💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JAUC › jauc1-3.phk captured on 2022-06-12 at 13:01:58.

View Raw

More Information

-=-=-=-=-=-=-


  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
  ======================================================================
  ISSN 1074-3111           Volume One, Issue Three        April 30, 1994
  ======================================================================
    
      Editor-in-Chief:         Scott Davis      (dfox@fennec.com)
      Technology Editor:       Max Mednick      (kahuna@bga.com)
      Consipracy Editor:       Gordon Fagan     (flyer@fennec.com)
      Network Security:        George Phillips  (ice9@bga.com)

      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC

      U.S. Mail:
      The Journal Of American Underground Computing 
      10111 N. Lamar #25
      Austin, Texas 78753-3601

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 IMPORTANT ADDRESSES - 
 ============================================================================
 To Subscribe to "TJOAUC", send mail to:              sub@fennec.com
 All questions/comments about this publication to:    comments@fennec.com
 Send all articles/info that you want published to:   submit@fennec.com
 Commercial Registration for Profitable Media:        form1@fennec.com
 ============================================================================

 "The underground press serves as the only effective counter to a growing
 power, and more sophisticated techniques used by establishment mass media
 to falsify, misrepresent, misquote, rule out of consideration as a priori
 ridiculous, or simply ignore and blot out of existence: data, books,
 discoveries that they consider prejudicial to establishment interest..."

 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
 
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 Contents Copyright (C) 1994 The Journal Of American Underground Computing
 and/or the author of the articles presented herein. All rights reserved. 
 Nothing may be reproduced in whole or in part without written permission 
 of the Editor-In-Chief and/or the author of the article. This publication
 is made available periodically to the amateur computer hobbyist free of
 charge.  Any commercial usage (electronic or otherwise) is strictly
 prohibited without prior consent of the Editor, and is in violation of
 applicable US Copyright laws. To subscribe, send email to sub@fennec.com

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 DISCLAIMER AND NOTICE TO DISTRIBUTORS -

 NOTE: This electronic publication is to be distributed free of charge
 without modifications to anyone who wishes to have a copy. Under NO
 circumstances is any issue of this publication, in part or in whole, 
 to be sold for money or services, nor is it to be packaged with other 
 computer software, including, but not limited to CD Rom disks, without 
 the express written or verbal consent of the author and/or editor.
 To obtain permission to distribute this publication under any of the
 certain circumstances stated above, please contact the editor at one of
 the addresses above. If you have intentions of publishing this journal
 in any of the ways described above, or you are in doubt about whether or
 not your intentions conflict with the restrictions, please contact the
 editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
 This publication is provided without charge to anyone who wants it.
 This includes, but is not limited to lawyers, government officials,
 cops, feds, hackers, social deviants, and computer hobbyists. If anyone
 asks for a copy, please provide them with one, or mail the subscription
 list so that you may be added.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 3

                          TABLE OF CONTENTS

  1)   Visa Establishes International Consortium...      NewsWire
  2)   Cyberspace Cowboy                                 Maureen Harrington
  3)   A Message From The Vice President                 Al Gore
  4)   Legion Of Doom T-Shirts                           Chris Goggans
  5)   Computers Tnd The Second Amendment                Carl Guderian
  6)   How To Survive The First Year Of Law School..     Mike Godwin
  7)   Notes From Cyberspace - 2nd Edition               Readers
  8)   Editorial Of The Month [A Humorous Diddy]         Marco Landin
  9)   Whitehouse Electronic Publications FAQ            Stanton McCandlish
  10)  Redefining The Modem User                         Ed Cavazos
  11)  Texas ISDN - Request For Comments                 Public Util. Comm.
  12)  Test Scores, Funny, But Makes You Wonder          Anonymous
  13)  An Interview With Tom Jennings                    Jon Lebkowsky
  
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 J.R. "Bob" Dobbs - The Ultimage SubGenius
                  @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                  @@@@@@@^^~~~~~~~~~~~~~~~~~~~~^^@@@@@@@@
                  @@@@@@^     ~^  @  @@ @ @ @ I  ~^@@@@@@
                  @@@@@            ~ ~~ ~I          @@@@@
                  @@@@'                  '  _,w@<    @@@@
                  @@@@     @@@@@@@@w___,w@@@@@@@@  @  @@@
                  @@@@     @@@@@@@@@@@@@@@@@@@@@@  I  @@@
                  @@@@     @@@@@@@@@@@@@@@@@@@@*@[ i  @@@
                  @@@@     @@@@@@@@@@@@@@@@@@@@[][ | ]@@@
                  @@@@     ~_,,_ ~@@@@@@@~ ____~ @    @@@
                  @@@@    _~ ,  ,  `@@@~  _  _`@ ]L  J@@@
                  @@@@  , @@w@ww+   @@@ww``,,@w@ ][  @@@@
                  @@@@,  @@@@www@@@ @@@@@@@ww@@@@@[  @@@@
                  @@@@@_|| @@@@@@P' @@P@@@@@@@@@@@[|c@@@@
                  @@@@@@w| '@@P~  P]@@@-~, ~Y@@^'],@@@@@@
                  @@@@@@@[   _        _J@@Tk     ]]@@@@@@
                  @@@@@@@@,@ @@, c,,,,,,,y ,w@@[ ,@@@@@@@
                  @@@@@@@@@ i @w   ====--_@@@@@  @@@@@@@@
                  @@@@@@@@@@`,P~ _ ~^^^^Y@@@@@  @@@@@@@@@
                  @@@@^^=^@@^   ^' ,ww,w@@@@@ _@@@@@@@@@@
                  @@@_xJ~ ~   ,    @@@@@@@P~_@@@@@@@@@@@@
                  @@   @,   ,@@@,_____   _,J@@@@@@@@@@@@@
                  @@L  `' ,@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                  @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
 
 
 THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - April 30,1994 ISSN 1074-3111
 ============================================================================

 EDITOR'S NOTES:
 
 FREE-NET: I had intended to do some kind of informative article on
 the Free-Net systems around the world for this issue. In my attempts to 
 get information, I mailed about 60 individuals/groups requesting information
 on their organization. I contacted persons in several countries as well as
 many, many people here in the states. ...and low and behold, only 2 people
 responded offering information. Half did not reply at all, and the other
 half (minus the two brave souls mentioned above) replied saying that they
 had not developed an organization, had no info, no volunteers, etc...
 Go figure...(Is Free-Net the Vapor-Ware of the 90's??)

 PUBLISHING:  Our original publishing schedule has gone to hell-in-a-handbasket
 to say the least. We will probably release 2 or 3 times per quarter.

 Order some Legion Of Doom T-Shirts!

 Share this issue with all of the little boys and girls that you know who
 have an e-mail address.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                VISA ESTABLISHES INTERNATIONAL CONSORTIUM FOR 
                     ELECTRONIC PURSE SPECIFICATIONS

 /PRNEWSWIRE (C)opyright 1994

  SAN FRANCISCO, March 22 /PRNewswire/ -- Visa today formed an international
 consortium of market leaders in the consumer payments industry to develop
 common specifications for a new way to pay -- an "Electronic Purse," a card
 with a micro chip that can be used instead of cash and coins for everything
 from vending machines to public transportation.

  The Electronic Purse would consist of a micro-chip embedded in a credit
 card, debit card, or stand alone card to store value electronically.  
 The card would replace cash and coins for small-ticket purchases (less than 
 U.S. $10), such as gasoline stations, pay phones, road/bridge tolls, video 
 games, school cafeterias, fast food restaurants, convenience stores, and 
 cash lanes at supermarkets. Cardholders can "reload" the micro-chip and 
 control the amount of value stored in the card's memory.  The Electronic 
 Purse provides cardholders with the security and convenience of carrying 
 less cash and coins, eliminating the need for exact change.  Many 
 participants in this worldwide effort are currently pilot testing electronic 
 purse products, additional pilots are expected in late 1995.
 
  Joining forces with Visa to develop international technical specifications
 for the Electronic Purse are: Banksys; Electronic Payment Services, Inc.,
 (EPS); Financial Information Systems Center, (FISC); Groupement des Cartes
 Bancaires, (CB); NationsBank Corporation; Sociedad Espanola de Medios de 
 Pago, (SEMP); Sociedade Interbancaria de Servicos, S.A., (SIBS); and 
 Wachovia Corporation.  To ensure worldwide representation, limited additional 
 payment systems that have invested energies in open-market electronic purse 
 projects, will be invited to join.  In addition, Visa will form a parallel 
 group with technology companies to ensure the specifications support low-cost, 
 efficient production of necessary equipment.

  "The goal of our combined efforts is to lead the market into the next
 frontier of payment processing -- the automation of cash and coins," said Ed
 Jensen, president and chief executive officer, Visa International. "The 
 highly complementary capabilities of the participating companies will allow 
 us to address issues for all aspects of smart card-based electronic purse 
 solutions, including the cards themselves, point-of-sale systems, networks 
 and back-end interchange and settlement systems."

  This announcement reflects Visa's commitment to providing superior,
 convenient payment services to its member financial institutions who serve
 consumers and merchants around the globe.  The consortium was formed in
 response to member requests that Visa take the lead in facilitating the
 addition of an electronic purse to existing credit and debit cards, as well 
 as the introduction of a stand alone card.  Visa will leverage its global 
 brand presence by teaming up with strategic partners to develop common 
 standards.
 
  "The most critical step in making this concept a global market reality is
 the definition of open standards that can be shared among all participants,"
 said Wesley Tallman, president, Visa Products and Information Services.
 "Recognizing that important domestic electronic purse developments are
 underway, the consortium will leverage the expertise of all participants.
 Group 'knowledge sharing,' especially with our European participants that 
 have made significant advancements in the chip card arena, will facilitate 
 the development of a specification that is relevant to markets worldwide."
 The technological specifications will govern the standards needed to 
 establish an infrastructure that supports electronic purse payments.

  The worldwide market for automating cash transactions remains virtually
 untapped.  According to the Bank for International Settlement, consumer cash
 transactions in the U.S. alone exceed 300 billion per year.  By contrast,
 bank-facilitated consumer transactions, such as credit and debit cards,
 checks, and wire transfers total only 60 billion per year.  As these figures
 indicate, there is a vast market potential for automating cash transactions.
 "EPS has been investing significant resources to develop smart card solutions
 since 1991," stated David Van Lear, chairman and chief executive officer of
 Electronic Payment Services, Inc.  "Combining the resources of these industry
 leaders will accelerate market acceptance."
 
  Just as the standard operating environments have fueled the growth of the
 personal computer industry, the specifications that emerge from this
 collective effort will provide the essential framework to ensure
 compatibility, reduce development time and cost, and open up the market for
 others.
 
 International payment system participants included in this cooperative
 effort are:

 Banksys -- based in Brussels, Belgium, is a leading European specialist in
 electronic funds transfer (EFT) and payment security. Banksys operates the
 automated teller machine (ATM) and point-of-sale (POS) network on behalf of
 all card issuing banks in Belgium.  Besides Belgium, 10 other countries are
 equipped with the Banksys system. Banksys is entrusted with the development 
 of the Belgian Electronic Purse project, with pilot testing expected to begin 
 in December 1994.
 
 Electronic Payment Services, Inc.(EPS) -- based in Wilmington, Del., is the
 leading electronic funds transfer company in the United States with an annual
 transaction volume of 1.7 billion.  EPS is the holding company for BUYPASS
 Corporation and MONEY ACCESS SERVICE INC., operator of the MAC(R) network.

 Financial Information Systems Center (FISC) -- based in Taipei, Taiwan, is a
 government organization that supports electronic purse initiatives in that
 country.  Through its members, FISC has issued 80 thousand integrated circuit
 cards and has installed more than one thousand point-of-sale systems with
 integrated circuit card readers.
 
 Groupement des Cartes Bancaires (CB) -- based in Paris, is the country's
 payment cards organization that has succeeded in launching the world's 
 largest integrated circuit card program, with more than 22 million cards in
 circulation generating 2.2 billion transactions per year.
 
 NationsBank Corporation -- headquartered in Charlotte, N.C., is the third
 largest banking company in the United States with approximately $158 billion
 in assets, more than 1,900 retail banking centers in nine states and the
 District of Columbia, and consumer offices in 33 states. NationsBank is a
 financial services company providing products and services nationally and
 internationally to individuals, businesses, corporations, institutional
 investors and government agencies.
 
 Sociedad Espanola de Medios de Pago (SEMP) -- based in Madrid, SEMP is a
 sister company of Visa Espana, a group member of Visa banks in Spain.  SEMP
 operates Sermepa, the card processing company of Visa Espana.

 Sociedade Interbancaria de Servicos, S.A., (SIBS) -- based in Lisbon,
 Portugal, is the country's leading bank payments company which provides
 electronic clearing services and operates the national Multibanco ATM and
 EFT/POS networks.  As an extension to its service offerings, SIBS, is
 introducing the Multibanco Electronic Purse, (MEP).
 
 Visa International -- headquartered in the United States, is the world's
 leading consumer payments system with more than 333 million cards issued, 
 more than 11 million acceptance locations, and the largest global ATM 
 network.

 Wachovia Corporation -- with dual headquarters in Atlanta, and
 Winston-Salem, N.C., is one of the United States' leading debit card issuers
 and provides credit card services to three million cardholders nationwide.
 
 /NOTE TO EDITORS:  In December 1993 Visa International, MasterCard
 International and Europay announced an agreement to form a joint working
 group to develop a common set of technical specifications for the 
 integration of microprocessor chips in payment cards -- commonly known  as 
 "Integrated Circuit," "Chip," and "Smart" cards.  The electronic currency 
 specifications referenced in this release will enable the  electronic purse 
 application to be added to the integrated circuit  cards./
 
   /CONTACT:  Albert Coscia of Visa, 415-432-2039/

 03/28 VISA TECHNOLOGY GROUP SUPPORTS ELECTRONIC PURSE SPECIFICATIONS

  SAN FRANCISCO, /PRNewswire/ -- Visa today announced the formation
 of a technology group of international manufacturers to support the 
 adaptation of specifications for a variety of technologies that will 
 facilitate the issuance and acceptance of the "Electronic Purse" -- a payment 
 card that stores value electronically and is designed to replace cash and 
 coins for a wide range of low-value (under U.S. $10) consumer payments.
 
   The technology group will work with Visa who recently formed an
 international consortium of payment systems that will develop common
 specifications for Electronic Purse programs.  Because plans are underway 
 for the card to be used globally in a variety of venues -- including, 
 gas/petrol stations, grocery stores, convenience stores, fast food 
 restaurants, school cafeterias, and for such routine items as telephone calls 
 from pay phones, road/bridge tolls and video games -- a number of 
 technologies required to support card acceptance in global markets will be 
 examined by the group.
 
   The first suppliers to join the international technology group are 
 VeriFone, Inc., the leading global provider of point-of-sale transaction 
 systems, and Gemplus, SCA, the world's leading manufacturer of smart cards.  VeriFone and
 Gemplus have formed a joint venture, called VeriGem, to pursue electronic
 purse opportunities.  To ensure worldwide representation, additional
 technology leaders who have invested energies in electronic purse 
 applications will be invited to join the group.
 
   In addition to acceptance technologies, "loading" systems that enable
 cardholders to restore currency value into the micro chip will also be
 analyzed.  Automated Teller Machines (ATMs) are expected to play an important
 role in loading value into the electronic purse. Future loading methods, such
 as specialized devices located at merchant locations or in the home, will 
 also be explored.  Operating both the largest international consumer payment
 network, VisaNet, and the world's largest ATM network puts Visa in a unique
 position to lead this global effort.
 
   "As with all emerging technologies, consultation with suppliers responsible
 for physically implementing the technology is critical to ensuring the
 viability of the product design," said Wesley Tallman, president, Visa
 Products and Information Services. "As market leaders in the payment systems
 field, all of those who have joined us in this initiative are truly partners
 in paving this 'express lane' of the electronic payment superhighway."
 
   Tallman emphasized that the technology group will be charged with ensuring
 that the specifications developed by the consortium support low-cost,
 efficient production of necessary systems and equipment.
 This group approach has been a key tool in support of Visa's product and
 market development efforts.  In December 1992, Visa formed a manufacturer's
 group to support development efforts for security specifications of 
 integrated circuits on payment cards. Still active today, this group lends 
 critical on-going support and expertise to Visa's chip card efforts.  
 Participants in this international group include: Bull, CPS (France); 
 Gemplus, (France); Giesecke and Devrient (Germany); Schlumberger Industries 
 (France); and Toshiba Corporation (Japan).  Visa expects and welcomes the 
 participation of these and other technology partners in the electronic purse 
 effort.
 
   Hatim Tyabji, chairman, president and chief executive officer of VeriFone,
 agreed with the need for a supplier's group that would lend systems expertise
 to this effort.  "Establishing worldwde specifications is the essential first
 step in the global standardization of the electronic purse, uniting all
 industry participants on a common playing field with a common set of rules.
 The endorsement and support of the electronic purse by Visa, its member banks
 and leading worldwide payment systems send a strong message to the industry 
 -- the electronic purse is no longer merely a possibility, but a real market
 direction," said Tyabji.
 
   "With their high storage capacity, programmability and increasing
 affordability, smart cards are now poised to move beyond specialized
 applications and become a truly universal payment medium," said Dr. Marc
 Lassus, president and chief executive officer of Gemplus.  "We share the
 consortium's vision of the electronic purse, and are excited about helping 
 to bring speed, reliability and efficiency of smart card-based electronic 
 cash to markets around the globe."
 
   Visa International, headquartered in San Francisco, California, is the
 world's leading consumer payments system with more than 333 million cards
 issued, more than 11 million acceptance locations, and the largest global 
 ATM network.

  VeriFone, Inc., based in Redwood City, California, is a leading global
 provider of Transaction Automation solutions used to deliver payment
 processing and other transaction services to various retail market segments,
 as well as the healthcare and government benefits market.  The company has
 more than 30 facilities located throughout Asia, Europe and the United States.
 To date, VeriFone has shipped more than 3.4 million Transaction Automation
 systems, which have been installed in more than 70 countries.  Net revenues 
 in 1993 were U.S. $258.9 million.
 
   Gemplus Card International, based in Gemenos, France, is the leading
 worldwide manufacturer of smart cards.  Gemplus' cards are used for secure
 transactions in public and cellular telephone, banking, pay TV,
 transportation, healthcare and defense applications.  The company has three
 manufacturing facilities: two near Marseilles, France, and one near 
 Stuttgart, Germany.  Current Gemplus production exceeds 14 million cards 
 per month.  The company has direct sales offices in 12 countries and a 
 distribution network covering an additional 50 countries worldwide.  The 
 company's 1993 revenues were U.S. $130 million.
 
   NOTE:  Gemplus is a registered trademark of Gemplus Card International.
 VeriFone is a registered trademark of VeriFone, Inc. Visa is a registered
 trademark of Visa International, Inc.
 
     /NOTE TO EDITORS:  On March 22, 1994, Visa announced the formation of an
 international consortium to develop worldwide technical specifications for 
 the Electronic Purse.  The supplier's group discussed in this release is a
 complementary effort, serving Visa  in a consultative or advisory capacity.
 
   /CONTACT:  Albert Coscia of Visa, 415-432-2039/

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  
                         CYBERSPACE COWBOY

     John Perry Barlow rides the range on the electronic frontier
 
 By Maureen Harrington
 
 PINEDALE WY-  John Perry Barlow isn't exactly your average
 computer big shot.  Burly and bearded, prone to an eccentric mix
 of gaudy cowboy shirts and Italian leather jackets, he's a far
 cry from a pencil neck geek with a pocket protector and a Mensa
 membership.  His interest in technology tends less to megabytes
 than toward souping up the V-8 in his pickup.
 
 But neither is he cut out for a corporate dance card.  Barlow's
 sarcasm would get him tossed out of most boardrooms.
 
 Despite his unusual resume'- lyricist for the Grateful Dead,
 former Students for a Democratic Society organizer with an
 impeccable Republican pedigree, and failed Wyoming cattle rancher
 with the heart of an environmentalist- Barlow, 46, found a niche
 in computers. Accidentally.
 
 He's an outlaw at heart who lost his home on the range and found
 another.  Barlow intends to keep the electronic frontier free of
 rustlers, ruffians and the strong and long arm of the feds.  Just
 as he fought to keep the West free of polluters, developers and
 the strong and long arm of the law.
 
 The computer community has its first cultural historian, critic
 and social activist.  Barlow has set out to watchdog the goings
 on in cyberspace- the intangible place between the computer key
 board and the dots that appear on the computer screen.
 
 He's become, by dint of his megaverbal skills and nontechnical
 point of view, the cowboy conscience of the computer culture. 
 He's regarded by computer CEO's, journalists who follow the
 industry and the wildcatters who swoop through systems as the man
 to ask about the future of technology.
 
 Barlow not only writes and speaks about the future that is racing
 down the information highway, he puts his talent where his mouth
 is: he helped found the Electronic Frontier Foundation (EFF) in
 1991, along with Mitch Kapor, inventor of Lotus 1-2-3, the best-
 selling spreadsheet software in the world and with an assist from
 Steve Wozniak, Apple computer's onetime whiz kid.
 
 Kapor and Barlow started the foundation to protect the right to
 privacy in cyberspace.  They had both been visited by federal
 agents looking for the second-story men of the computer industry-
 hackers.  They became alarmed.
 
 The tale of Kapor and Barlow's friendship has become one of the
 first cyberspace legends.
 
 "I was sitting here in Pindale, enjoying this new found world on
 my computer, when an FBI agent shows up asking me what I might be
 doing on it," said Barlow.
 
 At the time, Barlow was unaware of a growing government concern
 about what they considered computer crimes of the most heinous
 nature.
 
 "A nice guy, but he was expert in cattle rustling, not in high-
 tech crime," recalled Barlow.  "I tried to explain it to him, but
 he didn't really understand computers.  He went on back to the
 office."
 
 Barlow got on the techies' horn- the WELL, a computer bulletin
 board- and alerted users all over the country to what happened. 
 In Connecticut, at about the same time, Kapor also  had been 
 visited by the feds.  Like Barlow, Kapor was concerned about
 government invasion in this newly forming world.
 
 He and Barlow got together via computers, naturally.  Later
 Kapor, on the way to the West Coast from his home on the East
 Coast, dropped into Wyoming in his private jet to talk with
 Barlow.
 
 As Barlow tells it, "Here we are two very different guys- one
 from Long Island, who has been a leader in this field for years
 and me, a small town Wyoming rancher who just figured out how to
 turn these things on.  I felt like I'd known Mitch all my life."
 
 In a few hours at a kitchen table in Wyoming, the two men
 conceived the first civil rights group for high-tech's new age.
 
 EFF, now headquartered in Washington, D.C., raises money for
 lobbying and provides funds for the defense of so-called
 "computer criminals."  Their first projects were helping with the
 legal defense of hackers who the founders don't think deserved
 such harsh treatment by the feds.
 
 "Oh, hell, these were kids mostly," said Barlow.  "Just fooling
 around.  They were being treated like major criminals.  This
 hacking is a lot like boys going out to abandoned buildings and
 looking around.  Yeah, the property owners don't like it, but
 it's part of a boy's life as far as I can tell."
 
 Barlow and Kapor have been bitterly criticized for their support
 of what many in corporate America- the software and telephone
 companies, in particular- say are serious criminals.
 
 Barlow takes that into consideration: "Crimes should be
 prosecuted.  There are some real bad things being done on these
 machines.  But that doesn't mean that we shouldn't be watching
 out for misuse of  (government) power and helping to protect the
 innocent.  We're into educating people about this stuff, as much
 as anything."
                          -----------
 
 Barlow doesn't fit, by nature or training, into either the
 techno-wonk category or the big money elite that has developed
 around the technology.  Nonetheless, both factions of the
 computer culture listen to him.
 
 He's preaching the sermon of change, from his high-tech pulpit:
 the computer bulletin board.  Barlow can be read on The WELL (one
 of the first and largest bulletin boards) as well as in the op-ed
 pages of the New York Times and the slick computer-lifestyle
 magazines, Wired and Mondo 2000.
 
 He's been profiled in the New York Times and quoted as an expert
 on the computer culture in scores of newspapers and
 newsmagazines.  Remarkably, Barlow had never used a computer
 until four years ago.  He caught on fast.
 
 "Oh, Jesus," he said, rolling his eyes, impatient with ordinary
 definitions of jobs.  "I'm a techno-crank.  I've got all kinds of
 hats on and most of them don't fit exactly.  But let's just say I
 came into computers late, but I was able to see fairly quickly
 some of the possibilities and problems of this new reality.
 
 "I got my first computer to do some of the accounting work for
 the ranch (The Bar Cross, outside Pinedale), in the late '80's. 
 I discovered that you could talk to people on it.  I got
 fascinated."
 
 "Fascinated," for most of us, constitutes a hobby.
 
 For Barlow, fascination turned into a new career.  Caught in the
 double bind of rising taxes and expenses and lower prices for
 cattle, Barlow had to sell the Bar Cross, which had been in the
 family for three generations.  Just as that part of his life was
 ending, he was catapulted into cyberspace.  And his future.
 
 Barlow is one of the few nontechnoids who has caught the
 attention of the citizenry of cyberspace.  In fact, he was the
 first to co-opt the word "cyberspace" from sci-fi novelist
 William Gibson and use it in everyday language.
 
 According to Bruce Sterling, a journalist, novelist and
 accomplished chronicler of computer culture, "Barlow saw that the
 world of electronic communications, now made visible through the
 computer screen, could no longer be regarded as just a tangle of
 high-tech wiring.  Instead it had become a place, cyberspace,
 which demanded a new set of metaphors, a new set of rules and
 behaviors."
 
 Sitting in his mothers home in Pinedale, wearing a short kimono
 over jeans and boots, Barlow had been on the phone, fax and modem
 all morning.  Mim Barlow, from whom he inherited his
 conversational skills, was decked out in bright red lipstick and
 matching rhinestone earrings.
 
 She has no problem, pointing out that although her son "was a
 brilliant child- quite interesting to raise- I thought for sure
 he was doomed.
 
 "His father and grandfather were alcoholics, and he was going
 down the same road."
 
 Barlow no longer drinks.
 
 "Hell, he was headed for juvenile delinquency," said Mim Barlow.
 "No question.
 
 "We got him out of town.  Sent him to Fountain Valley, a prep
 school outside of Colorado Springs.  Best thing that ever
 happened to this town."
 
 The best thing that happened to her son, too, he freely admitted:
 
 "I'm forever in debt to that school.  It saved me.  I hope my
 three girls will be able to go there, if I can afford it."
 
 (Barlow is divorced from his wife Elaine, who remains in Pinedale
 with their three children.  Barlow commutes between Wyoming and
 New York City.  He serves on the board of Fountain Valley.)
 
 Barlow met his fate at prep school: Bob Weir, a co-founder of the
 Grateful Dead and life-long friend.  Barlow has been writing for
 the Grateful Dead since 1970, including the lyrics for "Hell In a
 Bucket," "Picasso Moon," and "I need a Miracle."  The royalties
 kept the family ranch afloat for years and pay Barlow's bills
 now.
 
 "There's a resurgence in interest in the band and I'm actually
 picking up the pace a little," said Barlow.
 
 "You know I saw Bobby Weir last year," interjected Barlow's
 eighty something mother.  "He didn't look so good.
 
 "This one," she nodded at her son like he's a questionable head
 of beef, "looks better."
 
 Barlow shot his mother a look of mild disgust.  "Hell, Ma, Bob's
 had a *life*.  It shows, that's all."
 
 Barlow has had quite a life, too.
 
 After graduating from Wesleyan University in Connecticut, he was
 swept into the counterculture.  He went to India.  Rode
 motorcycles around Europe and was in and out of Haight-Ashbury. 
 He wandered back to the United States, in the early '70's, and
 was headed to Hollywood for a job, when he stopped at the family
 ranch on the way to Glamourville.  He didn't get out of Wyoming.
 
 "The ranch was in a mess.  My dad had been sick.  We were in
 debt.  I found something I could put my hand to.  I was a hippie
 that was running cattle and trying to keep the land.  I got
 married and had kids."
 
 Along the way, true to his deep Republican roots, he became an
 activist.  Two generations of Barlows were in the Wyoming Senate. 
 John Perry may have gotten there too, but he narrowly missed
 winning a Senate seat in 1987 running as a Republican.
 
 Instead, he became involved in the small town life.  He set out
 to protect that way of life by becoming an environmentalist-
 rancher, which is considered a bit of an oxymoron in the West. 
 But environmentalism is, in Barlow's estimation, "inevitable. 
 You've got to conserve the land."
 
 The loss of his land still rankles.  Driving through the Bar
 Cross acreage, now owned, as many ranches around Pinedale are, by
 a wealthy "weekend rancher," Barlow tightens up a little:  "I did
 the best I could.  I just couldn't make a go of it."
 
 Barlow sold his land at, "about break-even."
 
 He's been living mostly in New York for the past several years,
 writing for various magazines and becoming more and more famous
 on the electronic grapevine.  He travels constantly and is as
 provocative a speaker as he is writer.  While his income is still
 largely from royalties, he's commanding more attention and fees
 as a speaker.  He's spoken in China to a scientific congress and
 has been asked to help explain the future of information to the
 CIA.
 
 Barlow doesn't find that such an odd task for a social activist:
 "Like so many organizations, the CIA is waking up to the fact
 that they know nothing about this technology.  And, they are
 realizing that if they don't know about the revolution in
 information, they will be left behind.
 
 "People who don't accept this change are going to be left behind. 
 What we once thought of as power and wealth is changing.  Who's
 in charge is changing."
 
 Barlow's business card may say it all:  There are nine phone,
 fax, modem, and beeper numbers.  Under his name, his title reads,
 "cognitive dissident."
 
 In a new book, "The Hacker Crackdown: Law and Disorder on the
 Electronic Frontier" (Bantam $23), Sterling calls Barlow, "a
 computer networker of truly stellar brilliance.  He has a poet's
 gift of concise, colorful phrasing.  He also has a journalist's
 shrewdness, an off-the-wall, self deprecating wit and a
 phenomenal wealth of simple personal charm."
 
 Sterling adds that Barlow is "a gifted critic...who coins the
 catchphrases and the terms of debate that become the common
 currency of the period."
 
 John Perry Barlow has become the poet laureate of technologies
 new age.
 
 He's the hackers' hero- patrolling the borders of the newly
 discovered frontiers of technology.  If anyone is going to
 explain the social, legal and personal implications of all the
 megachange coming down the high-tech pike, it's Barlow.
 
 As he has written in the latest edition of Wired:  "In the little
 hick town I come from, they don't give you much credit for just
 having ideas.  You are judged by what you make of them."
 
 Using that criterion, Barlow may just have a future in
 cyberspace.
 
 *** Maureen Harrington is a Denver Post staff writer. ***  

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                    A MESSAGE FROM THE VICE PRESIDENT
                        ON NETWORK ACCESS REFORM
  
 By Al Gore (vice.president@whitehouse.gov)
 
 Greetings.  I'll leave it to others to carry on the important work
 former president Clinton started in health care reform after discovering
 that 37 million Americans have no health insurance.
 
 Now that Clinton has magnanimously stepped down, rather than embroil the
 US in lengthy Whitewater hearings, and I'm president, I plan to make it
 my top priority to deal with a really serious problem.  As horrifying
 and unthinkable as it is in this day and age, 212 million Americans
 don't have network access.
 
 The current network situation is an intolerable and inefficient
 hodgepodge of private, university, and government access providers.
 People in different parts of the country pay different amounts for
 network access.  Different providers give different levels of service.
 There's no excuse for this.  Access to the net -- *equal* access to the
 net -- is a fundamental human right.
 
 Tipper and I have developed a program which will guarantee equal access
 to the information superhighway to all Americans, tall or poor, rich or
 thin, white or non-smokers.
 
 All access to the net will be through one's employer.  Employers will
 deal only with large centralized network access providers.  There will
 be only one provider in each area of the country, cutting down on
 wasteful duplication.  All providers will be heavily regulated, and
 will be required to offer the exact same services for the exact same
 prices.  All employers will be required to participate, and to pay the
 full costs.
 
 Unemployed people's access will be paid for by the government.  This
 is not expected to require any tax increase.  At least, not a very large
 tax increase.  At least, not before the next election.
 
 Since individuals will not be charged for the services, some may be
 tempted to abuse the privilege.  Especially because many newsgroups are
 known to be highly addictive.  To prevent this, newsgroup access will be
 available only by prescription.
 
 For instance, if someone wants access to alt.sex, they would schedule
 an appointment with their Primary Network Consultant.  In a few weeks,
 when the appointment comes up, they'd come in at 8 am and get to speak
 briefly with their Consultant at some time that day or evening.  The
 Consultant would refer them to a sex consulatant or other specialist,
 as appropriate.  After a few weeks, they'd have a similar appointment
 with the specialist, who would then prescribe alt.sex or some other
 newsgroup as appropriate.  They would take the prescription to their
 Network Access Provider to get the prescribed newsgroup added to their
 .newsrc.  To prevent fraud and corruption, all prescriptions will be
 carefully tracked by the government in large databases, closely secured
 against everyone who doesn't have the carefully guarded top secret
 phone number for modem access (202-456-1414).  Also, all prescriptions
 automatically expire after 30 days.  They can be renewed only after
 another appointment with one's Primary Network Consultant and the
 specialist he refers one to.
 
 FTP, IRC, Gopher, WAIS, World Wide Web, Archie, telnet, rlogin, finger,
 and e-mail, may also be made available by prescription, if they are
 approved by the Federal Data Administration (FDA).  For reasons of
 public safety, network services and newsgroups not approved by the
 FDA will be strictly banned.  Anyone caught owning, using, producing,
 providing, or advocating unapproved services, mailing lists, or
 newsgroups, will be subject to zero tolerance -- everything they
 own will be forfeited to the government, without a trial.
 
 Also, anyone who rents an apartment or gives a job to a suspected
 network abuser will be subject to zero tolerance.  Of course, this
 being a free country, nobody will actually be sent to prison without
 a fair trial.  Since nobody who's accused will be able to afford an
 attorney, the government will provide them with an attorney of our
 choice without charge.  And anyone guilty of three offenses will serve
 a mandatory life sentence without parole.
 
 Similarly with anyone who writes, posesses, distributes, manufactures,
 sells, uses, posts, backs up, saves, promulgates, perpetrates, forwards,
 or laughs at, a spoof that makes official government policies or
 proposals look ridiculous.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        LEGION OF DOOM T-SHIRTS!! 

 By Chris Goggans <phrack@well.sf.ca.us>

 After a complete sellout at HoHo Con 1993 in Austin, TX this past
 December, the official Legion of Doom t-shirts are available
 once again.  Join the net luminaries world-wide in owning one of
 these amazing shirts.  Impress members of the opposite sex, increase
 your IQ, annoy system administrators, get raided by the government and
 lose your wardrobe!
 
 Can a t-shirt really do all this?  Of course it can!
 
------------
 
 "THE HACKER WAR  --  LOD vs MOD"
 
 This t-shirt chronicles the infamous "Hacker War" between rival
 groups The Legion of Doom and  The Masters of Destruction.  The front
 of the shirt displays a flight map of the various battle-sites
 hit by MOD and tracked by LOD.  The back of the shirt
 has a detailed timeline of the key dates in the conflict, and
 a rather ironic quote from an MOD member.
 
 (For a limited time, the original is back!)
 
 "LEGION OF DOOM  --  INTERNET WORLD TOUR"
 
 The front of this classic shirt displays "Legion of Doom Internet World
 Tour" as well as a sword and telephone intersecting the planet
 earth, skull-and-crossbones style.  The back displays the
 words "Hacking for Jesus" as well as a substantial list of "tour-stops"
 (internet sites) and a quote from Aleister Crowley.
 
 All t-shirts are sized XL, and are 100% cotton.
 
 Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for
 postage.
 
 Send checks or money orders.  Please, no credit cards, even if
 it's really your card.
 
 
  Name:       __________________________________________________
 
  Address:    __________________________________________________
 
  City, State, Zip:   __________________________________________
 
 
  I want ____ "Hacker War" shirt(s)
 
  I want ____ "Internet World Tour" shirt(s)
 
  Enclosed is $______ for the total cost.
 
 
     Mail to:   Chris Goggans
                603 W. 13th #1A-278
                Austin, TX 78701
 
  These T-shirts are sold only as a novelty items, and are in no way
  attempting to glorify computer crime.
  
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

            Computers and the Second Amendment: An Opening Volley

 By Carl Guderian (bjacques@cypher.com)
 
     A friend and I were talking the other night about needing to defend
 oneself against one's own government. He was talking about guns; I was
 talking about encryption. We were talking about the same thing. I read a lot
 of debates in which the arguments for restricting computing are strikingly
 similar to those for gun control. Am I the only one who sees the parallels?
 It's certainly forced me to take another look at the gun issue.

     The last few years have given us all an appreciation for the
 Constitution, or what's left of it. Most of the action in the personal
 computer user community is centered around the First Amendment, particularly
 the rights to free expression and peaceable assembly. We've also had our
 noses rubbed in official disregard for the Fourth, Fifth, and Sixth
 Amendments. All of this has been (and is still being) discussed elsewhere.
 Tonight's topic is the Second Amendment, the people's right to keep and bear
 arms (a well regulated militia being essential to the security of a free
 state), in relation to personal computers and private networks.

      Until recently, I didn't give much thought to the gun issue, since I
 don't own a gun and probably won't be getting one anytime soon. Unless I
 move to Arizona, I can't pack heat everywhere I go, so I probably won't
 have a shooting iron handy when I really need it to shoo away a mugger if I
 run into one. The best way for me to win such an encounter is to prevent it
 from ever taking place. According to Sun Tzu, a battle is won or lost
 before it is ever fought. I don't hide out in the suburbs, but I don't
 stroll down Main at midnight with my wallet hanging around my neck, either.
 Weapons are better than nakedness, but wits are better than
 both. The existence of priests and businessmen proves it. So much for that.

     Freedom of computing, it now turns out, has a lot in common with the
 citizen's right to own a gun. Both rights are being attacked in a similar
 manner.

     Proponents of restrictions love to wave a bogeyman in our faces to get
 us to blindly go along with their hastily cooked-up bills. George Hennard
 helped a bill restricting "assault" weapons get more attention than it
 deserved. Likewise, Sen. Joe Biden touts Senate Bill 266 as protection from
 crazed hackers who might trigger World War III or, worse, steal corporate
 secrets and sell them to the Japanese. And let's not forget the drug
 kingpins who might keep their communications secret from the Law. As a law-
 abiding citizen, you've got nothing to hide so this doesn't affect you
 <grin>.

     S.B. 266 essentially mandates a government backdoor into any encryption
 scheme marketed for public use. Secrecy becomes the exclusive domain of the
 government and its partners, such as corporations doing work of vital
 military or economic importance. The rest of us have to endure possible
 casual surveillance or be proscribed for daring to keep secrets from Uncle
 Sam.

     Not just no, but No, Goddammit! Privacy is scarce enough as it is.
 Every day my file gets passed around the federal and corporate nets like a
 cheerleader at a frat party. Cheap, widespread encryption is one of the few
 physical methods available for enforcing privacy, just as in the private
 ownership of guns kept the government honest in the past. Encryption is a
 window blind pulled down in the face of the hotel dick.

     "A well-regulated militia necessary to the security of a free State,
 the right of the people to keep and bear arms, shall not be infringed."

     Historically, citizen ownership of guns has been useful for repelling
 invaders, enforcing Manifest Destiny, and keeping central government from
 getting too many ideas about control. There have been some problems in the
 past. The Whiskey Rebellion, Shays' Rebellion, and Quantrill's Raiders spring
 to mind, but no one has seriously considered disposing of the Second
 Amendment.  The last real invasion was in 1815 and we've killed off most of
 the Indians, so what does that leave?
 
     Guns in the house are no match for a government determined to do you
 ill (though they may slow down a death squad). That's probably why
 Republicans can lust for control over everyone else yet fight gun control.
 Even the Tuff-On-Crime bill making it's way through the pipeline has no real
 provision for gun control (it may, however, okay warrantless searches made
 in "good faith" and further weaken habeas corpus). Republicans know as well
 as anyone else that guns are small potatoes when someone else has all the
 money and information.

     Rights, even those guaranteed by the Constitution, are really
 guaranteed only to the extent that they are hard for a government to
 violate. Early Americans were either well-armed or westward bo
 und, qualities needed in citizens opening a new frontier. However, the 1900 
 census found America with no more frontiers; there was no more West to go to. 
 The previous census, in 1890, was the first automated census, using punched
 Hollerith cards to perform a ten-year job in six weeks. For the first time,
 the government could use machines to track its citizens' movements. Control
 began where the frontier ended. Modern American history has been a running
 battle between individual rights and government control.

     Cheap, widely available data encryption is one of two new developments
 that are tipping the scales in the citizen's favor. Explosive growth of
 computer network use (the number of Internet users grew by 90% last year) is
 the other, enabling small groups to get the political jump on big ones by
 getting vital information over the wire quickly to just about anyone who
 needs it. Data encryption enforces privacy by keeping your e-mail from
 prying eyes. It represents the first physical 
 means of keeping the Fed's nose out of your private business.

      It's too bad encryption is not widely used outside of businesses.
 Because so few people use encryption, agencies such as the NSA have an easy
 job of spying on American citizens. I'm not giving away any secrets, but
 here is how I would do it. Though it's theoretically possible to parse
 every phone conversation and data transmission, doing so is a waste of
 resources.  Profiling and other tools tell an agency which 10% of the

 population is the real threat (90% of the threat comes from 10% of the
 population).  Encryption used by other than corporations and government
 agencies is considered suspect and bears cracking by agency supercomputers.
 Fortunately for the NSA, unofficial secure traffic is not very large.
 However, this could change if, say , companies marketed secure
 communications as an alternative to the postal system (Feds can't open your
 e-mail, but you can't fax drugs eitherDlife is full of tradeoffs), or

 Americans started using encryption as a matter of course just because it's
 s imply none of the government's damned business what a private citizen
 does if he or she is not the subject of an actual criminal investigation
 (instead of a fishing expedition). Either or both of these developments
 would severely tax the government's ability to casually spy on its own
 people. It might even force the Feds to wonder if it's really worth it.
 Maybe.

     A problem with encryption is that there are very few good schemes out 
 there.  The DES algorithm is best known, but it was created by the NSA. No
 comment. The RSA (Rivest-Shamir-Adelman) algorithm is superior to DES, but
 MIT owns it and licenses cost money (DES is free). There is supposed to be 
 a freeware package based on or comparable to RSA, but it could also be NSA
 suckerware.  It's easy to get paranoid about this. A bigger problem with
 encryption is that most Americans don't value privacy enough to make the
 extra effort to secure their communications.

      The government may or may not be systematically running small networks
 and bbs's out of business by busting them right and left. That's open to
 debate.  The No Such Agency is almost certainly tapping their lines,
 though. In the short term, it would be stupid not to. That is its job. In
 the long run, though, this speeds the collapse of the Republic by dangerously 
 concentrating power.

     Power tends to accumulate. The more power one group has, the more it
 can get. Eventually, one group gets too much of it and spends most of its
 time securing it at the expense of others, whether it needs to or not
 (eventually it needs to). The firs t impulse of one of the other groups is
 to usurp the power from the first group, all with the highest of motives, of
 course. This leads to exactly the same problems. The only way to prevent an
 endless succession of power grabs is to disperse power as widely as
 possible, among people interested in limiting it for everyone. This is where
 checks and balances come in. "All power to the people (soviets)" is a
 disastrous substitute, as (thankfully) other people learned in 1798 and
 1917. All of this is explained at length and more clearly in On Power: Its
 Nature and the History of its Growth, by Bertrand de Jouvenel (Viking Press,
 New York, 1949).  The book is long out of print, but it's well worth your
 while to check it out and photocopy it somewhere. Other good references
 include Democracy in America (1835) and The Old Regime and the 
 French Revolution (1856), both written by Alexis de Tocqueville. You can find 
 those at a used bookstore.

     Theory aside, it can be shown that a people completely dependent on
 their government for security lose their ability to come to that
 government's aid in times of external danger. At that time, the people
 further drain those resources by requiring protection from themselves. The
 less capable a people become, the more fearful they get, eventually voting
 in a police state. Hitler was elected.

     Computer users face similar dangers. Additionally, economics play a
 large role. A person with a computer is a nearly self-sufficient engine of
 wealth.  Economic competition is constant. Denial of personal rights to
 privacy of information removes the individual's ability to protect an idea
 before bringing it to the market. Computer users are thus unable to create.
 All they can do is consume or, at best, labor for someone else.
 Entrepreneurs and small business owners, both key agents of pr
 ogress , are effectively locked out. A nation of employees economically 
 dependent on bosses is an economic nonstarter. Freedom of  computer use and 
 the right to privacy are thus essential to the economic security of a free 
 state.

     The kind of power bestowed by guns, personal computers and absolute
 data privacy implies a need for a personal sense of responsibility. Both
 viruses and encryption programs are far easier to make and distribute than
 plastic Glock-11 automatic pistols. Some sort of regulation is required.
 This is where the "well-regulated militia" part of the Second Amendment
 comes in and this is the most difficult part of the issue.

      My definition of a "well-regulated militia" falls somewhere between
 the NRA and the National Guard. If there were an NRA for computer network
 users I'd probably be in it. I think the stakes are higher with computers
 than they are with guns. I want to see more people with computers and
 modems, to ensure the widest possible dispersal of computing power. For
 this to work, all users should be made aware of the power and
 responsibility of owning a computer ("Only a madman would give a loaded
 revolver to an idiot"DFredric Brown). If there are kids in the house, they
 must be taught to respect guns and computers as early as possible. In a
 well-defended, well-connected house, one can live without fear. Only then
 can a citizen look past the distracting horrorshows put on by the
 politicians and pundits to hide the real issues. Who will see to it that
 responsibilities accompany rights?  Part of the answer, believe it or not
 comes from the government. Laws already exist to cover most serious crimes
 committed with a computer.

     Where the law is insufficient, professional/lobbying groups such as the
 Electronic Frontier Foundation, the Computer Professionals for Social
 Responsibility, and the Association for Computing Machinery are helping to
 draw up new laws to deal with new kinds of crimes. It's early in the game,
 but the above organizations seem to be working for fairness.

     For the control addicts in government, this may not be enough. Tough.
 Computer user organizations are working hard to approach government the way
 we all were taught to do it in high school civics, and they seem to be
 making it work. Can the EFF, CPSR, or the ACM control hackers? Of course
 not.  That's what the law is for (demographics suggest that the rapid growth
 of network use will not be accompanied by an equally rapid rise in hacking
 incidents. The hacking scene is maturing with the rest of the population.
 Most hacker heroes are born-again capitalists who might make even better
 role models as long as they don't forget where they came from).
 
     Computer user groups educate while seeking to disperse power, which the
 NRA also does to some extent. The EFF especially tries to reach out to
 potential allies by demystifying computer technology for nonusers and even
 the cops.  Let's face itDthe nervous man with the gun is not going to go
 away, so we might as well try to calm him down a little.

     Finally, computer network users have their talents to use as
 negotiating chips. A government that refuses to respect their rights will
 lose their economic cooperation. The network-based economy makes an Atlas
 Shrugged-style withdrawal very feasible. The government will have its
 illusion of control while computer users work ordinary jobs while
 moonlighting in the Netherlands and piling up ones and zeroes (Swiss francs)
 in Brunei, all in the comfort of one's suburban home. The result will be an
 Italian-style economyDlackluster on the surface and lively underground.
 Germany lost the A-bomb by chasing out a half-dozen geniuses in the
 Thirties. If America wants to be a player in the global economic contest, it
 needs to treat its citizens with respect.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

               HOW TO SURVIVE THE FIRST YEAR OF LAW SCHOOL
                       AT THE UNIVERSITY OF TEXAS

 by Mike Godwin (mnemonic@eff.org)

 (Copyright 1988,1992. This article may be freely distributed on any
 computer forum, including commercial online services. To reproduce it
 in print or in any other non-computer medium, please seek permission
 from the author.)

 You went to a decent college, you scored well on your Law School
 Admission Test, and you ranked in the top 10 percent of your class.  So,
 now that you're here at The University of Texas School of Law, you can
 look forward to an unbroken string of acadernic successes, right?

 Not so fast. No matter how easy you found undergraduate school to be,
 law school is a different story. And the sooner you learn that, the
 better your chances of coming out of the law-school game a winner.

 First, disabuse yourself of any notions about your natural academic
 superiority. Sure, you're good, but so is everyone else in your class.
 And since everyone is graded against everyone else on a curve, the
 chances are nine out of 10 that you'll be in the bottom 90 percent of
 your class, regardless of your undergraduate performance.
  
 This means that law-school success doesn't come merely from knowing the
 law; you have to know it better than most of your peers.  So you can't
 be complacent.
 
 If you start heeding the following hints early in your first semester,
 they'll improve your chances of hot job offers...and maybe even an
 editorship on the law review.
 
 Class Participation
 
 If you saw the movie "The Paper Chase" (and odds are that you did, or
 you wouldn't be here), you probably know that large classes in law
 school normally are run by "the Socratic method."  Rather than
 lecturing, the professor will assign some reading for the day and
 conduct the class by asking students questions about the material.
 
 Watching the movie, you probably got the impression that the best 
 law students are those who are eager and able to answer the 
 professor's questions.  Don't be fooled.  Glibness and self-possession 
 in class are only roughly correlated to exam performance, and your 
 grades are based almost entirely on final exams, not on your 
 quickness in the classroom.  Because the finals are graded 
 anonymously, the professor won't even be able to link your 
 classroom participation with the exam.
 
 It's far wiser to spend your time mastering the principles behind 
 each case you read rather than memorizing its facts.  If you try the 
 latter tactic, your brain will be too muddled with facts at exam time 
 to allow you to apply the law.  Don't worry about the inevitable 
 instances in which a professor tries to embarass you for knowing 
 less than he does.  (I refer to the professor as "he" because almost all 
 UT law professors are male.  Most are white, too).  You can get your 
 revenge by earning an honors grade in the course.
 
 Class Preparation
 
 Keep up with the assigned reading.  Onerous though the reading may 
 be, it's easier to keep up than to catch up.  And reading the cases for 
 the day will enable you to answer most of the questions any 
 professor tries to throw at you.
 
 If for some reason you do get behind on the reading, however, don't 
 panic.  This happens to some of the best law students.  Attend class 
 anyway, even if you haven't read that day's class materials.  The 
 professor's Socratic questions will clue you in to the issues he expects 
 you to know for the exam.
 
 Professors
 
 Some law professors are frightening; others are charming.  
 Ultimately, however, their personalities don't matter very much.  
 Whether he likes you or not, each professor will grade your exam 
 according to the curve.  There's no such thing as an "easy" law course, 
 although you may find some lectures more tolerable than oothers.  If 
 the material is easy for you, it may well be easy for everybody, so the 
 curve can get you anyway.
 
 While some law professors make a pretense of keeping office hours, 
 most of them don't really want to see you outside the classroom, a 
 milieu they prefer because that's where they have all the control.  
 Any question you want to ask a professor probably can be answered 
 by a "hornbook" (legal treatise) anyway, and library is full of 
 hornbooks.
 
 Don't expect too much sympathy from your professors.  After all, law 
 school is a game they've *won.*  They may have some sort of abstract 
 pity for the poor contracts student who's agonizing over Sec. 2-207 of
 the Uniform Commercial Code, but under no cirumstances will you be able to 
 persuade them to change your grade.
 
 Briefing your cases
 
 The rule here is "Condense, condense, condense." Nothing's more 
 pathetic than the law nerd whose brief is longer than the case 
 excerpt in the casebook. Remember this rule: Each case has one or 
 two main ideas. Find them, and you'll have what you need to know 
 for the exam.
 
 And good, *brief* briefs can be easily incorporated in your study 
 outline.
 
 Some professors like to ask tricky questions about the fact pattern of 
 a case during the lecture, but don't write these details down.
 
 Instead, make notes in the margin or highlight key facts of your 
 casebook. If you've read the case, you should be able to remember 
 the facts long enough to get through the class period. And if the
 professor stresses a particular type of fact pattern in the lecture,
 he's signalling to you a possible exam issue. Note the issue, not the
 facts of the particular case.
 
 Buying study aids
 
 Basically, there are two types of study aids you can buy for first-
 year courses: commercial outlines and hornbooks. A commercial 
 outline is a prepackaged, detailed skeleton of the material you
 need to know for a particular course. There are several brands of 
 outlines, and each has something to recommend it. The Legalines 
 outlines track particular casebooks, while the Emanuel Law Outlines 
 and Gilbert Law Summaries are more general, although they will 
 include many of the cases in your casebook.
 
 You may find it best to buy Legalines outlines for each of your 
 courses except contracts. (The UT professors who wrote the contracts 
 casebook designed it in a way that makes it difficult to produce a 
 commercial outline for it.) Then you can supplement the Legalines 
 with general-purpose outlines like Emanuel's and Gilbert's for 
 courses you're having trouble with. Be aware that occasionally the case
 summaries and discussions in the commercial outlines are *mistaken*--
 let your professor and your classmates supplement your take on a given
 case or issue.
 
 Some students buy "hornbooks" for particular 
 subjects, but for a first-year student the treatises often go into too 
 much unnecessary detail. Theyre also very expensive, and in general 
 it's best not to buy them; but you may want to make an exception for 
 contracts, which many students find a particularly subtle and 
 difficult branch of law. The Calamari and Perillo hornbook is good for 
 general contract law, while the White and Summers hornbook is 
 necessary for a thorough understanding of the parts of your 
 contracts course that deal with the Uniform Commercial Code. You 
 may also want to consult UT Professor Charles Alan Wright's treatise 
 on the law of federal courts for your civil-procedure class.
 Finally, if you signed up early for a bar-review course (believe it
 or not, some people do this during their first year), some bar-review
 courses will allow you to "check out" their reviews of black-letter 
 law.
 
 Study Groups
 
 Try to get into one. When you find a likely group, make sure that 
 most of the people in the group are dedicated enough to stick with it. 
 Discussing difficult ideas with other law students is a good way of 
 making sure you understand them. In general, study groups work 
 best with about five people, with each person concentrating on one of 
 the five first-year courses you'll be taking each semester. If you 
 have a choice about which course to concentrate on, choose the 
 course you think you'll find most difficult; your responsibility to 
 your friends in the study group will give you an added incentive to 
 master that material.
 
 Computers
 
 Buy a computer--you can purchase them at near-wholesale cost at 
 the Texas Union MicroCenter on 21st Street. Only if you own a 
 computer will you be able to produce and edit a legible course outline 
 in a hurry.  You'll need two types of software:  a good word 
 processing program to help you with the briefs and memos you have 
 to produce for your legal research and writing seminar, and an 
 outline program to produce the course outlines you'll need for exams.  
 (Some word processors include outlining capability--in general, those
 word processors are not as good at outlining as programs designed for just
 that purpose.)
 
 If you buy a Macintosh, the outlining software of choice is MORE; if you
 own an IBM PC, buy Thinktank or Grandview.. Both products are available
 at local computer stores.
 
 Exam-taking strategy
 
 Your heart's beating rapidly, your palms are sweaty, and your mind is a
 blank.  Yes, you're taking your first law-school exam. How on earth do
 you handle those exam questions?
 
 The first thing to remember is that all law-exam questions are more or
 less alike. Each describes an invented and often quite complex situation
 that, had it occurred in real life, would probably generate one or more
 lawsuits. Following the fact situation is usually a question or
 instruction such as "Describe the potential legal claims and liabilities
 of each party."
 
 Your best strategy, when you outline your answer, is to pretend you're
 the lawyer for each party in turn.  Pretending to be Smith's lawyer,
 quickly list all the legal principles from your course outline that
 could advance Smith's case against Jones. Now play the part of Jones'
 lawyer how would you answer each of these legal arguments or claims? What
 counterclaims could you use against Smith? What will Smith say in
 response to your responses? What other parties in the fact situation
 could sue or be sued? And so on.
 
 Inevitably, you'll see some obvious legal issues in the fact pattern.
 You have to deal with them, of course, but don't make the fatal mistake
 of assuming that by handling the obvious or major issues you've written
 a good exam answer. After all, your peers probably share your gift for
 seeing the obvious.
 
 So, how do you make sure you catch the subtle issues as well as the
 straightforward ones? When you're preparing for the exam, condense your
 outline into a checklist of one- or two-word shorthand expressions for
 legal principles.  Memorize the checklist, and recite it in your head
 each time you pretend to be the attorney for one of the parties. (Better
 yet--write it down on your scratch paper at the beginning of your exam
 as soon as you're allowed to start writing, before you even read the
 first question.  The checklist will remind you of issues you'd otherwise
 overlook.
 
 Practice Exams
 
 Besides creating a legal-issues outline, the best way to prepare for
 exams is to take practice exams.  Almost all professors keep their old
 exams on file in the lbirary.  After you've done the bulk of your study
 outlines, photocopy your professors' exams from the last couple of
 years.  Then sit down with a friend and practice outlining exams answers
 based on the old questions.  Don't bother writing a full exam answer!
 Time yourself, and give yourself about as much time to outline each
 answer as you would during a real exam.  YOu should budget about a third
 of the time you're given to answer an essay question for outlining your
 answer (e.g., 20 minutes for a 60-minute question).
 
 After each question, compare your outlined answer with your friend's.
 He or she will have seen some points you missed, and vice versa.  This
 pinpoints issues you may tend to overlook during the real exam.
 
 Other matters
 
 Four of your first-year law courses -- contracts, torts, civil procedure,
 and property -- will last your entire first year. You'll also take two
 semester-long courses: criminal law in the fall and constitutional law
 in the spring.
 
 Thus, if you have to concentrate on any particular exam during winter
 midterms, concentrate on criminal law; that's the only exam you'll take
 in your first semester that counts as a grade for an entire course.
 Conversely, the exam for the three-hour constitutional-law course in the
 spring will count less toward your average than the exams for your
 year-long courses, which are each worth five or six hours' credit.
 
 Don't get too competitive.  It's the friends you make during your first
 few months as a law student who'll help you get through the year.  Don't
 be deluded into thinking that other students are the enemy; they're not.
 It's the system you've got to beat, and you can do it with the right
 attitude.  A vicious competitive streak, however, tends to undermine
 your karma in the long run.
 
 Finally, try to enjoy yourself.  The law really can be fun to learn if
 you let yourself relax.  Most people who make it through the first year
 look back at it as a time of rapid intellectual growth and the building
 of mental discipline.  Don't regard law school as just the
 stepping-stone to a career.  A law-school education has value in itself
 -- it will teach you a lot about what makes our society tick.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                           NOTES FROM CYBERSPACE
                               2nd Edition

 Notes From Cyberspace will be a feature of every issue of this publication.
 They are little tidbits, notes, comments, etc... from people like you.
 If you have any comments, we certainly encourage you to send them in.
 (comments@fennec.com)

 ============================================================================
                   
 NOTES FROM CYBERSPACE - ARTICLE 1
 By Rodney Perkins
 Subject: THEY ARE OUT TO GET YOU!  A piece of POST-LOGIC.
  
 Is that tuna fish I smell? No, its the CONSPIRACY. As avid readers of this 
 magazine probably already know, the conspiracy has tried to use its poison 
 tentacles to steal eggs from our snake pit. For now, our eggs are safe. One
 day, however, they might try it again. We will be there, knife in hand, 
 ready to chop off their offending appendages. Yes, they will probably try 
 to squirt their government ink in our eyes but we will continue to fight
 with the weapons given to us by (insert savior here).	 We must take a stand  
 against the pervasive eye of the conspiracy's octopi (yes, it rhymes). You 
 must ask yourself "What can I do to help stop this reign of tyranny from 
 the unseens and the who-whats-its?" You must continue to fight against the
 shickelgrubers, the boot boys and the LOGIC-WEAVERS! You must never fall 
 for LOGIC, you must always use POST-LOGIC (real men always think in POST-
 LOGIC). Confusion and ambiguity are the weapons in this war. Turn their
 MEDIASPEAK, GOOBLEDYGOOK and BAFFLEGAB against them! Weave great webs of 
 Orwellian nightmare language!  Master the art of circular logic! When they 
 ask you what you believe, tell them "I believe what you believe. Just don't 
 practice it".	 Are you confused yet? Good! You get "it"!

 ===========================

 NOTES FROM CYBERSPACE - ARTICLE 2
 By John Logan (ice9@bga.com)
 Subject: ON THE SUBJECT OF GOVERNMENT...

 Welcome to a new age!  Yes this is a world where technology has hit an all 
 time high. It seems there is no other way to go but up.  Funny, that 
 includes taxes, cost of living, and trouble in government. Yes, this is the 
 day and age that we are subjected to, by our wonderful president Mr. William
 Jefferson Clinton, successor to the New World Order...  Most Americans are 
 probably still wondering "Just what is this 'New World Order?'" Well, lets 
 talk about that:

 The New World Order is a product of the Trilateral Committee, made up of the 
 World's key leaders. In this form of government, the entire world will be 
 broken up into 3 'Nation States':  Europe, The Asias, and The Americas.  
 The worlds decisions will be made by the 'elected' presidents of each nation 
 state. The entire world will be on a common market with a universal currency.
 I'm sure we have all heard of - the 'credit.' Yes for years we have been 
 getting oriented to this system, whether in movies, or by our banking system.
 Well, in the near future, there will be very few private banks, we will 
 store our credits (for a small fee) in the World Bank.  We will be forced to 
 carry around credit chips that, when inserted into a machine, will access 
 our account number, list what is to be purchased, and the price.  Forget 
 about tax evasion!! It will all be AUTOMATICALLY DEDUCTED from out accounts.  
 Yes, the new government will be a cross between Capitalism and Communism.
 They will know our every move. Business owners will still be allowed to keep 
 their businesses but they will have to pay exorbitant taxes. State security 
 will be at an all time high. There will be no middle class.  Citizens will 
 be either very rich or very poor. The machine has already started.  Our 
 wonderful government does not want a car on the road that is over 10 years 
 old. A bill has already been passed limiting parts for the cars that fit in 
 this 'danger zone.'  It is now impossible to get manufacturer parts for
 these cars. If you have a problem, you must use after-market parts and hope 
 that it fits specifications. Todays cars are built to last 10 years or less.  
 Its a sad thing that more people do not understand what is coming down the
 proverbial 'road.' The governing machine is going to run right over the 
 common people like a steam roller. People won't even know what happened.  
 Take a look around!  The New World Order is not nearly as wonderful as our 
 government would like us to think. Don't worry, it won't be long and we won't 
 have to worry about what they want us to think. They will soon control that 
 too! WE HAVE BEEN WARNED.  NOW ITS TIME TO DO SOMETHING ABOUT IT!

 =============================

 NOTES FROM CYBERSPACE - ARTICLE 3
 By Dan Wilson
 Subject: Fight the Power!
 
 As I sit here writing this, I can't help wondering what the hell is going on.  
 Why is it that every time a group a people find some new freedom or form of 
 expression, the government steps in to suffocate it?  Just look at the	
 National Endowment for the Arts controversy or the PMRC. Why must a small
 group of paranoid people try to force their fears down all of our throats? 
 I must admit that when these things first began happening, I just sat by
 thinking to myself that it was a crock of sh*t without doing anything about
 it. It didn't strike close enough to home for me to get involved.  Recently,
 however, there's been a series of events that have struck close to home and
 have forced me to take action. The events to which I'm referring are none
 other than the government's recent attempts at bringing the computer world 
 to justice (as they define it, of course).

 It's really disturbing to hear about the methods the feds used to crack down 
 on "dangerous" users. Unsigned search warrants have been used to gain entry 
 to homes where all sorts of equipment, computer related or not, was 
 confiscated while no charges were specified. There have also been cases of
 holding guns to children's heads while a raid was going on.  What kind of
 gestapo tactics are these?  Have these guys never heard of the Bill of 
 Rights? This isn't the America I was told about as a kid; it sounds a 
 helluva lot more like those "evil" communist countries that I was taught to 
 hate. The only logical conclusion that can be drawn here is that the 
 government is very afraid. Why else would they dedicate so much effort to
 something they know so little about?  These guys don't have a clue as to
 what's going on out here in cyberspace.  That's the source of the problem.
 Here we sit with these marvelous machines in front of us. Touch a few keys
 and any information that we want to exchange can be sent anywhere in minutes.
 This must seem like a pretty major threat to a government that so often 
 relies on misinformation and cover-ups in order to scam the public into 
 believing what	it wants them to believe. We can't be controlled like the 
 media bozos who drone bullsh*t through the idiot box at us.  We can't be 
 censored like the newspaper or the radio.  In fact, this is probably the 
 truest form of	information exchange we have available today.  That alone is 
 worth fighting	for.

 It could also be that they are afraid of a society where people are judged 
 solely on their thoughts and ideas.  We have no style whores here. Race, 
 creed, color and religion are insignificant and pointless in cyberspace;
 they serve no purpose.  There can be no discrimination, there can only be
 disagreement with someone's opinions.  To me, this is pretty close to a
 perfect society.  It is refreshing to judged on what I think and how I 
 express myself rather than by the color of my skin or the origin of my 
 birth. In a society like this, the government cannot play people off 
 against one another. They have no ground on which to stand.  Perhaps it's 
 this lack of footing that makes them nervous.  Whatever it is, it's got them 
 thinking that they need to	put a stop to it and "bring it under control".  
 We are a far too dangerous force for them to just ignore.  This fact should 
 be remembered and taken advantage of, information is the key!  Less than an 
 hour ago, I posted issue number six of this magazine on Internet along with 
 messages urging others to read it.  In a matter of minutes it was all over 
 the world.  Maybe this will draw others into the fold, maybe not.  
 Regardless, it'll force them to think and maybe to take action themselves.
 
 
 @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@

 NOTES FROM CYBERSPACE - ARTICLE 4
 By Anonymous Attorney
 Subject: POCKET LAW...Quick Reference Card

 Hey, copy this down and keep it in your wallet for those situations where
 you might be suppressed by the power-hungry infidels of humanity.
 
 My lawyer has instructed me not to talk to anyone about my case or anything
 else, and not to answer any questions or reply to accusations. On advice of
 counsel and on the ground of my rights under the State and Federal
 Constitutions, I shall talk to no one in the absence of counsel. I shall
 not give any consents or make any waivers of my legal rights. Any request
 for information or for consent to conduct searches, papers, property,
 or effects should be addressed to my lawyer. I request that my lawyer
 be notified and allowed to be present if any identification, confrontations,
 tests, examinations, or investigations of any sort are conducted in my case,
 and I do not consent to any such identification, confrontations, tests,
 examinations, or investigations.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                          EDITORIAL OF THE MONTH

 By Marco Landin
 
		[This article is fiction/humor]
        (Excerpt from INdigest, Feb 1994, Interview with
        the Elusive and Unintelligible Mfactor)

    INd:  In your most recent book, "I Don't Want My Children To Grow Up
 Around Those Filthy UNIX", you seemed to display a sense of farce that isn't
 too commonly seen amongst the Great Internet Poets of the Apocalypse.  Tell
 us, why do you see the 21st century as the Golden Age of Lunacy?

    Mf:  [wearing pajamas and Mickey Mouse ears]  Well, it's like this.  In
 the early 80's we perfected the concept of an international communications
 database.  It was populated solely by research personnel.  MIT grads,
 military, Elvis.  Purely serious study going on.  Then, in the late 80's and
 mid-90's, there was a practical applications boom, where savvy businessfolk
 rolled up their sleeves and sank their elbows into the datastream.  Now, as
 we near the End Times, we find that the greatest structure ever created by
 man -the Internet- is being vacated by its corporate and research personnel
 and a whole buttload of social misfits and weirdos are moving in by the
 droves.  Look at me for instance.  No, you better not.  Wanna jawbreaker?

   INd:  No, thank you.  Are you saying that the new computer literacy is
 making this once rich and fertile forest of intellect and commerce into a
 vast mental wasteland where the only thing that stirs is an occasional,
 barbed, tumbleweed of a pun based on bathroom jokes?
 
   Mf:  Well, yes, and I'm thankful for it!  I mean, have you SEEN what
 happens to the human body when the brain is used too much?  Glasses,
 unsocial behavior, a goofy voice, and insatiable masturbatory compulsions
 become the trademark of the computer genius.  Why if I had to choose between
 looks and brains,  I'd sure as hell pick looks, cause looks can get you
 brains, and the corollary is not as true.  I feel very lucky to have both.

   INd:  In the book, you mention a few extreme cases of individuals who have
 no business on UNIX and who yet not only live in it, they can't do without
 it.

   Mf:  Indeed, there seem to be many odd cases.  Take for example Cherry,
 the erotic dancer from Norway who has an Internet Address.  She works out 36
 hours a day, dances every night, goes out with friends, HAS FRIENDS!!!  And
 yet she still finds time to moderate a newsgroup, cherry.pop.tart, I mean,
 how does she do that?  Then there's the Internet node for the Eskimo Len
 Terrorist With Teret's Syndrome Association.  What does THAT have to do with
 worldwide communications?  Then of course, there's the newsgroup 
 alt.binaries.pictures.bestiality.  Need more be said???  The freaks are
 moving in as the contractors and architects move out.  Isn't it beautiful?

   INd:  What's your plan in life, Mr. Mfactor?

   Mf:  In this day and age, making plans is dangerous.  That's why I have
        several.

   INd: Please, share with us your most visionary.

   Mf:  Moving to Norway and finding Cherry.  Soon.  Like NOW.
   
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

          WHITE HOUSE ELECTRONIC PUBLICATIONS AND PUBLIC ACCESS EMAIL
                          FREQUENTLY ASKED QUESTIONS

 By Stanton McCandlish (mech@eff.org)

                         Updated April 2, 1994
                           Table Of Contents

  I.   Searching and Retrieving White House documents.
          -  Publications@WhiteHouse.GOV
          -  WAIS
          -  GOPHER
          -  FedWorld BBS
  
  II.  Signing up for Daily Electronic Publications.
          A.  Widely Available Sources.
          B.  Notes on Widely Available Sources.
          C.  Direct Email Distribution.
          D.  Email Summary Service.
  
  III. Sending Email to the White House.
          -  Internet Direct
  
  IV.  Sending Email to Congress
          -  Internet Direct
  
  V.   Submitting Updates to the FAQs.
  
  
  I.  HOW DO I SEARCH AND RETRIEVE WHITE HOUSE ELECTRONIC PUBLICATIONS?
  
  The White House is pleased to announce the establishment of an Internet
  address for retrieving White House publications.  We have set up an
  Almanac server to process requests by email.  To receive instructions on
  using this server, send a message to:
  
          Publications@WhiteHouse.GOV
  
  In the body of the message, type:
  
          send info
  
  Various additional sites are archiving the press releases as distributed. 
  What follows is an incomplete list of some of the sites containing the
  documents that have been released to date.  This FAQ will be updated to
  reflect new sites as they become known.
  
           SITE                   DIRECTORY
  
  1. SUNSITE.UNC.EDU      pub/academic/political-science/whitehouse-papers
  2. FTP.CCO.CALTECH.EDU        /PUB/BJMCCALL
  3. FTP MARISTB.MARIST.EDU
  4. CPSR.ORG                   /CPSR/CLINTON
  5. FedWorld Online System     703-321-8020  8-N-1  or:
                                Telnet fedworld.doc.gov
  6. GOPHER.TAMU.EDU            11/.dir/president.dir
  
  
  Notes:  The following are notes on how to log in and get
          information from the above sites.
  
  1.      Office for Information Technology at the University of
          North Carolina maintains the full collection of White
          House electronic releases available for search with WAIS and
          also accessible via Gopher and FTP.
  1.a     WAIS
          (:source
          :version 3
          :database-name "/home3/wais/White-House-Papers" :ip-
                  address "152.2.22.81"
          :ip-name "sunsite.unc.edu"
          :tcp-port 210
          :cost 0.00
          :cost-unit :free
          :maintainer "pjones@sunsite.unc.edu"
  
          :description "Server created with WAIS release 8 b5 on  
          Feb 27 15:16:16 1993 by pjones@sunsite.unc.edu These are the
          White House Press Briefings and other postings dealing with
          William Jefferson Clinton and Albert Gore as well as members
          of the President's Cabinet and the first lady Hillary Rodham
          Clinton, Chelsea, Socks and others in Washington DC. Dee Dee
          Meyers and George Stephanopoulos.  Other good words:
          United States of America, Bill Al Tipper Democrats USA 
          US These files are also available via anonymous ftp 
          from sunsite.unc.edu The files of type filename used in 
          the index were: 
          /home3/ftp/pub/academic/political-science/whitehouse-
           papers/1993 ")
  
          Folks without WAIS clients or gophers that act as WAIS
          clients may telnet to sunsite.unc.edu and login as swais 
          to access this information via WAIS.
  
  1.b     GOPHER is a distributed menu system for information access on the
          Internet developed at the University of Minnesota. gophers are
          client-server implementations and various gopher clients are
          available for nearly any computing platform.  You may now use
          gopher clients to access the White House Papers and other
          political information on SunSITE.unc.edu's new gopher server.
          You may also add links from your local gopher server to
          SunSITE for access to the White House Papers.
  
          For gopher server keepers and adventurous clients to access
          SunSITE you need only know that we use the standard gopher
          port 70 and that our internet address is SunSITE.unc.edu
          (152.2.22.81). Point there and you'll see the references to
          the Politics areas.
  
          For folks without gopher clients can telnet to sunsite.unc.edu
          to try out gopher access. You need to have access to internet
          telnet and:
          
                          telnet sunsite.unc.edu
                          login: gopher 
          The rest is very straight forward. Browsing options end with a
          directory mark (/), searching options end with an question mark 
          (?).
          There's plenty of on-line help available.
  
  2.      No special instructions.
  
  3.      The CLINTON@MARIST log files which contain all the official
          administration releases distributed through the MIT servers
          are available via anonymous FTP. These logs contain in
          addition to the official releases, the posts that comprise the
          ongoing discussion conducted by the list subscribers. 
          To obtain the logs:
          FTP MARISTB.MARIST.EDU - the logs are in the CLINTON directory
          and are named CLINTON LOG9208 thru CLINTON LOGyymm where yymm
          stands for the current year and month. Problems should be
          directed to my attention: URLS@MARISTC.BITNET or
          URLS@VM.MARIST.EDU. 
          Posted by Lee Sakkas - owner, CLINTON@MARIST
  
  4.      Computer Professionals for Social Responsibility is
          providing all Clinton documents on technology and privacy
          at the CPSR Internet Library, available via
          FTP/WAIS/Gopher at cpsr.org /cpsr/clinton (and in other
          folders as relevant). For email access, send a message
          with the word "help" at the 1st line of text to
          listserv@cpsr.org.
  
  5.      The FedWorld Computer System, operated by the National Technical
          Information Service, archives White House papers in a
          traditional BBS type file library.  Connect to FedWorld by
          calling (703) 321-8020.  No parity, eight data bits and one stop
          bit (N-8-1).  FedWorld accommodates baud speeds of up to 9,600.
          It is also possible to Telnet to FedWorld at FedWorld.doc.gov.
          White House papers are located in the W-House library of files.
          To access this library from the main FedWorld menu, 
          enter <f s w-house>.  Files are named with the first four digits
          being the release month and day (e.g. 0323XXX.txt).  Some
          standard abbreviations after the date include:
   
                  rem - Remarks by the President
                  pc  - Press Conference transcript
                  pr  - Press Release
                  AM  - AM Press Briefing
                  PM  - PM Press Briefing
                  sch - The President's public schedule
                  spch- Text of major speeches.
   
          These files are saved in ASCII format.  Files can be viewed
          online by requesting to download a file and then selecting
          (L)ist as the download protocol.   This will display the file a
          screen at a time.  White House papers are kept in the above
          format for up to two months.  Papers more than two months old
          are compressed using Pkzip into a single file that contains all
          of the files for that month (e.g.  0193.zip contains all papers
          released during January 1993).  In addition to White Documents,
          FedWorld also provides a gateway to more than 100 government
          funded BBSs and computer systems.
  
  6.      Texas A&M University GOPHER Server makes available White House
          press releases and other documents.  This archive includes
          information from 1992 until the present time and is updated
          as new documents are released.  Gopher users can reach the
          Texas A&M server by choosing it from their local server's list
          of other gophers, or by pointing their gopher clients to
          GOPHER.TAMU.EDU.
  
          After connecting to the A&M server, take the following path to
          reach the White House menus:
  
          "Browse Information by Subject" --> 
          "Political Science"  -->
                  "Information from the White House"
  
          Gopher maintainers and other intrepid souls are welcome to point
          directly to the A&M White House archive.  The server is
          GOPHER.TAMU.EDU and the path is 11/.dir/president.dir.
  
  
  II.  HOW DO I SIGN UP FOR ELECTRONIC PUBLICATIONS BY THE WHITE HOUSE?
  
  The White House Communications office is distributing press releases
  over an experimental system developed during the campaign at the MIT
  Artificial Intelligence Laboratory.
  
  You can obtain copies of all the press releases from a wide variety of
  on-line services or discussion groups devoted to either national
  politics in general or President Clinton in particular.  These are
  listed in sections I and II.
  
  Section IIc explains how you can sign up to receive press releases
  directly from the experimental MIT system by using an automated email
  server.  The present system was not designed to handle high levels of
  message traffic. A more powerful system will become available in due
  course, and in the meantime, it would be appreciated if you used this
  service sparingly.  One appropriate current use is secondary
  redistribution and archiving. If you use it, you will be carried forward
  when the more powerful system that replaces it.
  
  
  IIa. WIDELY AVAILABLE SOURCES
  
  1.  On USENET/NETNEWS, electronic publications are found on a variety
      of groups:
  
          Direct Distribution
  
                  alt.politics.clinton
                  alt.politics.org.misc
                  alt.politics.reform
                  alt.politics.usa.misc
                  alt.news-media
                  alt.activism
                  talk.politics.misc
  
          Indirect Distribution
  
                  misc.activism.progressive
                  cmu.soc.politics
                  assocs.clinton-gore-92 
  
  2.  On CompuServe: GO WHITEHOUSE
  3.  On America Online: keyword WHITEHOUSE or THE WHITEHOUSE or CLINTON
  4.  On The WELL: type whitehouse
  5.  On MCI: type VIEW WHITE HOUSE
  6.  On Fidonet: See Echomail WHITEHOUSE
  7.  On Peacenet or Econet: See pol.govinfo.usa.
  8.  On The Meta Network: Go Whitehouse
  9.  On GEnie: Type WHITEHOUSE or WHRT,  or MOVE 1600
  10. On CompuServe, see the Democratic Forum: Go Democrats
  
  IIb. NOTES ON WIDELY AVAILABLE SOURCES
  
  2.      CompuServe's White House Forum (GO WHITEHOUSE) is devoted to
          discussion of the Clinton administration's policies and
          activities. The forum's library consists of news releases and
          twice daily media briefings from the White House Office of Media
          Affairs. CompuServe members can exchange information and
          opinions with each other in the 17 sections in the forum's
          message area. The message board spans a broad range of topics,
          including international and United Nations activities, defense,
          health care, the economy and the deficit, housing and
          urban development, the environment, and education and national
          service.
  
  3.      On America Online, the posts are sent to the White House Forum,
          located in the News & Finance Department of the service or
          accessible via keywords: "white house" or "clinton".  The White
          House Forum on America Online contains the press releases from
          the White House, divided into the categories "Appointments",
          "Budget", "Congress", "Education", "Economy", "Foreign Policy",
          "Health Care", "Housing", "Labor", "Law and Order", "Meetings &
          Speeches", "Proclamations", "Technology", and "Vice President".
          The area features a message board so you can discuss the
          releases with other AOL members, a searchable database for easy
          retrieval of releases that interest you, a Library for longer
          releases from the White House, and a library that members can
          upload files of interest for other members.
  
  4.      MCI Mail users access daily information on the  administration's     
          programs provided by the White House through MCI Mail bulletin
          boards.  The available boards are: WHITE HOUSE ECONOMIC, WHITE
          HOUSE FOREIGN, WHITE HOUSE SOCIAL, WHITE HOUSE SPEECHES and
          WHITE HOUSE NEWS.  A listing of these boards can also be
          obtained by simply typing VIEW WHITE HOUSE at the COMMAND
          prompt.
  
  5.      On The Meta Network, material is posted in the White house
          conference and is accessible via keywords (matching on document
          titles and subject categories) as well as full text search.
          Discussions on specific initiatives take place in special
          interest forums, e.g.  health, technology, and reinventing
          government.
  
  9.      GEnie's White House RoundTable has been established to
          distribute and discuss the official press releases and files
          relating to the White House and the Clinton Administration. The
          files library holds all of the press releases on the official
          mailing list, and the Bulletin Board has Categories set up with
          topics relating to all aspects of the Administration and
          Executive Branch of government.  Letters to the White House can
          be entered easily online with a menu option on the WHITEHOUSE
          page.
  
  10.     CompuServe's Democratic Forum (GO DEMOCRATS) is the Democratic
          Party's online information service covering the activities of
          the Clinton administration. The sysops of the Democratic Forum
          work for the Democratic National Committee, and are directly
          involved in managing the forum and responding to online
          questions. The Democratic Forum provides access to documents
          from the White House Office of Media Affairs, with vigorous
          discussion and debate in the message sections about the impact
          of the Clinton Administration's policies and proposals. The
          Democratic Forum also holds a regular weekly online conference
          with special guests on current topics.
  
  
  IIc. DIRECT EMAIL DISTRIBUTION
  
  If you don't have access to the these accounts or if you would prefer to
  receive the releases via email, then this section details how to
  sign up for this service.  The server is not set up to answer email
  letters, comments or requests for specific information.  To reach this
  MIT server, send email:
  
                  To: Clinton-Info@Campaign92.Org
                  Subject: Help
  
  The server works by reading the subject line of the incoming message and
  taking whatever action that line calls for. If you want to sign up to
  automatically receive press releases, then your subject line would begin
  with the word RECEIVE.  You can then specify what kind of information
  you are interested in receiving. The categories of information are:
  
  ECONOMY
                  Get releases related to the economy such as budget
                  news, technology policy review, etc.
  
  FOREIGN
                  Get releases related to foreign policy such as
                  statements on Bosnian airdrop, Haitian refugee status,
                  etc.
  
  HEALTH          Get releases related to health care policy, without
                  receiving any other social issues.  Use this instead
                  of social.
  
  SOCIAL
                  Get releases related to social issues like National
                  Service (Student Loan) program, abortion, welfare
                  reform, etc.
  
  SPEECHES                    
                  All speeches made by the President and important
                  speeches made by other Administration officials.
  
  NEWS
                  Transcripts of press conferences released by the White
                  House Communications office, as well as the
                  President's remarks in photo ops and other Q&A
                  sessions.
  
  ALL             All of the above
  
  So, if you wanted to sign up to get releases related to the economy
  your email message would look like this:
  
          To: Clinton-Info@Campaign92.Org
          Subject: RECEIVE ECONOMY
  
  When you send a signup message to the clinton-info server, it sends you
  back a status message letting you know what distribution streams you are
  signed up for. If you ever want to check on what groups you are signed
  up for send the following message:
  
          To: Clinton-Info@Campaign92.Org
          Subject: STATUS
  
  *****You can stop receiving email releases by sending a REMOVE message
  to the clinton-info server. The word REMOVE would be followed by
  whatever distribution stream you wanted to drop. If you wanted to stop
  receiving message about the ECONOMY then your mail would look like this:
  
          To: Clinton-Info@Campaign92.Org 
          Subject: REMOVE ECONOMY
  
  You could substitute SOCIAL, FOREIGN, HEALTH, SPEECHES, NEWS or ALL for
  ECONOMY in the above message and you would be dropped from that
  distribution list. If you send the subject line REMOVE ALL, then you
  will be taken off the email distribution system all together and will
  not receive further releases of any kind.
  
  You can also ask for help from the automated server.  Send an email
  query as follows:
  
          To: Clinton-Info@Campaign92.Org
          Subject: HELP
  
  The server will respond by sending you a detailed form that will guide
  you through the process of signing up for the various distribution
  streams.  As you will quickly discover, there is a automatic form
  processing interface that parallel the quick and easy subject line
  commands discussed here. More detailed help is available by sending an
  email query as follows:
  
          To: Clinton-Info@Campaign92.Org
          Subject: Please Help!
  
  Finally, if you want to search and retrieve documents, but you do not
  have access to the retrieval methods discussed in section II, you can do
  this via email through the MIT server. You can obtain the WAIS query
  form by sending an email query as follows:
  
          To: Clinton-Info@Campaign92.Org
          Subject: WAIS
  
  Once you have identified the documents that you want, be careful not
  to request them all at once, because you may be sent a message
  containing all the documents and this message may be too big for some
  mail delivery systems between the email server and you.
  
  D. EMAIL SUMMARY SERVICE
  
  The Extension Service of the U.S. Department of Agriculture provides a 
  daily summary of White House electronic publications.  
  
  1. Subscriptions
  
  To subscribe to the USDA Extension Service White House Summary service, 
  send a message to: 
  
          almanac@ESUSDA.GOV
  
  In the body of the message, type: 
  
          subscribe wh-summary
  
  To Unsubscribe from the USDA Extension Service White House Summary
  service, send a message to:
  
          almanac@ESUSDA.GOV
  
  In the body of the message, type: 
  
          unsubscribe wh-summary
  
  2. Document Retrieval
  
  To request a specific document from the daily summaries, send a message
  to:
  
          almanac@ESUSDA.GOV
  
  In the body of the message, type: 
  
          send white-house #####
          (where ##### is the request number for the document)
  
  3. Document Search
  
  A user-friendly search facility is also available to search the
  white-house documents archived at ESUSDA.GOV. To search, send a message
  to:
  
          almanac@ESUSDA.GOV
          
  In the body of the message, type: 
  
          search white-house keyword1 keyword2
  
  4. Catalogue of Summaries and Documents
  
  Back issues and the catalog of the summaries or the documents contained
  at ESUSDA.GOV can also be retrieved through our almanac server. To get
  the summary catalog, send a message
  
          To:   almanac@ESUSDA.GOV
  
  In the body of the message, type: 
  
          send wh-summary catalog 
  
  5. Further Information
  
  If you have any questions about Almanac, please contact:
  
          wh-admin@ESUSDA.GOV
  
  III.  HOW DO I SEND EMAIL TO THE WHITE HOUSE?
  
  We are pleased to introduce this new form of communication with the
  White House for the first time in history.  As we work to reinvent
  government and streamline our processes, this electronic mail project
  will help put us on the leading edge of progress.  Please remember,
  though, this project is still very much under construction.  The Office
  of Correspondence is currently working on defining what this system
  will do, as well as addressing equipment and staffing needs.
  
  When you send a message to the White House you will receive an immediate
  acknowledgment that your message has been received.  This is the only
  electronic response you will receive at this stage of development; if
  you include your street address in your message, you may receive a
  response by U.S. Mail.  Please be assured that every electronic mail
  message received is read and analyzed by staff.  Your concerns, your
  praise, your suggestions, and your ideas are carefully recorded and
  reported to the President and Vice President weekly.
  
  You can send email to the following addresses:
  
  Internet Direct:        President@WhiteHouse.GOV
                          Vice.President@WhiteHouse.GOV
  
  
  IV.  HOW DO I SEND EMAIL TO CONGRESS?
  
  The House and the Senate are conducting electronic communications
  projects.  You can access Congressional information via the protocols
  listed below. For additional information, please contact the offices of
  your Representative or Senators.
   
  
  Site            Protocol        Host/connection
  
  House
  
                  Email           Congress@hr.House.GOV
                  Gopher          Gopher.House.GOV
                                  [URL: "Gopher://Gopher.House.GOV/11"]
  
  Senate
  
                  Gopher          Gopher.Senate.GOV
                                  [URL: "Gopher://Gopher.Senate.GOV/11"]
                  FTP             FTP.Senate.GOV
  
  Library of Congress
  
                  Gopher          Marvel.LOC.GOV
                                  [URL: "Gopher://Marvel.LOC.GOV/11"]
                  FTP             seq1.LOC.GOV
                  Telnet          LOCIS.LOC.GOV
  
                     
  
  Please note that these are not connected in any way to any White House
  online projects, so if you have any problems with Congressional systems,
  you will need to contact their system administrators for assistance.
  
  V.  HOW DO I SUBMIT UPDATES FOR THIS FAQ?
  
  Please send corrections, deletion and additions to this FAQ to:

                  Publications-Comments@WhiteHouse.GOV
                  
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  

                       REDEFINING THE MODEM USER:
     HOW THE MEDIA TOOK TWO PERFECTLY HARMLESS WORDS AND RUINED THEM

 By Ed Cavazos

     Computer telecommunication hobbyists always seem to find themselves
 being labeled by the media in ways which help spread fear and
 misunderstanding.  For some reason, there is no term in the vernacular to
 describe someone who uses their computer and modem not as a tool to
 perpetrate illegal activities, but as an electronic link to the world.
 Whenever one comes along, it gets used in a way which always implies
 illicit behavior.


             "Hacker": From Computer Guru to Computer Terrorist

     The word "hacker" is already lost.  When Stephen Levy's 1984 book
 "Hackers: Heroes of the Computer Revolution" was published, the word was
 used in a way that was devoid of the negative associations prevalent today.

 In fact, the blurb on the back cover of the paperback described hackers as:

          "Spellbound explorers totally committed to
           experimenting with the infinite new possibilities
           of the computer.."

 And Levy himself (in the Preface) described his subjects as "those computer
 programmers and designers who regard computing as the most important thing
 in the world."  Levy was concerned that some were using the term as a
 derogatory one to describe someone who wrote bad code. This innocent
 definition of the word could be traced back to the days when MIT Model
 Railroad enthusiasts were described that way.

     But those days are gone.  Listen to what the National Law Journal
 (September 16, 1991) noticed:

     "...there is a widespread public perception that so-called
     computer hackers get their kicks out of breaking into top-secret
     government computer systems and wreaking havoc with destructive
     programs called computer viruses."

 And Katie Hafner a computer crime journalist was quoted in Waldensoftware's
 Computer Newslink,( Autumn 1991, Vol. 6, Issue 1) as remarking:

     "With the release of the movie "War Games" in 1983, in which a
     teenager almost triggers World War III from his little home
     computer, the definition of hacker changed overnight. Suddenly,
     hacker took on a very negative connotation. Now it's defined in
     Webster's as somebody who tries to break into computers."

 The media has helped turn what was at one time considered a complimentary
 term into something that connotes violence, illegality and destruction.
 To be called a hacker today is an accusation.  Through misuse, the media is
 warping the word even further.  When Geraldo Rivera interviewed Craig
 Neidorf for his television show "Now it Can Be Told" he referred to Craig
 (an electronic publisher) as "The Mad Hacker."  Geraldo's loose usage of
 the term ignores the fact that Craig was never accused of breaking into a
 system, or gaining illegal access anywhere.


             Cyberpunk: From Science Fiction to Sensationalism

     When William Gibson, Bruce Sterling and other science fiction writers
 began writing a new type of science fiction in the 1980's, critics searched
 for a way to describe it.  They settled (to the disappointment of some of
 the very writers they were describing) on "Cyberpunk."  The term still
 refers to a genre of science fiction. "Science fiction with an attitude,"
 is how the April 20, 1990 Washington Post described it. At the stretches of
 its usage, it describes a new world view which is composed of a collage of
 computers and information, of countercultural electronic expression.

     But, as happened before, the media decided that definition wasn't good
 enough.  When Katie Hafner and John Markoff decided to write a book on
 computer crime, they stole the term for their cover. "Cyberpunk: Outlaws
 and Hackers on the Computer Frontier" was the result. Now, all of a sudden,
 Cyberpunk doesn't refer to a sci-fi or cultural movement, it refers to a
 cynical hacker.  When asked to describe a "typical Cyberpunk" Hafner
 explains:

     "They are typically alienated suburban teenage boys who find an
     alternative world in computers. Pengo, who we wrote about in the book,
     is a pretty good example. He lives in Berlin and dresses in black.
     Then again, who in Berlin doesn't? But he was almost a caricature of
     himself. He smoked hand-rolled cigarettes. When he worked at his
     computer, he had his headphones on all the time listening to
     synthesized music. He started hacking when he was fifteen and by
     seventeen he started spying for the KGB by hacking over the networks."
     (Waldensoftware's Computer Newslink, August 1991)

     Even William Gibson, Cyberpunk's founding father, who wrote of
 cyberspace and a new society noticed it. "I've been credited of inspiring a
 whole new generation of techno-delinquents," he remarks in the February 19,
 1989 Boston Globe.  If only we could hear Gibson's reaction two years
 later, when the term which once described his writing style is now being
 used to describe computer criminals.

     The word "Cyberpunk" had a real mystique to it.  To turn it into a
 term to describe the "alienated suburban teenage boy" is to ruin some of
 that feel.  Moreover, it serves to confuse and concern a public which is
 already paranoid and somewhat hysterical about anybody who admits to using
 a computer and modem for long periods of time.  Responsible journalists
 should shy away from sensationalistic tactics like misusing an already well
 defined term like this.


                          The Need for A New Word

     What is needed is new terminology.   There are a myriad of totally
 legal and legitimate uses for modems and personal computers.  People do
 everything online from perusing library card catalogs to meeting their
 perfect romantic match.  On BBS's there are livid discussions of issues
 ranging from politics to religion -- from art to science. And online
 services like Prodigy and Compuserve are watching their user base swell
 annually.  Soon, perhaps the media will accept a word that describes a
 person interested in communicating electronically without implying illegal
 activity.  "Hacker" and "Cyberpunk" are ruined. "Modem Enthusiast" sounds
 too much like a term fresh from the pages of Reader's Digest.  Hopefully,
 someone will provide us with a new term which truly describes the millions
 of modem users who "live, play and thrive" in cyberspace.  Until that time,
 we can only sit and watch as the mainstream media stumbles along trying to
 understand and describe a phenomenon one gets the feeling it knows very
 little about.
 
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                    PUBLIC UTILITY COMMISSION OF TEXAS
       REQUESTS COMMENTS ON INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

 The Public Utility Commission of Texas (the Commission) has
 established a project (Project No. 12756) to examine Integrated
 Services Digital Network (ISDN) issues.  The Commission seeks comments
 from interested parties in response to the following questions.  If
 your answers would differ depending upon time-frame considerations,
 please provide answers for each time-frame.  Parties are requested to
 organize their comments to address the specific questions asked in the
 order asked and are encouraged to include an executive summary
 emphasizing the main points of their comments to each question.

 Comments (13 paper copies) should contain a reference to Project No.
 12756 and should be submitted to John M. Renfrow, Secretary of the
 Commission, Public Utility Commission of Texas, 7800 Shoal Creek
 Boulevard, Austin, Texas 78757, no later than April 30, 1994. 

 Informal comments may be sent to Ms. Pam Whittington at the Commission
 via e-mail addressed to:

          pam.tel@email.puc.texas.gov

 Or you may call her at (512) 458-0100.

 1. To which local exchange carriers (LECs) should a rule on ISDN
 apply?  Why?

 2. Should ISDN-based services be considered to be a replacement of or
 successor for "plain old telephone service"?  Why?

 3. Should all Texas customers and customer classes have access to
 ISDN?  Why?  If not, why not?  What policies should be adopted by the
 Commission regarding customer access to ISDN?  Why?

 4. What are the policies which the Commission should adopt regarding
 the determination of costs and the pricing of ISDN and ISDN-based
 services?  Explain why. Provide detailed cost information for each
 position if available.

 5. Should the manner in which ISDN is deployed affect the price?  How?

 6. Should the Commission grant regulatory incentives, penalties, or
 flexibility in exchange for a LEC's provision of ISDN?  Why?  If yes,
 describe the incentives, penalties, or flexibility.

 7. Does the Commission have jurisdiction to compel the provision of
 ISDN?  Why?  Explain the legal basis for your position.

 8. Should the LECs be required to provide ISDN services in a manner
 that is conducive to competition in the provision of ISDN?  Why?  If
 so, how?

 9. What policies should the Commission adopt regarding the deployment
 of ISDN?  Should the Commission directly mandate deployment, require
 deployment to be driven by customer demand, or require deployment in
 some other manner?  Why?  Describe in detail how.

 10. Describe in detail how these policies regarding deployment should
 be implemented and enforced.

 11. If customer driven demand deployment was ordered by the Commission, 
 should the trigger for deployment be thirty customer requests for ISDN
 per central office?  Why?  If not, why not, and provide evidence to
 support your position.  If thirty requests is not the appropriate
 number, explain what is.

 12. Should LEC compliance with deployment requirements be monitored on
 a periodic basis by the Commission?  If so, explain in detail how and
 why.

 13. What are the appropriate time frames for completion of deployment
 of ISDN in a LEC's service territory and in the entire state respectively?  
 Why?

 14. What are the technological options of the LECs with respect to the
 system upgrades necessary to deploy ISDN within their service areas?
 Explain in detail how the costs should be determined and reported to
 the Commission.

 15. Are there any other policies, aspects, technical characteristics,
 costs, or obstacles (e.g. switch architecture, software, or SS7)
 regarding deployment that the Commission should consider?  If yes,
 list and describe each and explain why.  Provide detailed cost
 information for each item if available.

 16. What policies regarding ISDN standards should be adopted by the
 Commission?  Why?

 17. To what standards (e.g. National ISDN, ITU-T standards, etc.)
 should the Commission require ISDN be deployed and provided?  Why?

 18. What specific service capabilities (e.g. bearer services,
 teleservices, supplementary services, etc.) should be required to be
 provided to customers?  Why?

 19. How should the policies regarding ISDN be implemented by the
 Commission?  Why?  If tariff filings were required, what should they
 contain?  Why?

 20. What end-user applications (e.g. telemedicine, distance learning,
 telecommuting, and video conferencing) using ISDN are available?  Will
 these applications be available using technology other than ISDN?
 Should the Commission consider this in its rulemaking?  Why?

 21. Does Texas need ISDN to compete with other states?  Why?

 22. Would the widespread availability of ISDN have a beneficial impact
 (e.g., through telecommuting, video conferencing, etc.) on Texas'
 compliance with the Clean Air Act?  Explain how.

 23. Are there any other aspects or characteristics of providing ISDN
 that should be considered by the Commission?  If yes, describe each
 and explain why.

 Parties interested in providing additional comments are welcome to do
 so.  The Commission also welcomes data and documentation supporting
 the parties' comments.  General Counsel and staff will review the
 comments and use them in preparing a recommendation to the Commission.

 Comments (13 paper copies) should contain a reference to Project No.
 12756 and should be submitted to John M. Renfrow, Secretary of the
 Commission, Public Utility Commission of Texas, 7800 Shoal Creek
 Boulevard, Austin, Texas 78757, by April 30, 1994.

 Informal comments may be sent to Ms. Pam Whittington at the Commission
 via e-mail addressed to:

          pam.tel@email.puc.texas.gov

 Or you may call her at  (512) 458-0100.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                                  EXAM PAPERS

 [Editor's Note: These are supposed to be actual answers from the tests of
 some students. There were no indications as to which grade-level they were
 in...but just between me and you, I hope that they weren't college kids.
 If so, ...I weep for the future.]

  ACTUAL EXCERPTS FROM STUDENT EXAM PAPERS:

- Charles Darwin was a naturalist who wrote the organ of the species.
- Benjamin Franklin produced electricity by rubbing cats backwards
- The theory of evolution was greatly objected to because it made man think.
- Three kinds of blood vessels are arteries, vanes, and caterpillars.
- The dodo is a bird that is almost decent by now.
- To remove air from a flask, fill it with water, tip the water out, and
  put the cork in quick before the air can get back in.
- The process of turning steam back into water again is called conversation.
- A magnet is something you find crawling over a dead cat.
- The Earth makes one resolution every 24 hours.
- The cuckoo bird does not lay his own eggs.
- To prevent conception when having intercourse, the male wears a
  condominium.
- To collect fumes of sulfur, hold a deacon over a flame in a test tube.
- Parallel lines never meet, unless you bend one or both of them.
- Algebraical symbols are used when you do not know what you are talking
  about.
- Geometry teaches us to bisex angles.
- A circle is a line which meets its other end without ending.
- The pistol of a flower is its only protection against insects.
- The moon is a planet just like the Earth, only it is even deader.
- Artificial insemination is when the farmer does it to the cow instead of
  the bull.
- An example of animal breeding is the farmer who mated a bull that gave a
  great deal of milk with a bull with good meat.
- We believe that the reptiles came from the amphibians by spontaneous
- generation and the study of rocks.
- English sparrows and starlings eat the farmers grain and soil his corpse.
- By self-pollination, the farmer may get a flock of long-haired sheep.
- If conditions are not favorable, bacteria go into a period of adolescence.
- Dew is formed on leaves when the sun shines down on them and makes them
  perspire.
- Vegetative propagation is the process by which one individual manufactures
  another individual by accident.
- A super-saturated solution is one that holds more than it can hold.
- A triangle which has an angle of 135 degrees is called an obscene
  triangle.
- Blood flows down one leg and up the other.
- A person should take a bath once in the summer, and not quite so often in
  the winter.
- The hookworm larvae enters the human body through the soul.
- When you haven't got enough iodine in your blood you get a glacier.
- It is a well-known fact that a deceased body harms the mind.
- Humans are more intelligent than beasts because human branes have more
  convulsions.
- For fainting:  rub the person's chest, or if a lady, rub her arm above the
  hand, instead.
- For fractures:  to see if the limb is broken, wiggle it gently back and
  forth.
- For a dog bite:  put the dog away for several days.  If he has not
  recovered, then kill it.
- For a nosebleed:  put the nose much lower than the body.
- For drowning:  climb on top of the person and move up and down to make
  artificial perspiration.
- To remove dust from the eye, pull the eye down over the nose.
- For head colds:  use an agonizer to spray the nose until it drops into
  your throat.
- For snakebites:  bleed the wound and rape the victim in a blanket for shock.
- For asphixiation:  apply artificial respiration until the patient is dead.
- Before giving a blood transfusion, find out if the blood is affirmative or
  negative.
- Bar magnets have north and south poles, horseshoe magnets have east and west
  poles.
- When water freezes you can walk on it.  That is what Christ did long ago in
  wintertime.
- When you smell an odorless gas, it is probably carbon monoxide.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                      Interview with Tom Jennings
                     by Jon Lebkowsky, jonl@io.com
                       reprinted with permission

     Originally published in Fringe Ware Review #1, ISSN 1069-5656.
         Copyright (c)1993 by the author.  All rights reserved.
              For more details, contact: fringeware@io.com
 
 Our FWI prez recently had a chance to chat with Tom Jennings, who commented
 afterwards: "Think you can mention somewhere that I'm a fag anarcho nerd
 troublemaker/activist? It is important, and to me as well. It always gets
 buried. Lots of people like to know, especially scared people with no
 images of people who are gay and reasonably functional in some way." Tis
 our pleasure to honor Tom, whose work has been so brilliant and so far out
 on the Fringe, that when the US gov't precluded computer technology exports
 during the Cold War, they basically forgot/ignored a certain fag anarcho
 nerd from the Bay Area... As a result, Tom's FidoNet now provides the basis
 for computer networking in Eastern Europe, former USSR and most of the
 Third World, as well as a extraordinary conduit throughout the rest of the
 world.
 
 Tom: This people tracking stuff... what little I know of it sounds very
 creepy. I don't want a box that reports where the hell I am all the time,
 when I walk in the room, it can tell some local machine I'm there. It's
 none of anyone's goddamn business. It's the corporate culture invasion on
 real life, like the top 1% who make all the money, and think everyone's
 gonna live like them.
 
 Jon: Well, if you're living in an ivory tower, after you live there for a
 while, you start to think, not that it's YOUR environment, but it's THE
 environment.
 
 T: Yeah, it is reality, but it's a local one. Everyone they know is like
 that... well, they don't know everybody.
 
 J: In a conversation I had the other day with Allucquere Rosanne Stone, she
 talked about ubiquitous computing, that computers or computing will be
 invisible, it will be so omnipresent...
 
 T: That's what Alan Kay pointed out years ago, that when technology gets
 done right, you don't even see it. When you walk in a room, your hand
 flicks a switch... how much thought do you give to that stupid light
 switch? Hopefully very little. The light comes on, and... Telephones are
 getting close to that.
 
 J: Even better, there's some rooms you walk into and the light switches on
 automatically, because there's motion detectors.
 
 T: Yeah.
 
 
 Anarchy In The A-C-K
 
 J: Tell me about FidoNet. As I said, I'm sorta ignorant on the subject...
 
 T: I have a weird point of view on it, of course, having designed it...
 February or March of '94 will be it's tenth year. It is a network, a
 collection of bulletin boards. It is a loose confederation, and it is
 completely and thoroughly and utterly decentralized. There is literally no
 top. Most of it's members have a narrow view of it because they have this
 particular reality filter on all the time from living amongst hierarchy
 addicts. But FidoNet's most basic element is a bulletin board. What FidoNet
 is, is a set of protocols that lets the bulletin boards communicate.
 FidoNet started as a bunch of bulletin boards, running my Fido software.
 FidoNet was added later, to allow point-to-point email between Fido boards.
 
 J: Did you start with just a single BBS?
 
 T: It started with my system. I was writing software for Phoenix Software,
 which is now Phoenix Technologies. I was their first employee. I did all
 their portable MS-DOS stuff prior to the ROM BIOS they did, which was
 partly based on my previous work with "portable" MS-DOS... we were doing
 MS-DOS installations in three days, and charging exorbitant sums... and
 delivering really good stuff, people got their money's worth, and got it
 damn fast! We had it down to an art of just totally portable stuff. So I
 had this portable attitude toward hardware, and wrote a bulletin board sort
 of based on it.
 
 FidoNet is more importantly a social mechanism. It was pretty obvious from
 the start that it was going to be a social monster, almost more so than a
 technical thing. And it had to do with the original environment of bulletin
 boards, which were around for quite a while by the time I got around to
 doing Fido. Every bulletin board was completely different, run by some
 cantankerous person who ran their board the way that they saw fit, period.
 So FidoNet had to fit in that environment.
 
 J: A very anarchic environment.
 
 T: Yes, explicitly anarchic. Most people just ran them for their own
 reasons, and they were just separated by large distances of time and space,
 so they remained locally oriented. I just ran across old interviews and old
 documentation from '83 - '84, and we were saying it then. It was just...
 people didn't hear it, it just went in one ear and out the other. They
 think 'Oh, anarchism, that means throwing rocks at the cops!' Well
 sometimes, I suppose, but that's mostly a cop's definition of it.
 
 
 The Revolution Will Be Packetized
 
 J: The sense of the bomb throwing anarchist, I guess, is sort of in the
 sense of political disorder...
 
 T: ...which was a specific event in the 20's in San Francisco having to do
 with union labor busts. And blackmail... this guy Tom Mooney, a bomb was
 planted and blame arranged to fall on Tom Mooney, tossing his ass in jail,
 putting the blame squarely on the anarchists.
 
 J: Anarchy has this sorta bad connotation, but anarchy itself is not unlike
 what so many seem to want to embrace now. I think the libertarian
 philosophy is fairly anarchic, and you find it widespread throughout the
 net. It's basically a hands-off philosophy.
 
 T: I think people often take it too seriously, like various anarchist camps
 that have more rules than not. I consider it a personal philosophy, not a
 political thing at all. It has nothing to do with party-type politics.
 
 J: If it becomes overtly political, it ceases to be anarchy...
 
 T: Yeah, more or less, and I don't really care about what's considered
 politics per se, it's personal interaction, how I treat other people and
 how they treat me, and my relations to other people, it's anarchism... I
 always call it Paul Goodman style, which is the principle that people work
 together better if they're cooperating than if they're coerced. Very
 simple, nothing to do with goddamn party politics. It has to do with how
 you treat people that you have to work with. And that's what FidoNet was
 based on, very explicitly. It was sort of laid over the top of a lot of
 Fido bulletin boards, and let them talk to each other in a straightforward
 point-to-point manner.
 
 
 Just How Big Is It?
 
 J: Was it just Fido boards?
 
 T: Just Fido at the time, because it required a fairly low-level of
 restructuring of the innards, message bases and stuff. And Fido is a pretty
 good bulletin board, has been for years, though now it's definitely old
 fashioned. I haven't done a revision to Fido for over two years.
 
 J: Are you thinking about doing that?
 
 T: No, I'm thinking about dropping it. <laughter> I've thought about it,
 and it's over. So FidoNet started up in spring of '84 with two systems, me
 and my friend John Madill and within four months there were twenty or
 fifty... by the end of the year, it was approaching 100 by the next
 February, in nine months. It started growing really fast. And every single
 one was run by somebody for their own reasons in their own manner for their
 own purposes, so FidoNet had to accommodate this. And this is nothing
 unusual, in one sense. All computer networks are essentially run this way.
 The Internet is. There's no central Internet authority where you go to get
 a system in Internet, you just put it online, and find people to help you,
 register with the NIC [Network Information Center] which is just a
 convention for handling names.
 
 J: Sort of ideally cooperative.
 
 T: Yeah, it's quite cooperative, and you don't really get kicked out unless
 you technically screw up, or do something massively illegal or glaringly
 obvious. Most likely technical, like don't answer mail for a long time.
 Most electronic things are like that. It didn't start to take off until
 Echomail came by, which was done by this guy named Jeff Rush in Dallas as a
 way to talk among Dallas sysops about organizing pizza parties. It's a
 fully distributed, redundant database using FidoNet netmail to transport
 the records in the distributed database. It's functionally equivalent to
 Usenet, they gate back and forth very easily.
 
 J: Can you link FidoNet very easily to Internet or UUCP Mail?
 
 T: There's gateways between [FidoNet and UUCP] operating. You can just set
 up the UFGate package... [FidoNet and the Internet] they have totally
 different paradigms. IP, the Internet stuff, is fully connected all the
 time. When you want to connect to a system in Finland, you just rub packets
 with them and they come back in generally under a second. FidoNet is all
 store and forward, offline processing...
 
 J: How big is it now?
 
 T: Just short of 20,000 systems.
 
 J: Wow, that's a lot...
 
 T: It's doubled in a year... I think more than doubled in a year. It's been
 doubling every year for a long time <laughs>.
 
 
 QQBEGIN PGP PUBLIC KEY BLOCKQQ
 
 J: There's a lot of discussion today of encryption schemes, are you
 involved in that?
 
 T: Actually, yeah, I use it routinely.
 
 J: Using PGP?
 
 T: Yeah. FidoNet was pretty intentionally involved in getting PGP
 ubiquitous the first time around... an intentional, conscious quick-dump of
 about 10,000 copies in a week, starting on a Monday, just to be sure that
 it was unstoppable, and it spread very quickly. Now there's all kinds of
 arguments over whether it's legal, or whether it's going to incriminate me
 to use PGP, and the traffic into the network itself...
 
 J: It wouldn't be a criminal issue...
 
 T: People believe all kinds of crazy nonsense.
 
 J: Somebody has a patent on the algorithm, is that it?
 
 T: Yeah, and some people are afraid that if they send or pass encrypted
 data, that the police will bust into the house and steal the computer, all
 this kind of stuff... FidoNet sprung up fully-formed out of seeming nowhere
 into the rest of the computer world. Most people on the Internet have
 access to it through schools or industry. They went to school, then they
 got a job, and they grew up with maintained Internet connectivity... they
 were brought up into the sort of Internet-hood.
 
 J: I think that's changing a bit...
 
 T: Oh, it is changing, it will continue to change, and someday it will be
 incomprehensible that it was this way, but as of today, it's sort of how it
 is. FidoNet did not come from that direction at all. It came from... the
 usual white guys who could afford a computer :-), but in the best tradition
 of radio and astronomy, they were at least amateurs, it's truly an amateur
 network. It is not professional, as in "profession"... "professional" is
 frequently used to mean legitimate, as opposed to amateur...
 
 J: You mean "hobbyist?"
 
 T: Yeah, amateur as a word became disparaging, but we mean it actually in
 the older sense, like the radio amateur sense. We don't do it for money,
 it's done for the sake of itself. So for the most part, FidoNet members
 never had that traditional kind of connectivity, and also didn't have the
 corporate culture, and didn't have the computer network culture, so it
 basically formed in the dark, on its own.
 
 
 550 Flavors of Culture
 
 J: Speaking of the word "culture," do you find that within the FidoNet
 universe, there's a particular set of cultural predilections? Does there
 tend to be a general kind of group or community that uses FidoNet?
 
 T: Well, it's like any of those things, it's really subjective. But, yeah,
 there do seem to be, in my travels on Internet and FidoNet, distinct
 flavors. One is not better than the other, I can tell you that, culturally
 speaking. The Internet people say, "Oh, but the flame level on FidoNet is
 so awful." Bullshit. The flame level on the Internet is just as high. It's
 in loftier language, five line signatures, and all that kind of crap... but
 I'm sorry, it's not any better, it's just different. What it is, is less
 alien to them, more comfortable... and vice-versa from the FidoNet side.
 It's more comfortable, it's more familiar, the language used and the
 acronyms and the smiley faces, all of that junk.
 
 There is a FidoNet flavor, through the usual sociological things. The
 people who originally populated it defined this vague common set, and
 people who come onto it self-select ("Oh, I like that!") and join it, and
 then enhance it, or they're sort of neutral and they come in and they just
 absorb it because... you know, you start hanging out with people, and you
 pick up their manner of speaking. And there are people, of course, who are
 utterly opposed to this, and want to make it professional and some just
 don't care, and live in a corner of it.
 
 But yeah, there are things in common, and I have a hard time putting my
 finger on what they are. It is fiercely independent, utterly, fiercely
 independent. It is viciously anti-commercialization. It has a long history
 of some nasty politics, some really enlightened politics, and I think in a
 lot of ways they have more pragmatic view, and a better view Q better
 meaning more functional in today's world Q than people who haven't had to
 pay their own phone bills.
 
 J: Some people argue that you can't have strictly online community, and
 others believe that you can. Some feel that there has to be some kind of
 face-to-face interaction. In the Internet there has not been as much of
 that until it began to become more broadly accessible to regular people...
 
 T: The Internet is still completely and thoroughly inaccessible... I'm
 sorry, it is simply not accessible. You have to have a large amount of
 hardware or an intimate relationship with someone who does, like you have
 to go to school or something. Otherwise you're paying money... and there
 are people who fall through the cracks...
 
 J: How about public access Internet?
 
 T: Yeah, but if there's more than 100 terminals in the U.S. that any
 average person could walk up to and figure out how to use in less than a
 week, I would be surprised. It still takes huge amounts of specialized
 knowledge.
 
 J: But the technical side is fairly dense...
 
 T: Oh, yeah... I've been an SWTP, CP/M, DOS hacker and hardware hacker for
 fifteen fucking years, twenty years, and UNIX is so intimidating,
 arbitrarily difficult to use... a lot of the users have this macho attitude
 that "Well, you should have to plow through it, I did." The whole
 priesthood nonsense. It's stupid. And the argument whether online culture
 is possible or not, that ain't where it's gonna get decided. It either gets
 made or it doesn't. I think there are online communities. The people who
 are doing it aren't asking themselves, "Are we an online community?"
 They're just going about their business. They're not tangible enough to
 really get documented except in hindsight, you look back and say "Oh, yeah,
 those people are" or "No, they really weren't, when push came to shove,
 they didn't stay together."
 
 J: At EFF-Austin we've been a little more self-conscious about it, we've
 actually been trying to do some community-building, to try to structure an
 online community in Austin where we'd have some force to get things done,
 various projects. One of the things we're doing that other EFF-related
 groups haven't been doing is arts projects, and in doing those things, in
 talking to some of the people who are interested in doing that, I realized
 that there are a lot of writers and artists who are hungry to get online.
 They know it's there, they'd like to be using it, but they can't get access
 to it because they can't, unless they stumble into it, find a system
 that'll give them an account. It's kind of like what you were saying about
 barriers... but I wonder if, in the FidoNet world, you find writers and
 artists using FidoNet to share information and to form arts communities?
 
 T: Well, there's a lot more less-technical people involved, because you can
 put a $300 system together, line cord to phone jack. That just means that
 the entry level is a lot lower. And it's functional as hell! I mean, So
 what if it's slow? 5 seconds or 100 milliseconds, what's the difference to
 most people?
 
 
 All Look Completely Different
 
 J: The link, the network, is strictly for email? Or do you have some other
 stuff, file transfer... ?
 
 T: Oh, there's lots of file transfer stuff. In some ways it's a lot more
 sophisticated than the FTP stuff from the user's point of view. There's
 this thing called the SDN, the Software Distribution Network, which looks
 like a conference for files, where the objects are not messages, but files.
 And they're stored in a redundant manner, some locally concentrated, some
 far away and scattered. It's kind of nebulous, like most network things
 are. They do monthly announcements of new files, and most of it's
 shareware, or free. You can do things like file attach (send with a
 message), and file requests (file fetch via message).
 
 FidoNet doesn't have the problem that a lot of older networks have, with
 seven bit channels and all that crap. We have eight bit channels with 32
 bit CRCs. We do run into the alien system problems... ASCII character sets
 vs. the cyrillic alphabets and all that kinda stuff. Those problems are
 about as chaotic as they are anywhere else.
 
 J: How about remote login?
 
 T: No... the systems in FidoNet are radically different. There's Radio
 Shack color computers, there's CP/M machines, Apple IIs, giant DOS
 machines, giant LANs of UNIX boxes, all running common protocols in a far
 broader hardware base than most, even UNIX boxes. There's no unified
 operating system, there's a set of protocols, there's 40 or 50 different
 mailers, and FidoNet interfaces in bulletin boards, and they all look
 completely different. So it's at a much higher level of abstraction than
 the FidoNet gets defined at. I bet a lot of the Internet, some huge
 proportion, is UNIX...
 
 J: You certainly need some kind of standard to be interoperable to the
 extent that the Internet is, don't you?
 
 T: No, where the real compatibility is is the TCP/IP layer, and that's rock
 solid, and that's the thing in common. All the rlogin, telnet, and ftp
 stuff partly user paradigm, rather than just a set of protocols. It's well,
 and fine, and wonderful, and I love it, but it does put a real crimp on
 style.
 
 [Ed Cavazos, almost-attorney and vice-prez of EFF-Austin, shows up and
 settles in to listen. The conversation continues.]
 
  The Color Of Money
 
 T: A lot of FidoNet is so radically different, you can't get people to
 either hear it or understand what's going on, because it's NOT like any of
 the others, and it was intentionally not made like the others, and some of
 the really basic principles that seem random are intentional... they're in
 writing, and have been in writing for seven years. The strictly American
 anarchist principles that it's based on are written into the policy
 documents.
 
 We actually had in '85, '86, '87 an attempted takeover by a corporation
 that was formed from within, it was like a cancer that became a giant boil
 on the surface, called IFNA, the International FidoNet Association, that
 was sort of a good idea, or a potentially good idea, when we started it at
 the 200 node level. By the time it got around to being implemented, at 500
 nodes, the world had utterly changed. With 200 people, you can run it like
 a club. It was 90% U.S., 90% white guys with computers, and at the 500 node
 level, it was about 20% European and definitely, obviously growing. It
 hopped the puddle, with systems appearing in South America, scattered, but
 you know how that goes... when you get one, then you get two, and then
 four, and they start to grow.
 
 We were very naive, and I was right in the middle of it. Some of us learned
 quickly, this isn't going to work! But this corporation grew, and became a
 501(c)(3), and like all of those things, they get power-hungry, and they
 get grabby of territory, and we had to fight it off, and it was fought off
 by the constituents of the network... and it was killed off. They had
 gained control of the copyright and the trademarks, and they were fought
 off. The network, instead of dying, like everyone predicted, thrived.
 
 J: So how did this fight go?
 
 T: It was fought by lawyers and proxy votes and all the usual crap, in a
 goddamn hotel in San Jose, was the final straw...
 
 J: Were you a part of this corporation at all?
 
 T: Well, a bunch of us started it... at first, we were brainstorming what
 we could do... deals on modems, some obvious stuff. And we'd have a
 spokesperson from FidoNet who'd attend the EMA meetings once a year and
 represent bulletin board operators and FidoNet members in electronic
 privacy things and the technical trade stuff and the obvious things. And
 those are still lacking, we still need them. But it was established really
 early that everyone not only retains control of their system, but they're
 expected to do their part to run it, because there is no one else to run
 it. And as simple as it sounds, it's a really radical act to get that
 across, so that people don't just sit on their butts. And of course, the
 usual 10% does the work, and 90% sits on their butts, but that's fine, too.
 
 
 Double Plus Plus Good
 
 T: FidoNet's a little odd, unlike the Internet, which has a domain name
 system... you say "Connect to toad.com," it says, ".com, okay, over there,
 toad... here's the address," and you go after it. FidoNet has what appears
 to be a centralized database that every system in the net has, a copy of
 this at the moment 2 megabyte long ASCII database, with 20,000 records in
 it. And it's updated every week, it contains the full physical and logical
 information about the entire network... phone number, system name,
 restrictions on use, protocols supported, some ASCII text, like system
 name, and city, all that kind of junk. It contains the hierarchical
 addressing scheme of the network, and it contains a lot of redundancy.
 
 J: Given that there's no central authority, who maintains this database?
 
 T: A local autonomous unit in FidoNet... First... the terminology in
 FidoNet is point-node-net-zone. Points aren't really part of FidoNet,
 they're a peculiar thing... a node is the basic unit, it is a bulletin
 board or a mail-only site, generally a phone number with a modem on it. A
 net is a cluster of Fidos, a cluster of nodes, like San Francisco has Net
 125, SFBay Net, 75-80 systems. A node in a net is the basic social
 organizational unit. It was designed to be small enough to comprehend in
 regular old terms, like we all know and love, clubs and that kind of
 group... when they get too big they tend to fragment into pieces, which
 become autonomous units, then nets are collected into the real-life
 geography of continents.
 
 The North American phone system is alien to the Western European ones, and
 they have lots of mutually-alien phone systems. The North Americans tend to
 be a lot less political... Zone 1 encompasses Mexico, U.S., and Canada, and
 nobody ever batted an eye over it. It's like, "Oh, okay, that makes sense."
 In Europe, they're fiercely defensive of the political boundaries, and it's
 really silly. Local autonomy was the critical thing to make it work,
 because who's going to allow somebody in New Jersey to dictate how they're
 going to run their system? There'd be no way to exert any kind of control,
 and once you start getting into control wars, you spend all your time doing
 that.
 
 So the way the node list is made is that every net fragment makes its own
 chunk of the node list, which is a very straightforward task, even though
 it ends up being work. They're passed up through regional coordinators who
 take these fragments, and everybody gets a copy of everybody else's weekly
 list, and each of them compiles a giant list, then they do a difference,
 this week from last week, and mail out that difference back down the tree.
 So if you chopped off half the network and smashed it flat, it would
 regenerate itself. It's a balance of terror, that's what it is. It's a
 genuine balance of terror in responsibility and power. What you get for
 that redundancy is that no one can cut you out of the network, no one can
 declare that you can't communicate.
 
 In the UUCP world none of this happens because the social environment is
 much more substantial... universities, Hewlett Packard... Your neighbors,
 in theory, can cut you off, and you disappear, no one knows about you, if
 you're eliminated from the bang path, no one can talk to you, and that's
 it, you don't exist, it's as simple as that.
 
 In FidoNet, and this has happened recently in England... a bunch of
 religious fundamentalists by just hammering away gained control of large
 chunks of the FidoNet in the U.K., and they started having fits... "Why,
 there's perverts on this board, and we're not gonna have 'em in FidoNet!"
 <laughter> And they clipped them out of the goddamn list, they removed the
 entries from the U.K. list. You sort of noticed they disappeared, but those
 people can still communicate, they can mail you their fragment,
 hand-generated if necessary, and all the node list processors let you
 incorporate private lists, and you can reply back, just like that. No one
 can be cut out of the network.
 
 If you start thinking about it, you realize that there are a number of good
 and bad side effects from this. Like, if you have some real asshole
 troublemaker, there's nothing you can do about it. Like, unless somebody
 comes in and pulls out a gun or something, it's kinda hard to get someone
 kicked out of a more or less public place... well, [here in] the hotel
 would be relatively easy, but out in the street, you've just gotta live
 with your neighbors. And the same is true in the FidoNet. You have to learn
 to live with your neighbors, and vice versa. The flaming assholes have to
 learn how to behave well enough to not be utterly censured. Which is what
 generally happens to them... people just ignore them.
 
 There was one guy, he was another fundamentalist Christian nut case. He was
 amusing, actually. He was a "true Bible" believer, this was called
 pre-rapture, or something or other, some pre-rapture network... he was
 persecuted by all sides, and he loved it. He was mailing everybody this
 gibberish, pages and pages of gibberish. And there's programs that just
 filter out mail, and you say, I don't wanna see mail from this address...
 
 J: A bozofilter.
 
 T: Yeah, basically, it's a bozofilter, we've had 'em for a long time. And
 there's also another one that's called bounce... whenever you get anything
 from this guy, bounce it back. It appends a bit of text that says "This
 message is refused at site so-and-so, have it back," which IRRITATES
 people! But it just works out that people, even the crazy ones are social
 organisms. We don't really like to be disliked too widely, we like to have
 an audience, if nothing else. So that's the underpinnings...
 
 FidoNet has been very flexible technically. When technological changes or
 opportunities come by, within a year half the net supports them. In about
 '85 U.S.JRobotics very smartly discovered bulletin boards, and they
 realized the way it works is, even though there's a relatively small number
 of bulletin board sysops, if you're bulletin board caller, who do you look
 to to see what hardware to buy? The sysop. And they ask, "What kind of
 modem do you have... oh, it must be pretty good if you use it," because
 when it's bad, they mouth off to hundreds of people about it.
 
 So USR basically courted the FidoNet, and said "What do you want to see in
 a modem?" The first modem they did this with was the Courier 2400, which
 was 600 bucks new at the time, or 700 bucks. They offered a 50% off deal,
 down to about 300 or 400 dollars, which was a bargain, relatively speaking.
 We wanted true flow control, and a symmetrical modem with basic AT command
 set, and they did it. It was an instant success. And then they did the HST,
 much to most of the industry's annoyance, they did this kludgey proprietary
 asymmetrical protocol 9600 one way, 300 baud the other way... they came to
 us again, and we worked out more handshake stuff, and started changing
 protocols on our side.
 
 FidoNet was originally based on xmodem, which is amazingly similar to
 X.25's packet ack, like Kermit, only much more efficient than Kermit, and
 very much like UUCP-G, only it's not windowed... block ack block ack block
 ack... it's fine at 2400 baud and below, above 2400 baud it was not good.
 We had asymmetrical modems that collapsed. So there had been another
 protocol called Wazoo around, and it instantly became hot, because it did
 protocol negotiation when you started a session, and it could pick ZMODEM
 [trademark Chuck Forseberg], which is fully-windowed, screaming fast, you
 can run it ackless. You could work the hell out of an HST in ways that
 other protocols couldn't. Internet protocols and UUCP-G were just useless,
 in other words, the modem was useless for existing protocols. So FidoNet's
 historically been very flexible, technology-wise.
  
 McLuhanites: Myopy, My Opium
 
 Ed: Are you familiar with John Quarterman? Have you seen his maps of
 FidoNet?
 
 T: No, I haven't seen his maps of FidoNet. [Quarterman did show 'em off
 later in the conference.] I talk to him occasionally, I republished one of
 his articles in FidoNews a while ago... FidoNews is a weird phenomenon in
 itself... a 20,000 circulation weekly newsletter in its tenth year. It sort
 of goes unacknowledged... FidoNet has a giant credibility problem, because
 it sprang forth fully-formed 'way outside all traditional computer things,
 and because it works on PCs and Radio Shack Color Computers (which actually
 turns out to be a nice processor, it runs OS9 on a 6809... you can run
 multiusers on a $99 packaged machine). It's really some amazing software.
 
 FidoNews was designed in '84 in the first year as the meta-net, to discuss
 the net itself, to discuss the social end of the net. In the first issue
 was a retired Air Force colonel or something, whining about the military
 retirement process, and people instantly said, "This is supposed to be a
 technical newsletter, this is FidoNet..." and I said, "No, bullshit, it's
 not. I'm tired of just this techie crap. Do you talk on the phone about
 your telephone all the time? 'Gee, I've got a great new phone, it's got all
 these pushbuttons...' and you get bored very quickly. It's like radio
 amateurs talking about their goddamn antennas." Who wants to put up with
 that stuff?
 
 J: We've been talking about that a lot. There's three or four magazines
 devoted to online cultures, cultures of the Matrix, that focus on the
 Internet a lot. Wired is one, Mondo in a real different way, and
 bOING-bOING, of course, in a REAL different way. And we realized that a lot
 of the articles are preoccupied with the carrier, with the technology for
 carrying messages, and not so much with the messages themselves or the
 cultures themselves, the sorts of cultures that are evolving.
 
 T: Yeah, they forget that what we're making is a goddamn conduit; it's a
 medium, it's not content! A content comes with it, because they're brand
 new mediums, they fail a lot, and they need to be developed... all software
 sucks, and all hardware sucks, so you end up talking about it a lot, but
 yeah, that's not the point.
 
 J: What's really more fascinating is what's at either end of the conduit...
 
 T: Yeah, the telephone proved that. It's actually a way to convey social
 information, emotion, that's why telephones worked, you can talk over them.
 How many ways can you say "No" with a keyboard? Not very many. 25 or 50 if
 you're incredibly ingenious. Smiley faces and uppercase... All the cultural
 information is stripped. And a lot of it has simply been access. Those at
 the gates determine who comes in. If you own the $5,000 PC...
 
 J: Is that what brings you here [to the fourth conference on Computers,
 Freedom, and Privacy), access issues?
 
 T: Yeah, that's why I'm always skeptical of large-scale networks. While I'm
 on the Internet, I don't have any pretensions of being... "Why, the world
 is connected!" No, one percent of one percent is connected, barely, and the
 tools really suck. Through no fault of the authors, they're incredible
 works, the foundation to a world. But they're hardly accessible to everyone
 in the world.
 
 J: I had to buy my access to the Internet, at first. The WELL...
 
 T: Mine I get because I'm managing a small IP cooperative, and I get it
 sort of as a perk to my $400 to $500 salary for what is essentially a
 full-time job.
 
 J: Actually, I've been able to pick up other accounts since, but the only
 way that I could have got in in the first place was by buying access,
 because I'm not really very technical. My interests are more
 sociopolitical, I guess...
 
 T: I don't really have any serious problems with the way things exist. For
 better or worse, that's the way that all complicated things have been
 developed in our little Western history timeline. It takes resources and
 effort and energy, and they do spread out, eventually. And they get defined
 along the way, they definitely have basic cultural assumptions glued into
 them at the very base.
 
 J: It allows a more distributed way of organizing and doing things...
 
 T: We'll see if it's ever as good as the telephone is. It doesn't get much
 better than the telephone, when you think about its position in society.
 Like Bruce said in his Hacker Crackdown, you notice them when you don't
 have one, they're so ubiquitous, they're like light switches. You don't
 think of a telephone, it's not an exciting object.
 
 J: I can remember when there was a single phone in the house, and it was a
 big deal to have a second phone, which was usually on the same line. And
 now I have three phone lines, and one is a dedicated data line. I don't
 think I know many people who don't have at least two or three phones in
 their house.
 
 T: I'm down to two, and I consider that rarefied... I only need two lines
 now, after having six at one point, all these bulletin boards and data
 lines, now it's like, oh, a voice line, and a data line...
 
 J: I prefer asynchronous text swapping, but I'm not sure why, maybe a
 personal idiosyncrasy. It seems funny to me, because Matisse Enzer, the
 support guy on the WELL... when we're having a problem, and we can't quite
 figure out how to communicate about it, he always says, "Well look, why
 don't I call you up, and we'll talk about it." And I always say, "No, wait,
 I don't wanna talk, I just wanna text!" <laughter>
 
  -----
 Originally published in Fringe Ware Review #1, ISSN 1069-5656.
 Copyright (c)1993 by the author.  All rights reserved.
 For more details, contact: fringeware@io.com

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%