home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Nov 2, 1997 Volume 9 : Issue 79
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.79 (Sun, Nov 2, 1997)
-
- File 1--RC5 Cracked - The unknown message is... (fwd)
- File 2--Justice Dept charges Microsoft w/violating 199 order
- File 3--Microsoft's reaction the the DOJ lawsuit
- File 4--Small Minds Think Alike
- File 5--Illinois Library Decides Not to Filter Net
- File 6--Gullibility Virus Warning
- File 7--Bandwidth Turnabout: Not Just Fair Play But Future Wave?
- File 8--Islands in the Clickstream
- File 9--Kashpureff in custody. (fwd)
- File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Mon, 27 Oct 1997 08:43:38 -0500
- From: Albert Garrido <Albert.Garrido@nextel.com>
- Subject: File 1--RC5 Cracked - The unknown message is... (fwd)
-
- Hi, I'm sending the message below for inclusion in the next CuD issue.
-
- ---
-
- Below is the original press release detailing RC5-56 bit encryption
- being cracked by the Bovine effort at http://www.distributed.net
-
- Please note that the Bovine effort has not stopped, and has moved onto
- cracking RC5-64. See for details.
-
-
- ----------
- From-- David McNett <nugget@slacker.com>[:]
- Sent-- Wednesday, October 22, 1997 3:14 PM
- Subject-- [rc5] The unknown message is...
-
- -----BEGIN PGP SIGNED MESSAGE-----
- Hash: SHA1
-
- It is a great privilege and we are excited to announce that at 13:25
- GMT on 19-Oct-1997, we found the correct solution for RSA Labs' RC5-
- 32/12/7 56-bit secret-key challenge. Confirmed by RSA Labs, the key
- 0x532B744CC20999 presented us with the plaintext message for which we
- have been searching these past 250 days.
-
- The unknown message is: It's time to move to a longer key length
-
- In undeniably the largest distributed-computing effort ever, the
- Bovine RC5 Cooperative (http://www.distributed.net/), under the
- leadership of distributed.net, managed to evaluate 47% of the
- keyspace, or 34 quadrillion keys, before finding the winning key. At
- the close of this contest our 4000 active teams were processing over
- 7 billion keys each second at an aggregate computing power equivalent
- to more than 26 thousand Pentium 200's or over 11 thousand PowerPC
- 604e/200's. Over the course of the project, we received block
- submissions from over 500 thousand unique IP addresses.
-
- The winning key was found by Peter Stuer <peter@dinf.vub.ac.be> with
- an Intel Pentium Pro 200 running Windows NT Workstation, working for
- the STARLab Bovine Team coordinated by Jo Hermans
- <Jo.Hermans@vub.ac.be> and centered in the Computer Science
- Department (DINF) of the Vrije Universiteit (VUB) in Brussels,
- Belgium. (http://dinf.vub.ac.be/bovine.html/). Jo's only comments
- were that "$1000 will buy a lot of beer" and that he wished that the
- solution had been found by a Macintosh, the platform that represented
- the largest portion of his team's cracking power. Congratulations
- Peter and Jo!
-
- Of the US$10000 prize from RSA Labs, they will receive US$1000 and
- plan to host an unforgettable party in celebration of our collective
- victory. If you're anywhere near Brussels, you might want to find
- out when the party will be held. US$8000, of course, is being
- donated to Project Gutenberg (http://www.promo.net/pg/) to assist
- them in their continuing efforts in converting literature into
- electronic format for the public use. The remaining US$1000 is being
- retained by distributed.net to assist in funding future projects.
-
- Equally important are the thanks, accolades, and congratulations due
- to all who participated and contributed to the Bovine RC5-56 Effort!
- The thousands of teams and tens of thousands of individuals who have
- diligently tested key after key are the reason we are so successful.
-
- The thrill of finding the key more than compensates for the sleep,
- food, and free time that we've sacrificed!
-
- Special thanks go to all the coders and developers, especially Tim
- Charron, who has graciously given his time and expertise since the
- earliest days of the Bovine effort. Thanks to all the coordinators
- and keyserver operators: Chris Chiapusio, Paul Chvostek, Peter
- Denitto, Peter Doubt, Mishari Muqbil, Steve Sether, and Chris
- Yarnell. Thanks to Andrew Meggs, Roderick Mann, and Kevyn Shortell
- for showing us the true power of the Macintosh and the strength of
- its users. We'd also like to thank Dave Avery for attempting to
- bridge the gap between Bovine and the other RC5 efforts.
-
- Once again, a heartfelt clap on the back goes out to all of us who
- have run the client. Celebrations are in order. I'd like to invite
- any and all to join us on the EFNet IRC network channel #rc5 for
- celebrations as we regroup and set our sights on the next task. Now
- that we've proven the limitations of a 56-bit key length, let's go
- one further and demonstrate the power of distributed computing! We
- are, all of us, the future of computing. Join the excitement as the
- world is forced to take notice of the power we've harnessed.
-
- Moo and a good hearty laugh.
-
- Adam L. Beberg - Client design and overall visionary
- Jeff Lawson - keymaster/server network design and morale booster
- David McNett - stats development and general busybody
-
- ------------------------------
-
- Date: Sun, 02 Nov 97 00:08 CST
- From: Cu Digest <TK0JUT2@MVS.CSO.NIU.EDU>
- Subject: File 2--Justice Dept charges Microsoft w/violating 199 order
-
- FOR IMMEDIATE RELEASE AT
- MONDAY, OCTOBER 20, 1997 (202) 616-2771
- TDD (202) 514-1888
-
-
- JUSTICE DEPARTMENT CHARGES MICROSOFT WITH
- VIOLATING 1995 COURT ORDER
-
-
- Asks Court to Impose $1 Million a Day Fine if Violation Continues
-
- WASHINGTON, D.C. -- The Department of Justice asked a
- federal court today to hold Microsoft Corporation--the world's
- dominant personal computer software company--in civil contempt
- for violating terms of a 1995 court order barring it from
- imposing anticompetitive licensing terms on manufacturers of
- personal computers.
-
- The petition filed today by the Department's Antitrust
- Division alleges that Microsoft violated the court order by
- requiring PC manufacturers to license and distribute Microsoft's
- Internet browser, called Internet Explorer, as a condition of
- licensing Microsoft's Windows 95. Most PC makers preinstall
- Windows 95--the dominant PC operating system--at the factory on
- the PCs they sell.
-
- "Microsoft is unlawfully taking advantage of its Windows
- monopoly to protect and extend that monopoly and undermine
- consumer choice," said Attorney General Janet Reno.
-
- The Department brought today's action to enforce the earlier
- court order, and to prevent Microsoft from being able to expand
- and protect its monopoly in the PC operating system market by
- anticompetitive means. The Department also wants to ensure that
- PC manufacturers and consumers will be able to choose among
- competing software products.
-
- "Our main concern is that by violating the court order,
- Microsoft is using an unlawful advantage to beat back an
- important competitive challenge to its Windows monopoly," said
- Joel I. Klein, Assistant Attorney General in charge of the
- Department's Antitrust Division. "Even as we go forward with
- this action today," Klein added, "we also want to make clear that
- we have an ongoing and wide-ranging investigation to determine
- whether Microsoft's actions are stifling innovation and consumer
- choice."
-
- Much of Microsoft's market power today results because most
- applications programs for PCs--programs such as word processing,
- spread sheets and money managers--are written to work with
- Microsoft's Windows 95 PC operating system, the Department said.
- Unfettered competition among Internet browser products could lead
- to development of a computer environment in which business and
- consumer applications would work regardless of which operating
- system was installed on the PC. Software companies are currently
- developing applications that use an Internet browser as the user
- interface and work on other operating systems as well as with
- Windows 95.
-
- Microsoft's operating system is installed on more than 80
- percent of the nation's PCs, and preinstallation on PCs at the
- factory is Microsoft's main distribution channel.
-
- Under the 1995 court order, Microsoft is prohibited from
- forcing computer makers to license any other Microsoft product as
- a condition of licensing Windows 95. Many PC manufacturers want
- the ability to choose freely among competing software products
- when they decide what to package with their PCs in order to offer
- their customers the best mix of software products available.
-
- The petition charges that Microsoft has conditioned licenses
- to Windows 95 on manufacturers' licensing of Internet Explorer
- and that it has denied manufacturers' requests not to ship
- Internet Explorer on new PCs with Windows 95.
-
- The Department stressed that it is not taking sides in the
- "browser war" between Microsoft and its rival, Netscape
- Communications Corporation, or in any emerging competition
- between Windows and other products.
-
- "Microsoft is not entitled to require computer manufacturers
- and consumers to take Internet Explorer when they license Windows
- 95," said Klein. "Each of Microsoft's products should compete on
- its own merits."
-
- Klein stressed, however, that today's action in no way
- prevents consumers or PC manufacturers from voluntarily choosing
- to obtain Internet Explorer and Windows 95, either together or
- separately, if they so wish.
-
- In its petition, the Department asked the court:
-
- * To stop Microsoft from requiring PC manufacturers to
- accept Internet Explorer as a condition of receiving Windows 95.
-
- * To require Microsoft to notify consumers of PCs that have
- Windows 95 that they are not required to use Internet Explorer,
- that they are free to use any compatible Internet browser, and to
- give consumers simple instructions about how to remove the
- Internet Explorer icon from their PC desktop if they choose.
-
- * To impose large daily fines--$1 million--on Microsoft if
- it continues to violate the court's order.
-
- * To strike down broad portions of non-disclosure
- agreements that Microsoft requires those with whom it does
- business to sign.
-
- The non-disclosure agreements may deter companies and
- individuals from coming forward voluntarily to provide
- information about Microsoft to the Department. Moreover, they
- sometimes require signatories to notify Microsoft first before
- complying with the Department's formal requests, or even court
- orders, for such information.
-
- Microsoft has advised the Department that it would not
- insist on prior disclosure when the Department approaches
- companies or individuals and assures them that it will keep
- information confidential. But, this informal agreement, Klein
- said, does not address the concerns of parties who wish to come
- forward voluntarily.
-
- Klein stressed the importance of full, voluntary disclosure
- of information relevant to the Department's larger investigation
- of Microsoft's practices. He expressed concern that the broad
- non-disclosure agreements could possibly hamper its investigation
- and indicated that, to remove any possible impediment, even if
- unintended, the Department was seeking a court order.
-
- "We need a court order to clear the air here so that anyone
- with relevant information will feel free to come talk to the
- Department without any fear of intimidation or reprisal," Klein
- said. "We will not let Microsoft or anyone else burden that
- fundamental right."
-
- Today's petition was filed in U.S. District Court for the
- District of Columbia, where the 1995 consent decree was entered.
-
- Microsoft will have an opportunity to respond to the
- Department's petition in writing within 11 days. At that time,
- the judge will decide whether a hearing is appropriate.
-
- ------------------------------
-
- Date: Thu, 30 Oct 1997 21:54:52 -0700
- From: Jack Dean <JackDean@webworldinc.com>
- Subject: File 3--Microsoft's reaction the the DOJ lawsuit
-
- Here's an interesting press release on Microsoft's reaction to the the DOJ
- lawsuit:
-
- REDMOND, Wash. - Oct. 21, 1997 -- In direct response to accusations
- made by the Department of Justice, the Microsoft Corp. announced today
- that it will be acquiring the federal government of the United States of
- America for an undisclosed sum.
-
- "It's actually a logical extension of our planned growth," said Microsoft
- chairman Bill Gates, "It really is going to be a positive arrangement for
- everyone."
-
- Microsoft representatives held a briefing in the oval office of the White
- House with U.S. President Bill Clinton, and assured members of the press
- that changes will be "minimal." The United States will be managed as a
- wholly owned division of Microsoft. An initial public offering is planned
- for July of next year, and the federal government is expected to be
- profitable by "Q4 1999 at latest," according to Microsoft president Steve
- Ballmer.
-
- In a related announcement, Bill Clinton stated that he had "willingly and
- enthusiastically" accepted a position as a vice president with Microsoft,
- and will continue to manage the United States government, reporting
- directly to Bill Gates. When asked how it felt to give up the mantle of
- executive authority to Gates, Clinton smiled and referred to it as "a
- relief." He went on to say that Gates has a "proven track record", and
- that U.S. citizens should offer Gates their "full support and
- confidence." Clinton will
- reportedly be earning several times the $200,000 annually he has earned
- as U.S. president, in his new role at Microsoft.
-
- Gates dismissed a suggestion that the U.S. Capitol be moved to Redmond as
- "silly," though did say that he would make executive decisions for the U.S.
- government from his existing office at Microsoft headquarters. Gates went
- on to say that the House and Senate would "of course" be abolished.
- "Microsoft isn't a democracy," he observed, "and look how well we're doing."
-
- When asked if the rumored attendant acquisition of Canada was proceeding,
- Gates said, "We don't deny that discussions are taking place." Microsoft
- representatives closed the conference by stating that United States
- citizens will be able to expect lower taxes, increases in government
- services and discounts on all Microsoft products.
-
- About Microsoft
- ---------------
- Founded in 1975, Microsoft (NASDAQ "MSFT") is the worldwide leader in
- software for personal computers, and democratic government. The company
- offers a wide range of products and services for public, business and
- personal use, each designed with the mission of making it easier and more
- enjoyable for people to take advantage of the full power of personal
- computing and free society every day.
-
- About the United States
- -----------------------
- Founded in 1789, the United States of America is the most successful
- nation in the history of the world, and has been a beacon of democracy and
- opportunity for over 200 years. Headquartered in Washington, D.C., the
- United States is a wholly owned subsidiary of Microsoft Corporation.
-
-
- (from www.MacsOnly.com)
-
- ------------------------------
-
- Date: Fri, 31 Oct 1997 13:10:47 -0800 (PST)
- From: "Brock N. Meeks" <brock@well.com>
- Subject: File 4--Small Minds Think Alike
-
- Source - : fight-censorship@vorlon.mit.edu
-
- CyberWire Dispatch Bulletin
-
- Washington --In this boneyard of Washington, DC it doesn't take
- long for big dawgs and small alike to bark. A couple of small
- ones yipped it up today.
-
- Rep. Marge (no relation to Homer) Roukema, R-N.J. and Sen. Lauch
- (??) Faircloth, R-N.C. introduced a bill to amend the
- Communications Act that would ban convicted sex offenders from
- using the Internet.
-
- "We must protect our children by denying convicted violent sex
- offenders this form of access to their victims," Roukema said.
- [Hey, you knew THAT line was coming...]
-
- Roukema calls this a "practical, workable bill." Because known
- sex offenders must register, the bill will work! she says. No,
- no, no, this is NOT an infringement of the 1st Amendment. After
- all, she says, if a felon can be denied the right to vote, a
- violent sex offender can certainly be denied the right to
- 'cruise' the Internet looking for victims," she says.
-
- [Okay. Line up HERE: to take your one free shot at this brain
- dead logic.]
-
- The bill bars interactive service providers from giving sex
- offenders an account. Break that law and you get fined $5,000
- for each day the perp is online.
-
- Meeks out...
-
- ------------------------------
-
- Date: Fri, 17 Oct 1997 18:19:13 GMT
- From: owner-cyber-liberties@aclu.org
- Subject: File 5--Illinois Library Decides Not to Filter Net
-
- Cyber-liberties Update
- October 17, 1997
-
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Illinois Library Decides Not to Filter Net, Others Consider Restricting
- Policies
-
- Deciding that parents are in the best position to decide what their
- children may view on the Internet, the Des Plaines, Ill., Public Library
- recently installed Internet browsers on two computers located in the
- children's section of the library without installing blocking software,
- reports the Freedom Forum First Amendment Center at Vanderbilt University.
- <http://www.fac.org/>.
-
- In an interview with the First Amendment Center, Library Administrator
- Sandra Norlin explained that "while we make suggestions on what we think
- are the best sites for children, we are not the right people to be
- determining each child's maturity level and each family's system of values.
- Our policy is based on high regard for the people in our community and
- their ability to make wise and prudent decisions for themselves."
-
- Library officials also cited problems with filtering software in their
- decision not to install it and that the software creates a false sense of
- security in parents, the First Amendment Center reports.
-
- "We felt that filtering software was not the appropriate action to take,"
- Norlin said. "It's the 'one-size-fits-all' approach. =85 Everyone has the
- same restrictions placed on them. No one would have the individual
- opportunity to make their own decisions."
-
- Meanwhile, in Virginia Fairfax County officials this week proposed a policy
- which would allow parents of children under age 13 to prohibit their
- children from using the Internet in public libraries. Library officials
- claimed that the policy may be the only solution since they cannot arrive
- at a consensus on the filtering issue.
-
- Under the policy being considered by the county's library board, a child's
- parents or guardians would have the right to notify the library system that
- they did not want him or her to be given access to the Internet. Children
- 13 and older still would have unrestricted access.
-
- Other local libraries in the Washington, D.C. area are also considering
- whether to install filtering software. However, the Loudoun County library
- board, which voted in July to install screening software on all computers
- is reconsidering the policy.
-
- Last month, the San Jose, Ca., City Council overwhelmingly rejected a
- proposal that would have mandated restriction of Internet access in public
- libraries, however, neighboring local counties are continuing to consider
- filtering proposals, Ann Brick, a staff attorney with the ACLU of No. Ca.
- said.
-
- Filtering software is particularly problematic because it often blocks a
- much wider spectrum of speech than legally obscene speech, Brick said,
- adding that the decision to filter runs counter to the Supreme Court
- decision in Reno v. ACLU from this year.
-
- "The Supreme Court in Reno v. ACLU held that the Internet, as much as the
- books and newspapers found in our public libraries, is entitled to the very
- highest level of First Amendment protection which means that Internet
- censorship in the library off limits for government, including City
- Councils," she said.
-
- ++++++++++++++++++++
-
- About Cyber-Liberties Update:
-
- ACLU Cyber-Liberties Update Editor:
- Cassidy Sehgal (Cassidy_Sehgal@aclu.org)
- American Civil Liberties Union
- National Office 125 Broad Street,
- New York, New York 10004
-
- To subscribe to the ACLU Cyber-Liberties Update, send a message to
- majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
- message. To terminate your subscription, send a message to
- majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
-
- ------------------------------
-
- Date: Thu, 30 Oct 1997 23:57:13 -0600
- From: Avi Bass <te0azb1@corn.cso.niu.edu>
- Subject: File 6--Gullibility Virus Warning
-
- ********************************************************************
- WARNING, CAUTION, DANGER, AND BEWARE!
- Gullibility Virus Spreading over the Internet!
- ********************************************************************
-
-
- WASHINGTON, D.C.--The Institute for the Investigation of Irregular
- Internet Phenomena announced today that many Internet users are becoming
- infected by a new virus that causes them to believe without question every
- groundless story, legend, and dire warning that shows up in their inbox or
- on their browser. The Gullibility Virus, as it is called, apparently
- makes people believe and forward copies of silly hoaxes relating to cookie
- recipes, email viruses, taxes on modems, and get-rich-quick schemes
- [perhaps conspiracy theories should be included here].
-
- "These are not just readers of tabloids or people who buy lottery tickets
- based on fortune cookie numbers," a spokesman said. "Most are otherwise
- normal people, who would laugh at the samestories if told to them by a
- stranger on a streetcorner." However, once these same people become
- infected with the Gullibility Virus, they believe anything they read on
- the Internet.
-
- "My immunity to tall tales and bizarre claims is all gone," reported one
- weeping victim. "I believe every warning message and sick child story my
- friends forward to me, even though most of the messages are anonymous."
-
- Another victim, now in remission, added, "When I first heard about Good
- Times, I just accepted it without question. After all, there were dozens
- of other recipients on the mail header, so I thought the virus must be
- true." It was a long time, the victim said, before she could stand up at
- a Hoaxees Anonymous meeting and state, "My name is Jane, and I've been
- hoaxed." Now, however, she is spreading the word. "Challenge and check
- whatever you read," she says.
-
- Internet users are urged to examine themselves for symptoms of the virus,
- which include the following:
-
- * the willingness to believe improbable stories
- without thinking
-
- * the urge to forward multiple copies of such
- stories to others
-
- * a lack of desire to take three minutes to check
- to see if a story is true
-
- T. C. is an example of someone recently infected. He told one reporter, "I
- read on the Net that the major ingredient in almost all shampoos makes your
- hair fall out, so I've stopped using shampoo." When told about the
- Gullibility Virus, T. C. said he would stop reading email, so that he would
- not become infected.
-
- Anyone with symptoms like these is urged to seek help immediately. Experts
- recommend that at the first feelings of gullibility, Internet users rush to
- their favorite search engine and look up the
- item tempting them to thoughtless credence. Most hoaxes, legends, and tall
- tales have been widely discussed and exposed by the Internet community.
-
- Courses in critical thinking are also widely available, and there is online
- help from many sources, including
-
- * Department of Energy Computer Incident Advisory
- Capability at
- <http://ciac.llnl.gov/ciac/CIACHoaxes.html>
-
- * Symantec Anti Virus Research Center at
- <http://www.symantec.com/avcenter/index.html>
-
- * McAfee Associates Virus Hoax List at
- <http://www.mcafee.com/support/hoax.html>
-
- * Dr. Solomons Hoax Page at
- <http://www.drsolomons.com/vircen/hoax.html>
-
- * The Urban Legends Web Site at
- <http://www.urbanlegends.com>
-
- * Urban Legends Reference Pages at
- <http://www.snopes.com>
-
- * Datafellows Hoax Warnings at
- <http://www.Europe.Datafellows.com/news/hoax.htm>
-
- Those people who are still symptom free can help inoculate themselves
- against the Gullibility Virus by reading some good material on evaluating
- sources, such as
-
- * Evaluating Internet Research Sources at
- <http://www.sccu.edu/faculty/R_Harris/evalu8it.htm>
-
- * Evaluation of Information Sources at
- <http://www.vuw.ac.nz/~agsmith/evaln/evaln.htm>
-
- * Bibliography on Evaluating Internet Resources at
- <http://refserver.lib.vt.edu/libinst/critTHINK.HTM>
-
- Lastly, as a public service, Internet users can help stamp out the
- Gullibility Virus by sending copies of this message to anyone who forwards
- them a hoax.
-
- *******************************************************************
- This message is so important, we're sending it anonymously! Forward it to
- all your friends right away! Don't think about it! This is not a chain
- letter! This story is true! Don't check it out! This story is so timely,
- there is no date on it! This story is so important, we're using lots of
- exclamation points! For every message you forward to some unsuspecting
- person, the Home for the Hopelessly Gullible will donate ten cents to
- itself. (If you wonder how the Home will know you are forwarding these
- messages all over creation, you're obviously thinking too much.)
-
- *******************************************************************
-
- ACT NOW! DON'T DELAY! LIMITED TIME! NOT SOLD IN ANY STORE!
-
- *******************************************
-
- ------------------------------
-
- Date: Tue, 21 Oct 1997 20:36:08 -0400
- From: Paul Kneisel <tallpaul@nyct.net>
- Subject: File 7--Bandwidth Turnabout: Not Just Fair Play But Future Wave?
-
- The readers of CuDigest might be interested in the latest service offered
- by my ISP (that I have not yet explored or signed up for.)
-
- We read how the telco's are complaining that Internet users are eating
- excessively into their bandwidth because the average net connection lasts
- longer than the average "wail mail" voice phone call.
-
- It seems that some ISPs have a different opinion in the matter. They've
- started to shift their excess data bandwidth to become value-added
- long-distance providers.
-
- It makes one wonder about the "accuracy" of the telco claims.
-
- -- tallpaul
- ++++++++++
-
- Dear NYCT Customer,
-
- NYCT is proud to announce the newest, most innovative, money saving
- service:
-
- NYCT LONG DISTANCE
-
- It's the world's first paperless long distance service designed
- exclusively for internet users. You'll use your phone the same as you
- do today, but pay unbelievably low rates (better than the advertised
- rates of the major carriers) and get great on-line features - never
- before available. Some (but not all) of these features are:
-
- On-line call detail and statements, in dbase or ACSCII format.
-
- Don't recognize a number on your on-line phone bill? Click on a
- number, and we'll give you the name and address of whose number it is.
-
- View your calls from yesterday or one year ago on-line.
-
- On-line address book, created and updated automatically every time you
- made a call.
-
- Your mom says you never call - with a click of your mouse we'll tell
- you, on-line, every time you've called her and what you've spent.
-
- Calling card: great rates, and get news, weather, sports and
- entertainment.
-
- On-line 411 directory service (110 million business and residential
- listings).
-
- 24 x 7 on-line customer service (no more voicemail hell).
-
- And much More!
-
- To learn more and to subscribe to NYCT Long Distance, go to :
- http://nyct.quadracom.com
-
- Here you'll learn all about the available features and you can sign up
- to be a NYCT Long Distance customer.
-
- Thanks.
-
- Andrew E. Coren
- --
- ________________________________________________________________
- : Andrew E. Coren, President TOTAL SOLUTION PROVIDERS :
- : New York Connect.Net, Ltd. internet services,networks, :
- : http://www.nyct.net hardware,programming,support :
- : 212-293-2620 :
- : " BRINGING NEW YORK THE INTERNET SERVICES IT DESERVES " :
- :________________________________________________________________:
-
- ------------------------------
-
- Date: Fri, 10 Oct 1997 06:50:15
- From: Richard Thieme <rthieme@thiemeworks.com>
- Subject: File 8--Islands in the Clickstream
-
- Islands in the Clickstream:
- The Voice of the Computer
-
-
- I was disappointed when hour-long cartoons of Peanuts were made for
- television. I had been reading the comic strip for years, and when I read
- the words in balloons above the characters. heads, I heard their voices
- inside my head as a kind of echo -- the way you probably hear .my. voice
- inside your head as you read these words.
-
- That voice -- private, well-modulated, always just right -- was replaced by
- a real child.s voice that didn.t sound right at all. It sounded like a
- child, a real child, not the Charlie Brown in my head. By providing too
- much information, the movie makers yanked Peanuts from the world of
- imagination and turned it into one more concrete thing in the world of
- sensation, a fetish stripped of its magical properties.
-
- Computer engineers pay close attention to the world of sensation as they
- struggle to develop computers that act like human beings. They more they
- try, however, the more it seems they miss the mark. Artificial intelligence
- and robotics experts design crabs that scuttle around their labs like
- low-grade idiots. Few laypeople are excited when a robot distinguishes a
- cube from a ball and lifts it off the ground.
-
- The best robots are designed for tasks, not to look like living creatures.
- Let them do their jobs, and we.ll provide the personality.
-
- A decade ago, Joseph Weizenbaum of MIT became upset when an employee
- interacted with ELIZA, the simple interactive .therapist. he designed, as
- if ELIZA were a real person.. His employee even asked him to leave the room
- so she could have a private conversation.
-
- Weizenbaum was alarmed at the ease with which people projected personality
- and presence onto the computer. He thought it was bad, instead of just
- what.s so. Now two men from Stanford -- Byron Reeves and Clifford Nass --
- have carried out some wonderful studies that reveal how and why we respond
- to computers as if they are real people (.The Media Equation: How People
- Treat Computers, Television and New Media like Real People and Places. -
- Stanford and Cambridge: 1996).
-
- Their studies state the obvious, but -- as usual -- it was so obvious, we
- missed it. Our brains evolved to help us survive, and we react,
- unconsciously and automatically, as if something that looks or acts like a
- person IS a person. Our .top-level. program may say something else --
- .it.s only a movie,. for example, when we.re frightened during a horror
- flick -- but that wouldn.t be necessary if we didn.t think it was real.
-
- Artificial intelligence and virtual reality are not necessary to make us
- think a computer is smart. Less is more. Too much detail, too much
- information, overwhelms our imaginations.
-
- Computers are inherently social actors, Nass said at a Usability
- Professionals Association conference. He used flattery as an example.
- .We.re suckers for flattery, even when we know it isn.t true.. So computer
- programs that flatter the user are consistently judged to be smarter and
- better at playing games, and users enjoy using them more. And ... people
- ALWAYS deny that.s what they.re doing.
-
- We act the way we act, not the way we think we act.
-
- We need friends, we need allies, Nass explained, and when they tied blue
- armbands around both users and computers and said they were a team, the
- users believed their computers were friendlier, smarter, better, just as we
- do about our human team-mates. Again, no one knew they were doing it.
-
- The voices of our computers -- the ones we hear in our heads -- are always
- just right. If designers simply provide the opportunity for projection and
- facilitate the transaction in a seamless way, we.ll do most of the work and
- add emotional richness and content. Get in the way too much, it.s like that
- little paperclip guy on Windows programs, always in your face. I don.t know
- anyone who wants that animation dancing on their screen all the time like a
- fly you can.t swat.
-
- The Infocom interactive text games from the 1980s were powerfully
- evocative. Games like Trinity, A Mind Forever Voyaging, and Hitchhiker.s
- Guide to the Galaxy used clever text and poetic imagery to invite us to
- co-create landscapes as magical as those I remember from children.s books.
- With larger platforms and memory devices, games evolved into interactive
- movies that shut down that process. When graphics dominate the interface,
- there.s less room for the activity of the imagination.
-
- Children imagine so much, Eleanor Roosevelt observed, because they have so
- little experience. As our experience grows, the magical landscapes of our
- childhood vanish, replaced with interstate highways, convenience stores and
- power lines. A little more imagination and a little less information
- wouldn.t hurt. It gives our souls some room to maneuver. If computers
- provide just enough cues to elicit our projections, we.ll do the rest.
- We.ll endow distributed networks, human and non-human alike, with
- personality, presence, and intentionality as the ancient Greeks saw gods in
- every rock and grove and thunderstorm.
-
- Cyberspace is .space. indeed, brimful of gods and goddesses, angels and
- demons waiting to become flesh. That.s neither good nor bad, it.s just
- what.s so. Digital deities are emerging now in the brackish tidewaters of
- cyberspace, where all life begins. If we accept responsibility for
- understanding how we co-create them, how we interact with the Net and the
- entire universe unconsciously and automatically, then we can cooperate with
- how our brains work anyway. They make up the game whether we want them to
- or not. .Out there. and .in here. are metaphors, defining preconditions of
- perception as .space.. The grid is imaginary, and the grid is real. That.s
- the playing field of our lives so we might as well learn the rules, then
- work and play with gusto and be all used up when the game is done.
-
- **********************************************************************
-
- Islands in the Clickstream is a weekly column written by
- Richard Thieme exploring social and cultural dimensions
- of computer technology. Comments are welcome.
-
- Feel free to pass along columns for personal use, retaining this
- signature file. If interested in (1) publishing columns
- online or in print, (2) giving a free subscription as a gift, or
- (3) distributing Islands to employees or over a network,
- email for details.
-
- To subscribe to Islands in the Clickstream, send email to
- rthieme@thiemeworks.com with the words "subscribe islands" in the
- body of the message. To unsubscribe, email with "unsubscribe
- islands" in the body of the message.
-
- Richard Thieme is a professional speaker, consultant, and writer
- focused on the impact of computer technology on individuals and
- organizations.
-
- Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.
-
- ThiemeWorks on the Web: http://www.thiemeworks.com
-
- ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
-
- ------------------------------
-
- Date: Fri, 31 Oct 1997 10:40:31 -0800 (PST)
- From: Sharif Torpis <storpis@CRL.COM
- Subject: File 9--Kashpureff in custody. (fwd)
-
- Forwarded message:
- Date--Fri, 31 Oct 1997 10:40:20 -0500 (EST)
- From--Marc Hurst <mhurst@fastlane.ca
-
- Eugene Kashpureff, known for his redirect of the NSI web page,
- was apprehended this morning in Toronto by undercover RCMP
- detectives.
-
- Pending a deportation hearing, he will be returned to New York to
- face Felony Wire Fraud charges that were sworn out against him
- after he had settled out of court with NSI in regard to their
- civil suit.
-
- Early in the week Eugene relinquished control of the Alternic to
- an adhoc industry group and that group will be making an
- announcement in the next few days.
-
- A this time I have no further information to volunteer.
-
- Sincerely
- Marc Hurst
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.79
- ************************************
-
-
-