Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 05 Issue 41
Computer underground Digest Sun June 06 1993 Volume 5 : Issue 41
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Editor: Etaoin Shrdlu, Senrio
CONTENTS, #5.41 (June 06 1993)
File 1-- LODCOM@ Mail Bounces Fixed --
File 2-- CuD (and other stuff) for Non-Internet readers
File 3-- A New public CU BBS in Southern Italy
File 4-- Sending E-Mail to Clinton and Gore
File 5-- Electronic fingerprinting of welfare recipients in CA
File 6-- Email "Etiquette"
File 7-- Microstate: Old Empires and New (New Repub. Reprint)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) 203-832-8441 NUP:Conspiracy
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Thu, 04 June 1993 22:51:01 EDT
From: CuD Moderators <cudigest@mindvox.phantom.com>
Subject: File 1--LODCOM@ Mail Bounces Fixed --
CuD 5.39 ran a special issue describing the LOD's ambitious project of
"hacker" BBSes in the 1980s. We received a number of inquiries about
bounced mail back from lodcom@mindvox.phantom.com. Mindvox upgrade of
mail services created a temporary snag. We're informed that mail that
seemed to bounce in fact arrived, so those inquiring about LOD's "BBS
History Project" should have received a response by now.
For more information on the LOD project, including what files are
currently available and the price list for each, contact them directly
at lodcom@mindvox.phantom.com
------------------------------
Date: Wed, 02 Jun 1993 19:32:57 -0600
From: af814@FREENET.HSC.COLORADO.EDU(ERIC PAUL)
Subject: File 2--CuD (and other stuff) for Non-Internet readers
My name is Eric Paul. I have received your fine publication
since midway through volume 4. I have decided to give
something back to the "Underground" community for all the
service that you have given me. I run The SpellBook BBS here
in Plainville, Mass. We run at 14.4 v.32b v.42b. I have all of
Volume 5 available for download in a no-ratio area. I also
support FREQ in Fidonet, Chateaunet, and Maxnet. Anonymous/
unlisted systems are welcome. Please feel free to add my
information to your list of sources to try and take the load off
of some of the backbone FTP sites. Thanks again for such a fine
publication.
Eric Paul
BBS: 508/695-9656
Fido: 1:333/596
Chateau: 100:6100/101
Maxnet: 90:171/301
------------------------------
Date: Fri, 04 Jun 93 10:16:52 GMT
From: luc pac <LPACCAG@ITNCISTI.BITNET>
Subject: File 3--A New public CU BBS in Southern Italy
(MODERATORS' NOTE: Luciano has been working on setting up his system
in Southern Italy for the past few months, and it's just about set to
roll. As he reminded us, Italy is a relatively under-devopled country
and lacks the access to Internet, BBS, and other resources that many
of us take for granted. We wish him well in providing a public site
for information in his part of the world)).
I'm glad to let you know: I have set up a public BBS exclusively
dedicated to the computer underground and counter-cultural issues. You
can connect and download stuff such as CuD, Phrack, EFF's bulletins,
'zines, academy papers, SPUNK Press writings, and the like.
Furthermore, there are a few echo conferences about cyberpunk and
libertarian/anarchistic issues.
It is NOT a H/P BBS. Its archive is meant to be used by any kind of
people: H/P community as well as scholars and researchers. I myself
am writing my final dissertation on CMC and the building of virtual
communities.
BITs Against The Empire BBS is cybernet and *fidonet* node
(2:333/412), and stuff can be downloaded via File/Request open to
everyone (points and unlisted nodes included). Because of my lack of
money/time, the system is *NOT* 24h. It is only open 23.00 to 7.15
local time -- that is GMT - 1 (NY should be six hours late, LA nine
hours).
I just thought it is interesting to you knowing that CuD can be found
outside the Internet in South Europe.
The BBS number is: +39-461-980493
------------------------------
Date: Thu, 04 June 1993 22:51:01 EDT
From: CuD Moderators <cudigest@mindvox.phantom.com>
Subject: File 4--Sending E-Mail to Clinton and Gore
THE WHITE HOUSE
Office of Presidential Correspondence
++++++++++++++++++
For Immediate Release June 1, 1993
LETTER FROM THE PRESIDENT AND VICE PRESIDENT
IN ANNOUNCEMENT OF WHITE HOUSE ELECTRONIC MAIL ACCESS
Dear Friends:
Part of our commitment to change is to keep the White House in
step with today's changing technology. As we move ahead into the
twenty-first century, we must have a government that can show the way
and lead by example. Today, we are pleased to announce that for the
first time in history, the White House will be connected to you via
electronic mail. Electronic mail will bring the Presidency and this
Administration closer and make it more accessible to the people.
The White House will be connected to the Internet as well as
several on-line commercial vendors, thus making us more accessible and
more in touch with people across this country. We will not be alone
in this venture. Congress is also getting involved, and an exciting
announcement regarding electronic mail is expected to come from the
House of Representatives tomorrow.
Various government agencies also will be taking part in the near
future. Americans Communicating Electronically is a project developed
by several government agencies to coordinate and improve access to the
nation's educational and information assets and resources. This will
be done through interactive communications such as electronic mail,
and brought to people who do not have ready access to a computer.
However, we must be realistic about the limitations and
expectations of the White House electronic mail system. This
experiment is the first-ever e-mail project done on such a large
scale. As we work to reinvent government and streamline our
processes, the e-mail project can help to put us on the leading edge
of progress.
Initially, your e-mail message will be read and receipt
immediately acknowledged. A careful count will be taken on the number
received as well as the subject of each message. However, the White
House is not yet capable of sending back a tailored response via
electronic mail. We are hoping this will happen by the end of the
year.
A number of response-based programs which allow technology to
help us read your message more effectively, and, eventually respond to
you electronically in a timely fashion will be tried out as well.
These programs will change periodically as we experiment with the best
way to handle electronic mail from the public. Since this has never
been tried before, it is important to allow for some flexibility in
the system in these first stages. We welcome your suggestions.
This is an historic moment in the White House and we look forward
to your participation and enthusiasm for this milestone event. We
eagerly anticipate the day when electronic mail from the public is an
integral and normal part of the White House communications system.
President Clinton Vice President Gore
PRESIDENT@WHITEHOUSE.GOV VICE.PRESIDENT@WHITEHOUSE.GOV
------------------------------
Date: Sun, 23 May 1993 11:33:44 -0700
From: "James I. Davis" <jdav@WELL.SF.CA.US>
Subject: File 5--Electronic fingerprinting of welfare recipients in CA
I spoke on Thursday (5/13) at a hearing before the San Francisco
Social Services Commission regarding their plan to begin requiring
that welfare recipients submit to electronic fingerprinting as a
condition of receiving public assistance. I am sending out a copy
of my remarks (it's a rather long posting) under "separate cover."
Here is some background information on the issue:
I collected most of the data contained in my remarks from
interviews with various people, and some memos and press releases
from various agencies. I understand that there is a small piece in
a recent _Mother Jones_ about the experience in LA, which supports
the points I made in my remarks. I have a more pointed piece in
the CPSR/Berkeley newsletter if you are interested.
In June of 1991, Los Angeles County began requiring electronic
fingerprints as a condition of receiving General Assistance (GA).
GA is a state-mandated, county administered program for indigent
adults. The system is ostensibly designed to deter people from
receiving benefits under multiple names, although their are many
aspects of the system that could bear more serious scrutiny than
it has received to date.
LA is spending some $9.4 million over five years on the Automated
Fingerprint Image Reporting and Match System (AFIRM), AFIRM was
developed by computer services giant Electronic Data Systems. In
February of this year, Alameda County started using the system, at
an estimated cost of $1.3 million. San Francisco is currently
considering adopting the system. The Department of Social Services
says it will cost $1 million to implement, but I think that is
low. The AFIRM proposal was approved by the SF Social Services
Commission on May 13, and the matter now goes to the SF Board of
Supervisors, who must approve a change in the ordinance governing
GA, to include the fingerprinting requirement. The next step will
be a hearing before one or more committees (perhaps Willie
Kennedy's on social policy, and/or the finance committee), most
likely in early June.
Any suggestions for questions about the system will be very
helpful, especially questions about technical, privacy and
security issues. It is clear that SF plans to link the system up
with other counties and share data with them regularly. Also if
you have any expertise on fingerprinting and law enforcement, I
need some info on that.
The AFIRM system only makes sense if it is installed on as wide a
basis, and for as many public assistance programs as possible. On
the other hand, the more counties that refuse to participate, the
less likely it will be to take root. I think that there is an
opportunity to stop it at the SF Board of Supervisors...
Jim D.
++++++++++++++++++++++=
STATEMENT BEFORE THE SAN FRANCISCO SOCIAL SERVICES COMMISSION
REGARDING THE AFIRM SYSTEM
My name is Jim Davis, and I live at 414 Chestnut Street in San
Francisco. I am here in two capacities, first, as a San Francisco
resident and taxpayer, and second, as the western regional
director for Computer Professionals for Social Responsibility
(CPSR). Computer Professionals for Social Responsibility is a
national public-interest alliance of computer scientists,
engineers, users and others interested in the impact of computer
technology on society. We work to influence decisions regarding
the development and use of computers because those decisions have
far-reaching consequences and reflect basic values and priorities.
CPSR has 500 members in the Bay Area.
Fingerprinting of people as a requirement for receiving General
Assistance (GA) benefits is a bad idea, for several reasons:
* the proposed system is unnecessary;
* its use cannot be justified for the reasons put forward by the
Department of Social Services;
* it shifts resources from providing benefits to expanding the
welfare bureaucracy;
* the costs of the system have most likely been understated, and
the benefits overstated;
* it is fraught with risks for people who receive welfare;
* it is an affront to anyone who must rely on welfare;
* it sets a dangerous precedent for everyone who receives any kind
of government assistance;
* it sends a false message to San Franciscans about welfare.
Please allow me to elaborate.
THE SYSTEM IS UNNECESSARY.
The proposed Automated Fingerprint Image Reporting and Match
System (AFIRM) is unnecessary. AFIRM is intended to deter fraud by
preventing GA recipients from signing up under more than one name.
However, current policy requires people to provide a state ID card
or driver's license to DSS before they can receive GA. According
to Bill Madison, an information officer with the Department of
Motor Vehicles, it is extremely difficult to obtain identification
under more than one name. DMV personnel are trained to identify
false documentation. Suspicious requests for ID are passed along
to their security unit, which can utilize their database of
digital fingerprints and photographs to determine if a duplicate
request has been made. That is, the checks against maintaining
more than one identity are already in place. The AFIRM system is
redundant, and duplicates government resources. As such, it is a
waste of our money.
AFIRM'S USE CANNOT BE JUSTIFIED FOR THE REASONS GIVEN BY DSS.
AFIRM's use cannot be justified for the reasons put forward by the
Department of Social Services. The rationale for installing AFIRM
is not to detect fraud per se. In fact, Alameda County, which
began using the AFIRM system in early February, is about 80% done
with fingerprinting of existing GA clients. With approximately
9,000 GA cases processed, only six matches have been found, and
none of those matches were cases of fraudulent behavior. The
stated purpose of AFIRM, rather, is to deter alleged fraud by
driving away people who would "double-dip" in the GA program.
From Alameda County's experience, in fact the caseload has dropped
by 147 cases since the system was implemented. But without any
data as to why the caseload dropped, it is spurious logic at best
to assert that fraud has been rooted out. Much more likely reasons
for the caseload drop are missed appointments, perhaps because of
lost or missed mail; fears about being fingerprinted; concerns
about privacy; or the inevitable problems of processing 11,000
cases. A 98.5% rate of success in processing would be admirable in
most quality assurance managers' book; but the other 1.5% that are
failures could still account for all of the dropped cases.
In fact any substantial change in case-handling could result in a
drop in cases, of people who are entitled to receive benefits. I
have yet to see any data to substantiate the claim that AFIRM has
deterred fraud. All that can be said is that AFIRM is an
expensive, additional obstacle to receiving GA, and that its use
coincides with a reduction in caseloads. However, the purpose of
AFIRM is not to reduce caseloads, and any other goals of using the
system cannot be proven with currently available data. That makes
AFIRM an expensive, long-term "maybe."
AFIRM SHIFTS RESOURCES FROM SERVICES TO BUREAUCRACY.
AFIRM represents additional costs in GA administration, with no
rise in the benefits pool. As such, it means that the ratio of
administration-to-benefits has gone up; that is, new
inefficiencies are built into the welfare system. Computers are
not a magic solution, and additional infrastructure is required to
install and maintain hardware and software, and train users and
adjust office procedure. Inflating bureaucracy at the expense of
services-provided is not a wise use of taxpayer money.
THE COSTS OF THE SYSTEM HAVE MOST LIKELY BEEN UNDERSTATED, AND THE
BENEFITS OVERSTATED.
In his letter to Mayor Frank Jordan, DSS General Manager Brian
Cahill wrote that the system "would cost in the neighborhood of $1
million over a 5 year period. Our costs would be based on hardware
and the number of cases on GA." Yet Alameda County estimates that
the same system there will cost $1.3 million over a five year
period. San Francisco's case load is 50% higher that Alameda's,
meaning that the anticipated cost to San Francisco could be twice
Cahill's estimate. In addition, adopting new systems mean many
hidden costs: inefficiencies while adopting a new system, staff
frustration on the learning curve, lost time due to re-processing
cases that were erroneously closed, etc. Such costs could further
inflate the $2 million price tag. Furthermore, if data-sharing
begins with other counties, additional administrative resources
will be required. The dollar costs need to be examined very
carefully.
Likewise, the alleged savings from using the system could bear
more serious scrutiny. For example, Cahill asserts that Alameda
County saved $360,000 in four months by discontinuing 35 cases.
Cahill is claiming savings that would be realized over a three
year period in the first few months. It's dubious accounting to
claim all of the benefits before they are actually realized. A
more honest accounting using Cahill's figures would be to say that
the $21,000 per month system saved $11,000 a month. Using the
latest Alameda figure of 147 cases dropped, the system appears to
begin to pay for itself. But one must ask, how many of those
dropped cases will be reopened, torpedoing the inflated benefits
of the AFIRM system? In addition, the largest drop in cases will
most likely happen during the changeover period, so projections
should not be based on an initial rate of dropping caseloads. To
reassert, the claimed savings should not be taken at face value.
AFIRM IS FRAUGHT WITH RISKS TO GA RECIPIENTS.
DSS has assured the Mayor's office that AFIRM fingerprint
information will not be shared with police agencies. The AFIRM and
police computer systems are distinct, and department policy
forbids sharing of information. However, such assurances are not,
and cannot be enough. First, the line between social services and
law enforcement is becoming increasingly blurred. The stated
rationale for the fingerprinting system is in fact a law
enforcement one -- to prevent criminal activity. DSS already works
closely with the District Attorney's office in investigating
alleged fraud. Information is shared between the agencies; and
whether it is the fingerprint itself or information derived from
fingerprint searches, the protestations that data sharing will not
take place are seriously weakened.
"Unofficial" use of the data poses additional problems. Data
stored on a computer is much more prone to unauthorized
duplication, modification, and transmission than its low-tech
counterparts. And such problems are even more likely in the
absence of a thought-out policy regarding the security of computer
records. Does DSS have a computer security policy? Who will have
access to the fingerprint information? What audit trail will be
maintained regarding changes to data on the system? Is DSS taking
into account where technology will be five years from now, as
equipment costs will most assuredly drop, and computing search
power will grow. Access issues will continue to grow in
complexity.
Furthermore, I have been told of cases in recent history where
zealous DSS employees have shared information with police, against
stated department policy. Local newspapers have reported on police
officers keeping duplicate sets of police data on their home
computers, against policy. And I'm sure that you are all aware of
the current case of former police inspector Tom Gerard, who is
charged with stealing confidential police files and suspected of
selling the information to other agencies and even to other
governments. The point is that once data assumes a digital format,
it tends to persist in computer systems, and to leak about. One
must carefully weigh the questionable benefits of AFIRM against
the potential abuse of the system, and the loss of privacy for GA
recipients. The simplest solution in this case is not to collect
the information in the first place.
AFIRM IS AN AFFRONT TO ANYONE ON WELFARE.
The AFIRM system is based on a presumption of guilt. That is,
unless you confirm your innocence of not double-dipping, you are
assumed to be guilty of it. This contravenes a basic
constitutional principle.
AFIRM SETS A DANGEROUS PRECEDENT FOR ANYONE RECEIVING GOVERNMENT
ASSISTANCE.
If AFIRM takes root in San Francisco, it will continue to spread
to other counties, and to other government programs. Social
service administrators have made it clear that they intend to
extend the reach of the AFIRM system. Other counties in the Bay
Area have considered adopting it for their GA programs. More
ominous, Los Angeles will begin in June a $21 million pilot
program to quadruple the reach of the program to include people
receiving assistance from the Aid to Families with Dependent
Children (AFDC) program. Alameda County is rumored to be exploring
the same thing, and who knows, it may be under discussion in San
Francisco. But why stop the program there? Anyone receiving any
kind of government support, from social security to veterans
benefits to income tax deductions could be equally culpable of
defrauding the government. Why not fingerprint them before
providing support. Who knows where it would end? This is a bad
precedent being tested on a vulnerable group of San Franciscans.
AFIRM SENDS A FALSE MESSAGE ABOUT WELFARE.
It shouldn't need to bear repeating, but being poor is not a
crime. Yet the law enforcement aura surrounding fingerprinting is
inescapable. Last year, for example, the Wall Street Journal
reported that airport officials, looking for a way to speed people
through immigration at Kennedy Airport, decided not to use
fingerprinting technology to match people with their passports.
"We didn't want to get into fingerprints because of law
enforcement connotations," said Richard Norton, the Air Transport
Association's senior director of facilitation. Requiring
fingerprinting for receiving benefits reinforces an all-too-common
perception of criminality. This is a divisive message to send to
San Franciscans about General Assistance.
For the reasons just stated, I repeat that the AFIRM system is a
bad idea, and I urge you to decide against its implementation.
Thank you for your patience.
Jim Davis
414 Chestnut Street
San Francisco, CA 94133
(415) 398-2818
May 13, 1993
------------------------------
Date: Thu, 20 May 93 16:07:27 EDT
From: Jerry Leichter <leichter@LRW.COM>
Subject: File 6--Email "Etiquette"
I thought you might find the following interesting for historical
value. Some things haven't changed much since 1984, but some have.
In particular, while the general ideas in this posting area as much
part of the net gestalt now as they were 9 years ago, what I find
striking is the change in tone. There's no feeling of a flame war
ready to break out at any moment, and in fact there is only a single
reference to "flames", and that in a context somewhat different form
contemporary usage. For me, it was a bit of a walk down memory lane;
the style and tone were very familiar, but hearing them again made
clear how the world has changed.
-- Jerry
Date--Mon, 17 May 93 10:47:44 -0400
From--John Robinson <jr@ksr.com>
Sender--jr@ksr.com
To--silent-tristero@Think.COM
Subject--an impressive show
+------- Start of forwarded message -------
From--cmb
Subject--[deg@wise1.tau.ac.il--Re--Email "Etiquette"]
Date--Mon, 17 May 93 10:01:48 EDT
I hope enough of this 1984 Lisp-based humor is still funny in a 1993
Unix-centered world. Note that the mail reading and composing
software was much more complex than today and that users often used
multiple fonts (some of their own creation) in messages. Bug reports
automatically included a stack backtrace and the values of all
arguments and local variables along with the version and patch level
of all software.
From--David Goldfarb <deg@wise1.tau.ac.il>
To--Tom McMahon <tlm@triple-i.com>
Cc--The-Usual-Suspects@triple-i.com
Subject--Re--Email "Etiquette"
Date--Fri 14-May-93 14:37:49 IST
Years and years ago there was a rather facetious Email "etiquette" file
floating around. CWR seems to remember it having possibly been
authored by BSG. If anyone knows its whereabouts could you please send
me a copy?
I knew my old "humor.mai" file would come in useful some day :-)
I've decided that this is such an important message for our time that
it should be forwarded to the whole list. Enjoy!
Please note the following line from Bernie's message:
"Inclusion of very old messages from others makes for an impressive show."
David
Date--Friday, 13 April 1984, 16:16-EST
From--Bernard S. Greenberg <BSG at SCRC-TENEX>
Subject--Mail Style
To--fun at SCRC-TENEX
(For those of of you who have read this already, MLB has just made
a substantial contribution of the highest quality to this file,
and you should read it again from the string "MLB" on.)
Based upon recent discussions of proper etiquette and style in
electronic mail, I have prepared a [satiric] document on the subject.
SCRC:<BSG>MAIL-STYLE.TEXT
============= S:>BSG>Mail-Style.text inserted 10/16/85 ==============
Proposed Symbolics guidelines for mail messages
BSG 4/11/84
It is impermissible to use the term "EMAIL".
Mail should be at least a mixture of upper and lower case. Devising
your own font (Devanagari, pinhead graphics, etc.) and using it in the
mail is a good entertainment tactic, as is finding some way to use
existing obscure fonts.
Sending the mail from Unix is frowned upon (although this has gotten
much better).
It is customary to attack the someone by including his or her message,
indented (unless you are using MM), and replying point by point, as
someone debating someone they are watching on TV, or hearing on the
radio.
It is considered artful to append many messages on a subject, leaving
only the most inflammatory lines from each, and reply to all in one
swift blow. The choice of lines to support your argument can make or
break your case.
Replying to one's own message is a rarely-exposed technique for
switching positions once you have thought about something only after
sending mail.
State opinions in the syntax of fact: "...as well as the bug in LMFS
where you have to expunge directories to get rid of files....."
If you have nothing to say on a subject, replying with a line such as
"I agree with this." puts you in the TO:'s for all future messages,
and establishes you as "one who really cares", if not an actual
expert, on the topic at hand.
Inclusion of very old messages from others makes for an impressive
show.
The choice of a subject line is of supreme importance. It should be
concise and witty. The subject line has to survive once the discussion
has diverged far past the original subject. Remember "Hewitt AP0"?
Oblique allusion to past famous subject lines is one of the best
techniques for generating subjects. So is any reference to drawings of
B. Kliban.
People can be set wondering by loading obscure personal patchable
systems, and sending bug reports. Who would not stop and wonder upon
seeing "Experimental TD80-TAPE 1.17, MegaDeath 2.5..."? The same
for provocatively-named functions and variables in stack traces.
Know the list of "large, chronic problems". If there is any problem
with the window system, blame it on the activity system. Any lack of
user functionality should be attributed to the lack of a command
processor. A surprisingly large number of people will believe that you
have thought in depth about the issue to which you are alluding when
you do.
Know how to blow any problem up into insolubility. Know how to use
the phrase "The new %A system" to insult its argument, e.g., "I guess
this destructuring LET thing is fixed in the new Lisp system", or
better yet, PROLOG.
Never hit someone head on, always sideswipe. Never say, "Foo's last
patch was brain-damaged", but rather, "While fixing the miscellaneous
bugs in 243.xyz [foo's patch], I found...."
You get 3 opportunities to advertise your Rock band, no more.
Idiosyncratic indentations, double-spacing, capitalization, etc.,
while stamps of individuality, leave one an easy target for parody.
Strong language gets results. "The reloader is completely broken
in 242" will open a lot more eyes than "The reloader doesn't
load files with intermixed spaces, asterisks, and <'s in their names
that are bigger than 64K". You can always say the latter in a later
paragraph.
The entire life, times, collected works, expressions, and modalities
of Zippy the Pinhead are a common ground for much of the metaphor,
rhetoric, and invective which pass daily through the mail. An occasional
parenthetical "yow" CORRECTLY USED will endear one to the senior
systems staff. So will puns and other remarks addressed directly
to the point.
+------------------------------------------------------------
MLB volunteered the following, 4/13/84
Including a destination in the CC list that will cause the recipients'
mailer to blow out is a good way to stifle dissent.
When replying, it is often possible to cleverly edit the original
message in such a way as to subtly alter its meaning or tone to your
advantage while appearing that you are taking pains to preserve the
author's intent. As a bonus, it will seem that your superior
intellect is cutting through all the excess verbiage to the very heart
of the matter.
Referring to undocumented private communications allows one to claim
virtually anything: "we discussed this idea in our working group last
year, and concluded that it was totally brain-damaged".
Points are awarded for getting the last word in. Drawing the
conversation out so long that the original message disappears due to
being indented off the right hand edge of the screen is one way to do
this. Another is to imply that anyone replying further is a hopeless
cretin and is wasting everyone's valuable time.
Keeping a secret "Hall Of Flame" file of people's mail indiscretions,
or copying messages to private mailing lists for subsequent derision,
is good fun and also a worthwhile investment in case you need to
blackmail the senders later.
Users should cultivate an ability to make the simplest molehill into a
mountain by finding controversial interpretations of innocuous
sounding statements that the sender never intended or imagined.
Obversely, a lot of verbal mileage can also be gotten by sending out
incomprehensible, cryptic, confusing or unintelligible messages, and
then iteratively "correcting" the "mistaken interpretations" in the
replys.
Electronic mail is an indispensable component of the automated office.
Besides providing entertainment, it gives one the appearance of
engaging in industrious and technically sophisticated activity. By
flaming constantly on numerous mailing lists, one can be assured of a
ready supply of makework as well as an opportunity to establish one's
reputation amongst the "literati".
------------------------------
Date: Thu, 3 Jun 1993 20:42 CDT
From: <BOEHLEFELD@WISCSSC.BITNET>
Subject: File 7--Microstate: Old Empires and New (New Repub. Reprint)
((MODERATORS' NOTE: In the year 2250, some enterprising social
scientist might compare the political systems of constitutional
democracy and Gatesean democratic technocracy and come up with the
following typology):
| > "MicroState: Old Empires and New" by Douglas Coupland, in
| > _The New Republic_, June 7, 1993.
| >
| > ==============================================================
| > Constitutional Democracy | Microsoft
| > ===================================+==========================
| > born in 18th c. France | born in
| > and the United States | 1970s Seattle
| > -----------------------------------|-----------------------------------
| > People of a common culture | People of a common culture
| > ruling a common territory | ruling a common industry
| > -----------------------------------|-----------------------------------
| > constitutions | MS-DOS
| > -----------------------------------|-----------------------------------
| > self-determination | compelling applications
| > -----------------------------------|-----------------------------------
| > freedom | Windows
| > -----------------------------------|-----------------------------------
| > obsolete monarchies and empires | IBM
| > -----------------------------------|-----------------------------------
| > tricoteuses | the media
| > -----------------------------------|-----------------------------------
| > "Let them eat cake" | "The PC will never catch on"
| > -----------------------------------|-----------------------------------
| > Protestant individualism | loner nerds
| > -----------------------------------|-----------------------------------
| > enlightenment | microprocessors
| > -----------------------------------|-----------------------------------
| > secularism | no wardrobe restrictions
| > | at the office
| > -----------------------------------|-----------------------------------
| > the rise of science | software upgrades
| > -----------------------------------|-----------------------------------
| > rationalism | Mr. Spock worship
| > -----------------------------------|-----------------------------------
| > Boston Tea Party | Starbuck's coffee addiction
| > -----------------------------------|-----------------------------------
| > radicals | cyberpunks
| > -----------------------------------|-----------------------------------
| > civil liberties pioneers | hackers
| > -----------------------------------|-----------------------------------
| > preceded industrialism | precedes post-industrialism
| > ==============================================================
------------------------------
End of Computer Underground Digest #5.41
************************************