home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Wed Nov 18, 1992 Volume 4 : Issue 59
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Copy Eater: Etaion Shrdlu, Junior
-
- CONTENTS, #4.59 (Nov 18, 1992)
- File 1--FTP Sites / COMP Hierarchy
- File 2--Another First-hand account of 2600 Disturbance
- File 3--Re: viruses and "finding your calling"
- File 4--Re: Viruses--Facts and Myths
- File 5--NYT article on technology policy
- File 6--Va. Hearing on SSNs
- File 7--Am I a Techno-Junkie?
- File 8--Any Technophiliacs Here Besides Me?
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from America Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
- Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
- anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
- /pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
- (192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
- in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail
- server at mailserv@batpad.lgb.ca.us.
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Wed, 17 Nov 92 18:11:52 CST
- From: moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--FTP Sites / COMP Hierarchy
-
- Brendan Kehoe has added several shadow ftp sites where back-issues of
- CuD and other documents are available. Thanks and kudos to Dan
- Carosone, Paul Southworth, Ralph Sims, and Jyrki Kuoppala for their
- efforts in maintaining them.
-
- READERS ARE **URGED** TO USE THE SHADOW SITES RATHER THAN the
- ftp.eff.org site, and to use them during off-hours. This reduces the
- strain on a single site and makes us all good net citizens.
-
- We also receive periodic complaints that, since the switch from
- alt.society.cu-digest *TO* comp.society.cu-digest, some readers can no
- longer obtain CuD. If this is a problem on your system, check with
- your local sysad rather than us--we obviously have no control over
- individual systems.
-
- ------------------------------
-
- Date: Tue, 17 Nov 92 17:40:39 -0500
- From: guru<forward.from@mindvox.phantom.com>
- Subject: File 2--Another First-hand account of 2600 Disturbance
-
- There has been much conjecture over what actually during the 2600
- meeting in November. Ten days later, I have not yet seen a good
- account of what actually happened. I've seen many opinions and
- contradictory statements, however. I was there, and I'd like to clear
- up a lot of misconceptions and give a more authoritative statement on
- what actually happened. It is accurate to say that none of the
- statements I've read from the participants are inaccurate, they are
- merely incomplete.
-
- Al Johnson's statements on the other hand are contradictory lies.
- Besides his obvious contradictions such as whether or not the Secret
- Service was involved (see the Brock Meek's transcript). Al Johnson
- also stated that they merely confiscated a few things left on the
- table which no one claimed. This is far from true, they confiscated
- considerably more than just what was left on the table (including the
- confiscation of Milk Dud boxes left on the table). The stuff that was
- left on the table was left there because they intimidated us into
- denying that they belonged to us.
-
- I wish to rectify this situation by giving a thorough accurate
- account of what actually happened. I will not give any names not
- previously mentioned in other articles, it has done nothing but get
- people in trouble. Two people have lost their jobs (and I don't mean
- the security guards), and one will likely lose their job (despite an
- excellent performance record).
-
- I arrived at about 5:05 pm with another person (who has not yet
- been named, and shall remain so). When we got there, we introduced
- ourselves and began having small private conversations. On the table
- there were some Xeroxed AT&T schematics and a bag of Milk Duds (they
- sure went fast), a Mondo 2000, and a nice laser printed copy of the
- PumpCon raid. No one was discussing anything illegal, at least that I
- heard. During the time before the incident occurred many of us went
- and got fast food from the local grease joints.
-
- We took turns pointing out guys in suits who were staring at us.
- One guy, who had a camera, would then proceed to photograph him, and
- he'd turn nervously away. We even once joked about it once to KL, who
- nervously turned and covered his head with his trenchcoat.
-
- Around 5:30 "Knight Lightning" (KL) addressed the entire meeting.
- By this time, there were probably about 15, or 20 of us there. He
- passed out Computer Professionals for Social Responsibility membership
- pamphlets, a 8 page newsletter called "Privacy Journal," and of course
- the infamous ("ISPNews --Security Violators will get their access
- kicked") buttons he had just received from ISPNews. KL began
- lecturing us on how CPSR were just as nice people as the guys from
- EFF.
-
- At around 6:00pm I began to notice some rent-a-cops congregating
- on the balconies. Naively, I ignored them, figuring we weren't doing
- anything illegal why should they bother us, and I gave it no second
- though until they surrounded us. KL said "I think we may have some
- trouble here," and proceeded to vanish only to be seen again after the
- whole incident.
-
- This is when the incident began. Someone (I never found out his
- alias) came down the elevator, and whipped out his Whisper 2000 and
- started passing it around. The guards then quickly ran down the
- elevator and surrounded us, demanding to know who owned the "stungun."
- (which is not illegal in VA) Apparently they believed this small
- pocket amplifier was a stungun. The back of the amplifier was
- removed, possibly making it look more like a weapon. After several
- people commented, "What stungun? Oh, you mean the Whisper 2000. It's
- a pocket amplifier, you know its the thing you see on TV. It's
- nothing more than an amplifier." The person who had it at the time
- gave it to the guard ("C. Thomas"). Thomas examined the device
- carefully, and eventually convinced it wasn't a stungun, he returned
- it.
-
- After Thomas was done with the Whisper 2000, he started asking
- about "The Mad Hatter"'s handcuffs. After teasing "The Mad Hatter"
- about the inferior quality of his handcuffs, he demanded to know how
- he got them, and why he had them. Thomas refused to accept the answer
- that was most logical. "The Mad Hatter" responded that they are easy
- to get at stores, and he had them because he felt like it. Thomas
- grabbed the handcuffs and kept them.
-
- At this point a new guard (presumably Johnson) entered the scene.
- The man looked a little stocky probably of middle age and Western
- Asian descent, with slightly graying hair. He was wearing merely a
- suit, and looked like he was in charge of everything. Many of the
- guards were not wearing name tags, one was obviously undercover
- complete with an ear piece. Johnson then clearly stated we were
- computer hackers, and that he understood that we met here each month.
-
- Johnson, saw the box owned by "MetalHead" sitting next to me. He
- told "MetalHead" to open it. Having nothing to hide, he did. It
- contained a fairly new looking keyboard. The immediate response by
- Johnson was that he was obviously a juvenile delinquent and had
- shoplifted it from Radio Shack. He explained that he had made prior
- arrangements with someone else to sell it at the meet. Johnson,
- calmly asked if he had a vendor's permit. When, he responded, he was
- unaware that he needed one, Johnson went on a tirade about how "Don't
- even think of selling that in MY mall without a vendor's permit!" The
- guards grabbed it.
-
- The tension was beginning to run high. Someone asked a guard
- what his name was, and he responded that "[he] didn't have a name!
- [his] name is unimportant..." We began demanding ID, and they refused
- to show it to us. Instead, they turned around and demanded ID from
- us. Some people refused. Those who did, were brought to the
- Arlington police officers (who had come sometime during the incident)
- and were informed that they could be held for up to ten hours for
- failing to produce ID. In fact some of the guards threatened that "we
- would be very sorry when the police got here, if we didn't give ID."
- This convinced people to change their minds. I offered a library card
- (my only form of ID), they were uninterested, as they apparently
- wanted photographic ID and/or SS#.
-
- "Loki" produced four forms of ID. Johnson couldn't stand this,
- he kept demanding ID from him, and "Loki" kept asking him which he
- wanted. Finally, Johnson just looked over all of them. Johnson
- announced that our parents would be called. The legal adults
- protested bitterly, and their parents were not called. They contacted
- other guards over the radio discussing the contents of the IDs (if in
- fact these were Secret Service agents, as suspected, this would be a
- violation of the Privacy Acts).
-
- "Hackrat" began writing down the few names he could get off their
- uniforms (and not to many at that). When the guards became aware of
- this, they grabbed the pencil and paper, and tore it up. Our
- camera man decided to photograph the guards. The guards responded by
- grabbing the camera, and forcibly removing the film (and probably
- ruining it). The guards claimed they had every right to be doing what
- they were doing, and the cops supported them. The cops said they
- "were working for an outside party" (presumably the Secret Service,
- which is illegal because of the Privacy Acts).
-
- "Loki" was asked what was in his back pack, as was every one
- else. "Loki" showed Johnson some of what was in it, and then put it
- down. Johnson decided this was insufficient and he started going
- through the pack grabbing whatever he felt like. "Loki" nor anyone
- else granted permission for them to go through their equipment. The
- guards decided to eject us from the mall at this point (despite
- requests to use the bathroom).
-
- The guards had taken the keyboard, a wiretap, a reel to reel
- tape, a full set of VMS manuals, "Loki"'s backpack (including his
- homework), a lineman's phone, and all the paperwork. They said we
- could get our stuff back, yet they refused to write receipts (which
- meant we couldn't).
-
- We spent a long time down in the metro deciding what to do.
- After we rejoined a number of people who were coming in during the
- "raid," we decided to go upstairs and use the phone. We went up the
- elevator, and we called the Washington Post. They responded that they
- were uninterested and refused to produce any reporters on the scene.
-
- The guards at this point came out to the area, at which point one
- of us photographed them. This seemed to agitate them further. At no
- time were the guards actually calm, at least one was upset at all
- times. An incident with "Gentry" ensued when "Gentry" accidentally
- touched him, and the guard ("C. Thomas") got terribly agitated. They
- then threatened to ticket all of our cars. The cars were legally
- parked, on the street, they therefore had no right to ticket them.
- Right before I left the area, I noticed on last incident. A guard
- came out of the mall in a car (which looked like a Jeep Cherokee), and
- then quickly accelerated to 60mph (the street is like a 30 mph street)
- without using sirens or headlights. At this point the group split up,
- and the meeting (at least for me) was over.
-
- ------------------------------
-
- Date: Mon, 9 Nov 92 08:39:58 EST
- From: morgan@ENGR.UKY.EDU(Wes Morgan)
- Subject: File 3--Re: viruses and "finding your calling"
-
- >From: Guido Sanchez<guido@nunbeaters.anon.com>
- >Subject--File 1--Response to the Virus Discussion
- >
- >Yes, virus authors are in it now more
- >for making fun and avenging themselves of the anti-viral authors, who
- >in turn do the same in their programs. Etc, Etc, Etc.
-
- Apparently, neither side cares about 'collateral damage'; i.e. the
- hundreds/thousands of third parties who are 'bitten' by virus attacks.
-
- >So here's what I do. On my 'underground e-leet Vx' BBS, I make all
- >viruses and other files free on the first call.
-
- >Hopefully, besides using viruses as a commodity, the
- >fledgling sysop will look at a few of the pro-viral utilities and some
- >of the source code.
-
- "pro-viral"? Gee, I was just thinking that Political Correctness had
- not yet reached the digital world. I guess I'm mistaken, eh? Can't
- you just say "yes, I write programs that destroy/impede the work of other
- users?"
-
- >We force nothing into the minds and computers of others,
- >it's all part of curiosity and voluntary.
-
- Hahahahahahahahahahahahahahahahahahahaha! Let me get this straight:
- - You (and others) write viruses
- - You release those viruses into the digital environment
- - You then claim "we force nothing".
-
- The notion that you "force nothing" is akin to saying "we distribute
- weapons, but we aren't *forcing* you to install metal detectors in your
- schools." As an argument, it holds no water.
-
- I can tell you one thing which you force upon others. Those of us who
- manage computer systems and networks for a living are *forced* to
- spend extensive man-hours disinfecting our systems/networks and
- attempting to devise means by which we can prevent reinfection. Of
- course, we can't find/patch every loophole (that's the definition of
- security; you can never catch everything), so the work becomes a
- constant; periodic scans of ALL susceptible hardware/software,
- constant efforts to improve security, and a constant stream of
- angry/disgusted users. <Thankfully, our network setup now allows us
- to protect our DOS servers from infection.......for now, we only have
- to worry about individual machines>
-
- >We help people to find their
- >calling <forgive me for sounding like a religious fanatic or cult
- >leader here..> in whatever field of modem-dom they like.
-
- What about those people who want to be mere users? What about those
- folks who don't really care about either your 'having fun....and avenging.."
- OR the folks who write disinfectors/cleaners?
-
- Apparently, you don't care one whit about them (except, perhaps, as a
- vector for your product).
-
- >May you all find your calling
-
- In the real world <as opposed to this grand contest you seem to have
- composed in your imagination>, your efforts actually *silence* the
- cal-ling(s) that users might hear. Our PC LANs serve 2300 people,
- many of whom are taking their first steps into the digital world; in
- fact, I'd guess that over 60% of my users never make significant use
- of PCs before coming to this university. If, during their first
- serious use of a PC, they are victimized by your viruses, they often
- lose *all* desire to do *anything* further with a PC. You're actually
- killing your own cause.
-
- I'm getting rather tired of virus authors <the "pro-viral" sobriquet
- is inane> who claim that they're on some "noble quest for knowledge".
- If this were truly the case, we'd never see a virus loosed upon the
- digital environment; the worthy seeker of knowledge would test it on
- their own hardware, find it successful, add the information to their
- journals, and have no reason to loose it upon the rest of us. If such
- people actually exist <and, by definition, I'd never know about them,
- right?>, they have my wholehearted support. The people who distribute
- viruses for the heck of it are positioned at the bottom of the digital
- food chain.
-
- ------------------------------
-
- Date: 13 NOV 92 21:26
- From: <RANDY%MPA15AB@TRENGA.TREDYDEV.UNISYS.COM>
- Subject: File 4--Re: Viruses--Facts and Myths
-
- It has been stated that a virus only needs "normal" write access to
- files in order to infect. I'd like to point out that this is not true
- on all computer systems. Most systems do not treat machine code as
- anything special, and these systems are vulnerable to any program with
- write capability. But some systems (such as Unisys A Series) include
- the compilers in the Trusted Computing Base, and do not permit
- ordinary users or programs to create executable files. On these
- systems, a virus would have to have the highest possible privileges in
- order to infect a program; with that level of privilege, *anything*
- can be done.
-
- I should point out that this was not done with viruses in mind. The
- restrictions came about because of the architecture of the systems:
- objects of various kinds are implemented in hardware, and the hardware
- is aware of what operations are permitted on which objects to a
- certain extent. The compilers are responsible for only emitting
- dangerous operators, which override normal object access rules, in
- well-defined situations. To allow users to emit such code would
- destabilize the system. Of course, this only works because the
- architecture was designed to implement high-level languages, and
- languages are available with extentions that provide sufficient power
- as to eliminate any need to write in assembly.
-
- ------------------------------
-
- Date: Tue, 10 Nov 1992 08:52:13 -0500
- From: "(Gary Chapman)" <chapman@SILVER.LCS.MIT.EDU>
- Subject: File 5--NYT article on technology policy
-
- The lead story, and a long one, in today's (11/10) Science Times
- section of The New York Times is headlined "Clinton To Promote High
- Technology, With Gore In Charge." The article is by regular Times
- science/tech writer William Broad.
-
- A caption to the large illustration says "President-elect Clinton
- proposes to redirect $76 billion or so in annual Federal research
- spending so it spurs industrial innovation. Areas likely to get
- stimulus include robotics, batteries, computer chips, 'smart' roads,
- biotechnology, machine tools, magnetic levitation trains, fiberoptic
- communications, computer networks, digital imaging, data storage,
- software, sensors, computer-aided manufacturing, advanced composite
- materials, and artificial intelligence."
-
- The article says that Clinton's civilian initiative will "spend money
- twice as fast as the Pentagon's Star Wars anti-missile program, one of
- the biggest research efforts of all time." It also says the aim of
- the Clinton program is "a new wave of research discoveries and
- applications that will flood the economy with innovative goods and
- services, lifting the general level of prosperity and strengthening
- American industry for the international trade wars of the 1990s and
- beyond."
-
- To underscore what I've been saying about the adoption of Cold War
- models of thinking in this new "civilian" research program, Kent
- Hughes, president of the Council on Competitiveness, says, "This is a
- watershed. We're now going to develop an economic strategy much in
- the way we developed a national security strategy to fight the Cold
- War."
-
- The article describes plans for business-government partnerships, and
- says that Gore will be charged with coordinating this entire effort,
- as well as to "create a forum for systematic private sector input into
- U.S. government deliberations about technology policy and
- competitiveness." (Those words are Clinton's.)
-
- The Clinton administration plans to shift "at the very least" $7.6
- billion per year, or about 10% of all Federal R&D, from the military
- to civilian programs. They applaud efforts like SEMATECH and plan to
- extend the SEMATECH model to other high technology sectors.
-
- The article notes that a key player in the development of these plans
- is Senator Jeff Bingaman of New Mexico. Bingaman says that
- pork-barrel politics will be avoided by insisting on cost-sharing with
- private partners. Bingaman says, "We'll sit down and say, 'What do
- you think is important?' and require them to spend their own money
- too."
-
- This is a long article, so I've skipped a lot of major points in this
- brief summary. It serves to emphasize the importance of the things
- we've been saying about trends in technology policy.
-
- ------------------------------
-
- Date: Wed, 11 Nov 1992 09:29:42 EDT
- From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
- Subject: File 6--Va. Hearing on SSNs
-
- An ad hoc committee of the Virginia General Assembly met November 10
- and agreed to draft legislation that will remove the SSN off the face
- of the Va. drivers license and from voting records. The Special Joint
- Subcommittee Studying State and Commercial use of Social Security
- Numbers for Transaction Identification met for 3 hours and heard
- witnesses from government, industry and public interest groups. It
- appears that the draft will require the DMV and the Election Board to
- continue to collect the information, but will no longer make it
- publicly available. It was also agreed that the committee
- would look into greater enforcement of Va. privacy laws, including the
- feasibility of setting up a data commissioner.
-
- All of the legislators in attendance agreed that using the SSN on the
- face of the driver's license caused problems for both fraud and
- privacy. The DMV representative admitted that it would cost a minimum
- amount of money to modify their new computer system, which they have
- not completed installing yet, to use another numbering system. She
- estimated that this would take 3-7 years using the renewal process to
- change all the licenses. She estimated a cost of $8 million for an
- immediate change due to mailing costs.
-
- Bob Stratton of Intercon Systems explained the inherent flaws in using
- the SSN as an identifier and offered alternatives such as the SOUNDEX
- system used by Maryland and New York as a better alternative for
- licenses. A representative of the Va. State Police admitted that they
- do not use the SSN to identify persons in their records because it was
- "inherently inaccurate" and described cases of criminals with up to 50
- different SSNs. Dave Banisar of CPSR Washington Office explained how
- the SSN facilitates computer matching and offered options for the
- board to consider to improve protection of personal privacy. Mikki
- Barry of Intercon Systems described how any attorney in Virginia has
- access to the DMV database to examine all records via a computer
- network.
-
- ------------------------------
-
- Date: Tues 17 Nov 92 12:18:34 EST
- From: internet.housewife@hoover.joy.uunet.uu.net
- Subject: File 7--Am I a Techno-Junkie?
-
- Dear Cu-Digest people:
-
- I'm your worst nightmare come to life: a housewife who's on
- internet among all you techno-literati. I can't help myself. The
- soft key strokes, the gentle motion of the cursor flowing across
- my screen, the firm penetration of captured logs entering my
- hard-drive---I'm hooked. Problem is, I hang out in usenet all
- day, on IRC all night, and the rest of the time is spent
- polishing the screen, vacuuming the vents, and dusting my disks.
- The dishes pile up in the sink, the kids cook their own meals, my
- husband has moved out, and the cat has run off. I've gone
- through denial, anger, bargaining and acceptance, but my life is
- still a mess. Life has no meaning when I log-off, and I suffer
- headaches until I boot back up. What should I do?
-
- Can you help?
-
- Sincerely,
-
- Internet (I post therefore I am) Housewife
-
- ((MODERATORS' NOTE: Dear Hooked--perhaps the following file will help))
-
- ------------------------------
-
- Date: Thu, 12 Nov 1992 22:20:20 +0100
- From: Dennis Wier <drwier@CLIENTS.SWITCH.CH>
- Subject: File 8--Any Technophiliacs Here Besides Me?
-
- An Introduction to Technophiliacs Anonymous
- (By Dennis R. Wier )
-
- The same Truth has many forms.
-
- Technophiliacs Anonymous is a fellowship of persons and institutions
- who desire to stop their addiction to technology.
-
- Technophiliacs Anonymous is supported entirely through contributions
- of its membership and is free to all those who need it.
-
- To counter the destructive consequences of addiction to technology we
- draw on these resources:
- 1. We use our personal willingness to stop our addictive behavior on
- a daily basis.
- 2. We use the support of the fellowship of Technophiliacs Anonymous
- to increase our capacity to stop our addiction.
- 3. We practice the principles of Technophiliacs Anonymous to
- recognize and properly respond to addictive behavior.
- 4. We develop our perceptions and awareness of the correct use of
- technology by the regular practice of meditation.
- 5. We support the efforts of those who expose the hidden side effects
- of any technological activity.
-
- Technophiliacs Anonymous is not affiliated with any other
- organization, movement or cause, either religious or secular.
-
- What is a Technophiliac?
-
- The word technophiliac is a newly coined word and it means "having a
- pathological love of technology." We use this new word to imply that
- the love is a dysfunction of some kind. We are all technophiliacs in
- the sense that we as a society are dependent on the wide-spread use
- of technology --such as electricity, cars, telephone, TV, computers
- and many other forms. We need to seriously ask ourselves if this
- dependence helps or hurts our human relationships. We need to
- constantly examine this dependence to see if the hidden-side effects
- of technological dependence are destructive to our families, society
- or environment.
-
- Are You A Technophiliac?
-
- Has the use of technology improved or worsened your
- financial condition,
- health,
- relationships with friends and family,
- relationships with your mate or lover,
- relationship with your self?
-
- How many hours a day do you
- watch television,
- work on a computer,
- operate technical equipment,
- talk on the telephone,
- tinker with your car?
- Add those hours up.
-
- Is your total use of technology an indication of your addictive
- relationship to technology?
-
- Now honestly look at your human relationships with the planet, your
- environment your family and your inner self:
- do you know what phase the Moon is in right now?
- do you know which way the seasonal clouds are moving and their
- shapes?
- can you comfortably walk alone in the woods at night without a
- flashlight?
- do you know the type of earth around your house?
- do you tell your children stories, or do you let them watch TV so
- they leave you alone?
- are you aware of environmental stress through your personal
- sensitivity to the behavior of local animals and plants?
- Do you choose to spend time on your computer or watching TV or
- talking on the telephone or tinkering with your car or with other
- technology rather than being with your mate or children?
-
- Long-term focused awareness on technology or on technological matters
- to the exclusion of natural or human relationships indicates a life
- profoundly out of balance.
-
- The cumulative effect of many lives out of balance creates a
- world-wide disaster with profound effects on the environment, social
- and group interactions, institutional and political behavior, human
- and family values and ethics, interpersonal relationships, and
- physical and psychological health, with immense costs in all areas.
-
- What is Technophiliacs Anonymous?
-
- Technophiliacs Anonymous is a multi-faceted fellowship based on a
- desire to know the hidden side-effects of technology, to popularize
- the awareness of the hidden side-effects of technology on our social,
- psychological, economic and spiritual beings, and to counter the
- destructive consequences of technological addiction. With established
- meetings in many cities in the United States and abroad, this
- self-help fellowship is open to anyone, and any institution, who
- suffers from a compulsive need to use technology, and those
- desperately attached to a specific technology such as the telephone,
- the computer, the television, the automobile, etc. Technological
- addiction also includes a pathological interest in destructive,
- coercive and invasive technologies. What all members have in common
- is the realization that the compulsive attachment to technology has
- become increasingly destructive to all areas of their lives --
- family, career, environment, society and political institutions.
- Technophiliacs Anonymous welcomes the participation of anyone
- directly involved in technology or directly affected by technology
- --either beneficially or otherwise, or in the government, or in the
- spiritual areas corned with the subtle effects of technology. We
- especially welcome the participation of human potential workers and
- facilitators.
-
- We seek to understand, and to make known to all, how technology,
- generally and specifically, affects our spiritual, mental, emotional,
- physical, economic, political and social lives, and to cure, whenever
- possible, the deleterious effects of technology; and to learn, by
- sharing information, the correct ways to manage our lives for the
- continued benefits of life-supporting technology without subjecting
- ourselves to the hidden malevolent side-effects.
-
- Technophiliacs Anonymous was first begun in June, 1988 in Berkeley by
- Dennis R. Wier, who realized that technological dependency was
- affecting life in the same ways as chemical, alcohol and love
- addictions, but not only were the deleterious effects felt in
- personal lives, but also in ecological, political and spiritual
- realms. Thus, what may be said of a personal addiction to a
- technology also may be said in a global way as well, that is, one
- side effect of our addiction to automobiles causes air pollution, one
- side effect of our addiction to telephones causes separation between
- people, one side effect of our addiction to television causes loss of
- awareness through induction of trance, one side effect of our
- addiction to computers causes loss of judgement and cognitive
- abilities. There are other, more hidden and more sinister side
- effects of technological addiction.
-
- Co-Dependency
-
- If a technophiliac is addicted to technology there are those around
- him or her who are co-dependent. Co-dependents may not be addicted to
- technology but they derive important benefits from the addiction.
- Manufacturers of alcoholic beverages are co-dependent to alcoholics
- in different ways than a person in a close personal relationship with
- an alcoholic is co-dependent, but both are co-dependent in that their
- common behavior supports the continued addiction of the alcoholic.
- A technophiliac has the same problem. Manufacturers of the newest
- computers are co-dependent with the technophiliac. And, if the
- technophiliac is highly paid, those persons dependent financially on
- the technophiliac psychologically support his dependence even though
- it may be personally destructive to the technophiliac.
-
- One of the differences between AA, SLAA and Technophiliacs Anonymous
- is that many institutions --government, educational and business
- --support and encourage technological addiction because they are not
- aware of the hidden side-effect of technological addiction. It is
- possible to make a change in awareness. A change in awareness will
- help bring about an important social change. Some years ago,
- cigarette smoking was socially acceptable and tolerated if not
- encouraged by many social institutions. Smoking was generally
- tolerated as a common and nearly harmless bad habit. Now, with
- greater social awareness of the dangers of cigarette smoking, society
- is now attempting to reduce cigarette addiction by prohibiting
- smoking in public places and requiring manufacturers to place health
- warning messages on tobacco products.
-
- It may seem that technological addiction is a trivial and unimportant
- matter compared to the more obvious and important issue of cigarette
- smoking; yet, technological addiction has greater consequences for us
- all the longer we ignore it. Technophiliacs are not the only victims
- of their addiction, but their creations often are at the root of
- important and world-wide dangers and all of us become victims.
- Beneficial social changes came about because of increased social
- awareness of the dangers of the hidden side-effects of tobacco
- addiction, and the same social awareness now extends to alcohol and
- drug addiction. The same social awareness is now beginning to be felt
- in environmental and ecological areas, because of PCB contaminations,
- acid rain, toxic waste treatment procedures, atmospheric pollution
- and other technological hidden side effects now making themselves
- known. It may become obvious that there is an increasing awareness of
- the hidden side effects to technological things we think are simple,
- are not.
-
- It is the position of Technophiliacs Anonymous that society needs to
- become aware of its dangerous addiction to technology and to begin to
- cope with its co-dependent issues, as well as the underlying and
- important hidden side effects.
-
- Because technological addiction is so pervasive and is encouraged by
- co-dependent governmental, educational, business and institutional
- entities, the members of Technophiliacs Anonymous include not only
- those who recognize their compulsive need for technology, and those
- with a desperate attachment to one specific form of technology, but
- also those leaders and visionaries who may conceive of the
- possibilities of a right relationship to technology.
-
- Why Technology Can Be Addicting
-
- The use of technology for the purpose of lessening pain or augmenting
- pleasure, by a person, institution, government or business who has
- lost control over the rate, frequency or duration of its use, and
- whose corporate or individual psychological, economic, social and
- spiritual life has become progressively unmanageable as a result is
- addicted to that technology.
-
- Technological addiction extends from teenagers addicted to
- television, to yuppie programmers making piles of money, to a
- military establishment addicted to acquiring newer, faster and more
- exotic destructive forces, to a government intent on knowing and
- controlling everything possible, to real estate agents with a
- perverted sense of "highest and best use."
-
- Technophiliacs Anonymous believe that an addiction exists not just
- because we need or use technology more than others, but because of
- the motive. A technophiliac uses technology to lessen the pain that
- comes from problems in other areas of life. Governmental and business
- institutions use technology to regulate and control life, a behavior
- which is typical of co-dependents.
-
- As we collectively or individually seek someone or something to 'take
- us away from all this,' we are really seeking to avoid reality
- altogether. We come to use a technology as a substitution for other
- satisfactions, to comfort ourselves for real or imagined needs, or to
- avoid or try to make unnecessary attending to a life that seems to
- give us too much pain.
-
- Even the humble electric light, used to provide illumination at night
- to read, has become a substitution for other satisfactions such as
- observing the night, and it comforts us in driving away the
- mysterious darkness, and helps us avoid our own thoughts, those same
- thoughts we need to think in order to keep our life in balance. Even
- the electric light has the side effect of keeping our life out of
- balance in very subtle ways. The cumulative effect of millions of
- lives out of balance causes disastrous effects over the entire planet.
- More technology is not the answer.
-
- In our addiction to technology it seems as though the power lies
- elsewhere, and that our lives are being destroyed by forces and
- tensions that cannot be denied and by problems that cannot be escaped.
- For the technophiliac, closeness to others has become increasingly
- rare and difficult. It is easier for the technophiliac to have a
- relationship with his car, television or computer than with his mate,
- his children, or his neighbors.
-
- Within an institution, it may be easier for an institutional
- technophiliac to buy more computers, hire more consultants, process
- more data faster, make heavier reports, create ever more
- sophisticated military hardware, than to have a real and meaningful
- relationship with its clients, citizens or employees.
- What can you do if you admit, however reluctantly, that technological
- addiction might be the problem, instead of lack of 'enough' or the
- 'right kind' of technology?
-
- The Road to Recovery
-
- The road to recovery starts with an awareness of the existence of the
- problem. To get aware that technological addiction is the problem,
- try this experiment: turn off all your electricity for five days.
- Most technological devices depend on electricity in order to work. If
- the changes you go through during the five days are not painful, but
- "business as usual," then you are not addicted to technology.
- However, if the changes are painful, frightening, or perhaps so
- difficult that you cannot finish the five days, then you are a
- technophiliac.
-
- The beginning is simple, but not easy. The admission of powerlessness
- has to be coupled with a readiness to break the addictive pattern --
- to stay away from all technology for long periods of time. This
- withdrawal from the addictive use of technology generally brings
- symptoms just as physical and as painful as the withdrawal from drugs
- or alcohol. On our own the tension would be too much, the temptation
- to indulge just one more time would be unbearable, and the belief
- that there could be another way to live would weaken.
-
- First we find a sense of wholeness and dignity within ourselves. Even
- while working with technology we need to keep balanced and at some
- distance from it. To find wholeness within ourselves we first must
- know that part of us which is human and then to explore the intimate
- and mysterious relationship we have with the planet.
-
- Meetings
-
- For information on meetings in your area, please write to us and we
- will send you a local meeting schedule or give you information on
- organizing a local chapter.
-
- Evolving A Proper Relationship
-
- The hard questions cannot be ignored. The most difficult questions
- are ultimately the most important because they represent those
- aspects of life which we tend to ignore or deny. In place of facing
- these difficult questions which are different questions for each one
- of us, we create substitute problems, such as technical problems, as
- symbols for our own internal processes. There is the mistaken belief
- that by solving these technical problems somehow the more difficult
- questions will also be solved.
-
- Technology can be known in many ways which will enhance our
- relationship with ourselves and with the universe.
- The proper relationship with technology is a distant and cautious
- one. Without spiritual protection in place, dealing with any
- technology ultimately is damaging to us. Any other relationship
- ultimately damages our spiritual, social, environmental and
- psychological life.
-
- Developing spiritual protection is a life-long continuous practice
- which is helped by meditation in all of its forms. The support of
- others in a community devoted to personal awareness and growth lays
- the foundation for right social action and planetary unity.
-
- How you can help
-
- If you want to help in a real way to popularize these concepts,
- please discuss these ideas with your friends and the media, send
- pertinent newspaper clippings, cartoons to us and write us for any
- information. Help us start a chapter in your area. We will appear on
- TV and talk on the radio about these concepts. Write for helpful
- details, but ultimately the power, benefits and responsibility is
- yours.
-
- +++
- Comments on the above are welcome by e-mail. Yes, I am ALWAYS
- on my computer!
-
- Dennis
-
- ------------------------------
-
- End of Computer Underground Digest #4.59
- ************************************
-