3108 lines
158 KiB
Plaintext
3108 lines
158 KiB
Plaintext
|
|
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
|
|
======================================================================
|
|
ISSN 1074-3111 Volume One, Issue Three April 30, 1994
|
|
======================================================================
|
|
|
|
Editor-in-Chief: Scott Davis (dfox@fennec.com)
|
|
Technology Editor: Max Mednick (kahuna@bga.com)
|
|
Consipracy Editor: Gordon Fagan (flyer@fennec.com)
|
|
Network Security: George Phillips (ice9@bga.com)
|
|
|
|
** ftp site: etext.archive.umich.edu /pub/Zines/JAUC
|
|
|
|
U.S. Mail:
|
|
The Journal Of American Underground Computing
|
|
10111 N. Lamar #25
|
|
Austin, Texas 78753-3601
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
IMPORTANT ADDRESSES -
|
|
============================================================================
|
|
To Subscribe to "TJOAUC", send mail to: sub@fennec.com
|
|
All questions/comments about this publication to: comments@fennec.com
|
|
Send all articles/info that you want published to: submit@fennec.com
|
|
Commercial Registration for Profitable Media: form1@fennec.com
|
|
============================================================================
|
|
|
|
"The underground press serves as the only effective counter to a growing
|
|
power, and more sophisticated techniques used by establishment mass media
|
|
to falsify, misrepresent, misquote, rule out of consideration as a priori
|
|
ridiculous, or simply ignore and blot out of existence: data, books,
|
|
discoveries that they consider prejudicial to establishment interest..."
|
|
|
|
(William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
Contents Copyright (C) 1994 The Journal Of American Underground Computing
|
|
and/or the author of the articles presented herein. All rights reserved.
|
|
Nothing may be reproduced in whole or in part without written permission
|
|
of the Editor-In-Chief and/or the author of the article. This publication
|
|
is made available periodically to the amateur computer hobbyist free of
|
|
charge. Any commercial usage (electronic or otherwise) is strictly
|
|
prohibited without prior consent of the Editor, and is in violation of
|
|
applicable US Copyright laws. To subscribe, send email to sub@fennec.com
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
DISCLAIMER AND NOTICE TO DISTRIBUTORS -
|
|
|
|
NOTE: This electronic publication is to be distributed free of charge
|
|
without modifications to anyone who wishes to have a copy. Under NO
|
|
circumstances is any issue of this publication, in part or in whole,
|
|
to be sold for money or services, nor is it to be packaged with other
|
|
computer software, including, but not limited to CD Rom disks, without
|
|
the express written or verbal consent of the author and/or editor.
|
|
To obtain permission to distribute this publication under any of the
|
|
certain circumstances stated above, please contact the editor at one of
|
|
the addresses above. If you have intentions of publishing this journal
|
|
in any of the ways described above, or you are in doubt about whether or
|
|
not your intentions conflict with the restrictions, please contact the
|
|
editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
|
|
This publication is provided without charge to anyone who wants it.
|
|
This includes, but is not limited to lawyers, government officials,
|
|
cops, feds, hackers, social deviants, and computer hobbyists. If anyone
|
|
asks for a copy, please provide them with one, or mail the subscription
|
|
list so that you may be added.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 3
|
|
|
|
TABLE OF CONTENTS
|
|
|
|
1) Visa Establishes International Consortium... NewsWire
|
|
2) Cyberspace Cowboy Maureen Harrington
|
|
3) A Message From The Vice President Al Gore
|
|
4) Legion Of Doom T-Shirts Chris Goggans
|
|
5) Computers Tnd The Second Amendment Carl Guderian
|
|
6) How To Survive The First Year Of Law School.. Mike Godwin
|
|
7) Notes From Cyberspace - 2nd Edition Readers
|
|
8) Editorial Of The Month [A Humorous Diddy] Marco Landin
|
|
9) Whitehouse Electronic Publications FAQ Stanton McCandlish
|
|
10) Redefining The Modem User Ed Cavazos
|
|
11) Texas ISDN - Request For Comments Public Util. Comm.
|
|
12) Test Scores, Funny, But Makes You Wonder Anonymous
|
|
13) An Interview With Tom Jennings Jon Lebkowsky
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
J.R. "Bob" Dobbs - The Ultimage SubGenius
|
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
|
@@@@@@@^^~~~~~~~~~~~~~~~~~~~~^^@@@@@@@@
|
|
@@@@@@^ ~^ @ @@ @ @ @ I ~^@@@@@@
|
|
@@@@@ ~ ~~ ~I @@@@@
|
|
@@@@' ' _,w@< @@@@
|
|
@@@@ @@@@@@@@w___,w@@@@@@@@ @ @@@
|
|
@@@@ @@@@@@@@@@@@@@@@@@@@@@ I @@@
|
|
@@@@ @@@@@@@@@@@@@@@@@@@@*@[ i @@@
|
|
@@@@ @@@@@@@@@@@@@@@@@@@@[][ | ]@@@
|
|
@@@@ ~_,,_ ~@@@@@@@~ ____~ @ @@@
|
|
@@@@ _~ , , `@@@~ _ _`@ ]L J@@@
|
|
@@@@ , @@w@ww+ @@@ww``,,@w@ ][ @@@@
|
|
@@@@, @@@@www@@@ @@@@@@@ww@@@@@[ @@@@
|
|
@@@@@_|| @@@@@@P' @@P@@@@@@@@@@@[|c@@@@
|
|
@@@@@@w| '@@P~ P]@@@-~, ~Y@@^'],@@@@@@
|
|
@@@@@@@[ _ _J@@Tk ]]@@@@@@
|
|
@@@@@@@@,@ @@, c,,,,,,,y ,w@@[ ,@@@@@@@
|
|
@@@@@@@@@ i @w ====--_@@@@@ @@@@@@@@
|
|
@@@@@@@@@@`,P~ _ ~^^^^Y@@@@@ @@@@@@@@@
|
|
@@@@^^=^@@^ ^' ,ww,w@@@@@ _@@@@@@@@@@
|
|
@@@_xJ~ ~ , @@@@@@@P~_@@@@@@@@@@@@
|
|
@@ @, ,@@@,_____ _,J@@@@@@@@@@@@@
|
|
@@L `' ,@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
|
|
|
|
|
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - April 30,1994 ISSN 1074-3111
|
|
============================================================================
|
|
|
|
EDITOR'S NOTES:
|
|
|
|
FREE-NET: I had intended to do some kind of informative article on
|
|
the Free-Net systems around the world for this issue. In my attempts to
|
|
get information, I mailed about 60 individuals/groups requesting information
|
|
on their organization. I contacted persons in several countries as well as
|
|
many, many people here in the states. ...and low and behold, only 2 people
|
|
responded offering information. Half did not reply at all, and the other
|
|
half (minus the two brave souls mentioned above) replied saying that they
|
|
had not developed an organization, had no info, no volunteers, etc...
|
|
Go figure...(Is Free-Net the Vapor-Ware of the 90's??)
|
|
|
|
PUBLISHING: Our original publishing schedule has gone to hell-in-a-handbasket
|
|
to say the least. We will probably release 2 or 3 times per quarter.
|
|
|
|
Order some Legion Of Doom T-Shirts!
|
|
|
|
Share this issue with all of the little boys and girls that you know who
|
|
have an e-mail address.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
VISA ESTABLISHES INTERNATIONAL CONSORTIUM FOR
|
|
ELECTRONIC PURSE SPECIFICATIONS
|
|
|
|
/PRNEWSWIRE (C)opyright 1994
|
|
|
|
SAN FRANCISCO, March 22 /PRNewswire/ -- Visa today formed an international
|
|
consortium of market leaders in the consumer payments industry to develop
|
|
common specifications for a new way to pay -- an "Electronic Purse," a card
|
|
with a micro chip that can be used instead of cash and coins for everything
|
|
from vending machines to public transportation.
|
|
|
|
The Electronic Purse would consist of a micro-chip embedded in a credit
|
|
card, debit card, or stand alone card to store value electronically.
|
|
The card would replace cash and coins for small-ticket purchases (less than
|
|
U.S. $10), such as gasoline stations, pay phones, road/bridge tolls, video
|
|
games, school cafeterias, fast food restaurants, convenience stores, and
|
|
cash lanes at supermarkets. Cardholders can "reload" the micro-chip and
|
|
control the amount of value stored in the card's memory. The Electronic
|
|
Purse provides cardholders with the security and convenience of carrying
|
|
less cash and coins, eliminating the need for exact change. Many
|
|
participants in this worldwide effort are currently pilot testing electronic
|
|
purse products, additional pilots are expected in late 1995.
|
|
|
|
Joining forces with Visa to develop international technical specifications
|
|
for the Electronic Purse are: Banksys; Electronic Payment Services, Inc.,
|
|
(EPS); Financial Information Systems Center, (FISC); Groupement des Cartes
|
|
Bancaires, (CB); NationsBank Corporation; Sociedad Espanola de Medios de
|
|
Pago, (SEMP); Sociedade Interbancaria de Servicos, S.A., (SIBS); and
|
|
Wachovia Corporation. To ensure worldwide representation, limited additional
|
|
payment systems that have invested energies in open-market electronic purse
|
|
projects, will be invited to join. In addition, Visa will form a parallel
|
|
group with technology companies to ensure the specifications support low-cost,
|
|
efficient production of necessary equipment.
|
|
|
|
"The goal of our combined efforts is to lead the market into the next
|
|
frontier of payment processing -- the automation of cash and coins," said Ed
|
|
Jensen, president and chief executive officer, Visa International. "The
|
|
highly complementary capabilities of the participating companies will allow
|
|
us to address issues for all aspects of smart card-based electronic purse
|
|
solutions, including the cards themselves, point-of-sale systems, networks
|
|
and back-end interchange and settlement systems."
|
|
|
|
This announcement reflects Visa's commitment to providing superior,
|
|
convenient payment services to its member financial institutions who serve
|
|
consumers and merchants around the globe. The consortium was formed in
|
|
response to member requests that Visa take the lead in facilitating the
|
|
addition of an electronic purse to existing credit and debit cards, as well
|
|
as the introduction of a stand alone card. Visa will leverage its global
|
|
brand presence by teaming up with strategic partners to develop common
|
|
standards.
|
|
|
|
"The most critical step in making this concept a global market reality is
|
|
the definition of open standards that can be shared among all participants,"
|
|
said Wesley Tallman, president, Visa Products and Information Services.
|
|
"Recognizing that important domestic electronic purse developments are
|
|
underway, the consortium will leverage the expertise of all participants.
|
|
Group 'knowledge sharing,' especially with our European participants that
|
|
have made significant advancements in the chip card arena, will facilitate
|
|
the development of a specification that is relevant to markets worldwide."
|
|
The technological specifications will govern the standards needed to
|
|
establish an infrastructure that supports electronic purse payments.
|
|
|
|
The worldwide market for automating cash transactions remains virtually
|
|
untapped. According to the Bank for International Settlement, consumer cash
|
|
transactions in the U.S. alone exceed 300 billion per year. By contrast,
|
|
bank-facilitated consumer transactions, such as credit and debit cards,
|
|
checks, and wire transfers total only 60 billion per year. As these figures
|
|
indicate, there is a vast market potential for automating cash transactions.
|
|
"EPS has been investing significant resources to develop smart card solutions
|
|
since 1991," stated David Van Lear, chairman and chief executive officer of
|
|
Electronic Payment Services, Inc. "Combining the resources of these industry
|
|
leaders will accelerate market acceptance."
|
|
|
|
Just as the standard operating environments have fueled the growth of the
|
|
personal computer industry, the specifications that emerge from this
|
|
collective effort will provide the essential framework to ensure
|
|
compatibility, reduce development time and cost, and open up the market for
|
|
others.
|
|
|
|
International payment system participants included in this cooperative
|
|
effort are:
|
|
|
|
Banksys -- based in Brussels, Belgium, is a leading European specialist in
|
|
electronic funds transfer (EFT) and payment security. Banksys operates the
|
|
automated teller machine (ATM) and point-of-sale (POS) network on behalf of
|
|
all card issuing banks in Belgium. Besides Belgium, 10 other countries are
|
|
equipped with the Banksys system. Banksys is entrusted with the development
|
|
of the Belgian Electronic Purse project, with pilot testing expected to begin
|
|
in December 1994.
|
|
|
|
Electronic Payment Services, Inc.(EPS) -- based in Wilmington, Del., is the
|
|
leading electronic funds transfer company in the United States with an annual
|
|
transaction volume of 1.7 billion. EPS is the holding company for BUYPASS
|
|
Corporation and MONEY ACCESS SERVICE INC., operator of the MAC(R) network.
|
|
|
|
Financial Information Systems Center (FISC) -- based in Taipei, Taiwan, is a
|
|
government organization that supports electronic purse initiatives in that
|
|
country. Through its members, FISC has issued 80 thousand integrated circuit
|
|
cards and has installed more than one thousand point-of-sale systems with
|
|
integrated circuit card readers.
|
|
|
|
Groupement des Cartes Bancaires (CB) -- based in Paris, is the country's
|
|
payment cards organization that has succeeded in launching the world's
|
|
largest integrated circuit card program, with more than 22 million cards in
|
|
circulation generating 2.2 billion transactions per year.
|
|
|
|
NationsBank Corporation -- headquartered in Charlotte, N.C., is the third
|
|
largest banking company in the United States with approximately $158 billion
|
|
in assets, more than 1,900 retail banking centers in nine states and the
|
|
District of Columbia, and consumer offices in 33 states. NationsBank is a
|
|
financial services company providing products and services nationally and
|
|
internationally to individuals, businesses, corporations, institutional
|
|
investors and government agencies.
|
|
|
|
Sociedad Espanola de Medios de Pago (SEMP) -- based in Madrid, SEMP is a
|
|
sister company of Visa Espana, a group member of Visa banks in Spain. SEMP
|
|
operates Sermepa, the card processing company of Visa Espana.
|
|
|
|
Sociedade Interbancaria de Servicos, S.A., (SIBS) -- based in Lisbon,
|
|
Portugal, is the country's leading bank payments company which provides
|
|
electronic clearing services and operates the national Multibanco ATM and
|
|
EFT/POS networks. As an extension to its service offerings, SIBS, is
|
|
introducing the Multibanco Electronic Purse, (MEP).
|
|
|
|
Visa International -- headquartered in the United States, is the world's
|
|
leading consumer payments system with more than 333 million cards issued,
|
|
more than 11 million acceptance locations, and the largest global ATM
|
|
network.
|
|
|
|
Wachovia Corporation -- with dual headquarters in Atlanta, and
|
|
Winston-Salem, N.C., is one of the United States' leading debit card issuers
|
|
and provides credit card services to three million cardholders nationwide.
|
|
|
|
/NOTE TO EDITORS: In December 1993 Visa International, MasterCard
|
|
International and Europay announced an agreement to form a joint working
|
|
group to develop a common set of technical specifications for the
|
|
integration of microprocessor chips in payment cards -- commonly known as
|
|
"Integrated Circuit," "Chip," and "Smart" cards. The electronic currency
|
|
specifications referenced in this release will enable the electronic purse
|
|
application to be added to the integrated circuit cards./
|
|
|
|
/CONTACT: Albert Coscia of Visa, 415-432-2039/
|
|
|
|
03/28 VISA TECHNOLOGY GROUP SUPPORTS ELECTRONIC PURSE SPECIFICATIONS
|
|
|
|
SAN FRANCISCO, /PRNewswire/ -- Visa today announced the formation
|
|
of a technology group of international manufacturers to support the
|
|
adaptation of specifications for a variety of technologies that will
|
|
facilitate the issuance and acceptance of the "Electronic Purse" -- a payment
|
|
card that stores value electronically and is designed to replace cash and
|
|
coins for a wide range of low-value (under U.S. $10) consumer payments.
|
|
|
|
The technology group will work with Visa who recently formed an
|
|
international consortium of payment systems that will develop common
|
|
specifications for Electronic Purse programs. Because plans are underway
|
|
for the card to be used globally in a variety of venues -- including,
|
|
gas/petrol stations, grocery stores, convenience stores, fast food
|
|
restaurants, school cafeterias, and for such routine items as telephone calls
|
|
from pay phones, road/bridge tolls and video games -- a number of
|
|
technologies required to support card acceptance in global markets will be
|
|
examined by the group.
|
|
|
|
The first suppliers to join the international technology group are
|
|
VeriFone, Inc., the leading global provider of point-of-sale transaction
|
|
systems, and Gemplus, SCA, the world's leading manufacturer of smart cards. VeriFone and
|
|
Gemplus have formed a joint venture, called VeriGem, to pursue electronic
|
|
purse opportunities. To ensure worldwide representation, additional
|
|
technology leaders who have invested energies in electronic purse
|
|
applications will be invited to join the group.
|
|
|
|
In addition to acceptance technologies, "loading" systems that enable
|
|
cardholders to restore currency value into the micro chip will also be
|
|
analyzed. Automated Teller Machines (ATMs) are expected to play an important
|
|
role in loading value into the electronic purse. Future loading methods, such
|
|
as specialized devices located at merchant locations or in the home, will
|
|
also be explored. Operating both the largest international consumer payment
|
|
network, VisaNet, and the world's largest ATM network puts Visa in a unique
|
|
position to lead this global effort.
|
|
|
|
"As with all emerging technologies, consultation with suppliers responsible
|
|
for physically implementing the technology is critical to ensuring the
|
|
viability of the product design," said Wesley Tallman, president, Visa
|
|
Products and Information Services. "As market leaders in the payment systems
|
|
field, all of those who have joined us in this initiative are truly partners
|
|
in paving this 'express lane' of the electronic payment superhighway."
|
|
|
|
Tallman emphasized that the technology group will be charged with ensuring
|
|
that the specifications developed by the consortium support low-cost,
|
|
efficient production of necessary systems and equipment.
|
|
This group approach has been a key tool in support of Visa's product and
|
|
market development efforts. In December 1992, Visa formed a manufacturer's
|
|
group to support development efforts for security specifications of
|
|
integrated circuits on payment cards. Still active today, this group lends
|
|
critical on-going support and expertise to Visa's chip card efforts.
|
|
Participants in this international group include: Bull, CPS (France);
|
|
Gemplus, (France); Giesecke and Devrient (Germany); Schlumberger Industries
|
|
(France); and Toshiba Corporation (Japan). Visa expects and welcomes the
|
|
participation of these and other technology partners in the electronic purse
|
|
effort.
|
|
|
|
Hatim Tyabji, chairman, president and chief executive officer of VeriFone,
|
|
agreed with the need for a supplier's group that would lend systems expertise
|
|
to this effort. "Establishing worldwde specifications is the essential first
|
|
step in the global standardization of the electronic purse, uniting all
|
|
industry participants on a common playing field with a common set of rules.
|
|
The endorsement and support of the electronic purse by Visa, its member banks
|
|
and leading worldwide payment systems send a strong message to the industry
|
|
-- the electronic purse is no longer merely a possibility, but a real market
|
|
direction," said Tyabji.
|
|
|
|
"With their high storage capacity, programmability and increasing
|
|
affordability, smart cards are now poised to move beyond specialized
|
|
applications and become a truly universal payment medium," said Dr. Marc
|
|
Lassus, president and chief executive officer of Gemplus. "We share the
|
|
consortium's vision of the electronic purse, and are excited about helping
|
|
to bring speed, reliability and efficiency of smart card-based electronic
|
|
cash to markets around the globe."
|
|
|
|
Visa International, headquartered in San Francisco, California, is the
|
|
world's leading consumer payments system with more than 333 million cards
|
|
issued, more than 11 million acceptance locations, and the largest global
|
|
ATM network.
|
|
|
|
VeriFone, Inc., based in Redwood City, California, is a leading global
|
|
provider of Transaction Automation solutions used to deliver payment
|
|
processing and other transaction services to various retail market segments,
|
|
as well as the healthcare and government benefits market. The company has
|
|
more than 30 facilities located throughout Asia, Europe and the United States.
|
|
To date, VeriFone has shipped more than 3.4 million Transaction Automation
|
|
systems, which have been installed in more than 70 countries. Net revenues
|
|
in 1993 were U.S. $258.9 million.
|
|
|
|
Gemplus Card International, based in Gemenos, France, is the leading
|
|
worldwide manufacturer of smart cards. Gemplus' cards are used for secure
|
|
transactions in public and cellular telephone, banking, pay TV,
|
|
transportation, healthcare and defense applications. The company has three
|
|
manufacturing facilities: two near Marseilles, France, and one near
|
|
Stuttgart, Germany. Current Gemplus production exceeds 14 million cards
|
|
per month. The company has direct sales offices in 12 countries and a
|
|
distribution network covering an additional 50 countries worldwide. The
|
|
company's 1993 revenues were U.S. $130 million.
|
|
|
|
NOTE: Gemplus is a registered trademark of Gemplus Card International.
|
|
VeriFone is a registered trademark of VeriFone, Inc. Visa is a registered
|
|
trademark of Visa International, Inc.
|
|
|
|
/NOTE TO EDITORS: On March 22, 1994, Visa announced the formation of an
|
|
international consortium to develop worldwide technical specifications for
|
|
the Electronic Purse. The supplier's group discussed in this release is a
|
|
complementary effort, serving Visa in a consultative or advisory capacity.
|
|
|
|
/CONTACT: Albert Coscia of Visa, 415-432-2039/
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
CYBERSPACE COWBOY
|
|
|
|
John Perry Barlow rides the range on the electronic frontier
|
|
|
|
By Maureen Harrington
|
|
|
|
PINEDALE WY- John Perry Barlow isn't exactly your average
|
|
computer big shot. Burly and bearded, prone to an eccentric mix
|
|
of gaudy cowboy shirts and Italian leather jackets, he's a far
|
|
cry from a pencil neck geek with a pocket protector and a Mensa
|
|
membership. His interest in technology tends less to megabytes
|
|
than toward souping up the V-8 in his pickup.
|
|
|
|
But neither is he cut out for a corporate dance card. Barlow's
|
|
sarcasm would get him tossed out of most boardrooms.
|
|
|
|
Despite his unusual resume'- lyricist for the Grateful Dead,
|
|
former Students for a Democratic Society organizer with an
|
|
impeccable Republican pedigree, and failed Wyoming cattle rancher
|
|
with the heart of an environmentalist- Barlow, 46, found a niche
|
|
in computers. Accidentally.
|
|
|
|
He's an outlaw at heart who lost his home on the range and found
|
|
another. Barlow intends to keep the electronic frontier free of
|
|
rustlers, ruffians and the strong and long arm of the feds. Just
|
|
as he fought to keep the West free of polluters, developers and
|
|
the strong and long arm of the law.
|
|
|
|
The computer community has its first cultural historian, critic
|
|
and social activist. Barlow has set out to watchdog the goings
|
|
on in cyberspace- the intangible place between the computer key
|
|
board and the dots that appear on the computer screen.
|
|
|
|
He's become, by dint of his megaverbal skills and nontechnical
|
|
point of view, the cowboy conscience of the computer culture.
|
|
He's regarded by computer CEO's, journalists who follow the
|
|
industry and the wildcatters who swoop through systems as the man
|
|
to ask about the future of technology.
|
|
|
|
Barlow not only writes and speaks about the future that is racing
|
|
down the information highway, he puts his talent where his mouth
|
|
is: he helped found the Electronic Frontier Foundation (EFF) in
|
|
1991, along with Mitch Kapor, inventor of Lotus 1-2-3, the best-
|
|
selling spreadsheet software in the world and with an assist from
|
|
Steve Wozniak, Apple computer's onetime whiz kid.
|
|
|
|
Kapor and Barlow started the foundation to protect the right to
|
|
privacy in cyberspace. They had both been visited by federal
|
|
agents looking for the second-story men of the computer industry-
|
|
hackers. They became alarmed.
|
|
|
|
The tale of Kapor and Barlow's friendship has become one of the
|
|
first cyberspace legends.
|
|
|
|
"I was sitting here in Pindale, enjoying this new found world on
|
|
my computer, when an FBI agent shows up asking me what I might be
|
|
doing on it," said Barlow.
|
|
|
|
At the time, Barlow was unaware of a growing government concern
|
|
about what they considered computer crimes of the most heinous
|
|
nature.
|
|
|
|
"A nice guy, but he was expert in cattle rustling, not in high-
|
|
tech crime," recalled Barlow. "I tried to explain it to him, but
|
|
he didn't really understand computers. He went on back to the
|
|
office."
|
|
|
|
Barlow got on the techies' horn- the WELL, a computer bulletin
|
|
board- and alerted users all over the country to what happened.
|
|
In Connecticut, at about the same time, Kapor also had been
|
|
visited by the feds. Like Barlow, Kapor was concerned about
|
|
government invasion in this newly forming world.
|
|
|
|
He and Barlow got together via computers, naturally. Later
|
|
Kapor, on the way to the West Coast from his home on the East
|
|
Coast, dropped into Wyoming in his private jet to talk with
|
|
Barlow.
|
|
|
|
As Barlow tells it, "Here we are two very different guys- one
|
|
from Long Island, who has been a leader in this field for years
|
|
and me, a small town Wyoming rancher who just figured out how to
|
|
turn these things on. I felt like I'd known Mitch all my life."
|
|
|
|
In a few hours at a kitchen table in Wyoming, the two men
|
|
conceived the first civil rights group for high-tech's new age.
|
|
|
|
EFF, now headquartered in Washington, D.C., raises money for
|
|
lobbying and provides funds for the defense of so-called
|
|
"computer criminals." Their first projects were helping with the
|
|
legal defense of hackers who the founders don't think deserved
|
|
such harsh treatment by the feds.
|
|
|
|
"Oh, hell, these were kids mostly," said Barlow. "Just fooling
|
|
around. They were being treated like major criminals. This
|
|
hacking is a lot like boys going out to abandoned buildings and
|
|
looking around. Yeah, the property owners don't like it, but
|
|
it's part of a boy's life as far as I can tell."
|
|
|
|
Barlow and Kapor have been bitterly criticized for their support
|
|
of what many in corporate America- the software and telephone
|
|
companies, in particular- say are serious criminals.
|
|
|
|
Barlow takes that into consideration: "Crimes should be
|
|
prosecuted. There are some real bad things being done on these
|
|
machines. But that doesn't mean that we shouldn't be watching
|
|
out for misuse of (government) power and helping to protect the
|
|
innocent. We're into educating people about this stuff, as much
|
|
as anything."
|
|
-----------
|
|
|
|
Barlow doesn't fit, by nature or training, into either the
|
|
techno-wonk category or the big money elite that has developed
|
|
around the technology. Nonetheless, both factions of the
|
|
computer culture listen to him.
|
|
|
|
He's preaching the sermon of change, from his high-tech pulpit:
|
|
the computer bulletin board. Barlow can be read on The WELL (one
|
|
of the first and largest bulletin boards) as well as in the op-ed
|
|
pages of the New York Times and the slick computer-lifestyle
|
|
magazines, Wired and Mondo 2000.
|
|
|
|
He's been profiled in the New York Times and quoted as an expert
|
|
on the computer culture in scores of newspapers and
|
|
newsmagazines. Remarkably, Barlow had never used a computer
|
|
until four years ago. He caught on fast.
|
|
|
|
"Oh, Jesus," he said, rolling his eyes, impatient with ordinary
|
|
definitions of jobs. "I'm a techno-crank. I've got all kinds of
|
|
hats on and most of them don't fit exactly. But let's just say I
|
|
came into computers late, but I was able to see fairly quickly
|
|
some of the possibilities and problems of this new reality.
|
|
|
|
"I got my first computer to do some of the accounting work for
|
|
the ranch (The Bar Cross, outside Pinedale), in the late '80's.
|
|
I discovered that you could talk to people on it. I got
|
|
fascinated."
|
|
|
|
"Fascinated," for most of us, constitutes a hobby.
|
|
|
|
For Barlow, fascination turned into a new career. Caught in the
|
|
double bind of rising taxes and expenses and lower prices for
|
|
cattle, Barlow had to sell the Bar Cross, which had been in the
|
|
family for three generations. Just as that part of his life was
|
|
ending, he was catapulted into cyberspace. And his future.
|
|
|
|
Barlow is one of the few nontechnoids who has caught the
|
|
attention of the citizenry of cyberspace. In fact, he was the
|
|
first to co-opt the word "cyberspace" from sci-fi novelist
|
|
William Gibson and use it in everyday language.
|
|
|
|
According to Bruce Sterling, a journalist, novelist and
|
|
accomplished chronicler of computer culture, "Barlow saw that the
|
|
world of electronic communications, now made visible through the
|
|
computer screen, could no longer be regarded as just a tangle of
|
|
high-tech wiring. Instead it had become a place, cyberspace,
|
|
which demanded a new set of metaphors, a new set of rules and
|
|
behaviors."
|
|
|
|
Sitting in his mothers home in Pinedale, wearing a short kimono
|
|
over jeans and boots, Barlow had been on the phone, fax and modem
|
|
all morning. Mim Barlow, from whom he inherited his
|
|
conversational skills, was decked out in bright red lipstick and
|
|
matching rhinestone earrings.
|
|
|
|
She has no problem, pointing out that although her son "was a
|
|
brilliant child- quite interesting to raise- I thought for sure
|
|
he was doomed.
|
|
|
|
"His father and grandfather were alcoholics, and he was going
|
|
down the same road."
|
|
|
|
Barlow no longer drinks.
|
|
|
|
"Hell, he was headed for juvenile delinquency," said Mim Barlow.
|
|
"No question.
|
|
|
|
"We got him out of town. Sent him to Fountain Valley, a prep
|
|
school outside of Colorado Springs. Best thing that ever
|
|
happened to this town."
|
|
|
|
The best thing that happened to her son, too, he freely admitted:
|
|
|
|
"I'm forever in debt to that school. It saved me. I hope my
|
|
three girls will be able to go there, if I can afford it."
|
|
|
|
(Barlow is divorced from his wife Elaine, who remains in Pinedale
|
|
with their three children. Barlow commutes between Wyoming and
|
|
New York City. He serves on the board of Fountain Valley.)
|
|
|
|
Barlow met his fate at prep school: Bob Weir, a co-founder of the
|
|
Grateful Dead and life-long friend. Barlow has been writing for
|
|
the Grateful Dead since 1970, including the lyrics for "Hell In a
|
|
Bucket," "Picasso Moon," and "I need a Miracle." The royalties
|
|
kept the family ranch afloat for years and pay Barlow's bills
|
|
now.
|
|
|
|
"There's a resurgence in interest in the band and I'm actually
|
|
picking up the pace a little," said Barlow.
|
|
|
|
"You know I saw Bobby Weir last year," interjected Barlow's
|
|
eighty something mother. "He didn't look so good.
|
|
|
|
"This one," she nodded at her son like he's a questionable head
|
|
of beef, "looks better."
|
|
|
|
Barlow shot his mother a look of mild disgust. "Hell, Ma, Bob's
|
|
had a *life*. It shows, that's all."
|
|
|
|
Barlow has had quite a life, too.
|
|
|
|
After graduating from Wesleyan University in Connecticut, he was
|
|
swept into the counterculture. He went to India. Rode
|
|
motorcycles around Europe and was in and out of Haight-Ashbury.
|
|
He wandered back to the United States, in the early '70's, and
|
|
was headed to Hollywood for a job, when he stopped at the family
|
|
ranch on the way to Glamourville. He didn't get out of Wyoming.
|
|
|
|
"The ranch was in a mess. My dad had been sick. We were in
|
|
debt. I found something I could put my hand to. I was a hippie
|
|
that was running cattle and trying to keep the land. I got
|
|
married and had kids."
|
|
|
|
Along the way, true to his deep Republican roots, he became an
|
|
activist. Two generations of Barlows were in the Wyoming Senate.
|
|
John Perry may have gotten there too, but he narrowly missed
|
|
winning a Senate seat in 1987 running as a Republican.
|
|
|
|
Instead, he became involved in the small town life. He set out
|
|
to protect that way of life by becoming an environmentalist-
|
|
rancher, which is considered a bit of an oxymoron in the West.
|
|
But environmentalism is, in Barlow's estimation, "inevitable.
|
|
You've got to conserve the land."
|
|
|
|
The loss of his land still rankles. Driving through the Bar
|
|
Cross acreage, now owned, as many ranches around Pinedale are, by
|
|
a wealthy "weekend rancher," Barlow tightens up a little: "I did
|
|
the best I could. I just couldn't make a go of it."
|
|
|
|
Barlow sold his land at, "about break-even."
|
|
|
|
He's been living mostly in New York for the past several years,
|
|
writing for various magazines and becoming more and more famous
|
|
on the electronic grapevine. He travels constantly and is as
|
|
provocative a speaker as he is writer. While his income is still
|
|
largely from royalties, he's commanding more attention and fees
|
|
as a speaker. He's spoken in China to a scientific congress and
|
|
has been asked to help explain the future of information to the
|
|
CIA.
|
|
|
|
Barlow doesn't find that such an odd task for a social activist:
|
|
"Like so many organizations, the CIA is waking up to the fact
|
|
that they know nothing about this technology. And, they are
|
|
realizing that if they don't know about the revolution in
|
|
information, they will be left behind.
|
|
|
|
"People who don't accept this change are going to be left behind.
|
|
What we once thought of as power and wealth is changing. Who's
|
|
in charge is changing."
|
|
|
|
Barlow's business card may say it all: There are nine phone,
|
|
fax, modem, and beeper numbers. Under his name, his title reads,
|
|
"cognitive dissident."
|
|
|
|
In a new book, "The Hacker Crackdown: Law and Disorder on the
|
|
Electronic Frontier" (Bantam $23), Sterling calls Barlow, "a
|
|
computer networker of truly stellar brilliance. He has a poet's
|
|
gift of concise, colorful phrasing. He also has a journalist's
|
|
shrewdness, an off-the-wall, self deprecating wit and a
|
|
phenomenal wealth of simple personal charm."
|
|
|
|
Sterling adds that Barlow is "a gifted critic...who coins the
|
|
catchphrases and the terms of debate that become the common
|
|
currency of the period."
|
|
|
|
John Perry Barlow has become the poet laureate of technologies
|
|
new age.
|
|
|
|
He's the hackers' hero- patrolling the borders of the newly
|
|
discovered frontiers of technology. If anyone is going to
|
|
explain the social, legal and personal implications of all the
|
|
megachange coming down the high-tech pike, it's Barlow.
|
|
|
|
As he has written in the latest edition of Wired: "In the little
|
|
hick town I come from, they don't give you much credit for just
|
|
having ideas. You are judged by what you make of them."
|
|
|
|
Using that criterion, Barlow may just have a future in
|
|
cyberspace.
|
|
|
|
*** Maureen Harrington is a Denver Post staff writer. ***
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
A MESSAGE FROM THE VICE PRESIDENT
|
|
ON NETWORK ACCESS REFORM
|
|
|
|
By Al Gore (vice.president@whitehouse.gov)
|
|
|
|
Greetings. I'll leave it to others to carry on the important work
|
|
former president Clinton started in health care reform after discovering
|
|
that 37 million Americans have no health insurance.
|
|
|
|
Now that Clinton has magnanimously stepped down, rather than embroil the
|
|
US in lengthy Whitewater hearings, and I'm president, I plan to make it
|
|
my top priority to deal with a really serious problem. As horrifying
|
|
and unthinkable as it is in this day and age, 212 million Americans
|
|
don't have network access.
|
|
|
|
The current network situation is an intolerable and inefficient
|
|
hodgepodge of private, university, and government access providers.
|
|
People in different parts of the country pay different amounts for
|
|
network access. Different providers give different levels of service.
|
|
There's no excuse for this. Access to the net -- *equal* access to the
|
|
net -- is a fundamental human right.
|
|
|
|
Tipper and I have developed a program which will guarantee equal access
|
|
to the information superhighway to all Americans, tall or poor, rich or
|
|
thin, white or non-smokers.
|
|
|
|
All access to the net will be through one's employer. Employers will
|
|
deal only with large centralized network access providers. There will
|
|
be only one provider in each area of the country, cutting down on
|
|
wasteful duplication. All providers will be heavily regulated, and
|
|
will be required to offer the exact same services for the exact same
|
|
prices. All employers will be required to participate, and to pay the
|
|
full costs.
|
|
|
|
Unemployed people's access will be paid for by the government. This
|
|
is not expected to require any tax increase. At least, not a very large
|
|
tax increase. At least, not before the next election.
|
|
|
|
Since individuals will not be charged for the services, some may be
|
|
tempted to abuse the privilege. Especially because many newsgroups are
|
|
known to be highly addictive. To prevent this, newsgroup access will be
|
|
available only by prescription.
|
|
|
|
For instance, if someone wants access to alt.sex, they would schedule
|
|
an appointment with their Primary Network Consultant. In a few weeks,
|
|
when the appointment comes up, they'd come in at 8 am and get to speak
|
|
briefly with their Consultant at some time that day or evening. The
|
|
Consultant would refer them to a sex consulatant or other specialist,
|
|
as appropriate. After a few weeks, they'd have a similar appointment
|
|
with the specialist, who would then prescribe alt.sex or some other
|
|
newsgroup as appropriate. They would take the prescription to their
|
|
Network Access Provider to get the prescribed newsgroup added to their
|
|
.newsrc. To prevent fraud and corruption, all prescriptions will be
|
|
carefully tracked by the government in large databases, closely secured
|
|
against everyone who doesn't have the carefully guarded top secret
|
|
phone number for modem access (202-456-1414). Also, all prescriptions
|
|
automatically expire after 30 days. They can be renewed only after
|
|
another appointment with one's Primary Network Consultant and the
|
|
specialist he refers one to.
|
|
|
|
FTP, IRC, Gopher, WAIS, World Wide Web, Archie, telnet, rlogin, finger,
|
|
and e-mail, may also be made available by prescription, if they are
|
|
approved by the Federal Data Administration (FDA). For reasons of
|
|
public safety, network services and newsgroups not approved by the
|
|
FDA will be strictly banned. Anyone caught owning, using, producing,
|
|
providing, or advocating unapproved services, mailing lists, or
|
|
newsgroups, will be subject to zero tolerance -- everything they
|
|
own will be forfeited to the government, without a trial.
|
|
|
|
Also, anyone who rents an apartment or gives a job to a suspected
|
|
network abuser will be subject to zero tolerance. Of course, this
|
|
being a free country, nobody will actually be sent to prison without
|
|
a fair trial. Since nobody who's accused will be able to afford an
|
|
attorney, the government will provide them with an attorney of our
|
|
choice without charge. And anyone guilty of three offenses will serve
|
|
a mandatory life sentence without parole.
|
|
|
|
Similarly with anyone who writes, posesses, distributes, manufactures,
|
|
sells, uses, posts, backs up, saves, promulgates, perpetrates, forwards,
|
|
or laughs at, a spoof that makes official government policies or
|
|
proposals look ridiculous.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
LEGION OF DOOM T-SHIRTS!!
|
|
|
|
By Chris Goggans <phrack@well.sf.ca.us>
|
|
|
|
After a complete sellout at HoHo Con 1993 in Austin, TX this past
|
|
December, the official Legion of Doom t-shirts are available
|
|
once again. Join the net luminaries world-wide in owning one of
|
|
these amazing shirts. Impress members of the opposite sex, increase
|
|
your IQ, annoy system administrators, get raided by the government and
|
|
lose your wardrobe!
|
|
|
|
Can a t-shirt really do all this? Of course it can!
|
|
|
|
------------
|
|
|
|
"THE HACKER WAR -- LOD vs MOD"
|
|
|
|
This t-shirt chronicles the infamous "Hacker War" between rival
|
|
groups The Legion of Doom and The Masters of Destruction. The front
|
|
of the shirt displays a flight map of the various battle-sites
|
|
hit by MOD and tracked by LOD. The back of the shirt
|
|
has a detailed timeline of the key dates in the conflict, and
|
|
a rather ironic quote from an MOD member.
|
|
|
|
(For a limited time, the original is back!)
|
|
|
|
"LEGION OF DOOM -- INTERNET WORLD TOUR"
|
|
|
|
The front of this classic shirt displays "Legion of Doom Internet World
|
|
Tour" as well as a sword and telephone intersecting the planet
|
|
earth, skull-and-crossbones style. The back displays the
|
|
words "Hacking for Jesus" as well as a substantial list of "tour-stops"
|
|
(internet sites) and a quote from Aleister Crowley.
|
|
|
|
All t-shirts are sized XL, and are 100% cotton.
|
|
|
|
Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for
|
|
postage.
|
|
|
|
Send checks or money orders. Please, no credit cards, even if
|
|
it's really your card.
|
|
|
|
|
|
Name: __________________________________________________
|
|
|
|
Address: __________________________________________________
|
|
|
|
City, State, Zip: __________________________________________
|
|
|
|
|
|
I want ____ "Hacker War" shirt(s)
|
|
|
|
I want ____ "Internet World Tour" shirt(s)
|
|
|
|
Enclosed is $______ for the total cost.
|
|
|
|
|
|
Mail to: Chris Goggans
|
|
603 W. 13th #1A-278
|
|
Austin, TX 78701
|
|
|
|
These T-shirts are sold only as a novelty items, and are in no way
|
|
attempting to glorify computer crime.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
Computers and the Second Amendment: An Opening Volley
|
|
|
|
By Carl Guderian (bjacques@cypher.com)
|
|
|
|
A friend and I were talking the other night about needing to defend
|
|
oneself against one's own government. He was talking about guns; I was
|
|
talking about encryption. We were talking about the same thing. I read a lot
|
|
of debates in which the arguments for restricting computing are strikingly
|
|
similar to those for gun control. Am I the only one who sees the parallels?
|
|
It's certainly forced me to take another look at the gun issue.
|
|
|
|
The last few years have given us all an appreciation for the
|
|
Constitution, or what's left of it. Most of the action in the personal
|
|
computer user community is centered around the First Amendment, particularly
|
|
the rights to free expression and peaceable assembly. We've also had our
|
|
noses rubbed in official disregard for the Fourth, Fifth, and Sixth
|
|
Amendments. All of this has been (and is still being) discussed elsewhere.
|
|
Tonight's topic is the Second Amendment, the people's right to keep and bear
|
|
arms (a well regulated militia being essential to the security of a free
|
|
state), in relation to personal computers and private networks.
|
|
|
|
Until recently, I didn't give much thought to the gun issue, since I
|
|
don't own a gun and probably won't be getting one anytime soon. Unless I
|
|
move to Arizona, I can't pack heat everywhere I go, so I probably won't
|
|
have a shooting iron handy when I really need it to shoo away a mugger if I
|
|
run into one. The best way for me to win such an encounter is to prevent it
|
|
from ever taking place. According to Sun Tzu, a battle is won or lost
|
|
before it is ever fought. I don't hide out in the suburbs, but I don't
|
|
stroll down Main at midnight with my wallet hanging around my neck, either.
|
|
Weapons are better than nakedness, but wits are better than
|
|
both. The existence of priests and businessmen proves it. So much for that.
|
|
|
|
Freedom of computing, it now turns out, has a lot in common with the
|
|
citizen's right to own a gun. Both rights are being attacked in a similar
|
|
manner.
|
|
|
|
Proponents of restrictions love to wave a bogeyman in our faces to get
|
|
us to blindly go along with their hastily cooked-up bills. George Hennard
|
|
helped a bill restricting "assault" weapons get more attention than it
|
|
deserved. Likewise, Sen. Joe Biden touts Senate Bill 266 as protection from
|
|
crazed hackers who might trigger World War III or, worse, steal corporate
|
|
secrets and sell them to the Japanese. And let's not forget the drug
|
|
kingpins who might keep their communications secret from the Law. As a law-
|
|
abiding citizen, you've got nothing to hide so this doesn't affect you
|
|
<grin>.
|
|
|
|
S.B. 266 essentially mandates a government backdoor into any encryption
|
|
scheme marketed for public use. Secrecy becomes the exclusive domain of the
|
|
government and its partners, such as corporations doing work of vital
|
|
military or economic importance. The rest of us have to endure possible
|
|
casual surveillance or be proscribed for daring to keep secrets from Uncle
|
|
Sam.
|
|
|
|
Not just no, but No, Goddammit! Privacy is scarce enough as it is.
|
|
Every day my file gets passed around the federal and corporate nets like a
|
|
cheerleader at a frat party. Cheap, widespread encryption is one of the few
|
|
physical methods available for enforcing privacy, just as in the private
|
|
ownership of guns kept the government honest in the past. Encryption is a
|
|
window blind pulled down in the face of the hotel dick.
|
|
|
|
"A well-regulated militia necessary to the security of a free State,
|
|
the right of the people to keep and bear arms, shall not be infringed."
|
|
|
|
Historically, citizen ownership of guns has been useful for repelling
|
|
invaders, enforcing Manifest Destiny, and keeping central government from
|
|
getting too many ideas about control. There have been some problems in the
|
|
past. The Whiskey Rebellion, Shays' Rebellion, and Quantrill's Raiders spring
|
|
to mind, but no one has seriously considered disposing of the Second
|
|
Amendment. The last real invasion was in 1815 and we've killed off most of
|
|
the Indians, so what does that leave?
|
|
|
|
Guns in the house are no match for a government determined to do you
|
|
ill (though they may slow down a death squad). That's probably why
|
|
Republicans can lust for control over everyone else yet fight gun control.
|
|
Even the Tuff-On-Crime bill making it's way through the pipeline has no real
|
|
provision for gun control (it may, however, okay warrantless searches made
|
|
in "good faith" and further weaken habeas corpus). Republicans know as well
|
|
as anyone else that guns are small potatoes when someone else has all the
|
|
money and information.
|
|
|
|
Rights, even those guaranteed by the Constitution, are really
|
|
guaranteed only to the extent that they are hard for a government to
|
|
violate. Early Americans were either well-armed or westward bo
|
|
und, qualities needed in citizens opening a new frontier. However, the 1900
|
|
census found America with no more frontiers; there was no more West to go to.
|
|
The previous census, in 1890, was the first automated census, using punched
|
|
Hollerith cards to perform a ten-year job in six weeks. For the first time,
|
|
the government could use machines to track its citizens' movements. Control
|
|
began where the frontier ended. Modern American history has been a running
|
|
battle between individual rights and government control.
|
|
|
|
Cheap, widely available data encryption is one of two new developments
|
|
that are tipping the scales in the citizen's favor. Explosive growth of
|
|
computer network use (the number of Internet users grew by 90% last year) is
|
|
the other, enabling small groups to get the political jump on big ones by
|
|
getting vital information over the wire quickly to just about anyone who
|
|
needs it. Data encryption enforces privacy by keeping your e-mail from
|
|
prying eyes. It represents the first physical
|
|
means of keeping the Fed's nose out of your private business.
|
|
|
|
It's too bad encryption is not widely used outside of businesses.
|
|
Because so few people use encryption, agencies such as the NSA have an easy
|
|
job of spying on American citizens. I'm not giving away any secrets, but
|
|
here is how I would do it. Though it's theoretically possible to parse
|
|
every phone conversation and data transmission, doing so is a waste of
|
|
resources. Profiling and other tools tell an agency which 10% of the
|
|
|
|
population is the real threat (90% of the threat comes from 10% of the
|
|
population). Encryption used by other than corporations and government
|
|
agencies is considered suspect and bears cracking by agency supercomputers.
|
|
Fortunately for the NSA, unofficial secure traffic is not very large.
|
|
However, this could change if, say , companies marketed secure
|
|
communications as an alternative to the postal system (Feds can't open your
|
|
e-mail, but you can't fax drugs eitherDlife is full of tradeoffs), or
|
|
|
|
Americans started using encryption as a matter of course just because it's
|
|
s imply none of the government's damned business what a private citizen
|
|
does if he or she is not the subject of an actual criminal investigation
|
|
(instead of a fishing expedition). Either or both of these developments
|
|
would severely tax the government's ability to casually spy on its own
|
|
people. It might even force the Feds to wonder if it's really worth it.
|
|
Maybe.
|
|
|
|
A problem with encryption is that there are very few good schemes out
|
|
there. The DES algorithm is best known, but it was created by the NSA. No
|
|
comment. The RSA (Rivest-Shamir-Adelman) algorithm is superior to DES, but
|
|
MIT owns it and licenses cost money (DES is free). There is supposed to be
|
|
a freeware package based on or comparable to RSA, but it could also be NSA
|
|
suckerware. It's easy to get paranoid about this. A bigger problem with
|
|
encryption is that most Americans don't value privacy enough to make the
|
|
extra effort to secure their communications.
|
|
|
|
The government may or may not be systematically running small networks
|
|
and bbs's out of business by busting them right and left. That's open to
|
|
debate. The No Such Agency is almost certainly tapping their lines,
|
|
though. In the short term, it would be stupid not to. That is its job. In
|
|
the long run, though, this speeds the collapse of the Republic by dangerously
|
|
concentrating power.
|
|
|
|
Power tends to accumulate. The more power one group has, the more it
|
|
can get. Eventually, one group gets too much of it and spends most of its
|
|
time securing it at the expense of others, whether it needs to or not
|
|
(eventually it needs to). The firs t impulse of one of the other groups is
|
|
to usurp the power from the first group, all with the highest of motives, of
|
|
course. This leads to exactly the same problems. The only way to prevent an
|
|
endless succession of power grabs is to disperse power as widely as
|
|
possible, among people interested in limiting it for everyone. This is where
|
|
checks and balances come in. "All power to the people (soviets)" is a
|
|
disastrous substitute, as (thankfully) other people learned in 1798 and
|
|
1917. All of this is explained at length and more clearly in On Power: Its
|
|
Nature and the History of its Growth, by Bertrand de Jouvenel (Viking Press,
|
|
New York, 1949). The book is long out of print, but it's well worth your
|
|
while to check it out and photocopy it somewhere. Other good references
|
|
include Democracy in America (1835) and The Old Regime and the
|
|
French Revolution (1856), both written by Alexis de Tocqueville. You can find
|
|
those at a used bookstore.
|
|
|
|
Theory aside, it can be shown that a people completely dependent on
|
|
their government for security lose their ability to come to that
|
|
government's aid in times of external danger. At that time, the people
|
|
further drain those resources by requiring protection from themselves. The
|
|
less capable a people become, the more fearful they get, eventually voting
|
|
in a police state. Hitler was elected.
|
|
|
|
Computer users face similar dangers. Additionally, economics play a
|
|
large role. A person with a computer is a nearly self-sufficient engine of
|
|
wealth. Economic competition is constant. Denial of personal rights to
|
|
privacy of information removes the individual's ability to protect an idea
|
|
before bringing it to the market. Computer users are thus unable to create.
|
|
All they can do is consume or, at best, labor for someone else.
|
|
Entrepreneurs and small business owners, both key agents of pr
|
|
ogress , are effectively locked out. A nation of employees economically
|
|
dependent on bosses is an economic nonstarter. Freedom of computer use and
|
|
the right to privacy are thus essential to the economic security of a free
|
|
state.
|
|
|
|
The kind of power bestowed by guns, personal computers and absolute
|
|
data privacy implies a need for a personal sense of responsibility. Both
|
|
viruses and encryption programs are far easier to make and distribute than
|
|
plastic Glock-11 automatic pistols. Some sort of regulation is required.
|
|
This is where the "well-regulated militia" part of the Second Amendment
|
|
comes in and this is the most difficult part of the issue.
|
|
|
|
My definition of a "well-regulated militia" falls somewhere between
|
|
the NRA and the National Guard. If there were an NRA for computer network
|
|
users I'd probably be in it. I think the stakes are higher with computers
|
|
than they are with guns. I want to see more people with computers and
|
|
modems, to ensure the widest possible dispersal of computing power. For
|
|
this to work, all users should be made aware of the power and
|
|
responsibility of owning a computer ("Only a madman would give a loaded
|
|
revolver to an idiot"DFredric Brown). If there are kids in the house, they
|
|
must be taught to respect guns and computers as early as possible. In a
|
|
well-defended, well-connected house, one can live without fear. Only then
|
|
can a citizen look past the distracting horrorshows put on by the
|
|
politicians and pundits to hide the real issues. Who will see to it that
|
|
responsibilities accompany rights? Part of the answer, believe it or not
|
|
comes from the government. Laws already exist to cover most serious crimes
|
|
committed with a computer.
|
|
|
|
Where the law is insufficient, professional/lobbying groups such as the
|
|
Electronic Frontier Foundation, the Computer Professionals for Social
|
|
Responsibility, and the Association for Computing Machinery are helping to
|
|
draw up new laws to deal with new kinds of crimes. It's early in the game,
|
|
but the above organizations seem to be working for fairness.
|
|
|
|
For the control addicts in government, this may not be enough. Tough.
|
|
Computer user organizations are working hard to approach government the way
|
|
we all were taught to do it in high school civics, and they seem to be
|
|
making it work. Can the EFF, CPSR, or the ACM control hackers? Of course
|
|
not. That's what the law is for (demographics suggest that the rapid growth
|
|
of network use will not be accompanied by an equally rapid rise in hacking
|
|
incidents. The hacking scene is maturing with the rest of the population.
|
|
Most hacker heroes are born-again capitalists who might make even better
|
|
role models as long as they don't forget where they came from).
|
|
|
|
Computer user groups educate while seeking to disperse power, which the
|
|
NRA also does to some extent. The EFF especially tries to reach out to
|
|
potential allies by demystifying computer technology for nonusers and even
|
|
the cops. Let's face itDthe nervous man with the gun is not going to go
|
|
away, so we might as well try to calm him down a little.
|
|
|
|
Finally, computer network users have their talents to use as
|
|
negotiating chips. A government that refuses to respect their rights will
|
|
lose their economic cooperation. The network-based economy makes an Atlas
|
|
Shrugged-style withdrawal very feasible. The government will have its
|
|
illusion of control while computer users work ordinary jobs while
|
|
moonlighting in the Netherlands and piling up ones and zeroes (Swiss francs)
|
|
in Brunei, all in the comfort of one's suburban home. The result will be an
|
|
Italian-style economyDlackluster on the surface and lively underground.
|
|
Germany lost the A-bomb by chasing out a half-dozen geniuses in the
|
|
Thirties. If America wants to be a player in the global economic contest, it
|
|
needs to treat its citizens with respect.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
HOW TO SURVIVE THE FIRST YEAR OF LAW SCHOOL
|
|
AT THE UNIVERSITY OF TEXAS
|
|
|
|
by Mike Godwin (mnemonic@eff.org)
|
|
|
|
(Copyright 1988,1992. This article may be freely distributed on any
|
|
computer forum, including commercial online services. To reproduce it
|
|
in print or in any other non-computer medium, please seek permission
|
|
from the author.)
|
|
|
|
You went to a decent college, you scored well on your Law School
|
|
Admission Test, and you ranked in the top 10 percent of your class. So,
|
|
now that you're here at The University of Texas School of Law, you can
|
|
look forward to an unbroken string of acadernic successes, right?
|
|
|
|
Not so fast. No matter how easy you found undergraduate school to be,
|
|
law school is a different story. And the sooner you learn that, the
|
|
better your chances of coming out of the law-school game a winner.
|
|
|
|
First, disabuse yourself of any notions about your natural academic
|
|
superiority. Sure, you're good, but so is everyone else in your class.
|
|
And since everyone is graded against everyone else on a curve, the
|
|
chances are nine out of 10 that you'll be in the bottom 90 percent of
|
|
your class, regardless of your undergraduate performance.
|
|
|
|
This means that law-school success doesn't come merely from knowing the
|
|
law; you have to know it better than most of your peers. So you can't
|
|
be complacent.
|
|
|
|
If you start heeding the following hints early in your first semester,
|
|
they'll improve your chances of hot job offers...and maybe even an
|
|
editorship on the law review.
|
|
|
|
Class Participation
|
|
|
|
If you saw the movie "The Paper Chase" (and odds are that you did, or
|
|
you wouldn't be here), you probably know that large classes in law
|
|
school normally are run by "the Socratic method." Rather than
|
|
lecturing, the professor will assign some reading for the day and
|
|
conduct the class by asking students questions about the material.
|
|
|
|
Watching the movie, you probably got the impression that the best
|
|
law students are those who are eager and able to answer the
|
|
professor's questions. Don't be fooled. Glibness and self-possession
|
|
in class are only roughly correlated to exam performance, and your
|
|
grades are based almost entirely on final exams, not on your
|
|
quickness in the classroom. Because the finals are graded
|
|
anonymously, the professor won't even be able to link your
|
|
classroom participation with the exam.
|
|
|
|
It's far wiser to spend your time mastering the principles behind
|
|
each case you read rather than memorizing its facts. If you try the
|
|
latter tactic, your brain will be too muddled with facts at exam time
|
|
to allow you to apply the law. Don't worry about the inevitable
|
|
instances in which a professor tries to embarass you for knowing
|
|
less than he does. (I refer to the professor as "he" because almost all
|
|
UT law professors are male. Most are white, too). You can get your
|
|
revenge by earning an honors grade in the course.
|
|
|
|
Class Preparation
|
|
|
|
Keep up with the assigned reading. Onerous though the reading may
|
|
be, it's easier to keep up than to catch up. And reading the cases for
|
|
the day will enable you to answer most of the questions any
|
|
professor tries to throw at you.
|
|
|
|
If for some reason you do get behind on the reading, however, don't
|
|
panic. This happens to some of the best law students. Attend class
|
|
anyway, even if you haven't read that day's class materials. The
|
|
professor's Socratic questions will clue you in to the issues he expects
|
|
you to know for the exam.
|
|
|
|
Professors
|
|
|
|
Some law professors are frightening; others are charming.
|
|
Ultimately, however, their personalities don't matter very much.
|
|
Whether he likes you or not, each professor will grade your exam
|
|
according to the curve. There's no such thing as an "easy" law course,
|
|
although you may find some lectures more tolerable than oothers. If
|
|
the material is easy for you, it may well be easy for everybody, so the
|
|
curve can get you anyway.
|
|
|
|
While some law professors make a pretense of keeping office hours,
|
|
most of them don't really want to see you outside the classroom, a
|
|
milieu they prefer because that's where they have all the control.
|
|
Any question you want to ask a professor probably can be answered
|
|
by a "hornbook" (legal treatise) anyway, and library is full of
|
|
hornbooks.
|
|
|
|
Don't expect too much sympathy from your professors. After all, law
|
|
school is a game they've *won.* They may have some sort of abstract
|
|
pity for the poor contracts student who's agonizing over Sec. 2-207 of
|
|
the Uniform Commercial Code, but under no cirumstances will you be able to
|
|
persuade them to change your grade.
|
|
|
|
Briefing your cases
|
|
|
|
The rule here is "Condense, condense, condense." Nothing's more
|
|
pathetic than the law nerd whose brief is longer than the case
|
|
excerpt in the casebook. Remember this rule: Each case has one or
|
|
two main ideas. Find them, and you'll have what you need to know
|
|
for the exam.
|
|
|
|
And good, *brief* briefs can be easily incorporated in your study
|
|
outline.
|
|
|
|
Some professors like to ask tricky questions about the fact pattern of
|
|
a case during the lecture, but don't write these details down.
|
|
|
|
Instead, make notes in the margin or highlight key facts of your
|
|
casebook. If you've read the case, you should be able to remember
|
|
the facts long enough to get through the class period. And if the
|
|
professor stresses a particular type of fact pattern in the lecture,
|
|
he's signalling to you a possible exam issue. Note the issue, not the
|
|
facts of the particular case.
|
|
|
|
Buying study aids
|
|
|
|
Basically, there are two types of study aids you can buy for first-
|
|
year courses: commercial outlines and hornbooks. A commercial
|
|
outline is a prepackaged, detailed skeleton of the material you
|
|
need to know for a particular course. There are several brands of
|
|
outlines, and each has something to recommend it. The Legalines
|
|
outlines track particular casebooks, while the Emanuel Law Outlines
|
|
and Gilbert Law Summaries are more general, although they will
|
|
include many of the cases in your casebook.
|
|
|
|
You may find it best to buy Legalines outlines for each of your
|
|
courses except contracts. (The UT professors who wrote the contracts
|
|
casebook designed it in a way that makes it difficult to produce a
|
|
commercial outline for it.) Then you can supplement the Legalines
|
|
with general-purpose outlines like Emanuel's and Gilbert's for
|
|
courses you're having trouble with. Be aware that occasionally the case
|
|
summaries and discussions in the commercial outlines are *mistaken*--
|
|
let your professor and your classmates supplement your take on a given
|
|
case or issue.
|
|
|
|
Some students buy "hornbooks" for particular
|
|
subjects, but for a first-year student the treatises often go into too
|
|
much unnecessary detail. Theyre also very expensive, and in general
|
|
it's best not to buy them; but you may want to make an exception for
|
|
contracts, which many students find a particularly subtle and
|
|
difficult branch of law. The Calamari and Perillo hornbook is good for
|
|
general contract law, while the White and Summers hornbook is
|
|
necessary for a thorough understanding of the parts of your
|
|
contracts course that deal with the Uniform Commercial Code. You
|
|
may also want to consult UT Professor Charles Alan Wright's treatise
|
|
on the law of federal courts for your civil-procedure class.
|
|
Finally, if you signed up early for a bar-review course (believe it
|
|
or not, some people do this during their first year), some bar-review
|
|
courses will allow you to "check out" their reviews of black-letter
|
|
law.
|
|
|
|
Study Groups
|
|
|
|
Try to get into one. When you find a likely group, make sure that
|
|
most of the people in the group are dedicated enough to stick with it.
|
|
Discussing difficult ideas with other law students is a good way of
|
|
making sure you understand them. In general, study groups work
|
|
best with about five people, with each person concentrating on one of
|
|
the five first-year courses you'll be taking each semester. If you
|
|
have a choice about which course to concentrate on, choose the
|
|
course you think you'll find most difficult; your responsibility to
|
|
your friends in the study group will give you an added incentive to
|
|
master that material.
|
|
|
|
Computers
|
|
|
|
Buy a computer--you can purchase them at near-wholesale cost at
|
|
the Texas Union MicroCenter on 21st Street. Only if you own a
|
|
computer will you be able to produce and edit a legible course outline
|
|
in a hurry. You'll need two types of software: a good word
|
|
processing program to help you with the briefs and memos you have
|
|
to produce for your legal research and writing seminar, and an
|
|
outline program to produce the course outlines you'll need for exams.
|
|
(Some word processors include outlining capability--in general, those
|
|
word processors are not as good at outlining as programs designed for just
|
|
that purpose.)
|
|
|
|
If you buy a Macintosh, the outlining software of choice is MORE; if you
|
|
own an IBM PC, buy Thinktank or Grandview.. Both products are available
|
|
at local computer stores.
|
|
|
|
Exam-taking strategy
|
|
|
|
Your heart's beating rapidly, your palms are sweaty, and your mind is a
|
|
blank. Yes, you're taking your first law-school exam. How on earth do
|
|
you handle those exam questions?
|
|
|
|
The first thing to remember is that all law-exam questions are more or
|
|
less alike. Each describes an invented and often quite complex situation
|
|
that, had it occurred in real life, would probably generate one or more
|
|
lawsuits. Following the fact situation is usually a question or
|
|
instruction such as "Describe the potential legal claims and liabilities
|
|
of each party."
|
|
|
|
Your best strategy, when you outline your answer, is to pretend you're
|
|
the lawyer for each party in turn. Pretending to be Smith's lawyer,
|
|
quickly list all the legal principles from your course outline that
|
|
could advance Smith's case against Jones. Now play the part of Jones'
|
|
lawyer how would you answer each of these legal arguments or claims? What
|
|
counterclaims could you use against Smith? What will Smith say in
|
|
response to your responses? What other parties in the fact situation
|
|
could sue or be sued? And so on.
|
|
|
|
Inevitably, you'll see some obvious legal issues in the fact pattern.
|
|
You have to deal with them, of course, but don't make the fatal mistake
|
|
of assuming that by handling the obvious or major issues you've written
|
|
a good exam answer. After all, your peers probably share your gift for
|
|
seeing the obvious.
|
|
|
|
So, how do you make sure you catch the subtle issues as well as the
|
|
straightforward ones? When you're preparing for the exam, condense your
|
|
outline into a checklist of one- or two-word shorthand expressions for
|
|
legal principles. Memorize the checklist, and recite it in your head
|
|
each time you pretend to be the attorney for one of the parties. (Better
|
|
yet--write it down on your scratch paper at the beginning of your exam
|
|
as soon as you're allowed to start writing, before you even read the
|
|
first question. The checklist will remind you of issues you'd otherwise
|
|
overlook.
|
|
|
|
Practice Exams
|
|
|
|
Besides creating a legal-issues outline, the best way to prepare for
|
|
exams is to take practice exams. Almost all professors keep their old
|
|
exams on file in the lbirary. After you've done the bulk of your study
|
|
outlines, photocopy your professors' exams from the last couple of
|
|
years. Then sit down with a friend and practice outlining exams answers
|
|
based on the old questions. Don't bother writing a full exam answer!
|
|
Time yourself, and give yourself about as much time to outline each
|
|
answer as you would during a real exam. YOu should budget about a third
|
|
of the time you're given to answer an essay question for outlining your
|
|
answer (e.g., 20 minutes for a 60-minute question).
|
|
|
|
After each question, compare your outlined answer with your friend's.
|
|
He or she will have seen some points you missed, and vice versa. This
|
|
pinpoints issues you may tend to overlook during the real exam.
|
|
|
|
Other matters
|
|
|
|
Four of your first-year law courses -- contracts, torts, civil procedure,
|
|
and property -- will last your entire first year. You'll also take two
|
|
semester-long courses: criminal law in the fall and constitutional law
|
|
in the spring.
|
|
|
|
Thus, if you have to concentrate on any particular exam during winter
|
|
midterms, concentrate on criminal law; that's the only exam you'll take
|
|
in your first semester that counts as a grade for an entire course.
|
|
Conversely, the exam for the three-hour constitutional-law course in the
|
|
spring will count less toward your average than the exams for your
|
|
year-long courses, which are each worth five or six hours' credit.
|
|
|
|
Don't get too competitive. It's the friends you make during your first
|
|
few months as a law student who'll help you get through the year. Don't
|
|
be deluded into thinking that other students are the enemy; they're not.
|
|
It's the system you've got to beat, and you can do it with the right
|
|
attitude. A vicious competitive streak, however, tends to undermine
|
|
your karma in the long run.
|
|
|
|
Finally, try to enjoy yourself. The law really can be fun to learn if
|
|
you let yourself relax. Most people who make it through the first year
|
|
look back at it as a time of rapid intellectual growth and the building
|
|
of mental discipline. Don't regard law school as just the
|
|
stepping-stone to a career. A law-school education has value in itself
|
|
-- it will teach you a lot about what makes our society tick.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
NOTES FROM CYBERSPACE
|
|
2nd Edition
|
|
|
|
Notes From Cyberspace will be a feature of every issue of this publication.
|
|
They are little tidbits, notes, comments, etc... from people like you.
|
|
If you have any comments, we certainly encourage you to send them in.
|
|
(comments@fennec.com)
|
|
|
|
============================================================================
|
|
|
|
NOTES FROM CYBERSPACE - ARTICLE 1
|
|
By Rodney Perkins
|
|
Subject: THEY ARE OUT TO GET YOU! A piece of POST-LOGIC.
|
|
|
|
Is that tuna fish I smell? No, its the CONSPIRACY. As avid readers of this
|
|
magazine probably already know, the conspiracy has tried to use its poison
|
|
tentacles to steal eggs from our snake pit. For now, our eggs are safe. One
|
|
day, however, they might try it again. We will be there, knife in hand,
|
|
ready to chop off their offending appendages. Yes, they will probably try
|
|
to squirt their government ink in our eyes but we will continue to fight
|
|
with the weapons given to us by (insert savior here). We must take a stand
|
|
against the pervasive eye of the conspiracy's octopi (yes, it rhymes). You
|
|
must ask yourself "What can I do to help stop this reign of tyranny from
|
|
the unseens and the who-whats-its?" You must continue to fight against the
|
|
shickelgrubers, the boot boys and the LOGIC-WEAVERS! You must never fall
|
|
for LOGIC, you must always use POST-LOGIC (real men always think in POST-
|
|
LOGIC). Confusion and ambiguity are the weapons in this war. Turn their
|
|
MEDIASPEAK, GOOBLEDYGOOK and BAFFLEGAB against them! Weave great webs of
|
|
Orwellian nightmare language! Master the art of circular logic! When they
|
|
ask you what you believe, tell them "I believe what you believe. Just don't
|
|
practice it". Are you confused yet? Good! You get "it"!
|
|
|
|
===========================
|
|
|
|
NOTES FROM CYBERSPACE - ARTICLE 2
|
|
By John Logan (ice9@bga.com)
|
|
Subject: ON THE SUBJECT OF GOVERNMENT...
|
|
|
|
Welcome to a new age! Yes this is a world where technology has hit an all
|
|
time high. It seems there is no other way to go but up. Funny, that
|
|
includes taxes, cost of living, and trouble in government. Yes, this is the
|
|
day and age that we are subjected to, by our wonderful president Mr. William
|
|
Jefferson Clinton, successor to the New World Order... Most Americans are
|
|
probably still wondering "Just what is this 'New World Order?'" Well, lets
|
|
talk about that:
|
|
|
|
The New World Order is a product of the Trilateral Committee, made up of the
|
|
World's key leaders. In this form of government, the entire world will be
|
|
broken up into 3 'Nation States': Europe, The Asias, and The Americas.
|
|
The worlds decisions will be made by the 'elected' presidents of each nation
|
|
state. The entire world will be on a common market with a universal currency.
|
|
I'm sure we have all heard of - the 'credit.' Yes for years we have been
|
|
getting oriented to this system, whether in movies, or by our banking system.
|
|
Well, in the near future, there will be very few private banks, we will
|
|
store our credits (for a small fee) in the World Bank. We will be forced to
|
|
carry around credit chips that, when inserted into a machine, will access
|
|
our account number, list what is to be purchased, and the price. Forget
|
|
about tax evasion!! It will all be AUTOMATICALLY DEDUCTED from out accounts.
|
|
Yes, the new government will be a cross between Capitalism and Communism.
|
|
They will know our every move. Business owners will still be allowed to keep
|
|
their businesses but they will have to pay exorbitant taxes. State security
|
|
will be at an all time high. There will be no middle class. Citizens will
|
|
be either very rich or very poor. The machine has already started. Our
|
|
wonderful government does not want a car on the road that is over 10 years
|
|
old. A bill has already been passed limiting parts for the cars that fit in
|
|
this 'danger zone.' It is now impossible to get manufacturer parts for
|
|
these cars. If you have a problem, you must use after-market parts and hope
|
|
that it fits specifications. Todays cars are built to last 10 years or less.
|
|
Its a sad thing that more people do not understand what is coming down the
|
|
proverbial 'road.' The governing machine is going to run right over the
|
|
common people like a steam roller. People won't even know what happened.
|
|
Take a look around! The New World Order is not nearly as wonderful as our
|
|
government would like us to think. Don't worry, it won't be long and we won't
|
|
have to worry about what they want us to think. They will soon control that
|
|
too! WE HAVE BEEN WARNED. NOW ITS TIME TO DO SOMETHING ABOUT IT!
|
|
|
|
=============================
|
|
|
|
NOTES FROM CYBERSPACE - ARTICLE 3
|
|
By Dan Wilson
|
|
Subject: Fight the Power!
|
|
|
|
As I sit here writing this, I can't help wondering what the hell is going on.
|
|
Why is it that every time a group a people find some new freedom or form of
|
|
expression, the government steps in to suffocate it? Just look at the
|
|
National Endowment for the Arts controversy or the PMRC. Why must a small
|
|
group of paranoid people try to force their fears down all of our throats?
|
|
I must admit that when these things first began happening, I just sat by
|
|
thinking to myself that it was a crock of sh*t without doing anything about
|
|
it. It didn't strike close enough to home for me to get involved. Recently,
|
|
however, there's been a series of events that have struck close to home and
|
|
have forced me to take action. The events to which I'm referring are none
|
|
other than the government's recent attempts at bringing the computer world
|
|
to justice (as they define it, of course).
|
|
|
|
It's really disturbing to hear about the methods the feds used to crack down
|
|
on "dangerous" users. Unsigned search warrants have been used to gain entry
|
|
to homes where all sorts of equipment, computer related or not, was
|
|
confiscated while no charges were specified. There have also been cases of
|
|
holding guns to children's heads while a raid was going on. What kind of
|
|
gestapo tactics are these? Have these guys never heard of the Bill of
|
|
Rights? This isn't the America I was told about as a kid; it sounds a
|
|
helluva lot more like those "evil" communist countries that I was taught to
|
|
hate. The only logical conclusion that can be drawn here is that the
|
|
government is very afraid. Why else would they dedicate so much effort to
|
|
something they know so little about? These guys don't have a clue as to
|
|
what's going on out here in cyberspace. That's the source of the problem.
|
|
Here we sit with these marvelous machines in front of us. Touch a few keys
|
|
and any information that we want to exchange can be sent anywhere in minutes.
|
|
This must seem like a pretty major threat to a government that so often
|
|
relies on misinformation and cover-ups in order to scam the public into
|
|
believing what it wants them to believe. We can't be controlled like the
|
|
media bozos who drone bullsh*t through the idiot box at us. We can't be
|
|
censored like the newspaper or the radio. In fact, this is probably the
|
|
truest form of information exchange we have available today. That alone is
|
|
worth fighting for.
|
|
|
|
It could also be that they are afraid of a society where people are judged
|
|
solely on their thoughts and ideas. We have no style whores here. Race,
|
|
creed, color and religion are insignificant and pointless in cyberspace;
|
|
they serve no purpose. There can be no discrimination, there can only be
|
|
disagreement with someone's opinions. To me, this is pretty close to a
|
|
perfect society. It is refreshing to judged on what I think and how I
|
|
express myself rather than by the color of my skin or the origin of my
|
|
birth. In a society like this, the government cannot play people off
|
|
against one another. They have no ground on which to stand. Perhaps it's
|
|
this lack of footing that makes them nervous. Whatever it is, it's got them
|
|
thinking that they need to put a stop to it and "bring it under control".
|
|
We are a far too dangerous force for them to just ignore. This fact should
|
|
be remembered and taken advantage of, information is the key! Less than an
|
|
hour ago, I posted issue number six of this magazine on Internet along with
|
|
messages urging others to read it. In a matter of minutes it was all over
|
|
the world. Maybe this will draw others into the fold, maybe not.
|
|
Regardless, it'll force them to think and maybe to take action themselves.
|
|
|
|
|
|
@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@
|
|
|
|
NOTES FROM CYBERSPACE - ARTICLE 4
|
|
By Anonymous Attorney
|
|
Subject: POCKET LAW...Quick Reference Card
|
|
|
|
Hey, copy this down and keep it in your wallet for those situations where
|
|
you might be suppressed by the power-hungry infidels of humanity.
|
|
|
|
My lawyer has instructed me not to talk to anyone about my case or anything
|
|
else, and not to answer any questions or reply to accusations. On advice of
|
|
counsel and on the ground of my rights under the State and Federal
|
|
Constitutions, I shall talk to no one in the absence of counsel. I shall
|
|
not give any consents or make any waivers of my legal rights. Any request
|
|
for information or for consent to conduct searches, papers, property,
|
|
or effects should be addressed to my lawyer. I request that my lawyer
|
|
be notified and allowed to be present if any identification, confrontations,
|
|
tests, examinations, or investigations of any sort are conducted in my case,
|
|
and I do not consent to any such identification, confrontations, tests,
|
|
examinations, or investigations.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
EDITORIAL OF THE MONTH
|
|
|
|
By Marco Landin
|
|
|
|
[This article is fiction/humor]
|
|
(Excerpt from INdigest, Feb 1994, Interview with
|
|
the Elusive and Unintelligible Mfactor)
|
|
|
|
INd: In your most recent book, "I Don't Want My Children To Grow Up
|
|
Around Those Filthy UNIX", you seemed to display a sense of farce that isn't
|
|
too commonly seen amongst the Great Internet Poets of the Apocalypse. Tell
|
|
us, why do you see the 21st century as the Golden Age of Lunacy?
|
|
|
|
Mf: [wearing pajamas and Mickey Mouse ears] Well, it's like this. In
|
|
the early 80's we perfected the concept of an international communications
|
|
database. It was populated solely by research personnel. MIT grads,
|
|
military, Elvis. Purely serious study going on. Then, in the late 80's and
|
|
mid-90's, there was a practical applications boom, where savvy businessfolk
|
|
rolled up their sleeves and sank their elbows into the datastream. Now, as
|
|
we near the End Times, we find that the greatest structure ever created by
|
|
man -the Internet- is being vacated by its corporate and research personnel
|
|
and a whole buttload of social misfits and weirdos are moving in by the
|
|
droves. Look at me for instance. No, you better not. Wanna jawbreaker?
|
|
|
|
INd: No, thank you. Are you saying that the new computer literacy is
|
|
making this once rich and fertile forest of intellect and commerce into a
|
|
vast mental wasteland where the only thing that stirs is an occasional,
|
|
barbed, tumbleweed of a pun based on bathroom jokes?
|
|
|
|
Mf: Well, yes, and I'm thankful for it! I mean, have you SEEN what
|
|
happens to the human body when the brain is used too much? Glasses,
|
|
unsocial behavior, a goofy voice, and insatiable masturbatory compulsions
|
|
become the trademark of the computer genius. Why if I had to choose between
|
|
looks and brains, I'd sure as hell pick looks, cause looks can get you
|
|
brains, and the corollary is not as true. I feel very lucky to have both.
|
|
|
|
INd: In the book, you mention a few extreme cases of individuals who have
|
|
no business on UNIX and who yet not only live in it, they can't do without
|
|
it.
|
|
|
|
Mf: Indeed, there seem to be many odd cases. Take for example Cherry,
|
|
the erotic dancer from Norway who has an Internet Address. She works out 36
|
|
hours a day, dances every night, goes out with friends, HAS FRIENDS!!! And
|
|
yet she still finds time to moderate a newsgroup, cherry.pop.tart, I mean,
|
|
how does she do that? Then there's the Internet node for the Eskimo Len
|
|
Terrorist With Teret's Syndrome Association. What does THAT have to do with
|
|
worldwide communications? Then of course, there's the newsgroup
|
|
alt.binaries.pictures.bestiality. Need more be said??? The freaks are
|
|
moving in as the contractors and architects move out. Isn't it beautiful?
|
|
|
|
INd: What's your plan in life, Mr. Mfactor?
|
|
|
|
Mf: In this day and age, making plans is dangerous. That's why I have
|
|
several.
|
|
|
|
INd: Please, share with us your most visionary.
|
|
|
|
Mf: Moving to Norway and finding Cherry. Soon. Like NOW.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
WHITE HOUSE ELECTRONIC PUBLICATIONS AND PUBLIC ACCESS EMAIL
|
|
FREQUENTLY ASKED QUESTIONS
|
|
|
|
By Stanton McCandlish (mech@eff.org)
|
|
|
|
Updated April 2, 1994
|
|
Table Of Contents
|
|
|
|
I. Searching and Retrieving White House documents.
|
|
- Publications@WhiteHouse.GOV
|
|
- WAIS
|
|
- GOPHER
|
|
- FedWorld BBS
|
|
|
|
II. Signing up for Daily Electronic Publications.
|
|
A. Widely Available Sources.
|
|
B. Notes on Widely Available Sources.
|
|
C. Direct Email Distribution.
|
|
D. Email Summary Service.
|
|
|
|
III. Sending Email to the White House.
|
|
- Internet Direct
|
|
|
|
IV. Sending Email to Congress
|
|
- Internet Direct
|
|
|
|
V. Submitting Updates to the FAQs.
|
|
|
|
|
|
I. HOW DO I SEARCH AND RETRIEVE WHITE HOUSE ELECTRONIC PUBLICATIONS?
|
|
|
|
The White House is pleased to announce the establishment of an Internet
|
|
address for retrieving White House publications. We have set up an
|
|
Almanac server to process requests by email. To receive instructions on
|
|
using this server, send a message to:
|
|
|
|
Publications@WhiteHouse.GOV
|
|
|
|
In the body of the message, type:
|
|
|
|
send info
|
|
|
|
Various additional sites are archiving the press releases as distributed.
|
|
What follows is an incomplete list of some of the sites containing the
|
|
documents that have been released to date. This FAQ will be updated to
|
|
reflect new sites as they become known.
|
|
|
|
SITE DIRECTORY
|
|
|
|
1. SUNSITE.UNC.EDU pub/academic/political-science/whitehouse-papers
|
|
2. FTP.CCO.CALTECH.EDU /PUB/BJMCCALL
|
|
3. FTP MARISTB.MARIST.EDU
|
|
4. CPSR.ORG /CPSR/CLINTON
|
|
5. FedWorld Online System 703-321-8020 8-N-1 or:
|
|
Telnet fedworld.doc.gov
|
|
6. GOPHER.TAMU.EDU 11/.dir/president.dir
|
|
|
|
|
|
Notes: The following are notes on how to log in and get
|
|
information from the above sites.
|
|
|
|
1. Office for Information Technology at the University of
|
|
North Carolina maintains the full collection of White
|
|
House electronic releases available for search with WAIS and
|
|
also accessible via Gopher and FTP.
|
|
1.a WAIS
|
|
(:source
|
|
:version 3
|
|
:database-name "/home3/wais/White-House-Papers" :ip-
|
|
address "152.2.22.81"
|
|
:ip-name "sunsite.unc.edu"
|
|
:tcp-port 210
|
|
:cost 0.00
|
|
:cost-unit :free
|
|
:maintainer "pjones@sunsite.unc.edu"
|
|
|
|
:description "Server created with WAIS release 8 b5 on
|
|
Feb 27 15:16:16 1993 by pjones@sunsite.unc.edu These are the
|
|
White House Press Briefings and other postings dealing with
|
|
William Jefferson Clinton and Albert Gore as well as members
|
|
of the President's Cabinet and the first lady Hillary Rodham
|
|
Clinton, Chelsea, Socks and others in Washington DC. Dee Dee
|
|
Meyers and George Stephanopoulos. Other good words:
|
|
United States of America, Bill Al Tipper Democrats USA
|
|
US These files are also available via anonymous ftp
|
|
from sunsite.unc.edu The files of type filename used in
|
|
the index were:
|
|
/home3/ftp/pub/academic/political-science/whitehouse-
|
|
papers/1993 ")
|
|
|
|
Folks without WAIS clients or gophers that act as WAIS
|
|
clients may telnet to sunsite.unc.edu and login as swais
|
|
to access this information via WAIS.
|
|
|
|
1.b GOPHER is a distributed menu system for information access on the
|
|
Internet developed at the University of Minnesota. gophers are
|
|
client-server implementations and various gopher clients are
|
|
available for nearly any computing platform. You may now use
|
|
gopher clients to access the White House Papers and other
|
|
political information on SunSITE.unc.edu's new gopher server.
|
|
You may also add links from your local gopher server to
|
|
SunSITE for access to the White House Papers.
|
|
|
|
For gopher server keepers and adventurous clients to access
|
|
SunSITE you need only know that we use the standard gopher
|
|
port 70 and that our internet address is SunSITE.unc.edu
|
|
(152.2.22.81). Point there and you'll see the references to
|
|
the Politics areas.
|
|
|
|
For folks without gopher clients can telnet to sunsite.unc.edu
|
|
to try out gopher access. You need to have access to internet
|
|
telnet and:
|
|
|
|
telnet sunsite.unc.edu
|
|
login: gopher
|
|
The rest is very straight forward. Browsing options end with a
|
|
directory mark (/), searching options end with an question mark
|
|
(?).
|
|
There's plenty of on-line help available.
|
|
|
|
2. No special instructions.
|
|
|
|
3. The CLINTON@MARIST log files which contain all the official
|
|
administration releases distributed through the MIT servers
|
|
are available via anonymous FTP. These logs contain in
|
|
addition to the official releases, the posts that comprise the
|
|
ongoing discussion conducted by the list subscribers.
|
|
To obtain the logs:
|
|
FTP MARISTB.MARIST.EDU - the logs are in the CLINTON directory
|
|
and are named CLINTON LOG9208 thru CLINTON LOGyymm where yymm
|
|
stands for the current year and month. Problems should be
|
|
directed to my attention: URLS@MARISTC.BITNET or
|
|
URLS@VM.MARIST.EDU.
|
|
Posted by Lee Sakkas - owner, CLINTON@MARIST
|
|
|
|
4. Computer Professionals for Social Responsibility is
|
|
providing all Clinton documents on technology and privacy
|
|
at the CPSR Internet Library, available via
|
|
FTP/WAIS/Gopher at cpsr.org /cpsr/clinton (and in other
|
|
folders as relevant). For email access, send a message
|
|
with the word "help" at the 1st line of text to
|
|
listserv@cpsr.org.
|
|
|
|
5. The FedWorld Computer System, operated by the National Technical
|
|
Information Service, archives White House papers in a
|
|
traditional BBS type file library. Connect to FedWorld by
|
|
calling (703) 321-8020. No parity, eight data bits and one stop
|
|
bit (N-8-1). FedWorld accommodates baud speeds of up to 9,600.
|
|
It is also possible to Telnet to FedWorld at FedWorld.doc.gov.
|
|
White House papers are located in the W-House library of files.
|
|
To access this library from the main FedWorld menu,
|
|
enter <f s w-house>. Files are named with the first four digits
|
|
being the release month and day (e.g. 0323XXX.txt). Some
|
|
standard abbreviations after the date include:
|
|
|
|
rem - Remarks by the President
|
|
pc - Press Conference transcript
|
|
pr - Press Release
|
|
AM - AM Press Briefing
|
|
PM - PM Press Briefing
|
|
sch - The President's public schedule
|
|
spch- Text of major speeches.
|
|
|
|
These files are saved in ASCII format. Files can be viewed
|
|
online by requesting to download a file and then selecting
|
|
(L)ist as the download protocol. This will display the file a
|
|
screen at a time. White House papers are kept in the above
|
|
format for up to two months. Papers more than two months old
|
|
are compressed using Pkzip into a single file that contains all
|
|
of the files for that month (e.g. 0193.zip contains all papers
|
|
released during January 1993). In addition to White Documents,
|
|
FedWorld also provides a gateway to more than 100 government
|
|
funded BBSs and computer systems.
|
|
|
|
6. Texas A&M University GOPHER Server makes available White House
|
|
press releases and other documents. This archive includes
|
|
information from 1992 until the present time and is updated
|
|
as new documents are released. Gopher users can reach the
|
|
Texas A&M server by choosing it from their local server's list
|
|
of other gophers, or by pointing their gopher clients to
|
|
GOPHER.TAMU.EDU.
|
|
|
|
After connecting to the A&M server, take the following path to
|
|
reach the White House menus:
|
|
|
|
"Browse Information by Subject" -->
|
|
"Political Science" -->
|
|
"Information from the White House"
|
|
|
|
Gopher maintainers and other intrepid souls are welcome to point
|
|
directly to the A&M White House archive. The server is
|
|
GOPHER.TAMU.EDU and the path is 11/.dir/president.dir.
|
|
|
|
|
|
II. HOW DO I SIGN UP FOR ELECTRONIC PUBLICATIONS BY THE WHITE HOUSE?
|
|
|
|
The White House Communications office is distributing press releases
|
|
over an experimental system developed during the campaign at the MIT
|
|
Artificial Intelligence Laboratory.
|
|
|
|
You can obtain copies of all the press releases from a wide variety of
|
|
on-line services or discussion groups devoted to either national
|
|
politics in general or President Clinton in particular. These are
|
|
listed in sections I and II.
|
|
|
|
Section IIc explains how you can sign up to receive press releases
|
|
directly from the experimental MIT system by using an automated email
|
|
server. The present system was not designed to handle high levels of
|
|
message traffic. A more powerful system will become available in due
|
|
course, and in the meantime, it would be appreciated if you used this
|
|
service sparingly. One appropriate current use is secondary
|
|
redistribution and archiving. If you use it, you will be carried forward
|
|
when the more powerful system that replaces it.
|
|
|
|
|
|
IIa. WIDELY AVAILABLE SOURCES
|
|
|
|
1. On USENET/NETNEWS, electronic publications are found on a variety
|
|
of groups:
|
|
|
|
Direct Distribution
|
|
|
|
alt.politics.clinton
|
|
alt.politics.org.misc
|
|
alt.politics.reform
|
|
alt.politics.usa.misc
|
|
alt.news-media
|
|
alt.activism
|
|
talk.politics.misc
|
|
|
|
Indirect Distribution
|
|
|
|
misc.activism.progressive
|
|
cmu.soc.politics
|
|
assocs.clinton-gore-92
|
|
|
|
2. On CompuServe: GO WHITEHOUSE
|
|
3. On America Online: keyword WHITEHOUSE or THE WHITEHOUSE or CLINTON
|
|
4. On The WELL: type whitehouse
|
|
5. On MCI: type VIEW WHITE HOUSE
|
|
6. On Fidonet: See Echomail WHITEHOUSE
|
|
7. On Peacenet or Econet: See pol.govinfo.usa.
|
|
8. On The Meta Network: Go Whitehouse
|
|
9. On GEnie: Type WHITEHOUSE or WHRT, or MOVE 1600
|
|
10. On CompuServe, see the Democratic Forum: Go Democrats
|
|
|
|
IIb. NOTES ON WIDELY AVAILABLE SOURCES
|
|
|
|
2. CompuServe's White House Forum (GO WHITEHOUSE) is devoted to
|
|
discussion of the Clinton administration's policies and
|
|
activities. The forum's library consists of news releases and
|
|
twice daily media briefings from the White House Office of Media
|
|
Affairs. CompuServe members can exchange information and
|
|
opinions with each other in the 17 sections in the forum's
|
|
message area. The message board spans a broad range of topics,
|
|
including international and United Nations activities, defense,
|
|
health care, the economy and the deficit, housing and
|
|
urban development, the environment, and education and national
|
|
service.
|
|
|
|
3. On America Online, the posts are sent to the White House Forum,
|
|
located in the News & Finance Department of the service or
|
|
accessible via keywords: "white house" or "clinton". The White
|
|
House Forum on America Online contains the press releases from
|
|
the White House, divided into the categories "Appointments",
|
|
"Budget", "Congress", "Education", "Economy", "Foreign Policy",
|
|
"Health Care", "Housing", "Labor", "Law and Order", "Meetings &
|
|
Speeches", "Proclamations", "Technology", and "Vice President".
|
|
The area features a message board so you can discuss the
|
|
releases with other AOL members, a searchable database for easy
|
|
retrieval of releases that interest you, a Library for longer
|
|
releases from the White House, and a library that members can
|
|
upload files of interest for other members.
|
|
|
|
4. MCI Mail users access daily information on the administration's
|
|
programs provided by the White House through MCI Mail bulletin
|
|
boards. The available boards are: WHITE HOUSE ECONOMIC, WHITE
|
|
HOUSE FOREIGN, WHITE HOUSE SOCIAL, WHITE HOUSE SPEECHES and
|
|
WHITE HOUSE NEWS. A listing of these boards can also be
|
|
obtained by simply typing VIEW WHITE HOUSE at the COMMAND
|
|
prompt.
|
|
|
|
5. On The Meta Network, material is posted in the White house
|
|
conference and is accessible via keywords (matching on document
|
|
titles and subject categories) as well as full text search.
|
|
Discussions on specific initiatives take place in special
|
|
interest forums, e.g. health, technology, and reinventing
|
|
government.
|
|
|
|
9. GEnie's White House RoundTable has been established to
|
|
distribute and discuss the official press releases and files
|
|
relating to the White House and the Clinton Administration. The
|
|
files library holds all of the press releases on the official
|
|
mailing list, and the Bulletin Board has Categories set up with
|
|
topics relating to all aspects of the Administration and
|
|
Executive Branch of government. Letters to the White House can
|
|
be entered easily online with a menu option on the WHITEHOUSE
|
|
page.
|
|
|
|
10. CompuServe's Democratic Forum (GO DEMOCRATS) is the Democratic
|
|
Party's online information service covering the activities of
|
|
the Clinton administration. The sysops of the Democratic Forum
|
|
work for the Democratic National Committee, and are directly
|
|
involved in managing the forum and responding to online
|
|
questions. The Democratic Forum provides access to documents
|
|
from the White House Office of Media Affairs, with vigorous
|
|
discussion and debate in the message sections about the impact
|
|
of the Clinton Administration's policies and proposals. The
|
|
Democratic Forum also holds a regular weekly online conference
|
|
with special guests on current topics.
|
|
|
|
|
|
IIc. DIRECT EMAIL DISTRIBUTION
|
|
|
|
If you don't have access to the these accounts or if you would prefer to
|
|
receive the releases via email, then this section details how to
|
|
sign up for this service. The server is not set up to answer email
|
|
letters, comments or requests for specific information. To reach this
|
|
MIT server, send email:
|
|
|
|
To: Clinton-Info@Campaign92.Org
|
|
Subject: Help
|
|
|
|
The server works by reading the subject line of the incoming message and
|
|
taking whatever action that line calls for. If you want to sign up to
|
|
automatically receive press releases, then your subject line would begin
|
|
with the word RECEIVE. You can then specify what kind of information
|
|
you are interested in receiving. The categories of information are:
|
|
|
|
ECONOMY
|
|
Get releases related to the economy such as budget
|
|
news, technology policy review, etc.
|
|
|
|
FOREIGN
|
|
Get releases related to foreign policy such as
|
|
statements on Bosnian airdrop, Haitian refugee status,
|
|
etc.
|
|
|
|
HEALTH Get releases related to health care policy, without
|
|
receiving any other social issues. Use this instead
|
|
of social.
|
|
|
|
SOCIAL
|
|
Get releases related to social issues like National
|
|
Service (Student Loan) program, abortion, welfare
|
|
reform, etc.
|
|
|
|
SPEECHES
|
|
All speeches made by the President and important
|
|
speeches made by other Administration officials.
|
|
|
|
NEWS
|
|
Transcripts of press conferences released by the White
|
|
House Communications office, as well as the
|
|
President's remarks in photo ops and other Q&A
|
|
sessions.
|
|
|
|
ALL All of the above
|
|
|
|
So, if you wanted to sign up to get releases related to the economy
|
|
your email message would look like this:
|
|
|
|
To: Clinton-Info@Campaign92.Org
|
|
Subject: RECEIVE ECONOMY
|
|
|
|
When you send a signup message to the clinton-info server, it sends you
|
|
back a status message letting you know what distribution streams you are
|
|
signed up for. If you ever want to check on what groups you are signed
|
|
up for send the following message:
|
|
|
|
To: Clinton-Info@Campaign92.Org
|
|
Subject: STATUS
|
|
|
|
*****You can stop receiving email releases by sending a REMOVE message
|
|
to the clinton-info server. The word REMOVE would be followed by
|
|
whatever distribution stream you wanted to drop. If you wanted to stop
|
|
receiving message about the ECONOMY then your mail would look like this:
|
|
|
|
To: Clinton-Info@Campaign92.Org
|
|
Subject: REMOVE ECONOMY
|
|
|
|
You could substitute SOCIAL, FOREIGN, HEALTH, SPEECHES, NEWS or ALL for
|
|
ECONOMY in the above message and you would be dropped from that
|
|
distribution list. If you send the subject line REMOVE ALL, then you
|
|
will be taken off the email distribution system all together and will
|
|
not receive further releases of any kind.
|
|
|
|
You can also ask for help from the automated server. Send an email
|
|
query as follows:
|
|
|
|
To: Clinton-Info@Campaign92.Org
|
|
Subject: HELP
|
|
|
|
The server will respond by sending you a detailed form that will guide
|
|
you through the process of signing up for the various distribution
|
|
streams. As you will quickly discover, there is a automatic form
|
|
processing interface that parallel the quick and easy subject line
|
|
commands discussed here. More detailed help is available by sending an
|
|
email query as follows:
|
|
|
|
To: Clinton-Info@Campaign92.Org
|
|
Subject: Please Help!
|
|
|
|
Finally, if you want to search and retrieve documents, but you do not
|
|
have access to the retrieval methods discussed in section II, you can do
|
|
this via email through the MIT server. You can obtain the WAIS query
|
|
form by sending an email query as follows:
|
|
|
|
To: Clinton-Info@Campaign92.Org
|
|
Subject: WAIS
|
|
|
|
Once you have identified the documents that you want, be careful not
|
|
to request them all at once, because you may be sent a message
|
|
containing all the documents and this message may be too big for some
|
|
mail delivery systems between the email server and you.
|
|
|
|
D. EMAIL SUMMARY SERVICE
|
|
|
|
The Extension Service of the U.S. Department of Agriculture provides a
|
|
daily summary of White House electronic publications.
|
|
|
|
1. Subscriptions
|
|
|
|
To subscribe to the USDA Extension Service White House Summary service,
|
|
send a message to:
|
|
|
|
almanac@ESUSDA.GOV
|
|
|
|
In the body of the message, type:
|
|
|
|
subscribe wh-summary
|
|
|
|
To Unsubscribe from the USDA Extension Service White House Summary
|
|
service, send a message to:
|
|
|
|
almanac@ESUSDA.GOV
|
|
|
|
In the body of the message, type:
|
|
|
|
unsubscribe wh-summary
|
|
|
|
2. Document Retrieval
|
|
|
|
To request a specific document from the daily summaries, send a message
|
|
to:
|
|
|
|
almanac@ESUSDA.GOV
|
|
|
|
In the body of the message, type:
|
|
|
|
send white-house #####
|
|
(where ##### is the request number for the document)
|
|
|
|
3. Document Search
|
|
|
|
A user-friendly search facility is also available to search the
|
|
white-house documents archived at ESUSDA.GOV. To search, send a message
|
|
to:
|
|
|
|
almanac@ESUSDA.GOV
|
|
|
|
In the body of the message, type:
|
|
|
|
search white-house keyword1 keyword2
|
|
|
|
4. Catalogue of Summaries and Documents
|
|
|
|
Back issues and the catalog of the summaries or the documents contained
|
|
at ESUSDA.GOV can also be retrieved through our almanac server. To get
|
|
the summary catalog, send a message
|
|
|
|
To: almanac@ESUSDA.GOV
|
|
|
|
In the body of the message, type:
|
|
|
|
send wh-summary catalog
|
|
|
|
5. Further Information
|
|
|
|
If you have any questions about Almanac, please contact:
|
|
|
|
wh-admin@ESUSDA.GOV
|
|
|
|
III. HOW DO I SEND EMAIL TO THE WHITE HOUSE?
|
|
|
|
We are pleased to introduce this new form of communication with the
|
|
White House for the first time in history. As we work to reinvent
|
|
government and streamline our processes, this electronic mail project
|
|
will help put us on the leading edge of progress. Please remember,
|
|
though, this project is still very much under construction. The Office
|
|
of Correspondence is currently working on defining what this system
|
|
will do, as well as addressing equipment and staffing needs.
|
|
|
|
When you send a message to the White House you will receive an immediate
|
|
acknowledgment that your message has been received. This is the only
|
|
electronic response you will receive at this stage of development; if
|
|
you include your street address in your message, you may receive a
|
|
response by U.S. Mail. Please be assured that every electronic mail
|
|
message received is read and analyzed by staff. Your concerns, your
|
|
praise, your suggestions, and your ideas are carefully recorded and
|
|
reported to the President and Vice President weekly.
|
|
|
|
You can send email to the following addresses:
|
|
|
|
Internet Direct: President@WhiteHouse.GOV
|
|
Vice.President@WhiteHouse.GOV
|
|
|
|
|
|
IV. HOW DO I SEND EMAIL TO CONGRESS?
|
|
|
|
The House and the Senate are conducting electronic communications
|
|
projects. You can access Congressional information via the protocols
|
|
listed below. For additional information, please contact the offices of
|
|
your Representative or Senators.
|
|
|
|
|
|
Site Protocol Host/connection
|
|
|
|
House
|
|
|
|
Email Congress@hr.House.GOV
|
|
Gopher Gopher.House.GOV
|
|
[URL: "Gopher://Gopher.House.GOV/11"]
|
|
|
|
Senate
|
|
|
|
Gopher Gopher.Senate.GOV
|
|
[URL: "Gopher://Gopher.Senate.GOV/11"]
|
|
FTP FTP.Senate.GOV
|
|
|
|
Library of Congress
|
|
|
|
Gopher Marvel.LOC.GOV
|
|
[URL: "Gopher://Marvel.LOC.GOV/11"]
|
|
FTP seq1.LOC.GOV
|
|
Telnet LOCIS.LOC.GOV
|
|
|
|
|
|
|
|
Please note that these are not connected in any way to any White House
|
|
online projects, so if you have any problems with Congressional systems,
|
|
you will need to contact their system administrators for assistance.
|
|
|
|
V. HOW DO I SUBMIT UPDATES FOR THIS FAQ?
|
|
|
|
Please send corrections, deletion and additions to this FAQ to:
|
|
|
|
Publications-Comments@WhiteHouse.GOV
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
REDEFINING THE MODEM USER:
|
|
HOW THE MEDIA TOOK TWO PERFECTLY HARMLESS WORDS AND RUINED THEM
|
|
|
|
By Ed Cavazos
|
|
|
|
Computer telecommunication hobbyists always seem to find themselves
|
|
being labeled by the media in ways which help spread fear and
|
|
misunderstanding. For some reason, there is no term in the vernacular to
|
|
describe someone who uses their computer and modem not as a tool to
|
|
perpetrate illegal activities, but as an electronic link to the world.
|
|
Whenever one comes along, it gets used in a way which always implies
|
|
illicit behavior.
|
|
|
|
|
|
"Hacker": From Computer Guru to Computer Terrorist
|
|
|
|
The word "hacker" is already lost. When Stephen Levy's 1984 book
|
|
"Hackers: Heroes of the Computer Revolution" was published, the word was
|
|
used in a way that was devoid of the negative associations prevalent today.
|
|
|
|
In fact, the blurb on the back cover of the paperback described hackers as:
|
|
|
|
"Spellbound explorers totally committed to
|
|
experimenting with the infinite new possibilities
|
|
of the computer.."
|
|
|
|
And Levy himself (in the Preface) described his subjects as "those computer
|
|
programmers and designers who regard computing as the most important thing
|
|
in the world." Levy was concerned that some were using the term as a
|
|
derogatory one to describe someone who wrote bad code. This innocent
|
|
definition of the word could be traced back to the days when MIT Model
|
|
Railroad enthusiasts were described that way.
|
|
|
|
But those days are gone. Listen to what the National Law Journal
|
|
(September 16, 1991) noticed:
|
|
|
|
"...there is a widespread public perception that so-called
|
|
computer hackers get their kicks out of breaking into top-secret
|
|
government computer systems and wreaking havoc with destructive
|
|
programs called computer viruses."
|
|
|
|
And Katie Hafner a computer crime journalist was quoted in Waldensoftware's
|
|
Computer Newslink,( Autumn 1991, Vol. 6, Issue 1) as remarking:
|
|
|
|
"With the release of the movie "War Games" in 1983, in which a
|
|
teenager almost triggers World War III from his little home
|
|
computer, the definition of hacker changed overnight. Suddenly,
|
|
hacker took on a very negative connotation. Now it's defined in
|
|
Webster's as somebody who tries to break into computers."
|
|
|
|
The media has helped turn what was at one time considered a complimentary
|
|
term into something that connotes violence, illegality and destruction.
|
|
To be called a hacker today is an accusation. Through misuse, the media is
|
|
warping the word even further. When Geraldo Rivera interviewed Craig
|
|
Neidorf for his television show "Now it Can Be Told" he referred to Craig
|
|
(an electronic publisher) as "The Mad Hacker." Geraldo's loose usage of
|
|
the term ignores the fact that Craig was never accused of breaking into a
|
|
system, or gaining illegal access anywhere.
|
|
|
|
|
|
Cyberpunk: From Science Fiction to Sensationalism
|
|
|
|
When William Gibson, Bruce Sterling and other science fiction writers
|
|
began writing a new type of science fiction in the 1980's, critics searched
|
|
for a way to describe it. They settled (to the disappointment of some of
|
|
the very writers they were describing) on "Cyberpunk." The term still
|
|
refers to a genre of science fiction. "Science fiction with an attitude,"
|
|
is how the April 20, 1990 Washington Post described it. At the stretches of
|
|
its usage, it describes a new world view which is composed of a collage of
|
|
computers and information, of countercultural electronic expression.
|
|
|
|
But, as happened before, the media decided that definition wasn't good
|
|
enough. When Katie Hafner and John Markoff decided to write a book on
|
|
computer crime, they stole the term for their cover. "Cyberpunk: Outlaws
|
|
and Hackers on the Computer Frontier" was the result. Now, all of a sudden,
|
|
Cyberpunk doesn't refer to a sci-fi or cultural movement, it refers to a
|
|
cynical hacker. When asked to describe a "typical Cyberpunk" Hafner
|
|
explains:
|
|
|
|
"They are typically alienated suburban teenage boys who find an
|
|
alternative world in computers. Pengo, who we wrote about in the book,
|
|
is a pretty good example. He lives in Berlin and dresses in black.
|
|
Then again, who in Berlin doesn't? But he was almost a caricature of
|
|
himself. He smoked hand-rolled cigarettes. When he worked at his
|
|
computer, he had his headphones on all the time listening to
|
|
synthesized music. He started hacking when he was fifteen and by
|
|
seventeen he started spying for the KGB by hacking over the networks."
|
|
(Waldensoftware's Computer Newslink, August 1991)
|
|
|
|
Even William Gibson, Cyberpunk's founding father, who wrote of
|
|
cyberspace and a new society noticed it. "I've been credited of inspiring a
|
|
whole new generation of techno-delinquents," he remarks in the February 19,
|
|
1989 Boston Globe. If only we could hear Gibson's reaction two years
|
|
later, when the term which once described his writing style is now being
|
|
used to describe computer criminals.
|
|
|
|
The word "Cyberpunk" had a real mystique to it. To turn it into a
|
|
term to describe the "alienated suburban teenage boy" is to ruin some of
|
|
that feel. Moreover, it serves to confuse and concern a public which is
|
|
already paranoid and somewhat hysterical about anybody who admits to using
|
|
a computer and modem for long periods of time. Responsible journalists
|
|
should shy away from sensationalistic tactics like misusing an already well
|
|
defined term like this.
|
|
|
|
|
|
The Need for A New Word
|
|
|
|
What is needed is new terminology. There are a myriad of totally
|
|
legal and legitimate uses for modems and personal computers. People do
|
|
everything online from perusing library card catalogs to meeting their
|
|
perfect romantic match. On BBS's there are livid discussions of issues
|
|
ranging from politics to religion -- from art to science. And online
|
|
services like Prodigy and Compuserve are watching their user base swell
|
|
annually. Soon, perhaps the media will accept a word that describes a
|
|
person interested in communicating electronically without implying illegal
|
|
activity. "Hacker" and "Cyberpunk" are ruined. "Modem Enthusiast" sounds
|
|
too much like a term fresh from the pages of Reader's Digest. Hopefully,
|
|
someone will provide us with a new term which truly describes the millions
|
|
of modem users who "live, play and thrive" in cyberspace. Until that time,
|
|
we can only sit and watch as the mainstream media stumbles along trying to
|
|
understand and describe a phenomenon one gets the feeling it knows very
|
|
little about.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
PUBLIC UTILITY COMMISSION OF TEXAS
|
|
REQUESTS COMMENTS ON INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
|
|
|
|
The Public Utility Commission of Texas (the Commission) has
|
|
established a project (Project No. 12756) to examine Integrated
|
|
Services Digital Network (ISDN) issues. The Commission seeks comments
|
|
from interested parties in response to the following questions. If
|
|
your answers would differ depending upon time-frame considerations,
|
|
please provide answers for each time-frame. Parties are requested to
|
|
organize their comments to address the specific questions asked in the
|
|
order asked and are encouraged to include an executive summary
|
|
emphasizing the main points of their comments to each question.
|
|
|
|
Comments (13 paper copies) should contain a reference to Project No.
|
|
12756 and should be submitted to John M. Renfrow, Secretary of the
|
|
Commission, Public Utility Commission of Texas, 7800 Shoal Creek
|
|
Boulevard, Austin, Texas 78757, no later than April 30, 1994.
|
|
|
|
Informal comments may be sent to Ms. Pam Whittington at the Commission
|
|
via e-mail addressed to:
|
|
|
|
pam.tel@email.puc.texas.gov
|
|
|
|
Or you may call her at (512) 458-0100.
|
|
|
|
1. To which local exchange carriers (LECs) should a rule on ISDN
|
|
apply? Why?
|
|
|
|
2. Should ISDN-based services be considered to be a replacement of or
|
|
successor for "plain old telephone service"? Why?
|
|
|
|
3. Should all Texas customers and customer classes have access to
|
|
ISDN? Why? If not, why not? What policies should be adopted by the
|
|
Commission regarding customer access to ISDN? Why?
|
|
|
|
4. What are the policies which the Commission should adopt regarding
|
|
the determination of costs and the pricing of ISDN and ISDN-based
|
|
services? Explain why. Provide detailed cost information for each
|
|
position if available.
|
|
|
|
5. Should the manner in which ISDN is deployed affect the price? How?
|
|
|
|
6. Should the Commission grant regulatory incentives, penalties, or
|
|
flexibility in exchange for a LEC's provision of ISDN? Why? If yes,
|
|
describe the incentives, penalties, or flexibility.
|
|
|
|
7. Does the Commission have jurisdiction to compel the provision of
|
|
ISDN? Why? Explain the legal basis for your position.
|
|
|
|
8. Should the LECs be required to provide ISDN services in a manner
|
|
that is conducive to competition in the provision of ISDN? Why? If
|
|
so, how?
|
|
|
|
9. What policies should the Commission adopt regarding the deployment
|
|
of ISDN? Should the Commission directly mandate deployment, require
|
|
deployment to be driven by customer demand, or require deployment in
|
|
some other manner? Why? Describe in detail how.
|
|
|
|
10. Describe in detail how these policies regarding deployment should
|
|
be implemented and enforced.
|
|
|
|
11. If customer driven demand deployment was ordered by the Commission,
|
|
should the trigger for deployment be thirty customer requests for ISDN
|
|
per central office? Why? If not, why not, and provide evidence to
|
|
support your position. If thirty requests is not the appropriate
|
|
number, explain what is.
|
|
|
|
12. Should LEC compliance with deployment requirements be monitored on
|
|
a periodic basis by the Commission? If so, explain in detail how and
|
|
why.
|
|
|
|
13. What are the appropriate time frames for completion of deployment
|
|
of ISDN in a LEC's service territory and in the entire state respectively?
|
|
Why?
|
|
|
|
14. What are the technological options of the LECs with respect to the
|
|
system upgrades necessary to deploy ISDN within their service areas?
|
|
Explain in detail how the costs should be determined and reported to
|
|
the Commission.
|
|
|
|
15. Are there any other policies, aspects, technical characteristics,
|
|
costs, or obstacles (e.g. switch architecture, software, or SS7)
|
|
regarding deployment that the Commission should consider? If yes,
|
|
list and describe each and explain why. Provide detailed cost
|
|
information for each item if available.
|
|
|
|
16. What policies regarding ISDN standards should be adopted by the
|
|
Commission? Why?
|
|
|
|
17. To what standards (e.g. National ISDN, ITU-T standards, etc.)
|
|
should the Commission require ISDN be deployed and provided? Why?
|
|
|
|
18. What specific service capabilities (e.g. bearer services,
|
|
teleservices, supplementary services, etc.) should be required to be
|
|
provided to customers? Why?
|
|
|
|
19. How should the policies regarding ISDN be implemented by the
|
|
Commission? Why? If tariff filings were required, what should they
|
|
contain? Why?
|
|
|
|
20. What end-user applications (e.g. telemedicine, distance learning,
|
|
telecommuting, and video conferencing) using ISDN are available? Will
|
|
these applications be available using technology other than ISDN?
|
|
Should the Commission consider this in its rulemaking? Why?
|
|
|
|
21. Does Texas need ISDN to compete with other states? Why?
|
|
|
|
22. Would the widespread availability of ISDN have a beneficial impact
|
|
(e.g., through telecommuting, video conferencing, etc.) on Texas'
|
|
compliance with the Clean Air Act? Explain how.
|
|
|
|
23. Are there any other aspects or characteristics of providing ISDN
|
|
that should be considered by the Commission? If yes, describe each
|
|
and explain why.
|
|
|
|
Parties interested in providing additional comments are welcome to do
|
|
so. The Commission also welcomes data and documentation supporting
|
|
the parties' comments. General Counsel and staff will review the
|
|
comments and use them in preparing a recommendation to the Commission.
|
|
|
|
Comments (13 paper copies) should contain a reference to Project No.
|
|
12756 and should be submitted to John M. Renfrow, Secretary of the
|
|
Commission, Public Utility Commission of Texas, 7800 Shoal Creek
|
|
Boulevard, Austin, Texas 78757, by April 30, 1994.
|
|
|
|
Informal comments may be sent to Ms. Pam Whittington at the Commission
|
|
via e-mail addressed to:
|
|
|
|
pam.tel@email.puc.texas.gov
|
|
|
|
Or you may call her at (512) 458-0100.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
EXAM PAPERS
|
|
|
|
[Editor's Note: These are supposed to be actual answers from the tests of
|
|
some students. There were no indications as to which grade-level they were
|
|
in...but just between me and you, I hope that they weren't college kids.
|
|
If so, ...I weep for the future.]
|
|
|
|
ACTUAL EXCERPTS FROM STUDENT EXAM PAPERS:
|
|
|
|
- Charles Darwin was a naturalist who wrote the organ of the species.
|
|
- Benjamin Franklin produced electricity by rubbing cats backwards
|
|
- The theory of evolution was greatly objected to because it made man think.
|
|
- Three kinds of blood vessels are arteries, vanes, and caterpillars.
|
|
- The dodo is a bird that is almost decent by now.
|
|
- To remove air from a flask, fill it with water, tip the water out, and
|
|
put the cork in quick before the air can get back in.
|
|
- The process of turning steam back into water again is called conversation.
|
|
- A magnet is something you find crawling over a dead cat.
|
|
- The Earth makes one resolution every 24 hours.
|
|
- The cuckoo bird does not lay his own eggs.
|
|
- To prevent conception when having intercourse, the male wears a
|
|
condominium.
|
|
- To collect fumes of sulfur, hold a deacon over a flame in a test tube.
|
|
- Parallel lines never meet, unless you bend one or both of them.
|
|
- Algebraical symbols are used when you do not know what you are talking
|
|
about.
|
|
- Geometry teaches us to bisex angles.
|
|
- A circle is a line which meets its other end without ending.
|
|
- The pistol of a flower is its only protection against insects.
|
|
- The moon is a planet just like the Earth, only it is even deader.
|
|
- Artificial insemination is when the farmer does it to the cow instead of
|
|
the bull.
|
|
- An example of animal breeding is the farmer who mated a bull that gave a
|
|
great deal of milk with a bull with good meat.
|
|
- We believe that the reptiles came from the amphibians by spontaneous
|
|
- generation and the study of rocks.
|
|
- English sparrows and starlings eat the farmers grain and soil his corpse.
|
|
- By self-pollination, the farmer may get a flock of long-haired sheep.
|
|
- If conditions are not favorable, bacteria go into a period of adolescence.
|
|
- Dew is formed on leaves when the sun shines down on them and makes them
|
|
perspire.
|
|
- Vegetative propagation is the process by which one individual manufactures
|
|
another individual by accident.
|
|
- A super-saturated solution is one that holds more than it can hold.
|
|
- A triangle which has an angle of 135 degrees is called an obscene
|
|
triangle.
|
|
- Blood flows down one leg and up the other.
|
|
- A person should take a bath once in the summer, and not quite so often in
|
|
the winter.
|
|
- The hookworm larvae enters the human body through the soul.
|
|
- When you haven't got enough iodine in your blood you get a glacier.
|
|
- It is a well-known fact that a deceased body harms the mind.
|
|
- Humans are more intelligent than beasts because human branes have more
|
|
convulsions.
|
|
- For fainting: rub the person's chest, or if a lady, rub her arm above the
|
|
hand, instead.
|
|
- For fractures: to see if the limb is broken, wiggle it gently back and
|
|
forth.
|
|
- For a dog bite: put the dog away for several days. If he has not
|
|
recovered, then kill it.
|
|
- For a nosebleed: put the nose much lower than the body.
|
|
- For drowning: climb on top of the person and move up and down to make
|
|
artificial perspiration.
|
|
- To remove dust from the eye, pull the eye down over the nose.
|
|
- For head colds: use an agonizer to spray the nose until it drops into
|
|
your throat.
|
|
- For snakebites: bleed the wound and rape the victim in a blanket for shock.
|
|
- For asphixiation: apply artificial respiration until the patient is dead.
|
|
- Before giving a blood transfusion, find out if the blood is affirmative or
|
|
negative.
|
|
- Bar magnets have north and south poles, horseshoe magnets have east and west
|
|
poles.
|
|
- When water freezes you can walk on it. That is what Christ did long ago in
|
|
wintertime.
|
|
- When you smell an odorless gas, it is probably carbon monoxide.
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
Interview with Tom Jennings
|
|
by Jon Lebkowsky, jonl@io.com
|
|
reprinted with permission
|
|
|
|
Originally published in Fringe Ware Review #1, ISSN 1069-5656.
|
|
Copyright (c)1993 by the author. All rights reserved.
|
|
For more details, contact: fringeware@io.com
|
|
|
|
Our FWI prez recently had a chance to chat with Tom Jennings, who commented
|
|
afterwards: "Think you can mention somewhere that I'm a fag anarcho nerd
|
|
troublemaker/activist? It is important, and to me as well. It always gets
|
|
buried. Lots of people like to know, especially scared people with no
|
|
images of people who are gay and reasonably functional in some way." Tis
|
|
our pleasure to honor Tom, whose work has been so brilliant and so far out
|
|
on the Fringe, that when the US gov't precluded computer technology exports
|
|
during the Cold War, they basically forgot/ignored a certain fag anarcho
|
|
nerd from the Bay Area... As a result, Tom's FidoNet now provides the basis
|
|
for computer networking in Eastern Europe, former USSR and most of the
|
|
Third World, as well as a extraordinary conduit throughout the rest of the
|
|
world.
|
|
|
|
Tom: This people tracking stuff... what little I know of it sounds very
|
|
creepy. I don't want a box that reports where the hell I am all the time,
|
|
when I walk in the room, it can tell some local machine I'm there. It's
|
|
none of anyone's goddamn business. It's the corporate culture invasion on
|
|
real life, like the top 1% who make all the money, and think everyone's
|
|
gonna live like them.
|
|
|
|
Jon: Well, if you're living in an ivory tower, after you live there for a
|
|
while, you start to think, not that it's YOUR environment, but it's THE
|
|
environment.
|
|
|
|
T: Yeah, it is reality, but it's a local one. Everyone they know is like
|
|
that... well, they don't know everybody.
|
|
|
|
J: In a conversation I had the other day with Allucquere Rosanne Stone, she
|
|
talked about ubiquitous computing, that computers or computing will be
|
|
invisible, it will be so omnipresent...
|
|
|
|
T: That's what Alan Kay pointed out years ago, that when technology gets
|
|
done right, you don't even see it. When you walk in a room, your hand
|
|
flicks a switch... how much thought do you give to that stupid light
|
|
switch? Hopefully very little. The light comes on, and... Telephones are
|
|
getting close to that.
|
|
|
|
J: Even better, there's some rooms you walk into and the light switches on
|
|
automatically, because there's motion detectors.
|
|
|
|
T: Yeah.
|
|
|
|
|
|
Anarchy In The A-C-K
|
|
|
|
J: Tell me about FidoNet. As I said, I'm sorta ignorant on the subject...
|
|
|
|
T: I have a weird point of view on it, of course, having designed it...
|
|
February or March of '94 will be it's tenth year. It is a network, a
|
|
collection of bulletin boards. It is a loose confederation, and it is
|
|
completely and thoroughly and utterly decentralized. There is literally no
|
|
top. Most of it's members have a narrow view of it because they have this
|
|
particular reality filter on all the time from living amongst hierarchy
|
|
addicts. But FidoNet's most basic element is a bulletin board. What FidoNet
|
|
is, is a set of protocols that lets the bulletin boards communicate.
|
|
FidoNet started as a bunch of bulletin boards, running my Fido software.
|
|
FidoNet was added later, to allow point-to-point email between Fido boards.
|
|
|
|
J: Did you start with just a single BBS?
|
|
|
|
T: It started with my system. I was writing software for Phoenix Software,
|
|
which is now Phoenix Technologies. I was their first employee. I did all
|
|
their portable MS-DOS stuff prior to the ROM BIOS they did, which was
|
|
partly based on my previous work with "portable" MS-DOS... we were doing
|
|
MS-DOS installations in three days, and charging exorbitant sums... and
|
|
delivering really good stuff, people got their money's worth, and got it
|
|
damn fast! We had it down to an art of just totally portable stuff. So I
|
|
had this portable attitude toward hardware, and wrote a bulletin board sort
|
|
of based on it.
|
|
|
|
FidoNet is more importantly a social mechanism. It was pretty obvious from
|
|
the start that it was going to be a social monster, almost more so than a
|
|
technical thing. And it had to do with the original environment of bulletin
|
|
boards, which were around for quite a while by the time I got around to
|
|
doing Fido. Every bulletin board was completely different, run by some
|
|
cantankerous person who ran their board the way that they saw fit, period.
|
|
So FidoNet had to fit in that environment.
|
|
|
|
J: A very anarchic environment.
|
|
|
|
T: Yes, explicitly anarchic. Most people just ran them for their own
|
|
reasons, and they were just separated by large distances of time and space,
|
|
so they remained locally oriented. I just ran across old interviews and old
|
|
documentation from '83 - '84, and we were saying it then. It was just...
|
|
people didn't hear it, it just went in one ear and out the other. They
|
|
think 'Oh, anarchism, that means throwing rocks at the cops!' Well
|
|
sometimes, I suppose, but that's mostly a cop's definition of it.
|
|
|
|
|
|
The Revolution Will Be Packetized
|
|
|
|
J: The sense of the bomb throwing anarchist, I guess, is sort of in the
|
|
sense of political disorder...
|
|
|
|
T: ...which was a specific event in the 20's in San Francisco having to do
|
|
with union labor busts. And blackmail... this guy Tom Mooney, a bomb was
|
|
planted and blame arranged to fall on Tom Mooney, tossing his ass in jail,
|
|
putting the blame squarely on the anarchists.
|
|
|
|
J: Anarchy has this sorta bad connotation, but anarchy itself is not unlike
|
|
what so many seem to want to embrace now. I think the libertarian
|
|
philosophy is fairly anarchic, and you find it widespread throughout the
|
|
net. It's basically a hands-off philosophy.
|
|
|
|
T: I think people often take it too seriously, like various anarchist camps
|
|
that have more rules than not. I consider it a personal philosophy, not a
|
|
political thing at all. It has nothing to do with party-type politics.
|
|
|
|
J: If it becomes overtly political, it ceases to be anarchy...
|
|
|
|
T: Yeah, more or less, and I don't really care about what's considered
|
|
politics per se, it's personal interaction, how I treat other people and
|
|
how they treat me, and my relations to other people, it's anarchism... I
|
|
always call it Paul Goodman style, which is the principle that people work
|
|
together better if they're cooperating than if they're coerced. Very
|
|
simple, nothing to do with goddamn party politics. It has to do with how
|
|
you treat people that you have to work with. And that's what FidoNet was
|
|
based on, very explicitly. It was sort of laid over the top of a lot of
|
|
Fido bulletin boards, and let them talk to each other in a straightforward
|
|
point-to-point manner.
|
|
|
|
|
|
Just How Big Is It?
|
|
|
|
J: Was it just Fido boards?
|
|
|
|
T: Just Fido at the time, because it required a fairly low-level of
|
|
restructuring of the innards, message bases and stuff. And Fido is a pretty
|
|
good bulletin board, has been for years, though now it's definitely old
|
|
fashioned. I haven't done a revision to Fido for over two years.
|
|
|
|
J: Are you thinking about doing that?
|
|
|
|
T: No, I'm thinking about dropping it. <laughter> I've thought about it,
|
|
and it's over. So FidoNet started up in spring of '84 with two systems, me
|
|
and my friend John Madill and within four months there were twenty or
|
|
fifty... by the end of the year, it was approaching 100 by the next
|
|
February, in nine months. It started growing really fast. And every single
|
|
one was run by somebody for their own reasons in their own manner for their
|
|
own purposes, so FidoNet had to accommodate this. And this is nothing
|
|
unusual, in one sense. All computer networks are essentially run this way.
|
|
The Internet is. There's no central Internet authority where you go to get
|
|
a system in Internet, you just put it online, and find people to help you,
|
|
register with the NIC [Network Information Center] which is just a
|
|
convention for handling names.
|
|
|
|
J: Sort of ideally cooperative.
|
|
|
|
T: Yeah, it's quite cooperative, and you don't really get kicked out unless
|
|
you technically screw up, or do something massively illegal or glaringly
|
|
obvious. Most likely technical, like don't answer mail for a long time.
|
|
Most electronic things are like that. It didn't start to take off until
|
|
Echomail came by, which was done by this guy named Jeff Rush in Dallas as a
|
|
way to talk among Dallas sysops about organizing pizza parties. It's a
|
|
fully distributed, redundant database using FidoNet netmail to transport
|
|
the records in the distributed database. It's functionally equivalent to
|
|
Usenet, they gate back and forth very easily.
|
|
|
|
J: Can you link FidoNet very easily to Internet or UUCP Mail?
|
|
|
|
T: There's gateways between [FidoNet and UUCP] operating. You can just set
|
|
up the UFGate package... [FidoNet and the Internet] they have totally
|
|
different paradigms. IP, the Internet stuff, is fully connected all the
|
|
time. When you want to connect to a system in Finland, you just rub packets
|
|
with them and they come back in generally under a second. FidoNet is all
|
|
store and forward, offline processing...
|
|
|
|
J: How big is it now?
|
|
|
|
T: Just short of 20,000 systems.
|
|
|
|
J: Wow, that's a lot...
|
|
|
|
T: It's doubled in a year... I think more than doubled in a year. It's been
|
|
doubling every year for a long time <laughs>.
|
|
|
|
|
|
QQBEGIN PGP PUBLIC KEY BLOCKQQ
|
|
|
|
J: There's a lot of discussion today of encryption schemes, are you
|
|
involved in that?
|
|
|
|
T: Actually, yeah, I use it routinely.
|
|
|
|
J: Using PGP?
|
|
|
|
T: Yeah. FidoNet was pretty intentionally involved in getting PGP
|
|
ubiquitous the first time around... an intentional, conscious quick-dump of
|
|
about 10,000 copies in a week, starting on a Monday, just to be sure that
|
|
it was unstoppable, and it spread very quickly. Now there's all kinds of
|
|
arguments over whether it's legal, or whether it's going to incriminate me
|
|
to use PGP, and the traffic into the network itself...
|
|
|
|
J: It wouldn't be a criminal issue...
|
|
|
|
T: People believe all kinds of crazy nonsense.
|
|
|
|
J: Somebody has a patent on the algorithm, is that it?
|
|
|
|
T: Yeah, and some people are afraid that if they send or pass encrypted
|
|
data, that the police will bust into the house and steal the computer, all
|
|
this kind of stuff... FidoNet sprung up fully-formed out of seeming nowhere
|
|
into the rest of the computer world. Most people on the Internet have
|
|
access to it through schools or industry. They went to school, then they
|
|
got a job, and they grew up with maintained Internet connectivity... they
|
|
were brought up into the sort of Internet-hood.
|
|
|
|
J: I think that's changing a bit...
|
|
|
|
T: Oh, it is changing, it will continue to change, and someday it will be
|
|
incomprehensible that it was this way, but as of today, it's sort of how it
|
|
is. FidoNet did not come from that direction at all. It came from... the
|
|
usual white guys who could afford a computer :-), but in the best tradition
|
|
of radio and astronomy, they were at least amateurs, it's truly an amateur
|
|
network. It is not professional, as in "profession"... "professional" is
|
|
frequently used to mean legitimate, as opposed to amateur...
|
|
|
|
J: You mean "hobbyist?"
|
|
|
|
T: Yeah, amateur as a word became disparaging, but we mean it actually in
|
|
the older sense, like the radio amateur sense. We don't do it for money,
|
|
it's done for the sake of itself. So for the most part, FidoNet members
|
|
never had that traditional kind of connectivity, and also didn't have the
|
|
corporate culture, and didn't have the computer network culture, so it
|
|
basically formed in the dark, on its own.
|
|
|
|
|
|
550 Flavors of Culture
|
|
|
|
J: Speaking of the word "culture," do you find that within the FidoNet
|
|
universe, there's a particular set of cultural predilections? Does there
|
|
tend to be a general kind of group or community that uses FidoNet?
|
|
|
|
T: Well, it's like any of those things, it's really subjective. But, yeah,
|
|
there do seem to be, in my travels on Internet and FidoNet, distinct
|
|
flavors. One is not better than the other, I can tell you that, culturally
|
|
speaking. The Internet people say, "Oh, but the flame level on FidoNet is
|
|
so awful." Bullshit. The flame level on the Internet is just as high. It's
|
|
in loftier language, five line signatures, and all that kind of crap... but
|
|
I'm sorry, it's not any better, it's just different. What it is, is less
|
|
alien to them, more comfortable... and vice-versa from the FidoNet side.
|
|
It's more comfortable, it's more familiar, the language used and the
|
|
acronyms and the smiley faces, all of that junk.
|
|
|
|
There is a FidoNet flavor, through the usual sociological things. The
|
|
people who originally populated it defined this vague common set, and
|
|
people who come onto it self-select ("Oh, I like that!") and join it, and
|
|
then enhance it, or they're sort of neutral and they come in and they just
|
|
absorb it because... you know, you start hanging out with people, and you
|
|
pick up their manner of speaking. And there are people, of course, who are
|
|
utterly opposed to this, and want to make it professional and some just
|
|
don't care, and live in a corner of it.
|
|
|
|
But yeah, there are things in common, and I have a hard time putting my
|
|
finger on what they are. It is fiercely independent, utterly, fiercely
|
|
independent. It is viciously anti-commercialization. It has a long history
|
|
of some nasty politics, some really enlightened politics, and I think in a
|
|
lot of ways they have more pragmatic view, and a better view Q better
|
|
meaning more functional in today's world Q than people who haven't had to
|
|
pay their own phone bills.
|
|
|
|
J: Some people argue that you can't have strictly online community, and
|
|
others believe that you can. Some feel that there has to be some kind of
|
|
face-to-face interaction. In the Internet there has not been as much of
|
|
that until it began to become more broadly accessible to regular people...
|
|
|
|
T: The Internet is still completely and thoroughly inaccessible... I'm
|
|
sorry, it is simply not accessible. You have to have a large amount of
|
|
hardware or an intimate relationship with someone who does, like you have
|
|
to go to school or something. Otherwise you're paying money... and there
|
|
are people who fall through the cracks...
|
|
|
|
J: How about public access Internet?
|
|
|
|
T: Yeah, but if there's more than 100 terminals in the U.S. that any
|
|
average person could walk up to and figure out how to use in less than a
|
|
week, I would be surprised. It still takes huge amounts of specialized
|
|
knowledge.
|
|
|
|
J: But the technical side is fairly dense...
|
|
|
|
T: Oh, yeah... I've been an SWTP, CP/M, DOS hacker and hardware hacker for
|
|
fifteen fucking years, twenty years, and UNIX is so intimidating,
|
|
arbitrarily difficult to use... a lot of the users have this macho attitude
|
|
that "Well, you should have to plow through it, I did." The whole
|
|
priesthood nonsense. It's stupid. And the argument whether online culture
|
|
is possible or not, that ain't where it's gonna get decided. It either gets
|
|
made or it doesn't. I think there are online communities. The people who
|
|
are doing it aren't asking themselves, "Are we an online community?"
|
|
They're just going about their business. They're not tangible enough to
|
|
really get documented except in hindsight, you look back and say "Oh, yeah,
|
|
those people are" or "No, they really weren't, when push came to shove,
|
|
they didn't stay together."
|
|
|
|
J: At EFF-Austin we've been a little more self-conscious about it, we've
|
|
actually been trying to do some community-building, to try to structure an
|
|
online community in Austin where we'd have some force to get things done,
|
|
various projects. One of the things we're doing that other EFF-related
|
|
groups haven't been doing is arts projects, and in doing those things, in
|
|
talking to some of the people who are interested in doing that, I realized
|
|
that there are a lot of writers and artists who are hungry to get online.
|
|
They know it's there, they'd like to be using it, but they can't get access
|
|
to it because they can't, unless they stumble into it, find a system
|
|
that'll give them an account. It's kind of like what you were saying about
|
|
barriers... but I wonder if, in the FidoNet world, you find writers and
|
|
artists using FidoNet to share information and to form arts communities?
|
|
|
|
T: Well, there's a lot more less-technical people involved, because you can
|
|
put a $300 system together, line cord to phone jack. That just means that
|
|
the entry level is a lot lower. And it's functional as hell! I mean, So
|
|
what if it's slow? 5 seconds or 100 milliseconds, what's the difference to
|
|
most people?
|
|
|
|
|
|
All Look Completely Different
|
|
|
|
J: The link, the network, is strictly for email? Or do you have some other
|
|
stuff, file transfer... ?
|
|
|
|
T: Oh, there's lots of file transfer stuff. In some ways it's a lot more
|
|
sophisticated than the FTP stuff from the user's point of view. There's
|
|
this thing called the SDN, the Software Distribution Network, which looks
|
|
like a conference for files, where the objects are not messages, but files.
|
|
And they're stored in a redundant manner, some locally concentrated, some
|
|
far away and scattered. It's kind of nebulous, like most network things
|
|
are. They do monthly announcements of new files, and most of it's
|
|
shareware, or free. You can do things like file attach (send with a
|
|
message), and file requests (file fetch via message).
|
|
|
|
FidoNet doesn't have the problem that a lot of older networks have, with
|
|
seven bit channels and all that crap. We have eight bit channels with 32
|
|
bit CRCs. We do run into the alien system problems... ASCII character sets
|
|
vs. the cyrillic alphabets and all that kinda stuff. Those problems are
|
|
about as chaotic as they are anywhere else.
|
|
|
|
J: How about remote login?
|
|
|
|
T: No... the systems in FidoNet are radically different. There's Radio
|
|
Shack color computers, there's CP/M machines, Apple IIs, giant DOS
|
|
machines, giant LANs of UNIX boxes, all running common protocols in a far
|
|
broader hardware base than most, even UNIX boxes. There's no unified
|
|
operating system, there's a set of protocols, there's 40 or 50 different
|
|
mailers, and FidoNet interfaces in bulletin boards, and they all look
|
|
completely different. So it's at a much higher level of abstraction than
|
|
the FidoNet gets defined at. I bet a lot of the Internet, some huge
|
|
proportion, is UNIX...
|
|
|
|
J: You certainly need some kind of standard to be interoperable to the
|
|
extent that the Internet is, don't you?
|
|
|
|
T: No, where the real compatibility is is the TCP/IP layer, and that's rock
|
|
solid, and that's the thing in common. All the rlogin, telnet, and ftp
|
|
stuff partly user paradigm, rather than just a set of protocols. It's well,
|
|
and fine, and wonderful, and I love it, but it does put a real crimp on
|
|
style.
|
|
|
|
[Ed Cavazos, almost-attorney and vice-prez of EFF-Austin, shows up and
|
|
settles in to listen. The conversation continues.]
|
|
|
|
The Color Of Money
|
|
|
|
T: A lot of FidoNet is so radically different, you can't get people to
|
|
either hear it or understand what's going on, because it's NOT like any of
|
|
the others, and it was intentionally not made like the others, and some of
|
|
the really basic principles that seem random are intentional... they're in
|
|
writing, and have been in writing for seven years. The strictly American
|
|
anarchist principles that it's based on are written into the policy
|
|
documents.
|
|
|
|
We actually had in '85, '86, '87 an attempted takeover by a corporation
|
|
that was formed from within, it was like a cancer that became a giant boil
|
|
on the surface, called IFNA, the International FidoNet Association, that
|
|
was sort of a good idea, or a potentially good idea, when we started it at
|
|
the 200 node level. By the time it got around to being implemented, at 500
|
|
nodes, the world had utterly changed. With 200 people, you can run it like
|
|
a club. It was 90% U.S., 90% white guys with computers, and at the 500 node
|
|
level, it was about 20% European and definitely, obviously growing. It
|
|
hopped the puddle, with systems appearing in South America, scattered, but
|
|
you know how that goes... when you get one, then you get two, and then
|
|
four, and they start to grow.
|
|
|
|
We were very naive, and I was right in the middle of it. Some of us learned
|
|
quickly, this isn't going to work! But this corporation grew, and became a
|
|
501(c)(3), and like all of those things, they get power-hungry, and they
|
|
get grabby of territory, and we had to fight it off, and it was fought off
|
|
by the constituents of the network... and it was killed off. They had
|
|
gained control of the copyright and the trademarks, and they were fought
|
|
off. The network, instead of dying, like everyone predicted, thrived.
|
|
|
|
J: So how did this fight go?
|
|
|
|
T: It was fought by lawyers and proxy votes and all the usual crap, in a
|
|
goddamn hotel in San Jose, was the final straw...
|
|
|
|
J: Were you a part of this corporation at all?
|
|
|
|
T: Well, a bunch of us started it... at first, we were brainstorming what
|
|
we could do... deals on modems, some obvious stuff. And we'd have a
|
|
spokesperson from FidoNet who'd attend the EMA meetings once a year and
|
|
represent bulletin board operators and FidoNet members in electronic
|
|
privacy things and the technical trade stuff and the obvious things. And
|
|
those are still lacking, we still need them. But it was established really
|
|
early that everyone not only retains control of their system, but they're
|
|
expected to do their part to run it, because there is no one else to run
|
|
it. And as simple as it sounds, it's a really radical act to get that
|
|
across, so that people don't just sit on their butts. And of course, the
|
|
usual 10% does the work, and 90% sits on their butts, but that's fine, too.
|
|
|
|
|
|
Double Plus Plus Good
|
|
|
|
T: FidoNet's a little odd, unlike the Internet, which has a domain name
|
|
system... you say "Connect to toad.com," it says, ".com, okay, over there,
|
|
toad... here's the address," and you go after it. FidoNet has what appears
|
|
to be a centralized database that every system in the net has, a copy of
|
|
this at the moment 2 megabyte long ASCII database, with 20,000 records in
|
|
it. And it's updated every week, it contains the full physical and logical
|
|
information about the entire network... phone number, system name,
|
|
restrictions on use, protocols supported, some ASCII text, like system
|
|
name, and city, all that kind of junk. It contains the hierarchical
|
|
addressing scheme of the network, and it contains a lot of redundancy.
|
|
|
|
J: Given that there's no central authority, who maintains this database?
|
|
|
|
T: A local autonomous unit in FidoNet... First... the terminology in
|
|
FidoNet is point-node-net-zone. Points aren't really part of FidoNet,
|
|
they're a peculiar thing... a node is the basic unit, it is a bulletin
|
|
board or a mail-only site, generally a phone number with a modem on it. A
|
|
net is a cluster of Fidos, a cluster of nodes, like San Francisco has Net
|
|
125, SFBay Net, 75-80 systems. A node in a net is the basic social
|
|
organizational unit. It was designed to be small enough to comprehend in
|
|
regular old terms, like we all know and love, clubs and that kind of
|
|
group... when they get too big they tend to fragment into pieces, which
|
|
become autonomous units, then nets are collected into the real-life
|
|
geography of continents.
|
|
|
|
The North American phone system is alien to the Western European ones, and
|
|
they have lots of mutually-alien phone systems. The North Americans tend to
|
|
be a lot less political... Zone 1 encompasses Mexico, U.S., and Canada, and
|
|
nobody ever batted an eye over it. It's like, "Oh, okay, that makes sense."
|
|
In Europe, they're fiercely defensive of the political boundaries, and it's
|
|
really silly. Local autonomy was the critical thing to make it work,
|
|
because who's going to allow somebody in New Jersey to dictate how they're
|
|
going to run their system? There'd be no way to exert any kind of control,
|
|
and once you start getting into control wars, you spend all your time doing
|
|
that.
|
|
|
|
So the way the node list is made is that every net fragment makes its own
|
|
chunk of the node list, which is a very straightforward task, even though
|
|
it ends up being work. They're passed up through regional coordinators who
|
|
take these fragments, and everybody gets a copy of everybody else's weekly
|
|
list, and each of them compiles a giant list, then they do a difference,
|
|
this week from last week, and mail out that difference back down the tree.
|
|
So if you chopped off half the network and smashed it flat, it would
|
|
regenerate itself. It's a balance of terror, that's what it is. It's a
|
|
genuine balance of terror in responsibility and power. What you get for
|
|
that redundancy is that no one can cut you out of the network, no one can
|
|
declare that you can't communicate.
|
|
|
|
In the UUCP world none of this happens because the social environment is
|
|
much more substantial... universities, Hewlett Packard... Your neighbors,
|
|
in theory, can cut you off, and you disappear, no one knows about you, if
|
|
you're eliminated from the bang path, no one can talk to you, and that's
|
|
it, you don't exist, it's as simple as that.
|
|
|
|
In FidoNet, and this has happened recently in England... a bunch of
|
|
religious fundamentalists by just hammering away gained control of large
|
|
chunks of the FidoNet in the U.K., and they started having fits... "Why,
|
|
there's perverts on this board, and we're not gonna have 'em in FidoNet!"
|
|
<laughter> And they clipped them out of the goddamn list, they removed the
|
|
entries from the U.K. list. You sort of noticed they disappeared, but those
|
|
people can still communicate, they can mail you their fragment,
|
|
hand-generated if necessary, and all the node list processors let you
|
|
incorporate private lists, and you can reply back, just like that. No one
|
|
can be cut out of the network.
|
|
|
|
If you start thinking about it, you realize that there are a number of good
|
|
and bad side effects from this. Like, if you have some real asshole
|
|
troublemaker, there's nothing you can do about it. Like, unless somebody
|
|
comes in and pulls out a gun or something, it's kinda hard to get someone
|
|
kicked out of a more or less public place... well, [here in] the hotel
|
|
would be relatively easy, but out in the street, you've just gotta live
|
|
with your neighbors. And the same is true in the FidoNet. You have to learn
|
|
to live with your neighbors, and vice versa. The flaming assholes have to
|
|
learn how to behave well enough to not be utterly censured. Which is what
|
|
generally happens to them... people just ignore them.
|
|
|
|
There was one guy, he was another fundamentalist Christian nut case. He was
|
|
amusing, actually. He was a "true Bible" believer, this was called
|
|
pre-rapture, or something or other, some pre-rapture network... he was
|
|
persecuted by all sides, and he loved it. He was mailing everybody this
|
|
gibberish, pages and pages of gibberish. And there's programs that just
|
|
filter out mail, and you say, I don't wanna see mail from this address...
|
|
|
|
J: A bozofilter.
|
|
|
|
T: Yeah, basically, it's a bozofilter, we've had 'em for a long time. And
|
|
there's also another one that's called bounce... whenever you get anything
|
|
from this guy, bounce it back. It appends a bit of text that says "This
|
|
message is refused at site so-and-so, have it back," which IRRITATES
|
|
people! But it just works out that people, even the crazy ones are social
|
|
organisms. We don't really like to be disliked too widely, we like to have
|
|
an audience, if nothing else. So that's the underpinnings...
|
|
|
|
FidoNet has been very flexible technically. When technological changes or
|
|
opportunities come by, within a year half the net supports them. In about
|
|
'85 U.S.JRobotics very smartly discovered bulletin boards, and they
|
|
realized the way it works is, even though there's a relatively small number
|
|
of bulletin board sysops, if you're bulletin board caller, who do you look
|
|
to to see what hardware to buy? The sysop. And they ask, "What kind of
|
|
modem do you have... oh, it must be pretty good if you use it," because
|
|
when it's bad, they mouth off to hundreds of people about it.
|
|
|
|
So USR basically courted the FidoNet, and said "What do you want to see in
|
|
a modem?" The first modem they did this with was the Courier 2400, which
|
|
was 600 bucks new at the time, or 700 bucks. They offered a 50% off deal,
|
|
down to about 300 or 400 dollars, which was a bargain, relatively speaking.
|
|
We wanted true flow control, and a symmetrical modem with basic AT command
|
|
set, and they did it. It was an instant success. And then they did the HST,
|
|
much to most of the industry's annoyance, they did this kludgey proprietary
|
|
asymmetrical protocol 9600 one way, 300 baud the other way... they came to
|
|
us again, and we worked out more handshake stuff, and started changing
|
|
protocols on our side.
|
|
|
|
FidoNet was originally based on xmodem, which is amazingly similar to
|
|
X.25's packet ack, like Kermit, only much more efficient than Kermit, and
|
|
very much like UUCP-G, only it's not windowed... block ack block ack block
|
|
ack... it's fine at 2400 baud and below, above 2400 baud it was not good.
|
|
We had asymmetrical modems that collapsed. So there had been another
|
|
protocol called Wazoo around, and it instantly became hot, because it did
|
|
protocol negotiation when you started a session, and it could pick ZMODEM
|
|
[trademark Chuck Forseberg], which is fully-windowed, screaming fast, you
|
|
can run it ackless. You could work the hell out of an HST in ways that
|
|
other protocols couldn't. Internet protocols and UUCP-G were just useless,
|
|
in other words, the modem was useless for existing protocols. So FidoNet's
|
|
historically been very flexible, technology-wise.
|
|
|
|
McLuhanites: Myopy, My Opium
|
|
|
|
Ed: Are you familiar with John Quarterman? Have you seen his maps of
|
|
FidoNet?
|
|
|
|
T: No, I haven't seen his maps of FidoNet. [Quarterman did show 'em off
|
|
later in the conference.] I talk to him occasionally, I republished one of
|
|
his articles in FidoNews a while ago... FidoNews is a weird phenomenon in
|
|
itself... a 20,000 circulation weekly newsletter in its tenth year. It sort
|
|
of goes unacknowledged... FidoNet has a giant credibility problem, because
|
|
it sprang forth fully-formed 'way outside all traditional computer things,
|
|
and because it works on PCs and Radio Shack Color Computers (which actually
|
|
turns out to be a nice processor, it runs OS9 on a 6809... you can run
|
|
multiusers on a $99 packaged machine). It's really some amazing software.
|
|
|
|
FidoNews was designed in '84 in the first year as the meta-net, to discuss
|
|
the net itself, to discuss the social end of the net. In the first issue
|
|
was a retired Air Force colonel or something, whining about the military
|
|
retirement process, and people instantly said, "This is supposed to be a
|
|
technical newsletter, this is FidoNet..." and I said, "No, bullshit, it's
|
|
not. I'm tired of just this techie crap. Do you talk on the phone about
|
|
your telephone all the time? 'Gee, I've got a great new phone, it's got all
|
|
these pushbuttons...' and you get bored very quickly. It's like radio
|
|
amateurs talking about their goddamn antennas." Who wants to put up with
|
|
that stuff?
|
|
|
|
J: We've been talking about that a lot. There's three or four magazines
|
|
devoted to online cultures, cultures of the Matrix, that focus on the
|
|
Internet a lot. Wired is one, Mondo in a real different way, and
|
|
bOING-bOING, of course, in a REAL different way. And we realized that a lot
|
|
of the articles are preoccupied with the carrier, with the technology for
|
|
carrying messages, and not so much with the messages themselves or the
|
|
cultures themselves, the sorts of cultures that are evolving.
|
|
|
|
T: Yeah, they forget that what we're making is a goddamn conduit; it's a
|
|
medium, it's not content! A content comes with it, because they're brand
|
|
new mediums, they fail a lot, and they need to be developed... all software
|
|
sucks, and all hardware sucks, so you end up talking about it a lot, but
|
|
yeah, that's not the point.
|
|
|
|
J: What's really more fascinating is what's at either end of the conduit...
|
|
|
|
T: Yeah, the telephone proved that. It's actually a way to convey social
|
|
information, emotion, that's why telephones worked, you can talk over them.
|
|
How many ways can you say "No" with a keyboard? Not very many. 25 or 50 if
|
|
you're incredibly ingenious. Smiley faces and uppercase... All the cultural
|
|
information is stripped. And a lot of it has simply been access. Those at
|
|
the gates determine who comes in. If you own the $5,000 PC...
|
|
|
|
J: Is that what brings you here [to the fourth conference on Computers,
|
|
Freedom, and Privacy), access issues?
|
|
|
|
T: Yeah, that's why I'm always skeptical of large-scale networks. While I'm
|
|
on the Internet, I don't have any pretensions of being... "Why, the world
|
|
is connected!" No, one percent of one percent is connected, barely, and the
|
|
tools really suck. Through no fault of the authors, they're incredible
|
|
works, the foundation to a world. But they're hardly accessible to everyone
|
|
in the world.
|
|
|
|
J: I had to buy my access to the Internet, at first. The WELL...
|
|
|
|
T: Mine I get because I'm managing a small IP cooperative, and I get it
|
|
sort of as a perk to my $400 to $500 salary for what is essentially a
|
|
full-time job.
|
|
|
|
J: Actually, I've been able to pick up other accounts since, but the only
|
|
way that I could have got in in the first place was by buying access,
|
|
because I'm not really very technical. My interests are more
|
|
sociopolitical, I guess...
|
|
|
|
T: I don't really have any serious problems with the way things exist. For
|
|
better or worse, that's the way that all complicated things have been
|
|
developed in our little Western history timeline. It takes resources and
|
|
effort and energy, and they do spread out, eventually. And they get defined
|
|
along the way, they definitely have basic cultural assumptions glued into
|
|
them at the very base.
|
|
|
|
J: It allows a more distributed way of organizing and doing things...
|
|
|
|
T: We'll see if it's ever as good as the telephone is. It doesn't get much
|
|
better than the telephone, when you think about its position in society.
|
|
Like Bruce said in his Hacker Crackdown, you notice them when you don't
|
|
have one, they're so ubiquitous, they're like light switches. You don't
|
|
think of a telephone, it's not an exciting object.
|
|
|
|
J: I can remember when there was a single phone in the house, and it was a
|
|
big deal to have a second phone, which was usually on the same line. And
|
|
now I have three phone lines, and one is a dedicated data line. I don't
|
|
think I know many people who don't have at least two or three phones in
|
|
their house.
|
|
|
|
T: I'm down to two, and I consider that rarefied... I only need two lines
|
|
now, after having six at one point, all these bulletin boards and data
|
|
lines, now it's like, oh, a voice line, and a data line...
|
|
|
|
J: I prefer asynchronous text swapping, but I'm not sure why, maybe a
|
|
personal idiosyncrasy. It seems funny to me, because Matisse Enzer, the
|
|
support guy on the WELL... when we're having a problem, and we can't quite
|
|
figure out how to communicate about it, he always says, "Well look, why
|
|
don't I call you up, and we'll talk about it." And I always say, "No, wait,
|
|
I don't wanna talk, I just wanna text!" <laughter>
|
|
|
|
-----
|
|
Originally published in Fringe Ware Review #1, ISSN 1069-5656.
|
|
Copyright (c)1993 by the author. All rights reserved.
|
|
For more details, contact: fringeware@io.com
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|