💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JOAUC › jauc04.txt captured on 2022-06-12 at 13:02:19.

View Raw

More Information

-=-=-=-=-=-=-



  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically

  ======================================================================

  ISSN 1074-3111           Volume One, Issue Four           June 7, 1994

  ======================================================================

    

      Editor-in-Chief:        Scott Davis      (dfox@fennec.com)

      Technology Editor:      Max Mednick      (kahuna@fennec.com)

      Consipracy Editor:      Gordon Fagan     (flyer@fennec.com)

      Network Security:       George Phillips  (ice9@fennec.com)



      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC



      U.S. Mail:

      The Journal Of American Underground Computing 

      10111 N. Lamar #25

      Austin, Texas 78753-3601



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 IMPORTANT ADDRESSES - 

 ============================================================================

 To Subscribe to "TJOAUC", send mail to:              sub@fennec.com

 All questions/comments about this publication to:    comments@fennec.com

 Send all articles/info that you want published to:   submit@fennec.com

 Commercial Registration for Profitable Media:        form1@fennec.com

 ============================================================================



 "The underground press serves as the only effective counter to a growing

 power, and more sophisticated techniques used by establishment mass media

 to falsify, misrepresent, misquote, rule out of consideration as a priori

 ridiculous, or simply ignore and blot out of existence: data, books,

 discoveries that they consider prejudicial to establishment interest..."



 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)

 

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 Contents Copyright (C) 1994 The Journal Of American Underground Computing

 and/or the author of the articles presented herein. All rights reserved. 

 Nothing may be reproduced in whole or in part without written permission 

 of the Editor-In-Chief and/or the author of the article. This publication

 is made available periodically to the amateur computer hobbyist free of

 charge.  Any commercial usage (electronic or otherwise) is strictly

 prohibited without prior consent of the Editor, and is in violation of

 applicable US Copyright laws. To subscribe, send email to sub@fennec.com



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 DISCLAIMER AND NOTICE TO DISTRIBUTORS -



 NOTE: This electronic publication is to be distributed free of charge

 without modifications to anyone who wishes to have a copy. Under NO

 circumstances is any issue of this publication, in part or in whole, 

 to be sold for money or services, nor is it to be packaged with other 

 computer software, including, but not limited to CD Rom disks, without 

 the express written or verbal consent of the author and/or editor.

 To obtain permission to distribute this publication under any of the

 certain circumstances stated above, please contact the editor at one of

 the addresses above. If you have intentions of publishing this journal

 in any of the ways described above, or you are in doubt about whether or

 not your intentions conflict with the restrictions, please contact the

 editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com

 This publication is provided without charge to anyone who wants it.

 This includes, but is not limited to lawyers, government officials,

 cops, feds, hackers, social deviants, and computer hobbyists. If anyone

 asks for a copy, please provide them with one, or mail the subscription

 list so that you may be added.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



     THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 4



                          TABLE OF CONTENTS



 1)  We've tried To Be Nice...                     Carl Guderian

 2)  Defcon Convention Update                      Dark Tangent

 3)  Obituary / Mimsey                             Unknown

 4)  Call For Papers / Neural Networks             Readers

 5)  Press Release: Spyglass/NCSA Agreement        Readers

 5)  The Real Story                                Carl Guderian

 6)  Legion Of Doom T-Shirt Ad                     Chris Goggans

 7)  Libertarian Party / Opposition To DTA         Libertarian Pty

 8)  Unabom - 1 Million $ Reward                   William Tafoya

 9)  The Massachusetts Encryption Bill             Unknown

 10) Book Review: Information Warfare              Scott Davis

 11) Whisper Who, A Unix Tool (Source Code)        Editors

 12) Hacker Barbie                                 Readers

 13) The Well: A Small Town...                     Cliff Figillo

 14) The Feminization Of Cyberspace                Doctress Neutopia

 15) Response To The Feminization Of Cyberspace    Jason Webb

 16) Easy-to-Use Kennedy Conspiracy Chart          Gordon Fagan

 17) Meeks Defense Fund                            MDF

 18) HOPE - Hackers On Planet Earth                Emmanual Goldstein

 19) TV & Movie Mania Radio Show                   Lauren Weinstein

 

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 Special thanks to the anonymous reader who sent the software to my US Mail

 address...it was very cool.    -Scott

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 The Journal Of American Underground Computing supports DEFCON II in Vegas!!

 We will be there, and we encourage you to do the same.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



            We've Tried to Be Nice: Other Ways to Fight Clipper



 by Carl Guderian (bjacques@cypher.com)



 (You've read about Clipper ad nauseam elsewhere, so refer to other sources 

 if you still don't know about Clipper, the Digital Telephony Act, and 

 everything else that will be lumped together here under the rubric of 

 "Clipper."  Start with John Perry Barlow's excellent "Jackboots on the 

 Infobahn" in issue 2.04 of Wired Magazine. If you want balance, ask the NSA 

 for its opinion and weigh it against our position that Clipper obviously 

 blows. Onward.)



 The Situation, Spring 1994



 The Clinton White House is apparently steaming ahead on Clipper despite our 

 perfectly reasonable arguments and well-mannered campaign against it. To 

 John Perry Barlow (see intro) it plays like Invasion of the Body Snatchers 

 II: The White House Years--formerly sensible folks replaced by pod people 

 blandly assuring us that if "I could tell you what I know, you'd agree with 

 me."  No help there.

 

 Various industry consortia were ready to sell us down the slippery slope 

 until the feds double-crossed them at the last minute by rescinding the 

 offer to lift export controls on encryption in exchange for support for 

 Clipper. An attempt to make RSA/PGP encryption a politico-economic fait 

 accompli by sheer numbers of users is moving slowly, if at all (PGP really 

 requires direct internet access, it's hard to use, and RSA's suing Phil 

 Zimmerman so nobody else is going to dress it up for the market). The White 

 House spooks may make a bigger splash in the market by ordering their 

 50,000 electronic keyholes than we can by passing out copies of PGP for 

 free. We're fighting the enemy on its own turf and terms and we could lose. 

 It's time to fight dirty. Below are a couple of suggestions.



 Mutt and Jeff



 Just as for every civil rights Freedom Rider there was a Black Panther, for 

 every Pat Schroeder there's a Riot Grrl, and for every polished Dixiecrat 

 Senator there was a KKK Nightrider, so must we field media streetfighters 

 to complement our sincere and polite public spokesmen. The history of social 

 progress (and, unfortunately, reaction) is that of good cop and bad cop. 

 Opponents of Clipper must employ these Siamese twins of persuasion in order 

 to get anywhere. If you've never been interrogated by police, customs 

 officials, school principals, or corporate investigators, a little 

 explanation of good cop/bad cop may help. 



 In interrogations conducted in civilized countries, the object is to crack 

 the interviewee without resorting to physical torture. The most effective 

 method is good cop/bad cop. The bad cop, sent in first, acts enraged and 

 threatens to beat the truth out of the suspect. He gleefully enumerates all 

 the terrible things that can happen to an uncooperative suspect. Sometimes 

 this alone works. If the prisoner stands firm (or is frozen with fear), the 

 good cop comes to the rescue, radiating sympathy and bonhomie. He offers a 

 cigarette, a friendly ear, and assurances that, he and the suspect are 

 really on the same side. 

 

 The good cop plays on the suspect's pride, suspicions, or other 

 psychological weaknesses in order to get a voluntary confession. The good 

 cop's presence carries the implied threat of the return of the bad cop if 

 no confession is forthcoming. To accuse the good cop of waging psychological 

 warfare is to miss the point. Psychological warfare is waged by adept 

 deployment of both good and bad cops in order to break the prisoner. 

 It's very effective against folks who don't know any better, especially 

 young hackers, schoolkids, and Seattle scenesters en route to Vancouver. 



 The Occult Technology of Power



 The point of the above digression is that a tool well-known to the 

 authoritaries can be, and has been, used against them as well. As gays have 

 learned, neither the noisy AIDS Die-ins by ACT-UP nor lobbying by advocacy 

 groups is alone sufficient to win public support. Together the tactics work 

 because they offer different levels on which the public can deal with issues 

 (and people) that clearly won't go away. 



 Clipper advocates already know the weakness of their position, so arguments 

 are useless. They repeat the same arguments in hopes the public will get 

 tired of hearing about it and simply sign the blank check. We must pre-empt 

 the argument with bite-sized zingers. In the economy of attention, the 

 market goes to the side with the pithiest arguments. When they say "law and 

 order" we respond with "ATF." Such sound bites are Patriot Missiles that 

 shoot down the other side's forensic Scuds. Channel the spirits of Dorothy 

 Parker and Oscar Wilde. Give their straw man a hotfoot; they summon up 

 nuclear terrorism, we resurrect the Branch Davidians. The issue doesn't lend 

 itself to riotous demonstrations, but with a really good negative media 

 campaign we can whip up a good hate frenzy against Clipper. We already do 

 this somewhat, but we need to go further, with high concept slogans and 

 catch phrases. 

 

 "Clinton chip," like "Hooverville," has a dry, sharp ring to it, commanding 

 attention like the snap of a bone. Plus, it yokes the President personally 

 to the issue. If that sounds lame, try something else. The ancient 

 techniques of propaganda apply here, wedded to the black art of meme/

 information virus theory. It's a media war, so we'll use a little McLuhan. 

 (If you've read his stuff, you know his writing style was really disjointed, 

 but sounded great! Which may be the point.) Slick attack ads, sound bites, 

 rants to the editor, whisper campaigns, and other forms of media 

 manipulation are in order. Anything short of gross distortion or outright 

 lies is acceptable. The truth is scary enough and can be made to sound 

 positively Lovecraftian, if we succeed in seizing the metaphors. Detourned 

 ads such as "big brother inside" are a good start. The opportunities for 

 satire are boundless, especially given the history of government projects. 

 Emphasize how much more a Clippered future will play like "Brazil" than 

 "1984." 

 

 Why assume things will always work out for the Bad Guys Conspiracy? Want to 

 bet that when the government buys Clipper chips the Secret Service, FBI, 

 CIA, NSA, and State Department will probably spy on each other (since no one 

 else will use it)? Or that when Clipper charges out the fortress gate its 

 broken carcass will likely be flung back over the wall (i.e., it will be 

 cracked and posted to the net)? How will they know I haven't sold my 

 Clippered cellular phone at a garage sale? And so on. 

 

 Negative campaigns don't by themselves win support, but reasonable words 

 don't win much attention either. Both tricks must be played in their turn. 

 Not good cop or bad cop, but good cop AND bad cop. A diverse battle plan 

 gives sympathizers more options for action. Some folks like to lobby and 

 others like to sling mud. Hey, we're a big tent. And the streetfighters can 

 keep the lobbyists honest. 



 Useful Idiots



 In order for an issue to get attention it should demonstrably arouse the ire 

 of a number of large and unrelated groups. Right wing fundamentalist 

 screwheads as well as flaming liberals stand to lose if Clipper becomes the 

 law, so we put a bug in their respective ears in hopes of getting a 

 response. Support for one's position comes from surprising places. 

 Cyberpagans, for example, will be shocked to learn that Phyllis 

 "Church Lady" Schlafly denounced Clipper in a syndicated column a couple of 

 months back (she got a few details wrong, but you have to expect that). 

 Equally shocking (at least to this writer) is Rush Limbaugh, avid computer 

 user, so far passing up an opportunity to savage Clinton on Clipper. Liberal 

 groups can be persuaded that a conservative Republican administration armed 

 with Clipper would make J. Edgar Hoover look like Norbert the Narc.

  

 This strategy is aimed primarily at right wing groups for a number of 

 reasons. They already hate the present Democratic administration.  They're

 best at marshalling money and "good-ole-boy" clout. Right-wing paranoia is 

 more entertaining than the left-wing variety, so it is more likely to be 

 heard. To the Christian Right, for instance, Clipper carries the musky scent 

 of the Beast 666, and they expect Clinton to spend a second term stamping 

 our hands at the door of the Hellfire Club. And did you ever notice how 

 many cypherpunks own guns? Play up the gun analogy.

   

 This avenue to political action is time-critical. If 1997 sees a Republican 

 administration in place, right-wing groups will lose interest in attacking 

 it. And since it was the Bush White House (or spooks within it) that 

 proposed Clipper, you can bet the rent that President Dole, Quayle (!), or 

 whoever will make it a fact of life quicker than you can say "national 

 security." So much for looking to the Republicans for relief from Clipper.

 

  The Golden Apple of Discord



 Thank the Deist god of the Founding Fathers that our government is not a 

 monolithic entity possessed of a single will. Battles are already underway 

 over which agency gets the secret skeleton key to the Clipper escrow vault 

 to bypass the official safeguards that won't work anyway. Getting the Crips

 and Bloods to make peace was a cakewalk compared to Clinton's efforts to get

 the Three Letter Agencies to talk to each other. As long as they must 

 compete for funding it will be so. 



 Not quite the end



 With a bit of work we can play up Clipper so that it attracts as much 

 attention as the abortion, gun control, or gay rights issues have. Getting 

 the cover of Newsweek was good; mainstream coverage in a proposal normally 

 of interest only to propeller heads and conspiracy buffs is gratifying. 

 Remember the fallout after the Hacker Crackdown of 1990? But sustained 

 pressure is needed. Clinton's people need their noses rubbed in the sheer 

 breadth of opposition to Clipper. If a White House aide hears "Clinton Chip" 

 or something similar on the street, the President will hear of it and 

 realize we're serious.



 Really the end



 According to a recent issue of Federal Computer Week, the NSA is adopting as 

 it's mascot the armadillo. Maybe we can thank Bobby Ray Inman for this one. 

 FCW recently ran a contest to name the "dillo." Entrants were asked to 

 consider the NSA's reputation for prurience and the animal's best known 

 habitat (the freeway center stripe). The contest is probably over by now, 

 but "Roadkill" seemed to be the winner paws down. "Road rash," "Winston 

 [Smith]," and "Harry Buttle" (the poor sap whose erroneous arrest and 

 subsequent death under torture--er, information retrieval--trigger the 

 events of "Brazil") were this author's favorites.



 Credits



 Many thanks go posthumously to Marshall McLuhan for his theory of 

 perception, which states that most people see either the figure or the 

 background (a vase or two faces?) but that true perception is seeing both 

 figure and background.	This seemed pretty wacky a year ago, but it makes a 

 lot more sense now. Backhanded thanks go to a trio of Canadian customs 

 guards at the Peace Bridge connecting Buffalo, NY to Ft. Erie, Ontario for 

 personal instruction in the tactics of "good cop/bad cop". Thanks also to 

 ReSearch (for PRANKS!), the Situationist International (including King Mob), 

 Richard Dawkins (meme theory) and the late Count Alfred Korzybski (general 

 semantics), for inspiration.



 Please wash your hands before leaving the 20th century.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                            DEFCON UPDATE



 by Dtangent (dtangent@defcon.org)





 XXXXXXXXXXXXXXXXXXXXXXXX XX     DEF CON II Convention Update Announcement

 XXXXXXXxxxxXXXXXXXXXXXXXXX XX   DEF CON II Convention Update Announcement

 XXXXXXxxxxxxXXXXXX  X    X      DEF CON II Convention Update Announcement

 XXXXXxxxxxxxxXXXXXXX  X         DEF CON II Convention Update Announcement

 XXXXxxxxxxxxxxXXXX XXXXXXXXX    DEF CON II Convention Update Announcement

 XXXxxxxxxxxxxxxXXXXXXXXXX X     DEF CON II Convention Update Announcement

 XXxxxxxxxxxxxxxxXXXXXX  XX  X   DEF CON II Convention Update Announcement

 XXXxxxxxxxxxxxxXXXXXXXX         DEF CON II Convention Update Announcement

 XXXXxxxxxxxxxxXXXXXXXX X XX     DEF CON II Convention Update Announcement

 XXXXXxxxxxxxxXXXXXXXXXX  XX X   DEF CON II Convention Update Announcement

 XXXXXXxxxxxxXXXXXXXXX X         DEF CON II Convention Update Announcement

 XXXXXXXxxxxXXXXXXXXXXXXXXX      DEF CON II Convention Update Announcement

 XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement



READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE

DISTRUBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ

 ============================================================================



 What's this?  This is an updated announcement and invitation to DEF CON II,

 a convention for the "underground" elements of the computer culture.  We try

 to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,

 Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties

 Groups, CypherPunks, Futurists, Artists, Etc..



 WHO:   You know who you are, you shady characters.

 WHAT:  A convention for you to meet, party, and listen to some speeches

        that you would normally never hear.

 WHEN:  July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th)

 WHERE: Las Vegas, Nevada @ The Sahara Hotel



 So you heard about DEF CON I, and want to hit part II?  You heard about the

 parties, the info discussed, the bizarre atmosphere of Las Vegas and want to

 check it out in person?  Load up your laptop muffy, we're heading to Vegas! 



 Here is what Three out of Three people said about last years convention:



 "DEF CON I, last week in Las Vegas, was both the strangest and the best

 computer event I have attended in years." -- Robert X. Cringely, Info World 



 "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas



 "Soon we were at the hotel going through the spoils: fax sheets, catalogs,

 bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds.

 The documents disappeared in seconds." -- Gillian Newson, New Media Magazine



 DESCRIPTION:



 Last year we held DEF CON I, which went over great, and this year we are

 planning on being bigger and better.  We have expanded the number of

 speakers to included midnight tech talks and additional speaking on Sunday.

 We attempt to bring the underground into contact with "legitimate" speakers.

 Sure it's great to meet and party with fellow hackers, but besides that we

 try to provide information and speakers in a forum that can't be found at

 other conferences.



 While there is an initial concern that this is just another excuse for the

 evil hackers to party and wreak havok, it's just not the case.  People come

 to DEF CON for information and for making contacts. We strive to distinguish

 this convention from others in that respect.



 WHAT'S NEW THIS YEAR:



 This year will be much larger and more organized (hopefully) than last year.

 We have a much larger meeting area, and have better name recognition.

 Because of this we will have more speakers on broader topics.  Expect

 speaking to run Saturday and Sunday, ending around 5 p.m.  Some of the new

 things expected include:



 o An Internet connection with sixteen ports will be there, _BUT_ will only

   provide serial connections because terminals are too hard to ship.  So

   bring a laptop with communications software if you want to connect to the

   network.  Thanks to cyberlink communications for the connection.



 o There will be door prizes, and someone has already donated a Cell Phone

   and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead 

   Addict.



 o Dr. Ludwig will present his virus creation awards on Sunday. 



 o A bigger and better "Spot The Fed" contest, which means more shirts to

   give away.



 o More room, we should have tables set up for information distribution.

   If you have anything you want distributed, feel free to leave it on the

   designated tables.  Yes, this year there will be a true 24 hour

   convention space.



 o A 24 hour movie / video suite where we will be playing all type of

   stuff.

   VHS Format.  Mail me with suggested titles to show, or bring your own.

   We'll use a wall projector when not in use by speakers.



 o Midnight Tech Talks on Friday and Saturday night to cover the more

   technical topics and leave the days free for more general discussions.



 WHO IS SPEAKING:==========================================================



 This list represents almost all of the speakers verified to date.  Some

 people do not want to be announced until the event for various reasons, or

 are waiting for approval from employers.  A speaking schedule will go out

 in the next announcement.





 Phillip Zimmerman, Notorious Cryptographer & author of PGP.

 Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and

     "Computer Viruses, Artificial Life and Evolution"

 Loyd Blankenship (The Mentor), Net Running in the 90's and RPG.

 Padgett Peterson, Computer Enthusiest, Anti-Virus Programmer.

 The Jackal, A Radio Communications Overview, Digital Radio and the Hack 

 Angle.

 Judi Clark, Computer Professionals for Social Responsibility.

 Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced.

 To be Announced, The Software Publishers Association, Topic to be Announced.

 Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics.

 Mark Lotter, Cellular Enthusiest, Hacking Cell Phones.

 Lorax, The Lighter Side of VMBs.

 Peter Shipley, Unix Stud, Q&A on Unix Security.

 George Smith, Crypt Newsletter, Virus Topic to be Announced.

 Cathy Compton, Attorney, Q&A Surrounding Seisure Issues, Etc.

 John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal.

 Red Five & Hellbender, Madmen With a Camcorder, Who Knows?

 Chris Goggans (Erik Bloodaxe), Wierd Wireless Psycho Shit.. Stay Tuned..



 There should be a few round table discussions on Virus, Cellular, Unix and

 something else surrounding the industry.



 I'll name the rest of the the speakers as they confirm.  I'm still working 

 on a few (Two?) people and groups, so hopefully things will work out and I 

 can pass the good news on in the next announcement, or over our List Server.



 ============================================================================



 WHERE THIS THING IS:



 It's in Las Vegas, the town that never sleeps.  Really. There are no clocks

 anywhere in an attempt to lull you into believing the day never ends.  Talk

 about virtual reality, this place fits the bill with no clunky hardware.  If

 you have a buzz you may never know the difference.  It will be at the Sahara

 Hotel.  Intel is as follows:



         The Sahara Hotel: 1.800.634.6078 

         Room Rates: Single/Double $55, Tripple $65, Suite $120

                    (Usually $200) + 8% tax



         Transportation: Shuttles from the airport for cheap.



    NOTE:  Please make it clear you are registering for the DEF CON II

    convention to get the room rates.  Our convention space price is

    based on how many people register.  Register under a false name if

    it makes you feel better, 'cuz the more that register the better for

    my pocket book.  No one under 21 can rent a room by themselves, so

    get your buddy who is 21 to rent for you and crash out.  Try to contact

    people on the Interactive Mailing List (More on that below) and

    hook up with people.  Don't let the hotel people get their hands on

    your baggage, or there is a mandatory $3 group baggage fee.  Vegas

    has killer unions. 



 OTHER STUFF:



 I'll whip up a list of stuff that's cool to check out in town there so if 

 for some reason you leave the awesome conference you can take in some unreal

 sites in the city of true capitalism.  If anyone lives in Las Vegas, I

 would appreciate it if you could send a list of some cool places to check 

 out or where to go to see the best shows and I'll post it in the next

 announcement or in the program



 -o I am asking for people to submit to me any artwork, pictures, drawings,

    logos, etc. that they want me to try and include in this years program.

    I am tring to not violate any copywrite laws, but wat cool shit.  Send

    me your art or whatever and I'll try and use it in the program, giving 

    you credit for the work, of course.  Please send it in .TIF format if it 

    has more than eight bit color. The program will be eight bit black and 

    white.

 -o in case you want to make adjustments on your side.



 *** NEW MAILING LIST SERVER ***



 We've finally gotten Major Dommo List Serv software working (Kinda) and it

 is now ready for testing.  MTV spent alot of time hacking this thing to work

 with BSDi, and I would like to thank him.  The purpose of the list is to

 allow people interested in DEF CON II to chat with one another.  It would

 be very sueful for people over 21 who want to rent hotel space, but split

 costs with others.  Just mention you have room for 'x' number of people, and

 I'm sure you'll get a response from somone wanting to split costs.  Someone

 also suggested that people could organize a massive car caravan from 

 Southern Ca. to the Con.  My attitude is that the list is what you make of 

 it.  Here are the specifics:



 Umm.. I TAKE THAT BACK!!  The mailing list is _NOT_ ready yet.  Due to

 technical problems, etc.  I'll do another mass mailing to everyone letting

 them know that the list is up and how to access it.  Sorry for the delay! 



 MEDIA:



 Some of the places you can look for information from last year include: 



 New Media Magazine, September 1993

 InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely

 Gray Areas Magazine, Vol 2, #3 (Fall 1993)

 Unix World, ???,

 Phrack #44



 COST: 



 Cost is whatever you pay for a hotel room split however many ways, plus

 $15 if you preregister, or $30 at the door.  This gets you a nifty 24 bit

 color name tag (We're gonna make it niftier this year) and your foot in the

 door.  There are fast food places all over, and there is alcohol all over

 the place but the trick is to get it during a happy hour for maximum

 cheapness.



 ==========================================================================



 I wanted to thank whoever sent in the anonymous fax to Wired that

 was printed in issue 1.5  Cool deal!



 ===========================================================================



 FOR MORE INFORMATION:



 For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com

 in /pub/defcon.  There are digitized pictures, digitized speeches and text

 files with the latest up to date info available.



 For email users, you can email dtangent@defcon.org for more information. 



 For non-net people call:



 For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102,

                         Seattle, WA, 98112



 For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone.



 A DEF CON Mailing list is maintained, and the latest announcements are 

 mailed automatically to you.  If you wish to be added to the list just send 

 email to dtangent@defcon.org.  We also maintain a chat mailing list where 

 people can talk to one another and plan rides, talk, whatever.  If you 

 request to be on this list your email address will be shown to everyone, 

 just so you are aware.



 STUFF TO SPEND YOUR MONEY ON:



 o Tapes of last years speakers (four 90 minute tapes) are available for $20 



 o DEF CON I tee-shirts (white, large only) with large color logo on the

   front, and on the back the Fourth Amendment, past and present.  This is

   shirt v 1.1 with no type-o's.  These are $20, and sweatshirts are $25.



 o DEF CON II tee-shirts will be made in various colors this year, including

   a few long sleeve shirts.  Sizes will be in large only again, with a

   few white mediums made.  Shirts will be $15, Long Sleve $17, Sweat shirts

   will be $20.



 o We will have a few (ten maybe?) embroidered hats with this years logo.

   Not shure how much they will be.. like $10 maybe.



 o Full sized 4 color DEF CON II wall posters will be for sale for about $5.

 

 o Pre-Register for next year in advance for $15 and save half.



 o Make all checks/money orders/etc. out to DEF CON, and mail to the address

   above.  Way above.



 If you have any confidential info to send, use this PGP key to encrypt:



 -----BEGIN PGP PUBLIC KEY BLOCK-----

 Version: 2.3



 mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo

 dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf

 uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ

 hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50

 IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==

 =ko7s

 -----END PGP PUBLIC KEY BLOCK-----



- The Dark Tangent



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 



 TO: EDITORS@FENNEC.COM

 Subject: OBITUARY - VAX 8600, aka Mimsy, dead at age 8

     

        An era of computing in the University of Maryland Computer Science

 Department came to an end Sunday, March 20th, when the Department's last 

 VAX, an 8600, peacefully died in its sleep. After a power-down, the VAX, 

 which had been off maintenance since July, 1993, was not able to boot as 

 a result of a disk/controller that finally went bad.



      The 8600 had arrived in 1986 as the Department's most powerful machine

 and had been named "Brillig"; in November 1990, when the Department's VAX 

 11/785 was retired, the 8600 assumed the name and duties of "Mimsy" and 

 had served in that capacity until its semi-retirement in July, 1994. At 

 that time, the 8600 was renamed "Imladris" and the "Mimsy" moniker was 

 bestowed upon a Sun SPARC 10/30.



      Along with being the last VAX, the 8600 was also the last UMD machine

 running the mutoid 4.3/4.3tahoe/4.3reno/Net-2 conglomeration (4.3BSD Torix, 

 as it was called here) that emerged over the span of a decade of working 

 with Unix. Although it is now gone, the hacks it helped inspire live on

 in locally-changed versions of the SunOS, Ultrix, OSF/1 and BSDI offerings 

 in hundreds of other systems here.



      It is somewhat ironic that the VAX ended the way it did. Its demise

 was originally scheduled for earlier that week, when the 8600, after a short 

 ceremony, was to have committed suicide. The machine would have, under its 

 own free will and volition, executed (through the "cron" facility) a shell 

 script prepared by Dr. Vax Kevorkian which would have issued an "rm -rf /" 

 command. Onlookers were to have watched the process until the machine seized 

 up, and would have then powered the machine down and gone to dinner.



      However, an earlier problem with the building Uninterruptible Power

 Supply (UPS) necessitated a load test for the 20th, and as a large consumer 

 of power, it was decided the 8600 would remain on for this one last task. As 

 a result of a short power-down during the UPS load test, the machine's 

 mighty heart (ummm, disk) gave out.

 

      Funeral arrangements are not yet complete, but tentative plans call

 for shipping the remains to Chris Torek's apartment in Berkeley, as a token 

 of the staff's appreciation. The staff has requested that all gifts of 

 condolence be made to the University of Maryland's Dinner-for-Wayword-

 Hackers Fund; checks may be made payable to Pete Cottrell.

      

        MIMSY IS DEAD! LONG LIVE MIMSY!

     

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     



     CALL FOR PAPERS: Neural Networks for Automatic Target Recognition 



 By Dept of Cognitive and Neural Systems (announce@retina.bu.edu)



 ATR is a many-faceted problem of tremendous importance in industrial and

 defense applications. Biological systems excel at these tasks, and neural

 networks may provide a robust, real-time, and compact means for achieving

 solutions to ATR problems. ATR systems utilize a host of sensing modalities

 (visible, multispectral, IR, SAR, and ISAR imagery; radar, sonar, and acoustic

 time series; and fusion of multiple sensing modalities) in order to detect 

 and track targets in clutter, and classify them. This Special Issue will 

 bring together a broad range of invited and contributed articles that 

 explore a variety of software and hardware modules and systems, and 

 biological inspirations, focused on solving ATR problems. We particularly 

 welcome articles involving applications to real data, though the journal 

 cannot publish classified material. It will be the responsibility of the 

 submitting authors to insure that all submissions are of an unclassified 

 nature.  



 Co-Editors:

 -----------

 Professor Stephen Grossberg, Boston University

 Dr. Harold Hawkins, Office of Naval Research 

 Dr. Allen Waxman, MIT Lincoln Laboratory 



 Submission:

 -----------

 Deadline for submission: October 31, 1994 

 Notification of acceptance: January 15, 1995 

 Format: as for normal papers in the journal (APA format) and no longer 

 than 10,000 words 



 Address for Papers:

 -------------------

 Professor Stephen Grossberg 

 Editor, Neural Networks 

 Boston University 

 Department of Cognitive and Neural Systems 

 111 Cummington Street 

 Room 244 

 Boston, MA 02215 USA 

       

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                  PRESS RELEASE: SPYGLASS/NCSA AGREEMENT

                  

 From: Eric W. Sink (eric@spyglass.com)



 The following press release announces our new relationship with NCSA

 and Mosaic.  I would like to prepend a clarification or two:

 Initially, Spyglass will sell Mosaic to volume users requiring a

 minimum of 5000 licenses per year.  It is our intention to let the

 needs of smaller volume customers, including end-users, be met thru

 other channels.



 Also, remember that NCSA Mosaic, for Windows, Mac, and UNIX will

 continue to be freely available from NCSA.  Development of the free

 versions will continue at NCSA, and Spyglass will be in collaboration

 with the NCSA development team.

 

 At Internet World Booth #609:

 For Immediate Release 



 Spyglass Signs Agreement with NCSA to Enhance and Broadly Relicense

 Mosaic Graphical Browser for the Internet

 (C)1994 Internet World

 Commercial Windows and Macintosh Versions Available in June; X Windows

 Version to Follow in July



 INTERNET WORLD, SAN JOSE, Calif., June 1 -- Spyglass, Inc. and the

 National Center for Supercomputing Applications (NCSA) at the

 University of Illinois/Urbana-Champaign have entered into an agreement

 that will get Mosaic, NCSA's graphical browser for the Internet, to

 the desktops of millions of people. The agreement gives Spyglass full

 rights to enhance, commercialize and broadly relicense

 Mosaic. Spyglass is making a multimillion-dollar commitment to NCSA

 and will focus initially on developing a commercially enhanced version

 of Mosaic that other companies will incorporate with their products

 for distribution to their customers. The announcement was made today

 in San Jose, on the opening day of exhibits at the Spring '94 Internet

 World conference.



 Developed by NCSA, Mosaic gives users point-and-click access to the

 World Wide Web (WWW), an information retrieval system on the Internet

 with more than 2,300 graphical, multimedia databases of "hyperlinked"

 documents. The Internet is a vast "supernetwork" of public and private

 networks connecting thousands of organizations and an estimated 20

 million individual users. New users are joining the Internet at the

 rate of 2 million each month, and hundreds of new WWW servers are

 coming online every month. Because of the reach of the Internet, it

 offers an attractive vehicle for electronic publishing and for

 conducting business globally.



 "Mosaic and World Wide Web are two key ingredients for successful

 electronic publishing and commerce on the Internet. But, to date,

 businesses have tapped only a fraction of the Internet's potential

 because these tools haven't been commercially available. Working with

 NCSA, we're going to change this," said Douglas Colbeth, president of

 Spyglass, which was formed in 1990 and has commercialized other NCSA

 technologies.



 "We're committed to evolving Mosaic so it becomes a robust, commercial

 tool with complete documentation, technical support and advanced

 features," explained Tim Krauskopf, co-founder of Spyglass and

 developer of NCSA Telnet. "We'll be collaborating with NCSA and other

 key partners to create new tools and establish standards that will

 help organizations build robust World Wide Web information servers

 quickly and inexpensively."



 "It has been thrilling to see the universal acceptance of NCSA Mosaic

 as an interactive window into cyberspace," said Larry Smarr, director

 of the NCSA. "I am very pleased to see Spyglass making such a

 financial commitment to the commercialization of Mosaic, which frees

 NCSA up to develop the next level of functionality for the public

 domain. Spyglass has been a terrific technology partner for us in the

 past and we look forward to an even closer working relationship in the

 future."



 "We welcome Spyglass as our partner in this effort because of the

 company's track record in commercializing other NCSA technologies and

 our rapidly developing close working relationship with the people at

 Spyglass," said Joseph Hardin, associate director of NCSA's software

 program. "Spyglass gives us the cross-platform development, global

 distribution and ongoing financial resources we need to take the

 Mosaic environment to the next level. With this commercialization

 arrangement with Spyglass in place, NCSA is freed to continue to

 develop core technologies for Mosaic as well as new technologies that

 leverage the Internet. We encourage companies to take advantage of

 this new relationship with Spyglass and contact them about volume

 licensing arrangements for Mosaic technology."



 Mosaic has been called the "killer application" for the Internet

 because it lets users navigate the Internet by browsing through a

 series of graphical, multimedia documents. The WWW was developed

 several years ago by CERN, a European consortium of scientists based

 in Switzerland, to keep track of researchers' information and to

 provide an easy method of sharing data. Subsequently, WWW has grown

 into one of the world's most open and widely used environments for

 information publishing, browsing and retrieval.



 WWW servers contain eye-catching documents with built-in links to

 other documents, allowing the user to move easily and naturally around

 the Internet. With Mosaic, users can browse through page after page of

 menus, hyperlinked to data dispersed all over the world, without

 having to know the location or network address of the information they

 are seeking.



 Spyglass has re-architected Mosaic so it will be a more robust and

 full-featured tool.  Enhancements available in Enhanced NCSA Mosaic

 from Spyglass include improved installation, better memory management,

 increased performance, new forms capabilities, online hypertext-based

 help, support for a proxy gateway and user interface improvements such

 as support for multiple windows. Future versions will include enhanced

 security and authentication, which will enable credit-card and other

 business transactions to take place on the Internet; filters that will

 enable documents from popular document readers to be read seamlessly

 by Mosaic; and integration with emerging editing and document

 management tools. A number of businesses are already using Mosaic and

 WWW to publish magazines, deliver goods and services, provide

 technical support to customers and conduct other forms of business

 electronically. For example, Mosaic and WWW are part of the recently

 announced $12 million CommerceNet project, a public- and

 private-sector-backed initiative exploring various ways to conduct

 commerce over the Internet and other data networks. NCSA will continue

 to maintain a public-with-copyright version of Mosaic, which Internet

 users can download for free from the Internet. NCSA, which began

 distributing Mosaic in the late fall, estimates that more than one

 million people use Mosaic and that more than 30,000 copies are being

 downloaded each month.



 Spyglass will be targeting the following types of customers as initial

 prospects for large-scale Mosaic client licensing agreements: computer

 systems and communications vendors, publishers and content providers,

 and online information service providers. For example, a publisher

 might want to include Mosaic with a subscription to an online magazine

 or a computer vendor might want to include Mosaic with each system

 sold. By building WWW servers themselves and distributing Mosaic

 clients to their customers, businesses can easily use this system for

 communicating with customers, providing technical support,

 distributing product and marketing information and other kinds of

 commerce.

  

 Enhanced NCSA Mosaic from Spyglass will be available for Microsoft

 Windows and Apple Macintosh desktop computers this month and for X

 Windows computers in July. To navigate the Internet, Mosaic users

 require a direct connection to the Internet or a PPP or SLIP

 connection. Enhanced NCSA Mosaic from Spyglass will be priced

 aggressively for high-volume distribution, enabling licensees to

 incorporate Mosaic into their products and services for a modest

 cost. For more information about Enhanced NCSA Mosaic from Spyglass,

 contact Spyglass directly at (217) 355-6000, mosaic@spyglass.com or

 http://www.spyglass.com/.



 The National Center for Supercomputing Applications, based at the

 University of Illinois at Urbana-Champaign, is supported by grants

 from the National Science Foundation, other federal agencies, the

 State of Illinois, the University of Illinois and corporate partners.



 Founded in 1990, Spyglass, Inc. is the leading developer of visual

 data analysis tools for the engineering and scientific marketplace,

 which support Windows, Macintosh and UNIX platforms. The company's

 venture-capital partners include Greylock Management of Boston,

 Mass. and Venrock Associates of New York City.



 Spyglass is a registered trademark of Spyglass, Inc. All other brands

 or products are trademarks or registered trademarks of their

 respective holders and should be treated as such.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                            THE REAL STORY



 By Carl Guderian (bjacques@cypher.com)



 The Real Story



 (The following report is a compilation of printed materials and transcripts 

 of personal interviews conducted by the author(s). In the course of this 

 exhaustive research we have come to feel that, given the controversial 

 nature of the subject matter, it is best that the authors as well as their 

 primary sources be kept confidential. Perhaps it is just as well, as the 

 events depicted in the report are years or decades in the past. Many of the 

 principals are retired or dead and, therefore, beyond any earthly reward or 

 revenge. The author(s) may be dead, too. In this line of journalism, that is 

 very likely.



 1994, Leopold & Loeb, Media Consultants)



 

 Employee Motivation Seminars



 Employee motivational seminars are a modern management tool, predicated on 

 the assumption that external motivation, whether carrot or stick or 

 combination thereof, is insufficient to move employees to give 110% to the 

 job; rather, internal motivation must be cultivated in the employees 

 somehow. Motivational seminars, usually conducted by outside consulting 

 firms, employ a variety of techniques, from survey questionnaires to group 

 exercises to meditation. These seminars have become enormously popular since 

 their introduction in the 1950s (mostly in sales-related fields then), as 

 they present a real advance over basic reward/punishment systems (-Theories 

 X and Y+) or even Frederick W. Taylor's scientific methods. More 

 importantly, they have actually worked. Workplace productivity has markedly 

 increased since the introduction of motivational seminars. 

 

 However, no innovation is universally welcomed. Recently, deeply religious 

 employees have begun to level serious accusations against motivational 

 seminars, declaring the programs promote a socialistic or New Age ethic. A 

 socialistic attitude, they argue, will lead otherwise sensible people to 

 embrace a world government under the Anti-Christ, as predicted in the Book 

 of Revelation in the Christian Bible (as interpreted by fundamentalist 

 Christians). A related and more serious charge is that the meditation 

 techniques (such as those used in the Krone program) open employees to 

 possession by demons. The latter charge is the focus of this report.

 

 The diabolical connection is real. Employee motivational seminars did indeed 

 spring from an arrangement between American industry and the Prince of 

 Darkness. Satan respects Americans like he respects no other people because 

 it was an American, Daniel Webster, who defeated him in court, using his 

 wits. Others have beaten the Devil, but only through invoking the powers of 

 Heaven, a tactic akin to bringing in grownups to restrain a schoolyard 

 bully. American corporate executives cut a deal with the Devil to deliver 

 the souls of underlings in exchange for the usual favors. Though the souls 

 of corporate employees are industrial grade, and therefore not worth as much 

 as the souls of the elite, an executive must deliver a number of them in 

 exchange for infernal favors. Paradoxically, the worth of elite American 

 souls has risen in direct proportion to the degradation in the worth of 

 those of followers. The perfect mechanism for delivering B-grade souls by 

 the bushel is, of course, an employee motivational seminar, in which large 

 numbers of workers are possessed at once (By the way, television evangelists 

 work the same way; their mass public healings are actually mass 

 possessions).

 

 This cozy arrangement between American leaders and Satan has served both 

 sides well. Demons consider possession of Americans to be a kind of working 

 vacation, a welcome relief from tormenting the damned souls toiling 

 eternally in the flaming dung-pits of Hell. Not that this isn't enjoyable 

 work, but even a demon likes a change of scenery. Satan and his lieutenants 

 can dole out plum earthside assignments for demonic devotion, thus 

 reinforcing the infernal hierarchy. American leaders, of course, get the 

 usual rewards of power, sexual potency (or firm breasts and derriere), and 

 that Christmas bonus for boosting corporate productivity while laying off 

 excess workers.



 Lately, however, the system's inherent problems have begun to manifest 

 themselves. As motivational seminars have gained in popularity, they have 

 increased the demand for demons. As the innovation has become more 

 widespread, it has ceased to be a competitive advantage. In Hell, too, the 

 system's success has presented similar problems, and Satan is now seems 

 ready to pull out of the deal.

 

 The shortage of demons is a Hellish fact. Present-day demons, of course, are 

 the same ones who participated in the original rebellion of Lucifer (now 

 Satan). All the angels were created at once, and no new ones have been made 

 since. The pool of demons, then, is a subset of that group. Occasionally a 

 truly wicked soul is promoted to demon status, but equally often a demon is 

 devoured by an angry superior (a la C. S. Lewis' The Screwtape Letters). On 

 the whole, the supply of demons should be considered to be fixed. 

 

 In the early years of the program, American executives were pleased to see 

 their employees possessed by only the most hard-working demons. Today, 

 however, all the good ones are taken. Latter-day possessions by demons of 

 procurement fraud, office-supply theft, and general loafing on the job have 

 taken their toll on the system. Worse, even the best and brightest demons 

 seem to have gone native or become Americanized, becoming easily distracted 

 by the attractions of our post-industrial society or falling dangerously 

 into sympathy with the modern worker.  One formerly trustworthy (!) demon 

 was even caught committing workplace sabotage in solidarity with his 

 co-workers!  An embarrassed Satan had to deal personally with the matter.  

 All in all, the phrase working like a demon has begun to lose its cachet.

 

 As more corporations jumped on the infernal bandwagon, they found that the 

 employees of their competitors were performing equally well (or recently, 

 equally poorly). Worse, as the quality of the everyday American soul has 

 declined, many hapless executives have found themselves caught short. In one 

 company, the worth of the workers' souls had fallen drastically between the 

 signing of the contract and the possession of the workers. The contracting 

 executive killed a fellow executive (who was his wife - also on the infernal 

 take) over the shrinking soul pie at their company in order to hold up his 

 end of the bargain, lest he be forced to hand over his own soul. It didn't 

 help. The wife caught up with him in Hell.

 

 Meanwhile, in Hell the situation has also deteriorated. Eventually all 

 demons have been recruited earthside, so the dream ticket has ceased to be a 

 credible reward for exemplary effort. Furthermore, production in the Satanic 

 Mills is down. Temporarily out of sight of their demon overseers, damned 

 souls have begun shirking on the eternal job.

 

 By piecing together accounts channeled through trance mediums (leaks are now 

 worse than ever!), the authors have been able to determine that Satan has 

 begun revoking all contracts dealing with motivational seminars, releasing 

 the possessed workers and taking back favors bestowed on contractees. This 

 may partly explain the recent decline of the old industrial corporations in 

 favor of information technology firms, in which traditional religious values 

 are relatively absent.

 

 Thus, the era of employee motivation seminars seems to be drawing to a 

 close. The heyday of private economic deals with the Devil seems to be over 

 as well. Overheard executive conversatons reveal that Satan is simply not 

 interested in any more such contracts. Though some may be tempted to see the 

 above episode as another case of the power elite enlisting the powers of 

 Hell to fuck over the little guy, they should look at the larger picture and 

 realize the system seems to have taken care of itself according to the laws 

 of the Free Market. The Invisible Hand really does seem to work. 





 Postscript



 It now appears that Satan plans to compete in the world labor market after 

 having seen the prevailing trend toward cheaper labor. He has an advantage 

 over the Chinese, who lead the market using convict/slave labor. Political 

 prisoners have to be fed bread and water and must be allowed 3 or 4 hours of 

 sleep a day. The damned souls of Hell, of course, eat nothing and work 

 tirelessly twenty-four hours a day, seven days a week. The Devil now knows 

 quite a bit about management theory (in relation to his demonic supervisors) 

 and wants to recall them to Hell to oversee the re-engineering of Hell's 

 production lines. Modern world leaders thinking to hold off this development 

 are doomed to failure. Hell has on its side such notables as Albert Speer, 

 Josef Stalin, Adolf Eichmann, and Roy Cohn (to handle the legal work) and 

 will soon have Henry Kissinger to handle international relations. Given a 

 team like that, it's only a matter of time.



 Post-postscript



 The original (now void) contracts are sought-after collectors items, not the 

 least for their blackmail value. Even when the signatories are beyond 

 blackmail, as in the case of the aforementioned executive and his wife, 

 their contracts are worth a lot simply as works of art. The Devil is a 

 traditionalist at heart, and insists that contracts be handwritten by demons 

 noted for their calligraphic skill and that the documents bear his seal and 

 those of major demons acting as witnesses. The early contracts (pre-1983) 

 are worth the most, as they are the most visually stunning and bear the 

 names of America's best and brightest of the time, as well as the seals of 

 Hell's best known demons and devils.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%





                 LEGION OF DOOM T-SHIRTS!! Get 'em



 By Chris Goggans <phrack@well.sf.ca.us>



After a complete sellout at HoHo Con 1993 in Austin, TX this past

December, the official Legion of Doom t-shirts are available

once again.  Join the net luminaries world-wide in owning one of

these amazing shirts.  Impress members of the opposite sex, increase

your IQ, annoy system administrators, get raided by the government and

lose your wardrobe!

 

Can a t-shirt really do all this?  Of course it can!

 

--------------------------------------------------------------------------

 

"THE HACKER WAR  --  LOD vs MOD"

 

This t-shirt chronicles the infamous "Hacker War" between rival

groups The Legion of Doom and  The Masters of Destruction.  The front

of the shirt displays a flight map of the various battle-sites

hit by MOD and tracked by LOD.  The back of the shirt

has a detailed timeline of the key dates in the conflict, and

a rather ironic quote from an MOD member.

 

(For a limited time, the original is back!)

 

"LEGION OF DOOM  --  INTERNET WORLD TOUR"

 

The front of this classic shirt displays "Legion of Doom Internet World

Tour" as well as a sword and telephone intersecting the planet

earth, skull-and-crossbones style.  The back displays the

words "Hacking for Jesus" as well as a substantial list of "tour-stops"

(internet sites) and a quote from Aleister Crowley.

 

--------------------------------------------------------------------------

 

All t-shirts are sized XL, and are 100% cotton.

 

Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for

postage.

 

Send checks or money orders.  Please, no credit cards, even if

it's really your card.

 

 

Name:       __________________________________________________

 

Address:    __________________________________________________

 

City, State, Zip:   __________________________________________

 

 

I want ____ "Hacker War" shirt(s)

 

I want ____ "Internet World Tour" shirt(s)

 

Enclosed is $______ for the total cost.

 

 

Mail to:   Chris Goggans

           603 W. 13th #1A-278

           Austin, TX 78701

 

 

These T-shirts are sold only as a novelty items, and are in no way

attempting to glorify computer crime.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



     LIBERTARIAN PARTY ANNOUNCES OPPOSITION TO DIGITAL TELEPHONY ACT



 NEWS FROM THE LIBERTARIAN PARTY

 1528 Pennsylvania Avenue SE

 Washington DC 20003



 For additional information:

 Bill Winter, Director of Communications

        (202) 543-1988







        Calling it a "serious infringement of civil liberties and a

 gross violation of property rights," the Libertarian Party National

 Committee unanimously voted to oppose the Digital Telephony and

Communications Act of 1994. 



        At their quarterly meeting in Kansas City, Missouri, the

 governing body of America's third-largest political party charged that

 "the Digital Telephony Act would make furnishing the FBI with easy

 wiretapping capability the overriding priority for designers of

 telephone equipment and related software."



        "It is a lie to call this legislation a 'Privacy Improvement

 Act,'" said Bill Evers, the National Committee member from California

 who sponsored the resolution.



        The Digital Telephony Act, noted the resolution, "requires

 telephone, cable television, and computer network companies to ensure

 that the government can conduct surveillance while private communication 

 is going on. It requires the installation of surveillance-facilitating

 software in telephone switching equipment to expose personal information -- 

 such as telephone-calling patterns, credit card purchases, banking

 records, and medical records -- to the view of the government."



        "Such personal information should be the private property of

 either the company that assembles it or the individual to whom it

 pertains," said Evers.



        Libertarians also oppose the Digital Telephony Act because it

 "would require a fundamental re-engineering of the communications

 infrastructure at great expense to American taxpayers, and to the

 owners of private communications systems," said Evers.



        The Libertarian National Committee also unanimously voted to

 oppose the National Security Agency's Escrowed Encryption Standard -

 the so-called Clipper Chip system - or any "government policies

 promoting or requiring specific encryption methods for civilian use."

 The party also urged the "repeal of the U.S. ban on export abroad of

 Clipper-free encryption devices produced by American companies."



        "Government-mandated encryption standards will foster

 indiscriminate surveillance of private communications by the

 government," charged Evers. 



        The resolution said "the Clinton Administration plans to induce 

 American manufacturers to install government-readable encryption devices 

 in every telephone, fax machine, and computer modem made in the United 

 States."



        "The Clinton Administration is explicitly denying that the

 American people have the right to communicate in private," said Evers.

 By contrast, he said, "The Libertarian Party has long upheld the civil

 liberties of the American citizen."



        Approximately 120 Libertarians serve in elected and appointed

 office around the country, including four State Representatives in New

 Hampshire and two mayors in California. The Libertarian Party platform

 calls for vigorous defense of the Bill of Rights, free enterprise,

 civil liberties, free trade, and private charity.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%







                             UNABOM

                       $1,000,000 Reward

                 SERIES OF 14 UNSOLVED BOMBINGS





 William L. Tafoya, Ph.D. Special Agent, FBI

 UNABOM Task Force, San Francisco, CA (btafoya@orion.arc.nasa.gov)

 



   Beginning in May, 1978, a series of 14 bombing incidents have 

 occurred across the United States for which there is no apparent 

 explanation or motive.  No person or group has been identified as 

 the perpetrator(s) of these incidents.  The explosions have taken 

 place in seven states from Connecticut to California.  As a result 

 of these bombings, one person has been killed and 23 others 

 injured, some grievously.  There had been no incidents identified 

 with this series of bombings since 1987. However that changed in 

 late June, 1993, when a well known geneticist residing in Tiburon, 

 California, and a renown computer scientist from Yale University, 

 New Haven, Connecticut, opened packages which had been mailed to 

 them and both were severely injured when these packages exploded.  



   In the past, targets of the bomber have been associated with 

 the computer industry, the aircraft and airline industry and 

 universities.  Seven of these devices have been mailed to specific 

 individuals and the other seven have been placed in locations 

 which suggest there was no specific intended victim. All but two 

 of the explosive devices functioned as designed and exploded.  All 

 14 crimes, dubbed "UNABOM", have had common effects:  all have 

 caused terror, grief, and fear.  On September 11, 1985, Hugh 

 Scrutton, the owner of the Rentech Computer Company, in 

 Sacramento, California, was killed by one of these diabolic 

 devices.  The two most recent victims narrowly escaped death.  



   In response to the June, 1993, events, the Attorney General 

 directed that a task force of federal law enforcement agencies be 

 reestablished to urgently investigate and solve these crimes. The 

 UNABOM Task Force, consisting of investigators from the FBI, ATF, 

 and the U.S. Postal Inspection Service, has been operational in 

 San Francisco and Sacramento, California, since July 12, 1993, and 

 is dedicated exclusively to the investigation of these crimes.  



   Among the clues in the case are the following words in what 

 appears to be a note possibly written by the bomber as a reminder 

 to make a telephone call:  "call Nathan R--Wed 7PM."  The UNABOM 

 Task Force believes that "Nathan R" may be associated, perhaps 

 innocently, with the bomber and that "Nathan R" may have received 

 a telephone call from the bomber on a Wednesday prior to the June, 

 1993 bombings.



   The two most recent tragic bombings illustrate the senseless 

 and tragic consequences of these crimes and demonstrate the urgent 

 necessity of solving this case.  This serial bomber will strike 

 again.  We do not know who the next victim will be.  We do believe 

 that there is someone out there who can provide the identity of 

 the person or persons responsible for these crimes. This person 

 may be a friend, a neighbor, or even a relative of the bomber(s).



	UNABOM's chronology is as follows:



 1)  Northwestern University

     Evanston, Illinois

     May 25, 1978           



   A package was found in the Engineering Department parking lot 

 at the Chicago Circle Campus of the University of Illinois. The 

 package was addressed to an Engineering Professor at Rensselaer 

 Polytechnic Institute in Troy, New York.  The package had a return 

 address of a Professor at Northwestern's Technological Institute.  

 The package was returned to the addressor who turned it over to 

 the Northwestern University Police Department because he had not 

 sent the package.  On May 26, 1978 the parcel was opened by a 

 police officer who suffered minor injuries when the bomb 

 detonated.



 2)  Northwestern University

     Evanston, Illinois

     May 9, 1979            



   A disguised explosive device which had been left in a common 

 area in the University's Technological Institute, slightly injured 

 a graduate student on May 9, 1979, when he attempted to open the 

 box and it exploded. 



 3)  Chicago, Illinois

     November 15, 1979



   An explosive device disguised as a parcel was mailed from 

 Chicago for delivery to an unknown location.  The bomb detonated 

 in the cargo compartment of an airplane, forcing it to make an 

 emergency landing at Dulles Airport.  Twelve individuals were 

 treated for smoke inhalation.  The explosion destroyed the 

 wrapping to such an extent that the addressee could not be 

 determined.



 4)  Chicago, Illinois

     June 10, 1980    



   A bomb disguised as a parcel postmarked June 8, 1980 was 

 mailed to an airline executive at his home in Lake Forest, 

 Illinois.  The airline executive was injured in the explosion.



 5)  University of Utah

     Salt Lake City, Utah

     October 8, 1981     



   An explosive device was found in the hall of a classroom 

 building and rendered safe by bomb squad personnel.  



 6)  Vanderbilt University

     Nashville, Tennessee

     May 5, 1982          



   A wooden box containing a pipe bomb detonated on May 5, 1982, 

 when opened by a secretary in the Computer Science Department.  

 The secretary suffered minor injuries.  The package was initially 

 mailed from Provo, Utah on April 23, 1982, to Pennsylvania State 

 University and then forwarded to Vanderbilt.  



 7)  University of California

     Berkeley, California

     July 2, 1982            



   A small metal pipe bomb was placed in a coffee break room of 

 Cory Hall at the University's Berkeley Campus.  A Professor of 

 Electrical Engineering and Computer Science was injured when he 

 picked up the device.  



 8)  Auburn, Washington

     May 8, 1985       



   A parcel bomb was mailed on May 8, 1985, to the Boeing 

 Company, Fabrication Division.  On June 13, 1985, the explosive 

 device was discovered when employees opened it.  The device was 

 rendered safe by bomb squad personnel without injury.



 9)  University of California

     Berkeley, California

     May 15, 1985            



   A bomb detonated in a computer room at Cory Hall on the 

 Berkeley Campus.  A graduate student in Electrical Engineering 

 lost partial vision in his left eye and four fingers from his 

 right hand.  The device was believed to have been placed in the 

 room several days prior to detonation.



 10)  Ann Arbor, Michigan

      November 15, 1985  



   A textbook size package was mailed to the home of a 

 University of Michigan Professor in Ann Arbor, Michigan from Salt 

 Lake City.  On November 15, 1985, a Research Assistant suffered 

 injuries when he opened the package.  The Professor was a few feet 

 away but was not injured.





 11)  Sacramento, California

      December 11, 1985     



   Mr. Hugh Scrutton was killed outside his computer rental 

 store when he picked up a device disguised as a road hazard left 

 near the rear entrance to the building.  Metal shrapnel from the 

 blast ripped through Scrutton's chest and penetrated his heart.



 12)  Salt Lake City, Utah

      February 20, 1987   



   On February 20, 1987, an explosive device disguised as a road 

 hazard was left at the rear entrance to CAAMs, Inc. (computer 

 store).  The bomb exploded and injured the owner when he attempted 

 to pick up the device.



 13)  Tiburon, California

      June 22, 1993      



   On June 22, 1993, a well known geneticist received a parcel 

 postmarked June 18, 1993, at his residence.  The doctor attempted 

 to open the package at which time it exploded severely injuring 

 him.  It has been determined that this parcel was mailed from 

 Sacramento, California. 



 14)  Yale University

      New Haven, Connecticut

      June 24, 1993         

  

   On June 24, 1993, a Professor/Computer Scientist at Yale 

 University attempted to open a parcel which he had received at his 

 office.  This parcel exploded severely injuring him.  It has been 

 determined that this parcel was mailed from Sacramento, California 

 on June 18, 1993.



   At this time, the UNABOM Task Force would appeal to the 

 public for assistance.  For this purpose, a one million dollar 

 reward is being offered for information which results in the 

 identification, arrest and conviction of the person(s) 

 responsible.  Contact the UNABOM Task Force at 1-(800) 701-

 2662.







 William L. Tafoya, Ph.D.

 Special Agent, FBI

 UNABOM Task Force

 San Francisco, CA

 btafoya@orion.arc.nasa.gov

 



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 





                   MASSACHUSETTS ENCRYPTION BILL





                    THE STATE OF MASSACHUSETTS

  

       MASSACHUSETTS 179TH GENERAL COURT -- 1994 REGULAR SESSION



 HOUSE NO.  4491

 BY MR. COHEN OF NEWTON, PETITION OF DAVID B.  COHEN AND ANOTHER RELATIVE

 TO ESTABLISHMENT OF THE PRIVACY OF PERSONAL RECORDS LAW AND REGULATING THE

 TECHNOLOGY OF DATA  ENCRYPTION.  THE JUDICIARY.

                       



                                                  February 25, 1994



 AN ACT RELATIVE TO THE TECHNOLOGY OF DATA  ENCRYPTION. 

 Be it enacted by the Senate and House of Representatives in General

 Court assembled, and by the authority of the same, as follows:



 SECTION 1.  The General Laws are hereby amended by inserting after

 chapter sixty-six A the following chapter:



 CHAPTER 66B. MASSACHUSETTS PRIVACY OF PERSONAL RECORDS ACT.



 Section 1. For the purposes of this chapter the following terms shall

 have the following meanings:



 "Personal data files", any machine readable information or information

 in a state of electronic, optic, or other computer based transmission

 which is capable of being read, stored, copied, transmitted, changed,

 or deleted by or through computer or telecommunications devices and

 which relates to or describes any person, including a corporation,

 partnership or sole proprietorship, or such person's real or personal

 property. It shall include, but not be limited to, magnetic tapes,

 disks, cartridges, floppy disks, CD-ROM's, optical cubes or other

 optical storage devices, documents printed in magnetic ink or OCR

 symbol sets, and any other medium capable of being read or stored at

 high speed, in large volume, or without substantial human

 intervention.  The term denotes the substance of the information as

 distinguished from the incidental medium of its storage or

 transmission.



 " Encrypted" , changed in form by programmed routines or algorithms so

 as to be unintelligible to any person without employing a suitable

 decryption routine or algorithm. 



 "Decryption", the reverse process of  encryption,  so as to restore any

 data so  encrypted  to its original, human readable form. 



 "Routine or algorithm", any series of discrete steps in a computer,

 microprocessor, or calculator native machine language which is

 performed as a unit to  encrypt  or decrypt data, or to present such

 decrypted data on an end user display medium; provided, however, that

 it shall not include source code written in any human readable

 language.



 "End user display medium", a video display terminal or paper.



 "Source code", any programming language used to produce the native

 machine language described in the definition of "routine or

 algorithm". 



 "Authorized end user", any person, including a corporation,

 partnership, sole proprietorship, or governmental body for whose

 specific use the data in question is produced. If shall specifically

 exclude any person, including a corporation, partnership, sole

 proprietorship, or governmental body into or through whose possession

 said data may pass before reaching said authorized end user. 



 "Numeric data", symbols representing exclusively quantities.  It shall

 specifically exclude expressions containing number which represent

 nonnumeric entities including, but not limited to, social security

 numbers, license numbers, bank account numbers, street addresses, and

 the like.



 "Custodian", a person, including a corporation, partnership, sole

 proprietorship, or governmental body, that has access of any kind

 whatsoever to personal data files. 



 "Live data", any personal data which currently represents or at any

 time in the past had represented any actual person, including a

 corporation, partnership, or sole proprietorship or such person's

 property.



 SECTION 2.  Personal data files within the commonwealth shall be

 encrypted.



 SECTION 3.  Decryption of  encrypted  data may be accomplished only by,

 for, or on behalf of the authorized end user of such data, and only to

 render such data into human readable form for the use of such

 authorized end user or an end user display medium.  Any intermediate

 storage or transmission of decrypted data in machine readable form

 shall be a violation of this chapter.



 SECTION 4.  Machine executable routines or algorithms used to decrypt

 encrypted  data shall reside only in those routines or algorithms which

 present the data to authorized end users upon end user media. Source

 code for such routines or algorithms shall reside only at the situs of

 the authorized end user or at the situs of a party engaged in the

 development or maintenance of said source code.  No party so engaged

 may use live data for any purpose whatsoever except as provided in this

 chapter.



 SECTION 5.  Any copy, excerpt, summary, extension, transmission, or

 other transfer of any personal data, whether or not originally

 encrypted,  shall be encrypted  during such transfer until it reaches

 the authorized end user.



 SECTION 6.  Notwithstanding any other provision of this chapter,

 numeric data may be stored in decrypted form during testing of summary

 or other numeric routines or algorithms in connection with development

 or maintenance of software whose purpose is the processing or display

 of such data for the use of the authorized end user, where such testing

 would be rendered impossible or unreasonably burdensome using

 encrypted  data.  For the purposes of this section, amounts used to

 calculate simple algebraic sums shall not qualify for decrypted storage

 under this section.



 SECTION 7.  Notwithstanding any other provision of this chapter, any

 personal data which is stored and maintained exclusively or generally

 for the purpose of providing access to such data by the public shall be

 exempted for the encryption  requirements this chapter.  The exemption

 provided hereby shall extend to excerpts, and compilations of such

 data, however and by whomever used.  Any and all other data from other

 sources which are not specifically exempted under this section or under

 sections nine or ten shall be  encrypted, whether or not merged,

 appended, inserted, or otherwise attached to exempted data, and are

 subject to all of the provisions of this chapter in the same manner as

 if such exempted data did not exist.



 SECTION 8.  Notwithstanding any other provision of this chapter, any

 routines or algorithms used for the decryption of  encrypted  data may

 be provided to the appropriate law enforcement agencies for the purpose

 of assuring compliance with various national, state, and local laws.

 For the purposes of this section, such law enforcement agencies shall

 be considered authorized end users.



 SECTION 9.  Notwithstanding any other provision of this chapter, any

 person may waive the protections afforded by this chapter. Evidence of

 such waiver must be given in writing by such person to each custodian

 of data pertaining to said person.  When more than one person is

 entitled to protection under this chapter, by virtue of joint ownership

 or other such relationship, no waiver shall be effective unless signed

 by all parties so involved.  Such waiver shall be construed to waive

 protection only with respect to the specific kinds or elements of

 information enumerated on its face, and shall operate to exclude only

 encryption  of said data by the particular custodian of such data as is

 named in said waiver and in whose possession to waiver is kept. The

 waiver may operate in perpetuity or be limited to a particular time.

 Any ambiguities in any waiver given under this section shall be

 resolved in favor of encryption of the most data colorable under its

 terms.



 SECTION 10.  Notwithstanding any other provision of this chapter,

 decrypted data may be stored in a secure location apart from the situs

 of any user of such data, provided that the sole purpose to which such

 data shall be put shall be to restore data which has been lost or

 corrupted. Any routines or algorithms used to restore used files using

 said decrypted data shall employ  encryption rountines or algorithms as

 required by this chapter.  For the purposes of this section, decryption

 routines or algorithms may be considered lost or corrupted if a

 reasonable belief exists that security employed in the custody of such

 routines or algorithms has been breached.



 SECTION 11.  Reasonable security shall be employed by persons in the

 management of the routines and algorithms used for the  encryption  and

 decryption of data, as required by this chapter. Such secuirty shall

 consist as a minimum in the storage of such routines and algorithms at

 one situs and the nature and location of its associated data at

 another.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                    BOOK REVIEW:  INFORMATION WARFARE

                   CHAOS ON THE ELECTRONIC SUPERHIGHWAY

                            By Winn Schwartau



 INFORMATION WARFARE - CHAOS ON THE ELECTRONIC SUPERHIGHWAY

 By Winn Schwartau.  (C)opyright 1994 by the author

 Thundermouth Press, 632 Broadway / 7th floor / New York, NY 10012

 ISBN 1-56025-080-1 - Price $22.95

 Distributed by Publishers Group West, 4065 Hollis St. / Emeryville, CA 94608

 (800) 788-3123



 Review by Scott Davis (dfox@fennec.com)



 If you only buy one book this year, make sure it is INFORMATION WARFARE!

 In my 10+ years of existing in cyberspace and seeing people and organizatons

 debate, argue and contemplate security issues, laws, personal privacy,

 and solutions to all of these issues...and more, never have I seen a more

 definitive publication. In INFORMATION WARFARE,  Winn Schwartau simply

 draws the line on the debating. The information in this book is hard-core,

 factual documentation that leaves no doubt in this reader's mind that

 the world is in for a long, hard ride in regards to computer security.

 The United States is open to the world's electronic terrorists.

 When you finish reading this book, you will find out just how open we are.

 

 Mr. Schwartau talks about industrial espionage, hacking, viruses, 

 eavesdropping, code-breaking, personal privacy, HERF guns, EMP/T bombs,

 magnetic weaponry, and the newest phrase of our generation...

 "Binary Schizophrenia". He exposes these topics from all angles. If you

 spend any amount of time in Cyberspace, this book is for you.



 How much do you depend on technology? 



 ATM machines, credit cards, toasters, VCR's, televisions, computers,

 telephones, modems...the list goes on. You use technology and computers

 and don't even know it! But the point is...just how safe are you from

 invasion? How safe is our country's secrets? The fact is - they are NOT

 SAFE! How easy is it for someone you don't know to track your every move

 on a daily basis? VERY EASY! Are you a potential victim to fraud,

 breech of privacy, or general infractions against the way you carry

 on your daily activities? YES! ...and you'd never guess how vulnerable

 we all are!



 This book will take you deep into places the government refuses to 

 acknowledge. You should know about INFORMATION WARFARE. Order your

 copy today, or pick it up at your favorite book store. You will not

 regret it.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                        WHISPER WHO: A Unix tool



 Here is a handy little tool for you to use on your Unix machine. Follow the

 instructions provided!



 -------cut here-------------------cut here---------------cut here------------



/*****************************************************************************

 *  This program can be changed without too much trouble to a program        *

 *  that logs everybody in and out of a system.  Need to add                 *

 *  signal(SIGHUP,SIG_IGN) to it though, so it continues after you are gone. *

 *  This program whispers to you when somebody logs on or off, and is pretty *

 *  hard to kill. ( you have to send SIGKILL to kill this one.)              *

 *  As is right now, it will not stay active after you logoff. To prevent    *

 *  annoying anyone, just put it in your .profile.                           *

 *                                                                           *

 *  CUT THIS PART OUT OF THIS FILE AND NAME THE TEXT: wwho_1.c               *

 *                                                                           *

 *  To compile:   cc -o wwho wwho_1.c                                        *

 *            or  gcc -o wwho wwho_1.c                                       *

 *****************************************************************************/



#include <signal.h>

#include <stdio.h>

#include <sys/types.h>

#include <utmp.h>

#include <sys/stat.h>

#include <fcntl.h>



#define MAXPROCESSES 40



struct utmp who[MAXPROCESSES];   /* list of all rembered users on-line */

struct utmp u[MAXPROCESSES];     /* list of all users in the utmp file */

int counter = 0;                 /* number of users in memory */



void sig_hand(int sig) {

  register int x;

  x=0;

  switch(sig) {

    case 15: signal(SIGTERM,sig_hand);

    case 3: signal(SIGINT,sig_hand);

    for(x=0; x<counter; x++)

    printf(": Name: %s, Device: %s.\n",who[x].ut_name,who[x].ut_line);

    break;

    }

}



void main(int argc,char *argv) {

    int prio,      /* process id of 'child' process */

    u_handle, /* handle for the /etc/utmp file */

    z;        /* loop control varriable*/

    int pid;     /* process id of 'forked' process */



    if(argc>=2) prio = atoi(argv[1]);  /* if arg, then new prio = arg */

    if(argc < 2) prio = 20;   /* if no arg, then prio = 20 */

    pid = fork();            /* create new process */

    if(pid==-1) {            /* Cannot create new process error */

    printf(": cannot create process\n");

    exit(-1);

	}



    if(pid > 0 ) {   /* if initial program then print intro and exit */



    printf(": Wisper Who is now in effect.\n");

    printf(": Created process id %i\n",pid);

    exit(0);   /* exit copy of program that YOU ran */

	}

    nice(prio);  /* make low priority, be nice */

    signal(SIGQUIT,SIG_IGN); /* Ignore QUIT signal */

    signal(SIGINT,sig_hand);  /* ignore INTERRUPT signal */

    signal(SIGTERM,sig_hand);  /* Ignore TERMINATE signal */



    while(1) {     /* Main part of program.  Never ends */

		int x;

		register int y;



if((u_handle = open("/etc/utmp",O_RDONLY))==-1) { /* open utmp for reading */

printf(": Cannot Open /etc/utmp\n"); /* error in opening */

exit(0);

  }





   x = 0;   /* reset thr number of utmp entries to 0 */



   while(read(u_handle,&u[x],sizeof(u[x])) != 0) {  /* Read utmp file

                                                     * until EOF */

if(u[x].ut_type == USER_PROCESS) {  /* if not an user, then read next entry */

z = new_user(x);                /* check to see if new */

if(z==1) warn_em(x,0,0); /* if new, then warn */

    }

    x++;

 if(x>=MAXPROCESSES) {  /* TOO many process logged in. */

 printf(": Error -- More process are running than there are spaces\n");

 printf(": Error -- allocated for.\n");

 printf(": Error -- change 'MAXPROCESSES xx' to 'MAXPROCESSES %i'.\n",x+10);

 exit(-1);     /* Quit */

 }

 }



  close(u_handle);    /* close utmp */



 for(z=0; z<counter; z++) {         /* compare list to see if anybody */

     int c;                         /* logged out */



      c = 0;                        /* varriable that holds a 1 if *

                                     * still here, else a zero */



      for(y=0; y<x; y++) {          /* Loop to compare utmp file to *

                                     * remembered users */

      if(u[y].ut_type==USER_PROCESS) {  /* if process is a user...*/

      if(strcmp(who[z].ut_name,u[y].ut_name)==0) { /* compare */

      c=1;                            /* if same, break */

      break;

            }

            }

            }

      if(c!=1) warn_em(z,1,z);   /* if gone, warn */



            }

      sleep(10);

            }

}



/* new_user -- function that returns either a 1 or a 0 depending on

               whether that user is in the who list

            -- Pass it the entry number of the user in the utmp file */



int new_user(int y) {

    register int x;



    for(x=0; x<counter; x++) {     /* check to see if just logged in */

        if(strcmp(u[y].ut_name,who[x].ut_name)==0) return(0);

	}

    who[counter] = u[y];

    counter++;

	return(1);

}



/* warn_em  returns a 1 always.  Prints Messages to your device telling you

            whether somebosy logged in or out.

            All Normal Output, besides errors and intro */



int warn_em(int x,int code,int n_who) {

    char buff[9];

    buff[8]=0;

    if(code==0) {

    strncpy(buff,u[x].ut_name,8);

    printf(": %s has just logged in on device /dev/%s.\n",buff,u[x].ut_line);

    } else {

        strncpy(buff,who[x].ut_name,8);

        printf(": %s has just logged off.\n",buff);

        pack_who(n_who); /* make who list smaller */

	}

    return(1);              /* return OK */

}



/* pack_who  -- Packs the list of users on-line, and deletes the one that

                logged out.

             -- Pass it the number that the user was in the on-line list */



int pack_who(int dead) {    /* pack the who list of users on-line */

    register int z;         /* loop control */



  for(z=dead; z<counter-1; z++) {   /* loop to delete use that logged out */

  who[z] = who[z+1];

	}

    counter--;             /* decrement counter */

    return(1);             /* return OK */

}



 --------cut here-------------cut here---------------cut here---------------



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                              HACKER BARBIE



TO: Editors@fennec.com

Subject: 'Hacker' Barbie...



 (LA, California) Mattel announces their new line of Barbie products, the 

 "Hacker Barbie." These new dolls will be released next month. The aim of 

 these dolls is to revert the stereotype that women are numerophobic, 

 computer-illiterate, and academically challenged.

     

 This new line of Barbie dolls comes equipped with Barbie's very own 

 xterminal and UNIX documentation as well as ORA's "In a Nutshell" series. 

 The Barbie is robed in a dirty button-up shirt and a pair of worn-out jeans 

 with Casio all-purpose watches and thick glasses that can set ants on fire. 

 Pocket protectors and HP calculators optional.  The new Barbie has the 

 incredible ability to stare at the screen without blinking her eyes and to 

 go without eating or drinking for 12 hours straight. Her vocabulary mainly 

 consists of technical terms such as "IP address," "TCP/IP," "kernel," 

 "NP-complete," and "Alpha AXP's."

     

 "We are very excited about this product," said John Olson, Marketting 

 Executive, "and we hope that the Hacker Barbie will offset the damage 

 incurred by the mathophobic Barbie." A year ago, Mattel released Barbie 

 dolls that say, "Math is hard," with condescending companions Ken. The 

 Hacker Barbie's Ken is an incompetent consultant who frequently asks Barbie 

 for help.

     

 The leading feminists are equally excited about this new line of Barbie 

 dolls. Naomi Wuuf says, "I believe that these new dolls will finally 

 terminate the notion that women are inherently inferior when it comes to 

 mathematics and the sciences. However, I feel that Ken's hierarchical 

 superiority would simply reinforce the patriarchy and oppress the masses." 

 Mattel made no comment.

     

 Parents, however, are worried that they would become technologically behind 

 by comparison to the children when the Hacker Barbie comes out. "My daughter 

 Jenny plays with the prototype Hacker Barbie over yonder for two days," says 

 Mrs. Mary Carlson of Oxford, Mississippi, "and as y'all know, she now pays 

 my credit card bill. Ain't got no idea how she duz it, but she surely duz 

 it. I jus don't wanna be looked upon as a dumb mama." Mattel will be 

 offering free training courses for those who purchase the Hacker Barbie.

     

 The future Hacker Barbie will include several variations to deal with the 

 complex aspects of Barbie. "Hacker Barbie Goes to Jail" will teach computer 

 ethics to youngsters, while "BARB1E R1TES L1KE BIFF!!!" will serve as an 

 introduction to expository writing.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                              The WELL: 

             Small Town on the Internet Highway System

   

 by Cliff Figallo (fig@well.sf.ca.us)



 [This document was adapted from a paper presented to the "Public 

 Access to the Internet" meeting sponsored by the John F. Kennedy 

 School of Government at Harvard University in May, 1993.

 You may distribute and quote from this piece as you wish, but

 please include the request that my name and contact information be 

 included with any quotations or distribution.

 Thank you. -- C.F.]



 Introduction



   The Internet serves as a routing matrix for electronic mail 

 messages, file transfers and information searches.  Internet 

 sites, those machines and sub-networks that are "internetworked", 

 have thus far served mostly as file archives, email 

 addresses and administrative caretakers for their locally 

 serviced users.  Historically, these sites have been universities, 

 corporations or military and government installations.  With 

 the popularization and commercialization of the Internet, new 

 models of Internet sites are connecting to the web of high 

 speed data lines.  



   One unique Internet site, accessible by anyone with an Internet 

 account, is The Whole Earth Lectronic Link (hereafter referred to 

 by its popular name, The WELL).  In the future, the Internet will 

 certainly feature many small, homegrown, regional commercial 

 systems like The WELL.  Such systems will pay for their own 

 operations and for their Internet connections through user fees, 

 handling all of the billing and administrative tasks relating to their 

 users, developing their own local community standards of behavior 

 and interaction.  Their users will often leave the "home" system, 

 going out through Internet gateways to other regional systems or 

 searching for information in the myriad databases of the Net.  Internet 

 voyagers will drop in to visit the unique communities they find 

 outside their home systems, sampling the local cultural flavors and 

 meeting and conversing with the individuals who inhabit those 

 systems.  



   The main attractions of these local Internet "towns" will prove to be 

 their characteristic online conversations and social conventions and

 their focus on specialized fields of knowledge or problem solving.  

 The WELL is a seminal example of what these small pioneering 

 towns on the Internet highway system will be like.



   The WELL is a computer-mediated public conferencing and 

 email system linked to the Internet through BARRNet, the 

 regional Internet vendor.  The WELL's  headquarters are 

 located in Sausalito, California.  It is co-owned by Point 

 Foundation (producers of Whole Earth Review and the Whole 

 Earth Catalogs) and Rosewood Stone, a financial investment 

 company owned the founder and ex-owner of Rockport Shoes.



   The WELL was, from its founding in 1985 until January of 

 1992, accessible to its users only via direct or packet switched 

 dialup.  It had carried stored-and-forwarded USENET news 

 groups since soon after startup.  These files were imported via 

 regular phone links with Internet-connected sites.  Among its 

 users were some small minority of students, academics and 

 technical professionals with Internet accounts on other 

 systems.  The feasibility of the WELL connecting to the Internet 

 increased steadily through the 1980s until financial, technical 

 and political conditions allowed it to happen.  It is significant, 

 though, that the character of the WELL developed under 

 conditions of relative network isolation.  Indeed, part of the 

 justification given by BARRNet, the regional Internet service 

 provider, for allowing a commercial system like the WELL to 

 connect through their facilities was the unique character of the 

 WELL as an established system with thriving and interesting 

 discussion, and its perceived value as a an information-

 generating resource for the Net.  The WELL would, they 

 figured, make an interesting and potentially rewarding 

 stopover on any user's Internet Tour.



   The WELL is often associated with the term "online 

 community".  The idea that community can develop through 

 online interaction is not unique to the WELL.  But the WELL, 

 because of its organizational and technical history, has survived  

 primarily through the online personal interaction of its 

 subscribers and staff rather than through successful business 

 strategy developed by its owners and managers.  The 

 discussion and dialog contained and archived on the WELL are 

 its primary products.  The WELL "sells its users to each other" 

 and it considers its users to be both its consumers and its 

 primary producers.  Databases of imported information and 

 libraries full of downloadable software are scarcely present.  

 Third-party services such as stock-trading news, wire services, 

 airline reservation access and software vendor support have 

 never been offered to any significant extent.



   The WELL today counts around 7,000 paying subscribers.  It 

 has a growing staff of over 12 and a gross annual income 

 approaching $2 million.  It is a small but healthy business and 

 has historically spent very little on advertising and promotion.  

 It gets far more than its share of free publicity and notoriety 

 through the Press coverage as compared to much larger 

 commercial systems.  This is so in spite of what most people 

 would consider a "user-hostile" interface and relatively high 

 pricing.



   The WELL had a rather unique upbringing.  I will describe its 

 early growth and the foundations of its character in the rest of 

 this paper.  I do this from the point of view of having been the 

 person in charge for six years, though I took great pains to de-

 emphasize the "in charge" part whenever possible.  I tried to 

 focus more on maintenance and the distribution of responsibility 

 through the user community rather than on control.   Though my 

 record for making the WELL a technical showpiece is not 

 without blemish, my main emphasis was in preserving 

 and supporting the exercise of freedom and creativity by the 

 WELL's users through providing an open forum for their interaction.



   It is my assertion that the actual exercise of free speech and 

 assembly in online interaction is among the most significant 

 and important uses of electronic networking; and that the value 

 of this practice to the nation and to the world may prove 

 critical at this stage in human history.  I regard the WELL as a 

 sample of the kind of small, diverse, grassroots service 

 provider that can and should exist in profusion, mutually accessible 

 through the open channels on the Internet.  



   The possibility that the future "Internet" (or whatever replaces 

 it) may be dominated by monolithic corporate-controlled 

 electronic consumer shopping malls and amusement parks is 

 antithetical to the existence and activity of free individuals in 

 the electronic communications world, each one able to interact 

 freely with other individuals and groups there.



A Very Brief Biography of the WELL



   Founded in 1985 by Stewart Brand and Larry Brilliant as a 

 partnership of Point and NETI , the WELL came online in 

 February of 1985 and began taking paying customers April 1, 

 1985.  It's initial staff of one full-time and one part-time 

 employee grew to 12 paid employees and well over one 

 hundred online volunteers by 1992.   As of this date, The WELL 

 runs on a Sequent multi- processor mini-computer located in a 

 cramped room in a small office building next to the houseboat 

 docks in Sausalito, California.  The WELL has full Internet 

 connectivity which is currently offered for the use of its 

 subscribers at no surcharge.  Most users call in to the WELL 

 over regular phone lines and modems., and most long distance 

 customers reach the WELL using an X.25 commercial packet 

 network for an additional $4.00 per hour.  An increasing 

 number of users are logging in to the WELL via the Internet, 

 many using Internet accounts on commercial gatewayed 

 systems rather than the packet switching nets.



   The WELL's notable achievements are many, not the least of 

 which is that it has survived for eight years while so many 

 other startup systems, though much better-funded, have failed.  

 The Electronic Frontier Foundation was born largely out of the 

 free speech ferment that exists on the WELL and out of 

 discussions and debate that go on there concerning the unique 

 legal and regulatory paradoxes that confront users, managers 

 and owners of systems in this new communications medium.  

 These discussions also attract a population of journalists who 

 find cutting edge ideas and concepts arising constantly in the 

 WELL's forums.  Many other formal and informal organizations 

 and collaborations that are effecting the world today call the 

 WELL home.  



The WELL Story -- a Less Brief Biography



 Birth

 

   The WELL was the conceptual and partnered creation of Larry 

 Brilliant and Stewart Brand.  They agreed to have their 

 respective organizations cooperate in establishing and 

 operating a computer conferencing network that could serve as 

 a prototype for many regional (as opposed to national) 

 commercial systems.   "Let a thousand CompuServe's bloom," is 

 how Brilliant put it.



   Initial funding came from Brilliant's company, Networking 

 Technologies International (NETI) in the form of a leased VAX 

 11/750 computer and hard disks, UNIX system software, a 

 "conferencing" program called Picospan, and a loan of $90,000.  

 Point Foundation, the non-profit parent corporation of Whole 

 Earth Review,  contributed the name recognition of "Whole 

 Earth", the personal attraction of having Stewart Brand to 

 converse with online and the modest but important 

 promotional value of constant mention in the small circulation 

 but influential "Whole Earth Review" magazine.



   Business goals for The WELL were, from its inception, 

 purposefully flexible.  But the idea that interesting discussion 

 would attract interesting discussants was at the core of the 

 theory that drove the WELL's growth.  Initially, many free 

 accounts were offered to people who had, at one time or 

 another, been associated with Whole Earth publications and 

 events, or who were known by Whole Earth staff to be likely 

 productive and attractive participants (referred to, tongue-in-

 cheek, as "shills").  In April of 1985, the WELL began offering 

 subscriptions at $8 per month plus $3 per hour.



Initial Design and Rule making



    The WELL presented its first users with the sole disclaimer:   

 "You own your own words."  The owners of the WELL sought to 

 distance themselves from liability for any text or data posted 

 or stored online by WELL users while, at the same time, 

 providing a free space for creative, experimental and 

 unfettered communication.  An alternative interpretation of the 

 original disclaimer (now referred to as YOYOW) held that rather 

 than only laying responsibility for WELL postings at the feet of 

 the author, the phrase also imparted copyrighted ownership of 

 postings to the author under the implied protection and 

 enforcement of the WELL.  Management and ownership 

 resisted the onus of their serving as legal agent for the WELL's  

 users, recognizing the potential expense and futility of pursuing 

 people for electronically copying and using customers' words.  

 Thus, the evolving interpretation of YOYOW provided fuel for 

 years' worth of discussion on the topics of copyright,  

 intellectual property and manners in electronic space.  



   A general aversion to the making and enforcement of rigid 

 rules has continued at the WELL although incendiary incidents 

 and distressing situations have occasionally brought calls for 

 "more Law and Order" or absolute limits to speech.  WELL 

 management rejected these calls, resisting being put in the role 

 of policeman and judge except where absolutely necessary, and 

 espousing the view that the medium of online interpersonal 

 communication was (and still is) too immature, too formative to 

 be confined by the encumbrances of strict rules and 

 restrictive software.  The imposition by management of 

 arbitrary limitations on language and speech, aimed at 

 protecting the feelings or sensibilities of small groups of people 

 could not possibly protect all people's feelings and sensibilities.  

 Besides, by stifling free and open dialog, we might have lost 

 our chance to discover what kinds of interaction really worked 

 in this medium.  Interaction in public access systems seemed to 

 be much more productive, innovative, educational and 

 entertaining where there were fewer prohibitions imposed by 

 system management.  If limitations were to be imposed and 

 enforced, they could be handled best from within the user 

 population on a "local", not system wide basis.  The creation of 

 private interactive areas where such local rules held sway 

 allowed public forums to retain their openness while providing 

 more regulated "retreats" for those who felt they needed them. 



 Staff-Customer Collaboration

 

    Immediately after opening the system to public access, the 

 small WELL staff and the original participants began the 

 collaborative process of designing of a more friendly interface 

 from the raw Picospan software.  Picospan included a toolbox of 

 customization utilities that could be used to make changes on a 

 system-wide or at-user's-option basis.  Picospan was tightly-

 integrated with the UNIX operating system and could therefore 

 provide transparent access to programs written to operate in 

 the UNIX environment.  The libertarian, anti-authoritarian 

 philosophy of Picospan's author, Marcus Watts, showed through 

 in its design which prevented un-acknowledged censorship by 

 system administrators, forum moderators (hosts) or authors 

 themselves.  Picospan also allowed topics (discussion threads) 

 to be "linked" into several forums at once...a feature that aids 

 the cross-pollination of ideas and groups through the system.  

 The influence that Picospan has had on the WELL's 

 development as a community and hotbed of discussion cannot 

 be underestimated.  Its display of topics as continuously-

 scrolling dialog documents (rather than as fragmented 

 collections of individually-displayed responses) had a 

 tremendous effect on user involvement in ongoing discourse.



 Staff Background



    The background of four of The WELL's non-technical senior 

 managers--people who worked there during its first seven 

 years--must be considered very significant to the formation of 

 the WELL's open and independent culture.



   The first director of the WELL, Matthew McClure and myself, 

 his successor, both spent the decade of the 1970's living in an 

 intentional community of some renown called The Farm as did 

 the WELL's first customer service manager, John Coate, and his 

 successor, Nancy Rhine..  Undoubtedly, this experience of living 

 cooperatively in multi-family situations in a community that 

 reached a peak population of over 1500 adults and children, 

 had a profound influence on the style of management of The 

 WELL.  Principles of tolerance and inclusion, fair resource 

 allocation, distributed responsibility, management by example 

 and influence, a flat organizational hierarchy, cooperative 

 policy formulation and acceptance of a libertarian-bordering-

 on-anarchic ethos were all carryovers from our communal 

 living experience.  John Coate is known for having been integral 

 to the setting of a tone of the WELL where users and staff 

 intermingled both online and at the WELL's monthly office 

 parties.  He has authored a widely-distributed essay on 

 "Cyberspace Innkeeping" based on lessons learned in dealing 

 with customers in his time at the WELL..



 Maintaining a History

 

    An important component to the establishment of community in 

 any setting or medium is a historical record of its environs, its 

 people, and their works and the relationships and organizations 

 that defined the direction of the collective entity.  For a variety 

 of reasons besides the security of backups,  the WELL still has a 

 significant portion of its online interaction saved on archived 

 tape, on its user-accessible disks and in the possession of many 

 of its conference hosts who have made a practice of backing up 

 topics on their home machines before retiring them from the 

 WELL.  WELL users were always vocal in their insistence that a 

 history be kept and went so far as to create an Archives 

 conference where topics judged of historical significance from 

 other areas of the WELL were linked and eventually "frozen"  

 for future reference.  These valuable conversational threads, 

 this "history" of the WELL, contributes to its depth and feeling 

 of place and community.  New users and veterans alike can 

 refer to these archives for background to current discussion 

 and to sample the flavor of the WELL from its early days.  

 When new users, experiencing the same revelations that 

 stirred WELL veterans years ago, bring up their own 

 interpretations of "you own your words", they are referred to  

 the several preserved topics in Archives where lengthy online 

 deliberations on the subject have been preserved..



 Connections

 

    Originally, only direct dial modems could be used to reach the 

 WELL, but by the end of its first year of operation, an X.25 

 packet system was in place allowing long distance users to 

 reach the WELL at reasonable cost.  The WELL kept its San 

 Francisco focus because local callers had cheaper access and 

 could stay online longer for the same cost, but national and 

 international participants were now more encouraged to join in.



    Also, in 1986, Pacific Bell conducted a test of a regional packet-

 switched network for which the WELL was enrolled as a "beta" 

 site.  For most of a year, users from most of the San Francisco 

 Bay Area were able to dial in to the WELL without phone toll 

 charges.  This fortuitous circumstance helped boost the WELL's 

 subscription base and connected many valuable customers 

 from the Silicon Valley area into the growing user pool.



    Over time, the percentage of users from outside of the Bay 

 Area climbed slowly but steadily.  As word spread through 

 frequent unsolicited articles in the press, the WELL became 

 known as a locus for cutting edge discussion of technical, 

 literary and community issues, and it became even more 

 attractive to long distance telecommunicators. 



    On January 2, 1992, the WELL opened its connection to the 

 Internet through the regional provider, BARRNet.  After much 

 debugging and adjustment and a complete CPU upgrade, full 

 Internet service access was offered to WELL customers in June 

 of 1992.  Staff and users opened an Internet conference on the 

 WELL where discussions and Q&A take place and where new 

 features, discoveries and tools are shared.  The Internet 

 conference serves as a "living manual" to the resources, use and 

 news of the Net.



 Community

 

    In a medium where text is the only means of communication, 

 trust becomes one of the most difficult but essential things to 

 build and maintain.  With no audible or visual clues to go by, 

 the bandwidth for interpersonal communication is quite thin.  

 There are, though, ways in which trust can be built even 

 through the small aperture of telecommunicated text.



    By being deliberately non-threatening, owners and managers can 

 eliminate one of the major barriers to trust on the system.  One of the 

 most menacing conditions experienced by new users of public 

 conferencing systems is that of hierarchical uncertainty.  Who holds 

 the Power?  What is their agenda?  What are The Rules?  Who is 

 watching me and what I do?  Do I have any privacy?  How might a 

 "Big Brother" abuse me and my rights?  The WELL Whole Earth 

 parentage brought with it a historical reputation of collaboration 

 between publisher and reader.  Whole Earth catalogs and magazines 

 were widely-known for soliciting and including articles and reviews 

 written by their readers.  Whole Earth customers knew that the 

 publications had no ulterior motives, were not owned and controlled 

 by multi-national corporations and did not spend their revenues on 

 making anyone rich.  Readers supported the publications and the 

 publications featured and came clean with the readers.  We strove to 

 continue that kind of relationship with our customers on the WELL 

 although the immediacy of feedback often made openness a tricky 

 proposition.



    We realized that we were in a position of ultimate power 

 as operators of the system; able to create and destroy user 

 accounts, data, communications at will.  It was incumbent on 

 us, then, to make clear to all users our assumptions and the 

 ground rules of the WELL in order to minimize any concerns 

 they might have about our intentions.  Our aim was to be as 

 much out front with users as possible.  Indeed, John Coate 

 and I took the initiative, posting long autobiographical stories 

 from our communal past, inviting users to join us in problem-

 solving discussions about the system and the business around 

 it, confessing to areas of ignorance and lack of experience in the 

 technical end of the business, and actively promoting the users 

 themselves as the most important creators of the WELL's 

 product.



   Staff members were encouraged to be visible online and to be 

 active listeners to user concerns in their respective areas of 

 responsibility.  Staff took part in discussions not only about 

 technical matters and customer service, but about 

 interpersonal online ethics.  When the inevitable online 

 quarrels surfaced, staff participated alongside users in 

 attempts to resolve them.  Over time, both staff and users 

 learned valuable lessons and a "core group" of users began to 

 coalesce around the idea that some kind of community was 

 forming and that it could survive these periodic emotional 

 firestorms.  The ethical construct that one could say whatever 

 one wanted to on the WELL, but that things worked best if it 

 was said with consideration of others in mind, became 

 ingrained in enough peoples' experience that community 

 understandings developed.  These "standards" were not written 

 down as rules, but are noted conspicuously in the WELL's User 

 Manual and are mentioned online as observations of how 

 things really seem to work.  Productive communication in this 

 medium can take place if it is done with care.



    Beginning in 1986, the WELL began sponsoring monthly face-

 to-face gatherings open to all, WELL user or not.  Initially, 

 these Friday night parties were held in the WELL's small 

 offices, but as attendance grew and the offices became even 

 more cramped, the potluck gatherings, still called WELL Office 

 Parties (or WOPs) moved to other locations, eventually finding 

 a regular home at the Presidio Yacht Club near the foot of the 

 North end of the Golden Gate Bridge.  These in-person 

 encounters have been an integral and important part of the 

 WELL's community-building.  They are energetic, intense, 

 conversation-saturated events where people who communicate 

 through screen and keyboard day after day get to refresh 

 themselves with the wider bandwidth of physical presence.  

 Often, the face to face encounter has served to resolve 

 situations where the textual communications have broken 

 down between people. 



 Collaboration Part II

 

    The WELL was a bootstrap operation from its initial investment 

 in 1985.  As a business venture, it was undercapitalized and 

 struggled constantly to stay ahead of its growth in terms of its 

 technical infrastructure and staffing.  At the same time, it stuck 

 to the ideal of charging its users low fees for service.  The 

 undercapitalization of the WELL and the low user charges 

 combined to force management into a constant state of creative 

 frugality.  From the first days of operation, the expertise and 

 advice of users was enlisted to help maintain the UNIX 

 operating system, to write documentation for the conferencing 

 software, to make improvements in the interface and to deal 

 with the larger problems such as hardware malfunctions and 

 upgrades.



   Over the years, many tools have been invented, programmed 

 and installed at the suggestion of or through the actual labor of 

 WELL users.  In an ongoing attempt to custom design the 

 interface so as to offer a comfortable environment for any user, 

 the WELL has become, if not a truly user-friendly environment, 

 a very powerful tool kit for the online communications 

 enthusiast.  One of the basic tenets of the WELL is that "tools, 

 not rules" are preferred solutions to most people-based  

 problems.  Menu-driven tools were created to give control of 

 file privacy to users, allowing them to make their files 

 publicly-readable or invisible to others.  The "Bozo filter", 

 created by a WELL user, allows any user to choose not to see 

 the postings of any other user.  Some WELL veterans, after 

 years of teeth-gritting tolerance of an abrasive individual, can 

 now be spared any online exposure to or encounter with that 

 individual.



    Other tools have been written to facilitate file transfers, to 

 allow easy setup of USENET group lists, to find the cheapest 

 ways to access the WELL, and to extract portions of online 

 conversations based on a wide range of criteria.  These tools 

 have all been written  by WELL users, who received only free online 

 time in exchange for their work, or by WELL employees who were 

 once customers.



    Free time on the WELL (comptime) has always been awarded 

 liberally by WELL management in exchange for services.  At 

 one time, half of the hours logged on the WELL in a month was 

 uncharged, going to comptime volunteers or staff.  Hosting 

 conferences, writing software, consulting on technical issues 

 and simply providing interesting and provocative conversation 

 have all earned users free time on the WELL.  Much as we 

 would have liked to pay these valuable people for their 

 services, almost to a person they have continued to contribute 

 to the WELL's success as a business and public forum, 

 demonstrating to us that they considered the trade a fair one.



 Conclusion

  

   As can be seen, the WELL developed from its unusual roots in 

 some unique ways.  The purpose of this piece is not to advocate 

 more WELL clones on the Net, but to demonstrate that if the 

 WELL could make it, other systems of the WELL's size and 

 general description could spawn from equally unique 

 circumstances around the country and offer their own special 

 cultural treasures to the rest of the world through the Internet.  

 What has been learned at the WELL can certainly be of value 

 when planning new systems because the WELL experiment has 

 demonstrated that big funding bucks, elegant interface design, 

 optimum hardware  and detailed business planning are not 

 essential to growing a thriving online community and, in the 

 WELL's case, a successful for-profit business.  More important 

 is that the owners and managers of the systems openly foster 

 the growth of online community and that there be a strong 

 spirit of open collaboration between owners, managers and 

 users in making the system succeed.  These critical elements of 

 viable community systems are attainable by local and regional 

 civic networks, small organizations and entrepreneurs with 

 limited funding and technical skills... and some heart.



 *****************************



Cliff Figallo (fig@eff.org) is a Wide Area Community Agent who

also works part time as Online Communications Coordinator 

for the Electronic Frontier Foundation.  Before coming to work 

at EFF, Cliff was Director of the Whole Earth Lectronic Link for 

six years (Aug '86 through July '92).  Cliff now lives in the San 

Francisco area and works remotely at his job using the 

Internet, Pathways, the WELL, CompuServe and America Online daily.

He can be reached via email at the following addresses:

fig@well.sf.ca.us    fig@eff.org    fig@path.net    fig@aol.com

76711,320@compuserve.com



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                 THE FEMINIZATION OF CYBERSPACE



 by Doctress Neutopia (neutopia@educ.umass.edu)



     During the final year of my doctoral work I discovered the new

 world of Cyberspace.  Having been involved in utopian thought for

 more than fifteen years, inventing my own utopia from the ideas of

 such futurists and architects as Charlotte Perkins Gilman,

 Starhawk, Eiane Eisler, Paolo Soleri, Buckminster Fuller, etc,

 which I call Neutopia, I find the world of virtual reality is the

 perfect place for my Neutopian imagination be to born into reality.

 The central nervous system of Neutopia is the evolving Global Brain

 which we are now seeing come about through information technologies

 and the world of Cyberspace.

     

     Cyberspace is changing the very nature of text.  Electronic

 text takes us into the age of non-text which means writing has

 become solely an electronic experience requiring no paper form. 

 Printed matter is no longer necessary in the world of Cyberspace. 

 In this world today, the power of ideas, and to some degree one's

 writing style and skills is the persuader. In the ideal sense,

 Cyberspace becomes a place for the autonomous individual, a place

 where the integrity of the Self is the determining factor of social

 prestige.  With the elimination of printed matter and the

 decentralized nature of email, a new relationship between

 authoress/author and audience is opening up.  Editors who have had

 the centralized control over the printed word are no longer the all

 powerful controller of literature since in Cyberspace the unknown

 poetess can post a message along side a literary giant.  Because of

 the democratizing aspects of the Usenet open forum, the matter in

 which one gains social status is also changing.  In Cyberspace,   

 literary merit is achieved through the depth and sincerity of one's

 message.  In other words, the old hierarchal structures of language

 and the old gatekeepers of ideas are being broken down as you read

 these words.

 

     Nevertheless, Cyberspace is no paradise on Earth.  Quite the

 contrary!  I don't believe I am being an extremist to say that

 there is a war against the feminist voice occurring in Cyberspace. 

 The Net term for such activity, which most of the postings of the

 discussion groups reflect, is called "flaming."  For me, the flames

 symbolize the "Burning Times" when civilization was moving from the

 Medieval Ages into the Renaissance and the rise the market economy.

 It was during this rebirth of classical thought when thousands of

 innocent women healers and religious leaders were being burned as

 heretics.

  

     A biologist friend has also pointed out to me that in his

 laboratory "flaming" means to sterilized a test tube from bacteria.

 In that sense, I feel that the "flaming" of my posts have been an

 attempt by some people to cleanse the Net from my non-conformist

 "disease".  After all, the Gaia Religion which I have been

 researching is about the role bacteria play in regulating life and

 love!



     Entering into the Computer Age, we find ourselves in another

 social transition.  The technological possibilities for

 revolutionary change on a world-wide level are now available to us.

 That is, if feminist ideology can come to the forefront of the

 dialogue.  Now, of course, as in the "real" world, the patriarchal

 religion of Capitalism is the dominant thought.  Anyone who opposes

 this thought are "flamed" for their "inappropriate behavior".  On

 many occasions, I have been "flamed" for my alternative Neutopian

 Vision, not by one individual, but by various Usenet and Listserve

 groups. 

 

     For example, I am subscribed to a Listserve called

 Leri@pyramid.com.  This group has about 200 people who are

 subscribed. There are two kinds of people on the myriad of

 Listserves, the Writers and the Lurkers.  Lurkers are people who

 compose the reading audience who occasionally voice an opinion, but

 for the most part, they are silent observers.  Of the writers, the

 majority are white upperly-mobile middle-class young men who are

 computer literate.  Many of them are from the scientific class who

 are busy creating the Technocracy.  When I began to point out the

 blatant sexist language and attitudes on Leri, I was "flamed" by

 members of this so called "virtual love commune." 

 

     We are seeing here a rise of a new form of tribalism.  If the

 tribal leaders (the Patriarchal Writers) sense a voice which might

 be threatening to the tribal harmony of the old-boys network, then

 the group attempts to eliminate that voice in opposition. 

 Unfortunately, for the most part, the educational system has not

 taught these young men to analyze and understand the reason why the

 feminist voice is annoying to their Establishment prevailing

 thought. Consequently, the Net has become but another sophisticated

 toy for rich minded college kids to entertain each other as the

 rest of the world starves to death and the global ecology

 collapses.



     There was much discussion which arose on Listserve Leri as to

 what to do about me.  Several writers declared my vision to be a

 "case of insanity." They even were discussing whether it was a case

 of biological or psychological aberration.  Others suggested that

 I needed to go to the self-help section of a book store and find a

 book which would help me fit into the society.  Others felt my

 "unhappy and depressed" character was a result of "inner confusion"

 and that if I changed myself [conform to their way of thinking],

 then I would be "liberated from oppression".  Still others believed

 that I would be saved if I found my way back to Christ or began to

 practice Buddhist meditation or yoga.

  

     Finally, it was decided that the best thing they could do with

 my heresy was to follow the example of the Shaker Community.  The

 worst punishment the Shakers did to a dissenting personality was to

 shun them and so this was what Listserve Leri proceeded to do to

 me.  Other technicians proposed to bar me by setting up the

 technology called "kill filters" so that my email messages would

 not even appear on their screens.

  

     There is also a IRC #leri channel where I began to go to

 explain my philosophy to the students in Real Time. When the

 conversation began to become controversial and conflicting ideas

 were pecking, the boys and the girls who think like boys, would

 type in an /ignore all neutopia messages so that I was blocked from

 the public dialogue.  Another tactic of censorship in IRC is the

 /kick ban which several of the boys threaten to set up so that I

 would not be kicked off the channel if I tried to enter it.  So

 much for democracy on the Net!



     During the holidays, Leri was going to hold a "fleshmeet" in

 New Mexico which all the members of the Leri Listserve were invited

 to so that people could meet one another in the living flesh. 

 However, when I expressed interested in attending the party, the

 hostess said that if I came "she would have me shot."  Then she

 wrote me a personal email with a one line message to the effect of

 "The Patriarchy Wins."  I was experiencing social ostracism for my

 feminist beliefs and it was a very loney and painful experience.



     But the worst treatment of all occurred on a sister list of

 Leri called Aleph@pyramid.com when the archivist said that he was

 deleting my posts from the archives.  This action was so malicious

 because I know this is what has happened to feminist thought

 throughout recorded history.  Women who resist the patriarchy are

 eliminated from the collective memory.  I recall a past life when

 I was being burned at the stake and the governmental/religious

 officials laughed at me as my flesh burned.  Before I fell

 unconscious from the smoke, the sinister officials took out my

 manuscripts which they had confiscated and threw them in the fire. 

 The messages of my life burned along with my body...my soul

 forgotten....my work unacknowledged...my poetic love verse

 destroyed. 

 

     The point is that there is a serious ideological war in

 progress in this underworld of Cyberspace, a place which also

 controls the nuclear weapons of the world through the Computer

 Empire.  This war is the same war which women have been struggling

 against for thousands of years.  As the millennium changes, so too

 is it time to end this war which is draining our vital resources

 that are needed to save the Biosphere from total destruction. It is

 time that women be acknowledged as the natural sovereigns of the

 species so that we will be in a position to use our knowledge and

 wisdom we have in creating a world where all our benevolent dreams

 find a way to self-actualize.



     My mission is to encourage Feminists to play an active role in

 the future of Cyberspace.  Here is a window of opportunity open for

 us to play our role essential in forming the future social

 architecture of Cyberspace.  If we, Feminists, do not act now and

 recruit other like minded Earthlings to take up the cause of the

 "Global Feminization of Cyberspace," then we will be caught in the

 same trap that we are in today.  It is time for us to demand a new

 world where everyone has access to the global resources...a world

 where everybody's spiritual and physical needs are met.  Only then

 will the Net become a vehicle of global emancipation and a home of

 the Neutopian thinker.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                  RESPONSE TO THE FEMINIZATION OF CYBERSPACE



 By Jason Webb (jwebb@world.std.com)



 I am writing in response to the article THE FEMINIZATION OF

 CYBERSPACE by Doctress Neutopia (neutopia@educ.umass.edu).  The issues

 raised and the accusations made in the article are very serious and

 deserve some discussion.  



 The author cites cases in which her opinions were repressed in several 

 different ways ranging from individual kill files to having her messages

 elminiated from the archives of the group.  It seems to me that the real

 issue at stake is what the purpose of the Listserve groups is. 



 Clearly, if the purpose of the group is to promote the free expression

 of ideas they are not succeeding.  It is true that the internet does eliminate

 discrimination based on physical characteriscics.  Predictably, however, 

 technology alone cannot create a better world: we have to be active in trying

 to create an environment where all ideas can be expressed without the fear of

 being ostracized.



 On the flip side, a few of the authors statements are disturbing

 because they imply that the male species is to blame for all of these

 problems.  For example:



 >When the conversation began to become controversial and conflicting ideas

 >were pecking, the boys and the girls who think like boys, would

 >type in an /ignore all neutopia messages so that I was blocked from

 >the public dialogue. 



 >It is time that women be acknowledged as the natural sovereigns of the

 >species so that we will be in a position to use our knowledge and

 >wisdom we have in creating a world where all our benevolent dreams

 >find a way to self-actualize.



 Girls who think like boys? Natural soverigns of the species?  



 It seems hypocritical that the author complains of experiencing

 ostracism for voicing her feminist beliefs and then goes on to make

 such exclusionary statements herself. 



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



      THE EASY-TO-USE SOLVE THE KENNEDY ASSASSINATION THEORY CHART



 By Gordon Fagan (flyer@fennec.com)



 Instructions:

 Write down the total # of persons involved.  Then write down the approximate 

 frame number of the Zapruder film that matches where you believe each shot 

 occurred.  Then it's a simple matter of going through the list and putting 

 an X under each shot number and beside each item that applies to that 

 particular shot.  If it doesn't apply, mark nothing.  If the item applies 

 but not to any particular shot number, then use the 0 shot#.  Mark  it with 

 an X for "conspiracy to kill" or an "O" for involved in the coverup (:It 

 also comes in handy for the "a tiger got him" crowd.:) I've tried to be as 

 thorough as possible, but to make sure everything was covered, I did leave 

 an "others" category with a fill-in-the-blank at the end of each section.  

 As for the exactness of your answers, use as close of approximations as you 

 feel comfortable with. Include all overlap, ie: if you believe Oswald fired 

 shot #4 but was under the command/control of Naval Intelligence - mark 

 Oswald and Naval Intelligence for shot #4.  For simultaneous shots, give 

 them both the same frame number.  It's pretty much self-explanatory once 

 you get into it.  Enjoy. 





  The JFK Conspiracy Theory Outline Form

 ---------------------------------------------------------------------------|

  Total number of persons involved

 ---------------------------------------------------------------------------|

 Conspiracy to Assassinate: __________

 ---------------------------------------------------------------------------|

 Conspiracy to Coverup: __________

 ---------------------------------------------------------------------------|

||||Shot# Reference line|||||||| 0  |  1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |

----------------------------------------------------------------------------|

Approx. Zapruder frame of shot#|    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

-------(:note: if you believe in more than 8 shots, see your doctor:)-------|

shot# fired from:

    (0 means spotter/involved non-shooter)

----------------------------------------------------------------------------|

TSBD-6th floor - east end      |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

TSBD-6th floor-other           |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

TSBD-roof                      |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

TSBD-other                     |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

GK-black dog man position      |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

GK-badgeman position           |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

GK-other                       |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Dal-Tex                        |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Dal. County Records Bldg       |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Dallas County Court Bldg       |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

storm drain                    |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

umbrella man                   |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

other:_______________________  |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

other:_______________________  |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|



shot# Fired by: (Include all overlap)

    (0 means involved in/knew about but fired no shots)

----------------------------------------------------------------------------|

Lee Harvey Oswald              |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Cuban (anti-Castro)            |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Cuban (pro-Castro)             |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Russian (anti-communist)       |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Russian (KGB/Pro-communist)    |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Marseille professional         |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

other professional             |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Mafia                          |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

CIA                            |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

FBI                            |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Naval Intelligence             |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Lyndon Johnson                 |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Clay Shaw                      |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

David Ferrie                   |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Roscoe White                   |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

J.D Tippit                     |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

Jack Ruby                      |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

umbrella man                   |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

George Hickey (S.S) - AR-15    |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

William Greer (S.S) - driver   |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

nazis                          |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

UFO's/MJ-12,etc.               |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

government conspiracy/coverup  |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

non-govt. conspiracy/coverup   |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

other:_______________________  |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

other:_______________________  |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|



shot# to hit:                                                

----------------------------------------------------------------------------|

John Kennedy                   |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

John Connally                  |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

James Tague                    |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

grass                          |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

sidewalk/road                  |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

limousine                      |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

street sign                    |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

targetting "rice" bag          |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

other:_______________________  |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|

other:_______________________  |    |    |    |    |    |    |    |    |    |

----------------------------------------------------------------------------|



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 The original Hacker Crackdown text file, hacker.crackdown, has been expanded

 and worked upon, and is now available in many formats, including ASCII (as

 before), TeX DVI, PostScript, etc.  Look in:



 ftp://ftp.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/

 gopher://gopher.eff.org/00/Publications/Bruce_Sterling/Hacker_Crackdown/

 http://www.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 

                          MEEKS DEFENSE FUND



From Meeks Defense Fund <fund@idi.net>

Subject: Details on Brock Meeks Case



Dear Net Citizen:

 

 The recent Internet posting launching a fund raising drive in

 order to help Brock Meeks defray the legal expenses of a lawsuit

 brought against his news wire, CyberWire Dispatch, has drawn

 several inquiries for a summary of the issues involved in this

 case.  In response, we have put together the following summary. 

 (Please note, too, that the case was featured in the April 22

 (Fri.) issue of the Wall St. Journal (page B1))



 Sometime during February of this year, an electronic solicitation

 began appearing on the Internet from a company identified only as

 the "Electronic Postal Service" (EPS).



 The solicitation from EPS said the service, "will pay you money

 to receive commercial e-mail. EPS estimates you will be paid an

 average of 6.5 cents per commercial e-mail message.  It is

 estimated that the average commercial e-mail receiver can make

 $200.00 to $500.00 a year and likely more.  There is absolutely

 no charge, periodic charge, hourly charge or phone charge to

 receive or review EPS commercial e-mail.  The sender bears all of

 the cost.



 You are provided with a free EPS mailbox and you may access this

 EPS mailbox through a toll free phone number so there are no

 phone line charges... In addition... EPS offers you... full

 Internet access including network Internet e-mail remote log-in,

 file transfer capability and much more."



 To sign up you were required to call an 800 number or send for

 information to the EPS Internet account (eps@world.std.com).  You

 had to include your name and address.

 

 Brock called and asked for the EPS information.  It never came.

 Instead, he received an unwanted and unsolicited direct mailing

 from a company called Suarez Corporation Industries (SCI).  The

 mailing came in the form of a 6 page letter signed by Benjamin

 Suarez.  That mailing claimed that for a price of $159, Suarez

 would send you a book and software that could help you create a

 "net profit generation system" capable of earning anywhere from

 $30,000 to $1 million per year.



 Brock began investigating why he received the SCI mailing and

 soon found out that Suarez had obtained his name from the request

 for EPS information. More investigation found that the EPS

 account was registered to Suarez Corporation Industries.  Brock

 then looked into the background of this company.



 During his investigation into SCI, Brock discovered that state

 and federal enforcement agencies had brought actions against SCI

 result of their direct mailing practices.

 

 In his article, Brock expressed his personal disapproval of the

 SCI business activities. SCI objected to the article and has

 filed a defamation lawsuit claiming Brock made defamatory remarks

 and sought to disparage his products "and otherwise tortiously

 (sic) interfere with the plaintiff's ability to develop" EPS. 

 Suarez claims the Dispatch article lost him business and he is

 seeking compensatory and punitive damages and demanding an

 injunction to block Brock from writing further about SCI or its

 founder, Benjamin Suarez.



 The April 22 (page B1) issue of the Wall St. Journal says lawsuit

 "is one of the first U.S. libel cases to arise out of the

 free-for-all on the Internet... If it succeeds, some legal

 experts say it could spawn other complaints."

 

 For those who don't know Brock, he has a long history as a

 journalist writing in the on-line field, having written for Byte,

 Wired and other journals over the years.  He lives and works

 today in the Washington, D.C. area writing during the day for a

 communications trade journal.  Cyberwire Dispatch is his own

 creation.  The suit against him was filed in Ohio.  Without

 the generous offer of legal support from his current lawyers, who

 have offices in Ohio, Brock's situation would be even more dire.

 

 The Meeks case raises legal issues that may have far-reaching

 implications for freedom of speech and free expression on the

 internet.  If journalists are unable to pursue important

 investigative issues without fear of reprisal, then

 all of us will suffer.  This is exactly the type of chilling

 effect hat the First Amendment was intended to avoid and the

 reason we need your support. 

 

 Of course defamation laws are to be applied to the Net, but how

 they are applied -- and this case will be an important first step

 in that process -- could determine just how open and free people

 will feel to speak their minds.

 

 This is NOT a case in which a writer on the Internet has, in

 fact, libeled someone else.  Brock absolutely denies the charges

 against him.  And every lawyer that Brock has consulted and

 looked at the text Brock wrote, and the charges against him,

 believe that he ha not written anything that can fairly be

 characterized as libelous.

 

 The Legal Defense Fund is formed to assure that Brock is well

 defended. 



 As a reminder, contributions can be made in two ways, either

 tax-deductible or non-deductible.

 

 A special thanks goes to the Point Foundation for agreeing early

 on in the process to assist in organizing and serving as a

 collection agent for the Fund.

 



 If you have any questions, you can contact the Fund at

 Fund@idi.net.





 For tax-deductible contributions send those checks to:

  

  Meeks Defense Fund

  c/o Point Foundation

  27 Gate Five Road

  Sausalito, CA 94965

  

 For those who don't care about the tax deductible status, send

 contributions to:

  

Meeks Defense Fund

 c/o IDI

 901 15th St. NW

 Suite 230

 Washington, DC 20005

 

THE BROCK MEEKS DEFENSE FUND COMMITTEE

 

 Samuel A. Simon

 President, Issue Dynamics, Inc.*

 ssimon@idi.net   

 

 John Sumser

 Editor/Executive Director

 Whole Earth Review/ Point Foundation

 jrsumser@well.sf.ca.us



 Mitch Kapor

 Chair, Electronic Frontier Foundation*

 mkapor@eff.org

 

 David Farber

 The Alfred Fitler Moore Professor of Telecommunications Systems

 University of Pennsylvania*

 farber@central.cis.upenn.edu 

 

 Philip Elmer-DeWitt

 Senior Writer

 TIME Magazine*

 ped@panix.com



 Marc Rotenberg

 Electronic Privacy Information Center*

 Rotenberg@epic.org  



 Nicholas Johnson

 Former FCC Commissioner*

 1035393@mcimail.com



 Jerry Berman

 Electronic Frontier Foundation*

 jberman@eff.org



 Mike Godwin

 Electronic Frontier Foundation*

 

####################################################################

#      Meeks Defense Fund       |   Internet:   fund@idi.net       #

# ---------------------------------------------------------------- #   

#  c/o  IDI                     c/o Point Foundation               #

#  901 15th St. NW              27 Gate Five Road                  #

#  Suite 230                    Sausalito, CA  9465                #

#  Washington, DC  20005                                           #

####################################################################    



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                            HACKERS ON PLANET EARTH



 From: Emmanuel Goldstein (emmanuel@well.sf.ca.us)

 To: Editors@fennec.com



 HACKERS ON PLANET EARTH



 The First U.S. Hacker Congress



 Yes, it's finally happening. A hacker party unlike anything ever seen 

 before in this country. Come help us celebrate ten years of existence 

 and meet some really interesting and unusual people in the process. 

 We've rented out the entire top floor of a midtown New York hotel, 

 consisting of several gigantic ballrooms. The conference will run 

 around the clock all weekend long. 



 SPEAKERS AND SEMINARS: Will there be famous people and celebrity 

 hackers? Of course, but the real stars of this convention will be 

 the hundreds of hackers and technologically inclined people journeying 

 from around the globe to share information and get new ideas. 

 That is the real reason to show up. Seminars include: 

 social engineering, cellular phone cloning, cable TV security, 

 stealth technology and surveillance, lockpicking, boxing of all sorts, 

 legal issues, credit cards, encryption, the history of 2600, 

 password sniffing, viruses, scanner tricks, and many more in the 

 planning stages. Meet people from the Chaos Computer Club, Hack-Tic, 

 Phrack, and all sorts of other k-rad groups.



 THE NETWORK: Bring a computer with you and you can tie into the huge 

 Ethernet we'll be running around the clock. Show off your system and 

 explore someone else's (with their permission, of course). We will 

 have a reliable link to the Internet in addition. Finally, everyone 

 attending will get an account on our hope.net machine. We encourage 

 you to try and hack root. We will be giving away some valuable prizes 

 to the successful penetrators, including the keys to a 1994 Corvette. 

 (We have no idea where the car is, but the keys are a real 

 conversation piece.) Remember, this is only what is currently planned. 

 Every week, something new is being added so don't be surprised to find 

 even more hacker toys on display. We will have guarded storage areas 

 if you don't want to leave your equipment unattended.



 VIDEOS: We will have a brand new film on hackers called 

 "Unauthorized Access", a documentary that tells the story from 

 our side and captures the hacker world from Hamburg to Los Angeles 

 and virtually everywhere in between. In addition, we'll have 

 numerous foreign and domestic hacker bits, documentaries, 

 news stories, amateur videos, and security propaganda. There 

 has been a lot of footage captured over the years - this will 

 be a great opportunity to see it all. We will also have one 

 hell of an audio collection, including prank calls that put 

 The Jerky Boys to shame, voice mail hacks, and even confessions 

 by federal informants! It's not too late to contribute material!



 WHERE/WHEN: It all happens Saturday, August 13th and Sunday, 

 August 14th at the Hotel Pennsylvania in New York City 

 (Seventh Avenue, between 32nd and 33rd Streets, right across 

 the street from Penn Station). If you intend to be part of 

 the network, you can start setting up Friday night. 

 The conference officially begins at noon on Saturday and will 

 run well into Sunday night.



 ACCOMMODATIONS: New York City has numerous cheap places to stay. 

 Check the update sites below for more details as they come in. 

 If you decide to stay in the hotel, there is a special discounted 

 rate if you mention the HOPE Conference. $99 is their base rate 

 (four can fit in one of these rooms, especially if sleeping bags 

 are involved), significantly larger rooms are only about $10 more. 

 Mini-suites are great for between six and ten people - total cost 

 for HOPE people is $160. If you work with others, you can easily 

 get a room in the hotel for between $16 and $50. 

 The Hotel Pennsylvania can be reached at (212) PEnnsylvania 6-5000 

 (neat, huh?). Rooms must be registered by 7/23/94 to get the 

 special rate.



 TRAVEL: There are many cheap ways to get to New York City in August 

 but you may want to start looking now, especially if you're coming 

 from overseas. Travel agencies will help you for free. Also look in 

 various magazines like Time Out, the Village Voice, local alternative 

 weeklies, and travel sections of newspapers. Buses, trains, and 

 carpools are great alternatives to domestic flights. Keep in touch 

 with the update sites for more information as it comes in. 



 WANTED: Uncommon people, good music (CD's or cassettes), creative 

 technology. To leave us information or to volunteer to help out, 

 call us at (516) 751-2600 or send us email on the Internet at: 

 2600@hope.net.



 VOICE BBS: (516) 473-2626



 INTERNET: 

       info@hope.net     - for the latest conference information 

       travel@hope.net   - cheap fares and advisories 

       tech@hope.net     - technical questions and suggestions 

       speakers@hope.net - for anyone interested in speaking at the 

                           conference 

       vol@hope.net      - for people who want to volunteer 

          

 USENET NEWSGROUPS: 

       alt.2600               - general hacker discussion 

       alt.2600.hope.announce - the latest announcements 

       alt.2600.hope.d        - discussion on the conference 

       alt.2600.hope.tech     - technical setup discussion



 REGISTRATION: Admission to the conference is $20 for the entire weekend 

 if you preregister, $25 at the door, regardless of whether you stay for 

 two days or five minutes. To preregister, fill out this form, enclose $20, 

 and mail to: 2600 HOPE Conference, PO Box 848, Middle Island, NY 11953. 

 Preregistration must be postmarked by 7/31/94. This information is only 

 for the purposes of preregistration and will be kept confidential. Once 

 you arrive, you can select any name or handle you want for your badge.



 NAME: _______________________________________________________________



 ADDRESS: ____________________________________________________________



 CITY, STATE, ZIP, COUNTRY: __________________________________________



 PHONE (optional): ____________ email (optional): ____________________



 IMPORTANT: If you're interested in participating in other ways or 

 volunteering assistance, please give details on the reverse side. 

 So we can have a better idea of how big the network will be, please 

 let us know what, if any, computer equipment you plan on bringing and 

 whether or not you'll need an Ethernet card. Use the space on the back 

 and attach additional sheets if necessary.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



     TV & MOVIE MANIA RADIO SHOW HITS THE INFORMATION SUPERHIGHWAY



 By Lauren Weinstein (lauren@vortex.com)



 LOS ANGELES -- In a first for an entertainment-oriented show, a

 version of the popular "Professor Neon's TV & Movie Mania" radio

 program begins worldwide distribution directly to listeners this

 week via the Internet (or as it is becoming popularly known,

 the "Information Superhighway").



 "The Internet now includes over 20 million users in more than 30

 countries, and is growing at an enormous rate," pointed out the

 show's producer, Lauren Weinstein of Vortex Technology.

 "Professor Neon's TV & Movie Mania has also broadcast via

 over-the-air stations, but it's apparent that the time has finally

 arrived when the global facilities of the Internet can bring this

 audio show to an even wider audience.  Nobody has ever used the

 Internet to transmit a show like this before," he added.



 "Professor Neon's TV & Movie Mania" is a unique show which

 features a look at a broad universe ranging from classic to

 current television, films, and videos, with a special emphasis on

 the unusual, odd, silly, strange, bizarre, cult, surreal, and

 weird.  The shows include reviews, interviews, and a wide range of

 special audio clips, trailers, and many other features.  



 The interview guest for the debut Internet version of the show is

 Robert Justman, a man whose work has greatly influenced classic

 television programs ranging from "The Outer Limits" (on which he

 was assistant director) to both the original "Star Trek" and "Star

 Trek: The Next Generation" (on which he was associate producer and

 co-producer, respectively).  Many of the most familiar aspects of

 these programs were the result of his ideas, and he speaks

 candidly with the show's enigmatic host, Professor Neon, about the

 production of these programs in this fascinating interview. 



 Professor Neon has featured programs focusing on topics ranging

 from "Plan 9 From Outer Space" (with guest "Vampira" who starred

 in the classic cult film), to Forrest J. Ackerman (publisher of

 "Famous Monsters" magazine), to shows focused on topics from "The

 Twilight Zone" to "The Three Stooges". 



 The half hour Internet version of the program is being distributed

 biweekly on the Internet via the Internet Multicasting Service in

 Washington D.C., on the "Internet Town Hall" channel, and is also

 available as a file for retrieval by any Internet user from the

 many Internet Multicasting / Internet Talk Radio archive sites

 around the world.  Users retrieving the audio files can then play

 them on virtually any workstation, PC, Mac, or other computer

 with even simple audio facilities.



 The most recent show, as well as other information regarding the

 program, can also be heard by calling Professor Neon's TV & Movie

 Mania Machine" on (310) 455-1212.



 The Internet version of the show is freely distributable via

 computer networks and BBS systems.  Use by over-the-air

 broadcasters requires the permission of Vortex Technology.  For

 more information regarding accessing the show via the Internet,

 please use the contact below.  Inquiries regarding other access

 and versions of the show for broadcast use are also invited.



 CONTACT: Lauren Weinstein at Vortex Technology, Woodland Hills, CA.

          (818) 225-2800 (9:30-5:30 PDT)

          lauren@vortex.com



 Notes to Internet folks:



 Information regarding the show, including current guest schedule, etc.

 is also available via FTP from site "ftp.vortex.com" (in the "tv-film-video"

 subdirectory) or via gopher from site "gopher.vortex.com" (under the

 "TV/Film/Video" menu item).



 For a list of Internet Multicasting Service / Internet Talk Radio archive

 sites to obtain (via FTP) the audio file for playback, send a message

 (content is not important) to:



         sites@radio.com



 The debut of the Internet version of the show will run via Internet

 Multicast from Interop on Thursday, May 5.  FTP to site "ftp.media.org"

 or "www.media.org" for schedule information.  The audio file of the show

 should become available in the archive sites for retrieval within a few

 days, though exact timing is variable.  The filenames will probably

 be "mania1.au" for the audio and "mania1.txt" for the accompanying

 descriptive text file, though the archive maintainers may change

 the names at some point to fit their overall naming system.  If you

 have trouble locating the files after a few days, please let us know.

 If you have any other questions regarding the program, feel free to

 email or call.



 In two weeks, our interview guest for the next show will be Joel Engel, the

 author of the definitive Rod Serling biography: "The Dreams and Nightmares

 of Life in the Twilight Zone," and of the newly released and highly

 controversial new book, "Gene Roddenberry: The Myth and the Man

 Behind Star Trek."



 If you have any questions for Mr. Engel please email them to: 



    neon@vortex.com



 as soon as possible.  Thanks much!



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



.