876 lines
42 KiB
Plaintext
876 lines
42 KiB
Plaintext
|
||
|
||
Computer underground Digest Fri, Feb 28, 1992 Volume 4 : Issue 09
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Associate Editor: Etaion Shrdlu
|
||
|
||
CONTENTS, #4.09 (Feb 28, 1992)
|
||
File 1: Message related to craig's problem (RE to CuD 4.08)
|
||
File 2: Legal Costs, Attys, and why $60 doesn't go far
|
||
File 3: Response to Craig Neidorf's Legal Expenditures
|
||
File 4: TV station and BBS registration
|
||
File 5: Review of INTERTEK MAGAZINE (Newsbytes Reprint)
|
||
File 6: Bury Usenet (Intertek Reprint)
|
||
File 7: Mitch Kapor Response to "Bury Usenet" (Intertek Reprint)
|
||
File 8: A Comment on Amateur Action BBS
|
||
File 9: 'Michelangelo' Scare (Washington Post abstract)
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
|
||
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
NOTE: THE WIDENER SITE IS TEMPORARILY RE-ORGANIZING AND IS CURRENTLY
|
||
DIFFICULT TO ACCESS. FTP-ERS SHOULD USE THE ALTERNATE FTP SITES UNTIL
|
||
FURTHER NOTICE.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Mon, 17 Feb 92 22:25:07 -0500
|
||
From: an288@CLEVELAND.FREENET.EDU(Mark Hittinger)
|
||
Subject: File 1--Message related to craig's problem (RE to CuD 4.08)
|
||
|
||
A poster in CuD 4.08 wrote:
|
||
|
||
>Craig needs our help in defraying the costs of a battle from which we
|
||
>all benefited. Even $5 would help. Just a 29 cent stamp and a $5
|
||
>check.
|
||
|
||
Mine is on its way. Thanks to the CuD guys for making us aware of
|
||
this. Those of us that can (and would) help can't unless we are made
|
||
aware of the need. Many of us are older and draw good incomes from
|
||
the cyberchaos. Lets not call it cyberspace yet!
|
||
|
||
Debates over issues and principles are fine but they need to occur
|
||
after the practical matters of life are dealt with. In our less than
|
||
ideal world we still need to get the rent paid (and even the lawyers'
|
||
fees *DAMN*). I have been somewhat disillusioned by the activities of
|
||
various new frontier organizations. Lets fix the practical matters
|
||
first in real time and then debate the principles later in virtual
|
||
time.
|
||
|
||
> ... Ironically, if the
|
||
>principle of honor were not so important, Craig arguably would have
|
||
>been better off to plead guilty rather than defend his honor. It would
|
||
>have saved him time, money, and bother. When the costs of pleading
|
||
>guilty to crimes of which one is innocent becomes the best way of
|
||
>avoiding devastating consequences, we cannot agree that the system
|
||
>"works."
|
||
|
||
Lets not forget than Len Rose caved in and took the plea bargain
|
||
route. We can argue about what he did or didn't do, but he still
|
||
needs to get his rent paid, feed his kids, and rebuild his life when
|
||
he gets out (soon).
|
||
|
||
I'm sure that there will be similar needs in the upcoming cases that
|
||
have been discussed in recent CuD articles. I wish that it was as
|
||
easy to send a $5 check as it is to argue - but I know that it is not.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 20 Feb 1992 11:25:31 -0500
|
||
From: Craig Neidorf <knight@EFF.ORG>
|
||
Subject: File 2--Legal Costs, Attys, and why $60 doesn't go far
|
||
|
||
The readers should remember that my case was one of first instance.
|
||
In most court cases, the law or precedent is much more clear and
|
||
understood. Usually cases that go to court deal a lot with
|
||
determining the facts instead of determining the law.
|
||
|
||
Katten, Muchin, & Zavis bills Sheldon Zenner's time at $210/hour. In
|
||
addition to Zenner, they had Ken Kliebard (an associate) and two law
|
||
students working on my case over a 7 month period.
|
||
|
||
There were multiple court appearances including two arraignments and
|
||
the submission of all sorts of motions (for discovery, for release of
|
||
beneficial evidence, for all sorts of things).
|
||
|
||
There were all sorts of meetings -- with the government and with our
|
||
witnesses. There were flights to Atlanta to have meetings with Robert
|
||
Riggs and to St. Louis to meet with me (for a while I was not allowed
|
||
to leave the State other than for court appearances). There was a lot
|
||
of time spent in finding experts, interviewing them, and then learning
|
||
from what they had to say.
|
||
|
||
There was a vast abundance of evidence that had to be read, cataloged,
|
||
and understood (stacks of email printouts, Phrack issues, other
|
||
similar publications, and magazines about the telephone industry). My
|
||
attorneys had to learn about computers and Unix systems).
|
||
|
||
The fact that they first indicted me on one set of charges and then
|
||
turned around and re-indicted me on another set of charges added a lot
|
||
more time and money to my expenses. Every item of evidence that the
|
||
government photocopied for us cost tons of money (since they bill
|
||
photocopies at a very high rate (like $.15 per copy) and there were
|
||
thousands of pages.
|
||
|
||
The main problem was that the government had brought me up on charges
|
||
that had never been used before in a computer case like this one.
|
||
That meant there had to be a lot more research than perhaps would have
|
||
been ordinarily needed.
|
||
|
||
Finally there was the actual five full days of trial. This does not
|
||
imply the hours of 9 to 5, it was more like 5 am to 11pm. Hours like
|
||
these were not uncommon for Zenner during the entire 7 month period.
|
||
|
||
The bottom line here is that I am a bit outraged by the questions
|
||
posed by Mr. Moore of where the money was spent. I happen to know
|
||
that certain steps were taken to keep my bill a lot lower than it
|
||
might have been. I have learned for example that by referring a lot
|
||
of the work to the summer associates, KMZ was able to bill those hours
|
||
at a considerably lower rate. Furthermore, experts like John Nagle
|
||
and Dorothy Denning refused to accept payment for their testimony.
|
||
Ordinarially, expert witnesses like them would receive several
|
||
thousand dollars each + expenses in return for their testimony.
|
||
|
||
Don't you think my family and I scrutinized the bill ourselves to find
|
||
some errors that would bring the total down?
|
||
|
||
Finally, I feel that I received the absolute finest representation and
|
||
counseling from Sheldon Zenner. The legal expenses were checked and
|
||
re-checked by us and by him. I consider him a true friend and I trust
|
||
him without any hesitation or doubts whatsoever.
|
||
|
||
I'd rather checks be sent to Zenner because:
|
||
|
||
A. I don't want the money being sent to my name because I don't want a
|
||
stream of deposits in my bank accounts to irk IRS or anybody else.
|
||
|
||
B. I'd rather not net-broadcast my home address.
|
||
|
||
C. I tend to move around a lot since I live in rented housing and the
|
||
US Post Office is not the greatest at forwarding mail. The KMZ
|
||
address is the most reliable.
|
||
|
||
Mr. Moore writes that "The high price of legal help is arguably as
|
||
much of the problem as the reckless disregard for law and due process
|
||
demonstrated by the government." I don't disagree, but don't make me
|
||
responsible for the flaws in the system. Letters like yours victimize
|
||
me all over again.
|
||
|
||
Craig Neidorf
|
||
|
||
|
||
ps- The net total of donations based on my most recent public notice
|
||
stands at $60. $10 from one person, $20 from one person, and $30 from
|
||
one person. All of whom were people I generally knew before and were
|
||
not really among the 26,000 readers of CUD. People talk a good game,
|
||
but the money is not where their mouths are. The grand total of
|
||
donations received overall since day one (and excluding Kapor)
|
||
doesn't even hit the $1,000 mark.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 24 Feb 1992 16:47:38 -0500
|
||
From: Mike Godwin <mnemonic@EFF.ORG>
|
||
Subject: File 3--Response to Craig Neidorf's Legal Expenditures
|
||
|
||
In article <1992Feb21.083926.16788@chinacat.unicom.com> Keith Moore
|
||
writes:
|
||
|
||
>I have read repeated pleas on various networked discussion groups for
|
||
>readers to help defray Craig's legal expenses. While I sympathize
|
||
>with his position and am in fact willing to help, I'm sure many of the
|
||
>readers would like to know what all of that money was spent for. I
|
||
>want to help Craig, but I don't like the idea of giving over money to
|
||
>lawyers. The high price of legal help is arguably as much of the
|
||
>problem as the reckless disregard for law and due process demonstrated
|
||
>by the government.
|
||
|
||
Most of the cost of Craig's defense is attributed to preparation for
|
||
trial. This means researching the law relevant to the charges,
|
||
understanding the evidence, and finding out what the government's
|
||
witnesses are likely to say as well as preparing your own witnesses.
|
||
|
||
I cannot dispute that legal help is costly. But it seems to me that a
|
||
failure to help Craig because legal help is costly promotes any
|
||
lowering of the cost of legal help. It does, however, increase the
|
||
personal burden on Craig.
|
||
|
||
It is a fact that when one sets out to fight the federal government in
|
||
court, legal expenses tend to skyrocket. But this is not Craig's
|
||
fault.
|
||
|
||
>Also, why are we asked to send money directly to the law firm that
|
||
>defended Craig, and not to Craig himself?
|
||
|
||
Because that's where the money is owed. If the money were solicited
|
||
for Craig himself, countless net.critics would be calling it a scam on
|
||
Craig's part, and they'd be demanding guarantees that the money go to
|
||
his legal bills. One of the things that becomes apparent when you
|
||
spend enough time on the Net is that some people will be critical of
|
||
you no matter what you do.
|
||
|
||
>Perhaps the computer underground, realizing how
|
||
>much we are at the mercy of both lawyers and the government, would
|
||
>find it in its interest to act to curtail their powers.
|
||
|
||
It is certainly in everybody's interest to lower the cost of legal
|
||
representation. It is unclear to me how failing to help Craig Neidorf
|
||
does this. Do you really suppose that defense lawyers will watch Craig
|
||
go bankrupt and conclude "Ah, well, guess we set our fees too high"?
|
||
Isn't it asking a lot of Craig that he go bankrupt in order to
|
||
articulate your criticism of the legal system?
|
||
|
||
I believe there are plenty of reasons to be critical of the system,
|
||
but it seems heartless to me to ask Craig to bear the burden while we
|
||
sit back and pontificate about it. That's why I contributed money to
|
||
Craig's legal expenses, and I hope you do too.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 30 Jan 92 3:32:05 CST
|
||
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
|
||
Subject: File 4--TV station and BBS registration
|
||
|
||
Here's something that you might find interesting... from
|
||
misc.legal.computing. I've enclosed (most of) my reply to the
|
||
article's author.
|
||
|
||
Bob
|
||
|
||
[ start ]
|
||
|
||
A local television reporter did a report on the 10pm news about
|
||
teenagers getting access to adult .gif files on computer bulletin
|
||
boards.
|
||
|
||
He explains how many sites with adult gifs require proof-of-age (e.g.,
|
||
copies of driver's license) for registration, but some merely print a
|
||
"you must be over 21 to register" message before on-line registration.
|
||
|
||
No problem, except he then claims you can lie and still become
|
||
registered -- which he proceeds to do on camera.
|
||
|
||
Isn't this a violation of Federal law regarding computer access? The
|
||
sysop of the BBS clearly requested identifying information, as is his
|
||
right before granting system access, which the reporter deliberately
|
||
refused to provide yet accepted system access?
|
||
|
||
This TV station is getting a bad reputation for overzealous reporters--
|
||
a few years ago one star reporter actually paid for pit-bull fights
|
||
that she subsequently reported on. She was ultimately fired from the
|
||
station and charged with a felony.
|
||
|
||
I don't expect things to go this far in this situation -- but neither
|
||
do I want to sit by as the TV station implies it's okay to lie during
|
||
on-line registration for BBSes.
|
||
|
||
Any comments or suggestions?
|
||
|
||
BTW, the reporter was Jim Benemann of KCNC in Denver. I can post the
|
||
Station Manager's name if other people wish to contact the station.
|
||
|
||
Bear Giles
|
||
bear@fsl.noaa.gov
|
||
|
||
[ and my reply: ]
|
||
|
||
>To: bear@spike.ucar.edu
|
||
>Subject: Re: Stupid TV reporter tricks
|
||
|
||
In article <15091@ncar.ucar.edu> you write:
|
||
|
||
>Any comments or suggestions?
|
||
|
||
Work with the station on producing an editorial. Ask them what
|
||
criteria they use to authenticate news sources, and what their policy
|
||
is on providing air time to an individual who is immediately or
|
||
eventually proven to have faked their identity. Mention that access
|
||
rules for on-line systems, large or small, are often more strict than
|
||
those legally required of adult magazines: A signed statement that
|
||
you're over a certain age. The system's owner was complying with a
|
||
tradition of law that applies to similar adult-oriented media. The
|
||
question of whether the reporter's misrepresentation of their
|
||
identity, which treads close to the phone company's definition of
|
||
fraud, was justified is one that the station's news management is
|
||
invited to discuss publicly. After all, they were presented with a
|
||
policy for authentication that matches legal proof employed by related
|
||
media, and they bypassed it. If the station's position is that people
|
||
must be honest for a system of age-oriented access restriction to
|
||
work, they're right. If the station insists on providing a clear
|
||
example of how to defeat the owner's intent to comply with the law, it
|
||
is hardly the system owner that is in the wrong. Take the editorial
|
||
to competing stations if you need to. Of course, this is a lot of
|
||
swimming upstream for people to do, and there may be a better way that
|
||
I haven't thought of... In any case, I'm interested in hearing what,
|
||
if anything, comes of this.
|
||
|
||
------------------------------
|
||
|
||
From: John F. McMullen (mcmullen@well.sf.ca.us)
|
||
Date: Mon, 17 Feb 1992 10:39:11 PST
|
||
Subject: File 5--Review of INTERTEK MAGAZINE (Newsbytes Reprint)
|
||
|
||
REVIEW OF: Intertek
|
||
|
||
From: Intertek, 325 Elwood Beach #3, Goleta, CA 93117; Telephone:
|
||
805 685-6557; Online - steve@cs.ucsb.edu
|
||
|
||
Price: Current issue (Volume 3.3) ---- $4.00; Back issues (Volumes
|
||
3.1 & 3.2) - $5.00 ea; Subscription (4 issues) - $14,00
|
||
|
||
PUMA Rating 3.6 on a scale 1=lowest to 4=highest
|
||
|
||
Reviewed by Newsbytes by Barbara E. McMullen & John F. McMullen
|
||
|
||
Summary: Intertek is a semi-annual magazine that explores the social,
|
||
legal, ethical and technological issues confronting those in the on-line
|
||
community..
|
||
|
||
======
|
||
|
||
REVIEW
|
||
|
||
======
|
||
|
||
Intertek is a surprisingly professional semi-annual glossy magazine
|
||
dealing with issues relating to telecommunications, computer crime
|
||
and first amendment concerns. We say "surprisingly professional"
|
||
because the editor and publisher, Steve Steinberg, is still an
|
||
undergraduate at the University of California, Santa Barbara. The
|
||
current issue, Volume 3.3 - Winter 1992, is, in our judgement, of a
|
||
quality that one would expect to find in a more commercial
|
||
publication.
|
||
|
||
While the publication has developed a following among those lucky
|
||
enough to know of its existence (generally those who have already
|
||
been actively interested in the issues dealt with by Intertek), it
|
||
does not have the widespread newsstand distribution that it deserves
|
||
--although Steinberg informed us that it is distributed in Europe and
|
||
should be appearing domestically in Tower Books locations. The only
|
||
way, however, at this time to be sure of obtaining a copy is to
|
||
subscribe ($14 for 2 years - 4 issues).
|
||
|
||
After reading every available Intertek (Volumes 3.1, 3.2, & 3.3), we
|
||
think that Steinberg has hit on a extremely good pattern in his
|
||
production of the publication:
|
||
- each issue is narrowly focused on a specific topic (3.1 - "The Hacker
|
||
Issue"; 3.2 - "The Ethics Issue"; 3.3 - "Virtual Communities").
|
||
- Steinberg has attracted a well-known group of experts who also have
|
||
a fine command of language and style top either write specifically
|
||
for Intertek or to allow republication of previously material that is
|
||
germane to the topic under discussion. The three issues mentioned
|
||
include pieces by (or interviews with) John Perry Barlow, Bruce
|
||
Sterling, Brenda Laurel, Mitch Kapor, Peter Denning, Katie Hafner,
|
||
John Quarterman, Gail Thackeray, John Markoff, and Gordon Meyer. Each
|
||
of these writers bring a perspective to the topic that is both well
|
||
thought out and well presented.
|
||
- Steinberg himself writes well. He is also skillful enough as an
|
||
editor to put together pieces on provocative topics with responses
|
||
from knowledgeable individuals on the same topic -- a superior
|
||
method in our judgement than publishing the piece in one issue and
|
||
the responses in subsequent one, particular when speaking of a
|
||
semi-annual publication. An example of this technique is found in
|
||
the current issue where Steinberg has written a piece entitled "Bury
|
||
Usenet" and packaged it with responses from Mitch Kapor, Electronic
|
||
Frontier Foundation co-founder; John S. Quarterman, author of The
|
||
Matrix (Digital Press) and publisher of the Matrix News; Peter J.
|
||
Denning, computer science chair at George Mason University and
|
||
former president of the ACM; and Bruce Sterling, journalist author.
|
||
|
||
Other articles in the Winter 1992 issue include "Electropolis:
|
||
Communication and Community on Internet Relay Chat" by Elizabeth
|
||
M. Reid; "Social Organization of the Computer Underground" by
|
||
Gordon R. Meyer; "Real World Kerberos: Authentication and Privacy
|
||
on a Physically Insecure Network"; and "Mudding: Social Phenomena
|
||
in Text-Based Virtual Realities" by Pavel Curtis.
|
||
There is also a 3 page section entitled "Newsflash" that does, despite
|
||
the difficulties of providing real news in a semi-annual publication,
|
||
contain some interesting items that we had not seen elsewhere.
|
||
|
||
The centerfold of the publication presents a snapshot of both stock
|
||
prices in the technology industries and prices of hardware, new and
|
||
used. Although the information is dated (almost 2 months old when
|
||
we got it), it is presented nicely with graphs and charts and is
|
||
accompanied by a short piece by New York Times technology writer
|
||
John Markoff. While this two-page section presents nothing that is
|
||
really new, Markoff's piece is well-done, the display is attractive and
|
||
there are certainly worse things that can be put in a centerfold.
|
||
|
||
If you have any interest in acquiring a greater understanding of the
|
||
issues surrounding global telecommunications (and, in our
|
||
judgement, everyone should have such interest - particularly
|
||
Newsbytes readers!), Intertek is worth your investment. It is lively,
|
||
informative, and well-written. In short, buy the magazine!
|
||
============
|
||
|
||
PUMA RATINGS
|
||
|
||
============
|
||
|
||
PERFORMANCE/PRICE: 4. Intertek sets out to fill a niche not found in
|
||
other publications relating to on-line life. Not as folksy as Boardwatch or
|
||
as "techie" as 2600, Intertek deals with issues normally only discussed at
|
||
conferences like CFP-1 or on an on-line service such as the WELL. In our
|
||
judgement, it fulfills its mission well. At $14, for people with these
|
||
interests, it's a bargain.
|
||
|
||
USEFULNESS: 4. In an informal survey that we did with a number of
|
||
readers, the only complaints that we heard were that it should have more
|
||
pages or come out more often. That seems to be heady praise from a
|
||
demanding group.
|
||
|
||
MANUAL: N/A
|
||
|
||
AVAILABILITY: 3. Tough to get if you don't subscribe. You won't find
|
||
Intertek in your local B. Dalton or Walden sitting next to Computer
|
||
Shopper or Byte. Although the problem is easy to solve by subscribing,
|
||
many won't because they haven't actually seen a copy .. and they'll be
|
||
missing out on a good thing.
|
||
|
||
(Barbara E. McMullen & John F. McMullen/19920218)
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 15 Feb 92 17:33:29 PST
|
||
From: G.Steinberg <steve@CS.UCSB.EDU>
|
||
Subject: File 6--Bury Usenet (Intertek Reprint)
|
||
|
||
(Reprinted from _Intertek_, Winter (Vol 3.3), Winter, 1992. Pp 1-3.)
|
||
|
||
Bury USENET by Steve Steinberg
|
||
|
||
The concept of USENET, a global electronic bulletin board on which any
|
||
person can post messages on topics ranging from nanotechnology to
|
||
weightlifting and reach other interested people, sounds terrific. It
|
||
seems like a step towards the magical future which we are all brought
|
||
up to believe is right around the corner; the future of Hugo Gernsback
|
||
in which the entire bustling globe is united in productivity and
|
||
prosperity. But, just as genetic engineering and nuclear power have
|
||
turned out to cause more problems than they solve, we now see that
|
||
USENET improves productivity and our quality of life about as much as
|
||
TV does. True, there are thousands of people who enjoy reading
|
||
USENET, just as there are millions who enjoy watching TV; however this
|
||
is not proof of the quaility of the medium but instead is indicative
|
||
of the lack of alternatives. It is therefore important to understand
|
||
why USENET fails as a medium so that we can avoid further blunders in
|
||
this direction.
|
||
|
||
The three general uses that a medium such as USENET should facilitate
|
||
are: directed information seeking, browsing, and collaboration.
|
||
Directed information seeking is when someone is trying to find out a
|
||
specific piece of information. Browsing is an exploratory
|
||
information-seeking strategy that is used when the problem is
|
||
ill-defined or when the user simply wants to become more familiar with
|
||
an area of knowledge. Lastly, collaboration, for the purposes of this
|
||
paper, refers to a group of people sharing what they know and posing
|
||
questions to each other about a particular subject so as to increase
|
||
the knowledge and ability of everyone involved.
|
||
|
||
USENET fails at all of these uses, and we can lump the reasons for the
|
||
failures into three main categories: USENET's asynchronous nature, its
|
||
small bandwidth, and the large amount of noise.
|
||
|
||
By asynchronous nature I simply mean that communications on USENET is
|
||
not in real time as it is with a telephone but instead is more like
|
||
conventional mail. Being asynchronous is not a problem with mail
|
||
because we communicate with relatively few people, so there are only a
|
||
small number of letters we need to remember and keep track of.
|
||
However, when we read hundreds of different messages by different
|
||
people on different subjects, we quickly get lost and forget what the
|
||
status is of all the various topic threads. A technique people use on
|
||
USENET to minimize the drawbacks of asynchronous communications is to
|
||
begin each message with the relevant portion of the message to which
|
||
they are replying. This repetition helps to some degree however each
|
||
message will still only contain some subset of the previous messages
|
||
(depending on which earlier messages caught the current writer's
|
||
attention) and so does not give a complete picture of what has been
|
||
determined on a particular topic. The asynchronous nature of USENET
|
||
makes collaboration very difficult. A topic will often start with a
|
||
question and then receive several messages in reply, each of which in
|
||
turn will spawn several replies. The topic will then quickly
|
||
degenerate into discussions of trivial points and multiple digressions
|
||
leaving the poster of the original question, and other readers, more
|
||
confused than helped. It is the sheer size of USENET, where a topic
|
||
thread can last for thousands of messages and many months, that makes
|
||
this problem so intractable.
|
||
|
||
In these post-MTV proto-multimedia days the idea of people writing to
|
||
each other seems almost quaint. Indeed one often hears professional
|
||
writers lament that the death of writing has occurred now that the
|
||
telephone has supplanted the letter. Hence, it might seem at first
|
||
blush that USENET is a good thing and will cause the rebirth of the
|
||
written letter. Unfortunately, as someone who has waded through tens
|
||
of thousands of USENET messages, I can say with some certitude that
|
||
this rebirth has not occurred, nor does it appear likely. To write
|
||
clearly and concisely requires skill as well as time. Because most
|
||
people lack one or the other of these requirements, messages posted to
|
||
USENET are usually confusingly worded, difficult to read, and prone to
|
||
misinterpretation. This is what I was referring to when I said in the
|
||
beginning that one of the fundamental problems with USENET is its
|
||
small bandwidth. When we express our feelings on a subject or explain
|
||
a detailed technical matter, we usually use many cues and tools in
|
||
order to make ourselves understood. These include tone of voice, body
|
||
language, and pictures or diagrams. When we try instead to compress
|
||
our thoughts into 80-column ASCII, we leave behind many of the
|
||
nuances. This makes any use of USENET--whether it be searching or
|
||
collaborating--difficult since we often do not understand what a
|
||
message is really trying to say.
|
||
|
||
One solution to the problem of small bandwidth that seems likely to
|
||
catch on in a big way soon (it already has to some degree) is to allow
|
||
graphics to be viewed over USENET. This would allow a user to include
|
||
a drawn or digitized picture inside the message he or she posts.
|
||
Multimedia messages seem like a good idea, and you can easily imagine
|
||
the good uses possible such as diagrams to clearly indicate how
|
||
something works. However, I have no doubts, based on how people have
|
||
used USENET so far, that the main results would be an outbreak of
|
||
pornography and a rash of garish signatures.
|
||
|
||
Reading USENET is like drinking from a firehose, you'll get very wet
|
||
but you probably will still be thirsty. The problem is that there are
|
||
thousands of messages posted each day, but only a few of these will be
|
||
of interest to any one reader. Searching through this haystack of
|
||
messages is a tedious and laborious task with no sure method of
|
||
success. Many people end up spending (some would say wasting) several
|
||
hours a day reading USENET in order to find the few items of interest
|
||
and importance to them. What further complicates the task of searching
|
||
for information, making it near impossible as well as unpleasant, is
|
||
the huge amount of noise -- lengthy messages which say nothing useful,
|
||
messages that are personal attacks on someone, and messages that are
|
||
plain wrong.
|
||
|
||
Anyone with access to a UNIX machine that has a USENET feed can post a
|
||
message on any subject, no matter how unqualified the author may be.
|
||
The result is usually chaotic and unenlightening. Even when the poster
|
||
is humble enough to prefix his or her message with "I'm no lawyer
|
||
/scientist /doctor but...", a clear signal that we may save time and
|
||
skip this message, we only continue on to ten more messages by other
|
||
unqualified people berating the first poster for inaccuracies. The
|
||
dichotomy which is being exposed here is between a medium which
|
||
informs and a medium for general discussion. If we think USENET should
|
||
be the former, then there is no place for messages by unqualified
|
||
people. If USENET should be for discussion, then indeed anyone should
|
||
be allowed to offer their opinion. Unfortunately USENET isn't very
|
||
good at this either due to the phenomena known as "flaming" in which
|
||
users attack other persons' views far more quickly and violently than
|
||
would occur with any other medium. Because users are safely hidden
|
||
behind their terminal, and can not see who they are talking to,
|
||
standard social customs concerning conversation do not seem to apply.
|
||
The result is that even the most innocent comment can provoke typed
|
||
vitriol from someone who feels offended. Flaming is undoubtedly the
|
||
most virulent form of noise, and there is nothing more unpleasant than
|
||
having to wade through messages of infantile bickering. So, although
|
||
USENET tries to be both a medium for informing as well as discussion,
|
||
it succeeds at neither.
|
||
|
||
The concept of a moderated newsgroup is a simple solution to the noise
|
||
problem, but it leads to a problem of a different kind. In a
|
||
moderated newsgroup a user sends messages to the person in charge of
|
||
the newsgroup, and this moderator then picks only the messages he or
|
||
she feels are relevant. Sometimes this works well as in the often
|
||
cited example of Peter Neumann's RISK digest. However, there is the
|
||
insidious danger of moderator bias. The specter of this problem has
|
||
risen in conjunction with the TELECOM digest which is moderated by the
|
||
rather opinionated Patrick Townsend. Whether Townsend actually censors
|
||
messages he disagrees with is not important. The perception--and the
|
||
possibility--are there.
|
||
|
||
To summarize, USENET's asynchronous nature makes collaboration
|
||
difficult, its small bandwidth makes messages difficult to understand
|
||
and easy to misinterpret, and the high amount of noise makes searching
|
||
for interesting messages time consuming and unpleasant.
|
||
|
||
I wish I could end by presenting five easy steps to improve USENET.
|
||
Unfortunately, the only ones which seem feasible, such as news readers
|
||
which use artificial intelligence techniques to filter out noise, are
|
||
merely stopgap measures which do not address all of the fundamental
|
||
problems. Before we can fix USENET we must first understand how we
|
||
learn and how groups work together. Until this has been determined our
|
||
tools are as likely to hinder our productivity as they are to help us.
|
||
As has been amply demonstrated by television over the last fifty
|
||
years, some mediums, no matter how much of a good idea they may seem,
|
||
just don't work. I hope we quickly learn to see USENET as a noble but
|
||
failed experiment so that we can research other directions in order to
|
||
find new mediums that really do enhance our communications and our
|
||
quality of life.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 15 Feb 92 17:33:29 PST
|
||
From: Mitch Kapor <mkapor@well.sf.ca.us>
|
||
Subject: File 7--Mitch Kapor Response to "Bury Usenet" (Intertek Reprint)
|
||
|
||
Somewhere between the intimacy of island universe conferencing systems
|
||
like the WELL (an electronic bulletin board in California) and the
|
||
anarchic ocean of USENET lies the future of computer conferencing.
|
||
USENET's problems are legion and unlikely to go away. What may succeed
|
||
are new generations of software and conferencing systems built upon
|
||
the lessons and experience, both positive and negative, of a
|
||
multiplicity of existing systems.
|
||
|
||
The WELL works much better than USENET as a source of informed
|
||
discourse for several reasons:
|
||
|
||
o It's hosted on a single system, avoiding the lag of distributed
|
||
systems.
|
||
o People pay to be there. This weeds out the single largest source
|
||
of noise.
|
||
o Conferences are all hosted, which acts as a loose control
|
||
mechanism.
|
||
o The management of the system realizes it's running a digital
|
||
gathering place.
|
||
|
||
The WELL has problems too. It's insular, its user interface is nothing
|
||
to be proud of and its telecommunications access cost is excessive if
|
||
you don't live in the Bay Area.
|
||
|
||
If these problems were addressed, there's no reason in principle why
|
||
the example of the WELL couldn't be more widely applied. It wouldn't
|
||
be USENET, but maybe that's OK.
|
||
|
||
I envision a system which is on the Internet and thus reachable from
|
||
anywhere on the Internet, a system which has a graphical user
|
||
interface (in addition to whatever the hardcore users want), whose
|
||
conferences are hosted, and which charges a nominal--say a dollar an
|
||
hour--usage charge. This software may have many separate
|
||
instantiations, in different locations, serving different needs and
|
||
interests.
|
||
|
||
In fact, this is a brief sketch of a design idea for a development
|
||
project we hope to begin within the Electronic Frontier Foundation
|
||
(EFF) in 1992.
|
||
|
||
Mitch Kapor
|
||
EFF co-founder
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 24 Feb 1992 11:31:22 PST
|
||
From: Ann O'Nonymous <baybridg@vesuvios.edu>
|
||
Subject: File 8--A Comment on Amateur Action BBS
|
||
|
||
Bob Thomas has been having trouble with his kids. They are
|
||
experiencing emotional and behavior problems they've never had before.
|
||
The police officers they had learned in school to trust came to their
|
||
house one morning and unceremoniously took away their computer. The
|
||
police were rude. They offered no explanation for why they took the
|
||
kids' games and schoolwork. The half-dozen plain-clothes cops were not
|
||
related to Officer Friendly, and the children were confused,
|
||
frightened, and hurt. These police weren't THEIR friends!
|
||
|
||
So was Bob Thomas. He ran AMATEUR ACTION BBS in San Jose, Calif.,
|
||
which specialized in adult gif files. Local police (no federal agents)
|
||
burst in at 7:30 a.m. on Monday, January 20 with a search warrant
|
||
alleging grand theft, trafficking in obscene material, and child
|
||
pornography. Bob doesn't recall if the officers had their guns drawn.
|
||
The affidavit supporting the warrant is sealed, so the justification
|
||
for the raid may never be known. Bob was stunned by the accusations,
|
||
and he and his family watched in horror as the police carted away his
|
||
486, three 386s, videos, and all the tools he needed to run his two
|
||
electronics businesses and BBS business. The police also took all
|
||
hardcopy business records and other materials.
|
||
|
||
The raid resulted in seizure of over $30,000 worth of equipment. Bob
|
||
estimated that he also lost over $15,000 in lost business revenue and
|
||
legal fees. He also missed a major trade show. His children lost
|
||
their innocence. Society lost another round in the battle to maintain
|
||
a semblance of civil liberties in cyberspace.
|
||
|
||
Bob's attorney communicated with EFF and the officers were made aware
|
||
of federal and other laws relating to seizure. No charges have been
|
||
filed, and there is no indication that any will be. When I spoke with
|
||
Bob on February 24, he was expecting the return of most, hopefully
|
||
all, of the equipment by that evening, or within a day or two. He has
|
||
no explanation for why the police raided him, but suspected it might
|
||
be connected to the problems of America Online, which faced a similar
|
||
investigation.
|
||
|
||
Amateur Action (408-263-3393) specialized in adult gif files (over
|
||
4,600) using amateur rather than commercial models. Bob also used it
|
||
to distribute adult videos. There were no action or other files. It
|
||
was simply an adult BBS with a modest message base. Bob has
|
||
established a reputation for aggressively attempting to keep children
|
||
off his adult BBS, and we have neither heard nor seen any evidence
|
||
that his board contained child pornography. The different levels of
|
||
access cost from $29 to $69 a year.
|
||
|
||
Amateur Action is back up, running Wildcat. The $69 annual rate will
|
||
earn you a meg-a-day download privilege with no upload obligation.
|
||
A Visa/Mastercard sub gives immediate access.
|
||
|
||
Unless evidence appears to the contrary, this is another instance of
|
||
police mishandling a seizure, confiscating first and asking questions
|
||
later, and not being quite sure of what they're doing. What do Steve
|
||
Jackson, Bob Thomas, and deja vous have in common?
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 18 Feb 92 15:36:33 EST
|
||
From: "garbled header" <eaten.by.our@program>
|
||
Subject: File 9--'Michelangelo' Scare (Washington Post abstract)
|
||
|
||
"'Michelangelo' Scare Stirs Fears About Computer Viruses"
|
||
Author: John Burgess
|
||
Source: Washington Post, Feb 17, 1992, p. A1
|
||
|
||
A new and unusually destructive type of computer "virus" -- a
|
||
software program that enters a computer surreptitiously and destroys
|
||
data there en masse -- has reignited concern over these electronic
|
||
saboteurs.
|
||
|
||
Security experts have dubbed the virus "Michelangelo," because after
|
||
entering a computer it lies dormant until March 6, the Italian
|
||
Renaissance artist's birthday. Then it springs to life and wipes out
|
||
data stored on the computer's memory disk.
|
||
|
||
In November, a copy of Michelangelo turned up at the Gaithersburg
|
||
offices of the National Institute of Standards and Technology, hiding
|
||
on the data disk of a computer that had been returned after being on
|
||
loan to another federal agency.
|
||
|
||
Using special software, institute technicians found the virus and
|
||
removed it after receiving a tip from the other agency. That agency
|
||
had found the virus on its computers and warned the institute to
|
||
make sure its computers hadn't been infected too.
|
||
|
||
Michelangelo got national attention last month after Leading Edge
|
||
Products Inc., a manufacturer of personal computers compatible with
|
||
those of International Business Machines Corp., confirmed that it had
|
||
shipped about 500 machines that contained the virus. The manufacturer
|
||
sent customers special software designed to neutralize it.
|
||
|
||
Because the triggering date lies in the future, no one is known to
|
||
have lost data due to the virus, which was created by an unknown
|
||
programmer and has spread from computer to computer through the
|
||
exchange of infected floppy disks.
|
||
|
||
But security experts, using special software that scans computer
|
||
disks to detect viruses, have been finding copies of Michelangelo
|
||
since last summer and removing them before they activate.
|
||
|
||
It remains unclear whether large numbers of computers contain
|
||
undetected copies of the virus, though estimates of millions of
|
||
machines have been published in the news media. Michelangelo affects
|
||
only IBM-compatible personal computers, but there are about 60
|
||
million of these in existence.
|
||
|
||
Past scares about viruses often have proven to be overblown. But due
|
||
to Michelangelo's unusually destructive nature, as well as the
|
||
potential presence of other viruses, some computer experts are
|
||
suggesting that personal computer users take no chances over getting
|
||
caught by a virus.
|
||
|
||
"When it hits, it's dramatic," said Lance Hoffman, a professor of
|
||
computer science at George Washington University.
|
||
|
||
Computer users can protect themselves by making additional electronic
|
||
copies of information they cannot afford to lose, by reducing the
|
||
exchange of floppy disks and the transmission of software over phone
|
||
lines, and by obtaining special software that detects viruses.
|
||
|
||
Viruses are a surprise byproduct of the computer age. Complex sets
|
||
of computer instructions, they are usually written by anonymous
|
||
programmers as pranks, or in the case of Michelangelo, in a deliberate
|
||
effort to destroy the information of people the programmer has never
|
||
met.
|
||
|
||
Fighting the virus writers is a coalition of software companies,
|
||
academics, researchers and users of personal computers. The two play
|
||
a constant cat-and-mouse game -- virus writers sometimes send their
|
||
creations to the experts as a challenge.
|
||
|
||
If an infected floppy disk is put into a computer, the virus orders
|
||
the machine to copy it onto any other disk that the computer
|
||
contains, generally without the operator knowing that this is taking
|
||
place. Or a virus may enter a computer when its operator receives
|
||
infected software programs from a computer "bulletin board" reached
|
||
by phone.
|
||
|
||
Many viruses are considered benign, doing little more than flashing
|
||
whimsical messages on the screen or playing a tune. But others, like
|
||
Michelangelo, are engineered to seek out stored data and destroy it,
|
||
sometimes on a specific date.
|
||
|
||
That can be devastating. Companies might lose all of their account
|
||
records, for instance, or an author using a home computer might lose
|
||
the entire manuscript of a novel.
|
||
|
||
To dissect Michelangelo and find out how it works, security experts
|
||
have deliberately introduced the virus into test computers and
|
||
advanced their internal clocks to March 6 to trigger the virus.
|
||
|
||
Michelangelo-infected machines that are not functioning on March 6
|
||
will not activate the virus, according to experts. By the same
|
||
token, the virus can be kept dormant by shifting the clock on the
|
||
machine so that it never reads March 6.
|
||
|
||
Computer experts agree that getting hit by a virus -- more than
|
||
1,000 types have been identified over the years -- can be devastating
|
||
as society progressively puts more and more reliance on computers.
|
||
But there is continuing debate as to how prevalent the programs really
|
||
are.
|
||
|
||
"I'm finding virus catastrophes everywhere," said Martin Tibor, a
|
||
data recovery consultant in San Rafael, Calif., whose repeated calls
|
||
to the media after the Leading Edge incident helped publicize
|
||
Michelangelo. "These things are replicating like crazy."
|
||
|
||
David Stang, director of research at the National Computer Security
|
||
Association, offers a more conservative assessment. While stressing
|
||
the danger of viruses, he puts the probability of a virus residing in
|
||
a given computer at a large company at about 1 in 1,000.
|
||
Michelangelo constitutes a tiny fraction of those viruses, he said.
|
||
|
||
The National Institute of Standards and Technology has 5,000 personal
|
||
computers and has detected about one to three viruses a month since
|
||
last summer.
|
||
|
||
In contrast, Total Control Inc., an Alexandria computer security
|
||
firm, said that about 70 percent of the 300 personal computers at one
|
||
unnamed federal agency have been found to have Michelangelo.
|
||
|
||
San Jose research firm Dataquest Inc. surveyed 600 large U.S.
|
||
companies late last year and found that 63 percent had found a virus
|
||
on at least one company computer. However, it noted that these
|
||
companies often operated hundreds of computers.
|
||
|
||
Antiviral software has created a thriving new niche for the personal
|
||
computer software industry. Such products can be purchased in
|
||
software stores or obtained for free or at a nominal cost through
|
||
on-line computer networks.
|
||
|
||
Antiviral software is not foolproof, however. "You can't write a
|
||
generic program that detects every virus, " said Hoffman, noting that
|
||
new strains are always appearing.
|
||
|
||
Some computer users suggest that the antiviral software companies
|
||
want to stoke fear to build a market for their products.
|
||
|
||
Consultant Tibor conceded that the calls he made to the media about
|
||
Michelangelo were in part motivated by hopes of bringing business his
|
||
way -- it in fact brought in only one client, he said. But his main
|
||
motivation, Tibor said, was to get the word out about a serious
|
||
computer danger.
|
||
|
||
"I see the victims of viruses all the time," he said. He calls viruses
|
||
"the digital equivalent of germ warfare."%
|
||
|
||
------------------------------
|
||
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.09
|
||
************************************
|
||
|
||
|