Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 05 Issue 28
Computer underground Digest Sun Apr 18 1993 Volume 5 : Issue 28
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cyop Editor: Etaoin Shrdlu, Senior
CONTENTS, #5.28 (Apr 18 1993)
File 1--NREN Wrap (or "Joe's Ride at the Houston Chron")
File 2--Clinton Proposes National ID Card
File 3--White House Crypto Statement
File 4--Debate on Gov't Encryption Initiative (from CPSR)
File 5--RU Sirius/Mondo interview (from GEnie)
File 6--Rune Stone BBS (IIRG Home Board) Back On-Line
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) 203-832-8441 NUP:Conspiracy
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in Luxembourg BBS (++352) 466893;
ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)
Back issues also may be obtained through mailservers at:
mailserv@batpad.lgb.ca.us or server@blackwlf.mese.com
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Some authors do copyright their material, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Thu, 15 Apr 1993 00:56:26 EDT
From: Joe Abernathy <Joe.Abernathy@HOUSTON.CHRON.COM>
Subject: File 1--NREN Wrap (or "Joe's Ride at the Houston Chron")
((MODERATORS' NOTE: The following is Joe Abernathy's last story for
the Houston Chronicle. We've known Joe since 1990, and have found him
a strong supporter of civil liberties in cyberspace. As his knowledge
of the the topic has grown, so has the sophistication of his articles.
His periodic columns in The Village Voice's "Wired" section have been
consistently penetrating commentaries on law, ethics, and policy. We
wish Joe the best in his new life. Thanks Joe.))
NREN Wrap -- This is my last story for the Houston Chronicle. It is to
appear on April 4, 1993. Please feel free to redistribute it for any
non-commercial use.
To those of you who have provided so much help these past four
years, thanks. It's been a real education. I've accepted the job of
Senior Editor-News at PC World magazine, and I'll still be writing the
Village Voice Technocracy column, so I hope you'll all stay in touch.
My new contact information is P.O. Box 572390, Houston, Texas
77257-2390, joe@blkbox.com.
By JOE ABERNATHY
Houston Chronicle Staff Writer
The specters of class struggle and international economic warfare
are casting a shadow over administration hearings on how to build a
sophisticated national computer network.
Billed as an engine of job growth, a central concern is emerging
that the "data superhigh way" promised by Vice President Al Gore and
President Bill Clinton during the campaign could produce a large
underclass of "information have-nots."
Based on an emerging global computer net work known as the
Internet, which links up to 12 million people in more than 30 nations,
the National Research and Education Network (NREN) is a decade-long
project of former Sen. Gore.
Gore envisions a future in which oceans of data, including
libraries of movies, books and other creative works, would be readily
avail able to every home. In selling a $5 billion spending plan
focused on the network in 1992, Gore held forth the image of
classrooms without walls, sophisticated medical collaborations, and
globally competitive small businesses.
"The NREN is at all odds the most important and lucrative
marketplace of the 21st century," he said in a recent statement.
But in trying to make it work, it has become apparent that the NREN
remains in many ways a captive of its privileged institutional
heritage. Some Americans don't even have telephone service, and many
still don't have computers with which to access the net.
Two congressional hearings were held in late March concerning the
National Information Infrastructure, and a bill has been introduced
that would take up where Gore's 1992 High-Performance Computing Act
left off _ bringing the net to classrooms, small business and other
potentially disenfranchised Americans. Clinton's budget includes an
additional $489 million over six years for the network.
And while the regional Bells, newspapers and other information
giants have been struggling for years over the future of the medium,
congressional insiders say that with the in creased attention, a
resolution seems likely to be found during the current session of
Congress.
"What I think is really getting squeezed out is that there hasn't
been a genuine, public interest, bottom-up grass roots voice. It's a
huge, huge issue," said Marc Rotenberg, director of the Washington
offices of Computer Professionals for Social Responsibility, the
primary champion of civil rights in the new electronic medium. "It's
about people, it's about institutions, it's about who gets to connect
and on what terms."
Observers also fear that the rush to wield the network as an
economic weapon could produce dramatic incursions into free speech and
other civil liberties.
"I'm very concerned that the rhetoric about national
competitiveness is transforming itself into a new cold war," said
Gary Chapman, director of CPSR's 21st Century Project in Cambridge,
Mass. "The concerns of intelligence and other federal agencies
including NASA has been to look at technology resources that are not
related to military security but to economic benefits as being things
that have to be protected by Draconian measures of security."
Recent disciplinary actions at NASA Ames Research Center in
Northern California seem to support Chapman's concerns.
Up to eight of the 11 scientists disciplined in December were
targeted because of their participation in politically oriented,
international discussion groups hosted on the Internet computer
network, according to documents obtained by the Houston Chronicle
under the Freedom of Information Act, along with subsequent
interviews of NASA Ames personnel.
"Some people there were accused of dealing with foreign nationals
about non-classified technology issues," said Chapman, whose
organization also has made inquiries into the matter. "NASA said
the U.S. has to protect its technology assets because of the global
environment of competitiveness."
The issues are even simpler for Raymond Luh, a subcontracting
engineer fired by NASA. Luh, an American of Chinese ancestry, feels
that his career was destroyed simply because he joined in one of the
thousands of political discussions aired each day over the Internet.
"I feel I have been gravely wronged by NASA," Luh said. "I
cannot possibly seek employment elsewhere. My reputation as a
law-abiding citizen and a hard-working researcher has been tarnished
almost beyond repair."
NASA refused to comment on the matter.
According to FOIA documents provided by NASA's Office of the
Inspector General, Luh was fired when "a document containing Chinese
writing was found in (Luh's computer). ... Investigation determined
that Luh's office computer held a large volume of files relating to
his efforts to promote Most Favored Nation trade status for the
People's Republic of China. ... Luh was not authorized to use his
computer for this activity."
To Luh, however, he was only one of the chorus of voices that
joined in a fiery debate surrounding fallout from the Tiananmen Square
massacre. He wasn't trying to make policy _ he was exercising
intellectual freedom, in his spare time.
"That's a very dangerous and disturbing kind of trend," said
Chapman. "The parallel is with the Cold War and transforming the
modes of thinking and the practices of these agencies into new forms
of control, even in the absence of militarily significant enemies.
We'll start thinking about the Japanese or whatever Pacific Rim
country you want to pick as being %enemies,' and intellectual commerce
with these people will be a matter of economic security.
"The freedom of expression aspect of that is very critical. We
want to make sure that this is a system in which people can express
themselves freely without repercussions."
Observers fear that Luh may be only the first such casualty as
federal agencies and special interest groups reshape the Internet into
their own model, carving up a pie estimated to be worth $3.5 trillion.
While Gore's vision implies the construction of a high-speed,
high-tech fiber optic network, a number of counter-proposals are being
floated.
The Electronic Frontier Foundation _ which earlier made a name for
itself with a successful court challenge to the conduct of the Secret
Service in a hacker crackdown _ is focusing on building a less
powerful, less costly network that could reach more people, more
quickly.
"Our central concern is that we get from debate to doing
something," said Jerry Berman, EFF director.
EFF's approach _ endorsed by Rep. Edward J. Markey, D-Mass. _ is to
build an ISDN (Integrated Services Digital Network) service atop the
telephone network, making a modest level of digital computer
transmission available quickly to every home. The more sophisticated
fiber optic approach implied by Gore's NREN could be implemented as
time and money allow.
But few voices have been heard backing ISDN.
"The current state of the discussion is turmoil and chaos," said
the CPSR's Rotenberg. "It's a mistake to place too much emphasis on
any technological configuration. A lot of that energy and those
resources would be better spent talking about users and institutions
rather than technology and standards.
"This is like trying to explain railroads in the 18th century or
cars in the 19th century. Here we are in the 20th century, and we know
something big is happening right under our feet and we know it has
something to do with these new telecommunications technologies.
"None of us knows where this is going to take us, but I think
people should have some sensitivity to the prospect that the future
world we're going to live in is going to be shaped in many ways by the
decisions we make today about the information infrastructure."
------------------------------
Date: Thu, 15 Apr 93 16:33:01 EDT
From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.CSV.CMICH.EDU>
Subject: File 2--Clinton Proposes National ID Card
Here is a data pointer you might find of interest.
++++++++++++++++++++++++ATTACHMENT++++++++++++++++++++++++++++++++++++++
From--Ross_Werner@next.com
Subject--A national ID card - coming soon from the Clinton administration?
Date--7 Apr 93 18:52:13 GMT
This is a brief synopsis of an article in Section B, page 7, in the
Wednesday, April 7, 1993 San Jose Mercury News. Excerpted without
permission. All typos are mine.
Headline: Big Brother's little sibling: the smart card
Author: Martin Anderson
The article discusses work ongoing in the Clinton administration to
give everyone a "smart card" for personal medical information, to cut
down on waste, fraud, and abuse in health care.
"But now the smart card idea may have taken an ugly turn.
Recently, Ira Magaziner, a Uria Heepish bureaucrat in charge
of coordinating the development of health care policy for the
Clinton Administration, asserted they want "to create an
integrated system with a card that everyone will get at
birth."
another paragraph:
"The smart card is an open, engraved invitation to a national
identity card. In the early 1980s when I worked in the West
Wing of the White House as President Reagan's domestic policy
adviser I was surprised by the ardent desire of government
bureaucrats, many of them Reagan appointees, for a national
identity card."
Apparently it almost happened.
"The idea of a national identity card, with a new name, has
risen once again from the graveyard of bad policy ideas, more
powerful and virulent than ever. Unless it is stopped quickly
we may live to see the end of privacy in the United States,
all of us tagged like so many fish."
The best part of this article is that it gives phone numbers to call
to express your opinion, as Clinton has invited the public to do. I
urge everyone to call, and to spread the word.
(202) 456 - 1414 White House switch board
(202) 456 - 6406 Ira Magaziner's direct line (the person working
for Clinton on the smart card)
about the author:
"Martin Anderson, a senior adviser on the President's Economic
Policy Advisory Board during the Reagan administration, is now
a senior fellow at the Hoover Institution at Stanford. He
wrote this article fore the Scripps Howard News Service."
------------------------------
Date: Fri, 16 Apr 1993 16:20:19 EST
From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
Subject: File 3--White House Crypto Statement
White House Crypto Statement
THE WHITE HOUSE
Office of the Press Secretary
For Immediate Release April 16, 1993
STATEMENT BY THE PRESS SECRETARY
The President today announced a new initiative that will bring
the Federal Government together with industry in a voluntary
program to improve the security and privacy of telephone
communications while meeting the legitimate needs of law
enforcement.
The initiative will involve the creation of new products to
accelerate the development and use of advanced and secure
telecommunications networks and wireless communications links.
For too long there has been little or no dialogue between our
private sector and the law enforcement community to resolve the
tension between economic vitality and the real challenges of
protecting Americans. Rather than use technology to accommodate
the sometimes competing interests of economic growth, privacy and
law enforcement, previous policies have pitted government against
industry and the rights of privacy against law enforcement.
Sophisticated encryption technology has been used for years to
protect electronic funds transfer. It is now being used to
protect electronic mail and computer files. While encryption
technology can help Americans protect business secrets and the
unauthorized release of personal information, it also can be used
by terrorists, drug dealers, and other criminals.
A state-of-the-art microcircuit called the "Clipper Chip" has
been developed by government engineers. The chip represents a
new approach to encryption technology. It can be used in new,
relatively inexpensive encryption devices that can be attached to
an ordinary telephone. It scrambles telephone communications
using an encryption algorithm that is more powerful than many in
commercial use today.
This new technology will help companies protect proprietary
information, protect the privacy of personal phone conversations
and prevent unauthorized release of data transmitted
electronically. At the same time this technology preserves the
ability of federal, state and local law enforcement agencies to
intercept lawfully the phone conversations of criminals.
A "key-escrow" system will be established to ensure that the
"Clipper Chip" is used to protect the privacy of law-abiding
Americans. Each device containing the chip will have two unique
2
"keys," numbers that will be needed by authorized government
agencies to decode messages encoded by the device. When the
device is manufactured, the two keys will be deposited separately
in two "key-escrow" data bases that will be established by the
Attorney General. Access to these keys will be limited to
government officials with legal authorization to conduct a
wiretap.
The "Clipper Chip" technology provides law enforcement with no
new authorities to access the content of the private
conversations of Americans.
To demonstrate the effectiveness of this new technology, the
Attorney General will soon purchase several thousand of the new
devices. In addition, respected experts from outside the
government will be offered access to the confidential details of
the algorithm to assess its capabilities and publicly report
their findings.
The chip is an important step in addressing the problem of
encryption's dual-edge sword: encryption helps to protect the
privacy of individuals and industry, but it also can shield
criminals and terrorists. We need the "Clipper Chip" and other
approaches that can both provide law-abiding citizens with access
to the encryption they need and prevent criminals from using it
to hide their illegal activities. In order to assess technology
trends and explore new approaches (like the key-escrow system),
the President has directed government agencies to develop a
comprehensive policy on encryption that accommodates:
-- the privacy of our citizens, including the need to
employ voice or data encryption for business purposes;
-- the ability of authorized officials to access telephone
calls and data, under proper court or other legal
order, when necessary to protect our citizens;
-- the effective and timely use of the most modern
technology to build the National Information
Infrastructure needed to promote economic growth and
the competitiveness of American industry in the global
marketplace; and
-- the need of U.S. companies to manufacture and export
high technology products.
The President has directed early and frequent consultations with
affected industries, the Congress and groups that advocate the
privacy rights of individuals as policy options are developed.
3
The Administration is committed to working with the private
sector to spur the development of a National Information
Infrastructure which will use new telecommunications and computer
technologies to give Americans unprecedented access to
information. This infrastructure of high-speed networks
("information superhighways") will transmit video, images, HDTV
programming, and huge data files as easily as today's telephone
system transmits voice.
Since encryption technology will play an increasingly important
role in that infrastructure, the Federal Government must act
quickly to develop consistent, comprehensive policies regarding
its use. The Administration is committed to policies that
protect all Americans' right to privacy while also protecting
them from those who break the law.
Further information is provided in an accompanying fact sheet.
The provisions of the President's directive to acquire the new
encryption technology are also available.
For additional details, call Mat Heyman, National Institute of
Standards and Technology, (301) 975-2758.
- - ---------------------------------
QUESTIONS AND ANSWERS ABOUT THE CLINTON ADMINISTRATION'S
TELECOMMUNICATIONS INITIATIVE
Q: Does this approach expand the authority of government
agencies to listen in on phone conversations?
A: No. "Clipper Chip" technology provides law enforcement with
no new authorities to access the content of the private
conversations of Americans.
Q: Suppose a law enforcement agency is conducting a wiretap on
a drug smuggling ring and intercepts a conversation
encrypted using the device. What would they have to do to
decipher the message?
A: They would have to obtain legal authorization, normally a
court order, to do the wiretap in the first place. They
would then present documentation of this authorization to
the two entities responsible for safeguarding the keys and
obtain the keys for the device being used by the drug
smugglers. The key is split into two parts, which are
stored separately in order to ensure the security of the key
escrow system.
Q: Who will run the key-escrow data banks?
A: The two key-escrow data banks will be run by two independent
entities. At this point, the Department of Justice and the
Administration have yet to determine which agencies will
oversee the key-escrow data banks.
Q: How strong is the security in the device? How can I be sure
how strong the security is?
A: This system is more secure than many other voice encryption
systems readily available today. While the algorithm will
remain classified to protect the security of the key escrow
system, we are willing to invite an independent panel of
cryptography experts to evaluate the algorithm to assure all
potential users that there are no unrecognized
vulnerabilities.
Q: Whose decision was it to propose this product?
A: The National Security Council, the Justice Department, the
Commerce Department, and other key agencies were involved in
this decision. This approach has been endorsed by the
President, the Vice President, and appropriate Cabinet
officials.
Q: Who was consulted? The Congress? Industry?
A: We have on-going discussions with Congress and industry on
encryption issues, and expect those discussions to intensify
as we carry out our review of encryption policy. We have
briefed members of Congress and industry leaders on the
decisions related to this initiative.
Q: Will the government provide the hardware to manufacturers?
A: The government designed and developed the key access
encryption microcircuits, but it is not providing the
microcircuits to product manufacturers. Product
manufacturers can acquire the microcircuits from the chip
manufacturer that produces them.
Q: Who provides the "Clipper Chip"?
A: Mykotronx programs it at their facility in Torrance,
California, and will sell the chip to encryption device
manufacturers. The programming function could be licensed
to other vendors in the future.
Q: How do I buy one of these encryption devices?
A: We expect several manufacturers to consider incorporating
the "Clipper Chip" into their devices.
Q: If the Administration were unable to find a technological
solution like the one proposed, would the Administration be
willing to use legal remedies to restrict access to more
powerful encryption devices?
A: This is a fundamental policy question which will be
considered during the broad policy review. The key escrow
mechanism will provide Americans with an encryption product
that is more secure, more convenient, and less expensive
than others readily available today, but it is just one
piece of what must be the comprehensive approach to
encryption technology, which the Administration is
developing.
The Administration is not saying, "since encryption
threatens the public safety and effective law enforcement,
we will prohibit it outright" (as some countries have
effectively done); nor is the U.S. saying that "every
American, as a matter of right, is entitled to an
unbreakable commercial encryption product." There is a
false "tension" created in the assessment that this issue is
an "either-or" proposition. Rather, both concerns can be,
and in fact are, harmoniously balanced through a reasoned,
balanced approach such as is proposed with the "Clipper
Chip" and similar encryption techniques.
Q: What does this decision indicate about how the Clinton
Administration's policy toward encryption will differ from
that of the Bush Administration?
A: It indicates that we understand the importance of encryption
technology in telecommunications and computing and are
committed to working with industry and public-interest
groups to find innovative ways to protect Americans'
privacy, help businesses to compete, and ensure that law
enforcement agencies have the tools they need to fight crime
and terrorism.
Q: Will the devices be exportable? Will other devices that use
the government hardware?
A: Voice encryption devices are subject to export control
requirements. Case-by-case review for each export is
required to ensure appropriate use of these devices. The
same is true for other encryption devices. One of the
attractions of this technology is the protection it can give
to U.S. companies operating at home and abroad. With this
in mind, we expect export licenses will be granted on a
case-by-case basis for U.S. companies seeking to use these
devices to secure their own communications abroad. We plan
to review the possibility of permitting wider exportability
of these products.
--------------end-------------------------
------------------------------
Date: Fri, 16 Apr 1993 16:43:02 EST
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
Subject: File 4--Debate on Gov't Encryption Initiative (from CPSR)
April 16, 1993
Washington, DC
COMPUTER PROFESSIONALS CALL FOR PUBLIC
DEBATE ON NEW GOVERNMENT ENCRYPTION INITIATIVE
Computer Professionals for Social Responsibility (CPSR)
today called for the public disclosure of technical data
underlying the government's newly-announced "Public Encryption
Management" initiative. The new cryptography scheme was
announced today by the White House and the National Institute
for Standards and Technology (NIST), which will implement the
technical specifications of the plan. A NIST spokesman
acknowledged that the National Security Agency (NSA), the super-
secret military intelligence agency, had actually developed the
encryption technology around which the new initiative is built.
According to NIST, the technical specifications and the
Presidential directive establishing the plan are classified. To
open the initiative to public review and debate, CPSR today
filed a series of Freedom of Information Act (FOIA) requests
with key agencies, including NSA, NIST, the National Security
Council and the FBI for information relating to the encryption
plan. The CPSR requests are in keeping with the spirit of the
Computer Security Act, which Congress passed in 1987 in order to
open the development of non-military computer security standards
to public scrutiny and to limit NSA's role in the creation of
such standards.
CPSR previously has questioned the role of NSA in
developing the so-called "digital signature standard" (DSS), a
communications authentication technology that NIST proposed for
government-wide use in 1991. After CPSR sued NIST in a FOIA
lawsuit last year, the civilian agency disclosed for the first
time that NSA had, in fact, developed that security standard.
NSA is due to file papers in federal court next week justifying
the classification of records concerning its creation of the
DSS.
David Sobel, CPSR Legal Counsel, called the
administration's apparent commitment to the privacy of
electronic communications, as reflected in today's official
statement, "a step in the right direction." But he questioned
the propriety of NSA's role in the process and the apparent
secrecy that has thus far shielded the development process from
public scrutiny. "At a time when we are moving towards the
development of a new information infrastructure, it is vital
that standards designed to protect personal privacy be
established openly and with full public participation. It is
not appropriate for NSA -- an agency with a long tradition of
secrecy and opposition to effective civilian cryptography -- to
play a leading role in the development process."
CPSR is a national public-interest alliance of computer
industry professionals dedicated to examining the impact of
technology on society. CPSR has 21 chapters in the U.S. and
maintains offices in Palo Alto, California, Cambridge,
Massachusetts and Washington, DC. For additional information on
CPSR, call (415) 322-3778 or e-mail <cpsr@csli.stanford.edu>.
------------------------------
Date: 16 Apr 93 22:00:39 EDT
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 5--RU Sirius/Mondo interview (from GEnie)
The following is an edited transcript of a GEnie real-time conference held
with R.U. Sirius of Mondo 2000. The full transcript is available
for downloading on GEnie. Reprinted with permission.
Copyright (C), 1993 Jack Smith, the Writers' RoundTable All rights
reserved. No part of this file may be reproduced or copied by any means
(graphic, electronic, magical or mechanical) without the written permission
of Jack Smith (GEnie address = WRITERS.INK, snail mail = 401 North
Washington Street, Rockville, MD, 20850, MN3).
This file was downloaded from the Writers' RoundTable on GEnie. To join
GEnie you can signup via computer or by following these steps:
1) Set your communications software for half duplex (local echo) at 300,
1200 or 2400 baud.
2) Dial toll free: 1-800-638-8369 (or in Canada, 1-800-387-8330). When you
see CONNECT on your screen, quickly type HHH.
3) At the U#= prompt, enter XTX99003,WRITERS and press Return.
4) Have a major credit card ready (or in the U.S., you can also use your
checking account number).
For voice information (in other words... a real person), call 800-638-9636.
*************
<[Jack] WRITERS.INK> Okay folks tonight's guest is R. U. Sirius of
the Mondo 2000 magazine and book. I'll start off with the first
question... How did you come up with the name for the magazine?
<[R. U. Sirius]> We had a publication called Reality Hackers that wasn't
doing that well. We were moving in the direction of cyberpunk and those
kinds of influences and wanted something that had more of an overall pop
gestalt.
I was watching tv severely wasted one night and there were all these ads
for this and that "2000." and a whole show called Discovery 2000. I
crawled into Queen Mu's bedroom and said "Everybody's using 2000 to sell
shit. Why not us?" She immediately came up with MONDO 2000 cause she knew
that all the 0's would make for a good looking logo.
<[Barbara] B.PAUL> I keep reading cyberpunk is dead; is that why you want a
more pop gestalt?
<[R. U. Sirius]> Well, in a literal sense, cyberpunk was never really
alive. It's all media mythology and as the culture complexities, less and
less people want to conform to any sort of tribal identity for a long
period of time. But basically we wanted to really be effective
communicators and succeed at what we're doing. And part of doing that
involves a bit of strategic thinking while at the same time working within
whatever your obsessions and interests happen to be... It was always
important to us that we published a very slick looking magazine. It's
like dressing up to get inside an establishment dinner. It's much more
subversive, I think, than picketing outside with your fist in the air.
<[Barbara] B.PAUL> Actually, I like the nonexistent cyberpunk myself; the
word has attached itself to a certain style and pov that are distinctive.
Do you mean you've lost interest in it?
<[R. U. Sirius]> I like the sort of tough post punk no bullshit aesthetic
that was expressed through cyberpunk sci fi and the way that sort of took
on a living breathing reality in hacker and in industrial performance
culture. I just don't like to get caught up in movements or names like
cyberpunk. The sense of the thing continues. I know very few people who
actually want to call themselves "a Cyberpunk."
<HG> you seem to have an idea in mind in publishing MONDO 200o, do you have
a succinct philosophy?
<[R. U. Sirius] PRESS22>
HA!!!! The explanation for the meme changes every time I have to answer
the question. I'll put it in two ways, one of them politic and the other
one vulgar
1) MONDO is a magazine for the culture of cyberspace, for a
generation that has grown up inside of media, inside of bits and bytes
and who can recognize the fact that this is the primary territory in
which our socio-political and economic lives are taking place. It's
about consciously occupying that space. In fact, it's possible that a
relatively democratic do-it-yourself "sub"culture has really moved into
cyberspace more completely than the power elites.
2: MONDO 2000 is here to give the high tech culture of America in the 90's
the enema it so desperately needs!!!
<[Bryce] K.CAMPBELL14> What's your opinion on the media/corporations
applying the 'cyber' label to everything (from Networks like GEnie to
microprocessor controlled toasters).
<[R. U. Sirius] PRESS22> It's good for MONDO and what's good for MONDO is
good for Amerika! Seriously though it's just another bit of language
manipulation that everybody 'll soon get sick of next everybody from GE
to toasters will try to latch on to shamanism... like, Be all that you can
be in the new shamanic army etcetera.
<[Danny] D.PERLMAN> I have limited contact with the mag, having skimmed the
book and read issue 8 in the last 48 hours (my mind is cyber goo) but, I
found it fascinating. However, I noted right off the bat that the leadoff
article on Information America had some stuff that didn't quite sit right
fact-wise, and with about 90 seconds of computer time determined that, at
least according to the databases of the two newspapers cited, the articles,
used as bibliographic reference don't exist. What's the deal? Are your
articles intended to be "factual", or more for amusement?
<[R. U. Sirius] PRESS22> I believe that article was intended to be accurate
although employing hardcore fact checkers is not in our budget yet. We've
gotten a number of letters on that piece going both ways, challenging some
of the details or adding additional paranoid data to the brew. We'd be
interested in any specific details that you care to refute.
<[John] J.BILICSKA> Do you foresee MONDO 2000 ever becoming a victim of
its own success, a la ROLLING STONE (since mass culture absorbs every
counterculture, eventually)?
<[R. U. Sirius] PRESS22> If the magazine gets sold to somebody else, it
might get wimp-ized. But as long as Mu and I are at it, it'll always be
wierd. We can't help it. SUre, we might sell it some day and apply our
wierdness to something else.
<[John] J.BILICSKA> Are you contemplating a multimedia/interactive
version of MONDO 2000? I think it would really blow the minds of
suburbanites buying those CD-ROM drives.
<[R. U. Sirius] PRESS22> Yeah, I'm talking with somebody right now about
doing a cd rom version of the Guide. Also, might edit a cd rom version
of Peter Stafford's Psychedelic's Encyclopedia, a return to my roots for
me... hope CBS doesn't hear about it!
<[CuD] GRMEYER> I've been enjoying the book and mag for quite some time
now, thanks. I've wondered if you've ever run into any 'censorship' (at
whatever level).
<[R. U. Sirius] PRESS22> We've had problems with printers, I believe over
female breasts, though the current printer, who we've been with for I
think 5 issues, hasn't given us any problems. We've had some internal
wrangles, which I won't go into... guess I'll have to write an
autobiography some day.
<[Jack] WRITERS.INK> Since magazines tend to be business and business means
money, I was curious if you have control of the magazine or if you have
investors who profer opinions and advice. Success doesn't always bring
the best ... er help.
<[R. U. Sirius] PRESS22> To be honest, Queen Mu is the majority owner and
has complete control over the magazine. We do wrestle occasionally...
***end of conference excerpt***
------------------------------
Date: Thu, 8 Apr 93 23:59:48 CDT
From: Ron <acct069@CARROLL1.CC.EDU>
Subject: File 6--Rune Stone BBS (IIRG Home Board) Back On-Line
US BBS Callers: Rune Stone BBS (IIRG WHQ) 203-832-8441 NUP:Conspiracy
Thanks once again: Mercenary/IIRG
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
THE INTERNATIONAL INFORMATION RETRIEVAL GUILD
Invites The Readers of CUD
To Call and Participate on The IIRG's Public
Bulletin Board System, and WHQ :
The Rune Stone BBS.
Available at: (203)-832-8441
14.4 HST Public Node
1200-2400 Baud Callers Welcome
Home of The IIRG Archives and Phantasy Magazine
3000+ Hack/Phreak Text and Magazines
Archived by The IIRG.
NO Ratios, and No Access Charges
in the tradition of FREE information for all.
Sysop: Mercenary Co-Sysop: Anubis
New User Password: CONSPIRACY
------------------------------
End of Computer Underground Digest #5.28
************************************