922 lines
45 KiB
Plaintext
922 lines
45 KiB
Plaintext
Computer underground Digest Sun Jan 23 1994 Volume 6 : Issue 09
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe (Improving each day)
|
|
Acting Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Coppice Editor: P. Bunyan
|
|
|
|
CONTENTS, #6.09 (Jan 23 1994)
|
|
File 1--Brendan's mom thanks the Net
|
|
File 2--"The Prisoner: Phiber Optik Goes Directly to Jail"
|
|
File 3--Letter of Concern in Amateur Action BBS Procedures
|
|
File 4--Some thoughts on censorship (Re Am. Action "Porn" Raid)
|
|
File 5--Lobby the Feds via PC
|
|
File 6--More on "The Rating Game" (Re:CuD 6.03, 6.04)
|
|
File 7--PUB.RCDS #1: online polit disclosures + leg.online (AB1624)
|
|
File 8--GOV-ACCESS #2 interests; radio chat; joining this list
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|
nodes and points welcome.
|
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
|
|
ANONYMOUS FTP SITES:
|
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|
EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
|
|
UNITED STATES:
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
|
|
halcyon.com( 202.135.191.2) in mirror2/cud
|
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|
KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Wed, 19 Jan 1994 13:38:42 -0800
|
|
From: Jeffrey L. Needleman <needje@MSEN.COM>
|
|
Subject: File 1--Brendan's mom thanks the Net
|
|
|
|
((MODERATORS' NOTE: Brendan's recovery has been described as
|
|
"miraculous." We received a short, but "typically Brenan" note from
|
|
him Thursday evening, and he's progressing far better than expected.
|
|
Those wishing to contribute to his medical fund or send a card can do
|
|
so at:
|
|
|
|
Brendan Kehoe
|
|
c/o Brendan's Friends
|
|
Cygnus Support
|
|
One Kendall Square
|
|
Cambridge, MA 02139
|
|
|
|
=======================================
|
|
|
|
A few weeks before his accident, Brendan Kehoe was named the Board Leader
|
|
of the Internet Bulletin Board on the PRODIGY Information Service, a
|
|
national service which is a joint venture of IBM and Sears.
|
|
|
|
Alice Kehoe has an account on PRODIGY and posted the message that follows:
|
|
|
|
> INTERNET BB
|
|
>TOPIC: GENERAL
|
|
>TIME: 01/16 7:34 PM
|
|
>
|
|
>TO: ALL
|
|
>FROM: ALICE KEHOE (EMGX48C)
|
|
>SUBJECT: BRENDAN
|
|
>
|
|
>Hi, I'm Brendan's mom -
|
|
>Since I can't get to the Net right now, thought this might
|
|
>be one way, at least, of reaching some of the wonderful
|
|
>folks who've so generously sent along masses of cards, mes-
|
|
>sages, and letters since word of Brendan's accident made its
|
|
>way through Cyberspace. Your thoughtful kindness means such
|
|
>a very great deal to all of us ...
|
|
>Although there is still a very, very long way to go, and
|
|
>months of rehab in the offing, Brendan is progressing at a
|
|
>far faster rate than his doctors had ever anticipated. He is
|
|
>able to feed himself; can walk with assistance; and, has
|
|
>even managed a few words now and again, often more or less
|
|
>in context.
|
|
>He is still at Philadelphia's Hospital of the University of
|
|
>Pennsylvania, but we (his brother, Derry, and I) anticipate
|
|
>moving him to a Boston long-term rehab facility in about a
|
|
>week or two. (We live in Maine, but Boston's about as close
|
|
>as we can get for the type of care he needs.)
|
|
>Your thoughts, good wishes, and most importantly, prayers
|
|
>have been an immeasurable support and life-line to all three
|
|
>of us. Thank you, so VERY much!
|
|
>
|
|
>Regards and God bless,
|
|
>Alice
|
|
>
|
|
>PS: Would someone who can link into the Net be kind enough
|
|
>to convey our gratitude Out There?? Thanks!
|
|
>
|
|
>
|
|
|
|
Jeff Needleman, DMVR98B@prodigy.com
|
|
(I'm the MemRep for the Computer Bulletin Board on PRODIGY.)
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 20 Jan 1994 21:25:21 -0500 (EST)
|
|
From: Julian Dibbell <julian@PANIX.COM>
|
|
Subject: File 2--"The Prisoner: Phiber Optik Goes Directly to Jail"
|
|
|
|
The Prisoner: Phiber Optik Goes Directly to Jail
|
|
|
|
By Julian Dibbell (julian@panix.com)
|
|
(From The Village Voice, January 12, 1994)
|
|
|
|
|
|
Phiber Optik is going to prison this week and if you ask me and
|
|
a whole lot of other people, that's just a goddamn shame.
|
|
|
|
To some folks, of course, it's just deserts. Talk to phone-company
|
|
executives, most computer-security experts, any number of U.S.
|
|
attorneys and law-enforcement agents, or Justice Louis Stanton of the
|
|
Southern District of New York (who handed Phiber his year-and-a-day in
|
|
the federal joint at Minorsville, Pennsylvania), and they'll tell you
|
|
the sentence is nothing more than what the young hacker had coming to
|
|
him. They'll tell you Phiber Optik is a remorseless, malicious invader
|
|
of other people's computers, a drain on the economic lifeblood of our
|
|
national telecommunications infrastructure, and/or a dangerous role
|
|
model for the technoliterate youth of today.
|
|
|
|
The rest of us will tell you he's some kind of hero. Just ask.
|
|
Ask the journalists like me who have come to know this 21-year-old
|
|
high-school dropout from Queens over the course of his legal travails.
|
|
We'll describe a principled and gruffly plain-talking spokesdude whose
|
|
bravado, street-smart style, and remarkably unmanipulative
|
|
accessibility have made him the object of more media attention than
|
|
any hacker since Robert Morris nearly brought down the Internet. Or
|
|
ask the on-line civil libertarians who felt that Phiber's commitment
|
|
to nondestructive hacking and to dialogue with the straight world made
|
|
him an ideal poster boy for their campaign against the repressive
|
|
excesses of the government's war on hackers. You might even ask the
|
|
small subset of government warriors who have arrived at a grudging
|
|
respect for Phiber's expertise and the purity of his obsession with
|
|
the workings of the modern computerized phone system (a respect that
|
|
has at times bordered on parental concern as it grew clear that a 1991
|
|
conviction on state charges of computer trespass had failed to curb
|
|
Phiber's reckless explorations of the system).
|
|
|
|
But for a truly convincing glimpse of the high regard in which
|
|
Phiber Optik is held in some quarters, you'd have to pay an on-line
|
|
visit to ECHO, the liberal-minded but hardly cyberpunk New York
|
|
bulletin-board system where Phiber has worked as resident technical
|
|
maven since last spring. Forsaking the glories of phonephreaking for
|
|
the workaday pleasures of hooking the system up to the Internet and
|
|
helping users navigate its intricacies, he moved swiftly into the
|
|
heart of ECHO's virtual community (which took to referring to him by
|
|
the name his mother gave him -- Mark -- as often as by his nom de
|
|
hack). So that when he was indicted again, this time on federal
|
|
charges of unauthorized access to phone-company computers and
|
|
conspiracy to commit further computer crimes, ECHO too was drawn into
|
|
the nerve-racking drama of his case.
|
|
|
|
As the "coconspirators" named in the indictment (a group of
|
|
Phiber's friends and government-friendly ex-friends) pleaded guilty
|
|
one by one, there remained brave smiles and high hopes for Phiber's
|
|
jury trial in July. By the time the trial date arrived, however,
|
|
Phiber had made an agonizing calculus of risks and decided to plead
|
|
guilty to one count each of computer intrusion and conspiracy. ECHO
|
|
was left on tenterhooks waiting for the day of the sentencing. Given
|
|
Mark's newfound enthusiasm for more legitimate means of working with
|
|
computers and his undisputed insistence at the time of his plea that
|
|
he had never damaged or intended to damage any of the systems he broke
|
|
into, it seemed reasonable to wish for something lenient. A long
|
|
probation, maybe, or at worst a couple months' jail time. After all,
|
|
the infamous Morris had done considerably greater harm, and he got off
|
|
with no jail time at all.
|
|
|
|
When the news arrived, therefore, of Phiber's 12-month prison sentence
|
|
(plus three years' probation and 600 hours of service), it hit like a
|
|
slap in the face, and ECHO responded with a massive outburst of dismay
|
|
and sympathy. ECHO's director, Stacy Horn, posted the information at 3
|
|
p.m. on November 3 in the system's main conference area, and within 24
|
|
hours the place was flooded with over 100 messages offering
|
|
condolences, advice on penitentiary life, and curses on Judge Stanton.
|
|
Not all the messages were what you'd want to call articulate
|
|
("shit," read the first one in its entirety; quoth another:
|
|
"fuckfuckfuck-fuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuck"),
|
|
nor was all the advice exactly comforting ("Try not to get killed,"
|
|
a sincere and apparently quite prison-savvy Echoid suggested; "Skip
|
|
the country," proposed one user who connects from abroad, inviting
|
|
Phiber to join him in sunny South Africa). But the sentiment
|
|
throughout was unmistakably heartfelt, and when Phiber Optik finally
|
|
checked in, his brief response was even more so:
|
|
|
|
"I just finished reading all this and...I'm speechless. I
|
|
couldn't say enough to thank all of you."
|
|
|
|
He didn't have to thank anybody, of course. Motivated by genuine
|
|
fellow feeling as this electronic lovefest was, it was also the last
|
|
step in the long-running canonization of Phiber Optik as the digital
|
|
age's first full-fledged outlaw hero, and making somebody else a hero
|
|
is not necessarily the most generous of acts. For one thing, we tend
|
|
to get more from our heroes than they get from us, and for another, we
|
|
tend to be heedless of (when not morbidly fascinated by) the very high
|
|
psychic overhead often involved in becoming a hero -- especially the
|
|
outlaw kind. To their credit, though, the Echoids proved themselves
|
|
sensitive to the weight of the burden Phiber had been asked to take
|
|
on. As one of them put it: "Sorry Mark. You've obviously been made a
|
|
martyr for our generation."
|
|
|
|
There was some melodrama in that statement, to be sure, but not
|
|
too much exaggeration. For ironically enough, Judge Stanton himself
|
|
seemed to have endorsed its basic premise in his remarks upon passing
|
|
sentence. Not unmoved by the stacks of letters sent him in support of
|
|
Phiber Optik's character and motivations, the judge allowed as how a
|
|
less celebrated Phiber Optik convicted of the same crimes might not
|
|
deserve the severity of the discipline he was about to prescribe (and
|
|
in Phiber's case it could be argued that 12 months locked up without a
|
|
computer is severe enough to rate as cruel and unusual). But since
|
|
Phiber had made of himself a very public advertisement for the ethic
|
|
of the digital underground, the judge insisted he would have to make
|
|
of the sentence an equally public countermessage. "The
|
|
defendant...stands as a symbol here today," said Stanton, making it
|
|
clear that the defendant would therefore be punished as one too.
|
|
|
|
The judge did not make it clear when exactly it was that the
|
|
judicial system had abandoned the principle that the punishment fits
|
|
the crime and not the status of the criminal, though I suppose that
|
|
happened too long ago to be of much interest. More frustratingly, he
|
|
also didn't go into much detail as to what it was that Phiber Optik
|
|
was to stand as a symbol _of_. In at least one of his remarks,
|
|
however, he did provide an ample enough clue:
|
|
|
|
"Hacking crimes," said Judge Stanton, "constitute a real threat
|
|
to the expanding information highway."
|
|
|
|
That "real threat" bit was a nice dramatic touch, but anyone
|
|
well-versed in the issues of the case could see that at this point the
|
|
judge was speaking symbolically. For one thing, even as practiced by
|
|
the least scrupulous joyriders among Phiber Optik's subcultural peers,
|
|
hacking represents about as much of a threat to the newly rampant
|
|
telecommunications juggernaut as shoplifting does to the future of
|
|
world capitalism. But more to the point, everybody recognizes by now
|
|
that all references to information highways, super or otherwise, are
|
|
increasingly just code for the corporate wet dream of a pay-as-you-go
|
|
telecom turnpike, owned by the same megabusinesses that own our phone
|
|
and cable systems today and off-limits to anyone with a slender wallet
|
|
or a bad credit rating. And _that_, symbolically speaking, is what
|
|
Phiber Optik's transgressions threaten.
|
|
|
|
For what did his crimes consist of after all? He picked the locks
|
|
on computers owned by large corporations, and he shared the knowledge
|
|
of how to do it with his friends (they had given themselves the
|
|
meaningless name MOD, more for the thrill of sounding like a
|
|
conspiracy than for the purpose of actually acting like one). In
|
|
themselves the offenses are trivial, but raised to the level of a
|
|
social principle, they do spell doom for the locks some people want to
|
|
put on our cyberspatial future. And I'm tempted, therefore, to close
|
|
with a rousing celebration of Phiber Optik as the symbol of a spirit
|
|
of anarchic resistance to the corporate Haussmannization of our
|
|
increasingly information-based lives, and to cheer Phiber's hero
|
|
status in places like ECHO as a sign that that spirit is thriving.
|
|
|
|
But I think I'll pass for now. Phiber Optik has suffered enough
|
|
for having become a symbol, and in any case his symbolic power will
|
|
always be available to us, no matter where he is. Right now, though,
|
|
the man himself is going away for far too long, and like I said,
|
|
that's nothing but a goddamn shame.
|
|
|
|
|
|
*********************************************************************
|
|
Julian Dibbell julian@panix.com
|
|
*********************************************************************
|
|
|
|
------------------------------
|
|
|
|
From: hkhenson@CUP.PORTAL.COM
|
|
Subject: File 3--Letter of Concern in Amateur Action BBS Procedures
|
|
Date: Thu, 20 Jan 94 23:30:28 PST
|
|
|
|
H. Keith Henson
|
|
799 Coffey Ct.
|
|
San Jose, CA 95123
|
|
408-972-1132
|
|
|
|
Hon. Wayne D. Brazil
|
|
U.S. Magistrate-Judge
|
|
450 Golden Gate Ave.
|
|
15th Floor, Courtroom A
|
|
San Francisco, CA 94102
|
|
|
|
January 19, 1994
|
|
|
|
|
|
Dear Judge Brazil:
|
|
|
|
This letter is to express my concerns about search warrant
|
|
3.94.3005.WDB you issued on January 6 of this year to David
|
|
H. Dirmeyer. (I am assuming you issued it; the copy of the
|
|
warrant persented at the time of the search did not have a
|
|
signature on it, but did have your name typed in.)
|
|
|
|
Under "PROPERTY TO BE SEIZED," point A refered to a computer
|
|
system used for publishing, and thus protected from warrants
|
|
under Title 42, Section 2000aa. (The "Newspaper Privacy
|
|
Protection Act" requires supenas except very limited cases.)
|
|
|
|
This computer also contained electronic communications
|
|
between many of the 3500 people who used this system. Title
|
|
18, Setion 2703 (Electronic Communication Privacy Act)
|
|
requires specific warrants to seize, or even block access to
|
|
such electronic communications.
|
|
|
|
In conversation with Postal Inspector Dirmeyer at the time
|
|
of the search, I asked if he was aware of the these laws.
|
|
He told me that he was. In an additional conversation last
|
|
Saturday morning with him and a police officer he stated
|
|
that he had discussed the ECPA and 2000aa issues as well as
|
|
the Steve Jackson Games type of liability issues with you
|
|
before the warrant was issued.
|
|
|
|
Agent Dirmeyer admitted to me Saturday that he was the
|
|
"Lance White" whose records were being sought under points H
|
|
and I of the search warrant, and that you were aware of, and
|
|
approved, the deception involved. Dirmeyer/White also
|
|
stated in writing that he sent an unsolicited package of
|
|
child pornography to the person at the address of the search
|
|
warrant, and (verbally to me) that this was "normal
|
|
investigation procedure."
|
|
|
|
I realize that Judges are not much concerned with warrants
|
|
after they are issued. However, I was so astounded by the
|
|
statements of Agent Dirmeyer, that I decided to at least let
|
|
you know about them.
|
|
|
|
Sincerely,
|
|
|
|
|
|
H. Keith Henson
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 21 Jan 1994 23:19:17 CST
|
|
From: "AMERICAN EAGLE PUBLICATION INC." <0005847161@MCIMAIL.COM>
|
|
Subject: File 4--Some thoughts on censorship (Re Am. Action "Porn" Raid)
|
|
|
|
From--Mark Ludwig, ameagle@mcimail.com
|
|
|
|
After reading about the latest porno-BBS raids, and the fact that one
|
|
reader cancelled his sub to CUD because he was sick of hearing about
|
|
it, I wanted to make a few comments. It seems like pornography is
|
|
always and forever a 1st amendment/freedom of speech issue, but I
|
|
don't think it is a very good test of the 1st amendment.
|
|
|
|
I've been writing and publishing technical literature about computer
|
|
viruses for a few years now--as well as arguing that viruses are not
|
|
something that should be suppressed because (a) people need good,
|
|
solid technical information if they want to defend themselves against
|
|
viruses, and (b) because viruses are not simply totally evil.
|
|
Obviously, some are pretty bad, but at the same time, you have
|
|
arguably beneficial ones like Cruncher and Potassium Hydroxide.
|
|
Likewise, they may provide valuable insights into other disciplines,
|
|
as discussed in my recent book, Computer Viruses, Artificial Life and
|
|
Evolution.
|
|
|
|
My work has been subject to an incredible amount of censorship. But
|
|
not government-sponsored censorship. I've been censored by the
|
|
press--those who were once the vanguard of freedom of the press have
|
|
become its worst enemy in my eyes. Let me explain . . .
|
|
|
|
Around about December 7 I received a call from ___, sales
|
|
representative at the Computer Shopper. She informed me that they were
|
|
not going to allow us to advertise in their magazine anymore.
|
|
Evidently they had received complaints about our advertisement and
|
|
decided, like so many other journals, that their readers are too
|
|
immature and irresponsible to handle such things and, for the good of
|
|
society, they'd better deprive them of such information.
|
|
|
|
Did they review our materials prior to their decision? No.
|
|
|
|
Did they give us an opportunity to answer the complaints they
|
|
received? No.
|
|
|
|
In fact, Ziff Davis' high and mighty legal department proved totally
|
|
unwilling to even speak to me, preferring to hide behind a sales rep
|
|
instead. And no one at Ziff would put anything in writing.
|
|
|
|
This may sound preposterous to you, but it's happened to me time and
|
|
time again. A fair number of magazines have terminated our advertising
|
|
without ever reviewing our materials or discussing the matter with us.
|
|
These include Dr. Dobbs, Computer Language (who didn't even bother to
|
|
inform us they had dropped our ad), Computer Craft, and Nuts and Volts
|
|
(who reconsidered and reinstated us after about a year).
|
|
|
|
What sets the Computer Shopper apart is that they are the porn king of
|
|
computer magazines. In the context of a dozen pages of ads which sell
|
|
everything from Seymour Butts, Erotic Fantasies, Porkware and Deep
|
|
Throat to the gay Man Power, the decision to pull our ad came as a
|
|
real surprise. Evidently the omniscient legal department at Ziff has
|
|
come to the inspired realization that our materials are much worse
|
|
than blatant pornography--without ever looking at anything we sell!
|
|
|
|
Personally, I find it difficult to understand what a porno CD has to
|
|
do with computers, except that it goes in a CD ROM reader in your
|
|
computer. But that's kind of like selling x-rated videos in a
|
|
technical magazine about TVs. The only logic I can see to it is the
|
|
idea that perhaps the techies who read magazines like the Shopper are
|
|
sexually unfulfilled people who must fantasize to satisfy their animal
|
|
lusts. At least, I suppose that's what Ziff's pundits think, and
|
|
that's why they run the ads. It makes their customers happy.
|
|
|
|
On the other hand, technical information about computer viruses makes
|
|
a lot of sense in a computer magazine. After all, they are a
|
|
phenomenon that most computer users are going to have to deal with
|
|
sooner or later, and they are something that some of us find
|
|
interesting for purely technical reasons.
|
|
|
|
Pornography has long been a point of contention in the battle over
|
|
free speech simply because--in the Supreme Court's words--it has no
|
|
"socially redeeming value." And if one is free to appeal to only the
|
|
basest human lusts, so the argument goes, then any more noble ideas
|
|
will also be protected.
|
|
|
|
These kinds of arguments are fallacious though. The whole idea of
|
|
freedom of speech was born in the reformation, not with an eye to
|
|
protecting pornographers, but with an eye to protecting thinkers--and
|
|
specifically religious reformers--people who saw the corruption of the
|
|
state-church and who spoke out to condemn it and change it.
|
|
|
|
Good ideas can often be far more dangerous to those in power than bad
|
|
ideas. And porn is at best a bad idea. It won't threaten anyone in
|
|
power, and it acts like an opiate to society. It is a diversion. So to
|
|
suffer its existence isn't a good test of the freedom of speech. On
|
|
the other hand, what happens when somebody has a really good idea that
|
|
sets to naught the ideas which those in power use to remain in power?
|
|
(e.g. "taxation without representation is wrong") That is truly
|
|
threatening. Will the idea be suppressed by legal means? Will it be
|
|
buried under a flood of propaganda? This is the REAL testing ground. A
|
|
society which permits porn, but suppresses real ideas isn't free at
|
|
all.
|
|
|
|
The whole issue of cryptography is case and point. In this age, the
|
|
dissemination or withholding of information has become a real tool of
|
|
power. In the past century, government secrets have multiplied without
|
|
number, while government has steadily demanded more and more
|
|
information about its citizens, and access to more information on
|
|
demand. Good cryptography is a threat to the ability to gather
|
|
information, and a stumbling block on the road to total control. So it
|
|
is being suppressed.
|
|
|
|
Now, when we see flagrant intrusions into our freedom by
|
|
government--such as in cryptography--our tendency is to point the
|
|
finger at government--"those guys." But--at least here in America--we
|
|
are the government. We voted it into power. And, no matter where, all
|
|
governments exist only with the consent of the governed. Perhaps it is
|
|
grudging consent, or fearful consent, but it is consent none the less.
|
|
The only one who really may not consent is probably in solitary
|
|
confinement or a slave-labor camp being whipped. So when we see
|
|
government intruding on freedom of speech or some such thing, we can
|
|
only rightly see it as a sickness in all of society. And it should be
|
|
no surprise to find the press--which has traditionally been thought of
|
|
as the vanguard of the freedom of speech--suppressing it. The Computer
|
|
Shopper, Dr. Dobbs, etc., etc., just have the same sickness as the
|
|
government and everyone else.
|
|
|
|
Frankly, I think we live in a generation where a majority of people
|
|
prefer security to freedom. You can see it everywhere. Clinton is no
|
|
dummy, and I think his new theme is not just a stupid idea, but the
|
|
result of research. He knows what Americans--for the most part--have
|
|
come to expect, and he's going to at least promise it to them (even
|
|
though he cannot possibly deliver the reality of it, even if he has
|
|
spoken of a "new covenant"). I think it's a shrewd move. Every
|
|
president since Carter in 1976 has been elected on the basis of the
|
|
economy. Financial security has proven to be more important to the
|
|
average american than freedom, election after election. In short,
|
|
freedom isn't really an issue of national importance anymore, though
|
|
some of us still value it deeply. Security is the issue that gathers
|
|
the crowds and wins the votes.
|
|
|
|
There is an important idea here: freedom or security? The America of
|
|
200 years ago was founded on the idea of freedom under God. That
|
|
doesn't mean unrestrained freedom, but freedom within a given moral
|
|
code. It meant you were free to follow the profession of your choice,
|
|
go (or not go) to the church of your choice, to speak respectable
|
|
opinions, and free to live where you wanted, and keep what you earned.
|
|
It did not mean you were free to loot your neighbor or sell your
|
|
daughter as a prostitute. Now in a state ruled by this paradigm of
|
|
freedom, there are always questions about how far those freedoms go.
|
|
|
|
Today, however, there has been a paradigm shift in our society. The
|
|
question is no longer how far we can go with freedom without
|
|
endangering society. Rather, the question which government and the
|
|
people seem concerned about is how to maximize security--e.g. how to
|
|
assure an ever growing abundance of material possessions, and reduce
|
|
the risk of losing them. That's why the economy is such a big issue in
|
|
government. If freedom were our objective, we'd try to get the
|
|
government out of the economy, rather than trying to get government to
|
|
manipulate it more effectively.
|
|
|
|
Now the paradigm of security leads directly to 1984--a totally
|
|
controlled, totalitarian society. If you keep pushing the idea of
|
|
security, that's where you end up. A totally controlled society is
|
|
very secure, and no one in power ever makes a mistake. And that's
|
|
where I think America is headed.
|
|
|
|
Some kind of revolution or civil war isn't going to help things a bit
|
|
either. At best, such a cataclysm will be only the event which brings
|
|
the full totalitarianism upon us. That's because this love affair
|
|
with security is in the people's hearts. It's not government vs. the
|
|
people. It's still government of the people by the people. And if the
|
|
people want security, then they'll install the government which best
|
|
promises them that. This is and always has been a totalitarian regime.
|
|
And if revolution won't work, it's hard to put your faith in some
|
|
milder type of reform.
|
|
|
|
I say all of this because it's the only way I can understand the
|
|
censorship I've faced. It's the only way you can twist your mind to
|
|
believe that what I do is worse than pornography. Even though there
|
|
are such things as beneficial viruses, even though viruses might give
|
|
us some valuable insights into other scientific disciplines, even
|
|
though they have military value, they are a potential threat to the
|
|
general security. And to have people walking around who know how to
|
|
create them is a threat to the general security. So as long as you are
|
|
operating under the paradigm of security, you cannot tolerate virus
|
|
writing. Thus, the press censors the press. Computer Shopper censors
|
|
American Eagle Publications, and throws their contract out the window
|
|
without ever even evaluating their materials.
|
|
|
|
If the government steps into the picture and enforces some kind of
|
|
official censorship against viruses through legislation, it will only
|
|
be because the private sector has chosen it already. It will be
|
|
because there are a lot of well-heeled businesses pushing it, and a
|
|
lot of magazines that won't address the issue honestly in editorials,
|
|
and won't let anyone else do it in advertising. That's the age old
|
|
formula for totalitarianism.
|
|
|
|
For these reasons I honestly don't think pornography is the issue
|
|
that's pushing the limits of the 1st amendment. The real hot issue
|
|
that those of us who value freedom should be giving our attention to
|
|
is security vs. freedom. That's where the paradigm shift is taking
|
|
place, and where the future will be won or lost. Right now, it would
|
|
seem that security is winning out by default.
|
|
|
|
In the long run, an unearthly security is a false hope. But I'd far
|
|
rather see it exposed for what it is by intelligent people using their
|
|
brains effectively in my generation, than having it exposed by a
|
|
government whip over several generations.
|
|
|
|
In short, porn isn't the real 1st amendment issue it's cracked up to
|
|
be. More often than not, its technical knowledge that really ruffles
|
|
the feathers today.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 11 Jan 94 21:54:54 PST
|
|
From: David.Batterson@F290.N105.Z1.FIDONET.ORG(David Batterson)
|
|
Subject: File 5--Lobby the Feds via PC
|
|
|
|
Lobby The Feds Via PC
|
|
by David Batterson
|
|
|
|
Here's another one of those programs to let "We The People" [at
|
|
least those with PCs] tell those lame-brained, no-account lazy
|
|
politicians and bureaucrats in Washington who's the boss.
|
|
|
|
A while back Parsons Technology offered us Personal Advocate (now
|
|
sold for $29, DOS), and Symantec has Write Your Congressman! (also in
|
|
a DOS version for $29.95). [Symantec uses a rather sexist,
|
|
politically incorrect title, doesn't it? Well, they actually bought
|
|
the program (along with ACT!) from a Texas company.]
|
|
|
|
A tiny company in San Rafael, CA [where this reporter used to
|
|
live] got on its soapbox, and decided to do it even better. Or at
|
|
least they've tried to.
|
|
|
|
Soapbox Software offers Federal SoapBox (FSB) Ver. 1.2 that
|
|
"brings you the power and know how of Washington insiders by combining
|
|
a graphic flow chart of the Federal Government, detailed listings of
|
|
policy makers, powerful search functions and easy-to-use
|
|
communications tools, allowing you to contact the right people in
|
|
Washington at the right time." OK, so much for marketing hype.
|
|
|
|
After testing out this software, I really don't think it has
|
|
Artificial Intelligence capability (so it knows if you contacted the
|
|
correct person in a timely fashion). I didn't just fall off a turnip
|
|
truck. Nor does it search very well for every person you want to
|
|
find.
|
|
|
|
For example, I did a "Search by Person" for Dee Dee Myers. It
|
|
found her OK, since she is the current Press Secretary. But when I
|
|
tried to search for former PR whiz George Stephanopoulos, ol' lonesome
|
|
George could not be located (even though I knew he was in the White
|
|
House chain of command somewhere.
|
|
|
|
So I looked under Executive Office of the President, where I
|
|
found some guy named Clinton. I clicked on "Data," and following data
|
|
on the Big Guy, there was the "Office Staff" listed. In that group
|
|
was listed "George Stephanopoulos, Sr. Advisor."
|
|
|
|
Now is there any good reason why FSB's search capability can't
|
|
also locate a staff member by name? Cheesch! I think the only reason
|
|
must be "bad programming."
|
|
|
|
The software does have some useful features, such as being able
|
|
to create customized mailing lists, exporting data for use in your
|
|
database program, federal documents, biographies, legislative
|
|
committee assignments, text editor, an online glossary, federal BBSs,
|
|
and so on.
|
|
|
|
The program now has an interface to MCI Mail, but only works if
|
|
you want to send PAPER mail or a fax. Note: you CANNOT send e-mail,
|
|
for instance, to the MCI Mail ID: WHITE HOUSE, or send Internet
|
|
e-mail. Boo! I hope that future versions of FSB fix this oversight.
|
|
|
|
FSB is sold as a subscription. The rather hefty price of $129
|
|
gets you the DOS software plus three quarterly updates; additional
|
|
years are $49. Windows and Mac versions are on the way, the company
|
|
told me.
|
|
|
|
Info: SoapBox Software, 10 Golden Gate Drive, San Rafael, CA
|
|
94901; 415-258-0292, FAX: 415-258-0294, 800-989-7627 (orders),
|
|
Internet: 5942208@mcimail.com, CompuServe: 71614,2373, MCI Mail:
|
|
594-2208.
|
|
|
|
#
|
|
|
|
Computer reporter/reviewer David Batterson looks forward to the day
|
|
when most federal, state, county and city officials are online, so we
|
|
can zap 'em with e-mail. [Will he live so long?] You may contact him
|
|
via The Internet: dbatterson@mcimail.com, or:
|
|
david.batterson@f290.n105.z1.fidonet.org.
|
|
* Evaluation copy of Silver Xpress. Day # 50
|
|
--- via Silver Xpress V4.00 [NR]
|
|
--
|
|
uucp: uunet!m2xenix!puddle!290!David.Batterson
|
|
Internet: David.Batterson@f290.n105.z1.fidonet.org
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 19 Jan 1994 19:52:04 -0500
|
|
From: Bryce Eustace Wilcox <wilcoxb@NAG.CS.COLORADO.EDU>
|
|
Subject: File 6--More on "The Rating Game" (Re:CuD 6.03, 6.04)
|
|
|
|
THE RATING GAME (In re CuD 6.03, 6.04)
|
|
|
|
Stephen Williams (sdw@meaddata.com) has proposed one of THOSE ideas. An
|
|
idea that is simple in design but stunning in potential function. I
|
|
heartily congratulate him and add my own two bits:
|
|
|
|
>Basically, I suggested that special messages be standardized that
|
|
>would endorse messages for certain distributions. Old (existing...)
|
|
>news software would just pass the messages like others, but news
|
|
>systems that wanted to rate or hide improper messages could pay
|
|
>attention to them. My software would probably take the form of
|
|
>patches to INN and tin, etc. There would be positive and negative
|
|
>endorsements, of course with the possibility of signature keys, etc.
|
|
|
|
This last possibility intrigues me the most. A "majority vote" to
|
|
indicate "value" or "content" of a message wwould simply emulate the
|
|
current media paradigm: "lowest common denominator". If instead of
|
|
simply tallying yay and nay votes, I can tailor my own software to
|
|
recognize specific signatures and give them added weight (<giggle> I
|
|
just realized that if this were to happen there might be people whose
|
|
names I would include with a negative weight factor...) then we would
|
|
have a really nice system going. I see several problems right off the
|
|
bat, some practical and some hypothetical.
|
|
|
|
Prob 1: authentification. We must prevent forgery of signatures.
|
|
Apparently (according to Phil Zimmerman's PGP doc file), public key
|
|
|
|
Prob 1a: Public key encryption. Are we ever going to have
|
|
widely-used public key encryption available? Insert the whole patent
|
|
controversy here.
|
|
|
|
Prob 1b: bandwidth (numerous apologies and requests for correction
|
|
if I misuse any technical term in my enthusiastic ignorance). PGP
|
|
keys are 32, 64, or 128 bytes long. Multiply that by the number of
|
|
endorsements tacked onto any given message and multiply *that* by the
|
|
number of messages and notice a major technical problem.
|
|
|
|
Prob 2: the end results. will this kind of consensual
|
|
discrimination lead to a polarizing/tribalizing effect on society?
|
|
Whatever the mass media's faults (and I think they are legion), it
|
|
*has* served to give people a common culture. But with the technology
|
|
and the society changing the way that it is I really can't imagine a
|
|
return to the mass media paradigm nor the "messy Internet" paradigm.
|
|
I think Stephen William's anarchic, organic paradigm is definitely the
|
|
way to go.
|
|
|
|
[Though this message is getting a bit long, I think I should pause to
|
|
defend/ explain my use of the word "anarchy". I am using the simple
|
|
definition "absence of control or regulation". (Of course I do *not*
|
|
mean absence of self-control or self-regulation!) The "anarchy" that
|
|
I envision in the informational realm is a state in which it is
|
|
impossible or at least socially unacceptable for any entity to delete
|
|
or substantially alter information without the permission of the
|
|
author. Of course some other mechanism will be needed to sort, sift
|
|
and organize information and that is why I am so excited about Stephen
|
|
William's idea.]
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 18 Jan 1994 05:32:39 -0800
|
|
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
|
Subject: File 7--PUB.RCDS #1: online polit disclosures + leg.online (AB1624)
|
|
|
|
Jan. 18, 1994
|
|
|
|
This starts a new series of online Updates and occasional panic-mode
|
|
Action Alerts regarding specific legislative and regulatory efforts to
|
|
assure modern [online, computer-assisted] access to public government
|
|
records -- legislative, executive and judicial; federal, state and local.
|
|
Most of these postings will fit on one or two printed pages; some will be
|
|
noticeably longer.
|
|
** Any time you wish to NOT receive further postings, just lemmie know
|
|
and I'll delete you from the distribution list. **
|
|
|
|
NEWS TO YOU?
|
|
As I begin this series, I am adding a large number of eaddrs for folks
|
|
who have either explicitly requested information in the last several
|
|
months about online state legislation, or have otherwise been suggested as
|
|
likely-interested in computer-assisted access to public records.
|
|
Reiterating: Yer on the list until you ask to be off the list.
|
|
|
|
|
|
PROPOSAL FOR COMPUTER-ASSISTED ACCESS TO POLITICAL DISCLOSURES NOW ONLINE
|
|
I have finally found time to upload my 28-page [printed], Jan. 1st
|
|
implementation proposal that has been circulating in state and local
|
|
political circles since ~Jan. 4th:
|
|
"Computerized Political Disclosures:
|
|
Doing It with Minimal Cost and Maximum Utility."
|
|
This details how to conveniently and economically computerize the filing
|
|
of and computer-assisted public access to state and local campaign-finance
|
|
disclosures, officials' statements of economic interests, and state
|
|
lobbyists' disclosures. Local-government Clerks and Voter Registrars can
|
|
implement it for a one-time cost of ~$10,000 (if they don't already have a
|
|
spare PC). Filings and statewide public access for state offices can be
|
|
implemented for as little as $12,000 for a minimal adequate system, plus
|
|
perhaps $200/month for statewide access too all disclosures within hours of
|
|
them being filed. (It is likely, however, that they may spend 3 to 5 times
|
|
the minimum capital amount -- but will incur significant other savings in
|
|
staff and resources and provide wildly-improved statewide services.)
|
|
Copies in MacWord5 and/or RTF format are available by anonymous-ftp, WAIS,
|
|
gopher, Veronica, etc. from:
|
|
Internet-host: cpsr.org
|
|
In directory: /cpsr/states/california/polidisclos
|
|
[If you are on the WELL, you can copy them directly from my home directory.]
|
|
|
|
On Jan. 11th, I met with Deputy Chief Secretary of State Tony Miller and
|
|
his staff, who had reviewed the proposal. They were enthusiastic about it,
|
|
and projected that they will need little or *no* additional budget allocation
|
|
to do it.
|
|
It will, however, require some legislative authorizations and mandates.
|
|
It appears likely that State Senator Tom Hayden will amend the needed
|
|
language into his campaign-reform bill, SB758. I should know more within
|
|
two weeks or less.
|
|
|
|
|
|
FOUR BILLS INTRODUCED TO OPEN UP ALREADY-COMPUTERIZED PUBLIC RECORDS
|
|
Assembly Members Debra Bowen (D, Marina del Rey) and Tom Bates (D, Oakland-
|
|
Berkeley) have introduced a total of four bills seeking modern access to
|
|
California's computerized public records. Call their offices for copies:
|
|
Bowen: 916-445-8528, Mary Winkley Bates: 916-445-7554, Rachel Richman
|
|
More in future updates. Privacy advocates, please note: A "public" record,
|
|
by definition, does NOT include personal information that is not public.
|
|
|
|
|
|
SON OF AB1624 [Or "OFFSPRING OF ...", for the politically-correct :-) ]
|
|
These notices are a follow-on to 34+ online notices regarding the 1993
|
|
California Legislature's Assembly Bill 1624 (by Bowen).
|
|
Now Calif. Govt. Code 10248, AB1624 mandates that all California state
|
|
legislation-in-progress, state statutes and the state Constitution be
|
|
available via the Internet, without charge by the state.
|
|
For antiquitarians' interest, those online notices plus other related
|
|
postings are available by anonymous-ftp, WAIS, gopher, Veronica, etc. from:
|
|
Internet-host: cpsr.org
|
|
In directory: /cpsr/states/california/AB1624.
|
|
|
|
|
|
STATE LEGISLATION ONLINE: AB1624 WHEN?
|
|
AB1624 was signed into law on Oct. 11th and took effect Jan. 1, 1994.
|
|
At the end of December, bill-author Bowen's office said the Legislative
|
|
Counsel - which operates the Legislative Data Center (LDC)- had estimated
|
|
they would be online and operational by Jan. 10th. Last week, Bowen's
|
|
office reported that Legis.Counsel was then estimating they would be online
|
|
and publicly operational by Friday, Jan. 21st.
|
|
It continues to be my sincere belief that the LDC staff *are* *diligently*
|
|
trying to get the system operational. Don't blame them; I honestly believe
|
|
they are doing the best they can with the time and resources allotted to them
|
|
by their management.
|
|
However, I find it arrogant disregard by the Chief Legislative Counsel,
|
|
that he ignores requests for progress details - especially amazing in that
|
|
the entire issue in AB1624 is the public's right to know what their/our
|
|
government is doing. All the worse, his lack of a public statement causes
|
|
his computer staff unjustified ill-repute among the public, and that ain't
|
|
right!
|
|
If they're not online by about the 23rd, I will send another update
|
|
giving the name, address, phone number and fax number of the responsible
|
|
party, the Chief Legislative Counsel, and folks can explore his responsive-
|
|
ness, directly.
|
|
When I know more, you'll know more.
|
|
|
|
Mo' as it Is.
|
|
--jim
|
|
Jim Warren, columnist for MicroTimes, Government Technology, BoardWatch, etc.
|
|
jwarren@well.sf.ca.us -or- jwarren@autodesk.com
|
|
345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/415-851-2814
|
|
[organizer & Chair, First Conference on Computers, Freedom & Privacy (1991);
|
|
InfoWorld founder (1978); PBS's "Computer Chronicles" first host; blah blah]
|
|
|
|
>>Permission herewith granted for unlimited reposting and recirculation.<<
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 19 Jan 1994 15:06:18 -0800
|
|
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
|
Subject: File 8--GOV-ACCESS #2 interests; radio chat; joining this list
|
|
|
|
Jan. 19, 1994
|
|
|
|
SOME DIMENSIONS OF THE GOV-ACCESS/PUB-RCDS TURF
|
|
|
|
Note: Access to public records is one component of a broader issue -- the
|
|
input side (from the public's perspective, the perspective of this list).
|
|
Functionality in which citizens may be interested:
|
|
|
|
access to information, online feedback to officials & agencies
|
|
online access, offline bulk-data access, info services (not just data)
|
|
personal use, nonprofit-organization use, commercial/tax-paying use
|
|
public dissemination, community discussion (town-sized to Village Earth)
|
|
Level(s) of government in which citizens may be interested:
|
|
city/town, county/parrish, state, federal, multi-national
|
|
<specific areas of special interest>
|
|
Types of public government information in which citizens may be
|
|
interested: political disclosures, legislative, judicial/courts,
|
|
all public records <specific topics of special interest>
|
|
|
|
If yer willin', it would be nice to know your interests -- which will
|
|
*not* be disclosed to anyone else, unless your identifying specifics
|
|
are removed. **If you respond, please be SURE to indicate whether you
|
|
are already on this distribution list -- i.e., you received this,
|
|
directly to your eaddr.**
|
|
|
|
SF BAY AREA TALK-SHOW ABOUT COMPUTER-AIDED PUBLIC ACCESS TO GOVERNMENT
|
|
I have been invited to have an hour-long radio talk-show chat about
|
|
computer-assisted access to government -- legislative information,
|
|
political disclosures, computerized public records, etc. (and I hope
|
|
to include privacy concerns in the discussion, too, e.g. commercial
|
|
abuse of driver lic info).
|
|
More importantly, it's on one of the biggest stations in the San
|
|
Francisco Bay Area, and it's in radio's *prime* time -- the weekday
|
|
p.m. commute hours!
|
|
|
|
The Peter B. Collins Show
|
|
KSFO-AM/KYA-FM (560-KHz/93-MHz)
|
|
5:30 p.m. - 6:30 p.m., Monday, January 24th
|
|
|
|
[ If you are knowedgeable computer-aided gov-access issues, why not
|
|
contact *your* area's radio talk-show producers (ask for the producer;
|
|
not the host), and see if they will have you and/or knowledgable
|
|
collegues discuss them? ]
|
|
|
|
|
|
TO BE ADDED TO THIS GOV-ACCESS INFORMATION-DISTRIBUTION LIST
|
|
|
|
Several people pointed out that I neglected, in posting #1, to state how
|
|
new-comers can be added to this distribution list. Tsk! <blush>
|
|
(This list has been growing for about 9 months; originally focused only on
|
|
one specific California bill mandating free online legislative access.)
|
|
Email your request to jwarren@well.sf.ca.us
|
|
|
|
At a minimum, state the email address you wish added to the list.
|
|
If you are willing, please also include your traditional contact info:
|
|
name, work, organization, snailmail address, voice phone, fax.
|
|
|
|
Please note: So far, this is an information distribution list; not a
|
|
discussion list. However, several of us are planning moderated and
|
|
unmoderated USENET news-groups on these topics -- that will *not*
|
|
conflict with existant news-groups and lists. Yes, as soon as there
|
|
are coherent draft-plans, this list will hear of them.
|
|
|
|
Jim Warren, columnist for MicroTimes, Government Technology, BoardWatch, etc.
|
|
|
|
>>Permission herewith granted for unlimited reposting and recirculation.<<
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #6.09
|
|
************************************
|
|
|