home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed May 10, 1995 Volume 7 : Issue 37
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Goddess of Judyism Editor: J. Tenuta
-
- CONTENTS, #7.37 (Wed, May 10, 1995)
-
- File 1--Response to "Digital Copyright Problem" (re: CuD 736)
- File 2--Commentary on NPR in re the Exon Bill (EPIC fwd)
- File 3--Noam Chomksy on the Internet (fwd)
- File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- From: "David Gersic" <A02DAG1@NOC.NIU.EDU>
- Date: Tue, 9 May 1995 13:04:03 CDT
- Subject: file 1--Response to "Digital Copyright Problem" (re: CuD 736)
-
- -=> Subject--File 2--A solution to the digital copyright problem
- -=>
- -=> Fixing the Digital Copyright Dilemma with Telerights:
- -=> Copying is easy; decryption is not
- -=>
-
- I have several problems with this proposal, not the least of which is
- that it won't work.
-
- -=> After reading the National Information Infrastructure debate on
- -=> intellectual property reform in the digital age, one could conclude that
- -=> computers and copyrights have come to an impasse.
-
- They have. At best, the current copyright code does not map well onto
- the computer information it is being applied to.
-
- -=> Some have proposed drastically curtailing electronic technology in
- -=> order to protect future publishers.
-
- I think that this would be a Very Bad Thing. We are on the verge of
- being able to disseminate more information, faster, and more
- directly, than ever before. It's a cliche by now, but the computer is
- doing to print media what the printing press did to the monks. And
- just like the monks, the print media are attempting to maintain their
- monopoly on information distribution. It didn't work last time, it'd
- be a shame to let it work this time.
-
- -=> disk into RAM. They want to ban the electronic resale or renting of
- -=> copyrighted material fearing that the piracy which has plagued software
- -=> will plague movies and books when they enter cyberspace.
-
- Who are "they"? Pirating movies has been around forever, as has
- music. Sure, the quality may be off a little on the copy, but that
- has never stopped people from enjoying their illicit copies anyway. A
- local couple (Chicago) was just arrested recently for bootlegging
- movies. They were sneaking a pocket cam-corder into movie theaters,
- taping the movies from the audience, then selling the copies. Sure,
- it was a *lousy* copy, but they were making money anyway. Rock
- concert boot-legs have been around forever too.
-
- -=> I call this a system of 'telerights.'
- -=> A user would buy an encrypted copy of the document from the author
- -=> or publisher. Each individual version would have a different key, so
- -=> the user could make many duplicates but in essence only own the one
- -=> 'copy' that was paid for. When the user wanted to use the document, it
- -=> would contact its publisher for the key. If no other versions with the
- -=> same key were in use, the publisher would send the key to the user's
- -=> machine and the document would decrypt itself into an area of temporary
- -=> memory like RAM. When the user was done, the document would delete the
- -=> decrypted version.
-
- Problems:
-
- 1) You're assuming that I'll have a network connection wherever I
- might want to use this document that I've "bought". If I carry my
- laptop out under a tree to sit in the sunshine, I'm screwed and have
- to go back inside where the ethernet is. OTOH, if *you* want to run
- the T1 to my house and provide a wireless network solution for a
- five or six square mile area around my house, I'd be delighted to
- talk about it...
-
- 2) You're assuming that the network connection in #1 is of no cost to
- me. If I'm using an ISDN link to the 'net, I have to pay for it on a
- per-call basis. So, each time I want to refer to a diagram in this
- document I have to insert a quarter in the coin slot in the side of
- my monitor. The phone company may love this idea, but it's going to
- be expensive for the user. Plus, if that document has a link to
- another document, there's another phone call to validate the new
- document, and possibly a third one to get back to my original
- document.
-
- 3) What if I don't *want* the publisher to follow my actions and
- interests? The civil libertarians will love this idea... Given the
- current interest in the "militias" and people like Tim McVeigh,
- wouldn't it be nice to be able to query the publishers of all bomb-
- related documents to see who has been reading them? And, going back
- to the ISDN mentioned in #2, it'd be even easier to figure out where
- they were reading the documents from. I'm not paranoid, but I'm sure
- that the FBI would love to be able to find/trace people that they are
- interested in this easily, and given the current public mood to give
- the FBI the power to investigate people who have not (to their
- knowledge) violated any laws, that's a scary proposition. Or, maybe I
- just don't think that it's anybody's business but mine what I read,
- when I read it, or *where* I read it.
-
- -=> The old problem of piracy would be turned on its head. The user
- -=> instead of the publisher would have to worry about theft. When someone
- -=> stole his copy, they would steal his use of it as well. There would be
- -=> no assurance the person you buy used information from would delete their
- -=> old copies.
-
- This is the biggest falacy in the whole proposition. You've missed
- the basic method of software piracy; remove the copy protection. What
- is proposed here is not really that much different from a "key-disk"
- protection that comes with many games. And, it will be no harder to
- bypass. You've substituted high-tech for the simpler key-disk, but
- basically it comes down to:
-
- 1) start the program
- 2) query something to see if this is valid to run
- 3) if ok, jump to real start of program
- 4) else exit
-
- All you have to do to bypass this scheme is to find step #3 in the
- code and change it to remove the "if ok" part. People have been doing
- this since the Apple ][ was popular, and have gotten quite good at
- it over the last decade. As long as the program is running on *my*
- CPU, in *my* machine, you have no real way to keep me from changing
- it to run the way *I* want it to. Unless all program execution will
- be done on the other end of a network link with only display data
- being shipped to me (see objection #1 and #2 above), the whole scheme
- will be bypassed within the first *hour* of somebody trying it.
-
- -=> The government does not need to alter existing copyright laws;
-
- Actually, I don't think that modification of the existing laws will
- work; I think that they're going to have to write an entire new set
- to handle what the computer industry is doing to information and
- information technology.
-
- -=> On the consumer end, there is the privacy issue. Any company that
- -=> both maintains other people's teleright accounts and publishes its own
- -=> documents will be tempted to use for financial gain private information
- -=> about other companies' customers.
-
- Tempted? I get enough junk mail, cold-callers on my phone, and other
- unsolicited sales contacts for stuff that I'm *not* interested in
- now. Given this sort of data collection ability, I'm sure that I'd
- get a *lot* more.
-
- -=> The issue of encryption itself is sticky because there are already
- -=> two established and ideologically opposed groups fighting about it. The
- -=> government must be coaxed into relaxing its objections to strong
- -=> encryption and Clipper opponents must learn to accept a key escrow
- -=> standard to which the government has warranted access.
-
- There's also the "export" problem. What if I take my laptop to Iraq
- with me? Can I still read my encrypted copy of Time magazine, or do I
- have to wait until I get back to the US?
-
- -=> The government must also encourage software and computer companies
- -=> to accept some level of professionalization. With the proper tools and
- -=> knowledge it will be possible to trap keys or decrypted documents stored
- -=> in temporary memory. These tools and skills must be tightly regulated
- -=> and those sections of the operating system must be shut off from amateur
- -=> tampering.
-
- Can't be done. As long as there is a book on programming available,
- some people will mis-use their knowledge to pirate stuff. Just like
- as long as there is a book on basic high school chemistry available,
- people will be able to build bombs. That's the problem with
- information; it's neither 'good', nor 'bad', it just is. It's the
- people who *use* the information that make it helpful, or dangerous.
-
- -=> This may cause angst among some programmers but for most of
- -=> us this should not be a burden. It does, after all, take a license (and
- -=> the proper employer) to tamper with phone boxes and electric meters.
-
- It does? Since when? Sure, *legally* it takes that, but I can go to
- the hardware store and purchase everything I need to actually do it.
- Blowing up buildings is illegal too, and we can see how well *that*
- set of laws protects us from having our building blown up.
-
- -=> One would have to vastly restrict low level media access to make
- -=> unencrypted telerights work because it would be easy to pull raw
- -=> information off the disk with a sector editor. With encryption, the
- -=> restrictions are narrower and easier to enforce because the data is
- -=> coded wherever it is stored in permanent form. Only certain sections of
- -=> the runtime environment need to be restricted.
-
- As long as the decryption is done on the local machine, it's never
- going to be secure. If you modify the operating systems in use (even
- assuming that MSDOS finally goes away) to make it more secure, it's
- no more difficult to remove the security from *my* copy of the
- operating system, or to write my own O/S without your security
- measures. Look at Linux. Sure, it's been a lot of work, but it's not
- impossible to write an O/S that works.
-
- -=> We are, to use the old Chinese pejorative, living in interesting
- -=> times. Why the Chinese have historically found this undesirable I do
- -=> not know. Their word for 'crisis' means both 'danger' and 'opportunity'
-
- I think that they got the balance just about perfect with that
- thought. There is a lot of opportunity right now, and there is also
- quite a bit of danger. I include well-meaning proposals like this in
- the "danger" category, because they involve a loss of privacy that
- I'm not sure is balanced by any tangible gain for me, the user.
-
- -=> ------------------------------------------------------------------------
- -=>
- -=> Wade Riddick is a graduate student and National Science Foundation
- -=> Fellow in the Government Department at the University of Texas at
- -=> Austin. His email address is riddick@jeeves.la.utexas.edu.
- -=>
- -=> ------------------------------
-
- Hmm. Ok. I'm just another net.admin/programmer out here in the world.
- Maybe I don't know any better, but I worry when the government
- (or, in this case, somebody majoring in government) wants to help me.
-
- Interesting times indeed...
-
- ------------------------------
-
- Date: 6 May 1995 21:34:29 -0400
- From: Marc Rotenberg <rotenberg@epic.org>
- Subject: file 2--Commentary on NPR in re the Exon Bill (EPIC fwd)
-
- The transcript of yesterday morning's NPR program on the Exon bill
- follows. Yours truly and EPIC Advisory Board member Eli Noam went at
- it with Senator Exon. The program went very well. The bill is
- obviously in trouble.
-
- - - -
-
- On another civil liberties front, we could really use your help with
- the $500,000,000 for the FBI wiretap program. With the folks in
- Washington falling over one another to see who can put together the
- most draconian terrorism legislation, the money for the national
- surveillance plan remains the key to the bills. The Clinton
- administration just proposed raising all civil fines by 40% (!) to
- fund the payoff to telephone companies so the FBI can wiretap more
- phones.
-
-
- Also, Dave Banisar just finished going through the wiretap reports for
- 1994. Here are the key numbers (Some of this will be in a Newsweek
- story on the stands later this week):
-
- -- wiretapping reached an all-time high in 1994, 1,154 taps authorized
- for federal and state combined up from 976 in 1993.
-
- -- 75% of all taps were authorized for narcotics investigations, 8%
- for gambling, and 8% for racketeering
-
- -- Not a single tap was authorized for investigations involving
- "arson, explosives, or weapons" in 1994. In fact, such an order
- hasn't been approved since the late 1980s. Keep that in mind when
- people say wiretapping is necessary to prevent tragedies like Oklahoma
- City.
-
- -- Only 17% of all conversations intercepted were deemed
- "incriminating" by prosecutors. That figure is at an all-time low (in
- the early '70s it was closer to 50%), and it means that the FBI is
- gathering far more information through electronic surveillance
- unrelated to a criminal investigation than ever before.
-
- -- Also, the duration of the taps is way up, now around 40 days on
- average. Twenty years ago, it was closer to 18.
-
- We really need the help of civil liberties and free expression groups
- with this campaign. For those who are sympathetic but think
- wiretapping is not a First Amendment issue, take a look at Herbert
- Mitgang, _Dangerous Dossiers: Exposing the Secret War Against
- America's Greatest Authors_ or recall the FBI's "Library Awareness
- Program" of the 1980s.
-
- The FBI's claim that new technologies are frustrating wiretap is
- completely without support. But if the $500,000,000 to make the
- network wiretap ready is appropriated, the current trends will be
- amplified: more surveillance, longer duration, less well targeted -->
- less privacy for all Americans.
-
- Check out our web page http://epic.org/terrorism/ or send a message to
- wiretap@epic.org. We even set up an 800 number for folks who want to
- send mailgrams.
-
- And send comments to me if you have suggestions.
-
- Thanks,
-
- Marc.
-
- ====================
-
- Copyright 1995 National Public Radio
- NPR
-
- SHOW: Morning Edition (NPR 6:00 am ET)
-
- May 5, 1995
-
- Transcript # 1600-3
-
- TYPE: Package
-
- SECTION: News; Domestic
-
- LENGTH: 788 words
-
- HEADLINE: Senator Wants to Police Internet Porno
-
- GUESTS: Sen. J. JAMES EXON (D NB); ELI NOAM, Tele-Information
- Institute, Columbia University; MARC ROTENBERG, Electronic Privacy
- Information Center
-
- BYLINE: JOHN NIELSEN
-
- HIGHLIGHT:
- The Senate telecommunications reform bill will now include an
- amendment to ban materials considered lewd and lascivious on the
- Internet. Some critics fear the government would become Internet
- police.
-
- BODY:
- BOB EDWARDS, Host: Some senators are concerned about sexually
- oriented communication on the Internet, the global network of
- computers. An amendment to the Senate's telecommunications reform
- bill would ban materials considered indecent, lewd, or lascivious.
- Supporters say the idea is to protect children. NPR's John Nielsen
- reports.
-
- JOHN NIELSEN, Reporter: Democratic Senator James Exon of Nebraska
- says he marvels at the Internet. With it, people all over the
- world can now meet and interact, they can talk privately, they can
- talk in groups, they can look at pictures, and they can sell each
- other information. Exon considers it the biggest advance in
- communications technology since the invention of the printing
- press. But Exon also thinks the Internet has one gigantic
- failing. He says there's an awful lot of pornography on this
- system and it's almost all accessible to everyone who goes online.
- A child with basic computer skills easily can stumble into the
- equivalent of a pornographic bookstore, Exon says, and he doesn't
- think that should be legal.
-
- Sen. J. JAMES EXON (D-NB): I cannot imagine that the framers of
- the Constitution intended that pornography, in and of itself,
- would be protected under the First Amendment. Certainly not for
- kids.
-
- JOHN NIELSEN: That's why Exon and Washington Republican Slade
- Gorton recently attached an anti-smut amendment to the Senate's
- telecommunications reform bill. It would punish people who
- transmit 'obscene, lewd, lascivious, filthy, or indecent
- materials' with fines of up to $100,000, or jail terms of up to
- two years. Anti-smut organizations have applauded the broadly
- worded amendment; so has South Dakota Republican Larry Pressler,
- author of the telecommunications reform bill.
-
- But critics say these anti-smut rules are dangerously vague. Eli
- Noam, of Columbia University's Tele-Information Institute, says
- they're tougher in some ways than telephone smut laws, which allow
- consenting adults to say or hear anything they want to each other.
-
- ELI NOAM, Tele-Information Institute, Columbia University: What
- the Exon-Gorton amendment would do, in effect, would make such
- conversations potentially illegal and, furthermore, would apply a
- very vague standard to it.
-
- JOHN NIELSEN: Marc Rotenberg, of the Electronic Privacy
- Information Center, has a different concern. He fears the new law
- will turn prosecutors in conservative parts of the country into a
- kind of Internet police. For instance, these prosecutors might
- argue that paintings and books from out-of-town libraries and
- museums violate community norms. Rotenberg says that could keep
- those libraries and museums off the Internet completely.
-
- MARC ROTENBERG, Electronic Privacy Information Center: You may
- have to stop and think for a moment. I mean, in your art
- collection you got to wonder about some of those Impressionists.
- Can we put everything that we've got currently hanging on the
- walls, can we put that stuff online?
-
- JOHN NIELSEN: Now, Senator Exon's staff has tried hard to answer
- criticisms of the anti-porn bill. They've dropped language that
- would have held online carriers like CompuServe and America Online
- responsible for the actions of their customers, and they've added
- language restricting the government's right to monitor Internet
- conversations. But that last change may have created as many
- problems as it solved. In a letter released this week, the
- Justice Department said restrictions on digital wire-tapping could
- cripple government efforts to catch computer hackers and to track
- suspected terrorists.
-
- Spokesmen for Senator Exon say they don't think that's true, but
- the senator says he's perfectly willing to hear his critics out.
- He'll also consider more revisions.
-
- Sen. J. JAMES EXON: And I don't mind taking the hits from some
- people that accuse me of wanting to be a censor because all of
- that has fed interest in the story and millions of people know
- about it now that had no idea of the magnitude of the problem
- before I first introduced the bill.
-
- JOHN NIELSEN: Right now the bill's future is uncertain. When the
- Senate telecommunications bill comes up for a final vote this
- month, Democratic Senator Patrick Leahy of Vermont will try to
- push the anti-smut debate aside for at least six more months.
- That would give the Justice Department time to develop an
- alternative to Exon's anti-smut plan. I'm John Nielsen in
- Washington.
-
-
- The preceding text has been professionally transcribed.
- However, although the text has been checked against an audio
- track, in order to meet rigid distribution and transmission
- deadlines, it may not have been proofread against tape.
-
- ------------------------------
-
- Date: Tue, 9 May 1995 00:33:30 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: file 3--Noam Chomksy on the Internet (fwd)
-
- ---------- Forwarded message ----------
-
- [Noam Chomksy - interview in "GeekGirl" magazine]
-
- Noam Chomsky interviewed by RosieX and Chris Mountford
-
- Chris Mountford: Professor Chomsky what do you see as the present influence
- of technology - primarily low cost small powerful computers and global
- public information networks - the technology of the so-called information
- revolution, on the mass media power in the future?
-
- *THE FIRST EDGE*
-
- Noam Chomsky: Well, I think it's double edged and you can already see the
- competing/conflicting tendencies developing. Up until now it's been pretty
- much a monopoly of relatively privileged sectors, of people who have access
- to computers in universities and so on. Say, in the academic world it's
- turned out to be a very useful way of communicating scientific results, but
- in the area we are talking about it has been used pretty efficiently in
- distributing information and setting up interconnections etc. Do you have
- peacenet or something equivalent in Australia?
-
- Rosie X: Yes the Pegasus Network..
-
- NC: Okay, in the US and particularly Europe, Peacenet puts across tons of
- information and also loads of specialist Bulletin Boards where groups with
- particular interests and concerns interact and discuss all sorts of things.
- The main journal that I write for is Z magazine, an independent left
- journal. They have a Z bulletin board which leftie types subscribe to. They
- are now bringing in the readership of other media left, so on some issues
- (eg East Timor) it's just been invaluable in organising. The reason for
- that is most of the information about it isn't in the mainstream. So for
- example a lot of it comes from Australia and until recently the Australian
- press was really accessible only to special lucky people...it was
- accessible to me cos I have friends here, who have been clipping madly for
- 20 years and sending me stuff, but that's not much help to the population.
- These days it's readily available, like say the Dili massacre, you know all
- the news was out at once. Other issues have come to the fore, which is all
- a positive consequence of the technology.
-
- *THE SECOND EDGE*
-
- NC:However there's a downside, several in fact. One aspect of it which is
- hard to quantify, but I see it very clearly myself. I am deluged with mail,
- in fact I spend 20hrs a week or so just answering letters, and often they
- are long interesting letters.It's a reflection of the fact that global
- society is very atomised and very much alone. They think they are the only
- person who thinks in a particular way. I constantly get letters saying I
- read something you wrote and I thought I was the only person in the world
- who had these crazy ideas and so on. Things have been so atomised and
- broken down and de-personalised that people have lost the normal bonds of
- association and communication, and so there's tons of mail. Recently e-mail
- has been mounting very fast, and its to the point where I have to stop
- answering it, cos its physically impossible, so I am now have to send form
- letters saying, "I just can't do it"...send me snail-mail...
-
- *BIG BROTHER INCORPORATED*
-
- NC: The big effect which I still haven't mentioned and the one that worries
- me most is what the corporate world is telling us they have in mind. And
- what they are telling us they have in mind is taking the whole thing over
- and using it as a technique of domination and control. In fact I recall
- reading an article in maybe the Wall Street Journal or somewhere which
- described the great potential of this system and they gave two examples to
- illustrate their point; one for the female market and one for the male
- market. Of course the ideal was to have every human being spend every spare
- moment alone in front of the tube and now it's interactive! So for women
- they will be watching some model advertising some crazy product which no
- sane human being would want, but with enough PR aura around, and since it's
- interactive they can have home delivery in ten minutes. For men, they said
- every red blooded American male is supposed to be watching the super bowl.
- Now it's just passive and you watch the super bowl and drink beer with your
- buddies, and so on, but with interactivity what we can do is, before the
- coach sends in the next play, everyone in the audience can be asked to
- punch in what they think it oughtta be. So they are participating, and then
- after the play is called they can flash on the screen 43% said it should
- have been a kick instead of a pass...or something, so there you have it
- something terrific for men and women. And this was not intended as a
- caricature; that's exactly the kind of thing they have in mind and you can
- see it make sense ...if I were a PR guy working for Warner Communications
- that's just what I'd be working on. Those guys have billions of $ that they
- can put into this, and the whole technology including the Internet can go
- in this direction or it can go any other direction. Incidentally the whole
- thing is simply reliving things that have gone on with earlier
- communication technologies and it's well worth having a look at what
- happened. Some very clever left type academics and media people have
- charted the course of radio in US since the 20s. In the US things took
- quite a different course from the rest of the world in the 1920s, the
- United States is a very business run society with a very high class
- business community. Like vulgar Marxists with all the values reversed,
- their stuff reads like Maoist tracks have the time just change the words
- around.
-
- *BACK TO THE ROOTS*
-
- NC: In the 20s there was a battle. *radio* was coming along, everyone knew
- it wasn't a marketable product like shoes. It's gonna be regulated and the
- question was, who was gonna get hold of it? Well, there were groups,
- (church groups, labor unions were ex tremely weak and split then, & some
- student groups), but it was a very weak civil society, and it had been a
- very repressive period just after Wilson's red scare, which had just
- smashed up the whole society. There were people who tried to organise to
- get radio to become a kind of a public interest phenomenon; but they were
- just totally smashed. I mean it was completely commercialised, it was
- handed over under the pretext it was democratic, cos if you give it to the
- big corporations then it's pure democracy. So radio in the US became almost
- exclusively commercialised - they were allowed a student radio station
- which reached three blocks or something. Now the rest of the world went the
- other way, almost everywhere else it became public. Which means it was as
- free as the society is - you know never very free but at least to whatever
- extent people can affect what a government does, which is something after
- all - to that extent radio was a public good. In the US, the opposite. Now
- when TV came along in the US it wasn't even a battle. By then business
- dominance was so overwhelming that the question never even arose. It became
- purely private. In the 1960s they allowed public radio and tv but in an
- interesting way. [The] public could act to some extent through the
- parliamentary institutions, and congress had imposed some conditions on
- public interest requirements on the big networks, which means they had to
- spend two percent of their time at 3am Sunday allowing a community group
- on...or something...and then every year they had to file reports to the
- federal communications commission saying, 'yeah here is the way we met our
- responsibility', which was mainly a nuisance as far as CBS was concerned.
- Actually I knew someone who worked in one of their offices and she told me
- they had to spend all sorts of time lying about what they were doing and it
- was a pain in the neck. At some point they realised it would be better to
- just get the burden off their heads and allow a marginal public system
- which would be very poorly funded and marginalised and under state
- corporate control anyway, and then they wouldn't even have to pretend any
- longer, and that's pretty much how those two modes of communications turned
- out.
-
- *NOAM'S NO NEWBIE*
-
- N.C: ...to tell you something personally I have a daughter in Nicaragua,
- and Nicaragua in the 80s was under a complete ban.You couldn't get a letter
- down there, but we were communicating thanks to the Pentagon. Thanks to the
- Pentagon and the fact that I'm at MIT, I was the on the ARPANET, and it's
- not meant for people like me but they can't get me out, and so my daughter
- (who had a connection) and I during the terrorist war were actually
- communicating thanks to the Pentagon.
-
- RX: Ahh, did you use or do you use cryptography?
-
- NC: I just don't care about secrecy. In fact one thing I have learned over
- the years in resistance, and been close to long jail sentences and been in
- trials. I know this system pretty well, and the one thing I've discovered
- over the years is to be complet ely public. The intelligence systems are so
- ideologically fanatic that they can not understand public opposition. I
- mean I can give you exact examples of this. They assume that everybody is
- as nutty as they are and so they spend all their time and energy trying to
- figure out the connections to North Korea or something like that, the idea
- that someone could honestly and openly say "I defy the Government, I reject
- what you're doing, I'm gonna subvert it and so on"... they simply dismiss.
- The safest thing always is to be quite public. Furthermore there is no way
- to protect yourself from the National Security Administration snooping, you
- know, and they don't bother, they don't have the resources and if they had
- they couldn't do anything with them cos they are to stupid to use the
- information.
-
- *IS TECH ENOUGH?*
-
- CM: I'd actually like to take you up there on your point about one of the
- negatives of corporate control. At the moment a large number of online
- communities or groups who consider themselves communities don't have the
- problem you mentioned, junk e-mail, because their group communications are
- public, there's no possibility of responding to everything - that was given
- up long ago - quality is judged by the viewer. Perhaps it's easier to find
- what you are looking for with this technology, you can do more than change
- channel. Compounding with that, unlike broadcast media which as you
- mentioned were appropriated by corporations, this is not broadcast this is
- not one-to-many but any-to-any, it can be one on one or one to a very large
- audience.
-
- NC: The same is true of cable TV for example, theoretically you can have
- dozens of cable television channels, and in fact, in the US there are laws
- which require the major corporations to fund independent cable stations.
- Well the net effect is that virtually nothing happens and the reason is
- because [of] the distribution for resources, energy and organisation, so
- what you are saying is theoretically true. But the way it works out in
- practice is a reflection of the state of activism and organisation and
- resource allocation and so on. Incidentally the public nets where everyone
- is talking to one another have, in my opinion, the same degraded character
- as the individual e-mail messages; people are just too casual in what comes
- across...the effect is you often get good things, but buried...the quality
- of what people are doing is actually declining because of their intense
- involvement in these e-mail interactions which are have such an
- overwhelming character when you get involved in them. And it's kind of
- seductive, not personally for me, but I know people get seduced by the
- computer and sitting there banging around at it. It has a negative
- potential and a certain positive potential, but I think it's a double edged
- sword
-
- *FLAMES, FLAMES AND THE FUTURE*
-
- RX: What about flaming, is it a sign of human nature having been oppressed
- for so long that people are hell bent on vetting their anger in a medium
- where they can be anonymous.
-
- NC: I don't think its very different from personal interactions, people
- throw things at each other and hit each other...its quite common place
-
- RX: Do you think anger is an initial stage of the technology?
-
- NC: I think the way the technology is likely to go is unpredictable... if I
- had to make a guess, my guess is corporate take-over, and that to the
- extent that it's so far tax payer supported and it's a government
- institution or whatever people call it, in fact it's a military
- installation/system at base and they are letting it go, and the reason they
- are letting it go is cos they are not concerned about the positive effects
- it has, because they probably feel, maybe correctly, that it's overwhelmed
- by the n egative effects...and these are things people have to achieve -
- they are not going to be given as gifts...like the Pentagon is not going to
- give people as a gift a technique for free communication which undermine
- the major media; if its going to take out that way it will be cos of
- struggle like any other victory for freedom.
-
- *ANYONE'S TOOL*
-
- CM: Do you think that the technology is inherently democratic?
-
- NC: There is no technology which is inherently democratic or no technology
- which is inherently oppressive for that matter, technology is usually a
- fairly neutral thing. The technology doesn't care really whether it's used
- for oppression or liberation, it's how people use it.
-
- CM: If you have what's probably pretty close to a level playing field, even
- with a cheap set-up, and have basically the same capability to publish
- whatever you produce as everyone else does, a quality document or whatever,
- (not just half-baked junk e-mail) it can be distributed more easily than
- traditional product- based means. Then you work in the looming financial
- link, what you mentioned before - people leaving their subscriptions
- behind, that could perhaps become all electronic.
-
- NC: First of all the business...about level playing field is all a bit of a
- joke, I mean type writers and paper are also a level playing field but that
- doesn't mean that the mass media system is equally distributed among the
- population. What's called a level playing field, is just capitalist
- ideology, its not a level playing field when power is concentrated. And
- even if, formally speaking, a market is meant to be a level playing
- field...but we know what that means..as to using this type of technology,
- the threat to left institutions is severe in my opinion. If people do or
- become so anti-social and so controlled by market ideology even people on
- the left, that they will drop their support for independent left media
- institutions because they can get something free, those institutions will
- decline and they won't be anything over the Internet, as what goes over the
- Internet now is things that come out of the existing institutions. If those
- are destroyed nothing is going to come out that counts. There are ways
- around this, for example you could subscribe to some Internet forums...for
- example Time Magazine are putting their stuff out free on the Internet and
- this makes a lot of sense for them because a journal like Time does not
- make money when they sell subscriptions, they lose money. They make money
- from advertising, so they are delighted to not have to distribute the thing
- physically...they are delighted to give it away free, because then they
- don't have the cost of selling it at news stands and sending subscriptions.
- They still get the same income mainly from advertising, but that's not true
- for say Z magazine, they don't live on advertising they live on
- subscriptions..
-
- RX: What other publications do you read, and do you ever peak at Wired...or
- other high tech publications?
-
- NC: I'm not much into high tech culture...even though I am at MIT, and my
- wife works at educational technology and my son is a computer fanatic. I
- don't have time to read Zines, I don't find them very enlightening.
-
- ---------------------------------------------------------
- Needless to say Noam Chomsky declined giving us his e-mail address!!
-
- ------------------------------
-
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: file 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.37
- ************************************
-
-