822 lines
40 KiB
Plaintext
822 lines
40 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Wed Nov 18, 1992 Volume 4 : Issue 59
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Copy Eater: Etaion Shrdlu, Junior
|
|||
|
|
|||
|
CONTENTS, #4.59 (Nov 18, 1992)
|
|||
|
File 1--FTP Sites / COMP Hierarchy
|
|||
|
File 2--Another First-hand account of 2600 Disturbance
|
|||
|
File 3--Re: viruses and "finding your calling"
|
|||
|
File 4--Re: Viruses--Facts and Myths
|
|||
|
File 5--NYT article on technology policy
|
|||
|
File 6--Va. Hearing on SSNs
|
|||
|
File 7--Am I a Techno-Junkie?
|
|||
|
File 8--Any Technophiliacs Here Besides Me?
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
|
|||
|
Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
|
|||
|
anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
|
|||
|
/pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
|
|||
|
(192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
|
|||
|
in /pub/text/CuD.
|
|||
|
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
|||
|
Back issues also may be obtained from the mail
|
|||
|
server at mailserv@batpad.lgb.ca.us.
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Wed, 17 Nov 92 18:11:52 CST
|
|||
|
From: moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--FTP Sites / COMP Hierarchy
|
|||
|
|
|||
|
Brendan Kehoe has added several shadow ftp sites where back-issues of
|
|||
|
CuD and other documents are available. Thanks and kudos to Dan
|
|||
|
Carosone, Paul Southworth, Ralph Sims, and Jyrki Kuoppala for their
|
|||
|
efforts in maintaining them.
|
|||
|
|
|||
|
READERS ARE **URGED** TO USE THE SHADOW SITES RATHER THAN the
|
|||
|
ftp.eff.org site, and to use them during off-hours. This reduces the
|
|||
|
strain on a single site and makes us all good net citizens.
|
|||
|
|
|||
|
We also receive periodic complaints that, since the switch from
|
|||
|
alt.society.cu-digest *TO* comp.society.cu-digest, some readers can no
|
|||
|
longer obtain CuD. If this is a problem on your system, check with
|
|||
|
your local sysad rather than us--we obviously have no control over
|
|||
|
individual systems.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 17 Nov 92 17:40:39 -0500
|
|||
|
From: guru<forward.from@mindvox.phantom.com>
|
|||
|
Subject: File 2--Another First-hand account of 2600 Disturbance
|
|||
|
|
|||
|
There has been much conjecture over what actually during the 2600
|
|||
|
meeting in November. Ten days later, I have not yet seen a good
|
|||
|
account of what actually happened. I've seen many opinions and
|
|||
|
contradictory statements, however. I was there, and I'd like to clear
|
|||
|
up a lot of misconceptions and give a more authoritative statement on
|
|||
|
what actually happened. It is accurate to say that none of the
|
|||
|
statements I've read from the participants are inaccurate, they are
|
|||
|
merely incomplete.
|
|||
|
|
|||
|
Al Johnson's statements on the other hand are contradictory lies.
|
|||
|
Besides his obvious contradictions such as whether or not the Secret
|
|||
|
Service was involved (see the Brock Meek's transcript). Al Johnson
|
|||
|
also stated that they merely confiscated a few things left on the
|
|||
|
table which no one claimed. This is far from true, they confiscated
|
|||
|
considerably more than just what was left on the table (including the
|
|||
|
confiscation of Milk Dud boxes left on the table). The stuff that was
|
|||
|
left on the table was left there because they intimidated us into
|
|||
|
denying that they belonged to us.
|
|||
|
|
|||
|
I wish to rectify this situation by giving a thorough accurate
|
|||
|
account of what actually happened. I will not give any names not
|
|||
|
previously mentioned in other articles, it has done nothing but get
|
|||
|
people in trouble. Two people have lost their jobs (and I don't mean
|
|||
|
the security guards), and one will likely lose their job (despite an
|
|||
|
excellent performance record).
|
|||
|
|
|||
|
I arrived at about 5:05 pm with another person (who has not yet
|
|||
|
been named, and shall remain so). When we got there, we introduced
|
|||
|
ourselves and began having small private conversations. On the table
|
|||
|
there were some Xeroxed AT&T schematics and a bag of Milk Duds (they
|
|||
|
sure went fast), a Mondo 2000, and a nice laser printed copy of the
|
|||
|
PumpCon raid. No one was discussing anything illegal, at least that I
|
|||
|
heard. During the time before the incident occurred many of us went
|
|||
|
and got fast food from the local grease joints.
|
|||
|
|
|||
|
We took turns pointing out guys in suits who were staring at us.
|
|||
|
One guy, who had a camera, would then proceed to photograph him, and
|
|||
|
he'd turn nervously away. We even once joked about it once to KL, who
|
|||
|
nervously turned and covered his head with his trenchcoat.
|
|||
|
|
|||
|
Around 5:30 "Knight Lightning" (KL) addressed the entire meeting.
|
|||
|
By this time, there were probably about 15, or 20 of us there. He
|
|||
|
passed out Computer Professionals for Social Responsibility membership
|
|||
|
pamphlets, a 8 page newsletter called "Privacy Journal," and of course
|
|||
|
the infamous ("ISPNews --Security Violators will get their access
|
|||
|
kicked") buttons he had just received from ISPNews. KL began
|
|||
|
lecturing us on how CPSR were just as nice people as the guys from
|
|||
|
EFF.
|
|||
|
|
|||
|
At around 6:00pm I began to notice some rent-a-cops congregating
|
|||
|
on the balconies. Naively, I ignored them, figuring we weren't doing
|
|||
|
anything illegal why should they bother us, and I gave it no second
|
|||
|
though until they surrounded us. KL said "I think we may have some
|
|||
|
trouble here," and proceeded to vanish only to be seen again after the
|
|||
|
whole incident.
|
|||
|
|
|||
|
This is when the incident began. Someone (I never found out his
|
|||
|
alias) came down the elevator, and whipped out his Whisper 2000 and
|
|||
|
started passing it around. The guards then quickly ran down the
|
|||
|
elevator and surrounded us, demanding to know who owned the "stungun."
|
|||
|
(which is not illegal in VA) Apparently they believed this small
|
|||
|
pocket amplifier was a stungun. The back of the amplifier was
|
|||
|
removed, possibly making it look more like a weapon. After several
|
|||
|
people commented, "What stungun? Oh, you mean the Whisper 2000. It's
|
|||
|
a pocket amplifier, you know its the thing you see on TV. It's
|
|||
|
nothing more than an amplifier." The person who had it at the time
|
|||
|
gave it to the guard ("C. Thomas"). Thomas examined the device
|
|||
|
carefully, and eventually convinced it wasn't a stungun, he returned
|
|||
|
it.
|
|||
|
|
|||
|
After Thomas was done with the Whisper 2000, he started asking
|
|||
|
about "The Mad Hatter"'s handcuffs. After teasing "The Mad Hatter"
|
|||
|
about the inferior quality of his handcuffs, he demanded to know how
|
|||
|
he got them, and why he had them. Thomas refused to accept the answer
|
|||
|
that was most logical. "The Mad Hatter" responded that they are easy
|
|||
|
to get at stores, and he had them because he felt like it. Thomas
|
|||
|
grabbed the handcuffs and kept them.
|
|||
|
|
|||
|
At this point a new guard (presumably Johnson) entered the scene.
|
|||
|
The man looked a little stocky probably of middle age and Western
|
|||
|
Asian descent, with slightly graying hair. He was wearing merely a
|
|||
|
suit, and looked like he was in charge of everything. Many of the
|
|||
|
guards were not wearing name tags, one was obviously undercover
|
|||
|
complete with an ear piece. Johnson then clearly stated we were
|
|||
|
computer hackers, and that he understood that we met here each month.
|
|||
|
|
|||
|
Johnson, saw the box owned by "MetalHead" sitting next to me. He
|
|||
|
told "MetalHead" to open it. Having nothing to hide, he did. It
|
|||
|
contained a fairly new looking keyboard. The immediate response by
|
|||
|
Johnson was that he was obviously a juvenile delinquent and had
|
|||
|
shoplifted it from Radio Shack. He explained that he had made prior
|
|||
|
arrangements with someone else to sell it at the meet. Johnson,
|
|||
|
calmly asked if he had a vendor's permit. When, he responded, he was
|
|||
|
unaware that he needed one, Johnson went on a tirade about how "Don't
|
|||
|
even think of selling that in MY mall without a vendor's permit!" The
|
|||
|
guards grabbed it.
|
|||
|
|
|||
|
The tension was beginning to run high. Someone asked a guard
|
|||
|
what his name was, and he responded that "[he] didn't have a name!
|
|||
|
[his] name is unimportant..." We began demanding ID, and they refused
|
|||
|
to show it to us. Instead, they turned around and demanded ID from
|
|||
|
us. Some people refused. Those who did, were brought to the
|
|||
|
Arlington police officers (who had come sometime during the incident)
|
|||
|
and were informed that they could be held for up to ten hours for
|
|||
|
failing to produce ID. In fact some of the guards threatened that "we
|
|||
|
would be very sorry when the police got here, if we didn't give ID."
|
|||
|
This convinced people to change their minds. I offered a library card
|
|||
|
(my only form of ID), they were uninterested, as they apparently
|
|||
|
wanted photographic ID and/or SS#.
|
|||
|
|
|||
|
"Loki" produced four forms of ID. Johnson couldn't stand this,
|
|||
|
he kept demanding ID from him, and "Loki" kept asking him which he
|
|||
|
wanted. Finally, Johnson just looked over all of them. Johnson
|
|||
|
announced that our parents would be called. The legal adults
|
|||
|
protested bitterly, and their parents were not called. They contacted
|
|||
|
other guards over the radio discussing the contents of the IDs (if in
|
|||
|
fact these were Secret Service agents, as suspected, this would be a
|
|||
|
violation of the Privacy Acts).
|
|||
|
|
|||
|
"Hackrat" began writing down the few names he could get off their
|
|||
|
uniforms (and not to many at that). When the guards became aware of
|
|||
|
this, they grabbed the pencil and paper, and tore it up. Our
|
|||
|
camera man decided to photograph the guards. The guards responded by
|
|||
|
grabbing the camera, and forcibly removing the film (and probably
|
|||
|
ruining it). The guards claimed they had every right to be doing what
|
|||
|
they were doing, and the cops supported them. The cops said they
|
|||
|
"were working for an outside party" (presumably the Secret Service,
|
|||
|
which is illegal because of the Privacy Acts).
|
|||
|
|
|||
|
"Loki" was asked what was in his back pack, as was every one
|
|||
|
else. "Loki" showed Johnson some of what was in it, and then put it
|
|||
|
down. Johnson decided this was insufficient and he started going
|
|||
|
through the pack grabbing whatever he felt like. "Loki" nor anyone
|
|||
|
else granted permission for them to go through their equipment. The
|
|||
|
guards decided to eject us from the mall at this point (despite
|
|||
|
requests to use the bathroom).
|
|||
|
|
|||
|
The guards had taken the keyboard, a wiretap, a reel to reel
|
|||
|
tape, a full set of VMS manuals, "Loki"'s backpack (including his
|
|||
|
homework), a lineman's phone, and all the paperwork. They said we
|
|||
|
could get our stuff back, yet they refused to write receipts (which
|
|||
|
meant we couldn't).
|
|||
|
|
|||
|
We spent a long time down in the metro deciding what to do.
|
|||
|
After we rejoined a number of people who were coming in during the
|
|||
|
"raid," we decided to go upstairs and use the phone. We went up the
|
|||
|
elevator, and we called the Washington Post. They responded that they
|
|||
|
were uninterested and refused to produce any reporters on the scene.
|
|||
|
|
|||
|
The guards at this point came out to the area, at which point one
|
|||
|
of us photographed them. This seemed to agitate them further. At no
|
|||
|
time were the guards actually calm, at least one was upset at all
|
|||
|
times. An incident with "Gentry" ensued when "Gentry" accidentally
|
|||
|
touched him, and the guard ("C. Thomas") got terribly agitated. They
|
|||
|
then threatened to ticket all of our cars. The cars were legally
|
|||
|
parked, on the street, they therefore had no right to ticket them.
|
|||
|
Right before I left the area, I noticed on last incident. A guard
|
|||
|
came out of the mall in a car (which looked like a Jeep Cherokee), and
|
|||
|
then quickly accelerated to 60mph (the street is like a 30 mph street)
|
|||
|
without using sirens or headlights. At this point the group split up,
|
|||
|
and the meeting (at least for me) was over.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 9 Nov 92 08:39:58 EST
|
|||
|
From: morgan@ENGR.UKY.EDU(Wes Morgan)
|
|||
|
Subject: File 3--Re: viruses and "finding your calling"
|
|||
|
|
|||
|
>From: Guido Sanchez<guido@nunbeaters.anon.com>
|
|||
|
>Subject--File 1--Response to the Virus Discussion
|
|||
|
>
|
|||
|
>Yes, virus authors are in it now more
|
|||
|
>for making fun and avenging themselves of the anti-viral authors, who
|
|||
|
>in turn do the same in their programs. Etc, Etc, Etc.
|
|||
|
|
|||
|
Apparently, neither side cares about 'collateral damage'; i.e. the
|
|||
|
hundreds/thousands of third parties who are 'bitten' by virus attacks.
|
|||
|
|
|||
|
>So here's what I do. On my 'underground e-leet Vx' BBS, I make all
|
|||
|
>viruses and other files free on the first call.
|
|||
|
|
|||
|
>Hopefully, besides using viruses as a commodity, the
|
|||
|
>fledgling sysop will look at a few of the pro-viral utilities and some
|
|||
|
>of the source code.
|
|||
|
|
|||
|
"pro-viral"? Gee, I was just thinking that Political Correctness had
|
|||
|
not yet reached the digital world. I guess I'm mistaken, eh? Can't
|
|||
|
you just say "yes, I write programs that destroy/impede the work of other
|
|||
|
users?"
|
|||
|
|
|||
|
>We force nothing into the minds and computers of others,
|
|||
|
>it's all part of curiosity and voluntary.
|
|||
|
|
|||
|
Hahahahahahahahahahahahahahahahahahahaha! Let me get this straight:
|
|||
|
- You (and others) write viruses
|
|||
|
- You release those viruses into the digital environment
|
|||
|
- You then claim "we force nothing".
|
|||
|
|
|||
|
The notion that you "force nothing" is akin to saying "we distribute
|
|||
|
weapons, but we aren't *forcing* you to install metal detectors in your
|
|||
|
schools." As an argument, it holds no water.
|
|||
|
|
|||
|
I can tell you one thing which you force upon others. Those of us who
|
|||
|
manage computer systems and networks for a living are *forced* to
|
|||
|
spend extensive man-hours disinfecting our systems/networks and
|
|||
|
attempting to devise means by which we can prevent reinfection. Of
|
|||
|
course, we can't find/patch every loophole (that's the definition of
|
|||
|
security; you can never catch everything), so the work becomes a
|
|||
|
constant; periodic scans of ALL susceptible hardware/software,
|
|||
|
constant efforts to improve security, and a constant stream of
|
|||
|
angry/disgusted users. <Thankfully, our network setup now allows us
|
|||
|
to protect our DOS servers from infection.......for now, we only have
|
|||
|
to worry about individual machines>
|
|||
|
|
|||
|
>We help people to find their
|
|||
|
>calling <forgive me for sounding like a religious fanatic or cult
|
|||
|
>leader here..> in whatever field of modem-dom they like.
|
|||
|
|
|||
|
What about those people who want to be mere users? What about those
|
|||
|
folks who don't really care about either your 'having fun....and avenging.."
|
|||
|
OR the folks who write disinfectors/cleaners?
|
|||
|
|
|||
|
Apparently, you don't care one whit about them (except, perhaps, as a
|
|||
|
vector for your product).
|
|||
|
|
|||
|
>May you all find your calling
|
|||
|
|
|||
|
In the real world <as opposed to this grand contest you seem to have
|
|||
|
composed in your imagination>, your efforts actually *silence* the
|
|||
|
cal-ling(s) that users might hear. Our PC LANs serve 2300 people,
|
|||
|
many of whom are taking their first steps into the digital world; in
|
|||
|
fact, I'd guess that over 60% of my users never make significant use
|
|||
|
of PCs before coming to this university. If, during their first
|
|||
|
serious use of a PC, they are victimized by your viruses, they often
|
|||
|
lose *all* desire to do *anything* further with a PC. You're actually
|
|||
|
killing your own cause.
|
|||
|
|
|||
|
I'm getting rather tired of virus authors <the "pro-viral" sobriquet
|
|||
|
is inane> who claim that they're on some "noble quest for knowledge".
|
|||
|
If this were truly the case, we'd never see a virus loosed upon the
|
|||
|
digital environment; the worthy seeker of knowledge would test it on
|
|||
|
their own hardware, find it successful, add the information to their
|
|||
|
journals, and have no reason to loose it upon the rest of us. If such
|
|||
|
people actually exist <and, by definition, I'd never know about them,
|
|||
|
right?>, they have my wholehearted support. The people who distribute
|
|||
|
viruses for the heck of it are positioned at the bottom of the digital
|
|||
|
food chain.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 13 NOV 92 21:26
|
|||
|
From: <RANDY%MPA15AB@TRENGA.TREDYDEV.UNISYS.COM>
|
|||
|
Subject: File 4--Re: Viruses--Facts and Myths
|
|||
|
|
|||
|
It has been stated that a virus only needs "normal" write access to
|
|||
|
files in order to infect. I'd like to point out that this is not true
|
|||
|
on all computer systems. Most systems do not treat machine code as
|
|||
|
anything special, and these systems are vulnerable to any program with
|
|||
|
write capability. But some systems (such as Unisys A Series) include
|
|||
|
the compilers in the Trusted Computing Base, and do not permit
|
|||
|
ordinary users or programs to create executable files. On these
|
|||
|
systems, a virus would have to have the highest possible privileges in
|
|||
|
order to infect a program; with that level of privilege, *anything*
|
|||
|
can be done.
|
|||
|
|
|||
|
I should point out that this was not done with viruses in mind. The
|
|||
|
restrictions came about because of the architecture of the systems:
|
|||
|
objects of various kinds are implemented in hardware, and the hardware
|
|||
|
is aware of what operations are permitted on which objects to a
|
|||
|
certain extent. The compilers are responsible for only emitting
|
|||
|
dangerous operators, which override normal object access rules, in
|
|||
|
well-defined situations. To allow users to emit such code would
|
|||
|
destabilize the system. Of course, this only works because the
|
|||
|
architecture was designed to implement high-level languages, and
|
|||
|
languages are available with extentions that provide sufficient power
|
|||
|
as to eliminate any need to write in assembly.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 10 Nov 1992 08:52:13 -0500
|
|||
|
From: "(Gary Chapman)" <chapman@SILVER.LCS.MIT.EDU>
|
|||
|
Subject: File 5--NYT article on technology policy
|
|||
|
|
|||
|
The lead story, and a long one, in today's (11/10) Science Times
|
|||
|
section of The New York Times is headlined "Clinton To Promote High
|
|||
|
Technology, With Gore In Charge." The article is by regular Times
|
|||
|
science/tech writer William Broad.
|
|||
|
|
|||
|
A caption to the large illustration says "President-elect Clinton
|
|||
|
proposes to redirect $76 billion or so in annual Federal research
|
|||
|
spending so it spurs industrial innovation. Areas likely to get
|
|||
|
stimulus include robotics, batteries, computer chips, 'smart' roads,
|
|||
|
biotechnology, machine tools, magnetic levitation trains, fiberoptic
|
|||
|
communications, computer networks, digital imaging, data storage,
|
|||
|
software, sensors, computer-aided manufacturing, advanced composite
|
|||
|
materials, and artificial intelligence."
|
|||
|
|
|||
|
The article says that Clinton's civilian initiative will "spend money
|
|||
|
twice as fast as the Pentagon's Star Wars anti-missile program, one of
|
|||
|
the biggest research efforts of all time." It also says the aim of
|
|||
|
the Clinton program is "a new wave of research discoveries and
|
|||
|
applications that will flood the economy with innovative goods and
|
|||
|
services, lifting the general level of prosperity and strengthening
|
|||
|
American industry for the international trade wars of the 1990s and
|
|||
|
beyond."
|
|||
|
|
|||
|
To underscore what I've been saying about the adoption of Cold War
|
|||
|
models of thinking in this new "civilian" research program, Kent
|
|||
|
Hughes, president of the Council on Competitiveness, says, "This is a
|
|||
|
watershed. We're now going to develop an economic strategy much in
|
|||
|
the way we developed a national security strategy to fight the Cold
|
|||
|
War."
|
|||
|
|
|||
|
The article describes plans for business-government partnerships, and
|
|||
|
says that Gore will be charged with coordinating this entire effort,
|
|||
|
as well as to "create a forum for systematic private sector input into
|
|||
|
U.S. government deliberations about technology policy and
|
|||
|
competitiveness." (Those words are Clinton's.)
|
|||
|
|
|||
|
The Clinton administration plans to shift "at the very least" $7.6
|
|||
|
billion per year, or about 10% of all Federal R&D, from the military
|
|||
|
to civilian programs. They applaud efforts like SEMATECH and plan to
|
|||
|
extend the SEMATECH model to other high technology sectors.
|
|||
|
|
|||
|
The article notes that a key player in the development of these plans
|
|||
|
is Senator Jeff Bingaman of New Mexico. Bingaman says that
|
|||
|
pork-barrel politics will be avoided by insisting on cost-sharing with
|
|||
|
private partners. Bingaman says, "We'll sit down and say, 'What do
|
|||
|
you think is important?' and require them to spend their own money
|
|||
|
too."
|
|||
|
|
|||
|
This is a long article, so I've skipped a lot of major points in this
|
|||
|
brief summary. It serves to emphasize the importance of the things
|
|||
|
we've been saying about trends in technology policy.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 11 Nov 1992 09:29:42 EDT
|
|||
|
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
|||
|
Subject: File 6--Va. Hearing on SSNs
|
|||
|
|
|||
|
An ad hoc committee of the Virginia General Assembly met November 10
|
|||
|
and agreed to draft legislation that will remove the SSN off the face
|
|||
|
of the Va. drivers license and from voting records. The Special Joint
|
|||
|
Subcommittee Studying State and Commercial use of Social Security
|
|||
|
Numbers for Transaction Identification met for 3 hours and heard
|
|||
|
witnesses from government, industry and public interest groups. It
|
|||
|
appears that the draft will require the DMV and the Election Board to
|
|||
|
continue to collect the information, but will no longer make it
|
|||
|
publicly available. It was also agreed that the committee
|
|||
|
would look into greater enforcement of Va. privacy laws, including the
|
|||
|
feasibility of setting up a data commissioner.
|
|||
|
|
|||
|
All of the legislators in attendance agreed that using the SSN on the
|
|||
|
face of the driver's license caused problems for both fraud and
|
|||
|
privacy. The DMV representative admitted that it would cost a minimum
|
|||
|
amount of money to modify their new computer system, which they have
|
|||
|
not completed installing yet, to use another numbering system. She
|
|||
|
estimated that this would take 3-7 years using the renewal process to
|
|||
|
change all the licenses. She estimated a cost of $8 million for an
|
|||
|
immediate change due to mailing costs.
|
|||
|
|
|||
|
Bob Stratton of Intercon Systems explained the inherent flaws in using
|
|||
|
the SSN as an identifier and offered alternatives such as the SOUNDEX
|
|||
|
system used by Maryland and New York as a better alternative for
|
|||
|
licenses. A representative of the Va. State Police admitted that they
|
|||
|
do not use the SSN to identify persons in their records because it was
|
|||
|
"inherently inaccurate" and described cases of criminals with up to 50
|
|||
|
different SSNs. Dave Banisar of CPSR Washington Office explained how
|
|||
|
the SSN facilitates computer matching and offered options for the
|
|||
|
board to consider to improve protection of personal privacy. Mikki
|
|||
|
Barry of Intercon Systems described how any attorney in Virginia has
|
|||
|
access to the DMV database to examine all records via a computer
|
|||
|
network.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tues 17 Nov 92 12:18:34 EST
|
|||
|
From: internet.housewife@hoover.joy.uunet.uu.net
|
|||
|
Subject: File 7--Am I a Techno-Junkie?
|
|||
|
|
|||
|
Dear Cu-Digest people:
|
|||
|
|
|||
|
I'm your worst nightmare come to life: a housewife who's on
|
|||
|
internet among all you techno-literati. I can't help myself. The
|
|||
|
soft key strokes, the gentle motion of the cursor flowing across
|
|||
|
my screen, the firm penetration of captured logs entering my
|
|||
|
hard-drive---I'm hooked. Problem is, I hang out in usenet all
|
|||
|
day, on IRC all night, and the rest of the time is spent
|
|||
|
polishing the screen, vacuuming the vents, and dusting my disks.
|
|||
|
The dishes pile up in the sink, the kids cook their own meals, my
|
|||
|
husband has moved out, and the cat has run off. I've gone
|
|||
|
through denial, anger, bargaining and acceptance, but my life is
|
|||
|
still a mess. Life has no meaning when I log-off, and I suffer
|
|||
|
headaches until I boot back up. What should I do?
|
|||
|
|
|||
|
Can you help?
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
Internet (I post therefore I am) Housewife
|
|||
|
|
|||
|
((MODERATORS' NOTE: Dear Hooked--perhaps the following file will help))
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 12 Nov 1992 22:20:20 +0100
|
|||
|
From: Dennis Wier <drwier@CLIENTS.SWITCH.CH>
|
|||
|
Subject: File 8--Any Technophiliacs Here Besides Me?
|
|||
|
|
|||
|
An Introduction to Technophiliacs Anonymous
|
|||
|
(By Dennis R. Wier )
|
|||
|
|
|||
|
The same Truth has many forms.
|
|||
|
|
|||
|
Technophiliacs Anonymous is a fellowship of persons and institutions
|
|||
|
who desire to stop their addiction to technology.
|
|||
|
|
|||
|
Technophiliacs Anonymous is supported entirely through contributions
|
|||
|
of its membership and is free to all those who need it.
|
|||
|
|
|||
|
To counter the destructive consequences of addiction to technology we
|
|||
|
draw on these resources:
|
|||
|
1. We use our personal willingness to stop our addictive behavior on
|
|||
|
a daily basis.
|
|||
|
2. We use the support of the fellowship of Technophiliacs Anonymous
|
|||
|
to increase our capacity to stop our addiction.
|
|||
|
3. We practice the principles of Technophiliacs Anonymous to
|
|||
|
recognize and properly respond to addictive behavior.
|
|||
|
4. We develop our perceptions and awareness of the correct use of
|
|||
|
technology by the regular practice of meditation.
|
|||
|
5. We support the efforts of those who expose the hidden side effects
|
|||
|
of any technological activity.
|
|||
|
|
|||
|
Technophiliacs Anonymous is not affiliated with any other
|
|||
|
organization, movement or cause, either religious or secular.
|
|||
|
|
|||
|
What is a Technophiliac?
|
|||
|
|
|||
|
The word technophiliac is a newly coined word and it means "having a
|
|||
|
pathological love of technology." We use this new word to imply that
|
|||
|
the love is a dysfunction of some kind. We are all technophiliacs in
|
|||
|
the sense that we as a society are dependent on the wide-spread use
|
|||
|
of technology --such as electricity, cars, telephone, TV, computers
|
|||
|
and many other forms. We need to seriously ask ourselves if this
|
|||
|
dependence helps or hurts our human relationships. We need to
|
|||
|
constantly examine this dependence to see if the hidden-side effects
|
|||
|
of technological dependence are destructive to our families, society
|
|||
|
or environment.
|
|||
|
|
|||
|
Are You A Technophiliac?
|
|||
|
|
|||
|
Has the use of technology improved or worsened your
|
|||
|
financial condition,
|
|||
|
health,
|
|||
|
relationships with friends and family,
|
|||
|
relationships with your mate or lover,
|
|||
|
relationship with your self?
|
|||
|
|
|||
|
How many hours a day do you
|
|||
|
watch television,
|
|||
|
work on a computer,
|
|||
|
operate technical equipment,
|
|||
|
talk on the telephone,
|
|||
|
tinker with your car?
|
|||
|
Add those hours up.
|
|||
|
|
|||
|
Is your total use of technology an indication of your addictive
|
|||
|
relationship to technology?
|
|||
|
|
|||
|
Now honestly look at your human relationships with the planet, your
|
|||
|
environment your family and your inner self:
|
|||
|
do you know what phase the Moon is in right now?
|
|||
|
do you know which way the seasonal clouds are moving and their
|
|||
|
shapes?
|
|||
|
can you comfortably walk alone in the woods at night without a
|
|||
|
flashlight?
|
|||
|
do you know the type of earth around your house?
|
|||
|
do you tell your children stories, or do you let them watch TV so
|
|||
|
they leave you alone?
|
|||
|
are you aware of environmental stress through your personal
|
|||
|
sensitivity to the behavior of local animals and plants?
|
|||
|
Do you choose to spend time on your computer or watching TV or
|
|||
|
talking on the telephone or tinkering with your car or with other
|
|||
|
technology rather than being with your mate or children?
|
|||
|
|
|||
|
Long-term focused awareness on technology or on technological matters
|
|||
|
to the exclusion of natural or human relationships indicates a life
|
|||
|
profoundly out of balance.
|
|||
|
|
|||
|
The cumulative effect of many lives out of balance creates a
|
|||
|
world-wide disaster with profound effects on the environment, social
|
|||
|
and group interactions, institutional and political behavior, human
|
|||
|
and family values and ethics, interpersonal relationships, and
|
|||
|
physical and psychological health, with immense costs in all areas.
|
|||
|
|
|||
|
What is Technophiliacs Anonymous?
|
|||
|
|
|||
|
Technophiliacs Anonymous is a multi-faceted fellowship based on a
|
|||
|
desire to know the hidden side-effects of technology, to popularize
|
|||
|
the awareness of the hidden side-effects of technology on our social,
|
|||
|
psychological, economic and spiritual beings, and to counter the
|
|||
|
destructive consequences of technological addiction. With established
|
|||
|
meetings in many cities in the United States and abroad, this
|
|||
|
self-help fellowship is open to anyone, and any institution, who
|
|||
|
suffers from a compulsive need to use technology, and those
|
|||
|
desperately attached to a specific technology such as the telephone,
|
|||
|
the computer, the television, the automobile, etc. Technological
|
|||
|
addiction also includes a pathological interest in destructive,
|
|||
|
coercive and invasive technologies. What all members have in common
|
|||
|
is the realization that the compulsive attachment to technology has
|
|||
|
become increasingly destructive to all areas of their lives --
|
|||
|
family, career, environment, society and political institutions.
|
|||
|
Technophiliacs Anonymous welcomes the participation of anyone
|
|||
|
directly involved in technology or directly affected by technology
|
|||
|
--either beneficially or otherwise, or in the government, or in the
|
|||
|
spiritual areas corned with the subtle effects of technology. We
|
|||
|
especially welcome the participation of human potential workers and
|
|||
|
facilitators.
|
|||
|
|
|||
|
We seek to understand, and to make known to all, how technology,
|
|||
|
generally and specifically, affects our spiritual, mental, emotional,
|
|||
|
physical, economic, political and social lives, and to cure, whenever
|
|||
|
possible, the deleterious effects of technology; and to learn, by
|
|||
|
sharing information, the correct ways to manage our lives for the
|
|||
|
continued benefits of life-supporting technology without subjecting
|
|||
|
ourselves to the hidden malevolent side-effects.
|
|||
|
|
|||
|
Technophiliacs Anonymous was first begun in June, 1988 in Berkeley by
|
|||
|
Dennis R. Wier, who realized that technological dependency was
|
|||
|
affecting life in the same ways as chemical, alcohol and love
|
|||
|
addictions, but not only were the deleterious effects felt in
|
|||
|
personal lives, but also in ecological, political and spiritual
|
|||
|
realms. Thus, what may be said of a personal addiction to a
|
|||
|
technology also may be said in a global way as well, that is, one
|
|||
|
side effect of our addiction to automobiles causes air pollution, one
|
|||
|
side effect of our addiction to telephones causes separation between
|
|||
|
people, one side effect of our addiction to television causes loss of
|
|||
|
awareness through induction of trance, one side effect of our
|
|||
|
addiction to computers causes loss of judgement and cognitive
|
|||
|
abilities. There are other, more hidden and more sinister side
|
|||
|
effects of technological addiction.
|
|||
|
|
|||
|
Co-Dependency
|
|||
|
|
|||
|
If a technophiliac is addicted to technology there are those around
|
|||
|
him or her who are co-dependent. Co-dependents may not be addicted to
|
|||
|
technology but they derive important benefits from the addiction.
|
|||
|
Manufacturers of alcoholic beverages are co-dependent to alcoholics
|
|||
|
in different ways than a person in a close personal relationship with
|
|||
|
an alcoholic is co-dependent, but both are co-dependent in that their
|
|||
|
common behavior supports the continued addiction of the alcoholic.
|
|||
|
A technophiliac has the same problem. Manufacturers of the newest
|
|||
|
computers are co-dependent with the technophiliac. And, if the
|
|||
|
technophiliac is highly paid, those persons dependent financially on
|
|||
|
the technophiliac psychologically support his dependence even though
|
|||
|
it may be personally destructive to the technophiliac.
|
|||
|
|
|||
|
One of the differences between AA, SLAA and Technophiliacs Anonymous
|
|||
|
is that many institutions --government, educational and business
|
|||
|
--support and encourage technological addiction because they are not
|
|||
|
aware of the hidden side-effect of technological addiction. It is
|
|||
|
possible to make a change in awareness. A change in awareness will
|
|||
|
help bring about an important social change. Some years ago,
|
|||
|
cigarette smoking was socially acceptable and tolerated if not
|
|||
|
encouraged by many social institutions. Smoking was generally
|
|||
|
tolerated as a common and nearly harmless bad habit. Now, with
|
|||
|
greater social awareness of the dangers of cigarette smoking, society
|
|||
|
is now attempting to reduce cigarette addiction by prohibiting
|
|||
|
smoking in public places and requiring manufacturers to place health
|
|||
|
warning messages on tobacco products.
|
|||
|
|
|||
|
It may seem that technological addiction is a trivial and unimportant
|
|||
|
matter compared to the more obvious and important issue of cigarette
|
|||
|
smoking; yet, technological addiction has greater consequences for us
|
|||
|
all the longer we ignore it. Technophiliacs are not the only victims
|
|||
|
of their addiction, but their creations often are at the root of
|
|||
|
important and world-wide dangers and all of us become victims.
|
|||
|
Beneficial social changes came about because of increased social
|
|||
|
awareness of the dangers of the hidden side-effects of tobacco
|
|||
|
addiction, and the same social awareness now extends to alcohol and
|
|||
|
drug addiction. The same social awareness is now beginning to be felt
|
|||
|
in environmental and ecological areas, because of PCB contaminations,
|
|||
|
acid rain, toxic waste treatment procedures, atmospheric pollution
|
|||
|
and other technological hidden side effects now making themselves
|
|||
|
known. It may become obvious that there is an increasing awareness of
|
|||
|
the hidden side effects to technological things we think are simple,
|
|||
|
are not.
|
|||
|
|
|||
|
It is the position of Technophiliacs Anonymous that society needs to
|
|||
|
become aware of its dangerous addiction to technology and to begin to
|
|||
|
cope with its co-dependent issues, as well as the underlying and
|
|||
|
important hidden side effects.
|
|||
|
|
|||
|
Because technological addiction is so pervasive and is encouraged by
|
|||
|
co-dependent governmental, educational, business and institutional
|
|||
|
entities, the members of Technophiliacs Anonymous include not only
|
|||
|
those who recognize their compulsive need for technology, and those
|
|||
|
with a desperate attachment to one specific form of technology, but
|
|||
|
also those leaders and visionaries who may conceive of the
|
|||
|
possibilities of a right relationship to technology.
|
|||
|
|
|||
|
Why Technology Can Be Addicting
|
|||
|
|
|||
|
The use of technology for the purpose of lessening pain or augmenting
|
|||
|
pleasure, by a person, institution, government or business who has
|
|||
|
lost control over the rate, frequency or duration of its use, and
|
|||
|
whose corporate or individual psychological, economic, social and
|
|||
|
spiritual life has become progressively unmanageable as a result is
|
|||
|
addicted to that technology.
|
|||
|
|
|||
|
Technological addiction extends from teenagers addicted to
|
|||
|
television, to yuppie programmers making piles of money, to a
|
|||
|
military establishment addicted to acquiring newer, faster and more
|
|||
|
exotic destructive forces, to a government intent on knowing and
|
|||
|
controlling everything possible, to real estate agents with a
|
|||
|
perverted sense of "highest and best use."
|
|||
|
|
|||
|
Technophiliacs Anonymous believe that an addiction exists not just
|
|||
|
because we need or use technology more than others, but because of
|
|||
|
the motive. A technophiliac uses technology to lessen the pain that
|
|||
|
comes from problems in other areas of life. Governmental and business
|
|||
|
institutions use technology to regulate and control life, a behavior
|
|||
|
which is typical of co-dependents.
|
|||
|
|
|||
|
As we collectively or individually seek someone or something to 'take
|
|||
|
us away from all this,' we are really seeking to avoid reality
|
|||
|
altogether. We come to use a technology as a substitution for other
|
|||
|
satisfactions, to comfort ourselves for real or imagined needs, or to
|
|||
|
avoid or try to make unnecessary attending to a life that seems to
|
|||
|
give us too much pain.
|
|||
|
|
|||
|
Even the humble electric light, used to provide illumination at night
|
|||
|
to read, has become a substitution for other satisfactions such as
|
|||
|
observing the night, and it comforts us in driving away the
|
|||
|
mysterious darkness, and helps us avoid our own thoughts, those same
|
|||
|
thoughts we need to think in order to keep our life in balance. Even
|
|||
|
the electric light has the side effect of keeping our life out of
|
|||
|
balance in very subtle ways. The cumulative effect of millions of
|
|||
|
lives out of balance causes disastrous effects over the entire planet.
|
|||
|
More technology is not the answer.
|
|||
|
|
|||
|
In our addiction to technology it seems as though the power lies
|
|||
|
elsewhere, and that our lives are being destroyed by forces and
|
|||
|
tensions that cannot be denied and by problems that cannot be escaped.
|
|||
|
For the technophiliac, closeness to others has become increasingly
|
|||
|
rare and difficult. It is easier for the technophiliac to have a
|
|||
|
relationship with his car, television or computer than with his mate,
|
|||
|
his children, or his neighbors.
|
|||
|
|
|||
|
Within an institution, it may be easier for an institutional
|
|||
|
technophiliac to buy more computers, hire more consultants, process
|
|||
|
more data faster, make heavier reports, create ever more
|
|||
|
sophisticated military hardware, than to have a real and meaningful
|
|||
|
relationship with its clients, citizens or employees.
|
|||
|
What can you do if you admit, however reluctantly, that technological
|
|||
|
addiction might be the problem, instead of lack of 'enough' or the
|
|||
|
'right kind' of technology?
|
|||
|
|
|||
|
The Road to Recovery
|
|||
|
|
|||
|
The road to recovery starts with an awareness of the existence of the
|
|||
|
problem. To get aware that technological addiction is the problem,
|
|||
|
try this experiment: turn off all your electricity for five days.
|
|||
|
Most technological devices depend on electricity in order to work. If
|
|||
|
the changes you go through during the five days are not painful, but
|
|||
|
"business as usual," then you are not addicted to technology.
|
|||
|
However, if the changes are painful, frightening, or perhaps so
|
|||
|
difficult that you cannot finish the five days, then you are a
|
|||
|
technophiliac.
|
|||
|
|
|||
|
The beginning is simple, but not easy. The admission of powerlessness
|
|||
|
has to be coupled with a readiness to break the addictive pattern --
|
|||
|
to stay away from all technology for long periods of time. This
|
|||
|
withdrawal from the addictive use of technology generally brings
|
|||
|
symptoms just as physical and as painful as the withdrawal from drugs
|
|||
|
or alcohol. On our own the tension would be too much, the temptation
|
|||
|
to indulge just one more time would be unbearable, and the belief
|
|||
|
that there could be another way to live would weaken.
|
|||
|
|
|||
|
First we find a sense of wholeness and dignity within ourselves. Even
|
|||
|
while working with technology we need to keep balanced and at some
|
|||
|
distance from it. To find wholeness within ourselves we first must
|
|||
|
know that part of us which is human and then to explore the intimate
|
|||
|
and mysterious relationship we have with the planet.
|
|||
|
|
|||
|
Meetings
|
|||
|
|
|||
|
For information on meetings in your area, please write to us and we
|
|||
|
will send you a local meeting schedule or give you information on
|
|||
|
organizing a local chapter.
|
|||
|
|
|||
|
Evolving A Proper Relationship
|
|||
|
|
|||
|
The hard questions cannot be ignored. The most difficult questions
|
|||
|
are ultimately the most important because they represent those
|
|||
|
aspects of life which we tend to ignore or deny. In place of facing
|
|||
|
these difficult questions which are different questions for each one
|
|||
|
of us, we create substitute problems, such as technical problems, as
|
|||
|
symbols for our own internal processes. There is the mistaken belief
|
|||
|
that by solving these technical problems somehow the more difficult
|
|||
|
questions will also be solved.
|
|||
|
|
|||
|
Technology can be known in many ways which will enhance our
|
|||
|
relationship with ourselves and with the universe.
|
|||
|
The proper relationship with technology is a distant and cautious
|
|||
|
one. Without spiritual protection in place, dealing with any
|
|||
|
technology ultimately is damaging to us. Any other relationship
|
|||
|
ultimately damages our spiritual, social, environmental and
|
|||
|
psychological life.
|
|||
|
|
|||
|
Developing spiritual protection is a life-long continuous practice
|
|||
|
which is helped by meditation in all of its forms. The support of
|
|||
|
others in a community devoted to personal awareness and growth lays
|
|||
|
the foundation for right social action and planetary unity.
|
|||
|
|
|||
|
How you can help
|
|||
|
|
|||
|
If you want to help in a real way to popularize these concepts,
|
|||
|
please discuss these ideas with your friends and the media, send
|
|||
|
pertinent newspaper clippings, cartoons to us and write us for any
|
|||
|
information. Help us start a chapter in your area. We will appear on
|
|||
|
TV and talk on the radio about these concepts. Write for helpful
|
|||
|
details, but ultimately the power, benefits and responsibility is
|
|||
|
yours.
|
|||
|
|
|||
|
+++
|
|||
|
Comments on the above are welcome by e-mail. Yes, I am ALWAYS
|
|||
|
on my computer!
|
|||
|
|
|||
|
Dennis
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.59
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|