home *** CD-ROM | disk | FTP | other *** search
- Der Weltanschauung Magazine (The WorldView) Origination: HOUSTON, TEXAS USA
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- % %
- % Editor: The Desert Fox D E R %
- % Co-Editor: Rev. Scott Free %
- % %
- % W E L T A N S C H A U U N G %
- % %
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- November 9, 1991 Volume 1, Issue 9
- (*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)
-
- Material Written By Computer And Telecommunications Hobbyists World Wide
- Promoting the publication of Features, Editorials, and Anything Else....
- To submit material, or to subscribe to the magazine contact one of the
- following net addresses below...
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- % Der Weltanschauung Distribution Site: %
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ % %
- ~ Send $1.OO To: ~ %%%%%% The Dickinson Nightlight %
- ~ ~ % (713)337-1452 %
- ~ The SubGenius Foundation ~ % 3/12/2400 Bps *24 Hours/7Days %
- ~ P.O. Box 140306 ~ % Fido: The Desert Fox@1:106/995 %
- ~ Dallas, Texas 75214 ~ % InterNet fox@nuchat.sccsi.com %
- ~ ~ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- "WELCOME TO THE MACHINE" -Pink Floyd
-
-
- "Let us arise, let us arise against the oppressors of humanity; all kings,
- emperors, presidents of republics, priests of all religions are the true
- enemies of the people; let us destroy along with them all juridical, political,
- civil and religious institutions."
-
- -Manifesto of anarchists in the Romagna, 1878
-
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- The World View Staff: InterNet Address:
-
- The Desert Fox [Editor] / fox@nuchat.sccsi.com
- Rev. Scott Free [CoEditor] / revfree@nuchat.sccsi.com
- Bryan O' Blivion / blivion@nuchat.sccsi.com
- Modok Tarleton / rperkins@sugar.neosoft.com
- The Sorcerer (REV) / sorcerer@taronga.com
- Brain On A Stick / brain@taronga.com
- Cyndre The Grey / cyndre@taronga.com
-
- Houston, Texas...Honesty Is Our Only Excuse
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- PLEASE NOTE: IF YOU ARE GETTING THIS FOR THE FIRST TIME, PLEASE SEND MAIL
-
- TO dfox@taronga.com WITH FEEDBACK STATING WHETHER OR NOT YOU WISH TO
- CONTINUE TO RECEIVE THIS PUBLICATION... Thanks!
-
- FOR BACK ISSUES, CONTACT brain@taronga.com
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- TABLE OF CONTENTS
-
- 1) The Perils Of Liberty...................................Gipson Arnold
- 2) CPSR Conference Video Tapes.............................The Desert Fox
- 3) Castration Of The Innocent..............................The Adversary
- 4) On The Subject Of Computer Vandalism....................Cyndre The Grey
- 5) HO HO Con...............................................NIA/Phrack
- 6) Recent Updates (Important Information!).................Bryan O' Blivion
- 7) Computers & The Second Amendment: An Opening Volley.....Jacque Shellacque
- 8) Editor's Notes..........................................The Desert Fox
- 9) A Call To Arms..........................................Cyndre The Grey
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- THE PERILS OF LIBERTY
-
- By Gipson Arnold, Atheist Network Interim Director
-
- A Commentary Reprinted With Permission From The Atheist Network Journal
-
- (C)1991
-
- Socrates introduced humankind to a new era of human thought by daring to
- ask questions. If we try to engage in even the simplest mental activity
- without asking questions in a systematic way, we see why modern thought is
- so often said to have begun with Socrates. The materialist Greek and Roman
- philosophies that grew from Socratic thinking were snuffed out by
- Christianity when the Roman Empire became 'Holy', but the seeds of ideas sown
- by the Greek and Roman philosophers encouraged a growth away from religious
- control during the Renaissance. One of the most enduring trends of Western
- culture has been the mercurial movement away from religious authority.
-
- Philosophers and social observers often compare the development of a
- secular culture with the growth experiences of a human individual. Like the
- progression from birth to infancy through childhood into adolescence and on
- to adulthood, the transition from spiritually based authority to a more
- rational system can be long and difficult. Like a growing child, a culture
- 'coming of age' might doubt its ability to cope with responsibilities and
- problems that beset a free society. History provides countless examples of
- populace fearful of a lack of rigid control over the lives of individuals.
- If a large segment of society becomes concerned that things are 'getting out
- of hand,' the prospect of tyranny multiplies. In times of crisis (epidemic,
- famine, war, economic depression, or social unrest), a secular culture may
- lose its confidence in reason and seek refuge in the 'easy answers' and
- 'security' of religion. The staggering loss of life during the bubonic plague
- in the 14th century drove Europeans hysterically toward the Roman Catholic
- Church. In the early 1900's, scientific theories threatened many American
- Protestants, sparking the first mass fundamentalist movement. Runaway
- inflation, political agitation, labor activism, and hedonism rocked post-
- World War I Germany. Hitler's brownshirt troops answered the German public's
- clamor for order, the Nazis rose to power with the cooperation of business
- and the Christian churches. In Leni Riefensthal's chilling documentary film
- Triumph of the Will, hundreds of thousands of Germans cheered wildly as
- Herman Goering announced the suspension of civil liberties and the
- subjugation of the justice system to National Socialist ideology.
-
- Only a few days ago, a reactionary core of bureaucrats attempted a
- coup in the USSR to reinstate pre-glasnost totalitarian rule. Soviet
- citizens in every republic stood up to the eight-man jaunta in a triumph of
- human valor; in three short days, initiatives toward liberalization and
- independence were back on track. Though the Soviet Union is beleaguered by
- ethnic strife, food shortages, political uncertainty, and sweeping social
- change, her diverse peoples asserted their preference for a precarious
- democracy over the relative safety of dictatorship. Everyone within reach of
- a newspaper, radio, or television can look to the Soviet people's repudiation
- of the coup with justifiable pride and optimism.
-
- In the face of the stirring Soviet example, Americans seem to be
- taking their freedoms for granted. A handful of citizens have marshalled
- a campaign of pressure to restrict our hard-won liberties. Self-appointed
- arbiters of morality want to narrow the range of what Americans may watch on
- television, listen to on radio, and view at art museums. Christian
- fundamentalists groups work to impose prayer and other religious points of
- view on pluralistic, secular public schools. Right-wing evangelicals want to
- enforce laws limiting the rights and opportunities of gays, lesbians, and
- unmarried persons living together. Others respond to today's flurry of crime
- and drug abuse by suggesting martial law for the United States. While news
- commentators smugly refer to the shaky beginnings of self-determination in
- the Soviet Union, they ignore the menace to our Constitutional rights at
- home.
-
- Life is not easy under the best of circumstances. The maintenance of
- freedom is a delicate balancing act-keeping one person's rights from
- intruding on the rights of another. The temptation to impose one arbitrary
- standard of morality on every member of our pluralistic population will
- always be with us; it must be resisted. There are unsavory trends in the
- United States toward narrowing of artistic and political expression,
- intolerance of alternative lifestyles, and abandoning commitments to equal
- opportunity. These trends underscore an increasing desire for authoritarian
- control, and religious institutions are helping fuel this desire. Citizens
- need to encourage cultural maturity so we may deal with the difficulties of
- freedom effectively and fairly.
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- Public Service Announcement #1 (FYI)
-
-
- The videotapes from the CPSR Conference on Computers, Freedom, and Privacy
- (March, 1991, San Francisco) are now available for purchase. Pass the word to
- other interested people, libraries, etc.
-
- The full set of 15 videotapes provides gavel-to-gavel coverage of the
- conference:
-
- 1. The Constitution in the Information Age
- (Tribe, Warren)
- 2. Trends in computers and Networks
- (P.Denning, Quarterman, Neumann, Hellman, Chaum, Farber)
- 3. International Perspectives and Impacts
- (Veeder, Riley, Flaherty, Plesser)
- 4. Personal Information and Privacy - I
- (Goldman, Baker, Westin, Rotenberg)
- 5. Personal Information and Privacy - II
- (Davies, Hendricks, Mandel, Ware, L.Hoffman)
- 6. Network Environments of the Future
- (Noam, Rotenberg)
- 7. Law Enforcement Practices and Problems
- (Snyder, Delaney, Boll, Ingraham, Tenney)
- 8. Law
- Enforcement and Civil Liberties
- (Zenner, Rosenblatt, Kapor, Gibbons, Figallo, Beckman,
- Rasch, D.Denning)
- 9. Legislation and Regulation
- (Schiffries, Julian, Berman, Bernstein, Maxwell, McLellan,
- Jacobson)
- 10. Computer-Based Surveillance of Individuals
- (Krug, Nussbaum, Marx, Flaherty, Nycum)
- 11. Security Capabilities, Privacy and Integrity
- (Bayse, D.Denning)
- 12. Electronic Speech, Press and Assembly
- (Rose, Rickard, Perry, McMulle
- n, Lieberman, Hughes)
- 13. Access to Government Information
- (Hammitt, Mawdsley, Burnham, Veeder)
- 14. Ethics and Education
- (D.Denning, Parker, Hollinger, Gilmore, Budd, Bowman, Winograd)
- 15. Where Do We Go From Here?
- (Bernstein, Culnan, Hughes, Ingraham, Kapor, Lieberman,
- Parker, Schiffries, Veeder, Warren)
-
- For a brochure detailing the contents of all 15 videotapes, call, write, or
- e-mail:
-
- Computers, Freedom, and Privacy Video Library Project
- P.O. Bo
- x 912
- Topanga, CA 90290
- (800) 235-4922
- cfpvideo@well.sf.ca.us
-
- The individual session tapes are $55 each plus $4 shipping and handling. The
- full set of 15 tapes is $480 plus $15 shipping and handling. (Calif. residents
- add sales tax.)
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- Castration Of The Innocent In The Interest Of Public Welfare
- And Other Tales O' Wonderment
-
- By The Adversary
-
- The latest trend in the mo
- dem community today is in the efforts towards
- unity and legal security in the "Real" or outside world. Personally I'm
- not so sure I like the side effects its causing and how it will effect
- the shape of our "Silicon Society" to come. Even now with the low cost
- availability of PC's and peripherals the local boards have become
- overcrowded and the overall quality of modeming has decreased. Maybe
- I've become a little to burnt out, or been around to long to be objective.
- But the upward trend in ou
- r so called hobby, is in my opinion less than
- positive. A few years ago when boards and users were fewer, the modem held
- a certain dark romance as well as a oneness with the small circle of users
- that frequented the local scenes. The influx of younger Sysops and Users
- today, has given rise to discrimination and general disregard for modem
- ethics. There has always been a certain amount of prejudice against those
- with less than up to date equipment, but its gotten worse of late. Now
- with the c
- ries of "Public Acceptance" and "Computer Rights" I feel a sense
- of impending doom upon us. I don't like the Hardcore Police Actions that
- the Telecommunications Community has been subjected to, and there is a
- need for better legislation. But sometimes progress in one direction
- has dire results on the whole. The modem has been a Virtual Frontier of
- sorts, but much like the western frontier of America, with justice also
- comes complacency and order. As the legal system catches up with us,
- unfor
- tunately corporate America will as well, with its death grip of
- commercialization. I doubt that the Spirit and Arrogance that has brought
- the modem community this far, will still remain twenty years from now. And
- if I am correct the modem will become the tame docile pet of Mr and Mrs
- Joe Average of the Twenty First Century. So as we all band together to
- fight the good fight for our legal rights and public understanding,
- remember to be cautious and aware of every misstep. For all Frontiers must
-
- eventually end, let us not be to quick to end this one...
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- On the Subject of Computer Vandalism
-
- By Cyndre the Grey
-
- Looking around our modem community I hear talk about
- viruses and plans to implement them on computer systems run
- by "geeks" and other sysops who have angered them in one way
- or another. I understand that some people have a problem
- with power trips but this is a little out of
- hand. A BBS
- that I was very fond of went down the other day because of
- some munchkin on a power trip uploading a virus to the
- system. As you may have guessed, that is what prompted this
- article.
-
- The system that was taken down was The Dickinson Nightlight.
- This is a very popular BBS in the Houston area that supported over
- 700 users. Someone uploaded a virus to the BBS that completely
- destroyed the software and hardware. The computer was un-bootable.
- It proceeded to munch on several direc
- tories on the drive. It was
- even beyond the 'boot off of a floppy' stage. This BBS was operated
- by one of the greatest guys in the BBS community and was used by many
- great people. It was also the main distribution site for this very
- publication. I would like to congratulate the geek who successfully
- destroyed a terrific outlet for our freedom of speech, files, and some
- very interesting message areas where hundreds of people spoke their peace.
- It is now a federal offense to upload a virus. Luckily f
- or the schmuck who
- did it, the harddrives had to be formatted in order to recover them.
-
- It is people like this that give the cyberpunk community a bad name.
- Our community is advancing beyond everyone's wildest dreams. Yet, someone
- has to take matters into their own hands and do something of this magnitude.
- I would personally like to see this individual in prison for his immaturity.
- If the facts ever do surface, that is exactly where this person will be.
-
- People don't seem to real
- ize that when this happens, it not
- only effects the sysop, but also the users who frequent the
- BBS and download files. Today the FCC is trying to
- "regulate" the use of BBSs. If we lose that battle, there
- probably won't be very many left. In the mean time, we are
- battling each other and running around in circles. If
- we continue on this course, they will have no need for
- regulating us, we will have already killed ourselves off.
- Now is the worse time to be playing VIRUS GAMES! We are all
- fools no
- t to see that.
-
- If you are one of these power tripped users and are
- thinking about "downing" a system, just remember that there
- are also many users that are inconvenienced in the process,
- and with every infected upload, you just help the FCC and
- NOBODY else. In short, just who's side are YOU on??
-
- Cyndre The Grey
- (I know who's side I'm on.)
-
- - Please send any and all comments to: cyndre@taronga.com
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-
- ==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- NIA & Phrack Magazine, & dFx International Digest Are Proud To Present:
-
- The Second Annual
-
- X M A S C O N
-
- Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
- Authors and Other Interested Parties.
-
- Where: Houston Airport Hilton Inn
- 500 North Belt East
- Houston, Texas 77060
-
- U.S.A.
- Tel: (713) 931-0101
- Fax: (713) 931-3523
-
- When: Friday December 27 through Sunday December 29, 1991
-
- Yes, ladies and gentlemen, you read it right... Xmascon has returned! This
- will undoubtedly be the telecom event of the year. Unlike certain conferences
- in the past, Xmascon 91 has a devoted and dedicated staff who are putting in
- an unmentionable ammount of time to ensure a large, vast and organized
- collection of some of
- the most diversified people in the telecommunications
- world. The event will be open to the public so that anyone may attend and
- learn more about the different aspects of computer security.
-
- Hotel Information
- -----------------
-
- The Houston Airport Hilton Inn is located about 6 miles from Intercontinental
- Airport. The Xmascon group room rates are $49.00 plus tax (15%) per night,
- your choice of either single or double. There are also 7 suit
- es available, the
- prices of which vary from $140 to $250. You can call the hotel to find out
- the differences and availability of the suites, and you will also NEED to
- tell them you are with the Xmascon Conference to receive the reduced room
- rate, otherwise, you will be paying $69.00. There is no charge for children,
- regardless of age, when they occupy the same room as their parents. Specially
- designed rooms for the handicapped are available. The hotel provides free
- transportation to and from the ai
- rport, as well as neighboring Greenspoint Mall,
- every 30 minutes on the hour, and on call, if needed. There are 2 restaurants in
- the hotel. The Wicker Works is open until 11:00 pm, and The
- Forty Love is open 24 Hours. There will also be breakfast, lunch and dinner
- buffets each day. There is a piano bar, The Cycle Club, as well as a sports
- bar, Chaps, which features numerous table games, large screen tv, and a disco
- with a DJ. Within the hotel compound, there are 3 pools, 2 of which are
- indoors, a j
- acuzzi, a miniature golf course, and a fully equipped health club
- which features universal weights, a whirlpool and sauna. A car rental agency
- is located in the hotel lobby, and you can arrange to pick your car up at
- either the airport or the hotel. Xmascon attendees are entitled to a
- discounted rate. Contact the hotel for more information.
-
- Xmascon will last 3 days, with the main conference being held on Saturday,
- December 28, in the Osage meeting room, starting at 12:00 p.m. and continuing
- on th
- roughout the evening. This year, we have our own complete wing of the
- hotel, which is housed around a 3,000 square foot atrium ballroom. The wing
- is completely separated from the rest of the hotel, so we are strongly
- encouraging people to make their reservations as far in advance as possible
- to ensure themselves a room within our area.
-
- We are hoping to have a number of people speak on a varied assortment of
- topics. If you would like to speak, please contact us as soon as possible and
- let us know
- who you are, who you represent (if anyone), the topic you wish to
- speak on, a rough estimate of how long you will need, and whether or not you
- will be needing any audio-visual aids.
-
- There will be a display case inside the meeting room which will hold items of
- telecom interest. Specific items that will be available, or that we hope to
- have, include the first issues of 2600, Tap, Mondo 2000, and other magazines,
- non-computer related magazines that feature articles of interest, a wide
- array of boxes
- , the Quaker Oats 2600 mhz whistle, The Metal AE, etc. We will
- also have a VCR and monitor set up, so if you have any interesting videos
- (such as the Unsolved Mysteries show featuring Kevin Poulsen), or if you have
- anything you think people would enjoy having the chance to see, please let us
- know ahead of time, and tell us if you will need any help getting it to the
- conference. If all else fails, just bring it to the con and give it to us
- when you arrive.
-
- Media support has been very strong so far
- . Publications that have agreed to
- print pre-conference announcements and stories include Computer World, Info
- World, New York Times, San Francisco Chronicle, Austin Chronicle, Houston
- Chronicle, Independent Journal, Mondo 2000, CuD, Informatik, a leading
- Japanese computer magazine, NME, Regeneration (Germany), and a few other
- European based magazines. PBS stations WHNY, WNET, and KQED, as well as the
- stations that carry their syndicated shows, will be mentioning the conference
- also. If you are a j
- ournalist and would like to do a story on Xmascon 91, or
- know someone who would, contact us with any questions you may have, or feel
- free to use and reprint any information in this file.
-
- If anyone requires any additional information, needs to ask any questions,
- wants to RSVP, or would like to be added to the mailing list to receive the
- Xmascon updates, you may write to either myself (Drunkfux), Judge Dredd, or
- Lord Macduff via Internet at:
-
- nia@nuchat.sccsi.com
-
- Or
- via US Mail at:
-
- Hard Data Corporation
- ATTN: HoHo
- P.O. Box 60695
- Houston, Texas
- 77205-9998
- U.S.A.
-
-
- We will hopefully have an 800 mailbox before the next update is sent out. If
- someone cares to donate a decent one, that will stay up throughout the end of
- the year, please let us know. We should also b
- e listing a few systems as an
- alternative form of reaching us.
-
-
- Xmascon 91 will be a priceless learning experience for professionals, and
- gives journalists a chance to gather information and ideas direct from the
- source. It is also one of the very few times when all the members of the
- computer underground can come together for a realistic purpose. We urge
- people not to miss out on an event of this caliber, which doesn't happen very
- often. If you've ever wanted to meet some of the most famous peo
- ple from the
- hacking community, this may be your one and only chance. Don't wait to read
- about it in all the magazines, and then wish you had attended, make your
- plans to be there now! Be a part of our largest and greatest conference ever.
-
-
- Remember, to make your reservations, call (713) 931-0101 and tell them you're
- with Xmascon.
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- RECENT HAPPENINGS
- By Bryan O'Blivion
-
- The pace o
- f events in our cyberuniverse is picking up, dear readers,
- and it should come as no surprise to learn that the Lone Star State is getting
- quite well known as a place where cyberevents and orgs happen instead of just
- being talked about.
-
- The World View's own CYBERLUNCH held Oct. 12 in Houston, was a
- success, with representatives from the nationally famous ComSec Data Security
- attending as well as NIA magazine. Numerous local sysops and enthusiasts
- appeared, and the whole meeting turned into
- a general party afterwards.
-
- There is apparently a great amount of interest from local cyberfolk in
- moving up from Houston's vigorous local board scene to the wide horizons of
- the Usenet news feeds and the InterNet's uucp email services. Currently, local
- access to these feeds is handled by three brave and groundbreaking local
- NixPub (public access UNIX) systems: NuChat, Taronga Park, and Sugarland Unix.
- These good people allow their users to send email worldwide and to access the
- usenet news
- feeds in a manner which will later be recognized as truly
- pioneering.
-
- For now, however, these systems are fragile and are easily overtaxed by
- the requirements of new and would-be users. PLEASE, if you want an account on
- these systems, do your unix homework to the point where you can use the shell,
- the tass and vnews newsreaders, and the elm mailer by yourself --- the sysops
- just do not have time or inclination to give each new user a custom tutorial -
- - nor should they. Remember also, that
- any abuse of access privileges or of
- the sysops' time and patience is a great disservice to the cybercommunity as a
- whole. These good people have devoted years of their time and thousands worth
- of hardware to make InterNet access a reality for ordinary users like us, and
- they need our support rather than a lot of hassle.
-
- There is a plan to make the Korova MilkBar [(713) 492-2783] a training
- ground where docs and unix user's classes can be had for those who are willing
- to put in the time and
- study necessary to use Nixpub capabilities properly.
- Logon the Korova and leave email to sysop Squid if you're interested. Tomorrow
- belongs to --- US!
-
- Synchronistic with the Cyberlunch on Oct. 12, Austin EFF chapter, the
- FIRST local chapter of the Electronic Frontier Foundation anywhere, had a
- strong presence at the ArmadilloCon SF convention in Austin. Steve Jackson and
- Bruce Sterling and other volunteers spread the good word that the Bill of
- Rights also applies to folks like us, who th
- ink, speak, publish, and associate
- cybernetically. Response was very encouraging, but we have a long way to go
- toward educating the public about what we are all about, and what governmental
- abuses have occurred.
-
- One IBM employee approached the EFF booth, and was sympathetic to the
- cause, but was actually afraid to put her name down on the mailing list. Looks
- like Russia is now a real intellectually liberal place compared to the good
- ol' USA, dominated as we are by Republicans, Rehnquist, and
- SS raiders
- stealing books and mail.... One good point: looks like the Immense Blue
- Mountain may not be in much of a position to intimidate anybody in the 'puter
- field anymore, due to the condition of its $$$ balance sheets. Tough luck
- guys, but your era is OVER! Their I Build Monstrosity megamillionmainframes
- just aren't very attractive these days to 90's people with some serious data
- to crunch. And we can throw Compaq and their artificially inflated
- compuprices in the same trash barrel... just
- ask Rod Canion. Popular computing
- is here at last.
-
- Speaking of repression, the Government has filed a Motion to Dismiss
- the legal case Steve Jackson filed against the SS criminals, rogue government
- attorney, and lying telco informant who seized his unpublished work, BBS, and
- users' email. Seems they are claiming now, in sworn affidavits, that: 1. They
- didn't know Steve's company was a publisher of books (great investigative
- work, fellows) and 2. Honest, really, please believe us, they did
- n't read
- anybody's email on the BBS even though they combed Steve's hard disk byte by
- byte with Norton Editor looking for whatever they might be able to use against
- him, his employees, or his users.
-
- The government is still claiming that they had the right to steal
- Steve's property and seize private email as part of the "ongoing"
- investigation into the allegedly stolen 911 document published in Phrack. Too
- bad the whole world (except, apparently, for them) knows by now that the 911
- docume
- nt was freely and publicly available from telco for just a couple of
- dollars. Craig Neidorf blew their whole case away on this exact point during
- his prosecution (at a personal cost of $100,000.00), but apparently the Gov't
- hopes that we rubes here in Texas will buy this bullshit theory and overlook
- the fact that their theory has been definitively defeated in court already.
- See you in court, tough guys.
-
- NEXT ISSUE: Grease up your keyboards, friends, the XmasCon will be held here
- in Houston Dec. 2
- 7-29. Sponsored by Phrack, LOD, and NIA! A reunion of old
- friends not to be missed....
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- Computers and the Second Amendment: An Opening Volley
-
- By Blacque Jacques Shellacque
-
-
- A friend and I were talking the other night about needing to defend
- oneself against one's own government. He was talking about guns; I was
- talking about encryption. We were talking about the same thing. I read a lot
- of debates
- in which the argument s for restricting computing are strikingly
- similar to those for gun control. Am I the only one who sees the parallels?
- It's certainly forced me to take another look at the gun issue.
-
- The last few years have given us all an appreciation for the
- Constitution, or what's left of it. Most of the action in the personal
- computer user community is centered around the First Amendment, particularly
- the rights to free expression and peaceable assembly. We've also had our
- noses ru
- bbed in official disregard for the Fourth, Fifth, and Sixth
- Amendments. All of this has been (and is still being) discussed elsewhere.
- Tonight's topic is the Second Amendment, the people's right to keep and bear
- arms (a well regulated militia being essential to the security of a free
- state), in relation to personal computers and private networks.
-
- Until recently, I didn't give much thought to the gun issue, since I
- don't own a gun and probably won't be getting one anytime soon. Unless I
- mo
- ve to Arizona, I can't pack heat everywhere I go, so I probably won't
- have a shooting iron handy when I really need it to shoo away a mugger if I
- run into one. The best way for me to win such an encounter is to prevent it
- from ever taking place. According to Sun Tzu, a battle is won or lost
- before it is ever fought. I don't hide out in the suburbs, but I don't
- stroll down Main at midnight with my wallet hanging around my neck, either.
- Weapons are better than nakedness, but wits are better than
- both. The
- existence of priests and businessmen proves it. So much for that.
-
- Freedom of computing, it now turns out, has a lot in common with the
- citizen's right to own a gun. Both rights are being attacked in a similar
- manner.
-
- Proponents of restrictions love to wave a bogeyman in our faces to get
- us to blindly go along with their hastily cooked-up bills. George Hennard
- helped a bill restricting "assault" weapons get more attention than it
- deserved. Likewise, Sen. Joe Biden touts S
- enate Bill 266 as protection from
- crazed hackers who might trigger World War III or, worse, steal corporate
- secrets and sell them to the Japanese. And let's not forget the drug
- kingpins who might keep their communications secret from the Law. As a law-
- abiding citizen, you've got nothing to hide so this doesn't affect you
- <grin>.
-
- S.B. 266 essentially mandates a government backdoor into any encryption
- scheme marketed for public use. Secrecy becomes the exclusive domain of the
- government and
- its partners, such as corporations doing work of vital
- military or economic importance. The rest of us have to endure possible
- casual surveillance or be proscribed for daring to keep secrets from Uncle
- Sam.
-
- Not just no, but No, Goddammit! Privacy is scarce enough as it is.
- Every day my file gets passed around the federal and corporate nets like a
- cheerleader at a frat party. Cheap, widespread encryption is one of the few
- physical methods available for enforcing privacy, just as in the privat
- e
- ownership of guns kept the government honest in the past. Encryption is a
- window blind pulled down in the face of the hotel dick.
-
- "A well-regulated militia necessary to the security of a free State,
- the right of the people to keep and bear arms, shall not be infringed."
-
- Historically, citizen ownership of guns has been useful for repelling
- invaders, enforcing Manifest Destiny, and keeping central government from
- getting too many ideas about control. There have been some problems in t
- he
- pastDThe Whiskey Rebellion, Shays' Rebellion, and Quantrill's Raiders spring
- to mindDbut no one has seriously considered disposing of the Second
- Amendment. The last real invasion was in 1815 and we've killed off most of
- the Indians, so what does that leave?
-
- Guns in the house are no match for a government determined to do you
- ill (though they may slow down a death squad). That's probably why
- Republicans can lust for control over everyone else yet fight gun control.
- Even the Tuff-On-Crime
- bill making it's way through the pipeline has no real
- provision for gun control (it may, however, okay warrantless searches made
- in "good faith" and further weaken habeas corpus). Republicans know as well
- as anyone else that guns are small potatoes when someone else has all the
- money and information.
-
- Rights, even those guaranteed by the Constitution, are really
- guaranteed only to the extent that they are hard for a government to
- violate. Early Americans were either well-armed or westward bo
- und, qualities
- needed in citizens opening a new frontier. However, the 1900 census found
- America with no more frontiers; there was no more West to go to. The
- previous census, in 1890, was the first automated census, using punched
- Hollerith cards to perform a ten-year job in six weeks. For the first time ,
- the government could use machines to track its citizens' movements. Control
- began where the frontier ended. Modern American history has been a running
- battle between individual rights and governme
- nt control.
-
- Cheap, widely available data encryption is one of two new developments
- that are tipping the scales in the citizen's favor. Explosive growth of
- computer network use (the number of Internet users grew by 90% last year) is
- the other, enabling small groups to get the political jump on big ones by
- getting vital information over the wire quickly to just about anyone who
- needs it. Data encryption enforces privacy by keeping your e-mail from
- prying eyes. It represents the first physical
- means of keeping the Fed's
- nose out of your private business.
-
- It's too bad encryption is not widely used outside of businesses.
- Because so few people use encryption, agencies such as the NSA have an easy
- job of spying on American citizens. I'm not giving away any secrets, but
- here is how I would do it. Though it's theoretically possible to parse
- every phone conversation and data transmission, doing so is a waste of
- resources. Profiling and other tools tell an agency which 10% of the
-
- population is the real threat (90% of the threat comes from 10% of the
- population). Encryption used by other than corporations and government
- agencies is considered suspect and bears cracking by agency supercomputers.
- Fortunately for the NSA, unofficial secure traffic is not very large.
- However, this could change if, say , companies marketed secure
- communications as an alternative to the postal system (Feds can't open your
- e-mail, but you can't fax drugs eitherDlife is full of tradeoffs), or
-
- Americans started using encryption as a matter of course just because it's
- s imply none of the government's damned business what a private citizen
- does if he or she is not the subject of an actual criminal investigation
- (instead of a fishing expedition). Either or both of these developments
- would severely tax the government's ability to casually spy on its own
- people. It might even force the Feds to wonder if it's really worth it.
- Maybe.
-
- A problem with encryption is that there are v
- ery few good schemes out
- there. The DES algorithm is best known, but it was created by the NSA. No
- comment. The RSA (Rivest-Shamir-Adelman) algorithm is superior to DES, but
- MIT owns it and licenses cost money (DES is free). There is supposed to be a
- freeware package based on or comparable to RSA, but it could also be NSA
- suckerware. It's easy to get paranoid about this. A bigger problem with
- encryption is that most Americans don't value privacy enough to make the
- extra effort to secure their co
- mmunications.
-
- The government may or may not be systematically running small networks
- and bbs's out of business by busting them right and left. That's open to
- debate. The No Such Agency is almost certainly tapping their lines,
- though. In the short term, it would be stupid not to. That is its job. In
- the long run, though, this speeds the collapse of the Republic by
- dangerously concentrating power.
-
- Power tends to accumulate. The more power one group has, the more it
- can get. Even
- tually, one group gets too much of it and spends most of its
- time securing it at the expense of others, whether it needs to or not
- (eventually it needs to). The firs t impulse of one of the other groups is
- to usurp the power from the first group, all with the highest of motives, of
- course. This leads to exactly the same problems. The only way to prevent an
- endless succession of power grabs is to disperse power as widely as
- possible, among people interested in limiting it for everyone. This is where
-
- checks and balances come in. "All power to the people (soviets)" is a
- disastrous substitute, as (thankfully) other people learned in 1798 and
- 1917. All of this is explained at length and more clearly in On Power: Its
- Nature and the History of its Growth, by Bertrand de Jouvenel (Viking Press,
- New York, 1949). The book is long out of print, but it's well worth your
- while to check it out and photocopy it somewhere. Other good references
- include Democracy in America (1835) and The Old Regime and the
- French
- Revolution (1856), both written by Alexis de Tocqueville. You can find those
- at a used bookstore.
-
- Theory aside, it can be shown that a people completely dependent on
- their government for security lose their ability to come to that
- government's aid in times of external danger. At that time, the people
- further drain those resources by requiring protection from themselves. The
- less capable a people become, the more fearful they get, eventually voting
- in a police state. Hitler was elect
- ed.
-
- Computer users face similar dangers. Additionally, economics play a
- large role. A person with a computer is a nearly self-sufficient engine of
- wealth. Economic competition is constant. Denial of personal rights to
- privacy of information removes the individual's ability to protect an idea
- before bringing it to the market. Computer users are thus unable to create.
- All they can do is consume or, at best, labor for someone else.
- Entrepreneurs and small business owners, both key agents of pr
- ogress , are
- effectively locked out. A nation of employees economically dependent on
- bosses is an economic nonstarter. Freedom of computer use and the right to
- privacy are thus essential to the economic security of a free state.
-
- The kind of power bestowed by guns, personal computers and absolute
- data privacy implies a need for a personal sense of responsibility. Both
- viruses and encryption programs are far easier to make and distribute than
- plastic Glock-11 automatic pistols. Some sort of r
- egulation is required.
- This is where the "well-regulated militia" part of the Second Amendment
- comes in and this is the most difficult part of the issue.
-
- My definition of a "well-regulated militia" falls somewhere between
- the NRA and the National Guard. If there were an NRA for computer network
- users I'd probably be in it. I think the stakes are higher with computers
- than they are with guns. I want to see more people with computers and
- modems, to ensure the widest possible dispersal of
- computing power. For
- this to work, all users should be made aware of the power and
- responsibility of owning a computer ("Only a madman would give a loaded
- revolver to an idiot"DFredric Brown). If there are kids in the house, they
- must be taught to respect guns and computers as early as possible. In a
- well-defended, well-connected house, one can live without fear. Only then
- can a citizen look past the distracting horrorshows put on by the
- politicians and pundits to hide the real issues. Who
- will see to it that
- responsibilities accompany rights? Part of the answer, believe it or not
- comes from the government. Laws already exist to cover most serious crimes
- committed with a computer.
-
- Where the law is insufficient, professional/lobbying groups such as the
- Electronic Frontier Foundation, the Computer Professionals for Social
- Responsibility, and the Association for Computing Machinery are helping to
- draw up new laws to deal with new kinds of crimes. It's early in the game,
- but
- the above organizations seem to be working for fairness.
-
- For the control addicts in government, this may not be enough. Tough.
- Computer user organizations are working hard to approach government the way
- we all were taught to do it in high school civics, and they seem to be
- making it work. Can the EFF, CPSR, or the ACM control hackers? Of course
- not. That's what the law is for (demographics suggest that the rapid growth
- of network use will not be accompanied by an equally rapid rise in hackin
- g
- incidents. The hacking scene is maturing with the rest of the population.
- Most hacker heroes are born-again capitalists who might make even better
- role models as long as they don't forget where they came from).
-
- Computer user groups educate while seeking to disperse power, which the
- NRA also does to some extent. The EFF especially tries to reach out to
- potential allies by demystifying computer technology for nonusers and even
- the cops. Let's face itDthe nervous man with the gun is not goin
- g to go
- away, so we might as well try to calm him down a little.
-
- Finally, computer network users have their talents to use as
- negotiating chips. A government that refuses to respect their rights will
- lose their economic cooperation. The network-based economy makes an Atlas
- Shrugged-style withdrawal very feasible. The government will have its
- illusion of control while computer users work ordinary jobs while
- moonlighting in the Netherlands and piling up ones and zeroes (Swiss francs)
- in Brune
- i, all in the comfort of one's suburban home. The result will be an
- Italian-style economyDlackluster on the surface and lively underground.
- Germany lost the A-bomb by chasing out a half-dozen geniuses in the
- Thirties. If America wants to be a player in the global economic contest, it
- needs to treat its citizens with respect.
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- EDITOR'S NOTES
-
- Greetings! First of all, I would like to tha
- nk all the people who have
- responded via Internet to request a subscription. Please keep us updated
- as to the status of your net-address so that we may keep our records
- current. If you know of anyone that would like a subscription, send their
- address to fox@nuchat.sccsi.com
-
- We are looking for contributors to write some material to be published in
- The World View. If you are so inclined, please draft something up and send
- it to fox@nuchat.sccsi.com It will be printed in the next issue. We accept
-
- features, editorials, insights, rebuttals, or whatever makes you happy!
- Send those in ASAP.
-
- Gene Roddenberry, the creator of Star Trek, passed away last month. He was
- a true pioneer. He passed away in California after a short illness. He will
- be missed.
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-
- A Call To Arms
-
- By Cynder The Grey
-
- As I sit here in my "Chair of Power" and view the
- changes of the world and the dawning of th
- e new cyber-world,
- an interesting thought runs through my mind. We are more
- significant than we believe. We are not a bunch of people on
- computers talking to one another. It is much more than that.
-
- We are the beginning of a new world, a new universe.
- The universe is not a physical one like the one we are used
- to. No, it is a VIRTUAL universe. That's what makes it so
- interesting. It can change in a moments notice with a couple
- buttons being pressed.
-
- I don't believe that I am th
- e first to bring this up and
- recognize the significance of this era. I have seen many
- books illustrating this idea but I think it goes beyond
- fiction. The government obviously realizes this fact because
- they are already trying to regulate us.
-
- I have no doubt that we will be the ones remembered
- throughout history - the CyberSpace Explorers. They will
- probably teach this era of history in the schools that our
- children will attend. What they will say about us is
- entirely up to us. Will w
- e make a stand on government
- regulating of OUR frontier or will we let this revolution be
- suppressed. I believe that we really have something worth
- keeping.
-
- In order to have an ongoing revolution, people must
- be kept up to date on the events happening around the world.
- This is a call to everyone reading this.
-
- The World View Magazine is in need of more writers
- around the world. We know that everyone is a "closet"
- journalist and we need to call on those abilities to expand
- our hori
- zons and continue our growth.
-
- Help keep the revolution going by writing your articles,
- reports, and commentaries and sending them to the Editor.
-
- Your help will be greatly appreciated and help aid many
- people around the world.
-
- Thank you,
- Cyndre the Grey
- [InterNet: cyndre@taronga.com]
-
- @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
-