757 lines
35 KiB
Plaintext
757 lines
35 KiB
Plaintext
|
||
|
||
Computer underground Digest Wed July 7 1993 Volume 5 : Issue 50
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Editor: Etaoin Shrdlu, Seniur
|
||
|
||
CONTENTS, #5.50 (July 7 1993)
|
||
File 1--New information on Public Key Patents
|
||
File 2--Galactic Hacker Party, '93
|
||
File 3--On-Line Congressional Hearing
|
||
File 4--Hacker Listens to Secretary's Aides
|
||
File 5--Virtually no Reality in "Virtual Reality"
|
||
File 6--Donation Distinctions (By E-Zine Editors/Moderators)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Mon, 28 Jun 1993 17:59:54 -0800 (PDT)
|
||
From: ygoland@HURRICANE.SEAS.UCLA.EDU
|
||
Subject: File 1--New information on Public Key Patents
|
||
|
||
Date--Mon, 28 Jun 93 17:25:32 edt
|
||
From--friedman@gnu.ai.mit.edu (Noah Friedman)
|
||
Subject--Digital Signature Scandal
|
||
|
||
[The following is an official announcement from the League for
|
||
Programming Freedom. Please redistribute this as widely as possible.]
|
||
|
||
Digital Signature Scandal
|
||
|
||
Digital signature is a technique whereby one person (call her J. R.
|
||
Gensym) can produce a specially encrypted number which anyone can
|
||
verify could only have been produced by her. (Typically a particular
|
||
signature number encodes additional information such as a
|
||
date and time or a legal document being signed.) Anyone can decrypt
|
||
the number because that can be done with information that is
|
||
published; but producing such a number uses a "key" (a password) that
|
||
J. R. Gensym does not tell to anyone else.
|
||
|
||
Several years ago, Congress directed the NIST (National Institute of
|
||
Standards and Technology, formerly the National Bureau of Standards)
|
||
to choose a single digital signature algorithm as a standard for the
|
||
US.
|
||
|
||
In 1992, two algorithms were under consideration. One had been
|
||
developed by NIST with advice from the NSA (National Security Agency),
|
||
which engages in electronic spying and decoding. There was widespread
|
||
suspicion that this algorithm had been designed to facilitate some
|
||
sort of trickery.
|
||
|
||
The fact that NIST had applied for a patent on this algorithm
|
||
engendered additional suspicion; despite their assurances that this
|
||
would not be used to interfere with use of the technique, people could
|
||
imagine no harmless motive for patenting it.
|
||
|
||
The other algorithm was proposed by a company called PKP, Inc., which
|
||
not coincidentally has patents covering its use. This alternative had
|
||
a disadvantage that was not just speculation: if this algorithm were
|
||
adopted as the standard, everyone using the standard would have to pay
|
||
PKP.
|
||
|
||
(The same patents cover the broader field of public key cryptography,
|
||
a technique whose use in the US has been mostly inhibited for a decade
|
||
by PKP's assiduous enforcement of these patents. The patents were
|
||
licensed exclusively to PKP by the Massachusetts Institute of
|
||
Technology and Stanford University, and derive from taxpayer-funded
|
||
research.)
|
||
|
||
PKP, Inc. made much of the suspect nature of the NIST algorithm and
|
||
portrayed itself as warning the public about this.
|
||
|
||
On June 8, NIST published a new plan which combines the worst of both
|
||
worlds: to adopt the suspect NIST algorithm, and give PKP, Inc. an
|
||
*exclusive* license to the patent for it. This plan places digital
|
||
signature use under the control of PKP through the year 2010.
|
||
|
||
By agreeing to this arrangement, PKP, Inc. shows that its concern to
|
||
protect the public from possible trickery was a sham. Its real desire
|
||
was, as one might have guessed, to own an official national standard.
|
||
Meanwhile, NIST has justified past suspicion about its patent
|
||
application by proposing to give that patent (in effect) to a private
|
||
entity.
|
||
|
||
Instead of making a gift to PKP, Inc., of the work all of us have paid
|
||
for, NIST and Congress ought to protect our access to it--by pursuing
|
||
all possible means, judicial and legislative, to invalidate or annul
|
||
the PKP patents. If that fails, even taking them by eminent domain is
|
||
better (and cheaper in the long run!) than the current plan.
|
||
|
||
You can write to NIST to object to this giveaway. Write to:
|
||
|
||
Michael R. Rubin
|
||
Active Chief Counsel for Technology
|
||
Room A-1111, Administration Building,
|
||
National Institute of Standards and Technology
|
||
Gaithersburg, Maryland 20899
|
||
(301) 975-2803.
|
||
|
||
The deadline for arrival of letters is around August 4.
|
||
|
||
Please send a copy of your letter to:
|
||
|
||
League for Programming Freedom
|
||
1 Kendall Square #143
|
||
P.O.Box 9171
|
||
Cambridge, Massachusetts 02139
|
||
|
||
(The League for Programming Freedom is an organization which defends
|
||
the freedom to write software, and opposes monopolies such as patented
|
||
algorithms and copyrighted languages. It advocates returning to the
|
||
former legal system under which if you write the program, you are free
|
||
to use it. Please write to the League if you want more information.)
|
||
|
||
Sending copies to the League will enable us to show them to elected
|
||
officials if that is useful.
|
||
|
||
This text was transcribed from a fax and may have transcription
|
||
errors. We believe the text to be correct but some of the numbers
|
||
may be incorrect or incomplete.
|
||
|
||
+++++++++
|
||
|
||
** The following notice was published in the Federal Register, Vol.
|
||
58, No. 108, dated June 8, 1993 under Notices **
|
||
|
||
National Institute of Standards and Technology
|
||
|
||
Notice of Proposal for Grant of Exclusive Patent License
|
||
|
||
This is to notify the public that the National Institute of
|
||
Standards and Technology (NIST) intends to grant an exclusive
|
||
world-wide license to Public Key Partners of Sunnyvale, California
|
||
to practice the Invention embodied in U.S. Patent Application No.
|
||
07/738.431 and entitled "Digital Signature Algorithm." A PCT
|
||
application has been filed. The rights in the invention have been
|
||
assigned to the United States of America.
|
||
|
||
The prospective license is a cross-license which would resolve a
|
||
patent dispute with Public Key Partners and includes the right to
|
||
sublicense. Notice of availability of this invention for licensing
|
||
was waived because it was determined that expeditious granting of
|
||
such license will best serve the interest of the Federal Government
|
||
and the public. Public Key Partners has provided NIST with the
|
||
materials contained in Appendix A as part of their proposal to
|
||
NIST.
|
||
|
||
Inquiries, comments, and other materials relating to the prospec-
|
||
tive license shall be submitted to Michael R. Rubin, Active Chief
|
||
Counsel for Technology, Room A-1111, Administration Building,
|
||
National Institute of Standards and Technology, Gaithersburg,
|
||
Maryland 20899. His telephone number is (301) 975-2803. Applica-
|
||
tions for a license filed in response to this notice will be
|
||
treated as objections to the grant of the prospective license.
|
||
Only written comments and/or applications for a license which are
|
||
received by NIST within sixty (60) days for the publication of this
|
||
notice will be considered.
|
||
|
||
The prospective license will be granted unless, within sixty (60)
|
||
days of this notice, NIST receives written evidence and argument
|
||
which established that the grant of the license would not be
|
||
consistent with the requirements of 35 U.S.C. 209 and 37 CFR 404.7.
|
||
|
||
Dated: June 2, 1993.
|
||
|
||
Raymond G. Kammer
|
||
Acting Director, National Institute Standards and Technology.
|
||
|
||
Appendix "A"
|
||
|
||
The National Institute for Standards and Technology ("NIST") has
|
||
announced its intention to grant Public Key Partners ("PKP")
|
||
sublicensing rights to NIST's pending patent application on the
|
||
Digital Signature Algorithm ("DSA").
|
||
|
||
Subject to NIST's grant of this license, PKP is pleased to declare
|
||
its support for the proposed Federal Information Processing
|
||
Standard for Digital Signatures (the "DSS") and the pending
|
||
availability of licenses to practice the DSA. In addition to the
|
||
DSA, licenses to practice digital signatures will be offered by PKP
|
||
under the following patents:
|
||
|
||
Cryptographic Apparatus and Method ("Diffie-Hellman")
|
||
No. 4,200,770
|
||
Public Key Cryptographic Apparatus and Method
|
||
("Hellman-Merkle") No. 4,315,552
|
||
Exponential Cryptographic Apparatus and Method
|
||
("Hellman-Pohlig") No. 4,434,414
|
||
Method For Identifying Subscribers And For Generating
|
||
And Verifying Electronic Signatures In A Data Exchange
|
||
System ("Schnorr") No. 4,995,082
|
||
|
||
It is PKP's intent to make practice of the DSA royalty free for
|
||
personal, noncommercial and U.S. Federal, state and local
|
||
government use. As explained below, only those parties who enjoy
|
||
commercial benefit from making or selling products, or certifying
|
||
digital signatures, will be required to pay royalties to practice
|
||
the DSA.
|
||
|
||
PKP will also grant a license to practice key management, at no
|
||
additional fee, for the integrated circuits which will implement
|
||
both the DSA and the anticipated Federal Information Processing
|
||
Standard for the "key escrow" system announced by President Clinton
|
||
on April 16, 1993.
|
||
|
||
Having stated these intentions, PKP now takes this opportunity to
|
||
publish its guidelines for granting uniform licenses to all parties
|
||
having a commercial interest in practicing this technology:
|
||
|
||
First, no party will be denied a license for any reason other that
|
||
the following:
|
||
|
||
(i) Failure to meet its payment obligations,
|
||
(ii) Outstanding claims of infringement, or
|
||
(iii) Previous termination due to material breach.
|
||
|
||
Second, licenses will be granted for any embodiment sold by the
|
||
licensee or made for its use, whether for final products software,
|
||
or components such as integrated circuits and boards, and regard-
|
||
less of the licensee's channel of distribution. Provided the
|
||
requisite royalties have been paid by the seller on the enabling
|
||
component(s), no further royalties will be owned by the buyer for
|
||
making or selling the final product which incorporates such
|
||
components.
|
||
|
||
Third, the practice of digital signatures in accordance with the
|
||
DSS may be licensed separately from any other technical art covered
|
||
by PKP's patents.
|
||
|
||
Fourth, PKP's royalty rates for the right to make or sell products,
|
||
subject to uniform minimum fees, will be no more than 2 1/2% for
|
||
hardware products and 5% for software, with the royalty rate
|
||
further declining to 1% on any portion of the product price
|
||
exceeding $1,000. These royalty rates apply only to noninfringing
|
||
parties and will be uniform without regard to whether the licensed
|
||
product creates digital signatures, verifies digital signatures or
|
||
performs both.
|
||
|
||
Fifth, for the next three (3) years, all commercial services which
|
||
certify a signature's authenticity for a fee may be operated
|
||
royalty free. Thereafter, all providers of such commercial
|
||
certification services shall pay a royalty to PKP of $1.00 per
|
||
certificate for each year the certificate is valid.
|
||
|
||
Sixth, provided the foregoing royalties are paid on such products
|
||
or services, all other practice of the DSA shall be royalty free.
|
||
|
||
Seventh, PKP invites all of its existing licensees, at their
|
||
option, to exchange their current licenses for the standard license
|
||
offered for DSA.
|
||
|
||
Finally, PKP will mediate the concerns of any party regarding the
|
||
availability of PKP's licenses for the DSA with designated
|
||
representatives of NIST and PKP. For copies of PKP's license
|
||
terms, contact Michael R. Rubin, Acting Chief Counsel for Technolo-
|
||
gy, NIST, or Public Key Partners.
|
||
|
||
Dated: June 2, 1993.
|
||
|
||
Robert B. Fougner, Esq.,
|
||
Director of Licensing, Public Key Partners,
|
||
310 North Mary Avenue, Sunnyvale, CA 94033
|
||
|
||
[FR Doc. 93-13473 Filed 8-7-93; 8:45 am]
|
||
|
||
+++++++++++++++
|
||
Forwarded by:
|
||
++++
|
||
Jim Gillogly
|
||
Trewesday, 21 Forelithe S.R. 1993, 20:56
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 23 Jun 1993 18:22:31 (EDT)
|
||
From: Crypt Newsletter <70743.1711@COMPUSERVE.COM>
|
||
Subject: File 2--Galactic Hacker Party, '93
|
||
|
||
Remember the Galactic Hacker Party back in 1989? Ever wonder what
|
||
happened to the people behind it? We sold out to big business, you
|
||
think. Think again, we're back!
|
||
|
||
That's right. On august 4th, 5th and 6th 1993, we're organising a
|
||
three-day summer congress for hackers, phone phreaks, programmers,
|
||
computer haters, data travellers, electro-wizards, networkers,
|
||
hardware freaks, techno-anarchists, communications junkies,
|
||
cyberpunks, system managers, stupid users, paranoid androids, Unix
|
||
gurus, whizz kids, warez dudes, law enforcement officers (appropriate
|
||
undercover dress required), guerilla heating engineers and other
|
||
assorted bald, long-haired and/or unshaven scum. And all this in the
|
||
middle of nowhere (well, the middle of Holland, actually, but that's
|
||
the same thing) at the Larserbos campground four metres below sea
|
||
level.
|
||
|
||
The three days will be filled with lectures, discussions and workshops
|
||
on hacking, phreaking, people's networks, Unix security risks, virtual
|
||
reality, semafun, social engineering, magstrips, lockpicking, viruses,
|
||
paranoia, legal sanctions against hacking in Holland and elsewhere and
|
||
much, much more. English will be the lingua franca for this event,
|
||
although some workshops may take place in Dutch. There will be an
|
||
Internet connection, an internet ethernet and social interaction
|
||
(both electronic and live). Included in the price are four nights in
|
||
your own tent. Also included are inspiration, transpiration, a
|
||
shortage of showers (but a lake to swim in), good weather (guaranteed
|
||
by god), campfires and plenty of wide open space and fresh air. All of
|
||
this for only 100 dutch guilders (currently around US$70).
|
||
|
||
We will also arrange for the availability of food, drink and smokes of
|
||
assorted types, but this is not included in the price. Our bar will be
|
||
open 24 hours a day, as well as a guarded depository for valuables
|
||
(like laptops, cameras etc.). You may even get your stuff back! For
|
||
people with no tent or air mattress: you can buy a tent through us for
|
||
100 guilders, a mattress costs 10 guilders. You can arrive from 17:00
|
||
(that's five p.m. for analogue types) on August 3rd. We don't have to
|
||
vacate the premises until 12:00 noon on Saturday, August 7 so you can
|
||
even try to sleep through the devastating Party at the End of Time
|
||
(PET) on the closing night (live music provided). We will arrange for
|
||
shuttle buses to and from train stations in the vicinity.
|
||
|
||
H O W ?
|
||
|
||
++++
|
||
|
||
Payment: In advance only. Even poor techno-freaks like us would like
|
||
to get to the Bahamas at least once, and if enough cash comes in we
|
||
may just decide to go. So pay today, or tomorrow, or yesterday, or in
|
||
any case before Friday, June 25th 1993. Since the banks still haven't
|
||
figured out why the Any key doesn't work for private international
|
||
money transfers, you should call, fax or e-mail us for the best way to
|
||
launder your currency into our account. We accept American Express,
|
||
even if they do not accept us. But we are more understanding than they
|
||
are. Foreign cheques go directly into the toilet paper recycling bin
|
||
for the summer camp, which is about all they're good for here.
|
||
|
||
H A !
|
||
|
||
+++++
|
||
|
||
Very Important: Bring many guitars and laptops.
|
||
|
||
M E ?
|
||
|
||
+++++
|
||
|
||
Yes, you! Busloads of alternative techno-freaks fromanet will descend
|
||
on this event. You wouldn't want to miss that, now, would you?
|
||
|
||
Maybe you are part of that select group that has something special to
|
||
offer! Participating in 'Hacking at the End of the Universe' is
|
||
exciting, but organising your very own part of it is even more fun. We
|
||
already have a load of interesting workshops and lectures scheduled,
|
||
but we're always on the lookout for more. We're also still in the
|
||
market for people who want to help us organize this during the
|
||
congress. In whatever way you wish to participate, call, write,
|
||
e-mail or fax us soon, and make sure your money gets here on time.
|
||
Space is limited.
|
||
|
||
S O :
|
||
|
||
+++++
|
||
|
||
> 4th, 5th and 6th of August
|
||
> Hacking at the En (a hacker summer congress)
|
||
|
||
> ANWB groepsterrein Larserbos
|
||
(Flevopolder, Netherlands)
|
||
|
||
> Cost: fl. 100,- (+/- 70 US$) per person
|
||
|
||
(including 4 nights in your own tent)
|
||
|
||
M O R E I N F O :
|
||
|
||
++++++++++++++++++++++++
|
||
|
||
Hack-Tic
|
||
Postbus 22953
|
||
1100 DL Amst Netherlands
|
||
tel : +31 20 6001480
|
||
fax : +31 20 6900968
|
||
E-mail : heu@hacktic.nl
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 6 Jul 1993 16:25:47 CDT
|
||
From: Jim Milles <MILLESJG@SLUVCA.SLU.EDU>
|
||
Subject: File 3--On-Line Congressional Hearing
|
||
|
||
Forwarded by Gleason Sackman, net-happenings moderator
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
++++++++++ Text of forwarded message ++++++++++
|
||
Date--Mon, 5 Jul 93 14:28:25 -0400
|
||
From--hearing-info@trystero.malamud.com
|
||
To--com-priv@psi.com
|
||
Subject--On-Line Congressional Hearing
|
||
|
||
Station--Internet Multicasting Service
|
||
Channel--Internet Town Hall
|
||
Program--On-Line Congressional Hearing
|
||
Release--July 5, 1993
|
||
Content--First Announcement/On-Line Congressional Hearing
|
||
|
||
On July 26 at 9:30AM EDT, the Subcommittee on Telecommunications
|
||
and Finance of the U.S. House of Representatives will hold the first
|
||
Congressional Hearing ever held over a computer network. The oversight
|
||
hearing on "The Role of Government in Cyberspace" will take place in
|
||
the Grand Ballroom of the National Press Club at 14th and F Streets,
|
||
N.W., Washington, D.C. The hearing is open to the public. An open
|
||
house will be held from 3-5PM on the same day in the same location and
|
||
is also open to the public.
|
||
|
||
Chairman Markey has asked that this historic occasion demonstrate
|
||
the potential and diversity of the global Internet. Thirty Sparcstations
|
||
will be in the hearing room, allowing members of Congress, staff, and
|
||
their guests to read e-mail, use Gopher menus, read testimony in WAIS
|
||
databases, browse the World Wide Web, and otherwise use the resources
|
||
of the global Internet as part of the hearing.
|
||
|
||
Some witnesses for the hearing will testify remotely, sending audio
|
||
and video over the Internet. Audio and video of the hearing will also
|
||
be multicast over the Multicast Backbone (MBONE). We are hoping that
|
||
C-SPAN and other traditional media will also carry the event. *MORE
|
||
DETAILS ON MBONE AND OTHER WAYS TO WATCH THE HEARINGS REMOTELY WILL BE
|
||
FORTHCOMING SHORTLY.*
|
||
|
||
One of the primary points that we are hoping to demonstrate is
|
||
the diversity and size of the Internet. We have therefore established
|
||
an electronic mail address by which people on the Internet can communicate
|
||
with the Subcommittee before and during the hearing:
|
||
|
||
congress@town.hall.org
|
||
|
||
We encourage you to send your comments on what the role of government
|
||
should be in the information age to this address. Your comments to this
|
||
address will be made part of the public record of the hearing. Feel free
|
||
to carry on a dialogue with others on a mailing list, cc'ing the e-mail
|
||
address.
|
||
|
||
Your cards and letters to congress@town.hall.org will help
|
||
demonstrate that there are people who use the Internet as part of their
|
||
personal and professional lives. We encourage you to send comments on
|
||
the role of government in cyberspace, on what role cyberspace should play
|
||
in government (e.g., whether government data be made available on the
|
||
Internet), on how the Internet should be built and financed, on how you
|
||
use the Internet, and on any other topic you feel is appropriate. This
|
||
is your chance to show the U.S. Congress that there is a constituency
|
||
that cares about this global infrastructure.
|
||
|
||
If you would like to communicate with a human being about the
|
||
hearing, you may send your comments and questions to:
|
||
|
||
hearing-info@town.hall.org
|
||
|
||
Support for the Internet Town Hall is provided by Sun Microsystems
|
||
and O'Reilly & Associates. Additional support for the July 26 on-line
|
||
congressional hearing is being provided by ARPA, BBN Communications,
|
||
the National Press Club, Xerox PARC, and many other organizations.
|
||
|
||
Network connectivity for the Internet Town Hall is provided by
|
||
UUNET Technologies.
|
||
|
||
------------------------------
|
||
|
||
From: adunkin@SDF.LONESTAR.ORG(Alan Dunkin)
|
||
Subject: File 4--Hacker Listens to Secretary's Aides
|
||
Date: Sat, 3 Jul 93 14:59:35 CDT
|
||
|
||
TELEPHONE HACKER LISTENS TO SECRETARY OF STATE'S AIDES
|
||
|
||
|
||
This morning (July 2nd, 1993) the _Dallas Morning News_
|
||
reiterated a _Business Week_ report dated Thursday that "an
|
||
electronic hacker eavesdropped on telephone conversations of
|
||
aides to Secretary of State Warren Christopher concerning
|
||
Sunday's missile attack on Baghdad, Iraq".
|
||
|
||
The magazine claimed it received a tape of calls by aides on
|
||
Saturday, before President Clinton's announcement of the
|
||
cruise missile attack.
|
||
|
||
The state department said no comment was to be made about any
|
||
private conversations.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 23 Jun 1993 18:22:31 (EDT)
|
||
From: Crypt Newsletter <70743.1711@COMPUSERVE.COM>
|
||
Subject: File 5--Virtually no Reality in "Virtual Reality"
|
||
|
||
((MODERATORS' NOTE: The following is reprinted from CRYPT NEWSLETTER
|
||
#15. We're waiting for the "Virtual Reality" comic books, perhaps
|
||
patterned after the mercifully defunct "Hacker Chronicles," and the
|
||
Saturday morning cartoon series brought to the kiddies by some frosted
|
||
cereal)).
|
||
|
||
"Virtual reality. What a concept." Yup, we kid you not - that's the
|
||
lead to the June Popular Science's cover story on the buzz-concept of
|
||
1993. But what concept does the story deliver? None, except more
|
||
phlogiston and shopworn photos on Virtuality's Dactyl Nightmare game -
|
||
the same press-release photos and animations that, uh, you've already
|
||
read in TIME, OMNI, MONDO 2000, OMNI, WIRED, MONDO 2000, NEWSWEEK,
|
||
TIME and POPULAR SCIENCE. Is there an echo in here? And THEN
|
||
reporter Michael Antonoff burbles about the exciting new SEGA "virtual
|
||
reality" helmet which is about to pop off the assembly line. It will
|
||
replace the TV with the usual goofy-looking, Nazi-helmet which the
|
||
company brags, will deliver a "feeling of total immersion in a
|
||
completely realistic 360-degree game world." That's if you consider
|
||
SEGA games realistic, of course.
|
||
|
||
Next comes the Virtual Kitchen, we are told. Why, you'll even be able
|
||
to turn on the faucet and listen to running water. Wow. We're really
|
||
pushing the boundaries of science, now. And there's virtual skiing as
|
||
a possibility, writes Antonoff. You won't really learn how to ski, but
|
||
it will be fun.
|
||
|
||
The story wraps up with 30 socko column inches on the usual wild
|
||
speculation on "Virtual Reality" applications in everything from
|
||
medicine to alchemy. Much of this talk is reminiscent of the inflated
|
||
claims which surrounded the science of molecular genetics in the
|
||
mid-'80's and persists to this day. Molecular biology was going to
|
||
cure cancer, eliminate viral and inherited illness and provide
|
||
everything from miracle drugs to custom-made enzymes which would
|
||
eliminate the threat of oil spills while replacing The Hair Club for
|
||
Men.
|
||
|
||
It was bullshit then and it's bullshit now. The theories are nice, but
|
||
nature doesn't yield her secrets easily just because
|
||
science/entertainment reporters have decided to be flacks for newly
|
||
minted professaurus's seeking tenure and grant money.
|
||
|
||
Of course, molecular biology HAS provided a key to understanding
|
||
cellular mechanisms at a very low level. However, it hasn't set the
|
||
world on edge. Despite superhuman effort, diseases like malaria,
|
||
although well understood, aren't playing dead.
|
||
|
||
And we suspect, so it will be with "virtual reality." A lot of idiots
|
||
will throw a ton of money at it and they'll get what they already
|
||
have: games and sex toys.
|
||
|
||
Even the tabloid TV journalists of the salacious "Hard Copy" sneered
|
||
at the "Virtual Reality" mavens on a recent evening segment. A couple
|
||
of women, whose names we forget, bleated on about "virtual sex" and
|
||
wound up showing Darth Vader-style helmets, rushes from "The Lawnmower
|
||
Man" and the kind of animations which tipped over Max Speegle's apple
|
||
cart. Crypt editors couldn't help jeering along with the "Hard Copy"
|
||
anchormen at the oh-so-novel idea of attaching "data gloves" to the
|
||
schlong. (Actually, such tools have been around for a long time. You
|
||
find them listed under "Penisator" in magazines published by Larry
|
||
Flynt.)
|
||
|
||
Indeed, if you think a minute you realize there is no such thing as
|
||
"virtual sex". It's like being "slightly pregnant." Or having a
|
||
"minor" case of gonorrhea. You either have sex with another person,
|
||
skin to skin, or you don't. "Virtual sex" is just another fluffy,
|
||
meaningless euphemism for computerized team masturbation. The Crypt
|
||
Newsletter supports the use of "virtual hooker" or "virtual love
|
||
automaton" if you must have jargon; the latter is better, particularly
|
||
if you're in need of some reassuring corporate-mumble for conning a
|
||
roomful of investment bankers. The mind reels at the possibilities.
|
||
Imagine the Michelangelo virus, or some descendant of it, activating
|
||
on Ted and Alice's Virtual Sex PC, crashing the system and causing a
|
||
"virtual" convulsion in their "data gloves" just as they're booting up
|
||
for some afternoon delight. Ouch. Lawsuit. So the next time someone
|
||
mentions the word "virtual" to you in dinner conversation, gracefully
|
||
dump your side-plate of collard greens into their lap.
|
||
|
||
And, lo, just as this issue of the Crypt Newsletter went to the
|
||
electronic press Newsweek magazine trumped Popular Science with a
|
||
cover story on "interactive" - that curious admixture of virtual
|
||
reality, information superhighways and CD-ROM squeaking/talking books.
|
||
"Virtual reality," claimed the magazine, ". . . with a mighty computer
|
||
and New Age goggles . . . you'll eventually be able to simulate sex,
|
||
drugs, rock and roll and just about every other human activity." Even
|
||
sicking up on your date after a night of too many Long Island Iced
|
||
Teas?
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 1 Jul 93 14:49 PDT
|
||
From: john@ZYGOT.ATI.COM(John Higdon)
|
||
Subject: File 6--Donation Distinctions (By E-Zine Editors/Moderators)
|
||
|
||
((MODERATORS' NOTE: John Higdon's post raises important issues
|
||
involving the status of moderators of digests. His comments focus on
|
||
the recent *FALSE* rumors announcing the elimination of CuD from one
|
||
of the ftp sites and the the difference between solicitation of funds
|
||
to maintain an organization and solicitation of funds by private
|
||
individuals who may need external support to enable them to eke out a
|
||
living while moderating digests.
|
||
|
||
Editors of electronic journals/digest are in an odd position. Unlike
|
||
organizations, they have no formal constituency that they represent.
|
||
Therefore, collecting "dues," "subscription fees," or other
|
||
compensation seems tacky. On the other hand, editing a journal such as
|
||
Telecom Digest (or CuD), which comes out several times a week,
|
||
requires a considerable investment of time and resources. Hard-copy
|
||
editors receive a living wage for their efforts. E-zine editors
|
||
generally perform the same tasks, reach a larger audience, and require
|
||
capital investment of equipment for which they receive no
|
||
compensation. Some electronic publishers are fortunate enough to be
|
||
tenured professors at a state university. This allows them to pursue
|
||
editorship as part of their "service." Others are not so fortunate.
|
||
Editing or moderating an electronic publication dramatically eats into
|
||
time that might otherwise be spent pursuing their livelihood.
|
||
Organizations, such as CPSR or EFF, have paid staff whose duties
|
||
include dissemination of newsletters or digests. Most other digests
|
||
do not.
|
||
|
||
How should e-Zine editors be compensated (if at all)? Is it proper for
|
||
editors to ask for compensation for efforts that are materially (and
|
||
substantially) rewarded in other forums? Should editors/moderators of
|
||
forums such as RISKS or TELECOM DIGEST receive compensation?
|
||
|
||
For now, we only raise the question without laying out the arguments.
|
||
At issue here is where altruism ends and reasonable compensation
|
||
begins. We would like to here from others: Should moderators/editors
|
||
request "donations?"
|
||
|
||
We must note that CuD editors have no material stake in the outcome of
|
||
such a discussion, because we are disallowed from receiving any form
|
||
of remuneration. However, we are well aware of the investment of time
|
||
and other resources that moderators and editor contribute, and we feel
|
||
that some discussion of of the issues are necessary.))
|
||
|
||
+++
|
||
|
||
The following remarks concern issues and fact that should be obvious to
|
||
everyone, but need to be said in the absence of comment by others.
|
||
|
||
Recently, there was a rumor that the EFF was dumping its archives of
|
||
CuD. The Telecom Digest moderator grabbed this opportunity to deliver
|
||
yet another diatribe condemning those who support the EFF and its work,
|
||
and casting aspersions on the motives behind the policies and practices
|
||
of the EFF itself. Further, he complained that there seemed to be a
|
||
dual standard when it came to the practices of the EFF and its fund
|
||
raising vs the Digest and the moderator's attempt to drum up cash.
|
||
|
||
Note: The rumor was a gross distortion in that it was indeed Phrack
|
||
that was offloaded to another site for reasons most aptly cited by
|
||
Mitch Kapor himself.
|
||
|
||
The overriding consideration is that the EFF is not in any way to be
|
||
compared with Telecom Digest. Leaving the legal definitions aside, the
|
||
EFF is an organization, staffed with experts and support personnel,
|
||
that has taken on the responsibility of observing, guiding, and even
|
||
changing laws that affect everyone in the telecommunications and
|
||
computing industry. It supports a paid staff, offices, communications
|
||
facilities, and has as its output legal consultations, legal
|
||
presentations, legislative commentary (formal and informal), and
|
||
provides invaluable assistance to those caught in the vacuum of
|
||
cyberspace non-protections. The organization maintains its own Internet
|
||
site with the attendant costs, issues hard publications and has,
|
||
incidental to its divergent operations, a newsletter (or digest if you
|
||
will).
|
||
|
||
The Telecom Digest is a mailing list. It is maintained on facilities
|
||
provided and paid for by a university. The moderator spends time
|
||
editing and transmitting issues of the Digest (a job done voluntarily
|
||
by moderators all over the Internet world). The Digest is the only
|
||
output. The $195/month office is strictly an option, as most mailing
|
||
lists are edited by people from their job worksites or their homes. The
|
||
same goes for the telephone expenses.
|
||
|
||
These comments are not to be construed to in any way minimize the work
|
||
done by the moderator of Telecom Digest (or any other moderator). But
|
||
there is hardly any comparison between the work done by an organization
|
||
such as the EFF and that done by the moderator of a mailing list. It is
|
||
obvious that there is also a difference between the request for funds
|
||
by a fully-qualified activist organization and someone who needs money
|
||
to pay the rent. Not everyone agrees with the positions taken by the
|
||
EFF or any other activist group and it is certainly anyone's right to
|
||
contribute to those with whom he agrees. But be it the EFF or the NRA,
|
||
the output of bonafide organizations on behalf of members and those
|
||
whose interests fall within an organization's scope of activity is
|
||
substantially more significant and appropriate to the consumption of
|
||
donated money than that of a simple e-publication, regardless of how
|
||
well it is produced.
|
||
|
||
I subscribe to many, many mailing lists and have done so for many
|
||
years. At no time has anyone who was in charge of any of them (except
|
||
one) suggested that funds were needed to keep the list going. Neither
|
||
direct contributions nor suggestions to buy resold products have been
|
||
mentioned in any way, with that one exception.
|
||
|
||
Whether it is appropriate for a moderator to solicit funds in this
|
||
manner I leave for others to debate. But to compare those solicitations
|
||
to those of an organization with the prestige and stature of the EFF is
|
||
most inappropriate by any standard of consideration. It seems obvious
|
||
that it is much more useful and more within the purposes of the net to
|
||
contribute money so that important cases get a fairer hearing rather
|
||
than so that a mailing list coordinator can be saved the inconvenience of
|
||
going out and getting a real job. If the powers that be determine that
|
||
the latter is within the scope of the intent of the Internet, then I
|
||
bow to that determination.
|
||
|
||
But let us all be clear on the important distinctions between mailing
|
||
lists and hard-working activist organizations.
|
||
|
||
++
|
||
John Higdon | P. O. Box 7648 | +1 408 264 4115 | FAX:
|
||
john@ati.com | San Jose, CA 95150 | 10288 0 700 FOR-A-MOO | +1 408 264 4407
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.50
|
||
************************************
|
||
|
||
|
||
|