home *** CD-ROM | disk | FTP | other *** search
- Computer Underground Digest--Fri Aug 23, 1991 (Vol #3.31)
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
-
- CONTENTS, #3.31 (AUGUST 23, 1991)
- File 1--Moderators' Corner: Blurbs
- File 2--Request info on suggestions for a class
- File 3--New BBS for CuD back issues and other services
- File 4--Moderators' Corner: Blurbs
- File 5--BOARDWATCH Magazine
- File 6--NREN Boondoggle?
- File 7--Inslaw Death Investigation Continues (NEWSBYTES REPRINT)
- File 8--Memes, Gurus, and Viruses
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu,
- chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Wed, 22 Aug 1991 10:00:00 CDT
- From: "Jim Thomas" <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--Moderators' Corner: Blurbs
-
- The address for contacting INTERTEK disappeared from our review of it.
-
- You can email steve steinberg at steve@cs.ucsb.edu (he's quite good
- about answering mail) or
-
- Steve Steinberg
- 325 Ellwood Beach, #3
- Goleta, CA 93117 (805) 685-6557 is the phone)
-
- Subs are $8 a year.
-
- +++++++++
-
- NIA #72 is out and it's available in the CuD ftp archives. The latest
- EFFector is also available there.
-
- +++++++
-
- Because of conferences, the start of school, and other craziness, CuD
- editors will take a week off, over labor day. We'll be back in about
- two weeks with a special issue of _Cyberpunk_ by Katie Hafner and John
- Markoff.
-
- ------------------------------
-
- Date: Mon, 19 Aug 91 17:15 EDT
- From: I'm hunting wabbits! - Elmer Fudd <ATKINSON@VCUVAX.BITNET>
- Subject: File 2--Request info on suggestions for a class
-
- It looks like I may be teaching an introductory course in information
- systems this fall. What I would like to do, is point out and discuss
- as many issues as possible. Two big ones are in the areas of computer
- crime, and the issues of Right to Privacy, and such that are being
- discussed in CU digest these days.
-
- I would like to ask the readership for their favorite top 10 articles,
- magazines, books, excerpts, etc. in some form of bibliographic format
- so that I can compile a suggested reading list for the class.
-
- I will happily summarize, remove duplicates, alphabetize, etc. and
- re-post back to the list.
-
- Would prefer that replies be sent directly to me.
-
- Thanks,
- Luther
- Atkinson@vcuvax (bitnet)
- Atkinson@gems.vcu.edu (other)
-
- ------------------------------
-
- Date: Wed, 21 Aug 1991 00:20:30 -0400
- From: Mike Neuliep <mike@CS.WIDENER.EDU>
- Subject: File 3--New BBS for CuD back issues and other services
-
- Mike Neuliep recently put up a new BBS which will be a distribution
- site for CuD as well as for other online publications. When he saves
- up enough money for another harddrive it will be a mirror of the
- widener ftp site. The number is 708-672-5426 and the location is Crete
- Illinois which is about 35 miles due south of Chicago. To download
- back issues users must exit from the user-friendly menu to c-shell and
- then cd to /hd20/cu/cud which is where all the files are archived.
- The software is Pro-Line running on an apple //e it is running a
- single user unix-like shell but is also somewhat networked
- (pro-mopar.cs.widener.edu on the internet). The name of the BBS is The
- World Trade Center. Users can store files in their home directories
- like on chi-net, and other services are also available. It's worth a
- look, especially for those in the 708/312 area.
-
- ------------------------------
-
- Date: Mon, 20 Aug, 1991 04:18:31 EDT
- From: "Anonymous" <deleted@by.request.etc>
- Subject: File 4--Federal abuses of Seizure Law
-
- The complaints against Federal agents for their abuses in seizing
- equipment and not returning it pale against the seizure of property in
- drug busts. The Chicago Tribune ran a story (August 11, 1991, p. 1,
- 13, "Drug Law Leaves Trail of Innocents: In 80% of Seizures, no
- Charges by Andrew Schnieder and Mary Pat Flaherty of The Pittsburgh
- Press) that illustrates the abuses of Federal seizure law and
- practices. Excerpts include:
-
- "Thousands of ordinary Americans are being victimized each year
- by the federal seizure law, which was meant to curb drugs by
- causing financial hardship to dealers.
-
- A 10-month study by The Pittsburgh Press shows that 80 percent of
- the people who lost property to the federal government were never
- charged with a crime. And most of the seized items weren't the
- luxurious playthings of drug barons, but modest homes and simple
- cars and hard-earned savings.
-
- Those goods generated $2 billion for the police departments that
- took them.
-
- Said Eric Sterling, who helped write the law a decade ago as a
- lawyer on a congressional committee: "The innocent-until-proven
- guilty concept is gone out the window."
-
- Under the government's seizure law, police can seize cash and
- belongings if a person fits a vague description of a drug runner,
- which is heavily weighted against minorities; or if a person has
- cash tainted by drugs, which is true of almost all U.S. currency,
- or if someone has property used in the commission of a crime,
- even if that person was not involved in the crime. To try to get
- it back,owners have to hire an attorney and sue the federal
- government. Cases usualy takes (sic) months or years, and there's
- no guarantee of success.
-
- The article lists several outrageous horror stories of people
- (mostly Black) detained for how the looked or for other
- "suspicious" but innocent acts. They broke no law, but their
- money or property was confiscated.
-
- Seizure laws originally intended to curb organized crime and
- substance abuse has had virtually no success in curtailing either
- drug use or the violence and other crimes associated with it.
- Yet, the laws have been expanded, and give the government what
- amounts to the power of totalitarian dictatorships in seizing
- property. This is a throwback to the dark ages where "might makes
- right," and it is a power that is expanding and being used
- less discriminately.
-
- The story concludes:
-
- ((One victim's)) lawyer, Jenny Cooke, calls the
- seizure "extortion."
-
- She said: "There is no difference between what the police did to
- ((her client)) or what Al Capone did in Chicago when he walked in
- and said, 'This is a nice little bar and it's mine.' The only
- difference is today they call this civil forfeiture."
-
- The confiscation of computer equipment is part of a larger trend
- toward "punishment without trial," and punishment allotted all too
- often to those who have committed no crime. The computer community is
- as apathetic to many of these issues--and some actually laud them--as
- the general public, but injustice in the name of justice is as
- criminal as any act of hackers.
-
- ------------------------------
-
- Date: Sat, 24 Aug 1991 01:29:20 -0600
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 5--BOARDWATCH Magazine
-
- We've been hearing lots of good things around the country about a
- magazine called BOARDWATCH from a cross section of cyber hobbyists and
- professionals. It's been around for awhile, but has only recently
- started drawing national attention for its content and perspective.
-
- Boardwatch Magazine is a monthly newsletter/magazine done by Jack
- Rickard out of Littleton, Colorado. It covers the online world with
- an emphasis on electronic bulletin boards, product support BBS,
- government data services, and unique or odd applications of BBS
- technology (i.e. BBS for Cockatiel owners, BBS for sailing/yachting
- race results, etc.). It includes a good dose of technology update on
- modems, ISDN, BBS software, and the odd but useful shareware utility.
-
- Starting as a regional publication in 1987, Boardwatch has grown to
- international proportions and amassed a readership of about 18,000 with
- subscribers in 56 countries based on a startling new marketing
- concept: if you can track it down, find the publisher, and talk him
- into taking your $36, he'll add you to the mailing list. Some
- highlights:
-
- May 91 issue - List of 37 Soviet BBS - coverage of Computers Freedom
- and Privacy Conference with Mitch Kapor of EFF as cover girl. Review
- of $399 GVC V.32 9600 bps modem. Discussion of 16550 UARTS. Unicode as
- ASCII replacement. Multitech V.32bis modem. Publicly available
- Internet access sites. Boston Computer Society to join Internet.
- Book review of !%@:: A Directory of Electronic Mail Addressing and
- Networks. Massachusetts Commission for the Blind BBS. Photo of Bob
- and Tracey Mahoney and story on their new EXEC-PC chatline service.
- Astronomy BBS.
-
- June 91 Issue - "Cover Girl" was Cliff Figallo, administrator for THE
- WELL. ATT Packet/Cellular laptop. Article on NeXT computers.
- Discount on TBBS bulletin board software. Windows application for
- TCP/IP. Announcement of Wildcat! sysops meeting in California.
- Medical Physicians computer resource guide on diskette. Photo and
- story about Hayes ISDN 1 external terminal adapter. U.S. Robotics
- acquires Touchbase Systems and the Worldport pocket modem line.
- Detailed article on Prodigy's STAGE.DAT woes. Review of America
- Online. Article by Lance Rose on Law in CyberSpace. Reprint of a
- January 1980 Kilobaud Microcomputing article by Frank Derfler with
- first printed BBS list - 3 systems - ONE IS STILL UP. CERFNet dialup
- Internet access program. Knowbot Online E-Mail Directory Source of
- 26000 Voyager images on CD ROM for $99. Library of Congress online via
- Internet. Ciarcia's Circuit Cellar BBS. Order flower delivery online.
-
- July 91 Issue. Announcement of FidoCon 91 BBS Conference in Denver.
- List of all 400+ FidoNet network coordinators worldwide. K12Net
- educational network. Tokyo BBS Systems with a review of Tympas X.25
- network allowing access to Japan at $8.40 per hour. Review of
- Heartland FreeNet offering free Internet e-mail boxes. List of BBS
- Software Vendors support BBS. Announcement of a 9600 bps V.32 modem
- available to BBS operators at $199. Eight-line caller ID interface
- for PCs. HP intros two plain paper faxes. Internet mailing lists -
- where to find them and what they are.
-
- The magazine has a regular national list of some 200+ selected BBS,
- and a standing "List of Lists" noting BBS where you can get electronic
- lists of BBS for particular area codes, topical BBS lists, etc. The
- art and layout are a little cramped and a little odd - NOT what you
- normally see on the newsstand. But a quick take on the editorial
- style explains why Rickard has gained a following with this monthly
- publication. July issue was 56 pages. $36 annual domestic - $99
- overseas. BOARDWATCH is available at at all Software Etc. and Comp
- USA stores among others.
-
- Boardwatch Magazine's address is:
-
- 5970 South Vivian St.
- Littleton, CO 80127
- Fax (303)973-3731.
- Voice subscription line 800-933-6038.
- Rickard can be reached at jrickard@csn.org
-
- Check it out. BOARDWATCH, MONDO 2000, INTERTEK, and 2600 illustrate
- that cyberspace is expanding, and these 'zines will help us
- navigate through it.
-
- ------------------------------
-
- Date: Sat, 3 Aug 91 22:11 EST
- From: "Michael E. Marotta" <MERCURY@LCC.EDU>
- Subject: File 6--NREN Boondoggle?
-
- GRID News. ISSN 1054-9315. vol 2 nu 21a August 03, 1991.
- World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- (73 lines) Summa Contra NREN -- Part 1. The Boondoggle
- (C) 1991 by Michael E. Marotta
-
- NREN is the National Research and Education Network, a proposed
- two-gigabit/second fiber-optic network to connect all national
- research and educational facilities. Publicly, NREN is the brainchild
- of Senator Albert Gore of Tennessee. In reality, Gore's proposals
- draw heavily on the work of Robert E. Kahn, founder of the
- Corporation for National Research Initiatives. Dr. Kahn worked on
- ARPANET for Bolt Beranek Newman in 1966. Later, he helped set up
- Telenet. (see "Bob Kahn Wants to Wire the Nation" BUSINESS MONTH,
- April 1987, and "Networks for Advanced Computing", SCIENTIFIC
- AMERICAN, October 1987.)
-
- NREN's primary beneficiaries will be university researchers who use
- supercomputers to model colliding neutron stars, an example provided
- by the Coalition for NREN, 1112 16th Street NW, Suite 600, Washington
- DC 20036. Other "Grand Challenge" scientific problems such as global
- warming and mapping the human genome are also mentioned in NREN
- literature. Companies that make supercomputers (IBM, CDC, Cray) will
- also profit from NREN. Other businesses are offered positive
- incentives. They are promised access to marketing data, access to
- industrial development and the ability to sell data in an
- information-based economy. More benefits to businesses include
- access to satellite imaging, high definition television conferencing,
- and contracts to "wire the nation." NREN proponents also claim that
- doctors in rural areas could communicate with major healthcare
- facilities. Children in small towns could reach the Library of
- Congress.
-
- However, the truth is less exciting than this. As defined in Senate
- Bill S.272, introduced on January 24, 1991, NREN is a $2 billion
- study. It is ONLY a STUDY. The overall plan is for Congress to
- allocate funds which NASA, the Departments of Energy and Defense, and
- the National Science Foundation would spend on supercomputers and
- high performance computing networks. There is no plan to connect
- rural children with the Library of Congress.
-
- In fact, when in Washington for the White House Conference on Library
- and Information Services, I visited the Library of Congress. They
- don't want children doing their homework to dial in and request
- "everything you have on Thomas Jefferson." That service can be
- provided online at the local level. And in fact, it already is in
- many places. That it is NOT provided in MORE places is significant.
- A more correct priority would be to put dialup catalogs in every
- library.
-
- The thought of a rural doctor accessing an urban medical center
- sounds compelling. Such technology is offered by CATV companies
- already and cable is very affordable. The reason that this is not
- more common is that it is not demanded by the doctors and hospitals.
-
- You are reading this file because you are already in cyberspace. You
- are a netrunner on the electronic frontier. FidoNet is possible
- because of individuals like Ward Christensen, Michael Hayes, and of
- course Tom Jennings. Your sysop is a private individual who donates
- time and materials to making FidoNet possible. When it was founded,
- CompuServe ran on a PDP-11 and today their platform is a VAX Cluster.
- WELL, the Whole Earth 'Lectronic Link, runs on a multi-processor
- Fujitsu. Hobbyists enjoy modem speeds of 9600 and 19.6K baud. If
- there were really a demand for NREN, the private sector would
- overcome all obstacles to provide it.
-
- In the 1800s, governments financed canals just in time for railroads
- to come along. Then governments got into the railroad game, spending
- public money on private ventures just in time for the invention of
- the automobile. Those governments then built highways for the auto
- industry just as computing was sprouting. NREN promises to be
- another boondoggle.
-
- Next file: NREN vs. the First Amendment
-
- (GRID News is FREQable from 1:159/450, the Beam Rider BBS)
-
- ------------------------------
-
- Date:
- From: jmcmullen@well.sf.ca.us
- Subject: File 7--Inslaw Death Investigation Continues (NEWSBYTES REPRINT)
-
- INSLAW DEATH INVESTIGATION CONTINUES (NEWSBYTES Reprint)
- (By Barbara E. McMullen & John F. McMullen)
-
- Martinsburg, West Virginia, the scene of the death of Washington,
- D.C. journalist Joseph D. "Danny" Casolaro, has received more press
- attention than ever before in its history as reporters from ABC-TV,
- Newsbytes News Network, and the Washington Post roamed the halls
- interrogating bell-hops, waitresses, and desk clerks for information
- regarding the death of Casolaro.
-
- Employees, supposedly under the cloak of Sheraton-forced silence,
- told Newsbytes that, while some prospective guests have specifically
- requested the room in which Casolaro died, their instructions have
- been to leave the room vacant for an unspecified time.
-
- Casolaro, 44, had been investigating the "Inslaw" case, a rather
- tangled web of allegations relating to the charges brought by Inslaw
- Inc., that the Justice Department had first stolen its software
- product, "Promis," and then driven the firm into bankruptcy. Casolaro
- had told friends and family that he was about to receive material
- that would provide him with documentation linking Inslaw to other
- alleged incidents of Reagan-Bush administration wrong-doing. Casolaro
- was said to have referred to the alleged conspiracy as the "Octopus"
- and stated that there were links between the Inslaw theft, the
- "October Surprise," and Iran-Contra allegations.
-
- The "October surprise" refers to allegations that representatives of
- the Reagan-Bush campaign team, through meetings with Iranian
- representatives, delayed the release of the hostages in Iran until
- after the 1980 elections. These charges are currently being
- investigated by Congressional committee. Casolaro was found dead, an
- apparent suicide, in Room 517 of the Sheraton on Saturday, August
- 10th, two days after his arrival in Martinsburg. He was found in the
- bathtub at approximately 1:00 pm with both wrists slashed. His body
- was released within three hours to a local funeral parlor for
- embalming, an action that Berkeley County Medical Examiner Sandra
- Brining was quoted as saying was normal in the case of a suicide.
- "Everything was consistent with a self-inflicted wound."
-
- When Casolaro's family became aware of his death on Monday, August
- 14th, it immediately called for an expanded investigation and his
- brother, Dr. Anthony Casolaro, an Arlington, Virginia physician, was
- quoted as saying, "In my heart I remember Danny telling us that in
- case of an accident, don't believe it." Dr. Casolaro also discounted
- statements made by his brother in a letter to a publisher in which he
- seemed financially strapped and despondent. Dr. Casolaro attributed
- Casolaro's remarks to a desire to convince the would-be publisher of
- the importance of extending a book contract to him. Casolaro had been
- immersed in the Inslaw case for over a year and had been unsuccessful
- in two proposals to the publishing firm of Little, Brown & Co.
-
- The clamor for a fuller investigation caused an autopsy to be
- subsequently performed on Casolaro, an action that Assistant Berkeley
- County prosecutor Cynthia Gaither said was not hindered by the
- previous embalming.
-
- Casolaro was buried on Friday, October 16th after a funeral service
- at St. Ann's Catholic Church in Arlington, Virginia attended by over
- 100 people.
-
- At a press conference held on Thursday, August 15th, Dr. James Frost,
- assistant West Virginia medical examiner, said that, while the
- results of the examination bore out the preliminary findings of
- suicide, the investigation would be continued. Brining and Gaither
- also participated in the hour-long press conference held in the
- meeting room of the Martinsburg City Council.
-
- Newsbytes has obtained conflicting reports on the state of Casolaro's
- mental condition. A California free-lance journalist, Virginia
- McCullough, with whom Casolaro had allegedly shared information, told
- Newsbytes, "It is ludicrous to think that Danny took his life. He was
- excited about his new contact and said that 'For the first time I
- really believe that the government was involved.'" McCullough,
- herself, claims to be the victim of a government action that drove
- her electronics firm into bankruptcy and she is presently writing a
- book on her case and other similar cases, including Inslaw.
-
- McCullough's comments on the unlikelihood of a Casolaro suicide were
- echoed in quotes from Pat Clawson, president of Washington-based
- Metrowest Broadcasting Co., and Richard O'Connell, editor of the
- Washington Crime News, a newsletter published in Arlington, VA. Nancy
- Hamilton, vice president of Inslaw, also took issue with the suicide
- finding telling the Martinsburg Morning Journal, "We don't accept
- that. They are saying that here is a man, totally sober, mutilating
- himself."
-
- Martinsburg residents interviewed by Newsbytes paint a slightly
- different picture and depict Casolaro as seemingly depressed and
- drinking pitchers of beer by himself in a local Pizza Hut on the
- Thursday evening before his death (although a wine bottle was found
- in his room, there was no evidence of alcohol found in the body by
- the autopsy). Additionally, a Washington Post piece of Saturday,
- August 17th by Gary Lee and Robert O'Harrow, Jr., shows Casolaro to
- be debt-ridden and despondent. According to the Post report,
- "Casolaro had no independent means of income and had invested heavily
- in the book project for at least eight months, financing several
- trips to the West Coast and long-distance telephone calls."
-
- The Post article also revealed that Casolaro's sister had committed
- suicide in California 20 years ago. While confirming the sister's
- suicide and his brother's financial difficulties, Dr. Casolaro said
- that these facts still did not support a conclusion of suicide for
- his brother. He told the Post, "Danny was the sort of guy who was
- always broke but he knew that he had a lot of resources for money in
- the family if he needed it."
-
- Dr. Casolaro also told the Post that he had received a call from a
- man who purported to have met with Casolaro in Martinsburg on the day
- before the death and turned over documents relating to computer
- hardware thefts. Dr. Casolaro said that the man was willing to meet
- with investigators under the cloak of anonymity. Newsbytes has
- confirmed, from multiple sources, the existence of the
- contact, a man called "Bill," but has not yet obtained information
- concerning the content or the validity of the purported
- documentation.
-
- The so-called "Inslaw Case" began in 1982 when Inslaw signed a $10
- million contract to provide an enhanced version of its case tracking
- software to the U.S. Department of Justice. According to Inslaw,
- shortly after it rebuffed attempts by a company owned by Earl Brian,
- a close friend of former US. Attorney General Edwin Meese, to buy
- Inslaw, the government stopped its contract payments and eventually
- forced the firm into bankruptcy. In January 1988, a federal
- bankruptcy judge upheld the claims of Inslaw President William
- Hamilton and awarded Inslaw damages of $6.8 million, saying that the
- Justice Department has stolen the Promis software by "trickery, fraud
- and deceit." A second federal judge later upheld the ruling.
-
- The Justice Dept. continued to appeal the verdicts and, on May 7,
- 1991, was successful when the U.S. Court of Appeals ruled that the
- bankruptcy court had claimed extraordinary and improper jurisdiction
- in the case. The court said that Hamilton was free to pursue his
- claims in the proper federal court and that the Justice Department's
- "conduct, if it occurred, is inexcusable."
-
- During the appeal process, Inslaw broadened its charges to claim that
- Iran Contra figures Robert McFarlane and Richard Secord had played a
- role is disseminating the software to intelligence agencies of
- Israel, Libya, Iraq, South Korea, and Canada. These charges were
- substantiated by Ari Ben-Menashe, who claims to be a former Israeli
- intelligence officer, Iranian arms dealer Richard Babayan, and
- Michael Riconosciuto, who said that he was hired to modify the
- software for use in law enforcement and intelligence agencies
- worldwide.
-
- Riconosciuto, who was arrested in March of this year and is being
- held in the state of Washington, also claimed to be involved in a
- now-defunct joint venture between the Wachenhut Corp. of Coral
- Gables, FL and the Southern California Cabazon Indian tribe.
- According to Riconosciuto's affidavit, the joint venture developed
- sophisticated weapons for the Contras. McFarlane and Brian have
- denied all charges.
-
- There have also been reports that the software, allegedly used by the
- foreign intelligence services for maintaining dissidents, contained a
- "Trojan horse" that would allow U.S. security agencies to have
- undetected access to the computer system of the foreign agency. It
- was also revealed during this time that Inslaw President Hamilton is
- a former employee of the National Security Agency (NSA).
-
- As the long appeal process continued, the House Judiciary Committee
- under Chairman Jack Brooks (D-Tex.) began its own investigation of
- the case and became embroiled in a year-long battle with then
- Attorney General Richard Thornburgh who refused to turn over Justice
- Department documents to the committee. Shortly before Thornburgh's
- departure to run for the Senate from Pennsylvania, an agreement was
- reached between the committee and the Justice Department on the
- release of certain documents and the investigation is now continuing.
- During the controversy, another former U.S. Attorney General, Elliot
- Richardson, now serving as counsel for Inslaw, said, "Evidence of the
- widespread ramifications of the Inslaw case comes from many sources
- and keeps accumulating. It remains inexplicable why the Justice
- Department refuses to pursue this evidence and resists cooperation
- with the Judiciary Committee of the House of Representatives."
-
- On Wednesday, August 14th, Richardson called for a federal
- investigation of Casolaro's death and was quoted as suspecting murder
- in the case.
-
- In an interview with Newsbytes, an investigative reporter who has
- been tracking Inslaw and related cases for a few years said that he
- had met with Casolaro within the last six months and that Casolaro
- had no material at that time that the investigative reporter deemed
- as new. The reporter, speaking to Newsbytes under the promise of
- non-attribution, also said, "I believe that the Justice Department
- stole Inslaw's software. I have not seen, however, compelling
- evidence to support the charges that it was linked to the so-called
- 'October Surprise.'"
-
- ------------------------------
-
- Date: Thu, 21 Mar 91 20:39:31 PST
- From: hkhenson@CUP.PORTAL.COM
- Subject: File 8--Memes, Gurus, and Viruses
-
- //Moderators' note: Keith Henson wrote the following, and we liked it
- so he gave permission to print it. He subtlely addresses the issue of
- information processing and power, which directly raises some of the
- political and cultural dangers of cyberspace. There are many issues
- to develop further here, and we encourage readers to develop them and
- send them over//.
-
-
- The Guru Trap
- Or
- What Computer Viruses Can Tell Us About Saddam Hussein
- (By H. Keith Henson)
-
- Over the past 10 years Iraq started two disastrous wars. Making an
- incredible error in judgment, they invaded Iran, a country with almost
- three times their population. With Kuwait, they picked a smaller
- country, but failed entirely to predict the response from the rest of
- the world. They continued to delude themselves, believing that other
- countries would not fight, even up to the eve of the ground invasion.
- As irrational as their actions were, they were far from unique. Most
- wars of this century have similar origins, origins which I propose can
- be understood, and perhaps avoided in the future.
-
- Many people hold the informal opinion that Saddam Hussein is insane.
- In a company which includes Hitler, Pol Pot, and Jim Jones, I believe
- this opinion is technically correct. In my view Saddam is a victim of
- a group situational psychosis called "the Guru Trap." The people
- around Saddam, and to a lesser extent the whole population of Iraq,
- are also direct victims of the group psychosis. The population of
- Kuwait and the rest of the world are indirect victims of the effects
- of the trap.
-
- I cannot explain how groups of people fall into the Guru Trap without
- introducing a number of concepts from memetics. Memetics (from meme,
- a word coined by evolutionary biologist Richard Dawkins) is the study
- of why and how information patterns are replicated in human minds.
- The patterns themselves are called memes (rhymes with schemes). You
- can think of a meme as an idea (or sometimes a connected set of ideas)
- which are passed on from person to person. A passing idea which is
- not communicated to another fails to be a meme. A really successful
- meme spreads out to vast numbers of human minds, and some memes have
- major effects on the behavior of the people so infected.
-
- Consider baseball as a meme. You could determine that a certain
- person had (or was infected with) the baseball meme if they were able
- to teach a group of children who had never seen baseball to play a
- recognizable game.
-
- To explain why information is replicated in human minds requires a
- little background in human evolution, and the strategies we
- large-brained, tool-using primates have used so successfully to spread
- all over the world.
-
- However far back this discussion reaches, the goal of understanding
- the origin(s) of war is certainly worth the trouble. It is virtually
- impossible to make progress on problems we do not understand. It is
- historical fact that no significant progress was made in controlling
- the epidemics which, time after time, swept over the world until it
- was at long last understood that epidemics are caused by
- microorganisms. Without an understanding of the root causes of war,
- activities we undertake to prevent war are unlikely to have the
- desired effect. Demonstrations strike me as about as effective as
- praying for relief from the plague in a 14th-century, rat-infested
- church, and as likely to succeed.
-
- How should we go about trying to understand the origin of wars? Marvin
- Minsky (one of the founders of the field of artificial intelligence)
- contends in Society of Mind that the expansion of human knowledge
- comes about almost entirely through analogy. I agree with him. We
- come to a crude understanding of some phenomenon by saying that it is
- similar to something we already understand. We then reduce the
- differences between our rough model and what we are trying to
- understand by a process of refining. After a while, we may be able to
- use our new understanding as an analogy to help understand some new
- problem.
-
- Another advantage of analogy is that it allows us to roughly
- understand problems which are very complex or so close to us that they
- are hard to see. Computers (at this stage of their development) are
- much simpler than humans. And yet, they are plagued by parasitic
- "worms" and "viruses" which share many of the properties of a
- dangerous class of memes. These computer parasites are patterns of
- information which instruct the computers they find themselves in to
- replicate the worms and viruses in ways that will sooner or later
- infect another computer. In a very similar fashion, some memes
- include explicit or implicit instructions of "teach me to others" (or
- sometimes "impose me on others!").
-
- Computer parasites can replicate in computers because computers have
- been designed to (among other things) make copies of data and
- programs. The parasites take advantage of these features. Some
- computer viruses (after a certain number of replications) wipe the
- hard disk. That is a fairly close analogy to suicide!
-
- Human minds have been wired up by evolution to copy information as
- well. The origin of this skill is apparent in our closest relatives,
- the chimpanzees. As Jane Goodall has documented, chimpanzees groups
- have primitive cultures. They pass on complex skills such as fishing
- for termites which even involve making tools. It takes many years of
- imitating, that is, copying the behavior of other chimpanzees, before
- a young chimpanzee becomes proficient at living in the wild.
-
- Our line's success in living all over the world is directly dependent
- on our ability to pass on a great deal of information about how to
- cope with the local environment from one generation to the next. In
- other words, the success of humans is dependent on memes, which in the
- aggregate constitute culture.
-
- The great majority of the memes we pass from generation to generation
- are helpful, just as most data copied by computers is intentional.
- These are memes that direct behaviors such as how to chip rocks, make
- shoes, or which berries to pick. Other memes, such as tunes and fads,
- seem to be mostly harmless. Rumors are another class of sometimes
- harmless memes. Long established religions can be considered as
- defenses against some harmful memes.
-
- Like computers, our strongest point is also a serious weakness. We can
- be infected with memes which (like a computer virus) can do serious
- damage to us, kill us, or induce us to kill others. Here the analogy
- between computer viruses/computers and memes/humans is limited.
- Computers almost never make an error copying a virus; memes,
- especially those committed to paper, can be copied into new minds
- fairly accurately, but they can also mutate wildly, sometimes at every
- transfer. So, a relatively harmless belief (i.e., some complex of
- memes) which is passed around in a close group can become more
- destructively out of step with reality at each turn. This is
- especially true when the memes are cycling between a leader and a
- group of followers who for one reason or another are strongly
- motivated to please the leader. This is the Guru Trap. (And also the
- classic "kill the messenger who brings bad news" problem.)
-
- An example of the distortion information can go through in just one
- transfer comes from the example just before the invasion last August.
- Saddam asked the US Ambassador if the US had any opinion on the border
- dispute between Kuwait and Iraq. The Ambassador said that was
- considered an Arab problem, which Saddam took to mean that it didn't
- matter to the US if they moved their border over to Saudi Arabia.
-
- Runaway infectious craziness episodes are not too common because
- humans and their cultures have evolved some defenses against
- pathological accumulations of memes. Laughter is one defense when
- someone starts stating ideas wildly out of line with reality. It is
- easy to understand why this defense failed to control weird ideas in
- Hitler, Pol Pot, or Jim Jones, and hard indeed to imagine someone
- laughing (more than once) at one of Saddam's ideas. In some cases,
- almost anything the leader utters becomes a meme, is written down, and
- transmitted to large numbers of followers.
-
- Just like infectious diseases, Guru Trap episodes seem to be less
- common in the more advanced countries of the world. When they do
- occur, they tend to be labeled "religious" instead of "political." It
- is only preliminary speculation, but "meta- memes" may be involved.
- Meta-memes are reasoning skills such as logic and the scientific
- method. These "memes-people-use-to-judge-other-memes" are relatively
- wide spread in the more advanced countries.
-
- There are several conditions which seem to predispose a leader go fall
- into the Guru Trap. A low level of education is one of them. It
- seems to be harder for an educated person to accept being worshipped
- for very long, perhaps because education conveys to people just how
- little they do know. Most examples of the Guru Trap I have noted in
- western countries tend to have relatively uneducated followers as
- well. There are exceptions; the Rajneesh cult was one.
-
- Economic dislocations seem to be a factor in the rise of some memes.
- Nazism originated in an economic hard times; and closely related memes
- began to infect more people during recent hard times in the Western
- US. There may be very simple reasons, having to do with resentment
- against "them" for job loss, combined with a lot of idle time to
- contract an information disease.
-
- I suspect that exposure to a lot of modern advertizing may raise a
- population's resistance to being sucked into the Guru Trap. A
- culturally uniform population should be more susceptible than a
- heterogeneous one for the same reasons a heterogeneous genetic
- population is less susceptible to being wiped out by epidemic disease.
-
- It is a common occurrence for leaders and followers deep in the Guru
- Trap to become lawless. The central meme(s) they are infected with
- become so important in their minds that matters of legal conduct drop
- out of their consideration. This seems to be an almost universal
- problem with gurus and their followers in intense "cult"-type
- situations. Lawlessness by a small cult leads to the legal process
- being invoked, a fairly common end to many small-scale cults. This
- was the fate of the LaRouche cult. On the nation-state scale,
- lawlessness eventually provokes a response from other nations.
- Because the system was primed by the example of Hitler, the response
- came sooner rather than later for Saddam.
-
- Intense positive feedback in guru-trap situations leads to memes that
- get entirely out of step with reality. This makes leaders (and
- groups) in the trap unpredictable. Hitler's successes and later
- downfall were both dependent on making illogical (and therefore
- unexpected) military moves. The blitzkrieg through a forest against
- France was unorthodox--and worked. Opening a second front by
- attacking the Soviet Union, and then dithering till winter set in to
- go after Moscow was monumentally stupid. It would not have been
- tolerated by his generals except for the fact that Hitler's previous
- unorthodox orders had worked.
-
- Saddam's behavior in occupying and trying to hold Kuwait against the
- forces which took it back was pathologically divorced from reality.
- This is an effect of circular information flow. Real information on
- the state of his military machine, especially after being mauled from
- the air, was either not presented or not believed by Saddam. I
- suspect that as you got closer to the bottom of the hierarchy the true
- conditions became more and more apparent. If they had not been
- worried about reprisals on their families back home, the Iraqi troops
- might well have given up before the ground assault. (Some did
- anyway.)
-
- The end game of a nation-state Guru Trap varies. Sometimes, as
- happened to the USSR, the original guru(s) hang on till they die and
- are replaced. Eventually information started leaking into the system
- >from outside. A society divorced from physical and social reality
- falls further and further behind societies which are not trapped. It
- was the discovery of the true economic state of the Soviet Union by
- Gorbachev which kicked off glasnost and perestroika. From what one
- can see at this distance, Gorbachev has managed to stay out of the
- Guru Trap, a feat which impresses me as much as anything else he has
- done.
-
- In other cases, reality comes down hard, as in bombs and artillery
- shells. One class of response is the "Gotterdamerung" response: "if
- I can't be the guru, nobody else will either." Hitler and the Rev. Jim
- Jones took that route. Once it became unavoidable knowledge that they
- were going to be beaten, Hitler ordered the entire country wrecked.
- He was thwarted by Albert Speer, who felt guilty at the time for not
- obeying his guru. Hitler ended his days with poison and a gun in a
- bunker.
-
- The Jim Jones affair came to a similar end. A US senator showed up to
- investigate reported gruesome conditions in a cult in the jungle.
- After having the senator shot, Jones ordered a long- rehearsed mass
- suicide, where over 900 people drank poison and died. (Jones took
- poison, but shot himself before it had time to act.)
-
- This is not the only possible outcome, but it is a likely one given
- Saddam's history. If Saddam does not end his days like Hitler and Jim
- Jones, he may be tried and possibly hanged by a Nuremberg-type court.
- However, if I were in charge of his defense, I would try to get him
- off as insane, a victim of his own brutal and unstable nature and the
- overpowering amplification of the Guru Trap. (It probably wouldn't
- work, but it might get the "meme about memes" more widely known.)
-
- Perhaps an understanding of memetics would permit organizations,
- including governments, to watch for emerging Guru Trap situations.
- They might issue "memetic epidemic warnings" reports for places around
- the world the way the Center for Disease Control does for cholera. If
- we were able to see dangerous conditions emerging, we might be able to
- take reasoned and effective actions before a war grows out of a Guru
- Trap gone lawless. Even if we cannot take positive actions, at least
- we would know which emerging gurus we should quit helping. (Though it
- might not have helped in the case of Saddam. There were about 2-1/2
- Guru Traps going in adjacent countries, and it was not obvious at the
- time which were the most dangerous.)
-
- Understanding memetics and the Guru Trap gives me more of an
- appreciation of the empirical progress we made in creating good
- government. It has been a very long time since a western democracy
- went to war with another western democracy. When they do go to war,
- it usually requires considerable provocation. This was true even in
- the case of Vietnam. Not the Gulf of Tonkin event, the provocation
- was in the form of the grisly stories which came from the people who
- fled from North Vietnam when those infected with the local version of
- the Marxist-Leninist meme took over. (For extra credit the reader can
- do a memetic analysis of the Vietnam war. Use at least three
- meme-infected groups and two Guru Traps in the analysis.)
-
- The knowledge that epidemics are caused by microorganisms allowed us
- to control them. In the last hundred years we have come a long way
- toward keeping germs out of people through sanitation and clean water.
- We have also built up resistance to germs by vaccinating people. The
- result has been a massive reduction in human misery.
-
- If, as I have proposed here, most wars are an outcome of a Guru Trap,
- a similar reduction in human misery could come about from an
- understanding of memetics and human vulnerability to memes. Educating
- people about these topics should raise the resistance of leaders and
- followers alike to being sucked into the Guru Trap. It is my hope
- that the conditions leading to wars could be detected early, or better
- yet, never happen.
-
- +++++++++++++++
-
- Mr. Henson is a local hardware/software consultant. He has been
- infected by a number of memes including the space colony meme which
- originated with Dr. O'Neill of Princeton in the early '70s, the
- nanotechnology/cryonics meme reported on in West Magazine recently,
- and, of course, the meme about memes. He is a founder of the L5
- Society, a Senior member of IEEE, and has been widely published on a
- number of topics--including memes.
-
- ------------------------------
-
- End of Computer Underground Digest #3.31
- ************************************
-