779 lines
38 KiB
Plaintext
779 lines
38 KiB
Plaintext
|
|
Computer underground Digest Wed May 10, 1995 Volume 7 : Issue 37
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Goddess of Judyism Editor: J. Tenuta
|
|
|
|
CONTENTS, #7.37 (Wed, May 10, 1995)
|
|
|
|
File 1--Response to "Digital Copyright Problem" (re: CuD 736)
|
|
File 2--Commentary on NPR in re the Exon Bill (EPIC fwd)
|
|
File 3--Noam Chomksy on the Internet (fwd)
|
|
File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
From: "David Gersic" <A02DAG1@NOC.NIU.EDU>
|
|
Date: Tue, 9 May 1995 13:04:03 CDT
|
|
Subject: file 1--Response to "Digital Copyright Problem" (re: CuD 736)
|
|
|
|
-=> Subject--File 2--A solution to the digital copyright problem
|
|
-=>
|
|
-=> Fixing the Digital Copyright Dilemma with Telerights:
|
|
-=> Copying is easy; decryption is not
|
|
-=>
|
|
|
|
I have several problems with this proposal, not the least of which is
|
|
that it won't work.
|
|
|
|
-=> After reading the National Information Infrastructure debate on
|
|
-=> intellectual property reform in the digital age, one could conclude that
|
|
-=> computers and copyrights have come to an impasse.
|
|
|
|
They have. At best, the current copyright code does not map well onto
|
|
the computer information it is being applied to.
|
|
|
|
-=> Some have proposed drastically curtailing electronic technology in
|
|
-=> order to protect future publishers.
|
|
|
|
I think that this would be a Very Bad Thing. We are on the verge of
|
|
being able to disseminate more information, faster, and more
|
|
directly, than ever before. It's a cliche by now, but the computer is
|
|
doing to print media what the printing press did to the monks. And
|
|
just like the monks, the print media are attempting to maintain their
|
|
monopoly on information distribution. It didn't work last time, it'd
|
|
be a shame to let it work this time.
|
|
|
|
-=> disk into RAM. They want to ban the electronic resale or renting of
|
|
-=> copyrighted material fearing that the piracy which has plagued software
|
|
-=> will plague movies and books when they enter cyberspace.
|
|
|
|
Who are "they"? Pirating movies has been around forever, as has
|
|
music. Sure, the quality may be off a little on the copy, but that
|
|
has never stopped people from enjoying their illicit copies anyway. A
|
|
local couple (Chicago) was just arrested recently for bootlegging
|
|
movies. They were sneaking a pocket cam-corder into movie theaters,
|
|
taping the movies from the audience, then selling the copies. Sure,
|
|
it was a *lousy* copy, but they were making money anyway. Rock
|
|
concert boot-legs have been around forever too.
|
|
|
|
-=> I call this a system of 'telerights.'
|
|
-=> A user would buy an encrypted copy of the document from the author
|
|
-=> or publisher. Each individual version would have a different key, so
|
|
-=> the user could make many duplicates but in essence only own the one
|
|
-=> 'copy' that was paid for. When the user wanted to use the document, it
|
|
-=> would contact its publisher for the key. If no other versions with the
|
|
-=> same key were in use, the publisher would send the key to the user's
|
|
-=> machine and the document would decrypt itself into an area of temporary
|
|
-=> memory like RAM. When the user was done, the document would delete the
|
|
-=> decrypted version.
|
|
|
|
Problems:
|
|
|
|
1) You're assuming that I'll have a network connection wherever I
|
|
might want to use this document that I've "bought". If I carry my
|
|
laptop out under a tree to sit in the sunshine, I'm screwed and have
|
|
to go back inside where the ethernet is. OTOH, if *you* want to run
|
|
the T1 to my house and provide a wireless network solution for a
|
|
five or six square mile area around my house, I'd be delighted to
|
|
talk about it...
|
|
|
|
2) You're assuming that the network connection in #1 is of no cost to
|
|
me. If I'm using an ISDN link to the 'net, I have to pay for it on a
|
|
per-call basis. So, each time I want to refer to a diagram in this
|
|
document I have to insert a quarter in the coin slot in the side of
|
|
my monitor. The phone company may love this idea, but it's going to
|
|
be expensive for the user. Plus, if that document has a link to
|
|
another document, there's another phone call to validate the new
|
|
document, and possibly a third one to get back to my original
|
|
document.
|
|
|
|
3) What if I don't *want* the publisher to follow my actions and
|
|
interests? The civil libertarians will love this idea... Given the
|
|
current interest in the "militias" and people like Tim McVeigh,
|
|
wouldn't it be nice to be able to query the publishers of all bomb-
|
|
related documents to see who has been reading them? And, going back
|
|
to the ISDN mentioned in #2, it'd be even easier to figure out where
|
|
they were reading the documents from. I'm not paranoid, but I'm sure
|
|
that the FBI would love to be able to find/trace people that they are
|
|
interested in this easily, and given the current public mood to give
|
|
the FBI the power to investigate people who have not (to their
|
|
knowledge) violated any laws, that's a scary proposition. Or, maybe I
|
|
just don't think that it's anybody's business but mine what I read,
|
|
when I read it, or *where* I read it.
|
|
|
|
-=> The old problem of piracy would be turned on its head. The user
|
|
-=> instead of the publisher would have to worry about theft. When someone
|
|
-=> stole his copy, they would steal his use of it as well. There would be
|
|
-=> no assurance the person you buy used information from would delete their
|
|
-=> old copies.
|
|
|
|
This is the biggest falacy in the whole proposition. You've missed
|
|
the basic method of software piracy; remove the copy protection. What
|
|
is proposed here is not really that much different from a "key-disk"
|
|
protection that comes with many games. And, it will be no harder to
|
|
bypass. You've substituted high-tech for the simpler key-disk, but
|
|
basically it comes down to:
|
|
|
|
1) start the program
|
|
2) query something to see if this is valid to run
|
|
3) if ok, jump to real start of program
|
|
4) else exit
|
|
|
|
All you have to do to bypass this scheme is to find step #3 in the
|
|
code and change it to remove the "if ok" part. People have been doing
|
|
this since the Apple ][ was popular, and have gotten quite good at
|
|
it over the last decade. As long as the program is running on *my*
|
|
CPU, in *my* machine, you have no real way to keep me from changing
|
|
it to run the way *I* want it to. Unless all program execution will
|
|
be done on the other end of a network link with only display data
|
|
being shipped to me (see objection #1 and #2 above), the whole scheme
|
|
will be bypassed within the first *hour* of somebody trying it.
|
|
|
|
-=> The government does not need to alter existing copyright laws;
|
|
|
|
Actually, I don't think that modification of the existing laws will
|
|
work; I think that they're going to have to write an entire new set
|
|
to handle what the computer industry is doing to information and
|
|
information technology.
|
|
|
|
-=> On the consumer end, there is the privacy issue. Any company that
|
|
-=> both maintains other people's teleright accounts and publishes its own
|
|
-=> documents will be tempted to use for financial gain private information
|
|
-=> about other companies' customers.
|
|
|
|
Tempted? I get enough junk mail, cold-callers on my phone, and other
|
|
unsolicited sales contacts for stuff that I'm *not* interested in
|
|
now. Given this sort of data collection ability, I'm sure that I'd
|
|
get a *lot* more.
|
|
|
|
-=> The issue of encryption itself is sticky because there are already
|
|
-=> two established and ideologically opposed groups fighting about it. The
|
|
-=> government must be coaxed into relaxing its objections to strong
|
|
-=> encryption and Clipper opponents must learn to accept a key escrow
|
|
-=> standard to which the government has warranted access.
|
|
|
|
There's also the "export" problem. What if I take my laptop to Iraq
|
|
with me? Can I still read my encrypted copy of Time magazine, or do I
|
|
have to wait until I get back to the US?
|
|
|
|
-=> The government must also encourage software and computer companies
|
|
-=> to accept some level of professionalization. With the proper tools and
|
|
-=> knowledge it will be possible to trap keys or decrypted documents stored
|
|
-=> in temporary memory. These tools and skills must be tightly regulated
|
|
-=> and those sections of the operating system must be shut off from amateur
|
|
-=> tampering.
|
|
|
|
Can't be done. As long as there is a book on programming available,
|
|
some people will mis-use their knowledge to pirate stuff. Just like
|
|
as long as there is a book on basic high school chemistry available,
|
|
people will be able to build bombs. That's the problem with
|
|
information; it's neither 'good', nor 'bad', it just is. It's the
|
|
people who *use* the information that make it helpful, or dangerous.
|
|
|
|
-=> This may cause angst among some programmers but for most of
|
|
-=> us this should not be a burden. It does, after all, take a license (and
|
|
-=> the proper employer) to tamper with phone boxes and electric meters.
|
|
|
|
It does? Since when? Sure, *legally* it takes that, but I can go to
|
|
the hardware store and purchase everything I need to actually do it.
|
|
Blowing up buildings is illegal too, and we can see how well *that*
|
|
set of laws protects us from having our building blown up.
|
|
|
|
-=> One would have to vastly restrict low level media access to make
|
|
-=> unencrypted telerights work because it would be easy to pull raw
|
|
-=> information off the disk with a sector editor. With encryption, the
|
|
-=> restrictions are narrower and easier to enforce because the data is
|
|
-=> coded wherever it is stored in permanent form. Only certain sections of
|
|
-=> the runtime environment need to be restricted.
|
|
|
|
As long as the decryption is done on the local machine, it's never
|
|
going to be secure. If you modify the operating systems in use (even
|
|
assuming that MSDOS finally goes away) to make it more secure, it's
|
|
no more difficult to remove the security from *my* copy of the
|
|
operating system, or to write my own O/S without your security
|
|
measures. Look at Linux. Sure, it's been a lot of work, but it's not
|
|
impossible to write an O/S that works.
|
|
|
|
-=> We are, to use the old Chinese pejorative, living in interesting
|
|
-=> times. Why the Chinese have historically found this undesirable I do
|
|
-=> not know. Their word for 'crisis' means both 'danger' and 'opportunity'
|
|
|
|
I think that they got the balance just about perfect with that
|
|
thought. There is a lot of opportunity right now, and there is also
|
|
quite a bit of danger. I include well-meaning proposals like this in
|
|
the "danger" category, because they involve a loss of privacy that
|
|
I'm not sure is balanced by any tangible gain for me, the user.
|
|
|
|
-=> ------------------------------------------------------------------------
|
|
-=>
|
|
-=> Wade Riddick is a graduate student and National Science Foundation
|
|
-=> Fellow in the Government Department at the University of Texas at
|
|
-=> Austin. His email address is riddick@jeeves.la.utexas.edu.
|
|
-=>
|
|
-=> ------------------------------
|
|
|
|
Hmm. Ok. I'm just another net.admin/programmer out here in the world.
|
|
Maybe I don't know any better, but I worry when the government
|
|
(or, in this case, somebody majoring in government) wants to help me.
|
|
|
|
Interesting times indeed...
|
|
|
|
------------------------------
|
|
|
|
Date: 6 May 1995 21:34:29 -0400
|
|
From: Marc Rotenberg <rotenberg@epic.org>
|
|
Subject: file 2--Commentary on NPR in re the Exon Bill (EPIC fwd)
|
|
|
|
The transcript of yesterday morning's NPR program on the Exon bill
|
|
follows. Yours truly and EPIC Advisory Board member Eli Noam went at
|
|
it with Senator Exon. The program went very well. The bill is
|
|
obviously in trouble.
|
|
|
|
- - -
|
|
|
|
On another civil liberties front, we could really use your help with
|
|
the $500,000,000 for the FBI wiretap program. With the folks in
|
|
Washington falling over one another to see who can put together the
|
|
most draconian terrorism legislation, the money for the national
|
|
surveillance plan remains the key to the bills. The Clinton
|
|
administration just proposed raising all civil fines by 40% (!) to
|
|
fund the payoff to telephone companies so the FBI can wiretap more
|
|
phones.
|
|
|
|
|
|
Also, Dave Banisar just finished going through the wiretap reports for
|
|
1994. Here are the key numbers (Some of this will be in a Newsweek
|
|
story on the stands later this week):
|
|
|
|
-- wiretapping reached an all-time high in 1994, 1,154 taps authorized
|
|
for federal and state combined up from 976 in 1993.
|
|
|
|
-- 75% of all taps were authorized for narcotics investigations, 8%
|
|
for gambling, and 8% for racketeering
|
|
|
|
-- Not a single tap was authorized for investigations involving
|
|
"arson, explosives, or weapons" in 1994. In fact, such an order
|
|
hasn't been approved since the late 1980s. Keep that in mind when
|
|
people say wiretapping is necessary to prevent tragedies like Oklahoma
|
|
City.
|
|
|
|
-- Only 17% of all conversations intercepted were deemed
|
|
"incriminating" by prosecutors. That figure is at an all-time low (in
|
|
the early '70s it was closer to 50%), and it means that the FBI is
|
|
gathering far more information through electronic surveillance
|
|
unrelated to a criminal investigation than ever before.
|
|
|
|
-- Also, the duration of the taps is way up, now around 40 days on
|
|
average. Twenty years ago, it was closer to 18.
|
|
|
|
We really need the help of civil liberties and free expression groups
|
|
with this campaign. For those who are sympathetic but think
|
|
wiretapping is not a First Amendment issue, take a look at Herbert
|
|
Mitgang, _Dangerous Dossiers: Exposing the Secret War Against
|
|
America's Greatest Authors_ or recall the FBI's "Library Awareness
|
|
Program" of the 1980s.
|
|
|
|
The FBI's claim that new technologies are frustrating wiretap is
|
|
completely without support. But if the $500,000,000 to make the
|
|
network wiretap ready is appropriated, the current trends will be
|
|
amplified: more surveillance, longer duration, less well targeted -->
|
|
less privacy for all Americans.
|
|
|
|
Check out our web page http://epic.org/terrorism/ or send a message to
|
|
wiretap@epic.org. We even set up an 800 number for folks who want to
|
|
send mailgrams.
|
|
|
|
And send comments to me if you have suggestions.
|
|
|
|
Thanks,
|
|
|
|
Marc.
|
|
|
|
====================
|
|
|
|
Copyright 1995 National Public Radio
|
|
NPR
|
|
|
|
SHOW: Morning Edition (NPR 6:00 am ET)
|
|
|
|
May 5, 1995
|
|
|
|
Transcript # 1600-3
|
|
|
|
TYPE: Package
|
|
|
|
SECTION: News; Domestic
|
|
|
|
LENGTH: 788 words
|
|
|
|
HEADLINE: Senator Wants to Police Internet Porno
|
|
|
|
GUESTS: Sen. J. JAMES EXON (D NB); ELI NOAM, Tele-Information
|
|
Institute, Columbia University; MARC ROTENBERG, Electronic Privacy
|
|
Information Center
|
|
|
|
BYLINE: JOHN NIELSEN
|
|
|
|
HIGHLIGHT:
|
|
The Senate telecommunications reform bill will now include an
|
|
amendment to ban materials considered lewd and lascivious on the
|
|
Internet. Some critics fear the government would become Internet
|
|
police.
|
|
|
|
BODY:
|
|
BOB EDWARDS, Host: Some senators are concerned about sexually
|
|
oriented communication on the Internet, the global network of
|
|
computers. An amendment to the Senate's telecommunications reform
|
|
bill would ban materials considered indecent, lewd, or lascivious.
|
|
Supporters say the idea is to protect children. NPR's John Nielsen
|
|
reports.
|
|
|
|
JOHN NIELSEN, Reporter: Democratic Senator James Exon of Nebraska
|
|
says he marvels at the Internet. With it, people all over the
|
|
world can now meet and interact, they can talk privately, they can
|
|
talk in groups, they can look at pictures, and they can sell each
|
|
other information. Exon considers it the biggest advance in
|
|
communications technology since the invention of the printing
|
|
press. But Exon also thinks the Internet has one gigantic
|
|
failing. He says there's an awful lot of pornography on this
|
|
system and it's almost all accessible to everyone who goes online.
|
|
A child with basic computer skills easily can stumble into the
|
|
equivalent of a pornographic bookstore, Exon says, and he doesn't
|
|
think that should be legal.
|
|
|
|
Sen. J. JAMES EXON (D-NB): I cannot imagine that the framers of
|
|
the Constitution intended that pornography, in and of itself,
|
|
would be protected under the First Amendment. Certainly not for
|
|
kids.
|
|
|
|
JOHN NIELSEN: That's why Exon and Washington Republican Slade
|
|
Gorton recently attached an anti-smut amendment to the Senate's
|
|
telecommunications reform bill. It would punish people who
|
|
transmit 'obscene, lewd, lascivious, filthy, or indecent
|
|
materials' with fines of up to $100,000, or jail terms of up to
|
|
two years. Anti-smut organizations have applauded the broadly
|
|
worded amendment; so has South Dakota Republican Larry Pressler,
|
|
author of the telecommunications reform bill.
|
|
|
|
But critics say these anti-smut rules are dangerously vague. Eli
|
|
Noam, of Columbia University's Tele-Information Institute, says
|
|
they're tougher in some ways than telephone smut laws, which allow
|
|
consenting adults to say or hear anything they want to each other.
|
|
|
|
ELI NOAM, Tele-Information Institute, Columbia University: What
|
|
the Exon-Gorton amendment would do, in effect, would make such
|
|
conversations potentially illegal and, furthermore, would apply a
|
|
very vague standard to it.
|
|
|
|
JOHN NIELSEN: Marc Rotenberg, of the Electronic Privacy
|
|
Information Center, has a different concern. He fears the new law
|
|
will turn prosecutors in conservative parts of the country into a
|
|
kind of Internet police. For instance, these prosecutors might
|
|
argue that paintings and books from out-of-town libraries and
|
|
museums violate community norms. Rotenberg says that could keep
|
|
those libraries and museums off the Internet completely.
|
|
|
|
MARC ROTENBERG, Electronic Privacy Information Center: You may
|
|
have to stop and think for a moment. I mean, in your art
|
|
collection you got to wonder about some of those Impressionists.
|
|
Can we put everything that we've got currently hanging on the
|
|
walls, can we put that stuff online?
|
|
|
|
JOHN NIELSEN: Now, Senator Exon's staff has tried hard to answer
|
|
criticisms of the anti-porn bill. They've dropped language that
|
|
would have held online carriers like CompuServe and America Online
|
|
responsible for the actions of their customers, and they've added
|
|
language restricting the government's right to monitor Internet
|
|
conversations. But that last change may have created as many
|
|
problems as it solved. In a letter released this week, the
|
|
Justice Department said restrictions on digital wire-tapping could
|
|
cripple government efforts to catch computer hackers and to track
|
|
suspected terrorists.
|
|
|
|
Spokesmen for Senator Exon say they don't think that's true, but
|
|
the senator says he's perfectly willing to hear his critics out.
|
|
He'll also consider more revisions.
|
|
|
|
Sen. J. JAMES EXON: And I don't mind taking the hits from some
|
|
people that accuse me of wanting to be a censor because all of
|
|
that has fed interest in the story and millions of people know
|
|
about it now that had no idea of the magnitude of the problem
|
|
before I first introduced the bill.
|
|
|
|
JOHN NIELSEN: Right now the bill's future is uncertain. When the
|
|
Senate telecommunications bill comes up for a final vote this
|
|
month, Democratic Senator Patrick Leahy of Vermont will try to
|
|
push the anti-smut debate aside for at least six more months.
|
|
That would give the Justice Department time to develop an
|
|
alternative to Exon's anti-smut plan. I'm John Nielsen in
|
|
Washington.
|
|
|
|
|
|
The preceding text has been professionally transcribed.
|
|
However, although the text has been checked against an audio
|
|
track, in order to meet rigid distribution and transmission
|
|
deadlines, it may not have been proofread against tape.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 9 May 1995 00:33:30 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: file 3--Noam Chomksy on the Internet (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
|
|
[Noam Chomksy - interview in "GeekGirl" magazine]
|
|
|
|
Noam Chomsky interviewed by RosieX and Chris Mountford
|
|
|
|
Chris Mountford: Professor Chomsky what do you see as the present influence
|
|
of technology - primarily low cost small powerful computers and global
|
|
public information networks - the technology of the so-called information
|
|
revolution, on the mass media power in the future?
|
|
|
|
*THE FIRST EDGE*
|
|
|
|
Noam Chomsky: Well, I think it's double edged and you can already see the
|
|
competing/conflicting tendencies developing. Up until now it's been pretty
|
|
much a monopoly of relatively privileged sectors, of people who have access
|
|
to computers in universities and so on. Say, in the academic world it's
|
|
turned out to be a very useful way of communicating scientific results, but
|
|
in the area we are talking about it has been used pretty efficiently in
|
|
distributing information and setting up interconnections etc. Do you have
|
|
peacenet or something equivalent in Australia?
|
|
|
|
Rosie X: Yes the Pegasus Network..
|
|
|
|
NC: Okay, in the US and particularly Europe, Peacenet puts across tons of
|
|
information and also loads of specialist Bulletin Boards where groups with
|
|
particular interests and concerns interact and discuss all sorts of things.
|
|
The main journal that I write for is Z magazine, an independent left
|
|
journal. They have a Z bulletin board which leftie types subscribe to. They
|
|
are now bringing in the readership of other media left, so on some issues
|
|
(eg East Timor) it's just been invaluable in organising. The reason for
|
|
that is most of the information about it isn't in the mainstream. So for
|
|
example a lot of it comes from Australia and until recently the Australian
|
|
press was really accessible only to special lucky people...it was
|
|
accessible to me cos I have friends here, who have been clipping madly for
|
|
20 years and sending me stuff, but that's not much help to the population.
|
|
These days it's readily available, like say the Dili massacre, you know all
|
|
the news was out at once. Other issues have come to the fore, which is all
|
|
a positive consequence of the technology.
|
|
|
|
*THE SECOND EDGE*
|
|
|
|
NC:However there's a downside, several in fact. One aspect of it which is
|
|
hard to quantify, but I see it very clearly myself. I am deluged with mail,
|
|
in fact I spend 20hrs a week or so just answering letters, and often they
|
|
are long interesting letters.It's a reflection of the fact that global
|
|
society is very atomised and very much alone. They think they are the only
|
|
person who thinks in a particular way. I constantly get letters saying I
|
|
read something you wrote and I thought I was the only person in the world
|
|
who had these crazy ideas and so on. Things have been so atomised and
|
|
broken down and de-personalised that people have lost the normal bonds of
|
|
association and communication, and so there's tons of mail. Recently e-mail
|
|
has been mounting very fast, and its to the point where I have to stop
|
|
answering it, cos its physically impossible, so I am now have to send form
|
|
letters saying, "I just can't do it"...send me snail-mail...
|
|
|
|
*BIG BROTHER INCORPORATED*
|
|
|
|
NC: The big effect which I still haven't mentioned and the one that worries
|
|
me most is what the corporate world is telling us they have in mind. And
|
|
what they are telling us they have in mind is taking the whole thing over
|
|
and using it as a technique of domination and control. In fact I recall
|
|
reading an article in maybe the Wall Street Journal or somewhere which
|
|
described the great potential of this system and they gave two examples to
|
|
illustrate their point; one for the female market and one for the male
|
|
market. Of course the ideal was to have every human being spend every spare
|
|
moment alone in front of the tube and now it's interactive! So for women
|
|
they will be watching some model advertising some crazy product which no
|
|
sane human being would want, but with enough PR aura around, and since it's
|
|
interactive they can have home delivery in ten minutes. For men, they said
|
|
every red blooded American male is supposed to be watching the super bowl.
|
|
Now it's just passive and you watch the super bowl and drink beer with your
|
|
buddies, and so on, but with interactivity what we can do is, before the
|
|
coach sends in the next play, everyone in the audience can be asked to
|
|
punch in what they think it oughtta be. So they are participating, and then
|
|
after the play is called they can flash on the screen 43% said it should
|
|
have been a kick instead of a pass...or something, so there you have it
|
|
something terrific for men and women. And this was not intended as a
|
|
caricature; that's exactly the kind of thing they have in mind and you can
|
|
see it make sense ...if I were a PR guy working for Warner Communications
|
|
that's just what I'd be working on. Those guys have billions of $ that they
|
|
can put into this, and the whole technology including the Internet can go
|
|
in this direction or it can go any other direction. Incidentally the whole
|
|
thing is simply reliving things that have gone on with earlier
|
|
communication technologies and it's well worth having a look at what
|
|
happened. Some very clever left type academics and media people have
|
|
charted the course of radio in US since the 20s. In the US things took
|
|
quite a different course from the rest of the world in the 1920s, the
|
|
United States is a very business run society with a very high class
|
|
business community. Like vulgar Marxists with all the values reversed,
|
|
their stuff reads like Maoist tracks have the time just change the words
|
|
around.
|
|
|
|
*BACK TO THE ROOTS*
|
|
|
|
NC: In the 20s there was a battle. *radio* was coming along, everyone knew
|
|
it wasn't a marketable product like shoes. It's gonna be regulated and the
|
|
question was, who was gonna get hold of it? Well, there were groups,
|
|
(church groups, labor unions were ex tremely weak and split then, & some
|
|
student groups), but it was a very weak civil society, and it had been a
|
|
very repressive period just after Wilson's red scare, which had just
|
|
smashed up the whole society. There were people who tried to organise to
|
|
get radio to become a kind of a public interest phenomenon; but they were
|
|
just totally smashed. I mean it was completely commercialised, it was
|
|
handed over under the pretext it was democratic, cos if you give it to the
|
|
big corporations then it's pure democracy. So radio in the US became almost
|
|
exclusively commercialised - they were allowed a student radio station
|
|
which reached three blocks or something. Now the rest of the world went the
|
|
other way, almost everywhere else it became public. Which means it was as
|
|
free as the society is - you know never very free but at least to whatever
|
|
extent people can affect what a government does, which is something after
|
|
all - to that extent radio was a public good. In the US, the opposite. Now
|
|
when TV came along in the US it wasn't even a battle. By then business
|
|
dominance was so overwhelming that the question never even arose. It became
|
|
purely private. In the 1960s they allowed public radio and tv but in an
|
|
interesting way. [The] public could act to some extent through the
|
|
parliamentary institutions, and congress had imposed some conditions on
|
|
public interest requirements on the big networks, which means they had to
|
|
spend two percent of their time at 3am Sunday allowing a community group
|
|
on...or something...and then every year they had to file reports to the
|
|
federal communications commission saying, 'yeah here is the way we met our
|
|
responsibility', which was mainly a nuisance as far as CBS was concerned.
|
|
Actually I knew someone who worked in one of their offices and she told me
|
|
they had to spend all sorts of time lying about what they were doing and it
|
|
was a pain in the neck. At some point they realised it would be better to
|
|
just get the burden off their heads and allow a marginal public system
|
|
which would be very poorly funded and marginalised and under state
|
|
corporate control anyway, and then they wouldn't even have to pretend any
|
|
longer, and that's pretty much how those two modes of communications turned
|
|
out.
|
|
|
|
*NOAM'S NO NEWBIE*
|
|
|
|
N.C: ...to tell you something personally I have a daughter in Nicaragua,
|
|
and Nicaragua in the 80s was under a complete ban.You couldn't get a letter
|
|
down there, but we were communicating thanks to the Pentagon. Thanks to the
|
|
Pentagon and the fact that I'm at MIT, I was the on the ARPANET, and it's
|
|
not meant for people like me but they can't get me out, and so my daughter
|
|
(who had a connection) and I during the terrorist war were actually
|
|
communicating thanks to the Pentagon.
|
|
|
|
RX: Ahh, did you use or do you use cryptography?
|
|
|
|
NC: I just don't care about secrecy. In fact one thing I have learned over
|
|
the years in resistance, and been close to long jail sentences and been in
|
|
trials. I know this system pretty well, and the one thing I've discovered
|
|
over the years is to be complet ely public. The intelligence systems are so
|
|
ideologically fanatic that they can not understand public opposition. I
|
|
mean I can give you exact examples of this. They assume that everybody is
|
|
as nutty as they are and so they spend all their time and energy trying to
|
|
figure out the connections to North Korea or something like that, the idea
|
|
that someone could honestly and openly say "I defy the Government, I reject
|
|
what you're doing, I'm gonna subvert it and so on"... they simply dismiss.
|
|
The safest thing always is to be quite public. Furthermore there is no way
|
|
to protect yourself from the National Security Administration snooping, you
|
|
know, and they don't bother, they don't have the resources and if they had
|
|
they couldn't do anything with them cos they are to stupid to use the
|
|
information.
|
|
|
|
*IS TECH ENOUGH?*
|
|
|
|
CM: I'd actually like to take you up there on your point about one of the
|
|
negatives of corporate control. At the moment a large number of online
|
|
communities or groups who consider themselves communities don't have the
|
|
problem you mentioned, junk e-mail, because their group communications are
|
|
public, there's no possibility of responding to everything - that was given
|
|
up long ago - quality is judged by the viewer. Perhaps it's easier to find
|
|
what you are looking for with this technology, you can do more than change
|
|
channel. Compounding with that, unlike broadcast media which as you
|
|
mentioned were appropriated by corporations, this is not broadcast this is
|
|
not one-to-many but any-to-any, it can be one on one or one to a very large
|
|
audience.
|
|
|
|
NC: The same is true of cable TV for example, theoretically you can have
|
|
dozens of cable television channels, and in fact, in the US there are laws
|
|
which require the major corporations to fund independent cable stations.
|
|
Well the net effect is that virtually nothing happens and the reason is
|
|
because [of] the distribution for resources, energy and organisation, so
|
|
what you are saying is theoretically true. But the way it works out in
|
|
practice is a reflection of the state of activism and organisation and
|
|
resource allocation and so on. Incidentally the public nets where everyone
|
|
is talking to one another have, in my opinion, the same degraded character
|
|
as the individual e-mail messages; people are just too casual in what comes
|
|
across...the effect is you often get good things, but buried...the quality
|
|
of what people are doing is actually declining because of their intense
|
|
involvement in these e-mail interactions which are have such an
|
|
overwhelming character when you get involved in them. And it's kind of
|
|
seductive, not personally for me, but I know people get seduced by the
|
|
computer and sitting there banging around at it. It has a negative
|
|
potential and a certain positive potential, but I think it's a double edged
|
|
sword
|
|
|
|
*FLAMES, FLAMES AND THE FUTURE*
|
|
|
|
RX: What about flaming, is it a sign of human nature having been oppressed
|
|
for so long that people are hell bent on vetting their anger in a medium
|
|
where they can be anonymous.
|
|
|
|
NC: I don't think its very different from personal interactions, people
|
|
throw things at each other and hit each other...its quite common place
|
|
|
|
RX: Do you think anger is an initial stage of the technology?
|
|
|
|
NC: I think the way the technology is likely to go is unpredictable... if I
|
|
had to make a guess, my guess is corporate take-over, and that to the
|
|
extent that it's so far tax payer supported and it's a government
|
|
institution or whatever people call it, in fact it's a military
|
|
installation/system at base and they are letting it go, and the reason they
|
|
are letting it go is cos they are not concerned about the positive effects
|
|
it has, because they probably feel, maybe correctly, that it's overwhelmed
|
|
by the n egative effects...and these are things people have to achieve -
|
|
they are not going to be given as gifts...like the Pentagon is not going to
|
|
give people as a gift a technique for free communication which undermine
|
|
the major media; if its going to take out that way it will be cos of
|
|
struggle like any other victory for freedom.
|
|
|
|
*ANYONE'S TOOL*
|
|
|
|
CM: Do you think that the technology is inherently democratic?
|
|
|
|
NC: There is no technology which is inherently democratic or no technology
|
|
which is inherently oppressive for that matter, technology is usually a
|
|
fairly neutral thing. The technology doesn't care really whether it's used
|
|
for oppression or liberation, it's how people use it.
|
|
|
|
CM: If you have what's probably pretty close to a level playing field, even
|
|
with a cheap set-up, and have basically the same capability to publish
|
|
whatever you produce as everyone else does, a quality document or whatever,
|
|
(not just half-baked junk e-mail) it can be distributed more easily than
|
|
traditional product- based means. Then you work in the looming financial
|
|
link, what you mentioned before - people leaving their subscriptions
|
|
behind, that could perhaps become all electronic.
|
|
|
|
NC: First of all the business...about level playing field is all a bit of a
|
|
joke, I mean type writers and paper are also a level playing field but that
|
|
doesn't mean that the mass media system is equally distributed among the
|
|
population. What's called a level playing field, is just capitalist
|
|
ideology, its not a level playing field when power is concentrated. And
|
|
even if, formally speaking, a market is meant to be a level playing
|
|
field...but we know what that means..as to using this type of technology,
|
|
the threat to left institutions is severe in my opinion. If people do or
|
|
become so anti-social and so controlled by market ideology even people on
|
|
the left, that they will drop their support for independent left media
|
|
institutions because they can get something free, those institutions will
|
|
decline and they won't be anything over the Internet, as what goes over the
|
|
Internet now is things that come out of the existing institutions. If those
|
|
are destroyed nothing is going to come out that counts. There are ways
|
|
around this, for example you could subscribe to some Internet forums...for
|
|
example Time Magazine are putting their stuff out free on the Internet and
|
|
this makes a lot of sense for them because a journal like Time does not
|
|
make money when they sell subscriptions, they lose money. They make money
|
|
from advertising, so they are delighted to not have to distribute the thing
|
|
physically...they are delighted to give it away free, because then they
|
|
don't have the cost of selling it at news stands and sending subscriptions.
|
|
They still get the same income mainly from advertising, but that's not true
|
|
for say Z magazine, they don't live on advertising they live on
|
|
subscriptions..
|
|
|
|
RX: What other publications do you read, and do you ever peak at Wired...or
|
|
other high tech publications?
|
|
|
|
NC: I'm not much into high tech culture...even though I am at MIT, and my
|
|
wife works at educational technology and my son is a computer fanatic. I
|
|
don't have time to read Zines, I don't find them very enlightening.
|
|
|
|
---------------------------------------------------------
|
|
Needless to say Noam Chomsky declined giving us his e-mail address!!
|
|
|
|
------------------------------
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: file 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.37
|
|
************************************
|
|
|