home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun June 7, 1992 Volume 4 : Issue 25
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Associate Editor: Etaion Shrdlu, Jr.
- Newest Authormeister: B. Kehoe
- Arcmeister: Bob Kusumoto
- Downundermeister: Dan Carosone
-
- CONTENTS, #4.25 (June 7, 1992)
- File 1--Detailed Summary of X-Press (Response to CuD 4.24)
- File 2--Study of E-Mail/Computer-Mediated Communication
- File 3--Major Congressional Candidates Commit to Elec. Civil Liberties
- File 4--Internet Society Details
- File 5--GEnie RTC with Hafner (Co-author of CYBERPUNK)
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie in the PF*NPC RT libraries, on
- the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from
- ftp.eff.org (192.88.144.4), chsun1.spc.uchicago.edu, and
- ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail
- with the subject "help" (without the quotes) to
- archive-server@chsun1.spc.uchicago.edu. European distributor: ComNet
- in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to
- computer culture and communication. Articles are preferred to short
- responses. Please avoid quoting previous posts unless absolutely
- necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Fri, 5 Jun 92 04:48 EST
- From: "Michael E. Marotta" <MERCURY@LCC.EDU>
- Subject: File 1--Detailed Summary of X-Press (Response to CuD 4.24)
-
- In CUD #4.24, the transcript of Cisler's forum on Genie mentioned
- X-Press. Here is a more detailed description of what X-Press is.
-
- ++++++++++++++++++++++++++++++
-
- Excerpts from: "Connecting Your Computer to Cable TV
- Doubles the Dimensions of Cyberspace"
- by Michael E. Marotta
- (originally published Aug 1991 by TELECOMPUTING, Albuq, NM)
-
- X-PRESS Informations Services, Ltd., of Denver Colorado, makes it
- possible for your home computer to receive and store news via cable
- (or satellite) television. X-PRESS X-Change is their basic service;
- they also sell an "executive" connection geared to businesses.
-
- X-PRESS X-Change is a basic consumer information service provided by
- cable television companies to personal computers. The service is a
- constant stream of worldwide news, sports, and weather supplemented
- with articles on lifestyle, shopping, and entertainment. Conferencing
- with other users is also possible.
-
- International news is the key feature of X-Change. In addition to the
- Associated Press, there are nine other news feeds. Tass and Xinhua
- send news in English from the USSR and China. English-language news
- also comes from OPEC, Taiwan and Japan. NOTIMEX sends out news in
- Spanish from Mexico. User can define up to 16 keywords for which the
- computer will automatically scan. The results can be stored to disk
- for later evaluation.
-
- The service is generally compatible with IBM-PC, Apple // and
- Macintosh, Atari and Amiga computers. It is most compatible with
- IBM-PCs including the XT, AT and PC/2 lines. To run with an Apple //c
- or //e, requires a super serial card. As you would expect, only the
- Atari-ST series can be used and Amiga owners must have a 500, 1000 or
- 2000. This is a 16-bit service.
-
- Also, there are some differences in the kinds of special features the
- various kinds of personal computers will support. For example, all of
- them will news and stock quotes and all can write news stories to disk
- for future reference. However, only IBM, Atari and Amiga systems can
- accept futures and options information.
-
- To connect to X-Change, you buy an interface kit for $99.95. If your
- cable television service already offers X-change there is no other
- charge. Executive service costs $19.95 per month. The cost of the
- modem is higher, also, $149.95. If your cable television provider
- does not carry X-Change and doesn't want to, then you can use a
- satellite dish. The signal comes from Galaxy-1 transponders 7 (WTBS)
- and 18 (CNN) but you don't have to subscribe to these to use the
- InfoCipher equipment. Via satellite the Executive service costs
- $26.95 per month.
-
- Both the Executive and basic products give you access to financial
- information. For instance basic service includes the ability to track
- 128 symbols from 2000 securities. X-PRESS Executive provides quotes
- on 30,000 securities. In addition, stocks, Treasury rates, CDs,
- Broker Call Loans and foreign exchange rate, and selected metal prices
- are also available. X-PRESS also provides software for tracking and
- analyzing financial data. The output is compatible with Lotus 1-2-3.
-
- Conferencing is also possible. X-PRESS clients can dial in via a
- Tymnet 800 number. Users can read and post messages in several areas.
- X-PRESS then selects messages to be posted on the television feeds.
- The "Pen Pals" conference is popular with grade schoolers. High
- school students benefit from a "Science and Technology" conference
- that leans toward NASA activities. Thus, X-PRESS is basically a BBS
- via cable television or satellite. Of necessity, the information flow
- is generally one way, from X-PRESS to you.
-
- ------------------------------
-
- Date: Fri 53 Jun 1992 17:22:51 CST
- From: Jim Thomas<tk0jut1@niu.bitnet>
- Subject: File 2--Study of E-Mail/Computer-Mediated Communication
-
- A novel study is being proposed by a number of participants of the
- bitnet Computer-Mediated Communication (CMC) newsgroup. It may be the
- first such study--done by researchers scattered around the world who
- have never met--of its kind. The CMC forum focuses on academic
- discussions related to the impact of computer and related technology
- on forms, content, and structure of communication. Those interested
- can subscribe by sending the command: JOIN CMC <name> to:
- COMSERVE@RPIECS Here is a summary of the research:
-
- ++++++ original post follows +++++++
-
-
- Date- Wed, 3 Jun 1992 19-19-00 IST
- From- Sheizaf Rafaeli <KBUSR@HUJIVM1.BITNET>
- Subject- E-Group study update
-
- E-Groups study, outline #3, update
-
- As promised, here is a short summary of what has happened (for those
- tuning-in late):
-
- It began with a discussion of the dynamics of discussions. David
- Levine, of UC Berkeley, proposed a 'bad posts drive out good'
- postulate, that ignited many of us. A group of us have agreed to
- attempt a joint study of the longevity and process of e-group
- discussions.
-
- We are now doing two things:
-
- 1) Mobilizing: identifying participants and collecting 'pledges'.
- 2) Conceptualizing: identifying research questions and hypotheses,
- with an eye toward a study or two.
-
- There seem to be, in the works, two parallel efforts. One line of
- inquiry will be qualitative. The purpose in this study will be an
- in-depth analysis of the dynamics occuring within a list. Prof. Brenda
- Danet will, I hope, fill in more details on this effort.
-
- The second project is shaping up to be a content-analysis of a
- representative sample of archived discussions, which may (later) be
- linked to surveys of users, moderators, participant observations, etc.
- Under discussion are the hypotheses such a data set can address.
-
- The e-group content analysis is an attempt to quantify group behavior
- (formation, cohesion, dispersal) on e-lists. The hypotheses suggested so
- far predict sensitivity of the threads of discussion to combinations of
- the following variables:
-
- * Length of messages
- * language of message
- * presence and nature of subject header
- * presence and nature of stylized signature
- * writer status
- * writer gender
- * dependency on previous messages (posts)
- * use of quotes from previous posts
- * tone (sarcasm, information, plea, threat, support, 'lecture')
- * use of questions, challenges
- * extent of use of nonverbal cues in message
- * presence of "flames"
- * metacommunication, that is communication about communication
- * personal interest vested in post
- * reference to external communication sources
-
- We intend to 'massage' these concepts into a workable codebook. If the
- numbers of participants stay where they are right now, the onerous
- nature of content analysis grunt work wont even be that bad. We should
- be able to generate reliable data.
-
- The codebook will then be used to content-analyze series of messages.
- Hopefully, we will end up with enough data to identify threads of
- discussions, and "communities" forming, lasting and/or disbanding.
- Eventually, if this works, we'll have at least two products on our
- hands:
-
- a. a large data set all can dip into.
- b. the experience of having collaborated without meeting.
-
- I believe either of the two is good enough reason to try.
-
- Under discussion, currently, are:
-
- 1) Hypotheses and research questions.
- 2) Items for inclusion in the codebook.
- 3) Individual lists for inclusion in the sample,
- or - alternatively - a method for selecting lists.
-
-
- Nothing is set in stone yet. It is all, literally, bits in the wind. So
- join in, Please!
-
-
-
- Sheizaf Rafaeli
- Hebrew University of Jerusalem
- sheizafr@shum.huji.ac.il
- or KBUSR@HUJIVM1
-
- ------------------------------
-
- Date: Mon, 1 Jun 92 10:59:51 PDT
- From: jwarren@AUTODESK.COM(Jim Warren)
- Subject: File 3--Major Congressional Candidates Commit to Elec. Civil Liberties
-
- Five Leading San Francisco Peninsula Congressional Candidates Sign
- Explicit Commitments to Protect "Electronic Civil Liberties"
-
- All but one of the six leading candidates for California's 14th
- Congressional District have formally committed to protect traditional
- constitutional liberties against technological threats. All three
- Republican candidates and two of the three leading Democratic
- candidates signed formal commitments.
-
- The 14th District covers northern "Silicon Valley" and the southern
- half of the San Francisco Peninsula.
-
- This is believed to be the first time that major-party congressional
- candidates have ever committed to explicit action to protect
- technology-related civil liberties.
-
- The candidates' signed statements that were much more than
- nice-sounding, equivocating "God, mother and apple-pie" principles.
- They made explicit commitments to take explicit action in their
- first/next term in Congress.
-
- Those 14th Dist candidates who signed the formal statement (below)
- included:
- Dixon Arnett (R), Tom Huening (R), Ted Lempert (D),
- Tom Nolan (D), Mike Maibach (R) and Chuck Olson (L).
-
- Gerry Andeen (D) sent a statement about the issues, but made NO
- COMMITMENTS.
-
- Anna Eshoo (D) FAILED TO RESPOND AFTER FOUR REQUESTS, as did
- then-candidate James Blackman (D), after three requests. The multiple
- requests were faxed and mailed to the candidates between Apr. 4th and
- Apr. 13th, along with an explanatory cover letter.
-
- Lempert was the first to respond -- apparently by return mail -- and
- added a two-page statement regarding technological threats to personal
- privacy and his commitment to seek protection against them, as well.
-
- Arnett's response also noted that he was one of the cosponsors of
- the Privacy Section that was added to the California Constitution
- during his tenure in the state Assembly.
-
- In addition, ten other Libertarian candidates signed the formal
- statement, apparently circulated by Libertarian activists, primarily
- using the computer nets. Those signing included:
- Alan F. Barksdale (U.S. Senate from Alabama),
- Richard Boddie (U.S. Senate from California),
- James Elwood (8th House Dist from California),
- June R. Genis (U.S. Senate from California),
- Robert D. Goodwyn (22nd California State Assembly Dist),
- Chuck Hammill (47th California State Assembly Dist),
- James J. Ludemann (California State Assembly),
- George L. O'Brien (12th House Dist from California),
- Anton Sherwood (12th California State Assembly Dist),
- Mark Valverde (13th California State Assembly Dist) and
- Will Wohler (3rd California State Senate Dist).
-
- Note: This Libertarian sign-up resulted entirely from one copy
- being sent by electronic-mail to June Genis (San Mateo County) and one
- to Mark Hinkle (Santa Clara County activist).
-
- Several others responded without committing to action:
-
- U.S. Senate candidate Tom Campbell (R) also sent a statement about
- the issues, but offered NO COMMITMENTS TO EXPLICIT ACTION, as did
- Glenn Tenney (D, 12th House).
-
- This effort was an outcome of disclosures before and during the
- First Conference on Computers, Freedom & Privacy, held near San
- Francisco International Airport in March, 1991. It drew over eighty
- pages of public and trade press coverage, internationally.
-
- This is the statement that was signed by the indicated candidates:
-
- Guaranteeing Constitutional Freedoms into the 21st Century
-
- Preface
-
- Harvard Law Professor Laurence H. Tribe, one of the nation's
- leading Constitutional scholars, views technological threats to our
- traditional constitutional freedoms and protections as so serious that --
- for the first time in his career -- he has proposed a Constitutional
- Amendment:
-
- "This Constitution's protections for the freedoms of speech,
- press, petition and assembly, and its protections against unreasonable
- searches and seizures and the deprivation of life, liberty or property
- without due process of law, should be construed as fully applicable
- without regard to the technological method or medium through which
- information content is generated, stored, altered, transmitted or
- controlled."
-
- -- First Conf. on Computers, Freedom & Privacy, 3/27/91, Burlingame CA
-
- In the absence of such a constitutional clarification, legislation
- and regulation are the only alternatives to assure that citizens are
- protected from technological threats against their constitutional
- rights and freedoms.
-
-
- Candidate's Commitment to Action
-
- Preface: It has been over two centuries since our Constitution
- and Bill of Rights were adopted. The great technological changes in
- the interim --especially in computing, telecommunications and
- electronics -- now pose a clear and present danger to the rights and
- protections guaranteed in those great documents. Therefore:
-
- Commitment: In the first legislative session after I am
- [re]elected, I will author or co-author legislation reflecting the
- following specifics, and I will actively support and testify in favor
- of any similar legislation as may be introduced by others. Further, I
- will actively seek to include in such legislation, explicit personal
- civil and/or criminal penalties against any agent, employee or
- official of the government who violates any of these statutes. And
- finally, I will keep all citizens who express interest in legislative
- progress on these matters fully and timely informed.
-
- The protections guaranteed in the Constitution and its Amendments
- shall be fully applicable regardless of the current technology of the
- time. This particularly includes, but is not limited to:
-
- Speech: Freedom of speech shall be equally protected, whether by
- voice or in written form as in the 18th Century, or by electronic
- transmission or computer communication as in the 20th Century and
- thereafter.
-
- Press: Freedom of the press shall be equally protected, whether
- its information is distributed by print as in the 18th Century, or by
- networked computers or other electronic forms, as in the 20th Century
- and thereafter. Liability for content: Just as a printer is not
- liable for content of leaflets printed for a customer, so also shall
- the owner or operator of a computer or electronic or
- telecommunications facility be held harmless for the content of
- information distributed by users of that facility, except as the owner
- or operator may, by contract, control information content. Those who
- author statements and those who have contractual authority to control
- content shall be the parties singularly responsible for such content.
-
- Assembly: Freedom of assembly shall be equally protected, whether
- by face-to-face meeting as in the 18th Century, or by computer-based
- electronic-conference or other teleconference as in the 20th Century
- and thereafter. The right to hold confidential meetings shall be
- equally protected, whether they be by personal meeting in private
- chambers, or by computer-assisted or electronic-based means.
-
- Self-defense: The right of the people to keep and use computers
- and communications connections shall not be abridged by the
- government.
-
- Search & seizure: The right of the people to be secure in their
- papers and effects, against unreasonable searches and seizures, shall
- be fully applicable to their electronic mail, computerized information
- and personal computer systems.
-
- Warrants: No warrants for search or seizure shall issue for
- computerized information, but upon probable cause, supported by oath
- or affirmation, and particularly describing the computer system to be
- searched and the specific information to be seized.
-
- Secure information vaults: Just as search and seizure of letters in a
- post-office, and papers in a bank-vault lock-box, and surveillance of
- telephone conversations by wire-tap, each require a separate warrant
- for each postal address, lock-box and telephone line, so also shall a
- separate warrant be required for each electronic-mail address and/or
- computer files of each suspect, when stored in a computer facility or
- archive shared by others. And further, computer files stored in a
- shared facility or archive by or for a citizen who is neither named in
- a warrant nor associated with a suspect so-named, may not be used
- against that un-named citizen, if seized or discovered during legal
- search of or for files of a suspect.
-
- Self-incrimination: No person shall be compelled in any civil or
- criminal case to be a witness against himself or herself, nor be
- compelled to provide information retained only in their mind, nor
- otherwise be compelled to assist the translation or decoding of
- information that he or she believes may be self-incriminating.
-
- Property: Private property shall not be taken for public use without
- just compensation, nor shall such property be used nor sold by any
- government agency for less than fair market value, in which case all such
- proceeds shall promptly derive singularly to its last owner prior to
- government seizure.
-
- Speedy release: Anyone not accused of a crime shall enjoy the
- right to a speedy release and return of all of their property, as may
- be seized under any warrant, particularly including their computerized
- information. The government shall be fully liable for any damage
- befalling property or information they have seized.
-
-
- [ Additional copies of this model candidate's position commitment are
- available from:
- Jim Warren, Electronic Democracy Initiatives,
- 345 Swett Road, Woodside CA 94062; (415)851-7075, fax/(415)851-2814;
- electronic-mail/ jwarren@autodesk.com -or- jwarren@well.sf.ca.us
- For identification purposes, only: organized and chaired the First
- Conference on Computers, Freedom & Privacy (3/91), received one of the
- Electronic Frontier Foundation's first Pioneer Awards (3/92), is a
- "futures" columnist for MicroTimes, an Autodesk Board member, the founder
- of InfoWorld, PBS-TV "Computer Chronicles" founding host, etc. ]
-
- ------------------------------
-
- Date: Tue, 2 Jun 1992 17:54:44 GMT
- From: NEELY_MP@DARWIN.NTU.EDU.AU(Mark P. Neely, Northern Territory Univ.)
- Subject: File 4--Internet Society Details
-
- Details of the Internet Society for the readers of CuD:-
-
- >From: Geoff Huston <G.Huston@aarnet.edu.au
-
- >The Internet Society Newsletter is a publication of the Internet
- >Society, sent to members of the Internet Society free of charge.
-
- >To receive a subscription you need to join the Internet Society
- >as a personal member. Regular membership is $70 US p.a. and
- >student membership is $25 US p.a. The Internet Society is a
- >non-profit professional society whose objective
- >is facilitate and support the technical evolution of the
- >Internet as a research and education infrastructure.
-
- >To join send you details (name, address, email) to the Internet
- >Society at
- >isoc@nri.reston.va.us
-
- >cheers
-
- >Geoff Huston
-
- ------------------------------
-
- Date: 30 May 92 21:08:09 EDT
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 5--GEnie RTC with Hafner (Co-author of CYBERPUNK)
-
- ______________________________________________________
- | |
- | The Public Forum * NonProfit Connection RoundTable |______
- |______________________________________________________| |
- | Sysops' GE Mail: PF$ RTC Sunday 9pm EDT: MOVE 545;2 |______
- |___________________________________________________________| |
- | News, Current Events, Government, Societal Issues, Nonprofits |
- |________________________________________________________________|
-
- Real-time Conference on Cyberpunk
- with
- Katie Hafner
- (May 24, 1992)
- ====================================================================
-
- (C) 1992 by GEnie (R) and Public Forum*NonProfit Connection
-
- This file may be distributed only in its entirety
- and with this notice intact.
-
-
- CYBERPUNK: Outlaws and Hackers on the Computer Frontier has intrigued
- everyone from William (Neuromancer) Gibson to Mitch (Lotus Development)
- Kapor.
-
- On May 24 at 9pm ET, author Katie Hafner joined us to talk about the
- social consequences of computer networks and the communities that have
- grown up around them. The government has both raided local BBSs and
- solicited proposals for a "weaponized virus." What rules of the road
- would you make for computer networks? Former news editor of Data
- Communications magazine, Katie was correspondent for Business Week
- specializing in technology and computers. A graduate of the University
- of California at Santa Barbara, with an M.A. from Columbia University
- School of Journalism, she's now working on a book about German
- reunification. The New York Times' John Markoff is co-author of
- Cyberpunk.
-
- This RTC is the third in the Public Forum's month-long program on
- Technology and Society. Our next RTC is May 31. And don't miss lively
- discussion of Science, Technology and Society in bulletin board category
- 7, and check out the files on technology and society in our library.
- See Cat 7/Topic 1 for details.
-
- An electronic meeting place for friends, family and national "town
- meetings," GEnie is an international online computer network for
- information, education and entertainment. For under $5.00/month, GEnie
- offers over 50 special interest bulletin boards and unlimited electronic
- mail at no extra charge during evenings, weekends and holidays. GEnie is
- offered by GE Information Services, a division of General Electric
- Company.
-
- In the Public Forum*NonProfit Connection, thousands of people every day
- discuss politics and a wide range of social and nonprofit issues. A
- neutral arena for all points of view, the PF*NPC is presented by Public
- Interest Media, a nonprofit organization devoted to empowering people
- through the socially productive use of information and communication
- technology. For more information about GEnie or the Public Forum, call
- 1-800-638-9636 or send electronic mail to tsherman@igc.org.
-
- To sign up for GEnie service, call (with modem in HALF DUPLEX)
- 800-638-8369. Upon connection, type HHH. At the U#= prompt, type
- XTX88367,GENIE <RETURN>. The system will prompt you for information.
-
- ====================================================================
-
- __________________________________________________________
- -=(( The Public Forum * NonProfit Connection RoundTable ))=-
- -==((( GEnie Page 545 - Keywords PF or NPC )))==-
- -=((__________________________________________________________))=-
-
-
-
- <SHERRY.PF> I'd like to welcome everyone to the RTC. Katie, why
- don't you say a few words and introduce yourself.
-
- <[Katie] PRESS11> let's see... john markoff (my husband) and i wrote
- cyberpunk over a period... of about three years and
- it came out last summer. but the book isn't cheap, so
- luckily, the papberback is coming out next month
- let's see...what else?....oh yes, now i'm living in
- berlin... most of the time, working on a second book.
-
- <SHERMAN> Let me explain the process here . . . Before we get
- started, a word about the process . . . At the
- beginning, only Katie and people asking questions
- will be able to talk so that everyone gets a turn . .
- If you have a question, type /RAI to raise your
- hand. I'll call on you in order. Please type your
- question, but DON'T hit <return> to send it. When
- you're called on, THEN hit <return> to send your
- question quickly . . . so we'll have time for more
- questions . . . It's good to use three periods if you
- have more to say and to put GA for "go ahead" at the
- end of a final phrase . . . So let's see those
- /RAIsed hands and I'll start calling on you! GA
-
- <[Darryl] D.JENT> Katie, did you actually meet Kevin Mitnick & the
- others in your book ga
-
- <[Katie] PRESS11> yes. i met everyone in the book. the only one who
- didn't cooperate with the book was kevin... kevin is
- the hacker we wrote about in the first section of the
- book... a member of an l.a. gang of phone phreaks and
- hackers called the roscoe gang... he wanted to be
- paid to talk to us, and i explained to him (and his
- grandmother, who was working as his agent...) that
- journalists, for obvious ethical reasons, do not (if
- they're good journalists, that is)... pay sources fo
- information.
-
- <[Gene] G.STOVER> When do you think cyberspace will be available to the
- general public? What part will NREN and ISDN play in
- this? <ga>
-
- <[Katie] PRESS11> it already is... the more bandwidth, the more
- cyberspace! ga
-
- <SHERMAN> After a few more people have had a chance to ask
- questions . . . I'll give everyone a second or third
- or fourthchance . . . <grin> Richard, your question?
-
- <[Richard] R.GILLIAM3> Who was the publisher for each edition?
-
- <[Katie] PRESS11> simon & schuster did the hardcover, and an imprint of
- S&S... called Touchstone is doing the paperback. ga
-
- <[Richard] R.GILLIAM3> Who was your editor at the publishing house. (Sorry
- for my unfamiliarity with the commands)
-
- <[Katie] PRESS11> my editor? a very nice guy who doesn't know a lot
- about technology named Bob Bender ga
-
- <SHERRY.PF> Katie, I read _The Cuckoo's Egg_, and was fascinated
- -- and appalled. Have The Powers That Be become any
- more security conscious, or at least any more willing
- to listen in the event something like that happens
- again?
-
- <[Katie] PRESS11> it's still pretty bad, security-wise out there...
- there are lots of loopholes. everywhere. ga
-
- <[2] eric] E.SHCHNEIDER> did he give you permission to write about him ..... m
-
- <[Katie] PRESS11> no. no one gave us permission. we're journalists, not
- movie producers. ga
-
- <[Andrea] A.DUDA> We read about the really sensational cases of
- hackers. How much of a problem are they overall? And
- in trying to limit their activities, do we lose more
- than we gain (since we limit other, legitimate, users
- as well)?
-
- <[Katie] PRESS11> i think that the press reports that blow the hacking
- incidents out of proportion.... do a real disservice
- to society... that is, i think that now the public at
- large has an exaggerated fear of hackers. in the
- book... we tried to write very realistically about
- what really happened... and i do think that we're
- treading aline between restricting access too much
- and leaving systems too wide open. ga
-
- <[Darryl] D.JENT> Katie, What was your feelings about the chaos club in
- Germany?
-
- <[Katie] PRESS11> i like them a lot... they're very different from
- hackers in the united states, and that was kind of
- interesting...
-
- <[Darryl] D.JENT> How much of their activities did you get to witness
- ga
-
- <[Katie] PRESS11> wau holland, the founder of chaos, is an old 60's
- radical, and a liberatarian who's categorically
- opposed to authority ga
-
- <[Tom] SHERMAN> Katie, did you see Darryl's second qeustion -- how
- much of their activities did you get to witness?
-
- <[Katie] PRESS11> oops. sorry... yeah. i hung out with pengo in berlin
- for several weeks... and of course i witnessed quite
- a bit... he was good (at hacking, that is), but more
- of a talker, really, than anything else... the really
- talented one in that group was probably markus hess,
- the one who was in the berkeley computers and who
- gave cliff stoll such a heart attack... and in the
- end, they all got scared and ratted on each other and
- three of them went to jail (well, hess's parents
- bailed him out) ga
-
- <[Tom] SHERMAN> Katie, who do you think is going to draw that line
- between too little restriction and too much? What
- role does the public play? ga
-
- <[Katie] PRESS11> i guess we have to draw the line... i mean, we are
- all sitting in cyberspace right now, and we're pretty
- much respecting the rules of the road... and if we
- want to keep the feds from telling us what we can and
- cannot do in cyberspace then we have to come up with
- rules that are acceptable to us and to them. ga
-
- <[Andrea] A.DUDA> How do you think the "rules of the road" will change
- when commercial firms become more evident with NREN?
- Are they more concerned about security than
- universities, etc.?
-
- <[Katie] PRESS11> in a way it's too bad because anything that goes
- commercial takes on a formal flavor that can be
- restrictive... but that's not always the case... but
- yes, they are concerned about security, particularly
- because of all the security firms out there telling
- them they should be. ga
-
- <[Andrea] A.DUDA> One of the things I like about the Internet is being
- able to go to various computers for information. Do
- you think the whole system will become more
- restrictive to accommodate the commercial firms?
-
- <[Katie] PRESS11> new technology such as cryptography... will tend to
- make commercialization work because it will make
- breaking into systems more difficult. ga
-
- <[Tom] SHERMAN> Katie, would you say something about the differences
- between European and US regulations governing
- security and privacy -- and the potential for
- problems with the European Community?
-
- <[Katie] PRESS11> the europeans have always (like in all things) been a
- little bit behind the u.s.... in hacking laws. the
- most interesting thing about it is that as soon as a
- country makes it illegal to break into computers...
- then the hacking drops precipitously (or maybe the
- underground goes deeper)... the international folks
- at the ec are already trying to come up with uniform
- laws governing computer security throughout the
- european community. yawn. ga
-
- <[Phillip] P.MAY2> katie, do you feel there is a greater potential for
- abuse of systems from "insiders", i.e. employees of
- companies who implement the systems, or outsiders
- like those described in you r book .? ga
-
- <[Katie] PRESS11> of course there is... it's pretty widely known that
- almost all of the white-collar crime out there that
- uses computers and is most expensive to business is
- committed by insiders... but companies get very
- embarrassed by that... and they tend not to report
- those crimes... they'd rather report crimes that seem
- to be committed by juvenile delinquents... not their
- own people! ga
-
- <[Darryl] D.JENT> What is nren & Katie what is the new book about. More
- hackers or what?... I loved your first book, read it
- in two days ga
-
- <[Katie] PRESS11> national research and education network, designed to
- send data above a gigabit... and tie all the nation's
- supercomputer centers together and it's federally
- funded. the book i'm working on now... is about a
- particular house in gemrany. just over the glienicker
- bride (where all the spies used to be exchanged)...
- in berlin. nothing to do with computers.
-
- <[Tom] SHERMAN> Darryl, check out the article from the Whole Earth
- Review about data highways; it's in our file library
- (with permission, of course :-) Darryl, follow up
- question?
-
- <[Darryl] D.JENT> Sounds interesting still, I'll thanks
-
- <[Richard] R.GILLIAM3> Stock exchanges and currency exchanges are close to
- 24 hour world-wide operation. How possible will it be
- for insiders to undetectable manipulate the
- markets?GA
-
- <[Katie] PRESS11> quite possible. have you heard about the $170
- million or so that disappeared mysteriously from
- volkswagen's books?... this happened a few years
- ago. ga
-
- <[Richard] R.GILLIAM3> No. I haven't heard the VW story. I think the
- potential for financial hacking is enormous GA
-
- <[Katie] PRESS11> i think you're absolutely right... and i think we
- (the public) only hear about a very small fraction of
- the stuff that goes on. ga
-
- <[Tom] SHERMAN> Before we move into open discussion, I want to take a
- second to . . . thank all of you for your question
- and, especially, . . . to thank Katie for joining us!
-
- <[Katie] PRESS11> it was fun! sorry about all my typing blunders :-)
-
- <[Tom] SHERMAN> And now for the winners of our contest . . . Thanks
- to Simon & Schuster, the publishers of CYBERPUNK, for
- donating four copies of the book to our contest
- winners. Thanks to everyone for submitting such
- imaginative entries!. . . The envelope please . . .
-
- For the best scenarios describing constructive uses
- of hacking, T.CAMPBELL11 and M.VANCE1. And for
- destructive uses, S.CURTISIII1 and D.TAMPLIN.
- Congratulations to Tim, Vance, Stan and David! I'll
- now open the room so that all of us can type . . .
-
- <[Tom] SHERMAN> No one counts typing blunders, Katie, not in here!
-
- <[Richard] R.GILLIAM3> RTC spell-checkers. The next cyber-frontier! <g>
-
- <[Andrea] A.DUDA> Are the contest winners all in one place where we can
- read them?
-
- <[Tom] SHERMAN> Yes, the contest entries are in Cat 7/Topics 16 and
- 17, except . . . for one that was sent by e-mail
- because the author thought it too dangerous to post
- in public
-
- <[Tom] SHERMAN> Katie, what do you think about the FBI's interest in
- legislation requiring the phone companies to make
- digital phone transmission accessible to them? (Did
- you see Marc and Janlori on Koppel's program the
- other night?)
-
- <[Katie] PRESS11> it's the stupidest thing i've ever heard of. it will
- never work... people will just buy cheap encryption.
-
- <[Darryl] D.JENT> Katie, have you meet meet William Gibson & How
- surprised are you at the way his books have become
- reality?
-
- <[Tom] SHERMAN> Hmmm, say a little more about that, would you?
-
- <[Katie] PRESS11> i've talked to him on the phone. i'd like to meet
- him, though. he's extremely tall, i hear ... but what
- part has become reality? ga
-
- <[Fomalhaut] J.PAXSON> Darryl, pray that the world itself does not become
- that horrible.
-
- <[Katie] PRESS11> you're not kidding.
-
- <[Darryl] D.JENT> I was meaning the way virtual reality is shaping
-
- <[Darryl] D.JENT> Most of what I've read about VR lately was in his
- books
-
- <[Fomalhaut] J.PAXSON> I've had some success with virtual reality using
- x-specs and stereo headphones.
-
- <[Richard] R.GILLIAM3> Experiment surgery has been done for the hearing
- impaired, wiring the bones between the ear and the
- brain so that some sound can be heard. This is, I
- suggest, a rudimentary form of the cyber-wiring that
- is certain to come.
-
- <[Tom] SHERMAN> Richard, will they just wire digital jacks where our
- ears used to be?
-
- <[Katie] PRESS11> that's been done for the blind, too.
-
- <[Andrea] A.DUDA> Interesting thought, Richard. Imagine what happens if
- someone messes with that!
-
- <SHERRY.PF> I heard that on a talk show just this morning,
- Richard!
-
- <[Richard] R.GILLIAM3> Yes, Tom. Expect that eventually it will be done by
- radio receivers, not wires.
-
- <[Tom] SHERMAN> Will there be an OFF switch?
-
- <[Richard] R.GILLIAM3> Let's hope so, Tom
-
- <SHERRY.PF> That'll depend on whether or not we end up in 1984 or
- Brave New World.
-
- <[Tom] SHERMAN> Is this what Gene meant when he said we'd all be on
- the network?
-
- <[Darryl] D.JENT> Katie, what is the wildest computer lab you have
- visited as far as technologically advanced?
-
- <[Richard] R.GILLIAM3> I've often thought it was just a question of who got
- us first---the cyberpunks or the genetic engineers.
- Eventually it will be both.
-
- <[Katie] PRESS11> it's a toss-up between the media lab and xerox parc
-
- <[Darryl] D.JENT> It that the media lab at MIT?
-
- <SHERRY.PF> Is that Xerox in Leesburg, VA?
-
- <[Katie] PRESS11> yeah, and xerox parc in palo alto
-
- <SHERRY.PF> I haven't been to Palo Alto, but I've been to
- Leesburg. It's pretty wild too. ;)
-
- <[Darryl] D.JENT> hAVE YOU MET mARVIN mINSKY at MIT, He has wrote some
- wild books about the brain & AI
-
- <[Katie] PRESS11> yes. he's a wild guy. you should meet his daughter
-
- <[Darryl] D.JENT> Tom, I didn't get a chance to, but will I loved his
- book Society of the Mind.
-
- <[Katie] PRESS11> i've never read that.
-
- <[Darryl] D.JENT> It's about using Artificial Intelligence & trying to
- mimic the brain
-
- <[Darryl] D.JENT> About how the easiest things we do as humans are the
- hardest to get a computer to do.
-
- <[Tom] SHERMAN> Katie's already stayed longer than I asked and so . .
- I want to thank her again for joining us and . . . to
- remind all of you that Jerry Berman, formerly of the
- ACLU and now . . . head of the D.C. office of the
- Electronic Frontier Foundation will . . . be our
- guest next Sunday! . . . Do join us and, during the
- week, . . . take a minute to add your thoughts to our
- bulletin board discussion about . . . technology and
- society in Category 7 . . . All of you . . . are
- welcome to stay as long as you like. Katie. thanks
- again!
-
- <[Darryl] D.JENT> Such as moving Thanks, Katie, will have to read your
- new book. Good luck
-
- <[Richard] R.GILLIAM3> Thanks Katie, Tom. Enjoyed the RTC. Looking forward
- to visiting again.
-
- <SHERRY.PF> You can get to the PF*NPC bulletin board on page
- 8011;1 -- it's a Basic service.
-
-
- -----# Participants #-----
-
- <[Andrea] A.DUDA>
- <[Darryl] D.JENT>
- <[Dave] D.THOMPSON74>
- <[2] eric] E.SHCHNEIDER>
- <[Gene] G.STOVER>
- <[Fomalhaut] J.PAXSON>
- <J.PRESLEY1>
- <[Lamont] L.INGALLS>
- <MCFARMER>
- <[Phillip] P.MAY2>
- <[Katie] PRESS11>
- <[Richard] R.GILLIAM3>
- <[Tom] SHERMAN>
- <SHERRY.PF>
- <[Tom] T.BARKER6>
-
- __________________________________________________________________
- | Rights & responsibilities, government, politics, minority civil |_
- | rights, volunteerism, nonprofit management, the media, the | |
- | environment, international issues, gay/lesbian/bisexual issues, | |
- | women & men, parenting, youth organizations and more! | |
- |__________________________________________________________________| |
- |__________________________________________________________________|
-
- ________ PF$ PF*NPC Sysops _____________
- | |_ | Weekly RTC: |_
- | The | | SHERMAN Tom Sherman | 9pm Eastern | |
- | PF*NPC | | SCOTT Scott Reed | on Sundays! | |
- | Staff: | | CHERNOFF Paul Chernoff | Type M545;2 | |
- |________| | GRAFFITI Ric Helton |_____________| |
- |________| SHERRY Sherry |_____________|
-
- __________________________________________________________
- -=(( The Public Forum * NonProfit Connection RoundTable ))=-
- -==((( GEnie Page 545 - Keywords PF or NPC )))==-
- -=((__________________________________________________________))=-
-
-
- |
- | This listing was generated by LRTC Version 1.00
- | (C)opyright by Hartmut W. Malzahn, 1991. All rights reserved.
- |
-
- # # #
-
- ------------------------------
-
- End of Computer Underground Digest #4.25
- ************************************
-
-