home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed June 1, 1994 Volume 6 : Issue 47
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Covey Editors: D. Bannaducci & S. Jones
-
- CONTENTS, #6.47 (June 1, 1994)
-
- File 1--Digital Cash system created (fwd)
- File 2--Announcing: The Electronic Cafe
- File 3--Problems at TCOE (fwd)
- File 4--NZ pilots Apple online Network
- File 5--CYBERSAM VS MIND CONTROL
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Fri, 27 May 1994 10:09:16 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 1--Digital Cash system created (fwd)
-
- ---------- Forwarded message ----------
-
- From: "DigiCash Information" <info@DigiCash.nl>
-
- DIGICASH PRESS RELEASE
-
- World's first electronic cash payment over computer networks.
- =============================================================
-
- FOR IMMEDIATE RELEASE
- (Release Date: May 27, 1994)
-
- ==========================
-
- Payment from any personal computer to any other workstation, over
- email or Internet, has been demonstrated for the first time, using
- electronic cash technology. "You can pay for access to a database, buy
- nsoftware or a newsletter by email, play a computer game over the net,
- receive $5 owed you by a friend, or just order a pizza. The
- possibilities are truly unlimited" according to David Chaum, Managing
- Director of DigiCash TM, who announced and demonstrated the product
- during his keynote address at the first conference on the World Wide
- Web, in Geneva this week.
-
- Electronic cash has the privacy of paper cash, while achieving the
- high security required for electronic network environments
- exclusively through innovations in public key cryptography. "It's the
- first software only solution. In the past we've pioneered such cash
- for chip cards and electronic wallets, always with a tamper-resistant
- chip for storing the value--now all you have to do is download the
- software and you're up and running" continues Dr. Chaum.
-
- The product works with Microsoft(R) Windows TM, Macintosh TM, and
- most UNIX TM platforms. It was shown integrated with Mosaic, the
- most popular software for people accessing databases, email, or other
- services on the Internet and World Wide Web. The graphic user
- interface allows intuitive "dragging and dropping" of icons
- representing stacks of coins, receipts, record books, etc.
-
- The company will be supplying the technology through other firms who
- will release the products, under various cooperation and trial
- programs. The user software, which allows both paying and receiving
- payment, will be distributed free of charge.
-
- The product was developed by DigiCash TM Corporation's wholly owned
- Dutch subsidiary, DigiCash TM BV. It is related to the firm's earlier
- released product for road pricing, which has been licensed to Amtech TM
- Corporation, of Dallas, Texas, worldwide leader in automatic road
- toll collection. This system allows privacy protected payments for
- road use at full highway speed from a smart card reader affixed to the
- inside of a vehicle. Also related is the approach of the EU supported
- CAFE project, of which Dr. Chaum is Chairman, which uses
- tamper-resistant chips inserted into electronic wallets.
-
- The underlying 'blind signature' technology was described in the
- article "Achieving Electronic Privacy," by David Chaum, Scientific
- American, August 1992.
-
- ============================================================
- For more information contact:
-
- DigiCash bv info@digicash.nl
- Kruislaan 419 tel +31 20 665 2611
- 1098 VA Amsterdam fax +31 20 668 5486
- The Netherlands
- ============================================================
-
- ------------------------------
-
- Date: Sun, 29 May 1994 17:30:49 +0100 (BST)
- From: mac18@CUS.CAM.AC.UK(Sparky)
- Subject: File 2--Announcing: The Electronic Cafe
-
- Announcing: The Electronic Cafe
-
- Imagine a place where access to the Internet is as easy as buying a
- paper; where you can exchange knowledge and ideas with millions of
- people worldwide. Imagine a focus for the interface between your local
- community and the global community of the Internet.
-
- You are thinking about the Ecafe - a community comining music, art and
- imagination with the resources of a global network, a centre of
- activity where ordinary people can use the facilities of the Internet
- within their everyday lives.
-
- Bringing together a music venue, a cafe and a connection to the
- Internet, the Ecafe will give people access in a social setting. It
- will provide local community information, educational resources,
- electronic publishing, graphic design and an audience which spans the
- globe.
-
- It will be a place for people to gather, a place of education and
- creativity, a place where everyone is equal, providing a link to 15
- million minds at the speed of light. The Ecafe will be this and more,
- evolving via the imagination of its users into a local meeting place
- in the global community.
-
- The Electronic Cafe is simple in its goal; to provide Internet access
- to the general public, but the Ecafe will be more than just another
- connection onto the Internet. It will provide access for the public to
- the vast array of information sources available and help people to add
- to that resource, giving them the equipment to explore the creativity
- waiting to be discovered within this new medium.
-
- If you would like to find out more about the Ecafe then point your web
- browser to:
-
- http://www.cyberspace.org/u/ecafe/www/index.html
-
- or Email ecafe@cyberspace.org
-
- The Ecafe is scheduled to open by the end of this year in London. We
- are currently looking for backers and sponsors to support the project,
- if you would like to discuss the Ecafe in more detail, or perhaps even
- write an article, I would be only to happy to meet you. I am available
- in the UK over the next month and in America during July.
-
- Mark Cheverton (ecafe@cyberspace.org)
- 363 King's College, Cambridge, England. CB2 1ST.
-
- The Electronic Cafe
- Email: ecafe@cyberspace.org
- WWW: http://www.cyberspace.org/u/ecafe/www/index.html
-
- ------------------------------
-
- Date: Tue, 24 May 1994 18:38:27 -0400 (EDT)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 3--Problems at TCOE (fwd)
-
- >From brown@eff.org Tue May 24 13:51:26 1994
-
- Following is a post summing up the problems we are having on a local
- publicly owned BBS. Any advice?
-
- --Jim Maroon
-
- ======================================================================
- This message was from JIM MAROON to ALL
- originally in conference GeneralPub
- and was forwarded to you by JIM MAROON
- ----------------------------------------
-
-
-
- Most of you have no doubt heard about the problems at the Tulare
- County Office of Education BBS. I found out when a couple of
- conferences I used were withdrawn, but then reinstated. Well, I have
- picked around here and there and think I have a handle on what is going
- on, as well as some thoughts on how we ought to approach this.
-
- You are going to read in the Times Delta (our local newspaper)
- an article on this sometime this week. Among other things, the Delta
- article will report this as a county employee using county time and
- equipment to push personal political views. That is not what this is
- really about. This is about book burning. This is not about liberal vs
- conservative politics. This is about silencing voices with which we
- disagree through political maneuvering.
-
- Apparently, some individual (one of my fellow "liberal"
- Democrats) objected to the content of some of the messages that were
- being posted on some of the conferences on TCOE. He also felt
- that most of the posts and conferences were too conservative. Now, I
- know we liberals are outnumbered here in Tulare County, so it makes
- sense that most posts are going to be conservative in nature. Instead
- of coming out and debating the posters of these messages, thus fighting
- speech with speech, as would be the truly democratic approach, this
- individual instead chose to go behind the scenes and complain. The
- problem this censor had, however, was how does one go about censoring
- without looking like a censor? Well, he found a device.
-
- One of the jobs of a sysop, in my opinion, is to encourage
- conversation. One way to do that is to pass on controversial positions
- now and then. It is not possible to be a sysop and not state one's
- views on occasion. Roger Smith (we all know who the sysop is, so there
- is no need keep it out of this post) saw a message on an echo (the
- verbatim reproduction of the Paula Jones vs Bill Clinton brief) and
- forwarded it to the Soundoff echo. This took a total of about 4
- seconds. Admittedly, Roger could have done this at home, but is this
- really a big deal? Of course it isn't, and our censor knew that, but
- this was the proverbial foot in the door. He used this as an excuse to
- silence at least a half dozen echoes, Soundoff being one of them. Would
- he have complained about this had it been a post that praised the
- President or took another shot at Dan "The Target" Quail or Rush "Slim"
- Limbaugh or Ross "Ears" Perot? Of course not. He did this because he
- objected to the political content of the speech involved, not because of
- where and when it was done. So, these echoes are no more. They are not
- gone because they were unpopular. They are gone because they are
- conservative, and one person found that unfair. They may or may not be
- back.
-
- TCOE is bound by the First Amendment. We are going to see more
- and more public institutions going online, and in the future that will
- be the primary mode of getting online. That is why this issue is so
- important. This is not about some petty local political squabble. This
- is about the legal right to access information in an unfettered manner
- on a publicly funded BBS, regardless of political beliefs of the poster
- or the content of their posts. This is about the right to speak and the
- right to read. It is legally no different from the Internet. The courts
- have held that if a government institution provides a meeting room to
- anybody, it cannot refuse access to that meeting room to any group based
- on the religious or political beliefs of that group. Well, I see (and
- the courts would see) a conference as identical. The courts have found
- that publicly funded universities could not remove Internet listservs
- based on objection the content of those listservs, or block access to
- e-mail or bbs echoes.
-
- A BBS is just a bunch of folks sitting around talking. You can't
- dictate what speech is allowed and what speech is not allowed on a BBS
- run by a government institution.
-
-
- --Jim Maroon
-
- ------------------------------
-
- Date: Mon, 30 May 1994 10:43:18 +1200
- From: Nathan Torkington <Nathan.Torkington@VUW.AC.NZ>
- Subject: File 4--NZ pilots Apple online Network
-
- This is copied with permission of the author and editor, from the "New
- Zealand InfoTech Weekly", Monday May 30, 1994.
-
- ----------
-
- NZ pilots Apple online Network
-
- by Adrienne Perry
-
- Apple Computer's new online information service is about to be piloted
- at 150 New Zealand sites before it launches worldwide in a few months.
-
- The pilot is part of an international test of the service that will
- compete with established online information networks such as
- Compuserve and Internet.
-
- e-World was announced by Apple at the Macworld computer show in San
- Francisco in January, and since then Apple has been constructing the
- database and signing up content providers.
-
- Apple agent CED Distributors will market the product in New Zealand.
- Managing director Alex Broughton says there will be a strong emphasis
- on local content, and e-World's as yet undisclosed pricing will be
- competitive with Compuserve.
-
- He says e-World will have an advantage over Internet in that the user
- interface will employ Apple's traditional user-friendliness and it
- will be very easy to navigate the service and find areas of interest.
- e-world will contain gateways into Compuserve and Internet.
-
- Initially, Apple intends to convert the 50-60,000 world-wide users of
- Applelink --- Apple's international e-mail service --- over to
- e-world. By the end of this year, e-World software will be bundled
- with every Apple computer sold.
-
- Apple computers account for about 12 per cent of the world's personal
- computers. However, e-World will also be available on PC-Windows, and
- should those sales take off the service could rapidly become a serious
- competitor for Compuserve.
-
- Mr Broughton says Apple Computers is exploring e-World software
- bundling deals with leading PC vendors in the United States.
-
- New Zealand pilot sites include banks, media and accounting firms, all
- levels of education, user groups, resellers, software houses,
- telecommunications carriers and IT managers.
-
- There is already a wide range of content on e-World.
-
- A Learning Centre contains Groliers Encyclopaedia, while an Arts and
- Leisure pavilion houses information about films, music, horoscopes,
- and the entertainment world.
-
- Electronic shopping will be available, and United States outdoor
- equipment retailer LL Bean is already selling its wares on the
- service. Retailers will probably supply full product details on
- CD-Rom as demand dictates, Mr Broughton says.
-
- The shopping corner will also include third-party Apple software
- products and a full Mac catalogue.
-
- The newstand will house news and commentary. Already online are USA
- Today, Reuters, and some information technology publications.
- Subscribers can isolate areas of interest and ask e-World to deliver
- on-line articles on those subjects at prescribed times.
-
- The Community Centre offers a multitude of forums for international
- conversations in groups or one-on-one sessions, while the Finance and
- Business Centre offers stockmarket news, investment advice, company
- profiles, teleworking advice, and live sessions with, for example,
- marketing guru Regis McKenna.
-
- Mr Broughton says New Zealand exporters could advertise their wares on
- the service.
-
- He says e-World can handle moving images and full interactive
- multi-media but it is limited by the lack of fibre optic cabling, and
- further developments will depend on network providers.
-
- e-World will run over 9600 baud lines to local BT (British Telecom)
- nodes in Auckland, Wellington and Christchurch then direct to a
- California Stratus-based system.
-
- --------------------
-
- (gnat speaking again).
-
- I *hate* closed systems. It looks like Apple have learned nothing
- about the direction of the last 20 years. How many people will
- seriously want to advertise on Apple's system, when advertising on the
- Internet would reach a far larger audience? The gullible ones, I
- guess.
-
- As for Apple's e-World givng a friendly interface to the Internet,
- it's about time that someone pointed Apple at NCSA Mosaic. Come to
- think of it, someone already has. They're running an HTTP server. Is
- it really true that Apple are offering multimedia through the
- networks?! Gosh, I wish we'd thought of that for the World Wide Web.
-
- At least it's not as bad as last week's classic offering by the IT
- Weekly, where we were told that the Internet only has a text-based
- user interface. This was from people trying to sell Hyper-G, mind
- you. No mention of the Web at all.
-
- It looks like Apple are reinventing O'Reilly's GNN (http://gnn.com/)
- at considerable expense, and isolating the corporate customers that
- advertise with them from the biggest on-line audience around.
-
- Bah, and humbug.
-
- Nat
-
- ------------------------------
-
- Date: Sat, 21 May 94 01:06:39 EDT
- From: ALIENAIDED@AOL.COM
- Subject: File 5--CYBERSAM VS MIND CONTROL
-
- Copyright 1994 by W.H. Bowart
-
- An excerpt from
- OPERATION MIND CONTROL
- BOOK TWO
-
- CYBERSAM
- >From The Cybernetic Samisdat
-
-
- It's not easy to make a living as an investigative journalist. It's
- far easier to make a living writing advertorials, advertising paid
- garbage for affluent markets. But when you are compelled by a concern
- for truth, justice and what once was "the American way" to write about
- subjects that threaten the cryptocracy's plans you could find it hard
- to get published. What with most of the publishers of books,
- magazines, radio and television broadcast news departments having an
- cryptocracy agent in place, little gets out about things such as mind
- control. As a matter of fact, that's one reason to suspect any news of
- this kind that you read in the papers or see on the "happytalk" TV
- news.
-
- It's worth repeating the findings of the CIA's internal "Task Force on
- Greater CIA Openness": "...the public Affairs Office of the CIA now
- has relationships with reporters from every major wire service,
- newspaper, news weekly and television network in the nation... This
- has helped us turn some 'intelligence failure' stories into
- 'intelligence success' stories... In many instances, we have persuaded
- reporters to postpone, change, hold or even scrap stories that could
- have adversely affected national security interests...1"
-
- The independent researcher of supressed subjects is left to struggle
- and strive. Once you could write books like this (Operation Mind
- Control) on an advance from a book publisher, but seldom any more. Few
- of the major publishers have the courage or the commitment to
- constitutional principles to take the chance and buck the invisible
- system. The establishment press has been co-opted. We are left with a
- people's news network, a samisdat. In the more innocent days of the
- 1960's, the sociologist Tamotsu Shibutani concluded: "Various elite
- groups may seize institutional channels and persuade others to accept
- ideas that legitimize their ascendancy, but such advantages are
- generally temporary. Regardless of their formal philosophies most men
- are pragmatic in their actual orientation toward their world; a
- premium is placed upon accurate knowledge, for the simple reason that
- errors in the long run lead to painful consequences. Thus, successful
- politicians may; gain temporary ascendancy through devious maneuvers,
- but before long their victims become suspicious and their colleagues
- cynical. So long as there is some disparity of interests between those
- who control institutional channels and others, some situations are
- bound to be interpreted through rumors..."2
-
- "Although tyranny is not new," Shibutani wrote, "thoughtful men in
- recent years have become increasingly alarmed over awesome prospects
- arising from the development of effective techniques of political
- subjugation and control, especially through the manipulation of
- beliefs. In the last analysis political power rests on the consent or
- acquiescence of the governed, but if the views of men can be
- manipulated, is there any safeguard to limit the power of those who
- control the channels of communication?"
-
- Since the passage of the National Security Act, government lying
- became institutionalized. In the 1950's and 1960s, U.S. Army planes
- carried out biological warfare attacks against American and Canadian
- cities by spraying them with supposedly harmless bacteria. The army
- told local officials it was just testing a radar-deflecting chaff.
- While the bacteria was supposed to be harmless, several people's
- deaths are attributed to it.
-
- History will show that more freedoms were lost and more lies told
- during the 12 years George Bush was at the helm of the United States
- (as both V.P. to a senile movie actor President, then as his
- sucessor). The Bush administration drafted regulations on the use of
- deception to provide cover for secret programs.
-
- The regulations are part of the National Industrial Security Program
- Operating Manual, which sets forth security procedures for government
- agencies and contractors involved with classified programs The
- Department of Defense wrote a supplement to the manual for "special
- access" (read that "black") programs, whose existence could not even
- be acknowledged. Dated May 29, 1992, and stamped "draft" the
- supplement stated:
-
- "Cover stories may be established for unacknowledged programs in order
- to protect the integrity of the program from individuals who do not
- have a need to know. Cover stories must be believable and cannot
- reveal any information regarding the true nature of the contract.
- Cover stories for Special Access Programs must have the approval of
- the PSO (Program Security Officer) prior to dissemination."
-
- The Scientific American commented: " The supplement also notes that
- special access programs must have 'nonattributable' telephone lines,
- also called 'Hello lines,' connecting them to the outside world.
- Personnel who answer such a telephone must 'state the proper
- salutation, e.g. Good Morning or Hello. Do not use the company name.'"
-
- Who's paying the bills of government? The people who don't have the
- need to know, right? Does this mean we no longer live in a democratic
- republic?
-
- During the last years of the Soviet Union, in the decay of the
- totalitarian regime that was called communism, when repression was
- complete, the press controlled by the state, there came from the west
- two revolutionary tools: satellite television and the photocopy
- machine. Through the round the clock news reports broadcast from CNN
- the repressed people of the Soviet Union learned the truth about the
- rest of the world. Through the capability of instant publication made
- possible by the technology of "dryography", the photocopy and fax
- machines allowed the people to communicate with each other despite the
- official channels of communication. The government controlled
- newspapers, magazines and news programs on the government controlled
- radio and television stations were reduced by the new technology to
- mere trivial forms of entertainment. People would turn on the
- "official news" just to have a good laugh. Informed by their grass
- roots samisdat they could laugh at the transparent propaganda which
- was pumped through the institutional news channels. The people knew
- what was happening through their underground press -- clandestine
- dryography machines working through the night putting out the truth,
- circulated hand-to-hand by a network of citizens.
-
- The new electronic technology has affected us too. We in America, for
- the first time, can look in on any revolution anywhere -- live. We
- might even be a part of them without leaving our desks. Here's Whole
- Earth Review Editor, Howard Rheingold writing in his book Virtual
- Community:
-
- "I was following an eyewitness report from Moscow during the coup
- attempt, or China during the Tiananmen Square incident, or Israel and
- Kuwait during the Gulf War, passed directly from citizen to citizen
- through an ad hoc network patched together from cheap computers and
- ordinary telephone lines, cutting across normal geographic and
- political boundaries by piggybacking on the global communications
- infrastructure...
-
- "People in virtual communities use words on screens to exchange
- pleasantries and argue, engage in intellectural discourse, conduct
- commerce, exchange knowledge, share emotional support, make plans,
- brainstorm, gossip, feud, fall in love, find friends and lose them,
- play games, flirt, create a little high art and a lot of idle talk.
- People in virtual communities do just about everything people do in
- real life, but we leave our bodies behind. You can't kiss anybody and
- nobody can punch you in the nose, but a lot can happen within those
- boundaries. To the millions who have been drawn into it, the richness
- and vitality of computer-linked cultures is attractive, even
- addictive.
-
- "There's no such thing as a single, monolithic, online subculture;
- it's more like an ecosystem of subcultures, some frivolous, others
- serious. The cutting edge of scientific discourse is migrating to
- virtual communities, where you can read the electronic pre-preprinted
- reports of molecular biologist and cognitive scientists. At the same
- time, activits and educational reformers are using the same medium as
- a political tool. You can use virtual communities to find a date, sell
- a lawnmower, publish a novel, conduct a meeting..."
-
- The free press, it once was said, belongs to him who owns the press.
- Now, today, it belongs to him who has access to the internet. The free
- press is dead in the "establishment" media, but it's alive and well in
- cyberspace. Electronic bulletin boards and e-mail and computer
- networks are carrying a good deal of the truth which flies in the face
- of all the official reports and government propaganda. ( Though beware
- of disinformation.)
-
- As an editorial in the first MONDO2000 reflected the size and shape
- and climate of the burgeoning cyberspace. It's all about: "what to do
- until the millennium comes. We're talking about Total Possibilities.
- Radical assaults on the limiits of biology, gravity and time. The end
- of Artificial Scarcity. The dawn of a new humanism. High-jacking
- technology for personal empowerment, fun and games. Flexing those
- synapses! Stoking those neuropeptides! Making Bliss States our normal
- waking consciousness. Becoming the Bionic Angel... But things are
- going to get weirder before they get better. The Rupture before the
- Rapture. Social and economic dislocation that will make the Cracked
- 80's look like summer camp..."
-
- And it's not all happening on screens. A lot of it finds it way into
- the finality of print -- the old fashioned way -- but not in the
- "establishment press," in the samisdat. When I founded the Underground
- Press Syndicate (UPS) in 1965 there were only five papers. UPS grew
- within a few years to contain a 200 periodical membership with
- millions of readers. Now there's a magazine that just reviews
- underground, alternative and fringe publication. At last count there
- were an estimated 5000 plus regularly published "zines" of all shapes
- and sizes devoted to all sorts of themes and ideas. Here is art and
- here is literature and here in the samisdat is truth that might make
- it's way into the "mainstream" in years to come, meanwhile it's
- happening now.
-
- Cyberpunk cryptowriter for MONDO2000, Xandor Korzybski offered a
- piece entitled Mind Kontrol Ultra3:
-
- "Remember, when you wake up agitated at 3:00 in the morning , that's
- when they're running ELF transmitters to program your dreams. It's
- also the time when most UFOs appear -- quelle coincidence! Let me
- explain: They send out subliminal signals over all radio and TV
- channels and use microwave antennas to beam instructions via ELF
- modulation into your heads to reinforce hypnotic screen memories of
- alien doctors in spaceships, when they're actually Frankensteinian
- Nazi scientists running bizarre eugenics experiments in underground
- tunnels created by massive subterranean machines which are the cause
- of that slowly moving hum you hear underground in Taos and other parts
- of the Southwest.
-
- "But you don't have to have an intranasal brain implant to be under
- their control. Hemisync tone sequences, subliminal instructions,
- reverse-speech hidden messages, magnetic signals, infrasonics,
- ultrasoncis (like Hitler) are all part of the total panoply. And throw
- away your Synchro-Energizer: the CIA programs mind-machine circuitry
- to create zombie automatons. In fact, the entire candybrain New Age
- movement invented by LSD monger Willis Harman under directions from
- the British Tavistock Institute in London, is a massive MI6-controlled
- deception operation designed to hypnotize millions and convert them
- into slaves to the New World Order..."
-
- Obviously Xandor's wisdom was formed by his interface with cyberspace
- dissolved lightly in psychedelics. Paranoid? Perhaps just accurate and
- insightful reporting.
-
- And the days of the freedom of cyberspace may be numbered, at least
- the days of the "information highway" as a medium of free expression
- are numbered. A bill making mandatory the insertion of a "Clipper
- Chip", a government proprietary encryption device, has been proposed
- and looks like it will be passed into law. This chip ( in one form or
- another) will be installed in every phone, every computer, every fax
- machine, whether or not this version of the bill passes Congress or
- not. Eventually some version of it will pass and that will give the
- NSA, CIA and FBI the right to read over your shoulder. It will give
- them the ability to read the private mail of citizens and business
- alike without your knowledge. While insisting that this is merely in
- the interests of national security, the real reason, it would appear,
- is so that the cryptocracy can get "hot business tips" and know which
- way to shift the black ops funds for fatter profits outside the
- public's purview. When this happens, only the gullible or the cunning
- will send anything but the most trivial communications on this
- "information highway."
-
- Far more prevalent and reliable a form of communication is the
- papersam, a paper "information highway" upon which news is transferred
- hand-to-hand in photocopy format. On one 100+ page document I received
- ( a paper on the murders of civilians by ATF and FBI agents at Waco,
- Texas) the cover page of the photocopied document read: "A.P.F.N. ( of
- which I still haven't figured the meaning)= "Friends FAXING Friends...
- for FREEDOM". It was followed by the observation: "... no conspiracy
- can survive expose'.
-
- Some of the information in this artifact you hold in your hands, came
- to our attention through this "network of friends faxing friends( or
- E-mailing or swapping photocopies)". Much of the information herein
- has been verified, but much also has not. ( Hopefully, future editions
- of this book will evolve to weed out the disinformation.) To our best
- estimates as much as 1/3 of the information could be untrue due to
- deliberately planted "disinformation", lies which have been sown by
- the cryptocracy to mislead and confuse us. In this edition (Book Two)
- We have used information that has been verified by at least three
- sources. That rule produce 100% accuracy in the first edition (Book
- One). Some things which have appeared in photocopy or via e-mail or
- downloaded files have been deleted because, unlike the practice in
- transitory cyberspace, in the fixity of print they must be considered
- libelous until proven true.
-
- The reader is encouraged to network with others and tap into the rich
- flow of the cybernetic samisdat (cybersam) -- probably our only source
- of reliable communication in the information age. You can trust that
- all the cryptocracy's secrets will be revealed eventually in the
- cybernetic samisdat (cybersam.) There are patriots at work even within
- the closets of the secret agencies. The CIA's phones are tapped. ( A
- posting on Internet gave all the computer-link phone numbers of
- government contractors working on high technology, and it is reported
- on the samisdat that there's a mad scramble going on to disconnect all
- secret government facilities from the Internet. You think it's
- because someone posted their secret access codes?) The NSA cryptocrats
- are being remotely viewed at all times by patriots within their own
- ranks.( NSA's "confidential -- not to leave the building" manual for
- prospective employees was published on the net.)
-
- The force of freedom urges all spirits toward the light. Secrecy is
- not the light, does not promote truth, shall not make you free.
- Secrecy protects the guilty, covers both crimes and mistakes, and
- makes everyone suffer at least from incompetence for 20 years, or the
- length of the classification term.
-
- A government is not smarter than its people. A people survives.
- Governments do not. (So far.) And, thank you Dr. McLuhan: when
- information travels at the speed of light there can be no secrecy -- (
- nor copyrights. )
-
- The strength of the brief human adventure has come from the
- creativity of the people and the free exchange of ideas. Creativity
- thrives in chaos. That's why the cybersam is so dynamic and alive. To
- the degree that a cryptocracy would try to order the life of a nation,
- to the degree that it would control and suppress the creativity of the
- people is to the degree that it will fail, sinking into the quicksand
- of its own secret codes.
-
- "Ours is... a generation in which manipulation of outlook through
- ingenious propagandistic devices is commonplace, where ruses,
- unsubstantiated testimony, and doctored evidence play decisive parts
- in local and national life," Shibutani wrote. ( And anyone who has
- obtained their own FBI file under the Freedom of Information Act knows
- what Shibutani is talking about.) "What makes decisions in such
- unsettled times so important is that crises are the crucibles out of
- which many innovations emerge; new modes of action often get their
- initial direction in attempts to cope with emergencies..." ( One
- wonders why Shibutani's Improvised News has been out of print for so
- many years?)
-
- "Our nation, our world is in crisis. It would appear that The New
- World Order is being forced upon us, without our knowledge or consent.
- We are not being informed about its purpose. We are not being educated
- about its meaning. We have not been invited to participate in its
- creation. Like the subjects of evil psychoscientists under pain/drug
- hypnosis we are being used without our knowledge and against our wills
- by a nameless, faceless cryptocracy which is engaged in a futile
- struggle to keep its own existence secret at the expense of our
- pursuit of happiness. But when information travels at the speed of
- light there is no secrecy, so the people are becoming aware that this
- Emperor too has no clothes.
-
- "Rumors ...flourish in situations characterized by social unrest.
- Those who undergo strain over a long period of time -- victims of
- sustained bombings, survivors of a long epidemic, a conquered populace
- coping with an army of occupation, civilians grown weary of a long
- war, prisoners in a concentration camp, ( a nation whose leaders are
- assassinated by lone nuts), residents of neighborhoods marked by
- interethnic tension -- become restless and dissatisfied" Shibutani
- wrote. "...whenever individuals experience impulses that cannot be
- satisfied within the existing social framework, they become restless.
- They feel balked, insecure, alienated, and often lonely. When those
- who are similarly frustrated come together, they exchange views and
- thereby reinforce and intensify one another's discomfort. When men are
- collectively dissatisfied, the customary is called into question and
- those involved became acutely sensitized to possibilities of change...
-
- "...if the demand for news in a public exceeds the supply made
- available through institutional channels, rumor construction is likely
- to occur."
-
- "There is widespread agreement," Shibutani wrote," that known or
- suspected censorship increases the incidence of rumors.
-
- "Rumor is a substitute for news; in fact, it is news that does not
- develop in institutional channels. Unsatisfied demand for news-- the
- discrepancy between information needed to come to terms with a
- changing environment and what is provided by formal news channels --
- constitutes the crucial condition of rumor construction."
-
- The information contained in the following pages has arrived here
- through the alternative news channels of the information age. Only
- time will tell how much we can depend upon these new channels. The
- following information is unofficial. It could be mistaken, but it is
- published with the intention of discovering the truth. In the next
- edition of this book, we'll update this information, scoring its
- reliability and accuracy. Regardless of the accuracy of minute
- details, there seems to be a trend. The collective belief, the group
- feeling is being expressed through the Cybersam:
-
- "Have you figured it out yet?" Xandor Korzybsi asks. "OK, let me spell
- it out for all you pathetic autists: They know exactly which ELF
- frequencies, waveforms, and code sequences (brainwave-frequency region
- pulse-code modulation superimposed widely on power lines, radio, TV,
- and microwave transmissions) to use and can create any emotion or
- pathology they please. You don't. And you probably don't own a real
- ELF detector! You poor bleating sheep don't even know they're ALREADY
- using ELF generators in malls, restaurants, and bars to maximize
- throughput and revenues -- even magnetizing fans in air conditioners
- and refrigerators to create pulsed ELF waves to zap you. It will all
- be duly captured by Hillary's SmartCard which will store your
- brainwaves and monitor all transactions everywhere you go, so the
- Thought Police can download it any old time via the data superhighway
- and issue the ultimate ACCESS DENIED. By the way, you can't escape ELF
- -- there's no way to shield low frequency magnetic waves ..."
-
- The only hope is when all information does travel at the speed of
- light.
-
- Your feedback is welcome.
-
- Copies of the entire ms. Operation Mind Control, Updated and Revised
- 1994 edition can be obtained from the author for $25 by writing POB
- 35072 Tucson, Az. 85740.
-
- ------------------------------
-
-
- ------------------------------
-
- End of Computer Underground Digest #6.47
- ************************************
-
-
-