635 lines
30 KiB
Plaintext
635 lines
30 KiB
Plaintext
HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY
|
|
HEYHEYhey, hey, hey, it's ATI!HEY
|
|
HEYHEYHEYHEYHEYHEYHEYHEYHEYHEYHEY
|
|
|
|
-----> issue 57
|
|
|
|
November 6, 1991.
|
|
|
|
===========================
|
|
= info following brought =
|
|
= on by a need for more =
|
|
= real information =) =
|
|
===========================
|
|
|
|
|
|
|
|
Our net address: gzero@tronsbox.xei.com
|
|
|
|
U.S. Mail:
|
|
|
|
ATI
|
|
P.O. Box 2501
|
|
Bloomfield, NJ 07003
|
|
U.S.A.
|
|
|
|
|
|
|
|
ATI's Insane Staff:
|
|
|
|
Ground Zero - publisher, editor, writer
|
|
Prime Anarchist - editor, writer
|
|
Media Assassin - crass columnist
|
|
Geraldo Riviera - sleazy news columnist
|
|
Writing/Research Staff: Happy Harry Hardon, Fah-Q, MAC???,
|
|
and other occasional contributors
|
|
|
|
|
|
|
|
|
|
Hi, folks. Here we go again with a new ATI! It seems that we
|
|
are sticking to our monthly schedule for the time being. Pretty good,
|
|
huh?
|
|
We've got some great stuff in store for you in this issue -
|
|
mainframe fun, political commentary, letters, and more!
|
|
Let's get right to it!
|
|
|
|
|
|
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
|
|
|
|
|
LETTERS TO ATI
|
|
|
|
|
|
Please do write to us with any information, thoughts, ideas,
|
|
criticisms, suggestions, or just about anything!
|
|
|
|
|
|
LETTER #1:
|
|
|
|
"...I was offended by what was written by someone who is
|
|
obviously a member of the Libertarian party (Media Assassin's "Crass
|
|
Commentary", ATI55). I don't believe that something said by a member
|
|
of the Libertarian Party should be accepted as gospel. Frankly I think
|
|
Libertarians are greedy, rich bastards and do not represent the
|
|
anti-authoritarian ideas I am interested in."
|
|
|
|
The Media Assassin replies:
|
|
|
|
Hey, first off, who said I am a member of the Libertarian Party?
|
|
I sure didn't. I merely quoted Andre Marrou, the LP's Presidential
|
|
candidate in my column. And what does it matter if I a member of the LP?
|
|
Are LP members automatically wrong?
|
|
About Libertarians being "greedy, rich bastards," that's an
|
|
unfair generalization. I know about 4 "libertarians" and only one is
|
|
gainfully employed. Two are unemployed and have been looking for work,
|
|
and one is underemployed in a full-time job and has to work another
|
|
part-tine job. Hardly a collection of "rich, greedy bastards". And
|
|
what is your objection to someone being rich, anyway?
|
|
I suggest you read Ayn Rand and reconsider your own definitions
|
|
of "greedy", "selfish", and your ideas on just what you consider to
|
|
be "anti-authoritarian".
|
|
|
|
|
|
LETTER #2:
|
|
|
|
In ATI issue #55, you wrote...
|
|
> What's an ANAC? It stands for Automatic Number Anouncement. It
|
|
> refers to a number that you call that will give you a computer-voice
|
|
> reading of the phone number you're at. Telco repairmen use these
|
|
> numbers, but others sometimes find use for these numbers as well.
|
|
> Here are some that I have gathered from various sources such as 2600
|
|
> Magazine, and e-mail conversations I have had with people in different
|
|
> parts of the country:
|
|
|
|
New England Telephone uses 220 (at least for the 617 [MA] area code). I
|
|
haven't personally verified if it works for the other area codes that NET
|
|
serves, but will try to let you know if I ever get verification on them.
|
|
I can't recall if I checked on it for 203 (CT); mind's a little fuzzy at
|
|
the moment.
|
|
|
|
Cheers...
|
|
|
|
|
|
LETTER #3:
|
|
|
|
Here's how you can prove that 2 = 1 !!!!!!
|
|
|
|
A**2 means A squared the same for B and here it is!!!!!!!!!!!!
|
|
A=B and A*1 is A times 1
|
|
B=1
|
|
B**2=A*B Now subtract A squared from both sides
|
|
B**2-A**2=A*B-A**2 Now simplify these
|
|
(B+A)*(B-A)=A*(B-A) Now divide both sides by (B-A)
|
|
(B+A)=A
|
|
1+1=1
|
|
2=1 PROVEN!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
|
Are you happy now??
|
|
|
|
|
|
|
|
Do send us your letters!! If we print your letter, your name and
|
|
location/email address will only be revealed if you specifically ask us
|
|
to mention it.
|
|
|
|
|
|
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
|
|
|
|
|
MAINFRAME ANTICS
|
|
|
|
|
|
=============== start of article (der!) ==============
|
|
|
|
=================================================================
|
|
>>>>>>>>>>>>>> Warp 9 's Warped Views and reviews <<<<<<<<<<<<<<<
|
|
=================================================================
|
|
Brought to you (infrequently) by a rare late night with nothing to do
|
|
but write an article for ATI!!!
|
|
|
|
With personal freedom and privacy going down the tubes (the Supreme
|
|
Court is now 7/9 conservative and 2 moderates --- ha), there will be more
|
|
need for precautions in your day to day computer activities, even if they
|
|
are not illegal, just private. You can always use a version of DES on your
|
|
text files, but who wants to bet the NSA/SS/FBI/CIA can get a backdoor to it
|
|
anytime they feel like it? You can always use the rot13 of mail, but so can
|
|
most people. Some of the homebrew encryption programs I've seen are ok, but
|
|
not imaginative. You usually type something like 'encrypt myfile.txt password'
|
|
and it uses the password as a key on the file. Something like that would stop
|
|
a serious super-narc/hacker (slacker? hey, new definition!) for maybe a few
|
|
minutes until his highspeed computers picked your password and starts spewing
|
|
your private files into the 'ol print buffer. Sure 'the man' has access to the
|
|
best equipment and brains (debateable, I know, but never underestimate the
|
|
competition), but hey, let them work for it if they want to phuck you over.
|
|
|
|
In my opinion, the best type of encryption/decryption program would be
|
|
one you could customize yourself so that so many different versions use so
|
|
many different ways of encryption that nobody can keep tabs on them. ("hey,
|
|
this punk is using version 4.56 of Genericrypt(tm), I got that in my drawer!")
|
|
Using only a password as a key is lame as well. Ideally you could use long
|
|
digital strings and some DES like method, but how many of us are that up to
|
|
speed on the math theory ? To get to the point, I have come up
|
|
with a cheezy but functional pair of programs that use ANY text file you want
|
|
as an encryption/decryption key. It can be anything from your resume to the
|
|
documentation file on your favorite program. I highly reccomend that whatever
|
|
you use should never often be changed (U be phucked) and you should keep it and
|
|
a copy or two on diskette somewhere 'safe'. Compile the C code and only save
|
|
the executables on your machine, as it is pointless if an intruder is reading
|
|
this before he/she/it messes with your encrypted data. Sure someone can use
|
|
an unassembler to get a semi-clue from the .exe file, but what a pain in the
|
|
ass for most situations. This is only for the mildly paranoid anyway.
|
|
Enjoy and spread around.
|
|
|
|
------------------------------- cut here for jam.c --------------------------
|
|
|
|
/* JAM.C encryption program ---- meshes your Text file with target TEXT file
|
|
and can do customized byte operations to encrypt it.
|
|
|
|
Version 1.0 created by Warp 9 somewhere out in cyberspace Oct 1991 */
|
|
|
|
/* USAGE: jam filename.ext keyfile.ext
|
|
|
|
Where the keyfile can be any file at all, text or binary, preferrably
|
|
on disk instead of your hard drive. In the event of confiscation,
|
|
hiding the keyfile on disk somewhere could save your ass. Unless they
|
|
start assuming any encrypted data is the worst treasonous secrets and
|
|
treat you accordingly if you refuse to cooperate. Its up to you.
|
|
Creates file NEWFILE.JAM with the encrypted data. You must rename it
|
|
filename.jam or whatever, as I haven't looked into reading only the
|
|
filename without the extention from the argv[] element and using it
|
|
as a variable for the output filename. I'm sure its trivial (?).
|
|
|
|
Possible Improvements:
|
|
* Delete original file after encrypting into
|
|
new one.
|
|
* Allow encrypted file to have same filename but different
|
|
extension in code.
|
|
* Could expand to allow any binary .exe .com file
|
|
as keyfile or even file to encrypt (doesn't work yet), may need to use
|
|
buffers of bytes instead of relying on finding EOF's to stop while loops.
|
|
If try using straight binaries now, as soon as it encounter a '\x1A' byte
|
|
it terminates even if more data. Another trivial (?) change I haven't had
|
|
time to work into this version.
|
|
* Another idea: once you are convinced this works ok, rewrite it to
|
|
delete the original file once you are done jam-ming it.
|
|
****** IMPORTANT! *******
|
|
|
|
If you really want to be secure, when you delete any file, use a better
|
|
way, like Norton's WipeFile.EXE (or some equivalent) with a /Rn flag to
|
|
write 0's over the space in memory n times. Really burns the old data
|
|
away. Unjam.exe has an option to see the encrypted file onscreen
|
|
using ^s and ^q to stop scroll, without creating a text translation.
|
|
You can always use this option and direct it to a file on disk, too. This
|
|
is a better way to go. If you are worried about it, store text versions
|
|
of your favorite sensitive files/data at a remote 'safe' location like in
|
|
a friend's closet in another town/state/etc. Just be sure you can trust
|
|
them not to acknowledge they have them to anyone. Maybe somebody w/o a
|
|
computer is best?
|
|
|
|
..... and now back to our program.....
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
FILE *inptr,*keyptr,*outptr; /* pointers to files */
|
|
char datach,keych,ench; /* characters from each file */
|
|
|
|
|
|
if(argc!=3){
|
|
printf("Error: need correct version of file 'LINT.TXT' to run.\n");
|
|
exit(0);} /* red herring to frustrate bogus attempts to use */
|
|
|
|
/* check for and open all files */
|
|
|
|
if((inptr=fopen(argv[1],"rb"))==NULL){ /* open files as binary in order
|
|
to read control chars like newline */
|
|
printf("What? Get a clue, Holmes.\n"); /* rag on novice trying to hack you */
|
|
exit(0);}
|
|
|
|
if((keyptr=fopen(argv[2],"rb"))==NULL){
|
|
printf("What? Unknown reference, man.\n"); /* another frustration jab */
|
|
exit(0);}
|
|
|
|
outptr=fopen("newfile.jam","ab");
|
|
|
|
while((datach=fgetc(inptr)) != EOF){
|
|
if((keych=fgetc(keyptr)) == EOF) fseek(keyptr,0L,SEEK_SET);
|
|
/* rewinds keyfile if at end */
|
|
|
|
ench=keych^datach; /* XOR's keybyte and databyte
|
|
should insert own additional
|
|
manipulations here to be a
|
|
pain in the ass. Remember to
|
|
do the REVERSE operations in
|
|
UNJAM.C !! */
|
|
|
|
/* APPROPRIATE COMMENTS ^^^^^^^^^^^^^^^
|
|
|
|
Lots of room here for stuff like taking each byte and using bitwise
|
|
masking to get each bit and apply some funky n-bit stuff. Hell, you
|
|
could even read it in and mess with it 19 bits at a time if you were
|
|
clever enough (store excess bits and shift right next bits, etc.)
|
|
In this sample setup, it only XOR's bytes, so whenever you have 0 values
|
|
data is transparent from the keyfile or the textfile. This means that
|
|
if you run as is, the encrypted file contains some bits and chunks from
|
|
both the original and the keyfile. This is still ok, as you can't tell
|
|
what the hell the encrypted file is if you don't know what the two files
|
|
used were. Most of the bytes are gibberish, but at least add code to
|
|
complement them or convert to integer and add a number (subtracting after
|
|
same change in unjam.c) or whatever. I left it as is for simplicity and
|
|
lack of time to construct lots of manipulations that may confuse rather
|
|
than educate.
|
|
Feel free to use this as a general guide, as if you have this file, so
|
|
do 'they' ha ha ha. Seriously, folks, if you want legitimate security
|
|
on your files:
|
|
----Customize/mutate/twist this program to your whim. If there are
|
|
hundreds of versions out there all different, it makes it hard for
|
|
'the random unenlightened John Q. Dickwadd' to read your stuff.
|
|
----keep the keyfile used the same unless you unjam all files before
|
|
you change it
|
|
----if you are REALLY paranoid like me, never keep your keyfile on
|
|
the machine you need it on. Use a diskette and keep off site backup
|
|
somewhere so you don't get phucked. Hide the keyfile disk well if
|
|
you must keep it nearby. Make the bastards work if your machine is
|
|
going to be ransacked. Most files really don't need security, as the
|
|
first amendment is supposed to cover things like Phracks, LOD/H files,
|
|
ATI (of course) etc. (1st amendment, ha ha ha ha thats a good one!).
|
|
----NEVER tell anyone what file you use as a key. The beauty of this
|
|
program is that you can pass around the executable code and each person
|
|
can use whatever the hell text file for a key they want.
|
|
---If you give someone the executable only, write down the instructions
|
|
and tell them to memorize and destroy. The stupidest thing you can do
|
|
is to write down everything in some book that can be found/stolen.
|
|
|
|
Well, thats all I can do. Hope this is of use. I have other schemes for
|
|
encryption brewing in my warped mind as well, even more devious, but I have
|
|
to work out the details. See you in the bitstream, shockwave riders.
|
|
*/
|
|
|
|
|
|
fputc(ench,outptr); /* put encrypted byte in output file */
|
|
|
|
}
|
|
|
|
fclose(inptr);
|
|
fclose(keyptr);
|
|
fclose(outptr); /* shut down and bail -- mission
|
|
accomplished, commander! */
|
|
|
|
printf(" Success! Your file %s is encrypted and called NEWFILE.JAM\n",
|
|
argv[1]);
|
|
printf(" Please remember to rename it accordingly (like filename.jam)\n");
|
|
|
|
}
|
|
|
|
---------------------------------- cut here end of jam.c ----------------------
|
|
|
|
/* UNJAM.C Decryption program to go with JAM.C by Warp 9
|
|
October, 1991. Written using MSDOS TurboC, but
|
|
generic enough code for most machines (?)
|
|
*/
|
|
|
|
/* USAGE: unjam file.jam keyfile.ext [s]
|
|
|
|
If you want direct screendump of encrypted file, use 4 arguments, a letter
|
|
's' being the last (smallcase). If no 4th argument, a file is created.
|
|
Keyfile for decryption can be any text file as long as it is the SAME
|
|
one it was encrypted with byte per byte (so don't change the contents,
|
|
der!) NOTE: Making the keyfile a hidden file and keeping it on the HD
|
|
is stupid, as anyone can make files unhidden if they have any experience
|
|
with Norton Utilities, etc. If you are not using DOS, ignore this.
|
|
Compile code and don't keep it around once you have a working .exe file.
|
|
|
|
Possible improvements:
|
|
* setup screen buffer to read into and use the
|
|
pause() function to allow stopping screens as you read if 's' option
|
|
used. Pause() just stops until you hit return.
|
|
* Also find a way to change the output file to the same filename
|
|
as the .jam extension, but back to .txt or something. I haven't got
|
|
the time, so this version you have to rename the results.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
FILE *inptr,*keyptr,*outptr; /* pointers to files */
|
|
char datach,keych,ench; /* characters from each file */
|
|
|
|
if((argc!=3)&&(argc!=4)){
|
|
printf("Error: need correct version of file 'LINT.TXT'. \n");
|
|
exit(0);} /* red herring to frustrate bogus attempts to use */
|
|
|
|
if((inptr=fopen(argv[1],"rb"))==NULL){ /* open files as binary even
|
|
if text to read control chars */
|
|
printf("What? Blow me, baby.\n"); /* watch the steam from the 'suit' :) */
|
|
exit(0);}
|
|
|
|
if((keyptr=fopen(argv[2],"rb"))==NULL){
|
|
printf("What? You've got to be kidding, eat shit.\n");
|
|
/* serves to annoy the infiltrator */
|
|
exit(0);}
|
|
|
|
if(argc==3)outptr=fopen("newfile.txt","ab");/* check for and open all files */
|
|
|
|
while((ench=fgetc(inptr)) != EOF){ /* while encrypted file not at end */
|
|
if((keych=fgetc(keyptr)) == EOF) fseek(keyptr,0L,SEEK_SET);
|
|
/* rewinds keyfile if at end */
|
|
|
|
datach=keych^ench; /* XOR's keybyte and encrypted byte
|
|
should insert own additional
|
|
manipulations here to be a
|
|
pain in the ass. Remember to
|
|
do the REVERSE of operations
|
|
as in JAM.C !! Experiment on copy
|
|
of this code only. */
|
|
|
|
if(argc==4) printf("%c",datach); /* onscreen if s option used in command
|
|
line */
|
|
|
|
if(argc==3) fputc(datach,outptr); /* put encrypted byte in output file
|
|
by default */
|
|
|
|
} /* end of while loop */
|
|
|
|
/* shut down and bail -- mission
|
|
accomplished, commander! */
|
|
|
|
fclose(inptr);
|
|
fclose(keyptr);
|
|
|
|
if(argc==3){
|
|
fclose(outptr);
|
|
printf(" Success! File %s is decrypted and called NEWFILE.TXT\n",
|
|
argv[1]);
|
|
printf(" Please remember to rename it accordingly (like realname.txt?)\n");
|
|
}
|
|
|
|
} /* end main */
|
|
|
|
-------------------------------- end of unjam.c ------------------------------
|
|
|
|
Short and simple, but good for most purposes. If you're a real hacker
|
|
badass you memorize all your text files an burn them. The rest of us slobs
|
|
have to make do with what we got to protect ourselves.
|
|
|
|
...... and now for something completely different....
|
|
|
|
Pat Robertson and other clowns on CBN (my favorite late-night comedy channel)
|
|
have been wetting themselves with joy at the trends in the Supreme court and
|
|
in Eastern Europe. Pat has a bunch of missionaries over there to bilk them of
|
|
their szlotys or rubles or whatever, and he's 'counting the hours' until Roe
|
|
vs. Wade is history. I love how most of these evangelists are against
|
|
abortion yet for capital punishment. A funny bit of hypocrisy I saw was when
|
|
Robertson went into a long speech on how the split of the soviet union can be
|
|
interpreted by the prophecies, etc. (even though it fit better as the 'evil
|
|
empire'), and how the world has few days left to it before the big ending,
|
|
and on and on. After the commercial break (the average attention span of
|
|
the audience) he talks about how the word of god can make your life better and
|
|
if you get his new series of tapes you can make wise long term investments
|
|
and prosper. He's got a lot of gall to spew damnation one minute and long
|
|
term investment the other. Whatta crock. He pushed his new book on his views
|
|
on the 'New World Order' and how the christians are going to be persecuted
|
|
like the jews in WWII if a world government takes place. He says abandoning
|
|
nationalism is too high a price to pay for peace. He may be right, but I
|
|
sure ain't gonna fork over $100.00 to get a copy of his book or go to the
|
|
bookstore and look for it. The way things are going, a guy like him will get
|
|
in office and the non-christians will be the abused group in future Amerikka.
|
|
|
|
You notice the lack of guest accounts on the nets lately? Lots of 'em shut
|
|
down due to pressure from admins or due to too much cpu useage. Thats too
|
|
bad, I enjoyed using them, especially the **.ai.mit.edu ones. Another score
|
|
for the repressive system. Like the DSS (digital switching systems) the phone
|
|
companies use a lot now. There is instant number ident and probably zilch
|
|
chance of any of those multi-colored boxes working again. Its the end of an
|
|
era. I hope somebody somewhere is industrious enough to infiltrate into the
|
|
baby bells to smuggle out some tech manuals on this beast so new phreakers
|
|
will be able to do more than play with voicemail. Dialouts are extremely
|
|
rare to find now, as they close up as fast as word leaks (surprise,surprise)
|
|
and organizations are going to more secure methods of remote access. There
|
|
is sure a lot of challenges out there now. I'm glad I'm not much more than
|
|
a dabbler, as the frustration would no doubt take its toll.
|
|
|
|
Thats about all, hope the encryption programs give you some use, even
|
|
if you just use them as examples for your own kind. Keep rockin', later.
|
|
|
|
-------- Warp 9 -----------------------*
|
|
|
|
|
|
P.S. I tried the programs out on a VAX using VMS as well. They didn't
|
|
carry the newline charachters for some reason, so the text, although ok,
|
|
is not properly spaced if using VAX. Stick to MSDOS if it does similar
|
|
things on your machine, or be creative and find out the whys to fix it.
|
|
-W9
|
|
|
|
GZ's note: I have not tested these programs at all, so use at your own
|
|
risk!!!
|
|
|
|
% % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % %
|
|
|
|
|
|
|
|
|
|
RECENT POLITICAL EVENTS IN NORWAY/EUROPE
|
|
==========================================
|
|
|
|
By Nosferatu of RAZOR 1911 <data3d@ahhs.no>
|
|
|
|
I'm writing this article out of total disgust with the overall political
|
|
situation generally in Europe, specifically in my country, Norway.
|
|
|
|
Problem: We are not members of the EC, the European economical Community,
|
|
the free-trade organization for all significant developed nations in Europe.
|
|
|
|
Cause: A bunch of isolationist farmers who are *VERY* heavily subsidized by
|
|
the government, and are worried that if foreign farmers can sell their stuff
|
|
in Norway, they might have to start working in order to compete. The group also
|
|
contains others who leech on the people in the same way, producing services
|
|
or goods in such an inefficient way that foreign competition will sweep them
|
|
off the market unless they are protected by protectionist toll and tax
|
|
systems. Unfortunately, this group is very simplistic in their argumentation,
|
|
and hence very persuasive to the average John and Joan Doe (in Norway we call
|
|
them Ola and Kari Nordmann). The main political parties in Norway (yes, we
|
|
have more than 2!) are all in favour of EC membership, and so are all the
|
|
leaders of major companies. The government (a socialist one, blaeh!) is trying
|
|
to make a trade agreement with the EC to augment the difficulties arising from
|
|
lack of EC membership for norwegian companies, and they have majority support
|
|
for this in 'Stortinget' - our version of Congress - but the 'no-parties'
|
|
(that have grown fat protesting about EC and appealing to people's emotions
|
|
rather than their reason) are saying 'no' to this trade agreement already
|
|
before there is even a rough sketch of it! Thus they are making large
|
|
difficulties for the government who are trying to make an acceptable treaty. I
|
|
liken their arguments (though I will not go into any arguments for or against
|
|
EC, they are so tedious) to the actions of the norwegian priest who mailed a
|
|
baby doll covered in blood to one of the royal family, in order to protest
|
|
against freedom to abortion.
|
|
|
|
I don't know why, but all this seems to come at the same time as a lot of
|
|
ethnic unrest in the rest of Europe - the Soviet Union fragmenting, the
|
|
various ethnic groups in Yugoslavia shooting at each other for reasons that
|
|
seem utterly irrelevant and illogical to me.
|
|
|
|
Anyway, this brings me to the gist of the article: This surge of territorialism
|
|
or egoism or a bunch of other isms is not confined merely to international or
|
|
even intranational, ethnical groups. Now Norway is built up of 19 'fylker' -
|
|
let's translate that to 'counties', shall we? Now the county where I live is
|
|
built up of 3 geographical areas. For some reason, the northern part has
|
|
lately been over-represented in the 'fylkesting' - County Congress, I suppose.
|
|
And the southern part was grossly under-represented. So, some bright minds here
|
|
in the south decided that this was not fair, and they'd start A NEW POLITICAL
|
|
PARTY to serve the interests of the southern part of the county. Actually,
|
|
TWO significant such parties were started for some reason. To start with,
|
|
most people looked upon these with something akin to humour. But the last
|
|
county-election, some weeks ago, saw these two parties get OVER 50% of the
|
|
votes in the major southern city. Disgusting, isn't it? Now elections are not
|
|
about political issues anymore (what should we improve, and how?) but
|
|
territorial haggling (In what district should we improve?).
|
|
|
|
What are the logical consequenses of this? Well, the northerners have no
|
|
parties dedicated to the furthering of northern interests, so they will be
|
|
dominated by the southerners. Until next election, that is. Then they will
|
|
retaliate, to end the domination. We'll get a system where the most populous
|
|
part of the county dominates the less populous ones.
|
|
|
|
But it doesn't stop there. In a communicipality in the west of the country,
|
|
composed of two small islands where about 2000 people live, some people from
|
|
the northern island started a political party dedicated to furthering their
|
|
own interests. Since the others had no such party, the northerners got the
|
|
mayor. The southerners, having divided the representants from their votes
|
|
among the political parties (as opposed to the territorial parties), will be
|
|
dominated by the northerners, who have not an outright majority, but has the
|
|
largest bloc.
|
|
|
|
At this election, we had only some isolated incidents, but they were *VERY*
|
|
successful. In the next election, which I await with horror and disgust, they
|
|
will most likely spread horribly. The parts of any community governed by a
|
|
single organ, will either have to be populous enough to assure themselves a
|
|
majority in this organ, or withdraw from that community and form their own
|
|
governing organ. But within that smaller community, someone from the eastern
|
|
part will form a party, thus reiterating the whole process... This way, in
|
|
a few years we will have about three million small parties (which is the
|
|
number of voters in Norway), each dedicated to furthering the interests of
|
|
a single person.
|
|
|
|
What is the point of having a nation if it is divided into countless small
|
|
factions just interested in themselves? Imagine this: In the US, at the
|
|
next presidential election, there are not just two candidates, one
|
|
republican and one democrat. There are 50 candidates, one from Texas, one
|
|
>from California, one from Utah, one from Montana, and so on... A chilling
|
|
scenario, isn't it? Well, it's what's happening in Europe. As of yet, it's
|
|
mainly confined to ethnical minorities, like in the Soviet Union, where
|
|
nobody wants to be associated with people of slightly different ancestry,
|
|
and indeed are attempting to kill them or drive them off what they consider
|
|
'their' land.
|
|
|
|
In Yugoslavia, Croatians don't want to be governed by a government that
|
|
includes Serbs, and the Serbs, having control of that government, do not want
|
|
it to lose power over the Croatians. So someone gets the brilliant idea to
|
|
start a war.
|
|
|
|
In Czheckoslovakia (probably wrong spelling) the Czhecks and the Slovaks
|
|
both want to form their own little nations.
|
|
|
|
How does this relate to the reunion of Germany? Well, the Germans are, of
|
|
course, all of the same race... But before long, I'll wager someone is
|
|
stupid enough to start 'The Party of Eastern (or Western!) Germany' or some
|
|
such thing, and actually be successful.
|
|
|
|
What is the cause of all this isolationism and recessionism? Two things:
|
|
On the local scale: Selfishness. In ethnic aggression: Xenophobia, fear
|
|
of anything that's different.
|
|
|
|
Well, some time has passed since I wrote that, and as of today, the trade
|
|
agreement (EXS) negotiatons are finished, and the agreement only lacks
|
|
ratification from each individual government. The treaty involves tax
|
|
reductions of international trade (within the EC and EFTA) of up to 70%.
|
|
No reductions on norwegian salmon though. Since Norway is likely to export
|
|
more fish than we import, we had to give the EC countries the right to take
|
|
up a quantity of fish in norwegian waters. Norwegian fishermen, of course,
|
|
went totally apeshit. In a nationwide action, they blockaded all of Norway's
|
|
commercial harbours for a day. Nice going! That will surely better their
|
|
lot - a whole lot! Ignoring that they now can sell their (stinking) fish
|
|
to the rest of Europe without being hassled by a lot of stupid and unnecessary
|
|
taxes, they grow angry because our government hands over a part of the fishing
|
|
rights to some people who accidentally do not live in the geographical area
|
|
people think of as 'Norway'. Incidentally, these people (and I'm sure the
|
|
fishermen think of them as 'degos') are capable of staying solvent, unlike
|
|
the norwegian fishermen who are almost as heavily subsidized as the farmers,
|
|
they can even travel large distances from their home ports to norwegian waters
|
|
and back again, and STILL make a profit. The norwegian fishing fleet can't.
|
|
|
|
Well, that's what EC and free trade are all about, sharing resources with
|
|
those best capable of utilizing them.
|
|
|
|
OK, I think I'd better stop now, because I've said my piece, and besides
|
|
this file is getting long (just passed 8K) and I wouldn't want GZ to cut
|
|
too much text (grin). Oh, and by the way, this file is in no way an unbiased
|
|
factual account, but I believe it to be, at least, factual. And the opinions
|
|
stated herein are not to be attributed to anyone but myself.
|
|
|
|
Nosferatu - October 23rd, 1991
|
|
|
|
|
|
_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_
|
|
|
|
|
|
Well, that's about it for ATI57!
|
|
A quick note: Hats off to channel 4, WNBC-TV News, New York,
|
|
for presenting a short series on their nightly news about "Killer
|
|
Taxes." This program spoke about the extreme hardship of the middle
|
|
class to live under a repressive tax system. The program cited that
|
|
middle-class taxpayers pay about 50% or more of their income in federal,
|
|
state, local, property, and sales taxes, and often have to resort to
|
|
going to community food banks just to get food to eat! Knowing that
|
|
federal, state and local governments eat up about 47% of our gross
|
|
national product, the plight of the midle class doesn't surpise me.
|
|
(tax revolt now!!!!)
|
|
|
|
CIAo (the root word is CIA - heh)
|
|
|
|
Ground Zero
|
|
|
|
. . . . . . . . . . . . . . . . .
|
|
|
|
ATI: part of George Bush's thousand points of light.
|
|
|
|
|