home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Mar 14 1993 Volume 5 : Issue 20
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Eater: Etaion Shrdlu, Senior
-
- CONTENTS, #5.20 (Mar 14 1993)
- File 1--Steve Jackson Games WINS! (fwd)
- File 2--On-Line GEnie Interview with Bruce Sterling
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210;
- in Europe from the ComNet in Luxembourg BBS (++352) 466893;
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- red.css.itd.umich.edu (141.211.182.91) in /cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- Back issues also may be obtained from the mail server at
- mailserv@batpad.lgb.ca.us.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sun, 14 Mar 1993 23:25:44 GMT
- From: ckd@eff.org (Christopher Davis)
- Subject: File 1--Steve Jackson Games WINS! (fwd)
-
- ((MODERATORS' NOTE: THIS JUST IN: Steve Jackson Games has won it's
- suit. There is no word yet on whether there will be an appeal. Details
- will follow.))
-
- +++++++ Start of forwarded message +++++++
-
- Originator--jsq@aahsa.tic.com X-Submissions--eff-austin@tic.com
- Organization--Texas Internet Consulting
-
- We won.
-
- Pete Kennedy, our attorney at George, Donaldson & Ford, called me with
- the news about 3:30 today. Apparently the decision came in late Friday
- while Pete was at the CFP.
-
- The judge ruled for us on both the PPA and ECPA, though he says that
- taking the computer out the door was not an "interception." (I have
- not read the decision yet, so no quotes here.)
-
- He awarded damages of $1,000 per plaintiff under the ECPA.
-
- Under the PPA, he awarded SJ Games $42,259 for lost profits in 1990,
- and out of pocket costs of $8,781.
-
- Our attorneys are also entitled to submit a request for their costs.
-
- No word on appeal yet.
-
- Look for a more complete and coherent account after we all read the
- decision.
-
- Please copy this announcement to all electronic and other media.
-
- Thanks for your support through all this!
-
- ------------------------------
-
- Date: 07 Mar 93 18:00:55 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 2--On-Line GEnie Interview with Bruce Sterling
-
- GEnie talks with Bruce Sterling:
- This file comes from the Science Fiction and Fantasy RoundTable
- (SFRT, page 470) on GEnie, and is Copyright (c) 1992 by GEnie.
-
- ***
-
- To sign up on GEnie, follow these simple steps:
-
- 1. Set your communications software for half-duplex (local
- echo), at 300, 1200 or 2400 baud.
-
- 2. Dial toll free: 1-800-638-8369 (or in Canada, 1-800-387-
- 8330). Upon connection, enter HHH
-
- 3. At the U#= prompt, enter XTX99381,SFRT then press <RETURN>.
-
- 4. Have a major credit card ready. In the U.S., you may also
- use your checking account number.
-
- For more information in the United States or Canada, call
- 1-800-638-9636 or write: GEnie, c/o GE Information Services,
- P.O. Box 6403, Rockville, MD 20850-1785.
-
- ***
-
-
- 21:30EST 11/09/92
-
-
- <[Host] THE.HAMMER> The GEnie clock says that it's 9:30 ET, so we'll start now.
-
- ** <[Host] THE.HAMMER> Room is now listen-only.
-
- Room is now in listen-only mode.
-
- <[Host] THE.HAMMER> Our RTC guest tonight is Bruce Sterling, author of the
- <[Host] THE.HAMMER> novels INVOLUTION OCEAN, THE ARTIFICIAL KID,
- <[Host] THE.HAMMER> SCHISMATRIX, and ISLANDS IN THE NET, editor of the
- <[Host] THE.HAMMER> cyberpunk anthology MIRRORSHADES, co-author with
- <[Host] THE.HAMMER> William "NEUROMANCER" Gibson of THE DIFFERENCE ENGINE,
- <[Host] THE.HAMMER> and now the author of the non-fiction work THE HACKER
- <[Host] THE.HAMMER> CRACKDOWN. Welcome, Bruce.
-
- <[Guest] BRUCES> What a pleasure to see all those titles spelled correctly *8-)
-
- <[Host] THE.HAMMER> Bruce's new book is concerned with questions about the new
- electronic frontier.
-
- <[Guest] BRUCES> Now if we could only PRONOUNCE them *8-/
-
- <[Host] THE.HAMMER> Do a /rai if you have a question for Bruce, and I will call
- on you.
- <[Host] THE.HAMMER> Bruce, I'll lead off. Your book is called THE HACKER
- CRACKDOWN. How do you define "hacker"?
-
- <[Guest] BRUCES> Whoops.. oh dear, my fingertips have fallen off... no, false
- alarm. Do ask anything, people, don't be shy.
- <[Guest] BRUCES> How do I define hacker. Well, there was the good ol' 60s
- definition, and then there's the rather more sinister 90s definition.
-
- <[Host] THE.HAMMER> What are they?
-
- <[Guest] BRUCES> Generally I go with the cop definition, since it's the one in
- greater public usage, meaning a computer trespasser.
- <[Guest] BRUCES> When you see 'hacker' in headlines it invariably means
- somebody who's committed sillicitly.
- <[Guest] BRUCES> Wow! I mean someone who'se committed computer abuse and
- invaded
- <[Guest] BRUCES> a system illicitly.
-
- <[Host] THE.HAMMER> Okay, we have a question from DANTECH...
-
- <[Katie] DANTECH> I wonder if you think there's any way we can reclaim the term?
- <[Katie] DANTECH> I was a programmer, and to me it was a term of praise, a
- gonzo programmer who could get into the code and really make it sit up and
- beg...
- <[Katie] DANTECH> I get upset with the other definition. it takes a hacker to
- be a hacker in the new sense, but not all hackers do that sort of thing. if
- you follow me. ;-> anyway, does your book emphasize the difference?
-
- <[Guest] BRUCES> Reclaim the term "hacker?" Sure. About the same time that I
- reclaim the term "cyberpunk." Ha ha ha ha!
- <[Guest] BRUCES> My book does make the distinction between "hacker" in its
- better sense and
- the system-cracking hacker, but I'm afraid it's a losing battle.
-
- <[Host] THE.HAMMER> Katie, a followup?
-
- <[Katie] DANTECH> I'm hoping we get to GURPS later, but that's it
- for now.
-
- <[Host] THE.HAMMER> Okay.
- <[Host] THE.HAMMER> P.RETZBACH is next...
-
- <[Pete] P.RETZBACH> hi ... I want to ask about this stuff I hear about al gore
- and the "network america" ... can you comment??
-
- <[Guest] BRUCES> Comment on Al? Sure! Let me state publicly that I'm taking
- complete gloating glee at the prospect of Souther Yuppie Reptiles in Power!
- <[Guest] BRUCES> But more seriously -- yes, NREN is clearly a very big deal and
- I for one have high hopes for it.
- <[Guest] BRUCES> I think it's very encouraging that we now have a highly placed
- federal official with a firm grasp on modern telecommunications.
-
- <[Host] THE.HAMMER> Follow-up, Pete?
-
- <[Pete] P.RETZBACH> yes ...
- <[Pete] P.RETZBACH> so you really believe it's not too early or ambitious??
-
- <[Guest] BRUCES> What if it is? I don't see what we have to lose. A few
- billion? So what?
- <[Guest] BRUCES> "Information superhighways" sounds like a swell notion to me.
-
- <[Host] THE.HAMMER> Next up is B.LUHMAN.
-
- <[King Arthur] B.LUHMAN> What if any is the difference between Hackers and
- Phreakers? (not sure spelling)
-
- <[Guest] BRUCES> Well, "phreaks" are mostly into telephone manipulation while
- "hackers' crack systems, but that is a harder distinction to make now
- <[Guest] BRUCES> that the telphone system is becoming digitalized.
- <[Guest] BRUCES> "Phreaks" tend to be into petty theft-of-service more than
- hackers, too.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[King Arthur] B.LUHMAN> yes.. which is easier to get caught?
-
- <[Host] THE.HAMMER> Can you repeat that? It was garbled.
-
- <[King Arthur] B.LUHMAN> yes.. which is easier to get caught?
-
- <[Guest] BRUCES> Oh.... Well, that depends on what kind of crime you're
- committing and how openly you brag about it.
-
- <[King Arthur] B.LUHMAN> ic thnx!
-
- <[Guest] BRUCES> It also depends on who the local cops are and if they're hip
- to telecomm
-
- <[Host] THE.HAMMER> Next up is Martha Soukup, SFRT assistant sysop....
-
- <[Martha] SFWA-SOUKUP> I think you should introduce "sillicitly" into the
- language. Noun. Anyway....
- <[Martha] SFWA-SOUKUP> Of the people you met researching the book, who was, or
- were, the most fun
- <[Martha] SFWA-SOUKUP> to hang out with?
-
- <[Guest] BRUCES> Oh, Kapor and Barlow, no question.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[Martha] SFWA-SOUKUP> Howcum?
-
- <[Guest] BRUCES> John Perry Barlow is the heaviest dude I know!
-
- <[Host] THE.HAMMER> Second follow-up, Martha?
-
- <[Martha] SFWA-SOUKUP> Maybe you could elaborate? (Or does everyone need to
- buy the book? <g>)
-
- <[Guest] BRUCES> Cops are always a bit menacing; hackers hard to trust.
- <[Guest] BRUCES> But millionaires and Grateful Dead lyricists have their own
- odd kind of charm, believe me,
- <[Guest] BRUCES> It's a little hard to describe charisma.
-
- <[Host] THE.HAMMER> Next up is Mike Whalen....
-
- <[MIKE] M.WHALEN5> Hi, Bruce.
-
- <[Guest] BRUCES> Yo.
-
- <[MIKE] M.WHALEN5> I finished you book just this weekend.. great read. I wanted
- to ask you...
- <[MIKE] M.WHALEN5> I have been on BBSs here in New Orleans since 1984 and I can
- remember a prominent Hacker/Cracker/Phreaker scene.. but this seems to have
- died in recent years.. would you feel this is true of the whole scene?
-
- <[Guest] BRUCES> Well, I think the scene has changed its character. But the
- digital underground definitely exists, believe me.
- <[Guest] BRUCES> I could upload some proof if you're interested.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[MIKE] M.WHALEN5> Oh.. I do know it exists. Proof? What do you mean by Proof?
- ;)
-
- <[Guest] BRUCES> There's a big hacker convention coming up in Houston nemy hard
- disk.
-
- <[MIKE] M.WHALEN5> I am not doubting you. Btw, I could not finish the 911
- document. Thanks, Bruce.
-
- <[Guest] BRUCES> I gotta learn to stop doing that *8-(
- <[Guest] BRUCES> Anyway, there were a lot of Norleans people at this
- hacker con last year.
-
- <[Host] THE.HAMMER> A brief announcement:
- <[Host] THE.HAMMER> There is a contest in this RTC tonight, sponsored by
- <[Host] THE.HAMMER> Bantam Books and GEnie. The first three people to
- <[Host] THE.HAMMER> correctly answer a trivia question later in the RTC
- <[Host] THE.HAMMER> will win free autographed copies of THE HACKER
- <[Host] THE.HAMMER> CRACKDOWN.
- <[Host] THE.HAMMER> Next up is Pete Retzbach again...
-
- <[Guest] BRUCES> Unless my wrists fall off *8-(
-
- <[Pete] P.RETZBACH> did the feds REALLY believe Steve Jackson was
- publishing a hacker manual??
-
- <[Guest] BRUCES> I don't think they did, but I think they were anxious
- for a convenient excuse.
- <[Guest] BRUCES> I think the USSS realized immediately that they'd blown
- it, but they hoped the whole thing would remain completely obscure.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[Pete] P.RETZBACH> thank you
-
- <[Host] THE.HAMMER> Next up is Kate Daniel again...
-
- <[Katie] DANTECH> How do you mean, "an excuse"? what else did they want
- to nail him for?
- <[Katie] DANTECH> And, my main question, how is Kapor's group doing?
-
- <[Guest] BRUCES> I think they had his gaming bulletin-board,
- "Illuminati," figured for a very serious Legion of Doom hangout.
- <[Guest] BRUCES> They thought it would be full of hot passwords and such.
-
- <[Katie] DANTECH> government paranoia?
-
- <[Guest] BRUCES> Kapor's group is "an insurrection trying to become an
- institution."
- <[Guest] BRUCES> Not paranoia. Just a mistake. The problem came in
- trying to brazen out their blunder. If they'd just handed it back and
- apologized...
- <[Guest] BRUCES> Jackson would not have beat the drums so loudly.
-
- <[Host] THE.HAMMER> Follow-ups?
-
- <[Katie] DANTECH> the question on paranoia was all.
-
- <[Host] THE.HAMMER> Next up is Gary Frazier...
-
- <[GaryF] G.FRAZIER3> Bruce, do you think that the law enforcement
- community has the technical skills to deal with hacking's negative aspects?
-
- <[Guest] BRUCES> No, they don't; but then again, neither does anybody
- else!
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[GaryF] G.FRAZIER3> Are they flailing around, trying to give the
- impression that they're DOING SOMETHING?
-
- <[Guest] BRUCES> Things have been quiet for some months. However now
- that the Presidential campaigns are over...
- <[Guest] BRUCES> I very much expect to see the US Secret Service get
- into the electronic
- <[Guest] BRUCES> fray once again and with renewed vigor.
-
- <[Host] THE.HAMMER> Any follow-up, Gary?
-
- <[GaryF] G.FRAZIER3> Nope. Thanks, Bruce!
-
- <[Host] THE.HAMMER> Next up is Tom Weber
-
- <[Tom] T.WEBER7> Is the "any unlocked door is an invitation" morality
- prevalent among the young hackers you've encountered, or has that been
- exaggerated by the media? Is most hacking politically motivated, or just for
- kicks and personal gain?
-
- <[Guest] BRUCES> Kicks. Prurience. Ego-tripping. Role-playing.
- Neurosis. Intellectual curiosity. Lack of other outlets. Teenage high
- spirits...
- <[Guest] BRUCES> The "unlocked door" rap still gets a lot of play in
- hacker circles, but I've always found it kind of hard to take seriously.
-
- <[Host] THE.HAMMER> Follow-up, Tom?
-
- <[Tom] T.WEBER7> Are there any serious politically subversive groups
- hacking around?
-
- <[Guest] BRUCES> Well, that depends on what you mean by "serious," Tom.
- I think EFF is pretty "serious," and so are CPSR and ACLU, but they're not
- teenagers
-
- <[Guest] BRUCES> and they're not generally perceived as "hackers."
- <[Guest] BRUCES> Or as "subversive," for that matter -- which is
- probably their greatest strength.
-
- <[Host] THE.HAMMER> Next up is Susan Shwartz...
-
- <[Susan] S.SHWARTZ> As I understand it, Kapor's group is designed to
- protect people like Steve Jackson. What sort of success is it having?
- How would it answer (possible) charges that it's soft on the wrong sort of
- hacking--or would it?
-
- <[Guest] BRUCES> Well, anybody can make the "hacksymp" charge. It
- doesn't seem to carry much oomph though. I'm surprised at the public support
- for
- <[Guest] BRUCES> computer intrusion kids. The populace is very cynical
- these days. Big telephone companies and groups like FBI, Umuch of a
- sympathetic hearing.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[Susan] S.SHWARTZ> Yes, please. I have a subversive fondness for this
- sort of thing, too. But what's the group's basis in law? First Amendment?
- Unfair search and seizure? Privacy?
-
- <[Guest] BRUCES> Fourth Amendment, First Amendment,
- <[Guest] BRUCES> privacy legislation, anti wiretapping legislation.
- <[Guest] BRUCES> Electronic Communications Privacy Act, too.
-
- <[Host] THE.HAMMER> Next up is Mike Whalen again.
-
- <[Guest] BRUCES> And let's not underestimate $$$$$$$$$$
-
- <[MIKE] M.WHALEN5> Hey, again. What do you feel the public's CURRENT
- perception of CyberSpace is. Is it becoming MORE friendly? Or has the term
- Cyberspace and renewed Hacker media scared more people away?
-
- <[Guest] BRUCES> I think people are less terrified of "hacking" these
- days and more and more frightened by "viruses." Viruses probably ARE a worse
- threat.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[MIKE] M.WHALEN5> I guess the more hackers there are .. the more
- viruses? That is the current.. misnomer? At least I feel it is.
-
- <[Guest] BRUCES> The networks are growing steadily, especially the
- Internet, so people aren't frightened by modems per se or cyberspace as an
- idea...
-
- <[Guest] BRUCES> The thing that drives people nuts is the idea of having
- their hard-disks wiped by some idiot from Bulgaria and his PC virus.
- <[Guest] BRUCES> There's a pretty good book coming out from England
- called "Approaching Zero" that has a lot of material on Bulgarian virus-writing
- crowd.
-
- <[Host] THE.HAMMER> Next up is Kate Daniel again....
-
- <[Katie] DANTECH> this is a complex one. obvious lawbreakers, the ones
- who hack into corporate databases....
- <[Katie] DANTECH> and mess up financial records and plant viruses, they
- are obviously of interest to the g'vment. But do you think...
- <[Katie] DANTECH> some areas of g'ment are afraid of the non-illegal
- areas of cyberspace, like GEnie? think it's monitored? and what effect do you
- think ....
- <[Katie] DANTECH> the new administration's interest will have on it? ga
-
- <[Guest] BRUCES> Well, there are plenty of things you can do on a
- "legal" BBS or network that will catch a cop's attention....
- <[Guest] BRUCES> fencing stolen property, planning crimes (conspiracy),
- pornography (especially CHILD pornography)...
- <[Guest] BRUCES> swindles, thefts, libel, slander...
- <[Guest] BRUCES> exchanging hot credit card numbers, exchanging stolen
- phone access numbers...
- <[Guest] BRUCES> pirating and selling illicitly copied software...
- <[Guest] BRUCES> giving advice on demolitions, brewing poisons, how to
- kill with a single blow of a blunt object...
- <[Guest] BRUCES> advice on how to commit all manner of crimes and
- disguise your activities afterward. And so on.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[Katie] DANTECH> I'm more interested in open communications, consensus
- forming, and direct feedback to government. do you think some officials find
- this form of open, fast communications threatening?
-
- <[Guest] BRUCES> Did I forget plagiarism and theft of intellectual
- property?
-
- <[Katie] DANTECH> I was going to say we don't do those things on GEnie,
- but I *have* taken part in discussions on killing people. but I write murders.
- <g>
-
- <[Guest] BRUCES> You'll be grinning out of the other side of your modem
- if you ever become involved in an actual murder investigation, DANTECH.
-
- <[Katie] DANTECH> seriously?
-
- <[Guest] BRUCES> Depends on how CLOSELY involved you are.
- <[Guest] BRUCES> And if somebody examines your hard-disk.
-
- <[Host] THE.HAMMER> Next up is Martha Soukup again....
-
- <[Martha] SFWA-SOUKUP> In your (very funny) story, "Are You for 86?",
- you have a religious pro-life group using computer hacking as one of their
- strategies. Do you think that, in real life, the radical right will catch up
- to the radical left in that area? And are radical political groups getting
- anywhere with hackery? (hacking, whatever)
-
- <[Guest] BRUCES> Well, there have been Nazi bulletin boards in the US
- for a long time, and when it comes to satellite comm have been into it for a
- long time.
- <[Guest] BRUCES> I don't think the radical right has much "catching up"
- to do.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[Martha] SFWA-SOUKUP> How annoying are these groups, really, to the
- government?
-
- <[Guest] BRUCES> If they've got guns, they're plenty bothersome. And if
- they ever threaten the life of the President...
- <[Guest] BRUCES> You can bet that the USSS will be taking a prolonged
- and detailed interest in them and their activities.
-
- <[Host] THE.HAMMER> Second follow-up?
-
- <[Martha] SFWA-SOUKUP> And if they're just cracking &c?
-
- <[Guest] BRUCES> Mostly they're riddled with federal informants,
- though...
- <[Guest] BRUCES> So their chances of getting anywhere militarily are
- pretty limited...
- <[Guest] BRUCES> and the informant business goes in spades for the
- little teenage hacker groups...
- <[Guest] BRUCES> They just spill their guts immediately when apprehended.
-
- <[Host] THE.HAMMER> Next up is Denny again....
-
- <[Denny] DENNYA> Bruce, as technology gets more and more advanced, do
- you think hacking will become more difficult? Or more devastating? (Will more
- powerful computers and algorithms benefit the hacker or hackee?)
-
- <[Guest] BRUCES> I don't think hacking amounts to much. I'd worry more
- about the effects
- <[Guest] BRUCES> of these new and more powerful technologies for those
- who own them.
- <[Guest] BRUCES> Those who use them all day every day. Corporations and
- governments.
- <[Guest] BRUCES> It's silly to worry too much about teenagers.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[Denny] DENNYA> ga
-
- <[Host] THE.HAMMER> Next up is Cathy Hampton....
-
- <ARIEL> I'd like to follow up on Gary Frazier's question. Assuming
- that no one has the technical skill to enforce the law on-line, and assuming
- the Feds asked you to come up with a means to develop and teach this, how would
- you accomplish this? (Assuming you didn't run for dear life, that is. :> )
-
- <[Guest] BRUCES> Change the law so as to make it more easily enforceable.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <ARIEL> Absolutely. What changes would you make, then? One or two
- examples would be fine -- I know you don't have enough time before Christmas to
- answer it all. :>
-
- <[Guest] BRUCES> I think I'd make computer-intrusion a misdemeanor at
- worst and I'
- <[Guest] BRUCES> d devote my efforts..
- <[Guest] BRUCES> to tracking down people who commit telecommunications
- fraud and other..
- <[Guest] BRUCES> activities that can earn a criminal a dishonest
- living...
- <[Guest] BRUCES> crime won't really flourish until somebody can make
- plenty of folding money out of it...
- <[Guest] BRUCES> If you see that ethos come into hacking it will be the
- equivalent of
- <[Guest] BRUCES> crack cocaine entering the drug scene...
- <[Guest] BRUCES> in which case you will start seeing a lot more violence
- and a lot more open greed...
- <[Guest] BRUCES> and the situation may deteriorate pretty badly.
-
- <[Host] THE.HAMMER> Next up is Sarah Collier....
-
- <SARAH-C> Going back a bit, isn't there a proposed amendment to extend
- the 1st and 4th to electronic media?
-
- <[Guest] BRUCES> Yeah, that;s the Laurence Tribe proposal... word says
- Professor Tribe
- <[Guest] BRUCES> may have a shot at a Clinton/Gore Supreme Court post.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <SARAH-C> What do you figure its chances of passage are?
-
- <[Guest] BRUCES> It's not a bill in Congress, it's just a suggestion for
- a Constitutional amendment, which nobody has formally attempted to pass.
-
- <[Guest] BRUCES> The EFF offers the text of the speech in which Prof
- Tribe floats this idea of his.
-
- <[Host] THE.HAMMER> Next up is Gary Frazier....
-
- <[GaryF] G.FRAZIER3> Recently, DATELINE NBC did one of the standard
- media scare stories about hacking that one often sees. Is the media just
- ignorant of the technology, or so lazy as to simply echo the hysteria of law
- enforcement?
-
- <[Guest] BRUCES> I saw that. One of those hacker kids on NBC was
- "Urvile," one of my najor informants for the book.
-
- <[Guest] BRUCES> "Urvile" is a scary customer in a lot of ways.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[GaryF] G.FRAZIER3> Why is he so scary? Can you tell us more about him?
-
- <[Guest] BRUCES> Well, I don't want to libel the young gentleman or
- anything, but
- <[Guest] BRUCES> frankly he didn't seem to me to have much of anything
- in the way of qualms.
- <[Guest] BRUCES> When that's combined with considerable technical skill
- it tends to be a bit disquieting. The guy shows a little too much rigidity of
- the eyeball. No offense, Adam *8-/
-
- <[Host] THE.HAMMER> Second follow-up?
-
- <[GaryF] G.FRAZIER3> That is pretty frightening. Do you think the media
- sensationalizes hacking out
- <[GaryF] G.FRAZIER3> of ignorance of the technology? Do they
- really understand what's going on?
-
- <[Guest] BRUCES> I think they sensationalize it because
- sensation gets ratings, dude.
- <[Guest] BRUCES> No, they don't understand, but they know
- good press when they see it.
- <[Guest] BRUCES> NOBODY understands "what's going on."
-
- <[Host] THE.HAMMER> Next up is Susan Shwartz again....
-
- <[Susan] S.SHWARTZ> I'm interested in the genesis of your
- thought on these subjects. How'd you become interested in the
- entire cyber-areas--and how'd your fiction segue into this
- nonfiction book? Did the fiction affect your sources, including
- Urvile?
-
- <[Guest] BRUCES> I got involved because federal police raided a
- publisher in my home town and blamed him for writing a book called "Cyberpunk."
- <[Guest] BRUCES> I didn't think I needed to wait for an engraved
- invitation to take an interest.
-
- <[Host] THE.HAMMER> Follow-up, Susan?
-
- <[Susan] S.SHWARTZ> Yes. Would that have preceded your fiction?
- Specifically, I was interested in the evolution of your thought as it related
- to your fiction? Did you find it gave you credibility among your sources?
-
- <[Guest] BRUCES> Oh. That. Yeah. Yes, they all knew who I was. So
- did a lot of the cops *8-(
-
- <[Host] THE.HAMMER> Second follow-up?
-
- <[Susan] S.SHWARTZ> Last bit of one. In the litcritters' world, it's
- easy to see certain books as seminal. Still, when Robert Morris's father gives
- him SHOCKWAVE RIDER to read, it's hard to dismiss it. Do you consider that
- book important at all -- in your work, the development of cybernetic
- communities, hackers, etc.?
-
- <[Guest] BRUCES> Well, yeah, but nowhere near so "important" as the
- movie WAR GAMES in 1983.
-
- <[Host] THE.HAMMER> Ready for the trivia contest?
- <[Host] THE.HAMMER> Get ready on the /sen keys then.
- <[Host] THE.HAMMER> Here comes the trivia contest question with three
- <[Host] THE.HAMMER> autographed copies of THE HACKER CRACKDOWN as the
- <[Host] THE.HAMMER> prize. The first three correct answers to the trivia
- <[Host] THE.HAMMER> question that are /sent to me will win! (No public
- <[Host] THE.HAMMER> answers, please!)
- <[Host] THE.HAMMER>
- <[Host] THE.HAMMER> Ready?
- <[Host] THE.HAMMER>
- <[Host] THE.HAMMER> The trivia question is: What is the name of the
- second
- <[Host] THE.HAMMER> novel by the man who co-authored THE DIFFERENCE
- ENGINE
- <[Host] THE.HAMMER> with Bruce?
-
- <[Guest] BRUCES> The Miracle Worker!!!
-
- <[Host] THE.HAMMER> We have ONE winner.
-
- <[Guest] BRUCES> Oh sorry that was the other WG
-
- <[Host] THE.HAMMER> The question was the name of the second novel by
- Bruce's co-author, not the name of the co-author.
- <[Host] THE.HAMMER> TWO winners.
- <[Host] THE.HAMMER> THREE WINNERS!
- <[Host] THE.HAMMER> The winners are Tom Weber, who knew it instantly,
- Martha Soukup, and Kate Daniel.
- <[Host] THE.HAMMER> Congratulations. E-mail me your address, please.
- <[Host] THE.HAMMER> Next up is Mike Whalen again....
-
- <[MIKE] M.WHALEN5> I want to ask you about the future of CyberSpace. MY
- vision is something like the Apple Newton which is affordable.. and constantly
- hooked up through satellite link to a network (much like InterNet). What is
- your vision?
-
- <[Guest] BRUCES> I just fielded a phone call from Katie Hafner,
- co-author of CYBERPUNKS OUTLAWS AND HACKERS ON THE COMPUTER FRONTIER!
- <[Guest] BRUCES> Good booK!
- <[Guest] BRUCES> Oh, my vision, eh? COMPUTER AS FUROSHIKI
- <[Guest] BRUCES>
- <[Guest] BRUCES> "Computer as furoshiki" is a highly speculative vision
- of the personal computer as it might evolve if freed from certain current
- material constraints.
- <[Guest] BRUCES> The furoshiki is an intimate and ubiquitous accessory
- to Japanese daily life. It's nothing more than a large square of tough,
- well-made cloth, usually with a handsome pattern. The furoshiki is used, among
- other purposes, as a grocery bag, a book-tote, and a decorative wrapper for
- ceremonial gifts. In its simplicity and multiple uses it is little different
- from a cowboy's bandanna, except that the skill in wrapping and knotting
- furoshikis is more arcane.
- <[Guest] BRUCES> The computer-as-furoshiki is the computer as a large
- square of lightweight, flexible cloth. It is not, however, "cloth" as that
- material is currently understood.
- <[Guest] BRUCES> The furoshiki's display screen is formed by thin bands
- of color-emitting optical fibers, which are wide enough and bright enough to
- mimic the scan-lines of a video display terminal. These display-fibers are
- interwoven with other fiber-optics carrying data.
- <[Guest] BRUCES> A second kind of fiber is densely interwoven; it
- consists of room-temperature superconductive wire, possibly a novel form of
- buckminsterfullerene for strength and flexibility. This highly-charged net of
- superconductors serves as a literal power-grid.
- <[Guest] BRUCES> The third fiber is some currently-unknown form of
- piezoelectric filament that can contract, relax, and therefore warp and knot
- itself in response to precise electrical charges deployed along its length.
- <[Guest] BRUCES> A fourth form of fiber serves as a radio antenna and
- communications grid.
- <[Guest] BRUCES> One section of the cloth can be radically stiffened to
- serve as the diaphragm for an audio speaker.
- <[Guest] BRUCES> Computation, memory, and movement are carried out by
- photonic, photoelectronic, and electronic chips composed of custom-built
- artificial diamond for low cost and strength. If the tensile fibers are
- composed of organic proteins (which would seem likely), then the
- computer-as-furoshiki consists mostly of carbon.
- <[Guest] BRUCES> The device is operated with voice commands and touch,
- and possibly gesture, through a similarly woven linked glove.
- <[Guest] BRUCES> The computer-as-furoshiki is capable of limited
- movement. Early versions might fold themselves up like a gentleman's
- handkerchief; later models would resemble aluminum foil or Saran Wrap.
- Advanced versions can fly.
- <[Guest] BRUCES> Although this computer lacks direct video input, it
- might be capable of optical character recognition if placed on a page, or of
- image-scanning if placed on a graphic.
- <[Guest] BRUCES> When placed on light-sensitive paper, or film, it
- generates hard-copies. This computer might displace paper as a medium by
- usurping not merely the information of paper but the physical properties of
- paper as well.
- <[Guest] BRUCES> When one's head is wrapped completely in the furoshiki,
- it becomes a virtual-reality rig.
- <[Guest] BRUCES> When not in use, the furoshiki is worn, as a scarf,
- tie, turban, or, or course, the Console Cowboy's bandanna. Mainframes can be
- used as pup-tents, supercomputers as Big Tops, for a late twenty-first-century
- multimedia circus.
- <[Guest] BRUCES> Boy, that was hard typing! Gotta wait for my knuckles
- to stop smoking... *8-)
- <[Guest] BRUCES> GA
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[MIKE] M.WHALEN5> More or less, everyone would have their own personal
- mailbox. They can read/send mail.. subscribe to newsgroups.. get news through
- things LIKE ClariNet. What do you think?
-
- <[Guest] BRUCES> *I* think you need a lot of good editors *8-)
- <[Guest] BRUCES> Otherwise you'll drown like rats in the data firehose.
-
- <[Host] THE.HAMMER> LOL. Next up is Kate Daniel again...
-
- <[Katie] DANTECH> Could you give us a thumbnail profile of the typical
- "hacker", in the media sense, today? somehow I'm not sure it's still
- over-bright teens...
- <[Katie] DANTECH> and which types of targets are they after?
-
- <[Guest] BRUCES> Male 15-22, unmarried, time on his hands, may be
- mathematically gifted. Parents commonly divorced. Usually white. Commonly
- has no othecriminal record, though that's changing.
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[Katie] DANTECH> why teens, primarily?
-
- <[Guest] BRUCES> Targets are the easy ones first: universities and
- hospitals. May work his way up to Internet sites and telephone switching
- stations.
- <[Guest] BRUCES> Same profile as other kinds of trespassing and
- voyeurism offenders.
-
- <[Host] THE.HAMMER> Next up is Martha Soukup again....
-
- <[Martha] SFWA-SOUKUP> Bruce, are you working on any fiction projects
- now?
- <[Martha] SFWA-SOUKUP> And would you like to plug your collection
- GLOBALHEAD (a Mark Ziesing book)?
-
- <[Guest] BRUCES> I wish, Martha. At the moment, as you can see, I'm
- blowing yet more time hanging out on computer networks *8-/
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[Martha] SFWA-SOUKUP> When will GLOBALHEAD be out in mass-market?
- <[Martha] SFWA-SOUKUP> (Not that it's not worth buying in hardcover, as
- I did, of course.)
-
- <[Guest] BRUCES> Oh, quite some time. they want to do the paperback of
- my next novel first. Which is unwritten.
- <[Guest] BRUCES> Maybe I'll talk 'em into changing their minds.
-
- <[Host] THE.HAMMER> And our last question comes from Mike Whalen once
- again...
-
- <[MIKE] M.WHALEN5> Could you talk a bit more about this "tour" you are
- on? Someone mentioned that you are going to be traversing BBSs and such. How
- are you going to do this? Where are you going?
-
- <[Guest] BRUCES> Oh, I've been on CompuServe, Delphi... actually, my
- home system is
- <[Guest] BRUCES> the WELL (bruces@well.sf.ca.us) where I hang out in
- the MONDO 2000
- <[Guest] BRUCES> conference with all the other cyberpunk wierdos among
- whom I feel
- <[Guest] BRUCES> most at home.
- <[Guest] BRUCES> I also give away text on Macintosh floppy disks.
- Sneakernet!
-
- <[Host] THE.HAMMER> Follow-up?
-
- <[MIKE] M.WHALEN5> The Well is one of those Pay-pay-pay systems, eh?
-
- <[Guest] BRUCES> Well, you can telnet in and get stuff off it, pretty
- soon.
- <[Guest] BRUCES> I don't mind paying because it's such a pleasure to see
- hippies making their own way in the world for once *8-/
-
- <[Host] THE.HAMMER> And Bruce's AGITPROP disk is also available in IBM
- format. (I know; I have one.) Bruce, care to make some parting comments about
- the AGITPROP diskette?
-
- <[Guest] BRUCES> This removes the primary legitimation for co,mputer
- intrusion.
-
- <[Host] THE.HAMMER> How so?
-
- <[Guest] BRUCES> Yeah. If you had to PAY for that disk, you got RIPPED
- OFF!!
- <[Guest] BRUCES> "I had to break in to learn."
-
- <[Host] THE.HAMMER> Any parting comments about the book?
-
- <[Guest] BRUCES> Yeah. The book will also be released electronically
- for free reproduction, in about a year. INFORMATION WANTS TO BE FREE!!
- <[Guest] BRUCES> But information will settle for being $1.75. *8-)
-
- <[Host] THE.HAMMER> I may upload it to the SFRT library on
- GEnie. Is that okay?
- <[Host] THE.HAMMER> People would have to pay a small time charge to
- download it.
-
- <[Guest] BRUCES> That's okay. Time charge is grudgingly accepted.
-
- <[Host] THE.HAMMER> Thank you, Bruce.
- <[Host] THE.HAMMER> THE HACKER CRACKDOWN, Bantam Books, ISBN
- 0-533-08058-X.
- <[Host] THE.HAMMER> Available at bookstores everywhere.
- <[Host] THE.HAMMER> Recommended.
- <[Host] THE.HAMMER> Buy a few for Christmas presents...<G>
- <[Host] THE.HAMMER> The formal part of this conference is now over.
- <[Host] THE.HAMMER> Thank you all for attending, and thank you, Bruce.
-
- ** <[Host] THE.HAMMER> Room is now in the talk mode.
-
- END
-
- ------------------------------
-
- End of Computer Underground Digest #5.20
- ************************************
-
-