About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Brendan's mom thanks the Net, The Prisoner: Phibe


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Computer underground Digest Sun Jan 23 1994 Volume 6 : Issue 09
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer ([email protected])
Archivist: Brendan Kehoe (Improving each day)
Acting Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Coppice Editor: P. Bunyan

CONTENTS, #6.09 (Jan 23 1994)
File 1--Brendan's mom thanks the Net
File 2--"The Prisoner: Phiber Optik Goes Directly to Jail"
File 3--Letter of Concern in Amateur Action BBS Procedures
File 4--Some thoughts on censorship (Re Am. Action "Porn" Raid)
File 5--Lobby the Feds via PC
File 6--More on "The Rating Game" (Re:CuD 6.03, 6.04)
File 7--PUB.RCDS #1: online polit disclosures + leg.online (AB1624)
File 8--GOV-ACCESS #2 interests; radio chat; joining this list

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from [email protected]. The
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493

ANONYMOUS FTP SITES:
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
UNITED STATES:
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
halcyon.com( 202.135.191.2) in mirror2/cud
ftp.warwick.ac.uk in pub/cud (United Kingdom)
KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Wed, 19 Jan 1994 13:38:42 -0800
From: Jeffrey L. Needleman <[email protected]>
Subject: File 1--Brendan's mom thanks the Net

((MODERATORS' NOTE: Brendan's recovery has been described as
"miraculous." We received a short, but "typically Brenan" note from
him Thursday evening, and he's progressing far better than expected.
Those wishing to contribute to his medical fund or send a card can do
so at:

Brendan Kehoe
c/o Brendan's Friends
Cygnus Support
One Kendall Square
Cambridge, MA 02139

=======================================

A few weeks before his accident, Brendan Kehoe was named the Board Leader
of the Internet Bulletin Board on the PRODIGY Information Service, a
national service which is a joint venture of IBM and Sears.

Alice Kehoe has an account on PRODIGY and posted the message that follows:

> INTERNET BB
>TOPIC: GENERAL
>TIME: 01/16 7:34 PM
>
>TO: ALL
>FROM: ALICE KEHOE (EMGX48C)
>SUBJECT: BRENDAN
>
>Hi, I'm Brendan's mom -
>Since I can't get to the Net right now, thought this might
>be one way, at least, of reaching some of the wonderful
>folks who've so generously sent along masses of cards, mes-
>sages, and letters since word of Brendan's accident made its
>way through Cyberspace. Your thoughtful kindness means such
>a very great deal to all of us ...
>Although there is still a very, very long way to go, and
>months of rehab in the offing, Brendan is progressing at a
>far faster rate than his doctors had ever anticipated. He is
>able to feed himself; can walk with assistance; and, has
>even managed a few words now and again, often more or less
>in context.
>He is still at Philadelphia's Hospital of the University of
>Pennsylvania, but we (his brother, Derry, and I) anticipate
>moving him to a Boston long-term rehab facility in about a
>week or two. (We live in Maine, but Boston's about as close
>as we can get for the type of care he needs.)
>Your thoughts, good wishes, and most importantly, prayers
>have been an immeasurable support and life-line to all three
>of us. Thank you, so VERY much!
>
>Regards and God bless,
>Alice
>
>PS: Would someone who can link into the Net be kind enough
>to convey our gratitude Out There?? Thanks!
>
>

Jeff Needleman, [email protected]
(I'm the MemRep for the Computer Bulletin Board on PRODIGY.)

------------------------------

Date: Thu, 20 Jan 1994 21:25:21 -0500 (EST)
From: Julian Dibbell <[email protected]>
Subject: File 2--"The Prisoner: Phiber Optik Goes Directly to Jail"

The Prisoner: Phiber Optik Goes Directly to Jail

By Julian Dibbell ([email protected])
(From The Village Voice, January 12, 1994)

Phiber Optik is going to prison this week and if you ask me and
a whole lot of other people, that's just a goddamn shame.

To some folks, of course, it's just deserts. Talk to phone-company
executives, most computer-security experts, any number of U.S.
attorneys and law-enforcement agents, or Justice Louis Stanton of the
Southern District of New York (who handed Phiber his year-and-a-day in
the federal joint at Minorsville, Pennsylvania), and they'll tell you
the sentence is nothing more than what the young hacker had coming to
him. They'll tell you Phiber Optik is a remorseless, malicious invader
of other people's computers, a drain on the economic lifeblood of our
national telecommunications infrastructure, and/or a dangerous role
model for the technoliterate youth of today.

The rest of us will tell you he's some kind of hero. Just ask.
Ask the journalists like me who have come to know this 21-year-old
high-school dropout from Queens over the course of his legal travails.
We'll describe a principled and gruffly plain-talking spokesdude whose
bravado, street-smart style, and remarkably unmanipulative
accessibility have made him the object of more media attention than
any hacker since Robert Morris nearly brought down the Internet. Or
ask the on-line civil libertarians who felt that Phiber's commitment
to nondestructive hacking and to dialogue with the straight world made
him an ideal poster boy for their campaign against the repressive
excesses of the government's war on hackers. You might even ask the
small subset of government warriors who have arrived at a grudging
respect for Phiber's expertise and the purity of his obsession with
the workings of the modern computerized phone system (a respect that
has at times bordered on parental concern as it grew clear that a 1991
conviction on state charges of computer trespass had failed to curb
Phiber's reckless explorations of the system).

But for a truly convincing glimpse of the high regard in which
Phiber Optik is held in some quarters, you'd have to pay an on-line
visit to ECHO, the liberal-minded but hardly cyberpunk New York
bulletin-board system where Phiber has worked as resident technical
maven since last spring. Forsaking the glories of phonephreaking for
the workaday pleasures of hooking the system up to the Internet and
helping users navigate its intricacies, he moved swiftly into the
heart of ECHO's virtual community (which took to referring to him by
the name his mother gave him -- Mark -- as often as by his nom de
hack). So that when he was indicted again, this time on federal
charges of unauthorized access to phone-company computers and
conspiracy to commit further computer crimes, ECHO too was drawn into
the nerve-racking drama of his case.

As the "coconspirators" named in the indictment (a group of
Phiber's friends and government-friendly ex-friends) pleaded guilty
one by one, there remained brave smiles and high hopes for Phiber's
jury trial in July. By the time the trial date arrived, however,
Phiber had made an agonizing calculus of risks and decided to plead
guilty to one count each of computer intrusion and conspiracy. ECHO
was left on tenterhooks waiting for the day of the sentencing. Given
Mark's newfound enthusiasm for more legitimate means of working with
computers and his undisputed insistence at the time of his plea that
he had never damaged or intended to damage any of the systems he broke
into, it seemed reasonable to wish for something lenient. A long
probation, maybe, or at worst a couple months' jail time. After all,
the infamous Morris had done considerably greater harm, and he got off
with no jail time at all.

When the news arrived, therefore, of Phiber's 12-month prison sentence
(plus three years' probation and 600 hours of service), it hit like a
slap in the face, and ECHO responded with a massive outburst of dismay
and sympathy. ECHO's director, Stacy Horn, posted the information at 3
p.m. on November 3 in the system's main conference area, and within 24
hours the place was flooded with over 100 messages offering
condolences, advice on penitentiary life, and curses on Judge Stanton.
Not all the messages were what you'd want to call articulate
("shit," read the first one in its entirety; quoth another:
"fuckfuckfuck-fuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuck"),
nor was all the advice exactly comforting ("Try not to get killed,"
a sincere and apparently quite prison-savvy Echoid suggested; "Skip
the country," proposed one user who connects from abroad, inviting
Phiber to join him in sunny South Africa). But the sentiment
throughout was unmistakably heartfelt, and when Phiber Optik finally
checked in, his brief response was even more so:

"I just finished reading all this and...I'm speechless. I
couldn't say enough to thank all of you."

He didn't have to thank anybody, of course. Motivated by genuine
fellow feeling as this electronic lovefest was, it was also the last
step in the long-running canonization of Phiber Optik as the digital
age's first full-fledged outlaw hero, and making somebody else a hero
is not necessarily the most generous of acts. For one thing, we tend
to get more from our heroes than they get from us, and for another, we
tend to be heedless of (when not morbidly fascinated by) the very high
psychic overhead often involved in becoming a hero -- especially the
outlaw kind. To their credit, though, the Echoids proved themselves
sensitive to the weight of the burden Phiber had been asked to take
on. As one of them put it: "Sorry Mark. You've obviously been made a
martyr for our generation."

There was some melodrama in that statement, to be sure, but not
too much exaggeration. For ironically enough, Judge Stanton himself
seemed to have endorsed its basic premise in his remarks upon passing
sentence. Not unmoved by the stacks of letters sent him in support of
Phiber Optik's character and motivations, the judge allowed as how a
less celebrated Phiber Optik convicted of the same crimes might not
deserve the severity of the discipline he was about to prescribe (and
in Phiber's case it could be argued that 12 months locked up without a
computer is severe enough to rate as cruel and unusual). But since
Phiber had made of himself a very public advertisement for the ethic
of the digital underground, the judge insisted he would have to make
of the sentence an equally public countermessage. "The
defendant...stands as a symbol here today," said Stanton, making it
clear that the defendant would therefore be punished as one too.

The judge did not make it clear when exactly it was that the
judicial system had abandoned the principle that the punishment fits
the crime and not the status of the criminal, though I suppose that
happened too long ago to be of much interest. More frustratingly, he
also didn't go into much detail as to what it was that Phiber Optik
was to stand as a symbol _of_. In at least one of his remarks,
however, he did provide an ample enough clue:

"Hacking crimes," said Judge Stanton, "constitute a real threat
to the expanding information highway."

That "real threat" bit was a nice dramatic touch, but anyone
well-versed in the issues of the case could see that at this point the
judge was speaking symbolically. For one thing, even as practiced by
the least scrupulous joyriders among Phiber Optik's subcultural peers,
hacking represents about as much of a threat to the newly rampant
telecommunications juggernaut as shoplifting does to the future of
world capitalism. But more to the point, everybody recognizes by now
that all references to information highways, super or otherwise, are
increasingly just code for the corporate wet dream of a pay-as-you-go
telecom turnpike, owned by the same megabusinesses that own our phone
and cable systems today and off-limits to anyone with a slender wallet
or a bad credit rating. And _that_, symbolically speaking, is what
Phiber Optik's transgressions threaten.

For what did his crimes consist of after all? He picked the locks
on computers owned by large corporations, and he shared the knowledge
of how to do it with his friends (they had given themselves the
meaningless name MOD, more for the thrill of sounding like a
conspiracy than for the purpose of actually acting like one). In
themselves the offenses are trivial, but raised to the level of a
social principle, they do spell doom for the locks some people want to
put on our cyberspatial future. And I'm tempted, therefore, to close
with a rousing celebration of Phiber Optik as the symbol of a spirit
of anarchic resistance to the corporate Haussmannization of our
increasingly information-based lives, and to cheer Phiber's hero
status in places like ECHO as a sign that that spirit is thriving.

But I think I'll pass for now. Phiber Optik has suffered enough
for having become a symbol, and in any case his symbolic power will
always be available to us, no matter where he is. Right now, though,
the man himself is going away for far too long, and like I said,
that's nothing but a goddamn shame.

*********************************************************************
Julian Dibbell [email protected]
*********************************************************************

------------------------------

From: [email protected]
Subject: File 3--Letter of Concern in Amateur Action BBS Procedures
Date: Thu, 20 Jan 94 23:30:28 PST

H. Keith Henson
799 Coffey Ct.
San Jose, CA 95123
408-972-1132

Hon. Wayne D. Brazil
U.S. Magistrate-Judge
450 Golden Gate Ave.
15th Floor, Courtroom A
San Francisco, CA 94102

January 19, 1994

Dear Judge Brazil:

This letter is to express my concerns about search warrant
3.94.3005.WDB you issued on January 6 of this year to David
H. Dirmeyer. (I am assuming you issued it; the copy of the
warrant persented at the time of the search did not have a
signature on it, but did have your name typed in.)

Under "PROPERTY TO BE SEIZED," point A refered to a computer
system used for publishing, and thus protected from warrants
under Title 42, Section 2000aa. (The "Newspaper Privacy
Protection Act" requires supenas except very limited cases.)

This computer also contained electronic communications
between many of the 3500 people who used this system. Title
18, Setion 2703 (Electronic Communication Privacy Act)
requires specific warrants to seize, or even block access to
such electronic communications.

In conversation with Postal Inspector Dirmeyer at the time
of the search, I asked if he was aware of the these laws.
He told me that he was. In an additional conversation last
Saturday morning with him and a police officer he stated
that he had discussed the ECPA and 2000aa issues as well as
the Steve Jackson Games type of liability issues with you
before the warrant was issued.

Agent Dirmeyer admitted to me Saturday that he was the
"Lance White" whose records were being sought under points H
and I of the search warrant, and that you were aware of, and
approved, the deception involved. Dirmeyer/White also
stated in writing that he sent an unsolicited package of
child pornography to the person at the address of the search
warrant, and (verbally to me) that this was "normal
investigation procedure."

I realize that Judges are not much concerned with warrants
after they are issued. However, I was so astounded by the
statements of Agent Dirmeyer, that I decided to at least let
you know about them.

Sincerely,

H. Keith Henson

------------------------------

Date: Fri, 21 Jan 1994 23:19:17 CST
From: "AMERICAN EAGLE PUBLICATION INC." <[email protected]>
Subject: File 4--Some thoughts on censorship (Re Am. Action "Porn" Raid)

From--Mark Ludwig, [email protected]

After reading about the latest porno-BBS raids, and the fact that one
reader cancelled his sub to CUD because he was sick of hearing about
it, I wanted to make a few comments. It seems like pornography is
always and forever a 1st amendment/freedom of speech issue, but I
don't think it is a very good test of the 1st amendment.

I've been writing and publishing technical literature about computer
viruses for a few years now--as well as arguing that viruses are not
something that should be suppressed because (a) people need good,
solid technical information if they want to defend themselves against
viruses, and (b) because viruses are not simply totally evil.
Obviously, some are pretty bad, but at the same time, you have
arguably beneficial ones like Cruncher and Potassium Hydroxide.
Likewise, they may provide valuable insights into other disciplines,
as discussed in my recent book, Computer Viruses, Artificial Life and
Evolution.

My work has been subject to an incredible amount of censorship. But
not government-sponsored censorship. I've been censored by the
press--those who were once the vanguard of freedom of the press have
become its worst enemy in my eyes. Let me explain . . .

Around about December 7 I received a call from ___, sales
representative at the Computer Shopper. She informed me that they were
not going to allow us to advertise in their magazine anymore.
Evidently they had received complaints about our advertisement and
decided, like so many other journals, that their readers are too
immature and irresponsible to handle such things and, for the good of
society, they'd better deprive them of such information.

Did they review our materials prior to their decision? No.

Did they give us an opportunity to answer the complaints they
received? No.

In fact, Ziff Davis' high and mighty legal department proved totally
unwilling to even speak to me, preferring to hide behind a sales rep
instead. And no one at Ziff would put anything in writing.

This may sound preposterous to you, but it's happened to me time and
time again. A fair number of magazines have terminated our advertising
without ever reviewing our materials or discussing the matter with us.
These include Dr. Dobbs, Computer Language (who didn't even bother to
inform us they had dropped our ad), Computer Craft, and Nuts and Volts
(who reconsidered and reinstated us after about a year).

What sets the Computer Shopper apart is that they are the porn king of
computer magazines. In the context of a dozen pages of ads which sell
everything from Seymour Butts, Erotic Fantasies, Porkware and Deep
Throat to the gay Man Power, the decision to pull our ad came as a
real surprise. Evidently the omniscient legal department at Ziff has
come to the inspired realization that our materials are much worse
than blatant pornography--without ever looking at anything we sell!

Personally, I find it difficult to understand what a porno CD has to
do with computers, except that it goes in a CD ROM reader in your
computer. But that's kind of like selling x-rated videos in a
technical magazine about TVs. The only logic I can see to it is the
idea that perhaps the techies who read magazines like the Shopper are
sexually unfulfilled people who must fantasize to satisfy their animal
lusts. At least, I suppose that's what Ziff's pundits think, and
that's why they run the ads. It makes their customers happy.

On the other hand, technical information about computer viruses makes
a lot of sense in a computer magazine. After all, they are a
phenomenon that most computer users are going to have to deal with
sooner or later, and they are something that some of us find
interesting for purely technical reasons.

Pornography has long been a point of contention in the battle over
free speech simply because--in the Supreme Court's words--it has no
"socially redeeming value." And if one is free to appeal to only the
basest human lusts, so the argument goes, then any more noble ideas
will also be protected.

These kinds of arguments are fallacious though. The whole idea of
freedom of speech was born in the reformation, not with an eye to
protecting pornographers, but with an eye to protecting thinkers--and
specifically religious reformers--people who saw the corruption of the
state-church and who spoke out to condemn it and change it.

Good ideas can often be far more dangerous to those in power than bad
ideas. And porn is at best a bad idea. It won't threaten anyone in
power, and it acts like an opiate to society. It is a diversion. So to
suffer its existence isn't a good test of the freedom of speech. On
the other hand, what happens when somebody has a really good idea that
sets to naught the ideas which those in power use to remain in power?
(e.g. "taxation without representation is wrong") That is truly
threatening. Will the idea be suppressed by legal means? Will it be
buried under a flood of propaganda? This is the REAL testing ground. A
society which permits porn, but suppresses real ideas isn't free at
all.

The whole issue of cryptography is case and point. In this age, the
dissemination or withholding of information has become a real tool of
power. In the past century, government secrets have multiplied without
number, while government has steadily demanded more and more
information about its citizens, and access to more information on
demand. Good cryptography is a threat to the ability to gather
information, and a stumbling block on the road to total control. So it
is being suppressed.

Now, when we see flagrant intrusions into our freedom by
government--such as in cryptography--our tendency is to point the
finger at government--"those guys." But--at least here in America--we
are the government. We voted it into power. And, no matter where, all
governments exist only with the consent of the governed. Perhaps it is
grudging consent, or fearful consent, but it is consent none the less.
The only one who really may not consent is probably in solitary
confinement or a slave-labor camp being whipped. So when we see
government intruding on freedom of speech or some such thing, we can
only rightly see it as a sickness in all of society. And it should be
no surprise to find the press--which has traditionally been thought of
as the vanguard of the freedom of speech--suppressing it. The Computer
Shopper, Dr. Dobbs, etc., etc., just have the same sickness as the
government and everyone else.

Frankly, I think we live in a generation where a majority of people
prefer security to freedom. You can see it everywhere. Clinton is no
dummy, and I think his new theme is not just a stupid idea, but the
result of research. He knows what Americans--for the most part--have
come to expect, and he's going to at least promise it to them (even
though he cannot possibly deliver the reality of it, even if he has
spoken of a "new covenant"). I think it's a shrewd move. Every
president since Carter in 1976 has been elected on the basis of the
economy. Financial security has proven to be more important to the
average american than freedom, election after election. In short,
freedom isn't really an issue of national importance anymore, though
some of us still value it deeply. Security is the issue that gathers
the crowds and wins the votes.

There is an important idea here: freedom or security? The America of
200 years ago was founded on the idea of freedom under God. That
doesn't mean unrestrained freedom, but freedom within a given moral
code. It meant you were free to follow the profession of your choice,
go (or not go) to the church of your choice, to speak respectable
opinions, and free to live where you wanted, and keep what you earned.
It did not mean you were free to loot your neighbor or sell your
daughter as a prostitute. Now in a state ruled by this paradigm of
freedom, there are always questions about how far those freedoms go.

Today, however, there has been a paradigm shift in our society. The
question is no longer how far we can go with freedom without
endangering society. Rather, the question which government and the
people seem concerned about is how to maximize security--e.g. how to
assure an ever growing abundance of material possessions, and reduce
the risk of losing them. That's why the economy is such a big issue in
government. If freedom were our objective, we'd try to get the
government out of the economy, rather than trying to get government to
manipulate it more effectively.

Now the paradigm of security leads directly to 1984--a totally
controlled, totalitarian society. If you keep pushing the idea of
security, that's where you end up. A totally controlled society is
very secure, and no one in power ever makes a mistake. And that's
where I think America is headed.

Some kind of revolution or civil war isn't going to help things a bit
either. At best, such a cataclysm will be only the event which brings
the full totalitarianism upon us. That's because this love affair
with security is in the people's hearts. It's not government vs. the
people. It's still government of the people by the people. And if the
people want security, then they'll install the government which best
promises them that. This is and always has been a totalitarian regime.
And if revolution won't work, it's hard to put your faith in some
milder type of reform.

I say all of this because it's the only way I can understand the
censorship I've faced. It's the only way you can twist your mind to
believe that what I do is worse than pornography. Even though there
are such things as beneficial viruses, even though viruses might give
us some valuable insights into other scientific disciplines, even
though they have military value, they are a potential threat to the
general security. And to have people walking around who know how to
create them is a threat to the general security. So as long as you are
operating under the paradigm of security, you cannot tolerate virus
writing. Thus, the press censors the press. Computer Shopper censors
American Eagle Publications, and throws their contract out the window
without ever even evaluating their materials.

If the government steps into the picture and enforces some kind of
official censorship against viruses through legislation, it will only
be because the private sector has chosen it already. It will be
because there are a lot of well-heeled businesses pushing it, and a
lot of magazines that won't address the issue honestly in editorials,
and won't let anyone else do it in advertising. That's the age old
formula for totalitarianism.

For these reasons I honestly don't think pornography is the issue
that's pushing the limits of the 1st amendment. The real hot issue
that those of us who value freedom should be giving our attention to
is security vs. freedom. That's where the paradigm shift is taking
place, and where the future will be won or lost. Right now, it would
seem that security is winning out by default.

In the long run, an unearthly security is a false hope. But I'd far
rather see it exposed for what it is by intelligent people using their
brains effectively in my generation, than having it exposed by a
government whip over several generations.

In short, porn isn't the real 1st amendment issue it's cracked up to
be. More often than not, its technical knowledge that really ruffles
the feathers today.

------------------------------

Date: Tue, 11 Jan 94 21:54:54 PST
From: [email protected](David Batterson)
Subject: File 5--Lobby the Feds via PC

Lobby The Feds Via PC
by David Batterson

Here's another one of those programs to let "We The People" [at
least those with PCs] tell those lame-brained, no-account lazy
politicians and bureaucrats in Washington who's the boss.

A while back Parsons Technology offered us Personal Advocate (now
sold for $29, DOS), and Symantec has Write Your Congressman! (also in
a DOS version for $29.95). [Symantec uses a rather sexist,
politically incorrect title, doesn't it? Well, they actually bought
the program (along with ACT!) from a Texas company.]

A tiny company in San Rafael, CA [where this reporter used to
live] got on its soapbox, and decided to do it even better. Or at
least they've tried to.

Soapbox Software offers Federal SoapBox (FSB) Ver. 1.2 that
"brings you the power and know how of Washington insiders by combining
a graphic flow chart of the Federal Government, detailed listings of
policy makers, powerful search functions and easy-to-use
communications tools, allowing you to contact the right people in
Washington at the right time." OK, so much for marketing hype.

After testing out this software, I really don't think it has
Artificial Intelligence capability (so it knows if you contacted the
correct person in a timely fashion). I didn't just fall off a turnip
truck. Nor does it search very well for every person you want to
find.

For example, I did a "Search by Person" for Dee Dee Myers. It
found her OK, since she is the current Press Secretary. But when I
tried to search for former PR whiz George Stephanopoulos, ol' lonesome
George could not be located (even though I knew he was in the White
House chain of command somewhere.

So I looked under Executive Office of the President, where I
found some guy named Clinton. I clicked on "Data," and following data
on the Big Guy, there was the "Office Staff" listed. In that group
was listed "George Stephanopoulos, Sr. Advisor."

Now is there any good reason why FSB's search capability can't
also locate a staff member by name? Cheesch! I think the only reason
must be "bad programming."

The software does have some useful features, such as being able
to create customized mailing lists, exporting data for use in your
database program, federal documents, biographies, legislative
committee assignments, text editor, an online glossary, federal BBSs,
and so on.

The program now has an interface to MCI Mail, but only works if
you want to send PAPER mail or a fax. Note: you CANNOT send e-mail,
for instance, to the MCI Mail ID: WHITE HOUSE, or send Internet
e-mail. Boo! I hope that future versions of FSB fix this oversight.

FSB is sold as a subscription. The rather hefty price of $129
gets you the DOS software plus three quarterly updates; additional
years are $49. Windows and Mac versions are on the way, the company
told me.

Info: SoapBox Software, 10 Golden Gate Drive, San Rafael, CA
94901; 415-258-0292, FAX: 415-258-0294, 800-989-7627 (orders),
Internet: [email protected], CompuServe: 71614,2373, MCI Mail:
594-2208.

#

Computer reporter/reviewer David Batterson looks forward to the day
when most federal, state, county and city officials are online, so we
can zap 'em with e-mail. [Will he live so long?] You may contact him
via The Internet: [email protected], or:
[email protected].
* Evaluation copy of Silver Xpress. Day # 50
--- via Silver Xpress V4.00 [NR]
--
uucp: uunet!m2xenix!puddle!290!David.Batterson
Internet: [email protected]

------------------------------

Date: Wed, 19 Jan 1994 19:52:04 -0500
From: Bryce Eustace Wilcox <[email protected]>
Subject: File 6--More on "The Rating Game" (Re:CuD 6.03, 6.04)

THE RATING GAME (In re CuD 6.03, 6.04)

Stephen Williams ([email protected]) has proposed one of THOSE ideas. An
idea that is simple in design but stunning in potential function. I
heartily congratulate him and add my own two bits:

>Basically, I suggested that special messages be standardized that
>would endorse messages for certain distributions. Old (existing...)
>news software would just pass the messages like others, but news
>systems that wanted to rate or hide improper messages could pay
>attention to them. My software would probably take the form of
>patches to INN and tin, etc. There would be positive and negative
>endorsements, of course with the possibility of signature keys, etc.

This last possibility intrigues me the most. A "majority vote" to
indicate "value" or "content" of a message wwould simply emulate the
current media paradigm: "lowest common denominator". If instead of
simply tallying yay and nay votes, I can tailor my own software to
recognize specific signatures and give them added weight (<giggle> I
just realized that if this were to happen there might be people whose
names I would include with a negative weight factor...) then we would
have a really nice system going. I see several problems right off the
bat, some practical and some hypothetical.

Prob 1: authentification. We must prevent forgery of signatures.
Apparently (according to Phil Zimmerman's PGP doc file), public key

Prob 1a: Public key encryption. Are we ever going to have
widely-used public key encryption available? Insert the whole patent
controversy here.

Prob 1b: bandwidth (numerous apologies and requests for correction
if I misuse any technical term in my enthusiastic ignorance). PGP
keys are 32, 64, or 128 bytes long. Multiply that by the number of
endorsements tacked onto any given message and multiply *that* by the
number of messages and notice a major technical problem.

Prob 2: the end results. will this kind of consensual
discrimination lead to a polarizing/tribalizing effect on society?
Whatever the mass media's faults (and I think they are legion), it
*has* served to give people a common culture. But with the technology
and the society changing the way that it is I really can't imagine a
return to the mass media paradigm nor the "messy Internet" paradigm.
I think Stephen William's anarchic, organic paradigm is definitely the
way to go.

[Though this message is getting a bit long, I think I should pause to
defend/ explain my use of the word "anarchy". I am using the simple
definition "absence of control or regulation". (Of course I do *not*
mean absence of self-control or self-regulation!) The "anarchy" that
I envision in the informational realm is a state in which it is
impossible or at least socially unacceptable for any entity to delete
or substantially alter information without the permission of the
author. Of course some other mechanism will be needed to sort, sift
and organize information and that is why I am so excited about Stephen
William's idea.]

------------------------------

Date: Tue, 18 Jan 1994 05:32:39 -0800
From: Jim Warren <[email protected]>
Subject: File 7--PUB.RCDS #1: online polit disclosures + leg.online (AB1624)

Jan. 18, 1994

This starts a new series of online Updates and occasional panic-mode
Action Alerts regarding specific legislative and regulatory efforts to
assure modern [online, computer-assisted] access to public government
records -- legislative, executive and judicial; federal, state and local.
Most of these postings will fit on one or two printed pages; some will be
noticeably longer.
** Any time you wish to NOT receive further postings, just lemmie know
and I'll delete you from the distribution list. **

NEWS TO YOU?
As I begin this series, I am adding a large number of eaddrs for folks
who have either explicitly requested information in the last several
months about online state legislation, or have otherwise been suggested as
likely-interested in computer-assisted access to public records.
Reiterating: Yer on the list until you ask to be off the list.

PROPOSAL FOR COMPUTER-ASSISTED ACCESS TO POLITICAL DISCLOSURES NOW ONLINE
I have finally found time to upload my 28-page [printed], Jan. 1st
implementation proposal that has been circulating in state and local
political circles since ~Jan. 4th:
"Computerized Political Disclosures:
Doing It with Minimal Cost and Maximum Utility."
This details how to conveniently and economically computerize the filing
of and computer-assisted public access to state and local campaign-finance
disclosures, officials' statements of economic interests, and state
lobbyists' disclosures. Local-government Clerks and Voter Registrars can
implement it for a one-time cost of ~$10,000 (if they don't already have a
spare PC). Filings and statewide public access for state offices can be
implemented for as little as $12,000 for a minimal adequate system, plus
perhaps $200/month for statewide access too all disclosures within hours of
them being filed. (It is likely, however, that they may spend 3 to 5 times
the minimum capital amount -- but will incur significant other savings in
staff and resources and provide wildly-improved statewide services.)
Copies in MacWord5 and/or RTF format are available by anonymous-ftp, WAIS,
gopher, Veronica, etc. from:
Internet-host: cpsr.org
In directory: /cpsr/states/california/polidisclos
[If you are on the WELL, you can copy them directly from my home directory.]

On Jan. 11th, I met with Deputy Chief Secretary of State Tony Miller and
his staff, who had reviewed the proposal. They were enthusiastic about it,
and projected that they will need little or *no* additional budget allocation
to do it.
It will, however, require some legislative authorizations and mandates.
It appears likely that State Senator Tom Hayden will amend the needed
language into his campaign-reform bill, SB758. I should know more within
two weeks or less.

FOUR BILLS INTRODUCED TO OPEN UP ALREADY-COMPUTERIZED PUBLIC RECORDS
Assembly Members Debra Bowen (D, Marina del Rey) and Tom Bates (D, Oakland-
Berkeley) have introduced a total of four bills seeking modern access to
California's computerized public records. Call their offices for copies:
Bowen: 916-445-8528, Mary Winkley Bates: 916-445-7554, Rachel Richman
More in future updates. Privacy advocates, please note: A "public" record,
by definition, does NOT include personal information that is not public.

SON OF AB1624 [Or "OFFSPRING OF ...", for the politically-correct :-) ]
These notices are a follow-on to 34+ online notices regarding the 1993
California Legislature's Assembly Bill 1624 (by Bowen).
Now Calif. Govt. Code 10248, AB1624 mandates that all California state
legislation-in-progress, state statutes and the state Constitution be
available via the Internet, without charge by the state.
For antiquitarians' interest, those online notices plus other related
postings are available by anonymous-ftp, WAIS, gopher, Veronica, etc. from:
Internet-host: cpsr.org
In directory: /cpsr/states/california/AB1624.

STATE LEGISLATION ONLINE: AB1624 WHEN?
AB1624 was signed into law on Oct. 11th and took effect Jan. 1, 1994.
At the end of December, bill-author Bowen's office said the Legislative
Counsel - which operates the Legislative Data Center (LDC)- had estimated
they would be online and operational by Jan. 10th. Last week, Bowen's
office reported that Legis.Counsel was then estimating they would be online
and publicly operational by Friday, Jan. 21st.
It continues to be my sincere belief that the LDC staff *are* *diligently*
trying to get the system operational. Don't blame them; I honestly believe
they are doing the best they can with the time and resources allotted to them
by their management.
However, I find it arrogant disregard by the Chief Legislative Counsel,
that he ignores requests for progress details - especially amazing in that
the entire issue in AB1624 is the public's right to know what their/our
government is doing. All the worse, his lack of a public statement causes
his computer staff unjustified ill-repute among the public, and that ain't
right!
If they're not online by about the 23rd, I will send another update
giving the name, address, phone number and fax number of the responsible
party, the Chief Legislative Counsel, and folks can explore his responsive-
ness, directly.
When I know more, you'll know more.

Mo' as it Is.
--jim
Jim Warren, columnist for MicroTimes, Government Technology, BoardWatch, etc.
[email protected] -or- [email protected]
345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/415-851-2814
[organizer & Chair, First Conference on Computers, Freedom & Privacy (1991);
InfoWorld founder (1978); PBS's "Computer Chronicles" first host; blah blah]

>>Permission herewith granted for unlimited reposting and recirculation.<<

------------------------------

Date: Wed, 19 Jan 1994 15:06:18 -0800
From: Jim Warren <[email protected]>
Subject: File 8--GOV-ACCESS #2 interests; radio chat; joining this list

Jan. 19, 1994

SOME DIMENSIONS OF THE GOV-ACCESS/PUB-RCDS TURF

Note: Access to public records is one component of a broader issue -- the
input side (from the public's perspective, the perspective of this list).
Functionality in which citizens may be interested:

access to information, online feedback to officials & agencies
online access, offline bulk-data access, info services (not just data)
personal use, nonprofit-organization use, commercial/tax-paying use
public dissemination, community discussion (town-sized to Village Earth)
Level(s) of government in which citizens may be interested:
city/town, county/parrish, state, federal, multi-national
<specific areas of special interest>
Types of public government information in which citizens may be
interested: political disclosures, legislative, judicial/courts,
all public records <specific topics of special interest>

If yer willin', it would be nice to know your interests -- which will
*not* be disclosed to anyone else, unless your identifying specifics
are removed. **If you respond, please be SURE to indicate whether you
are already on this distribution list -- i.e., you received this,
directly to your eaddr.**

SF BAY AREA TALK-SHOW ABOUT COMPUTER-AIDED PUBLIC ACCESS TO GOVERNMENT
I have been invited to have an hour-long radio talk-show chat about
computer-assisted access to government -- legislative information,
political disclosures, computerized public records, etc. (and I hope
to include privacy concerns in the discussion, too, e.g. commercial
abuse of driver lic info).
More importantly, it's on one of the biggest stations in the San
Francisco Bay Area, and it's in radio's *prime* time -- the weekday
p.m. commute hours!

The Peter B. Collins Show
KSFO-AM/KYA-FM (560-KHz/93-MHz)
5:30 p.m. - 6:30 p.m., Monday, January 24th

[ If you are knowedgeable computer-aided gov-access issues, why not
contact *your* area's radio talk-show producers (ask for the producer;
not the host), and see if they will have you and/or knowledgable
collegues discuss them? ]

TO BE ADDED TO THIS GOV-ACCESS INFORMATION-DISTRIBUTION LIST

Several people pointed out that I neglected, in posting #1, to state how
new-comers can be added to this distribution list. Tsk! <blush>
(This list has been growing for about 9 months; originally focused only on
one specific California bill mandating free online legislative access.)
Email your request to [email protected]

At a minimum, state the email address you wish added to the list.
If you are willing, please also include your traditional contact info:
name, work, organization, snailmail address, voice phone, fax.

Please note: So far, this is an information distribution list; not a
discussion list. However, several of us are planning moderated and
unmoderated USENET news-groups on these topics -- that will *not*
conflict with existant news-groups and lists. Yes, as soon as there
are coherent draft-plans, this list will hear of them.

Jim Warren, columnist for MicroTimes, Government Technology, BoardWatch, etc.

>>Permission herewith granted for unlimited reposting and recirculation.<<

------------------------------

End of Computer Underground Digest #6.09
************************************

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS