THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically ====================================================================== ISSN 1074-3111 Volume One, Issue Six October 1, 1994 ====================================================================== Editor-in-Chief: Scott Davis (dfox@fc.net) Co-Editor/Technology: Max Mednick (kahuna@fc.net) Consipracy Editor: Gordon Fagan (flyer@fennec.com) Information Systems: Carl Guderian (bjacques@usis.com) Computer Security: John Logan (ice9@fennec.com) ** ftp site: etext.archive.umich.edu /pub/Zines/JAUC U.S. Mail: The Journal Of American Underground Computing 10111 N. Lamar #25 Austin, Texas 78753-3601 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% IMPORTANT ADDRESSES - ============================================================================ To Subscribe to "TJOAUC", send mail to: sub@fennec.com All questions/comments about this publication to: comments@fennec.com Send all articles/info that you want published to: submit@fennec.com Commercial Registration for Profitable Media: form1@fennec.com Advertising Rates: rates@fennec.com ============================================================================ "The underground press serves as the only effective counter to a growing power, and more sophisticated techniques used by establishment mass media to falsify, misrepresent, misquote, rule out of consideration as a priori ridiculous, or simply ignore and blot out of existence: data, books, discoveries that they consider prejudicial to establishment interest..." (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989) %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Contents Copyright (C) 1994 The Journal Of American Underground Computing and/or the author of the articles presented herein. All rights reserved. Nothing may be reproduced in whole or in part without written permission of the Editor-In-Chief and/or the author of the article. This publication is made available periodically to the amateur computer hobbyist free of charge. Any commercial usage (electronic or otherwise) is strictly prohibited without prior consent of the Editor, and is in violation of applicable US Copyright laws. To subscribe, send email to sub@fennec.com %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% DISCLAIMER AND NOTICE TO DISTRIBUTORS - NOTE: This electronic publication is to be distributed free of charge without modifications to anyone who wishes to have a copy. Under NO circumstances is any issue of this publication, in part or in whole, to be sold for money or services, nor is it to be packaged with other computer software, including, but not limited to CD Rom disks, without the express written or verbal consent of the author and/or editor. To obtain permission to distribute this publication under any of the certain circumstances stated above, please contact the editor at one of the addresses above. If you have intentions of publishing this journal in any of the ways described above, or you are in doubt about whether or not your intentions conflict with the restrictions, please contact the editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com This publication is provided without charge to anyone who wants it. This includes, but is not limited to lawyers, government officials, cops, feds, hackers, social deviants, and computer hobbyists. If anyone asks for a copy, please provide them with one, or mail the subscription list so that you may be added. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% LET THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING ADVERTISE FOR YOU. Computer services, Online access, Books, Software, Video, Music, Wierdness, Publishing, Hardware, Anything! For more information, send electronic mail to: rates@fennec.com You will be mailed a detailed list of rates and other information. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% COMING SOON!!! The Journal's own World-Wide Web Home Page. You will be notified by mail when it is ready for use. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% NOW AVAILABLE: If you do not have FTP access, and would like to get back issues of the Journal, please mail: info@fennec.com for more information %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% We are sorry for the bounce test problems for this issue...we have (had) a new way of mailing, but it obviously failed miserably. We have the issue corrected. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 6 TABLE OF CONTENTS Cyberdoggles And Virtual Pork Carl Guderian EFF Summary Of The Edwards/Leahy Digital Telephony Bill Stanton McCandlish Zine FAQ Jerod Pore Legion Of Doom T-Shirts Ad Chris Goggans A Point And Click Society Scott Davis Keynote Address: Crypto Conference Bruce Sterling Jackboots On The Infobahn John Perry Barlow Notes From Cyberspace, Volume 3 Readers Pornography Fouls Internet Paul Pihichyn Security / Coast FTP Unknown On the Subject of CyberCulture George Phillips A Comment On Clipper Azrael Sex, The Internet And The Idiots K.K. Campbell NBC's Anti-Net Campaign Alaric The Miami Device Project Marty Cyber Cybersell Michael Ege Some Info On Green Card Spam Unknown Cable Resources On The Net John Higgins IDS Announces New Rochelle, New York POP (AC 914) green@ids.net The Media List Adam M. Gaffin A TeleStrategies Event/Commercial Internet eXchange Unknown Scream Of Consciousness From WIRED 1.1 Stewart Brand Digital Cash Mini-FAQ For The Layman Jim Miller Patent Searching Email Server Now Open Gregory Aharonian Five "Hackers" Indicted for Credit Card/Computer Fraud CUD/AP Wire Clipper T-Shirts Norman Harman Cybernews Debuts Patrick Grote PC Magazine Declares The PIPELINE Best Internet Service James Gleick Scout Report Subscriptions Exceed 10,000 Internic The Future Of The Net Is At Hand James Parry Galactic Guide FAQ Steve Baker Employment Background Checks Agre/Harbs %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% The Computer Is Your Friend -Unknown Send Money, Guns, And Lawyers -H. S. Thompson %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CYBERDOGGLES AND VIRTUAL PORK - A SCENARIO FOR INTERNET II By Carl Guderian As one battle gets underway another is joined. While the EFF and others work to defend the noisy, colorful anarchy of the Net from the net.cops, the latter have begun gearing up for the endgame. If it's true that the electronic frontier is getting crowded while its newer colonists consider it too bare, then another system will be needed in a few years. That's the virtual Valley of Megiddo, the site of the (next) Final Battle between the techno-romantics and the corporate greyfaces. Internet II, or whatever they'll call it, is now only a vague idea in the minds of a few bureaucrats and infotainment industry execs, but it'll wind up a Mall of America, Panopticon, City of Quartz, or some other negative social metaphor (Brazil?). The first Internet grew up free because it was defined wholly by the users. Internet II, by contrast, will be a hybrid of corporate and government visions, combining the worst of both in a kind of Mendelian genetic distribution in which all offspring are defective. To the government it's a tax base and surveillance network; to industry it's a direct channel to a self-selecting, well-heeled market. To users the Internet is a community for which they've worked too hard to let it be taken away without a fight. The most obvious model for the Internet II standard is the U.S., or any other, civilian space program. It is about nothing so much as itself. The aerospace companies that are today inseparable from national space establishments make rockets or communications satellites. Like the designers of Internet II, they are concerned with delivering product (audiences) to the customers (advertisers). People generally support the space program because they hope it will open up space travel to everybody, from interplanetary honeymooners to lunar Libertarians (Jetsonian democracy!). Likewise, the Internet is popular because it's a vehicle for forming communities and getting free stuff. But Internet II will be about bandwidth, markets and security. The last item is emphasized because such a huge investment must be protected somehow, from the users of course. Whatever vision there might have been will be refocused instead on infrastructure. Call it information superhighway hypnosis, a trail of yellow stripes stretching to the horizon. Truly a vision to stir the soul. The pork barrel politics that characterize all big government projects will find a new arena on Internet II. The government can no longer pay for megaprojects like Internet II, but it can grant electronic Letters of Marque for companies to plunder the virtual seas under the federal colors. Obviously, the company or consortium that gets to write the new, none-dare- call-it-proprietary Internet protocols will have a leg up on competitors, sorta like the advantage Microsoft officially doesn't have over other developers for Windows. In the current and upcoming Congressional funding battles, watch for posturing by lawmakers from whatever states the infotainment conglomerates call their nominal homes (Austin? Provo? Los Gatos?). The relatively meager funding doled out by the government will become an instrument of control, and privacy and free expression on Internet II will be the first to go. While Reagan preached getting the government off the backs of the people, Transportation Secretary Elizabeth (Mrs. Bob) Dole ordered states to raise drinking ages and enforce seat-belt laws or else lose federal funding for highway development. The states meekly complied. Would-be government contractors will be told, adopt a Clipper-like standard or don't bother to apply. Infotainment industry execs will be grilled by Congress for allowing "pone" on the net. Subsequently, said execs will promise to read private e-mail and censor discussions in exchange for easy passage of whatever bill they're promoting at the time. In 1985, the Parents Music Resource Center, led by Tipper (Mrs. Albert) Gore and financed by the likes of Mike Love of the Beach Boys, instigated Senatorial hearings on raunchy rock lyrics. Recording studio heads and distributors agreed to label and categorize "offensive" music in hopes Congress would tax blank tapes to offset revenue losses the industry attributed to home taping. Happily, the bill died and the hearings degenerated into a circus. But community standards on Internet II may be those of Memphis, Tennessee, if a recent court decision stands, and the only cyber-sex will be the user squealing like a pig for multimedia producers, petty bureaucrats, and self- appointed moral watchdogs. Government attempts to rein in the Internet community will continue no matter which party is in power. Repression smells the same whether it's for "national security," "community standards," or raising PG kids in an X-rated world. Corporate plans for Internet II are even less palatable. The future dream is a shopping scheme, a Third Mall from the Sun. This corporate paradigm will kill the Internet as surely as will government interference and turn it into Òan Internet of shopkeepers. In a shopping mall the offerings are calculated to offend no one, so they please no one. Though a mall could, in theory, serve diverse interests, in reality it does not. Individual tastes being what they are, a customer could be offended by what it finds upon wandering into the wrong shop, and may leave the mall without buying anything. As a result, the mall loses the customer to a rival mall. To avoid this risk, the mall operator rents to shops with watered down selections, nothing too daring. Similarly, in a corporate online service, the range of allowable discussion topics is kept small to prevent users from who access the wrong discussion groups. Though itÕs possible to restrict access to the forum without censoring discussion within it, most services take the lazy way out and forbid them altogether, in case a user objects to their very existence. So much for open discussion on Internet II. The corporate vision accommodates shopkeepers who hate customers who browse but don't buy. Customers can turn a mall into a kind of public space for the price of a few sodas and pizza slices. Americans online on Internet II, however, will have to pay by the hour just to hang around. The ticking clock will prompt them to hurry up and pay for something to download. After being on the clock at work, consumers will get to log on and shop on the clock. Constant reminders of a rising bill will discourage idle chatting on the newsgroups, further restricting discussion on Internet II. Security will become an issue as cyberspace, once considered a kind of public space, becomes privatized. As with Los Angeles, Internet II will be vandalized by users who will take no pride in it because they will not own it. The Secret Service will work as mall cops for the owners of Internet II. The promise of "500 channels" betrays the limits of corporate vision. Internet II will be "one-to-many" like cable TV instead of the "many-to-many" structure of the common carriers, because the former facilitates billing and control by local monopolies. Also, customers are not accustomed to pay-per-call on a local line, but they're getting used to pay-per-view programming on cable. Will you cuss and spit when you drop offline during a rainstorm? You will...with [censored]. In the end, the corporate Internet will be designed for consumption, not community. Online services consider the latter an impediment to steady profits. Bovine consumers shop contentedly on 500 channels; discontented talkers just hog the lines. If corporate services had to destroy online communities that spring up like weeds in their well-kept yards, they would. Fortunately, they wonÕt have to; the Online Mall is barren ground. By some estimates, 1998 is the deadline to keep the Net from turning into the Third Mall from the Sun or that sanitized 1901 Kansas-style underground city in "A Boy and His Dog." Here are ways to kill that serpent in its shell. - Breathe down the necks of the architects of Internet II. Infotainment industry demands may require physical features that facilitate billing and copyright protection. The IRS and the cops will certainly want their own window into the Net. What the users want, assuming they know, is considered irrelevant. Change that by working through groups like the Electronic Frontier Foundation, but keep them from accepting "compromise" measures to wiretap "only" certain communications channels. It's like prison etiquette, in which the proper response to a proprietary hand on the shoulder is either a sock on the jaw or meek acceptance of what comes next. Given what's at stake, such a savage ethic applies. Freedom lent is freedom lost. - Boycott obvious government lapdogs. Do not surrender the Internet to the government; it has no legitimate claim to it. The Internet is like an abandoned military base built into a community by squatters. The original tenants have long ago gotten their money's worth from it and cannot take credit for the value added by the new settlers. The Internet communications standard, TCP/IP, which turned all the networks into the Internet, is public domain. The feds don't own it any more than they own the measurement of one U.S. gallon. The government still owns high-speed backbones, such as the National Science Foundation's NSFnet, and it can and does allow semi-private consortia like Merit to operate and maintain them. The users should claim the Internet, however, by usufruct ("fruitful use"), a legal concept under which squatters gain the right to occupy a structure in exchange for having improved it. If all else fails, boycott Internet II and go back to TCP/IP. The latter may not have the bandwidth and the bells and whistles of Internet II, but it works well enough and won't have wiretap-friendly features built into it. Most projected growth will come from the online services dumping settlers by the millions on Internet II, taking the load off the present Internet. Currently dedicated but unused Internet addresses can be redistributed. TCP/IP, the current protocol, can support 20+ million people worldwide, which is probably the proportion of the population willing and able to protect their freedom online. Even without an Internet, there are systems that will work in a pinch, like FIDOnet, invented by Tom Jennings and a few others. Using personal computers and ordinary phone lines, FIDOnet delivers e-mail to 30,000+ sites in the world. So alternatives exist, though it would be a shame to have to abandon a community just when it was starting to mature. De-evolution of the Internet community is a likely outcome but it's not inevitable. For the first time since the Whiskey Rebellion there's a chance to redirect American history from the seemingly endless march to centralized control. The technology is pretty cheap and widely available (unlike rockets), so it's a rare opportunity for real grass-roots action to create something that people can actually use. Internet doesn't have to go the way of other Big Science projects. But it will take a real fight; the other side won't deal if it doesn't think it has to. At stake is the future of the online community. Civilization built in an Autonomous Zone or pay-per-view surveillance (guess who pays?) in the Third Mall from the Sun: WHICH WILL IT BE? Those words fill the screen, accompanied by Raymond Massey whispering and chorus singing same, in "Things to Come." Fadeout). The Third Mall from the Sun concept belongs to late comic genius Bill Hicks. Burn joss money in his memory to help cover his bar tab in the afterlife. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% EFF SUMMARY OF THE EDWARDS/LEAHY DIGITAL TELEPHONY BILL From Stanton McCandlish OVERVIEW -------- The Edwards/Leahy Digital Telephony bill places functional requirements on telecommunications carriers in order to enable law enforcement to continue to conduct authorized electronic surveillance. It allows a court to impose fines on carriers that violate the requirements, and mandates that the processes for determining capacity requirements and technical standards be open and public. The bill also contains significant new privacy protections; including an increased standard for government access to transactional data (such as addressing information contained in electronic mail logs), a requirement that information acquired through the use of pen registers or trap and trace devices not disclose the physical location of an individual, and an expansion of current law to protect the radio portion of cordless telephone conversations from unauthorized surveillance. SCOPE OF THE BILL. WHO IS COVERED? ----------------------------------- The requirements of the bill apply to "telecommunications carriers", which are defined as any person or entity engaged in the transmission or switching of wire or electronic communications as a common carrier for hire (as defined by section 3 (h) of the Communications Act of 1934), including commercial mobile services (cellular, PCS, etc.). The bill also applies to those persons or entities engaged in providing wire or electronic communication switching or transmission service to the extent that the FCC finds that such service is a replacement for a substantial portion of the local telephone exchange. The bill does not apply to online communication and information services such as Internet providers, Compuserve, AOL, Prodigy, and BBS's. It also excludes private networks, PBX's, and facilities which only interconnect telecommunications carriers or private networks (such as most long distance service). REQUIREMENTS IMPOSED ON CARRIERS -------------------------------- Telecommunications carriers would be required to ensure that they possess sufficient capability and capacity to accommodate law enforcement's needs. The bill distinguishes between capability and capacity requirements, and ensures that the determination of such requirements occur in an open and public process. CAPABILITY REQUIREMENTS ----------------------- A telecommunications carrier is required to ensure that, within four years from the date of enactment, it has the capability to: 1. expeditiously isolate the content of a targeted communication within its service area; 2. isolate call-identifying information about the origin and destination of a targeted communication; 3. enable the government to access isolated communications at a point away from the carrier's premises and on facilities procured by the government, and; 4. to do so unobtrusively and in such a way that protects the privacy and security of communications not authorized to be intercepted (Sec. 2601). However, the bill does not permit law enforcement agencies or officers to require the specific design of features or services, nor does it prohibit a carrier from deploying any feature or service which does not meet the requirements outlined above. CAPACITY REQUIREMENTS --------------------- Within 1 year of enactment of the bill, the Attorney General must determine the maximum number of intercepts, pen register, and trap and trace devices that law enforcement will require four years from the date of enactment. Notices of capacity requirements must be published in the Federal Register (Sec. 2603). Carriers have 4 years to comply with capacity requirements. PROCESS FOR DETERMINING TECH. STANDARDS TO IMPLEMENT CAPABILITY REQUIREMENTS ---------------------------------------------------------------------------- Telecommunications carriers, through trade associations or standards setting bodies and in consultation with the Attorney General, must determine the technical specifications necessary to implement the capability requirements (Sec. 2606). The bill contains a 'safe harbor' provision, which allows a carrier to meet its obligations under the legislation if it is in compliance with publicly available standards set through this process. A carrier may deploy a feature or service in the absence of technical standards, although in such a case the carrier would not be covered by the safe harbor provision and may be found in violation. Furthermore, the legislation allows any one to file a motion at the FCC in the event that a standard violates the privacy and security of telecommunications networks or does not meet the requirements of the bill (Sec. 2606). If petitioned under this section, the FCC may establish technical requirements or standards that: 1) meet the capability requirements (in Sec. 2602); 2) protect the privacy and security of communications not authorized to be intercepted, and; 3) encourage the provision of new technologies and services to the public. ENFORCEMENT AND PENALTIES ------------------------- In the event that a court or the FCC deems a technical standard to be insufficient, or if law enforcement finds that it is unable to conduct authorized surveillance because a carrier has not met the requirements of this legislation, the Attorney General can request that a court issue an enforcement order (an order directing a carrier to comply), and/or a fine of up to $10,000 per day for each day in violation (Sec. 2607). However, a court can issue an enforcement order or fine a carrier only if it can be determined that no other reasonable alternatives are available to law enforcement. This provision allows carriers to deploy features and services which may not meet the requirements of the bill. Furthermore, this legislation does not permit the government to block the adoption or use of any feature or service by a telecommunications carrier which does not meet the requirements. The bill requires the government to reimburse carriers for all reasonable costs associated with complying with the capacity requirements. In other words, the government will pay for upgrades of current features or services, as well as any future upgrades which may be necessary, pursuant to published notices of capacity requirements (Sec. 2608). There is $500,000,000 authorized for appropriation to cover the costs of government reimbursements to carriers. In the event that a smaller sum is actually appropriated, the bill allows a court to determine whether a carrier must comply (Sec. 2608 (d)). This section recognizes that telecommunications carriers may not be responsible for meeting the requirements if the government does not cover reasonable costs. The government is also required to submit a report to congress within four years describing all costs paid to carriers for upgrades (Sec. 4). ENHANCED PRIVACY PROTECTIONS ---------------------------- The legislation contains enhanced privacy protections for transactional information (such as telephone toll records and electronic mail logs) generated in the course of completing a communication. Current law permits law enforcement to gain access to transactional information through a subpoena. The bill establishes a higher standard for law enforcement access to transactional data contained electronic mail logs and other online records. Telephone toll records would still be available through a subpoena. Under the new standard, law enforcement is required to obtain a court order by demonstrating specific and articulable facts that electronic mail logs and other online transactional records are relevant and material to an ongoing criminal investigation (Sec. 10). Law enforcement is also prohibited from remotely activating any surveillance capability. All intercepts must be conducted with the affirmative consent of a telecommunications carrier and activated by a designated employee of the carrier within the carrier's facilities (Sec. 2604). The bill further requires that, when using pen registers and trap and trace devices, law enforcement will use, when reasonably available, devices which only provide call set up and dialed number information (Sec. 10). This provision will ensure that as law enforcement employs new technologies in pen register and trap and trace devices, it will not gain access to additional call setup information beyond its current authority. Finally, the bill extends the Electronic Communications Privacy Act (ECPA) protections against interception of wireless communications to cordless telephones, making illegal the intentional interception of the radio portion of a cordless telephone (the transmission between the handset and the base unit). CELLULAR SCANNERS ----------------- The bill makes it a crime to possess or use an altered telecommunications instrument (such as a cellular telephone or scanning receiver) to obtain unauthorized access to telecommunications services (Sec. 9). This provision is intended to prevent the illegal use of cellular and other wireless communications services. Violations under this section face imprisonment for up to 15 years and a fine of up to $50,000. IMPROVEMENTS OF THE EDWARDS/LEAHY BILL OVER PREVIOUS FBI PROPOSALS ------------------------------------------------------------------ The Digital Telephony legislative proposal was first offered in 1992 by the Bush Administration. The 1992 version of the bill: * applied to all providers of wire or electronic communications services (no exemptions for information services, interexchange carriers or private networks); * gave the government the explicit authority to block or enjoin a feature or service that did not meet the requirements; * contained no privacy protections; * contained no public process for determining the capacity requirements; * contained no government reimbursement (carriers were responsible for meeting all costs); * would have allowed remote access to communications by law enforcement, and; * granted telecommunications carriers only 18 months to comply. The Bush Administration proposal was offered on capitol hill for almost a year, but did attract any congressional sponsors. The proposal was again offered under the Clinton Administration's FBI in March of 1993. The Clinton Administration's bill was a moderated version of the original 1992 proposal: * It required the government to pay all reasonable costs incurred by telecommunications carriers in retrofitting their facilities in order to correct existing problems; * It encouraged (but did not require), the Attorney General to consult with telecommunications industry representatives and standards bodies to facilitate compliance, * It narrowed the scope of the legislation to common carriers, rather than all providers of electronic communications services. Although the Clinton Administration version was an improvement over the Bush Administration proposal, it did not address the larger concerns of public interest organizations or the telecommunications industry. The Clinton Administration version: * did not contain any protections for access to transactional information; * did not contain any public process for determining the capability requirements or public notice of law enforcement's capacity needs; * would have allowed law enforcement to dictate system design and bar the introduction of features and services which did not meet the requirements, and; * would have allowed law enforcement to use pen registers and trap and trace devices to obtain tracking or physical location information. Locating Relevant Documents =========================== ** Original 1992 Bush-era draft ** ftp.eff.org, /pub/EFF/Policy/FBI/Old/digtel92_old_bill.draft gopher.eff.org, 1/EFF/Policy/FBI/Old, digtel92_old_bill.draft http://www.eff.org/pub/EFF/Policy/FBI/Old/digtel92_old_bill.draft bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital Telephony; file: digtel92.old ** 1993/1994 Clinton-era draft ** ftp.eff.org, /pub/EFF/Policy/FBI/digtel94_bill.draft gopher.eff.org, 1/EFF/Policy/FBI, digtel94_bill.draft http://www.eff.org/pub/EFF/Policy/FBI/digtel94_bill.draft bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital Telephony; file: digtel94.dft ** 1994 final draft, as sponsored ** ftp.eff.org, /pub/EFF/Policy/FBI/digtel94.bill gopher.eff.org, 1/EFF/Policy/FBI, digtel94.bill http://www.eff.org/pub/EFF/Policy/FBI/digtel94.bill bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital Telephony; file: digtel94.bil ** EFF Statement on sponsored version ** ftp.eff.org, /pub/EFF/Policy/FBI/digtel94_statement.eff gopher.eff.org, 1/EFF/Policy/FBI, digtel94_statement.eff http://www.eff.org/pub/EFF/Policy/FBI/digtel94_statement.eff bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital Telephony; file: digtel94.eff %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 'ZINE FAQ By Jerod Pore (jerod23@well.sf.ca.us) This file is Shareright 1994 by Jerod Pore; you may (and please do) copy, reproduce, replicate and distribute this information however, whereever and in whatever format, and as often as you wish, as long as this sentence is included. Answers to Frequently Asked Questions. What are zines? Zines are small press publications with a press run of 15 - 5,000. They often deal with obscure or controversial subjects, or they're about the life of the publisher, or they're about the latest underground muzak sensation. How does one find out about zines? The best place to start is with Factsheet Five or Factsheet Five-Electric. We review 1,000 - 1,500 zines every three months (more or less). We provide ordering information, size, quality of reproduction, contents and what we think about a zine. Once you get a few zines that sound interesting, you'll notice other zines referred to. Pretty soon you'll have more reading material then you know what to do with. How does one produce a zine? That's beyond the scope of this document. But my stock answer is go to lunch at 11:30 am, get back by 12:15 and you should have plenty of time to use the equipment at school or at work. Write down your thoughts (I suggest doing artwork on your own time), photocopy 40 or 50 copies, send one to us and to a few zines you think would be interested in yours. You may want to get the Zine Publishers' Resource guide, either $3.00 from Seth at the address below, or the prior version is available from the ftp and gopher sites. How does one get the zines? When ordering zines, cash is the best medium of exchange. Forget what your mother told you about evil thieves stealing one dollar bills out of mail boxes. If you absolutely must send a check or money order (and a money order is preferred over a check), then make it out to the name in the address portion of the reviews. However, many people publish zines under pseudonyms. Unless available only for a ridiculous amount of money, just send cash. Many zines, especially personal zines, science fiction fanzines and anarchist zines are available for what is quaintly known as "The Usual." "The Usual" is your zine or tape or record or calendar in trade, or a well-written Letter of Comment on the subject of the zine, or $2 - $3. Be warned about a few things. There are no guarantees. Checks are likely to be thrown away. Some zine names with especially offensive titles have often had their mail thrown away by self-righteous born- again postal workers, I kid you not! If the name of the zine is apt to offend your third-grade teacher, don't put it on the envelope. Some zines published in rather provincial parts of the world won't get their mail if the publisher's name isn't on the envelope, so whatever the name is in address, that's the name that should go on the envelope. I can work only with what information is provided me. I'll post any special requirements that are conveyed to me. If a zine is free, you may want to help out with some stamps. Free often translates as "The Usual," and many anarchists will accept food stamps. How to contact us with questions, etc. regarding F5 - either the paper or electronic versions. The email address for Factsheet Five and Factsheet Five - Electric is: jerod23@well.sf.ca.us Once upon a time, Seth had an email address. It may be reactivated in the future. The phone number for Factsheet Five (paper only) is +1-415-668-1781 Where should stuff be sent? For anything that can't be sent electronically, which is most of the stuff we deal with; comments, questions, feedback, donations, zines and other contributions to the defense of free expression rights around the world should be sent to either of these addresses: Factsheet Five Seth Friedman PO Box 170099 San Francisco CA 94117-0099 (This is the *only* address for subscriptions to the paper version) Factsheet Five Jerod Pore 1800 Market St. San Francisco CA 94102-6297 (This address is good for items that can't be sent to a PO Box) If you have a preference of reviewers, then send your zine to either of the above addresses as you see fit. Please, though, send your zine to just *ONE* address. Multiple copies just slow us down. I do most of the Fringe, Hate, Rant, SubGenius and Science Fiction/Fantasy zines. Seth either reviews or distributes the rest. We have a couple of long-time reviewers for two niches. They publish their own review zines so you get twice the coverage. We must stress that you send poetry to Luigi-Bob, because poetry sent to San Francisco won't be reviewed for a couple of issues. Send your queer, bi or especially prurient zines to: Larry-bob Queer Zine Explosion PO Box 591275 San Francisco CA 94159-1275 Send all poetry or prose/poetry zines with lots of poetry to: Luigi-Bob Drake Burning Press PO Box 585 Lakewood OH 44107 How does one obtain the reviews of zines? The files that comprise Factsheet Five - Electric are available for online reading or downloading from WELL or with a gopher client with gopher gopher.well.sf.ca.us. The files are also available via anonymous ftp from etext.archive.umich.edu in /pub/Factsheet.Five. The prior issue is in /pub/Factsheet.Five/Last.Issue. The WWW site is http://www.well.com/ You may subscribe to Factsheet Five - Electric by emailing me with "subscribe" in the subject line and your email address as the *entire* text. The files are sent out as they become available. Email subscriptions are sent out *last*, as it's a real pain in the ass for me to deal with. F5-E is available from other ftp and gopher sites, as well as BBS's around the world, but I don't track other locations. What is the best method of receiving the review files? The WELL is the "best" place. Not only is The WELL the greatest BBS in CyberSpace (no, I don't get a kickback; I pay $30-50 a month to be on WELL) it's the homebase for F5 - Electric. The most recent files are there. Online zines that are sent to me are there. News, gossip and rumours about zines and other underground media are there. 2600, Full Disclosure, bOING-bOING and other zinesters are there. The WELL is, however, somewhat expensive at $15.00 a month and $2.00 an hour. After WELL, ftp, gopher or WWW are the next best ways of getting the files. Our ftp sites accept anonymous as a login and your return address as a password. For some people, especially those of you on FidoNet, Compu$erve and other services with email-only gateways to The Internet, email is the *only* way to get the files. Unfornuately, the large file sizes (files range from 8 - 100k) prevent many locations from receiving them through email, especially uunet and uucp sites. How do ftp, gopher and WWW users know when new or updated files are available? For now, updates to F5-E will be announced in the newsgroups that attract people interested in zines: alt.zines and rec.mag An excellent suggestion was made about having an email service that announces just the names of the new or updated files to ftp users. I've juggled two email subscription lists, so this idea will be too much of a hassle to implement. I don't know if the zines-list is still active. If it is, I might send announcements out that way. What is alt.zines? alt.zines is a Usenet newsgroup about zines. It's where we discuss zine publishing, hype our zines, bitch about mainstream publications trying to coopt zines and so forth. It's unmoderated, but there's a few of us there most of the time to answer these questions over&over&over and to point out that your slick publication about Christian technology with a circulation of over 150,000 is *not* a zine. Much of the posts in alt.zines are xposted to rec.mag, to benefit people at sites where the anal-retentive administrators refuse to carry the alt. hierarchy. May the files be reprinted or posted elsewhere? All files (just like this one) are shareright. You may reproduce the information contained within them freely as long as others may reproduce that same information. In other words, you may use but not copyright these files. Shareright does not prevent you from charging money (or whatever your preferred medium of exchange is) for distribution. Including pertinent parts of this file, and giving credit to the reviewers is especially good for your karma, but not absolutely required to use what you wish of the review files. We're more interested in the widespread dissemination of the information. BBS operators are especially encouraged to make whatever files you deem appropriate available to your users. How does one submit reviews? For now, email the reviews to me. This could be subject to change, once we work out everything. Each file will have reviews of one or more zines that are somehow categorized together by subject matter or by reviewer. Also feel free to post to alt.zines reviews of zines you have come across or to hype your own zines. I've adopted the nerdy HTML format that is used for WWW browsing. While sticking to the format is nice, it is not necessary, as long as all pertinent information is included. However if the reviews are to be accessible by the Web, then you had better do them this way. Please keep all reviews in vanilla ASCII format. Also keep them shareright. We are especially in need of reviews ezines and of zines that are published outside of North America. Now, I get zines from Australia and, since I used to live there, I understand the dialect and cultural references. We don't have the resources to review zines that aren't published in English. I'd rather that F5-Electic not be an English only publication. If you get zines from other parts of the world and are willing to review them, please send the reviews to me. We are carrying a listing of ezines, thanks to johnl@netcom.com, but we would like to get more reviews of ezines, too. What are the subscription rates and/or sample copy prices for the print version of Factsheet Five? Single issues: US Newsstand Cover Price: $3.95 (Marketing sucks!) US via 1st Class: $6.00 Canada, Mexico: $6.00 Elsewhere in the world: $9.00 Six issue Subscription: US 3rd Class: $20.00 Friend Rate* $40.00 * First class, in an envelope, with the publisher's eternal gratitude AND the occassional subscriber goodie, like the Zine Publisher's Guide, or 2 pounds of zines for $3.00. Canada, Mexico: $35.00 UK, Europe, Latin America $45.00 Asia, Africa, Pacific $55.00 "We accept for payment cash (US or otherwise), check or money order drawn in US funds (payable to Factsheet Five), or IRCs (at the rate of $0.50 each). Prisoners may get single issues by paying in stamps." Please foward orders to: R. Seth Friedman P.O. Box 170099 San Francisco, CA 94117-0099 Will the subscription list (for the paper version) be sold? Seth plans making the list available to lots of cool companies like Archie McPhee, Blue Ryder, Co-Op America, and Kitchen Sink Press. If you have an aversion to receiving cool catalogs and other neat stuff in the mail, just mention it with your order. We'll be sure to keep your address private. What about the subscription list to the electronic version? The only thing I'll do with the email list is dump it when I get fed up with emailling huge files. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% LEGION OF DOOM T-SHIRTS!! Get 'em By Chris Goggans After a complete sellout at HoHo Con 1993 in Austin, TX this past December, the official Legion of Doom t-shirts are available once again. Join the net luminaries world-wide in owning one of these amazing shirts. Impress members of the opposite sex, increase your IQ, annoy system administrators, get raided by the government and lose your wardrobe! Can a t-shirt really do all this? Of course it can! "THE HACKER WAR -- LOD vs MOD" This t-shirt chronicles the infamous "Hacker War" between rival groups The Legion of Doom and The Masters of Destruction. The front of the shirt displays a flight map of the various battle-sites hit by MOD and tracked by LOD. The back of the shirt has a detailed timeline of the key dates in the conflict, and a rather ironic quote from an MOD member. (For a limited time, the original is back!) "LEGION OF DOOM -- INTERNET WORLD TOUR" The front of this classic shirt displays "Legion of Doom Internet World Tour" as well as a sword and telephone intersecting the planet earth, skull-and-crossbones style. The back displays the words "Hacking for Jesus" as well as a substantial list of "tour-stops" (internet sites) and a quote from Aleister Crowley. All t-shirts are sized XL, and are 100% cotton. Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for postage. Send checks or money orders. Please, no credit cards, even if it's really your card. Name: __________________________________________________ Address: __________________________________________________ City, State, Zip: __________________________________________ I want ____ "Hacker War" shirt(s) I want ____ "Internet World Tour" shirt(s) Enclosed is $______ for the total cost. Mail to: Chris Goggans 603 W. 13th #1A-278 Austin, TX 78701 These T-shirts are sold only as a novelty items, and are in no way attempting to glorify computer crime. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% A POINT AND CLICK SOCIETY LEARN TO DRIVE, OR GET OFF THE ROAD An Editorial By Scott Davis (dfox@fc.net) As a computer support professional, I am unfortunate enough to see some of the developments pertaining to the Internet as they occur. I say "unfortunate" not because what I see is so terrible, but what I see never ceases to knock me off of my feet. What I am referring to is the massive wave of new people coming on to the "Inpho-s00per Highway" who if not for icons to click on and a mouse to click with, would not be able to use a personal computer...much less some global network. Uhh..uhh I thank I'm referrin' to that "Inter-Net" thang... People are being sucked into a revolution of digital "Everything". Computers do their taxes, balance their books, order groceries and other products, and deliver electronic mail...among other things. But, it bugs me to no end to see somebody with an e-mail address from AOL. It makes me want to mail them back and tell them "HEY! Did you know that you are on the dirt road that runs beside the Internet?" Or tell them to "Get out of the ghetto of the Internet." "Do you know what you're doing?" What the big companies have done is give the masses a loaded gun... and the masses have never fired a weapon in their life! They've given them a Porsche 944...and they've never driven a car. But I also question the common sense of the average computer user. "Do you know what this computer does?" The bottom line is that there are more things to do with this thing than point and click on all of your pretty applications. Services such as AOL promote things like "electronic mail" and "Access to the Internet". But how many people who purchased the software did any reading or research as to WHAT the Internet is. WHAT is electronic mail? I know that I'll probably get a thousand flames for this article, and they'll say 'We were all newbies once!" I am completely aware of that, but when we (people who have been on the Net for 5+ years) were new, we had to learn every aspect of what we were getting into. There was no point-and-click options. If we did not know command line operations, we didn't surf! One problem can be contributed to the press. This is the fact that they have made "The Internet" and Info-SuperHighway" buzz-phrases that people are going to be attracted to because they sound "cool". There are no PC-based computers being marketed without Dos and Windows to this editor's knowledge. When the customer sees "Dos and Windows", how many people do you think say, "Hey Look...it's got Dos too!" It simply does not happen. Who cares what an operating system is, right? Well, the fact is...you better care. Because without an operating system, you wouldn't be able to point and click on you pretty little icons. I commend AOL, Compuserve, Microsoft and others who develop software for the masses. They do a fine job and a great service to the world. Computing just would not be the same without them (I guess). Computers are being mass-marketed and distributed to the public like social security cards. For the big-boys in the industry, this is good. It means profit, jobs, and market-share...and that sometime soon, every household in America will have at least one computer (or doorstop) and the owner will not know the first thing about it. Commercial software manufacturers and Internet service providers are looking at this as a slaughter. Rounding up the cattle, as it were. This is fine with me, but it is the end-user's responsibility to do work on his/her own to know what this "Hi-Tek-Hiway" is. There are ways not to become sheep. And if you don't do your homework, you don't deserve better. I think that people should be required to attend some in-depth computer courses before being able to buy one. * Computer Basics: This class would last a total of 100 hours. Two hours a night, three nights a week. Windows and other applications would not be discussed. The students would have to prove that they are proficient in Dos, Unix, or whatever command-line operating system their PC used. At the end of the 100 hour course, if they passed the command-line stuff, they would be permitted to attend a class that provided instruction on GUI's and other software. * Internet Basics 101: If the sheep are so eager to get on this damn SuperHighway, learn what it is about. Learn where it origninated and what it can do. --- and learn how NOT to be a headache to others. Ethics would be a portion of the instruction. Learn who you are, evaluate your place on the Net, and know that no matter who you are... there are bigger and better hackers out there. * Learn the difference between the Highway and the shoulder. * What is "REAL" access and just a gateway to where you WISH you were. * Hardware Troubleshooting: If my floppy disk drive is not working, I'd kinda like to know what to do to see if it is actually broken. If you purchased a $30,000 car and there were no service centers in the world, wouldn't you like to know how to change your oil? * Telecommunications Instruction: What is a modem? What does it do? Learn how to use non-commercial telecom software. Find some modem software package that does not come from a major service provider or is not used with the most popular GUI in the world...and call up a few local bulletin board systems. Also, if my modem is not functioning, I'd like to know some of the reasons why, and try to correct them. These are some simple suggestions that I believe everyone should do before purchasing a computer system. Of course, if you have been using computers for an extended period of time and proclaim to know how they work, there would be a CLEP test for you. Answer 5 questions about hardware, three questions on Internet, and answer NO to the question "Do you use Windows?" and you'll be on your way home with that new system. This is certainly not an attempt to hammer commerical services and/or providers, certain software programs designed to make computing easier, or the people who use them. It's simply a statement saying "Know what you're doing, make yourself open to fluctuations in trends, educate yourself on global networking, and have a nice day." There is no excuse for ignorance. Open your documentation, go to the book store, whatever. Do your homework. Otherwise, pull over...you're going to jail for driving without a license. There are political fights going on right now over different aspects of this "SuperHighway" that you're so eager to get on. The decisions made will ultimately affect you. Do you care? You should. There are lawyers, lobbyists, organizations such as the Electronic Frontier Foundation, and many individuals fighting for your right to use the services that you use. They are fighting to keep it "usable." In closing, be alert, be aware...and get educated. The light at the end of the tunnel to success might be a locomotive! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% KEYNOTE ADDRESS : CRYPTOGRAPHY CONFERENCE By Bruce Sterling (bruces@well.sf.ca.us) Hello everybody. It's quite an honor to be delivering the keynote address -- a *thankfully brief* keynote address -- at this conference. I hope to clear the decks in short order, and let you spend an engrossing afternoon, listening to an intense discussion of complex and important public issues, by highly qualified people, who fully understand what they're talking about. Unlike myself. Before all this begins, though, I do want to establish a context for this conference. Let me briefly put on my professional dunce-hat, as a popular-science writer, and try to make it clear to you exactly what the heck is going on here today. Cryptography. The science and study of secret writing, especially codes and cypher systems. The procedures, processes, measures and algorithms for making and using secret exchanges of information. *Secret* exchanges, done, made and conducted without the knowledge of others, whether those others be governments, competitors, local, state or federal police, private investigators, wiretappers, cellular scanners, corporate security people, marketers, merchandisers, journalists, public health officials, squads for public decency, snoopy neighbors, or even your own spouse, your own parents, or your own children. Cryptography is a way to confine knowledge to the initiated and the privileged in your circle, whatever that circle might be: corporate co-workers, fellow bureaucrats, fellow citizens, fellow modem-users, fellow artists, fellow writers, fellow influence-peddlers, fellow criminals, fellow software pirates, fellow child pornographers. Cryptography is a way to assure the privacy of digital way to help control the ways in which you reveal yourself to the world. It is also a way to turn everything inside a computer, even a computer seized or stolen by experts, into an utterly scrambled Sanskrit that no one but the holder of the key can read. It is a swift, powerful, portable method of high-level computer security. Electronic cryptography is potentially, perhaps, even a new form of information economics. Cryptography is a very hot issue in electronic civil liberties circles at the moment. After years of the deepest, darkest, never-say-anything, military spook obscurity, cryptography is out of the closet and openly flaunting itself in the street. Cryptography is attracting serious press coverage. The federal administration has offered its own cryptographic cure-all, the Clipper Chip. Cryptography is being discussed openly and publicly, and practiced openly and publicly. It is passing from the hands of giant secretive bureaucracies, to the desktop of the individual. Public-key cryptography, in particular, is a strange and novel form of cryptography which has some very powerful collateral applications and possibilities, which can only be described as bizarre, and possibly revolutionary. Cryptography is happening, and happening now. It often seems a truism in science and technology that it takes twenty years for anything really important to happen: well, Whitfield Diffie was publishing about public-key cryptography in 1975. The idea, the theory for much of what will be discussed today was already in place, theoretically, in 1975. This would suggest a target date of 1995 for this issue to break permanently out of the arid world of theory, and into the juicy, down-and-dirty real world of politics, lawsuits, and money. I rather think that this is a likely scenario. Personally, I think the situation's gonna blow a seam. And by choosing to attend this EFF and EFF-Austin conference in September 1993, you are still a handy two years ahead of the curve. You can congratulate yourself! Why do I say blow a seam? Because at this very moment, ladies and gentlemen, today, there is a grand jury meeting in Silicon Valley, under the auspices of two US federal attorneys and the US Customs Service. That grand jury is mulling over possible illegality, possible indictments, possible heaven-knows-what, relating to supposed export-law violations concerning this powerful cryptography technology. A technology so powerful that exporting cryptographic algorithms requires the same license that our government would grant to a professional armaments dealer. We can envision this federal grand jury meeting, in San Jose California, as a kind of dark salute to our conference here in Austin, a dark salute from the forces of the cryptographic status quo. I can guarantee you that whatever you hear at this conference today, is not gonna be the last you hear about this subject. I can also guarantee you that the people you'll be hearing from today are ideal people to tell you about these issues. I wrote a book once, partly about some of these people, so I've come to know some of them personally. I hope you'll forgive me, if I briefly wax all sentimental in public about how wonderful they are. There will be plenty of time for us to get all hardened and dark and cynical later. I'll be glad to help do that, because I'm pretty good at that when I put my mind to it, but in the meantime, today, we should feel lucky. We are lucky enough to have some people here who can actually tell us something useful about our future. Our real future, the future we can actually have, the future we'll be living in, the future that we can actually do something about. We have among us today the board of directors of the Electronic Frontier Foundation. They are meeting in Austin in order to pursue strategy for their own national organization, but in the meantime, they also have graciously agreed to appear publicly and share their expertise and their opinions with us Austinites. Furthermore, they are not getting a dime out of this; they are doing it, amazingly, out of sheer public-spiritedness. I'm going to introduce each of them and talk about them very briefly. I hope you will reserve your applause until the end. Although these people deserve plenty of applause, we are short on quality applause resources. In fact, today we will be rationing applause care, in order to assure a supply of basic, decent, ego-boosting applause for everyone, including those unable to privately afford top-quality applause care for the health of their own egos. A federal-policy in-joke for the many Washington insiders we have in the room today. Very well, on to the business at hand. Mitch Kapor is a cofounder of the Electronic Frontier Foundation, a software designer, a very prominent software entrepreneur, a philanthropist, a writer and journalist, and a civil liberties activist. In 1990, when Mr. Kapor co-founded EFF, there was very considerable legal and constitutional trouble in the world of cyberspace. Mitch spoke out on these sometimes-arcane, sometimes-obscure issues, and he spoke loudly, repeatedly, publicly, and very effectively. And when Mitch Kapor finished speaking-out, those issues were no longer obscure or arcane. This is a gift Mitch has, it seems. Mitch Kapor has also quietly done many good deeds for the electronic community, despite his full personal knowledge that no good deed goes unpunished. We very likely wouldn't be meeting here today, if it weren't for Mitch, and anything he says will be well worth your attention. Jerry Berman is the President and Director of Electronic Frontier Foundation, which is based in Washington DC. He is a longtime electronic civil liberties activist, formerly the founder and director of the Projects on Privacy and Information Technology for the American Civil Liberties Union. Jerry Berman has published widely on the legal and legislative implications of computer security and electronic communications privacy, and his expertise in networks and the law is widely recognized. He is heading EFF's efforts on the national information infrastructure in the very thick of the Clinton-Gore administration, and Mr Berman, as you might imagine, is a very busy man these days, with a lot of digital irons in the virtual fire. Mr. Kapor and Mr Berman will be taking part in our first panel today, on the topic of EFF's current directions in national public policy. This panel will last from 1:45 to 3PM sharp and should be starting about fifteen minutes after I knock it off and leave this podium. We will allow these well-qualified gentlemen to supply their own panel moderation, and simply tell us whatever is on their minds. And I rather imagine that given the circumstances, cryptography is likely to loom large. And, along with the other panels, if they want to throw it open for questions from the floor, that's their decision. There will be a fifteen-minute break between each panel to allow our brains to decompress. Our second panel today, beginning at 3:15, will be on the implications of cryptography for law enforcement and for industry, and the very large and increasingly dangerous areas where police and industry overlap in cyberspace. Our participants will be Esther Dyson and Mike Godwin. Esther Dyson is a prominent computer-industry journalist. Since 1982, she has published a well-known and widely-read industry newsletter called Release 1.0. Her industry symposia are justly famous, and she's also very well-known as an industry-guru in Central and Eastern Europe and the former Soviet Union. Ms Dyson is very knowledgeable, exceptionally well-informed, and always a healthy distance ahead of her time. When it comes to the computer industry, Esther Dyson not only knows where the bodies are buried, she has a chalk outline ready-and-waiting for the bodies that are still upright! She's on the Board of EFF as well as the Santa Fe Institute, the Global Business Network, the Women's Forum, and the Poynter Institute for Media Studies. Mike Godwin is the legal services council for EFF. He is a journalist, writer, attorney, legal theorist, and legal adviser to the electronically distressed. He is a veteran public speaker on these topics, who has conducted many seminars and taken part in many fora all over the United States. He is also a former Austinite, a graduate of the UT School of Law, and a minor character in a William Gibson novel, among his other unique distinctions. Mike Godwin is not only in EFF inside the beltway of Washington, but is on the board of the local group, EFF-Austin. Mike Godwin is a well-known, one might even say beloved, character in the electronic community. Mike Godwin is especially beloved to those among us who have had machinery sucked into the black hole of a federal search-and-seizure process. Our third panel today, beginning at 4:45, will be the uniquely appropriate Cypherpunk Panel. Our three barricade-climbing, torch-waving, veteran manifesto-writers will be John Perry Barlow, John Gilmore and Eric Hughes. Mr Eric Hughes is NOT a member of the EFF Board of Directors. Mr Hughes is the moderator of the well-known, notorious even, Internet cypherpunk mailing list. He is a private citizen and programmer from the Bay Area of California, who has a computer, has a modem, has crypto-code and knows how to use it! Mr Hughes is here today entirely on his own, very considerable, initiative, and we of EFF-Austin are proud to have him here to publicly declare anything and everything that he cares to tell us about this important public issue. Mr John Gilmore *is* a member of the EFF Board. He is a twenty-year veteran programmer, a pioneer in Sun Microsystems and Cygnus Support, a stalwart of the free software movement, and a long-term electronic civil libertarian who is very bold and forthright in his advocacy of privacy, and of private encryption systems. Mr Gilmore is, I must say, remarkable among UNIX and GNU programmers for the elegance and clarity of his prose writings. I believe that even those who may disagree with Mr Gilmore about the complex and important issues of cryptography, will be forced to admit that they actually understand what Mr Gilmore is saying. This alone makes him a national treasure. Furthermore, John Gilmore has never attended college, and has never bought a suit. When John Gilmore speaks his mind in public, people should sit up straight! And our last introductee is the remarkable John Perry Barlow. Journalist, poet, activist, techno-crank, manifesto-writer, WELLbeing, long-time lyricist for the Grateful Dead, co-founder of Electronic Frontier Foundation, member of the Wyoming Republican Party, a man who at last count had at least ten personal phone numbers, including two faxes, two cellulars and a beeper; bon vivant, legend in his own time, a man with whom superlatives fail, art critic, father of three, contributing editor of MONDO 2000, a man and a brother that I am proud to call truly *my kind of guy:* John Perry Barlow. So these are our panelists today, ladies and gentlemen: a fine group of public-spirited American citizens who, coincidentally, happen to have a collective IQ high enough to boil platinum. Let's give them a round of applause. (((frenzied applause))) Thank you. Ladies and gentlemen, EFF-Austin is not the EFF. We are a local group with our own incorporation and our own unique organizational challenges. We are doing things on a local scale, where the National EFF cannot operate. But we know them, and we *like* them, and we are proud to have them here. Furthermore, every time some Austin company, such as Steve Jackson Games Incorporated, or the currently unlucky Austin Codeworks, publishers of a program called "Moby Crypto," find themselves in some strange kind of federal hot water, we are not only proud to know the EFF, we are *glad* to know them. Glad, and *grateful!* They have a lot to tell us today, and they are going to tell us things they believe we really need to know. And after these formal panels, this evening from 8 to 10, we are going to indulge in a prolonged informal session of what we Austinites are best at: absorbing alcohol, reminiscing about the Sixties, and making what Mitch Kapor likes to call "valuable personal contacts." We of EFF-Austin are proud and happy to be making information and opinion on important topics and issues available to you, the Austin public, at NO CHARGE!! Of course, it would help us a lot, if you bought some of the unbelievably hip and with-it T-shirts we made up for this gig, plus the other odd and somewhat overpriced, frankly, memorabilia and propaganda items that we of EFF-Austin sell, just like every other not-for-profit organization in the world. Please help yourself to this useful and enlightening stuff, so that the group can make more money and become even more ambitious than we already are. And on a final note, for those of you who are not from Austin, I want to say to you as an Austinite and member of EFF-Austin, welcome to our city. Welcome to the Capital of Texas. The River City. The City of the Violet Crown. Silicon Hills. Berkeley-on-the-Colorado. The Birthplace of Cyberpunk. And the Waterloo of the Chicago Computer Fraud and Abuse Task Force. You are all very welcome here. So today, let's all learn something, and let's all have some fun. Thanks a lot. | Disclaimers : You are encouraged to re-distribute this | | document electronically. Any opinions expressed belong to | | the author and not the organization. (c) 1993. | [From the EFF-Austin online newsletter, _WORD_, Issue #9] %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -Editor's Note: This is a little old...but still good and important reading! =-=-=-=-=-=-Copyright 1993,4 Wired USA Ltd. All Rights Reserved=-=-=-=-=-= -=-=For complete copyright information, please see the end of this file=-=- JACKBOOTS ON THE INFOBAHN By John Perry Barlow (WIRED 2.04) Clipper is a last ditch attempt by the United States, the last great power from the old Industrial Era, to establish imperial control over cyberspace. [Note: The following article appeared in the April 1994 issue of WIRED. We, the editors of WIRED, are net-casting it now in its pre-published form as a public service. Because of the vital and urgent nature of its message, we believe readers on the Net should hear and take action now. You are free to pass this article on electronically; in fact we urge you to replicate it throughout the net with our blessings. If you do, please keep the copyright statements and this note intact. For a complete listing of Clipper-related resources available through WIRED Online, send email to with the following message: "send clipper.index". - The Editors of WIRED] On January 11, I managed to schmooze myself aboard Air Force 2. It was flying out of LA, where its principal passenger had just outlined his vision of the information superhighway to a suited mob of television, show- biz, and cable types who fervently hoped to own it one day - if they could ever figure out what the hell it was. From the standpoint of the Electronic Frontier Foundation the speech had been wildly encouraging. The administration's program, as announced by Vice President Al Gore, incorporated many of the concepts of open competition, universal access, and deregulated common carriage that we'd been pushing for the previous year. But he had said nothing about the future of privacy, except to cite among the bounties of the NII its ability to "help law enforcement agencies thwart criminals and terrorists who might use advanced telecommunications to commit crimes." On the plane I asked Gore what this implied about administration policy on cryptography. He became as noncommittal as a cigar-store Indian. "We'll be making some announcements.... I can't tell you anything more." He hurried to the front of the plane, leaving me to troubled speculation. Despite its fundamental role in assuring privacy, transaction security, and reliable identity within the NII, the Clinton administration has not demonstrated an enlightenment about cryptography up to par with the rest of its digital vision. The Clipper Chip - which threatens to be either the goofiest waste of federal dollars since President Gerald Ford's great Swine Flu program or, if actually deployed, a surveillance technology of profound malignancy - seemed at first an ugly legacy of the Reagan-Bush modus operandi. "This is going to be our Bay of Pigs," one Clinton White House official told me at the time Clipper was introduced, referring to the disastrous plan to invade Cuba that Kennedy inherited from Eisenhower. (Clipper, in case you're just tuning in, is an encryption chip that the National Security Agency and FBI hope will someday be in every phone and computer in America. It scrambles your communications, making them unintelligible to all but their intended recipients. All, that is, but the government, which would hold the "key" to your chip. The key would separated into two pieces, held in escrow, and joined with the appropriate "legal authority.") Of course, trusting the government with your privacy is like having a Peeping Tom install your window blinds. And, since the folks I've met in this White House seem like extremely smart, conscious freedom-lovers - hell, a lot of them are Deadheads - I was sure that after they were fully moved in, they'd face down the National Security Agency and the FBI, let Clipper die a natural death, and lower the export embargo on reliable encryption products. Furthermore, the National Institutes of Standards and Technology and the National Security Council have been studying both Clipper and export embargoes since April. Given that the volumes of expert testimony they had collected overwhelmingly opposed both, I expected the final report would give the administration all the support it needed to do the right thing. I was wrong. Instead, there would be no report. Apparently, they couldn't draft one that supported, on the evidence, what they had decided to do instead. THE OTHER SHOE DROPS On Friday, February 4, the other jackboot dropped. A series of announcements from the administration made it clear that cryptography would become their very own "Bosnia of telecommunications" (as one staffer put it). It wasn't just that the old Serbs in the National Security Agency and the FBI were still making the calls. The alarming new reality was that the invertebrates in the White House were only too happy to abide by them. Anything to avoid appearing soft on drugs or terrorism. So, rather than ditching Clipper, they declared it a Federal Data Processing Standard, backing that up with an immediate government order for 50,000 Clipper devices. They appointed the National Institutes of Standards and Technology and the Department of Treasury as the "trusted" third parties that would hold the Clipper key pairs. (Treasury, by the way, is also home to such trustworthy agencies as the Secret Service and the Bureau of Alcohol, Tobacco, and Firearms.) They reaffirmed the export embargo on robust encryption products, admitting for the first time that its purpose was to stifle competition to Clipper. And they outlined a very porous set of requirements under which the cops might get the keys to your chip. (They would not go into the procedure by which the National Security Agency could get them, though they assured us it was sufficient.) They even signaled the impending return of the dread Digital Telephony, an FBI legislative initiative requiring fundamental reengineering of the information infrastructure; providing wiretapping ability to the FBI would then become the paramount design priority. INVASION OF THE BODY SNATCHERS Actually, by the time the announcements thudded down, I wasn't surprised by them. I had spent several days the previous week in and around the White House. I felt like I was in another remake of The Invasion of the Body Snatchers. My friends in the administration had been transformed. They'd been subsumed by the vast mindfield on the other side of the security clearance membrane, where dwell the monstrous bureaucratic organisms that feed on fear. They'd been infected by the institutionally paranoid National Security Agency's Weltanschauung. They used all the telltale phrases. Mike Nelson, the White House point man on the NII, told me, "If only I could tell you what I know, you'd feel the same way I do." I told him I'd been inoculated against that argument during Vietnam. (And it does seem to me that if you're going to initiate a process that might end freedom in America, you probably need an argument that isn't classified.) Besides, how does he know what he knows? Where does he get his information? Why, the National Security Agency, of course. Which, given its strong interest in the outcome, seems hardly an unimpeachable source. However they reached it, Clinton and Gore have an astonishingly simple bottom line, to which even the future of American liberty and prosperity is secondary: They believe that it is their responsibility to eliminate, by whatever means, the possibility that some terrorist might get a nuke and use it on, say, the World Trade Center. They have been convinced that such plots are more likely to ripen to hideous fruition behind a shield of encryption. The staffers I talked to were unmoved by the argument that anyone smart enough to steal a nuclear device is probably smart enough to use PGP or some other uncompromised crypto standard. And never mind that the last people who popped a hooter in the World Trade Center were able to get it there without using any cryptography and while under FBI surveillance. We are dealing with religion here. Though only ten American lives have been lost to terrorism in the last two years, the primacy of this threat has become as much an article of faith with these guys as the Catholic conviction that human life begins at conception or the Mormon belief that the Lost Tribe of Israel crossed the Atlantic in submarines. In the spirit of openness and compromise, they invited the Electronic Frontier Foundation to submit other solutions to the "problem" of the nuclear-enabled terrorist than key escrow devices, but they would not admit into discussion the argument that such a threat might, in fact, be some kind of phantasm created by the spooks to ensure their lavish budgets into the post-Cold War era. As to the possibility that good old-fashioned investigative techniques might be more valuable in preventing their show-case catastrophe (as it was after the fact in finding the alleged perpetrators of the last attack on the World Trade Center), they just hunkered down and said that when wiretaps were necessary, they were damned well necessary. When I asked about the business that American companies lose because of their inability to export good encryption products, one staffer essentially dismissed the market, saying that total world trade in crypto goods was still less than a billion dollars. (Well, right. Thanks more to the diligent efforts of the National Security Agency than to dim sales potential.) I suggested that a more immediate and costly real-world effect of their policies would be to reduce national security by isolating American commerce, owing to a lack of international confidence in the security of our data lines. I said that Bruce Sterling's fictional data-enclaves in places like the Turks and Caicos Islands were starting to look real-world inevitable. They had a couple of answers to this, one unsatisfying and the other scary. The unsatisfying answer was that the international banking community could just go on using DES, which still seemed robust enough to them. (DES is the old federal Data Encryption Standard, thought by most cryptologists to be nearing the end of its credibility.) More frightening was their willingness to counter the data-enclave future with one in which no data channels anywhere would be secure from examination by one government or another. Pointing to unnamed other countries that were developing their own mandatory standards and restrictions regarding cryptography, they said words to the effect of, "Hey, it's not like you can't outlaw the stuff. Look at France." Of course, they have also said repeatedly - and for now I believe them - that they have absolutely no plans to outlaw non-Clipper crypto in the US. But that doesn't mean that such plans wouldn't develop in the presence of some pending "emergency." Then there is that White House briefing document, issued at the time Clipper was first announced, which asserts that no US citizen "as a matter of right, is entitled to an unbreakable commercial encryption product." Now why, if it's an ability they have no intention of contesting, do they feel compelled to declare that it's not a right? Could it be that they are preparing us for the laws they'll pass after some bearded fanatic has gotten himself a surplus nuke and used something besides Clipper to conceal his plans for it? If they are thinking about such an eventuality, we should be doing so as well. How will we respond? I believe there is a strong, though currently untested, argument that outlawing unregulated crypto would violate the First Amendment, which surely protects the manner of our speech as clearly as it protects the content. But of course the First Amendment is, like the rest of the Constitution, only as good as the government's willingness to uphold it. And they are, as I say, in the mood to protect our safety over our liberty. This is not a mind-frame against which any argument is going to be very effective. And it appeared that they had already heard and rejected every argument I could possibly offer. In fact, when I drew what I thought was an original comparison between their stand against naturally proliferating crypto and the folly of King Canute (who placed his throne on the beach and commanded the tide to leave him dry), my government opposition looked pained and said he had heard that one almost as often as jokes about roadkill on the information superhighway. I hate to go to war with them. War is always nastier among friends. Furthermore, unless they've decided to let the National Security Agency design the rest of the National Information Infrastructure as well, we need to go on working closely with them on the whole range of issues like access, competition, workplace privacy, common carriage, intellectual property, and such. Besides, the proliferation of strong crypto will probably happen eventually no matter what they do. But then again, it might not. In which case we could shortly find ourselves under a government that would have the automated ability to log the time, origin and recipient of every call we made, could track our physical whereabouts continuously, could keep better account of our financial transactions than we do, and all without a warrant. Talk about crime prevention! Worse, under some vaguely defined and surely mutable "legal authority," they also would be able to listen to our calls and read our e-mail without having to do any backyard rewiring. They wouldn't need any permission at all to monitor overseas calls. If there's going to be a fight, I'd rather it be with this government than the one we'd likely face on that hard day. Hey, I've never been a paranoid before. It's always seemed to me that most governments are too incompetent to keep a good plot strung together all the way from coffee break to quitting time. But I am now very nervous about the government of the United States of America. Because Bill 'n' Al, whatever their other new-paradigm virtues, have allowed the very old-paradigm trogs of the Guardian Class to define as their highest duty the defense of America against an enemy that exists primarily in the imagination - and is therefore capable of anything. To assure absolute safety against such an enemy, there is no limit to the liberties we will eventually be asked to sacrifice. And, with a Clipper Chip in every phone, there will certainly be no technical limit on their ability to enforce those sacrifices. WHAT YOU CAN DO GET CONGRESS TO LIFT THE CRYPTO EMBARGO The administration is trying to impose Clipper on us by manipulating market forces. By purchasing massive numbers of Clipper devices, they intend to induce an economy of scale which will make them cheap while the export embargo renders all competition either expensive or nonexistent. We have to use the market to fight back. While it's unlikely that they'll back down on Clipper deployment, the Electronic Frontier Foundation believes that with sufficient public involvement, we can get Congress to eliminate the export embargo. Rep. Maria Cantwell, D-Washington, has a bill (H.R. 3627) before the Economic Policy, Trade, and Environment Subcommittee of the House Committee on Foreign Affairs that would do exactly that. She will need a lot of help from the public. They may not care much about your privacy in DC, but they still care about your vote. Please signal your support of H.R. 3627, either by writing her directly or e-mailing her at cantwell@eff.org. Messages sent to that address will be printed out and delivered to her office. In the subject header of your message, please include the words "support HR 3627." In the body of your message, express your reasons for supporting the bill. You may also express your sentiments to Rep. Lee Hamilton, D-Indiana, the House Committee on Foreign Affairs chair, by e-mailing hamilton@eff.org. Furthermore, since there is nothing quite as powerful as a letter from a constituent, you should check the following list of subcommittee and committee members to see if your congressional representative is among them. If so, please copy them your letter to Rep. Cantwell. > Economic Policy, Trade, and Environment Subcommittee: Democrats: Sam Gejdenson (Chair), D-Connecticut; James Oberstar, D- Minnesota; Cynthia McKinney, D-Georgia; Maria Cantwell, D-Washington; Eric Fingerhut, D-Ohio; Albert R. Wynn, D-Maryland; Harry Johnston, D-Florida; Eliot Engel, D-New York; Charles Schumer, D-New York. Republicans: Toby Roth (ranking), R-Wisconsin; Donald Manzullo, R-Illinois; Doug Bereuter, R-Nebraska; Jan Meyers, R-Kansas; Cass Ballenger, R-North Carolina; Dana Rohrabacher, R-California. > House Committee on Foreign Affairs: Democrats: Lee Hamilton (Chair), D-Indiana; Tom Lantos, D-California; Robert Torricelli, D-New Jersey; Howard Berman, D-California; Gary Ackerman, D-New York; Eni Faleomavaega, D-Somoa; Matthew Martinez, D- California; Robert Borski, D-Pennsylvania; Donal Payne, D-New Jersey; Robert Andrews, D-New Jersey; Robert Menendez, D-New Jersey; Sherrod Brown, D-Ohio; Alcee Hastings, D-Florida; Peter Deutsch, D-Florida; Don Edwards, D-California; Frank McCloskey, D-Indiana; Thomas Sawyer, D-Ohio; Luis Gutierrez, D-Illinois. Republicans: Benjamin Gilman (ranking), R-New York; William Goodling, R- Pennsylvania; Jim Leach, R-Iowa; Olympia Snowe, R-Maine; Henry Hyde, R- Illinois; Christopher Smith, R-New Jersey; Dan Burton, R-Indiana; Elton Gallegly, R-California; Ileana Ros-Lehtinen, R-Florida; David Levy, R-New York; Lincoln Diaz-Balart, R-Florida; Ed Royce, R-California. BOYCOTT CLIPPER DEVICES AND THE COMPANIES WHICH MAKE THEM. Don't buy anything with a Clipper Chip in it. Don't buy any product from a company that manufactures devices with Big Brother inside. It is likely that the government will ask you to use Clipper for communications with the IRS or when doing business with federal agencies. They cannot, as yet, require you to do so. Just say no. LEARN ABOUT ENCRYPTION AND EXPLAIN THE ISSUES TO YOUR UNWIRED FRIENDS The administration is banking on the likelihood that this stuff is too technically obscure to agitate anyone but nerds like us. Prove them wrong by patiently explaining what's going on to all the people you know who have never touched a computer and glaze over at the mention of words like "cryptography." Maybe you glaze over yourself. Don't. It's not that hard. For some hands-on experience, download a copy of PGP - Pretty Good Privacy - a shareware encryption engine which uses the robust RSA encryption algorithm. And learn to use it. GET YOUR COMPANY TO THINK ABOUT EMBEDDING REAL CRYPTOGRAPHY IN ITS PRODUCTS If you work for a company that makes software, computer hardware, or any kind of communications device, work from within to get them to incorporate RSA or some other strong encryption scheme into their products. If they say that they are afraid to violate the export embargo, ask them to consider manufacturing such products overseas and importing them back into the United States. There appears to be no law against that. Yet. You might also lobby your company to join the Digital Privacy and Security Working Group, a coalition of companies and public interest groups - including IBM, Apple, Sun, Microsoft, and, interestingly, Clipper phone manufacturer AT&T - that is working to get the embargo lifted. ENLIST! Self-serving as it sounds coming from me, you can do a lot to help by becoming a member of one of these organizations. In addition to giving you access to the latest information on this subject, every additional member strengthens our credibility with Congress. > Join the Electronic Frontier Foundation by writing membership@eff.org. > Join Computer Professionals for Social Responsibility by e-mailing cpsr.info@cpsr .org. CPSR is also organizing a protest, to which you can lend your support by sending e-mail to clipper.petition@cpsr.org with "I oppose Clipper" in the message body. Ftp/gopher/WAIS to cpsr.org /cpsr/privacy/ crypto/clipper for more info. In his LA speech, Gore called the development of the NII "a revolution." And it is a revolutionary war we are engaged in here. Clipper is a last ditch attempt by the United States, the last great power from the old Industrial Era, to establish imperial control over cyberspace. If they win, the most liberating development in the history of humankind could become, instead, the surveillance system which will monitor our grandchildren's morality. We can be better ancestors than that. San Francisco, California Wednesday, February 9, 1994 * * * John Perry Barlow (barlow@eff.org) is co-founder and Vice-Chairman of the Electronic Frontier Foundation, a group which defends liberty, both in Cyberspace and the Physical World. He has three daughters. =-=-=-=-=-=-=-=-=-=-=-=WIRED Online Copyright Notice=-=-=-=-=-=-=-=-=-=-=-= Copyright 1993,4 Wired USA Ltd. All rights reserved. This article may be redistributed provided that the article and this notice remain intact. This article may not under any circumstances be resold or redistributed for compensation of any kind without prior written permission from Wired Ventures, Ltd. If you have any questions about these terms, or would like information about licensing materials from WIRED Online, please contact us via telephone (+1 (415) 904 0660) or email (info@wired.com). WIRED and WIRED Online are trademarks of Wired Ventures, Ltd. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% NOTES FROM CYBERSPACE VOLUME 3 By Jonathan Yarden (jyarden@iglou.iglou.com) Subject: Mosaic on Digital Satellite System Anyone else out there getting a serious hard-on on the Digital Satellite System? From what I have heard this puppy is doing IP via satellite. For that matter, I can't think of any other real way to do what it does. Here is a partial list of 'features:' 1. The DSS system is designed to asychronously receive data. Each DSS receiver has a unique ID allowing it to process packetized wide-band data (which in most cases is MPEG encoded video). This happens *whenever* the unit is operational. 2. The modem in the DSS receiver is for the sending of requests and receipt of data from a local or long distance 'service.' The majority of requests are for 'keys' to decode channels, but could also be used to send subscription requests for other services. 3. There is a magnetic 'card' used to hold information about the types of services currently subscribed to by the DSS user. The card is readable as well as writeable. THE BIG IDEA Knowing that data flow in Mosaic is almost 99% server to client, this opens up a rather fast way to do Mosaic. For that matter, since most of the people who surf are just passing thru or getting data, this is a fast data pipe to just about anything. The only catch would be that the sending speed would be maxed out at about 14.4kbps. But, if you are on the client end of a 2GB FTP session, well you get the picture... 2nd reason: According to TRACEROUTE (unix hamsters, try this at home...) CIX is basically 'metering' data traffic onto their routes. First 16K goes real fast, then you hit the bottom of the process queue (sounds VAXen, doesn't it?) and it's the loser in a snail race. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% PORNOGRAPHY FOULS INTERNET By Paul Pihichyn (pihichyn@freepress.mb.ca) There is a river of slime in the gutters of the information highway and it's giving cyberspace a bad name. The virtual community, it appears, has been invaded by the same scum that has slithered into the real communities across the land. We're talking pornography, with a capital P, right there on the Internet. Maybe you caught the report on CNN last week about the Lawrence Livermore Laboratory in California. It seems some sleezeball there had loaded several gigabytes of filth into a server that was connected to the Internet, and promptly made it available to all 20 million-plus 'Netsurfers. It's probably not surprising that in a community of 20 million, you are going to find the same sad mix that you will find in the general population. But, somehow, I though the Internet would attract a better class of humanity. Nevertheless, the Internet has become the largest and most accessable source of pornographic material on the planet - and the real danger is it's accessible to anyone with a PC and modem, even to children. Journalist Erik Lacitis (elak.news@times.com) said it best recently in the Seattle times: "... has there ever been a bigger collection of mean- spirited, emotionally-deficient, just plain-weird, and mostly utterly boring people?" He prefaced the remark by saying he was taking a vacation from the Internet and going back to the real world. Actually, it would make more sense for those 'Net-bound weirdos to be taking a reality check. Hiding behind their cloak of anonymity, these folks hurl hateful insults at those with whom they disagree or feel they can bully by virtue of their perceived superior knowledge of the nooks and crannies of the Internet. It is on the Usenet that these really dumb things often take place. Now tell me, does the world really need a forum called alt.sex.pictures.female, or alt.sex.bondage? Or maybe just plain old alt.sex? I think not. The crap on these forums is pretty crude. Obscene by many community standards. And also pretty silly. Racy stories written by pimply-faced adolescent boys pretending to be ravishingly over-sexed and under-loved young women is hardly the stuff on which to build a world-wide information superhighway. Remember, the Internet is a network of networks, each linked through a host site - often a university or some other educational facility. Some of these host sites have taken steps to clean up their little corner of the Internet. Troll Usenet through the server at the University of Manitoba, and you won't find the newsgroups alt.sex.pictures.female, or alt.sex.bondage. The U of M, along with several other Internet providers, has denied its users access to some of the more blatantly pornographic newsgroups. Though some people may complain that this is censorship, an infringement on the freedom of the Internet, I take my hat off to those who made the decision to try to keep the Internet decent place to work and play. There have been incidents reported of Internet users actually being stalked, electronically, by some of the weirder weirdoes out there. The really scary part is that some of the cyberstalkers have actually slithered into the real world and attempted face-to-face encounters. The 'Net anonymity also give a lot of jerks a chance to be mean. If there is a crude remark that has ever been made about women, you'll find it posted on the 'Net. It seems, as Lacitis wrote, the Internet is populated with men who never grew up. Big as it is, the Internet is still in its infancy. It will take time to gain some maturity, to find a way to weed out the cretins and perverts. Once you get around the crud on the Internet, you will find it a wonderful place to learn, work and do business. By Paul Pihichyn, pihichyn@freepress.mb.ca %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SECURITY / COAST FTP archive on-line Announcing the COAST Security FTP Archive! The COAST group at Purdue are happy to (finally) announce the availability of our security archive. The archive is currently available via FTP, with extensions to gopher and WWW planned soon. The archive currently contains software, standards, tools, and other material in the following areas: * access control * artificial life * authentication * criminal investigation * cryptography * e-mail privacy enhancement * firewalls * formal methods * general guidelines * genetic algorithms * incident response * institutional policies * intrusion detection * law & ethics * malware (viruses, worms, etc) * network security * password systems * policies * privacy * risk assessment * security related equipment * security tools * social impacts * software forensics * software maintenance * standards * technical tips * the computer underground The collection also contains a large set of site "mirrors" of interesting collections, many of which are linked by topic to the rest of the archive. You can connect to the archive using standard ftp to "coast.cs.purdue.edu". Information about the archive structure and contents is present in "/pub/aux"; we encourage users to look there, and to read the README* files located in the various directories. If you know of material you think should be added, please send mail to security-archive@cs.purdue.edu and tell us what you have and where we can get a copy. In order of preference, we would prefer to get: -- a pointer to the source ftp site for a package -- a pointer to a mirror ftp site for the package -- a uuencoded tar file -- a shar file -- a diskette or QIC tape If you are providing software, we encourage you to "sign" the software with PGP to produce a standalone signature file. This will help to ensure against trojaned versions of the software finding their way into the archive. Any comments or suggestions about the archive should be directed to "security-archive@cs.purdue.edu" -- please let us know what you think! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% ON THE SUBJECT OF CYBERCULTURE By George Phillips (ice9@fennec.com) I hate to be an asshole, but my friends will tell you I'm pretty good at it. I usually try to keep an open mind about a lot of things, but some things just get under my skin. Today, it's this damn cyberculture thingy! I thought the hype was subsiding, but now it seems to have sprouted back up like a festering pustule on the mouths of everyone. Let's just ask the question: What is cyberculture? Is it some coffee-shop hallucination romance dreamed up by some art-school boy with no social outlet? Is it some third-rate term developed by the editors of certain magazines to justify their existance? Was it created from a desperate attempt at giving a name to people who just don't fit in? ...or is there something real to all this fantasy? Let's take a closer look. I went out and looked for anything "cyber." Magazines, books, people, places, clothes, and things. I started out by picking up a magazine called "Mondo-2000". I'm sure I heard somewhere that this was a "cyber-oriented" magazine. The cover art did nothing for me as far as helping define what "cyber" was. After a time, I quickly realized that this magazine caters to junior/highschool children with Nintendos and acne. I saw nothing "cyber" about it. In fact, I really saw no real culture. Sure it had art, music, graphics, features, etc...but doesn't every magazine? What is keeping me from calling Time or Newsweek "Cyber-mags"? Could it be? Is "cyber" just another buzz-word like "virtual?" No! William Gibson writes about people in the future accessing a matrix called cyberspace. This is the "virtual" area between computer systems. No doubt one can see the parallels between his matrix and our Internet. But is this all there is to it? No. There are people called "cyberpunks" that access this matrix and exploit it to their own ends. These are very good books, by the way. I enjoyed reading them. There has got to be a parallel between his cyberpunks and the hackers of today. Although the books are excellent, I have yet to see what "Cyber-Culture" is. (Hearing theme song from Jeopardy in my head...) Billy Idol recorded an album called CyberPunk. Chained to my chair and threatened with death if I did not listen to this "K-Rad" CD, I formed the opinion that Billy Idol has too much free time on his hands. The makeup of this album has absolutely nothing to do with the title, or subjects in any William Gibson book. Thats not to say its not a good album. I'm sure there are many out there who like his work, but as far as my quest was concerned, this was a dead end. I just don't comprehend the reasoning behind such a venture. Exhausted with my household search for the eternal answer, I decided to hit the streets and find some real, live, cyber-people. I heard that this culture usually hangs out in clubs or raves that play loud alternative industrial dance music. I found a couple places like that in Houston and Austin, so I decided to give it a try. I chose a club in Houston, Texas. The lights were hypnotic. The smart-drinks were flowing. The people were dancing and zoning on the special effects of the club. I picked out the most "cyber-looking" people I could find. I knew what to look for because I just recently picked through a Mondo-2000 magazine to see what their be-all end-all definition of a cyber-person was. These people could barely figure out how to turn on a computer! How could they call themselves "cyber?" Am I wrong when I say that the whole term "Cyber" has at least SOMETHING to do with computers? Needless to say, I was rather disappointed in the ignorance of these lifeless wanna-bees and misled by all of the advertising of this ever-elusive "Cyber-Culture". Color me confused. Well, I figured that if anyone knew about "Cyber-Culture," it would have to be the computer underground. This is supposed to be one of the smartest, most alternitive, techno-literate group around. There was a convention going on in Las Vegas called DefCon II. Played-up to be one of the largest gatherings of computer underground enthusiasts, I had to go. Although it is sad that this term "Cyber", while used so widely today, is hard to define. I am sad that I had to go to Las Vegas to find "Cyber"...if it was even there. This was obviously a place where "cyber-culture" came together! I decided to attend and look around. What I found was a large group of people drinking, smoking, viewing porn and talking about the latest security holes. These people were nothing like the people in Mondo-2000 or any other Cyber-rags. Where was their strange, multi-color clothing? So this is cyber-culture? I hit a few coffee shops, followed a group that I would bet that I saw in Mondo, tried psudo-virtual-reality hangouts, tried their smart drinks, smoked their tobacco, attempted being "trendy", and contemplated art in the most cyber-sense. My return: ZIP! NADA! NOTHING! From all of my travels and studies, I came up with a few theories. Although possibly distorted, I feel they are, for the most part true. Cyberculture is: 1) A bunch of burn-outs in a coffee shop, reading trendy "alternative" magazines, analyzing "alternative" music, and going to raves. 2) A bunch of kids doing large amounts of drugs, drinking smart-drinks, wearing flanel, attending "alternative" concerts like Woodstock '94 hopelessly babbling on about topics that they know nothing about. 3) Cigarettes and alcohol. I find none of these interesting and frankly, I don't see whats so damn fascinating about them! ...and still cannot determine why it is called "Cyber". I am getting to hate this term more each time I have to write or say it...because it means NOTHING! So, if anyone finds "Mr. or Ms. Cyber" please let me know. I am not claiming to be a know-it-all, but when the press, the public, and society in general latches on to a term which evidently globally-defines a people or attitude, and THEN rams it down my throat on the front page of the newspaper and on the six o' clock news, I have the RIGHT to know what in the hell it means. Have a virtual-cyber-underground-mondo-networkable-fiber-opticable day! Alternative viewpoints are not welcome because this is my cyber-column. Get your own! Take a pill and get a life. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% A COMMENT ON CLIPPER By Azrael (reinoa@ccaix3.unican.es) Greetings to all fellow cyberpunks, hackers, modem enthusiasts, programmers, viri-coders, civil-rights activists, anarchists, crypto- mathematicians and all. The echoes of the Clipper polemics are heard even here in Spain, mainly thru a distorted view given by the pre-net mass media, and the very few people hooked to some kind of comms net. The way I see it, it is NOT that awful that the government of the USA is trying (in its best tradition) to limit liberty and privacy through the implantation of mandatory 'crippled' encryption or 'key escrows' or secure-phones or what have you. Remember the good old theory of the shield and the sword. If there is no enemy, there is no battle, and if there's no battle, there's no point in hacking, anarchism, sabotage, and public opinion campaigns. If there's no threat to our freedom or privacy, our skills will decay, weaken, and we'll submit in the end to the exigences of those in power. Security in computer systems should be improved upon, so that hackers have to keep up to it. Anti-virus packages have to get better, so that virus makers develop new techniques. In the same way, threatened privacy in electronic communications will be an incentive for enterprising people to create new methods of avoiding eavesdropping, by the development of new, better and faster cryptographic algorithms. As long as we keep 'en garde', they can't beat us. They just can't. But if they leave us alone for a time, we'll grow in pride and self-confidence and a false sense of security, while they have time to re-arm. In that way, they'll have us in the end. Fight the power! (and be glad you need to) %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SEX, THE INTERNET AND THE IDIOTS By K.K. Campbell (eye@io.org) There are two breeds of moron attracted to the Internet's relation to sex -- reporters and wankers. These categories may overlap, but that's beside the point. Canadian newsmedia owe a great deal of Internet education to Judge Francis Kovacs and his infamous Karla Homolka trial publication ban. That elevated the Internet to headline material. It is humorous to watch reporters/ editors grope for net.literacy. Talk with Justin Wells (stem@sizone.pci.on.ca) and Ken Chasse (root@sizone.pci.on.ca), the chaps who created alt.fan.karla-homolka as a lark, then found themselves hounded by reporters asking for "banned information, please." Or check out The Star's early stories, where Usenet newsgroups are called "computer billboards" -- whatever the hell those are. MEDIA MORONS Mainstream journalists without a rallying issue like a trial ban invariably end up with nothing better to do then bang the drum about the 3 Ps: pedophilia, piracy and pornography. Take the recent Internet "child molesters" silliness. Some teen somewhere is enticed into sex with an adult -- through America On Line, not the Internet -- and we have an "epidemic." Chicago's Harlan Wallach (wallach@mcs.com) reported in alt.internet.media-coverage how some dink named James Coates wrote a column for the July 15 Chicago Tribune called "Beware cybercreeps lurking on the Internet." True enough. But Coates' purpose is to frighten the middle class with some probably made-up story about "Vito," who cruises the net hoping "to have sex with children in wheelchairs." I understand Coates' pain. I can't spend 10 minutes in Internet Relay Chat (IRC) before someone asks if I'm a child in a wheelchair looking for a sex partner. Wallach told eye Coates has been going like this for months now -- "a master at work." Couple of weeks ago, California nuclear research facility Lawrence Livermore Labs discovered one computer held some dirty pictures. An employee gave away a password. Someone used that access to store the images. People could connect and get them. Nothing was hacked. Big deal. But on July 13, CNN reporter Don Knapp swooped in to whip up hysteria. Doom was clearly imminent. "Computer security specialists were surprised to find what may be the largest computer collection ever of hardcore pornography at the nation's top nuclear weapons and research laboratory," Knapp intoned ominously. Almost 2000 megs! Gol-ly! (Incidentally, 99 per cent of it was individual shots of nude/semi-nude women, no sexually explicit acts. Playboy stuff.) CNN rang Wired magazine writer Brian Behlendorf (brian@wired.com) and woke him at home, excited about "a big break-in at Laurence Livermore." Hackers and porno! If CNN was lucky, the hacker was a child molester. Behlendorf consented to an interview. CNN immediately asked him to "find some pictures of naked women on the Net for us." Behlendorf recounted the incident: "I really wasn't interested in doing that. I don't know of any FSP/FTP sites off hand anyways, and really didn't want to be associated with pictures of NEKKID GRRLS."* But amiable Behlendorf slid over to alt.binaries.pictures.supermodels and grabbed a picture of a model in a swimsuit. He also picked up a landscape, a race car and a Beatles album cover "to show that other images get sent over Usenet as well," naively thinking this point would be made -- though he stresses he by no means condones distributing copyrighted images, "clean" or otherwise. Behlendorf was then made to sit beside a terminal displaying Ms String-Bikini throughout all his comments. "They made me keep returning to that damn bikini image ... over and over." But intrepid reporter Don Knapp assured us all is well -- for now. "Spokespeople for the national laboratories insist that at no time were the pornographers, nor the software pirates, able to cross over from the research network into the classified network. The labs say that, while they are embarrassed, national security was not breached." Whew. YOU'RE GETTING VERY STUP- ERR, SLEEPY... Then you have regular net.wankers. Whoever said, "Never underestimate the intelligence of the American public," must read alt.sex.* newsgroups. For instance, the charismatic Aabid (aabid@elm.circa.ufl.edu) wrote a touching post called "I would like an enema myself!" to newsgroup sci.chem (science: chemistry). "Looking for a Middle Eastern M or F to help me with my enema desires. If you can be of assistance please email me." Readers of sci.chem were very intrigued and Aabid has made many interesting new friends. The greatest example of alt.sex stupidity is: The Hypnosis Program. As a joke, Indiana's Steve Salter (ssalter@silver.ucs.indiana.edu) posted to alt.sex.stories that he had a "hypnosis program" -- which you cleverly slip onto another person's computer where it will so mesmerize the unsuspecting target, he/she becomes your SEXUAL PLAYTHING, BENDING TO YOUR EVERY WHIM! For weeks after, global village idiots pestered him for copies. "I must have received over a hundred requests via private email or in alt.sex.stories for a copy of the program," Salter told eye. He had to publicly post a reply to stem the tide: "No offense, but get a rather large clue. There is no such animal. That was a joke. I thought it was obvious. How many people out there really want to hypnotize someone secretly? What the fuck is wrong with all of you?! What age group are we dealing with here? There is no such program!!! Sheesh..." Personally, I'm in agreement with David Romm (71443.1447@compuserve.com) who wrote: "I really liked the hypnosis program. It was much better than Cats." MASSAGE MY MEDIUM To get your own porn, there are lots of sites. Ask for the latest in the alt.sex groups. Check out alt.binaries.pictures.erotica to grab a few images. For text erotica, read in alt.sex.stories . If you can't access alt.sex groups because, say, your university is run by prudes, write (ahem) "Hot Stuff" (anon1ea3@nyx10.cs.du.edu) for details about his mail-server. He makes available hundreds of stories. We at eye have yet to sample this collection but are intrigued by two items: "Perils of Red Tape," which we assume reveals the lust-riddled world of civil service, and "Tales from the Network," the story of lonely boys sitting around Friday nights fingering their groins in IRC, praying someone with a female-sounding alias drops by. * FootNote: NEKKID GRRLS is idiomatic fresh-off-the-BBS net.wanker- speak. This language can be learned by hanging around newsgroups like alt.2600 . To convince others you are a deadly cool net.cruiser, write: "HEY, elite pir-8 d00ds! I got more NEKKID GRRLS philes than ANY OF U!!!! And U censorship loosers can SUCK MY DICK!!!!!" Send it to alt.sex . Make sure to cross-post to the comp.sys.ibm.* hierarchy because PCs are the most common computer and you will reach a wider audience. If you can manage it, post through an anonymous account and leave your personal signature with real address in the text of the message. +++++++++++++++++++++++++++++++++++++++++++ Retransmit freely in cyberspace Author holds standard copyright Full issue of eye available in archive ==> gopher.io.org or ftp.io.org Mailing list available http://www.io.org/eye eye@io.org "Break the Gutenberg Lock..." 416-971-8421 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% JAUC For Windows Project SCHEDULED FOR JANUARY RELEASE By Scott Davis (dfox@fc.net) The development team at Fennec Information systems is currently working on a project called "JAUC for Windows". This software will be a large Windows-based help file with ALL the issues of The Journal Of American Underground Computing, Editor's page with tons of info on the editorial staff, as well as a LOT of other information regarding the Internet... all accessible with the click of a mouse in Windows. The scheduled release date for this piece of software is sometime in January. A furious effort is underway to provide you with this file as soon as possible. You will be required to have Windows 3.0, 3.1, or some other Windows-based product. It will work with Windows For Workgroups, NT, Chicago, Daytona, etc... The file will be available for FTP from TWO sites on the Internet. Those sites will more than likely be FC.NET and ETEXT.ARCHIVE.UMICH.EDU. You will be sent a small note (if you are on our mailing list) when this product becomes available. At this time, the only method of distribution is FTP. We are working on other ways to get this out. We will update you. If you have any questions regarding this product, please mail: jauc-win@fennec.com You will be mailed any updates automatically. Editor. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% NBC's ANTI-NET CAMPAIGN By Alaric (Alaric@f111.n106.z1.fidonet.org) A most heinous act of info-terrorism has beem committed against the net community by "Dateline", NBC's pseudo-news propaganda ministry. To further the government's need to destroy the haven of free speech known as cyberspace, NBC has successfully deluded much of their reactionary brain-dead audience into beleiving that NETWORKS ARE DANGEROUS - BBS's ARE CRIMINAL. Something must be done! (Something will be done - read on...) The September 1 episode of Dateline paraded adventursome youths who had lost the occasional finger while honing their pyrotechnical skills with anarcho-terrorist data gleaned from BBSs and the net. Forrest "Goebbels" Sawyer whined that the young and restless data-seekers of the 90's have easy access to exciting netware titles such as "Bomb Making For Fun and Profit" and "Anarchist's Cookbook" with no governmental interference of any kind! The existence of such networks and their accessibility by Gen-X misfits poses a clear and present danger to the national security of the United States. You may recall the first such attempt at an anti-net freedom propaganda campaign failed miserably and was aborted. Not enough concerned citizens fell for the ruse of nets being an unfettered sanctuary for child porn mongers, NAMBLA dating services and wily molesters. Since the first trial balloon was floated and quickly transpired, Plan-B has been put into action. Let's see how many suckers will fall for this one, "Computer networks are a dangerous source of subversive terrorist information and the children must be protected." (Janet Reno was conspicuously absent from said broadcast) A CongressMan-ic Oppresive named Ed Markey (Dem. Mass 7th Dist) is trying to hold hearings on the dangers of computer networking and supposedly try to draft some legislation that would allow the governmnet to regulate the nets or BBSs. Undoubtedly the legislation if passed will have a chilling effect on net traffic, which frankly is getting way out of hand if you ask any bureaucrat with something to hide. Severe penalties will be brought against any sysop who allows minors to access anything that might be contrued as dangerous. No doubt this definition will eventually receive a broad enough interpretation to forbid instructions on the manufacture of smoke bombs, casting of all lead ammunition, cleaning a .22 rifle, and even slingshot repair. The true goal of such legislation of course is not to "protect the children", but to stifle the grassroots organizing of anti- statist groups and to squash the tide of truth that is flooding cyberspace and often embarrassing government and corporate interests. Look for a "Child Protection Act" subtitled "concerning minors' access to dangerous information" to come before Congress within 18 months. Sysops will become responsible for what information gets to whom and what they do with it, regardless of the diligence they show in keeping the nets safe. Disclaimers and signed age statements will no longer suffice. You WILL be responsible for the information travelling though your board or newsgroup and you WILL be held accountable. Is the Pen more Powerful than the Sword? This question may never be answered fully, so why not hold on to both? Yet the propaganda forces and strong arm tactics forces that managed to squeak by the ban on assault swords will now be unleashed on the modern-day pamphleteers of the net. Al Gore wants to build a kinder and gentler super-information tollroad to keep your pens in line. Netters will be able to mount a powerful counter-attack that will surprise the hell out of Big Brother and Little Rock Sister. Notify Rep. Markey that we are watching and ready to fight. Fax-blast his office. Dig into his dirt and spread liberally. Likewise show NBC that we are listening. Reach out and touch these folks as follows: dateline@news.nbc.com Representative Edward J. Markey (D-7th) Malden, MA Office phone (in DC): 202-225-2836 Energy and Commerce Markey is the Chairman of the subcomittee on Telecommunications and Finance - under Energy and Commerce 202-226-2424 subcommitee phone 202-226-2447 subcommitee fax This post should be crossposted and distributed. "They can have my net access when they pry the 486 from my dead, carpel tunnel syndrome-infested hands." %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CYBERSPACE, MIAMI, CHAOS, AND CLINTON THE MIAMI DEVICE PROJECT By Marty Cyber (cyb@gate.net) From December 8-11, 1994, Prez Clinton and Veep Gore, the Administration's point-man on the Infobahn will be coming to Miami to host the 35 democratically elected heads of government of every country in the Western Hemisphere from Canada to Tierra del Fuego. The event is called the Summit of The Americas, and you folks who read Wired and ARE wired should plug into this event via the Internet and via any other bit-radiation-receiver-transmitter-device you have access too. I'd like to get your ideas on how Cyberspace and Cybertech could help make the Summit a success from the point-of-view of telecomm and info-technologies --- in a word, to try to begin building and operating a Global Brain and Nervous System for Planet Earth that can help us all in private, public, academic and community sectors use Cyberspace to create some kind of movement toward a New World Order out of the Chaos and Complexity we are now trying to surf on, without a truly functional "cybersurfboard." I'm attaching a couple of files that could stimulate some interesting exchanges --- and hoping to get the likes of Negroponte, Kelly, Kapor, Fields, Minsky, Schank, Bruckman, Clinton, Gore, Mesarovich, Forrester, Shannon, Wiener, Prigogine, Crowley, Castro, Mas Canosa, Irving, Brown, Chiles, Cuomo, Tyson, Simon, Beer, Gleick, --- and YOU --- to all kick in some ideas on how to use the Miami Summit as a kickoff environment for launching a World Summit on The Future via Cyberspace. Do give me some "negative feedback," as the cyberneticians have been known to say. And if any of you would like to warm your cybernetic buns in Miami in December --- real buns or virtual buns --- give me some "bit-radiations." I've got an Art Deco apartment building in the heart of Miami Beach's cyberhip South Beach, and might be able to put you up. Clinton's awareness of, and ability to use, the Principles of Chaos, Complexity, Cybernetics and other modern organizational management and learning techniques may be decisive in determining if his Administration is able to create a New World Order on the Edge of the Current Turbulent ORDER/CHAOS Meridian. Unfortunately, day-to-day decisiomaking and policy selection in the White House frequently has so much noise injected on its channels from Whitewater, Senator Damato-type ignoramus-based partisan-politics, that serious policy problems like Cuba, and other Foreign, Domestic and Economic matters tend toward more chaotic and less orderly states. What the White House could use --- perhaps initially placed within its Office of Science and Technology Policy --- is a National Cybernetics Council. This group would consist of the nation and the world's specialists in Complex Systems Theory, Chaos, Cybernetics, Cyberspace, and a new field which integrates all of the above: CYBERTECTURE: The design, construction, and operation of "cybernetic systems" for government, business, education and city-planning. Pete Nelson is correct in suggesting that we need politicians and polities that can "embrace change, uncertainty, paradox and contradiction," but we also must equip the public, private, academic and community sectors of American (and World) Society to deal with this new level of complexity. In December, if current White House plans stay in place, President Clinton and VP Al Gore, Clinton's point-man in advancing his Administration's high- level policy objective of building a National and Global Information Infrastructure (NII/GII) --- the highly publicized "Information Superhighway" --- both of American Government's top-managers will travel to Miami to host the Summit of The Americas December 8-11, 1994. Although the primary agenda topics for all the invited democratically elected leaders of every coutry in the Western Hemisphere from Canada to the southern tip of Latin America will be Economic Integration, Democratic Political Systems, and extending NAFTA into WHFTA (a Western Hemisperhic Free Trade Agreement), and important sub-topic will be infrastructure -- especially Telecommunications and Information Infratructure. With "the Cybertecture of Cybersystems, policy makers and their politiescan steer through the current chaotic turbulences of today into a new, and hopefully better, world order of tomorrow. Clinton and Gore, with the proper cybertools, may be just what the world needs now. Our non-profit consulting partnership in Miami Beach, "The MIAMI DEVICE PROJECT/RESEARCH AND DEVELOPMENT PARTNERSHIP, has developed a concept- paper for this December Summit of the Americas that could help Clinton, and the rest of use, develop and use the cybersystems we need to steer into our 21st Century Future. The following text is a summary of our first draft of the Miami Device Project concept. We'd appreciate your feedback, comments, critiques, and suggestions on how to create a World Summit on The Future during December 1994 and January 1995 on the Internet and other related media such as print, broadcast, multimedia, and face-to-face conferences. Also broadening the audiences for the work of the Santa Fe Institute, Bill Gleick, Ilya Prigogine, Mitchell Waldrop, and the other leading theorists and practitioners of Chaos/Complexity theory, and related researchers in Cybernetics and Management of Large Organizations, such as Barry Clemson, Jay Forrester, Stafford Beer, Mike Mesarovic, and the related work at US Government Research Labs as well as the great industrial research labs at IBM and ATT, could also bring the power of science to the problems of public policy and decision-making. THE MIAMI DEVICE PROJECT: AN AMERICAN AND INTERNATIONAL MISSION-QUEST FOR CYBERSPACE Something important, chaotic and with a hidden sense of latent order is happening in Cyberspace and Real-Space. Nobody who is honest can say they truly know, see, can predict or control what is happening with The Net, also known as: THE INFORMATION SUPERHIGHWAY. THE NATIONAL INFORMATION INFRASTRUCTURE. THE GLOBAL INFORMATION INFRASTRUCTURE. THE INFO BAHN. THE ELECTRONIC/DIGITAL SUPERHIGHWAY. CYBERSPACE. America and The World need models, mavens, moxie, methodologies and, last but not least, money --- to design, build, test, market and operate the National and Global Information Infrastructures. But most of all, the emerging Cyberspace Industry will need multimedia forums and discourse, even face-to-face conferences, that will clarify and shape the complex and relevant issues we must deal with as we enter the on-ramps to the Info Superhighway, and try to avoid the "road-kills" of entities both corporate and ideational that took the wrong turns. These forums and discourses may turn out to be the second most important set of discussions since the founding of the United States in 1776 in the shaping and shaping of America and the World as we approach the 21st Century. Adding to the complexity of the discussions about Cybernetic-Cyberspace technologies, applications and markets will be the fact that we will be using these ver same networks to discuss and develop their evolution ---- hopefully a democratic exchange of views from the many stakeholders and users of the Net who will design and live in the rapidly evolving civilization, societies and communities (virtual and real) that will be spawned by CyberTech, and the cultural, economic, political and community structures Cyberspace will enable. Cyberspace represents a new and irresistible era in the evolution of human culture and business under the sign of technology --- but what is turyly wonderful is that we still have the opportunity to shape the application of Cybertech toward an Age of Utopia rather than Dystopia. What is being born and can be shaped by discussion and effort is something that every normal child or animal possesses at birth, but has never fully existed intact over the entire face of the planet: A BRAIN FOR PLANET EARTH; A GLOBAL CENTRAL NERVOUS SYSTEM; A WORLD-WIDE SENSE AND PARTICIPATION IN A GLOBAL COMMUNITY; A CYBERNETIC CITY. The relevant discourses and forums must rationally and humanely deal with all the relevant issues connected with the new cybertechnologies and cybermedia --- and they are too important to the future of the planet to be left in the hands of government, business or universities alone. The community and the public but get informed and stay involved with the evolution of the Net. We have termed this multi-dimensional quest and process THE MIAMI DEVICE PROJECT TOWARD PARADISE REGAINED --- FOR GREATER MIAMI BEACH, SOUTH FLORIDA, AND THE WORLD-CLASS CITIES, CITIZENS, & NATIONS OF THE FUTURE. Why Miami? Why not Cambridge, or New York, or Chicago, or Los Angeles, or Milan, or Berlin or Paris London or Tokyo? In the history of the planet over the ages, from the time humankind first emerged from the primordial ooze, there have always been a succession of great city-regions that entered the world stage as truly world-class, international and cosmopolitan centers of trade, culture, education, technolgy, finance, transportation, and concentration of talent, dreams, wheels and deals. Just as the Central Florida region around Cape Canaveral and the Kennedy Space Center identified itself as America and the World's launch-pad and testbed for Aerospace, so is the Greater Miami Beach and South Florida region of the Sunshine State begun it movement toward center-stage as the nation and the planet's laboratory and test-bed for mankind's thrust into the truly Final and Next Frontier: Cyberspace. The Greater Miami Beach/South Florida region of 4 million, supported by a unique partnership of its private, public, academic and community sectors called The Miami Device Project, has been selected by the Clinton Administration to host in our region in December of 1994 the first, Western Hemisphere-Latin American Summit Conference, to be led by President Clinton and Vice-President Gore themselves. Greater Miami Beach's strategic geographic location and tropical, earthquake- free (though occasionally hurricane-prone) has positioned the region as an international gateway to not only Latin America and The Caribbean, but to Europe, Asia, and North America, also. A great airport .... the world's largest cruise-ship port and one of the most active seaports ... and coming soon, the world's first Cyberport-Teleport-Cyberspaceport ... a laboratory and crucible where the model Cybernetic City of The Future will be forged. Greater Miami Beach and it's multimedia links and partnerships with other sister cities, states, and nations intends to do for the science, art and business of cybernetic computer communications something similar, but much more benevolent for humanity, what the Manhattan Project did during World War II with the technology of thermonuclear energy, from which the atomic bomb was created. BUT THERE WILL BE A FUNDAMENTAL DIFFERENCE IN MISSION AND VISION IN THE MIAMI DEVICE PROJECT AS OPPOSED TO THE MANHATTAN PROJECT: The Miami Device Project's focus is to create and to provide universal access to knowledge tools and multimedia information systems for the human community, in both America and world-wide --- and to help design, build and sustain a truly Global Village and Cybernetic City where art, science, philosophy, technology and business can provide the human spirit with the lift of a driving dream into the 21st Century --- a Cybernetic Century of peace, prosperity and co-evolution for man, his systems, and our children. Norbert Wiener, the MIT professor of mathematics and inventor of the word and field of cybernetics, once commented in his book, "cybernetics and Society: the Human Use of Human Beings:" Mankind and society can only be truly understood by a study of the messages they transmit; in the future, messages between man and man, man and machine, and machine and machine will play an increasingly important role." If children can be considered messages we send to a future we may never see ourselves, the human children of our loins will themselves create new futures with the children of our minds --- our systems, networks and knowledge bases --- as humanity leaps toward the stars in our inner and outer universes. A First Draft on April 22, 1994, Friday Night, in Miami Beach, Florida, USA --- by Marty Cyber. (PS: Lab space and residential space grants are available in beautiful, sunny South Miami Beach's Art Deco District, where Miami Device is attempting to create a Science Deco District. if you cyberesearchers in Boston, New York, Washington or beyond are seeking weather-friendlier climates in December and afterwards, give me a call, e-mail, or letter outlining your own research interests and comments about the MDP Project. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CYBERSELL (TM) From Michael Ege (Michael_Ege@designlink.com) [Editor's Note: I HAVE NO FUCKING IDEA why someone who, in my opinion, misused the net, disregarded the complaining of others, and vowed to do it again, gets off dictating their new-found policy to us. They evidently want this to be written in stone. I think the rules below are good...and have been obeyed for decades by those with any tact! Evidently, the "Green Card Spammers" are just now getting a clue and want to take credit for ethics that already exist. Get a life MARTHA! -Ed.] Contact: Martha Siegel Cybersell(tm) 602/661-5202 SUGGESTED INTERNET COMMERCIAL SPEECH GUIDELINES Explanatory Preface The Internet is the most powerful communication tool in the world, today and for the forseeable future. Recently the circulation of an advertisement by two lawyers for their legal services raised tremendous controversy as to the manner and location that ads should be placed on the Internet. Two years ago the National Science Foundation lifted the ban on Internet advertisements that they had previously imposed. Yet, the idea of commercialism an advertising in this increasingly pervasive medium is still controversial. The primary anti-ad forces can be found among the academics and technical workers who were the early residents of the Internet. Where advertising is an integral part of other mediums, this highly vocal faction is attempting, not without some success, publicly to characterize advertisers as inferior to others who supply information via computer. While the ad critics do not speak with a single voice, but rather express a diversity of opinions, several elements emerge with some consistency. First, there is an overall presumption that advertising is unwanted and useless. Even though those who who have made the pioneering forays into Internet advertising have met with financial success (proving that advertising messages are indeed accepted) the vocal minority continues to insist otherwise. Based on this faulty premises advertisers are told that custom demands that they approach customers only in an indirect manner. Specifically, advertisers are told that it is apropriate to to places ads only on channels set aside to carry nothing but advertising. Alternatively, an advertiser may place a message at a fixed locale in cyberspace but must use other mediums such as billboards and television ads to announce the computer location and ask the customer to go and look for it. It is unanimously agreed that noone controls the Internet and there is no legal requirment to follow these dictates. Nevertheless the vocal Internet minority that custom requires adherence to its outdated philospophy. The guidlines presented here refuse to recognize the unreasonable nature of those who are anti-advertising, Commercial activity on the Internet is a valuable and worthwhile use of this resource and advertising is a key element of such commercial use. It should be recognized that virtually no busines can be successful without advertising. The old-think view of some Net extremists that advertising is as an unwanted an unpleasant annoyance to be marginally tolerated is not good for the development of the Internet, nor healthy for the World economy. Recently special groups and networks devoted exclusively to product and service promotion have begun to be established. While these are an exciting pert of the development of the Information Superhighway, it is not acceptable or practical for advertising to be kept in a restricted area, separate from other Internet activities. Advertising is not relegated to such an inferior position in any other medium, thus it should not be so with respect to the Internet. Neither those who advertise on the Internet be forced to do so passively. In no ther medium is it required that a potential customer deliberately seek out an advertisement rather than having it placed before him or her. The idea that the only acceptable way to advertise on the Internet is a system where a non-computer medium is utilized to request that a potential customer look for such information at a particular site in cyberspace is a totally unacceptable limitation. Such convoluted methods are not effective or convenient for the advertiser or the consumer. The easy, free flow of information is the goal of the Internet. Advertising is valuable and useful information. It is the concept of free flow that should govern any Internet advertising policy. GUIDELINES * Usenet It is recognized that the Usenet is only public gathering place currently existing on the Internet. It is a legal and appropriate forum in which to place commercial messages. * Distribution Distribution of advertising messages to newsgroups on the Usenet will be based upon the demographic and /or interst of users of the newsgroups, ensuring that the newsgroups selected are those most often used by people likely to be interested in a particular commercial message. * Identity All commercial messages should be readiliy identifiable so users can read them in a fully informed manner. For example, a conventional, easily recognizable "AD" identifier in the title of all commercial message offerings may serve this purpose. * Filtering Advertisers shall respect the right of all individual Internet users to, though the use of existing or evolving technology, filter out commercial messages if they so choose. However, any upsteam provider short of the end users should refrain from making that decision for the individual, who may welcome a particular commercial message. Anything else would amount to censorship. * Sincerity Commercial messages should be offered only when there is a sincere belief that the information will prove useful to Internet users. The inclusion of useful information with the advertising copy is encouraged. However, it is als recognized that solicitation of purchases and directions on how to make such purchases are a validethical pursuit of the advertiser, as well as a useful convenience fot the consumer. (In addition to the above Internet-specific guidelines, the following suggestions are based upon time-tested, proven codes already in existence. {Sources are cited with each entry}) * Truth Advertising shall tell the truth and shall reveal significant facts, the concealment of which would mislead the public (AAF's Advertising Principle of American Business) * Responsibility Advertising agencies and advertisers shall be willing to provide substantiation of all claims made (WSJ Guide to Advertising Policy and Production) * Taste and Decency Advertising shall be free of statements, illustrations, or implications that are offensive to good taste or public decency (Same Source) * Substantiation Advertising claims shall be substantiated by evidence in possession of the advertiser and advertising agency, prior to making such claims. (Advertising Principles of American Business) * Omission An advertisement as a whole (ed. note: original says "shoe") may be misleading although every sentence separately considered is literally true. Misrepresentation may result not only from direct statements but from omission of material facts (Better Business Bureau Code of Advertising) * Testimonials Advertising containing testimonials shall be limited to those of competent witnesses who are reflecting a real and honest opinion or experience. (Advertising Principles of American Business) * Composition The composition and layout of advertisements should be such as to minimize the possibility of misundertanding. (BBB Code) * Price Claims Advertisers shall not knowingly create advertising that contains price claims which are misleading. (AAAA Standards and Practices) * Unprovable Claims Advertising shall avoid the use of exaggerated or uprovable claims. (WSJ Guide) * Claims by Authorities Advertisers will not knowingly create advertising that contains claims insufficiently supported or that distorts the true meaning or practical application of statements made by professional or scientific authority. (Standards and Practices) * Guarantees and Warranties Advertiser of such shall be explicit with sufficient information to apprise consumers of their principal terms and limitations, or, when space and time restrictions pleclude such disclosures, the advertisement shall clearly reveal where the full text of the guarantee or warranty can be examined before purchase. (Advertising Principles) * Bait Advertising Advertising shall not offer products or services for sale unless such offer is constitutes a bona fide effort to sell the advertised products or services and is not a device to switch consumers to other goods or services, usually higher price. (Same Source) %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SOME INFO ON GREEN CARD SPAM The first surprise is that "pericles.com" has disappeared from the PSI name servers and from the "whois" database! But they have a new domain, "SELL.COM". The change happened just two days ago: % whois pericles.com No match for "PERICLES.COM". % whois pericles-dom No match for "PERICLES-DOM". % whois canter Canter & Siegel (SELL-DOM) SELL.COM Canter, Laurence A. (LC42) postmaster@SELL.COM (602) 661-3911 [and some other entries that are irrelevant here] % whois sell-dom Canter & Siegel (SELL-DOM) P.O.Box 13510 Scottsdale, AZ 85267 Domain Name: SELL.COM Administrative Contact: Canter, Laurence A. (LC42) postmaster@SELL.COM (602) 661-3911 Technical Contact, Zone Contact: Network Information and Support Center (PSI-NISC) hostinfo@psi.com (518) 283-8860 Record last updated on 09-Aug-94. Domain servers in listed order: NS.PSI.NET 192.33.4.10 NS2.PSI.NET 192.35.82.2 % whois lc42 Canter, Laurence A. (LC42) postmaster@SELL.COM Canter & Siegel P.O.Box 13510 Scottsdale, AZ 85267 (602) 661-3911 Record last updated on 09-Aug-94. Queries from nslookup asking for an IP address or MX record for sell.com yield no fruit. The query "ls sell.com" is refused by the PSI name servers. But it seems logical to ask about "cyber.sell.com", and sure enough, it's there: cyber.sell.com inet address = 199.98.145.99 cyber.sell.com preference = 5, mail exchanger = cyber.sell.com This is the same address that pericles.com had until a couple of days ago. It still has no backup mail exchanger, but that may not be so important any more, because.... The host at this address is no longer a PC running Microsoft Windows. It's now a Unix box! That's right: if you try to telnet to this host, at the customary port 23, you're greeted with this prompt: UNIX System V Release 4.2 (cybersell) (pts/0) login: There are also server processes listening on ports 512(rexecd), 513 (rlogind) and 514 (rshd). They've got an FTP server (port 21), but it doesn't accept "anonymous" or "ftp" as a user name. They've also got an SMTP server listening (port 25), but it apparently does not implement the "vrfy", "expn", or "help" commands--all of these yield "502 ... Not recognized" error replies. The "rcpt to" command seems to accept any recipient name as legitimate--any validity check must come later, after it has already accepted the mail. They don't have an NNTP(119), Gopher(70), or Web(80) server--at least not on the conventional ports for such services. They do have a few other active ports: echo(7), discard(9), daytime(13), ttytest(19), and time service (37). There's also something that answers a connection to port 199, but I have no idea what that service might be. Anyone else know? If you do a traceroute, you get this: .... 9 psi-nsf.psi.net (192.41.177.246) 27 ms 31 ms 27 ms 10 core.net155.psi.net (38.1.2.3) 145 ms 129 ms 145 ms 11 serial.phoenix.az.psi.net (38.1.10.37) 227 ms 195 ms 195 ms 12 38.2.37.6 (38.2.37.6) 230 ms 184 ms 238 ms 13 cyber.sell.com (199.98.145.99) 195 ms 215 ms 219 ms Someone who knows more about routing and networks than me might be able to analyze this for information about the nature of their connection. What is "38.2.37.6"? It has no hostname, and if you try to telnet to it, it asks for a password without first asking for a username. I hope all of the above information is useful to the rest of the Usenet community. If you've got your site aliased to "pericles.com", you should consider adding a new alias of "cyber.sell.com". I look forward to hearing more information from others more knowledgeable than myself. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CABLE RESOURCES ON THE NET By John Higgins (higgins@dorsai.dorsai.org) Updated September 1994 Compiled by Multichannel News. Copyrighted by John M. Higgins 1994. All rights reserved. Additional copyright information at bottom. Multichannel News Contacts: Marianne Paskowski, editor-in-chief (Mpcable@aol.com) John M. Higgins, finance editor: (higgins@dorsai.dorsai.org) Multichannel News subscription information: 800-247-8080. A bargain at $89/year. Editorial Department: Voice) 212-887-8390; Fax) 212-887-8384 -=-=-=-=-=-=-=THE BEST CABLE STUFF-=-=-=-=-=-=-= Telecomreg (mailing list); Cable Regulation Digest (newsletter); fcc.gov (document archive); FCC Daily Digest (finger); cablelabs.com (document archive); rec.video.cable-tv (Usenet newsgroup); Edupage (newsletter) -=-=-=-=-=-=- For a bunch folks wanting to rule the info highway, cable's status on the Internet echoes MTV:Unplugged. There are some signs of senior execs starting to tap in, but they're few and far between. There are domains listed in the name of cable companies (TCI, Cablevision Systems, Viacom) but many seem to be inactive. Comcast and Viacom are on hopelessly limited MCI Mail systems that regularly snarl. To steal a line, cable execs hope to build the highway but they can't drive. Example: Recently I needed a copy of the freshly revised Hollings bill S.1822. I couldn't get it out of the Senate, the National Cable Television Association or any cable source. But I surfed over to Bell Atlantic's Internet site (ba.com) and grabbed the whole thing (including amendments). The telcos are clearly hipper to this info highway stuff than the cable kids. The good news is that the number of Internet resources useful to cable professionals is growing. The bad news is that they're primarily provided by telcos and regulators. But it's a start. Here's a cluster of cable resources of all sorts that I've encountered. GIMME FEEDBACK! Send us updates, particularly on the technical side. (And not just how to pirate HBO and pay-per-view porno, please.) "Differently clued" cable newbies should feel free to contact us with any questions on how to navigate. Many of these resources are NOT accessible to subscribers of Prodigy, America On-Line and Compu$erve. A similar list of broadcasting resources on the net is compiled by Neil Griffin (ngriffin@nyx.cs.du.edu). ** Mailing Lists TELECOMREG: A mailing list focusing on telecomunications regulation. Subscribers got an early peek at the FCC's latest cable price formula, Founded by Barry Orton, a consultant to municipal regulators, TELECOMREG is very high volume and fairly high quality. How to get on it: E-mail (listserver@relay.adp.wisc.edu; SUBSCRIBE TELCOMREG YOUR NAME) SCTE-LIST: A mailing list on cable technology apparently tied to the Society of Cable Television Engineers that just cranked up. It's too new to judge the quality. How to get on it: E-mail (listserver@relay.adp.wisc.edu; SUBSCRIBE SCTE-LIST YOUR NAME) I-TV: Discussion list centered on two-way Interactive Television. Very new, and appears to be focusing mostly on education and community development. So far it's pretty lame, but that could change. Expect lots of public-access types to be kicking around, as opposed to folks actually trying to make a business of it. Uploading press releases is -- for some bizzare reason -- encouraged. How to get on it: E-Mail (listserv@knowledgework.com; SUB I-TV YOUR NAME). TELECOM DIGEST: Oriented toward voice telephony, but covers all sorts of telecommunications topics. Fairly techie. How to get on it: E-mail (telecom-request@eecs.nwu.edu; SUBSCRIBE YOUR@ADDRESS); Usenet (comp.dcom.telecom). ** Publications CABLE REGULATION DIGEST: A weekly summary of regulatory news from Multichannel News. The best way to obtain it each week is on the TELECOMREG list. How to get it: FTP (ftp.vortex.com: /tv-film-video/cable-reg) Gopher (gopher.vortex.com : /TV/Film/Video) FCC DAILY DIGEST: Washington telecom lawyer Robert Keller attaches the most recent edition and referenced documents to his "finger" file. A really nice effort by Keller. Be sure to open your capture buffer first, as the file is many screens long. Also available at the fcc.gov ftp and gopher site. (see below). How To Get It: Finger (finger rjk@telcomlaw.com). EDUPAGE: Tip sheet on information technology and media issued three times weekly. Quickie summaries primarily of newspaper articles, primarily from the majors. How to get it. E-Mail (listproc@educom.edu, SUB EDUPAGE YOUR NAME). FITZ'S SHOPTALK: Daily dispatches on the TV business, primarily networks and local stations put there's plenty of cable in there. Put out by media headhunter Don FitzPatrick. Primarily summaries of wire-service and major newspapers, but also includes some full-text reprints. How to get it: E-mail (shoptalk-request@gremlin.clark.net, SUBSCRIBE YOUR@ADDRESS). SKYGUIDE: This one's from a Brit that doubtless watches too much TV. The Euro cable and satellite television scene. Concentrates on BSkyB but also romps off onto the continent. How to get it: E-mail (bignoise@cix.compulink.co.uk), Usenet {preferred!} (alt.satellite.tv.europe). SATNEWS: A newsletter about satellite television broadcasting around the world. How to get it: E-mail: (listserv@orbital.demon.co.uk, SUBSCRIBE YOUR NAME). ** FTP, Gopher, and WWW Sites CABLELABS: Finally, a cable-specific document archive! CableLabs, the industry's R&D greenhouse, has established an anonymous FTP archive at cablelabs.com. It's still "under construction", as they say. There's a small collection of techie documents in it so far, but more is promised. How to get there: FTP (ftp.cablelabs.com); WWW (http://www.cablelabs.com/). FEDERAL COMMUNICATIONS COMISSION: Loads of documents, orders, etc. but they're poorly orgainized. How to get there: Gopher (fcc.gov); FTP (fcc.gov). PEPPER & CORAZZINI: A D.C. telecom law firm has put up an archive of documents and memos by their lawyers on related to broadcasting, cable, common carriers, PCS and information law. P&C's e-mail contact is Neal J. Friedman (nfriedma@clark.net) How to get there: Gopher (gopher.iis.com//11/p-and-c); FTP (ftp.iis.com/companies/p-and-c) WWW (http://www.iis.com/pandc-home.html). NTIA: National Telecommunications and Information Administration has a document site, notably from Clinton's National Info Infrastructure committe. Seems to be down frequently. How to get there: Gopher (ntia.doc.gov); FTP (ntia.doc.gov). BELL ATLANTIC: Telco propaganda (press releases, speeches, Congressional testimony) mixed in with lots of useful regulatory documents. How to get there: Gopher (ba.com); FTP (ba.com). MFJ TASK FORCE: More RBOC lobbying on-line. But it's a hell of a lot better than anything cable has to offer. How to get there: Gopher (bell.com). C-SPAN: The public-affairs network has a gopher site with a whole mess of programming info for viewers. How to get there: Gopher (c-span.org); ftp (c-span.org). CNN: For reasons I haven't quite figured out, the University of Maryland has a gopher site carrying the text of CNN's Headline News stories, putting up dozens of national and international news stories daily, with an archive going back several days. How to get there: Gopher (info.umd.edu). ** Usenet Groups The quality of cable info on Usenet newgroups is mixed. The most active cable group is rec.video.cable-tv. It once was dominated by tips on stealing cable. However, in recent months three cable system-level execs from Time Warner (Dean Stauffer), Continental (Scott Westerman) and Century (Lloyd Sanchez) have virtually turned the group around by patiently and respectfully responding to cable subscribers' questions, legit complaints and outright rants. Informed and informative answers, what a concept! Give them a raise. Usenet is one way to sample what subscribers are buzzing about. Is your company included on the recent list of "worst cable companies"? rec.video.cable-tv Most active. alt.cable-tv.re-regulate Traffic has really picked up. Lots of complaining subscribers. alt.satellite.tv.europe Active group on Euro cable and satellite programming. alt.politics.datahighway Not too bad. alt.tv.public-access Reportedly exists, but I've never seen it. comp.dcom.telecom Moderated discussion of telco issues. Telecom Digest appears here. alt.dcom.telecom Breakaway group started by telco folks irritated by the ones dominating comp.dcom.telecom alt.dcom.catv I've NEVER seen pertinent traffic on this group. alt.tv.comedy.central Dull. alt.tv.mst3k Comedy Central's Mystery Science Theater 3000. alt.tv.hbo Hardly any traffic. alt.tv.nickelodeon Fans of the kid's network. alt.fan.ren-and-stimpy 'Nuff said. ** FAQ's There's a few frequently-asked-questions lists kicking about. The Cable TV FAQ is all about pirating HBO (YAWN!), with many technical details. Can't find the archive site, however. The DBS and wireless cable FAQs are more useful to non-pirate professionals. All three are posted are posted in rec.video.cable-tv periodically. High- power DBS is in rec.video.satellite. I'll add archive sites as I find them. CABLE TV FAQ How to get it: Usenet (rev.video.cable-tv). WIRELESS CABLE FAQ How to get it: FTP (rtfm.mit.edu:/pub/usenet/ rec.video.cable-tv/Wireless_Cable_TV_FAQ); Usenet (rec.video.cable-tv). HIGH-POWER DBS FAQ: Not archived anywhere. How to get it: Usenet (rec.video.cable-tv, rec.video.satellite). ** Canada Mooseland has its own cluster of resources: USENET GROUPS: can.infohighway can.infobahn MAILING LISTS PAC-HIWAY: Run by Public Advisory Council on Information Highway Policy. How to get it: E-mail: (listprocessor@cunews.carleton.ca; SUBSCRIBE YOUR NAME) ISCNEWS: Mailing list of news releases, fact sheets, etc. from the federal agency Communications Canada How to get it: E-mail (listserv@debra.dgbt.doc.ca; SUBSCRIBE ISCNEWS YOUR NAME) THE INTERNET JOURNAL OF GOVERNMENT RELATIONS: Bi-weekly commentary on government action regarding information technology, trade and procurement in North America, but primarily Canada. How to get it: E-mail (pcanniff@fox.nstn.ns.ca) SITES INDUSTRY CANADA: Canada's equivalent to the U.S. Department of Commerce How To Get There: Gopher (debra.dgbt.doc.ca /Industry Canada Docs) FTP (debra.dgbt.doc.ca /pub look in both "gazette" and "isc" directories) WWW: (http://debra.dgbt.doc.ca/isc/isc.html) Copyright 1994 by John M. Higgins. This list may be redistributed provided that the article and this notice remain intact. This article may not under any circumstances be resold or redistributed for compensation of any kind without prior written permission from John M. Higgins. That includes publication by magazine or CD-ROM. But if you're interested, talk to me. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% IDS ANNOUNCES NEW ROCHELLE, NEW YORK POP (AC 914) From: green@ids.net InteleCom Data Systems, Inc, operators of the IDS World Network, the worlds first full-service Internet Access service geared towards end-users, announces the latest of its new Points of Presence to be brought online. New Rochelle, New York members may access IDS via (914) 637-6100 at speeds of up to 28.8k baud using the new V.FAST technology. IDS offers dialup Internet access for a low flat monthly fee, as well as PersonalSLIP - a dial-on-demand, low-cost SL/IP service starting at $20 per month. Here is our standard electronic brochure. For more information, contact IDS Customer Service at (800) IDS-1680. :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:. The IDS World Network Internet Access Service :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:. A great place for the beginner to start with, and an easy enough place for the experienced user to fully utilize the facilities on the Internet. Features: o Usenet NEWS o Internet Mail o TELNET, FTP, FINGER, TALK o Menu Driven Interface o UPI Newswire o VAX/VMS DCL Access o Low affordable prices The IDS World Network Internet Access Service is a great meeting place on the Internet. We offer free BBS service to everyone; message areas and local email are all free. Stop in - meet and talk with people from all over the world... from Albania to Zimbabwe. Yugoslavia... Russia... Germany... Australia... and all of them participate in our online message bases, providing inteligent discussion and an excellent way to make the world a bit smaller by bringing everyone together electronicly. Subjects range from local parking tickets to the global environment and possible solutions for world problems. The IDS World Network was the first system to obtain NSFnet access for members - we're the longest running Internet "public access" service, with years of experience providing easy access for beginners, and ease of use for experienced Internet gurus. We have a network of several machines handling the load at our Operations Center in Rhode Island, with dedicated NEWS servers, SL/IP servers and UUCP machines. Now we're reachable through the CompuServe Packet Network - for just $4 per hour on top of the regular monthly subscription rates, you can access the IDS World Network from any local number for the CompuServe Packet Network - for your nearest CPN number, call our customer service line at (800) IDS-1680. The rates for using IDS through the CompuServe network are just $4 per hour, day or night - no higher rate for peak usage. PersonalSLIP and other SL/IP services are not available through the CompuServe Packet Network, although IDS UUCP services are... INTERNET SERVICES Users have their own workspace with unlimited file size storage; files remain in the workspace for 24 hours (giving the user ample time to download files to their personal computer). Service types: Standard Account - All Internet functions, standard menu account, VAX/VMS DCL Access. Services arranged by category in an easy-to-use, menu driven interface. All for $15 per month ($17 per month when dialing through Miami). PersonalSLIP - Your own Internet SL/IP connection, Dial-On-Demand. $20/month for 20 hours, $2/hr each additional hour. POP Mail service included for mail storage and retrieval, for use with popular email programs such as Eudora, QVTnet, and others. Also includes NNTP server access for offline/online NEWS reading. Dedicated PersonalSLIP - Your own Internet SL/IP connection, 24 hours a day, 7 days a week, your own Single-Host IP address and Domain Name, $75/month There is a $450 startup charge for this service. Dedicated SL/IP - Network connections for multiple hosts and all of the above for $200/month. There is a $450 startup charge for this service. UUCP Services - Connect your BBS or your own private system. We support 14.4k baud modems on all of our UUCP lines. One-time setup fee of $25, plus $20/month for mail and up to 100 newsgroups, $35/month for up to 500, $45/month for a full feed. One time fee of $25 for those wishing to apply for their own domain. ATTENTION TEACHERS AND EDUCATORS IDS works heavily with teachers and educators around the world to help bring them together to utilize the Internet in the classroom. If you'd like more information, send electronic mail to info@ids.net. Rhode Island teachers: contact Reo Beaulieu at the RI Department of Education for your free account. CURRENT DIALUP CALLING AREAS Middle Rhode Island (401) 884-9002 Northern Rhode Island (401) 273-1088 Southern Rhode Island (401) 294-5779 Miami, Florida (305) 534-0321 Merrit Island, Florida (407) 453-4545 (Brevard County, FL) New Rochelle, New York (914) 637-6100 All CompuServe Packet Network numbers. Other Florida areas forthcoming. --> ALL USERS MUST ADHERE TO ACCEPTABLE USE POLICIES OF THE APPROPRIATE <-- --> NETWORKS <-- To access the IDS World Network; telnet to ids.net [155.212.1.2], or dial us via modem at (401) 884-9002. If you are dialing direct, type IDS at the first prompt and then sign on as GUEST when it asks for a Username. Web users, try the IDS Web Server. For Customer Service, send email to info@ids.net, or call (800) IDS-1680 voice. Within Rhode Island, call (401) 884-7856. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% THE MEDIA LIST By Adam M. Gaffin (adamg@world.std.com) This is a listing of newspapers, magazines, TV stations and other media outlets that accept electronic submissions from readers and viewers, along with their main e-mail addresses. It would be almost impossible to maintain a listing of individual reporters, editors and the like; if you want to reach a specific person, try sending a request to the given media outlet's general address (but see below for a one-time listing for the Ottawa Citizen). If you are submitting a letter to the editor or an op-ed piece, it's a good idea to include your mail address and a daytime phone number. Publications generally try to verify authorship and will not run submissions without some way to check whether you really wrote the item to which your name is attached. Please send any additions, deletions or corrections to the address at the end of this list. Look for new editions in the alt.journalism, alt.internet.services and comp.misc newsgroups. My thanks to all who have contributed! Because of these kind folks, this list is now substantially longer than it was just a week ago. SPECIAL NOTE: The last part of this list contains the e-mail addresses for reporters and editors at the Ottawa Citizen. Thanks to the Citizen for the information. DAILY NEWSPAPERS Middlesex News, Framingham, Mass. mnews@world.std.com Boston Globe Story Ideas news@globe.com Circulation Requests circulation@globe.com Letters to the Editor letter@globe.com Submissions to "Voxbox" column voxbox@globe.com Comments on Coverage/Ombudsman ombud@globe.com Ask the Globe ask@globe.com Thursdays Calendar Section list@globe.com Health & Science Section howwhy@globe.com Confidential Chat chat@globe.com City Weekly Section ciweek@globe.com Religion Editor religion@globe.com Arts Editor arts@globe.com Champaign-Urbana (Ill.) News-Gazette gazette@prairienet.org Chronicle-Telegram, Elyria, Ohio macroncl@freenet.lorain.oberlin.edu Colorado Daily, Boulder, Colo colorado_daily@onenet-bbs.org The Guardian, U.K. letters@guardian.co.uk Notes and Queries nandq@guardian.co.uk Morning Journal, Lorain, Ohio mamjornl@freenet.lorain.oberlin.edu Ottawa Citizen, Ottawa, Ont. ottawa-citizen@freenet.carleton.ca Portland Oregonian oreeditors@aol.com Sacramento Bee sacbedit@netcom.com Phoenix Gazette phxgazette@aol.com St. Petersburg (Fla.) Times 73174.3344@compuserve.com San Diego Union-Tribune computerlink@sduniontrib.com San Francisco Examiner sfexaminer@aol.com San Jose Mercury-News sjmercury@aol.com Santa Cruz County (Calif.) Sentinel Letters to the editor sented@cruzio.com News desk sentcity@cruzio.com Seattle Times edtimes@hebron.connected.com Tico Times, Costa Rica ttimes@huracon.cr Washington Square News, NYU nyuwsn@aol.com WEEKLY NEWSPAPERS Hill Times, Ottawa, Ont. ab142@freenet.carleton.ca Journal Newspapers, D.C. area thejournal@aol.com The Mirror, Montreal, Quebec mirror@fc.babylon.montreal.qc.ca Palo Alto Weekly, Palo Alto, Calif. paweekly@netcom.com. The Village Voice, New York, N.Y. voice@echonyc.com MAGAZINES American Journalism Review amerjourrv@aol.com Brown Alumni Monthly, Providence, R.I. bam@brownvm.brown.edu Business Week bwreader@mgh.com Chronicle of Higher Education editor@chronicle.merit.edu Details detailsmag@aol.com Frank Magazine, Ottawa, Ont. ag419@freenet.carleton.ca Focus, Germany 100335.3131@compuserve.com GQ gqmag@aol.com Illinois Issues, Springfield, Ill. wojcicki@eagle.sangamon.edu. Mother Jones x@mojones.com The New Republic editors@tnr.com New Scientist, U.S. bureau 75310.1661@compuserve.com Oberlin Alumni Magazine alummag@ocvaxc.cc.oberlin.edu. OutNOW!, San Jose, Calif. jct@netcom.com Playboy playboy@class.com S.F. Examiner Magazine sfxmag@mcimai.com Scientific American letters@sciam.com Soundprint soundprt@jhuvms.hcf.jhu.edu Der Spiegel, Germany 100064.3164@compuserve.com Stern, Hamburg, Germany 100125.1305@compuserve.com Sky & Telescope, Cambridge, Mass. skytel@cfa.harvard.edu Spectrum, New York, N.Y. n.hantman@ieee.org Stern, Hamburg, Germany 100125.1305@compuserve.com Time timeletter@aol.com Ultramarathon Canada an346@freenet.carleton.ca USA Weekend usaweekend@aol.com U.S. News and World Report 71154.1006@compuserve.com Wired editor@wired.com NEWS/MEDIA SERVICES Cowles/SIMBA Media Daily simba02@aol.com Media Page mpage@netcom.com Newsbytes newsbytes@genie.geis.com NEWSLETTERS Dealmakers Ted.Kraus@property.com Information Law Alert markvoor@phantom.com Multichannel News higgins@dorsai.dorsai.org Society of Newspaper Design fairbairn@plink.geis.com Spec-Com Journal spec-com@genie.geis.com Western Producer, Saskatoon fairbairn@plink.geis.com RADIO AND TV STATIONS AND NETWORKS CJOH-TV, Ottawa, Ont. Can. ab363@freenet.carleton.ca KARK, Little Rock, Ark. newsfour@aol.com KOIN, Portland, OR. koin06A@prodigy.com WBFO, Buffalo, N.Y. wbfo@ubvms.cc.buffalo.edu WBFO-FM, NPR, Buffola, NY. wbfo@ubvms.cc.buffalo.edu WCBS-AM, CBS, NYC. news88@prodigy.com WCVB-TV, Boston, Mass. wcvb@aol.com WCCO-TV, Minneapolis, Minn. wccotv@mr.net WDCB Radio, Glen Ellyn, Ill. scotwitt@delphi.com WEOL-AM, Elyria, Ohio maweol@freenet.lorain.oberlin.edu. WNWV-FM, Elyria, Ohio maweol@freenet.lorain.oberlin.edu. WNYC, New York, N.Y., "On the Line" 76020.560@compuserve.com WRVO-FM, Oswego, N.Y. wrvo@oswego.edu WTVF-TV, Nashville, Tenn. craig.owensby@nashville.com WVIT-TV, New Britian, Conn wvit30a@prodigy.com WXYZ-TV, ABC, Detroit. wxyztv@aol.com WWWE 1100 AM Cleveland, OH talk11a@prodigy.com BBC "Write On" iac@bbc-iabr.demon.com.uk CBC Radio, "Brand X" brandx@winnipeg.cbc.ca Fox TV foxnet@delphi.com Maine Public TV, "Media Watch" greenman@maine.maine.edu Monitor Radio Int'l "Letterbox" letterbox@wshb.csms.com NBC News, New York, N.Y. nightly@nbc.ge.com NBC News, "Dateline" dateline@nbc.ge.com NPR "Talk of the Nation" totn@aol.com NPR "Talk of the Nation/Sci. Friday" scifri@aol.com NPR "Fresh Air" freshair@hslc.org NPR "Weekend All Things Considered" watc@cap.gwu.edu NPR "Weekend Edition/Sunday" wesun@clark.net COMPUTER PUBLICATIONS Communications News 489-8359@mcimail.com Corporate Computing 439-3854@mcimail.com Computerworld computerworld@mcimail.com Communications Week 440-7485@mcimail.com Data Communications 416-2157@mcimail.com Datateknik, Sweden datateknik@dt.etforlag.se Enterprise Systems Journal 543-3256@mcimail.com Home Office Computing hoc@aol.com Information Week informationweek@mcimail.com Infoworld letters@infoworld.com The Internet Business Journal mstrange@fonorola.net The Internet Letter netweek@access.digex.net iX, Germany post@ix.de Journal of C Language Translation jclt@iecc.com LAN Times 538-6488@mcimail.com Network Computing network_computing@mcimail.com Network Management network@world.std.com PC Magazine 157.9301@mcimail.com PC Week 557-0379@mcimail.com Telecommunications 311-1693@mcimail.com Windows User 75300.3513@compuserve.com -------------- Ottawa Citizen (please note that all of these addresses save the last one are at Ottawa Freenet, which has a domain of freenet.carleton.ca; to reach Doug Yonson from outside the Freenet, for example, write af719@freenet.carleton.ca). af719 Doug Yonson The Citizen's FreeNet coordinator ac583 Peter Calamai Editorial Page Editor ae273 Johanne Vincent Editorial Page assistant ae836 Tony Cote Action Line columnist ah206 Alana Kainz High technology reporter/columnist ac806 Deborah Richmond High Priority editor ag955 Francine Dube Social trends reporter af391 Peter Hum Reporter ai997 Mike Shahin Outaouais Reporter ae451 William Speake Part-time reporter ag696 Hilary Kemsley Years Ahead columnist (seniors issues) ai379 Drew Gragg Assistant Photo Director af227 Jack Aubry National Reporter (aboriginal affairs) ae379 Daniel Drolet Reporter al715 Liisa Tuominen Librarian ak570 Michael Groberman Theatre critic am906 Robert Sibley Reporter an643 Dave Rogers Reporter ao096 Wanita Bates Consumer, fashion reporter an552 Tony Lofaro Reporter am100 Seymour Diener Asst news editor, real estate columnist ao483 Mark Richardson Reporter ap171 Karen Murphy-Mackenzie Copy staff ao450 Bernard Potvin Copy staff ap764 Massey Padgham Foreign editor aq148 Carolyn Abraham Police reporter aq438 Shelley Page Science reporter Rick Laiken, 71277.3651@compuserve.com Assistant managing editor (OCRINET contact, newsroom computer systems specialist & libel expert) What follows are new entries and corrections for the Media List, which is a listing of newspapers, radio stations, etc. that accept electronic submissions. This is NOT the complete list. You can obtain the entire list via ftp at ftp.std.com as customers/periodicals/Middlesex- News/medialist. If you'd rather receive the list and updates automatically via e-mail, write to majordomo@world.std.com Leave the "subject:" line blank. As your message, write: subscribe medialist To leave the list, write to majordomo@world.std.com with a message of unsubscribe medialist NOTES ON USING THIS LIST: If you want a publication to print your letter, include your postal address and phone number for verification purposes. Also, please consider NOT using this list to send a mass mailing to every single listed media outlet. A bicycling magazine is unlikely to be interested in your thoughts on abortion, no matter how cogent they are, for example. My thanks again to all who have contributed! Comments and suggestions -- and especially addresses of unlisted media organizations -- are most welcome. Please send them to adamg@world.std.com (please note the 'g' in adamg; adam@world.std.com is a very nice person who has been graciously forwarding mis-addressed e-mail, but he is not me). NEWSFLASH: The New York Times is planning a formal Internet connection, we read on the CARR-L mailing list, sometime this summer or early fall. Once in place, the domain will be nytimes.com. CARR-L is a list for talking about the use of computers in newsrooms and journalistic research. To subscribe, send e-mail to listserv@ulkyvm.bitnet. Leave the "subject:" line blank, and as your message, write: subscribe carr-l Your Name (substituting, of course, your name). NOTE: Listings marked with an asterisk are corrections. DAILY NEWSPAPERS The Baltimore Sun To reach reporters or comment on the paper (NO letters to the editor or subscription requests) baltsun@clark.net The Columbus (Ohio) Dispatch crow@cd.columbus.oh.us Letters to the editor letters@cd.columbus.oh.us Jerusalem (Israel) Post jpost@zeus.datasrv.co.il The Olympian, Olympia, Wash. olympian@halcyon.com WEEKLY NEWSPAPERS City Sun, New York, N.Y. Computer column sysop@f618.n278.z1.fidonet.org COLLEGE NEWSPAPERS The Muse, Memorial Univ., Newfoundland muse@morgan.ucs.mun.ca The Tech, MIT, Cambridge, Mass. Advertising ads@the-tech.mit.edu Arts arts@the-tech.mit.edu News news@the-tech.mit.edu Sports sports@the-tech.mit.edu Archive management archive@the-tech.mit.edu Circulation and subscriptions circ@the-tech.mit.edu Free calendar listings news-notes@the-tech.mit.edu General questions general@the-tech.mit.edu Letters to the editor letters@the-tech.mit.edu Photography department photo@the-tech.mit.edu MAGAZINES *American Journalism Review Letters to the editors/queries (NO press releases) editor@ajr.umd.edu Electric Shock Treatment, U.K. (innovative and experimental music) bd1@mm-croy.mottmac.co.uk *Inside Media mediaseven@aol.com Interrace Magazine, Atlanta 73424.1014@compuserve.com NEWS/MEDIA SERVICES AND PRESS ASSOCIATIONS Conus Washington/TV Direct conus-dc@clark.net RADIO AND TELEVISION NETWORKS CNN Global News cnnglobal@aol.com * NBC, "Dateline" dateline@news.nbc.com RADIO AND TELEVISION STATIONS KXTV-TV, Sacramento, Calif. kxtv@netcom.com COMPUTER PUBLICATIONS *Network Computing editor@nwc.com *Personal Computer World editorial@pcw.ccmail.compuserve.com 3W Magazine: The Internet with a Human Face 3W@ukartnet.demon.co.uk Windows Computer Shareware 5648326@mcimail.com %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% A TeleStrategies Event co-chaired by the Commercial Internet eXchange (CIX) TeleStrategies' Internet Conference and Expo '94 Monday October 10 - Wednesday October 12 Sheraton Crystal City, Arlington VA Conference Track (Tue October 11 - Wed October 12):Publishing, Marketing and Advertising on the Internet Pre-Conference Tutorial (Mon October 10): Understanding Internet Technologies For Non-Engineers And Strategic Planners Demonstration Track (Mon October 10 - Wed October 12):Online Demonstrations Of Internet Services, Products And Access Technologies Workshop Track (Tue October 11 - Wed October 12):How To Do Business On The Internet Exhibitions (Mon October 10 - Wed October 12) CONFERENCE TRACK - Tuesday, October 11, 1994 Publishing , Marketing and Advertising on the Internet 8:00-9:00 Registration 9:00-10:00 - INTERNET: THE OUTLOOK FOR COMMERCIALIZATION AND GROWTH John Curran, Product Manager, BBN Technology Services Bill Washburn, Executive Director, Commercial Internet Exchange (CIX) 10:00-10:15 Coffee Break 10:15-12:00 - NEWSPAPER AND BOOK PUBLISHING ON THE INTERNET Jeff Crigler, Director, Market Development, Network Advanced Services Division, IBM Laura Fillmore, President, Online Bookstore William S. Johnson, Publisher, Palo Alto Weekly 12:00-2:00 Hosted Lunch and Exhibits 2:00-2:45 - INTERNET USERS: WHO ARE THEY? Magdalena Yesil, Partner, Management Forum 2:45-3:15 - INTERNET BILLING Gary Desler, Senior Vice President, Network Solutions 3:15-3:30 Coffee Break 3:30-5:30 - CREATING BUSINESS MODELS FOR THE INTERNET Gordon Cook, President, Cook Network Consultants Chris Locke, President, MecklerWeb Corporation Cathy Medich, Executive Director, CommerceNet Robert Raisch, President, The Internet Company 5:30-6:30 Reception and Exhibits CONFERENCE TRACK - Wednesday, October 12, 1994 Publishing , Marketing and Advertising on the Internet 8:30-10:00 - HOW TO MARKET AND ADVERTISE EFFECTIVELY Andrew Frank, Director, Software Development, Ogilvy & Mather Direct Erica Gruen, Senior Vice President, Television, Information and New Media, Saatchi & Saatchi Advertising Worldwide Judith Axler Turner, a head of the working group on advertising for the Coalition for Networked Information 10:00-10:30 Coffee Break and Exhibits 10:30-12:00 - COPYRIGHT AND LICENSING ISSUES Kathlene Krag, Assistant Director, Copyright and New Technology Association of American Publishers, Inc. Steve Metalitz, Vice President and General Counsel Information Industry Association Martha Whittaker, General Manager, The UnCover Company 12:00-12:30 - VIDEO VIA THE INTERNET Ed Moura, Vice President, Marketing and Sales Hybrid Networks, Inc. 12:30-2:00 Hosted Lunch and Exhibits 2:00-3:30 - INFORMATION SERVICES AND THE INTERNET Brad Templeton, President, ClariNet Communications Richard Vancil, Vice President, Marketing, INDIVIDUAL, Inc. Representative, America Online 3:30-3:45 Coffee Break 3:45-5:00 - INTERNET PUBLISHING AND MARKETING TOOLS Bruce Caslow, Systems Engineer, Mesa Technologies John Kolman, Vice President, NOTIS Systems, Inc. Kevin Oliveau, Engineer, WAIS, Inc. Pre-Conference Tutorial UNDERSTANDING INTERNET TECHNOLOGIES FOR NON-ENGINEERS AND STRATEGIC PLANNERS Monday, October 10, 1994 - 9:00 a.m. to 5:00 p.m. Presented By: John Curran, BBN Technology Services; Bruce Antleman, Information Express; Bruce Caslow, Mesa Technologies; and Stephen Crocker, Trusted Information Systems, Inc. This one-day tutorial is for the non-engineer, strategic planner, entrepreneur or anyone who has to understand the Internet in order to make business decisions about emerging commercial opportunities. This tutorial covers not only Internet technologies, economics and leading-edge opportunities, but also looks at operational issues such as security, addressing and network management from a business development perspective. 1. INTERNET OVERVIEW: What is the Internet? Who controls it? How do you get connected? What can you do with it? Who pays for it? Who are the players domestically and internationally? What is the role of the NII and NREN? Why are the RBOCs, cable TV companies, IXCs and PDA vendors interested in Internet? Why all the attention to commercialization? How is the Internet likely to evolve over the next few years? 2. INTERNET ACCESS, NAVIGATION AND APPLICATIONS: How to find, share and sell information on the Internet. The basic application tools and navigation/search systems (FTP, Telnet, Archie, Gopher, Mosaic, World Wide Web, WAIS, etc.). Access service providers (CIX, PSI, Sprint and others). Access options (dial-up, dedicated, frame relay, cable TV and wireless).New entrepreneurial developments. 3. INTERNET TECHNOLOGIES: Role of TCP/IP. MAC vs. PC products. LAN access (SLIP, PPP, frame relay, etc.) and WAN and ATM developments. IPX, DECNET and APPLETALK. Leading edge vendors and where their products are headed. IP addressing. How to obtain addresses (Class A,B,and C). CIDR, Internet DNS and how to register. Setting up an E-mail server, bulletin board and directory service. 4. INTERNET SECURITY AND MANAGEMENT: Security concerns, policies and procedures. Defeating password sniffing. Firewalls and available firewall toolkits. Encryption, authentication and Clipper Chip issues. Other operational concerns related to doing business on the Internet. Guidelines for managing a commercial Internet service. SNMP management tools and products. WORKSHOP TRACK - Tuesday, October 11, 1994 HOW TO DO BUSINESS ON THE INTERNET 9:00-10:15 - GETTING CONNECTED TO THE INTERNET Howard McQueen, President, CD Consultants 10:15-10:45 Coffee Break 10:45-12:00 - CREATING A BUSINESS PRESENCE ON THE INTERNET Duffy Mazan, Partner, Electric Press, Inc. 12:00-2:00 Lunch and Exhibits 2:00-3:15 - MOSAIC Bruce Caslow, Systems Engineer, Mesa Technologies 3:15-3:30 Break 3:30-5:00 - BUSINESS USES OF THE INTERNET Al Dhir, President, Internet Access Group, Inc. 5:00-6:30 Reception and Exhibits WORKSHOP TRACK - Wednesday, October 12, 1994 HOW TO DO BUSINESS ON THE INTERNET 9:00-10:15 - SECURITY: SINGLE SIGN ON Tom McHale, Director of Marketing and Product Development for North America, ICL, Inc. 10:15-10:45 Coffee Break 10:45-12:00 - CORPORATE AND BUSINESS TRAINING OVER THE INTERNET Speaker to be announced 12:00-2:00 Lunch and Exhibits 2:00-3:15 - NETIQUETTE: HOW TO DO BUSINESS ON THE INTERNET WITHOUT GETTING "FLAMED" Paul Kainen, President, Kainen Technology Services ONLINE INTERNET DEMONSTRATION TRACK Monday, October 10, 1994 2:00-5:00 p.m. Track A: DEMYSTIFYING THE INTERNET Paul Kainen, President, Kainen Technology Services Track B: DEMONSTRATIONS BY WAIS, Inc. and Performance Systems International 5:00-6:30 Reception and Exhibits ONLINE INTERNET DEMONSTRATION TRACK Tuesday, October 11, 1994 9:00 a.m.-12:00 p.m. Track A: DEMYSTIFYING THE INTERNET Bruce Caslow, Systems Engineer, Mesa Technologies Track B: DEMONSTRATIONS BY:Semaphore Communications - Internet security products - CD Consultants 12:00-2:00 Lunch and Exhibits 2:00-5:00 Track A: DEMONSTRATIONS BY Spry, Inc. "Internet in a Box" Online Bookstore Track B: DEMONSTRATIONS BY MecklerWeb Corporation and "Palo Alto Weekly," the first general circulation newspaper on the Internet 5:00-6:30 Reception and Exhibits ONLINE INTERNET DEMONSTRATION TRACK Wednesday, October 12, 1994 9:00-12:00 Track A: DEMONSTRATIONS BY America Online - demo of their current information services and NOTIS Systems, Inc. - demo of new, easy-to-use publishing tool for the Internet Track B: DEMONSTRATION BY Hybrid Networks, Inc. and Mesa Technologies - MOSAIC at 56 KBPS 12:00-2:00 Lunch and Exhibits 2:00-3:15 Track A: DEMONSTRATION BY LEGI-SLATE Track B: DEMONSTRATION BY Gestalt Systems, Inc. CURRENT ONLINE DEMONTRATIONS Monday, October 10 - Wednesday, October 12 Current Demonstrations Conducted By: WAIS, Inc., SemaphoreCommunications, CD Consultants, Spry, Inc., Online Bookstore,MecklerWeb Corporation, "Palo Alto Weekly," America Online, NOTIS Systems, Inc., Hybrid Networks, Inc., Mesa Technologies,Legi-Slate, Performance Systems International and Gestalt Systems, Inc. EXHIBIT HOURS Monday, October 10 - 5:00-6:30 p.m. Tuesday, October 11 - 12:00-6:30 p.m. Wednesday, October 12 - 10:00-2:00 p.m. For more information about exhibiting, call Jackie McGuigan at (703) 734-7050. For more information or registration call (703) 734-7050. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SCREAM OF CONSCIOUSNESS -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- =-=-=-=-=Copyright 1993,4 Wired Ventures, Ltd. All Rights Reserved-=-=-=-= -=-=For complete copyright information, please see the end of this file=-=- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= WIRED 1.1 Scream of Consciousness *********************** Paglia: Brash, Self-Promoting and Possibly the next Marshall McLuhan Interviewed by Stewart Brand (Editor's note - Paglia's faxed corrections of this article became a critical part of the design and layout. Hence, it has lost much that cannot be conveyed in ASCII over the electronic BBS's or the Internet. We strongly suggest you refer to the original in the magazine itself for the complete context). Camille Paglia, bad girl of feminism, has a knack for outraging listeners one moment, and then having them nod their heads in agreement the next. In rapid-fire broadcast mode, Paglia jumps from Aristotle to Madonna, soap opera to cathedral, all in one sentence. A tape recorder has trouble picking out her cascading words (Paglia faxed the accompanying text corrections to WIRED's offices late one Saturday night) and makes absolutely no progress in capturing her total body animation as she acts out each phrase. A media creature through and through, Paglia has been cavorting in the limelight of network TV and sold-out lectures ever since her 1991 book, Sexual Personae (the first of two volumes), poked the eye of both conservatives and liberals. Intrigued by Paglia's intellectual resemblance to Marshall McLuhan - patron saint of WIRED magazine - Stewart Brand, the author of the Media Lab, caught up with Paglia in the court of a San Francisco hotel. BRAND: Have you mapped your success against Marshall McLuhan's? Remember how that happened? Here was a guy, like you he was on the fringe of academia, Catholic oriented, basically a literary creature. He starts holding forth in a epigrammatic way about culture and media, and suddenly AT&T and everybody else wants to talk to him. Paglia comes along, does what you've done... PAGLIA: ...Influenced by McLuhan. Neil Postman, who I had the Harper's magazine discussion with, said something that was very moving to me. He said at the end of that evening, "I was a student of Marshall McLuhan and I have never been with someone who reminded me more of McLuhan. When you were sitting with McLuhan in the middle of the night, all you would see was the tip of his cigar glowing, and you would hear him making these huge juxtapositions. Even his writing never captured the way McLuhan's mind worked. Your mind works exactly the same, the way you bring things together and they ssssizzle when you bring them together." BRAND: So you read McLuhan in college. PAGLIA: McLuhan was assigned in my classes. Everyone had a copy of his books. There were so many things that were happening at that moment - McLuhan, Norman O. Brown, Leslie Fiedler, Allen Ginsberg. There was enormous promise of something that was going to just blast everything open in cultural criticism. What the heck happened? It wasn't just a conservative administration in the '70s and '80s. That's not it. It was a failure on the part of the '60s generation itself. You feel it a little bit in "Blow Up," or just like reading about Jimi Hendrix and the way the women looked, the way the groupies looked - how fabulous the groupies were. They were so sexy and so ballsy! It was amazing how those '60s chicks talked. This was the real feminism. Even women got less powerful. We have had a general cultural collapse. BRAND: What did you make of McLuhan? PAGLIA: We all thought, "This is one of the great prophets of our time." What's happened to him? Why are these people reading Lacan or Foucault who have no awareness at all of mass media? Why would anyone go on about the school of Saussure? In none of that French crap is there any reference to media. Our culture is a pop culture. Americans are the ones who have to be interpreting the pop culture reality. When I was in England earlier this summer for the release of the Penguin paperback of Sexual Personae, I was having fits because of no TV there. I felt like I was in prison. Then I got to Amsterdam, and Amsterdam was better because they had everything on satellite. That was interesting in a kind of sociological way. They have German TV and Italian TV and French TV, but it is still not equivalent to what we have. What we have is total domination by the pop culture matrix, by the mass media matrix. That's the future of the world. BRAND: Is pop culture and mass media the same thing? PAGLIA: For me, yes. I teach a course called "Mass Media." I think that it should be required for every liberal arts graduate - the whole history of mass media, traced from the 1830s newspapers all the way to today. BRAND: Between Volume 1 and the forthcoming Volume 2 of Sexual Personae is the arrival of mass media. When you have mass media, is art different? PAGLIA: I call the 20th century "The Age of Hollywood." I believe that mass media and pop culture is the culture of the 20th century. There's a big break at World War II. The last great works of high art are with World War I. You have Picasso and T. S. Eliot, and I feel that modernism in literature exhausted itself in its first generation - Proust, Joyce, Wolfe; that was it. What else? That's why I have my provocative statements, such as for me the best novel after World War II is Auntie Mame. I mean that literally. The only writers of fiction interesting to me at all after World War II are decadent or comedic. These are to me the only modes that work literarily after World War II. So Genet and Tennessee Williams are major figures for me. My publisher is always trying to get me to read novels - Saul Bellow, A.S. Byatt. I say, "Why would I want to read a serious novel?" Because a serious novel today is already too reactionary, by trying to reinterpret contemporary reality in verbal terms, making a verbal structure - no, no, no. To me, the rhythms of our thinking in the pop culture world, the domination by image, the whole way the images are put together, and so on are way beyond the novel at this point. If a novelist does emerge now who is a product of pop culture and mass media, it's going to look quite different on the page. It won't necessarily look fragmented. I don't believe in that post-modernist thing of cutting things up. But the rhythms of it are going to be fast rhythms, and it's going to be surreal, flashing. In my famous encounter with Susan Sontag in 1973, I had a bitter disappointment when I invited her to Bennington and we tried to talk, and I couldn't talk to her. I had felt like "Finally, a woman on my level," and her mind seemed so sloooow. It took me ten years before I realized what it was. She was born before World War II. There's no way her brain is like my brain. I suddenly realized, half my brain is different. I mean, half my brain is the traditional Apollonian logo-centric side which was trained by the rigorous public schools of that period, but the other half is completely an electrified brain. Essentially, what I'm doing is what all the '60s was doing, which was exploring the way that brain works. I have been exploring both sides of the brain in my work. But we need both. Not having both I think is a disaster for the young today because I have them in my classes. BRAND: You agree with Neil Postman's Amusing Ourselves to Death on this? PAGLIA: I agree with Neil Postman that we need both. We cannot have one, or one over the other. These young kids, they're lost. BRAND: If somebody's got both sides of their brain electric, what happens? PAGLIA: I think that they become hysterical. They become very susceptible to someone's ideology. The longing for something structured, something that gives them a world view, is so intense that whatever comes along, whether it's fascism or feminist ideology (which to me are inseparable), they'll glom onto it and they can't critique it. You see the inability of the young to critique this can of worms that feminism gives them - "patriarchy" and all this stuff - the inability to think through issues like date rape. I was screamed at by girls at Brown about date rape. Later I encountered them by chance on the streets of Philadelphia - they happened to be touring the country registering voters this summer - and I said ask me some questions. These girls were juniors at Brown and their minds couldn't even focus long enough for a reply. (Paglia mimics fluttering inarticulate interruptions.) They didn't have the base of education that I did, the rigorous public school education. The consequence is my mind can play in the realm of the mass media and that's my creativity as a person, the solid, rigorous building of the Apollonian skills on one side of the brain, and then the free play. To me, this is the great model of the human mind. It's incredible to go back and forth between those two things. This is why I don't need anybody in my life, because I have so much in my brain playing with each other. It's fantastic. When I was in England early in the summer, I was interviewed by some Cambridge women and had an incredible intellectual conversation. They were full of knowledge and insight. There's no TV whatever in Cambridge. BRAND: So all they do is Neil Postman's long cool argument. PAGLIA: Well, no. Actually, drinking a lot is what they seem to be doing. I think it must be that their extreme, extreme development of words is so exhausting. The amount that the educated class is drinking there, I couldn't believe it. I saw the public drunkenness in Cambridge of university men, staggering drunkenness, and I thought, that's what they have instead of pop culture: alcohol. The minute I hit London I realized no one looks at each other. I asked people there, "How does anyone pick up anyone, how do you ever meet anyone?" I was told, "The men never look at you. They respect your privacy." Well, OK. I was near the British Museum and we were going to a lecture; I needed something to eat, and walked into a pub at 4 o'clock. It was respectable - intellectuals and so on. The drunkenness! You could feel the sex was in there, in the pubs and the drinking. We've got the sex in our popular culture, and the feminists hate it - "sex and violence!" - but I think ours is far healthier. This is a very healthy culture as long as we keep up the rigorous training. The kids' true culture is pop culture - they already live in that - so that's why I oppose all this use of TV in school. I want education movie-based, in the way that we had in college. From the moment I arrived in college in 1964 we were immersed in films. I saw something like 800 films. The true multiculturism is foreign films, foreign films with subtitles, so you hear the language. That's the way to teach sex, the way to talk about male/female sex roles: movies. The way to teach what Lacan or Foucault claim to be doing - the relativity of a memory - is "Last Year in Marienbad." Did they meet at Marienbad or not? The inflections of emotion on people's faces, interrelations of subtleties, of non verbal subtleties of interpersonal sexual relations, are shown by cinema. Date-rape feminists want to insist, "No always means no." You'd never believe that if you were seeing cinema. When I think about it, these were mint-condition films. I realize what an incredible gift I had. It was a magic moment. There had been the art houses in the '50s in the urban centers and suddenly my generation had film on the college campuses in the '60s. We were seeing films - Fellini, Antonioni - that were five years old. We saw prints in mint condition. No one anywhere has that now. The quality of the prints has degenerated, and the films are being shown as videos. The way you develop the eye is to see great photography, the great high-contrast black-and-white in those films. Here's my proposal. A proper job for funding of the arts is to underwrite a national consortium of archives of all the classic films. They are too expensive to maintain at individual colleges and universities. What I envision is, when you go to any college of four years, by your fourth year, by rotation, a superb print of every classic film will have been shown. We happen to have a very bad print of "Persona" at my school. I have to tell the class, "Remember that scene where Bibi Andersson is standing, wearing a black dress against a white wall? I have to describe to you what Sven Nykvist photography really looked like there. It's a blazing white, very rock textured stucco, deep textured. The glossy sun glints in her blond hair..." This is ridiculous. Classic films are major works of art, and this is where the funding should go. BRAND: Film had that depth and that quality. Would you also have a television course offered? PAGLIA: Well, a course in mass media to introduce the student to a history of the technologies, the way network news is put together, how different our advertisements are from those in Europe, and so on. BRAND: What about content? You watch soap operas, right? Which ones? PAGLIA: "The Young and the Restless" is my favorite. For 17 years I've been watching that. "As the World Turns" is my second favorite. I have the TV on with the sound off most of the day. Not early in the morning because at that point I'm still dreaming. I'm waking up and I want to remember my dreams, so I don't want too many images at that point. By mid-morning it is on, on for the rest of the day until 1. I've been poor up to now, and my dream is to have someday a bank of TVs, where all the different channels could be on and I could be monitoring them. I would love that. The more the better. I love the tabloid stuff. The trashier the program is, the more I feel it's TV. BRAND: Why? PAGLIA: Because that's TV's mode. That's the Age of Hollywood. The idea of PBS - heavy-duty "Masterpiece Theater," Bill Moyers - I hate all that. BRAND: How about the ads? PAGLIA: I love ads. There's a section on ads in Volume 2 of Sexual Personae. Like Andy Warhol, I have been in love with ads since my earliest childhood. That is the way I think. One of the reasons that I probably got this famous is because I think and talk in ad terms, in sound-bite terms. People say, "She promotes herself." When I was young, I thought in newspaper headline terms: "Paglia Falls Off Chair." I feel totally a part of mass media. Everyone knows ads are the best part of television, but the way the ads work - it's also the way MTV videos work - it's just flash flash flash images, symbol symbol symbol. You know, the way that ads are structured is not unlike the way the Catholic Church was plastered with ads, essentially, for saint this, saint that. To me there was an absolute continuity between the Catholic Church and ads. See, this is where I drew up my theory that popular culture is the eruption of the varied pagan elements in Western culture - that Judeo-Christianity never did defeat paganism as history books claim, but rather it was driven underground. We've had three major eruptions of paganism. One at the Renaissance, and most people would accept that. Another was Romanticism, when the chthonic or daemonic element came up with all those vampires and the nature cult. And now the third great eruption is the 20th century Age of Hollywood. Gore Vidal agrees. Hollywood is the great thing that America has done and given to the world. BRAND: What happens to those eruptions after a while? Do they eventually self-defeat? PAGLIA: Well, no, because each one of the eruptions became part of the fabric of the future. The eruption of paganism at the Renaissance led eventually to the recovery of science, and science has been the greatest challenge to Judeo-Christianity. Many want to get rid of the church and say it is the biggest source of evil. I hate that talk. A proper society will strengthen all its institutions. I want to strengthen the church and to strengthen the sex industry. I think they play off each other. Both should fight with each other and be strengthened. There will always be a craving for religion, and if we don't get it from Catholicism, which is a very profound system, you're going to get it from feminist ideology. BRAND: Are you glad of the Latin Mass coming back? PAGLIA: Where is it coming back? BRAND: A few Catholic churches apparently are bringing back the Latin Mass, and the hierarchy stopped forbidding it. People like it; they like the mysticism. PAGLIA: I thought that was a tremendous loss when the church dispensed with all that ceremony and imagery and beauty... BRAND: ...Priests turning their backs on the congregation... PAGLIA: ...Turning their backs. The hierarchy of it, the hieraticism of it, that sense of the holy, the mystical, the awesome. What they've got now is more authentically like early Christianity. You have a bunch of peasants sitting together and holding hands. But what I love is what Martin Luther saw was bad, which was the whole pagan element of the Italian Catholic Church, the heir of the Roman Empire. BRAND: You say pop culture is the third wave of pagan and chthonic stuff. You say chthonic stuff is dangerous, and you ride on its danger. Is pop culture dangerous? PAGLIA: Well, if the culture becomes only that, I think it is, because it's filled with hallucinations. Of course that's what I love about it. It's surreal. But there are practical realities in everyday life that have to be solved - the procedures of corporate life, of academic life, all of the boring things that have to be done in a systematic manner, and we have be taught those systems. The Apollonian systems also are a heritage of the Greco-Roman period. The Apollonian part of the brain is absolutely necessary for us to exist as rational citizens. The problem with the New Age stuff is it's like all up here, you know (gesturing vaguely aloft). As for the channelers, my acting students could do better accents. Credulity is a product of lack of rigorous education. Here's what I'm saying in my work. You need to pay homage to both Apollo and Dionysus. Both are great gods. Both must be honored. We need a balance between the two. That's all. * * * =-=-=-=-=-=-=-=-=-=-=-=WIRED Online Copyright Notice=-=-=-=-=-=-=-=-=-=-=-= Copyright 1993,4 Wired Ventures, Ltd. All rights reserved. This article may be redistributed provided that the article and this notice remain intact. This article may not under any circumstances be resold or redistributed for compensation of any kind without prior written permission from Wired Ventures, Ltd. If you have any questions about these terms, or would like information about licensing materials from WIRED Online, please contact us via telephone (+1 (415) 904 0660) or email (info@wired.com). WIRED and WIRED Online are trademarks of Wired Ventures, Ltd. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= DIGITAL CASH MINI-FAQ FOR THE LAYMAN By Jim Miller (Jim-Miller@suite.com) [If you're on the cypherpunks mailing list, you've already seen this.] Here's a description of digital cash that I recently wrote up. I've intentionally generalized and oversimplified the descriptions to keep from getting bogged down in the details, but I feel the information is accurate. Q: How is digital cash possible? A: Public-key cryptography and digital signatures (both blind and non-blind signatures) make digital cash possible. It would take too long to go into detail how public-key cryptography and digital signatures work. But the basic gist is that banks and customers would have public-key encryption keys. Public-key encryption keys come in pairs. A private key known only to the owner, and a public key, made available to everyone. Whatever the private key encrypts, the public key can decrypt, and vice verse. Banks and customers use their keys to encrypt (for security) and sign (for identification) blocks of digital data that represent money orders. A bank "signs" money orders using its private key and customers and merchants verify the signed money orders using the bank's widely published public key. Customers sign deposits and withdraws using their private key and the bank uses the customer's public key to verify the signed withdraws and deposits. Q: Are there different kinds of digital cash? A: Yes. In general, there are two distinct types of digital cash: identified digital cash and anonymous digital cash. Identified digital cash contains information revealing the identity of the person who originally withdrew the money from the bank. Also, in much the same manner as credit cards, identified digital cash enables the bank to track the money as it moves through the economy. Anonymous digital cash works just like real paper cash. Once anonymous digital cash is withdrawn from an account, it can be spent or given away without leaving a transaction trail. You create anonymous digital cash by using numbered bank accounts and blind signatures rather than fully identified accounts and non-blind signatures. [To better understand blind signatures and their use with digital cash, I highly recommend skimming through chapters 1 - 6 of Bruce Schneier's book _Applied Cryptography_ (available at your favorite technical book store). Bruce does a very good job of describing the wide variety of interesting things you can do when you combine computers, networks, and cryptography. The first half-dozen chapters are quite readable, even to the layman. He doesn't get into the heavy-duty math until later in the book.] There are two varieties of each type of digital cash: online digital cash and offline digital cash. Online means you need to interact with a bank (via modem or network) to conduct a transaction with a third party. Offline means you can conduct a transaction without having to directly involve a bank. Offline anonymous digital cash is the most complex form of digital cash because of the double-spending problem. Q: What is the double-spending problem? A: Since digital cash is just a bunch of bits, a piece of digital cash is very easy to duplicate. Since the copy is indistinguishable from the original you might think that counterfeiting would be impossible to detect. A trivial digital cash system would allow me to copy of a piece of digital cash and spend both copies. I could become a millionaire in a matter of a few minutes. Obviously, real digital cash systems must be able to prevent or detect double spending. Online digital cash systems prevent double spending by requiring merchants to contact the bank's computer with every sale. The bank computer maintains a database of all the spent pieces of digital cash and can easily indicate to the merchant if a given piece of digital cash is still spendable. If the bank computer says the digital cash has already been spent, the merchant refuses the sale. This is very similar to the way merchants currently verify credit cards at the point of sale. Offline digital cash systems detect double spending in a couple of different ways. One way is to create a special smart card containing a tamper-proof chip called an "Observer" (in some systems). The Observer chip keeps a mini database of all the pieces of digital cash spent by that smart card. If the owner of the smart card attempts to copy some digital cash and spend it twice, the imbedded Observer chip would detect the attempt and would not allow the transaction. Since the Observer chip is tamper-proof, the owner cannot erase the mini-database without permanently damaging the smart card. The other way offline digital cash systems handle double spending is to structure the digital cash and cryptographic protocols so the identity of the double spender is known by the time the piece of digital cash makes it way back to the bank. If users of the offline digital cash know they will get caught, the incidents of double spending will be minimized (in theory). The advantage of these kinds of offline systems is that they don't require special tamper-proof chips. The entire system can be written in software and can run on ordinary PCs or cheap smart cards. It is easy to construct this kind of offline system for identified digital cash. Identified offline digital cash systems can accumulate the complete path the digital cash made through the economy. The identified digital cash "grows" each time it is spent. The particulars of each transaction are appended to the piece of digital cash and travel with it as it moves from person to person, merchant to vender. When the cash is finally deposited, the bank checks its database to see if the piece of digital cash was double spent. If the digital cash was copied and spent more than once, it will eventually appear twice in the "spent" database. The bank uses the transaction trails to identify the double spender. Offline anonymous digital cash (sans Observer chip) also grows with each transaction, but the information that is accumulated is of a different nature. The result is the same however. When the anonymous digital cash reaches the bank, the bank will be able to examine it's database and determine if the digital cash was double spent. The information accumulated along the way will identify the double spender. The big difference between offline anonymous digital cash and offline identified digital cash is that the information accumulated with anonymous digital cash will only reveal the identity of the spender if the cash is double spent. If the anonymous digital cash is not double spent, the bank can not determine the identity of the original spender nor can it reconstruct the path the cash took through the economy. With identified digital cash, both offline or online, the bank can always reconstruct the path the cash took through the economy. The bank will know what everyone bought, where they bought it, when they bought it, and how much they paid. And what the bank knows, the IRS knows. By the way, did you declare that $20 bill your Grandmother gave you for your birthday? You didn't? Well, you wont have to worry about forgetting those sorts of things when everybody is using fully identified digital cash. As a matter of fact, you wont even have to worry about filing a tax return. The IRS will just send you a bill. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% PATENT SEARCHING EMAIL SERVER is now open for business By Gregory Aharonian (srctran@world.std.com) APS PATENT SEARCHING ARRIVES ON THE INTERNET!!!!!!!!!!!!!!!! (well only in a real limited way for the time being :-) A few weeks ago, I announced plans to provide limited patent searching over the Internet, where you can get a list of patents by specifying the class/subclass. I have decided to do this in two stages. To test out the email-server software I am writing, I first plan to allow email requests to retreive parts of the PTO classification manuals (see below). Once things are running smoothly, I will then add the capability to retrieve patent titles by class/subclass. So feel free to start sending in requests to the address listed below: search@world.std.com wish me luck, and start thinking philanthropic. By the way, if someone has a machine readable version of the WIPO international classification system, please send it to me so I can add it to the server. At some point when I have lots of equipment, I will sort US patents by their international classification. Greg Aharonian Internet Patent News Service ==================== Internet Patent News Service September 1994 PATENT TITLES EMAIL SERVER search@world.std.com The Internet Patent News Service is pleased to announced the availability of the Patent Titles email server, where people can retrieve lists of patent titles dating back to 1970 for any USPTO class/subclass, and patent numbers for additional patents dating back to the 1800's. The Patent Titles email server is the first step in our efforts to make the entire USPTO APS patent text database system accessible over the Internet. Approximately one gigabyte of data has been prepared and attached to the Internet. As all of the equipment and network access is borrowed, I am limiting access to an email server until I get a better feel for demand for the data, and until I can raise funding to set up a proper Internet server. Unless the bandwidth and processing load overwhelms the equipment I am borrowing, the service will be free. To use the email server, send requests to the Internet address: search@world.std.com using any of the following commands sent as text in the body of the email message: SENDTO account-name@internet.site.adr This command is mandatory of all requests and is where you specify the email address you want the information sent to. Occasionally From: lines in email addresses do not provide a correct return address (at least in my experience doing the Internet Patent News Service). SEND INTRO SEND HELP Either of these commands will return this message. SEND UCLASSES This command will return an index to the approximately 400 patent classes that are currently being used, for example: Class: 69 Leather Manufacturers SEND UCLASS XXX This command will return that section of the USPTO's Manual of Classification covering patent class XXX. For example, the command "SEND CLASS 69" would return a list of all of the subclasses in Class 69 by number and title. These files range in size from 5K to 120K. What follows is a section of Class 69: Subclass Subclass Number Title 1 MACHINES 1.5 .Belt-stretching 3 .Horse collar shaping 4 .Horse collar stuffing SEND UCLASS COMPUTING This command will return those sections of the USPTO's Manual of Classification covering patent classes 395 and 364, the two main classes dealing with hardware and software. SEND IPNSINFO This command will return an introductory message to my Internet Patent News Service. SEND CONSULT This command will return an introductory message to my patent searching consulting services I offer. SAVE COMMENT This command lets me know your request is actually a comment about the email server operation, or any inaccuracies you detect in the patent information being sent out. As I am parasiting the equipment to run the server (which basically means that I operate the server at nite and on weekends), please send your requests in at the end of the workday or on weekends. Within a day or so, you will receive back ny email whatever you requested. SECURITY A very important concern for anyone using this email server is secrecy, that what they are searching for is not revealed to others. As a potential inventor, I appreciate this as much as anyone else. While I plan to save the email addresses of people who use the server (but not their search request), no other information will be retained. The email address information will be saved to study who, and how often, people are using the server. I would appreciate any suggestions on how to ensure security beyond this. Please excuse any mishaps that occur as I get this service off the ground. This email server is a classic hack that will get better in time as people use it. In turn, the experience gathered in running the server will be invaluable in demonstrating the feasibility of making massive amounts of patent data available over the Internet. Also, get ready for that voluntary registration fee I mention in my intro piece to the Internet Patent News Service. If the Patent Titles email server is successful, and you all like it, this fall I plan to coordinate an effort to put all of the patent abstract information since 1970 onto the Internet, making it available through email servers, Gopher, WAIS and Mosaic. But first things first, getting the Patent Titles email server working. Greg Aharonian Internet Patent News Service %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Five "Hackers" Indicted for Credit Card/Computer Fraud From CuD Moderators Computer Underground Digest (AP WIRE - Thurs, Sept. 8, 1994) NEW ORLEANS (AP) -- "Dr. Demonicus," "Renegade" and four other hackers used computers to steal credit card numbers and used them to buy $210,000 in gold coins and high-tech hardware, federal prosecutors said Wednesday (Sept 8, '94). The nine-count indictment unsealed Wednesday charged five men from Louisana and one from New York with conspiracy, computer fraud, access device fraud and wire fraud, U.S. Attorney Eddie Jordan Jr. said. Some fo their hacker nicknames were included. They were identified as Dwayne "Dr. Demonicus" Comeger, 22; Brian Ursin, 21; John Christopher "Renegade" Montegut, 24; Timothy "Revelation" Thompson, 21; James McGee, 25; and Raymone "Wiseguy" Savage, 25, of Richmond Hills, N.Y. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CLIPPER T-SHIRTS By Norman Harman (normh@crl.com) Information and opposition to the Clipper proposal is strong on the Internet. But it is far too unknown to the 'outside' community. Everyone concerned by this issue should inform all the people they know of its implications. One way to increase awareness and show your opinion is to wear it:). I would like to offer an anti Clipper/Skipjack T-shirt. They would be white with black printing and cost approximately $5.00 plus $2.90 shipping to US locations. That is the cost to produce one shirt. I am trying to spread awareness not make money. I need to know if people are interested in this idea and what should the shirts say? Two quick ideas are: "Skip Skipjack" or "Just Say No to Clipper" Please send comments, suggestions, and questions to normh@crl.com. If more than a few people are interested I will go ahead and have the shirts made and post how to get one. A worthy cause is better if it benefits another good cause so the shirts will be silk-screened by Zerolith, part of a non-profit organization that employs, shelters, and assists homeless youth. If you would like to talk with Zerolith or donate money directly here is how to contact them. Zerolith 3075 21st Street San Francisco, CA 94110-2626 415.641.1014 voice 415.641.1474 fax %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CYBERNEWS DEBUTS By Patrick Grote (patrick.grote@supportu.com) *** PRESS RELEASE *** CyberNews 11221 Manchester Rd., Suite 313, St. Louis, MO 63122 Contact: Patrick Grote, patrick.grote@supportu.com Phone: (314) 984-9691 FAX: (314) 984-9981 FOR IMMEDIATE RELEASE CyberNews, A Monthly Publication, Debuts With A Stunning Success for Readers/Advertisers St. Louis, MO, September 8 _ CyberNews, a new monthly electronic publication, debuted today featuring over 25 hard hitting, real world software reviews, a tell all interview with shareware king Scott Miller of Apogee Software, the people that brought the world Castle Wolfenstein and a feature by the leaders in the Work at Home field, Paul and Sarah Edwards. CyberNews is unique in electronic publications, commonly referred to as zines, due to the fact they are advertiser supported and 85% of the information is generated from everyday people. "Too many reviews today are done to please the advertiser. Heck, most of the traditional press basically reprint press releases. People need to know what software/hardware works and what problems may crop up. Unbiased reviews are what we strive for," detailed Patrick Grote, Publisher, Marketing. Available in three formats, CyberNews is readable by anyone. A Windows Help file format supports a color graphical excursion that anyone with Windows, Windows for Workgroups or WindowsNT can view. "We wanted to bring the electronic publication into a new era of color and production," notes Roger Klein, Publisher, Production. The ASCII version features the ability to be enjoyed by anyone with a PC, dumb terminal or device that has the ability to read standard ASCII text. According to Patrick Grote, Publisher, Marketing, "the goal was to make CyberNews as Internet friendly as possible. Since we use straight ASCII everyone who can access the Internet can read our publication." The ReadRoom format allows Sysops to add CyberNews to their BBS quickly without having to run a conversion program. "Sysops are the backbone of the information superhighway. They are engineer, designer, construction worker and user wrapped into one. We realized we can't ignore their needs," explained Publisher, Marketing, Patrick Grote. To grab latest issue of CyberNews, you can check these sources: Internet: wuarchive.wustl.edu:/pub/MSDOS_UPLOADS/zines polecat.law.indiana.edu:/pub/Incoming ftp.fonorola.net:/in.coming CompuServe: Work at Home (GO WORK in GENERAL LIBRARY), IBM APP (GO IBMAPP in ELECTRONIC PUBLICATIONS LIBRARY), Novell User (GO NOVUSER in NEW UPLOADS LIBRARY), International Trade Forum (GO TRADE in Section 1). FidoNet: You can freq the files 1:100/380: CYBER - All three versions CYBERR - The ReadRoom version. CYBERA - The ASCII version. CYBERW - The Windows version. Delphi: PCSIG America Online: Computing and Software Email: Send requests or questions to subscribe@supportu.com PG - Publisher, CyberNews, patrick.grote@supportu.com A Publication on the Leading Edge - 09/13/94 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% PC MAGAZINE DECARES THE PIPELINE BEST INTERNET SERVICE By James Gleick (gleick@pipeline.com) We at the Pipeline are very pleased to announce that the editors of PC Magazine, comparing all the major Internet service providers from America Online and Delphi down to the Pipeline, have declared that our young service is the best choice. We have a lot of room for improvement, we know, but coming in our first year, this is gratifying. "A true beauty queen," Robin Raskin, PC Magazine's editor, writes in the October 11 issue. "The Pipeline is an elegantly conceived program; we've seldom seen a Version 1.x program that's as well thought out. Watch as the Pipeline continues to grow; the Internet will be a better place because of this package." We hope so. Anyway, we'd like to take the opportunity to offer Internet users (or would-be Internet users) a free copy of our software, to try out in demo mode. It's available for Windows or Macintosh. Send your address to windisk@pipeline.com or macdisk@pipeline.com. For general information, you may send email to info@pipeline.com. James Gleick The Pipeline %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SCOUT REPORT SUBSCRIPTIONS EXCEED 10,000 MARK From InterNIC Info Scout (scout@is.internic.net) To all InterNauts: Subscriptions for the Scout Report have exceeded 10,000! And 10,000 InterNauts can't be wrong! To celebrate this milestone, this week's Scout Report will be a double issue and include many resources you may have missed during the recent end-of-summer weeks. It's now Fall, so clean out those electronic closets and make room for some new 'Net resources ready for exploration! The September 16 issue will also include an expanded NetBytes section to accommodate a large number of recently released sources of information about using the Internet. If you haven't yet subscribed or told your friends and colleagues, now is the time. Spread the news by word-of-net. Below are instructions for subscribing or receiving a copy of this week's issue by email, gopher, and WWW. The Scout Report is a weekly publication provided by InterNIC Information Services to assist InterNauts in their ongoing quest to know what's new on and about the Internet. It focuses on those resources thought to be of interest to the InterNIC's primary audience, researchers and educators, however everyone is welcome to subscribe and there are no associated fees. The Scout Report is posted on the InterNIC InfoGuide's gopher and WorldWideWeb servers where you can easily follow links to the resources which interest you. Past issues are stored on the InfoGuide for quick reference, and you can search the InfoGuide contents to find the specific references you need. The Scout Report is also distributed in an HTML version for use on your own host, providing fast local access for yourself and other users at your site. Join thousands of your colleagues already using the Scout Report as a painless tool for tracking what's new on the 'Net! Best regards, InterNIC Info Scout Scout Report Contents Subject-oriented online resources are organized by access method: * WWW * Gopher * Email/FTP Resources and announcements related to the network are included in: * National Information Infrastructure * NetBytes Recreational resources for perusing after hours (of course) are listed here: * Weekend Scouting *** New section coming the week of September 23 -- a place for selected interesting services on the 'Net which are fee based, provided by commercial organizations, or best of all, offer virtual shopping: Commercial Services Scout Report Access Methods ------------------------------ ** To receive the special double-issue of the Scout Report by email (gopher and WWW access methods are listed below) send mail after September 16 to: mailserv@is.internic.net and in the body of the message type: send /scout-report/9-16-94 ** To receive the email version of the Scout Report automatically each weekend, subscribe to the scout-report mailing list which is used exclusively for one Scout Report message each week: send mail to: majordomo@is.internic.net in the body of the message, type: subscribe scout-report to unsubscribe to the list, repeat this procedure substituting the word "unsubscribe" for subscribe. ** To receive the Scout Report in HTML format for local posting, subscribe to the scout-report-html mailing list, used exclusively to distribute the Scout Report in HTML format once a week. Send mail to: majordomo@is.internic.net in the body of the message, type: subscribe scout-report-html ** To access the hypertext version of the Report, point your WWW client to: http://www.internic.net/infoguide.html >> Gopher users can tunnel to: is.internic.net select: Information Services/Scout Report. *---------------------------------------------------------------- Copyright 1994 General Atomics. The InterNIC provides information about the Internet and the resources on the Internet to the US research and education community under the National Science Foundation Cooperative Agreement No. NCR-9218749. The Government has certain rights in this material. Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of the National Science Foundation, General Atomics, AT&T, or Network Solutions, Inc. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% IMPORTANT PROCLAMATION: THE FUTURE OF THE NET IS AT HAND! By James "Kibo" Parry (kibo@world.std.com) P R O C L A M A T I O N & M A N I F E S T O *********************************************** WHEREAS, the computer network named USENET has insurmountable flaws: => It is cluttered with thousands of disorganized groups. => It is difficult to use due to the various software interfaces. => It is infected with viruses, especially in the .signatures. => There is no formal rulebook and no official administration. => Bozos abound. => Power-crazed maniacs frequently try to manipulate Usenet at their whim. These problems are most important. THEREFORE, in an official and secret democratic vote, Kibo has been duly elected LEADER OF THE NET. To correct this heinous situation, LEADER KIBO has decided to take bold measures, a brave new initiative, detailed herein. WAKE UP, IT'S 1994! THE FUTURE WILL NOT WAIT FOR A VOTE! Here is what Leader Kibo has decided--what MUST be done--what WILL be done: PHASE ONE. GLOBAL RMGROUPS FOR ALL USENET GROUPS WILL BE ISSUED ON 4/15/94, 06:00 GMT. A Day Without Usenet shall pass, and it will be a time of rest for government employees. Many will discover life, or at least television. Desperate soc.singles readers will have nervous breakdowns. ClariNet will go bankrupt. UUNET's modems will cool off. The world will rotate a full three hundred sixty degrees just the same. Every Usenet group, and all its associated problems, will have been wiped off the face of the Earth forever by the might of the rmgroup. Of course, to prevent any power-crazed maniacs from putting the groups back, the newsgroup `control' will be rmgrouped FIRST. Thus, the situation will be permanent. Nobody will undo the Pax Kibotica! PHASE TWO. NEWGROUPS FOR THE GROUPS IN THE NEW HIERARCHY WILL BE ISSUED ON 4/16/43, 06:00 GMT. The new network shall be named HAPPYNET, as it will be a Better Place. Usenet is dead. Long live HappyNet! ********* HAPPYNET: THE NET THAT'S HAPPIER THAN YOU! ********* UNDER THE AUSPICES OF THE ALL-WISE LEADER KIBO, THE NEW NETWORK SHALL BE ORGANIZED THUSLY: Three hierarchies encompassing ALL HUMAN DISCOURSE: => nonbozo.* => bozo.* => megabozo.* All topics discussed on Usenet, and even deeper topics which COULD be discussed on Usenet but AREN'T, will fit nicely in those three-- NO EXCEPTIONS. Extensive time and motion studies have been performed in the name of efficiency to maximize your pleasure! Existing groups will be moved into the new organization scheme, resulting in nonbozo.news.announce.newusers, bozo.rec.pets, megabozo.talk.bizarre, nonbozo.comp.virus, bozo.alt.sex, megabozo.alt.fan.lemurs, bozo.postmodern, megabozo.org.mensa, nonbozo.clari.news.urgent, megabozo.megabozo.megabozo.religion.kibology, etc., as determined by scientific measurements of the bozosity of the groups, measured by Leader Kibo's Council On Scientific Bozosity and the faculty of Rensselaer Polytechnic Institute (Troy, NY), world leaders in bozosity assessment. These truly scientific procedures were developed and pre-tested by Drs. Todd M. McComb and Tim Gallagher and are patented to prove that they are good! It is estimated that the statistical breakdown of HappyNet will be thus: 1.0000% nonbozo.* 90.0000% bozo.* 9.0000% megabozo.* (Computations courtesy of Bell Labs) Bozo.* will, of course, be subdivided logically: bozo.nerd.*, bozo.tv.*, bozo.inane.*, bozo.boring.*, bozo.sex.*, bozo.argue.*. New groups will also be added for MAXIMUM ENJOYMENT. The network would be a very unfair place if only Leader Kibo were allowed to propose new groups. Instead, because Leader Kibo is benevolent and omnisagaciously father-like, he will create WHATEVER GROUP YOU WANT (even, say, megabozo.kibo.is.a.blenny!) provided that (a) you follow the Official Procedure, filing all five copies of your request in triplicate and then making seven carbons of each, and (b) you pay Leader Kibo $160 for each letter in the new group's name, and $720 for each period. UNLIKE SOMEARCHAIC SYSTEMS, VOWELS DO NOT COST EXTRA. PAT SAJAK IS EVIL! Of course, thanks to Leader Kibo's awesome foresight, new groups will probably not be needed. A simple computer program will generate all groupnames from *.aaaaa.aaaaa.aaaaa.aaaaa to *.zzzzz.zzzzz.zzzzz.zzzzz. This will encompass ALL possibilities in a COMPLETELY LOGICAL FASHION, maximally efficient yet FUN! Prudence and foresight by LEADER KIBO! There will even be a .d group for every regular group. In fact, the .d groups will even have their own .d.d groups for metadiscussion of whether or not the new .d.d.d and .d.d.d.d groups are needed at all! The wealth of new groups will also cut down on those annoying egomaniacal posters who try to post the same article to EVERY group, because it will become physically impossible to post to ALL groups within a MORTAL LIFETIME! But wait, there's more--over six billion groups MORE will be added at HappyNet's inception--free of charge! ********* HAPPYNET: EVERYONE IS EQUALLY EQUAL! ********* To promote EQUALITY and POLITICAL CORRECTNESS (the good kind), Leader Kibo has decided to correct the inequality of the distribution of "personal" groups. Some people, or groups of people, currently are popular enough to have groups named in their honor: alt.weemba, alt.fan.john-palmer, alt.fan.monty-python, alt.fan.dave-barry, alt.fan.mike-jittlov, alt.fan.naked-guy, alt.religion.kibology, alt.fan.alok-vijayvargia, alt.fan.harry-mandel. Because everyone is equal before the eyes of wise Leader Kibo, it was decided that EVERYONE WILL HAVE THEIR OWN GROUP on HappyNet. This will celebrate the global diversity of our users, demonstrating for once and for all that they are all unique, but unique in exactly the same way! A scientific questionnaire developed specifically for the purpose will be mailed to everyone on the planet. It will read: Dear Citizen Of The New Network, You are being given your own HappyNet group. Its placement will depend on your answer to this simple question. ARE YOU A BOZO? (CHECK EXACTLY ONE) [] YES [] NO I care, Leader Kibo People who answer "yes" will be given groups in bozo.personal.*, and people who answer "no" will be given groups in megabozo.personal.*. People who refuse to answer, or show contempt for the process, will be taken (by the Network Security Patrol Force) to the Citadel Of Judgment to appear before the Council Of Bozosity, who will examine the person and assign them either bozo.weenie.* or megabozo.weenie.*. Of course, this would be POINTLESS if anyone in the world were DENIED ACCESS to HappyNet. ********* HAPPYNET: A NET IN EVERY POT! ********* Net access will be provided to EVERY SINGLE PERSON, LIVING, UNBORN, OR DEAD, thanks to the new TELESCREENS which will be installed in every room of every building on the planet. Not only will this encourage higher net communications volume, it will also help Leader Kibo be a good leader, as it will allow Leader Kibo to instantly broadcast to all his subjects, and to see how they are feeling and what they are doing. But simple TELESCREENS in LIVING ROOMS, BEDROOMS, and BATHROOMS are not enough to ensure FREEDOM and EQUALITY. Neural transceivers will be implanted, FREE, at BIRTH in all newborns, allowing them to "jack in" to HappyNet, transmitting articles, sounds, and even GIF files at the speed of thought! They won't even have to worry about spelling-- they'll just THINK and their EVERY THOUGHT will be broadcast into EVERYONE ELSE'S HEADS! And because Leader Kibo CARES and values YOUR opinion, this will even allow Leader Kibo to know what his subjects are THINKING, thanks to the heroic actions of the NETWORK SECURITY PATROL FORCE. ********* HAPPYNET: WE KNOW WHAT YOU'RE THINKING ********* The Network Security Patrol Force, or NSPF, will be composed of volunteer system administrators who wish to enforce the continued accuracy, relevance, and acceptability of HappyNet postings. They will monitor, censor, and cancel bad postings, made by EVIL SUBVERSIVES who attempt to DEPRIVE you of your HAPPINESS. These SUPPRESSIVE PERSONS will be hunted down and suppressed! NSPF officers have really spiffy uniforms, especially the shiny gas masks, well-balanced batons, six-inch-thick shoulder pads and twelve-inch cleats. And, of course, they will punish evildoers, night or day. HappyNet never sleeps. ******* HAPPYNET: SLEEP TIGHT WITH ALL THE SECURITY IN THE WORLD! ********* But what of those EVIL organizations that simply want to SPY on you? Well, the NSPF won't have to even TRY to prevent that, because the LOGICAL PLAN of HAPPYNET will defeat that automatically! If some three-letter government agency wants to SCAN all articles for WORDS LIKE "NUCLEAR BOMB" or "WHITEWATER", it will be IMPOSSIBLE because not even the fastest computer in the WORLD--the CRAY-9000--could search ALL THOSE GROUPS, EVER!!! ********* HAPPYNET: ACCURACY IS EVERYTHING ON HAPPYNET! ********* Here are examples of infractions against the unwritten rules of HappyNet, and the punishments the NSPF will bring against the villains. .signature longer than four lines: Forced to read "War And Peace" at 110 baud. .signature has giant ASCII graphic: Forced to read "War And Peace" at 110 baud on a Braille terminal after having fingers rubbed with sandpaper. Posting an article consisting solely of "Me too!": Poster's legal name is officially changed to "Me Too". Calling a newsgroup a "bboard" or "notesfile": Forced to memorize Webster's Ninth. Spelling "too" as "to", "it's" as "its", "lose" as "loose", "you're" as "your", or any of the following--"wierd", "Anti-Semetic", "senerio", or "masterbation": Forced to write out Webster's Ninth ten times. Asking what ":-)" means: Drawing, quartering, and turning sideways. Using "" instead of ":-)": being sent back to GEnie, AOL, Delphi, etc. Sending a newgroup message without permission of Leader Kibo: Poster is forced to adopt twelve wacky sitcom children. Posting flames outside of a *.flame group: Poster is allowed to read only groups about fluffy puppies. Posting "Please send e-mail, since I don't read this group": Poster is rendered illiterate by a simple trepanation. *Plonk*ing outside talk.bizarre: Poster is *plonked*--LITERALLY. Asking for people to send cards to Craig Shergold: Poster must answer all of Craig's mail. Posting the "Dave Rhodes: MAKE MONEY FAST" scam: Poster must answer all of Craig's and Dave's mail while also memorizing the script to every episode of "Knight Rider" and doing voice exercises like saying "NANCY, HAND THE MAN THE DANDY CANDY" ten million times and also being forced to eat cottage cheese we found piled up on the sidewalk. Posting to aus.* from the USA: Poster is deported to Australia after having a "Kick Me, Mate" sign glued to their forehead. Posting an article with a malformed address so that mail bounces when people reply: Poster and/or their admin are sent back to kindergarten. .signature huge script letters: Poster is forced to tattoo HappyNet slogans on their body in huge script letters. Excess CAPITALIZATION & PUNCTUATION!!!!!!!!!!!!!: Poster is issued a new keyboard without capitals or punctuation. The space bar will be clearly labelled. *Excess*asterisks*in*.signature*: Poster is hit with one shuriken for each asterisk. Articles quoted in followup, but no new semantic content appended: Poster is forced to watch a "Small Wonder" marathon on cable TV. Advertising on the net: Poster is forced to pay Leader Kibo for the advertising time. Asking help for some program but not saying what sort of computer you're using: Poster's computer is reduced to 1K RAM. Arguing over whose computer is better: Being introduced to Leader Kibo, whose custom Turbissimo MoNDO Zeugma 6866688786/XA/sxe/IV computer is far better than theirs and will make them cry in humiliation. Giving away the secret of "The Crying Game": No punishment. Making fools of people in rec.org.mensa with pranks: No punishment necessary for something that simple. After all, some people could even do it by accident. Referring to the NSPF as "The Thought Police": Execution. Humor impairment: Execution. Saying "Imminent death of the net predicted!": Imminent execution of poster predicted. Mentioning Star Trek outside of the Star Trek groups: "Star Trek: Deep Space Nine" is cancelled, and all tapes of the original series are burned. William Shatner will direct all future movies. There are other helpful rules and regulations, but they are double secret. Of course, various branches of the NSPF will specialize in various enforcements: the Spelling Squad, the Grammar Goons, the Definition Draconians, the Typo Tyrants, the Capitalization Captains, the Pedantic Patriots, the Cross-Post Crushers, the Cascade Commandos, and the .signature .specialforce. There will even be a special detail to track down, and burn, copies of the Green Golfball Joke. ********* HAPPYNET: MODERATION IN ALL THINGS! ********* The concept of moderated groups will be retained for a few groups, with minor changes. Alt.flame (renamed megabozo.alt.flame) will be moderated by Dave Lawrence, as his news.announce.newgroups duties have been assumed by Leader Kibo. Dick Depew will be assigned the task of making up an imaginative Message-ID for every article in the world. (He will also unleash random daemons onto the net to destroy the unpleasant signal to noise ratio completely.) A program that determines how funny an article is by measuring the frequency of the "k" sound (an elementary comedic principle discovered in Kukamonga, Arkansas) will replace rec.humor.funny moderator Maddi Hausmann, allowing her to devote full time to assisting Brad Templeton's nonbozo.clarinet.* duties. Serdar Argic will be the official underliner of HappyNet. Every time the word "turkey" is mentioned, he will post a followup underlining and circling it. This will be a tremendous help to people looking for low-fat recipes. Jay O'Connell has volunteered to personally deliver an envelope labelled THESE ARE ALL THE TOPLESS PICTURES OF MARINA SIRTIS THERE ARE to all users to prevent them from asking for them over and over. This should reduce the bandwidth by an estimated 90%. Iain Sinclair will ensure that the link between Australia and the rest of the world is down on a regular schedule, instead of an irregular one. He has also been commissioned to design the NSPF uniforms, with the blessings of the Florida Citrus Council and the California Leather Council. And, of course, a world-class anonymous-posting server will be established. Not only will it remove your name from your postings (so that you don't have to worry about defending your opinions) but it will also eliminate the opinions themselves. Thus, don't be surprised to see a lot of anonymous postings in bozo.alt.sex.stories saying simply "I have no opinion on homosexuality." HappyNet will help us all to get along, even the people with no names. But what about those disclaimers that state that your opinion is not that of IBM, McDonalds, MIT, Scientology, etc.? Disclaimers are NOT required on articles, therefore you MUST include the following: DISCLAIMER: THIS DISCLAIMER IS NOT REQUIRED BY LEADER KIBO. THIS ARTICLE DOES NOT NECESSARILY REPRESENT THE OPINIONS OF LEADER KIBO. THIS ARTICLE DOES NOT NECESSARILY DISAGREE WITH LEADER KIBO EITHER. HAVE A NICE DAY! Also, for your protection, Leader Kibo has filed a copyright claim on HappyNet. Thus, any postings without a copyright notice become the intellectual property of Kibo. This will keep random people from commercially exploiting your ideas, because they won't be YOUR ideas any more! It's THAT SIMPLE. STREAMLINE EVERYTHING! ******** HAPPYNET: A BLAST TO LIGHT OUR GLOWING FUTURE! ******** HappyNet as currently implemented is just one communications medium. But this will blast our way into the foundation of the future: Eventually, HappyNet will be expanded to replace the other `conventional' media, such as newspapers, television, radio, standup comedy, and sex. .signatures will be sixty-second commercials. Alt.sex (bozo.alt.sex) will be interactive and finally worth reading. A PBS series, "Great RFCs, Past and Present" will be filmed to replace the boring old text RFCs. A Fox series, hosted by Dr. Ruth Westheimer, will replace "Emily Postnews". The Sony Walkman will become obsolete thanks to the Sony rnman. The instructions will be on a separate device, the Sony manman. Once everyone in the world is hooked into the giant HappyNet neural network and their brains merge into one gigantic community of mind (with an IQ well over THREE HUNDRED!), local events will be instantly communicated everywhere in the world. For example, people in Sri Lanka will be able to INSTANTLY receive dozens of "Hey, we're having a minor earthquake here in San Francisco RIGHT NOW!" postings INSTANTLY, instead of having to wait weeks. Rumors of such important events as DeForest Kelley's death will also propagate instantly, but this is not really a drawback: it enables the NSPF to detect them and snuff them out faster! HappyNet is an important part of this well-balanced future. In fact, it is the ONLY part. Without HappyNet, there could be no future. Usenet paves the road to misery and ruin with its cascades, cross-posts, flame wars, forgeries, and .signature viruses. HappyNet does not pave this road--where it's going, we don't NEED roads! HappyNet bravely journeys into an unknown, but not unpleasant future. Everyone WILL be happy, happier than human beings can possibly be. Although it will take HappyNet months, maybe years, to improve all areas of daily existence in all possible ways, it will be obvious to the most casual reader that HappyNet is better than Usenet. Those who aren't casual readers--well, they will come to agree. In time, they will even love me. In fact, soon they will beg to love me! But I, Leader Kibo, want only the best for everyone. After all, I am one of the readers of Usenet, so I can make the readers of Usenet happy by making me happy FIRST. DEATH TO USENET! LONG LIVE HAPPYNET! TO THE MOON! ********* HAPPYNET: YOU CONTROL HOW IT CONTROLS YOU ********* %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% [Editor's Note: Here is a FAQ from a very cool program. It is like the ultimate information database, but has a humorus kick to it. I will soon be published in this program. So, here's the FAQ. I highly suggest that you ftp the software.] ALT.GALACTIC-GUIDE FAQ -- MONTHLY POSTING -- Mk. II Release 1.1 By Steve Baker (swbaker@vela.acs.oakland.edu) Organization: Project Galactic Guide Mothership _____ _____ _____ ______ ___ ____ | __ \ / ____|/ ____|\ | /| ____/ _ \ / __ \ | |__) | | __| | __ \|/ | |__ | |_| | | | | | ___/| | |_ | | |_ |--o--| __|| _ | | | | | | | |__| | |__| | /|\ | | | | | | |__| | |_| \_____|\_____|/ | \|_| |_| |_|\___\_\ Project Galactic Guide Frequently Asked Questions FAQ Mk. II Release 1.1 18 September 1994 This is the Mostly All-New FAQ (Frequently Asked Questions) information file for the Usenet group alt.galactic-guide. This file is intended to provide you with answers to your frequently asked questions and is 97% fat-free with no preservatives or artificial flavours. Contents -------- 1.0 What is this newsgroup? 2.0 Who's in charge around here? 2.1 So who do I send articles to? 3.0 Format of the articles 3.1 Article content and legal stuff 3.2 So where can I get article ideas then? 3.3 The article lifecycle 4.0 The PGG Mothership 4.1 Mothership mirror sites 4.2 Supported computer platforms 4.3 Other ways to get PGG materials 5.0 World-Wide Web (WWW) sites 6.0 Miscellaneous questions 1.0 What is this newsgroup? ---------------------------- This newsgroup was created for the sole purpose of allowing uninterrupted communication between people involved in Project Galactic Guide. What is this project, you ask? It all started back in, oh, November of 1991 in the alt.fan.douglas-adams newsgroup. For the uninformed, Douglas Adams is the author of a series of humourous s/f books centering on the Hitchhiker's Guide to the Galaxy. In these books, the characters write for and frequently consult a sort of electronic encyclopedia which has an entry on just about everything. Paul said, "Hey, why don't we create a REAL guide to the galaxy?" and everyone else said, "Sounds good, let's do it!". So, with great fervor we started working on the skeletal structure of Project Galactic Guide, although at that time, we often called it "The HitchHiker's Guide the Known Galaxy." It was originally supposed to be about REAL things (as opposed to made-up things), but we eventually broke down and decided to incorporate EVERYTHING. So, now we'll take humorous entries about fictitious things (done in the Douglas Adams style, of course), and humorous entries about real things (also done in the Douglas Adams style, of course). 2.0 Who's in charge around here? --------------------------------- Well, not anyone, really. Er, actually, I suppose there *are* a couple of froods who tend to have a bit more input about things than others, but really it's mostly chaotic. Well, not actually *chaotic* but instead maybe something a bit more like a good recess. The aforementioned Paul Clegg is one of PGG's Founding Fathers. He is easily identifiable by his "...Paul" signature. Paul wrote the first PGG FAQ, upon which this document is derived. Today, Paul's an Editor and has many Wise Things to say about topics, issues, concerns, thoughts, ideas, problems, suggestions, and comments. His action figure should be available for the holiday season (along with the PGG Mothership playset), and he is available via email at: cleggp@rpi.edu Steve Baker helped get the project rolling with his "The Guide!" software for IBM/MS-DOS machines in the spring of 1992. Steve usually answers to the nom de plume "Stevadelic." Today, Steve's an Editor, the Librarian, Captain of the PGG Mothership, and actively avoids doing required updates and bug fixes to the TG! system. (He claims to be too busy working on Klingon language translation software.) You can send email to Steve at the address: swbaker@vela.acs.oakland.edu Roel van der Meulen joined the project in the fall of 1993, and is an active PGG Field Researcher Recruiter (he finds new articles and authors for PGG, in addition to his own work). He also maintains the PGG archives contents file and one of the fine WWW sites. Roel's Internet email address is: vdmeulen@rulrol.leidenuniv.nl Jeff Kramer is compiling the "PGG Report," a regular newsletter with lots of great information about the Project and its activities. He also admin's one of the PGG WWW sites. Jeff is available at: lthumper@bga.com Ryan Tucker provides articles, ideas, and crazy text art (like the FAQ logo), as well as up-to-date Iowa weather reports (as long as there's a tornado). Ryan's available at: rtucker@worf.infonet.net There's a lot of others out there who have contributed t-shirt designs, press card information, articles, ideas, suggestions, comments, et al... but to avoid this becoming one of those "Hi folks"-type things, I'll just leave it at that. 2.1 So who do I send articles to? ---------------------------------- Paul is available from September until April or May (during the college school year), and Steve is on-line and available year-round. Both Paul and Steve also have America Online accounts, so they're available there as well. Now that I think about it, Steve actually collects email accounts (he's now up to six different active, on-line email accounts, which is quite a lot of passwords to get straight). To answer the question, however, let's just say that you should send articles to one of the PGG Editors: cleggp@rpi.edu -- Paul swbaker@vela.acs.oakland.edu -- Steve We also have a third editor, Michael Bravo, who handles articles written in the Russian language. If you have written an article in Russian, please send them to Michael (mbravo@octopus.spb.su). 3.0 Format of the articles --------------------------- The articles that are accepted are organized by category and compiled in article "archives." Each archive file contains 25 accepted Guide entries. These archives are stored and available for download from the PGG Mothership. We've decided upon a simple ASCII text format for the article entries. The specs on the format are contained in the "article.new" file. It's really pretty simple, with just a few header token-type things that define useful stuff. The fine folks at PGG spent about a year discussing, debating, formulating, postulating, configuring, finalizing, and neglecting a nifty but complex text format. It was complete with crazy text formatting things and lots of other fun and wonderful features, but it never really caught on. Oh well. We're currently investigating the possibilities of porting the article archives into HTML (HyperText Markup Language) for use with html and WWW viewers. For now, however, standard ASCII files are just fine! 3.1 Article content and legal stuff ------------------------------------ You're welcome to write about anything. Yes, no matter how bizarre or crazy, please write about it. Really. Anything. Er, except, we don't want you to regurgitate Adams' material. Not only is this very unoriginal, it's also known as plagiarism. (Unless DNA himself decides to write it for us!) In general, please do NOT copy other people's work or ideas. We don't want the project stopped because we violated some silly copyright law! 3.2 So where can I get article ideas then? ------------------------------------------- We have a PGG Idea Bank, chock full of great ideas that beg for exploring. They're frequently posted to the alt.galactic-guide newsgroup, and all are available on-line at the Mothership. When posting an idea, be sure to include your name and email address for proper credit down the road. Conversely, when using an idea, just go ahead and write your article and credit the idea's originator in the header information. 3.3 The article lifecycle -------------------------- This describes what your Friendly Neighbourhood PGG Editor does and presents "a day in the life of an article" so to speak. Erm, actually, the articles themselves don't really speak much; that's just an expression, so let's carry on. 1) A young, up-and-coming comedian/researcher/student/author/human/whatever stumbles across, gets hit with, becomes infected by, is arrested in, or otherwise has a great idea for an article (or consults the Ideabank, which is sometimes less painful). She/he/it/they then write an article about the person/place/thing and send the article to an editor via email. (Please see Section 2.1, above, for info on who the editors are and where to send stuff.) 2) The editor send a message back to the author, stating something like: "Blah blah, thanks for the article, blah blah blah, I'll edit it for format and stuff, blah blah, you'll get it back pretty soon for author confirmation, blah blah, give me all your money, etc. etc." This message is the author's "receipt" that the editor received the article submission. If you don't get one of these, then the editor hasn't received your article yet! 4) The editor edits the article and performs routine grammar and spell- checker things on the article. Note: if the editor thinks that the article (1) violates a copyright law, (2) is a copy of other work, or (3) is hopelessly lame, the editor may nix the article for good. 5) Assuming that everything is fine with the article, the editor then sends it back to the author for "author confirmation." (This is often times abbreviated as A/C. Humm, if the author and the editor had a Direct Connection, would this be AC/DC?) 6) The author reviews the modified article, and then lets the editor know that things are alright. If the author has additional changes with the article, they go back to step one and start over. 7) Once the article is approved, the editor assigns the unique Article ID information and sends the article to the PGG Librarian. The Librarian adds the approved article into the article archives and posts the article to alt.galactic-guide. 4.0 The PGG Mothership ----------------------- The Mothership is an Anonymous FTP site where you can download PGG info, articles, programs, t-shirt images, reports, and other great stuff. To get to the PGG Mothership, FTP to the following site: Lexical: vela.acs.oakland.edu Numeric: 141.210.10.2 URL: ftp://vela.acs.oakland.edu/pub/galactic-guide When you connect, use the [ anonymous ] user ID and specify your full Internet email address as the password. The Mothership is [ pub/galactic-guide ], which is actually just a link to [ pub/swbaker ]. Thus, if you're using an FTP server which doesn't show the logical links, go into the [ swbaker ] directory. Anyway, beneath this directory are additional directories for each of the particular computer programs and general Hitchhiker's Guide fan stuff. There is a separate FAQ file on the PGG Mothership which describes these directories and the files they contain in more detail. 4.1 Mothership mirror sites ---------------------------- If having all of the PGG archives, programs, gif files, and other goodies at one centralized location isn't good enough for you, you may be pleased to know that it isn't! That is to say, the stuff is available from more than one Anonymous FTP site. The PGG Mothership is mirrored at: Lexical: ftp.cs.city.ac.uk Numeric: 138.40.91.9 URL: ftp://ftp.cs.city.ac.uk/pub/galactic-guide 4.2 Supported computer platforms --------------------------------- While having the articles themselves is pretty fun, actually being able to do something with them is even better. The following computer platforms are supported with PGG article reader systems: o Acorn Archimedes Author contact: Alex McLintock (alexmc@biccdc.co.uk) o Amiga o Atari ST o IBM/MS-DOS (also works within Windows, OS/2, DESQview, etc.) Author contact: Steve Baker (swbaker@vela.acs.oakland.edu) o Macintosh Author contact: Rickard Andersson (rickard@softlab.se) o Unix Author contact: Dave Gymer (dpg@cs.nott.ac.uk) o X Windows Author contact: David Squire (squizz@cs.curtin.edu.au) Each of the programs is available in its own subdirectory on the Mothership. Questions about a particular program's use or functionality should be directed to the program's author or posted to alt.galactic-guide. 4.3 Other ways to get PGG materials ------------------------------------ There's a lot of BBS systems that carry Project Galactic Guide stuff. Honestly -- I'm positive there's a lot of them... although the FAQ file doesn't really reflect this. Yet. Just give us some time and soon this list will have a lot of numbers. Really. Area/Region BBS Name Number --------------- ------------------------------ ---------------- Mass., USA Sea of Noise +1 203 886 1441 In addition, you may contact one of the following hoopy froods who have volunteered to distribute PGG materials in their local countries: Country Contact --------------- ------------------------------ Denmark Christian Moensted Almindingen 66 2860 Soeborg (email: moensted@diku.dk) 5.0 World-Wide Web (WWW) sites ------------------------------- For those who can view html documents (including users of Mosaic, Cello, and WinWeb), there are a number of froody WWW sites: URL: http://www.strw.leidenuniv.nl/~vdmeulen/index.html Operator: Roel van der Meulen URL: http://web.cs.city.ac.uk/pgg/guide.html Operator: Nick Williams URL: http://www.realtime.net/~lthumper/ Operator: Jeff Kramer URL: http://www.willamette.edu/pgg/ Operator: James Tilton These all have links to the Article Archives, the PGG Mothership, format and article information, and many have on-line archive search and article retrieval capabilities. 6.0 Miscellaneous questions ---------------------------- Q: What's with 42, who is Douglas Adams, and why should I carry a towel? A: Please see the alt.fan.douglas-adams Usenet group; they'll be happy to supply you with amplitudes of answers. Q: How can I get a PGG Press Card? A: As soon as they're finished, you'll be able to get an Official PGG Press Card from Jason Kohles (jason.kohles@m.cc.utah.edu). Q: What good are the PGG Press Cards? A: They may actually get you in some places, and besides they look cool. There's an article on what to do with your Press Card; check it out! Q: What's up with the PGG t-shirts? A: Among others, Stephane Lussier (stef@phoque.info.uqam.ca) has come up with some great graphics and motif ideas for the Official PGG t-shirt. They're available for review on the Mothership. As soon as we decide on how the shirts will look, and as soon as someone makes the shirts, then you'll be able to order them! For more information, just follow the t-shirt threads on alt.galactic-guide. Q: Do you need more editors? A: Not really. How can you become an editor? Well, lots of money would definitely help (just kidding). Anyway, until the project completely consumes both Paul and Steve to the point of exhaustion, we're probably all set. Q: Is there a Macintosh Guide Reader? A: YES! Please see Section 4.2, above. Q: Is there a Microsoft Windows-based Guide Reader? A: Sorta. It's being developed. Under construction. Something like that. Q: Is this the end of the PGG FAQ? A: Yes. Q: Really? A: I mean it this time. Q: Are you sure about that? A: Absolutely. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% PRE-EMPLOYMENT BACKGROUND CHECKS From: Phil Agre (pagre@weber.ucsd.edu) and Christine Harbs (charbs@teetot.acusd.edu) Although the enclosed fact sheet from The Privacy Rights Clearinghouse only applies to California, it might provide a model for other jurisdictions worldwide. The Privacy Rights Clearinghouse has a new gopher of useful legal and practical stuff about privacy. Telnet to teetot.acusd.edu (or 192.55.87.19) and log in as "privacy". You can now reach the Privacy Rights Clearinghouse's useful gopher directly at gopher.acusd.edu. You'll find PRC under menu item 4, USD Campus-Wide Information System. ************************************** The Privacy Rights Clearinghouse The Center for Public Interest Law 5998 Alcala Park San Diego, CA 92110 (619) 260-4806 (619) 260-4753 (fax) e-mail prc@teetot.acusd.edu gopher gopher.acusd.edu Hotline: +1 800-773-7748 (Calif. only) +1 619-298-3396 *************************************** Fact sheet No. 16 Copyright 1994, Center for Public Interest Law August 1994 Employment Background Checks: A Jobseeker's Guide **Why would an employer want to do a background check? Whether you are hired or promoted for a job may depend on the information gathered by the employer in a background check. Employers use them to verify the accuracy of information provided by jobseekers. Background reports may also uncover information left out of the application or interview. Today, more employers are being sued for "negligent hiring" for not checking carefully enough into the background of a potential employee. If an employee's action hurts someone, the employer may be liable. That is one reason more background checks are being conducted. The "information age" also accounts for the increase in background checks-- the availability of computer databases containing millions of records of personal data. As the cost of searching these sources drops, employers are finding it more feasible to conduct background checks. **I don't have anything to hide. Why should I worry? While some people are not concerned about background investigations, others are uncomfortable with the idea of an investigator poking around in their personal history. In-depth background checks could unearth information that is irrelevant, taken out of context or just plain wrong. A further concern is that the report might include information that is illegal to use for hiring purposes or which comes from questionable sources. Since in most cases employers are not required to tell applicants that a background check is being done, jobseekers may not have the opportunity to respond to negative or misleading data. **What types of information might be included in a background check? Background reports can range from a verification of an applicant's Social Security number to a detailed account of the potential employee's history and acquaintances. Here are some of the pieces of information that might be included in a background check: - Driving records - Vehicle registration - Credit records - Criminal records - Social Security no. - Education records - Court records - Workers' compensation - Bankruptcy - Character references - Neighbor interviews - Medical records - Property ownership - Employment verification - Military service records - State licensing records **Which companies conduct background checks? There are many companies that specialize in conducting pre-employment background checks. They typically use public records databases to compile reports. The following is a partial list of companies that perform a variety of services for employment background checking: Avert, Interfact, Equifax Employment Services, CDB Infotek, Employers Mutual Assoc., Employers Information Service, Trans Union, Information Resource Service Co., Pinkerton Security & Investigation Services. With the information age upon us, it is easier for employers to gather background information themselves. Much of it is computerized, allowing employers to "log on" to public records and commercial databases directly through commercial online services. Employers may also create a "clearinghouse" of information about potential employees. A group of employers establish a data exchange program to screen applicants. The database is comprised of information submitted by the member companies about their employees. When a jobseeker submits an application to a member company, that employer will check with the clearinghouse for information on the applicant. **What types of information *can't* the employer consider? Federal and state laws limit the types of information employers can use in hiring decisions. o Arrest information. Although arrest record information is public record, in California employers cannot seek out the arrest record of a potential employee. However, if the arrest resulted in a conviction, or if the applicant is out of jail but pending trial, that information can be used. (California Labor Code @ 432.7) o Criminal history. In California, criminal histories or "rap sheets" compiled by law enforcement agencies are not public record. Only certain employers such as public utilities, law enforcement, security guard firms, and child care facilities have access to this information. With the advent of computerized court records and arrest information, however, there are private companies that compile virtual "rap sheets." (California Penal Code @@ 11105, 13300) o Workers' compensation. When an employee's claim goes through the state system or the Workers' Compensation Appeals Board, the case becomes public record. Only if an injury might interfere with one's ability to perform required duties may an employer use this information. Under the federal Americans with Disabilities Act, employers cannot use medical information or the fact an applicant filed a workers' compensation claim to discriminate against applicants. (42 USC @12101) o Bankruptcies. Bankruptcies are public record. However, employers cannot discriminate against applicants because they have filed for bankruptcy. (11 USC @525) **Aren't some of my personal records confidential? The following types of information may be useful for an employer to make a hiring decision. However, the employer is required to get your permission before obtaining the records. (For more information, see PRC Fact Sheet No. 11, "From Cradle to Grave: Government Records and Your Privacy.") o Education records. Under both federal and California law, transcripts, recommendations, discipline records and financial information are confidential. A school should not release student records without the authorization of the student or parent. However, a school may release *directory information*, which can include name, address, dates of attendance, degrees earned, and activities, unless the student has given written notice otherwise. (California Education Code @@ 67100, 76200; 20 USC @1232g) o Military service records. Under the federal Privacy Act, service records are confidential and can only be released under limited circumstances. Inquiries must be made under the Freedom of Information Act. Even without the applicant's consent, the military may release name, rank, salary, duty assignments, awards and duty status. (5 USC @@ 552, 552a) o Medical records. In California, medical records are confidential. There are only a few instances when a medical record can be released without your knowledge or authorization. If employers require physical examinations after they make a job offer, they have access to the results. The Americans with Disabilities Act allows a potential employer to inquire only about your ability to perform specific job functions. (California Civil Code @ 56.10;42 USC @12101) There are other types of questions such as age and marital status and certain psychological tests that employers cannot use when interviewing. These issues are beyond the scope of this fact sheet. If you have further questions, look under "For more information" at the end of this fact sheet or call the PRC Hotline. **What can my former employer say about me? Often a potential employer will contact an applicant's past employers. A former boss can say anything [truthful] about your performance. However, most employers have a policy to only confirm dates of employment, final salary, and other limited information. California law prohibits employers from intentionally interfering with former employees' attempts to find jobs by giving out false or misleading references. (California Labor Code @ 1050) Documents in your personnel file are not confidential and can be revealed by an employer. Only medical information in a personnel file is confidential. If you are a state or federal employee, however, your personnel file is protected under the California Information Practices Act or the federal Privacy Act of 1974 and can only be disclosed under limited circumstances. Under California law, employees have a right to review their own personnel files, and make copies of documents they have signed. (California Civil Code @ 56.20; California Labor Code @@432, 1198.5; California Government Code @ 1798; 5 USC @552a) **Does the applicant have a right to be told when a background check is requested? The *only* times an applicant must be told if a background check is conducted is if the employer requests an "investigative consumer report" or a credit report. The investigative consumer report may contain information about your character, general reputation, personal characteristics and lifestyle. The information in the report is typically compiled from interviews with neighbors, friends, associates and others who might have information about you. Under both California and federal law, the applicant must be notified if an employer requests an investigative consumer report. (California Civil Code @ 1786; 12 USC @1681d. Also see Fact Sheet No. 6, "How Private is My Credit Report?") An employer can also order a copy of your credit report, which is less detailed than an investigative report. However, a credit report can still tell an employer a lot about you. It may contain public records information such as court cases, judgments, bankruptcies and liens; also, outstanding credit accounts and loans, and the payment history for each account. Credit report entries remain in the report for up to ten years. In California, if an employer checks your credit file, you must be notified and given an opportunity to see the file. Also, when a report is requested for employment purposes, the credit bureau must block all references to age, marital status, race, religion and medical information. Although federal and state laws allow credit bureaus to include criminal record information, it is an industry policy not to do so. (California Civil Code @@ 1785.18, 1785.20.5) **What can the job applicant do to prepare? Although you cannot *prevent* an employer from doing a background check, you can take steps to be ready for questions the employer might ask once the investigation is conducted. o Order a copy of your credit report. If there is something you do not recognize or that you disagree with, dispute the information with the creditor or credit bureau before you have to explain it to the interviewer. (See PRC Fact Sheet No. 6, "How Private is My Credit Report?") o Check public records files. If you have an arrest record or have been involved in court cases, go to the county where this took place and inspect the files. Make sure the information is correct and up to date. Request a copy of your driving record from the Department of Motor Vehicles (DMV), especially if you are applying for a job that may involve driving. o Ask to see a copy of your personnel file from your old job. Even if you do not work there anymore, you have a right to see your file until at least a year from the last date of employment. You are allowed to make copies of documents in your file that have your signature on them. (California Labor Code @ 432.) You may also want to ask if your former employer has a policy about the release of personnel records. Many companies limit the amount of information they disclose. o Read the fine print carefully. When you sign a job application, you may also be signing a statement that waives your right to a copy of your credit report. You might also be authorizing the disclosure of other personal data, such as educational records, medical records and financial data. Unfortunately, jobseekers are in an awkward position, since refusing to authorize a background check may jeopardize the chances of getting the job. o Tell neighbors and work colleagues, past and present, that they might be asked to provide information about you. This helps avoid suspicion and alerts you to possible problems. o If you feel comfortable, ask the interviewer about the company's employee privacy policies. Find out if the potential employer plans to do a background check, and ask to see a copy. **For more information o Equal Employment Opportunity Commission (see the Government Pages in your phone book). o California Labor Commission (see the Government Pages in your phone book). o Pacific Disability and Business Technical Assistance Center for questions about the Americans with Disabilities Act, (800) 949-4232. o Documented Reference Check, (800) 742-3316 (verifies references of former employers; fee charged). If you have additional questions about privacy, contact the PRC Hotline at (800) 773-7748. Copyright 1994 Center for Public Interest Law August 1994 *************************************************************************** The Clearinghouse is a nonprofit organization dedicated to educating Californians about personal privacy issues. It is funded by a grant from the Telecommunications Education Trust and operates under the auspices of the University of San Diego School of Law's Center for Public Interest Law. *************************************************************************** %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF YOU LIVE IN TEXAS. ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR PRIVACY. IF YOU DISCOVER THIS TO BE THE CASE, MAIL US! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%