home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Oct 24 1993 Volume 5 : Issue 83
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Erattaer: Etaoin Shrdlu, III
-
- CONTENTS, #5.83 (Oct 24 1993)
- File 1--CuD is taking TWO WEEKS OFF (Returning 7 November)
- File 2--Elansky Accepts Plea Agreement (Hartford BBS update)
- File 3--A Foreign Embassy Information Infrastructure
- File 4--DES Broken?
- File 5--Computers & Sustainable Society
- File 6--Students Suspended For Electronic Documents
- File 7--NOMA (Nat'l Online Media Association) BBS Org. Formed
- File 8--A Reporter meets "cyberpunks" (news item)
- File 9--"Cyber Comics" (Monterey Cty Coast Weekly Summary)
- File 10--Belated response to F. Cohen (CuD 5.80)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- UNITED STATES:
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- ftp.eff.org (192.88.144.4) in /pub/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sun 24 Oct 1993 15:19:41 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 1--CuD is taking TWO WEEKS OFF (Returning 7 November)
-
- CuD will be taking two weeks off, beginning after this issue (5.83).
- Conference and other travel from Oct 27 thru Nov 3, and "cold-turkey"
- withdrawal from all computer activity during that week means that
- we won't be answering mail for that eight day period. But, send in
- the articles and we'll deal with them on return.
-
- The next CuD (#5.84) will come out Sunday, 7 November.
-
- ------------------------------
-
- Date: Sat, Sep 23 1993 11:22:18 CDT
- From: CuD Moderators (tk0jut2@mvs.cso.niu.edu)
- Subject: File 2--Elansky Accepts Plea Agreement (Hartford BBS update)
-
- ((MODERATORS' NOTE: The case of Michael Elansky (Ionizer), sysop of
- the former Ware House BBS in West Hartford, Ct., is drawing to a
- close. Elansky was arrested in August for making "anarchy files," both
- written by a 15 year old four years ago, available on his BBS.
- Although the case was compounded by Elansky's previous legal problems,
- the arrest specifically for possession of Constitutionally protected
- literature was seen by CuD editors and many others as a potential
- threat to freedom of expression in cyberspace (see CuD 5.69, 5.71,
- 5.72, 5.78).
-
- While not formally dropping the charges for the literature, a failure
- that we find troubling, the charges will not be pursued. As Richard
- Brown, Elansky's attorney, observes, the prosecutor appears to have
- violated the Constitution. If so, it would be refreshing to the
- prosecutor held to the same standards of criminal liability to which
- Elansky and others are held.
-
- We are indebted to the anonymous reader who provided the information
- from the Hartford Courant, edited to conform to "fair use"
- guidelines)).
-
- ++++++++
-
- "WEST HARTFORD MAN MAY GET 3-YEAR TERM IN BOMB RECIPE CASE"
- By Matthew Kauffman, The Hartford Courant, Oct. 23, 1993
-
- A 21-year-old West Hartford man will not be prosecuted
- for running a computer bulletin board that told how to make
- bombs and kill law-enforcement agents, but faces as many as
- three years in prison on other charges.
-
- ((The article explains that Elansky has been held in jail since August
- on $500,000 bond. As part of a plea agreement on Friday, Elansky
- admitted to two violations of probation that could include up to three
- years in state prison)).
-
- But Elansky's attorney asked Superior Court Judge Thomas
- P. Miano to impose no additional prison time. After an hour,
- Miano halted the Friday sentencing hearing without deciding
- whether Elansky belongs behind bars.
-
- ((The judge indicated that he simply didn't know enough Elansky to
- make a decision, and required additional time)).
-
- Authorities have portrayed Elansky as a dangerous young
- man, obsessed with explosives and antagonistic toward
- police. When officials gained access to the bulletin board,
- they found a file replete with bomb recipes and techniques
- for "maiming or mortally wounding" law enforcement agents. A
- Massachusetts man has since acknowledged writing the file.
-
- ................
-
- Elansky was given a suspended sentence in 1988 after
- police found two pipe bombs and gunpowder in a basement
- workroom of his home. Elansky's father, David Elansky, said
- Friday that the devices were small incendiaries Elansky had
- constructed as part of a pyrotechnic display sanctioned by
- Hall High School, where Elansky was a student.
-
- He was arrested again last fall and charged with
- participating in a burglary at Hall High School in which
- several bottles of volatile chemicals were stolen. In his
- basement, police found homemade explosives _ which David
- Elansky said were part of a high school graduation show. A
- door in the basement, authorities said, had been rigged with
- a device that would propel a glass bottle at intruders.
- That charge also would not be prosecuted as part of Friday's
- plea bargain.
-
- .................
-
- In Superior Court in Hartford Friday, Brown harshly
- criticized the August arrest, saying the information on the
- computer was protected by the First Amendment.
-
- "It's my very strong feeling that the state of
- Connecticut, in its zeal to get something on this defendant,
- violated the constitution of the United States, the
- constitution of the state of Connecticut and perhaps certain
- laws," Brown said.
-
- ((Elansky's attorney held up a copy of the Anarchist's Cook, purchased
- at Barnes and Noble, for $20, according to the story. As indicated in
- CuD 5.78, the volume, along with numerous other over-the-counter
- publications available to anyone with purchase price, contains
- explicit instructions for pyrotechnic and other forms of destruction.
- Such volumes are protected under the First Amendment)).
-
- ............
-
- Brown said Elansky may not have taken the criminal
- justice system or his probation seriously, but said that
- changed the day in August he was put in jail. Since then,
- Brown said, Elansky has been assaulted twice, has witnessed
- a hanging and has had to bribe other inmates daily to ensure
- his safety.
-
- ------------------------------
-
- Date: Sat 23 Oct 1993 2:21:17 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 3-- A Foreign Embassy Information Infrastructure
-
- ((MODERATORS' NOTE: The following, reprinted from The Well's EFF
- conference, describes another proposal for connecting the world in
- cyberspace. Reprinted with the permission of the author
- (amicus@well.sf.ca.us)
-
- Author: Ross Stapleton, Intelligence Community Management Staff
-
- The US Government should organize and subsidize the creation of an
- Internet-based information infrastructure for the foreign embassies
- sited in Washington DC, in order to encourage those embassies to host
- information of interest to US audiences, to facilitate delivery of US
- government information to those embassies (and through them, to the
- sponsoring countries' governments and populace), and to establish a
- better means for US citizens to correspond with foreign governments.
-
- The Washington DC-based diplomatic community is a convenient scope for
- such a program: having the prospective users local to Washington would
- make them easier to train and support through the start-up phase; the
- existing US information infrastructure is much better than many parts
- of the international and foreign infrastructure; and many or most of
- the embassies are already repositories for information (albeit largely
- in nonelectronic form today) that they could be encouraged to provide
- to a US audience.
-
- There are a total of XX embassies in the Washington DC area, along
- with YY foreign and international government missions.
-
- The program would have three major goals:
-
- 1. Provide a means for foreign governments, initially through their
- embassies, to provide a broad range of information of interest to US
- citizens through the developing US information infrastructure;
-
- 2. Provide the US government a faster, more efficient, and more direct
- means of providing a broad range of information of interest to foreign
- governments, initially through their embassies (in both the first two
- goals, it could be expected that embassies would also develop better
- means to exchange information with their sponsoring governments--very
- likely through the Internet--and to lessen their obligation to serve
- as intermediaries);
-
- 3. Provide a focus for US citizen interest in foreign countries, for
- correspondence with foreign officials and governments.
-
- As one possible implementation strategy, the US State Department could
- commission the creation of an Internet site (e.g., a domain of
- "embassies.int") and provide funding for service, support and
- training, as well as for some amount of communications equipment to be
- provided to participating embassies (the last might be unnecessary
- where participating embassies could provide their own resources, or
- where corporate or other sponsors might be found to contribute
- resources). At a minimum, each participating embassy would have at
- least one Internet account (e.g., "ecuador@embassies.int") for
- electronic mail purposes. Each embassy that chose to expand its
- investment in the facility could be provided with its own subdomain
- (e.g., "france.embassies.int") for the provision of additional
- services.
-
- Each participating embassy should agree at a minimum to provide (1)
- simple correspondence, which need be nothing more than an
- auto-response message instructing on how to reach the embassy via
- traditional means (telephone, fax or letter), (2) basic information on
- embassy services (e.g., how to receive and file forms for visas), and
- (3) additional information (economic, cultural, etc.) likely to be of
- interest to a US audience, in order to build up the program's general
- information resources, to be made available to the public through
- standard Internet research tools (e.g., WAIS, Gopher, etc.).
-
- The US State Department, with other US foreign policy agencies, would
- make use of the program for the dissemination, to the embassies, of
- policy and other materials. This would provide the US government
- with an efficient and timely means to disseminate information to the
- whole of the participating embassy community (and this could be done
- in a manner that would permit the embassies to "pull" information of
- interest rather than have it "pushed" at them, allowing for a far
- greater volume of information to be made available without
- overburdening the recipients).
-
- ------------------------------
-
- Date: Fri 22 Oct 92 23:41:43 CDT
- From: jonpugh@NETCOM.COM(Jon Pugh)
- Subject: File 4--DES Broken?
-
- I recently read a report in a bit of email named the SURFPUNK
- Technical Journal <surfpunk@versant.com> that a Canadian researcher
- recently presented a paper describing a dedicated chip designed to
- break DES. The article claimed that this chip could be manufactured
- for $10.50 and that a machine with ~30,000 of these could be built for
- $1,000,000 which would have a 100% probability of breaking ANY DES
- encryption in a maximum of 7 hours (3.5 hours on the average).
-
- I was wondering if the CuD authors or readers had heard anything of
- this and could verify or denounce its authenticity. This seems like
- news that ought to be in CuD. As is usual with things of this nature,
- I seem to have moved the file to some other disk and do not have it
- accessible here to quote from, but if you are interested I may be able
- to locate it and send it along later.
-
- Perhaps the Surfpunks would care to comment?
-
- ------------------------------
-
- Date: Fri, 15 Oct 1993 01:42:16 EDT
- From: phyland@AOL.COM
- Subject: File 5--Computers & Sustainable Society
-
- NEWS RELEASE
-
- Worldwatch Institute
- 1776 Massachusetts Ave., N.W.
- Washington, DC 20036
- tel: (202)452-1999
- fax: (202)296-7365
- e-mail: worldwatch@igc.apc.org
-
- HOLD FOR RELEASE
- 6 p.m. EDT
- Saturday, September 25, 1993
-
- COMPUTERS OFFER NEW TOOLS FOR SOLVING ENVIRONMENTAL PROBLEMS
-
-
- Faster, cheaper computers, better programs, and rapidly
- expanding international computer networks are becoming extraordinary
- tools for environmental protection and sustainable development,
- according to Global Network: Computers in a Sustainable Society, a
- new Worldwatch Institute study.
-
- Computers have made it possible to model the effects of air
- pollution on the global climate, as well as to track changes in global
- temperature. Biologists now use computerized animal collars to study
- endangered species, monitoring their every movement. Microchips
- govern the functions of energy-efficient lights, advanced windmills
- and solar power installations. And thousands of environmental
- activists and organizations around the world are using computer
- networks to exchange news and coordinate campaigns.
-
- There are environmental costs to computerization, however.
- "Swept up in our visions of the potential power of computers, we have
- failed to come to grips with their impacts," said author John E.
- Young. "Few people realize that Silicon Valley, birthplace of the
- computer industry, is also home to the highest concentration of
- hazardous-waste sites in the United States. Or that computers now use
- about as much electricity each year as the entire country of Brazil."
-
- In addition, for computers to realize their potential to promote
- environmental sustainability, the report stresses, more attention
- needs to be devoted ensuring public access to computerized
- information.
-
- Computer modeling now makes it possible to identify
- environmental problems before they become overwhelming, by
- manipulating thousands of variables. Scientists had theorized since
- 1896 that carbon dioxide emissions could warm the global atmosphere,
- but it was not until the early 1980s--when sufficiently powerful
- computers became available--that climate simulations were able to
- project with confidence the effects of increased carbon dioxide on
- climate.
-
- In British Columbia, the Sierra Club of Western Canada is using
- computers to create detailed maps of forest cover on Vancouver Island.
- Their system has revealed that only 23 percent of the island's
- original low-elevation, temperate rain forests--an increasingly
- endangered ecosystem--remain uncut. Eighty-two percent of the
- island's land is currently allocated to logging. This information has
- proved vital in the fight to gain government protection for ancient
- rainforests on the island.
-
- Linked together by telecommunications networks, computers are
- also rapidly becoming an important means of communication for
- environmentalists and other researchers and activists. The largest
- collection of computer networks--the Internet--already serves 11
- million users; its transmissions are estimated to double every five
- months.
-
- The 11 interconnected networks of the Association for
- Progressive Communications (APC) make up the world's largest assembly
- of on-line environmental information and activists. The APC
- networks--which include Econet/Peacenet in the United States--now link
- more than 17,000 activists in 94 countries.
-
- The APC's computer conferences convey information that is
- detailed, global, and breathtakingly up-to-date. Recently, for
- example, an APC posting on rainforests reported the murder of Yanomami
- Indians in a remote corner of the Amazon Basin days before major
- United States newspapers.
-
- The Washington, D.C.-based Right-to-Know Computer Network (RTK
- Net) offers free, online access to the U.S. government's Toxics
- Release Inventory (TRI). The TRI database provides information on
- industrial releases of toxic chemicals from some 24,000 U.S.
- industrial facilities. Grassroots groups around the country have used
- TRI information to produce dozens of reports on pollution, garnering
- public attention and spurring industry cleanup efforts in a number of
- states. Agenda 21, accepted by all United Nations members at the 1992
- Earth Summit in Rio de Janeiro, recommends that all nations move to
- establish such pollution tracking systems.
-
- While computer networks are most extensive in the United States,
- Europe, and Japan, they also reach into many developing countries, as
- well as the newly democratic states of Eastern Europe and the former
- Soviet Union. Sophisticated communications programs that can run on
- inexpensive computers are helping link users in remote areas with the
- rest of the world--often overcoming inadequate telephone systems in
- the process.
-
- Yet Global Network emphasizes that the computer industry needs
- to address its own contributions to environmental pollution. There
- are now 23--and there have been as many as 29--federal Superfund
- hazardous-waste cleanup sites in Silicon Valley, most of them
- attributed to hazardous substances leaking from electronics facilities
- into groundwater. Many of those substances--such as glycol ethers,
- linked to high rates of miscarriages among electronics workers--can
- cause serious human health problems.
-
- The Worldwatch study recommends that governments and computer
- manufacturers expand their efforts to redesign computers and
- manufacturing processes to minimize environmental problems.One such
- project--the U.S. Environmental Protection Agency's (EPA) Energy Star
- Computers program--already promises major benefits. It offers the use
- of a special advertising logo to firms whose computers, monitors, or
- printers meet power-saving standards. Nearly 150 makers of computers,
- components, and software have signed up. EPA officials estimate that
- if Energy Star products capture two-thirds of the market by the year
- 2000, their use could prevent carbon dioxide emissions equal to the
- annual output of 5 million automobiles.
-
- Global Network cautions that computers will not solve all the
- world's problems, but argues that they can help people "think
- globally," as Rene Dubos once recommended. If applied appropriately,
- Young suggests, "Computers can give us global eyes and ears in an age
- where our actions often have worldwide impacts."
-
- "Made easy to use and accessible to all, computers and computer
- networks could become a force for reducing the environmental impacts
- of industrial civilization, ending poverty, and strengthening
- participatory democracy," Young concludes."
-
- - END -
-
- John E. Young is a senior researcher at the Worldwatch Institute, a
- Washington, D.C.-based global environmental think tank.
-
- ------------------------------
-
- Date: Sat, 23 Oct 93 16:26:51 PDT
- From: ug384@FREENET.VICTORIA.BC.CA(Jeff Kosiorek)
- Subject: File 6--Students Suspended For Electronic Documents
-
- Two Mount Olive (N.J.) High School freshmen have been given three days
- of in school suspension for possession of documents protected under
- the First Amendment. School administrators have decided that they
- have the right to censor any document or material they feel is
- inappropriate. Two students in the high school were caught in
- possession of computer disks containing copies of the "Jolly Roger
- Cookbook" which is widely available, and completely legal, on computer
- bulletin boards everywhere. The disks were confiscated, parents were
- notified, and police were involved in the investigation into materials
- which are protected under the Constitution.
-
- Where do school officials get the right to censor any type of
- publication a student may have in his or her possession? Furthermore,
- how can they punish these youths when even the investigating officer,
- Detective Joseph Kluska said, "It's not illegal to know how to do
- these things." The students were not in anyway using the information
- found in the cookbook for illegal activities yet they are being
- punished only because the vice principal, John DiColo, deems them
- "inappropriate".
-
- In a school where they profess the merits of the American Constitution
- and the rights protected therein, the hypocrisy is absurd.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- I just thought everyone might like to know what was going on in my
- neck of the woods. I find it absolutely ridiculous that these students
- are being punished for something that is completely legal. I feel the
- only reason it is made an issue is because of the fact it was found on
- computer disks. Who would have stood for the seizing of a paperback
- book and punishment of the student who possessed it? It would be
- really nice if the EFF could pick up on this and put some pressure on
- the school to exonerate these students. Any individual interested in
- making their opinion heard, please write to the school at: Mount Olive
- HS
- Flanders, NJ 07836
- USA
- The telephone number for the school is: (201) 927-2200.
- The local paper that first carried an article on the topic was:
- The Mount Olive Chronicle
- 336 Route 46
- PO Box 174
- Budd Lake, NJ 07828
-
- Feel free to copy and distribute this article.
- --
- Jeff Kosiorek
- ug384@freenet.victoria.bc.ca
-
- ------------------------------
-
- Date: Sun, 24 Oct 1993 16:12:10 CDT
- From: Lance Rose <elrose@echonyc.com>
- Subject: File 7--NOMA (Nat'l Online Media Association) BBS Org. Formed
-
-
- NOMA
- National Online Media Association
-
- Contacts: Phill Liggett
- LIGGETT@delphi.com
- (203)233-3163
-
- Lance Rose
- elrose@echonyc.com
- (201)509-1700
-
- FOR IMMEDIATE RELEASE
-
- A new trade association, the National Online Media Association
- (NOMA), was formed at ONE BBSCON '93 in Colorado Springs on August
- 27th, 1993. NOMA comprises BBS operators, Internet service
- providers, and other online media and services.
-
- NOMA's mission is to act for the BBS and online service industry
- on matters of national importance by creating an industry presence
- in Washington, D.C. and other means; assist its members at the
- state and local levels; educate the public on the unique social,
- business and legal roles of BBS's and other online services;
- establish appropriate industry standards and guidelines;
- promote business development in the industry; and maintain and
- provide access to resources and industry information for use by the
- public and the industry.
-
- An 11 person Organizing Committee was elected to develop a proposal
- for NOMA's charter, bylaws, membership requirements, structure, and
- form of leadership. The proposal is to be completed and
- distributed within the BBS and online services industry by November
- 30th, 1993.
-
- Discussion areas are being set up immediately for those interested
- in participating in NOMA's early development. An Internet mailing
- list is available to all those interested at natbbs@echonyc.com
- (subscribe to natbbs-request@echonyc.com). A conference area is
- also being made available on the Delphi national information
- service.
-
- The members of NOMA's Organizing Committee are:
-
- Phill Liggett - Chairperson
- LIGGETT@delphi.com
-
- Joe Balshone
- BALSHONE@delphi.com
-
- Celeste Clark
- BBS #: (805)520-2300
-
- Pat Clawson
- 76357.3572@compuserve.com
-
- P. Victor Grambsch - Secretary
- PVICTOR@delphi.com
-
- Tony McClenny
- BBS#: (703)648-1841
-
- Robert Pataki
- PUGDOG@delphi.com
-
- W. Mark Richmond
- BBS#: (209)685-8487
-
- Steve Sprague
- steve.sprague@uboa.org
-
- Jim Taylor
- jim.taylor@F5.N310.Z1.FIDONET.ORG
-
- Bill Wilt
- wilt@aol.com
-
- In addition, three advisors agreed to assist NOMA's Organizing
- Committee:
-
- Mike Godwin, Esq.
- mnemonic@eff.org
-
- David Johnson, Esq.
- djohns06@reach.com
-
- Lance Rose, Esq.
- elrose@echonyc.com
-
- For further information, please contact Phill Liggett, (203)233-
- 3163 or Lance Rose, Esq., (201)509-1700
-
- Mailing Address: NOMA
- c/o Phill Liggett
- Solutions, Inc.
- 89 Seymour Avenue,
- West Hartford, CT 06119
-
- ------------------------------
-
- Date: Sat, 23 Oct 93 21:35:31 -0700
- From: haynes@CATS.UCSC.EDU(Jim Haynes)
- Subject: File 8--A Reporter meets "cyberpunks" (news item)
-
- This week's (October 21) "Coast Weekly", a Monterey County free
- entertainment (mostly) paper has an article on "hacking" by staff
- writer Nicole Volpe. I'll quote part of an introduction from the
- editorial page.
-
- "While interviewing computer hackers for this issue, it
- occurred to me that there are a lot of similarities between
- reporters and cyberpunks - We share a belief in freedom of
- information, a general suspicion of those in power who
- operate secretly, and an unfortunate tendency to invade
- privacy.
-
- This reporter got a taste of what it's like to be on the
- receiving end of privacy invasion when a hacker I was
- interviewing handed me a printout of personal information
- about me that he had retrieved, using nothing more than my
- home phone number. His reasons were valid enough - he
- wanted to be sure I was who I said I was. As a reporter I
- was impressed with the investigation, but on a personal
- level, it gave me the creeps. It was a lesson they don't
- teach you in J-school..."
-
- The main article covers the exploits of some crackers in the Monterey
- area, their concern about the Clipper proposal, some stuff about
- arrests of crackers in other parts of the country, and an interview
- with a security man from Metromedia's long distance business. The
- latter says, "If you picked up the phone a year ago, dialed one digit,
- and then hung up, I could go back and find out what that one digit
- was. All the records are stored on magnetic tape." He goes on to say
- about the prospect of seizing and confiscating valuable equipment, "The
- cops are a little more aggressive in going after these kinds of crimes
- when they learn about that aspect of it."
-
- A companion article by Hannah Nordhaus, a San Francisco freelance
- writer, tells about the use of networking and BBSes by all kinds of
- groups, from white-supremacisist to leftists, and everything in
- between.
-
- ------------------------------
-
- Date: Sat, 23 Oct 93 22:13:17 -0700
- From: haynes@CATS.UCSC.EDU(Jim Haynes)
- Subject: File 9--"Cyber Comics" (Monterey Cty Coast Weekly Summary)
-
- "Cyber Comics" by Matt Ashare (in Coast Weekly for October 21, 1993 -
- says it originally appeared in Boston Phoenix, doesn't say when.)
-
- "Comic books are a longtime fixture in America's
- traditional love of escapism. primarily they've been a
- forum for exploring the realm of fantasy and science
- fiction...
-
- The most popular comics have also touched on the themes
- of the day. Superman of the '50s was a clean cut
- crusader for Truth, Justice, and the American Way;... The
- genetically mutated X-Men came of age as the effects of
- radiation and other biological toxins were becoming an
- issue in the '60s; to the extent that they were shunned
- by 'normal' society, they personified the tensions in an
- increasingly diverse racial, ethnic, and cultural
- landscape.
-
- The scientific frontier that offers the most
- possibilities these days is the computer, and sure
- enough, computer-based themes like virtual reality,
- artificial intelligence AIl, and hacking are rapidly
- finding their way into the pages of comic books. At the
- same time the comic-book vision of reality and the future
- has darkened to accommodate the contemporary perception
- that the world isn't the friendly place it was when Clark
- Kent was growing up in Smallville....
-
- The first comic-book experiments with cyberpunk began a
- decade ago, with more sophisticated precursors to the
- graphic novel like Frank Miller's "Ronin"...issued by DC
- Comics in 1983...[Ronin's] most telling enemy is a
- thoroughly hostile, violent, and lawless urban reality
- where one of his few allies is the computer.
-
- Merging form and content, First Comics published
- "Shatter", the first fully computer generated comic, in
- 1985....a loose affiliation of renegade, non-superhero
- protagonists has to confront another common cyberpunk
- enemy - a government controlled by a powerful,
- exploitative, multinational corporation. The kind of
- government that cyberpunk fiction seems made of.
- [for?]...
-
- ...DCs computer-generated "Digital Justice" graphic
- novel, a Batman program is booted up to counter the
- Joker's computer virus. Hey, even the Punisher's arch
- enemy, the Kingpin, gets a little assistance from a
- skateboarding hacker kid these days.
-
- More recently, both DC and Marvel have introduced new
- series that deal almost exclusively with cyberpunk
- themes. "The Hacker Files" which ended its 12-issue run
- this summer, is part of the same DC universe that's home
- to traditional heroes in tights like Green Lantern, but
- the protagonist is a scruffy thirtysomething hacker who
- uses computers instead of superpowers to fight his
- battles.
-
- ...Lewis Shiner, a writer whose 1984 novel Frontera(Bane)
- was part of the first cyberpunk wave, at the creative
- helm of "The Hacker Files"... 'Right after that computer
- virus at the Pentagon,' recalls Shiner, 'Bob Greenberger
- [a DC editor] calmed me and asked, "Why don't you do a
- comic about that and we'll get all these kid hackers
- started reading comics."...'
-
- As Shiner sees it, 'the idea of empowerment is what's
- behind a lot of superheroes, and the computer represents
- a source of empowerment to kids these days, so it's only
- natural...'
-
- "Wild Thing", Marvel Comics described...
-
- Beyond providing some colorful, escapist thrills, comic
- books like "Wild Thing" present a bleak, paranoid view of
- the future. Multinationals rule the world, violence and
- betrayal are commonplace, virtual reality is a new kind of
- drug, and computers are the heroes' only real friends."
-
- ------------------------------
-
- Date: Sun, 24 Oct 1993 10:07:48 -0700
- From: bjones@WEBER.UCSD.EDU(Bruce Jones)
- Subject: File 10--Belated response to F. Cohen (CuD 5.80)
-
- To recap the argument to date, Fredrick B. Cohen (fc@jupiter.saic.com)
- notes (CuD 5.78) that he once applied for permission to export
- crypto technology and was granted permission to do so. Finding it
- relatively easy to obtain permission, he fails to see what the fuss
- is about. I counter (CuD 5.79) that I see no reason why anyone
- should have to apply for permission in the first place. He responds
- (CuD. 5.80) with:
-
- >... why should I need any permission from the government for
- >anything? Perhaps I shouldn't, but the fact is, [the gov't has]
- >the power, and if you work within the structure, you may find that
- >it is not as oppressive as you thought.
-
- "Not as oppressive as [I you we] thought" implies some oppression.
-
- Now, perhaps I am again mis-reading you and all you are really
- saying is that, if the government imposes restrictions on specific
- activities and then allows permission, upon application, for citizens
- to engage in those activities, there is little or no problem. I
- disagree. It is important for a people who would be free to stay
- alive to the dangers inherent in all forms of power -- especially
- those that take away rights and then hand them back under license
- as privileges.
-
- As I noted at the end of my first response, one of the founding
- ideas of the United States of America is that the government
- of the US is ideologically and legally constrained by the powers
- granted it under law, and all other rights and privileges belong,
- by default, to the people. Mr. Cohen asks:
-
- >Where does the constitution say this? I agree that I would prefer
- >it that way, but I don't think there is any basis in law for your
- >statement.
-
- These ideals and ideas are part of two important documents, founding
- our country. The idea arises first, early in:
-
- THE DECLARATION OF INDEPENDENCE:
- In Congress, July 4, 1776,
- THE UNANIMOUS DECLARATION OF THE THIRTEEN UNITED STATES OF AMERICA
-
- [Paragraph 3]
- That to secure these rights [life, liberty, and the pursuit of
- happiness], Governments are instituted among Men, deriving their
- just powers from the consent of the governed.
-
- And is instantiated in Law in:
-
- THE CONSTITUTION OF THE UNITED STATES OF AMERICA
-
- Amendment IX (1791)
- The enumeration in the Constitution, of certain rights, shall
- not be construed to deny or disparage others retained by the people.
-
- Amendment X (1791)
- The powers not delegated to the United States by the Constitution,
- nor prohibited by it to the states, are reserved to the states
- respectively, or to the people.
-
- The government doesn't have rights. Amendment IX above says, quite
- clearly, that the people have rights, some enumerated under the
- Constitution, and others not enumerated but extant nevertheless.
- The government, under Amendment X requires permission from the
- people to engage in specified acts.
-
- Many agencies of our government seem to have forgotten these passages
- and they act as though their agencies and agents have the moral, legal,
- and ethical right to hand down decisions on how we may live. Just
- because they get away with such high-handed behavior most of the time
- doesn't make the agencies, the agents, or their decisions just. Nor
- as they discovered in the Steve Jackson Games case, and may again
- discover with PGP, does it make their actions legally justifiable.
-
- ------------------------------
-
- End of Computer Underground Digest #583
-