Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 10 Issue 25
Computer underground Digest Wed Apr 22, 1998 Volume 10 : Issue 25
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #10.25 (Wed, Apr 22, 1998)
File 1--Call for Papers - Special Issue of SP&E
File 2--Congress May Soon Vote on Spawn of CDA Censorship Bills
File 3--"Spam King" abdicates
File 4--REVIEW: "Digital Fortress", Dan Brown
File 5--Internet porn restriction moving ahead in Congress
File 6--Re: "tagging color printers" (CuD 10.22)
File 7--Re: File 1--proposal of technical solutions to spam problem
File 8--for CuD
File 9--Islands in the Clickstream. Densities. April 11, 1998
File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Mon, 13 Apr 1998 07:58:57 -0700 (PDT)
From: Gene Spafford <spaf@CS.PURDUE.EDU>
Subject: File 1--Call for Papers - Special Issue of SP&E
Call for Papers
Special issue of "Software Practice & Experience"
Experiences with Computer and Network Security
July 1, 1998
Later this year or early next year, there will be a special issue
of the journal "Software Practice & Experience," with Gene
Spafford as the guest editor; if there are enough articles, a
second issue may also be published. This special issue will be
devoted to experiences with computer and network security.
The purpose of Software- Practice & Experience is to convey the
results of practical experience (whether successful or not) that
might benefit the computing community. The key criterion for a
paper is that it make a contribution from which other persons
engaged in software design and implementation might benefit.
Originality, although important, is secondary, especially in cases
where apparently well known techniques do not appear in the
readily available literature.
Papers describing both `systems' and `applications' software in
any computing environment are acceptable. Typical topics include
software design and implementation, case studies, studies
describing the evolution of software systems, critical appraisals
of systems, and the practical aspects of software engineering.
Theoretical discussions can be included, but should illuminate the
practical aspects of the work, or indicate directions that might
lead to better practical systems.
This special issue is specifically devoted to issues of computer
and network security software. We are seeking high-quality
articles relating to the above-mentioned themes. This includes
papers on at least the following topics:
* access control systems
* auditing systems and analysis
* misuse and instrusion detection systems
* applications of cryptography
* secure messaging systems
* information protection systems
* security of mobile code
* security of browsers and related technology
* security testing and assurance
* firewall construction and testing
* experiences with new security programming paradigms
* development and experience with "hacking tools"
* experiences with patching security flaws
Papers may be of any length, ranging from a short note (perhaps a page) to
a full treatment of a substantial software system (say 40 pages). To submit
a paper to this special issue of the journal, please submit 3 paper copies
of your paper, double-spaced, to:
SP&E Special Issue Submissions
c/o Prof. Eugene Spafford
Department of Computer Sciences
Purdue University
West Lafayette, IN 47907-1398
Articles should be submitted when ready, and preferably by July 1,
1998 so as to allow sufficient time for peer review and any
required edits and resubmission. Expected publication of the
issue will be December 1998.
If you are interested in being added to the list of potential
reviewers for this issue, or if you have questions concerning
submissions, contact Spaf at <spaf@cs.purdue.edu>
------------------------------
Date: Mon, 6 Apr 1998 17:44:12 -0500 (EST)
From: owner-cyber-liberties@aclu.org
Subject: File 2--Congress May Soon Vote on Spawn of CDA Censorship Bills
CYBER-LIBERTIES UPDATE
April 7, 1998
7Congress May Soon Vote on Spawn of CDA Censorship Bills
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Congress May Soon Vote on Spawn of CDA Censorship Bills
The Senate Commerce Committee recently approved two bills that may soon
go to a floor vote that reconstruct the unconstitutional provisions of
the 1996 Communications Decency Act and remove power from parents and
local communities to decide how to help children use the Internet
safely.
The ACLU dubbed the bills "spawn of CDA," saying in a letter to the
committee that the proposals fly in the face of the Supreme Court's
landmark ruling in ACLU v. Reno and will restrict protected speech on
the Internet.
Ignoring these warnings, the Commerce Committee passed Senate Bill 1619,
the Internet School Filtering Act, by a unanimous voice vote. The bill,
sponsored by Sen. John McCain, R-AZ, requires all public libraries and
schools that receive federal funds for Internet access to use blocking
software.
The second bill, S. 1482, was sponsored by Senator Dan Coats, R-IN.
Dubbed "Son of CDA," its thrust is identical to the ill-fated
Communications Decency
Act, which was unanimously overturned last year by the United States
Supreme Court in
Reno v ACLU. The lone dissenter in that voice vote was Sen. Ron Wyden,
D-OR, who criticized the "one-size-fits-all Washington approach" to
regulating the Internet.
Congress is obviously enjoying the free political ride these bills
provide, with little thought for the taxpayers who will ultimately pay
the price when the courts strike them down, said Ann Beeson, ACLU Staff
Attorney.
In an ACLU letter to the Senate Committee about the Internet Filtering
Act, the group said, "blocking software restricts access to valuable,
protected online speech about topics including safe sex, AIDS and even
web sites posted by religious groups such as the Society of Friends and
the Glide United Methodist Church."
The ACLU is also working with 37 organizations that are members of the
Internet Free Expression Alliance (IFEA) on efforts to dissuade Congress
from passing the laws.
The ACLU and IFEA members continue to emphasize that parents and
teachers, not the government, should provide minors with guidance about
accessing the Internet.
The Coats bill, which attempts to narrow the CDA's restrictions to
speech that is "harmful to minors," is also unconstitutional, the groups
said, because such speech is "unquestionably protected by the
Constitution when communicated among adults."
The bill would impose criminal penalties on any sites with a commercial
component that provide access to inappropriate material without
requiring age verification. The definition of commercial distributor
could include any site from amazon.com to individual home pages that
have banner advertisements.
The bill also "fails to make any distinction between material that may
be harmful to a six-year-old but valuable for a 16-year-old, such as
safer-sex information," the ACLU letter said.
Some Congressional staff members believe the bills may go to a floor
vote shortly after Congress spring recess.
Take action against these bills by sending a message to Congress that
you oppose these bills. You may send a fax in just a few moments by
visiting the In Congress section of the ACLU Freedom Network web
page, online at: <http://www.aclu.org/congress/IC031298.html>
More information can also be found online at the Internet Free
Expression Alliance home page, online at <http://www.ifea.net>
++++++++++++++++++++++++++++
The Update is a bi-weekly e-zine on cyber-liberties cases and
controversies at the state and federal level. Questions or comments can
be sent to Cassidy Sehgal at csehgal@aclu.org. Past issues are archived
at: <http://www.aclu.org/issues/cyber/updates.html>
To subscribe to the ACLU Cyber-Liberties Update, send a message to
majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
message. To terminate your subscription, send a message to
majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
FOR GENERAL INFORMATION ABOUT THE ACLU, WRITE TO info@aclu.org.
SEE US ON THE WEB AT <http://www.aclu.org> AND AMERICA ONLINE KEYWORD:
ACLU
------------------------------
From: "Leandro Asnaghi-Nicastro" <leandro@CAPNASTY.ORG>
Date: Fri, 17 Apr 1998 22:36:30 +0000
Subject: File 3--"Spam King" abdicates
Thursday April 16 11:17 AM EDT
"Spam King" abdicates
PHILADELPHIA (Reuters) - "The Spam King," one of the most notorious
junk e-mailers on the Internet, says he has abdicated his throne and
promises never to sin again.
But not everyone believes him.
Sanford Wallace, 29-year-old president of Cyber Promotions Inc.,
abruptly announced his decision to a legion of long-time adversaries
who frequent a newsgroup dedicated to fighting bulk e-mail promotions.
The term "spamming" was derived from a "Monty Python" sketch in which
a waitress offers diners a choice of "spam, spam, spam, spam and
spam."
As the Internet's so-called Spam King, Wallace once boasted that his
Philadelphia-based firm was sending out 25 million promotional e-mails
daily on behalf of himself and his clients.
But in his parting message, posted last weekend, he said he had not
only abandoned the practice but would support anti-spam legislation.
"I will never go back to spamming," he wrote. "I apologize for my past
actions."
He added that although there was money in spamming, profits were
outweighed by risks.
Some anti-spam activists welcomed the news as a sign that the battle
had turned in their favor. But others remained suspicious, recalling
that Wallace had once previously promised to desist and form a direct
mailing standards organization.
His latest change of heart followed a futile six-month attempt to get
his operation back online after an angry service provider cut him off.
He also had been saddled with expensive legal settlements, ending with
a judgment against him last week over unsolicited faxes.
Wallace could not be reached for comment. ^REUTERS@
------------------------------
Date: Thu, 16 Apr 1998 08:38:02 -0800
From: "Rob Slade" <rslade@sprint.ca>
Subject: File 4--REVIEW: "Digital Fortress", Dan Brown
BKDGTLFT.RVW 980222
"Digital Fortress", Dan Brown, 1998, 0-312-18087-X, U$24.95/C$33.95
%A Dan Brown danbrown@digitalfortress.com
%C 175 Fifth Ave., New York, NY 10010
%D 1998
%G 0-312-18087-X
%I St. Martin's Press
%O U$24.95/C$33.95 212-674-5151 fax 800-288-2131 www.stmartins.com
%P 384 p.
%T "Digital Fortress"
Dear Dan,
Thanks for getting St. Martin's to send along the book. I enjoyed it
a lot. Your characters are great, and the device of having the
physical "street" action run in parallel with the cerebrations going
on in Crypto was quite effective. It lost a little when the action in
Crypto got physical, and at times the street activity skated a bit
close to farce, but that's a fine line with thrillers anyway. You
have a fine touch with dialogue, and the misunderstandings caused by
specific messages was particularly realistic. (Although, if I may
say, the people who staff your command center are a bit thick: I got
it sixteen pages before they did.)
However, I suspect that whoever suggested the review project to you
didn't tell you the whole story. The books reviewed here are
critiqued on the basis of technology, including the fiction. And on
that score, well, there are a few things you might want to reconsider
on your next effort.
I will say that you have included a good presentation of ciphering,
although you sometimes seem to get codes and ciphers confused.
("Without wax" is a code, and therefore not subject to decryption.)
You have also stressed the importance of key lengths, which, along
with the algorithm used, is critical to determining the strength of
encryption. Cryptographic key length is usually expressed in bits,
but you often refer to keys with different lengths of characters. A
character is usually measured as a byte, or eight bits.
(Incidentally, ASCII characters were original defined as seven bits,
so there are only 128, not 256.) Let me point out, though, that
*adding* a single bit (not character) to a key length is generally
considered to double the key space, essentially doubling the time
necessary to crack a given key.
Let's start with arithmetic. If your TRANSLTR superdecrypter is able
to crack a 64 *character* key in ten minutes, a 65 character key will
take about a day. A 66 character key will need about four months.
However, in the book, a 10,000 bit key, which is equivalent to 1,250
bytes and roughly twenty *times* as long as your 64 byte key, only
takes an hour. A key length a hundred times as long as the 10,000
bits takes only three hours.
Sticking with calculations, I note that your command center, dominated
by a 30' by 40' video wall, required the excavation of 250 metric tons
of earth. If so, the room is less than eight feet from front to back,
even if it was earth that was excavated and not rock, as one might
expect at 214 feet down. In the same vein, TRANSLTR is housed in
something no more than twenty three feet across and eight stories
deep. But if we assume that the three million processors in it are no
more advanced than, say, Pentiums, then the processors themselves are
going to occupy a solid block of space ten feet thick and five stories
high, even if the "spray-seal" doesn't add too much bulk. (I assume
that by "VSLI" you mean VLSI, very large scale integration?) This
disregards the space needed for memory, support chips, the boards
themselves, cabling, interfaces, catwalks, and the oft-mentioned
generators and cooling system, never mind enough air to support a
fire.
(While we are on the subject, we might as well mention chemistry: fire
consumes oxygen, it doesn't usually release it.)
A short detour via linguistics. Japanese ideographs are, as you say,
based on Chinese ideographs. The similarity is not confined to the
form of the symbols, though: enough of the meaning should come through
in either language. (Of course, if you have the actual symbols, it
should be clear which language is being used. The biggest problem
would be in determining representation for the symbols. Unicode,
anyone?)
And, finally, to computers. Just to get these points out of the way,
Grace Murray Hopper's moth was found in the Mark II, not the Mark I,
and was not the first use of the term "bug" (although it may have been
the origin of the use of "debugging"). PGP (Pretty Good Privacy) is
not an algorithm, although it is one of the most widely used
implementations.
First of all, you can't weld ceramic, and secondly, if you do weld the
computer shut, you have rendered it instantly obsolete. Even Deep
Blue got rebuilt between matches. Next, it makes no sense to say that
the computer uses quantum states "rather than" binary for storage.
Binary is, in a basic sense, a quantum state, and quantum physics
could be used to build devices that store binary information. (All
information can be stored in a binary system.) Also, I know about
silicon, CMOS (complementary metal oxide semiconductor), and gallium-
arsenide but ... titanium-strontium? And, OK, I know titanium burns,
but you have to get it pretty darn hot in order to do so.
Yes, some languages are similar enough that it makes it easy for
someone who has learned one to learn the other. However, it doesn't
mean that you automatically know how to use a third. When programs
are created, though, they are generally compiled into machine
language. (Certainly programs in Pascal and C are.) That means it
doesn't matter what languages you know: typing source commands into
the keyboard isn't going to affect the running program. Some
scripting languages use the source files, but Pascal and C don't
qualify. But the difference between source and object code raises
another point: the net would not automatically adopt an encryption
standard without having the source code and a description of the
algorithm to examine. The source code for PGP is available, and many
people compile their program directly from the source, not trusting an
already compiled version. Therefore, a "trap-doored" Digital Fortress
would be detected almost immediately. (The publication of the
Skipjack algorithm did result in the detection of a bug: ironically
the bug would have let the public use non-escrowed keys with it,
rendering the government's attempt to read messages much more
difficult.) Your email tracer doesn't make any sense: if you can't
find the guy, how can you find his site? Also, even if you could link
back to him somehow, as I get everlastingly tired of repeating, you
can't send programs in text messages (at least, not without it being
blindingly obvious).
More importantly, it doesn't matter how powerful your computer is, you
can't decrypt a message with a key if you don't know the algorithm.
Key length is important, but so is the algorithm used. A 56 bit
(that's seven bytes, by the way) key can be very strong in one
algorithm, and relatively weak in another. Also, the importance of
public-key encryption does not lie simply in the strength of the
algorithm. It is the "public" aspect that is so important.
Correspondents who have not met can be completely sure of the
authentication of the other without ever knowing identities. A
fraudulent "North Dakota" would not be a problem to someone who really
knew about encryption.
Finally, there is my field, viruses. It makes no sense to create a
virus for a one-of-a-kind computer, since viruses, as you eventually
do point out, are meant to reproduce. Most of what you say about
viruses makes no sense, including "mutation strings" and "rotating
cleartext." Viruses do not infect data, or, if they do, they just
corrupt it, rather than continuing to spread. I suppose you can
"cross-breed [viruses] into oblivion," but it's easier to delete than
overwrite them. And finally, what you have isn't a virus, and, no, it
isn't a worm either. (Worms reproduce, too.) What you have is the
classic, common or garden trojan horse. The bane of greedy net
surfers everywhere.
copyright Robert M. Slade, 1998 BKDGTLFT.RVW 980222
------------------------------
Date: Thu, 2 Apr 1998 14:20:54 -0800
From: "(--Todd Lappin-->)" <telstar@wired.com>
Subject: File 5--Internet porn restriction moving ahead in Congress
Internet porn restriction moving ahead in Congress
WASHINGTON, April 2 (Reuters) - Legislation to restrict
pornography on the Internet, backed by conservative lawmakers but
opposed by civil libertarians, is picking up momentum,
Congressional staff members said on Thursday.
Last month, the Senate Commerce Committee approved a bill
authored by Dan Coats, Republican of Indiana, that would require
commercial Internet sites containing material deemed harmful to
minors to prohibit access by children.
Within a few weeks, a companion bill will be introduced in the
U.S. House of Representatives by Republicans Mike Oxley of Ohio
and Jim Greenwood of Pennsylvania, an Oxley staffer said.
"Senator Coats has done a good job of building momentum," the
staffer said.
------------------------------
From: "Frank Knobbe" <FKnobbe@BELLSOUTH.NET>
Date: Fri, 17 Apr 1998 23:07:17 -0600
Subject: File 6--Re: "tagging color printers" (CuD 10.22)
> Date--06 Apr 1998 15:29:44 -0400
> From--Mark Atwood <mra@POBOX.COM>
> Subject--File 3--US Govt wants to "tag" color printers
[...]
> "In addition, Castle said, practical and realistic measures to tag
> scanners and printers must be considered, in order to identify the
> source of the counterfeit notes."
>
> In other words, he wants every color printer to embed some sort of
> signature into its output, so that the "authorities" can determine
> where it came from.
>
> I remember, back in high school civics, one of the bits of patriotic
> propaganda that was dispenced to us, was that the USSR required all
> photocopiers to embed a machine id and page number into its output,
> so that the "authorites" could control their use as publishing
> tools.
>
> Now the USA wants to do the same thing.
[...]
Great! I'm so curious to see how they are gonna tackle this issue. Put
an ID on top of the page? Sure, go right ahead, I have to use my
scissors anyway to cut out the Lincoln's.
The only way this would work, would be to overlay the copy with a fine
barcode type output, where the lines stretch across the whole page.
Which means the ID changes when the fuser gets old'n'dirty. Plus,
imagine how many people would return that copier because "it's broke
and procudes crappy output".
How about mandatory copier paper with a watermark? All you need to do
is equip the copier's paper cassette with a padlock.
Of course, alternatively you could try to improve security with newer
dollar bills that have additional security features such as holograms,
etc. but that would be too easy....
The world is going crazy, and it's not gonna get better...
------------------------------
Date: Mon, 20 Apr 1998 10:47:04 -0500
From: Neil Rickert <rickert@CS.NIU.EDU>
Subject: File 7--Re: File 1--proposal of technical solutions to spam problem
"Vladimir Z. Nuri" <vznuri@netcom.com> writes:
>the software problem
> Currently the large mass of internet sites use a mail program called
> Sendmail developed chiefly by Eric Allman. Will all due respect to the
> author and maintainers, IMHO the program is an embodiment in awkward
> and monolithic legacy software. It features many extremely arcane
> syntax rules and inscrutable conventions.
Vladimir has misdiagnosed the problem. Granted, most systems use
sendmail, and granted, sendmail uses methods that many consider
arcane and inscrutable. But that is mostly a matter of internal
design, and has very little to do with spam.
If Vladimir wants to criticize, he should get to the heart of the
matter, which is the SMTP protocol. This protocol requires no sender
authentication (other than a simple syntax check), and could not
easily be extended to prevent spam.
The nucleus of the problem really goes back to the way the network
has evolved. In its early days most computing was done by multi-user
systems. Thus there was a core of trustworthy machines administered
by technically compentent professionals, most of whom had a sense of
ethics and public responsibility. Most of the network protocols were
designed under the assumption that the machines you would communicate
were trustworthy. However, we now have a network composed mostly of
individual machines, too often untrustworthy, and usually run by
novices and in some case by unethical novices (spammers, for
example).
There is little hope of resolving the spam situation unless we
recognize the nature of the problem. The best solution would be a
return to the idea of a central core of trustworthy machines. This
would still allow a network of mostly individual machines. But it
would require that each individual machine forward outgoing mail to a
core machine that is capable of identifying it. And each non-core
machine would only accept email from its own users or from a core
machine. And each core machine would only accept email from other
core machines or from machines it could identify and authenticate.
Then you would have to design new protocols which carried
authentication information in the message envelope.
Spam is only partly a technical problem. It is partly a social
problem. We could not re-establish a core of trustworthy machines
without setting up social conventions to accredit those machines, and
to identify which they are. And we could not find a technical
solution to network problems such as spam without some concept of
trustworthy machines.
> One of the deficiencies in sendmail is the inability to reject email
> based on header information alone.
The alternative would be like having a "big brother" or "post office
nanny" machine attached to your mailbox, which automatically shreds
mail if it does not begin with "Dear person" and end with "Yours
sincerely." We don't need such a machine. Automated rejection of
email on the basis of header information is *evil*. What is needed
is some sort of authentication information, including an estimation
of the degree of trust to be placed in the purported origin of the
message. This information should be transported in the envelope
(separate from the message content and headers), so that it can be
dynamically updated as the mail is tranferred between machines.
------------------------------
Date: Wed, 22 Apr 1998 21:05:20 -0400
From: Jonathan Wallace <jw@bway.net>
Subject: File 8--for CuD
FEDERAL COURTS USE CENSORWARE; FREE SPEECH ADVOCATES OBJECT
FOR IMMEDIATE RELEASE
Contact: Jonathan Wallace daytime: 212-513-7777 evening:
718-797-9808 email: jw@bway.net
New York, April 22, 1998--The Censorware Project
<http://www.spectacle.org/cwp>, an organization which battles the
use of blocking software by public institutions including schools
and libraries, announced today that it has learned that federal
courts are using the WebSENSE censorware product, at least in the
Eighth, Ninth and Tenth judicial circuits (covering twenty-two
states and Guam). WebSENSE <http://www.websense.com> was
installed by the Administrative Office of the Courts, apparently
without the knowledge or consent of the judges themselves.
"I am really disturbed that the federal court administrators have
installed censorware, especially in light of federal judge Leonie
Brinkema's recent decision in the Loudoun County, Virginia
case," said James Tyre, a First Amendment attorney who is a
founding member of the Censorware Project. "In that decision,
available at http://www.venable.com/ORACLE/opinion.htm, the judge
suggested that blocking a web site in a library is like pulling a
book from the shelves. It is particularly shocking that the
Administrative Office of the Courts thinks that federal judges
need to be protected against the Internet--and that our tax money
is being spent to buy censorware for this purpose. It would be
ironic indeed if Judge Brinkema is prevented by WebSENSE from
visiting the very sites at issue in the Loudoun County case,
blocked by X-Stop, a competitor of WebSENSE."
One site erroneously blocked by the WebSENSE product under its
"Hacking" category is http://www.digicrime.com -- a humorous site
created by security experts to educate the public about computer
crime. "WebSENSE apparently took the site for a real computer
crime site," Tyre said. "DigiCrime is not just one bad block out
of 200,000: it is one of 54 hand-picked sites by the makers of
WebSENSE itself included in the downloadable demo versions of
the product. Although The Censorware Project has not done a full
analysis of WebSENSE, one must seriously question its claims to
accuracy if it cannot even get its demo blocks right." WebSENSE
also reportedly blocks A Different Light Bookstore,
http://www.adlbooks.com/, specializing in gay or lesbian
literature. The company claims that the product blocks 200,000
sites.
------------------------------
Date: Mon, 13 Apr 1998 16:07:31 -0500
From: Richard Thieme <rthieme@thiemeworks.com>
Subject: File 9--Islands in the Clickstream. Densities. April 11, 1998
Islands in the Clickstream:
Densities
Steven Hawking noted in a netcast from the White House that the next
generation of humans will live inside a common sense world of quantum
physics the way we have lived inside a Newtonian landscape. "Common sense"
is simply what we're taught to see, he said, which is why new truths always
appear at the edges of our thinking.
Or, as George Bernard Shaw put it, " All great truth begins as blasphemy."
Is it any wonder we are all beset by "cognitive dissonance" and see our
reality-frames flickering the way clairvoyants (excuse me, "remote
viewers") see images of distant sites? One moment we are living happily
inside Newtonian space, walking down a straight sidewalk toward a
right-angled corner when poof! with a puff of smoke, we experience
ourselves bent along a trajectory like light pulled by an immense
gravitational tug. Then we remember that how light bends IS gravity and
what we thought was a "pull" is simply the topography of energy wrinkling
and sliding into whorls of various densities.
In a museum the other day I watched a marble spiraling down a funnel of
smooth wood, circling toward the vortex. I thought of light travelling
along the curves and bumps of space-time ("the universe is shaped like a
potato," Einstein said, "finite but unbounded.") I thought of gravitational
lenses, created when galaxies that are closer to us magnify and distort
more distant galaxies.
Einstein predicted sixty years ago that a massive object would bend and
intensify light, generating multiple images or stretching an image into an
arc. When everything lines up just right, the distortion becomes a perfect
circle, like the galaxy pictured last week in Science News (Vol. 153, No.
114).
That's the long view. Turn the telescope around to see what's happening
right here in our own digital neighborhood.
Web sites are best characterized not by size but by density. A map of
cyberspace would look like millions of galaxies and a map of the traffic
between sites would look like a photo of electromagnetic energy across the
entire spectrum.
A browser is a knowledge engine that organizes information in flux so it
appears momentarily frozen. A site such as Yahoo that links links is a kind
of gravitational lens that boosts distant clusters into the foreground. If
we could see ourselves interacting in cyberspace, we too would look like
energy pouring through our monitors and moving at the speed of light toward
densities around which our interests coalesce. Our monitors like worm holes
let us bypass the long way around.
Organizational structures, including web sites, are dissipative structures
like whirlpools that retain their shape while exchanging energy and
information. Humans too are modular structures of energy and information
that interface over the Internet. That map of the energies of cyberspace is
really a map of our Mind.
Not quite common sense yet, is it? Words slip, slide, decay with
imprecision, T. S. Eliot said of his efforts to fix in poetic form the
world he discerned. In the world of printed text, the illusion that words
and meanings are fixed is magnified. The same words in pixels are obviously
transitory. Our media too function like gravitational lenses, magnifying
meanings intrinsic to their nature. The digital world builds a "common
sense reality" congruent with the quantum world, communicating by its very
nature that words, meanings, and all things slip, slide away.
We build this island for ourselves in the always sea and comfort ourselves
with the illusion that we are on dry land.
The trajectories of the energies of our lives - how they are organized,
aimed, and spent- are determined by our deepest intentionality. How we
intend to live our lives is how we wind up living them.
Cyberspace is a training ground for learning to live and move at the speed
of our minds, the speed of light, to inhabit a landscape that morphs or
changes shape according to our will, intention, and ultimate purpose.
The "sites" in our minds grow denser when our intentions coalesce like
millions of marbles rolling simultaneously toward a single vortex. Space,
time and causality may be woven into the very fabric of our minds, as Kant
said, but in a quantum landscape, causality is a very different animal. An
effect can precede its own cause.
Which is exactly how our minds operate.
Consciousness is always consciousness for or toward some end, always an
arrow aimed toward a potentiality or possibility. As a mental construct,
the image comes first. The effect precedes the cause and causes the effect
to come into being. That's why some think consciousness is the origin as
well as the goal of evolution.
A recent reflection on maps, filters, and belief systems ("Imaginary
Gardens - Filters. Filters of Filters.") brought from a reader an account
of the moment he realized how much the Mercator projection exaggerated the
size of the European community. He recalled the first time he looked at
Buckminster Fuller's Dymaxion map that looks at the world from the North
Pole rather than the equator. From that point of view, the world is seen as
a single unified landmass. The world has never looked the same to him since
Consciousness manifests itself in a visible medium like the Internet so we
can see it. We can never see the thing itself, because there is no thing
there. Nothing. But we can see some of the infinite ways it manifests
itself. Working and playing on the Internet is one way to practice
handling ourselves in a quantum world that is fluid, modular, and
interactive, a trans-planetary world, a trans-galactic world emerging on
the edge of the grid in which we have been living. That grid contained
reality in nice neat boxes. But the grid is flexing, morphing like an
animation even as we look at it, turning into another of its many
possibilities. Seen, of course - it's only common sense, isn't it?- from
just one of its infinitely many points of view.
**********************************************************************
Islands in the Clickstream is a weekly column written by
Richard Thieme exploring social and cultural dimensions
of computer technology. Comments are welcome.
Feel free to pass along columns for personal use, retaining this
signature file. If interested in (1) publishing columns
online or in print, (2) giving a free subscription as a gift, or
(3) distributing Islands to employees or over a network,
email for details.
To subscribe to Islands in the Clickstream, send email to
rthieme@thiemeworks.com with the words "subscribe islands" in the
body of the message. To unsubscribe, email with "unsubscribe
islands" in the body of the message.
Richard Thieme is a professional speaker, consultant, and writer
focused on the impact of computer technology on individuals and
organizations.
Islands in the Clickstream (c) Richard Thieme, 1998. All rights reserved.
ThiemeWorks on the Web: http://www.thiemeworks.com
ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #10.25
************************************