Copy Link
Add to Bookmark
Report
The Journal of American Underground Computing Issue 4
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
======================================================================
ISSN 1074-3111 Volume One, Issue Four June 7, 1994
======================================================================
Editor-in-Chief: Scott Davis (dfox@fennec.com)
Technology Editor: Max Mednick (kahuna@fennec.com)
Consipracy Editor: Gordon Fagan (flyer@fennec.com)
Network Security: George Phillips (ice9@fennec.com)
** ftp site: etext.archive.umich.edu /pub/Zines/JAUC
U.S. Mail:
The Journal Of American Underground Computing
10111 N. Lamar #25
Austin, Texas 78753-3601
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
IMPORTANT ADDRESSES -
============================================================================
To Subscribe to "TJOAUC", send mail to: sub@fennec.com
All questions/comments about this publication to: comments@fennec.com
Send all articles/info that you want published to: submit@fennec.com
Commercial Registration for Profitable Media: form1@fennec.com
============================================================================
"The underground press serves as the only effective counter to a growing
power, and more sophisticated techniques used by establishment mass media
to falsify, misrepresent, misquote, rule out of consideration as a priori
ridiculous, or simply ignore and blot out of existence: data, books,
discoveries that they consider prejudicial to establishment interest..."
(William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Contents Copyright (C) 1994 The Journal Of American Underground Computing
and/or the author of the articles presented herein. All rights reserved.
Nothing may be reproduced in whole or in part without written permission
of the Editor-In-Chief and/or the author of the article. This publication
is made available periodically to the amateur computer hobbyist free of
charge. Any commercial usage (electronic or otherwise) is strictly
prohibited without prior consent of the Editor, and is in violation of
applicable US Copyright laws. To subscribe, send email to sub@fennec.com
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
DISCLAIMER AND NOTICE TO DISTRIBUTORS -
NOTE: This electronic publication is to be distributed free of charge
without modifications to anyone who wishes to have a copy. Under NO
circumstances is any issue of this publication, in part or in whole,
to be sold for money or services, nor is it to be packaged with other
computer software, including, but not limited to CD Rom disks, without
the express written or verbal consent of the author and/or editor.
To obtain permission to distribute this publication under any of the
certain circumstances stated above, please contact the editor at one of
the addresses above. If you have intentions of publishing this journal
in any of the ways described above, or you are in doubt about whether or
not your intentions conflict with the restrictions, please contact the
editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
This publication is provided without charge to anyone who wants it.
This includes, but is not limited to lawyers, government officials,
cops, feds, hackers, social deviants, and computer hobbyists. If anyone
asks for a copy, please provide them with one, or mail the subscription
list so that you may be added.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 4
TABLE OF CONTENTS
1) We've tried To Be Nice... Carl Guderian
2) Defcon Convention Update Dark Tangent
3) Obituary / Mimsey Unknown
4) Call For Papers / Neural Networks Readers
5) Press Release: Spyglass/NCSA Agreement Readers
5) The Real Story Carl Guderian
6) Legion Of Doom T-Shirt Ad Chris Goggans
7) Libertarian Party / Opposition To DTA Libertarian Pty
8) Unabom - 1 Million $ Reward William Tafoya
9) The Massachusetts Encryption Bill Unknown
10) Book Review: Information Warfare Scott Davis
11) Whisper Who, A Unix Tool (Source Code) Editors
12) Hacker Barbie Readers
13) The Well: A Small Town... Cliff Figillo
14) The Feminization Of Cyberspace Doctress Neutopia
15) Response To The Feminization Of Cyberspace Jason Webb
16) Easy-to-Use Kennedy Conspiracy Chart Gordon Fagan
17) Meeks Defense Fund MDF
18) HOPE - Hackers On Planet Earth Emmanual Goldstein
19) TV & Movie Mania Radio Show Lauren Weinstein
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Special thanks to the anonymous reader who sent the software to my US Mail
address...it was very cool. -Scott
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
The Journal Of American Underground Computing supports DEFCON II in Vegas!!
We will be there, and we encourage you to do the same.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
We've Tried to Be Nice: Other Ways to Fight Clipper
by Carl Guderian (bjacques@cypher.com)
(You've read about Clipper ad nauseam elsewhere, so refer to other sources
if you still don't know about Clipper, the Digital Telephony Act, and
everything else that will be lumped together here under the rubric of
"Clipper." Start with John Perry Barlow's excellent "Jackboots on the
Infobahn" in issue 2.04 of Wired Magazine. If you want balance, ask the NSA
for its opinion and weigh it against our position that Clipper obviously
blows. Onward.)
The Situation, Spring 1994
The Clinton White House is apparently steaming ahead on Clipper despite our
perfectly reasonable arguments and well-mannered campaign against it. To
John Perry Barlow (see intro) it plays like Invasion of the Body Snatchers
II: The White House Years--formerly sensible folks replaced by pod people
blandly assuring us that if "I could tell you what I know, you'd agree with
me." No help there.
Various industry consortia were ready to sell us down the slippery slope
until the feds double-crossed them at the last minute by rescinding the
offer to lift export controls on encryption in exchange for support for
Clipper. An attempt to make RSA/PGP encryption a politico-economic fait
accompli by sheer numbers of users is moving slowly, if at all (PGP really
requires direct internet access, it's hard to use, and RSA's suing Phil
Zimmerman so nobody else is going to dress it up for the market). The White
House spooks may make a bigger splash in the market by ordering their
50,000 electronic keyholes than we can by passing out copies of PGP for
free. We're fighting the enemy on its own turf and terms and we could lose.
It's time to fight dirty. Below are a couple of suggestions.
Mutt and Jeff
Just as for every civil rights Freedom Rider there was a Black Panther, for
every Pat Schroeder there's a Riot Grrl, and for every polished Dixiecrat
Senator there was a KKK Nightrider, so must we field media streetfighters
to complement our sincere and polite public spokesmen. The history of social
progress (and, unfortunately, reaction) is that of good cop and bad cop.
Opponents of Clipper must employ these Siamese twins of persuasion in order
to get anywhere. If you've never been interrogated by police, customs
officials, school principals, or corporate investigators, a little
explanation of good cop/bad cop may help.
In interrogations conducted in civilized countries, the object is to crack
the interviewee without resorting to physical torture. The most effective
method is good cop/bad cop. The bad cop, sent in first, acts enraged and
threatens to beat the truth out of the suspect. He gleefully enumerates all
the terrible things that can happen to an uncooperative suspect. Sometimes
this alone works. If the prisoner stands firm (or is frozen with fear), the
good cop comes to the rescue, radiating sympathy and bonhomie. He offers a
cigarette, a friendly ear, and assurances that, he and the suspect are
really on the same side.
The good cop plays on the suspect's pride, suspicions, or other
psychological weaknesses in order to get a voluntary confession. The good
cop's presence carries the implied threat of the return of the bad cop if
no confession is forthcoming. To accuse the good cop of waging psychological
warfare is to miss the point. Psychological warfare is waged by adept
deployment of both good and bad cops in order to break the prisoner.
It's very effective against folks who don't know any better, especially
young hackers, schoolkids, and Seattle scenesters en route to Vancouver.
The Occult Technology of Power
The point of the above digression is that a tool well-known to the
authoritaries can be, and has been, used against them as well. As gays have
learned, neither the noisy AIDS Die-ins by ACT-UP nor lobbying by advocacy
groups is alone sufficient to win public support. Together the tactics work
because they offer different levels on which the public can deal with issues
(and people) that clearly won't go away.
Clipper advocates already know the weakness of their position, so arguments
are useless. They repeat the same arguments in hopes the public will get
tired of hearing about it and simply sign the blank check. We must pre-empt
the argument with bite-sized zingers. In the economy of attention, the
market goes to the side with the pithiest arguments. When they say "law and
order" we respond with "ATF." Such sound bites are Patriot Missiles that
shoot down the other side's forensic Scuds. Channel the spirits of Dorothy
Parker and Oscar Wilde. Give their straw man a hotfoot; they summon up
nuclear terrorism, we resurrect the Branch Davidians. The issue doesn't lend
itself to riotous demonstrations, but with a really good negative media
campaign we can whip up a good hate frenzy against Clipper. We already do
this somewhat, but we need to go further, with high concept slogans and
catch phrases.
"Clinton chip," like "Hooverville," has a dry, sharp ring to it, commanding
attention like the snap of a bone. Plus, it yokes the President personally
to the issue. If that sounds lame, try something else. The ancient
techniques of propaganda apply here, wedded to the black art of meme/
information virus theory. It's a media war, so we'll use a little McLuhan.
(If you've read his stuff, you know his writing style was really disjointed,
but sounded great! Which may be the point.) Slick attack ads, sound bites,
rants to the editor, whisper campaigns, and other forms of media
manipulation are in order. Anything short of gross distortion or outright
lies is acceptable. The truth is scary enough and can be made to sound
positively Lovecraftian, if we succeed in seizing the metaphors. Detourned
ads such as "big brother inside" are a good start. The opportunities for
satire are boundless, especially given the history of government projects.
Emphasize how much more a Clippered future will play like "Brazil" than
"1984."
Why assume things will always work out for the Bad Guys Conspiracy? Want to
bet that when the government buys Clipper chips the Secret Service, FBI,
CIA, NSA, and State Department will probably spy on each other (since no one
else will use it)? Or that when Clipper charges out the fortress gate its
broken carcass will likely be flung back over the wall (i.e., it will be
cracked and posted to the net)? How will they know I haven't sold my
Clippered cellular phone at a garage sale? And so on.
Negative campaigns don't by themselves win support, but reasonable words
don't win much attention either. Both tricks must be played in their turn.
Not good cop or bad cop, but good cop AND bad cop. A diverse battle plan
gives sympathizers more options for action. Some folks like to lobby and
others like to sling mud. Hey, we're a big tent. And the streetfighters can
keep the lobbyists honest.
Useful Idiots
In order for an issue to get attention it should demonstrably arouse the ire
of a number of large and unrelated groups. Right wing fundamentalist
screwheads as well as flaming liberals stand to lose if Clipper becomes the
law, so we put a bug in their respective ears in hopes of getting a
response. Support for one's position comes from surprising places.
Cyberpagans, for example, will be shocked to learn that Phyllis
"Church Lady" Schlafly denounced Clipper in a syndicated column a couple of
months back (she got a few details wrong, but you have to expect that).
Equally shocking (at least to this writer) is Rush Limbaugh, avid computer
user, so far passing up an opportunity to savage Clinton on Clipper. Liberal
groups can be persuaded that a conservative Republican administration armed
with Clipper would make J. Edgar Hoover look like Norbert the Narc.
This strategy is aimed primarily at right wing groups for a number of
reasons. They already hate the present Democratic administration. They're
best at marshalling money and "good-ole-boy" clout. Right-wing paranoia is
more entertaining than the left-wing variety, so it is more likely to be
heard. To the Christian Right, for instance, Clipper carries the musky scent
of the Beast 666, and they expect Clinton to spend a second term stamping
our hands at the door of the Hellfire Club. And did you ever notice how
many cypherpunks own guns? Play up the gun analogy.
This avenue to political action is time-critical. If 1997 sees a Republican
administration in place, right-wing groups will lose interest in attacking
it. And since it was the Bush White House (or spooks within it) that
proposed Clipper, you can bet the rent that President Dole, Quayle (!), or
whoever will make it a fact of life quicker than you can say "national
security." So much for looking to the Republicans for relief from Clipper.
The Golden Apple of Discord
Thank the Deist god of the Founding Fathers that our government is not a
monolithic entity possessed of a single will. Battles are already underway
over which agency gets the secret skeleton key to the Clipper escrow vault
to bypass the official safeguards that won't work anyway. Getting the Crips
and Bloods to make peace was a cakewalk compared to Clinton's efforts to get
the Three Letter Agencies to talk to each other. As long as they must
compete for funding it will be so.
Not quite the end
With a bit of work we can play up Clipper so that it attracts as much
attention as the abortion, gun control, or gay rights issues have. Getting
the cover of Newsweek was good; mainstream coverage in a proposal normally
of interest only to propeller heads and conspiracy buffs is gratifying.
Remember the fallout after the Hacker Crackdown of 1990? But sustained
pressure is needed. Clinton's people need their noses rubbed in the sheer
breadth of opposition to Clipper. If a White House aide hears "Clinton Chip"
or something similar on the street, the President will hear of it and
realize we're serious.
Really the end
According to a recent issue of Federal Computer Week, the NSA is adopting as
it's mascot the armadillo. Maybe we can thank Bobby Ray Inman for this one.
FCW recently ran a contest to name the "dillo." Entrants were asked to
consider the NSA's reputation for prurience and the animal's best known
habitat (the freeway center stripe). The contest is probably over by now,
but "Roadkill" seemed to be the winner paws down. "Road rash," "Winston
[Smith]," and "Harry Buttle" (the poor sap whose erroneous arrest and
subsequent death under torture--er, information retrieval--trigger the
events of "Brazil") were this author's favorites.
Credits
Many thanks go posthumously to Marshall McLuhan for his theory of
perception, which states that most people see either the figure or the
background (a vase or two faces?) but that true perception is seeing both
figure and background. This seemed pretty wacky a year ago, but it makes a
lot more sense now. Backhanded thanks go to a trio of Canadian customs
guards at the Peace Bridge connecting Buffalo, NY to Ft. Erie, Ontario for
personal instruction in the tactics of "good cop/bad cop". Thanks also to
ReSearch (for PRANKS!), the Situationist International (including King Mob),
Richard Dawkins (meme theory) and the late Count Alfred Korzybski (general
semantics), for inspiration.
Please wash your hands before leaving the 20th century.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
DEFCON UPDATE
by Dtangent (dtangent@defcon.org)
XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement
XXXXXXxxxxxxXXXXXX X X DEF CON II Convention Update Announcement
XXXXXxxxxxxxxXXXXXXX X DEF CON II Convention Update Announcement
XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON II Convention Update Announcement
XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON II Convention Update Announcement
XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON II Convention Update Announcement
XXXxxxxxxxxxxxxXXXXXXXX DEF CON II Convention Update Announcement
XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON II Convention Update Announcement
XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON II Convention Update Announcement
XXXXXXxxxxxxXXXXXXXXX X DEF CON II Convention Update Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE
DISTRUBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ
============================================================================
What's this? This is an updated announcement and invitation to DEF CON II,
a convention for the "underground" elements of the computer culture. We try
to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
Groups, CypherPunks, Futurists, Artists, Etc..
WHO: You know who you are, you shady characters.
WHAT: A convention for you to meet, party, and listen to some speeches
that you would normally never hear.
WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th)
WHERE: Las Vegas, Nevada @ The Sahara Hotel
So you heard about DEF CON I, and want to hit part II? You heard about the
parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
check it out in person? Load up your laptop muffy, we're heading to Vegas!
Here is what Three out of Three people said about last years convention:
"DEF CON I, last week in Las Vegas, was both the strangest and the best
computer event I have attended in years." -- Robert X. Cringely, Info World
"Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas
"Soon we were at the hotel going through the spoils: fax sheets, catalogs,
bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds.
The documents disappeared in seconds." -- Gillian Newson, New Media Magazine
DESCRIPTION:
Last year we held DEF CON I, which went over great, and this year we are
planning on being bigger and better. We have expanded the number of
speakers to included midnight tech talks and additional speaking on Sunday.
We attempt to bring the underground into contact with "legitimate" speakers.
Sure it's great to meet and party with fellow hackers, but besides that we
try to provide information and speakers in a forum that can't be found at
other conferences.
While there is an initial concern that this is just another excuse for the
evil hackers to party and wreak havok, it's just not the case. People come
to DEF CON for information and for making contacts. We strive to distinguish
this convention from others in that respect.
WHAT'S NEW THIS YEAR:
This year will be much larger and more organized (hopefully) than last year.
We have a much larger meeting area, and have better name recognition.
Because of this we will have more speakers on broader topics. Expect
speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new
things expected include:
o An Internet connection with sixteen ports will be there, _BUT_ will only
provide serial connections because terminals are too hard to ship. So
bring a laptop with communications software if you want to connect to the
network. Thanks to cyberlink communications for the connection.
o There will be door prizes, and someone has already donated a Cell Phone
and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead
Addict.
o Dr. Ludwig will present his virus creation awards on Sunday.
o A bigger and better "Spot The Fed" contest, which means more shirts to
give away.
o More room, we should have tables set up for information distribution.
If you have anything you want distributed, feel free to leave it on the
designated tables. Yes, this year there will be a true 24 hour
convention space.
o A 24 hour movie / video suite where we will be playing all type of
stuff.
VHS Format. Mail me with suggested titles to show, or bring your own.
We'll use a wall projector when not in use by speakers.
o Midnight Tech Talks on Friday and Saturday night to cover the more
technical topics and leave the days free for more general discussions.
WHO IS SPEAKING:==========================================================
This list represents almost all of the speakers verified to date. Some
people do not want to be announced until the event for various reasons, or
are waiting for approval from employers. A speaking schedule will go out
in the next announcement.
Phillip Zimmerman, Notorious Cryptographer & author of PGP.
Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and
"Computer Viruses, Artificial Life and Evolution"
Loyd Blankenship (The Mentor), Net Running in the 90's and RPG.
Padgett Peterson, Computer Enthusiest, Anti-Virus Programmer.
The Jackal, A Radio Communications Overview, Digital Radio and the Hack
Angle.
Judi Clark, Computer Professionals for Social Responsibility.
Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced.
To be Announced, The Software Publishers Association, Topic to be Announced.
Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics.
Mark Lotter, Cellular Enthusiest, Hacking Cell Phones.
Lorax, The Lighter Side of VMBs.
Peter Shipley, Unix Stud, Q&A on Unix Security.
George Smith, Crypt Newsletter, Virus Topic to be Announced.
Cathy Compton, Attorney, Q&A Surrounding Seisure Issues, Etc.
John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal.
Red Five & Hellbender, Madmen With a Camcorder, Who Knows?
Chris Goggans (Erik Bloodaxe), Wierd Wireless Psycho Shit.. Stay Tuned..
There should be a few round table discussions on Virus, Cellular, Unix and
something else surrounding the industry.
I'll name the rest of the the speakers as they confirm. I'm still working
on a few (Two?) people and groups, so hopefully things will work out and I
can pass the good news on in the next announcement, or over our List Server.
============================================================================
WHERE THIS THING IS:
It's in Las Vegas, the town that never sleeps. Really. There are no clocks
anywhere in an attempt to lull you into believing the day never ends. Talk
about virtual reality, this place fits the bill with no clunky hardware. If
you have a buzz you may never know the difference. It will be at the Sahara
Hotel. Intel is as follows:
The Sahara Hotel: 1.800.634.6078
Room Rates: Single/Double $55, Tripple $65, Suite $120
(Usually $200) + 8% tax
Transportation: Shuttles from the airport for cheap.
NOTE: Please make it clear you are registering for the DEF CON II
convention to get the room rates. Our convention space price is
based on how many people register. Register under a false name if
it makes you feel better, 'cuz the more that register the better for
my pocket book. No one under 21 can rent a room by themselves, so
get your buddy who is 21 to rent for you and crash out. Try to contact
people on the Interactive Mailing List (More on that below) and
hook up with people. Don't let the hotel people get their hands on
your baggage, or there is a mandatory $3 group baggage fee. Vegas
has killer unions.
OTHER STUFF:
I'll whip up a list of stuff that's cool to check out in town there so if
for some reason you leave the awesome conference you can take in some unreal
sites in the city of true capitalism. If anyone lives in Las Vegas, I
would appreciate it if you could send a list of some cool places to check
out or where to go to see the best shows and I'll post it in the next
announcement or in the program
-o I am asking for people to submit to me any artwork, pictures, drawings,
logos, etc. that they want me to try and include in this years program.
I am tring to not violate any copywrite laws, but wat cool shit. Send
me your art or whatever and I'll try and use it in the program, giving
you credit for the work, of course. Please send it in .TIF format if it
has more than eight bit color. The program will be eight bit black and
white.
-o in case you want to make adjustments on your side.
*** NEW MAILING LIST SERVER ***
We've finally gotten Major Dommo List Serv software working (Kinda) and it
is now ready for testing. MTV spent alot of time hacking this thing to work
with BSDi, and I would like to thank him. The purpose of the list is to
allow people interested in DEF CON II to chat with one another. It would
be very sueful for people over 21 who want to rent hotel space, but split
costs with others. Just mention you have room for 'x' number of people, and
I'm sure you'll get a response from somone wanting to split costs. Someone
also suggested that people could organize a massive car caravan from
Southern Ca. to the Con. My attitude is that the list is what you make of
it. Here are the specifics:
Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to
technical problems, etc. I'll do another mass mailing to everyone letting
them know that the list is up and how to access it. Sorry for the delay!
MEDIA:
Some of the places you can look for information from last year include:
New Media Magazine, September 1993
InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely
Gray Areas Magazine, Vol 2, #3 (Fall 1993)
Unix World, ???,
Phrack #44
COST:
Cost is whatever you pay for a hotel room split however many ways, plus
$15 if you preregister, or $30 at the door. This gets you a nifty 24 bit
color name tag (We're gonna make it niftier this year) and your foot in the
door. There are fast food places all over, and there is alcohol all over
the place but the trick is to get it during a happy hour for maximum
cheapness.
==========================================================================
I wanted to thank whoever sent in the anonymous fax to Wired that
was printed in issue 1.5 Cool deal!
===========================================================================
FOR MORE INFORMATION:
For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com
in /pub/defcon. There are digitized pictures, digitized speeches and text
files with the latest up to date info available.
For email users, you can email dtangent@defcon.org for more information.
For non-net people call:
For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102,
Seattle, WA, 98112
For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone.
A DEF CON Mailing list is maintained, and the latest announcements are
mailed automatically to you. If you wish to be added to the list just send
email to dtangent@defcon.org. We also maintain a chat mailing list where
people can talk to one another and plan rides, talk, whatever. If you
request to be on this list your email address will be shown to everyone,
just so you are aware.
STUFF TO SPEND YOUR MONEY ON:
o Tapes of last years speakers (four 90 minute tapes) are available for $20
o DEF CON I tee-shirts (white, large only) with large color logo on the
front, and on the back the Fourth Amendment, past and present. This is
shirt v 1.1 with no type-o's. These are $20, and sweatshirts are $25.
o DEF CON II tee-shirts will be made in various colors this year, including
a few long sleeve shirts. Sizes will be in large only again, with a
few white mediums made. Shirts will be $15, Long Sleve $17, Sweat shirts
will be $20.
o We will have a few (ten maybe?) embroidered hats with this years logo.
Not shure how much they will be.. like $10 maybe.
o Full sized 4 color DEF CON II wall posters will be for sale for about $5.
o Pre-Register for next year in advance for $15 and save half.
o Make all checks/money orders/etc. out to DEF CON, and mail to the address
above. Way above.
If you have any confidential info to send, use this PGP key to encrypt:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3
mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo
dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf
uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ
hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50
IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
=ko7s
-----END PGP PUBLIC KEY BLOCK-----
- The Dark Tangent
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
TO: EDITORS@FENNEC.COM
Subject: OBITUARY - VAX 8600, aka Mimsy, dead at age 8
An era of computing in the University of Maryland Computer Science
Department came to an end Sunday, March 20th, when the Department's last
VAX, an 8600, peacefully died in its sleep. After a power-down, the VAX,
which had been off maintenance since July, 1993, was not able to boot as
a result of a disk/controller that finally went bad.
The 8600 had arrived in 1986 as the Department's most powerful machine
and had been named "Brillig"; in November 1990, when the Department's VAX
11/785 was retired, the 8600 assumed the name and duties of "Mimsy" and
had served in that capacity until its semi-retirement in July, 1994. At
that time, the 8600 was renamed "Imladris" and the "Mimsy" moniker was
bestowed upon a Sun SPARC 10/30.
Along with being the last VAX, the 8600 was also the last UMD machine
running the mutoid 4.3/4.3tahoe/4.3reno/Net-2 conglomeration (4.3BSD Torix,
as it was called here) that emerged over the span of a decade of working
with Unix. Although it is now gone, the hacks it helped inspire live on
in locally-changed versions of the SunOS, Ultrix, OSF/1 and BSDI offerings
in hundreds of other systems here.
It is somewhat ironic that the VAX ended the way it did. Its demise
was originally scheduled for earlier that week, when the 8600, after a short
ceremony, was to have committed suicide. The machine would have, under its
own free will and volition, executed (through the "cron" facility) a shell
script prepared by Dr. Vax Kevorkian which would have issued an "rm -rf /"
command. Onlookers were to have watched the process until the machine seized
up, and would have then powered the machine down and gone to dinner.
However, an earlier problem with the building Uninterruptible Power
Supply (UPS) necessitated a load test for the 20th, and as a large consumer
of power, it was decided the 8600 would remain on for this one last task. As
a result of a short power-down during the UPS load test, the machine's
mighty heart (ummm, disk) gave out.
Funeral arrangements are not yet complete, but tentative plans call
for shipping the remains to Chris Torek's apartment in Berkeley, as a token
of the staff's appreciation. The staff has requested that all gifts of
condolence be made to the University of Maryland's Dinner-for-Wayword-
Hackers Fund; checks may be made payable to Pete Cottrell.
MIMSY IS DEAD! LONG LIVE MIMSY!
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
CALL FOR PAPERS: Neural Networks for Automatic Target Recognition
By Dept of Cognitive and Neural Systems (announce@retina.bu.edu)
ATR is a many-faceted problem of tremendous importance in industrial and
defense applications. Biological systems excel at these tasks, and neural
networks may provide a robust, real-time, and compact means for achieving
solutions to ATR problems. ATR systems utilize a host of sensing modalities
(visible, multispectral, IR, SAR, and ISAR imagery; radar, sonar, and acoustic
time series; and fusion of multiple sensing modalities) in order to detect
and track targets in clutter, and classify them. This Special Issue will
bring together a broad range of invited and contributed articles that
explore a variety of software and hardware modules and systems, and
biological inspirations, focused on solving ATR problems. We particularly
welcome articles involving applications to real data, though the journal
cannot publish classified material. It will be the responsibility of the
submitting authors to insure that all submissions are of an unclassified
nature.
Co-Editors:
-----------
Professor Stephen Grossberg, Boston University
Dr. Harold Hawkins, Office of Naval Research
Dr. Allen Waxman, MIT Lincoln Laboratory
Submission:
-----------
Deadline for submission: October 31, 1994
Notification of acceptance: January 15, 1995
Format: as for normal papers in the journal (APA format) and no longer
than 10,000 words
Address for Papers:
-------------------
Professor Stephen Grossberg
Editor, Neural Networks
Boston University
Department of Cognitive and Neural Systems
111 Cummington Street
Room 244
Boston, MA 02215 USA
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
PRESS RELEASE: SPYGLASS/NCSA AGREEMENT
From: Eric W. Sink (eric@spyglass.com)
The following press release announces our new relationship with NCSA
and Mosaic. I would like to prepend a clarification or two:
Initially, Spyglass will sell Mosaic to volume users requiring a
minimum of 5000 licenses per year. It is our intention to let the
needs of smaller volume customers, including end-users, be met thru
other channels.
Also, remember that NCSA Mosaic, for Windows, Mac, and UNIX will
continue to be freely available from NCSA. Development of the free
versions will continue at NCSA, and Spyglass will be in collaboration
with the NCSA development team.
At Internet World Booth #609:
For Immediate Release
Spyglass Signs Agreement with NCSA to Enhance and Broadly Relicense
Mosaic Graphical Browser for the Internet
(C)1994 Internet World
Commercial Windows and Macintosh Versions Available in June; X Windows
Version to Follow in July
INTERNET WORLD, SAN JOSE, Calif., June 1 -- Spyglass, Inc. and the
National Center for Supercomputing Applications (NCSA) at the
University of Illinois/Urbana-Champaign have entered into an agreement
that will get Mosaic, NCSA's graphical browser for the Internet, to
the desktops of millions of people. The agreement gives Spyglass full
rights to enhance, commercialize and broadly relicense
Mosaic. Spyglass is making a multimillion-dollar commitment to NCSA
and will focus initially on developing a commercially enhanced version
of Mosaic that other companies will incorporate with their products
for distribution to their customers. The announcement was made today
in San Jose, on the opening day of exhibits at the Spring '94 Internet
World conference.
Developed by NCSA, Mosaic gives users point-and-click access to the
World Wide Web (WWW), an information retrieval system on the Internet
with more than 2,300 graphical, multimedia databases of "hyperlinked"
documents. The Internet is a vast "supernetwork" of public and private
networks connecting thousands of organizations and an estimated 20
million individual users. New users are joining the Internet at the
rate of 2 million each month, and hundreds of new WWW servers are
coming online every month. Because of the reach of the Internet, it
offers an attractive vehicle for electronic publishing and for
conducting business globally.
"Mosaic and World Wide Web are two key ingredients for successful
electronic publishing and commerce on the Internet. But, to date,
businesses have tapped only a fraction of the Internet's potential
because these tools haven't been commercially available. Working with
NCSA, we're going to change this," said Douglas Colbeth, president of
Spyglass, which was formed in 1990 and has commercialized other NCSA
technologies.
"We're committed to evolving Mosaic so it becomes a robust, commercial
tool with complete documentation, technical support and advanced
features," explained Tim Krauskopf, co-founder of Spyglass and
developer of NCSA Telnet. "We'll be collaborating with NCSA and other
key partners to create new tools and establish standards that will
help organizations build robust World Wide Web information servers
quickly and inexpensively."
"It has been thrilling to see the universal acceptance of NCSA Mosaic
as an interactive window into cyberspace," said Larry Smarr, director
of the NCSA. "I am very pleased to see Spyglass making such a
financial commitment to the commercialization of Mosaic, which frees
NCSA up to develop the next level of functionality for the public
domain. Spyglass has been a terrific technology partner for us in the
past and we look forward to an even closer working relationship in the
future."
"We welcome Spyglass as our partner in this effort because of the
company's track record in commercializing other NCSA technologies and
our rapidly developing close working relationship with the people at
Spyglass," said Joseph Hardin, associate director of NCSA's software
program. "Spyglass gives us the cross-platform development, global
distribution and ongoing financial resources we need to take the
Mosaic environment to the next level. With this commercialization
arrangement with Spyglass in place, NCSA is freed to continue to
develop core technologies for Mosaic as well as new technologies that
leverage the Internet. We encourage companies to take advantage of
this new relationship with Spyglass and contact them about volume
licensing arrangements for Mosaic technology."
Mosaic has been called the "killer application" for the Internet
because it lets users navigate the Internet by browsing through a
series of graphical, multimedia documents. The WWW was developed
several years ago by CERN, a European consortium of scientists based
in Switzerland, to keep track of researchers' information and to
provide an easy method of sharing data. Subsequently, WWW has grown
into one of the world's most open and widely used environments for
information publishing, browsing and retrieval.
WWW servers contain eye-catching documents with built-in links to
other documents, allowing the user to move easily and naturally around
the Internet. With Mosaic, users can browse through page after page of
menus, hyperlinked to data dispersed all over the world, without
having to know the location or network address of the information they
are seeking.
Spyglass has re-architected Mosaic so it will be a more robust and
full-featured tool. Enhancements available in Enhanced NCSA Mosaic
from Spyglass include improved installation, better memory management,
increased performance, new forms capabilities, online hypertext-based
help, support for a proxy gateway and user interface improvements such
as support for multiple windows. Future versions will include enhanced
security and authentication, which will enable credit-card and other
business transactions to take place on the Internet; filters that will
enable documents from popular document readers to be read seamlessly
by Mosaic; and integration with emerging editing and document
management tools. A number of businesses are already using Mosaic and
WWW to publish magazines, deliver goods and services, provide
technical support to customers and conduct other forms of business
electronically. For example, Mosaic and WWW are part of the recently
announced $12 million CommerceNet project, a public- and
private-sector-backed initiative exploring various ways to conduct
commerce over the Internet and other data networks. NCSA will continue
to maintain a public-with-copyright version of Mosaic, which Internet
users can download for free from the Internet. NCSA, which began
distributing Mosaic in the late fall, estimates that more than one
million people use Mosaic and that more than 30,000 copies are being
downloaded each month.
Spyglass will be targeting the following types of customers as initial
prospects for large-scale Mosaic client licensing agreements: computer
systems and communications vendors, publishers and content providers,
and online information service providers. For example, a publisher
might want to include Mosaic with a subscription to an online magazine
or a computer vendor might want to include Mosaic with each system
sold. By building WWW servers themselves and distributing Mosaic
clients to their customers, businesses can easily use this system for
communicating with customers, providing technical support,
distributing product and marketing information and other kinds of
commerce.
Enhanced NCSA Mosaic from Spyglass will be available for Microsoft
Windows and Apple Macintosh desktop computers this month and for X
Windows computers in July. To navigate the Internet, Mosaic users
require a direct connection to the Internet or a PPP or SLIP
connection. Enhanced NCSA Mosaic from Spyglass will be priced
aggressively for high-volume distribution, enabling licensees to
incorporate Mosaic into their products and services for a modest
cost. For more information about Enhanced NCSA Mosaic from Spyglass,
contact Spyglass directly at (217) 355-6000, mosaic@spyglass.com or
http://www.spyglass.com/.
The National Center for Supercomputing Applications, based at the
University of Illinois at Urbana-Champaign, is supported by grants
from the National Science Foundation, other federal agencies, the
State of Illinois, the University of Illinois and corporate partners.
Founded in 1990, Spyglass, Inc. is the leading developer of visual
data analysis tools for the engineering and scientific marketplace,
which support Windows, Macintosh and UNIX platforms. The company's
venture-capital partners include Greylock Management of Boston,
Mass. and Venrock Associates of New York City.
Spyglass is a registered trademark of Spyglass, Inc. All other brands
or products are trademarks or registered trademarks of their
respective holders and should be treated as such.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
THE REAL STORY
By Carl Guderian (bjacques@cypher.com)
The Real Story
(The following report is a compilation of printed materials and transcripts
of personal interviews conducted by the author(s). In the course of this
exhaustive research we have come to feel that, given the controversial
nature of the subject matter, it is best that the authors as well as their
primary sources be kept confidential. Perhaps it is just as well, as the
events depicted in the report are years or decades in the past. Many of the
principals are retired or dead and, therefore, beyond any earthly reward or
revenge. The author(s) may be dead, too. In this line of journalism, that is
very likely.
1994, Leopold & Loeb, Media Consultants)
Employee Motivation Seminars
Employee motivational seminars are a modern management tool, predicated on
the assumption that external motivation, whether carrot or stick or
combination thereof, is insufficient to move employees to give 110% to the
job; rather, internal motivation must be cultivated in the employees
somehow. Motivational seminars, usually conducted by outside consulting
firms, employ a variety of techniques, from survey questionnaires to group
exercises to meditation. These seminars have become enormously popular since
their introduction in the 1950s (mostly in sales-related fields then), as
they present a real advance over basic reward/punishment systems (-Theories
X and Y+) or even Frederick W. Taylor's scientific methods. More
importantly, they have actually worked. Workplace productivity has markedly
increased since the introduction of motivational seminars.
However, no innovation is universally welcomed. Recently, deeply religious
employees have begun to level serious accusations against motivational
seminars, declaring the programs promote a socialistic or New Age ethic. A
socialistic attitude, they argue, will lead otherwise sensible people to
embrace a world government under the Anti-Christ, as predicted in the Book
of Revelation in the Christian Bible (as interpreted by fundamentalist
Christians). A related and more serious charge is that the meditation
techniques (such as those used in the Krone program) open employees to
possession by demons. The latter charge is the focus of this report.
The diabolical connection is real. Employee motivational seminars did indeed
spring from an arrangement between American industry and the Prince of
Darkness. Satan respects Americans like he respects no other people because
it was an American, Daniel Webster, who defeated him in court, using his
wits. Others have beaten the Devil, but only through invoking the powers of
Heaven, a tactic akin to bringing in grownups to restrain a schoolyard
bully. American corporate executives cut a deal with the Devil to deliver
the souls of underlings in exchange for the usual favors. Though the souls
of corporate employees are industrial grade, and therefore not worth as much
as the souls of the elite, an executive must deliver a number of them in
exchange for infernal favors. Paradoxically, the worth of elite American
souls has risen in direct proportion to the degradation in the worth of
those of followers. The perfect mechanism for delivering B-grade souls by
the bushel is, of course, an employee motivational seminar, in which large
numbers of workers are possessed at once (By the way, television evangelists
work the same way; their mass public healings are actually mass
possessions).
This cozy arrangement between American leaders and Satan has served both
sides well. Demons consider possession of Americans to be a kind of working
vacation, a welcome relief from tormenting the damned souls toiling
eternally in the flaming dung-pits of Hell. Not that this isn't enjoyable
work, but even a demon likes a change of scenery. Satan and his lieutenants
can dole out plum earthside assignments for demonic devotion, thus
reinforcing the infernal hierarchy. American leaders, of course, get the
usual rewards of power, sexual potency (or firm breasts and derriere), and
that Christmas bonus for boosting corporate productivity while laying off
excess workers.
Lately, however, the system's inherent problems have begun to manifest
themselves. As motivational seminars have gained in popularity, they have
increased the demand for demons. As the innovation has become more
widespread, it has ceased to be a competitive advantage. In Hell, too, the
system's success has presented similar problems, and Satan is now seems
ready to pull out of the deal.
The shortage of demons is a Hellish fact. Present-day demons, of course, are
the same ones who participated in the original rebellion of Lucifer (now
Satan). All the angels were created at once, and no new ones have been made
since. The pool of demons, then, is a subset of that group. Occasionally a
truly wicked soul is promoted to demon status, but equally often a demon is
devoured by an angry superior (a la C. S. Lewis' The Screwtape Letters). On
the whole, the supply of demons should be considered to be fixed.
In the early years of the program, American executives were pleased to see
their employees possessed by only the most hard-working demons. Today,
however, all the good ones are taken. Latter-day possessions by demons of
procurement fraud, office-supply theft, and general loafing on the job have
taken their toll on the system. Worse, even the best and brightest demons
seem to have gone native or become Americanized, becoming easily distracted
by the attractions of our post-industrial society or falling dangerously
into sympathy with the modern worker. One formerly trustworthy (!) demon
was even caught committing workplace sabotage in solidarity with his
co-workers! An embarrassed Satan had to deal personally with the matter.
All in all, the phrase working like a demon has begun to lose its cachet.
As more corporations jumped on the infernal bandwagon, they found that the
employees of their competitors were performing equally well (or recently,
equally poorly). Worse, as the quality of the everyday American soul has
declined, many hapless executives have found themselves caught short. In one
company, the worth of the workers' souls had fallen drastically between the
signing of the contract and the possession of the workers. The contracting
executive killed a fellow executive (who was his wife - also on the infernal
take) over the shrinking soul pie at their company in order to hold up his
end of the bargain, lest he be forced to hand over his own soul. It didn't
help. The wife caught up with him in Hell.
Meanwhile, in Hell the situation has also deteriorated. Eventually all
demons have been recruited earthside, so the dream ticket has ceased to be a
credible reward for exemplary effort. Furthermore, production in the Satanic
Mills is down. Temporarily out of sight of their demon overseers, damned
souls have begun shirking on the eternal job.
By piecing together accounts channeled through trance mediums (leaks are now
worse than ever!), the authors have been able to determine that Satan has
begun revoking all contracts dealing with motivational seminars, releasing
the possessed workers and taking back favors bestowed on contractees. This
may partly explain the recent decline of the old industrial corporations in
favor of information technology firms, in which traditional religious values
are relatively absent.
Thus, the era of employee motivation seminars seems to be drawing to a
close. The heyday of private economic deals with the Devil seems to be over
as well. Overheard executive conversatons reveal that Satan is simply not
interested in any more such contracts. Though some may be tempted to see the
above episode as another case of the power elite enlisting the powers of
Hell to fuck over the little guy, they should look at the larger picture and
realize the system seems to have taken care of itself according to the laws
of the Free Market. The Invisible Hand really does seem to work.
Postscript
It now appears that Satan plans to compete in the world labor market after
having seen the prevailing trend toward cheaper labor. He has an advantage
over the Chinese, who lead the market using convict/slave labor. Political
prisoners have to be fed bread and water and must be allowed 3 or 4 hours of
sleep a day. The damned souls of Hell, of course, eat nothing and work
tirelessly twenty-four hours a day, seven days a week. The Devil now knows
quite a bit about management theory (in relation to his demonic supervisors)
and wants to recall them to Hell to oversee the re-engineering of Hell's
production lines. Modern world leaders thinking to hold off this development
are doomed to failure. Hell has on its side such notables as Albert Speer,
Josef Stalin, Adolf Eichmann, and Roy Cohn (to handle the legal work) and
will soon have Henry Kissinger to handle international relations. Given a
team like that, it's only a matter of time.
Post-postscript
The original (now void) contracts are sought-after collectors items, not the
least for their blackmail value. Even when the signatories are beyond
blackmail, as in the case of the aforementioned executive and his wife,
their contracts are worth a lot simply as works of art. The Devil is a
traditionalist at heart, and insists that contracts be handwritten by demons
noted for their calligraphic skill and that the documents bear his seal and
those of major demons acting as witnesses. The early contracts (pre-1983)
are worth the most, as they are the most visually stunning and bear the
names of America's best and brightest of the time, as well as the seals of
Hell's best known demons and devils.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
LEGION OF DOOM T-SHIRTS!! Get 'em
By Chris Goggans <phrack@well.sf.ca.us>
After a complete sellout at HoHo Con 1993 in Austin, TX this past
December, the official Legion of Doom t-shirts are available
once again. Join the net luminaries world-wide in owning one of
these amazing shirts. Impress members of the opposite sex, increase
your IQ, annoy system administrators, get raided by the government and
lose your wardrobe!
Can a t-shirt really do all this? Of course it can!
--------------------------------------------------------------------------
"THE HACKER WAR -- LOD vs MOD"
This t-shirt chronicles the infamous "Hacker War" between rival
groups The Legion of Doom and The Masters of Destruction. The front
of the shirt displays a flight map of the various battle-sites
hit by MOD and tracked by LOD. The back of the shirt
has a detailed timeline of the key dates in the conflict, and
a rather ironic quote from an MOD member.
(For a limited time, the original is back!)
"LEGION OF DOOM -- INTERNET WORLD TOUR"
The front of this classic shirt displays "Legion of Doom Internet World
Tour" as well as a sword and telephone intersecting the planet
earth, skull-and-crossbones style. The back displays the
words "Hacking for Jesus" as well as a substantial list of "tour-stops"
(internet sites) and a quote from Aleister Crowley.
--------------------------------------------------------------------------
All t-shirts are sized XL, and are 100% cotton.
Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for
postage.
Send checks or money orders. Please, no credit cards, even if
it's really your card.
Name: __________________________________________________
Address: __________________________________________________
City, State, Zip: __________________________________________
I want ____ "Hacker War" shirt(s)
I want ____ "Internet World Tour" shirt(s)
Enclosed is $______ for the total cost.
Mail to: Chris Goggans
603 W. 13th #1A-278
Austin, TX 78701
These T-shirts are sold only as a novelty items, and are in no way
attempting to glorify computer crime.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
LIBERTARIAN PARTY ANNOUNCES OPPOSITION TO DIGITAL TELEPHONY ACT
NEWS FROM THE LIBERTARIAN PARTY
1528 Pennsylvania Avenue SE
Washington DC 20003
For additional information:
Bill Winter, Director of Communications
(202) 543-1988
Calling it a "serious infringement of civil liberties and a
gross violation of property rights," the Libertarian Party National
Committee unanimously voted to oppose the Digital Telephony and
Communications Act of 1994.
At their quarterly meeting in Kansas City, Missouri, the
governing body of America's third-largest political party charged that
"the Digital Telephony Act would make furnishing the FBI with easy
wiretapping capability the overriding priority for designers of
telephone equipment and related software."
"It is a lie to call this legislation a 'Privacy Improvement
Act,'" said Bill Evers, the National Committee member from California
who sponsored the resolution.
The Digital Telephony Act, noted the resolution, "requires
telephone, cable television, and computer network companies to ensure
that the government can conduct surveillance while private communication
is going on. It requires the installation of surveillance-facilitating
software in telephone switching equipment to expose personal information --
such as telephone-calling patterns, credit card purchases, banking
records, and medical records -- to the view of the government."
"Such personal information should be the private property of
either the company that assembles it or the individual to whom it
pertains," said Evers.
Libertarians also oppose the Digital Telephony Act because it
"would require a fundamental re-engineering of the communications
infrastructure at great expense to American taxpayers, and to the
owners of private communications systems," said Evers.
The Libertarian National Committee also unanimously voted to
oppose the National Security Agency's Escrowed Encryption Standard -
the so-called Clipper Chip system - or any "government policies
promoting or requiring specific encryption methods for civilian use."
The party also urged the "repeal of the U.S. ban on export abroad of
Clipper-free encryption devices produced by American companies."
"Government-mandated encryption standards will foster
indiscriminate surveillance of private communications by the
government," charged Evers.
The resolution said "the Clinton Administration plans to induce
American manufacturers to install government-readable encryption devices
in every telephone, fax machine, and computer modem made in the United
States."
"The Clinton Administration is explicitly denying that the
American people have the right to communicate in private," said Evers.
By contrast, he said, "The Libertarian Party has long upheld the civil
liberties of the American citizen."
Approximately 120 Libertarians serve in elected and appointed
office around the country, including four State Representatives in New
Hampshire and two mayors in California. The Libertarian Party platform
calls for vigorous defense of the Bill of Rights, free enterprise,
civil liberties, free trade, and private charity.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
UNABOM
$1,000,000 Reward
SERIES OF 14 UNSOLVED BOMBINGS
William L. Tafoya, Ph.D. Special Agent, FBI
UNABOM Task Force, San Francisco, CA (btafoya@orion.arc.nasa.gov)
Beginning in May, 1978, a series of 14 bombing incidents have
occurred across the United States for which there is no apparent
explanation or motive. No person or group has been identified as
the perpetrator(s) of these incidents. The explosions have taken
place in seven states from Connecticut to California. As a result
of these bombings, one person has been killed and 23 others
injured, some grievously. There had been no incidents identified
with this series of bombings since 1987. However that changed in
late June, 1993, when a well known geneticist residing in Tiburon,
California, and a renown computer scientist from Yale University,
New Haven, Connecticut, opened packages which had been mailed to
them and both were severely injured when these packages exploded.
In the past, targets of the bomber have been associated with
the computer industry, the aircraft and airline industry and
universities. Seven of these devices have been mailed to specific
individuals and the other seven have been placed in locations
which suggest there was no specific intended victim. All but two
of the explosive devices functioned as designed and exploded. All
14 crimes, dubbed "UNABOM", have had common effects: all have
caused terror, grief, and fear. On September 11, 1985, Hugh
Scrutton, the owner of the Rentech Computer Company, in
Sacramento, California, was killed by one of these diabolic
devices. The two most recent victims narrowly escaped death.
In response to the June, 1993, events, the Attorney General
directed that a task force of federal law enforcement agencies be
reestablished to urgently investigate and solve these crimes. The
UNABOM Task Force, consisting of investigators from the FBI, ATF,
and the U.S. Postal Inspection Service, has been operational in
San Francisco and Sacramento, California, since July 12, 1993, and
is dedicated exclusively to the investigation of these crimes.
Among the clues in the case are the following words in what
appears to be a note possibly written by the bomber as a reminder
to make a telephone call: "call Nathan R--Wed 7PM." The UNABOM
Task Force believes that "Nathan R" may be associated, perhaps
inno
cently, with the bomber and that "Nathan R" may have received
a telephone call from the bomber on a Wednesday prior to the June,
1993 bombings.
The two most recent tragic bombings illustrate the senseless
and tragic consequences of these crimes and demonstrate the urgent
necessity of solving this case. This serial bomber will strike
again. We do not know who the next victim will be. We do believe
that there is someone out there who can provide the identity of
the person or persons responsible for these crimes. This person
may be a friend, a neighbor, or even a relative of the bomber(s).
UNABOM's chronology is as follows:
1) Northwestern University
Evanston, Illinois
May 25, 1978
A package was found in the Engineering Department parking lot
at the Chicago Circle Campus of the University of Illinois. The
package was addressed to an Engineering Professor at Rensselaer
Polytechnic Institute in Troy, New York. The package had a return
address of a Professor at Northwestern's Technological Institute.
The package was returned to the addressor who turned it over to
the Northwestern University Police Department because he had not
sent the package. On May 26, 1978 the parcel was opened by a
police officer who suffered minor injuries when the bomb
detonated.
2) Northwestern University
Evanston, Illinois
May 9, 1979
A disguised explosive device which had been left in a common
area in the University's Technological Institute, slightly injured
a graduate student on May 9, 1979, when he attempted to open the
box and it exploded.
3) Chicago, Illinois
November 15, 1979
An explosive device disguised as a parcel was mailed from
Chicago for delivery to an unknown location. The bomb detonated
in the cargo compartment of an airplane, forcing it to make an
emergency landing at Dulles Airport. Twelve individuals were
treated for smoke inhalation. The explosion destroyed the
wrapping to such an extent that the addressee could not be
determined.
4) Chicago, Illinois
June 10, 1980
A bomb disguised as a parcel postmarked June 8, 1980 was
mailed to an airline executive at his home in Lake Forest,
Illinois. The airline executive was injured in the explosion.
5) University of Utah
Salt Lake City, Utah
October 8, 1981
An explosive device was found in the hall of a classroom
building and rendered safe by bomb squad personnel.
6) Vanderbilt University
Nashville, Tennessee
May 5, 1982
A wooden box containing a pipe bomb detonated on May 5, 1982,
when opened by a secretary in the Computer Science Department.
The secretary suffered minor injuries. The package was initially
mailed from Provo, Utah on April 23, 1982, to Pennsylvania State
University and then forwarded to Vanderbilt.
7) University of California
Berkeley, California
July 2, 1982
A small metal pipe bomb was placed in a coffee break room of
Cory Hall at the University's Berkeley Campus. A Professor of
Electrical Engineering and Computer Science was injured when he
picked up the device.
8) Auburn, Washington
May 8, 1985
A parcel bomb was mailed on May 8, 1985, to the Boeing
Company, Fabrication Division. On June 13, 1985, the explosive
device was discovered when employees opened it. The device was
rendered safe by bomb squad personnel without injury.
9) University of California
Berkeley, California
May 15, 1985
A bomb detonated in a computer room at Cory Hall on the
Berkeley Campus. A graduate student in Electrical Engineering
lost partial vision in his left eye and four fingers from his
right hand. The device was believed to have been placed in the
room several days prior to detonation.
10) Ann Arbor, Michigan
November 15, 1985
A textbook size package was mailed to the home of a
University of Michigan Professor in Ann Arbor, Michigan from Salt
Lake City. On November 15, 1985, a Research Assistant suffered
injuries when he opened the package. The Professor was a few feet
away but was not injured.
11) Sacramento, California
December 11, 1985
Mr. Hugh Scrutton was killed outside his computer rental
store when he picked up a device disguised as a road hazard left
near the rear entrance to the building. Metal shrapnel from the
blast ripped through Scrutton's chest and penetrated his heart.
12) Salt Lake City, Utah
February 20, 1987
On February 20, 1987, an explosive device disguised as a road
hazard was left at the rear entrance to CAAMs, Inc. (computer
store). The bomb exploded and injured the owner when he attempted
to pick up the device.
13) Tiburon, California
June 22, 1993
On June 22, 1993, a well known geneticist received a parcel
postmarked June 18, 1993, at his residence. The doctor attempted
to open the package at which time it exploded severely injuring
him. It has been determined that this parcel was mailed from
Sacramento, California.
14) Yale University
New Haven, Connecticut
June 24, 1993
On June 24, 1993, a Professor/Computer Scientist at Yale
University attempted to open a parcel which he had received at his
office. This parcel exploded severely injuring him. It has been
determined that this parcel was mailed from Sacramento, California
on June 18, 1993.
At this time, the UNABOM Task Force would appeal to the
public for assistance. For this purpose, a one million dollar
reward is being offered for information which results in the
identification, arrest and conviction of the person(s)
responsible. Contact the UNABOM Task Force at 1-(800) 701-
2662.
William L. Tafoya, Ph.D.
Special Agent, FBI
UNABOM Task Force
San Francisco, CA
btafoya@orion.arc.nasa.gov
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
MASSACHUSETTS ENCRYPTION BILL
THE STATE OF MASSACHUSETTS
MASSACHUSETTS 179TH GENERAL COURT -- 1994 REGULAR SESSION
HOUSE NO. 4491
BY MR. COHEN OF NEWTON, PETITION OF DAVID B. COHEN AND ANOTHER RELATIVE
TO ESTABLISHMENT OF THE PRIVACY OF PERSONAL RECORDS LAW AND REGULATING THE
TECHNOLOGY OF DATA ENCRYPTION. THE JUDICIARY.
February 25, 1994
AN ACT RELATIVE TO THE TECHNOLOGY OF DATA ENCRYPTION.
Be it enacted by the Senate and House of Representatives in General
Court assembled, and by the authority of the same, as follows:
SECTION 1. The General Laws are hereby amended by inserting after
chapter sixty-six A the following chapter:
CHAPTER 66B. MASSACHUSETTS PRIVACY OF PERSONAL RECORDS ACT.
Section 1. For the purposes of this chapter the following terms shall
have the following meanings:
"Personal data files", any machine readable information or information
in a state of electronic, optic, or other computer based transmission
which is capable of being read, stored, copied, transmitted, changed,
or deleted by or through computer or telecommunications devices and
which relates to or describes any person, including a corporation,
partnership or sole proprietorship, or such person's real or personal
property. It shall include, but not be limited to, magnetic tapes,
disks, cartridges, floppy disks, CD-ROM's, optical cubes or other
optical storage devices, documents printed in magnetic ink or OCR
symbol sets, and any other medium capable of being read or stored at
high speed, in large volume, or without substantial human
intervention. The term denotes the substance of the information as
distinguished from the incidental medium of its storage or
transmission.
" Encrypted" , changed in form by programmed routines or algorithms so
as to be unintelligible to any person without employing a suitable
decryption routine or algorithm.
"Decryption", the reverse process of encryption, so as to restore any
data so encrypted to its original, human readable form.
"Routine or algorithm", any series of discrete steps in a computer,
microprocessor, or calculator native machine language which is
performed as a unit to encrypt or decrypt data, or to present such
decrypted data on an end user display medium; provided, however, that
it shall not include source code written in any human readable
language.
"End user display medium", a video display terminal or paper.
"Source code", any programming language used to produce the native
machine language described in the definition of "routine or
algorithm".
"Authorized end user", any person, including a corporation,
partnership, sole proprietorship, or governmental body for whose
specific use the data in question is produced. If shall specifically
exclude any person, including a corporation, partnership, sole
proprietorship, or governmental body into or through whose possession
said data may pass before reaching said authorized end user.
"Numeric data", symbols representing exclusively quantities. It shall
specifically exclude expressions containing number which represent
nonnumeric entities including, but not limited to, social security
numbers, license numbers, bank account numbers, street addresses, and
the like.
"Custodian", a person, including a corporation, partnership, sole
proprietorship, or governmental body, that has access of any kind
whatsoever to personal data files.
"Live data", any personal data which currently represents or at any
time in the past had represented any actual person, including a
corporation, partnership, or sole proprietorship or such person's
property.
SECTION 2. Personal data files within the commonwealth shall be
encrypted.
SECTION 3. Decryption of encrypted data may be accomplished only by,
for, or on behalf of the authorized end user of such data, and only to
render such data into human readable form for the use of such
authorized end user or an end user display medium. Any intermediate
storage or transmission of decrypted data in machine readable form
shall be a violation of this chapter.
SECTION 4. Machine executable routines or algorithms used to decrypt
encrypted data shall reside only in those routines or algorithms which
present the data to authorized end users upon end user media. Source
code for such routines or algorithms shall reside only at the situs of
the authorized end user or at the situs of a party engaged in the
development or maintenance of said source code. No party so engaged
may use live data for any purpose whatsoever except as provided in this
chapter.
SECTION 5. Any copy, excerpt, summary, extension, transmission, or
other transfer of any personal data, whether or not originally
encrypted, shall be encrypted during such transfer until it reaches
the authorized end user.
SECTION 6. Notwithstanding any other provision of this chapter,
numeric data may be stored in decrypted form during testing of summary
or other numeric routines or algorithms in connection with development
or maintenance of software whose purpose is the processing or display
of such data for the use of the authorized end user, where such testing
would be rendered impossible or unreasonably burdensome using
encrypted data. For the purposes of this section, amounts used to
calculate simple algebraic sums shall not qualify for decrypted storage
under this section.
SECTION 7. Notwithstanding any other provision of this chapter, any
personal data which is stored and maintained exclusively or generally
for the purpose of providing access to such data by the public shall be
exempted for the encryption requirements this chapter. The exemption
provided hereby shall extend to excerpts, and compilations of such
data, however and by whomever used. Any and all other data from other
sources which are not specifically exempted under this section or under
sections nine or ten shall be encrypted, whether or not merged,
appended, inserted, or otherwise attached to exempted data, and are
subject to all of the provisions of this chapter in the same manner as
if such exempted data did not exist.
SECTION 8. Notwithstanding any other provision of this chapter, any
routines or algorithms used for the decryption of encrypted data may
be provided to the appropriate law enforcement agencies for the purpose
of assuring compliance with various national, state, and local laws.
For the purposes of this section, such law enforcement agencies shall
be considered authorized end users.
SECTION 9. Notwithstanding any other provision of this chapter, any
person may waive the protections afforded by this chapter. Evidence of
such waiver must be given in writing by such person to each custodian
of data pertaining to said person. When more than one person is
entitled to protection under this chapter, by virtue of joint ownership
or other such relationship, no waiver shall be effective unless signed
by all parties so involved. Such waiver shall be construed to waive
protection only with respect to the specific kinds or elements of
information enumerated on its face, and shall operate to exclude only
encryption of said data by the particular custodian of such data as is
named in said waiver and in whose possession to waiver is kept. The
waiver may operate in perpetuity or be limited to a particular time.
Any ambiguities in any waiver given under this section shall be
resolved in favor of encryption of the most data colorable under its
terms.
SECTION 10. Notwithstanding any other provision of this chapter,
decrypted data may be stored in a secure location apart from the situs
of any user of such data, provided that the sole purpose to which such
data shall be put shall be to restore data which has been lost or
corrupted. Any routines or algorithms used to restore used files using
said decrypted data shall employ encryption rountines or algorithms as
required by this chapter. For the purposes of this section, decryption
routines or algorithms may be considered lost or corrupted if a
reasonable belief exists that security employed in the custody of such
routines or algorithms has been breached.
SECTION 11. Reasonable security shall be employed by persons in the
management of the routines and algorithms used for the encryption and
decryption of data, as required by this chapter. Such secuirty shall
consist as a minimum in the storage of such routines and algorithms at
one situs and the nature and location of its associated data at
another.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
BOOK REVIEW: INFORMATION WARFARE
CHAOS ON THE ELECTRONIC SUPERHIGHWAY
By Winn Schwartau
INFORMATION WARFARE - CHAOS ON THE ELECTRONIC SUPERHIGHWAY
By Winn Schwartau. (C)opyright 1994 by the author
Thundermouth Press, 632 Broadway / 7th floor / New York, NY 10012
ISBN 1-56025-080-1 - Price $22.95
Distributed by Publishers Group West, 4065 Hollis St. / Emeryville, CA 94608
(800) 788-3123
Review by Scott Davis (dfox@fennec.com)
If you only buy one book this year, make sure it is INFORMATION WARFARE!
In my 10+ years of existing in cyberspace and seeing people and organizatons
debate, argue and contemplate security issues, laws, personal privacy,
and solutions to all of these issues...and more, never have I seen a more
definitive publication. In INFORMATION WARFARE, Winn Schwartau simply
draws the line on the debating. The information in this book is hard-core,
factual documentation that leaves no doubt in this reader's mind that
the world is in for a long, hard ride in regards to computer security.
The United States is open to the world's electronic terrorists.
When you finish reading this book, you will find out just how open we are.
Mr. Schwartau talks about industrial espionage, hacking, viruses,
eavesdropping, code-breaking, personal privacy, HERF guns, EMP/T bombs,
magnetic weaponry, and the newest phrase of our generation...
"Binary Schizophrenia". He exposes these topics from all angles. If you
spend any amount of time in Cyberspace, this book is for you.
How much do you depend on technology?
ATM machines, credit cards, toasters, VCR's, televisions, computers,
telephones, modems...the list goes on. You use technology and computers
and don't even know it! But the point is...just how safe are you from
invasion? How safe is our country's secrets? The fact is - they are NOT
SAFE! How easy is it for someone you don't know to track your every move
on a daily basis? VERY EASY! Are you a potential victim to fraud,
breech of privacy, or general infractions against the way you carry
on your daily activities? YES! ...and you'd never guess how vulnerable
we all are!
This book will take you deep into places the government refuses to
acknowledge. You should know about INFORMATION WARFARE. Order your
copy today, or pick it up at your favorite book store. You will not
regret it.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
WHISPER WHO: A Unix tool
Here is a handy little tool for you to use on your Unix machine. Follow the
instructions provided!
-------cut here-------------------cut here---------------cut here------------
/*****************************************************************************
* This program can be changed without too much trouble to a program *
* that logs everybody in and out of a system. Need to add *
* signal(SIGHUP,SIG_IGN) to it though, so it continues after you are gone. *
* This program whispers to you when somebody logs on or off, and is pretty *
* hard to kill. ( you have to send SIGKILL to kill this one.) *
* As is right now, it will not stay active after you logoff. To prevent *
* annoying anyone, just put it in your .profile. *
* *
* CUT THIS PART OUT OF THIS FILE AND NAME THE TEXT: wwho_1.c *
* *
* To compile: cc -o wwho wwho_1.c *
* or gcc -o wwho wwho_1.c *
*****************************************************************************/
#include <signal.h>
#include <stdio.h>
#include <sys/types.h>
#include <utmp.h>
#include <sys/stat.h>
#include <fcntl.h>
#define MAXPROCESSES 40
struct utmp who[MAXPROCESSES]; /* list of all rembered users on-line */
struct utmp u[MAXPROCESSES]; /* list of all users in the utmp file */
int counter = 0; /* number of users in memory */
void sig_hand(int sig) {
register int x;
x=0;
switch(sig) {
case 15: signal(SIGTERM,sig_hand);
case 3: signal(SIGINT,sig_hand);
for(x=0; x<counter; x++)
printf(": Name: %s, Device: %s.\n",who[x].ut_name,who[x].ut_line);
break;
}
}
void main(int argc,char *argv) {
int prio, /* process id of 'child' process */
u_handle, /* handle for the /etc/utmp file */
z; /* loop control varriable*/
int pid; /* process id of 'forked' process */
if(argc>=2) prio = atoi(argv[1]); /* if arg, then new prio = arg */
if(argc < 2) prio = 20; /* if no arg, then prio = 20 */
pid = fork(); /* create new process */
if(pid==-1) { /* Cannot create new process error */
printf(": cannot create process\n");
exit(-1);
}
if(pid > 0 ) { /* if initial program then print intro and exit */
printf(": Wisper Who is now in effect.\n");
printf(": Created process id %i\n",pid);
exit(0); /* exit copy of program that YOU ran */
}
nice(prio); /* make low priority, be nice */
signal(SIGQUIT,SIG_IGN); /* Ignore QUIT signal */
signal(SIGINT,sig_hand); /* ignore INTERRUPT signal */
signal(SIGTERM,sig_hand); /* Ignore TERMINATE signal */
while(1) { /* Main part of program. Never ends */
int x;
register int y;
if((u_handle = open("/etc/utmp",O_RDONLY))==-1) { /* open utmp for reading */
printf(": Cannot Open /etc/utmp\n"); /* error in opening */
exit(0);
}
x = 0; /* reset thr number of utmp entries to 0 */
while(read(u_handle,&u[x],sizeof(u[x])) != 0) { /* Read utmp file
* until EOF */
if(u[x].ut_type == USER_PROCESS) { /* if not an user, then read next entry */
z = new_user(x); /* check to see if new */
if(z==1) warn_em(x,0,0); /* if new, then warn */
}
x++;
if(x>=MAXPROCESSES) { /* TOO many process logged in. */
printf(": Error -- More process are running than there are spaces\n");
printf(": Error -- allocated for.\n");
printf(": Error -- change 'MAXPROCESSES xx' to 'MAXPROCESSES %i'.\n",x+10);
exit(-1); /* Quit */
}
}
close(u_handle); /* close utmp */
for(z=0; z<counter; z++) { /* compare list to see if anybody */
int c; /* logged out */
c = 0; /* varriable that holds a 1 if *
* still here, else a zero */
for(y=0; y<x; y++) { /* Loop to compare utmp file to *
* remembered users */
if(u[y].ut_type==USER_PROCESS) { /* if process is a user...*/
if(strcmp(who[z].ut_name,u[y].ut_name)==0) { /* compare */
c=1; /* if same, break */
break;
}
}
}
if(c!=1) warn_em(z,1,z); /* if gone, warn */
}
sleep(10);
}
}
/* new_user -- function that returns either a 1 or a 0 depending on
whether that user is in the who list
-- Pass it the entry number of the user in the utmp file */
int new_user(int y) {
register int x;
for(x=0; x<counter; x++) { /* check to see if just logged in */
if(strcmp(u[y].ut_name,who[x].ut_name)==0) return(0);
}
who[counter] = u[y];
counter++;
return(1);
}
/* warn_em returns a 1 always. Prints Messages to your device telling you
whether somebosy logged in or out.
All Normal Output, besides errors and intro */
int warn_em(int x,int code,int n_who) {
char buff[9];
buff[8]=0;
if(code==0) {
strncpy(buff,u[x].ut_name,8);
printf(": %s has just logged in on device /dev/%s.\n",buff,u[x].ut_line);
} else {
strncpy(buff,who[x].ut_name,8);
printf(": %s has just logged off.\n",buff);
pack_who(n_who); /* make who list smaller */
}
return(1); /* return OK */
}
/* pack_who -- Packs the list of users on-line, and deletes the one that
logged out.
-- Pass it the number that the user was in the on-line list */
int pack_who(int dead) { /* pack the who list of users on-line */
register int z; /* loop control */
for(z=dead; z<counter-1; z++) { /* loop to delete use that logged out */
who[z] = who[z+1];
}
counter--; /* decrement counter */
return(1); /* return OK */
}
--------cut here-------------cut here---------------cut here---------------
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
HACKER BARBIE
TO: Editors@fennec.com
Subject: 'Hacker' Barbie...
(LA, California) Mattel announces their new line of Barbie products, the
"Hacker Barbie." These new dolls will be released next month. The aim of
these dolls is to revert the stereotype that women are numerophobic,
computer-illiterate, and academically challenged.
This new line of Barbie dolls comes equipped with Barbie's very own
xterminal and UNIX documentation as well as ORA's "In a Nutshell" series.
The Barbie is robed in a dirty button-up shirt and a pair of worn-out jeans
with Casio all-purpose watches and thick glasses that can set ants on fire.
Pocket protectors and HP calculators optional. The new Barbie has the
incredible ability to stare at the screen without blinking her eyes and to
go without eating or drinking for 12 hours straight. Her vocabulary mainly
consists of technical terms such as "IP address," "TCP/IP," "kernel,"
"NP-complete," and "Alpha AXP's."
"We are very excited about this product," said John Olson, Marketting
Executive, "and we hope that the Hacker Barbie will offset the damage
incurred by the mathophobic Barbie." A year ago, Mattel released Barbie
dolls that say, "Math is hard," with condescending companions Ken. The
Hacker Barbie's Ken is an incompetent consultant who frequently asks Barbie
for help.
The leading feminists are equally excited about this new line of Barbie
dolls. Naomi Wuuf says, "I believe that these new dolls will finally
terminate the notion that women are inherently inferior when it comes to
mathematics and the sciences. However, I feel that Ken's hierarchical
superiority would simply reinforce the patriarchy and oppress the masses."
Mattel made no comment.
Parents, however, are worried that they would become technologically behind
by comparison to the children when the Hacker Barbie comes out. "My daughter
Jenny plays with the prototype Hacker Barbie over yonder for two days," says
Mrs. Mary Carlson of Oxford, Mississippi, "and as y'all know, she now pays
my credit card bill. Ain't got no idea how she duz it, but she surely duz
it. I jus don't wanna be looked upon as a dumb mama." Mattel will be
offering free training courses for those who purchase the Hacker Barbie.
The future Hacker Barbie will include several variations to deal with the
complex aspects of Barbie. "Hacker Barbie Goes to Jail" will teach computer
ethics to youngsters, while "BARB1E R1TES L1KE BIFF!!!" will serve as an
introduction to expository writing.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
The WELL:
Small Town on the Internet Highway System
by Cliff Figallo (fig@well.sf.ca.us)
[This document was adapted from a paper presented to the "Public
Access to the Internet" meeting sponsored by the John F. Kennedy
School of Government at Harvard University in May, 1993.
You may distribute and quote from this piece as you wish, but
please include the request that my name and contact information be
included with any quotations or distribution.
Thank you. -- C.F.]
Introduction
The Internet serves as a routing matrix for electronic mail
messages, file transfers and information searches. Internet
sites, those machines and sub-networks that are "internetworked",
have thus far served mostly as file archives, email
addresses and administrative caretakers for their locally
serviced users. Historically, these sites have been universities,
corporations or military and government installations. With
the popularization and commercialization of the Internet, new
models of Internet sites are connecting to the web of high
speed data lines.
One unique Internet site, accessible by anyone with an Internet
account, is The Whole Earth Lectronic Link (hereafter referred to
by its popular name, The WELL). In the future, the Internet will
certainly feature many small, homegrown, regional commercial
systems like The WELL. Such systems will pay for their own
operations and for their Internet connections through user fees,
handling all of the billing and administrative tasks relating to their
users, developing their own local community standards of behavior
and interaction. Their users will often leave the "home" system,
going out through Internet gateways to other regional systems or
searching for information in the myriad databases of the Net. Internet
voyagers will drop in to visit the unique communities they find
outside their home systems, sampling the local cultural flavors and
meeting and conversing with the individuals who inhabit those
systems.
The main attractions of these local Internet "towns" will prove to be
their characteristic online conversations and social conventions and
their focus on specialized fields of knowledge or problem solving.
The WELL is a seminal example of what these small pioneering
towns on the Internet highway system will be like.
The WELL is a computer-mediated public conferencing and
email system linked to the Internet through BARRNet, the
regional Internet vendor. The WELL's headquarters are
located in Sausalito, California. It is co-owned by Point
Foundation (producers of Whole Earth Review and the Whole
Earth Catalogs) and Rosewood Stone, a financial investment
company owned the founder and ex-owner of Rockport Shoes.
The WELL was, from its founding in 1985 until January of
1992, accessible to its users only via direct or packet switched
dialup. It had carried stored-and-forwarded USENET news
groups since soon after startup. These files were imported via
regular phone links with Internet-connected sites. Among its
users were some small minority of students, academics and
technical professionals with Internet accounts on other
systems. The feasibility of the WELL connecting to the Internet
increased steadily through the 1980s until financial, technical
and political conditions allowed it to happen. It is significant,
though, that the character of the WELL developed under
conditions of relative network isolation. Indeed, part of the
justification given by BARRNet, the regional Internet service
provider, for allowing a commercial system like the WELL to
connect through their facilities was the unique character of the
WELL as an established system with thriving and interesting
discussion, and its perceived value as a an information-
generating resource for the Net. The WELL would, they
figured, make an interesting and potentially rewarding
stopover on any user's Internet Tour.
The WELL is often associated with the term "online
community". The idea that community can develop through
online interaction is not unique to the WELL. But the WELL,
because of its organizational and technical history, has survived
primarily through the online personal interaction of its
subscribers and staff rather than through successful business
strategy developed by its owners and managers. The
discussion and dialog contained and archived on the WELL are
its primary products. The WELL "sells its users to each other"
and it considers its users to be both its consumers and its
primary producers. Databases of imported information and
libraries full of downloadable software are scarcely present.
Third-party services such as stock-trading news, wire services,
airline reservation access and software vendor support have
never been offered to any significant extent.
The WELL today counts around 7,000 paying subscribers. It
has a growing staff of over 12 and a gross annual income
approaching $2 million. It is a small but healthy business and
has historically spent very little on advertising and promotion.
It gets far more than its share of free publicity and notoriety
through the Press coverage as compared to much larger
commercial systems. This is so in spite of what most people
would consider a "user-hostile" interface and relatively high
pricing.
The WELL had a rather unique upbringing. I will describe its
early growth and the foundations of its character in the rest of
this paper. I do this from the point of view of having been the
person in charge for six years, though I took great pains to de-
emphasize the "in charge" part whenever possible. I tried to
focus more on maintenance and the distribution of responsibility
through the user community rather than on control. Though my
record for making the WELL a technical showpiece is not
without blemish, my main emphasis was in preserving
and supporting the exercise of freedom and creativity by the
WELL's users through providing an open forum for their interaction.
It is my assertion that the actual exercise of free speech and
assembly in online interaction is among the most significant
and important uses of electronic networking; and that the value
of this practice to the nation and to the world may prove
critical at this stage in human history. I regard the WELL as a
sample of the kind of small, diverse, grassroots service
provider that can and should exist in profusion, mutually accessible
through the open channels on the Internet.
The possibility that the future "Internet" (or whatever replaces
it) may be dominated by monolithic corporate-controlled
electronic consumer shopping malls and amusement parks is
antithetical to the existence and activity of free individuals in
the electronic communications world, each one able to interact
freely with other individuals and groups there.
A Very Brief Biography of the WELL
Founded in 1985 by Stewart Brand and Larry Brilliant as a
partnership of Point and NETI , the WELL came online in
February of 1985 and began taking paying customers April 1,
1985. It's initial staff of one full-time and one part-time
employee grew to 12 paid employees and well over one
hundred online volunteers by 1992. As of this date, The WELL
runs on a Sequent multi- processor mini-computer located in a
cramped room in a small office building next to the houseboat
docks in Sausalito, California. The WELL has full Internet
connectivity which is currently offered for the use of its
subscribers at no surcharge. Most users call in to the WELL
over regular phone lines and modems., and most long distance
customers reach the WELL using an X.25 commercial packet
network for an additional $4.00 per hour. An increasing
number of users are logging in to the WELL via the Internet,
many using Internet accounts on commercial gatewayed
systems rather than the packet switching nets.
The WELL's notable achievements are many, not the least of
which is that it has survived for eight years while so many
other startup systems, though much better-funded, have failed.
The Electronic Frontier Foundation was born largely out of the
free speech ferment that exists on the WELL and out of
discussions and debate that go on there concerning the unique
legal and regulatory paradoxes that confront users, managers
and owners of systems in this new communications medium.
These discussions also attract a population of journalists who
find cutting edge ideas and concepts arising constantly in the
WELL's forums. Many other formal and informal organizations
and collaborations that are effecting the world today call the
WELL home.
The WELL Story -- a Less Brief Biography
Birth
The WELL was the conceptual and partnered creation of Larry
Brilliant and Stewart Brand. They agreed to have their
respective organizations cooperate in establishing and
operating a computer conferencing network that could serve as
a prototype for many regional (as opposed to national)
commercial systems. "Let a thousand CompuServe's bloom," is
how Brilliant put it.
Initial funding came from Brilliant's company, Networking
Technologies International (NETI) in the form of a leased VAX
11/750 computer and hard disks, UNIX system software, a
"conferencing" program called Picospan, and a loan of $90,000.
Point Foundation, the non-profit parent corporation of Whole
Earth Review, contributed the name recognition of "Whole
Earth", the personal attraction of having Stewart Brand to
converse with online and the modest but important
promotional value of constant mention in the small circulation
but influential "Whole Earth Review" magazine.
Business goals for The WELL were, from its inception,
purposefully flexible. But the idea that interesting discussion
would attract interesting discussants was at the core of the
theory that drove the WELL's growth. Initially, many free
accounts were offered to people who had, at one time or
another, been associated with Whole Earth publications and
events, or who were known by Whole Earth staff to be likely
productive and attractive participants (referred to, tongue-in-
cheek, as "shills"). In April of 1985, the WELL began offering
subscriptions at $8 per month plus $3 per hour.
Initial Design and Rule making
The WELL presented its first users with the sole disclaimer:
"You own your own words." The owners of the WELL sought to
distance themselves from liability for any text or data posted
or stored online by WELL users while, at the same time,
providing a free space for creative, experimental and
unfettered communication. An alternative interpretation of the
original disclaimer (now referred to as YOYOW) held that rather
than only laying responsibility for WELL postings at the feet of
the author, the phrase also imparted copyrighted ownership of
postings to the author under the implied protection and
enforcement of the WELL. Management and ownership
resisted the onus of their serving as legal agent for the WELL's
users, recognizing the potential expense and futility of pursuing
people for electronically copying and using customers' words.
Thus, the evolving interpretation of YOYOW provided fuel for
years' worth of discussion on the topics of copyright,
intellectual property and manners in electronic space.
A general aversion to the making and enforcement of rigid
rules has continued at the WELL although incendiary incidents
and distressing situations have occasionally brought calls for
"more Law and Order" or absolute limits to speech. WELL
management rejected these calls, resisting being put in the role
of policeman and judge except where absolutely necessary, and
espousing the view that the medium of online interpersonal
communication was (and still is) too immature, too formative to
be confined by the encumbrances of strict rules and
restrictive software. The imposition by management of
arbitrary limitations on language and speech, aimed at
protecting the feelings or sensibilities of small groups of people
could not possibly protect all people's feelings and sensibilities.
Besides, by stifling free and open dialog, we might have lost
our chance to discover what kinds of interaction really worked
in this medium. Interaction in public access systems seemed to
be much more productive, innovative, educational and
entertaining where there were fewer prohibitions imposed by
system management. If limitations were to be imposed and
enforced, they could be handled best from within the user
population on a "local", not system wide basis. The creation of
private interactive areas where such local rules held sway
allowed public forums to retain their openness while providing
more regulated "retreats" for those who felt they needed them.
Staff-Customer Collaboration
Immediately after opening the system to public access, the
small WELL staff and the original participants began the
collaborative process of designing of a more friendly interface
from the raw Picospan software. Picospan included a toolbox of
customization utilities that could be used to make changes on a
system-wide or at-user's-option basis. Picospan was tightly-
integrated with the UNIX operating system and could therefore
provide transparent access to programs written to operate in
the UNIX environment. The libertarian, anti-authoritarian
philosophy of Picospan's author, Marcus Watts, showed through
in its design which prevented un-acknowledged censorship by
system administrators, forum moderators (hosts) or authors
themselves. Picospan also allowed topics (discussion threads)
to be "linked" into several forums at once...a feature that aids
the cross-pollination of ideas and groups through the system.
The influence that Picospan has had on the WELL's
development as a community and hotbed of discussion cannot
be underestimated. Its display of topics as continuously-
scrolling dialog documents (rather than as fragmented
collections of individually-displayed responses) had a
tremendous effect on user involvement in ongoing discourse.
Staff Background
The background of four of The WELL's non-technical senior
managers--people who worked there during its first seven
years--must be considered very significant to the formation of
the WELL's open and independent culture.
The first director of the WELL, Matthew McClure and myself,
his successor, both spent the decade of the 1970's living in an
intentional community of some renown called The Farm as did
the WELL's first customer service manager, John Coate, and his
successor, Nancy Rhine.. Undoubtedly, this experience of living
cooperatively in multi-family situations in a community that
reached a peak population of over 1500 adults and children,
had a profound influence on the style of management of The
WELL. Principles of tolerance and inclusion, fair resource
allocation, distributed responsibility, management by example
and influence, a flat organizational hierarchy, cooperative
policy formulation and acceptance of a libertarian-bordering-
on-anarchic ethos were all carryovers from our communal
living experience. John Coate is known for having been integral
to the setting of a tone of the WELL where users and staff
intermingled both online and at the WELL's monthly office
parties. He has authored a widely-distributed essay on
"Cyberspace Innkeeping" based on lessons learned in dealing
with customers in his time at the WELL..
Maintaining a History
An important component to the establishment of community in
any setting or medium is a historical record of its environs, its
people, and their works and the relationships and organizations
that defined the direction of the collective entity. For a variety
of reasons besides the security of backups, the WELL still has a
significant portion of its online interaction saved on archived
tape, on its user-accessible disks and in the possession of many
of its conference hosts who have made a practice of backing up
topics on their home machines before retiring them from the
WELL. WELL users were always vocal in their insistence that a
history be kept and went so far as to create an Archives
conference where topics judged of historical significance from
other areas of the WELL were linked and eventually "frozen"
for future reference. These valuable conversational threads,
this "history" of the WELL, contributes to its depth and feeling
of place and community. New users and veterans alike can
refer to these archives for background to current discussion
and to sample the flavor of the WELL from its early days.
When new users, experiencing the same revelations that
stirred WELL veterans years ago, bring up their own
interpretations of "you own your words", they are referred to
the several preserved topics in Archives where lengthy online
deliberations on the subject have been preserved..
Connections
Originally, only direct dial modems could be used to reach the
WELL, but by the end of its first year of operation, an X.25
packet system was in place allowing long distance users to
reach the WELL at reasonable cost. The WELL kept its San
Francisco focus because local callers had cheaper access and
could stay online longer for the same cost, but national and
international participants were now more encouraged to join in.
Also, in 1986, Pacific Bell conducted a test of a regional packet-
switched network for which the WELL was enrolled as a "beta"
site. For most of a year, users from most of the San Francisco
Bay Area were able to dial in to the WELL without phone toll
charges. This fortuitous circumstance helped boost the WELL's
subscription base and connected many valuable customers
from the Silicon Valley area into the growing user pool.
Over time, the percentage of users from outside of the Bay
Area climbed slowly but steadily. As word spread through
frequent unsolicited articles in the press, the WELL became
known as a locus for cutting edge discussion of technical,
literary and community issues, and it became even more
attractive to long distance telecommunicators.
On January 2, 1992, the WELL opened its connection to the
Internet through the regional provider, BARRNet. After much
debugging and adjustment and a complete CPU upgrade, full
Internet service access was offered to WELL customers in June
of 1992. Staff and users opened an Internet conference on the
WELL where discussions and Q&A take place and where new
features, discoveries and tools are shared. The Internet
conference serves as a "living manual" to the resources, use and
news of the Net.
Community
In a medium where text is the only means of communication,
trust becomes one of the most difficult but essential things to
build and maintain. With no audible or visual clues to go by,
the bandwidth for interpersonal communication is quite thin.
There are, though, ways in which trust can be built even
through the small aperture of telecommunicated text.
By being deliberately non-threatening, owners and managers can
eliminate one of the major barriers to trust on the system. One of the
most menacing conditions experienced by new users of public
conferencing systems is that of hierarchical uncertainty. Who holds
the Power? What is their agenda? What are The Rules? Who is
watching me and what I do? Do I have any privacy? How might a
"Big Brother" abuse me and my rights? The WELL Whole Earth
parentage brought with it a historical reputation of collaboration
between publisher and reader. Whole Earth catalogs and magazines
were widely-known for soliciting and including articles and reviews
written by their readers. Whole Earth customers knew that the
publications had no ulterior motives, were not owned and controlled
by multi-national corporations and did not spend their revenues on
making anyone rich. Readers supported the publications and the
publications featured and came clean with the readers. We strove to
continue that kind of relationship with our customers on the WELL
although the immediacy of feedback often made openness a tricky
proposition.
We realized that we were in a position of ultimate power
as operators of the system; able to create and destroy user
accounts, data, communications at will. It was incumbent on
us, then, to make clear to all users our assumptions and the
ground rules of the WELL in order to minimize any concerns
they might have about our intentions. Our aim was to be as
much out front with users as possible. Indeed, John Coate
and I took the initiative, posting long autobiographical stories
from our communal past, inviting users to join us in problem-
solving discussions about the system and the business around
it, confessing to areas of ignorance and lack of experience in the
technical end of the business, and actively promoting the users
themselves as the most important creators of the WELL's
product.
Staff members were encouraged to be visible online and to be
active listeners to user concerns in their respective areas of
responsibility. Staff took part in discussions not only about
technical matters and customer service, but about
interpersonal online ethics. When the inevitable online
quarrels surfaced, staff participated alongside users in
attempts to resolve them. Over time, both staff and users
learned valuable lessons and a "core group" of users began to
coalesce around the idea that some kind of community was
forming and that it could survive these periodic emotional
firestorms. The ethical construct that one could say whatever
one wanted to on the WELL, but that things worked best if it
was said with consideration of others in mind, became
ingrained in enough peoples' experience that community
understandings developed. These "standards" were not written
down as rules, but are noted conspicuously in the WELL's User
Manual and are mentioned online as observations of how
things really seem to work. Productive communication in this
medium can take place if it is done with care.
Beginning in 1986, the WELL began sponsoring monthly face-
to-face gatherings open to all, WELL user or not. Initially,
these Friday night parties were held in the WELL's small
offices, but as attendance grew and the offices became even
more cramped, the potluck gatherings, still called WELL Office
Parties (or WOPs) moved to other locations, eventually finding
a regular home at the Presidio Yacht Club near the foot of the
North end of the Golden Gate Bridge. These in-person
encounters have been an integral and important part of the
WELL's community-building. They are energetic, intense,
conversation-saturated events where people who communicate
through screen and keyboard day after day get to refresh
themselves with the wider bandwidth of physical presence.
Often, the face to face encounter has served to resolve
situations where the textual communications have broken
down between people.
Collaboration Part II
The WELL was a bootstrap operation from its initial investment
in 1985. As a business venture, it was undercapitalized and
struggled constantly to stay ahead of its growth in terms of its
technical infrastructure and staffing. At the same time, it stuck
to the ideal of charging its users low fees for service. The
undercapitalization of the WELL and the low user charges
combined to force management into a constant state of creative
frugality. From the first days of operation, the expertise and
advice of users was enlisted to help maintain the UNIX
operating system, to write documentation for the conferencing
software, to make improvements in the interface and to deal
with the larger problems such as hardware malfunctions and
upgrades.
Over the years, many tools have been invented, programmed
and installed at the suggestion of or through the actual labor of
WELL users. In an ongoing attempt to custom design the
interface so as to offer a comfortable environment for any user,
the WELL has become, if not a truly user-friendly environment,
a very powerful tool kit for the online communications
enthusiast. One of the basic tenets of the WELL is that "tools,
not rules" are preferred solutions to most people-based
problems. Menu-driven tools were created to give control of
file privacy to users, allowing them to make their files
publicly-readable or invisible to others. The "Bozo filter",
created by a WELL user, allows any user to choose not to see
the postings of any other user. Some WELL veterans, after
years of teeth-gritting tolerance of an abrasive individual, can
now be spared any online exposure to or encounter with that
individual.
Other tools have been written to facilitate file transfers, to
allow easy setup of USENET group lists, to find the cheapest
ways to access the WELL, and to extract portions of online
conversations based on a wide range of criteria. These tools
have all been written by WELL users, who received only free online
time in exchange for their work, or by WELL employees who were
once customers.
Free time on the WELL (comptime) has always been awarded
liberally by WELL management in exchange for services. At
one time, half of the hours logged on the WELL in a month was
uncharged, going to comptime volunteers or staff. Hosting
conferences, writing software, consulting on technical issues
and simply providing interesting and provocative conversation
have all earned users free time on the WELL. Much as we
would have liked to pay these valuable people for their
services, almost to a person they have continued to contribute
to the WELL's success as a business and public forum,
demonstrating to us that they considered the trade a fair one.
Conclusion
As can be seen, the WELL developed from its unusual roots in
some unique ways. The purpose of this piece is not to advocate
more WELL clones on the Net, but to demonstrate that if the
WELL could make it, other systems of the WELL's size and
general description could spawn from equally unique
circumstances around the country and offer their own special
cultural treasures to the rest of the world through the Internet.
What has been learned at the WELL can certainly be of value
when planning new systems because the WELL experiment has
demonstrated that big funding bucks, elegant interface design,
optimum hardware and detailed business planning are not
essential to growing a thriving online community and, in the
WELL's case, a successful for-profit business. More important
is that the owners and managers of the systems openly foster
the growth of online community and that there be a strong
spirit of open collaboration between owners, managers and
users in making the system succeed. These critical elements of
viable community systems are attainable by local and regional
civic networks, small organizations and entrepreneurs with
limited funding and technical skills... and some heart.
*****************************
Cliff Figallo (fig@eff.org) is a Wide Area Community Agent who
also works part time as Online Communications Coordinator
for the Electronic Frontier Foundation. Before coming to work
at EFF, Cliff was Director of the Whole Earth Lectronic Link for
six years (Aug '86 through July '92). Cliff now lives in the San
Francisco area and works remotely at his job using the
Internet, Pathways, the WELL, CompuServe and America Online daily.
He can be reached via email at the following addresses:
fig@well.sf.ca.us fig@eff.org fig@path.net fig@aol.com
76711,320@compuserve.com
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
THE FEMINIZATION OF CYBERSPACE
by Doctress Neutopia (neutopia@educ.umass.edu)
During the final year of my doctoral work I discovered the new
world of Cyberspace. Having been involved in utopian thought for
more than fifteen years, inventing my own utopia from the ideas of
such futurists and architects as Charlotte Perkins Gilman,
Starhawk, Eiane Eisler, Paolo Soleri, Buckminster Fuller, etc,
which I call Neutopia, I find the world of virtual reality is the
perfect place for my Neutopian imagination be to born into reality.
The central nervous system of Neutopia is the evolving Global Brain
which we are now seeing come about through information technologies
and the world of Cyberspace.
Cyberspace is changing the very nature of text. Electronic
text takes us into the age of non-text which means writing has
become solely an electronic experience requiring no paper form.
Printed matter is no longer necessary in the world of Cyberspace.
In this world today, the power of ideas, and to some degree one's
writing style and skills is the persuader. In the ideal sense,
Cyberspace becomes a place for the autonomous individual, a place
where the integrity of the Self is the determining factor of social
prestige. With the elimination of printed matter and the
decentralized nature of email, a new relationship between
authoress/author and audience is opening up. Editors who have had
the centralized control over the printed word are no longer the all
powerful controller of literature since in Cyberspace the unknown
poetess can post a message along side a literary giant. Because of
the democratizing aspects of the Usenet open forum, the matter in
which one gains social status is also changing. In Cyberspace,
literary merit is achieved through the depth and sincerity of one's
message. In other words, the old hierarchal structures of language
and the old gatekeepers of ideas are being broken down as you read
these words.
Nevertheless, Cyberspace is no paradise on Earth. Quite the
contrary! I don't believe I am being an extremist to say that
there is a war against the feminist voice occurring in Cyberspace.
The Net term for such activity, which most of the postings of the
discussion groups reflect, is called "flaming." For me, the flames
symbolize the "Burning Times" when civilization was moving from the
Medieval Ages into the Renaissance and the rise the market economy.
It was during this rebirth of classical thought when thousands of
innocent women healers and religious leaders were being burned as
heretics.
A biologist friend has also pointed out to me that in his
laboratory "flaming" means to sterilized a test tube from bacteria.
In that sense, I feel that the "flaming" of my posts have been an
attempt by some people to cleanse the Net from my non-conformist
"disease". After all, the Gaia Religion which I have been
researching is about the role bacteria play in regulating life and
love!
Entering into the Computer Age, we find ourselves in another
social transition. The technological possibilities for
revolutionary change on a world-wide level are now available to us.
That is, if feminist ideology can come to the forefront of the
dialogue. Now, of course, as in the "real" world, the patriarchal
religion of Capitalism is the dominant thought. Anyone who opposes
this thought are "flamed" for their "inappropriate behavior". On
many occasions, I have been "flamed" for my alternative Neutopian
Vision, not by one individual, but by various Usenet and Listserve
groups.
For example, I am subscribed to a Listserve called
Leri@pyramid.com. This group has about 200 people who are
subscribed. There are two kinds of people on the myriad of
Listserves, the Writers and the Lurkers. Lurkers are people who
compose the reading audience who occasionally voice an opinion, but
for the most part, they are silent observers. Of the writers, the
majority are white upperly-mobile middle-class young men who are
computer literate. Many of them are from the scientific class who
are busy creating the Technocracy. When I began to point out the
blatant sexist language and attitudes on Leri, I was "flamed" by
members of this so called "virtual love commune."
We are seeing here a rise of a new form of tribalism. If the
tribal leaders (the Patriarchal Writers) sense a voice which might
be threatening to the tribal harmony of the old-boys network, then
the group attempts to eliminate that voice in opposition.
Unfortunately, for the most part, the educational system has not
taught these young men to analyze and understand the reason why the
feminist voice is annoying to their Establishment prevailing
thought. Consequently, the Net has become but another sophisticated
toy for rich minded college kids to entertain each other as the
rest of the world starves to death and the global ecology
collapses.
There was much discussion which arose on Listserve Leri as to
what to do about me. Several writers declared my vision to be a
"case of insanity." They even were discussing whether it was a case
of biological or psychological aberration. Others suggested that
I needed to go to the self-help section of a book store and find a
book which would help me fit into the society. Others felt my
"unhappy and depressed" character was a result of "inner confusion"
and that if I changed myself [conform to their way of thinking],
then I would be "liberated from oppression". Still others believed
that I would be saved if I found my way back to Christ or began to
practice Buddhist meditation or yoga.
Finally, it was decided that the best thing they could do with
my heresy was to follow the example of the Shaker Community. The
worst punishment the Shakers did to a dissenting personality was to
shun them and so this was what Listserve Leri proceeded to do to
me. Other technicians proposed to bar me by setting up the
technology called "kill filters" so that my email messages would
not even appear on their screens.
There is also a IRC #leri channel where I began to go to
explain my philosophy to the students in Real Time. When the
conversation began to become controversial and conflicting ideas
were pecking, the boys and the girls who think like boys, would
type in an /ignore all neutopia messages so that I was blocked from
the public dialogue. Another tactic of censorship in IRC is the
/kick ban which several of the boys threaten to set up so that I
would not be kicked off the channel if I tried to enter it. So
much for democracy on the Net!
During the holidays, Leri was going to hold a "fleshmeet" in
New Mexico which all the members of the Leri Listserve were invited
to so that people could meet one another in the living flesh.
However, when I expressed interested in attending the party, the
hostess said that if I came "she would have me shot." Then she
wrote me a personal email with a one line message to the effect of
"The Patriarchy Wins." I was experiencing social ostracism for my
feminist beliefs and it was a very loney and painful experience.
But the worst treatment of all occurred on a sister list of
Leri called Aleph@pyramid.com when the archivist sai
d that he was
deleting my posts from the archives. This action was so malicious
because I know this is what has happened to feminist thought
throughout recorded history. Women who resist the patriarchy are
eliminated from the collective memory. I recall a past life when
I was being burned at the stake and the governmental/religious
officials laughed at me as my flesh burned. Before I fell
unconscious from the smoke, the sinister officials took out my
manuscripts which they had confiscated and threw them in the fire.
The messages of my life burned along with my body...my soul
forgotten....my work unacknowledged...my poetic love verse
destroyed.
The point is that there is a serious ideological war in
progress in this underworld of Cyberspace, a place which also
controls the nuclear weapons of the world through the Computer
Empire. This war is the same war which women have been struggling
against for thousands of years. As the millennium changes, so too
is it time to end this war which is draining our vital resources
that are needed to save the Biosphere from total destruction. It is
time that women be acknowledged as the natural sovereigns of the
species so that we will be in a position to use our knowledge and
wisdom we have in creating a world where all our benevolent dreams
find a way to self-actualize.
My mission is to encourage Feminists to play an active role in
the future of Cyberspace. Here is a window of opportunity open for
us to play our role essential in forming the future social
architecture of Cyberspace. If we, Feminists, do not act now and
recruit other like minded Earthlings to take up the cause of the
"Global Feminization of Cyberspace," then we will be caught in the
same trap that we are in today. It is time for us to demand a new
world where everyone has access to the global resources...a world
where everybody's spiritual and physical needs are met. Only then
will the Net become a vehicle of global emancipation and a home of
the Neutopian thinker.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
RESPONSE TO THE FEMINIZATION OF CYBERSPACE
By Jason Webb (jwebb@world.std.com)
I am writing in response to the article THE FEMINIZATION OF
CYBERSPACE by Doctress Neutopia (neutopia@educ.umass.edu). The issues
raised and the accusations made in the article are very serious and
deserve some discussion.
The author cites cases in which her opinions were repressed in several
different ways ranging from individual kill files to having her messages
elminiated from the archives of the group. It seems to me that the real
issue at stake is what the purpose of the Listserve groups is.
Clearly, if the purpose of the group is to promote the free expression
of ideas they are not succeeding. It is true that the internet does eliminate
discrimination based on physical characteriscics. Predictably, however,
technology alone cannot create a better world: we have to be active in trying
to create an environment where all ideas can be expressed without the fear of
being ostracized.
On the flip side, a few of the authors statements are disturbing
because they imply that the male species is to blame for all of these
problems. For example:
>When the conversation began to become controversial and conflicting ideas
>were pecking, the boys and the girls who think like boys, would
>type in an /ignore all neutopia messages so that I was blocked from
>the public dialogue.
>It is time that women be acknowledged as the natural sovereigns of the
>species so that we will be in a position to use our knowledge and
>wisdom we have in creating a world where all our benevolent dreams
>find a way to self-actualize.
Girls who think like boys? Natural soverigns of the species?
It seems hypocritical that the author complains of experiencing
ostracism for voicing her feminist beliefs and then goes on to make
such exclusionary statements herself.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
THE EASY-TO-USE SOLVE THE KENNEDY ASSASSINATION THEORY CHART
By Gordon Fagan (flyer@fennec.com)
Instructions:
Write down the total # of persons involved. Then write down the approximate
frame number of the Zapruder film that matches where you believe each shot
occurred. Then it's a simple matter of going through the list and putting
an X under each shot number and beside each item that applies to that
particular shot. If it doesn't apply, mark nothing. If the item applies
but not to any particular shot number, then use the 0 shot#. Mark it with
an X for "conspiracy to kill" or an "O" for involved in the coverup (:It
also comes in handy for the "a tiger got him" crowd.:) I've tried to be as
thorough as possible, but to make sure everything was covered, I did leave
an "others" category with a fill-in-the-blank at the end of each section.
As for the exactness of your answers, use as close of approximations as you
feel comfortable with. Include all overlap, ie: if you believe Oswald fired
shot #4 but was under the command/control of Naval Intelligence - mark
Oswald and Naval Intelligence for shot #4. For simultaneous shots, give
them both the same frame number. It's pretty much self-explanatory once
you get into it. Enjoy.
The JFK Conspiracy Theory Outline Form
---------------------------------------------------------------------------|
Total number of persons involved
---------------------------------------------------------------------------|
Conspiracy to Assassinate: __________
---------------------------------------------------------------------------|
Conspiracy to Coverup: __________
---------------------------------------------------------------------------|
||||Shot# Reference line|||||||| 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
----------------------------------------------------------------------------|
Approx. Zapruder frame of shot#| | | | | | | | | |
----------------------------------------------------------------------------|
-------(:note: if you believe in more than 8 shots, see your doctor:)-------|
shot# fired from:
(0 means spotter/involved non-shooter)
----------------------------------------------------------------------------|
TSBD-6th floor - east end | | | | | | | | | |
----------------------------------------------------------------------------|
TSBD-6th floor-other | | | | | | | | | |
----------------------------------------------------------------------------|
TSBD-roof | | | | | | | | | |
----------------------------------------------------------------------------|
TSBD-other | | | | | | | | | |
----------------------------------------------------------------------------|
GK-black dog man position | | | | | | | | | |
----------------------------------------------------------------------------|
GK-badgeman position | | | | | | | | | |
----------------------------------------------------------------------------|
GK-other | | | | | | | | | |
----------------------------------------------------------------------------|
Dal-Tex | | | | | | | | | |
----------------------------------------------------------------------------|
Dal. County Records Bldg | | | | | | | | | |
----------------------------------------------------------------------------|
Dallas County Court Bldg | | | | | | | | | |
----------------------------------------------------------------------------|
storm drain | | | | | | | | | |
----------------------------------------------------------------------------|
umbrella man | | | | | | | | | |
----------------------------------------------------------------------------|
other:_______________________ | | | | | | | | | |
----------------------------------------------------------------------------|
other:_______________________ | | | | | | | | | |
----------------------------------------------------------------------------|
shot# Fired by: (Include all overlap)
(0 means involved in/knew about but fired no shots)
----------------------------------------------------------------------------|
Lee Harvey Oswald | | | | | | | | | |
----------------------------------------------------------------------------|
Cuban (anti-Castro) | | | | | | | | | |
----------------------------------------------------------------------------|
Cuban (pro-Castro) | | | | | | | | | |
----------------------------------------------------------------------------|
Russian (anti-communist) | | | | | | | | | |
----------------------------------------------------------------------------|
Russian (KGB/Pro-communist) | | | | | | | | | |
----------------------------------------------------------------------------|
Marseille professional | | | | | | | | | |
----------------------------------------------------------------------------|
other professional | | | | | | | | | |
----------------------------------------------------------------------------|
Mafia | | | | | | | | | |
----------------------------------------------------------------------------|
CIA | | | | | | | | | |
----------------------------------------------------------------------------|
FBI | | | | | | | | | |
----------------------------------------------------------------------------|
Naval Intelligence | | | | | | | | | |
----------------------------------------------------------------------------|
Lyndon Johnson | | | | | | | | | |
----------------------------------------------------------------------------|
Clay Shaw | | | | | | | | | |
----------------------------------------------------------------------------|
David Ferrie | | | | | | | | | |
----------------------------------------------------------------------------|
Roscoe White | | | | | | | | | |
----------------------------------------------------------------------------|
J.D Tippit | | | | | | | | | |
----------------------------------------------------------------------------|
Jack Ruby | | | | | | | | | |
----------------------------------------------------------------------------|
umbrella man | | | | | | | | | |
----------------------------------------------------------------------------|
George Hickey (S.S) - AR-15 | | | | | | | | | |
----------------------------------------------------------------------------|
William Greer (S.S) - driver | | | | | | | | | |
----------------------------------------------------------------------------|
nazis | | | | | | | | | |
----------------------------------------------------------------------------|
UFO's/MJ-12,etc. | | | | | | | | | |
----------------------------------------------------------------------------|
government conspiracy/coverup | | | | | | | | | |
----------------------------------------------------------------------------|
non-govt. conspiracy/coverup | | | | | | | | | |
----------------------------------------------------------------------------|
other:_______________________ | | | | | | | | | |
----------------------------------------------------------------------------|
other:_______________________ | | | | | | | | | |
----------------------------------------------------------------------------|
shot# to hit:
----------------------------------------------------------------------------|
John Kennedy | | | | | | | | | |
----------------------------------------------------------------------------|
John Connally | | | | | | | | | |
----------------------------------------------------------------------------|
James Tague | | | | | | | | | |
----------------------------------------------------------------------------|
grass | | | | | | | | | |
----------------------------------------------------------------------------|
sidewalk/road | | | | | | | | | |
----------------------------------------------------------------------------|
limousine | | | | | | | | | |
----------------------------------------------------------------------------|
street sign | | | | | | | | | |
----------------------------------------------------------------------------|
targetting "rice" bag | | | | | | | | | |
----------------------------------------------------------------------------|
other:_______________________ | | | | | | | | | |
----------------------------------------------------------------------------|
other:_______________________ | | | | | | | | | |
----------------------------------------------------------------------------|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
The original Hacker Crackdown text file, hacker.crackdown, has been expanded
and worked upon, and is now available in many formats, including ASCII (as
before), TeX DVI, PostScript, etc. Look in:
ftp://ftp.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/
gopher://gopher.eff.org/00/Publications/Bruce_Sterling/Hacker_Crackdown/
http://www.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
MEEKS DEFENSE FUND
From Meeks Defense Fund <fund@idi.net>
Subject: Details on Brock Meeks Case
Dear Net Citizen:
The recent Internet posting launching a fund raising drive in
order to help Brock Meeks defray the legal expenses of a lawsuit
brought against his news wire, CyberWire Dispatch, has drawn
several inquiries for a summary of the issues involved in this
case. In response, we have put together the following summary.
(Please note, too, that the case was featured in the April 22
(Fri.) issue of the Wall St. Journal (page B1))
Sometime during February of this year, an electronic solicitation
began appearing on the Internet from a company identified only as
the "Electronic Postal Service" (EPS).
The solicitation from EPS said the service, "will pay you money
to receive commercial e-mail. EPS estimates you will be paid an
average of 6.5 cents per commercial e-mail message. It is
estimated that the average commercial e-mail receiver can make
$200.00 to $500.00 a year and likely more. There is absolutely
no charge, periodic charge, hourly charge or phone charge to
receive or review EPS commercial e-mail. The sender bears all of
the cost.
You are provided with a free EPS mailbox and you may access this
EPS mailbox through a toll free phone number so there are no
phone line charges... In addition... EPS offers you... full
Internet access including network Internet e-mail remote log-in,
file transfer capability and much more."
To sign up you were required to call an 800 number or send for
information to the EPS Internet account (eps@world.std.com). You
had to include your name and address.
Brock called and asked for the EPS information. It never came.
Instead, he received an unwanted and unsolicited direct mailing
from a company called Suarez Corporation Industries (SCI). The
mailing came in the form of a 6 page letter signed by Benjamin
Suarez. That mailing claimed that for a price of $159, Suarez
would send you a book and software that could help you create a
"net profit generation system" capable of earning anywhere from
$30,000 to $1 million per year.
Brock began investigating why he received the SCI mailing and
soon found out that Suarez had obtained his name from the request
for EPS information. More investigation found that the EPS
account was registered to Suarez Corporation Industries. Brock
then looked into the background of this company.
During his investigation into SCI, Brock discovered that state
and federal enforcement agencies had brought actions against SCI
result of their direct mailing practices.
In his article, Brock expressed his personal disapproval of the
SCI business activities. SCI objected to the article and has
filed a defamation lawsuit claiming Brock made defamatory remarks
and sought to disparage his products "and otherwise tortiously
(sic) interfere with the plaintiff's ability to develop" EPS.
Suarez claims the Dispatch article lost him business and he is
seeking compensatory and punitive damages and demanding an
injunction to block Brock from writing further about SCI or its
founder, Benjamin Suarez.
The April 22 (page B1) issue of the Wall St. Journal says lawsuit
"is one of the first U.S. libel cases to arise out of the
free-for-all on the Internet... If it succeeds, some legal
experts say it could spawn other complaints."
For those who don't know Brock, he has a long history as a
journalist writing in the on-line field, having written for Byte,
Wired and other journals over the years. He lives and works
today in the Washington, D.C. area writing during the day for a
communications trade journal. Cyberwire Dispatch is his own
creation. The suit against him was filed in Ohio. Without
the generous offer of legal support from his current lawyers, who
have offices in Ohio, Brock's situation would be even more dire.
The Meeks case raises legal issues that may have far-reaching
implications for freedom of speech and free expression on the
internet. If journalists are unable to pursue important
investigative issues without fear of reprisal, then
all of us will suffer. This is exactly the type of chilling
effect hat the First Amendment was intended to avoid and the
reason we need your support.
Of course defamation laws are to be applied to the Net, but how
they are applied -- and this case will be an important first step
in that process -- could determine just how open and free people
will feel to speak their minds.
This is NOT a case in which a writer on the Internet has, in
fact, libeled someone else. Brock absolutely denies the charges
against him. And every lawyer that Brock has consulted and
looked at the text Brock wrote, and the charges against him,
believe that he ha not written anything that can fairly be
characterized as libelous.
The Legal Defense Fund is formed to assure that Brock is well
defended.
As a reminder, contributions can be made in two ways, either
tax-deductible or non-deductible.
A special thanks goes to the Point Foundation for agreeing early
on in the process to assist in organizing and serving as a
collection agent for the Fund.
If you have any questions, you can contact the Fund at
Fund@idi.net.
For tax-deductible contributions send those checks to:
Meeks Defense Fund
c/o Point Foundation
27 Gate Five Road
Sausalito, CA 94965
For those who don't care about the tax deductible status, send
contributions to:
Meeks Defense Fund
c/o IDI
901 15th St. NW
Suite 230
Washington, DC 20005
THE BROCK MEEKS DEFENSE FUND COMMITTEE
Samuel A. Simon
President, Issue Dynamics, Inc.*
ssimon@idi.net
John Sumser
Editor/Executive Director
Whole Earth Review/ Point Foundation
jrsumser@well.sf.ca.us
Mitch Kapor
Chair, Electronic Frontier Foundation*
mkapor@eff.org
David Farber
The Alfred Fitler Moore Professor of Telecommunications Systems
University of Pennsylvania*
farber@central.cis.upenn.edu
Philip Elmer-DeWitt
Senior Writer
TIME Magazine*
ped@panix.com
Marc Rotenberg
Electronic Privacy Information Center*
Rotenberg@epic.org
Nicholas Johnson
Former FCC Commissioner*
1035393@mcimail.com
Jerry Berman
Electronic Frontier Foundation*
jberman@eff.org
Mike Godwin
Electronic Frontier Foundation*
####################################################################
# Meeks Defense Fund | Internet: fund@idi.net #
# ---------------------------------------------------------------- #
# c/o IDI c/o Point Foundation #
# 901 15th St. NW 27 Gate Five Road #
# Suite 230 Sausalito, CA 9465 #
# Washington, DC 20005 #
####################################################################
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
HACKERS ON PLANET EARTH
From: Emmanuel Goldstein (emmanuel@well.sf.ca.us)
To: Editors@fennec.com
HACKERS ON PLANET EARTH
The First U.S. Hacker Congress
Yes, it's finally happening. A hacker party unlike anything ever seen
before in this country. Come help us celebrate ten years of existence
and meet some really interesting and unusual people in the process.
We've rented out the entire top floor of a midtown New York hotel,
consisting of several gigantic ballrooms. The conference will run
around the clock all weekend long.
SPEAKERS AND SEMINARS: Will there be famous people and celebrity
hackers? Of course, but the real stars of this convention will be
the hundreds of hackers and technologically inclined people journeying
from around the globe to share information and get new ideas.
That is the real reason to show up. Seminars include:
social engineering, cellular phone cloning, cable TV security,
stealth technology and surveillance, lockpicking, boxing of all sorts,
legal issues, credit cards, encryption, the history of 2600,
password sniffing, viruses, scanner tricks, and many more in the
planning stages. Meet people from the Chaos Computer Club, Hack-Tic,
Phrack, and all sorts of other k-rad groups.
THE NETWORK: Bring a computer with you and you can tie into the huge
Ethernet we'll be running around the clock. Show off your system and
explore someone else's (with their permission, of course). We will
have a reliable link to the Internet in addition. Finally, everyone
attending will get an account on our hope.net machine. We encourage
you to try and hack root. We will be giving away some valuable prizes
to the successful penetrators, including the keys to a 1994 Corvette.
(We have no idea where the car is, but the keys are a real
conversation piece.) Remember, this is only what is currently planned.
Every week, something new is being added so don't be surprised to find
even more hacker toys on display. We will have guarded storage areas
if you don't want to leave your equipment unattended.
VIDEOS: We will have a brand new film on hackers called
"Unauthorized Access", a documentary that tells the story from
our side and captures the hacker world from Hamburg to Los Angeles
and virtually everywhere in between. In addition, we'll have
numerous foreign and domestic hacker bits, documentaries,
news stories, amateur videos, and security propaganda. There
has been a lot of footage captured over the years - this will
be a great opportunity to see it all. We will also have one
hell of an audio collection, including prank calls that put
The Jerky Boys to shame, voice mail hacks, and even confessions
by federal informants! It's not too late to contribute material!
WHERE/WHEN: It all happens Saturday, August 13th and Sunday,
August 14th at the Hotel Pennsylvania in New York City
(Seventh Avenue, between 32nd and 33rd Streets, right across
the street from Penn Station). If you intend to be part of
the network, you can start setting up Friday night.
The conference officially begins at noon on Saturday and will
run well into Sunday night.
ACCOMMODATIONS: New York City has numerous cheap places to stay.
Check the update sites below for more details as they come in.
If you decide to stay in the hotel, there is a special discounted
rate if you mention the HOPE Conference. $99 is their base rate
(four can fit in one of these rooms, especially if sleeping bags
are involved), significantly larger rooms are only about $10 more.
Mini-suites are great for between six and ten people - total cost
for HOPE people is $160. If you work with others, you can easily
get a room in the hotel for between $16 and $50.
The Hotel Pennsylvania can be reached at (212) PEnnsylvania 6-5000
(neat, huh?). Rooms must be registered by 7/23/94 to get the
special rate.
TRAVEL: There are many cheap ways to get to New York City in August
but you may want to start looking now, especially if you're coming
from overseas. Travel agencies will help you for free. Also look in
various magazines like Time Out, the Village Voice, local alternative
weeklies, and travel sections of newspapers. Buses, trains, and
carpools are great alternatives to domestic flights. Keep in touch
with the update sites for more information as it comes in.
WANTED: Uncommon people, good music (CD's or cassettes), creative
technology. To leave us information or to volunteer to help out,
call us at (516) 751-2600 or send us email on the Internet at:
2600@hope.net.
VOICE BBS: (516) 473-2626
INTERNET:
info@hope.net - for the latest conference information
travel@hope.net - cheap fares and advisories
tech@hope.net - technical questions and suggestions
speakers@hope.net - for anyone interested in speaking at the
conference
vol@hope.net - for people who want to volunteer
USENET NEWSGROUPS:
alt.2600 - general hacker discussion
alt.2600.hope.announce - the latest announcements
alt.2600.hope.d - discussion on the conference
alt.2600.hope.tech - technical setup discussion
REGISTRATION: Admission to the conference is $20 for the entire weekend
if you preregister, $25 at the door, regardless of whether you stay for
two days or five minutes. To preregister, fill out this form, enclose $20,
and mail to: 2600 HOPE Conference, PO Box 848, Middle Island, NY 11953.
Preregistration must be postmarked by 7/31/94. This information is only
for the purposes of preregistration and will be kept confidential. Once
you arrive, you can select any name or handle you want for your badge.
NAME: _______________________________________________________________
ADDRESS: ____________________________________________________________
CITY, STATE, ZIP, COUNTRY: __________________________________________
PHONE (optional): ____________ email (optional): ____________________
IMPORTANT: If you're interested in participating in other ways or
volunteering assistance, please give details on the reverse side.
So we can have a better idea of how big the network will be, please
let us know what, if any, computer equipment you plan on bringing and
whether or not you'll need an Ethernet card. Use the space on the back
and attach additional sheets if necessary.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
TV & MOVIE MANIA RADIO SHOW HITS THE INFORMATION SUPERHIGHWAY
By Lauren Weinstein (lauren@vortex.com)
LOS ANGELES -- In a first for an entertainment-oriented show, a
version of the popular "Professor Neon's TV & Movie Mania" radio
program begins worldwide distribution directly to listeners this
week via the Internet (or as it is becoming popularly known,
the "Information Superhighway").
"The Internet now includes over 20 million users in more than 30
countries, and is growing at an enormous rate," pointed out the
show's producer, Lauren Weinstein of Vortex Technology.
"Professor Neon's TV & Movie Mania has also broadcast via
over-the-air stations, but it's apparent that the time has finally
arrived when the global facilities of the Internet can bring this
audio show to an even wider audience. Nobody has ever used the
Internet to transmit a show like this before," he added.
"Professor Neon's TV & Movie Mania" is a unique show which
features a look at a broad universe ranging from classic to
current television, films, and videos, with a special emphasis on
the unusual, odd, silly, strange, bizarre, cult, surreal, and
weird. The shows include reviews, interviews, and a wide range of
special audio clips, trailers, and many other features.
The interview guest for the debut Internet version of the show is
Robert Justman, a man whose work has greatly influenced classic
television programs ranging from "The Outer Limits" (on which he
was assistant director) to both the original "Star Trek" and "Star
Trek: The Next Generation" (on which he was associate producer and
co-producer, respectively). Many of the most familiar aspects of
these programs were the result of his ideas, and he speaks
candidly with the show's enigmatic host, Professor Neon, about the
production of these programs in this fascinating interview.
Professor Neon has featured programs focusing on topics ranging
from "Plan 9 From Outer Space" (with guest "Vampira" who starred
in the classic cult film), to Forrest J. Ackerman (publisher of
"Famous Monsters" magazine), to shows focused on topics from "The
Twilight Zone" to "The Three Stooges".
The half hour Internet version of the program is being distributed
biweekly on the Internet via the Internet Multicasting Service in
Washington D.C., on the "Internet Town Hall" channel, and is also
available as a file for retrieval by any Internet user from the
many Internet Multicasting / Internet Talk Radio archive sites
around the world. Users retrieving the audio files can then play
them on virtually any workstation, PC, Mac, or other computer
with even simple audio facilities.
The most recent show, as well as other information regarding the
program, can also be heard by calling Professor Neon's TV & Movie
Mania Machine" on (310) 455-1212.
The Internet version of the show is freely distributable via
computer networks and BBS systems. Use by over-the-air
broadcasters requires the permission of Vortex Technology. For
more information regarding accessing the show via the Internet,
please use the contact below. Inquiries regarding other access
and versions of the show for broadcast use are also invited.
CONTACT: Lauren Weinstein at Vortex Technology, Woodland Hills, CA.
(818) 225-2800 (9:30-5:30 PDT)
lauren@vortex.com
Notes to Internet folks:
Information regarding the show, including current guest schedule, etc.
is also available via FTP from site "ftp.vortex.com" (in the "tv-film-video"
subdirectory) or via gopher from site "gopher.vortex.com" (under the
"TV/Film/Video" menu item).
For a list of Internet Multicasting Service / Internet Talk Radio archive
sites to obtain (via FTP) the audio file for playback, send a message
(content is not important) to:
sites@radio.com
The debut of the Internet version of the show will run via Internet
Multicast from Interop on Thursday, May 5. FTP to site "ftp.media.org"
or "www.media.org" for schedule information. The audio file of the show
should become available in the archive sites for retrieval within a few
days, though exact timing is variable. The filenames will probably
be "mania1.au" for the audio and "mania1.txt" for the accompanying
descriptive text file, though the archive maintainers may change
the names at some point to fit their overall naming system. If you
have trouble locating the files after a few days, please let us know.
If you have any other questions regarding the program, feel free to
email or call.
In two weeks, our interview guest for the next show will be Joel Engel, the
author of the definitive Rod Serling biography: "The Dreams and Nightmares
of Life in the Twilight Zone," and of the newly released and highly
controversial new book, "Gene Roddenberry: The Myth and the Man
Behind Star Trek."
If you have any questions for Mr. Engel please email them to:
neon@vortex.com
as soon as possible. Thanks much!
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%