-
- Once everyone in the world is hooked into the giant HappyNet neural
- network and their brains merge into one gigantic community of mind
- (with an IQ well over THREE HUNDRED!), local events will be instantly
- communicated everywhere in the world. For example, people in Sri Lanka
- will be able to INSTANTLY receive dozens of "Hey, we're having a minor
- earthquake here in San Francisco RIGHT NOW!" postings INSTANTLY, instead
- of having to wait weeks. Rumors of such important events as DeForest
- Kelley's death will also propagate instantly, but this is not really
- a drawback: it enables the NSPF to detect them and snuff them out faster!
-
- HappyNet is an important part of this well-balanced future. In fact,
- it is the ONLY part. Without HappyNet, there could be no future.
- Usenet paves the road to misery and ruin with its cascades, cross-posts,
- flame wars, forgeries, and .signature viruses. HappyNet does not pave
- this road--where it's going, we don't NEED roads! HappyNet bravely
- journeys into an unknown, but not unpleasant future. Everyone WILL
- be happy, happier than human beings can possibly be.
-
- Although it will take HappyNet months, maybe years, to improve all
- areas of daily existence in all possible ways, it will be obvious to
- the most casual reader that HappyNet is better than Usenet.
- Those who aren't casual readers--well, they will come to agree.
- In time, they will even love me. In fact, soon they will beg to
- love me! But I, Leader Kibo, want only the best for everyone.
- After all, I am one of the readers of Usenet, so I can make the
- readers of Usenet happy by making me happy FIRST. DEATH TO USENET!
- LONG LIVE HAPPYNET! TO THE MOON!
-
- ********* HAPPYNET: YOU CONTROL HOW IT CONTROLS YOU *********
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- [Editor's Note: Here is a FAQ from a very cool program. It is like the
- ultimate information database, but has a humorus kick to it. I will
- soon be published in this program. So, here's the FAQ. I highly suggest
- that you ftp the software.]
-
- ALT.GALACTIC-GUIDE FAQ -- MONTHLY POSTING -- Mk. II Release 1.1
-
- By Steve Baker (swbaker@vela.acs.oakland.edu)
- Organization: Project Galactic Guide Mothership
-
- _____ _____ _____ ______ ___ ____
- | __ \ / ____|/ ____|\ | /| ____/ _ \ / __ \
- | |__) | | __| | __ \|/ | |__ | |_| | | | |
- | ___/| | |_ | | |_ |--o--| __|| _ | | | |
- | | | |__| | |__| | /|\ | | | | | | |__| |
- |_| \_____|\_____|/ | \|_| |_| |_|\___\_\
- Project Galactic Guide Frequently Asked Questions
-
- FAQ Mk. II Release 1.1 18 September 1994
-
-
- This is the Mostly All-New FAQ (Frequently Asked Questions) information file
- for the Usenet group alt.galactic-guide. This file is intended to provide
- you with answers to your frequently asked questions and is 97% fat-free with
- no preservatives or artificial flavours.
-
-
- Contents
- --------
- 1.0 What is this newsgroup?
- 2.0 Who's in charge around here?
- 2.1 So who do I send articles to?
- 3.0 Format of the articles
- 3.1 Article content and legal stuff
- 3.2 So where can I get article ideas then?
- 3.3 The article lifecycle
- 4.0 The PGG Mothership
- 4.1 Mothership mirror sites
- 4.2 Supported computer platforms
- 4.3 Other ways to get PGG materials
- 5.0 World-Wide Web (WWW) sites
- 6.0 Miscellaneous questions
-
-
- 1.0 What is this newsgroup?
- ----------------------------
- This newsgroup was created for the sole purpose of allowing uninterrupted
- communication between people involved in Project Galactic Guide. What is
- this project, you ask?
-
- It all started back in, oh, November of 1991 in the alt.fan.douglas-adams
- newsgroup. For the uninformed, Douglas Adams is the author of a series
- of humourous s/f books centering on the Hitchhiker's Guide to the Galaxy.
- In these books, the characters write for and frequently consult a sort of
- electronic encyclopedia which has an entry on just about everything.
-
- Paul said, "Hey, why don't we create a REAL guide to the galaxy?" and
- everyone else said, "Sounds good, let's do it!". So, with great fervor
- we started working on the skeletal structure of Project Galactic Guide,
- although at that time, we often called it "The HitchHiker's Guide the Known
- Galaxy."
-
- It was originally supposed to be about REAL things (as opposed to made-up
- things), but we eventually broke down and decided to incorporate
- EVERYTHING. So, now we'll take humorous entries about fictitious things
- (done in the Douglas Adams style, of course), and humorous entries about
- real things (also done in the Douglas Adams style, of course).
-
-
- 2.0 Who's in charge around here?
- ---------------------------------
- Well, not anyone, really. Er, actually, I suppose there *are* a couple of
- froods who tend to have a bit more input about things than others, but
- really it's mostly chaotic. Well, not actually *chaotic* but instead maybe
- something a bit more like a good recess.
-
- The aforementioned Paul Clegg is one of PGG's Founding Fathers. He is
- easily identifiable by his "...Paul" signature. Paul wrote the first PGG
- FAQ, upon which this document is derived. Today, Paul's an Editor and has
- many Wise Things to say about topics, issues, concerns, thoughts, ideas,
- problems, suggestions, and comments. His action figure should be available
- for the holiday season (along with the PGG Mothership playset), and he is
- available via email at: cleggp@rpi.edu
-
- Steve Baker helped get the project rolling with his "The Guide!" software
- for IBM/MS-DOS machines in the spring of 1992. Steve usually answers to
- the nom de plume "Stevadelic." Today, Steve's an Editor, the Librarian,
- Captain of the PGG Mothership, and actively avoids doing required updates
- and bug fixes to the TG! system. (He claims to be too busy working on
- Klingon language translation software.) You can send email to Steve at
- the address: swbaker@vela.acs.oakland.edu
-
- Roel van der Meulen joined the project in the fall of 1993, and is an
- active PGG Field Researcher Recruiter (he finds new articles and authors
- for PGG, in addition to his own work). He also maintains the PGG archives
- contents file and one of the fine WWW sites. Roel's Internet email address
- is: vdmeulen@rulrol.leidenuniv.nl
-
- Jeff Kramer is compiling the "PGG Report," a regular newsletter with lots
- of great information about the Project and its activities. He also admin's
- one of the PGG WWW sites. Jeff is available at: lthumper@bga.com
-
- Ryan Tucker provides articles, ideas, and crazy text art (like the FAQ
- logo), as well as up-to-date Iowa weather reports (as long as there's a
- tornado). Ryan's available at: rtucker@worf.infonet.net
-
- There's a lot of others out there who have contributed t-shirt designs,
- press card information, articles, ideas, suggestions, comments, et al...
- but to avoid this becoming one of those "Hi folks"-type things, I'll just
- leave it at that.
-
-
- 2.1 So who do I send articles to?
- ----------------------------------
- Paul is available from September until April or May (during the college
- school year), and Steve is on-line and available year-round. Both Paul
- and Steve also have America Online accounts, so they're available there
- as well. Now that I think about it, Steve actually collects email accounts
- (he's now up to six different active, on-line email accounts, which is
- quite a lot of passwords to get straight).
-
- To answer the question, however, let's just say that you should send
- articles to one of the PGG Editors:
-
- cleggp@rpi.edu -- Paul
- swbaker@vela.acs.oakland.edu -- Steve
-
- We also have a third editor, Michael Bravo, who handles articles written
- in the Russian language. If you have written an article in Russian, please
- send them to Michael (mbravo@octopus.spb.su).
-
-
- 3.0 Format of the articles
- ---------------------------
- The articles that are accepted are organized by category and compiled in
- article "archives." Each archive file contains 25 accepted Guide entries.
- These archives are stored and available for download from the PGG
- Mothership.
-
- We've decided upon a simple ASCII text format for the article entries. The
- specs on the format are contained in the "article.new" file. It's really
- pretty simple, with just a few header token-type things that define useful
- stuff.
-
- The fine folks at PGG spent about a year discussing, debating, formulating,
- postulating, configuring, finalizing, and neglecting a nifty but complex
- text format. It was complete with crazy text formatting things and lots of
- other fun and wonderful features, but it never really caught on. Oh well.
-
- We're currently investigating the possibilities of porting the article
- archives into HTML (HyperText Markup Language) for use with html and WWW
- viewers. For now, however, standard ASCII files are just fine!
-
-
- 3.1 Article content and legal stuff
- ------------------------------------
- You're welcome to write about anything. Yes, no matter how bizarre or
- crazy, please write about it. Really. Anything.
-
- Er, except, we don't want you to regurgitate Adams' material. Not only is
- this very unoriginal, it's also known as plagiarism. (Unless DNA himself
- decides to write it for us!)
-
- In general, please do NOT copy other people's work or ideas. We don't want
- the project stopped because we violated some silly copyright law!
-
-
- 3.2 So where can I get article ideas then?
- -------------------------------------------
- We have a PGG Idea Bank, chock full of great ideas that beg for exploring.
- They're frequently posted to the alt.galactic-guide newsgroup, and all are
- available on-line at the Mothership.
-
- When posting an idea, be sure to include your name and email address for
- proper credit down the road. Conversely, when using an idea, just go ahead
- and write your article and credit the idea's originator in the header
- information.
-
-
- 3.3 The article lifecycle
- --------------------------
- This describes what your Friendly Neighbourhood PGG Editor does and presents
- "a day in the life of an article" so to speak. Erm, actually, the articles
- themselves don't really speak much; that's just an expression, so let's
- carry on.
-
- 1) A young, up-and-coming comedian/researcher/student/author/human/whatever
- stumbles across, gets hit with, becomes infected by, is arrested in, or
- otherwise has a great idea for an article (or consults the Ideabank,
- which is sometimes less painful).
-
- She/he/it/they then write an article about the person/place/thing and
- send the article to an editor via email. (Please see Section 2.1,
- above, for info on who the editors are and where to send stuff.)
-
- 2) The editor send a message back to the author, stating something like:
- "Blah blah, thanks for the article, blah blah blah, I'll edit it for
- format and stuff, blah blah, you'll get it back pretty soon for author
- confirmation, blah blah, give me all your money, etc. etc."
-
- This message is the author's "receipt" that the editor received the
- article submission. If you don't get one of these, then the editor
- hasn't received your article yet!
-
- 4) The editor edits the article and performs routine grammar and spell-
- checker things on the article. Note: if the editor thinks that the
- article (1) violates a copyright law, (2) is a copy of other work, or
- (3) is hopelessly lame, the editor may nix the article for good.
-
- 5) Assuming that everything is fine with the article, the editor then sends
- it back to the author for "author confirmation." (This is often times
- abbreviated as A/C. Humm, if the author and the editor had a Direct
- Connection, would this be AC/DC?)
-
- 6) The author reviews the modified article, and then lets the editor know
- that things are alright. If the author has additional changes with the
- article, they go back to step one and start over.
-
- 7) Once the article is approved, the editor assigns the unique Article ID
- information and sends the article to the PGG Librarian. The Librarian
- adds the approved article into the article archives and posts the
- article to alt.galactic-guide.
-
-
- 4.0 The PGG Mothership
- -----------------------
- The Mothership is an Anonymous FTP site where you can download PGG info,
- articles, programs, t-shirt images, reports, and other great stuff. To
- get to the PGG Mothership, FTP to the following site:
-
- Lexical: vela.acs.oakland.edu
- Numeric: 141.210.10.2
- URL: ftp://vela.acs.oakland.edu/pub/galactic-guide
-
- When you connect, use the [ anonymous ] user ID and specify your full
- Internet email address as the password.
-
- The Mothership is [ pub/galactic-guide ], which is actually just a link
- to [ pub/swbaker ]. Thus, if you're using an FTP server which doesn't show
- the logical links, go into the [ swbaker ] directory.
-
- Anyway, beneath this directory are additional directories for each of
- the particular computer programs and general Hitchhiker's Guide fan stuff.
- There is a separate FAQ file on the PGG Mothership which describes these
- directories and the files they contain in more detail.
-
-
- 4.1 Mothership mirror sites
- ----------------------------
- If having all of the PGG archives, programs, gif files, and other goodies
- at one centralized location isn't good enough for you, you may be pleased
- to know that it isn't! That is to say, the stuff is available from more
- than one Anonymous FTP site.
-
- The PGG Mothership is mirrored at:
-
- Lexical: ftp.cs.city.ac.uk
- Numeric: 138.40.91.9
- URL: ftp://ftp.cs.city.ac.uk/pub/galactic-guide
-
-
- 4.2 Supported computer platforms
- ---------------------------------
- While having the articles themselves is pretty fun, actually being able to
- do something with them is even better. The following computer platforms
- are supported with PGG article reader systems:
-
- o Acorn Archimedes
- Author contact: Alex McLintock (alexmc@biccdc.co.uk)
-
- o Amiga
-
- o Atari ST
-
- o IBM/MS-DOS (also works within Windows, OS/2, DESQview, etc.)
- Author contact: Steve Baker (swbaker@vela.acs.oakland.edu)
-
- o Macintosh
- Author contact: Rickard Andersson (rickard@softlab.se)
-
- o Unix
- Author contact: Dave Gymer (dpg@cs.nott.ac.uk)
-
- o X Windows
- Author contact: David Squire (squizz@cs.curtin.edu.au)
-
- Each of the programs is available in its own subdirectory on the Mothership.
- Questions about a particular program's use or functionality should be
- directed to the program's author or posted to alt.galactic-guide.
-
-
- 4.3 Other ways to get PGG materials
- ------------------------------------
- There's a lot of BBS systems that carry Project Galactic Guide stuff.
- Honestly -- I'm positive there's a lot of them... although the FAQ file
- doesn't really reflect this. Yet. Just give us some time and soon
- this list will have a lot of numbers. Really.
-
- Area/Region BBS Name Number
- --------------- ------------------------------ ----------------
- Mass., USA Sea of Noise +1 203 886 1441
-
-
- In addition, you may contact one of the following hoopy froods who have
- volunteered to distribute PGG materials in their local countries:
-
- Country Contact
- --------------- ------------------------------
- Denmark Christian Moensted
- Almindingen 66
- 2860 Soeborg
- (email: moensted@diku.dk)
-
-
- 5.0 World-Wide Web (WWW) sites
- -------------------------------
- For those who can view html documents (including users of Mosaic, Cello,
- and WinWeb), there are a number of froody WWW sites:
-
- URL: http://www.strw.leidenuniv.nl/~vdmeulen/index.html
- Operator: Roel van der Meulen
-
- URL: http://web.cs.city.ac.uk/pgg/guide.html
- Operator: Nick Williams
-
- URL: http://www.realtime.net/~lthumper/
- Operator: Jeff Kramer
-
- URL: http://www.willamette.edu/pgg/
- Operator: James Tilton
-
- These all have links to the Article Archives, the PGG Mothership, format
- and article information, and many have on-line archive search and article
- retrieval capabilities.
-
-
- 6.0 Miscellaneous questions
- ----------------------------
- Q: What's with 42, who is Douglas Adams, and why should I carry a towel?
- A: Please see the alt.fan.douglas-adams Usenet group; they'll be happy to
- supply you with amplitudes of answers.
-
- Q: How can I get a PGG Press Card?
- A: As soon as they're finished, you'll be able to get an Official PGG
- Press Card from Jason Kohles (jason.kohles@m.cc.utah.edu).
-
- Q: What good are the PGG Press Cards?
- A: They may actually get you in some places, and besides they look cool.
- There's an article on what to do with your Press Card; check it out!
-
- Q: What's up with the PGG t-shirts?
- A: Among others, Stephane Lussier (stef@phoque.info.uqam.ca) has come
- up with some great graphics and motif ideas for the Official PGG
- t-shirt. They're available for review on the Mothership. As soon as
- we decide on how the shirts will look, and as soon as someone makes
- the shirts, then you'll be able to order them! For more information,
- just follow the t-shirt threads on alt.galactic-guide.
-
- Q: Do you need more editors?
- A: Not really. How can you become an editor? Well, lots of money would
- definitely help (just kidding). Anyway, until the project completely
- consumes both Paul and Steve to the point of exhaustion, we're probably
- all set.
-
- Q: Is there a Macintosh Guide Reader?
- A: YES! Please see Section 4.2, above.
-
- Q: Is there a Microsoft Windows-based Guide Reader?
- A: Sorta. It's being developed. Under construction. Something like that.
-
- Q: Is this the end of the PGG FAQ?
- A: Yes.
-
- Q: Really?
- A: I mean it this time.
-
- Q: Are you sure about that?
- A: Absolutely.
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- PRE-EMPLOYMENT BACKGROUND CHECKS
-
- From: Phil Agre (pagre@weber.ucsd.edu)
- and Christine Harbs (charbs@teetot.acusd.edu)
-
- Although the enclosed fact sheet from The Privacy Rights Clearinghouse only
- applies to California, it might provide a model for other jurisdictions
- worldwide.
-
- The Privacy Rights Clearinghouse has a new gopher of useful legal and
- practical stuff about privacy. Telnet to teetot.acusd.edu
- (or 192.55.87.19) and log in as "privacy".
-
- You can now reach the Privacy Rights Clearinghouse's useful gopher directly
- at gopher.acusd.edu. You'll find PRC under menu item 4, USD Campus-Wide
- Information System.
-
-
- **************************************
- The Privacy Rights Clearinghouse
- The Center for Public Interest Law
- 5998 Alcala Park
- San Diego, CA 92110
- (619) 260-4806
- (619) 260-4753 (fax)
- e-mail prc@teetot.acusd.edu
- gopher gopher.acusd.edu
- Hotline: +1 800-773-7748 (Calif. only) +1 619-298-3396
- ***************************************
-
- Fact sheet No. 16 Copyright 1994, Center for Public Interest Law
- August 1994
-
- Employment Background Checks: A Jobseeker's Guide
-
- **Why would an employer want to do a background check?
-
- Whether you are hired or promoted for a job may depend on the information
- gathered by the employer in a background check. Employers use them to
- verify the accuracy of information provided by jobseekers. Background
- reports may also uncover information left out of the application or
- interview.
-
- Today, more employers are being sued for "negligent hiring" for not checking
- carefully enough into the background of a potential employee. If an
- employee's action hurts someone, the employer may be liable. That is one
- reason more background checks are being conducted.
-
- The "information age" also accounts for the increase in background checks--
- the availability of computer databases containing millions of records of
- personal data. As the cost of searching these sources drops, employers are
- finding it more feasible to conduct background checks.
-
- **I don't have anything to hide. Why should I worry?
-
- While some people are not concerned about background investigations, others
- are uncomfortable with the idea of an investigator poking around in their
- personal history. In-depth background checks could unearth information
- that is irrelevant, taken out of context or just plain wrong.
-
- A further concern is that the report might include information that is
- illegal to use for hiring purposes or which comes from questionable
- sources. Since in most cases employers are not required to tell applicants
- that a background check is being done, jobseekers may not have the
- opportunity to respond to negative or misleading data.
-
- **What types of information might be included in a background check?
-
- Background reports can range from a verification of an applicant's Social
- Security number to a detailed account of the potential employee's history
- and acquaintances. Here are some of the pieces of information that might be
- included in a background check:
-
- - Driving records - Vehicle registration - Credit records
- - Criminal records - Social Security no. - Education records
- - Court records - Workers' compensation - Bankruptcy
- - Character references - Neighbor interviews - Medical records
- - Property ownership - Employment verification
- - Military service records - State licensing records
-
- **Which companies conduct background checks?
-
- There are many companies that specialize in conducting pre-employment
- background checks. They typically use public records databases to compile
- reports. The following is a partial list of companies that perform a
- variety of services for employment background checking: Avert, Interfact,
- Equifax Employment Services, CDB Infotek, Employers Mutual Assoc.,
- Employers Information Service, Trans Union, Information Resource
- Service Co., Pinkerton Security & Investigation Services.
-
- With the information age upon us, it is easier for employers to gather
- background information themselves. Much of it is computerized, allowing
- employers to "log on" to public records and commercial databases directly
- through commercial online services.
-
- Employers may also create a "clearinghouse" of information about potential
- employees. A group of employers establish a data exchange program to screen
- applicants. The database is comprised of information submitted by the member
- companies about their employees. When a jobseeker submits an application
- to a member company, that employer will check with the clearinghouse for
- information on the applicant.
-
- **What types of information *can't* the employer consider?
-
- Federal and state laws limit the types of information employers can use in
- hiring decisions.
-
- o Arrest information. Although arrest record information is public record,
- in California employers cannot seek out the arrest record of a potential
- employee. However, if the arrest resulted in a conviction, or if the
- applicant is out of jail but pending trial, that information can be used.
- (California Labor Code @ 432.7)
-
- o Criminal history. In California, criminal histories or "rap sheets"
- compiled by law enforcement agencies are not public record. Only certain
- employers such as public utilities, law enforcement, security guard firms,
- and child care facilities have access to this information. With the advent
- of computerized court records and arrest information, however, there are
- private companies that compile virtual "rap sheets." (California Penal Code
- @@ 11105, 13300)
-
- o Workers' compensation. When an employee's claim goes through the state
- system or the Workers' Compensation Appeals Board, the case becomes public
- record. Only if an injury might interfere with one's ability to perform
- required duties may an employer use this information. Under the federal
- Americans with Disabilities Act, employers cannot use medical information
- or the fact an applicant filed a workers' compensation claim to
- discriminate against applicants. (42 USC @12101)
-
- o Bankruptcies. Bankruptcies are public record. However, employers cannot
- discriminate against applicants because they have filed for bankruptcy.
- (11 USC @525)
-
- **Aren't some of my personal records confidential?
-
- The following types of information may be useful for an employer to make a
- hiring decision. However, the employer is required to get your permission
- before obtaining the records. (For more information, see PRC Fact Sheet
- No. 11, "From Cradle to Grave: Government Records and Your Privacy.")
-
- o Education records. Under both federal and California law, transcripts,
- recommendations, discipline records and financial information are
- confidential. A school should not release student records without the
- authorization of the student or parent. However, a school may release
- *directory information*, which can include name, address, dates of
- attendance, degrees earned, and activities, unless the student has given
- written notice otherwise. (California Education Code @@ 67100, 76200;
- 20 USC @1232g)
-
- o Military service records. Under the federal Privacy Act, service records
- are confidential and can only be released under limited circumstances.
- Inquiries must be made under the Freedom of Information Act. Even without
- the applicant's consent, the military may release name, rank, salary, duty
- assignments, awards and duty status. (5 USC @@ 552, 552a)
-
- o Medical records. In California, medical records are confidential. There
- are only a few instances when a medical record can be released without your
- knowledge or authorization. If employers require physical examinations
- after they make a job offer, they have access to the results. The Americans
- with Disabilities Act allows a potential employer to inquire only about
- your ability to perform specific job functions. (California Civil Code @
- 56.10;42 USC @12101)
-
- There are other types of questions such as age and marital status and
- certain psychological tests that employers cannot use when interviewing.
- These issues are beyond the scope of this fact sheet. If you have further
- questions, look under "For more information" at the end of this fact sheet
- or call the PRC Hotline.
-
- **What can my former employer say about me?
-
- Often a potential employer will contact an applicant's past employers. A
- former boss can say anything [truthful] about your performance. However,
- most employers have a policy to only confirm dates of employment, final
- salary, and other limited information. California law prohibits employers
- from intentionally interfering with former employees' attempts to find jobs
- by giving out false or misleading references. (California Labor Code @ 1050)
-
- Documents in your personnel file are not confidential and can be revealed
- by an employer. Only medical information in a personnel file is
- confidential. If you are a state or federal employee, however, your
- personnel file is protected under the California Information Practices Act
- or the federal Privacy Act of 1974 and can only be disclosed under limited
- circumstances. Under California law, employees have a right to review
- their own personnel files, and make copies of documents they have signed.
- (California Civil Code @ 56.20; California Labor Code @@432, 1198.5;
- California Government Code @ 1798; 5 USC @552a)
-
- **Does the applicant have a right to be told when a background check is
- requested?
-
- The *only* times an applicant must be told if a background check is
- conducted is if the employer requests an "investigative consumer report"
- or a credit report. The investigative consumer report may contain
- information about your character, general reputation, personal
- characteristics and lifestyle. The information in the report is typically
- compiled from interviews with neighbors, friends, associates and others who
- might have information about you.
-
- Under both California and federal law, the applicant must be notified if
- an employer requests an investigative consumer report. (California Civil
- Code @ 1786; 12 USC @1681d. Also see Fact Sheet No. 6, "How Private is My
- Credit Report?")
-
- An employer can also order a copy of your credit report, which is less
- detailed than an investigative report. However, a credit report can still
- tell an employer a lot about you. It may contain public records information
- such as court cases, judgments, bankruptcies and liens; also, outstanding
- credit accounts and loans, and the payment history for each account. Credit
- report entries remain in the report for up to ten years.
-
- In California, if an employer checks your credit file, you must be notified
- and given an opportunity to see the file. Also, when a report is requested
- for employment purposes, the credit bureau must block all references to age,
- marital status, race, religion and medical information. Although federal
- and state laws allow credit bureaus to include criminal record information,
- it is an industry policy not to do so. (California Civil Code @@ 1785.18,
- 1785.20.5)
-
- **What can the job applicant do to prepare?
-
- Although you cannot *prevent* an employer from doing a background check,
- you can take steps to be ready for questions the employer might ask once
- the investigation is conducted.
-
- o Order a copy of your credit report. If there is something you do not
- recognize or that you disagree with, dispute the information with the
- creditor or credit bureau before you have to explain it to the interviewer.
- (See PRC Fact Sheet No. 6, "How Private is My Credit Report?")
-
- o Check public records files. If you have an arrest record or have been
- involved in court cases, go to the county where this took place and inspect
- the files. Make sure the information is correct and up to date. Request a
- copy of your driving record from the Department of Motor Vehicles (DMV),
- especially if you are applying for a job that may involve driving.
-
- o Ask to see a copy of your personnel file from your old job. Even if you
- do not work there anymore, you have a right to see your file until at least
- a year from the last date of employment. You are allowed to make copies of
- documents in your file that have your signature on them. (California Labor
- Code @ 432.) You may also want to ask if your former employer has a policy
- about the release of personnel records. Many companies limit the amount of
- information they disclose.
-
- o Read the fine print carefully. When you sign a job application, you may
- also be signing a statement that waives your right to a copy of your credit
- report. You might also be authorizing the disclosure of other personal
- data, such as educational records, medical records and financial data.
- Unfortunately, jobseekers are in an awkward position, since refusing to
- authorize a background check may jeopardize the chances of getting the job.
-
- o Tell neighbors and work colleagues, past and present, that they might
- be asked to provide information about you. This helps avoid suspicion and
- alerts you to possible problems.
-
- o If you feel comfortable, ask the interviewer about the company's employee
- privacy policies. Find out if the potential employer plans to do a
- background check, and ask to see a copy.
-
- **For more information
-
- o Equal Employment Opportunity Commission (see the Government Pages in
- your phone book).
-
- o California Labor Commission (see the Government Pages in your phone
- book).
-
- o Pacific Disability and Business Technical Assistance Center for questions
- about the Americans with Disabilities Act, (800) 949-4232.
-
- o Documented Reference Check, (800) 742-3316 (verifies references of former
- employers; fee charged).
-
- If you have additional questions about privacy, contact the PRC Hotline
- at (800) 773-7748.
-
- Copyright 1994 Center for Public Interest Law August 1994
- ***************************************************************************
- The Clearinghouse is a nonprofit organization dedicated to educating
- Californians about personal privacy issues. It is funded by a grant from the
- Telecommunications Education Trust and operates under the auspices of the
- University of San Diego School of Law's Center for Public Interest Law.
- ***************************************************************************
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
- IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
- YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
- PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-