952 lines
43 KiB
Plaintext
952 lines
43 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun June 7, 1992 Volume 4 : Issue 25
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Associate Editor: Etaion Shrdlu, Jr.
|
||
Newest Authormeister: B. Kehoe
|
||
Arcmeister: Bob Kusumoto
|
||
Downundermeister: Dan Carosone
|
||
|
||
CONTENTS, #4.25 (June 7, 1992)
|
||
File 1--Detailed Summary of X-Press (Response to CuD 4.24)
|
||
File 2--Study of E-Mail/Computer-Mediated Communication
|
||
File 3--Major Congressional Candidates Commit to Elec. Civil Liberties
|
||
File 4--Internet Society Details
|
||
File 5--GEnie RTC with Hafner (Co-author of CYBERPUNK)
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie in the PF*NPC RT libraries, on
|
||
the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from
|
||
ftp.eff.org (192.88.144.4), chsun1.spc.uchicago.edu, and
|
||
ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail
|
||
with the subject "help" (without the quotes) to
|
||
archive-server@chsun1.spc.uchicago.edu. European distributor: ComNet
|
||
in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to
|
||
computer culture and communication. Articles are preferred to short
|
||
responses. Please avoid quoting previous posts unless absolutely
|
||
necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Fri, 5 Jun 92 04:48 EST
|
||
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
|
||
Subject: File 1--Detailed Summary of X-Press (Response to CuD 4.24)
|
||
|
||
In CUD #4.24, the transcript of Cisler's forum on Genie mentioned
|
||
X-Press. Here is a more detailed description of what X-Press is.
|
||
|
||
++++++++++++++++++++++++++++++
|
||
|
||
Excerpts from: "Connecting Your Computer to Cable TV
|
||
Doubles the Dimensions of Cyberspace"
|
||
by Michael E. Marotta
|
||
(originally published Aug 1991 by TELECOMPUTING, Albuq, NM)
|
||
|
||
X-PRESS Informations Services, Ltd., of Denver Colorado, makes it
|
||
possible for your home computer to receive and store news via cable
|
||
(or satellite) television. X-PRESS X-Change is their basic service;
|
||
they also sell an "executive" connection geared to businesses.
|
||
|
||
X-PRESS X-Change is a basic consumer information service provided by
|
||
cable television companies to personal computers. The service is a
|
||
constant stream of worldwide news, sports, and weather supplemented
|
||
with articles on lifestyle, shopping, and entertainment. Conferencing
|
||
with other users is also possible.
|
||
|
||
International news is the key feature of X-Change. In addition to the
|
||
Associated Press, there are nine other news feeds. Tass and Xinhua
|
||
send news in English from the USSR and China. English-language news
|
||
also comes from OPEC, Taiwan and Japan. NOTIMEX sends out news in
|
||
Spanish from Mexico. User can define up to 16 keywords for which the
|
||
computer will automatically scan. The results can be stored to disk
|
||
for later evaluation.
|
||
|
||
The service is generally compatible with IBM-PC, Apple // and
|
||
Macintosh, Atari and Amiga computers. It is most compatible with
|
||
IBM-PCs including the XT, AT and PC/2 lines. To run with an Apple //c
|
||
or //e, requires a super serial card. As you would expect, only the
|
||
Atari-ST series can be used and Amiga owners must have a 500, 1000 or
|
||
2000. This is a 16-bit service.
|
||
|
||
Also, there are some differences in the kinds of special features the
|
||
various kinds of personal computers will support. For example, all of
|
||
them will news and stock quotes and all can write news stories to disk
|
||
for future reference. However, only IBM, Atari and Amiga systems can
|
||
accept futures and options information.
|
||
|
||
To connect to X-Change, you buy an interface kit for $99.95. If your
|
||
cable television service already offers X-change there is no other
|
||
charge. Executive service costs $19.95 per month. The cost of the
|
||
modem is higher, also, $149.95. If your cable television provider
|
||
does not carry X-Change and doesn't want to, then you can use a
|
||
satellite dish. The signal comes from Galaxy-1 transponders 7 (WTBS)
|
||
and 18 (CNN) but you don't have to subscribe to these to use the
|
||
InfoCipher equipment. Via satellite the Executive service costs
|
||
$26.95 per month.
|
||
|
||
Both the Executive and basic products give you access to financial
|
||
information. For instance basic service includes the ability to track
|
||
128 symbols from 2000 securities. X-PRESS Executive provides quotes
|
||
on 30,000 securities. In addition, stocks, Treasury rates, CDs,
|
||
Broker Call Loans and foreign exchange rate, and selected metal prices
|
||
are also available. X-PRESS also provides software for tracking and
|
||
analyzing financial data. The output is compatible with Lotus 1-2-3.
|
||
|
||
Conferencing is also possible. X-PRESS clients can dial in via a
|
||
Tymnet 800 number. Users can read and post messages in several areas.
|
||
X-PRESS then selects messages to be posted on the television feeds.
|
||
The "Pen Pals" conference is popular with grade schoolers. High
|
||
school students benefit from a "Science and Technology" conference
|
||
that leans toward NASA activities. Thus, X-PRESS is basically a BBS
|
||
via cable television or satellite. Of necessity, the information flow
|
||
is generally one way, from X-PRESS to you.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri 53 Jun 1992 17:22:51 CST
|
||
From: Jim Thomas<tk0jut1@niu.bitnet>
|
||
Subject: File 2--Study of E-Mail/Computer-Mediated Communication
|
||
|
||
A novel study is being proposed by a number of participants of the
|
||
bitnet Computer-Mediated Communication (CMC) newsgroup. It may be the
|
||
first such study--done by researchers scattered around the world who
|
||
have never met--of its kind. The CMC forum focuses on academic
|
||
discussions related to the impact of computer and related technology
|
||
on forms, content, and structure of communication. Those interested
|
||
can subscribe by sending the command: JOIN CMC <name> to:
|
||
COMSERVE@RPIECS Here is a summary of the research:
|
||
|
||
++++++ original post follows +++++++
|
||
|
||
|
||
Date- Wed, 3 Jun 1992 19-19-00 IST
|
||
From- Sheizaf Rafaeli <KBUSR@HUJIVM1.BITNET>
|
||
Subject- E-Group study update
|
||
|
||
E-Groups study, outline #3, update
|
||
|
||
As promised, here is a short summary of what has happened (for those
|
||
tuning-in late):
|
||
|
||
It began with a discussion of the dynamics of discussions. David
|
||
Levine, of UC Berkeley, proposed a 'bad posts drive out good'
|
||
postulate, that ignited many of us. A group of us have agreed to
|
||
attempt a joint study of the longevity and process of e-group
|
||
discussions.
|
||
|
||
We are now doing two things:
|
||
|
||
1) Mobilizing: identifying participants and collecting 'pledges'.
|
||
2) Conceptualizing: identifying research questions and hypotheses,
|
||
with an eye toward a study or two.
|
||
|
||
There seem to be, in the works, two parallel efforts. One line of
|
||
inquiry will be qualitative. The purpose in this study will be an
|
||
in-depth analysis of the dynamics occuring within a list. Prof. Brenda
|
||
Danet will, I hope, fill in more details on this effort.
|
||
|
||
The second project is shaping up to be a content-analysis of a
|
||
representative sample of archived discussions, which may (later) be
|
||
linked to surveys of users, moderators, participant observations, etc.
|
||
Under discussion are the hypotheses such a data set can address.
|
||
|
||
The e-group content analysis is an attempt to quantify group behavior
|
||
(formation, cohesion, dispersal) on e-lists. The hypotheses suggested so
|
||
far predict sensitivity of the threads of discussion to combinations of
|
||
the following variables:
|
||
|
||
* Length of messages
|
||
* language of message
|
||
* presence and nature of subject header
|
||
* presence and nature of stylized signature
|
||
* writer status
|
||
* writer gender
|
||
* dependency on previous messages (posts)
|
||
* use of quotes from previous posts
|
||
* tone (sarcasm, information, plea, threat, support, 'lecture')
|
||
* use of questions, challenges
|
||
* extent of use of nonverbal cues in message
|
||
* presence of "flames"
|
||
* metacommunication, that is communication about communication
|
||
* personal interest vested in post
|
||
* reference to external communication sources
|
||
|
||
We intend to 'massage' these concepts into a workable codebook. If the
|
||
numbers of participants stay where they are right now, the onerous
|
||
nature of content analysis grunt work wont even be that bad. We should
|
||
be able to generate reliable data.
|
||
|
||
The codebook will then be used to content-analyze series of messages.
|
||
Hopefully, we will end up with enough data to identify threads of
|
||
discussions, and "communities" forming, lasting and/or disbanding.
|
||
Eventually, if this works, we'll have at least two products on our
|
||
hands:
|
||
|
||
a. a large data set all can dip into.
|
||
b. the experience of having collaborated without meeting.
|
||
|
||
I believe either of the two is good enough reason to try.
|
||
|
||
Under discussion, currently, are:
|
||
|
||
1) Hypotheses and research questions.
|
||
2) Items for inclusion in the codebook.
|
||
3) Individual lists for inclusion in the sample,
|
||
or - alternatively - a method for selecting lists.
|
||
|
||
|
||
Nothing is set in stone yet. It is all, literally, bits in the wind. So
|
||
join in, Please!
|
||
|
||
|
||
|
||
Sheizaf Rafaeli
|
||
Hebrew University of Jerusalem
|
||
sheizafr@shum.huji.ac.il
|
||
or KBUSR@HUJIVM1
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 1 Jun 92 10:59:51 PDT
|
||
From: jwarren@AUTODESK.COM(Jim Warren)
|
||
Subject: File 3--Major Congressional Candidates Commit to Elec. Civil Liberties
|
||
|
||
Five Leading San Francisco Peninsula Congressional Candidates Sign
|
||
Explicit Commitments to Protect "Electronic Civil Liberties"
|
||
|
||
All but one of the six leading candidates for California's 14th
|
||
Congressional District have formally committed to protect traditional
|
||
constitutional liberties against technological threats. All three
|
||
Republican candidates and two of the three leading Democratic
|
||
candidates signed formal commitments.
|
||
|
||
The 14th District covers northern "Silicon Valley" and the southern
|
||
half of the San Francisco Peninsula.
|
||
|
||
This is believed to be the first time that major-party congressional
|
||
candidates have ever committed to explicit action to protect
|
||
technology-related civil liberties.
|
||
|
||
The candidates' signed statements that were much more than
|
||
nice-sounding, equivocating "God, mother and apple-pie" principles.
|
||
They made explicit commitments to take explicit action in their
|
||
first/next term in Congress.
|
||
|
||
Those 14th Dist candidates who signed the formal statement (below)
|
||
included:
|
||
Dixon Arnett (R), Tom Huening (R), Ted Lempert (D),
|
||
Tom Nolan (D), Mike Maibach (R) and Chuck Olson (L).
|
||
|
||
Gerry Andeen (D) sent a statement about the issues, but made NO
|
||
COMMITMENTS.
|
||
|
||
Anna Eshoo (D) FAILED TO RESPOND AFTER FOUR REQUESTS, as did
|
||
then-candidate James Blackman (D), after three requests. The multiple
|
||
requests were faxed and mailed to the candidates between Apr. 4th and
|
||
Apr. 13th, along with an explanatory cover letter.
|
||
|
||
Lempert was the first to respond -- apparently by return mail -- and
|
||
added a two-page statement regarding technological threats to personal
|
||
privacy and his commitment to seek protection against them, as well.
|
||
|
||
Arnett's response also noted that he was one of the cosponsors of
|
||
the Privacy Section that was added to the California Constitution
|
||
during his tenure in the state Assembly.
|
||
|
||
In addition, ten other Libertarian candidates signed the formal
|
||
statement, apparently circulated by Libertarian activists, primarily
|
||
using the computer nets. Those signing included:
|
||
Alan F. Barksdale (U.S. Senate from Alabama),
|
||
Richard Boddie (U.S. Senate from California),
|
||
James Elwood (8th House Dist from California),
|
||
June R. Genis (U.S. Senate from California),
|
||
Robert D. Goodwyn (22nd California State Assembly Dist),
|
||
Chuck Hammill (47th California State Assembly Dist),
|
||
James J. Ludemann (California State Assembly),
|
||
George L. O'Brien (12th House Dist from California),
|
||
Anton Sherwood (12th California State Assembly Dist),
|
||
Mark Valverde (13th California State Assembly Dist) and
|
||
Will Wohler (3rd California State Senate Dist).
|
||
|
||
Note: This Libertarian sign-up resulted entirely from one copy
|
||
being sent by electronic-mail to June Genis (San Mateo County) and one
|
||
to Mark Hinkle (Santa Clara County activist).
|
||
|
||
Several others responded without committing to action:
|
||
|
||
U.S. Senate candidate Tom Campbell (R) also sent a statement about
|
||
the issues, but offered NO COMMITMENTS TO EXPLICIT ACTION, as did
|
||
Glenn Tenney (D, 12th House).
|
||
|
||
This effort was an outcome of disclosures before and during the
|
||
First Conference on Computers, Freedom & Privacy, held near San
|
||
Francisco International Airport in March, 1991. It drew over eighty
|
||
pages of public and trade press coverage, internationally.
|
||
|
||
This is the statement that was signed by the indicated candidates:
|
||
|
||
Guaranteeing Constitutional Freedoms into the 21st Century
|
||
|
||
Preface
|
||
|
||
Harvard Law Professor Laurence H. Tribe, one of the nation's
|
||
leading Constitutional scholars, views technological threats to our
|
||
traditional constitutional freedoms and protections as so serious that --
|
||
for the first time in his career -- he has proposed a Constitutional
|
||
Amendment:
|
||
|
||
"This Constitution's protections for the freedoms of speech,
|
||
press, petition and assembly, and its protections against unreasonable
|
||
searches and seizures and the deprivation of life, liberty or property
|
||
without due process of law, should be construed as fully applicable
|
||
without regard to the technological method or medium through which
|
||
information content is generated, stored, altered, transmitted or
|
||
controlled."
|
||
|
||
-- First Conf. on Computers, Freedom & Privacy, 3/27/91, Burlingame CA
|
||
|
||
In the absence of such a constitutional clarification, legislation
|
||
and regulation are the only alternatives to assure that citizens are
|
||
protected from technological threats against their constitutional
|
||
rights and freedoms.
|
||
|
||
|
||
Candidate's Commitment to Action
|
||
|
||
Preface: It has been over two centuries since our Constitution
|
||
and Bill of Rights were adopted. The great technological changes in
|
||
the interim --especially in computing, telecommunications and
|
||
electronics -- now pose a clear and present danger to the rights and
|
||
protections guaranteed in those great documents. Therefore:
|
||
|
||
Commitment: In the first legislative session after I am
|
||
[re]elected, I will author or co-author legislation reflecting the
|
||
following specifics, and I will actively support and testify in favor
|
||
of any similar legislation as may be introduced by others. Further, I
|
||
will actively seek to include in such legislation, explicit personal
|
||
civil and/or criminal penalties against any agent, employee or
|
||
official of the government who violates any of these statutes. And
|
||
finally, I will keep all citizens who express interest in legislative
|
||
progress on these matters fully and timely informed.
|
||
|
||
The protections guaranteed in the Constitution and its Amendments
|
||
shall be fully applicable regardless of the current technology of the
|
||
time. This particularly includes, but is not limited to:
|
||
|
||
Speech: Freedom of speech shall be equally protected, whether by
|
||
voice or in written form as in the 18th Century, or by electronic
|
||
transmission or computer communication as in the 20th Century and
|
||
thereafter.
|
||
|
||
Press: Freedom of the press shall be equally protected, whether
|
||
its information is distributed by print as in the 18th Century, or by
|
||
networked computers or other electronic forms, as in the 20th Century
|
||
and thereafter. Liability for content: Just as a printer is not
|
||
liable for content of leaflets printed for a customer, so also shall
|
||
the owner or operator of a computer or electronic or
|
||
telecommunications facility be held harmless for the content of
|
||
information distributed by users of that facility, except as the owner
|
||
or operator may, by contract, control information content. Those who
|
||
author statements and those who have contractual authority to control
|
||
content shall be the parties singularly responsible for such content.
|
||
|
||
Assembly: Freedom of assembly shall be equally protected, whether
|
||
by face-to-face meeting as in the 18th Century, or by computer-based
|
||
electronic-conference or other teleconference as in the 20th Century
|
||
and thereafter. The right to hold confidential meetings shall be
|
||
equally protected, whether they be by personal meeting in private
|
||
chambers, or by computer-assisted or electronic-based means.
|
||
|
||
Self-defense: The right of the people to keep and use computers
|
||
and communications connections shall not be abridged by the
|
||
government.
|
||
|
||
Search & seizure: The right of the people to be secure in their
|
||
papers and effects, against unreasonable searches and seizures, shall
|
||
be fully applicable to their electronic mail, computerized information
|
||
and personal computer systems.
|
||
|
||
Warrants: No warrants for search or seizure shall issue for
|
||
computerized information, but upon probable cause, supported by oath
|
||
or affirmation, and particularly describing the computer system to be
|
||
searched and the specific information to be seized.
|
||
|
||
Secure information vaults: Just as search and seizure of letters in a
|
||
post-office, and papers in a bank-vault lock-box, and surveillance of
|
||
telephone conversations by wire-tap, each require a separate warrant
|
||
for each postal address, lock-box and telephone line, so also shall a
|
||
separate warrant be required for each electronic-mail address and/or
|
||
computer files of each suspect, when stored in a computer facility or
|
||
archive shared by others. And further, computer files stored in a
|
||
shared facility or archive by or for a citizen who is neither named in
|
||
a warrant nor associated with a suspect so-named, may not be used
|
||
against that un-named citizen, if seized or discovered during legal
|
||
search of or for files of a suspect.
|
||
|
||
Self-incrimination: No person shall be compelled in any civil or
|
||
criminal case to be a witness against himself or herself, nor be
|
||
compelled to provide information retained only in their mind, nor
|
||
otherwise be compelled to assist the translation or decoding of
|
||
information that he or she believes may be self-incriminating.
|
||
|
||
Property: Private property shall not be taken for public use without
|
||
just compensation, nor shall such property be used nor sold by any
|
||
government agency for less than fair market value, in which case all such
|
||
proceeds shall promptly derive singularly to its last owner prior to
|
||
government seizure.
|
||
|
||
Speedy release: Anyone not accused of a crime shall enjoy the
|
||
right to a speedy release and return of all of their property, as may
|
||
be seized under any warrant, particularly including their computerized
|
||
information. The government shall be fully liable for any damage
|
||
befalling property or information they have seized.
|
||
|
||
|
||
[ Additional copies of this model candidate's position commitment are
|
||
available from:
|
||
Jim Warren, Electronic Democracy Initiatives,
|
||
345 Swett Road, Woodside CA 94062; (415)851-7075, fax/(415)851-2814;
|
||
electronic-mail/ jwarren@autodesk.com -or- jwarren@well.sf.ca.us
|
||
For identification purposes, only: organized and chaired the First
|
||
Conference on Computers, Freedom & Privacy (3/91), received one of the
|
||
Electronic Frontier Foundation's first Pioneer Awards (3/92), is a
|
||
"futures" columnist for MicroTimes, an Autodesk Board member, the founder
|
||
of InfoWorld, PBS-TV "Computer Chronicles" founding host, etc. ]
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 2 Jun 1992 17:54:44 GMT
|
||
From: NEELY_MP@DARWIN.NTU.EDU.AU(Mark P. Neely, Northern Territory Univ.)
|
||
Subject: File 4--Internet Society Details
|
||
|
||
Details of the Internet Society for the readers of CuD:-
|
||
|
||
>From: Geoff Huston <G.Huston@aarnet.edu.au
|
||
|
||
>The Internet Society Newsletter is a publication of the Internet
|
||
>Society, sent to members of the Internet Society free of charge.
|
||
|
||
>To receive a subscription you need to join the Internet Society
|
||
>as a personal member. Regular membership is $70 US p.a. and
|
||
>student membership is $25 US p.a. The Internet Society is a
|
||
>non-profit professional society whose objective
|
||
>is facilitate and support the technical evolution of the
|
||
>Internet as a research and education infrastructure.
|
||
|
||
>To join send you details (name, address, email) to the Internet
|
||
>Society at
|
||
>isoc@nri.reston.va.us
|
||
|
||
>cheers
|
||
|
||
>Geoff Huston
|
||
|
||
------------------------------
|
||
|
||
Date: 30 May 92 21:08:09 EDT
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 5--GEnie RTC with Hafner (Co-author of CYBERPUNK)
|
||
|
||
______________________________________________________
|
||
| |
|
||
| The Public Forum * NonProfit Connection RoundTable |______
|
||
|______________________________________________________| |
|
||
| Sysops' GE Mail: PF$ RTC Sunday 9pm EDT: MOVE 545;2 |______
|
||
|___________________________________________________________| |
|
||
| News, Current Events, Government, Societal Issues, Nonprofits |
|
||
|________________________________________________________________|
|
||
|
||
Real-time Conference on Cyberpunk
|
||
with
|
||
Katie Hafner
|
||
(May 24, 1992)
|
||
====================================================================
|
||
|
||
(C) 1992 by GEnie (R) and Public Forum*NonProfit Connection
|
||
|
||
This file may be distributed only in its entirety
|
||
and with this notice intact.
|
||
|
||
|
||
CYBERPUNK: Outlaws and Hackers on the Computer Frontier has intrigued
|
||
everyone from William (Neuromancer) Gibson to Mitch (Lotus Development)
|
||
Kapor.
|
||
|
||
On May 24 at 9pm ET, author Katie Hafner joined us to talk about the
|
||
social consequences of computer networks and the communities that have
|
||
grown up around them. The government has both raided local BBSs and
|
||
solicited proposals for a "weaponized virus." What rules of the road
|
||
would you make for computer networks? Former news editor of Data
|
||
Communications magazine, Katie was correspondent for Business Week
|
||
specializing in technology and computers. A graduate of the University
|
||
of California at Santa Barbara, with an M.A. from Columbia University
|
||
School of Journalism, she's now working on a book about German
|
||
reunification. The New York Times' John Markoff is co-author of
|
||
Cyberpunk.
|
||
|
||
This RTC is the third in the Public Forum's month-long program on
|
||
Technology and Society. Our next RTC is May 31. And don't miss lively
|
||
discussion of Science, Technology and Society in bulletin board category
|
||
7, and check out the files on technology and society in our library.
|
||
See Cat 7/Topic 1 for details.
|
||
|
||
An electronic meeting place for friends, family and national "town
|
||
meetings," GEnie is an international online computer network for
|
||
information, education and entertainment. For under $5.00/month, GEnie
|
||
offers over 50 special interest bulletin boards and unlimited electronic
|
||
mail at no extra charge during evenings, weekends and holidays. GEnie is
|
||
offered by GE Information Services, a division of General Electric
|
||
Company.
|
||
|
||
In the Public Forum*NonProfit Connection, thousands of people every day
|
||
discuss politics and a wide range of social and nonprofit issues. A
|
||
neutral arena for all points of view, the PF*NPC is presented by Public
|
||
Interest Media, a nonprofit organization devoted to empowering people
|
||
through the socially productive use of information and communication
|
||
technology. For more information about GEnie or the Public Forum, call
|
||
1-800-638-9636 or send electronic mail to tsherman@igc.org.
|
||
|
||
To sign up for GEnie service, call (with modem in HALF DUPLEX)
|
||
800-638-8369. Upon connection, type HHH. At the U#= prompt, type
|
||
XTX88367,GENIE <RETURN>. The system will prompt you for information.
|
||
|
||
====================================================================
|
||
|
||
__________________________________________________________
|
||
-=(( The Public Forum * NonProfit Connection RoundTable ))=-
|
||
-==((( GEnie Page 545 - Keywords PF or NPC )))==-
|
||
-=((__________________________________________________________))=-
|
||
|
||
|
||
|
||
<SHERRY.PF> I'd like to welcome everyone to the RTC. Katie, why
|
||
don't you say a few words and introduce yourself.
|
||
|
||
<[Katie] PRESS11> let's see... john markoff (my husband) and i wrote
|
||
cyberpunk over a period... of about three years and
|
||
it came out last summer. but the book isn't cheap, so
|
||
luckily, the papberback is coming out next month
|
||
let's see...what else?....oh yes, now i'm living in
|
||
berlin... most of the time, working on a second book.
|
||
|
||
<SHERMAN> Let me explain the process here . . . Before we get
|
||
started, a word about the process . . . At the
|
||
beginning, only Katie and people asking questions
|
||
will be able to talk so that everyone gets a turn . .
|
||
If you have a question, type /RAI to raise your
|
||
hand. I'll call on you in order. Please type your
|
||
question, but DON'T hit <return> to send it. When
|
||
you're called on, THEN hit <return> to send your
|
||
question quickly . . . so we'll have time for more
|
||
questions . . . It's good to use three periods if you
|
||
have more to say and to put GA for "go ahead" at the
|
||
end of a final phrase . . . So let's see those
|
||
/RAIsed hands and I'll start calling on you! GA
|
||
|
||
<[Darryl] D.JENT> Katie, did you actually meet Kevin Mitnick & the
|
||
others in your book ga
|
||
|
||
<[Katie] PRESS11> yes. i met everyone in the book. the only one who
|
||
didn't cooperate with the book was kevin... kevin is
|
||
the hacker we wrote about in the first section of the
|
||
book... a member of an l.a. gang of phone phreaks and
|
||
hackers called the roscoe gang... he wanted to be
|
||
paid to talk to us, and i explained to him (and his
|
||
grandmother, who was working as his agent...) that
|
||
journalists, for obvious ethical reasons, do not (if
|
||
they're good journalists, that is)... pay sources fo
|
||
information.
|
||
|
||
<[Gene] G.STOVER> When do you think cyberspace will be available to the
|
||
general public? What part will NREN and ISDN play in
|
||
this? <ga>
|
||
|
||
<[Katie] PRESS11> it already is... the more bandwidth, the more
|
||
cyberspace! ga
|
||
|
||
<SHERMAN> After a few more people have had a chance to ask
|
||
questions . . . I'll give everyone a second or third
|
||
or fourthchance . . . <grin> Richard, your question?
|
||
|
||
<[Richard] R.GILLIAM3> Who was the publisher for each edition?
|
||
|
||
<[Katie] PRESS11> simon & schuster did the hardcover, and an imprint of
|
||
S&S... called Touchstone is doing the paperback. ga
|
||
|
||
<[Richard] R.GILLIAM3> Who was your editor at the publishing house. (Sorry
|
||
for my unfamiliarity with the commands)
|
||
|
||
<[Katie] PRESS11> my editor? a very nice guy who doesn't know a lot
|
||
about technology named Bob Bender ga
|
||
|
||
<SHERRY.PF> Katie, I read _The Cuckoo's Egg_, and was fascinated
|
||
-- and appalled. Have The Powers That Be become any
|
||
more security conscious, or at least any more willing
|
||
to listen in the event something like that happens
|
||
again?
|
||
|
||
<[Katie] PRESS11> it's still pretty bad, security-wise out there...
|
||
there are lots of loopholes. everywhere. ga
|
||
|
||
<[2] eric] E.SHCHNEIDER> did he give you permission to write about him ..... m
|
||
|
||
<[Katie] PRESS11> no. no one gave us permission. we're journalists, not
|
||
movie producers. ga
|
||
|
||
<[Andrea] A.DUDA> We read about the really sensational cases of
|
||
hackers. How much of a problem are they overall? And
|
||
in trying to limit their activities, do we lose more
|
||
than we gain (since we limit other, legitimate, users
|
||
as well)?
|
||
|
||
<[Katie] PRESS11> i think that the press reports that blow the hacking
|
||
incidents out of proportion.... do a real disservice
|
||
to society... that is, i think that now the public at
|
||
large has an exaggerated fear of hackers. in the
|
||
book... we tried to write very realistically about
|
||
what really happened... and i do think that we're
|
||
treading aline between restricting access too much
|
||
and leaving systems too wide open. ga
|
||
|
||
<[Darryl] D.JENT> Katie, What was your feelings about the chaos club in
|
||
Germany?
|
||
|
||
<[Katie] PRESS11> i like them a lot... they're very different from
|
||
hackers in the united states, and that was kind of
|
||
interesting...
|
||
|
||
<[Darryl] D.JENT> How much of their activities did you get to witness
|
||
ga
|
||
|
||
<[Katie] PRESS11> wau holland, the founder of chaos, is an old 60's
|
||
radical, and a liberatarian who's categorically
|
||
opposed to authority ga
|
||
|
||
<[Tom] SHERMAN> Katie, did you see Darryl's second qeustion -- how
|
||
much of their activities did you get to witness?
|
||
|
||
<[Katie] PRESS11> oops. sorry... yeah. i hung out with pengo in berlin
|
||
for several weeks... and of course i witnessed quite
|
||
a bit... he was good (at hacking, that is), but more
|
||
of a talker, really, than anything else... the really
|
||
talented one in that group was probably markus hess,
|
||
the one who was in the berkeley computers and who
|
||
gave cliff stoll such a heart attack... and in the
|
||
end, they all got scared and ratted on each other and
|
||
three of them went to jail (well, hess's parents
|
||
bailed him out) ga
|
||
|
||
<[Tom] SHERMAN> Katie, who do you think is going to draw that line
|
||
between too little restriction and too much? What
|
||
role does the public play? ga
|
||
|
||
<[Katie] PRESS11> i guess we have to draw the line... i mean, we are
|
||
all sitting in cyberspace right now, and we're pretty
|
||
much respecting the rules of the road... and if we
|
||
want to keep the feds from telling us what we can and
|
||
cannot do in cyberspace then we have to come up with
|
||
rules that are acceptable to us and to them. ga
|
||
|
||
<[Andrea] A.DUDA> How do you think the "rules of the road" will change
|
||
when commercial firms become more evident with NREN?
|
||
Are they more concerned about security than
|
||
universities, etc.?
|
||
|
||
<[Katie] PRESS11> in a way it's too bad because anything that goes
|
||
commercial takes on a formal flavor that can be
|
||
restrictive... but that's not always the case... but
|
||
yes, they are concerned about security, particularly
|
||
because of all the security firms out there telling
|
||
them they should be. ga
|
||
|
||
<[Andrea] A.DUDA> One of the things I like about the Internet is being
|
||
able to go to various computers for information. Do
|
||
you think the whole system will become more
|
||
restrictive to accommodate the commercial firms?
|
||
|
||
<[Katie] PRESS11> new technology such as cryptography... will tend to
|
||
make commercialization work because it will make
|
||
breaking into systems more difficult. ga
|
||
|
||
<[Tom] SHERMAN> Katie, would you say something about the differences
|
||
between European and US regulations governing
|
||
security and privacy -- and the potential for
|
||
problems with the European Community?
|
||
|
||
<[Katie] PRESS11> the europeans have always (like in all things) been a
|
||
little bit behind the u.s.... in hacking laws. the
|
||
most interesting thing about it is that as soon as a
|
||
country makes it illegal to break into computers...
|
||
then the hacking drops precipitously (or maybe the
|
||
underground goes deeper)... the international folks
|
||
at the ec are already trying to come up with uniform
|
||
laws governing computer security throughout the
|
||
european community. yawn. ga
|
||
|
||
<[Phillip] P.MAY2> katie, do you feel there is a greater potential for
|
||
abuse of systems from "insiders", i.e. employees of
|
||
companies who implement the systems, or outsiders
|
||
like those described in you r book .? ga
|
||
|
||
<[Katie] PRESS11> of course there is... it's pretty widely known that
|
||
almost all of the white-collar crime out there that
|
||
uses computers and is most expensive to business is
|
||
committed by insiders... but companies get very
|
||
embarrassed by that... and they tend not to report
|
||
those crimes... they'd rather report crimes that seem
|
||
to be committed by juvenile delinquents... not their
|
||
own people! ga
|
||
|
||
<[Darryl] D.JENT> What is nren & Katie what is the new book about. More
|
||
hackers or what?... I loved your first book, read it
|
||
in two days ga
|
||
|
||
<[Katie] PRESS11> national research and education network, designed to
|
||
send data above a gigabit... and tie all the nation's
|
||
supercomputer centers together and it's federally
|
||
funded. the book i'm working on now... is about a
|
||
particular house in gemrany. just over the glienicker
|
||
bride (where all the spies used to be exchanged)...
|
||
in berlin. nothing to do with computers.
|
||
|
||
<[Tom] SHERMAN> Darryl, check out the article from the Whole Earth
|
||
Review about data highways; it's in our file library
|
||
(with permission, of course :-) Darryl, follow up
|
||
question?
|
||
|
||
<[Darryl] D.JENT> Sounds interesting still, I'll thanks
|
||
|
||
<[Richard] R.GILLIAM3> Stock exchanges and currency exchanges are close to
|
||
24 hour world-wide operation. How possible will it be
|
||
for insiders to undetectable manipulate the
|
||
markets?GA
|
||
|
||
<[Katie] PRESS11> quite possible. have you heard about the $170
|
||
million or so that disappeared mysteriously from
|
||
volkswagen's books?... this happened a few years
|
||
ago. ga
|
||
|
||
<[Richard] R.GILLIAM3> No. I haven't heard the VW story. I think the
|
||
potential for financial hacking is enormous GA
|
||
|
||
<[Katie] PRESS11> i think you're absolutely right... and i think we
|
||
(the public) only hear about a very small fraction of
|
||
the stuff that goes on. ga
|
||
|
||
<[Tom] SHERMAN> Before we move into open discussion, I want to take a
|
||
second to . . . thank all of you for your question
|
||
and, especially, . . . to thank Katie for joining us!
|
||
|
||
<[Katie] PRESS11> it was fun! sorry about all my typing blunders :-)
|
||
|
||
<[Tom] SHERMAN> And now for the winners of our contest . . . Thanks
|
||
to Simon & Schuster, the publishers of CYBERPUNK, for
|
||
donating four copies of the book to our contest
|
||
winners. Thanks to everyone for submitting such
|
||
imaginative entries!. . . The envelope please . . .
|
||
|
||
For the best scenarios describing constructive uses
|
||
of hacking, T.CAMPBELL11 and M.VANCE1. And for
|
||
destructive uses, S.CURTISIII1 and D.TAMPLIN.
|
||
Congratulations to Tim, Vance, Stan and David! I'll
|
||
now open the room so that all of us can type . . .
|
||
|
||
<[Tom] SHERMAN> No one counts typing blunders, Katie, not in here!
|
||
|
||
<[Richard] R.GILLIAM3> RTC spell-checkers. The next cyber-frontier! <g>
|
||
|
||
<[Andrea] A.DUDA> Are the contest winners all in one place where we can
|
||
read them?
|
||
|
||
<[Tom] SHERMAN> Yes, the contest entries are in Cat 7/Topics 16 and
|
||
17, except . . . for one that was sent by e-mail
|
||
because the author thought it too dangerous to post
|
||
in public
|
||
|
||
<[Tom] SHERMAN> Katie, what do you think about the FBI's interest in
|
||
legislation requiring the phone companies to make
|
||
digital phone transmission accessible to them? (Did
|
||
you see Marc and Janlori on Koppel's program the
|
||
other night?)
|
||
|
||
<[Katie] PRESS11> it's the stupidest thing i've ever heard of. it will
|
||
never work... people will just buy cheap encryption.
|
||
|
||
<[Darryl] D.JENT> Katie, have you meet meet William Gibson & How
|
||
surprised are you at the way his books have become
|
||
reality?
|
||
|
||
<[Tom] SHERMAN> Hmmm, say a little more about that, would you?
|
||
|
||
<[Katie] PRESS11> i've talked to him on the phone. i'd like to meet
|
||
him, though. he's extremely tall, i hear ... but what
|
||
part has become reality? ga
|
||
|
||
<[Fomalhaut] J.PAXSON> Darryl, pray that the world itself does not become
|
||
that horrible.
|
||
|
||
<[Katie] PRESS11> you're not kidding.
|
||
|
||
<[Darryl] D.JENT> I was meaning the way virtual reality is shaping
|
||
|
||
<[Darryl] D.JENT> Most of what I've read about VR lately was in his
|
||
books
|
||
|
||
<[Fomalhaut] J.PAXSON> I've had some success with virtual reality using
|
||
x-specs and stereo headphones.
|
||
|
||
<[Richard] R.GILLIAM3> Experiment surgery has been done for the hearing
|
||
impaired, wiring the bones between the ear and the
|
||
brain so that some sound can be heard. This is, I
|
||
suggest, a rudimentary form of the cyber-wiring that
|
||
is certain to come.
|
||
|
||
<[Tom] SHERMAN> Richard, will they just wire digital jacks where our
|
||
ears used to be?
|
||
|
||
<[Katie] PRESS11> that's been done for the blind, too.
|
||
|
||
<[Andrea] A.DUDA> Interesting thought, Richard. Imagine what happens if
|
||
someone messes with that!
|
||
|
||
<SHERRY.PF> I heard that on a talk show just this morning,
|
||
Richard!
|
||
|
||
<[Richard] R.GILLIAM3> Yes, Tom. Expect that eventually it will be done by
|
||
radio receivers, not wires.
|
||
|
||
<[Tom] SHERMAN> Will there be an OFF switch?
|
||
|
||
<[Richard] R.GILLIAM3> Let's hope so, Tom
|
||
|
||
<SHERRY.PF> That'll depend on whether or not we end up in 1984 or
|
||
Brave New World.
|
||
|
||
<[Tom] SHERMAN> Is this what Gene meant when he said we'd all be on
|
||
the network?
|
||
|
||
<[Darryl] D.JENT> Katie, what is the wildest computer lab you have
|
||
visited as far as technologically advanced?
|
||
|
||
<[Richard] R.GILLIAM3> I've often thought it was just a question of who got
|
||
us first---the cyberpunks or the genetic engineers.
|
||
Eventually it will be both.
|
||
|
||
<[Katie] PRESS11> it's a toss-up between the media lab and xerox parc
|
||
|
||
<[Darryl] D.JENT> It that the media lab at MIT?
|
||
|
||
<SHERRY.PF> Is that Xerox in Leesburg, VA?
|
||
|
||
<[Katie] PRESS11> yeah, and xerox parc in palo alto
|
||
|
||
<SHERRY.PF> I haven't been to Palo Alto, but I've been to
|
||
Leesburg. It's pretty wild too. ;)
|
||
|
||
<[Darryl] D.JENT> hAVE YOU MET mARVIN mINSKY at MIT, He has wrote some
|
||
wild books about the brain & AI
|
||
|
||
<[Katie] PRESS11> yes. he's a wild guy. you should meet his daughter
|
||
|
||
<[Darryl] D.JENT> Tom, I didn't get a chance to, but will I loved his
|
||
book Society of the Mind.
|
||
|
||
<[Katie] PRESS11> i've never read that.
|
||
|
||
<[Darryl] D.JENT> It's about using Artificial Intelligence & trying to
|
||
mimic the brain
|
||
|
||
<[Darryl] D.JENT> About how the easiest things we do as humans are the
|
||
hardest to get a computer to do.
|
||
|
||
<[Tom] SHERMAN> Katie's already stayed longer than I asked and so . .
|
||
I want to thank her again for joining us and . . . to
|
||
remind all of you that Jerry Berman, formerly of the
|
||
ACLU and now . . . head of the D.C. office of the
|
||
Electronic Frontier Foundation will . . . be our
|
||
guest next Sunday! . . . Do join us and, during the
|
||
week, . . . take a minute to add your thoughts to our
|
||
bulletin board discussion about . . . technology and
|
||
society in Category 7 . . . All of you . . . are
|
||
welcome to stay as long as you like. Katie. thanks
|
||
again!
|
||
|
||
<[Darryl] D.JENT> Such as moving Thanks, Katie, will have to read your
|
||
new book. Good luck
|
||
|
||
<[Richard] R.GILLIAM3> Thanks Katie, Tom. Enjoyed the RTC. Looking forward
|
||
to visiting again.
|
||
|
||
<SHERRY.PF> You can get to the PF*NPC bulletin board on page
|
||
8011;1 -- it's a Basic service.
|
||
|
||
|
||
-----# Participants #-----
|
||
|
||
<[Andrea] A.DUDA>
|
||
<[Darryl] D.JENT>
|
||
<[Dave] D.THOMPSON74>
|
||
<[2] eric] E.SHCHNEIDER>
|
||
<[Gene] G.STOVER>
|
||
<[Fomalhaut] J.PAXSON>
|
||
<J.PRESLEY1>
|
||
<[Lamont] L.INGALLS>
|
||
<MCFARMER>
|
||
<[Phillip] P.MAY2>
|
||
<[Katie] PRESS11>
|
||
<[Richard] R.GILLIAM3>
|
||
<[Tom] SHERMAN>
|
||
<SHERRY.PF>
|
||
<[Tom] T.BARKER6>
|
||
|
||
__________________________________________________________________
|
||
| Rights & responsibilities, government, politics, minority civil |_
|
||
| rights, volunteerism, nonprofit management, the media, the | |
|
||
| environment, international issues, gay/lesbian/bisexual issues, | |
|
||
| women & men, parenting, youth organizations and more! | |
|
||
|__________________________________________________________________| |
|
||
|__________________________________________________________________|
|
||
|
||
________ PF$ PF*NPC Sysops _____________
|
||
| |_ | Weekly RTC: |_
|
||
| The | | SHERMAN Tom Sherman | 9pm Eastern | |
|
||
| PF*NPC | | SCOTT Scott Reed | on Sundays! | |
|
||
| Staff: | | CHERNOFF Paul Chernoff | Type M545;2 | |
|
||
|________| | GRAFFITI Ric Helton |_____________| |
|
||
|________| SHERRY Sherry |_____________|
|
||
|
||
__________________________________________________________
|
||
-=(( The Public Forum * NonProfit Connection RoundTable ))=-
|
||
-==((( GEnie Page 545 - Keywords PF or NPC )))==-
|
||
-=((__________________________________________________________))=-
|
||
|
||
|
||
|
|
||
| This listing was generated by LRTC Version 1.00
|
||
| (C)opyright by Hartmut W. Malzahn, 1991. All rights reserved.
|
||
|
|
||
|
||
# # #
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.25
|
||
************************************
|
||
|
||
|
||
|