💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JOAUC › jauc05.txt captured on 2022-06-12 at 13:02:21.

View Raw

More Information

-=-=-=-=-=-=-



  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically

  ======================================================================

  ISSN 1074-3111           Volume One, Issue Five         August 1, 1994

  ======================================================================

    

      Editor-in-Chief:               Scott Davis      (dfox@fc.net)

      Co-Editor/Technology:          Max Mednick      (kahuna@fc.net)

      Consipracy Editor:             Gordon Fagan     (flyer@fennec.com)

      Information Systems:           Carl Guderian    (bjacques@usis.com)

      Computer Security:             John Logan       (ice9@fennec.com)



      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC



      U.S. Mail:

      The Journal Of American Underground Computing 

      10111 N. Lamar #25

      Austin, Texas 78753-3601



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 IMPORTANT ADDRESSES - 

 ============================================================================

 To Subscribe to "TJOAUC", send mail to:              sub@fennec.com

 All questions/comments about this publication to:    comments@fennec.com

 Send all articles/info that you want published to:   submit@fennec.com

 Commercial Registration for Profitable Media:        form1@fennec.com

 Advertising Rates:                                   rates@fennec.com

 ============================================================================



 "The underground press serves as the only effective counter to a growing

 power, and more sophisticated techniques used by establishment mass media

 to falsify, misrepresent, misquote, rule out of consideration as a priori

 ridiculous, or simply ignore and blot out of existence: data, books,

 discoveries that they consider prejudicial to establishment interest..."



 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)

 

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 Contents Copyright (C) 1994 The Journal Of American Underground Computing

 and/or the author of the articles presented herein. All rights reserved. 

 Nothing may be reproduced in whole or in part without written permission 

 of the Editor-In-Chief and/or the author of the article. This publication

 is made available periodically to the amateur computer hobbyist free of

 charge.  Any commercial usage (electronic or otherwise) is strictly

 prohibited without prior consent of the Editor, and is in violation of

 applicable US Copyright laws. To subscribe, send email to sub@fennec.com



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 DISCLAIMER AND NOTICE TO DISTRIBUTORS -



 NOTE: This electronic publication is to be distributed free of charge

 without modifications to anyone who wishes to have a copy. Under NO

 circumstances is any issue of this publication, in part or in whole, 

 to be sold for money or services, nor is it to be packaged with other 

 computer software, including, but not limited to CD Rom disks, without 

 the express written or verbal consent of the author and/or editor.

 To obtain permission to distribute this publication under any of the

 certain circumstances stated above, please contact the editor at one of

 the addresses above. If you have intentions of publishing this journal

 in any of the ways described above, or you are in doubt about whether or

 not your intentions conflict with the restrictions, please contact the

 editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com

 This publication is provided without charge to anyone who wants it.

 This includes, but is not limited to lawyers, government officials,

 cops, feds, hackers, social deviants, and computer hobbyists. If anyone

 asks for a copy, please provide them with one, or mail the subscription

 list so that you may be added.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



  LET THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING ADVERTISE FOR YOU.



  Computer services, Online access, Books, Software, Video, Music, 

  Wierdness, Publishing, Hardware, Anything!



  For more information, send electronic mail to: rates@fennec.com

  You will be mailed a detailed list of rates and other information.

  

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



  COMING SOON!!!  The Journal's own World-Wide Web Home Page. You will be

  notified by mail when it is ready for use.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



     THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 5



                          TABLE OF CONTENTS



 1)  The Next Thirty Years:  Sociolegal Implications 

     Of The Information Technology Explosion                Steve Ryan



 2)  Advertising On The Net                                 Fawn Fitter

 3)  Availability Of TJOAUC; Overseas Fido Gateways         Editors

 4)  Cyberpasse Manifesto                                   Don Webb

 5)  AA BBS Convicted!                                      Anon News Svc

 6)  Open Platform Under Threat By Monopoly Interests       Anonymous

 7)  House Opens Vote Results; HR 3937                      Shabbir Safdar

 8)  High-Speed Internet Access Expanded; Minnesota         Dennis Fazio

 9)  Internet Access Now Available For All Minn. Teachers   Dennis Fazio

 10) Legion Of Doom T-Shirt Ad                              Chris Goggans

 11) White House Retreats On Clipper                        Stanton McCandlish

 12) Why Cops Hate Civilians                                Unknown

 13) Public Space On Info Highway                           Ctr. Media Ed.

 14) Software Key Escrow - A New Threat?                    Tim May

 15) Hoods Hit The Highway                                  Charlotte Lucas

 16) The Internet And The Anti-Net                          Nick Arnett



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



  The Computer Is Your Friend         -Unknown

  Send Money, Guns, And Lawyers       -H. S. Thompson



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                THE NEXT THIRTY TEARS:  SOCIOLEGAL IMPLICATIONS

                  OF THE INFORMATION TECHNOLOGY EXPLOSION



 By Steve Ryan (blivion@nuchat.sccsi.com)



  [EDITOR'S NOTE:  This is facinating reading! It is a college thesis

  written by an attorney who is a friend of the JAUC staff. Please

  keep in mind that it was written in *1980* and is a fantastic

  and accurate look into the future from his perspective in 1980.

  Feel free to mail the editors with any comments on this one and

  especially feel free to drop Steve a note with your opinions.]





 I do romance the law.  It's alive, it's vibrant, its' bubling. Every time 

 society tries something, we have new laws.



 --Hon. Jack Pope, Associate Justice Supreme Court of Texas



 INTRODUCTION



 The purpose of this paper is twofold.  First, an attempt is made to 

 acquaint the reader with current trends in computer technology which are 

 likely to have a major impact on American life in the forseeable future, 

 and to provide an overview of the staggering dimensions of the information-

 handling revolution now in progress.  Second, the response of the American 

 legal system to this explosive growth in the application of computer 

 technology is examined critically and areas of current and future legal

 concern are outlined.  No attempt has been made to provide an in-depth 

 legal analysis of the current state of the law in any single area;  

 the reader in search of such is reffered to the numerous excellent legal 

 periodicals presently published in this field.



 I.  DATA-HANDLING SYSTEMS OF THE FUTURE

 

 It is difficult to overstate the rapidity oand magnitude of the

 technological advances occurring every year in the data processing industry.  

 New developments and applications of those developments are announced with 

 bewildering rapidity.  Enormous amounts of dollars are poured into research 

 and development every year by the American data processing industry, and 

 the pace of change is so rapid that those who work with customers must keep 

 current or risk having their knowledge and skills become obsolescent within 

 a year or two.



 HARDWARE

 

 This near-exponential rate of technical progress can be quantiativley 

 expressed through several different conceptual "handles."  The number of 

 additions per second performed by computers in the U.S. every year grew by 

 three orders of magnitude (factor 1,000) between 1955 and 1965, and again 

 by the same factor in the decade 1965-1975.  This number appears to be still 

 growing at the rate of 100% per year.  Between 1955 and 1975 C. P. U.

 memory size shrank by over four orders of magnitude (factor 10,000) and 

 this trend continues.  Speed of operation has been rising more linearly, 

 at the rate of two orders of magnitude (factor 100) per decade, and the 

 ultimate limiting speed (dictated by the speed with which the electrical 

 impulses propagate through conductors) is still almost two and a one-half

 orders of magnitude away.  The cost of computer storage devices is plunging 

 at the rate of nearly three orders of magnitude per decade.  The density 

 with which intergrated circuit chips can be packed with electronic 

 components is now measured in the millions devices per square inch.  It 

 has been projected that during this decade the percentage of the gross 

 national product contributed by the data processing industry (broadly 

 defined) will outstrip that contributed by the auto industry.



 COMMUNICATIONS



 Similar advances have been occurring in the communications industry, 

 slashing the cost of maintaining computer-to-user and computer-to-computer 

 information links.  The major trends are development of satellite, fiber 

 optic, and laswer methods of data transmission.  As initially developed, 

 the cost to lease a 900-channel transponder on a satellite was between on 

 and one-half and two million dollars per year.  In the first half of this 

 decade , this cost is expected to drop to $250,000 per year.  The greatest 

 expense of satellite utilization is the cost of placing it in orbit; this 

 will become cheaper by at least this tak.  The new generation of satellites 

 launched by reusable shuttle will offer a greater number of data channels

 and perform switching functions as well as relay tasks; and all of this 

 greatly reduced cost.  Annual growth of data communiccations through the 

 middle of this decade is projected to be 35 percent.  Additionally, federal 

 deregulation of and new competitor entry into the communications industry 

 is expected to lower data communications costs in the future.



 ECONOMICS

 

 This author believes that the rapidly falling costs of computer hardware 

 and data links carry tremendous implications for the future.  Economic 

 barriers to computer utilization are falling, and the end result will be 

 an exlosive profilferation of small personal and business computers and 

 intelligent terminals in an incredible variety of application.  The 

 structure of business relations and transactions will change radically

 as corporate America discovers that they cannot afford not to utilize 

 the new technology.



 It will simply become bad business to process most transactions through 

 human hands and the mails in the form of paper of documents, when powerful 

 microprocessors having large memories are available for literally pennies 

 per chip.  Speed-of-light datalinks cheaply available for these machines 

 will eliminate time lags as a source of inefficiency and boost productivity.



 PERSONAL COMPUTING



 The same factors that make widespread use of data handling equipment 

 inevitable in the business world will also have the effect of placing 

 small, cheap computers by the millions in nonbusiness or personal 

 applications.  Computers are possibly the most versatile tool human beings 

 have ever invented to extend their capabilities.  Because they deal with 

 pure information, their potential applications are limitless, or rather

 limited only by the ingenuity of their users.  Nowhere is this more 

 evident than in the brand-new field of personal computers. For better or 

 worse, the personal computer revolution is upon us.  The first true 

 personal computer was brought out in 1974 by M.I.T.S. Corporation.  

 Baded on the Intel 8080 Comuter-on-a-chip, the Model T of microprocessors, 

 it was sold by mail in kit form for $420.00.  Customer response was 

 overwhelming, and M.I.T.S. was unable to to keep up with demand.  At the 

 time of this writing, six years later, the American consumer is the

 target of an enormous marketing effort for similar small computers mounted 

 by such corparate giants as Texas Instruments, Tandy Corp. (Radio Shack), 

 Sears & Roebuck, and a host of smaller competitors.  Clearly, these 

 corporations believe in the market for and future of home computing enough 

 to back their beliefs with large capital investments.



 The home computer, with appropriate interfaces and accessory hadware, can 

 play games, balance its owner's checkbook, optimize household energy usage, 

 play music, store information, show movies, do typing, draw pictures, 

 give its owner access to any database or other systems accessible by phone, 

 send mail, and let the cat out.  Some enthusiasts predict that the home 

 computer will remake our way of life as drastically as the automobiles, and

 will be the most explosive consumer product in human history, having a more 

 revolutionary effect than any other object ever sold.  it is also predicted 

 that home and personal uses of computers will dwarf the ordinary computer 

 industry within five or ten years, and will do IBM great economic harm by 

 destroying the IBM-fostered image of computers as enormous, centralized,

 horrendouly expensive machines requiring the services of a band of devoted 

 priest-programmers.  These things remain to be seen.  This author believes 

 that the most profound effects on American society created by the 

 microcomputer revolution will not be the result of dedicating small 

 computers to specific business and personal tasks but rather will result 

 from the ability of these countless small C.P.U.'s to communicate with

 one another economically.



 THE CONCEPT OF "THE NET"



 In recent years, as communication technology began to catch up with advanced 

 computer technology, a trend toward distributed computation has occured in 

 systems design.  Instead of a massive central computer linked to many 

 unitelligent I/O terminals, this new method of system architecture links 

 a number of central processing units into a network in which tasks can be 

 distributed to different locations for maximum efficiency in processing.  

 Networks are very efficient method of processing where the amount of 

 processing needed increases faster than the amount of data to be 

 transferred, and where a common specialized resouce is shared among 

 geographically desperesed end users.  Minicomputers linked into centralized

 computers in some applications, and they can be linked in such a manner that 

 individual minicomputers can fail without affecting the operational status 

 of the network.



 Given the above-forecasted situation of millions of small business and 

 personal computers linked by common inexpensive communications channels, 

 it is easy to see how a gigantic, highly flexible meta-network of 

 minicomputers could be said to exist.  The terms "network" and "distributed 

 processin" have customarily been used to refer to relatively small, 

 tightly interfaced groups of processors and are thus inadequate to use in 

 reference to such a huge complex of computers as would be formed by the 

 potential linkage of all the home and business computers of America.  

 Therefore the term "The Net" will be used in this paper to refer to such 

 a potential structure. This term has already gained currency with some 

 writers who are concerned with the social implicaitons of such an 

 electronic network.



 Persons who are fearful of suspicious of the advent of The Net for whatever 

 reason, and persons who doubt that such a broadly-based and widely linked 

 national (and transnational) EDP system wil become an operational reality 

 in the near future will no doubt be suprised and/or dismayed to learn

 that two private information utilities which demonstrate the feasibility 

 and usefulness of the Net concept are already on line and available to 

 minicomputer users today.  These are The Source and MicroNet, both about a 

 year old.  These services are accessed through telephone lines, which will 

 be the primary method of Net linkage until new technology make satellite-

 based or fiber optic linkage economically competitive with ordinary 

 landline and microwave channels.  Accessing these services augments the 

 computing power and usefulness of a home computer to and amazing extent. 

 By linking to a large mainframe, the small ones gain the power to program 

 in many languages ordinarily unavailable to them and gain the use of 

 utility programs such as word processors and text editors.  Large libraries 

 of generally applicable business and financial programs and data are 

 available to subscribers, as well as stock market information.  Also 

 available are game programs, UPI news wire service, New York Times news 

 service, and the New York Times Consumer Data Base, which abstracts over 

 60 publications.



 The flexibility and broad utility of even these fledgling Net Linkage 

 systems is demonstrated by other revolutionary services information 

 utilities offer.  The Source offers electonic mail service to its 

 subscribers; when users log on, the system notifies them of any messages 

 or mail it is holding for them.  Users of the Source can also call a program 

 named CHAT, which enables direct two-way between any users simultaneously 

 logged on.  MicroNet offers a fasicinating computerized version of CB radio 

 in which the user selects a numbered "Channel" which, in effect is a 

 "public airwave" of this small Net.  All users linked on the same channel 

 receive every message transmitted on that channel;  they can either join 

 the discourse or remain passive and watch the coversations of others on 

 their CRT.  A disadvantage is that like CB, two users cannot transmit on 

 the same channel simultaneously without mutual interference.



 The Source and MicroNet are privately operated for profit and charge the 

 subscriber for registration as a user and access time.  An alternative 

 mode of linking isolated home computers is provided by Computer Community 

 Bulletin Boards (CCBBS), of which there are well over one hundred operating 

 now in the U.S. These are free services operated by a variety of small 

 computer users and related organizations, and are rapidly growing in 

 popularity. Unlike the information utilities, which have phone exchanges in

 most large cities and therby spare their users high connect charges, CCBB 

 users must pay long distance charges unless the usefulness of CCBBs is 

 that no two-way communication is possible, only message posting within 

 the system.  The software package needed to establish a CCBB costs only 

 about $65.



 One final, rather ominous aspect of the commercial information utilities 

 is that it is required of applicants for user status to have a 

 Mastercharge or Visa card account for billing purposes. In other words, 

 person without identity in the presently existing credit subnet are denied 

 access to these new private Net components.  As the Net incorporates more 

 data-handling subunits into itself and becomes more ubiquitous in American 

 life, it may strike users as unfair and coercive to discover that routing 

 one's financial transactions through the Net is a necessary prerequisite 

 to enjoying certain limited uses and benefites of The Net.



 It is impossible to summarize or secribe all potential structures and 

 applications of the net likley to impact our society in the future because 

 of the amorphousness inherent in its conceptualization. For example, 

 although every EDP device capable of linking to the Net must be considered 

 a part of it, this linage may be "broad" or "Narrow": a sensitive 

 Government EDP file system with heavy security would be only narrowly

 accessible from other Net components, whereas an individual's personal 

 computer would of necessity be broadly accessible form almost all other 

 Net components because of the wide variety of functions it performs (mail, 

 entertainment access, retail buying and recordkeeping, phone message 

 functions, etc.).  As each new Net subunit goes online to the common Net, 

 that subunit must determine (1) what it wants from the rest of the Net, 

 and (2) what it is willing to make available to those who can now access

 it as part of the net.  Thus, considerations of function and security 

 determine what role each subunit will play in relation to The Net as a 

 whole, and these considerations will be different for each subunit.  

 The net must not be thought of as monolithic block of EDP devices joined 

 together, but rater as a vast and turbulent population of dicrete subunits 

 whose only common characteristic is a need for the efficient communication 

 and optimal use of EDP technology provided by The Net's linkage.



 The Net will be far more than a group of computers exchanging data and 

 software; widespread acceptance and utiliztion of Net linkage and 

 effieciency concepts will probably eventually result in the routing of 

 most current non-EDP methods of information transfer through the omnipresent 

 microcomputers. It will become inefficient and unnecessary to have a TV 

 set, or a newspaper, or a mailbox, or a radio in one's house when

 comprehensive Net access through an efficient, centralized home computer

 (whose sole design function is information handling) is just a keystroke 

 away.  One theme which home computer/Net enthusiasts frequently sound these 

 days is that the Net will solve the petroleum crisis by making ti largely 

 unnecessary for people to leave their homes.  Why drive to an office when 

 one can transact business, give a lecture, attend a class, generate 

 documents, transfer information, access a huge variety of data bases, and 

 receive all communications at one's home keyboard?  The Net has the 

 potential of becoming America's primary avenue of business and even social 

 interaction in the forseeable future.

 

 One troubling question occurs as we examin the social consequence of the 

 Net ethic of efficiency as the ultimate justification for change: what 

 happens to individuals who, for economic or personal reasons, cannot or 

 will not participate in the net society?  Unless non-net modes of 

 information handling are retained in all areas of Net pre-eminence, these 

 individuals run the risk of effectibely becoming non-persons.  One 

 solution to this problem would be govermental maintenece of free public 

 computer terminals, where those unfortunate enough to lack the cash or 

 hardware necessary for net access could perform the necessary interactions 

 with their electronic society.  Hopefully, net Participants will keep open 

 non-net channels of comminication to forestall the possiblity that the 

 information revolution will create two classes of American citizens: 

 Net-priviledged and invisible.  Property utilized, The Net can be 

 beneficial in countless ways.  But even if its use becomes a new norm,

 legal protection is necessary to ensure that no citizen suffers injury or 

 diadvantage as a result of failing to join The Net.  This writer believes 

 that economic considerations related to efficiency and the technology 

 revolution now occurring cannot fail to propel us willingly down the road 

 to a Net society, even in the face of the vague hostility most people feel 

 toward the increasing intrusion of computers into their lives.  The day

 may yet come when The Net is so central to American life that a person 

 excluded from access to it by State action might successfully argue in 

 court that his Constitutional rights to freedom of speech and assembly 

 have been effectively abrogated.





 II. AREAS OF CONTINUING LEGAL CONCERN



 PRIVACY



 Privacy will continue to be a controversial issue as computer technology 

 increases in impact on the daily life of Americans.  The magnitude of the 

 perceived threat to individuals created by computer recordkeeping will 

 increase as the system-to-system network of computer linkages expands.  

 The scope of future Federal protective legislation will almost certainly 

 extend to regulate private data collectors as well as governmental ones.



 Efforts have already been made in this direction. In 1974, Congressional 

 legislation was proposed containing provisions making all private personal 

 record systems subject to F.O.I.A.- type controls on collection, accuracy, 

 and dissemination.  This bill also set up a Federal Privacy Board to 

 monitor and enforce its provisions, and provided criminal penalties for 

 its violation as well as vibil remedies for persons injured by unfair 

 information practices.



 The gradual development of a Net-Type structure of data processors and 

 their associated databases will surely result in extreme public concern 

 about its possible harmful uses.  It is thus a certainty that such a 

 system would be very heavily regulated by the congress under its commerce 

 and "federal media" powers.  In fact, it is impossible to conceive of how 

 the public would tolerate the existence of such an intimidating system 

 without detailed privacy controls on it.  The Privacy Act of 1974 is only 

 the first halting step toward the creation of a comprehensive code of fair 

 information practices necessary to let Americans enjoy the benefits of 

 advanced computer technology without fear.





 PROTECTION OF ECONOMIC INTERESTS



 Since copyright protection of proprietary computer software is inadequate 

 to protect novel ideas and algrorithms incorporated therein, and since 

 the patenablility of software has been effectively denied by Supreme Court 

 ruling, further protection of substantial financial investments made in 

 the development of software would seem to be necessary in the future.  

 Common law and State statutory protection of such programs as trade secrets 

 will probably be inadequate in many respects to afford the degree of 

 protection necessary to encourage heavy corporate investment in software 

 research and development, as the industry grows in importance to all areas 

 of economic life.  Public policy will militate that further protection 

 be granted by explicit statutory means. The most logical way to go about 

 this would be by act of Congress, under either of the broad copyright or 

 commerce powers.



 Congress has already realized that the trend toward the use of Electronic 

 Funds Transfers and the computerization of economic activity will present 

 unknown problems in the future.  Current EFT legislation in force has 

 established a commission charged with the duty of evaluating the future 

 development of this area and reporting to the congress its findings and 

 conclusions.  Present legislation concering EFT can only be considered a 

 skeleton of what will eventually prove necessary.





 THE PROBLEMS OF ABUSE AND VULNERABILITY



 The wide linkage capabilities of the components of The Net coupled with 

 the computerization of business records and transactions creates an 

 enormous potential for abuse in a variety of ways.  Theft of CPU time and 

 software, manipulation of financial records, destruction of datafiles, 

 and even sabotage of whole systems are just a few of the potential abuses 

 that might occur.  Computer people often see the compromise of a security 

 system designed to prevenet unauthorized access as a challenging 

 intellectual game, and try it even without criminal motive.  Already, one 

 consequence of wide use of timesharing and networking techiniques is the 

 widespread acceptance of the ethic that any programs which may be found to 

 be somehow accessible from remote terminals can be treated as used as if 

 in the public domain (the "Peninsula Ethic").  Security problems are the 

 number-one concern in the design and establishment of The Net.  The Net 

 concept is unworkable without means of controlling access and limiting

 possible manupulations of data contained in Net subunits.  Due to its 

 flexibility of linkage, security control in the Net will not be physical 

 in nature but will be provided by confidential coding and password 

 techniques.  Although generally speaking, what one person can do, another 

 can undo, new "trapdoor" cryptological techniques have been discovered

 that make it possible to create an access control code system that cannot 

 be cracked even by computers in a reasonable amount of time.  This offers 

 hope for the feasibility of a fairly abuse-free Net.



 Still, no security system can be said to be totally proof against 

 compromise.  Prevention of abuse is the job of computer sercurity 

 specialist, but the law can play a large role in discouraging abuse by 

 imposing sanctions for it.  The currecnt Federal criminal law provisions 

 applicable to computer abuse are a hodge-podge of miscellaneous statutes 

 generally oriented around traditional fraud and misappropriation-of-

 property concepts that often present difficulties in application to 

 computer-related wrongful activity.  In the future it will become necessary 

 to greatly refine our collective societal concepts of what contitutes 

 impermissible conduct in relation to computers and their manifold 

 applications.  The deterrent effect on persons tempted to misuse the vast 

 capbilities of computers would be greatly enhanced by the passage of 

 legislation targeted specifically at computer abuse rather than framed in 

 terms of traditional concepts of wrongdoing like fraud, theft, and 

 misappropriation.  Prosecutors, when confronted by an instance of computer 

 abuse that clearly has damaged someone in a criminal manner, should not be 

 forced to search among and "stretch" the applications of the miscellaneous 

 batch of statutory provisions enacted when computers were a laboratory 

 curiosty.



 Response to this problem has been made be Senator Abraham Ribibcoff of 

 Connecticut, the Charman of the Senat Governmenatal Affairs Committee.  

 In 1977, he sponsered legislation entitled The Federal Computer Systems 

 Protection Act of 1977,which has never been enacted.  This proposed law 

 provides comprehensive santions against (1) introduction of fraudulent 

 records into computer systems, (2) improper alteration of destruction of 

 computer records, (3) unauthorized use of computer facilities, and (4) use 

 of computers to steal property of data.  The bill was drafted to apply to 

 all computer systems used in interstate commerce, and not just those in

 use by the Federal Governmet.  Additionally, the measure eases the 

 jurisdictional and evidentiary burdens on prosecutors that make prosecution 

 of computer crime so difficult. Specific thought was given by the framers 

 of this legislation to the problems of unauthorized access and to the need 

 to assure the integrity of the growing EFTS network.  This bill is an 

 outstinding attempt to deal now with the computer abuse problems that will 

 become increasingly more threatening in the future, and it is an excellent 

 example of how the response of the legal system should aggressively track 

 the pace of technological development.



 CONCLUSION



 The next thirty years will be a time of swift and revolutionary change in 

 American life related to computer usage on an uprecedented scale.  At this 

 point in time, the emerging outline of the social and legal changes this 

 will inevitably cause are visible.  The first halting steps have been

 taken by congress to enact legislation dealing with the problems caused 

 by these changes, but the pace of progress is so rapid that there is 

 substantial time lag between the time a problem comes into existence and 

 the time our legal system turns its attention to the necessary solution.  

 This lag time must be reduced by increased awareness of the capabilities

 and coming applications of computers on the respective parts of legislators, 

 attorneys, and judges; it is the duty of the legal system to serve the 

 needs of its society, and our society cannot wait until tomorrow to be 

 given the legal safeguards and processes it needs today in the area of 

 data processing.

      

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                         ADVERTISING ON THE NET



 By Fawn Fitter (fsquared@netcom.com)

 This article is copyright 1994 by Fawn Fitter



 A cybersavvy business owner could be forgiven for thinking of the 

 Internet as an advertising opportunity like no other. After all, the Net, 

 with its 6,000 discussion groups known as "newsgroups," connects -- at 

 last count -- 2 million sites in 60 countries. That's 10 million 

 potential customers already self-sorted into 6,000 demographic slots, a 

 thought to make marketing executives weep with joy. 

 

 But while many commercial online services like CompuServe and Prodigy 

 have built electronic shopping malls where virtual vendors peddle their 

 wares, advertising is a touchy subject on the Internet itself. 

 

 Originally, commercial messages were banned on the government-funded 

 portions of the Net. Today, while they aren't forbidden, they are still 

 highly controversial. A practice known as "spamming" -- posting a message 

 to all 6,000 newsgroups at once -- has infuriated longtime citizens of 

 cyberspace.

 

 Not long ago, two Phoenix attorneys "spammed" the Net with a long post 

 touting their expertise in U.S. immigration law. Mere weeks later, 

 another advertiser followed suit, shilling thigh-reducing cream in every 

 group from alt.pagan to comp.sys.mac.advocacy. Both were kicked off their 

 respective Net access providers for inappropriate use.

  

 "The problem is not content, it's the appropriateness of the forum where 

 the ad appears," explained Mike Godwin, staff counsel for the Electronic 

 Frontier Foundation, which focuses on public interest and civil liberties 

 issues as they relate to computer communications. "The value of the 

 newsgroups lies in their being organized by subject matter. 'Spamming' is 

 like reshelving all the books in a library -- the information is there, 

 but it's impossible to find what's valuable."

 

 Although indiscriminate salesmanship is frowned upon, there are still 

 ways to advertise online without crossing the bounds of netiquette. The 

 simplest way is to keep ads short and tasteful, indicate in their subject 

 headers that they are advertisements so people can skip them if they so 

 choose, and post them only to appropriate groups. In other words, a legal 

 advice newsgroup is the wrong place for an ad for couples workshops.

 

 Signature files, which provide a tagged-on signature (or .sig, pronounced 

 "dot-sig") at the end of a user's post, are another inoffensive and 

 discreet way to promote a product or service provider. Many programmers 

 and consultants identify themselves in their .sigs, which are 

 automatically appended to their every post in any group they frequent.

 

 The now-infamous "green card lawyers" have been dumped unceremoniously 

 from several online systems and have been refused accounts by others. 

 Despite the furor against them, they've defended their actions in 

 postings and newspaper articles by claiming that mass-distributed 

 advertising on the Net is convenient and therefore inevitable. They've 

 even started their own Internet marketing company, Cybersell, to bring 

 that day closer. One of the lawyers argued on CNN that "spamming" was 

 like "picking up the newspaper and getting advertisements along with the 

 sports pages."

 

 But Howard Rheingold, author of The Virtual Community and a well-known 

 defender of the Net, thinks it's more like "going to your mailbox and 

 finding two letters, a magazine, and 65,000 pieces of junk mail, 

 postage-due."

 

 The Net works because people agree to give each other the minimal amount 

 of cooperation necessary to keep information flowing in a free but 

 organized way, Rheingold explained. "IIf people don't abide by an 

 agreement to limit discussion to the appropriate group, the groups lose 

 their function, and there will be no value in the system any more," he 

 said. But, he added, "the day will pass when sleazebags who try to take 

 advantage of the openness of the system will be shut out."

 

 Rheingold is executive editor of HotWired, an online magazine being 

 launched this fall by the publisher of WIRED. HotWired will bring in 

 revenue by soliciting "sponsors" rather than "advertisers," as the Public 

 Broadcasting System does, he said.

  

 In the future, advertisers may also spread the word by subsidizing 

 people's net usage, Godwin said. "They may say, 'look at our ads in 

 e-mail and we'll give you an hour's free online time'," he speculated. 

 "No one's actually done it yet, but companies are thinking about it."



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                      AVAILIBILITY OF THIS MAGAZINE

                   A Message from the editorial staff



      OVERSEAS FIDONET GATEWAYS NO LONGER SUPPORTED BY THIS MAGAZINE!



   We will do everything in our power to get this publication to you in

 a timely manner. And we certainly appreciate the hundreds of subscription

 requests that we have received. There is one slight issue regarding the

 distribution of this magazine that we must address. This new policy will

 take effect immediately.



 It is no longer feasable for us to add people to the mailing list who have

 OVERSEAS FIDONET GATEWAYS. The reason for this is that some administrators

 who operate these gateways are getting irate with the amount of traffic

 coming through their systems from the USA in the form of large electronic

 magazines. 



 AS LONG AS YOUR E-MAIL ADDRESS DOES NOT HAVE A "%" IN IT, YOU'RE OK!



 The second reason is that our mailing system may not handle the address

 line properly due to the fact that Fido addresses overseas are usually

 very long.



 We are currently working on a way to set up an automatic mailing list

 for those who do fit into this catagory so that you can have the magazine

 mailed back to you when you know that the traffic in your area will be low.

 We will update you as the situation develops.



 Thank you for your understanding.

 

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                           CYBERPASSE MANIFESTO



 By Don Webb (0004200716@mcimail.com)

 This has no Copyright, and may be reposted at will.



 We have long awaited the moment to release our manifesto, so that we would 

 not appear guilty of the sin of vanguardism.  Since Bart Nagle has noted 

 that book publishers now note books bearing the suffix "Cyber" in the 

 title passe, we realize that it is time to strike while the iron is cooling.  

 The Cyberpasse movement began on October 8, 1966 when the BBC aired *The 

 Tenth Planet* -- part of their popular %Dr. Who% series.  The Cybermen have 

 replaced their natural bodies with plastic and thus have become disease free 

 and nearly immortal.  They represent the ideal of the Cyberpasse movement.  

 Cyberpasse will overtake cyberpunk, because we created it as a front.  

 The movement has great wealth and power, and is an open conspiracy.  Any

 number may play, provided that they obey the Cyberlaws.  We are the rulers 

 of the world, the makers of the zeitgeist, and the oatmeal of reality.

 

 These are the Cyberlaws, the key to Cyberpasse:

 

 1.  You must own a computer.  It must be a boring computer with lots of 

     capacity for upward and downward networking.  You favorite phrase is 

     "The computer is a tool." You must pretend incompetence with your 

     computer, so that people explain things for you, and do things for you. 

     Thus you learn to tap the skills of lots of experts.

 

 2.  You must belong to a frequent flyer plan.  You'll travel a lot to see 

     other Cybermen.  You must own a futon to put up traveling Cybermen.  

     You must make your visitors look as boring as possible, so as not to 

     tip off your neighbors that you are a planetary ruler.

 

 3.  You must appear dull.  This is essential.  Everyone must view you as a 

     harmless amateur.  You must practice perfect manners, so you don't get 

     thrown out of places for being too dull.

 

 4.  You must foster a myth of a long-term illness. 

     Thusly you can call in sick for work, whenever a learning opportunity 

     presents itself.  Knowledge is power.

 

 5.  You must You must place yourself in the middle of various webs of 

     information.  Always share information, but always filter to extend 

     the Cybervalues of logic, and of slow and steady change.  You must deny 

     that you are trying to improve the world, as always appear to be a 

     shambling slow witted machine that just happens to pass along the

     correct information at one time.  Remember humans are hostile to change 

     agents.

 

 6.  You must make sure that they're a lot of cutting edge movements around 

     to draw fire.  As a long term way to secure this, be sure and strongly 

     support civil liberties issues.

 

 7.  You must always deny the importance of new information technologies. 

     This is not to stifle, but to make people think they are harmless. Always 

     argue that there is nothing new going on.  This will make people, less 

     likely to fear/resist certain changes.

 

 8.  You must act every day to bring about the change into a cybersociety.  

     Each act must may be downplayed, but it must be constant and quiet.  

     Accumulate power to make your actions a little stronger.  Afterall the 

     boss can OK the T1 phone lines for the business, and she can allow

     personal Email accounts.  Always have a boring explanation, economy, 

     efficiency, whatever.  But be sure you never allow a step backward.

 

 9.  You must deny there is an organized Cyberpasse movement.  Even to 

     yourself.

 

 10.  You must seek allies in all areas of society. 

  

 11.  You must never act in anger, but only with logic

      and harmonious feelings.  Our battles are not the day to day battles 

      of the news.  Our battle is that of the vegetable empire vast and slow.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                           AA BBS - CONVICTED !



 MEMPHIS, Tenn -- A federal jury convicted a California couple Thursday 

 of transmitting obscene pictures over a computer bulletin board.



 The case has raised questions, in this age of international computer 

 networks, about a 1973 U.S. Supreme Court ruling that defines obscenity 

 by local community standards.



 ``This case would never have gone to trial in California,'' defense lawyer 

 Richard Williams said.



 Prosecutor Dan Newsom, an assistant U.S. attorney, said the trial was the 

 first he knows of for computer bulletin board operators charged under federal 

 law with transmitting pornography featuring sex by adults.



 Robert and Carleen Thomas, both 38, of Milpitas, Calif., were convicted of 

 transmitting sexually obscene pictures through interstate phone lines via 

 their members-only Amateur Action Bulletin Board System.



 The Thomases were convicted on 11 criminal counts, each carrying maximum 

 sentences of five years in prison and $250,000 in fines.



 Thomas was acquitted on a charge of accepting child pornography mailed to him 

 by an undercover postal inspector.



 The Thomases refused to comment after the verdict. They remain free on 

 $20,000 bond to await sentencing, for which no date was set.



 Williams said his clients will appeal, arguing the jury was wrongly 

 instructed on how to apply the Supreme Court's standard on obscenity.



 The trial raised questions of how to apply First Amendment free-speech 

 protections to ``cyberspace,'' the emerging community of millions of 

 Americans who use computers and modems to share pictures and words on every 

 imaginable topic.



 Williams argued unsuccessfully before trial that prosecutors sought out a 

 city for the trial where a conservative jury might be found.



 During the weeklong trial jurors were shown photographs carried over the 

 Thomases' bulletin board featuring scenes of bestiality and other sexual 

 fetishes. Williams argued this was voluntary, private communication between 

 adults who knew what they were getting by paying $55 for six months or $99 

 for a year.



 Their conviction also covers videotapes they sent to Memphis via United 

 Parcel Service. The videotapes were advertised over the bulletin board.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



          OPEN PLATFORM UNDER THREAT BY MONOPOLY INTERESTS!!!



 Anonymously Submitted



 First off, I apologise for sending this anonymously, but my company is

 sufficiently close to the center of this dispute that the usual personal

 disclaimers would not be enough.  We have to do business with these people

 and public criticism of them could lead to disconnexion and the collapse of

 our business. 



 Recently the CIX Association (a Non-Profit 501(c)6 Trade Association) has

 chosen to make a change to its policies that will make entry into the

 internet extremely hard if not impossible for small companies or individuals

 or cooperatives. 



 Some background:  first there was the Arpanet, and it was for government

 organizations and academics only.  Slowly, private companies attached to the

 Arpanet, but only when they had legitimate reasons to communicate with the

 government organizations they connected to.  Soon, enough private

 organizations were connected that they saw advantages in talking to each

 other, and they put in direct links to each other because they couldn't

 transit the NSF backbone.  Sometimes the connexion agreements for these

 links were informally ad-hoc, other times the people connecting would come

 to a 'settlement agreement'.  This meant that at the end of each year, they

 would work out the net flow of traffic over their link, and the side that

 got the most benefit from it was contracted to pay the other side a cash

 settlement.  



 There were the bad old days, and getting full connectivity to non-academic

 sites by making lots of individual connexions was expensive.  



 Then along came the group of big companies who formed the CIX.  They wrote a

 contract that said that members would route each others packets without

 settlement.  People still made their own arrangements about who they

 physically connected to, and their share of the cost of the wire etc, but

 once connected, they could send packets to _anyone_ who was a

 mutually-connected CIX member.  And just to make sure there weren't pockets

 of unconnected members, every member had also to make sure they had a

 working path to the CIX backbone.  That way A could talk to B even if it

 meant going all the way to the CIX backbone in Falls Church VA.  



 In fact, most of the big vendors have direct connexions to each other, and

 the CIX backbone itself is seldom transited.  It's not an expensive or long

 wire--just a couple of routers in Falls Church.  



 Now, the arrangement that CIX has decided to enforce as of November is that

 they will route for their clients, and people directly connected to their

 clients, but not people a step further downstream than that.  Which means

 that the clients of CIX clients who re-sell services will have to become

 members of the CIX themselves, at a cost of $10000. 



 This isn't small change for the majority of sites that it affects, and it is

 particularly insidious in that it halts completely the process that was

 beginning to take place where bandwidth would be split into smaller and

 smaller units by smaller and smaller enterprises, until you got down to the

 level of a guy in his garage running 6 modems on his PC allowing access to

 local people over his SLIP or PPP line to his own access provider down his

 v.fast modem, that would be a small company running a 56K line up to their

 access provider, who might be a medium company running a T1 to a big

 provider. 



 With this change in policy, "Mom & Pop" internet connexions are no longer

 possible.  The game is for big players only.  And I mean BIG--calculations

 show that to reach break-even, a new vendor needs something like 400

 customers from the start.   



 The CIX board justifies their change in policy by claiming it will actually

 increase mutual interconnectivity, by adding more people to the communal

 interoperability agreement.  However, the facts are that the downstream

 sites who are affected by this would have routed all packets going through

 them anyway.  It is, quite simply, an attempt by the big players to lock the

 small players out of the market, to consolidate their oligarchy.  And the

 fact that they'll be collecting many many more $10,000 annual fees has not

 gone unnoticed either. 



 This is one area where government interference _to ensure interoperability

 only and to stop restrictive practises_ would be welcome by we smaller

 players.  All that the CIX contributes is a piece of paper saying that

 people will cooperate--the cost of their hardware is small beer.  People

 who are in the CIX have an incentive to stay in because it keeps the

 competition out.  People outside the CIX _could_ make their own mutual

 care because we can afford the fees (almost), and

 it keeps out up and coming competitors.  I don't feel this way, which is why

 I'm posting, and why I have to post anonymously.  But then, I don't own the

 company.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



          HOUSE RULES VOTE RESULTS; HR 3937 A DEAD END THIS YEAR



 By Shabbir J. Safdar (shabbir@panix.com)

 Organization: Voters Telecomm Watch (vtw@vtw.org)





 INTRODUCTION



 Voters Telecomm Watch keeps scorecards on legislators' positions on 

 legislation that affects telecommunications and civil liberties.

 If you have updates to a legislator's positions, from either:



        -public testimony,

        -reply letters from the legislator,

        -stated positions from their office,



 please contact vtw@vtw.org so they can be added to this list.



 General questions:      vtw@vtw.org

 Mailing List Requests:  vtw-list-request@vtw.org

 Press Contact:          stc@vtw.org

 Gopher URL:             gopher://gopher.panix.com:70/11/vtw

 WWW URL:                We're working on it. :-)



 RESULT OF THE HOUSE RULES COMMITTEE VOTE ON HR 3937



 Based on information gathered by volunteers, we've been able to

 piece together some of the positions of the House Rules Committee

 as to how they voted for/against opening up HR 3937 to amendments on

 the House floor.  [This is now somewhat moot, as is explained in the

 next section.]



 Extensive kudos go to

        Joe Thomas <jthomas@pawpaw.mitre.org>

        gaj@portman.com (Gordon Jacobson)

 who both did extensive work to help find this information.



 Here are the results we were able to obtain:



        [The committee voted 5-4 to open the bill]



                HOUSE RULES COMMITTEE MEMBERS



   Dist ST Name, Address, and Party       Phone            

   ==== == ========================       ==============  

      9 MA Moakley, John Joseph (D)       1-202-225-8273  

        UNSPECIFIED POSITION



      3 SC Derrick, Butler (D)            1-202-225-5301 

        UNSPECIFIED POSITION



     24 CA Beilenson, Anthony (D)         1-202-225-5911

        UNSPECIFIED POSITION



     24 TX Frost, Martin (D)              1-202-225-3605 

        UNSPECIFIED POSITION



     10 MI Bonior, David E. (D)           1-202-225-2106

        UNSPECIFIED POSITION



      3 OH Hall, Tony P. (D)              1-202-225-6465

        UNSPECIFIED POSITION



      5 MO Wheat, Alan (D)                1-202-225-4535

        UNSPECIFIED POSITION



      6 TN Gordon, Bart (R)               1-202-225-4231

        UNSPECIFIED POSITION



     28 NY Slaughter, Louise M. (D)       1-202-225-3615

        Voted "open"



     22 NY Solomon, Gerald B. (R)         1-202-225-5614

        Voted "open"



      1 TN Quillen, James H. (R)          1-202-225-6356

        Told a constituent he would vote for "open".



     28 CA Dreier, David (R)              1-202-225-2305

        UNSPECIFIED POSITION



     14 FL Goss, Porter J. (R)            1-202-225-2536

        UNSPECIFIED POSITION



 It is probably not worth the trouble to ask the remaining legislators

 how they voted unless you happen to chat with their staff often. 



 STATUS OF THE BILL (updated 7/21/94)



 If you read the appropriate newsgroups (or any major newspaper) you've

 seen the news about the Gore/Cantwell compromise.  Since everyone

 has reprinted it already, we'll not reprint it again, though we'll

 happily send you a copy should you have missed it.



 The upshot of this is that Rep. Maria Cantwell will not be offering

 her amendment and therefore HR 3937 is a dead end this year for

 liberalizing cryptography exports.  Since VTW is an organization dedicated

 to working on legislation, and there is no longer a piece of relevant

 legislation, we will be concentrating on other projects.  The "cantwell"

 section of our archive will be reworked, and the records of legislators

 that voted will be kept there for future reference.  [NOTE: these

 voting records will also be rolled into our 1994 Voters Guide]



 Here is the final schedule/chronology of the bill



 Jul 21, 94  Rep. Cantwell and Vice Pres. Al Gore compromise on seven

             principles, retreating on the Clipper chip; Rep. Cantwell

             chooses not continue to press the legislation or the amendment

             (see relevant articles in today's NY Times and Washington Post)

 Jul 20, 94  HR3937 comes to House floor; a "good" amendement will be offered

 Jul 11, 94  House Rules Committee marks HR3937 "open"; allowing amendments

 Jun 30, 94  [*** vote postponed, perhaps till the week of 7/11/94]

             House Rules Comm. decides whether to allow amendments

             on the bill when it reaches the House floor 

 Jun 14, 94  Gutted by the House Select Committee on Intelligence 

 May 20, 94  Referred to the House Select Committee on Intelligence 

 May 18, 94  Passed out of the House Foreign Affairs Committee on May 18

             attached to HR 3937, the General Export Administration Act

 Dec  6, 93  Referred to the Subcommittee on Economic Policy, Trade and

 Nov 22, 93  Referred to the House Committee on Foreign Affairs.



 1994 VOTERS GUIDE



 Voters Telecomm Watch believes that you should be informed about your

 legislators' positions on key issues.  We will be developing a survey

 to give to current legislators and their challengers that will gauge

 their positions on key issues involving telecommunications and civil

 liberties.  These results will be made publicly available on the net

 for you to use in casting your vote in November.



 We'll be depending on you to help get legislative candidates to fill

 out and return their surveys.  Please watch this space for the

 announcement of survey availability in the coming weeks.



 If you wish to participate in the development of the survey, feel free

 to join the working list by mailing a note to that effect to 



                       vtw@vtw.org



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



      HIGH-SPEED INTERNET ACCESS EXPANDED THROUGHOUT MINNESOTA



 By Dennis Fazio (dfazio@mr.net)



 Contact:

 Dennis Fazio, Executive Director

 Minnesota Regional Network

 511 11th Avenue South, Box 212

 Minneapolis, MN 55415

 (612) 342-2890

 dfazio@MR.Net



 Minneapolis, MN, July 18, 1994 -- The Minnesota Regional Network (MRNet), a

 nonprofit corporation that provides connections to the burgeoning world-wide

 Internet in Minnesota, has implemented a major statewide expansion by

 installing several additional access sites around the state using a new data

 transport technology called Frame Relay. This new technology is available as

 a regular service by US West?s !nterPRISE Networking Services division. It

 allows MRNet to expand its central hub sites, which are locations where many

 customer connections are gathered together, to the four corners of

 Minnesota, providing a more economical means of connection for colleges,

 schools, libraries, government agencies and businesses in any city or town

 in the state.



 The Internet, a high-speed network of networks, is a current major component

 of what is coming to be called the "Information Superhighway". It is

 composed of a multitude of computer and information networks including

 international links, national backbones, regional and state distribution

 networks and campus or corporate networks. These are all connected in a

 seamless whole creating an information infrastructure containing several

 million individual computers used by ten to twenty million people around the

 globe. In Minnesota, the Minnesota Regional Network or MRNet, is the primary

 statewide distribution network for Internet access.



 "The deployment of these new network switching technologies has the

 potential to revolutionize the creation of wide-area networks," says Dennis

 Fazio, Executive Director of MRNet. "It has reduced the cost of providing

 high-speed connections to customer sites, not only within the US West Frame

 Relay service areas, but even in the outlying towns beyond the suburbs and

 in between the major state metropolitan areas." 



 Previously, point-to-point phone circuits had to be connected and expensive

 multi-port hub equipment installed in hub sites. Frame Relay service allows

 MRNet to install smaller less complex and less expensive equipment since the

 aggregation of traffic from multiple customer connections is done within US

 West?s switching equipment. It is necessary to only have a single connection

 from the hub site into the Frame Relay service. Additionally, the end-site

 connection links are less expensive, since they now only need a termination

 point at the customer's site. The other end of the link is brought directly

 into the Frame Relay system and doesn?t incur any termination charges, which

 are the most expensive portion of a digital circuit. This means that it is

 now more economical to cover the entire state by extending links to the

 nearest Frame Relay service area than it is to distribute many more hubs to

 cover the large number of communities necessary to provide full state-wide

 access. Finally, Frame Relay service is a much higher quality of service,

 since all links are monitored and maintained 24 hours a day by US West?s

 advanced engineers and technicians.



 With this new expansion, MRNet can provide lower cost direct Frame Relay

 access in Duluth, Hibbing, Thief River Falls, Bemidji, Brainerd, Moorhead,

 Willmar, St. Cloud, Marshall, Owatonna and Rochester in addition to the Twin

 Cities metro area. Those towns outside these areas can be served by

 extending a link to one of these 12 distributed sites. 



 MRNet has established partnerships with the University of Minnesota in the

 Twin Cities and Duluth and the Minnesota State University System to share

 long distance trunk lines, which bring the outstate traffic to the Twin

 Cities for forwarding to the Internet, and to obtain space to house

 equipment.



 Beyond this initial new deployment, plans are being put in place to expand

 local calling access for dialup subscribers in other parts of the state.

 This will provide lower-cost links to the Internet for individuals and small

 organizations who cannot yet justify the effort and expense of a high-speed

 digital link. Presently, local calling access is available in the Twin

 Cities, Rochester and St. Cloud. Toll-free access is already available to

 Minnesota educators in all parts of the state through the InforMNs

 demonstration project, a joint effort implemented by MRNet, TIES and the

 Minnesota Department of Education. This effort is partially subsidized by

 the state to provide equal access to all state educators. There are now

 about 1,000 subscribers on the InforMNs system. 



 The ability to provide this state-wide network expansion was helped in part

 with funds from the National Science Foundation via a grant to CICNet, a

 regional network comprised primarily of the Big-10 Universities in which

 several state networks including Minnesota, Wisconsin, Iowa, Illinois,

 Michigan and Indiana participated. This was a for a project titled "Rural

 Datafication" whose purpose was to extend Internet access to areas not

 easily served in the major metropolitan areas. 



 The Minnesota Regional Network is an independent member-based nonprofit

 corporation that has been providing access to the Internet since 1988. Its

 mission is to enhance the academic, research and economic environment of the

 state through the use of computer and information networks. It is the

 leading provider of Internet access in Minnesota and now has more than 100

 colleges, universities, libraries, school districts, nonprofit

 organizations, government agencies and businesses listed as connected

 members. Additionally, over 250 individuals and small organizations or

 businesses have access via various forms of dialup connections. MRNet works

 cooperatively with the state?s higher education community, the state

 government and several other service organizations of all types to expand

 and increase the level and quality of world-wide network access for the

 improvement of education, general research and commercial business

 operations.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



       INTERNET ACCESS NOW AVAILABLE FOR ALL MINNESOTA TEACHERS



 By Dennis Fazio (dfazio@mr.net)





 MINNEAPOLIS-ST. PAUL, MN, July 24, 1994 -- Nearly 1,000 Minnesota teachers

 are cruising the information superhighway this summer via InforMNs -

 Internet for Minnesota Schools, a service offered to K-12 educators

 throughout the state.  Using the direct full-function access to the Internet

 that InforMNs provides, teachers browse through on-line databases and

 library catalogs around the world; they have access to U.S. government

 information from a number of agencies including NASA, the Department of

 Education, and the National Institutes of Health; and they share lesson

 plans, ideas for more effective teaching, and thematic classroom activities

 with other teachers and students. 



 For instance, the Wolf Studies Project of the International Wolf Center in

 Ely, Minnesota allows students and teachers around the world to hear, see,

 and track radio-collared wolves in the Superior National Forest via the

 Internet.  They can read reports, see pictures and video images, and hear

 sound files about the wolves' movement and activity that are posted on the

 Wolf Studies Project Gopher server.  In another project, students and

 teachers in Minnesota have been exchanging electronic mail with their

 counterparts in Kamchatka, Russia for the past year.  This August the

 Kamchatka Ministry of Education is sponsoring the Second Annual Educational

 Travel Seminar to the Russian Far East with the help of the Minnesota

 Global Education Resource Center.  These kinds of resources and activities,

 and the communication that happens between people, are what make the

 Internet what is -- a worldwide network of computers, resources, and the

 people that use them.



 InforMNs is available to teachers, administrators, and staff from any

 school district, public or private, in Minnesota.  Subscriptions run for a

 12-month period and can start at any time.  The fee is $20 per month, paid

 annually, and provides up to 30 hours of toll free access per month. 

 Software, user guides, and a toll free helpline for on-going support are

 included.  In addition, the InforMNs service provides one day of training

 for one person in each subscribing school building to prepare that person

 to give on-site assistance to his or her colleagues.  To subscribe or for

 more information, call InforMNs at (612) 638-8786 or send email to

 howe@informns.k12.mn.us.  



 InforMNs is funded in part by an appropriation from the state legislature

 to the Minnesota Department of Education (MDE) to provide Internet access

 to all Minnesota schools.  The appropriation subsidizes the cost of

 providing the service so that toll free dial-up access is ensured from any

 school in the state, regardless of its location.  Of the 1,000 subscribers,

 approximately half connect to the network via local calls in St. Cloud,

 Rochester, and the Twin Cities, and half use the InforMNs 800 toll free

 access number.  



 In addition to toll free access, InforMNs subscribers receive all the

 software they need to connect their Macintosh or IBM-compatible personal

 computers directly to the Internet.  After making a dial-up connection with

 an ordinary phone line and a modem, the InforMNs user's computer becomes

 one of the estimated two million computers now on the Internet worldwide. 

 This method of connection differs from the more familiar link to a bulletin

 board system or on-line service like Compuserve, where the user's access to

 the Internet is relayed through a central computer operated by the bulletin

 board owner or on-line service provider.  The InforMNs direct connection

 allows teachers to use all the features and resources available on the

 Internet including news groups, discussion lists, electronic mail,

 Gopher-organized resources, the World Wide Web, and file transfer. 

 Information flows from a distant Internet repository directly to the user's

 own Macintosh or PC.



 The InforMNs service is provided by a partnership of the Minnesota

 Department of Education, the Minnesota Regional Network (MRNet), and

 Technology Information and Educational Services (TIES).  In addition, the

 University of Minnesota and the Minnesota State University System (MSUS)

 share use of their telecommunications infrastructure with the project, and

 InforMNs was launched with the support of the Minnesota Educational Media

 Organization (MEMO) and the Project for Automated Libraries (PALS) at

 Mankato State University.



 For more information, contact:

 Marla Davenport, davenpo@informns.k12.mn.us, (612)638-8793

 Margo Berg, mberg@mr.net, (612)724-2705



 InforMNs - Internet for Minnesota Schools

 2665 Long Lake Road, Suite 250

 Roseville, MN  55113-2535



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                       LEGION OF DOOM T-SHIRTS



 By Chris Goggans <phrack@well.sf.ca.us>



 After a complete sellout at HoHo Con 1993 in Austin, TX this past

 December, the official Legion of Doom t-shirts are available

 once again.  Join the net luminaries world-wide in owning one of

 these amazing shirts.  Impress members of the opposite sex, increase

 your IQ, annoy system administrators, get raided by the government and

 lose your wardrobe!

 

 Can a t-shirt really do all this?  Of course it can!

 

 

 "THE HACKER WAR  --  LOD vs MOD"

 

 This t-shirt chronicles the infamous "Hacker War" between rival

 groups The Legion of Doom and  The Masters of Destruction.  The front

 of the shirt displays a flight map of the various battle-sites

 hit by MOD and tracked by LOD.  The back of the shirt

 has a detailed timeline of the key dates in the conflict, and

 a rather ironic quote from an MOD member.

 

 (For a limited time, the original is back!)

 

 "LEGION OF DOOM  --  INTERNET WORLD TOUR"

 

 The front of this classic shirt displays "Legion of Doom Internet World

 Tour" as well as a sword and telephone intersecting the planet

 earth, skull-and-crossbones style.  The back displays the

 words "Hacking for Jesus" as well as a substantial list of "tour-stops"

 (internet sites) and a quote from Aleister Crowley.

 

 All t-shirts are sized XL, and are 100% cotton.

 

 Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for

 postage.

 

 Send checks or money orders.  Please, no credit cards, even if

 it's really your card.

 

 

 Name:       __________________________________________________

 

 Address:    __________________________________________________

 

 City, State, Zip:   __________________________________________

 

 

 I want ____ "Hacker War" shirt(s)

 

 I want ____ "Internet World Tour" shirt(s)

 

 Enclosed is $______ for the total cost.

 

 Mail to:   Chris Goggans

            603 W. 13th #1A-278

            Austin, TX 78701

 

 

 These T-shirts are sold only as a novelty items, and are in no way

 attempting to glorify computer crime.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                     WHITE HOUSE RETREATS ON CLIPPER



 By Stanton McCandlish (mech@eff.org)



 Yesterday, the Clinton Administration announced that it is taking several

 large, quick steps back in its efforts to push EES or Clipper

 encryption technology.  Vice-President Gore stated in a letter to

 Rep. Maria Cantwell, whose encryption export legislation is today being

 debated on the House floor, that EES is being limited to voice

 communications only.



 The EES (Escrowed Encryption Standard using the Skipjack algorithm, and

 including the Clipper and Capstone microchips) is a Federal Information

 Processing Standard (FIPS) designed by the National Security Agency, and

 approved, despite a stunningly high percentage anti-EES public comments on

 the proposal) by the National Institute of Standards and Technology.  Since

 the very day of the announcement of Clipper in 1993, public outcry against

 the key "escrow" system has been strong, unwavering and growing rapidly.



 What's changed?  The most immediate alteration in the White House's

 previously hardline path is an expressed willingness to abandon the EES

 for computer applications (the Capstone chip and Tessera card), and push

 for its deployment only in telephone technology (Clipper).  The most

 immediate effect this will have is a reduction in the threat to the

 encryption software market that Skipjack/EES plans posed.  



 Additionally, Gore's letter indicates that deployment for even the telephone

 application of Clipper has been put off for months of studies, perhaps

 partly in response to a draft bill from Sens. Patrick Leahy and Ernest

 Hollings that would block appropriation for EES development until many

 detailed conditions had been met.



 And according to observers such as Brock Meeks (Cyberwire Dispatch) and

 Mark Voorhees (Voorhees Reports/Information Law Alert), even Clipper is

 headed for a fall, due to a variety of factors including failure in

 attempts to get other countries to adopt the scheme, at least one state

 bill banning use of EES for medical records, loss of NSA credibility after

 a flaw in the "escrowed" key system was discovered by Dr. Matt Blaze of

 Bell Labs, a patent infringement lawsuit threat (dealt with by buying off

 the claimant), condemnation of the scheme by a former Canadian Defense

 Minister, world wide opposition to Clipper and the presumptions behind it,

 skeptical back-to-back House and Senate hearings on the details of the

 Administration's plan, and pointed questions from lawmakers regarding

 monopolism and accountability.



 One of the most signigicant concessions in the letter is that upcoming

 encryption standards will be "voluntary," unclassified, and exportable,

 according to Gore, who also says there will be no moves to tighten export

 controls.



 Though Gore hints at private, rather than governmental, key "escrow," the

 Administration does still maintain that key "escrow" is an important part of

 its future cryptography policy. 



 EFF would like to extend thanks to all who've participated in our online

 campaigns to sink Clipper.  This retreat on the part of the Executive

 Branch is due not just to discussions with Congresspersons, or letters

 from industry leaders, but in large measure to the overwhelming response from

 users of computer-mediated communication - members of virtual communities

 who stand a lot to gain or lose by the outcome of the interrelated

 cryptography debates.  Your participation and activism has played a key

 role, if not the key role, in the outcome thus far, and will be vitally

 important to the end game!





 Below is the public letter sent from VP Gore to Rep. Cantwell.



 ******



 July 20, 1994



 The Honorable Maria Cantwell

 House of Representatives

 Washington, D.C.,  20515



 Dear Representative Cantwell:



        I write to express my sincere appreciation for your efforts to move

 the national debate forward on the issue of information security and export

 controls.  I share your strong conviction for the need to develop a

 comprehensive policy regarding encryption, incorporating an export policy

 that does not disadvantage American software companies in world markets

 while preserving our law enforcement and national security goals. 



        As you know, the Administration disagrees with you on the extent to

 which existing controls are harming U.S. industry in the short run and the

 extent to which their immediate relaxation would affect national security. 

 For that reason we have supported a five-month Presidential study.  In

 conducting this study, I want to assure you that the Administration will

 use the best available resources of the federal government.  This will

 include the active participation of the National Economic Council and the

 Department of Commerce.  In addition, consistent with the Senate-passed

 language, the first study will be completed within 150 days of passage of

 the Export Administration Act reauthorization bill, with the second study

 to be completed within one year after the completion of the first.  I want

 to personally assure you that we will reassess our existing export controls

 based on the results of these studies.  Moreover, all programs with

 encryption that can be exported today will continue to be exportable.



        On the other hand, we agree that we need to take action this year

 to assure that over time American companies are able to include information

 security features in their programs in order to maintain their admirable

 international competitiveness.  We can achieve this by entering into an new

 phase of cooperation among government, industry representatives and privacy

 advocates with a goal of trying to develop a key escrow encryption system

 that will provide strong encryption, be acceptable to computer users

 worldwide, and address our national needs as well.



        Key escrow encryption offers a very effective way to accomplish our

 national goals,  That is why the Administration adopted key escrow

 encryption in the "Clipper Chip" to provide very secure encryption for

 telephone communications while preserving the ability for law enforcement

 and national security.  But the Clipper Chip is an approved federal

 standard for telephone communications and not for computer networks and

 video networks.  For that reason, we are working with industry to

 investigate other technologies for those applications.



        The Administration understands the concerns that industry has

 regarding the Clipper Chip.  We welcome the opportunity to work with

 industry to design a more versatile, less expensive system.  Such a key

 escrow system would be implementable in software, firmware, hardware, or

 any combination thereof, would not rely upon a classified algorithm, would

 be voluntary, and would be exportable.  While there are many severe

 challenges to developing such a system, we are committed to a diligent

 effort with industry and academia to create such a system.  We welcome your

 offer to assist us in furthering this effort.



        We also want to assure users of key escrow encryption products that

 they will not be subject to unauthorized electronic surveillance.  As we

 have done with the Clipper Chip, future key escrow systems must contain

 safeguards to provide for key disclosure only under legal authorization and

 should have audit procedures to ensure the integrity of the system.  Escrow

 holders should be strictly liable for releasing keys without legal

 authorization.



        We also recognize that a new key escrow encryption system must

 permit the use of private-sector key escrow agents as one option.  It is

 also possible that as key escrow encryption technology spreads, companies

 may established layered escrowing services for their own products.  Having

 a number of escrow agents would give individuals and businesses more

 choices and flexibility in meeting their needs for secure communications.



        I assure you the President and I are acutely aware of the need to

 balance economic an privacy needs with law enforcement and national

 security.  This is not an easy task, but I think that our approach offers

 the best opportunity to strike an appropriate balance.  I am looking

 forward to working with you and others who share our interest in developing

 a comprehensive national policy on encryption.  I am convinced that our

 cooperative endeavors will open new creative solutions to this critical

 problem.



 Sincerely,

 Al Gore

 AG/gcs



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                         WHY COPS HATE CIVILIANS



 Author Unknown

 Posted By Don Montgomery (donrm@sr.hp.com)



      Why Cops Hate You or If You Have to Ask, Get Out of the Way



 Have you  ever been  stopped by  a traffic  cop and,  while he  was

 writing a  ticket or  giving you a warning, you got the feeling he would

 just love  to yank  you out  of the  car, right  through the window, and

 smash your face into the front fender?  Have you ever had a noisy little

 spat with  someone, and  a cop  cruising by  calls, Everything all right

 over there?



 Did you  maybe sense  that he  really hoped  everything was not all

 right, that  he wanted  one of  you to answer, No, officer, this idiot's

 bothering me?   That  all he  was looking  for was  an excuse  to launch

 himself from  the cruiser  and play  a drum  solo on your skull with his

 nightstick?



 Did you  ever call  the cops to report a crime, maybe someone stole

 something from  your car or broke into your home, and the cops act as if

 it were  your fault?   That they were sorry the crook didn't rip you off

 for more?   That  instead of looking for the culprit, they'd rather give

 you a  shot in  the chops  for bothering  them with your bullshit in the

 first place?



 If you've  picked  up  on  this  attitude  from  your  local  sworn

 protectors, it's  not just  paranoia.  They actually don't like you.  In

 fact  cops  don't  just  dislike  you,  they  hate  your  fucking  guts!

 Incidentally, for a number of very good reasons.



 First of  all, civilians  are so goddamn stupid.  They leave things

 lying around,  just begging  thieves to  steal them.   They park cars in

 high crime  areas and  leave portable  TVs,  cameras,  wallets,  purses,

 coats, luggage,  grocery bags  and briefcases in plain view on the seat.

 Oh, sure  maybe they'll  remember to  close all the windows and lock the

 doors, but  do you  know how  easy it is to bust a car window?  How fast

 can it be done?  A ten-year-old can do it in less than six seconds!  And

 a poor cop has another Larceny from Auto on his hands.  Another crime to

 write a  report on,  waste another  half hour on.  Another crime to make

 him look bad.



 Meanwhile the  asshole who  left the  family heirlooms  on the back

 seat in  the first  place is raising hell about where were the cops when

 the car  was being  looted.  He's planning to write irate letters to the

 mayor and  the police commissioner complaining about what a lousy police

 force you  have here;  they can't  even keep  my car from getting ripped

 off!  What, were they drinking coffee somewhere?



 And the cops are saying to themselves.  Lemme tell ya, fuckhead, we

 were seven  blocks away,  taking  another  stupid  report  from  another

 jerkoff civilian about his fucking car being broken into because he left

 his shit on the back seat too!



 These civilians  can't figure  out that  maybe they shouldn't leave

 stuff lying  around un-attended  where anybody  can just  pick it up and

 boogie.   Maybe they  should put the shit in the trunk, where no one but

 Superman is  gonna see it.  Maybe they should do that before they get to

 wherever they're  going just  in case  some riffraff  is hanging  around

 watching them while the car is being secured.



 Another thing  that drives  cops wild  is the, "surely this doesn't

 apply to  me" syndrome,  which never fails to reveal itself at scenes of

 sniper or barricade incidents.  There's always some asshole walking down

 the street  (or jogging  or driving) who thinks the police cars blocking

 off the  area, the  ropes marked  Police Line:   Do  Not Cross, the cops

 crouched behind  cars pointing  revolvers and  carbines and shotguns and

 bazookas at  some building  has nothing whatsoever to do with him, so he

 weasels around  the barricades  or slithers  under the restraining ropes

 and blithely continues on his way, right into the field of fire.



 The result  is that some cop risks his ass (or her's, don't forget,

 the cops include women now) to go after the cretin and drag him, usually

 under protest,  back to  safety.   All of  these cops, including the one

 risking his  ass, devoutly  hope  that  the  sniper  will  get  off  one

 miraculous shot and drill the idiot right between the horns, which would

 have two  immediate effects.   The  quiche-for-brains civilian  would be

 dispatched to  his  just  reward  and  every  cop  on  the  scene  would

 instantaneously be  licensed to  kill the  scumbag  doing  the  sniping.

 Whereupon the  cops would destroy the whole fucking building, sniper and

 all, in  about 30  seconds, which is what they wanted to do in the first

 place, except  the brass  wouldn't let  them  because  the  motherfucker

 hadn't killed anybody yet.



 An  allied  phenomenon  is  the  My  isn't  this  amusing  behavior

 exhibited, usually  by Yuppies  or other  members of  higher society, at

 some emergency  scenes.   For example,  a group  of trendy types will be

 strolling down  the street  when a  squad car  with lights  flashing and

 siren on  screeches up  to a  building.  They'll watch the cops yank out

 their guns  and run up to the door, flatten themselves against the wall,

 and peep  into the  place cautiously.   Now,  if  you  think  about  it,

 something serious  could be  happening here.   Cops  usually don't  pull

 their revolvers to go get a cup of coffee.  any five-year-old ghetto kid

 can tell  you these  cops are  definitely ready to cap somebody.  But do

 our society  friends perceive  this?   Do they stay out of the cops way?

 Of course  not!  They think it's vastly amusing.   And, of course, since

 they're not involved in the funny little game the cops are playing, they

 think nothing  can happen  to them!       While the ghetto kid is hiding

 behind a  car for  the shooting  to start,  Muffy and Chip and Biffy are

 continuing their  stroll, right  up to  the  officers,  tittering  among

 themselves about  how silly  the cops look, all scrunched up against the

 wall, trying  to look in  through the door without stopping bullets with

 their foreheads.



 What the  cops are  hoping at  that point is for a homicidal holdup

 man to  come busting  out the  door with  a sawed-off  shotgun.  They're

 hoping he  has it  loaded with  elephant shot,  and that  he immediately

 identifies our socialites as serious threats to his personal well-being.

 They're hoping  he has  just enough  ammunition to blast the shit out of

 the gigglers,  but not  enough to  return fire  when the cops open up on

 him.



 Of course,  if that  actually happens,  the poor  cops will be in a

 world of  trouble for not protecting the innocent bystanders.  The brass

 wouldn't even  want to  hear that  the shitheads  probably  didn't  have

 enough sense to come in out of an acid rain.  Somebody ought to tell all

 the quiche  eaters out  there to  stand back when they encounter someone

 with a  gun in  his hand,  whether he happens to be wearing a badge or a

 ski mask.



 Civilians also  aggravate cops  in a  number of other ways.  One of

 their favorite games is Officer, can you tell me?  A cop knows he's been

 selected to  play this game whenever someone approaches and utters those

 magic words.   Now, it's okay if they continue with How to get to so and

 so street?   or Where such and such a place is located?  After all, cops

 are supposed  to be  familiar with  the area they work.  But it eats the

 lining of  their stomachs  when some jerkoff asks, Where can I catch the

 number fifty-four bus?  Or, Where can I find a telephone?



 Cops look  forward to  their last  day before retirement, when they

 can safely  give these  douche bags the answer they've been choking back

 for 20  years:   No, maggot,  I can't  tell you where the fifty-four bus

 runs!   What does  this look  like an MTA uniform?  Go ask a fucking bus

 driver!   And, No,  dog breath, I don't know where you can find a phone,

 except wherever  your fucking  eyes see one!  Take your head out of your

 ass and look for one.



 And cops  just love  to find  a guy  parking his car in a crosswalk

 next to  a fire  hydrant at  a bus stop posted with a sigh saying, Don't

 Even Think  About Stopping, Standing, or Parking Here.  Cars Towed Away,

 Forfeited to  the Government,  and Sold at Public Auction.  And the jerk

 asks, Officer, may I park here a minute?



 What are  you nuts?   Of  course ya  can park  here!  As long as ya

 like!   Leave it  there all  day!   Ya don't  see anything  that says ya

 can't, do  ya?   You're welcome.   See  ya later.   The  cop then drives

 around the  corner and  calls a tow truck to remove the vehicle.  Later,

 in traffic  court, the  idiot will  be whining  to the  judge But,  Your

 Honor, I  asked an  officer if  I could park there, and he said I could!

 No, I don't know which officer, but I did ask! Honest!  No, wait, Judge,

 I can't afford five hundred dollars!  This isn't fair!  I'm not creating

 a disturbance!   I've got rights!  Get your hands off me!  Where are you

 taking me?  What do you mean , ten days for contempt of court?  What did

 I do?   Wait,  wait,...   If you  should happen  to see  a  cop  humming

 contentedly and  smiling to  himself for no apparent reason, he may have

 won this game.



 Wildly unrealistic civilian expectations also contribute to a cop's

 distaste for  the general  citizenry.  An officer can be running his ass

 off all  day or  night handling  call after  call and writing volumes of

 police reports,  but everybody thinks their problem is the only thing he

 has to  work on.  The policeman may have a few worries, too.  Ever think

 of that?   the sergeant is on him because he's been late for roll call a

 few days;  he's been  battling like  a badger  with his wife, who's just

 about to leave him because he never takes her anywhere and doesn't spend

 enough time at home and the kids need braces and the station wagon needs

 a major  engine overhaul and where are we gonna get the money to pay for

 all that  and we haven't had a real vacation for years and all you do is

 hang around with other cops and you've been drinking too much lately and

 I could've  married that  wonderful guy  I was going with when I met you

 and lived  happily ever  after and  why don't you get a regular job with

 regular days  off and  no night  shifts and  decent pay and a chance for

 advancement and no one throwing bottles or taking wild potshots at you?



 Meanwhile, that  sweet young thing he met on a call last month says

 her period is late.  Internal Affairs is investigating him on fucking up

 a disorderly  last week;  the captain  is pissed  at him  for tagging  a

 councilman's car; a burglar's tearing up the businesses on his post; and

 he's already  handled two robberies, three family fights, a stolen auto,

 and a half dozen juvenile complaints today.



 Now here he is, on another juvenile call, trying to explain to some

 bimbo, who's  the president of her neighborhood improvement association,

 that the  security of  Western Civilization is not really threatened all

 that much  by the kids who hang around on the corner by her house.  Yes,

 officer, I  know they're not there now.  They always leave when you come

 by.   But after  you're gone,  they come  right back, don't you see, and

 continue their  disturbance.   It's intolerable!   I'm  so upset,  I can

 barely sleep at night.



 By now,  the cops  eyes have  glazed over.    What  we  need  here,

 officer, she  continues vehemently,  Is greater attention to this matter

 by the  police.   You and  some other officers should hide and stake out

 that corner  so those  renegades wouldn't see you.  Then you could catch

 them in  the act!   Yes, ma'am, we'd love to stake out that corner a few

 hours every night, since we don't have anything else to do, but I've got

 a better idea, he'd like to say.  Here's a box of fragmentation grenades

 the Department  obtained from  the Army  just for  situations like this.

 The next  time you see those little fuckers out there, just lob a couple

 of these into the crowd and get down!



 Or he's  got and  artsy-craftsy type  who's  moved  into  a  tough,

 rundown neighborhood  and decides  it's gotta  be cleaned up.  You know,

 Urban Pioneers.   The  cops see  a lot  of them  now.   Most of them are

 intelligent(?), talented, hard-working, well-paid folks with masochistic

 chromosomes interspersed  among their otherwise normal genes.  They have

 nice jobs,  live in nice homes, and they somehow decide that it would be

 a marvelous  idea to  move into a slum and get yoked, roped, looted, and

 pillaged on  a regular  basis.   What else  do you  expect?   Peace  and

 harmony?  It's like tossing a juicy little pig into a piranha tank.



 Moving day:  Here come the pioneers, dropping all their groovy gear

 from their  Volvo station  wagon, setting it on the sidewalk so everyone

 can get  a good  look and  the food processor, the microwave, the stereo

 system, the  color TV,  the tape deck, etc.  At the same time, the local

 burglars are  appraising the goods unofficially and calculating how much

 they can get for the TV down at the corner bar, how much the stereo will

 bring at  Joe's garage, who might want the tape deck at the barber shop,

 and maybe mama can use the microwave herself.



 When the  pioneers get  ripped off,  the cops figure they asked for

 it, and  they got  it.   You want to poke your arm through the bars of a

 tiger cage?   Fuck you!  Don't be amazed when he eats it for lunch!  The

 cops regard  it as  naive for  trendies to  move into  crime  zones  and

 conduct their  lives the same way they did up on Society Hill.  In fact,

 they can't fathom why anyone who didn't have to would want to move there

 at all,  regardless of  how they want to live or how prepared they might

 be to  adapt their  behavior.   That's probably  because  the  cops  are

 intimately acquainted  with all  those petty  but disturbing  crimes and

 nasty little  incidents that  never make  the newspapers  but profoundly

 affect the quality of life in a particular area.



 Something else  that causes  premature aging  among cops  is the, I

 don't know who to call, so I'll call the police ploy.  Why, the cops ask

 themselves, do  they get so many calls for things like water leaks, sick

 cases, bats in houses, and the like, things that have nothing whatsoever

 to do  with law  enforcement or  the maintenance  of public order?  They

 figure it's  because civilians  are getting  more and more accustomed to

 having the government solve problems for them, and the local P.D. is the

 only governmental  agency that'll  even answer  the phone a 3:00 am, let

 alone send anybody.



 So, when  the call  comes over  the radio  to go  to  such-and-such

 address  for  a  water  leak,  the  assigned  officer  rolls  his  eyes,

 acknowledges, responds,  surveys the problem, and tells the complainant,

 Yep, that's  a water  leak all  right!   No doubt  about it. Ya probably

 ought to  call a  plumber!   And it  might not be a bad idea to turn off

 your main  valve for  a while.   Or,  Yep, your  Aunt Minnie's  sick all

 right!   Ya probably ought to get'er to a doctor tomorrow if she doesn't

 get any  better by  then.S   Or, Yep,  that's a bat all right!  Mebbe ya

 ought to open the windows so it can fly outside again!



 In the meantime our hero is wasting his time on this bullshit call,

 maybe someone  is having  a real  problem out there, like getting raped,

 robbed or  killed.   Street cops would like to work the phones just once

 and catch  a few  of these idiotic complaints:  A bat in your house?  No

 need to  send an officer when I can tell ya what to do right here on the

 phone, pal!  Close all your doors and windows right away.  Pour gasoline

 all over  your furniture.   That's  it.   Now, set  it on  fire and  get

 everybody outside!   Yeah,  you'll get the little motherfucker for sure!

 That's okay, call us anytime.



 Probably the  most serious beef cops have with civilians relates to

 those situations  in which  the use  of force  becomes necessary to deal

 with some desperado who may have just robbed a bank, iced somebody, beat

 up his wife and kids, or wounded some cop, and now he's caught but won't

 give up.  He's not going to be taken alive, he's going to take some cops

 with him, and you better say your prayers, you pig bastards!  Naturally,

 if the  chump's armed  with any  kind of  weapon, the  cops are going to

 shoot the  shit out  of him  so bad  they'll be able to open up his body

 later as  a lead  mine.  If he's not armed, and the cops aren't creative

 enough to find a weapon for him, they'll beat him into raw meat and hope

 he spends  the next  few weeks  in traction.  They view it as a learning

 experience for  the asshole.  You fuck up somebody, you find out what it

 feels like  to get  fucked up.  Don't like it?  Don't do it again!  It's

 called Street  Justice, and  civilians approve of it as much as cops do,

 even if they don't admit it.



 Remember how  the audience  cheered when  Charles Bronson fucked up

 the bad  guys in  Death Wish?  How they scream with joy every time Clint

 Eastwood's Dirty  Harry makes his day by blowing up some rotten scumball

 with his  .44 Magnum?  What they applaud is the administration of street

 justice.   The old  eye-for-an-eye concept, one of mankind's most primal

 instincts.  All of us have it, especially cops.



 It severely  offends and  deeply hurts  cops when they administer a

 dose of  good old-fashioned  street justice  only to have some bleeding-

 heart do-gooder  happens upon  the scene  at the  last minute,  when the

 hairbag is  at last  getting his just deserts, and start hollering about

 police brutality.   Cops  regard that  as very  serious business indeed.

 Brutality can get them fired.  Get fired from one police department, and

 it's tough to get a job as a cop anywhere else ever again.



 Brutality exposes  the cop  to civil  liability as well.  Also, his

 superior officers,  the police  department as  an agency, and maybe even

 the local  government itself.  You've seen those segments on 60 Minutes,

 right?   Some cop  screws up, gets sued along with everybody else in the

 department who  had anything to do with him, and the city or county ends

 up paying  the plaintiff  umpty-ump million  dollars, raising  taxes and

 hocking its  fire engines  in the process.  What do think happens to the

 cop who fucked up in the first place?  He's done for.



 On many occasions when the cops are accused of excessive force, the

 apparent brutality  is  a  misperception  by  some  observer  who  isn't

 acquainted with  the realities of police work.  For example, do you have

 any idea  how hard  it is to handcuff someone who really doesn't want to

 be handcuffed?   Without  hurting them?   It's almost impossible for one

 cop to  accomplish by  himself unless  he beats  the  hell  out  of  the

 prisoner first,  which would  also be viewed a brutality!  It frequently

 takes three or four cops to handcuff one son of a bitch who's determined

 to battle them.



 In situations  like that,  it's not  unusual for  the cops  to hear

 someone in  the crowd  of onlookers comment on how they're ganging up on

 the poor  bastard and  beating him  unnecessarily.  This makes them feel

 like telling  the complainer,  Hey,  motherfucker,  you  think  you  can

 handcuff this  shithead by  yourself without killing him first?  C'mere!

 You're deputized!  Now, go ahead and do it!



 The problem  is that,  in addition  to being  unfamiliar  with  how

 difficult it  is in the real world to physically control someone without

 beating  his   ass,  last-minute   observers  usually   don't  have  the

 opportunity to see for themselves, like they do in the movies and on TV,

 what a  fucking monster  the suspect  might be.   If  they  did,  they'd

 probably holler  at the  cops to  beat his  ass some  more.   They might

 actually even  want to  help!      The best thing for civilians to do if

 they think they see the cops rough up somebody too much is to keep their

 mouths shut  at the  scene, and  to make  inquiries of  the police brass

 later on.   There  might be  ample justification for the degree of force

 used that  just wasn't  apparent at the time of the arrest.  If not, the

 brass will  be very  interested in  the complaint.  If one of their cops

 went over  the deep end, they'll want to know about it.     Most of this

 comes down  to  common  sense,  a  characteristic  the  cops  feel  most

 civilians lack.   One of the elements of common sense is thinking before

 opening one's  yap or  taking other  action.   Just a  brief  moment  of

 thought will  often prevent  the utterance  of something  stupid or  the

 commission of  some idiotic  act that will, among other things, generate

 nothing but  contempt from  the average street cop.  Think, and it might

 mean getting  a warning instead of a traffic ticket.  Or getting sent on

 your way  rather than being arrested.  Or continuing on to your original

 destination instead of to the hospital.  It might mean getting some real

 assistance instead  of the runaround.  The very least it'll get you is a

 measure of  respect cops  seldom show  civilians.  Act like you've got a

 little sense,  and even  if the cops don't love you, at least they won't

 hate you.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



           PUBLIC SPACE ON INFO HIGHWAY: CALL CONGRESS ASAP!



By The Center For Media Education (cme@access1.digex.net)



People For the American Way is 300,000-member nonpartisan constitutional

liberties public interest organization. 2000 M Street NW, Suite 400,

Washington DC 20036.



 ACTION ALERT  --  From People For the American Way (DC)



 SENATE TO ACT ON INFO-HIGHWAY BILL -- ACTIVISTS NEEDED TO ENSURE THAT

 PUBLIC ACCESS PROVISIONS ARE INCLUDED.



 The Issue



 -  The "information superhighway" has the potential to give rise to a new

 era of democratic self governance by providing the means through which

 civic discourse can flourish.  Turning this into a reality means that

 those committed to promoting this new marketplace of ideas must be given

 the tools to use new telecommunications networks.



 -  A diverse coalition of public interest organizations is supporting

 legislation introduced by Senator Daniel Inouye (D-HI), Chairman of the

 Communications Subcommittee of the Senate Commerce Committee, to encourage

 this new marketplace of ideas by ensuring that the public has access to

 the information superhighway is protected (S. 2195). 



 -  Without reserved capacity, the ability of local governmental

 institutions, libraries, schools, public broadcasters and other nonprofit

 organizations to take advantage of new telecommunications technologies

 will be determined by private gatekeepers who have few economic incentives

 to permit those institutions without the means to pay commercial rates

 access to their networks.



 -  Without Senator Inouye's legislation, the information superhighway will

 carry little more than video games, movies on demand and home shopping. 



 -  There has been a great deal of rhetoric about the telecommunications

 networks of the future being of unlimited capacity.  This is certainly the

 goal.  However, it is necessary to ensure that between now and the time

 that such capacity is unlimited, that there is meaningful access available

 for those entities proving important educational, cultural, informational,

 civic and charitable services to the public.



 -  Senator Inouye's legislation must be included in the debate with the

 larger telecommunications legislation (S. 1822) introduced by Senator

 Ernest Hollings (D-SC), Chairman of the Senate Commerce Committee. 





 LEGISLATIVE TIMING



 Senator Hollings (D-SC), Chairman of the Commerce Committee, and Senator

 Danforth (R-MO), Ranking Minority Member of the Commerce Committee are

 busily working on amendments to S. 1822, a major telecommunications reform

 bill.  Next week, the full Committee is expected to consider these

 amendments.  Therefore, a public access provision must be included now.



 ACTION REQUEST 



 -  Please call Senator Hollings at the Commerce Committee and Senator

 Danforth (Ranking Minority Member) immediately!!  Ask them to support S.

 2195 and guarantee that requirements are put in place for public access at

 low or no-cost rates are included in the Chairman's Mark.  Phone calls on

 this issue by the public will have a profound effect on the outcome of

 this legislation--so please call!



  Senator Hollings  202-224-5115

  Senator Danforth  202-224-6154



 -  Please also call Senator Inouye and encourage him to continue to push

 for passage of S. 2195 and to seek it's combination with S. 1822.



  Inouye (D-HI)   202-224-3934



 -  Please try to find the time to make a few calls and ask the other

 Senators on the Commerce Committee to support S. 2195 and ensure public

 access provisions are included in S. 1822. Other Senators on the Commerce

 Committee are:



 Exon  (D-NB)   202-224-4224

 Ford  (D-KY)   202-224-4343

 Rockefeller (D-WV)  202-224-6472

 Kerry  (D-MA)   202-224-2742

 Breaux (D-LA)   202-224-4623

 Bryan (D-NV)   202-224-6244

 Robb (D-VA)   202-224-4024

 Dorgan (D-ND)   202-224-2551

 Matthews (D-TN)   202-224-4944 

 Packwood (R-OR)   202-224-5244

 Pressler (R-SD)   202-224-5842

 Stevens (R-AK)   202-224-3004

 McCain (R-AZ)   202-224-2235

 Burns (R-MT)   202-224-2644

 Gorton (R-WA)   202-224-3441

 Lott (R-Miss.)   202-224-6253

 Hutchison (R-TX)   202-224-5922



 -  Calling these Senators *works*!!



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                   SOFTWARE KEY ESCROW - A NEW THREAT?



 By Timothy May (tcmay@netcom.com)



 At the June Cypherpunks meeting, Whit Diffie (co-inventor of

 public-key crypto, as you should all know) filled us in on a workshop

 on "key escrow" held in Karlsruhe, Germany. All the usual suspects

 were there, and I gather that part of the purpose was to bring the

 Europeans "into the tent" on key escrow, to deal with their objections

 to Clipper, and so on.



 Diffie described in some detail a software-based scheme developed by

 NIST (and Dorothy Denning, if I recall correctly) that, as I recall

 the details, avoids public key methods. Perhaps this was also

 described here on the list. I know Bill Stewart has recently discussed

 it in sci.crypt or talk.politics.crypto.



 What has me worried about it now is evidence from more than one source

 that this program is actually much further along than being merely a

 "trial balloon" being floated. In fact, it now looks as though the

 hardware-based key escrow systems will be deemphasized, as Al Gore's

 letter seems to say, in favor of software-based schemes. 



 While I've been skeptical that software-based schemes are secure (the

 bits are hardly secure against tampering), the addition of negotiation

 with another site (a lot like online clearing of digital cash, it

 seems) can make it nearly impossible for tampering to occur. That is,

 I'm now more persuaded that the NIST/NSA(?) proposal would allow

 software-based key escrow.



 Here's the rub:



 * Suppose the various software vendors are "incentivized" to include

 this in upcoming releases. For example, in 30 million copies of

 Microsoft's "Chicago" (Windows 4.0) that will hit the streets early in

 '95 (betas are being used today by many).



 * This solves the "infrastructure" or "fax effect" problem--key escrow

 gets widely deployed, in a way that Clipper was apparently never going

 to be (did any of you know _anybody_ planning to buy a "Surety"

 phone?).



 (Granted, this is key escrow for computers, not for voice

 communication. More on this later.)



 * Once widely deployed, with not talk of the government holding the

 keys, then eventual "mandatory key escrow" can be proposed, passed

 into law by Executive Order (Emergency Order, Presidential Directive,

 whatever your paranoia supports), an act of Congress, etc.



 I don't claim this scenario is a sure thing, or that it can't be

 stopped. But if in fact a "software key escrow" system is in the

 works, and is more than just a "trial balloon," then we as Cypherpunks

 should begin to "do our thing," the thing we've actually done pretty

 well in the past. To wit: examine the implications, talk to the

 lobbyist groups about what it means, plan sabotage efforts (sabotage

 of public opinion, not planting bugs in the Chicago code!), and

 develop ways to make sure that a voluntary key escrow system could

 never be made mandatory.



 (Why would _anyone_ ever use a voluntary key escrow system? Lots of

 reasons, which is why I don't condemn key escrow automatically.

 Partners in a business may want access under the right circumstances

 to files. Corporations may want corporate encryption accessible under

 emergencyy circumstances (e.g., Accounting and Legal are escrow

 agencies). And individuals who forget their keys--which happens all

 the time--may want the emergency option of asking their friends who

 agreed to hold the key escrow stuff to help them. Lots of other

 reasons. And lots of chances for abuse, independent of mandatory key escrow.)



 But there are extreme dangers in having the infrastructure of a

 software key escrow system widely deployed.



 I can't see how a widely-deployed (e.g., all copies of Chicago, etc.)

 "voluntary key escrow" system would remain voluntary for long. It

 looks to me that the strategy is to get the infrastructure widely

 deployed with no mention of a government role, and then to bring the

 government in as a key holder.



 (The shift of focus away from telephone communications to data is an

 important one. I can see several reasons. First, this allows wide

 deployment by integration into next-gen operating systems. A few

 vendors can be "incentivized." Second, voice systems are increasingly

 turning into data systems, with all the stuff surrounding ISDN,

 cable/telco alliances, "set-top" boxes, voice encryption on home

 computers, etc. Third, an infrastructure for software key escrow would

 make the backward extension to voice key escrow more palatable. And

 finally, there is a likely awareness that the "terrorist rings" and

 "pedophile circles" they claim to want to infiltrate are more than

 likely already using computers and encryption, not simple voice lines.

 This will be even more so in the future. So, the shift of focus to

 data is understandable. That it's a much easier system in which to get

 40-60 million installed systems _almost overnight_ is also not lost on

 NIST and NSA, I'm sure.)



 In other words, a different approach than with Clipper, where

 essentially nobody was planning to buy the "Surety" phones (except

 maybe a few thousand) but the government role was very prominent--and

 attackable, as we all saw. Here, the scenario might be to get 40-60

 million units out there (Chicago, next iteration of Macintosh OS,

 maybe Sun, etc.) and then, after some series of events (bombings,

 pedophile rings, etc.) roll in the mandatory aspects.



 Enforcement is always an issue, and I agree that many bypasses exist.

 But as Diffie notes, the "War on Drugs" enlistment of corporations was

 done with various threats that corporations would lose

 assets/contracts unless they cooperated. I could see the same thing

 for a software-based key escrow.



 A potentially dangerous situation. 



 I was the one who posted the Dorothy Denning "trial balloon" stuff to

 sci.crypt, in October of 1992, six months before it all became real

 with the announcement of Clipper. This generated more than a thousand

 postings, not all of them useful (:-}), and helped prepare us for the

 shock of the Clipper proposal the following April.



 I see this software-based key escrow the same way. Time to start

 thinking about how to stop it now, before it's gone much further.



 Putting Microsoft's feet to the fire, getting them to commit to *not*

 including any form of software-based key escrow in any future releases

 of Windows (Chicago or Daytona) could be a concrete step in the right

 direction. Ditto for Apple. 



 I'm sure we can think of other steps to help derail widespread

 deployment of this infrastructure.



 --Tim May



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 

            HOODS HIT THE HIGHWAY; COMPUTER USERS WARNED OF SCAMS

 

 By Charlotte-Anne Lucas

 Austin Bureau of The Dallas Morning News

 REPRINTED WITH PERMISSION OF THE DALLAS MORNING NEWS

 

 AUSTIN -- Computer users, beware: Driving on the information highway,

 it's possible to get fleeced.

 

 Scam artists have hit the cyberspace, offering high-tech ponzi schemes,

 sending illegal electronic chain letters and hyping virtually worthless

 stock, according to state securities regulators across the nation.

 

 In Texas, regulators say an Austin retiree lost $10,000 in a fake mutual

 fund deal sold by a man who promoted his "money managing" skills through

 an on-line computer service.

 

 "The danger here is that cyberspace, which could be a beneficial way for

 consumers to do a better job of informing themselves, will instead be

 discredited as a haven for fast-buck artists," said Denise Voigt

 Crawford, the Texas Securities Commissioner.

 

 In New Jersey and Missouri on Thursday, securities regulators filed

 cease and desist orders against promoters who used computer links to

 tout allegedly fraudulent deals.  Texas regulators say it is likely that

 they will seek an indictment in the case of the nonexistent mutual fund.

 

 But with nearly 4 million computer users nationwide linked into

 commercial computer services and 20 million people on the internet,

 a world-wide computer network, "it is almost too big to police

 effectively," said Jared Silverman, chief of the New Jersey Bureau of

 Securities and chairman of a multi-state team that investigates computer

 fraud.

 

 In response, regulators in all 50 states issued a bulletin to

 investigators, describing the potential frauds and listing steps small

 investors can take to protect themselves.  "We're trying to tell people

 to be careful," said Ms. Crawford, "there is a new fraud on the

 horizon."

 

 Although regulators are concerned about the problem, Ms. Crawford

 acknowledges enforcement will be a challenge.  Because electronic

 conversations, or E-mail, are considered private, "we don't know what

 difficulties we are going to have getting subpoenas enforced or what

 kind of cooperation we will get from (commercial bulletin board

 systems)." [sic]

 

 Officials say promoters tend to advertise offers or stock tips on the

 financial bulletin board sections of on-line computer services such as

 CompuServe, America Online and Prodigy, or in the specialized discussion

 forums in the Internet.

 

 Regulators said that of 75,000 messages posted on one computer service

 bulletin board during a recent two-week period, 5,600 were devoted to

 investment topics.  While some commercial computer bulletin board

 services try to control the publicly posted investment tips, most do not

 try to control most communications on the service.

  

 What begins as innocent E-mail can end with an unwary investor "getting

 cleaned out by high-tech schemers," said Ms. Crawford.

  

 In Texas, the case under investigation began when an Austin retiree

 posted a public note in a commercial bulletin board system looking for

 conversations about the stock market, according to John A. Peralta,

 deputy director of enforcement at the Texas Securities Board.

 

 "He was contacted.  It turned into a private E-mail conversation, a

 telephone conversation and then exchanges through the mail," said

 Mr. Peralta.  But the person who promoted himself on the computer as a

 skilled money manager turned out to be unlicensed -- and the mutual fund

 the retiree invested in turned out to be nonexistent.

 

 Mr. Peralta said at least one other person, not from Texas, invested

 $90,000 in the same deal, "We are aware of two, but we don't really

 know," he said.  "There may be dozens of victims."

 

 Securities regulators began taking interest in on-line scams last fall,

 after Mr. Silverman -- a computer junkie -- raised the issue at a

 national meeting of regulators.  "I heard stories about things going on

 on computer bulletin board services, and I have been monitoring these

 things for close to a year," he said.

 

 In fact, the New Jersey case came from Mr. Siverman's off-hours cruising

 of an on-line service.  "I sit at a keyboard two hours a day -- to the

 chagrin of my wife -- scanning these things," he said.

 

 What he found was a promoter pushing an E-mail chain letter.  The

 promoter, identified only as from San Antonio, claimed that in exchange

 for $5, investors could earn $60,000 in three to six weeks.

 

 Regulators said participants were told to send $1 to each of five people

 on a list in the computer bulletin board, add their own name to the list

 and post it on 10 different computer bulletin board sites.

 

 That, regulators said in a statement, "amounted to a high-tech

 variation on the old pyramid scam, which is barred by federal and state

 laws."

 

 In Missouri, regulators Thursday moved against an unlicensed stockbroker

 for touting his services and "making duubious [sic] claims for stocks

 not registered for sale in the state."  Among other things, regulators

 said, the promoter falsely claimed that Donald Trump was a "major,

 behind-the-scenes player in a tiny cruise line" whose stock he pitched.

 

 Ms. Crawford said that while computer users may be sophisticated in some

 ways, they still are attractive targets because they tend to have

 discretionary income and frequently are looking for ways to invest their

 money.

 

 Some of the commercial services also allow users to use various aliases,

 making it all the more difficult for investigators to figure out who

 they are really communication with.

 

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                      THE INTERNET AND THE ANTI-NET



 By Nick Arnett (nicka@mccmedia.com)



 Two public internetworks are better than one



 Networking policy debates tend to paint a future monolithic internetwork

 that will follow consistent policies despite a number of independent

 operators.  Although that's how the interstate highway and telephone

 systems -- favorite metaphors for network futurists -- operate, historical

 comparisons suggest that it is probably not what the future holds.  Two

 distinct, interconnected publicly accessible digital internetworks are

 likely to emerge, which is surely better than just one.



 One of the future internetworks will grow out of today's Internet, whose

 roots are in the technology and scientific/academic communities, funded by

 government, institutions and increasingly, corporate and individual users.

 Although the Internet will support commercial services, they rarely will

 depend on advertising.  The other great internetwork will grow out of the

 technology and mass communications industries, especially cable and

 broadcast industries.  The "Anti-net" will rely on advertising revenue to

 recoup the cost of the infrastructure necessary to create cheap, high-speed

 bandwidth.  (I call this second network the Anti-net not to be a demagogue

 but to make a historical allusion, explained shortly.)  All three

 communities -- technology, science and academia, and mass media -- will

 participate in many joint projects.  The most successful new ventures often

 will arise from three-way collaborations; skills of each are essential to

 create and deliver network-based information products and services.



 The Internet community reacts with profound anger and resentment at

 Anti-net behavior on the Internet -- in net-speak, "spamming" advertising

 messages into hundreds of discussions.  The outrage is based in part on the

 idealistic traditions of academic and scientific freedom of thought and

 debate, but there's more behind it.  Anger and resentment fueled by the

 world's love-hate relationship with the mass media, particularly

 television, surface in many other contexts.  Nearly everyone in the modern

 world and large segments of the third world watches television; nearly all

 think broadcast television is stupid, offering a homogenized,

 sensationalized point of view that serves advertising interests above all

 others.  In competition with television's hypnotic powers, or perhaps

 simply due to the high cost of distribution, other mass media have followed

 suit.



 Idealistic defenders of the Internet's purity believe they are waging a

 humanitarian or even a holy war that pits a democracy of ideas against the

 mass media's empty promises and indulgences.  Television and its kin offer

 the false idols and communities of soaps, sitcoms and sports.  The mass

 media tantalize with suggestions of healing, wealth, popularity and

 advertising's other blessings and temptations.  Internet idealists even

 question the U.S. administration's unclear proposal of an "information

 superhighway," suspecting that the masses will be taxed only to further

 expand the Anti-net's stranglehold on information.



 The same kind of stage was set 500 years ago.  The convergence of

 inexpensive printing and inexpensive paper began to loosen the Roman

 Catholic church's centuries-old stranglehold on cultural information.  The

 church's rise to power centuries earlier had followed the arrival of the

 Dark Ages, caused in Marshall McLuhan's analysis by the loss of papyrus

 supplies.  The church quickly became the best customer of many of the early

 printer-publishers, but not to disseminate information, only to make money.

 The earliest dated publication of Johann Gutenberg himself was a "papal

 indulgence" to raise money for the church's defense against the Turk

 invasions.  Indulgences were papers sold to the common folk to pay for the

 Pope's remission of their sins, a sort of insurance against the wrath of

 God.  Indulgences had been sold by the church since the 11th century, but

 shortly after the arrival of printing, the pope expanded the market

 considerably by extending indulgences to include souls in purgatory.

 Indulgence revenue was shared with government officials, becoming almost a

 form of state and holy taxation.  The money financed the church's holy

 wars, as well as church officials' luxurious lifestyles.



 Jumping on the new technology for corrupt purposes, the church had sown the

 seeds of its own undoing.  The church had the same sort of love-hate

 relationship with common people and government that the mass media have

 today.  The spark for the 15th-century "flame war," in net-speak, was a

 monk, Martin Luther.  Outraged by the depth of the church's corruption,

 Luther wrote a series of short theses in 1517, questioning indulgences,

 papal infallibility, Latin-only Bibles and services, and other

 authoritarian, self-serving church practices.  Although Luther had

 previously written similar theses, something different happened to the 95

 that he nailed to the church door in Wittenburg.  Printers -- the "hackers"

 of their day, poking about the geographic network of church doors and

 libraries -- found Luther's theses.



 As an academic, Luther enjoyed a certain amount of freedom to raise

 potentially heretical arguments against church practice.  Nailing his

 theses to the Wittenburg door was a standard way to distribute information

 to his academic community for discussion, much like putting a research

 paper on an Internet server today.  In Luther's time, intellectual property

 laws hadn't even been contemplated, so his papers were fair game for

 publication (as today's Internet postings often seem to be, to the dismay

 of many).  Luther's ideas quickly became the talk of Europe.  Heresy sells,

 especially when the questioned authority is corrupt.  But the speed of

 printing technology caught many by surprise.  Even Luther, defending

 himself before the pope, was at a loss to explain how so many had been

 influenced so fast.



 Luther's initial goal was to reform the church.  But his ideas were

 rejected and he was excommunicated by his order, the pope and the emperor,

 convincing Luther that the Antichrist was in charge in Rome.  Abandoning

 attempts at reform, but accepting Biblical prophecy, Luther resisted the

 utopian goal of removing the Antichrist from the papacy.  Instead, as a

 pacifist, he focused on teaching and preaching his views of true

 Christianity.  Luther believed that he could make the world a better place

 by countering the angst and insecurity caused by the Antichrist, not that

 he could save it by his own powers. 



 Luther's philosophy would serve the Internet's utopians well, especially

 those who believe that the Internet's economy of ideas untainted by

 advertising must "win" over the mass media's Anti-net ideas.  The

 Internet's incredibly low cost of distribution almost assures that it will

 remain free of advertising-based commerce.  Nonetheless, if lobbying by

 network idealists succeeds in derailing or co-opting efforts to build an

 advertising-based internetwork, then surely commercial interests will

 conspire with government officials to destroy or perhaps worse, to take

 over the Internet by political and economic means.  Historians, instead of

 comparing the Internet to the U.S. interstate highway system's success, may

 compare it with the near-destruction of the nation's railroad and trolley

 infrastructure by corrupt businesses with interests in automobiles and

 trucking.



 (which, like the Internet, was originally funded for military purposes)



 The printing press and cheap paper did not lead to widespread literacy in

 Europe; that event awaited the wealth created by the Industrial Revolution

 and the need for educated factory workers.  Printing technology's immediate

 and profound effect was the destruction of the self-serving, homogenized

 point of view of a single institution.  Although today's mass media don't

 claim divine inspiration, they are no less homogenized and at least as

 self-serving.  The people drown in information overload, but one point of

 view is barely discernable from another, ironically encouraging

 polarization of issues.



 Richard Butler, Australia's ambassador to the United Nations, draws the

 most disturbing analogy of all.  Butler, a leader in disarmament, compares

 the church's actions to the nuclear weapons industry's unwillingness to

 come under public scrutiny.  Like the church and its Bible, physicists

 argued that their subject was too difficult for lay people.  Medieval popes

 sold salvation; physicists sold destruction.  Neither was questioned until

 information began to move more freely.  The political power of nuclear

 weapons has begun to fall in part due to the role of the Internet and fax

 communications in the dissolution of the Soviet Union.



 The truly influential and successful early publishers, such as Aldus

 Manutius, were merchant technologists who formed collaborations with the

 scientific/academic community and even the church, especially those who

 dissented against Rome.  Out of business needs for economies of scale, they

 brought together people with diverse points of view and created books that

 appealed to diverse communities.  The Renaissance was propelled in part by

 books that allowed geniuses such as Copernicus to easily compare and

 contrast the many points of view of his predecessors, reaching

 world-changing conclusions.



 Today we are at a turning point.  We are leaving behind a world dominated

 by easy, audiovisual, sensational, advertising-based media, beginning a

 future in which the mass media's power will be diluted by the low cost of

 distribution of many other points of view.  Using the Internet is still

 something like trying to learn from the pre-Gutenberg libraries, in which

 manuscripts were chained to tables and there were no standards for

 organization and structure.  But like the mendicant scholars of those days,

 today's "mendicant sysops," especially on the Internet, are doing much of

 the work of organization in exchange for free access to information.



 Today, the great opportunity is not to make copies of theses on the digital

 church doors.  It is to build electronic magazines, newspapers, books,

 newsletters, libraries and other collections that organize and package the

 writings, photos, videos, sounds and other multimedia information from

 diverse points of view on the networks.  The Internet, with one foot in

 technology and the other in science and academia, needs only a bit of help

 from the mass media in order to show the Anti-net how it's done.



 ------------

 Nick Arnett [nicka@mccmedia.com] is president of Multimedia Computing

 Corporation, a strategic consulting and publishing company established in

 1988.  On the World-Wide Web: <URL:http://asearch.mccmedia.com/>



 Recommended reading:  "The printing press as an agent of change:

 Communications and cultural transformation in early-modern Europe," Vols. I

 and II.  Elizabeth Eisenstein.  Cambridge University Press, 1979.



 Copyright (c) 1994, Multimedia Computing Corp., Campbell, Calif., U.S.A.

 This article is shareware; it may be distributed at no charge, whole and

 unaltered, including this notice.  If you enjoy reading it and would like

 to encourage free distribution of more like it, please send a contribution

 to Plugged In (1923 University Ave., East Palo Alto, CA 94303), an

 after-school educational program for children in under-served communities. 



 Multimedia Computing Corp.

 Campbell, California



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  

.