home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Apr 18 1993 Volume 5 : Issue 28
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cyop Editor: Etaoin Shrdlu, Senior
-
- CONTENTS, #5.28 (Apr 18 1993)
- File 1--NREN Wrap (or "Joe's Ride at the Houston Chron")
- File 2--Clinton Proposes National ID Card
- File 3--White House Crypto Statement
- File 4--Debate on Gov't Encryption Initiative (from CPSR)
- File 5--RU Sirius/Mondo interview (from GEnie)
- File 6--Rune Stone BBS (IIRG Home Board) Back On-Line
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-6430), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) 203-832-8441 NUP:Conspiracy
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in Luxembourg BBS (++352) 466893;
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- Back issues also may be obtained through mailservers at:
- mailserv@batpad.lgb.ca.us or server@blackwlf.mese.com
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 15 Apr 1993 00:56:26 EDT
- From: Joe Abernathy <Joe.Abernathy@HOUSTON.CHRON.COM>
- Subject: File 1--NREN Wrap (or "Joe's Ride at the Houston Chron")
-
- ((MODERATORS' NOTE: The following is Joe Abernathy's last story for
- the Houston Chronicle. We've known Joe since 1990, and have found him
- a strong supporter of civil liberties in cyberspace. As his knowledge
- of the the topic has grown, so has the sophistication of his articles.
- His periodic columns in The Village Voice's "Wired" section have been
- consistently penetrating commentaries on law, ethics, and policy. We
- wish Joe the best in his new life. Thanks Joe.))
-
- NREN Wrap -- This is my last story for the Houston Chronicle. It is to
- appear on April 4, 1993. Please feel free to redistribute it for any
- non-commercial use.
-
- To those of you who have provided so much help these past four
- years, thanks. It's been a real education. I've accepted the job of
- Senior Editor-News at PC World magazine, and I'll still be writing the
- Village Voice Technocracy column, so I hope you'll all stay in touch.
- My new contact information is P.O. Box 572390, Houston, Texas
- 77257-2390, joe@blkbox.com.
-
- By JOE ABERNATHY
- Houston Chronicle Staff Writer
-
- The specters of class struggle and international economic warfare
- are casting a shadow over administration hearings on how to build a
- sophisticated national computer network.
-
- Billed as an engine of job growth, a central concern is emerging
- that the "data superhigh way" promised by Vice President Al Gore and
- President Bill Clinton during the campaign could produce a large
- underclass of "information have-nots."
-
- Based on an emerging global computer net work known as the
- Internet, which links up to 12 million people in more than 30 nations,
- the National Research and Education Network (NREN) is a decade-long
- project of former Sen. Gore.
-
- Gore envisions a future in which oceans of data, including
- libraries of movies, books and other creative works, would be readily
- avail able to every home. In selling a $5 billion spending plan
- focused on the network in 1992, Gore held forth the image of
- classrooms without walls, sophisticated medical collaborations, and
- globally competitive small businesses.
-
- "The NREN is at all odds the most important and lucrative
- marketplace of the 21st century," he said in a recent statement.
-
- But in trying to make it work, it has become apparent that the NREN
- remains in many ways a captive of its privileged institutional
- heritage. Some Americans don't even have telephone service, and many
- still don't have computers with which to access the net.
-
- Two congressional hearings were held in late March concerning the
- National Information Infrastructure, and a bill has been introduced
- that would take up where Gore's 1992 High-Performance Computing Act
- left off _ bringing the net to classrooms, small business and other
- potentially disenfranchised Americans. Clinton's budget includes an
- additional $489 million over six years for the network.
-
- And while the regional Bells, newspapers and other information
- giants have been struggling for years over the future of the medium,
- congressional insiders say that with the in creased attention, a
- resolution seems likely to be found during the current session of
- Congress.
-
- "What I think is really getting squeezed out is that there hasn't
- been a genuine, public interest, bottom-up grass roots voice. It's a
- huge, huge issue," said Marc Rotenberg, director of the Washington
- offices of Computer Professionals for Social Responsibility, the
- primary champion of civil rights in the new electronic medium. "It's
- about people, it's about institutions, it's about who gets to connect
- and on what terms."
-
- Observers also fear that the rush to wield the network as an
- economic weapon could produce dramatic incursions into free speech and
- other civil liberties.
-
- "I'm very concerned that the rhetoric about national
- competitiveness is transforming itself into a new cold war," said
- Gary Chapman, director of CPSR's 21st Century Project in Cambridge,
- Mass. "The concerns of intelligence and other federal agencies
- including NASA has been to look at technology resources that are not
- related to military security but to economic benefits as being things
- that have to be protected by Draconian measures of security."
-
- Recent disciplinary actions at NASA Ames Research Center in
- Northern California seem to support Chapman's concerns.
-
- Up to eight of the 11 scientists disciplined in December were
- targeted because of their participation in politically oriented,
- international discussion groups hosted on the Internet computer
- network, according to documents obtained by the Houston Chronicle
- under the Freedom of Information Act, along with subsequent
- interviews of NASA Ames personnel.
-
- "Some people there were accused of dealing with foreign nationals
- about non-classified technology issues," said Chapman, whose
- organization also has made inquiries into the matter. "NASA said
- the U.S. has to protect its technology assets because of the global
- environment of competitiveness."
-
- The issues are even simpler for Raymond Luh, a subcontracting
- engineer fired by NASA. Luh, an American of Chinese ancestry, feels
- that his career was destroyed simply because he joined in one of the
- thousands of political discussions aired each day over the Internet.
-
- "I feel I have been gravely wronged by NASA," Luh said. "I
- cannot possibly seek employment elsewhere. My reputation as a
- law-abiding citizen and a hard-working researcher has been tarnished
- almost beyond repair."
-
- NASA refused to comment on the matter.
-
- According to FOIA documents provided by NASA's Office of the
- Inspector General, Luh was fired when "a document containing Chinese
- writing was found in (Luh's computer). ... Investigation determined
- that Luh's office computer held a large volume of files relating to
- his efforts to promote Most Favored Nation trade status for the
- People's Republic of China. ... Luh was not authorized to use his
- computer for this activity."
-
- To Luh, however, he was only one of the chorus of voices that
- joined in a fiery debate surrounding fallout from the Tiananmen Square
- massacre. He wasn't trying to make policy _ he was exercising
- intellectual freedom, in his spare time.
-
- "That's a very dangerous and disturbing kind of trend," said
- Chapman. "The parallel is with the Cold War and transforming the
- modes of thinking and the practices of these agencies into new forms
- of control, even in the absence of militarily significant enemies.
- We'll start thinking about the Japanese or whatever Pacific Rim
- country you want to pick as being `enemies,' and intellectual commerce
- with these people will be a matter of economic security.
-
- "The freedom of expression aspect of that is very critical. We
- want to make sure that this is a system in which people can express
- themselves freely without repercussions."
-
- Observers fear that Luh may be only the first such casualty as
- federal agencies and special interest groups reshape the Internet into
- their own model, carving up a pie estimated to be worth $3.5 trillion.
-
- While Gore's vision implies the construction of a high-speed,
- high-tech fiber optic network, a number of counter-proposals are being
- floated.
-
- The Electronic Frontier Foundation _ which earlier made a name for
- itself with a successful court challenge to the conduct of the Secret
- Service in a hacker crackdown _ is focusing on building a less
- powerful, less costly network that could reach more people, more
- quickly.
-
- "Our central concern is that we get from debate to doing
- something," said Jerry Berman, EFF director.
-
- EFF's approach _ endorsed by Rep. Edward J. Markey, D-Mass. _ is to
- build an ISDN (Integrated Services Digital Network) service atop the
- telephone network, making a modest level of digital computer
- transmission available quickly to every home. The more sophisticated
- fiber optic approach implied by Gore's NREN could be implemented as
- time and money allow.
-
- But few voices have been heard backing ISDN.
-
- "The current state of the discussion is turmoil and chaos," said
- the CPSR's Rotenberg. "It's a mistake to place too much emphasis on
- any technological configuration. A lot of that energy and those
- resources would be better spent talking about users and institutions
- rather than technology and standards.
-
- "This is like trying to explain railroads in the 18th century or
- cars in the 19th century. Here we are in the 20th century, and we know
- something big is happening right under our feet and we know it has
- something to do with these new telecommunications technologies.
-
- "None of us knows where this is going to take us, but I think
- people should have some sensitivity to the prospect that the future
- world we're going to live in is going to be shaped in many ways by the
- decisions we make today about the information infrastructure."
-
- ------------------------------
-
- Date: Thu, 15 Apr 93 16:33:01 EDT
- From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.CSV.CMICH.EDU>
- Subject: File 2--Clinton Proposes National ID Card
-
- Here is a data pointer you might find of interest.
-
- ++++++++++++++++++++++++ATTACHMENT++++++++++++++++++++++++++++++++++++++
-
- From--Ross_Werner@next.com
- Subject--A national ID card - coming soon from the Clinton administration?
- Date--7 Apr 93 18:52:13 GMT
-
- This is a brief synopsis of an article in Section B, page 7, in the
- Wednesday, April 7, 1993 San Jose Mercury News. Excerpted without
- permission. All typos are mine.
-
- Headline: Big Brother's little sibling: the smart card
- Author: Martin Anderson
-
- The article discusses work ongoing in the Clinton administration to
- give everyone a "smart card" for personal medical information, to cut
- down on waste, fraud, and abuse in health care.
-
- "But now the smart card idea may have taken an ugly turn.
- Recently, Ira Magaziner, a Uria Heepish bureaucrat in charge
- of coordinating the development of health care policy for the
- Clinton Administration, asserted they want "to create an
- integrated system with a card that everyone will get at
- birth."
-
- another paragraph:
-
- "The smart card is an open, engraved invitation to a national
- identity card. In the early 1980s when I worked in the West
- Wing of the White House as President Reagan's domestic policy
- adviser I was surprised by the ardent desire of government
- bureaucrats, many of them Reagan appointees, for a national
- identity card."
-
- Apparently it almost happened.
-
- "The idea of a national identity card, with a new name, has
- risen once again from the graveyard of bad policy ideas, more
- powerful and virulent than ever. Unless it is stopped quickly
- we may live to see the end of privacy in the United States,
- all of us tagged like so many fish."
-
- The best part of this article is that it gives phone numbers to call
- to express your opinion, as Clinton has invited the public to do. I
- urge everyone to call, and to spread the word.
-
- (202) 456 - 1414 White House switch board
- (202) 456 - 6406 Ira Magaziner's direct line (the person working
- for Clinton on the smart card)
-
- about the author:
-
- "Martin Anderson, a senior adviser on the President's Economic
- Policy Advisory Board during the Reagan administration, is now
- a senior fellow at the Hoover Institution at Stanford. He
- wrote this article fore the Scripps Howard News Service."
-
- ------------------------------
-
- Date: Fri, 16 Apr 1993 16:20:19 EST
- From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
- Subject: File 3--White House Crypto Statement
-
- White House Crypto Statement
-
- THE WHITE HOUSE
-
- Office of the Press Secretary
-
- For Immediate Release April 16, 1993
-
-
- STATEMENT BY THE PRESS SECRETARY
-
-
- The President today announced a new initiative that will bring
- the Federal Government together with industry in a voluntary
- program to improve the security and privacy of telephone
- communications while meeting the legitimate needs of law
- enforcement.
-
- The initiative will involve the creation of new products to
- accelerate the development and use of advanced and secure
- telecommunications networks and wireless communications links.
-
- For too long there has been little or no dialogue between our
- private sector and the law enforcement community to resolve the
- tension between economic vitality and the real challenges of
- protecting Americans. Rather than use technology to accommodate
- the sometimes competing interests of economic growth, privacy and
- law enforcement, previous policies have pitted government against
- industry and the rights of privacy against law enforcement.
-
- Sophisticated encryption technology has been used for years to
- protect electronic funds transfer. It is now being used to
- protect electronic mail and computer files. While encryption
- technology can help Americans protect business secrets and the
- unauthorized release of personal information, it also can be used
- by terrorists, drug dealers, and other criminals.
-
- A state-of-the-art microcircuit called the "Clipper Chip" has
- been developed by government engineers. The chip represents a
- new approach to encryption technology. It can be used in new,
- relatively inexpensive encryption devices that can be attached to
- an ordinary telephone. It scrambles telephone communications
- using an encryption algorithm that is more powerful than many in
- commercial use today.
-
- This new technology will help companies protect proprietary
- information, protect the privacy of personal phone conversations
- and prevent unauthorized release of data transmitted
- electronically. At the same time this technology preserves the
- ability of federal, state and local law enforcement agencies to
- intercept lawfully the phone conversations of criminals.
-
- A "key-escrow" system will be established to ensure that the
- "Clipper Chip" is used to protect the privacy of law-abiding
- Americans. Each device containing the chip will have two unique
-
-
- 2
-
-
- "keys," numbers that will be needed by authorized government
- agencies to decode messages encoded by the device. When the
- device is manufactured, the two keys will be deposited separately
- in two "key-escrow" data bases that will be established by the
- Attorney General. Access to these keys will be limited to
- government officials with legal authorization to conduct a
- wiretap.
-
- The "Clipper Chip" technology provides law enforcement with no
- new authorities to access the content of the private
- conversations of Americans.
-
- To demonstrate the effectiveness of this new technology, the
- Attorney General will soon purchase several thousand of the new
- devices. In addition, respected experts from outside the
- government will be offered access to the confidential details of
- the algorithm to assess its capabilities and publicly report
- their findings.
-
- The chip is an important step in addressing the problem of
- encryption's dual-edge sword: encryption helps to protect the
- privacy of individuals and industry, but it also can shield
- criminals and terrorists. We need the "Clipper Chip" and other
- approaches that can both provide law-abiding citizens with access
- to the encryption they need and prevent criminals from using it
- to hide their illegal activities. In order to assess technology
- trends and explore new approaches (like the key-escrow system),
- the President has directed government agencies to develop a
- comprehensive policy on encryption that accommodates:
-
- -- the privacy of our citizens, including the need to
- employ voice or data encryption for business purposes;
-
- -- the ability of authorized officials to access telephone
- calls and data, under proper court or other legal
- order, when necessary to protect our citizens;
-
- -- the effective and timely use of the most modern
- technology to build the National Information
- Infrastructure needed to promote economic growth and
- the competitiveness of American industry in the global
- marketplace; and
-
- -- the need of U.S. companies to manufacture and export
- high technology products.
-
- The President has directed early and frequent consultations with
- affected industries, the Congress and groups that advocate the
- privacy rights of individuals as policy options are developed.
-
-
-
- 3
-
- The Administration is committed to working with the private
- sector to spur the development of a National Information
- Infrastructure which will use new telecommunications and computer
- technologies to give Americans unprecedented access to
- information. This infrastructure of high-speed networks
- ("information superhighways") will transmit video, images, HDTV
- programming, and huge data files as easily as today's telephone
- system transmits voice.
-
- Since encryption technology will play an increasingly important
- role in that infrastructure, the Federal Government must act
- quickly to develop consistent, comprehensive policies regarding
- its use. The Administration is committed to policies that
- protect all Americans' right to privacy while also protecting
- them from those who break the law.
-
- Further information is provided in an accompanying fact sheet.
- The provisions of the President's directive to acquire the new
- encryption technology are also available.
-
- For additional details, call Mat Heyman, National Institute of
- Standards and Technology, (301) 975-2758.
-
- - - ---------------------------------
-
- QUESTIONS AND ANSWERS ABOUT THE CLINTON ADMINISTRATION'S
- TELECOMMUNICATIONS INITIATIVE
-
- Q: Does this approach expand the authority of government
- agencies to listen in on phone conversations?
-
- A: No. "Clipper Chip" technology provides law enforcement with
- no new authorities to access the content of the private
- conversations of Americans.
-
- Q: Suppose a law enforcement agency is conducting a wiretap on
- a drug smuggling ring and intercepts a conversation
- encrypted using the device. What would they have to do to
- decipher the message?
-
- A: They would have to obtain legal authorization, normally a
- court order, to do the wiretap in the first place. They
- would then present documentation of this authorization to
- the two entities responsible for safeguarding the keys and
- obtain the keys for the device being used by the drug
- smugglers. The key is split into two parts, which are
- stored separately in order to ensure the security of the key
- escrow system.
-
- Q: Who will run the key-escrow data banks?
-
- A: The two key-escrow data banks will be run by two independent
- entities. At this point, the Department of Justice and the
- Administration have yet to determine which agencies will
- oversee the key-escrow data banks.
-
- Q: How strong is the security in the device? How can I be sure
- how strong the security is?
-
- A: This system is more secure than many other voice encryption
- systems readily available today. While the algorithm will
- remain classified to protect the security of the key escrow
- system, we are willing to invite an independent panel of
- cryptography experts to evaluate the algorithm to assure all
- potential users that there are no unrecognized
- vulnerabilities.
-
- Q: Whose decision was it to propose this product?
-
- A: The National Security Council, the Justice Department, the
- Commerce Department, and other key agencies were involved in
- this decision. This approach has been endorsed by the
- President, the Vice President, and appropriate Cabinet
- officials.
-
- Q: Who was consulted? The Congress? Industry?
-
- A: We have on-going discussions with Congress and industry on
- encryption issues, and expect those discussions to intensify
- as we carry out our review of encryption policy. We have
- briefed members of Congress and industry leaders on the
- decisions related to this initiative.
-
- Q: Will the government provide the hardware to manufacturers?
-
- A: The government designed and developed the key access
- encryption microcircuits, but it is not providing the
- microcircuits to product manufacturers. Product
- manufacturers can acquire the microcircuits from the chip
- manufacturer that produces them.
-
- Q: Who provides the "Clipper Chip"?
-
- A: Mykotronx programs it at their facility in Torrance,
- California, and will sell the chip to encryption device
- manufacturers. The programming function could be licensed
- to other vendors in the future.
-
- Q: How do I buy one of these encryption devices?
-
- A: We expect several manufacturers to consider incorporating
- the "Clipper Chip" into their devices.
-
- Q: If the Administration were unable to find a technological
- solution like the one proposed, would the Administration be
- willing to use legal remedies to restrict access to more
- powerful encryption devices?
-
- A: This is a fundamental policy question which will be
- considered during the broad policy review. The key escrow
- mechanism will provide Americans with an encryption product
- that is more secure, more convenient, and less expensive
- than others readily available today, but it is just one
- piece of what must be the comprehensive approach to
- encryption technology, which the Administration is
- developing.
-
- The Administration is not saying, "since encryption
- threatens the public safety and effective law enforcement,
- we will prohibit it outright" (as some countries have
- effectively done); nor is the U.S. saying that "every
- American, as a matter of right, is entitled to an
- unbreakable commercial encryption product." There is a
- false "tension" created in the assessment that this issue is
- an "either-or" proposition. Rather, both concerns can be,
- and in fact are, harmoniously balanced through a reasoned,
- balanced approach such as is proposed with the "Clipper
- Chip" and similar encryption techniques.
-
- Q: What does this decision indicate about how the Clinton
- Administration's policy toward encryption will differ from
- that of the Bush Administration?
-
- A: It indicates that we understand the importance of encryption
- technology in telecommunications and computing and are
- committed to working with industry and public-interest
- groups to find innovative ways to protect Americans'
- privacy, help businesses to compete, and ensure that law
- enforcement agencies have the tools they need to fight crime
- and terrorism.
-
- Q: Will the devices be exportable? Will other devices that use
- the government hardware?
-
- A: Voice encryption devices are subject to export control
- requirements. Case-by-case review for each export is
- required to ensure appropriate use of these devices. The
- same is true for other encryption devices. One of the
- attractions of this technology is the protection it can give
- to U.S. companies operating at home and abroad. With this
- in mind, we expect export licenses will be granted on a
- case-by-case basis for U.S. companies seeking to use these
- devices to secure their own communications abroad. We plan
- to review the possibility of permitting wider exportability
- of these products.
-
- --------------end-------------------------
-
- ------------------------------
-
- Date: Fri, 16 Apr 1993 16:43:02 EST
- From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
- Subject: File 4--Debate on Gov't Encryption Initiative (from CPSR)
-
- April 16, 1993
- Washington, DC
-
- COMPUTER PROFESSIONALS CALL FOR PUBLIC
- DEBATE ON NEW GOVERNMENT ENCRYPTION INITIATIVE
-
- Computer Professionals for Social Responsibility (CPSR)
- today called for the public disclosure of technical data
- underlying the government's newly-announced "Public Encryption
- Management" initiative. The new cryptography scheme was
- announced today by the White House and the National Institute
- for Standards and Technology (NIST), which will implement the
- technical specifications of the plan. A NIST spokesman
- acknowledged that the National Security Agency (NSA), the super-
- secret military intelligence agency, had actually developed the
- encryption technology around which the new initiative is built.
-
- According to NIST, the technical specifications and the
- Presidential directive establishing the plan are classified. To
- open the initiative to public review and debate, CPSR today
- filed a series of Freedom of Information Act (FOIA) requests
- with key agencies, including NSA, NIST, the National Security
- Council and the FBI for information relating to the encryption
- plan. The CPSR requests are in keeping with the spirit of the
- Computer Security Act, which Congress passed in 1987 in order to
- open the development of non-military computer security standards
- to public scrutiny and to limit NSA's role in the creation of
- such standards.
-
- CPSR previously has questioned the role of NSA in
- developing the so-called "digital signature standard" (DSS), a
- communications authentication technology that NIST proposed for
- government-wide use in 1991. After CPSR sued NIST in a FOIA
- lawsuit last year, the civilian agency disclosed for the first
- time that NSA had, in fact, developed that security standard.
- NSA is due to file papers in federal court next week justifying
- the classification of records concerning its creation of the
- DSS.
-
- David Sobel, CPSR Legal Counsel, called the
- administration's apparent commitment to the privacy of
- electronic communications, as reflected in today's official
- statement, "a step in the right direction." But he questioned
- the propriety of NSA's role in the process and the apparent
- secrecy that has thus far shielded the development process from
- public scrutiny. "At a time when we are moving towards the
- development of a new information infrastructure, it is vital
- that standards designed to protect personal privacy be
- established openly and with full public participation. It is
- not appropriate for NSA -- an agency with a long tradition of
- secrecy and opposition to effective civilian cryptography -- to
- play a leading role in the development process."
-
- CPSR is a national public-interest alliance of computer
- industry professionals dedicated to examining the impact of
- technology on society. CPSR has 21 chapters in the U.S. and
- maintains offices in Palo Alto, California, Cambridge,
- Massachusetts and Washington, DC. For additional information on
- CPSR, call (415) 322-3778 or e-mail <cpsr@csli.stanford.edu>.
-
- ------------------------------
-
- Date: 16 Apr 93 22:00:39 EDT
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 5--RU Sirius/Mondo interview (from GEnie)
-
- The following is an edited transcript of a GEnie real-time conference held
- with R.U. Sirius of Mondo 2000. The full transcript is available
- for downloading on GEnie. Reprinted with permission.
-
- Copyright (C), 1993 Jack Smith, the Writers' RoundTable All rights
- reserved. No part of this file may be reproduced or copied by any means
- (graphic, electronic, magical or mechanical) without the written permission
- of Jack Smith (GEnie address = WRITERS.INK, snail mail = 401 North
- Washington Street, Rockville, MD, 20850, MN3).
-
- This file was downloaded from the Writers' RoundTable on GEnie. To join
- GEnie you can signup via computer or by following these steps:
-
- 1) Set your communications software for half duplex (local echo) at 300,
- 1200 or 2400 baud.
- 2) Dial toll free: 1-800-638-8369 (or in Canada, 1-800-387-8330). When you
- see CONNECT on your screen, quickly type HHH.
- 3) At the U#= prompt, enter XTX99003,WRITERS and press Return.
- 4) Have a major credit card ready (or in the U.S., you can also use your
- checking account number).
- For voice information (in other words... a real person), call 800-638-9636.
- *************
- <[Jack] WRITERS.INK> Okay folks tonight's guest is R. U. Sirius of
- the Mondo 2000 magazine and book. I'll start off with the first
- question... How did you come up with the name for the magazine?
-
- <[R. U. Sirius]> We had a publication called Reality Hackers that wasn't
- doing that well. We were moving in the direction of cyberpunk and those
- kinds of influences and wanted something that had more of an overall pop
- gestalt.
-
- I was watching tv severely wasted one night and there were all these ads
- for this and that "2000." and a whole show called Discovery 2000. I
- crawled into Queen Mu's bedroom and said "Everybody's using 2000 to sell
- shit. Why not us?" She immediately came up with MONDO 2000 cause she knew
- that all the 0's would make for a good looking logo.
-
- <[Barbara] B.PAUL> I keep reading cyberpunk is dead; is that why you want a
- more pop gestalt?
-
- <[R. U. Sirius]> Well, in a literal sense, cyberpunk was never really
- alive. It's all media mythology and as the culture complexities, less and
- less people want to conform to any sort of tribal identity for a long
- period of time. But basically we wanted to really be effective
- communicators and succeed at what we're doing. And part of doing that
- involves a bit of strategic thinking while at the same time working within
- whatever your obsessions and interests happen to be... It was always
- important to us that we published a very slick looking magazine. It's
- like dressing up to get inside an establishment dinner. It's much more
- subversive, I think, than picketing outside with your fist in the air.
-
- <[Barbara] B.PAUL> Actually, I like the nonexistent cyberpunk myself; the
- word has attached itself to a certain style and pov that are distinctive.
- Do you mean you've lost interest in it?
-
- <[R. U. Sirius]> I like the sort of tough post punk no bullshit aesthetic
- that was expressed through cyberpunk sci fi and the way that sort of took
- on a living breathing reality in hacker and in industrial performance
- culture. I just don't like to get caught up in movements or names like
- cyberpunk. The sense of the thing continues. I know very few people who
- actually want to call themselves "a Cyberpunk."
-
- <HG> you seem to have an idea in mind in publishing MONDO 200o, do you have
- a succinct philosophy?
-
- <[R. U. Sirius] PRESS22>
- HA!!!! The explanation for the meme changes every time I have to answer
- the question. I'll put it in two ways, one of them politic and the other
- one vulgar
- 1) MONDO is a magazine for the culture of cyberspace, for a
- generation that has grown up inside of media, inside of bits and bytes
- and who can recognize the fact that this is the primary territory in
- which our socio-political and economic lives are taking place. It's
- about consciously occupying that space. In fact, it's possible that a
- relatively democratic do-it-yourself "sub"culture has really moved into
- cyberspace more completely than the power elites.
- 2: MONDO 2000 is here to give the high tech culture of America in the 90's
- the enema it so desperately needs!!!
-
- <[Bryce] K.CAMPBELL14> What's your opinion on the media/corporations
- applying the 'cyber' label to everything (from Networks like GEnie to
- microprocessor controlled toasters).
-
- <[R. U. Sirius] PRESS22> It's good for MONDO and what's good for MONDO is
- good for Amerika! Seriously though it's just another bit of language
- manipulation that everybody 'll soon get sick of next everybody from GE
- to toasters will try to latch on to shamanism... like, Be all that you can
- be in the new shamanic army etcetera.
-
- <[Danny] D.PERLMAN> I have limited contact with the mag, having skimmed the
- book and read issue 8 in the last 48 hours (my mind is cyber goo) but, I
- found it fascinating. However, I noted right off the bat that the leadoff
- article on Information America had some stuff that didn't quite sit right
- fact-wise, and with about 90 seconds of computer time determined that, at
- least according to the databases of the two newspapers cited, the articles,
- used as bibliographic reference don't exist. What's the deal? Are your
- articles intended to be "factual", or more for amusement?
-
- <[R. U. Sirius] PRESS22> I believe that article was intended to be accurate
- although employing hardcore fact checkers is not in our budget yet. We've
- gotten a number of letters on that piece going both ways, challenging some
- of the details or adding additional paranoid data to the brew. We'd be
- interested in any specific details that you care to refute.
-
- <[John] J.BILICSKA> Do you foresee MONDO 2000 ever becoming a victim of
- its own success, a la ROLLING STONE (since mass culture absorbs every
- counterculture, eventually)?
-
- <[R. U. Sirius] PRESS22> If the magazine gets sold to somebody else, it
- might get wimp-ized. But as long as Mu and I are at it, it'll always be
- wierd. We can't help it. SUre, we might sell it some day and apply our
- wierdness to something else.
-
-
- <[John] J.BILICSKA> Are you contemplating a multimedia/interactive
- version of MONDO 2000? I think it would really blow the minds of
- suburbanites buying those CD-ROM drives.
-
- <[R. U. Sirius] PRESS22> Yeah, I'm talking with somebody right now about
- doing a cd rom version of the Guide. Also, might edit a cd rom version
- of Peter Stafford's Psychedelic's Encyclopedia, a return to my roots for
- me... hope CBS doesn't hear about it!
-
- <[CuD] GRMEYER> I've been enjoying the book and mag for quite some time
- now, thanks. I've wondered if you've ever run into any 'censorship' (at
- whatever level).
-
- <[R. U. Sirius] PRESS22> We've had problems with printers, I believe over
- female breasts, though the current printer, who we've been with for I
- think 5 issues, hasn't given us any problems. We've had some internal
- wrangles, which I won't go into... guess I'll have to write an
- autobiography some day.
-
- <[Jack] WRITERS.INK> Since magazines tend to be business and business means
- money, I was curious if you have control of the magazine or if you have
- investors who profer opinions and advice. Success doesn't always bring
- the best ... er help.
-
- <[R. U. Sirius] PRESS22> To be honest, Queen Mu is the majority owner and
- has complete control over the magazine. We do wrestle occasionally...
-
-
- ***end of conference excerpt***
-
- ------------------------------
-
- Date: Thu, 8 Apr 93 23:59:48 CDT
- From: Ron <acct069@CARROLL1.CC.EDU>
- Subject: File 6--Rune Stone BBS (IIRG Home Board) Back On-Line
-
- US BBS Callers: Rune Stone BBS (IIRG WHQ) 203-832-8441 NUP:Conspiracy
-
- Thanks once again: Mercenary/IIRG
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- THE INTERNATIONAL INFORMATION RETRIEVAL GUILD
-
- Invites The Readers of CUD
-
- To Call and Participate on The IIRG's Public
- Bulletin Board System, and WHQ :
-
- The Rune Stone BBS.
-
- Available at: (203)-832-8441
- 14.4 HST Public Node
- 1200-2400 Baud Callers Welcome
-
- Home of The IIRG Archives and Phantasy Magazine
- 3000+ Hack/Phreak Text and Magazines
- Archived by The IIRG.
-
- NO Ratios, and No Access Charges
- in the tradition of FREE information for all.
-
- Sysop: Mercenary Co-Sysop: Anubis
- New User Password: CONSPIRACY
-
- ------------------------------
-
- End of Computer Underground Digest #5.28
- ************************************
-
-