884 lines
35 KiB
Plaintext
884 lines
35 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Mar 14 1993 Volume 5 : Issue 20
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Eater: Etaion Shrdlu, Senior
|
||
|
||
CONTENTS, #5.20 (Mar 14 1993)
|
||
File 1--Steve Jackson Games WINS! (fwd)
|
||
File 1--On-Line GEnie Interview with Bruce Sterling
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210;
|
||
in Europe from the ComNet in Luxembourg BBS (++352) 466893;
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
red.css.itd.umich.edu (141.211.182.91) in /cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
Back issues also may be obtained from the mail server at
|
||
mailserv@batpad.lgb.ca.us.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Sun, 14 Mar 1993 23:25:44 GMT
|
||
From: ckd@eff.org (Christopher Davis)
|
||
Subject: File 1--Steve Jackson Games WINS! (fwd)
|
||
|
||
((MODERATORS' NOTE: THIS JUST IN: Steve Jackson Games has won it's
|
||
suit. There is no word yet on whether there will be an appeal. Details
|
||
will follow.))
|
||
|
||
+++++++ Start of forwarded message +++++++
|
||
|
||
Originator--jsq@aahsa.tic.com X-Submissions--eff-austin@tic.com
|
||
Organization--Texas Internet Consulting
|
||
|
||
We won.
|
||
|
||
Pete Kennedy, our attorney at George, Donaldson & Ford, called me with
|
||
the news about 3:30 today. Apparently the decision came in late Friday
|
||
while Pete was at the CFP.
|
||
|
||
The judge ruled for us on both the PPA and ECPA, though he says that
|
||
taking the computer out the door was not an "interception." (I have
|
||
not read the decision yet, so no quotes here.)
|
||
|
||
He awarded damages of $1,000 per plaintiff under the ECPA.
|
||
|
||
Under the PPA, he awarded SJ Games $42,259 for lost profits in 1990,
|
||
and out of pocket costs of $8,781.
|
||
|
||
Our attorneys are also entitled to submit a request for their costs.
|
||
|
||
No word on appeal yet.
|
||
|
||
Look for a more complete and coherent account after we all read the
|
||
decision.
|
||
|
||
Please copy this announcement to all electronic and other media.
|
||
|
||
Thanks for your support through all this!
|
||
|
||
------------------------------
|
||
|
||
Date: 07 Mar 93 18:00:55 EST
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 2--On-Line GEnie Interview with Bruce Sterling
|
||
|
||
GEnie talks with Bruce Sterling:
|
||
This file comes from the Science Fiction and Fantasy RoundTable
|
||
(SFRT, page 470) on GEnie, and is Copyright (c) 1992 by GEnie.
|
||
|
||
***
|
||
|
||
To sign up on GEnie, follow these simple steps:
|
||
|
||
1. Set your communications software for half-duplex (local
|
||
echo), at 300, 1200 or 2400 baud.
|
||
|
||
2. Dial toll free: 1-800-638-8369 (or in Canada, 1-800-387-
|
||
8330). Upon connection, enter HHH
|
||
|
||
3. At the U#= prompt, enter XTX99381,SFRT then press <RETURN>.
|
||
|
||
4. Have a major credit card ready. In the U.S., you may also
|
||
use your checking account number.
|
||
|
||
For more information in the United States or Canada, call
|
||
1-800-638-9636 or write: GEnie, c/o GE Information Services,
|
||
P.O. Box 6403, Rockville, MD 20850-1785.
|
||
|
||
***
|
||
|
||
|
||
21:30EST 11/09/92
|
||
|
||
|
||
<[Host] THE.HAMMER> The GEnie clock says that it's 9:30 ET, so we'll start now.
|
||
|
||
** <[Host] THE.HAMMER> Room is now listen-only.
|
||
|
||
Room is now in listen-only mode.
|
||
|
||
<[Host] THE.HAMMER> Our RTC guest tonight is Bruce Sterling, author of the
|
||
<[Host] THE.HAMMER> novels INVOLUTION OCEAN, THE ARTIFICIAL KID,
|
||
<[Host] THE.HAMMER> SCHISMATRIX, and ISLANDS IN THE NET, editor of the
|
||
<[Host] THE.HAMMER> cyberpunk anthology MIRRORSHADES, co-author with
|
||
<[Host] THE.HAMMER> William "NEUROMANCER" Gibson of THE DIFFERENCE ENGINE,
|
||
<[Host] THE.HAMMER> and now the author of the non-fiction work THE HACKER
|
||
<[Host] THE.HAMMER> CRACKDOWN. Welcome, Bruce.
|
||
|
||
<[Guest] BRUCES> What a pleasure to see all those titles spelled correctly *8-)
|
||
|
||
<[Host] THE.HAMMER> Bruce's new book is concerned with questions about the new
|
||
electronic frontier.
|
||
|
||
<[Guest] BRUCES> Now if we could only PRONOUNCE them *8-/
|
||
|
||
<[Host] THE.HAMMER> Do a /rai if you have a question for Bruce, and I will call
|
||
on you.
|
||
<[Host] THE.HAMMER> Bruce, I'll lead off. Your book is called THE HACKER
|
||
CRACKDOWN. How do you define "hacker"?
|
||
|
||
<[Guest] BRUCES> Whoops.. oh dear, my fingertips have fallen off... no, false
|
||
alarm. Do ask anything, people, don't be shy.
|
||
<[Guest] BRUCES> How do I define hacker. Well, there was the good ol' 60s
|
||
definition, and then there's the rather more sinister 90s definition.
|
||
|
||
<[Host] THE.HAMMER> What are they?
|
||
|
||
<[Guest] BRUCES> Generally I go with the cop definition, since it's the one in
|
||
greater public usage, meaning a computer trespasser.
|
||
<[Guest] BRUCES> When you see 'hacker' in headlines it invariably means
|
||
somebody who's committed sillicitly.
|
||
<[Guest] BRUCES> Wow! I mean someone who'se committed computer abuse and
|
||
invaded
|
||
<[Guest] BRUCES> a system illicitly.
|
||
|
||
<[Host] THE.HAMMER> Okay, we have a question from DANTECH...
|
||
|
||
<[Katie] DANTECH> I wonder if you think there's any way we can reclaim the term?
|
||
<[Katie] DANTECH> I was a programmer, and to me it was a term of praise, a
|
||
gonzo programmer who could get into the code and really make it sit up and
|
||
beg...
|
||
<[Katie] DANTECH> I get upset with the other definition. it takes a hacker to
|
||
be a hacker in the new sense, but not all hackers do that sort of thing. if
|
||
you follow me. ;-> anyway, does your book emphasize the difference?
|
||
|
||
<[Guest] BRUCES> Reclaim the term "hacker?" Sure. About the same time that I
|
||
reclaim the term "cyberpunk." Ha ha ha ha!
|
||
<[Guest] BRUCES> My book does make the distinction between "hacker" in its
|
||
better sense and
|
||
the system-cracking hacker, but I'm afraid it's a losing battle.
|
||
|
||
<[Host] THE.HAMMER> Katie, a followup?
|
||
|
||
<[Katie] DANTECH> I'm hoping we get to GURPS later, but that's it
|
||
for now.
|
||
|
||
<[Host] THE.HAMMER> Okay.
|
||
<[Host] THE.HAMMER> P.RETZBACH is next...
|
||
|
||
<[Pete] P.RETZBACH> hi ... I want to ask about this stuff I hear about al gore
|
||
and the "network america" ... can you comment??
|
||
|
||
<[Guest] BRUCES> Comment on Al? Sure! Let me state publicly that I'm taking
|
||
complete gloating glee at the prospect of Souther Yuppie Reptiles in Power!
|
||
<[Guest] BRUCES> But more seriously -- yes, NREN is clearly a very big deal and
|
||
I for one have high hopes for it.
|
||
<[Guest] BRUCES> I think it's very encouraging that we now have a highly placed
|
||
federal official with a firm grasp on modern telecommunications.
|
||
|
||
<[Host] THE.HAMMER> Follow-up, Pete?
|
||
|
||
<[Pete] P.RETZBACH> yes ...
|
||
<[Pete] P.RETZBACH> so you really believe it's not too early or ambitious??
|
||
|
||
<[Guest] BRUCES> What if it is? I don't see what we have to lose. A few
|
||
billion? So what?
|
||
<[Guest] BRUCES> "Information superhighways" sounds like a swell notion to me.
|
||
|
||
<[Host] THE.HAMMER> Next up is B.LUHMAN.
|
||
|
||
<[King Arthur] B.LUHMAN> What if any is the difference between Hackers and
|
||
Phreakers? (not sure spelling)
|
||
|
||
<[Guest] BRUCES> Well, "phreaks" are mostly into telephone manipulation while
|
||
"hackers' crack systems, but that is a harder distinction to make now
|
||
<[Guest] BRUCES> that the telphone system is becoming digitalized.
|
||
<[Guest] BRUCES> "Phreaks" tend to be into petty theft-of-service more than
|
||
hackers, too.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[King Arthur] B.LUHMAN> yes.. which is easier to get caught?
|
||
|
||
<[Host] THE.HAMMER> Can you repeat that? It was garbled.
|
||
|
||
<[King Arthur] B.LUHMAN> yes.. which is easier to get caught?
|
||
|
||
<[Guest] BRUCES> Oh.... Well, that depends on what kind of crime you're
|
||
committing and how openly you brag about it.
|
||
|
||
<[King Arthur] B.LUHMAN> ic thnx!
|
||
|
||
<[Guest] BRUCES> It also depends on who the local cops are and if they're hip
|
||
to telecomm
|
||
|
||
<[Host] THE.HAMMER> Next up is Martha Soukup, SFRT assistant sysop....
|
||
|
||
<[Martha] SFWA-SOUKUP> I think you should introduce "sillicitly" into the
|
||
language. Noun. Anyway....
|
||
<[Martha] SFWA-SOUKUP> Of the people you met researching the book, who was, or
|
||
were, the most fun
|
||
<[Martha] SFWA-SOUKUP> to hang out with?
|
||
|
||
<[Guest] BRUCES> Oh, Kapor and Barlow, no question.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[Martha] SFWA-SOUKUP> Howcum?
|
||
|
||
<[Guest] BRUCES> John Perry Barlow is the heaviest dude I know!
|
||
|
||
<[Host] THE.HAMMER> Second follow-up, Martha?
|
||
|
||
<[Martha] SFWA-SOUKUP> Maybe you could elaborate? (Or does everyone need to
|
||
buy the book? <g>)
|
||
|
||
<[Guest] BRUCES> Cops are always a bit menacing; hackers hard to trust.
|
||
<[Guest] BRUCES> But millionaires and Grateful Dead lyricists have their own
|
||
odd kind of charm, believe me,
|
||
<[Guest] BRUCES> It's a little hard to describe charisma.
|
||
|
||
<[Host] THE.HAMMER> Next up is Mike Whalen....
|
||
|
||
<[MIKE] M.WHALEN5> Hi, Bruce.
|
||
|
||
<[Guest] BRUCES> Yo.
|
||
|
||
<[MIKE] M.WHALEN5> I finished you book just this weekend.. great read. I wanted
|
||
to ask you...
|
||
<[MIKE] M.WHALEN5> I have been on BBSs here in New Orleans since 1984 and I can
|
||
remember a prominent Hacker/Cracker/Phreaker scene.. but this seems to have
|
||
died in recent years.. would you feel this is true of the whole scene?
|
||
|
||
<[Guest] BRUCES> Well, I think the scene has changed its character. But the
|
||
digital underground definitely exists, believe me.
|
||
<[Guest] BRUCES> I could upload some proof if you're interested.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[MIKE] M.WHALEN5> Oh.. I do know it exists. Proof? What do you mean by Proof?
|
||
;)
|
||
|
||
<[Guest] BRUCES> There's a big hacker convention coming up in Houston nemy hard
|
||
disk.
|
||
|
||
<[MIKE] M.WHALEN5> I am not doubting you. Btw, I could not finish the 911
|
||
document. Thanks, Bruce.
|
||
|
||
<[Guest] BRUCES> I gotta learn to stop doing that *8-(
|
||
<[Guest] BRUCES> Anyway, there were a lot of Norleans people at this
|
||
hacker con last year.
|
||
|
||
<[Host] THE.HAMMER> A brief announcement:
|
||
<[Host] THE.HAMMER> There is a contest in this RTC tonight, sponsored by
|
||
<[Host] THE.HAMMER> Bantam Books and GEnie. The first three people to
|
||
<[Host] THE.HAMMER> correctly answer a trivia question later in the RTC
|
||
<[Host] THE.HAMMER> will win free autographed copies of THE HACKER
|
||
<[Host] THE.HAMMER> CRACKDOWN.
|
||
<[Host] THE.HAMMER> Next up is Pete Retzbach again...
|
||
|
||
<[Guest] BRUCES> Unless my wrists fall off *8-(
|
||
|
||
<[Pete] P.RETZBACH> did the feds REALLY believe Steve Jackson was
|
||
publishing a hacker manual??
|
||
|
||
<[Guest] BRUCES> I don't think they did, but I think they were anxious
|
||
for a convenient excuse.
|
||
<[Guest] BRUCES> I think the USSS realized immediately that they'd blown
|
||
it, but they hoped the whole thing would remain completely obscure.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[Pete] P.RETZBACH> thank you
|
||
|
||
<[Host] THE.HAMMER> Next up is Kate Daniel again...
|
||
|
||
<[Katie] DANTECH> How do you mean, "an excuse"? what else did they want
|
||
to nail him for?
|
||
<[Katie] DANTECH> And, my main question, how is Kapor's group doing?
|
||
|
||
<[Guest] BRUCES> I think they had his gaming bulletin-board,
|
||
"Illuminati," figured for a very serious Legion of Doom hangout.
|
||
<[Guest] BRUCES> They thought it would be full of hot passwords and such.
|
||
|
||
<[Katie] DANTECH> government paranoia?
|
||
|
||
<[Guest] BRUCES> Kapor's group is "an insurrection trying to become an
|
||
institution."
|
||
<[Guest] BRUCES> Not paranoia. Just a mistake. The problem came in
|
||
trying to brazen out their blunder. If they'd just handed it back and
|
||
apologized...
|
||
<[Guest] BRUCES> Jackson would not have beat the drums so loudly.
|
||
|
||
<[Host] THE.HAMMER> Follow-ups?
|
||
|
||
<[Katie] DANTECH> the question on paranoia was all.
|
||
|
||
<[Host] THE.HAMMER> Next up is Gary Frazier...
|
||
|
||
<[GaryF] G.FRAZIER3> Bruce, do you think that the law enforcement
|
||
community has the technical skills to deal with hacking's negative aspects?
|
||
|
||
<[Guest] BRUCES> No, they don't; but then again, neither does anybody
|
||
else!
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[GaryF] G.FRAZIER3> Are they flailing around, trying to give the
|
||
impression that they're DOING SOMETHING?
|
||
|
||
<[Guest] BRUCES> Things have been quiet for some months. However now
|
||
that the Presidential campaigns are over...
|
||
<[Guest] BRUCES> I very much expect to see the US Secret Service get
|
||
into the electronic
|
||
<[Guest] BRUCES> fray once again and with renewed vigor.
|
||
|
||
<[Host] THE.HAMMER> Any follow-up, Gary?
|
||
|
||
<[GaryF] G.FRAZIER3> Nope. Thanks, Bruce!
|
||
|
||
<[Host] THE.HAMMER> Next up is Tom Weber
|
||
|
||
<[Tom] T.WEBER7> Is the "any unlocked door is an invitation" morality
|
||
prevalent among the young hackers you've encountered, or has that been
|
||
exaggerated by the media? Is most hacking politically motivated, or just for
|
||
kicks and personal gain?
|
||
|
||
<[Guest] BRUCES> Kicks. Prurience. Ego-tripping. Role-playing.
|
||
Neurosis. Intellectual curiosity. Lack of other outlets. Teenage high
|
||
spirits...
|
||
<[Guest] BRUCES> The "unlocked door" rap still gets a lot of play in
|
||
hacker circles, but I've always found it kind of hard to take seriously.
|
||
|
||
<[Host] THE.HAMMER> Follow-up, Tom?
|
||
|
||
<[Tom] T.WEBER7> Are there any serious politically subversive groups
|
||
hacking around?
|
||
|
||
<[Guest] BRUCES> Well, that depends on what you mean by "serious," Tom.
|
||
I think EFF is pretty "serious," and so are CPSR and ACLU, but they're not
|
||
teenagers
|
||
|
||
<[Guest] BRUCES> and they're not generally perceived as "hackers."
|
||
<[Guest] BRUCES> Or as "subversive," for that matter -- which is
|
||
probably their greatest strength.
|
||
|
||
<[Host] THE.HAMMER> Next up is Susan Shwartz...
|
||
|
||
<[Susan] S.SHWARTZ> As I understand it, Kapor's group is designed to
|
||
protect people like Steve Jackson. What sort of success is it having?
|
||
How would it answer (possible) charges that it's soft on the wrong sort of
|
||
hacking--or would it?
|
||
|
||
<[Guest] BRUCES> Well, anybody can make the "hacksymp" charge. It
|
||
doesn't seem to carry much oomph though. I'm surprised at the public support
|
||
for
|
||
<[Guest] BRUCES> computer intrusion kids. The populace is very cynical
|
||
these days. Big telephone companies and groups like FBI, Umuch of a
|
||
sympathetic hearing.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[Susan] S.SHWARTZ> Yes, please. I have a subversive fondness for this
|
||
sort of thing, too. But what's the group's basis in law? First Amendment?
|
||
Unfair search and seizure? Privacy?
|
||
|
||
<[Guest] BRUCES> Fourth Amendment, First Amendment,
|
||
<[Guest] BRUCES> privacy legislation, anti wiretapping legislation.
|
||
<[Guest] BRUCES> Electronic Communications Privacy Act, too.
|
||
|
||
<[Host] THE.HAMMER> Next up is Mike Whalen again.
|
||
|
||
<[Guest] BRUCES> And let's not underestimate $$$$$$$$$$
|
||
|
||
<[MIKE] M.WHALEN5> Hey, again. What do you feel the public's CURRENT
|
||
perception of CyberSpace is. Is it becoming MORE friendly? Or has the term
|
||
Cyberspace and renewed Hacker media scared more people away?
|
||
|
||
<[Guest] BRUCES> I think people are less terrified of "hacking" these
|
||
days and more and more frightened by "viruses." Viruses probably ARE a worse
|
||
threat.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[MIKE] M.WHALEN5> I guess the more hackers there are .. the more
|
||
viruses? That is the current.. misnomer? At least I feel it is.
|
||
|
||
<[Guest] BRUCES> The networks are growing steadily, especially the
|
||
Internet, so people aren't frightened by modems per se or cyberspace as an
|
||
idea...
|
||
|
||
<[Guest] BRUCES> The thing that drives people nuts is the idea of having
|
||
their hard-disks wiped by some idiot from Bulgaria and his PC virus.
|
||
<[Guest] BRUCES> There's a pretty good book coming out from England
|
||
called "Approaching Zero" that has a lot of material on Bulgarian virus-writing
|
||
crowd.
|
||
|
||
<[Host] THE.HAMMER> Next up is Kate Daniel again....
|
||
|
||
<[Katie] DANTECH> this is a complex one. obvious lawbreakers, the ones
|
||
who hack into corporate databases....
|
||
<[Katie] DANTECH> and mess up financial records and plant viruses, they
|
||
are obviously of interest to the g'vment. But do you think...
|
||
<[Katie] DANTECH> some areas of g'ment are afraid of the non-illegal
|
||
areas of cyberspace, like GEnie? think it's monitored? and what effect do you
|
||
think ....
|
||
<[Katie] DANTECH> the new administration's interest will have on it? ga
|
||
|
||
<[Guest] BRUCES> Well, there are plenty of things you can do on a
|
||
"legal" BBS or network that will catch a cop's attention....
|
||
<[Guest] BRUCES> fencing stolen property, planning crimes (conspiracy),
|
||
pornography (especially CHILD pornography)...
|
||
<[Guest] BRUCES> swindles, thefts, libel, slander...
|
||
<[Guest] BRUCES> exchanging hot credit card numbers, exchanging stolen
|
||
phone access numbers...
|
||
<[Guest] BRUCES> pirating and selling illicitly copied software...
|
||
<[Guest] BRUCES> giving advice on demolitions, brewing poisons, how to
|
||
kill with a single blow of a blunt object...
|
||
<[Guest] BRUCES> advice on how to commit all manner of crimes and
|
||
disguise your activities afterward. And so on.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[Katie] DANTECH> I'm more interested in open communications, consensus
|
||
forming, and direct feedback to government. do you think some officials find
|
||
this form of open, fast communications threatening?
|
||
|
||
<[Guest] BRUCES> Did I forget plagiarism and theft of intellectual
|
||
property?
|
||
|
||
<[Katie] DANTECH> I was going to say we don't do those things on GEnie,
|
||
but I *have* taken part in discussions on killing people. but I write murders.
|
||
<g>
|
||
|
||
<[Guest] BRUCES> You'll be grinning out of the other side of your modem
|
||
if you ever become involved in an actual murder investigation, DANTECH.
|
||
|
||
<[Katie] DANTECH> seriously?
|
||
|
||
<[Guest] BRUCES> Depends on how CLOSELY involved you are.
|
||
<[Guest] BRUCES> And if somebody examines your hard-disk.
|
||
|
||
<[Host] THE.HAMMER> Next up is Martha Soukup again....
|
||
|
||
<[Martha] SFWA-SOUKUP> In your (very funny) story, "Are You for 86?",
|
||
you have a religious pro-life group using computer hacking as one of their
|
||
strategies. Do you think that, in real life, the radical right will catch up
|
||
to the radical left in that area? And are radical political groups getting
|
||
anywhere with hackery? (hacking, whatever)
|
||
|
||
<[Guest] BRUCES> Well, there have been Nazi bulletin boards in the US
|
||
for a long time, and when it comes to satellite comm have been into it for a
|
||
long time.
|
||
<[Guest] BRUCES> I don't think the radical right has much "catching up"
|
||
to do.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[Martha] SFWA-SOUKUP> How annoying are these groups, really, to the
|
||
government?
|
||
|
||
<[Guest] BRUCES> If they've got guns, they're plenty bothersome. And if
|
||
they ever threaten the life of the President...
|
||
<[Guest] BRUCES> You can bet that the USSS will be taking a prolonged
|
||
and detailed interest in them and their activities.
|
||
|
||
<[Host] THE.HAMMER> Second follow-up?
|
||
|
||
<[Martha] SFWA-SOUKUP> And if they're just cracking &c?
|
||
|
||
<[Guest] BRUCES> Mostly they're riddled with federal informants,
|
||
though...
|
||
<[Guest] BRUCES> So their chances of getting anywhere militarily are
|
||
pretty limited...
|
||
<[Guest] BRUCES> and the informant business goes in spades for the
|
||
little teenage hacker groups...
|
||
<[Guest] BRUCES> They just spill their guts immediately when apprehended.
|
||
|
||
<[Host] THE.HAMMER> Next up is Denny again....
|
||
|
||
<[Denny] DENNYA> Bruce, as technology gets more and more advanced, do
|
||
you think hacking will become more difficult? Or more devastating? (Will more
|
||
powerful computers and algorithms benefit the hacker or hackee?)
|
||
|
||
<[Guest] BRUCES> I don't think hacking amounts to much. I'd worry more
|
||
about the effects
|
||
<[Guest] BRUCES> of these new and more powerful technologies for those
|
||
who own them.
|
||
<[Guest] BRUCES> Those who use them all day every day. Corporations and
|
||
governments.
|
||
<[Guest] BRUCES> It's silly to worry too much about teenagers.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[Denny] DENNYA> ga
|
||
|
||
<[Host] THE.HAMMER> Next up is Cathy Hampton....
|
||
|
||
<ARIEL> I'd like to follow up on Gary Frazier's question. Assuming
|
||
that no one has the technical skill to enforce the law on-line, and assuming
|
||
the Feds asked you to come up with a means to develop and teach this, how would
|
||
you accomplish this? (Assuming you didn't run for dear life, that is. :> )
|
||
|
||
<[Guest] BRUCES> Change the law so as to make it more easily enforceable.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<ARIEL> Absolutely. What changes would you make, then? One or two
|
||
examples would be fine -- I know you don't have enough time before Christmas to
|
||
answer it all. :>
|
||
|
||
<[Guest] BRUCES> I think I'd make computer-intrusion a misdemeanor at
|
||
worst and I'
|
||
<[Guest] BRUCES> d devote my efforts..
|
||
<[Guest] BRUCES> to tracking down people who commit telecommunications
|
||
fraud and other..
|
||
<[Guest] BRUCES> activities that can earn a criminal a dishonest
|
||
living...
|
||
<[Guest] BRUCES> crime won't really flourish until somebody can make
|
||
plenty of folding money out of it...
|
||
<[Guest] BRUCES> If you see that ethos come into hacking it will be the
|
||
equivalent of
|
||
<[Guest] BRUCES> crack cocaine entering the drug scene...
|
||
<[Guest] BRUCES> in which case you will start seeing a lot more violence
|
||
and a lot more open greed...
|
||
<[Guest] BRUCES> and the situation may deteriorate pretty badly.
|
||
|
||
<[Host] THE.HAMMER> Next up is Sarah Collier....
|
||
|
||
<SARAH-C> Going back a bit, isn't there a proposed amendment to extend
|
||
the 1st and 4th to electronic media?
|
||
|
||
<[Guest] BRUCES> Yeah, that;s the Laurence Tribe proposal... word says
|
||
Professor Tribe
|
||
<[Guest] BRUCES> may have a shot at a Clinton/Gore Supreme Court post.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<SARAH-C> What do you figure its chances of passage are?
|
||
|
||
<[Guest] BRUCES> It's not a bill in Congress, it's just a suggestion for
|
||
a Constitutional amendment, which nobody has formally attempted to pass.
|
||
|
||
<[Guest] BRUCES> The EFF offers the text of the speech in which Prof
|
||
Tribe floats this idea of his.
|
||
|
||
<[Host] THE.HAMMER> Next up is Gary Frazier....
|
||
|
||
<[GaryF] G.FRAZIER3> Recently, DATELINE NBC did one of the standard
|
||
media scare stories about hacking that one often sees. Is the media just
|
||
ignorant of the technology, or so lazy as to simply echo the hysteria of law
|
||
enforcement?
|
||
|
||
<[Guest] BRUCES> I saw that. One of those hacker kids on NBC was
|
||
"Urvile," one of my najor informants for the book.
|
||
|
||
<[Guest] BRUCES> "Urvile" is a scary customer in a lot of ways.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[GaryF] G.FRAZIER3> Why is he so scary? Can you tell us more about him?
|
||
|
||
<[Guest] BRUCES> Well, I don't want to libel the young gentleman or
|
||
anything, but
|
||
<[Guest] BRUCES> frankly he didn't seem to me to have much of anything
|
||
in the way of qualms.
|
||
<[Guest] BRUCES> When that's combined with considerable technical skill
|
||
it tends to be a bit disquieting. The guy shows a little too much rigidity of
|
||
the eyeball. No offense, Adam *8-/
|
||
|
||
<[Host] THE.HAMMER> Second follow-up?
|
||
|
||
<[GaryF] G.FRAZIER3> That is pretty frightening. Do you think the media
|
||
sensationalizes hacking out
|
||
<[GaryF] G.FRAZIER3> of ignorance of the technology? Do they
|
||
really understand what's going on?
|
||
|
||
<[Guest] BRUCES> I think they sensationalize it because
|
||
sensation gets ratings, dude.
|
||
<[Guest] BRUCES> No, they don't understand, but they know
|
||
good press when they see it.
|
||
<[Guest] BRUCES> NOBODY understands "what's going on."
|
||
|
||
<[Host] THE.HAMMER> Next up is Susan Shwartz again....
|
||
|
||
<[Susan] S.SHWARTZ> I'm interested in the genesis of your
|
||
thought on these subjects. How'd you become interested in the
|
||
entire cyber-areas--and how'd your fiction segue into this
|
||
nonfiction book? Did the fiction affect your sources, including
|
||
Urvile?
|
||
|
||
<[Guest] BRUCES> I got involved because federal police raided a
|
||
publisher in my home town and blamed him for writing a book called "Cyberpunk."
|
||
<[Guest] BRUCES> I didn't think I needed to wait for an engraved
|
||
invitation to take an interest.
|
||
|
||
<[Host] THE.HAMMER> Follow-up, Susan?
|
||
|
||
<[Susan] S.SHWARTZ> Yes. Would that have preceded your fiction?
|
||
Specifically, I was interested in the evolution of your thought as it related
|
||
to your fiction? Did you find it gave you credibility among your sources?
|
||
|
||
<[Guest] BRUCES> Oh. That. Yeah. Yes, they all knew who I was. So
|
||
did a lot of the cops *8-(
|
||
|
||
<[Host] THE.HAMMER> Second follow-up?
|
||
|
||
<[Susan] S.SHWARTZ> Last bit of one. In the litcritters' world, it's
|
||
easy to see certain books as seminal. Still, when Robert Morris's father gives
|
||
him SHOCKWAVE RIDER to read, it's hard to dismiss it. Do you consider that
|
||
book important at all -- in your work, the development of cybernetic
|
||
communities, hackers, etc.?
|
||
|
||
<[Guest] BRUCES> Well, yeah, but nowhere near so "important" as the
|
||
movie WAR GAMES in 1983.
|
||
|
||
<[Host] THE.HAMMER> Ready for the trivia contest?
|
||
<[Host] THE.HAMMER> Get ready on the /sen keys then.
|
||
<[Host] THE.HAMMER> Here comes the trivia contest question with three
|
||
<[Host] THE.HAMMER> autographed copies of THE HACKER CRACKDOWN as the
|
||
<[Host] THE.HAMMER> prize. The first three correct answers to the trivia
|
||
<[Host] THE.HAMMER> question that are /sent to me will win! (No public
|
||
<[Host] THE.HAMMER> answers, please!)
|
||
<[Host] THE.HAMMER>
|
||
<[Host] THE.HAMMER> Ready?
|
||
<[Host] THE.HAMMER>
|
||
<[Host] THE.HAMMER> The trivia question is: What is the name of the
|
||
second
|
||
<[Host] THE.HAMMER> novel by the man who co-authored THE DIFFERENCE
|
||
ENGINE
|
||
<[Host] THE.HAMMER> with Bruce?
|
||
|
||
<[Guest] BRUCES> The Miracle Worker!!!
|
||
|
||
<[Host] THE.HAMMER> We have ONE winner.
|
||
|
||
<[Guest] BRUCES> Oh sorry that was the other WG
|
||
|
||
<[Host] THE.HAMMER> The question was the name of the second novel by
|
||
Bruce's co-author, not the name of the co-author.
|
||
<[Host] THE.HAMMER> TWO winners.
|
||
<[Host] THE.HAMMER> THREE WINNERS!
|
||
<[Host] THE.HAMMER> The winners are Tom Weber, who knew it instantly,
|
||
Martha Soukup, and Kate Daniel.
|
||
<[Host] THE.HAMMER> Congratulations. E-mail me your address, please.
|
||
<[Host] THE.HAMMER> Next up is Mike Whalen again....
|
||
|
||
<[MIKE] M.WHALEN5> I want to ask you about the future of CyberSpace. MY
|
||
vision is something like the Apple Newton which is affordable.. and constantly
|
||
hooked up through satellite link to a network (much like InterNet). What is
|
||
your vision?
|
||
|
||
<[Guest] BRUCES> I just fielded a phone call from Katie Hafner,
|
||
co-author of CYBERPUNKS OUTLAWS AND HACKERS ON THE COMPUTER FRONTIER!
|
||
<[Guest] BRUCES> Good booK!
|
||
<[Guest] BRUCES> Oh, my vision, eh? COMPUTER AS FUROSHIKI
|
||
<[Guest] BRUCES>
|
||
<[Guest] BRUCES> "Computer as furoshiki" is a highly speculative vision
|
||
of the personal computer as it might evolve if freed from certain current
|
||
material constraints.
|
||
<[Guest] BRUCES> The furoshiki is an intimate and ubiquitous accessory
|
||
to Japanese daily life. It's nothing more than a large square of tough,
|
||
well-made cloth, usually with a handsome pattern. The furoshiki is used, among
|
||
other purposes, as a grocery bag, a book-tote, and a decorative wrapper for
|
||
ceremonial gifts. In its simplicity and multiple uses it is little different
|
||
from a cowboy's bandanna, except that the skill in wrapping and knotting
|
||
furoshikis is more arcane.
|
||
<[Guest] BRUCES> The computer-as-furoshiki is the computer as a large
|
||
square of lightweight, flexible cloth. It is not, however, "cloth" as that
|
||
material is currently understood.
|
||
<[Guest] BRUCES> The furoshiki's display screen is formed by thin bands
|
||
of color-emitting optical fibers, which are wide enough and bright enough to
|
||
mimic the scan-lines of a video display terminal. These display-fibers are
|
||
interwoven with other fiber-optics carrying data.
|
||
<[Guest] BRUCES> A second kind of fiber is densely interwoven; it
|
||
consists of room-temperature superconductive wire, possibly a novel form of
|
||
buckminsterfullerene for strength and flexibility. This highly-charged net of
|
||
superconductors serves as a literal power-grid.
|
||
<[Guest] BRUCES> The third fiber is some currently-unknown form of
|
||
piezoelectric filament that can contract, relax, and therefore warp and knot
|
||
itself in response to precise electrical charges deployed along its length.
|
||
<[Guest] BRUCES> A fourth form of fiber serves as a radio antenna and
|
||
communications grid.
|
||
<[Guest] BRUCES> One section of the cloth can be radically stiffened to
|
||
serve as the diaphragm for an audio speaker.
|
||
<[Guest] BRUCES> Computation, memory, and movement are carried out by
|
||
photonic, photoelectronic, and electronic chips composed of custom-built
|
||
artificial diamond for low cost and strength. If the tensile fibers are
|
||
composed of organic proteins (which would seem likely), then the
|
||
computer-as-furoshiki consists mostly of carbon.
|
||
<[Guest] BRUCES> The device is operated with voice commands and touch,
|
||
and possibly gesture, through a similarly woven linked glove.
|
||
<[Guest] BRUCES> The computer-as-furoshiki is capable of limited
|
||
movement. Early versions might fold themselves up like a gentleman's
|
||
handkerchief; later models would resemble aluminum foil or Saran Wrap.
|
||
Advanced versions can fly.
|
||
<[Guest] BRUCES> Although this computer lacks direct video input, it
|
||
might be capable of optical character recognition if placed on a page, or of
|
||
image-scanning if placed on a graphic.
|
||
<[Guest] BRUCES> When placed on light-sensitive paper, or film, it
|
||
generates hard-copies. This computer might displace paper as a medium by
|
||
usurping not merely the information of paper but the physical properties of
|
||
paper as well.
|
||
<[Guest] BRUCES> When one's head is wrapped completely in the furoshiki,
|
||
it becomes a virtual-reality rig.
|
||
<[Guest] BRUCES> When not in use, the furoshiki is worn, as a scarf,
|
||
tie, turban, or, or course, the Console Cowboy's bandanna. Mainframes can be
|
||
used as pup-tents, supercomputers as Big Tops, for a late twenty-first-century
|
||
multimedia circus.
|
||
<[Guest] BRUCES> Boy, that was hard typing! Gotta wait for my knuckles
|
||
to stop smoking... *8-)
|
||
<[Guest] BRUCES> GA
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[MIKE] M.WHALEN5> More or less, everyone would have their own personal
|
||
mailbox. They can read/send mail.. subscribe to newsgroups.. get news through
|
||
things LIKE ClariNet. What do you think?
|
||
|
||
<[Guest] BRUCES> *I* think you need a lot of good editors *8-)
|
||
<[Guest] BRUCES> Otherwise you'll drown like rats in the data firehose.
|
||
|
||
<[Host] THE.HAMMER> LOL. Next up is Kate Daniel again...
|
||
|
||
<[Katie] DANTECH> Could you give us a thumbnail profile of the typical
|
||
"hacker", in the media sense, today? somehow I'm not sure it's still
|
||
over-bright teens...
|
||
<[Katie] DANTECH> and which types of targets are they after?
|
||
|
||
<[Guest] BRUCES> Male 15-22, unmarried, time on his hands, may be
|
||
mathematically gifted. Parents commonly divorced. Usually white. Commonly
|
||
has no othecriminal record, though that's changing.
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[Katie] DANTECH> why teens, primarily?
|
||
|
||
<[Guest] BRUCES> Targets are the easy ones first: universities and
|
||
hospitals. May work his way up to Internet sites and telephone switching
|
||
stations.
|
||
<[Guest] BRUCES> Same profile as other kinds of trespassing and
|
||
voyeurism offenders.
|
||
|
||
<[Host] THE.HAMMER> Next up is Martha Soukup again....
|
||
|
||
<[Martha] SFWA-SOUKUP> Bruce, are you working on any fiction projects
|
||
now?
|
||
<[Martha] SFWA-SOUKUP> And would you like to plug your collection
|
||
GLOBALHEAD (a Mark Ziesing book)?
|
||
|
||
<[Guest] BRUCES> I wish, Martha. At the moment, as you can see, I'm
|
||
blowing yet more time hanging out on computer networks *8-/
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[Martha] SFWA-SOUKUP> When will GLOBALHEAD be out in mass-market?
|
||
<[Martha] SFWA-SOUKUP> (Not that it's not worth buying in hardcover, as
|
||
I did, of course.)
|
||
|
||
<[Guest] BRUCES> Oh, quite some time. they want to do the paperback of
|
||
my next novel first. Which is unwritten.
|
||
<[Guest] BRUCES> Maybe I'll talk 'em into changing their minds.
|
||
|
||
<[Host] THE.HAMMER> And our last question comes from Mike Whalen once
|
||
again...
|
||
|
||
<[MIKE] M.WHALEN5> Could you talk a bit more about this "tour" you are
|
||
on? Someone mentioned that you are going to be traversing BBSs and such. How
|
||
are you going to do this? Where are you going?
|
||
|
||
<[Guest] BRUCES> Oh, I've been on CompuServe, Delphi... actually, my
|
||
home system is
|
||
<[Guest] BRUCES> the WELL (bruces@well.sf.ca.us) where I hang out in
|
||
the MONDO 2000
|
||
<[Guest] BRUCES> conference with all the other cyberpunk wierdos among
|
||
whom I feel
|
||
<[Guest] BRUCES> most at home.
|
||
<[Guest] BRUCES> I also give away text on Macintosh floppy disks.
|
||
Sneakernet!
|
||
|
||
<[Host] THE.HAMMER> Follow-up?
|
||
|
||
<[MIKE] M.WHALEN5> The Well is one of those Pay-pay-pay systems, eh?
|
||
|
||
<[Guest] BRUCES> Well, you can telnet in and get stuff off it, pretty
|
||
soon.
|
||
<[Guest] BRUCES> I don't mind paying because it's such a pleasure to see
|
||
hippies making their own way in the world for once *8-/
|
||
|
||
<[Host] THE.HAMMER> And Bruce's AGITPROP disk is also available in IBM
|
||
format. (I know; I have one.) Bruce, care to make some parting comments about
|
||
the AGITPROP diskette?
|
||
|
||
<[Guest] BRUCES> This removes the primary legitimation for co,mputer
|
||
intrusion.
|
||
|
||
<[Host] THE.HAMMER> How so?
|
||
|
||
<[Guest] BRUCES> Yeah. If you had to PAY for that disk, you got RIPPED
|
||
OFF!!
|
||
<[Guest] BRUCES> "I had to break in to learn."
|
||
|
||
<[Host] THE.HAMMER> Any parting comments about the book?
|
||
|
||
<[Guest] BRUCES> Yeah. The book will also be released electronically
|
||
for free reproduction, in about a year. INFORMATION WANTS TO BE FREE!!
|
||
<[Guest] BRUCES> But information will settle for being $1.75. *8-)
|
||
|
||
<[Host] THE.HAMMER> I may upload it to the SFRT library on
|
||
GEnie. Is that okay?
|
||
<[Host] THE.HAMMER> People would have to pay a small time charge to
|
||
download it.
|
||
|
||
<[Guest] BRUCES> That's okay. Time charge is grudgingly accepted.
|
||
|
||
<[Host] THE.HAMMER> Thank you, Bruce.
|
||
<[Host] THE.HAMMER> THE HACKER CRACKDOWN, Bantam Books, ISBN
|
||
0-533-08058-X.
|
||
<[Host] THE.HAMMER> Available at bookstores everywhere.
|
||
<[Host] THE.HAMMER> Recommended.
|
||
<[Host] THE.HAMMER> Buy a few for Christmas presents...<G>
|
||
<[Host] THE.HAMMER> The formal part of this conference is now over.
|
||
<[Host] THE.HAMMER> Thank you all for attending, and thank you, Bruce.
|
||
|
||
** <[Host] THE.HAMMER> Room is now in the talk mode.
|
||
|
||
END
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.20
|
||
************************************
|
||
|
||
|
||
|