home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun June 06 1993 Volume 5 : Issue 41
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Editor: Etaoin Shrdlu, Senrio
-
- CONTENTS, #5.41 (June 06 1993)
- File 1-- LODCOM@ Mail Bounces Fixed --
- File 2-- CuD (and other stuff) for Non-Internet readers
- File 3-- A New public CU BBS in Southern Italy
- File 4-- Sending E-Mail to Clinton and Gore
- File 5-- Electronic fingerprinting of welfare recipients in CA
- File 6-- Email "Etiquette"
- File 7-- Microstate: Old Empires and New (New Repub. Reprint)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-6430), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) 203-832-8441 NUP:Conspiracy
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 04 June 1993 22:51:01 EDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 1--LODCOM@ Mail Bounces Fixed --
-
- CuD 5.39 ran a special issue describing the LOD's ambitious project of
- "hacker" BBSes in the 1980s. We received a number of inquiries about
- bounced mail back from lodcom@mindvox.phantom.com. Mindvox upgrade of
- mail services created a temporary snag. We're informed that mail that
- seemed to bounce in fact arrived, so those inquiring about LOD's "BBS
- History Project" should have received a response by now.
-
- For more information on the LOD project, including what files are
- currently available and the price list for each, contact them directly
- at lodcom@mindvox.phantom.com
-
- ------------------------------
-
- Date: Wed, 02 Jun 1993 19:32:57 -0600
- From: af814@FREENET.HSC.COLORADO.EDU(ERIC PAUL)
- Subject: File 2--CuD (and other stuff) for Non-Internet readers
-
- My name is Eric Paul. I have received your fine publication
- since midway through volume 4. I have decided to give
- something back to the "Underground" community for all the
- service that you have given me. I run The SpellBook BBS here
- in Plainville, Mass. We run at 14.4 v.32b v.42b. I have all of
- Volume 5 available for download in a no-ratio area. I also
- support FREQ in Fidonet, Chateaunet, and Maxnet. Anonymous/
- unlisted systems are welcome. Please feel free to add my
- information to your list of sources to try and take the load off
- of some of the backbone FTP sites. Thanks again for such a fine
- publication.
-
- Eric Paul
- BBS: 508/695-9656
- Fido: 1:333/596
- Chateau: 100:6100/101
- Maxnet: 90:171/301
-
- ------------------------------
-
- Date: Fri, 04 Jun 93 10:16:52 GMT
- From: luc pac <LPACCAG@ITNCISTI.BITNET>
- Subject: File 3--A New public CU BBS in Southern Italy
-
- (MODERATORS' NOTE: Luciano has been working on setting up his system
- in Southern Italy for the past few months, and it's just about set to
- roll. As he reminded us, Italy is a relatively under-devopled country
- and lacks the access to Internet, BBS, and other resources that many
- of us take for granted. We wish him well in providing a public site
- for information in his part of the world)).
-
- I'm glad to let you know: I have set up a public BBS exclusively
- dedicated to the computer underground and counter-cultural issues. You
- can connect and download stuff such as CuD, Phrack, EFF's bulletins,
- 'zines, academy papers, SPUNK Press writings, and the like.
- Furthermore, there are a few echo conferences about cyberpunk and
- libertarian/anarchistic issues.
-
- It is NOT a H/P BBS. Its archive is meant to be used by any kind of
- people: H/P community as well as scholars and researchers. I myself
- am writing my final dissertation on CMC and the building of virtual
- communities.
-
- BITs Against The Empire BBS is cybernet and *fidonet* node
- (2:333/412), and stuff can be downloaded via File/Request open to
- everyone (points and unlisted nodes included). Because of my lack of
- money/time, the system is *NOT* 24h. It is only open 23.00 to 7.15
- local time -- that is GMT - 1 (NY should be six hours late, LA nine
- hours).
-
- I just thought it is interesting to you knowing that CuD can be found
- outside the Internet in South Europe.
-
- The BBS number is: +39-461-980493
-
- ------------------------------
-
- Date: Thu, 04 June 1993 22:51:01 EDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 4--Sending E-Mail to Clinton and Gore
-
- THE WHITE HOUSE
-
- Office of Presidential Correspondence
-
- ++++++++++++++++++
- For Immediate Release June 1, 1993
-
-
- LETTER FROM THE PRESIDENT AND VICE PRESIDENT
- IN ANNOUNCEMENT OF WHITE HOUSE ELECTRONIC MAIL ACCESS
-
- Dear Friends:
-
- Part of our commitment to change is to keep the White House in
- step with today's changing technology. As we move ahead into the
- twenty-first century, we must have a government that can show the way
- and lead by example. Today, we are pleased to announce that for the
- first time in history, the White House will be connected to you via
- electronic mail. Electronic mail will bring the Presidency and this
- Administration closer and make it more accessible to the people.
-
- The White House will be connected to the Internet as well as
- several on-line commercial vendors, thus making us more accessible and
- more in touch with people across this country. We will not be alone
- in this venture. Congress is also getting involved, and an exciting
- announcement regarding electronic mail is expected to come from the
- House of Representatives tomorrow.
-
- Various government agencies also will be taking part in the near
- future. Americans Communicating Electronically is a project developed
- by several government agencies to coordinate and improve access to the
- nation's educational and information assets and resources. This will
- be done through interactive communications such as electronic mail,
- and brought to people who do not have ready access to a computer.
-
- However, we must be realistic about the limitations and
- expectations of the White House electronic mail system. This
- experiment is the first-ever e-mail project done on such a large
- scale. As we work to reinvent government and streamline our
- processes, the e-mail project can help to put us on the leading edge
- of progress.
-
- Initially, your e-mail message will be read and receipt
- immediately acknowledged. A careful count will be taken on the number
- received as well as the subject of each message. However, the White
- House is not yet capable of sending back a tailored response via
- electronic mail. We are hoping this will happen by the end of the
- year.
-
- A number of response-based programs which allow technology to
- help us read your message more effectively, and, eventually respond to
- you electronically in a timely fashion will be tried out as well.
- These programs will change periodically as we experiment with the best
- way to handle electronic mail from the public. Since this has never
- been tried before, it is important to allow for some flexibility in
- the system in these first stages. We welcome your suggestions.
-
- This is an historic moment in the White House and we look forward
- to your participation and enthusiasm for this milestone event. We
- eagerly anticipate the day when electronic mail from the public is an
- integral and normal part of the White House communications system.
-
- President Clinton Vice President Gore
-
- PRESIDENT@WHITEHOUSE.GOV VICE.PRESIDENT@WHITEHOUSE.GOV
-
- ------------------------------
-
- Date: Sun, 23 May 1993 11:33:44 -0700
- From: "James I. Davis" <jdav@WELL.SF.CA.US>
- Subject: File 5--Electronic fingerprinting of welfare recipients in CA
-
- I spoke on Thursday (5/13) at a hearing before the San Francisco
- Social Services Commission regarding their plan to begin requiring
- that welfare recipients submit to electronic fingerprinting as a
- condition of receiving public assistance. I am sending out a copy
- of my remarks (it's a rather long posting) under "separate cover."
-
- Here is some background information on the issue:
-
- I collected most of the data contained in my remarks from
- interviews with various people, and some memos and press releases
- from various agencies. I understand that there is a small piece in
- a recent _Mother Jones_ about the experience in LA, which supports
- the points I made in my remarks. I have a more pointed piece in
- the CPSR/Berkeley newsletter if you are interested.
-
- In June of 1991, Los Angeles County began requiring electronic
- fingerprints as a condition of receiving General Assistance (GA).
- GA is a state-mandated, county administered program for indigent
- adults. The system is ostensibly designed to deter people from
- receiving benefits under multiple names, although their are many
- aspects of the system that could bear more serious scrutiny than
- it has received to date.
-
- LA is spending some $9.4 million over five years on the Automated
- Fingerprint Image Reporting and Match System (AFIRM), AFIRM was
- developed by computer services giant Electronic Data Systems. In
- February of this year, Alameda County started using the system, at
- an estimated cost of $1.3 million. San Francisco is currently
- considering adopting the system. The Department of Social Services
- says it will cost $1 million to implement, but I think that is
- low. The AFIRM proposal was approved by the SF Social Services
- Commission on May 13, and the matter now goes to the SF Board of
- Supervisors, who must approve a change in the ordinance governing
- GA, to include the fingerprinting requirement. The next step will
- be a hearing before one or more committees (perhaps Willie
- Kennedy's on social policy, and/or the finance committee), most
- likely in early June.
-
- Any suggestions for questions about the system will be very
- helpful, especially questions about technical, privacy and
- security issues. It is clear that SF plans to link the system up
- with other counties and share data with them regularly. Also if
- you have any expertise on fingerprinting and law enforcement, I
- need some info on that.
-
- The AFIRM system only makes sense if it is installed on as wide a
- basis, and for as many public assistance programs as possible. On
- the other hand, the more counties that refuse to participate, the
- less likely it will be to take root. I think that there is an
- opportunity to stop it at the SF Board of Supervisors...
-
- Jim D.
-
- ++++++++++++++++++++++=
-
- STATEMENT BEFORE THE SAN FRANCISCO SOCIAL SERVICES COMMISSION
- REGARDING THE AFIRM SYSTEM
-
-
- My name is Jim Davis, and I live at 414 Chestnut Street in San
- Francisco. I am here in two capacities, first, as a San Francisco
- resident and taxpayer, and second, as the western regional
- director for Computer Professionals for Social Responsibility
- (CPSR). Computer Professionals for Social Responsibility is a
- national public-interest alliance of computer scientists,
- engineers, users and others interested in the impact of computer
- technology on society. We work to influence decisions regarding
- the development and use of computers because those decisions have
- far-reaching consequences and reflect basic values and priorities.
- CPSR has 500 members in the Bay Area.
-
- Fingerprinting of people as a requirement for receiving General
- Assistance (GA) benefits is a bad idea, for several reasons:
-
- * the proposed system is unnecessary;
-
- * its use cannot be justified for the reasons put forward by the
- Department of Social Services;
-
- * it shifts resources from providing benefits to expanding the
- welfare bureaucracy;
-
- * the costs of the system have most likely been understated, and
- the benefits overstated;
-
- * it is fraught with risks for people who receive welfare;
-
- * it is an affront to anyone who must rely on welfare;
-
- * it sets a dangerous precedent for everyone who receives any kind
- of government assistance;
-
- * it sends a false message to San Franciscans about welfare.
-
-
- Please allow me to elaborate.
-
-
- THE SYSTEM IS UNNECESSARY.
-
- The proposed Automated Fingerprint Image Reporting and Match
- System (AFIRM) is unnecessary. AFIRM is intended to deter fraud by
- preventing GA recipients from signing up under more than one name.
- However, current policy requires people to provide a state ID card
- or driver's license to DSS before they can receive GA. According
- to Bill Madison, an information officer with the Department of
- Motor Vehicles, it is extremely difficult to obtain identification
- under more than one name. DMV personnel are trained to identify
- false documentation. Suspicious requests for ID are passed along
- to their security unit, which can utilize their database of
- digital fingerprints and photographs to determine if a duplicate
- request has been made. That is, the checks against maintaining
- more than one identity are already in place. The AFIRM system is
- redundant, and duplicates government resources. As such, it is a
- waste of our money.
-
-
- AFIRM'S USE CANNOT BE JUSTIFIED FOR THE REASONS GIVEN BY DSS.
-
- AFIRM's use cannot be justified for the reasons put forward by the
- Department of Social Services. The rationale for installing AFIRM
- is not to detect fraud per se. In fact, Alameda County, which
- began using the AFIRM system in early February, is about 80% done
- with fingerprinting of existing GA clients. With approximately
- 9,000 GA cases processed, only six matches have been found, and
- none of those matches were cases of fraudulent behavior. The
- stated purpose of AFIRM, rather, is to deter alleged fraud by
- driving away people who would "double-dip" in the GA program.
-
- >From Alameda County's experience, in fact the caseload has dropped
- by 147 cases since the system was implemented. But without any
- data as to why the caseload dropped, it is spurious logic at best
- to assert that fraud has been rooted out. Much more likely reasons
- for the caseload drop are missed appointments, perhaps because of
- lost or missed mail; fears about being fingerprinted; concerns
- about privacy; or the inevitable problems of processing 11,000
- cases. A 98.5% rate of success in processing would be admirable in
- most quality assurance managers' book; but the other 1.5% that are
- failures could still account for all of the dropped cases.
-
- In fact any substantial change in case-handling could result in a
- drop in cases, of people who are entitled to receive benefits. I
- have yet to see any data to substantiate the claim that AFIRM has
- deterred fraud. All that can be said is that AFIRM is an
- expensive, additional obstacle to receiving GA, and that its use
- coincides with a reduction in caseloads. However, the purpose of
- AFIRM is not to reduce caseloads, and any other goals of using the
- system cannot be proven with currently available data. That makes
- AFIRM an expensive, long-term "maybe."
-
-
- AFIRM SHIFTS RESOURCES FROM SERVICES TO BUREAUCRACY.
-
- AFIRM represents additional costs in GA administration, with no
- rise in the benefits pool. As such, it means that the ratio of
- administration-to-benefits has gone up; that is, new
- inefficiencies are built into the welfare system. Computers are
- not a magic solution, and additional infrastructure is required to
- install and maintain hardware and software, and train users and
- adjust office procedure. Inflating bureaucracy at the expense of
- services-provided is not a wise use of taxpayer money.
-
-
- THE COSTS OF THE SYSTEM HAVE MOST LIKELY BEEN UNDERSTATED, AND THE
- BENEFITS OVERSTATED.
-
- In his letter to Mayor Frank Jordan, DSS General Manager Brian
- Cahill wrote that the system "would cost in the neighborhood of $1
- million over a 5 year period. Our costs would be based on hardware
- and the number of cases on GA." Yet Alameda County estimates that
- the same system there will cost $1.3 million over a five year
- period. San Francisco's case load is 50% higher that Alameda's,
- meaning that the anticipated cost to San Francisco could be twice
- Cahill's estimate. In addition, adopting new systems mean many
- hidden costs: inefficiencies while adopting a new system, staff
- frustration on the learning curve, lost time due to re-processing
- cases that were erroneously closed, etc. Such costs could further
- inflate the $2 million price tag. Furthermore, if data-sharing
- begins with other counties, additional administrative resources
- will be required. The dollar costs need to be examined very
- carefully.
-
- Likewise, the alleged savings from using the system could bear
- more serious scrutiny. For example, Cahill asserts that Alameda
- County saved $360,000 in four months by discontinuing 35 cases.
- Cahill is claiming savings that would be realized over a three
- year period in the first few months. It's dubious accounting to
- claim all of the benefits before they are actually realized. A
- more honest accounting using Cahill's figures would be to say that
- the $21,000 per month system saved $11,000 a month. Using the
- latest Alameda figure of 147 cases dropped, the system appears to
- begin to pay for itself. But one must ask, how many of those
- dropped cases will be reopened, torpedoing the inflated benefits
- of the AFIRM system? In addition, the largest drop in cases will
- most likely happen during the changeover period, so projections
- should not be based on an initial rate of dropping caseloads. To
- reassert, the claimed savings should not be taken at face value.
-
-
- AFIRM IS FRAUGHT WITH RISKS TO GA RECIPIENTS.
-
- DSS has assured the Mayor's office that AFIRM fingerprint
- information will not be shared with police agencies. The AFIRM and
- police computer systems are distinct, and department policy
- forbids sharing of information. However, such assurances are not,
- and cannot be enough. First, the line between social services and
- law enforcement is becoming increasingly blurred. The stated
- rationale for the fingerprinting system is in fact a law
- enforcement one -- to prevent criminal activity. DSS already works
- closely with the District Attorney's office in investigating
- alleged fraud. Information is shared between the agencies; and
- whether it is the fingerprint itself or information derived from
- fingerprint searches, the protestations that data sharing will not
- take place are seriously weakened.
-
- "Unofficial" use of the data poses additional problems. Data
- stored on a computer is much more prone to unauthorized
- duplication, modification, and transmission than its low-tech
- counterparts. And such problems are even more likely in the
- absence of a thought-out policy regarding the security of computer
- records. Does DSS have a computer security policy? Who will have
- access to the fingerprint information? What audit trail will be
- maintained regarding changes to data on the system? Is DSS taking
- into account where technology will be five years from now, as
- equipment costs will most assuredly drop, and computing search
- power will grow. Access issues will continue to grow in
- complexity.
-
- Furthermore, I have been told of cases in recent history where
- zealous DSS employees have shared information with police, against
- stated department policy. Local newspapers have reported on police
- officers keeping duplicate sets of police data on their home
- computers, against policy. And I'm sure that you are all aware of
- the current case of former police inspector Tom Gerard, who is
- charged with stealing confidential police files and suspected of
- selling the information to other agencies and even to other
- governments. The point is that once data assumes a digital format,
- it tends to persist in computer systems, and to leak about. One
- must carefully weigh the questionable benefits of AFIRM against
- the potential abuse of the system, and the loss of privacy for GA
- recipients. The simplest solution in this case is not to collect
- the information in the first place.
-
-
- AFIRM IS AN AFFRONT TO ANYONE ON WELFARE.
-
- The AFIRM system is based on a presumption of guilt. That is,
- unless you confirm your innocence of not double-dipping, you are
- assumed to be guilty of it. This contravenes a basic
- constitutional principle.
-
-
- AFIRM SETS A DANGEROUS PRECEDENT FOR ANYONE RECEIVING GOVERNMENT
- ASSISTANCE.
-
- If AFIRM takes root in San Francisco, it will continue to spread
- to other counties, and to other government programs. Social
- service administrators have made it clear that they intend to
- extend the reach of the AFIRM system. Other counties in the Bay
- Area have considered adopting it for their GA programs. More
- ominous, Los Angeles will begin in June a $21 million pilot
- program to quadruple the reach of the program to include people
- receiving assistance from the Aid to Families with Dependent
- Children (AFDC) program. Alameda County is rumored to be exploring
- the same thing, and who knows, it may be under discussion in San
- Francisco. But why stop the program there? Anyone receiving any
- kind of government support, from social security to veterans
- benefits to income tax deductions could be equally culpable of
- defrauding the government. Why not fingerprint them before
- providing support. Who knows where it would end? This is a bad
- precedent being tested on a vulnerable group of San Franciscans.
-
-
- AFIRM SENDS A FALSE MESSAGE ABOUT WELFARE.
-
- It shouldn't need to bear repeating, but being poor is not a
- crime. Yet the law enforcement aura surrounding fingerprinting is
- inescapable. Last year, for example, the Wall Street Journal
- reported that airport officials, looking for a way to speed people
- through immigration at Kennedy Airport, decided not to use
- fingerprinting technology to match people with their passports.
- "We didn't want to get into fingerprints because of law
- enforcement connotations," said Richard Norton, the Air Transport
- Association's senior director of facilitation. Requiring
- fingerprinting for receiving benefits reinforces an all-too-common
- perception of criminality. This is a divisive message to send to
- San Franciscans about General Assistance.
-
- For the reasons just stated, I repeat that the AFIRM system is a
- bad idea, and I urge you to decide against its implementation.
-
- Thank you for your patience.
-
-
- Jim Davis
- 414 Chestnut Street
- San Francisco, CA 94133
- (415) 398-2818
-
- May 13, 1993
-
- ------------------------------
-
- Date: Thu, 20 May 93 16:07:27 EDT
- From: Jerry Leichter <leichter@LRW.COM>
- Subject: File 6--Email "Etiquette"
-
- I thought you might find the following interesting for historical
- value. Some things haven't changed much since 1984, but some have.
- In particular, while the general ideas in this posting area as much
- part of the net gestalt now as they were 9 years ago, what I find
- striking is the change in tone. There's no feeling of a flame war
- ready to break out at any moment, and in fact there is only a single
- reference to "flames", and that in a context somewhat different form
- contemporary usage. For me, it was a bit of a walk down memory lane;
- the style and tone were very familiar, but hearing them again made
- clear how the world has changed.
- -- Jerry
-
- Date--Mon, 17 May 93 10:47:44 -0400
- From--John Robinson <jr@ksr.com>
- Sender--jr@ksr.com
- To--silent-tristero@Think.COM
- Subject--an impressive show
-
- +------- Start of forwarded message -------
- From--cmb
- Subject--[deg@wise1.tau.ac.il--Re--Email "Etiquette"]
- Date--Mon, 17 May 93 10:01:48 EDT
-
- I hope enough of this 1984 Lisp-based humor is still funny in a 1993
- Unix-centered world. Note that the mail reading and composing
- software was much more complex than today and that users often used
- multiple fonts (some of their own creation) in messages. Bug reports
- automatically included a stack backtrace and the values of all
- arguments and local variables along with the version and patch level
- of all software.
-
- From--David Goldfarb <deg@wise1.tau.ac.il>
- To--Tom McMahon <tlm@triple-i.com>
- Cc--The-Usual-Suspects@triple-i.com
- Subject--Re--Email "Etiquette"
- Date--Fri 14-May-93 14:37:49 IST
-
- Years and years ago there was a rather facetious Email "etiquette" file
- floating around. CWR seems to remember it having possibly been
- authored by BSG. If anyone knows its whereabouts could you please send
- me a copy?
-
- I knew my old "humor.mai" file would come in useful some day :-)
-
- I've decided that this is such an important message for our time that
- it should be forwarded to the whole list. Enjoy!
-
- Please note the following line from Bernie's message:
-
- "Inclusion of very old messages from others makes for an impressive show."
-
- David
-
-
- Date--Friday, 13 April 1984, 16:16-EST
- From--Bernard S. Greenberg <BSG at SCRC-TENEX>
- Subject--Mail Style
- To--fun at SCRC-TENEX
-
- (For those of of you who have read this already, MLB has just made
- a substantial contribution of the highest quality to this file,
- and you should read it again from the string "MLB" on.)
-
- Based upon recent discussions of proper etiquette and style in
- electronic mail, I have prepared a [satiric] document on the subject.
- SCRC:<BSG>MAIL-STYLE.TEXT
-
- ============= S:>BSG>Mail-Style.text inserted 10/16/85 ==============
-
- Proposed Symbolics guidelines for mail messages
- BSG 4/11/84
-
- It is impermissible to use the term "EMAIL".
-
- Mail should be at least a mixture of upper and lower case. Devising
- your own font (Devanagari, pinhead graphics, etc.) and using it in the
- mail is a good entertainment tactic, as is finding some way to use
- existing obscure fonts.
-
- Sending the mail from Unix is frowned upon (although this has gotten
- much better).
-
- It is customary to attack the someone by including his or her message,
- indented (unless you are using MM), and replying point by point, as
- someone debating someone they are watching on TV, or hearing on the
- radio.
-
- It is considered artful to append many messages on a subject, leaving
- only the most inflammatory lines from each, and reply to all in one
- swift blow. The choice of lines to support your argument can make or
- break your case.
-
- Replying to one's own message is a rarely-exposed technique for
- switching positions once you have thought about something only after
- sending mail.
-
- State opinions in the syntax of fact: "...as well as the bug in LMFS
- where you have to expunge directories to get rid of files....."
-
- If you have nothing to say on a subject, replying with a line such as
- "I agree with this." puts you in the TO:'s for all future messages,
- and establishes you as "one who really cares", if not an actual
- expert, on the topic at hand.
-
- Inclusion of very old messages from others makes for an impressive
- show.
-
- The choice of a subject line is of supreme importance. It should be
- concise and witty. The subject line has to survive once the discussion
- has diverged far past the original subject. Remember "Hewitt AP0"?
- Oblique allusion to past famous subject lines is one of the best
- techniques for generating subjects. So is any reference to drawings of
- B. Kliban.
-
- People can be set wondering by loading obscure personal patchable
- systems, and sending bug reports. Who would not stop and wonder upon
- seeing "Experimental TD80-TAPE 1.17, MegaDeath 2.5..."? The same
- for provocatively-named functions and variables in stack traces.
-
- Know the list of "large, chronic problems". If there is any problem
- with the window system, blame it on the activity system. Any lack of
- user functionality should be attributed to the lack of a command
- processor. A surprisingly large number of people will believe that you
- have thought in depth about the issue to which you are alluding when
- you do.
-
- Know how to blow any problem up into insolubility. Know how to use
- the phrase "The new ~A system" to insult its argument, e.g., "I guess
- this destructuring LET thing is fixed in the new Lisp system", or
- better yet, PROLOG.
-
- Never hit someone head on, always sideswipe. Never say, "Foo's last
- patch was brain-damaged", but rather, "While fixing the miscellaneous
- bugs in 243.xyz [foo's patch], I found...."
-
- You get 3 opportunities to advertise your Rock band, no more.
-
- Idiosyncratic indentations, double-spacing, capitalization, etc.,
- while stamps of individuality, leave one an easy target for parody.
-
- Strong language gets results. "The reloader is completely broken
- in 242" will open a lot more eyes than "The reloader doesn't
- load files with intermixed spaces, asterisks, and <'s in their names
- that are bigger than 64K". You can always say the latter in a later
- paragraph.
-
- The entire life, times, collected works, expressions, and modalities
- of Zippy the Pinhead are a common ground for much of the metaphor,
- rhetoric, and invective which pass daily through the mail. An occasional
- parenthetical "yow" CORRECTLY USED will endear one to the senior
- systems staff. So will puns and other remarks addressed directly
- to the point.
-
- +------------------------------------------------------------
- MLB volunteered the following, 4/13/84
-
- Including a destination in the CC list that will cause the recipients'
- mailer to blow out is a good way to stifle dissent.
-
- When replying, it is often possible to cleverly edit the original
- message in such a way as to subtly alter its meaning or tone to your
- advantage while appearing that you are taking pains to preserve the
- author's intent. As a bonus, it will seem that your superior
- intellect is cutting through all the excess verbiage to the very heart
- of the matter.
-
- Referring to undocumented private communications allows one to claim
- virtually anything: "we discussed this idea in our working group last
- year, and concluded that it was totally brain-damaged".
-
- Points are awarded for getting the last word in. Drawing the
- conversation out so long that the original message disappears due to
- being indented off the right hand edge of the screen is one way to do
- this. Another is to imply that anyone replying further is a hopeless
- cretin and is wasting everyone's valuable time.
-
- Keeping a secret "Hall Of Flame" file of people's mail indiscretions,
- or copying messages to private mailing lists for subsequent derision,
- is good fun and also a worthwhile investment in case you need to
- blackmail the senders later.
-
- Users should cultivate an ability to make the simplest molehill into a
- mountain by finding controversial interpretations of innocuous
- sounding statements that the sender never intended or imagined.
-
- Obversely, a lot of verbal mileage can also be gotten by sending out
- incomprehensible, cryptic, confusing or unintelligible messages, and
- then iteratively "correcting" the "mistaken interpretations" in the
- replys.
-
- Electronic mail is an indispensable component of the automated office.
- Besides providing entertainment, it gives one the appearance of
- engaging in industrious and technically sophisticated activity. By
- flaming constantly on numerous mailing lists, one can be assured of a
- ready supply of makework as well as an opportunity to establish one's
- reputation amongst the "literati".
-
- ------------------------------
-
- Date: Thu, 3 Jun 1993 20:42 CDT
- From: <BOEHLEFELD@WISCSSC.BITNET>
- Subject: File 7--Microstate: Old Empires and New (New Repub. Reprint)
-
- ((MODERATORS' NOTE: In the year 2250, some enterprising social
- scientist might compare the political systems of constitutional
- democracy and Gatesean democratic technocracy and come up with the
- following typology):
-
- | > "MicroState: Old Empires and New" by Douglas Coupland, in
- | > _The New Republic_, June 7, 1993.
- | >
- | > ==============================================================
- | > Constitutional Democracy | Microsoft
- | > ===================================+==========================
- | > born in 18th c. France | born in
- | > and the United States | 1970s Seattle
- | > -----------------------------------|-----------------------------------
- | > People of a common culture | People of a common culture
- | > ruling a common territory | ruling a common industry
- | > -----------------------------------|-----------------------------------
- | > constitutions | MS-DOS
- | > -----------------------------------|-----------------------------------
- | > self-determination | compelling applications
- | > -----------------------------------|-----------------------------------
- | > freedom | Windows
- | > -----------------------------------|-----------------------------------
- | > obsolete monarchies and empires | IBM
- | > -----------------------------------|-----------------------------------
- | > tricoteuses | the media
- | > -----------------------------------|-----------------------------------
- | > "Let them eat cake" | "The PC will never catch on"
- | > -----------------------------------|-----------------------------------
- | > Protestant individualism | loner nerds
- | > -----------------------------------|-----------------------------------
- | > enlightenment | microprocessors
- | > -----------------------------------|-----------------------------------
- | > secularism | no wardrobe restrictions
- | > | at the office
- | > -----------------------------------|-----------------------------------
- | > the rise of science | software upgrades
- | > -----------------------------------|-----------------------------------
- | > rationalism | Mr. Spock worship
- | > -----------------------------------|-----------------------------------
- | > Boston Tea Party | Starbuck's coffee addiction
- | > -----------------------------------|-----------------------------------
- | > radicals | cyberpunks
- | > -----------------------------------|-----------------------------------
- | > civil liberties pioneers | hackers
- | > -----------------------------------|-----------------------------------
- | > preceded industrialism | precedes post-industrialism
- | > ==============================================================
-
- ------------------------------
-
- End of Computer Underground Digest #5.41
-