💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JAUC › jauc1-4.phk captured on 2022-06-12 at 13:02:00.

View Raw

More Information

-=-=-=-=-=-=-


  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
  ======================================================================
  ISSN 1074-3111           Volume One, Issue Four           June 7, 1994
  ======================================================================
    
      Editor-in-Chief:        Scott Davis      (dfox@fennec.com)
      Technology Editor:      Max Mednick      (kahuna@fennec.com)
      Consipracy Editor:      Gordon Fagan     (flyer@fennec.com)
      Network Security:       George Phillips  (ice9@fennec.com)

      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC

      U.S. Mail:
      The Journal Of American Underground Computing 
      10111 N. Lamar #25
      Austin, Texas 78753-3601

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 IMPORTANT ADDRESSES - 
 ============================================================================
 To Subscribe to "TJOAUC", send mail to:              sub@fennec.com
 All questions/comments about this publication to:    comments@fennec.com
 Send all articles/info that you want published to:   submit@fennec.com
 Commercial Registration for Profitable Media:        form1@fennec.com
 ============================================================================

 "The underground press serves as the only effective counter to a growing
 power, and more sophisticated techniques used by establishment mass media
 to falsify, misrepresent, misquote, rule out of consideration as a priori
 ridiculous, or simply ignore and blot out of existence: data, books,
 discoveries that they consider prejudicial to establishment interest..."

 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
 
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 Contents Copyright (C) 1994 The Journal Of American Underground Computing
 and/or the author of the articles presented herein. All rights reserved. 
 Nothing may be reproduced in whole or in part without written permission 
 of the Editor-In-Chief and/or the author of the article. This publication
 is made available periodically to the amateur computer hobbyist free of
 charge.  Any commercial usage (electronic or otherwise) is strictly
 prohibited without prior consent of the Editor, and is in violation of
 applicable US Copyright laws. To subscribe, send email to sub@fennec.com

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 DISCLAIMER AND NOTICE TO DISTRIBUTORS -

 NOTE: This electronic publication is to be distributed free of charge
 without modifications to anyone who wishes to have a copy. Under NO
 circumstances is any issue of this publication, in part or in whole, 
 to be sold for money or services, nor is it to be packaged with other 
 computer software, including, but not limited to CD Rom disks, without 
 the express written or verbal consent of the author and/or editor.
 To obtain permission to distribute this publication under any of the
 certain circumstances stated above, please contact the editor at one of
 the addresses above. If you have intentions of publishing this journal
 in any of the ways described above, or you are in doubt about whether or
 not your intentions conflict with the restrictions, please contact the
 editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
 This publication is provided without charge to anyone who wants it.
 This includes, but is not limited to lawyers, government officials,
 cops, feds, hackers, social deviants, and computer hobbyists. If anyone
 asks for a copy, please provide them with one, or mail the subscription
 list so that you may be added.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 4

                          TABLE OF CONTENTS

 1)  We've tried To Be Nice...                     Carl Guderian
 2)  Defcon Convention Update                      Dark Tangent
 3)  Obituary / Mimsey                             Unknown
 4)  Call For Papers / Neural Networks             Readers
 5)  Press Release: Spyglass/NCSA Agreement        Readers
 5)  The Real Story                                Carl Guderian
 6)  Legion Of Doom T-Shirt Ad                     Chris Goggans
 7)  Libertarian Party / Opposition To DTA         Libertarian Pty
 8)  Unabom - 1 Million $ Reward                   William Tafoya
 9)  The Massachusetts Encryption Bill             Unknown
 10) Book Review: Information Warfare              Scott Davis
 11) Whisper Who, A Unix Tool (Source Code)        Editors
 12) Hacker Barbie                                 Readers
 13) The Well: A Small Town...                     Cliff Figillo
 14) The Feminization Of Cyberspace                Doctress Neutopia
 15) Response To The Feminization Of Cyberspace    Jason Webb
 16) Easy-to-Use Kennedy Conspiracy Chart          Gordon Fagan
 17) Meeks Defense Fund                            MDF
 18) HOPE - Hackers On Planet Earth                Emmanual Goldstein
 19) TV & Movie Mania Radio Show                   Lauren Weinstein
 
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 Special thanks to the anonymous reader who sent the software to my US Mail
 address...it was very cool.    -Scott
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 The Journal Of American Underground Computing supports DEFCON II in Vegas!!
 We will be there, and we encourage you to do the same.
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

            We've Tried to Be Nice: Other Ways to Fight Clipper

 by Carl Guderian (bjacques@cypher.com)

 (You've read about Clipper ad nauseam elsewhere, so refer to other sources 
 if you still don't know about Clipper, the Digital Telephony Act, and 
 everything else that will be lumped together here under the rubric of 
 "Clipper."  Start with John Perry Barlow's excellent "Jackboots on the 
 Infobahn" in issue 2.04 of Wired Magazine. If you want balance, ask the NSA 
 for its opinion and weigh it against our position that Clipper obviously 
 blows. Onward.)

 The Situation, Spring 1994

 The Clinton White House is apparently steaming ahead on Clipper despite our 
 perfectly reasonable arguments and well-mannered campaign against it. To 
 John Perry Barlow (see intro) it plays like Invasion of the Body Snatchers 
 II: The White House Years--formerly sensible folks replaced by pod people 
 blandly assuring us that if "I could tell you what I know, you'd agree with 
 me."  No help there.
 
 Various industry consortia were ready to sell us down the slippery slope 
 until the feds double-crossed them at the last minute by rescinding the 
 offer to lift export controls on encryption in exchange for support for 
 Clipper. An attempt to make RSA/PGP encryption a politico-economic fait 
 accompli by sheer numbers of users is moving slowly, if at all (PGP really 
 requires direct internet access, it's hard to use, and RSA's suing Phil 
 Zimmerman so nobody else is going to dress it up for the market). The White 
 House spooks may make a bigger splash in the market by ordering their 
 50,000 electronic keyholes than we can by passing out copies of PGP for 
 free. We're fighting the enemy on its own turf and terms and we could lose. 
 It's time to fight dirty. Below are a couple of suggestions.

 Mutt and Jeff

 Just as for every civil rights Freedom Rider there was a Black Panther, for 
 every Pat Schroeder there's a Riot Grrl, and for every polished Dixiecrat 
 Senator there was a KKK Nightrider, so must we field media streetfighters 
 to complement our sincere and polite public spokesmen. The history of social 
 progress (and, unfortunately, reaction) is that of good cop and bad cop. 
 Opponents of Clipper must employ these Siamese twins of persuasion in order 
 to get anywhere. If you've never been interrogated by police, customs 
 officials, school principals, or corporate investigators, a little 
 explanation of good cop/bad cop may help. 

 In interrogations conducted in civilized countries, the object is to crack 
 the interviewee without resorting to physical torture. The most effective 
 method is good cop/bad cop. The bad cop, sent in first, acts enraged and 
 threatens to beat the truth out of the suspect. He gleefully enumerates all 
 the terrible things that can happen to an uncooperative suspect. Sometimes 
 this alone works. If the prisoner stands firm (or is frozen with fear), the 
 good cop comes to the rescue, radiating sympathy and bonhomie. He offers a 
 cigarette, a friendly ear, and assurances that, he and the suspect are 
 really on the same side. 
 
 The good cop plays on the suspect's pride, suspicions, or other 
 psychological weaknesses in order to get a voluntary confession. The good 
 cop's presence carries the implied threat of the return of the bad cop if 
 no confession is forthcoming. To accuse the good cop of waging psychological 
 warfare is to miss the point. Psychological warfare is waged by adept 
 deployment of both good and bad cops in order to break the prisoner. 
 It's very effective against folks who don't know any better, especially 
 young hackers, schoolkids, and Seattle scenesters en route to Vancouver. 

 The Occult Technology of Power

 The point of the above digression is that a tool well-known to the 
 authoritaries can be, and has been, used against them as well. As gays have 
 learned, neither the noisy AIDS Die-ins by ACT-UP nor lobbying by advocacy 
 groups is alone sufficient to win public support. Together the tactics work 
 because they offer different levels on which the public can deal with issues 
 (and people) that clearly won't go away. 

 Clipper advocates already know the weakness of their position, so arguments 
 are useless. They repeat the same arguments in hopes the public will get 
 tired of hearing about it and simply sign the blank check. We must pre-empt 
 the argument with bite-sized zingers. In the economy of attention, the 
 market goes to the side with the pithiest arguments. When they say "law and 
 order" we respond with "ATF." Such sound bites are Patriot Missiles that 
 shoot down the other side's forensic Scuds. Channel the spirits of Dorothy 
 Parker and Oscar Wilde. Give their straw man a hotfoot; they summon up 
 nuclear terrorism, we resurrect the Branch Davidians. The issue doesn't lend 
 itself to riotous demonstrations, but with a really good negative media 
 campaign we can whip up a good hate frenzy against Clipper. We already do 
 this somewhat, but we need to go further, with high concept slogans and 
 catch phrases. 
 
 "Clinton chip," like "Hooverville," has a dry, sharp ring to it, commanding 
 attention like the snap of a bone. Plus, it yokes the President personally 
 to the issue. If that sounds lame, try something else. The ancient 
 techniques of propaganda apply here, wedded to the black art of meme/
 information virus theory. It's a media war, so we'll use a little McLuhan. 
 (If you've read his stuff, you know his writing style was really disjointed, 
 but sounded great! Which may be the point.) Slick attack ads, sound bites, 
 rants to the editor, whisper campaigns, and other forms of media 
 manipulation are in order. Anything short of gross distortion or outright 
 lies is acceptable. The truth is scary enough and can be made to sound 
 positively Lovecraftian, if we succeed in seizing the metaphors. Detourned 
 ads such as "big brother inside" are a good start. The opportunities for 
 satire are boundless, especially given the history of government projects. 
 Emphasize how much more a Clippered future will play like "Brazil" than 
 "1984." 
 
 Why assume things will always work out for the Bad Guys Conspiracy? Want to 
 bet that when the government buys Clipper chips the Secret Service, FBI, 
 CIA, NSA, and State Department will probably spy on each other (since no one 
 else will use it)? Or that when Clipper charges out the fortress gate its 
 broken carcass will likely be flung back over the wall (i.e., it will be 
 cracked and posted to the net)? How will they know I haven't sold my 
 Clippered cellular phone at a garage sale? And so on. 
 
 Negative campaigns don't by themselves win support, but reasonable words 
 don't win much attention either. Both tricks must be played in their turn. 
 Not good cop or bad cop, but good cop AND bad cop. A diverse battle plan 
 gives sympathizers more options for action. Some folks like to lobby and 
 others like to sling mud. Hey, we're a big tent. And the streetfighters can 
 keep the lobbyists honest. 

 Useful Idiots

 In order for an issue to get attention it should demonstrably arouse the ire 
 of a number of large and unrelated groups. Right wing fundamentalist 
 screwheads as well as flaming liberals stand to lose if Clipper becomes the 
 law, so we put a bug in their respective ears in hopes of getting a 
 response. Support for one's position comes from surprising places. 
 Cyberpagans, for example, will be shocked to learn that Phyllis 
 "Church Lady" Schlafly denounced Clipper in a syndicated column a couple of 
 months back (she got a few details wrong, but you have to expect that). 
 Equally shocking (at least to this writer) is Rush Limbaugh, avid computer 
 user, so far passing up an opportunity to savage Clinton on Clipper. Liberal 
 groups can be persuaded that a conservative Republican administration armed 
 with Clipper would make J. Edgar Hoover look like Norbert the Narc.
  
 This strategy is aimed primarily at right wing groups for a number of 
 reasons. They already hate the present Democratic administration.  They're
 best at marshalling money and "good-ole-boy" clout. Right-wing paranoia is 
 more entertaining than the left-wing variety, so it is more likely to be 
 heard. To the Christian Right, for instance, Clipper carries the musky scent 
 of the Beast 666, and they expect Clinton to spend a second term stamping 
 our hands at the door of the Hellfire Club. And did you ever notice how 
 many cypherpunks own guns? Play up the gun analogy.
   
 This avenue to political action is time-critical. If 1997 sees a Republican 
 administration in place, right-wing groups will lose interest in attacking 
 it. And since it was the Bush White House (or spooks within it) that 
 proposed Clipper, you can bet the rent that President Dole, Quayle (!), or 
 whoever will make it a fact of life quicker than you can say "national 
 security." So much for looking to the Republicans for relief from Clipper.
 
  The Golden Apple of Discord

 Thank the Deist god of the Founding Fathers that our government is not a 
 monolithic entity possessed of a single will. Battles are already underway 
 over which agency gets the secret skeleton key to the Clipper escrow vault 
 to bypass the official safeguards that won't work anyway. Getting the Crips
 and Bloods to make peace was a cakewalk compared to Clinton's efforts to get
 the Three Letter Agencies to talk to each other. As long as they must 
 compete for funding it will be so. 

 Not quite the end

 With a bit of work we can play up Clipper so that it attracts as much 
 attention as the abortion, gun control, or gay rights issues have. Getting 
 the cover of Newsweek was good; mainstream coverage in a proposal normally 
 of interest only to propeller heads and conspiracy buffs is gratifying. 
 Remember the fallout after the Hacker Crackdown of 1990? But sustained 
 pressure is needed. Clinton's people need their noses rubbed in the sheer 
 breadth of opposition to Clipper. If a White House aide hears "Clinton Chip" 
 or something similar on the street, the President will hear of it and 
 realize we're serious.

 Really the end

 According to a recent issue of Federal Computer Week, the NSA is adopting as 
 it's mascot the armadillo. Maybe we can thank Bobby Ray Inman for this one. 
 FCW recently ran a contest to name the "dillo." Entrants were asked to 
 consider the NSA's reputation for prurience and the animal's best known 
 habitat (the freeway center stripe). The contest is probably over by now, 
 but "Roadkill" seemed to be the winner paws down. "Road rash," "Winston 
 [Smith]," and "Harry Buttle" (the poor sap whose erroneous arrest and 
 subsequent death under torture--er, information retrieval--trigger the 
 events of "Brazil") were this author's favorites.

 Credits

 Many thanks go posthumously to Marshall McLuhan for his theory of 
 perception, which states that most people see either the figure or the 
 background (a vase or two faces?) but that true perception is seeing both 
 figure and background.	This seemed pretty wacky a year ago, but it makes a 
 lot more sense now. Backhanded thanks go to a trio of Canadian customs 
 guards at the Peace Bridge connecting Buffalo, NY to Ft. Erie, Ontario for 
 personal instruction in the tactics of "good cop/bad cop". Thanks also to 
 ReSearch (for PRANKS!), the Situationist International (including King Mob), 
 Richard Dawkins (meme theory) and the late Count Alfred Korzybski (general 
 semantics), for inspiration.

 Please wash your hands before leaving the 20th century.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                            DEFCON UPDATE

 by Dtangent (dtangent@defcon.org)


 XXXXXXXXXXXXXXXXXXXXXXXX XX     DEF CON II Convention Update Announcement
 XXXXXXXxxxxXXXXXXXXXXXXXXX XX   DEF CON II Convention Update Announcement
 XXXXXXxxxxxxXXXXXX  X    X      DEF CON II Convention Update Announcement
 XXXXXxxxxxxxxXXXXXXX  X         DEF CON II Convention Update Announcement
 XXXXxxxxxxxxxxXXXX XXXXXXXXX    DEF CON II Convention Update Announcement
 XXXxxxxxxxxxxxxXXXXXXXXXX X     DEF CON II Convention Update Announcement
 XXxxxxxxxxxxxxxxXXXXXX  XX  X   DEF CON II Convention Update Announcement
 XXXxxxxxxxxxxxxXXXXXXXX         DEF CON II Convention Update Announcement
 XXXXxxxxxxxxxxXXXXXXXX X XX     DEF CON II Convention Update Announcement
 XXXXXxxxxxxxxXXXXXXXXXX  XX X   DEF CON II Convention Update Announcement
 XXXXXXxxxxxxXXXXXXXXX X         DEF CON II Convention Update Announcement
 XXXXXXXxxxxXXXXXXXXXXXXXXX      DEF CON II Convention Update Announcement
 XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement

READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE
DISTRUBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ
 ============================================================================

 What's this?  This is an updated announcement and invitation to DEF CON II,
 a convention for the "underground" elements of the computer culture.  We try
 to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
 Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
 Groups, CypherPunks, Futurists, Artists, Etc..

 WHO:   You know who you are, you shady characters.
 WHAT:  A convention for you to meet, party, and listen to some speeches
        that you would normally never hear.
 WHEN:  July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th)
 WHERE: Las Vegas, Nevada @ The Sahara Hotel

 So you heard about DEF CON I, and want to hit part II?  You heard about the
 parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
 check it out in person?  Load up your laptop muffy, we're heading to Vegas! 

 Here is what Three out of Three people said about last years convention:

 "DEF CON I, last week in Las Vegas, was both the strangest and the best
 computer event I have attended in years." -- Robert X. Cringely, Info World 

 "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas

 "Soon we were at the hotel going through the spoils: fax sheets, catalogs,
 bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds.
 The documents disappeared in seconds." -- Gillian Newson, New Media Magazine

 DESCRIPTION:

 Last year we held DEF CON I, which went over great, and this year we are
 planning on being bigger and better.  We have expanded the number of
 speakers to included midnight tech talks and additional speaking on Sunday.
 We attempt to bring the underground into contact with "legitimate" speakers.
 Sure it's great to meet and party with fellow hackers, but besides that we
 try to provide information and speakers in a forum that can't be found at
 other conferences.

 While there is an initial concern that this is just another excuse for the
 evil hackers to party and wreak havok, it's just not the case.  People come
 to DEF CON for information and for making contacts. We strive to distinguish
 this convention from others in that respect.

 WHAT'S NEW THIS YEAR:

 This year will be much larger and more organized (hopefully) than last year.
 We have a much larger meeting area, and have better name recognition.
 Because of this we will have more speakers on broader topics.  Expect
 speaking to run Saturday and Sunday, ending around 5 p.m.  Some of the new
 things expected include:

 o An Internet connection with sixteen ports will be there, _BUT_ will only
   provide serial connections because terminals are too hard to ship.  So
   bring a laptop with communications software if you want to connect to the
   network.  Thanks to cyberlink communications for the connection.

 o There will be door prizes, and someone has already donated a Cell Phone
   and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead 
   Addict.

 o Dr. Ludwig will present his virus creation awards on Sunday. 

 o A bigger and better "Spot The Fed" contest, which means more shirts to
   give away.

 o More room, we should have tables set up for information distribution.
   If you have anything you want distributed, feel free to leave it on the
   designated tables.  Yes, this year there will be a true 24 hour
   convention space.

 o A 24 hour movie / video suite where we will be playing all type of
   stuff.
   VHS Format.  Mail me with suggested titles to show, or bring your own.
   We'll use a wall projector when not in use by speakers.

 o Midnight Tech Talks on Friday and Saturday night to cover the more
   technical topics and leave the days free for more general discussions.

 WHO IS SPEAKING:==========================================================

 This list represents almost all of the speakers verified to date.  Some
 people do not want to be announced until the event for various reasons, or
 are waiting for approval from employers.  A speaking schedule will go out
 in the next announcement.


 Phillip Zimmerman, Notorious Cryptographer & author of PGP.
 Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and
     "Computer Viruses, Artificial Life and Evolution"
 Loyd Blankenship (The Mentor), Net Running in the 90's and RPG.
 Padgett Peterson, Computer Enthusiest, Anti-Virus Programmer.
 The Jackal, A Radio Communications Overview, Digital Radio and the Hack 
 Angle.
 Judi Clark, Computer Professionals for Social Responsibility.
 Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced.
 To be Announced, The Software Publishers Association, Topic to be Announced.
 Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics.
 Mark Lotter, Cellular Enthusiest, Hacking Cell Phones.
 Lorax, The Lighter Side of VMBs.
 Peter Shipley, Unix Stud, Q&A on Unix Security.
 George Smith, Crypt Newsletter, Virus Topic to be Announced.
 Cathy Compton, Attorney, Q&A Surrounding Seisure Issues, Etc.
 John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal.
 Red Five & Hellbender, Madmen With a Camcorder, Who Knows?
 Chris Goggans (Erik Bloodaxe), Wierd Wireless Psycho Shit.. Stay Tuned..

 There should be a few round table discussions on Virus, Cellular, Unix and
 something else surrounding the industry.

 I'll name the rest of the the speakers as they confirm.  I'm still working 
 on a few (Two?) people and groups, so hopefully things will work out and I 
 can pass the good news on in the next announcement, or over our List Server.

 ============================================================================

 WHERE THIS THING IS:

 It's in Las Vegas, the town that never sleeps.  Really. There are no clocks
 anywhere in an attempt to lull you into believing the day never ends.  Talk
 about virtual reality, this place fits the bill with no clunky hardware.  If
 you have a buzz you may never know the difference.  It will be at the Sahara
 Hotel.  Intel is as follows:

         The Sahara Hotel: 1.800.634.6078 
         Room Rates: Single/Double $55, Tripple $65, Suite $120
                    (Usually $200) + 8% tax

         Transportation: Shuttles from the airport for cheap.

    NOTE:  Please make it clear you are registering for the DEF CON II
    convention to get the room rates.  Our convention space price is
    based on how many people register.  Register under a false name if
    it makes you feel better, 'cuz the more that register the better for
    my pocket book.  No one under 21 can rent a room by themselves, so
    get your buddy who is 21 to rent for you and crash out.  Try to contact
    people on the Interactive Mailing List (More on that below) and
    hook up with people.  Don't let the hotel people get their hands on
    your baggage, or there is a mandatory $3 group baggage fee.  Vegas
    has killer unions. 

 OTHER STUFF:

 I'll whip up a list of stuff that's cool to check out in town there so if 
 for some reason you leave the awesome conference you can take in some unreal
 sites in the city of true capitalism.  If anyone lives in Las Vegas, I
 would appreciate it if you could send a list of some cool places to check 
 out or where to go to see the best shows and I'll post it in the next
 announcement or in the program

 -o I am asking for people to submit to me any artwork, pictures, drawings,
    logos, etc. that they want me to try and include in this years program.
    I am tring to not violate any copywrite laws, but wat cool shit.  Send
    me your art or whatever and I'll try and use it in the program, giving 
    you credit for the work, of course.  Please send it in .TIF format if it 
    has more than eight bit color. The program will be eight bit black and 
    white.
 -o in case you want to make adjustments on your side.

 *** NEW MAILING LIST SERVER ***

 We've finally gotten Major Dommo List Serv software working (Kinda) and it
 is now ready for testing.  MTV spent alot of time hacking this thing to work
 with BSDi, and I would like to thank him.  The purpose of the list is to
 allow people interested in DEF CON II to chat with one another.  It would
 be very sueful for people over 21 who want to rent hotel space, but split
 costs with others.  Just mention you have room for 'x' number of people, and
 I'm sure you'll get a response from somone wanting to split costs.  Someone
 also suggested that people could organize a massive car caravan from 
 Southern Ca. to the Con.  My attitude is that the list is what you make of 
 it.  Here are the specifics:

 Umm.. I TAKE THAT BACK!!  The mailing list is _NOT_ ready yet.  Due to
 technical problems, etc.  I'll do another mass mailing to everyone letting
 them know that the list is up and how to access it.  Sorry for the delay! 

 MEDIA:

 Some of the places you can look for information from last year include: 

 New Media Magazine, September 1993
 InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely
 Gray Areas Magazine, Vol 2, #3 (Fall 1993)
 Unix World, ???,
 Phrack #44

 COST: 

 Cost is whatever you pay for a hotel room split however many ways, plus
 $15 if you preregister, or $30 at the door.  This gets you a nifty 24 bit
 color name tag (We're gonna make it niftier this year) and your foot in the
 door.  There are fast food places all over, and there is alcohol all over
 the place but the trick is to get it during a happy hour for maximum
 cheapness.

 ==========================================================================

 I wanted to thank whoever sent in the anonymous fax to Wired that
 was printed in issue 1.5  Cool deal!

 ===========================================================================

 FOR MORE INFORMATION:

 For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com
 in /pub/defcon.  There are digitized pictures, digitized speeches and text
 files with the latest up to date info available.

 For email users, you can email dtangent@defcon.org for more information. 

 For non-net people call:

 For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102,
                         Seattle, WA, 98112

 For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone.

 A DEF CON Mailing list is maintained, and the latest announcements are 
 mailed automatically to you.  If you wish to be added to the list just send 
 email to dtangent@defcon.org.  We also maintain a chat mailing list where 
 people can talk to one another and plan rides, talk, whatever.  If you 
 request to be on this list your email address will be shown to everyone, 
 just so you are aware.

 STUFF TO SPEND YOUR MONEY ON:

 o Tapes of last years speakers (four 90 minute tapes) are available for $20 

 o DEF CON I tee-shirts (white, large only) with large color logo on the
   front, and on the back the Fourth Amendment, past and present.  This is
   shirt v 1.1 with no type-o's.  These are $20, and sweatshirts are $25.

 o DEF CON II tee-shirts will be made in various colors this year, including
   a few long sleeve shirts.  Sizes will be in large only again, with a
   few white mediums made.  Shirts will be $15, Long Sleve $17, Sweat shirts
   will be $20.

 o We will have a few (ten maybe?) embroidered hats with this years logo.
   Not shure how much they will be.. like $10 maybe.

 o Full sized 4 color DEF CON II wall posters will be for sale for about $5.
 
 o Pre-Register for next year in advance for $15 and save half.

 o Make all checks/money orders/etc. out to DEF CON, and mail to the address
   above.  Way above.

 If you have any confidential info to send, use this PGP key to encrypt:

 -----BEGIN PGP PUBLIC KEY BLOCK-----
 Version: 2.3

 mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo
 dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf
 uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ
 hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50
 IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
 =ko7s
 -----END PGP PUBLIC KEY BLOCK-----

- The Dark Tangent

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 

 TO: EDITORS@FENNEC.COM
 Subject: OBITUARY - VAX 8600, aka Mimsy, dead at age 8
     
        An era of computing in the University of Maryland Computer Science
 Department came to an end Sunday, March 20th, when the Department's last 
 VAX, an 8600, peacefully died in its sleep. After a power-down, the VAX, 
 which had been off maintenance since July, 1993, was not able to boot as 
 a result of a disk/controller that finally went bad.

      The 8600 had arrived in 1986 as the Department's most powerful machine
 and had been named "Brillig"; in November 1990, when the Department's VAX 
 11/785 was retired, the 8600 assumed the name and duties of "Mimsy" and 
 had served in that capacity until its semi-retirement in July, 1994. At 
 that time, the 8600 was renamed "Imladris" and the "Mimsy" moniker was 
 bestowed upon a Sun SPARC 10/30.

      Along with being the last VAX, the 8600 was also the last UMD machine
 running the mutoid 4.3/4.3tahoe/4.3reno/Net-2 conglomeration (4.3BSD Torix, 
 as it was called here) that emerged over the span of a decade of working 
 with Unix. Although it is now gone, the hacks it helped inspire live on
 in locally-changed versions of the SunOS, Ultrix, OSF/1 and BSDI offerings 
 in hundreds of other systems here.

      It is somewhat ironic that the VAX ended the way it did. Its demise
 was originally scheduled for earlier that week, when the 8600, after a short 
 ceremony, was to have committed suicide. The machine would have, under its 
 own free will and volition, executed (through the "cron" facility) a shell 
 script prepared by Dr. Vax Kevorkian which would have issued an "rm -rf /" 
 command. Onlookers were to have watched the process until the machine seized 
 up, and would have then powered the machine down and gone to dinner.

      However, an earlier problem with the building Uninterruptible Power
 Supply (UPS) necessitated a load test for the 20th, and as a large consumer 
 of power, it was decided the 8600 would remain on for this one last task. As 
 a result of a short power-down during the UPS load test, the machine's 
 mighty heart (ummm, disk) gave out.
 
      Funeral arrangements are not yet complete, but tentative plans call
 for shipping the remains to Chris Torek's apartment in Berkeley, as a token 
 of the staff's appreciation. The staff has requested that all gifts of 
 condolence be made to the University of Maryland's Dinner-for-Wayword-
 Hackers Fund; checks may be made payable to Pete Cottrell.
      
        MIMSY IS DEAD! LONG LIVE MIMSY!
     
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     

     CALL FOR PAPERS: Neural Networks for Automatic Target Recognition 

 By Dept of Cognitive and Neural Systems (announce@retina.bu.edu)

 ATR is a many-faceted problem of tremendous importance in industrial and
 defense applications. Biological systems excel at these tasks, and neural
 networks may provide a robust, real-time, and compact means for achieving
 solutions to ATR problems. ATR systems utilize a host of sensing modalities
 (visible, multispectral, IR, SAR, and ISAR imagery; radar, sonar, and acoustic
 time series; and fusion of multiple sensing modalities) in order to detect 
 and track targets in clutter, and classify them. This Special Issue will 
 bring together a broad range of invited and contributed articles that 
 explore a variety of software and hardware modules and systems, and 
 biological inspirations, focused on solving ATR problems. We particularly 
 welcome articles involving applications to real data, though the journal 
 cannot publish classified material. It will be the responsibility of the 
 submitting authors to insure that all submissions are of an unclassified 
 nature.  

 Co-Editors:
 -----------
 Professor Stephen Grossberg, Boston University
 Dr. Harold Hawkins, Office of Naval Research 
 Dr. Allen Waxman, MIT Lincoln Laboratory 

 Submission:
 -----------
 Deadline for submission: October 31, 1994 
 Notification of acceptance: January 15, 1995 
 Format: as for normal papers in the journal (APA format) and no longer 
 than 10,000 words 

 Address for Papers:
 -------------------
 Professor Stephen Grossberg 
 Editor, Neural Networks 
 Boston University 
 Department of Cognitive and Neural Systems 
 111 Cummington Street 
 Room 244 
 Boston, MA 02215 USA 
       
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                  PRESS RELEASE: SPYGLASS/NCSA AGREEMENT
                  
 From: Eric W. Sink (eric@spyglass.com)

 The following press release announces our new relationship with NCSA
 and Mosaic.  I would like to prepend a clarification or two:
 Initially, Spyglass will sell Mosaic to volume users requiring a
 minimum of 5000 licenses per year.  It is our intention to let the
 needs of smaller volume customers, including end-users, be met thru
 other channels.

 Also, remember that NCSA Mosaic, for Windows, Mac, and UNIX will
 continue to be freely available from NCSA.  Development of the free
 versions will continue at NCSA, and Spyglass will be in collaboration
 with the NCSA development team.
 
 At Internet World Booth #609:
 For Immediate Release 

 Spyglass Signs Agreement with NCSA to Enhance and Broadly Relicense
 Mosaic Graphical Browser for the Internet
 (C)1994 Internet World
 Commercial Windows and Macintosh Versions Available in June; X Windows
 Version to Follow in July

 INTERNET WORLD, SAN JOSE, Calif., June 1 -- Spyglass, Inc. and the
 National Center for Supercomputing Applications (NCSA) at the
 University of Illinois/Urbana-Champaign have entered into an agreement
 that will get Mosaic, NCSA's graphical browser for the Internet, to
 the desktops of millions of people. The agreement gives Spyglass full
 rights to enhance, commercialize and broadly relicense
 Mosaic. Spyglass is making a multimillion-dollar commitment to NCSA
 and will focus initially on developing a commercially enhanced version
 of Mosaic that other companies will incorporate with their products
 for distribution to their customers. The announcement was made today
 in San Jose, on the opening day of exhibits at the Spring '94 Internet
 World conference.

 Developed by NCSA, Mosaic gives users point-and-click access to the
 World Wide Web (WWW), an information retrieval system on the Internet
 with more than 2,300 graphical, multimedia databases of "hyperlinked"
 documents. The Internet is a vast "supernetwork" of public and private
 networks connecting thousands of organizations and an estimated 20
 million individual users. New users are joining the Internet at the
 rate of 2 million each month, and hundreds of new WWW servers are
 coming online every month. Because of the reach of the Internet, it
 offers an attractive vehicle for electronic publishing and for
 conducting business globally.

 "Mosaic and World Wide Web are two key ingredients for successful
 electronic publishing and commerce on the Internet. But, to date,
 businesses have tapped only a fraction of the Internet's potential
 because these tools haven't been commercially available. Working with
 NCSA, we're going to change this," said Douglas Colbeth, president of
 Spyglass, which was formed in 1990 and has commercialized other NCSA
 technologies.

 "We're committed to evolving Mosaic so it becomes a robust, commercial
 tool with complete documentation, technical support and advanced
 features," explained Tim Krauskopf, co-founder of Spyglass and
 developer of NCSA Telnet. "We'll be collaborating with NCSA and other
 key partners to create new tools and establish standards that will
 help organizations build robust World Wide Web information servers
 quickly and inexpensively."

 "It has been thrilling to see the universal acceptance of NCSA Mosaic
 as an interactive window into cyberspace," said Larry Smarr, director
 of the NCSA. "I am very pleased to see Spyglass making such a
 financial commitment to the commercialization of Mosaic, which frees
 NCSA up to develop the next level of functionality for the public
 domain. Spyglass has been a terrific technology partner for us in the
 past and we look forward to an even closer working relationship in the
 future."

 "We welcome Spyglass as our partner in this effort because of the
 company's track record in commercializing other NCSA technologies and
 our rapidly developing close working relationship with the people at
 Spyglass," said Joseph Hardin, associate director of NCSA's software
 program. "Spyglass gives us the cross-platform development, global
 distribution and ongoing financial resources we need to take the
 Mosaic environment to the next level. With this commercialization
 arrangement with Spyglass in place, NCSA is freed to continue to
 develop core technologies for Mosaic as well as new technologies that
 leverage the Internet. We encourage companies to take advantage of
 this new relationship with Spyglass and contact them about volume
 licensing arrangements for Mosaic technology."

 Mosaic has been called the "killer application" for the Internet
 because it lets users navigate the Internet by browsing through a
 series of graphical, multimedia documents. The WWW was developed
 several years ago by CERN, a European consortium of scientists based
 in Switzerland, to keep track of researchers' information and to
 provide an easy method of sharing data. Subsequently, WWW has grown
 into one of the world's most open and widely used environments for
 information publishing, browsing and retrieval.

 WWW servers contain eye-catching documents with built-in links to
 other documents, allowing the user to move easily and naturally around
 the Internet. With Mosaic, users can browse through page after page of
 menus, hyperlinked to data dispersed all over the world, without
 having to know the location or network address of the information they
 are seeking.

 Spyglass has re-architected Mosaic so it will be a more robust and
 full-featured tool.  Enhancements available in Enhanced NCSA Mosaic
 from Spyglass include improved installation, better memory management,
 increased performance, new forms capabilities, online hypertext-based
 help, support for a proxy gateway and user interface improvements such
 as support for multiple windows. Future versions will include enhanced
 security and authentication, which will enable credit-card and other
 business transactions to take place on the Internet; filters that will
 enable documents from popular document readers to be read seamlessly
 by Mosaic; and integration with emerging editing and document
 management tools. A number of businesses are already using Mosaic and
 WWW to publish magazines, deliver goods and services, provide
 technical support to customers and conduct other forms of business
 electronically. For example, Mosaic and WWW are part of the recently
 announced $12 million CommerceNet project, a public- and
 private-sector-backed initiative exploring various ways to conduct
 commerce over the Internet and other data networks. NCSA will continue
 to maintain a public-with-copyright version of Mosaic, which Internet
 users can download for free from the Internet. NCSA, which began
 distributing Mosaic in the late fall, estimates that more than one
 million people use Mosaic and that more than 30,000 copies are being
 downloaded each month.

 Spyglass will be targeting the following types of customers as initial
 prospects for large-scale Mosaic client licensing agreements: computer
 systems and communications vendors, publishers and content providers,
 and online information service providers. For example, a publisher
 might want to include Mosaic with a subscription to an online magazine
 or a computer vendor might want to include Mosaic with each system
 sold. By building WWW servers themselves and distributing Mosaic
 clients to their customers, businesses can easily use this system for
 communicating with customers, providing technical support,
 distributing product and marketing information and other kinds of
 commerce.
  
 Enhanced NCSA Mosaic from Spyglass will be available for Microsoft
 Windows and Apple Macintosh desktop computers this month and for X
 Windows computers in July. To navigate the Internet, Mosaic users
 require a direct connection to the Internet or a PPP or SLIP
 connection. Enhanced NCSA Mosaic from Spyglass will be priced
 aggressively for high-volume distribution, enabling licensees to
 incorporate Mosaic into their products and services for a modest
 cost. For more information about Enhanced NCSA Mosaic from Spyglass,
 contact Spyglass directly at (217) 355-6000, mosaic@spyglass.com or
 http://www.spyglass.com/.

 The National Center for Supercomputing Applications, based at the
 University of Illinois at Urbana-Champaign, is supported by grants
 from the National Science Foundation, other federal agencies, the
 State of Illinois, the University of Illinois and corporate partners.

 Founded in 1990, Spyglass, Inc. is the leading developer of visual
 data analysis tools for the engineering and scientific marketplace,
 which support Windows, Macintosh and UNIX platforms. The company's
 venture-capital partners include Greylock Management of Boston,
 Mass. and Venrock Associates of New York City.

 Spyglass is a registered trademark of Spyglass, Inc. All other brands
 or products are trademarks or registered trademarks of their
 respective holders and should be treated as such.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                            THE REAL STORY

 By Carl Guderian (bjacques@cypher.com)

 The Real Story

 (The following report is a compilation of printed materials and transcripts 
 of personal interviews conducted by the author(s). In the course of this 
 exhaustive research we have come to feel that, given the controversial 
 nature of the subject matter, it is best that the authors as well as their 
 primary sources be kept confidential. Perhaps it is just as well, as the 
 events depicted in the report are years or decades in the past. Many of the 
 principals are retired or dead and, therefore, beyond any earthly reward or 
 revenge. The author(s) may be dead, too. In this line of journalism, that is 
 very likely.

 1994, Leopold & Loeb, Media Consultants)

 
 Employee Motivation Seminars

 Employee motivational seminars are a modern management tool, predicated on 
 the assumption that external motivation, whether carrot or stick or 
 combination thereof, is insufficient to move employees to give 110% to the 
 job; rather, internal motivation must be cultivated in the employees 
 somehow. Motivational seminars, usually conducted by outside consulting 
 firms, employ a variety of techniques, from survey questionnaires to group 
 exercises to meditation. These seminars have become enormously popular since 
 their introduction in the 1950s (mostly in sales-related fields then), as 
 they present a real advance over basic reward/punishment systems (-Theories 
 X and Y+) or even Frederick W. Taylor's scientific methods. More 
 importantly, they have actually worked. Workplace productivity has markedly 
 increased since the introduction of motivational seminars. 
 
 However, no innovation is universally welcomed. Recently, deeply religious 
 employees have begun to level serious accusations against motivational 
 seminars, declaring the programs promote a socialistic or New Age ethic. A 
 socialistic attitude, they argue, will lead otherwise sensible people to 
 embrace a world government under the Anti-Christ, as predicted in the Book 
 of Revelation in the Christian Bible (as interpreted by fundamentalist 
 Christians). A related and more serious charge is that the meditation 
 techniques (such as those used in the Krone program) open employees to 
 possession by demons. The latter charge is the focus of this report.
 
 The diabolical connection is real. Employee motivational seminars did indeed 
 spring from an arrangement between American industry and the Prince of 
 Darkness. Satan respects Americans like he respects no other people because 
 it was an American, Daniel Webster, who defeated him in court, using his 
 wits. Others have beaten the Devil, but only through invoking the powers of 
 Heaven, a tactic akin to bringing in grownups to restrain a schoolyard 
 bully. American corporate executives cut a deal with the Devil to deliver 
 the souls of underlings in exchange for the usual favors. Though the souls 
 of corporate employees are industrial grade, and therefore not worth as much 
 as the souls of the elite, an executive must deliver a number of them in 
 exchange for infernal favors. Paradoxically, the worth of elite American 
 souls has risen in direct proportion to the degradation in the worth of 
 those of followers. The perfect mechanism for delivering B-grade souls by 
 the bushel is, of course, an employee motivational seminar, in which large 
 numbers of workers are possessed at once (By the way, television evangelists 
 work the same way; their mass public healings are actually mass 
 possessions).
 
 This cozy arrangement between American leaders and Satan has served both 
 sides well. Demons consider possession of Americans to be a kind of working 
 vacation, a welcome relief from tormenting the damned souls toiling 
 eternally in the flaming dung-pits of Hell. Not that this isn't enjoyable 
 work, but even a demon likes a change of scenery. Satan and his lieutenants 
 can dole out plum earthside assignments for demonic devotion, thus 
 reinforcing the infernal hierarchy. American leaders, of course, get the 
 usual rewards of power, sexual potency (or firm breasts and derriere), and 
 that Christmas bonus for boosting corporate productivity while laying off 
 excess workers.

 Lately, however, the system's inherent problems have begun to manifest 
 themselves. As motivational seminars have gained in popularity, they have 
 increased the demand for demons. As the innovation has become more 
 widespread, it has ceased to be a competitive advantage. In Hell, too, the 
 system's success has presented similar problems, and Satan is now seems 
 ready to pull out of the deal.
 
 The shortage of demons is a Hellish fact. Present-day demons, of course, are 
 the same ones who participated in the original rebellion of Lucifer (now 
 Satan). All the angels were created at once, and no new ones have been made 
 since. The pool of demons, then, is a subset of that group. Occasionally a 
 truly wicked soul is promoted to demon status, but equally often a demon is 
 devoured by an angry superior (a la C. S. Lewis' The Screwtape Letters). On 
 the whole, the supply of demons should be considered to be fixed. 
 
 In the early years of the program, American executives were pleased to see 
 their employees possessed by only the most hard-working demons. Today, 
 however, all the good ones are taken. Latter-day possessions by demons of 
 procurement fraud, office-supply theft, and general loafing on the job have 
 taken their toll on the system. Worse, even the best and brightest demons 
 seem to have gone native or become Americanized, becoming easily distracted 
 by the attractions of our post-industrial society or falling dangerously 
 into sympathy with the modern worker.  One formerly trustworthy (!) demon 
 was even caught committing workplace sabotage in solidarity with his 
 co-workers!  An embarrassed Satan had to deal personally with the matter.  
 All in all, the phrase working like a demon has begun to lose its cachet.
 
 As more corporations jumped on the infernal bandwagon, they found that the 
 employees of their competitors were performing equally well (or recently, 
 equally poorly). Worse, as the quality of the everyday American soul has 
 declined, many hapless executives have found themselves caught short. In one 
 company, the worth of the workers' souls had fallen drastically between the 
 signing of the contract and the possession of the workers. The contracting 
 executive killed a fellow executive (who was his wife - also on the infernal 
 take) over the shrinking soul pie at their company in order to hold up his 
 end of the bargain, lest he be forced to hand over his own soul. It didn't 
 help. The wife caught up with him in Hell.
 
 Meanwhile, in Hell the situation has also deteriorated. Eventually all 
 demons have been recruited earthside, so the dream ticket has ceased to be a 
 credible reward for exemplary effort. Furthermore, production in the Satanic 
 Mills is down. Temporarily out of sight of their demon overseers, damned 
 souls have begun shirking on the eternal job.
 
 By piecing together accounts channeled through trance mediums (leaks are now 
 worse than ever!), the authors have been able to determine that Satan has 
 begun revoking all contracts dealing with motivational seminars, releasing 
 the possessed workers and taking back favors bestowed on contractees. This 
 may partly explain the recent decline of the old industrial corporations in 
 favor of information technology firms, in which traditional religious values 
 are relatively absent.
 
 Thus, the era of employee motivation seminars seems to be drawing to a 
 close. The heyday of private economic deals with the Devil seems to be over 
 as well. Overheard executive conversatons reveal that Satan is simply not 
 interested in any more such contracts. Though some may be tempted to see the 
 above episode as another case of the power elite enlisting the powers of 
 Hell to fuck over the little guy, they should look at the larger picture and 
 realize the system seems to have taken care of itself according to the laws 
 of the Free Market. The Invisible Hand really does seem to work. 


 Postscript

 It now appears that Satan plans to compete in the world labor market after 
 having seen the prevailing trend toward cheaper labor. He has an advantage 
 over the Chinese, who lead the market using convict/slave labor. Political 
 prisoners have to be fed bread and water and must be allowed 3 or 4 hours of 
 sleep a day. The damned souls of Hell, of course, eat nothing and work 
 tirelessly twenty-four hours a day, seven days a week. The Devil now knows 
 quite a bit about management theory (in relation to his demonic supervisors) 
 and wants to recall them to Hell to oversee the re-engineering of Hell's 
 production lines. Modern world leaders thinking to hold off this development 
 are doomed to failure. Hell has on its side such notables as Albert Speer, 
 Josef Stalin, Adolf Eichmann, and Roy Cohn (to handle the legal work) and 
 will soon have Henry Kissinger to handle international relations. Given a 
 team like that, it's only a matter of time.

 Post-postscript

 The original (now void) contracts are sought-after collectors items, not the 
 least for their blackmail value. Even when the signatories are beyond 
 blackmail, as in the case of the aforementioned executive and his wife, 
 their contracts are worth a lot simply as works of art. The Devil is a 
 traditionalist at heart, and insists that contracts be handwritten by demons 
 noted for their calligraphic skill and that the documents bear his seal and 
 those of major demons acting as witnesses. The early contracts (pre-1983) 
 are worth the most, as they are the most visually stunning and bear the 
 names of America's best and brightest of the time, as well as the seals of 
 Hell's best known demons and devils.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%


                 LEGION OF DOOM T-SHIRTS!! Get 'em

 By Chris Goggans <phrack@well.sf.ca.us>

After a complete sellout at HoHo Con 1993 in Austin, TX this past
December, the official Legion of Doom t-shirts are available
once again.  Join the net luminaries world-wide in owning one of
these amazing shirts.  Impress members of the opposite sex, increase
your IQ, annoy system administrators, get raided by the government and
lose your wardrobe!
 
Can a t-shirt really do all this?  Of course it can!
 
--------------------------------------------------------------------------
 
"THE HACKER WAR  --  LOD vs MOD"
 
This t-shirt chronicles the infamous "Hacker War" between rival
groups The Legion of Doom and  The Masters of Destruction.  The front
of the shirt displays a flight map of the various battle-sites
hit by MOD and tracked by LOD.  The back of the shirt
has a detailed timeline of the key dates in the conflict, and
a rather ironic quote from an MOD member.
 
(For a limited time, the original is back!)
 
"LEGION OF DOOM  --  INTERNET WORLD TOUR"
 
The front of this classic shirt displays "Legion of Doom Internet World
Tour" as well as a sword and telephone intersecting the planet
earth, skull-and-crossbones style.  The back displays the
words "Hacking for Jesus" as well as a substantial list of "tour-stops"
(internet sites) and a quote from Aleister Crowley.
 
--------------------------------------------------------------------------
 
All t-shirts are sized XL, and are 100% cotton.
 
Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for
postage.
 
Send checks or money orders.  Please, no credit cards, even if
it's really your card.
 
 
Name:       __________________________________________________
 
Address:    __________________________________________________
 
City, State, Zip:   __________________________________________
 
 
I want ____ "Hacker War" shirt(s)
 
I want ____ "Internet World Tour" shirt(s)
 
Enclosed is $______ for the total cost.
 
 
Mail to:   Chris Goggans
           603 W. 13th #1A-278
           Austin, TX 78701
 
 
These T-shirts are sold only as a novelty items, and are in no way
attempting to glorify computer crime.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     LIBERTARIAN PARTY ANNOUNCES OPPOSITION TO DIGITAL TELEPHONY ACT

 NEWS FROM THE LIBERTARIAN PARTY
 1528 Pennsylvania Avenue SE
 Washington DC 20003

 For additional information:
 Bill Winter, Director of Communications
        (202) 543-1988



        Calling it a "serious infringement of civil liberties and a
 gross violation of property rights," the Libertarian Party National
 Committee unanimously voted to oppose the Digital Telephony and
Communications Act of 1994. 

        At their quarterly meeting in Kansas City, Missouri, the
 governing body of America's third-largest political party charged that
 "the Digital Telephony Act would make furnishing the FBI with easy
 wiretapping capability the overriding priority for designers of
 telephone equipment and related software."

        "It is a lie to call this legislation a 'Privacy Improvement
 Act,'" said Bill Evers, the National Committee member from California
 who sponsored the resolution.

        The Digital Telephony Act, noted the resolution, "requires
 telephone, cable television, and computer network companies to ensure
 that the government can conduct surveillance while private communication 
 is going on. It requires the installation of surveillance-facilitating
 software in telephone switching equipment to expose personal information -- 
 such as telephone-calling patterns, credit card purchases, banking
 records, and medical records -- to the view of the government."

        "Such personal information should be the private property of
 either the company that assembles it or the individual to whom it
 pertains," said Evers.

        Libertarians also oppose the Digital Telephony Act because it
 "would require a fundamental re-engineering of the communications
 infrastructure at great expense to American taxpayers, and to the
 owners of private communications systems," said Evers.

        The Libertarian National Committee also unanimously voted to
 oppose the National Security Agency's Escrowed Encryption Standard -
 the so-called Clipper Chip system - or any "government policies
 promoting or requiring specific encryption methods for civilian use."
 The party also urged the "repeal of the U.S. ban on export abroad of
 Clipper-free encryption devices produced by American companies."

        "Government-mandated encryption standards will foster
 indiscriminate surveillance of private communications by the
 government," charged Evers. 

        The resolution said "the Clinton Administration plans to induce 
 American manufacturers to install government-readable encryption devices 
 in every telephone, fax machine, and computer modem made in the United 
 States."

        "The Clinton Administration is explicitly denying that the
 American people have the right to communicate in private," said Evers.
 By contrast, he said, "The Libertarian Party has long upheld the civil
 liberties of the American citizen."

        Approximately 120 Libertarians serve in elected and appointed
 office around the country, including four State Representatives in New
 Hampshire and two mayors in California. The Libertarian Party platform
 calls for vigorous defense of the Bill of Rights, free enterprise,
 civil liberties, free trade, and private charity.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                             UNABOM
                       $1,000,000 Reward
                 SERIES OF 14 UNSOLVED BOMBINGS


 William L. Tafoya, Ph.D. Special Agent, FBI
 UNABOM Task Force, San Francisco, CA (btafoya@orion.arc.nasa.gov)
 

   Beginning in May, 1978, a series of 14 bombing incidents have 
 occurred across the United States for which there is no apparent 
 explanation or motive.  No person or group has been identified as 
 the perpetrator(s) of these incidents.  The explosions have taken 
 place in seven states from Connecticut to California.  As a result 
 of these bombings, one person has been killed and 23 others 
 injured, some grievously.  There had been no incidents identified 
 with this series of bombings since 1987. However that changed in 
 late June, 1993, when a well known geneticist residing in Tiburon, 
 California, and a renown computer scientist from Yale University, 
 New Haven, Connecticut, opened packages which had been mailed to 
 them and both were severely injured when these packages exploded.  

   In the past, targets of the bomber have been associated with 
 the computer industry, the aircraft and airline industry and 
 universities.  Seven of these devices have been mailed to specific 
 individuals and the other seven have been placed in locations 
 which suggest there was no specific intended victim. All but two 
 of the explosive devices functioned as designed and exploded.  All 
 14 crimes, dubbed "UNABOM", have had common effects:  all have 
 caused terror, grief, and fear.  On September 11, 1985, Hugh 
 Scrutton, the owner of the Rentech Computer Company, in 
 Sacramento, California, was killed by one of these diabolic 
 devices.  The two most recent victims narrowly escaped death.  

   In response to the June, 1993, events, the Attorney General 
 directed that a task force of federal law enforcement agencies be 
 reestablished to urgently investigate and solve these crimes. The 
 UNABOM Task Force, consisting of investigators from the FBI, ATF, 
 and the U.S. Postal Inspection Service, has been operational in 
 San Francisco and Sacramento, California, since July 12, 1993, and 
 is dedicated exclusively to the investigation of these crimes.  

   Among the clues in the case are the following words in what 
 appears to be a note possibly written by the bomber as a reminder 
 to make a telephone call:  "call Nathan R--Wed 7PM."  The UNABOM 
 Task Force believes that "Nathan R" may be associated, perhaps 
 innocently, with the bomber and that "Nathan R" may have received 
 a telephone call from the bomber on a Wednesday prior to the June, 
 1993 bombings.

   The two most recent tragic bombings illustrate the senseless 
 and tragic consequences of these crimes and demonstrate the urgent 
 necessity of solving this case.  This serial bomber will strike 
 again.  We do not know who the next victim will be.  We do believe 
 that there is someone out there who can provide the identity of 
 the person or persons responsible for these crimes. This person 
 may be a friend, a neighbor, or even a relative of the bomber(s).

	UNABOM's chronology is as follows:

 1)  Northwestern University
     Evanston, Illinois
     May 25, 1978           

   A package was found in the Engineering Department parking lot 
 at the Chicago Circle Campus of the University of Illinois. The 
 package was addressed to an Engineering Professor at Rensselaer 
 Polytechnic Institute in Troy, New York.  The package had a return 
 address of a Professor at Northwestern's Technological Institute.  
 The package was returned to the addressor who turned it over to 
 the Northwestern University Police Department because he had not 
 sent the package.  On May 26, 1978 the parcel was opened by a 
 police officer who suffered minor injuries when the bomb 
 detonated.

 2)  Northwestern University
     Evanston, Illinois
     May 9, 1979            

   A disguised explosive device which had been left in a common 
 area in the University's Technological Institute, slightly injured 
 a graduate student on May 9, 1979, when he attempted to open the 
 box and it exploded. 

 3)  Chicago, Illinois
     November 15, 1979

   An explosive device disguised as a parcel was mailed from 
 Chicago for delivery to an unknown location.  The bomb detonated 
 in the cargo compartment of an airplane, forcing it to make an 
 emergency landing at Dulles Airport.  Twelve individuals were 
 treated for smoke inhalation.  The explosion destroyed the 
 wrapping to such an extent that the addressee could not be 
 determined.

 4)  Chicago, Illinois
     June 10, 1980    

   A bomb disguised as a parcel postmarked June 8, 1980 was 
 mailed to an airline executive at his home in Lake Forest, 
 Illinois.  The airline executive was injured in the explosion.

 5)  University of Utah
     Salt Lake City, Utah
     October 8, 1981     

   An explosive device was found in the hall of a classroom 
 building and rendered safe by bomb squad personnel.  

 6)  Vanderbilt University
     Nashville, Tennessee
     May 5, 1982          

   A wooden box containing a pipe bomb detonated on May 5, 1982, 
 when opened by a secretary in the Computer Science Department.  
 The secretary suffered minor injuries.  The package was initially 
 mailed from Provo, Utah on April 23, 1982, to Pennsylvania State 
 University and then forwarded to Vanderbilt.  

 7)  University of California
     Berkeley, California
     July 2, 1982            

   A small metal pipe bomb was placed in a coffee break room of 
 Cory Hall at the University's Berkeley Campus.  A Professor of 
 Electrical Engineering and Computer Science was injured when he 
 picked up the device.  

 8)  Auburn, Washington
     May 8, 1985       

   A parcel bomb was mailed on May 8, 1985, to the Boeing 
 Company, Fabrication Division.  On June 13, 1985, the explosive 
 device was discovered when employees opened it.  The device was 
 rendered safe by bomb squad personnel without injury.

 9)  University of California
     Berkeley, California
     May 15, 1985            

   A bomb detonated in a computer room at Cory Hall on the 
 Berkeley Campus.  A graduate student in Electrical Engineering 
 lost partial vision in his left eye and four fingers from his 
 right hand.  The device was believed to have been placed in the 
 room several days prior to detonation.

 10)  Ann Arbor, Michigan
      November 15, 1985  

   A textbook size package was mailed to the home of a 
 University of Michigan Professor in Ann Arbor, Michigan from Salt 
 Lake City.  On November 15, 1985, a Research Assistant suffered 
 injuries when he opened the package.  The Professor was a few feet 
 away but was not injured.


 11)  Sacramento, California
      December 11, 1985     

   Mr. Hugh Scrutton was killed outside his computer rental 
 store when he picked up a device disguised as a road hazard left 
 near the rear entrance to the building.  Metal shrapnel from the 
 blast ripped through Scrutton's chest and penetrated his heart.

 12)  Salt Lake City, Utah
      February 20, 1987   

   On February 20, 1987, an explosive device disguised as a road 
 hazard was left at the rear entrance to CAAMs, Inc. (computer 
 store).  The bomb exploded and injured the owner when he attempted 
 to pick up the device.

 13)  Tiburon, California
      June 22, 1993      

   On June 22, 1993, a well known geneticist received a parcel 
 postmarked June 18, 1993, at his residence.  The doctor attempted 
 to open the package at which time it exploded severely injuring 
 him.  It has been determined that this parcel was mailed from 
 Sacramento, California. 

 14)  Yale University
      New Haven, Connecticut
      June 24, 1993         
  
   On June 24, 1993, a Professor/Computer Scientist at Yale 
 University attempted to open a parcel which he had received at his 
 office.  This parcel exploded severely injuring him.  It has been 
 determined that this parcel was mailed from Sacramento, California 
 on June 18, 1993.

   At this time, the UNABOM Task Force would appeal to the 
 public for assistance.  For this purpose, a one million dollar 
 reward is being offered for information which results in the 
 identification, arrest and conviction of the person(s) 
 responsible.  Contact the UNABOM Task Force at 1-(800) 701-
 2662.



 William L. Tafoya, Ph.D.
 Special Agent, FBI
 UNABOM Task Force
 San Francisco, CA
 btafoya@orion.arc.nasa.gov
 

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 


                   MASSACHUSETTS ENCRYPTION BILL


                    THE STATE OF MASSACHUSETTS
  
       MASSACHUSETTS 179TH GENERAL COURT -- 1994 REGULAR SESSION

 HOUSE NO.  4491
 BY MR. COHEN OF NEWTON, PETITION OF DAVID B.  COHEN AND ANOTHER RELATIVE
 TO ESTABLISHMENT OF THE PRIVACY OF PERSONAL RECORDS LAW AND REGULATING THE
 TECHNOLOGY OF DATA  ENCRYPTION.  THE JUDICIARY.
                       

                                                  February 25, 1994

 AN ACT RELATIVE TO THE TECHNOLOGY OF DATA  ENCRYPTION. 
 Be it enacted by the Senate and House of Representatives in General
 Court assembled, and by the authority of the same, as follows:

 SECTION 1.  The General Laws are hereby amended by inserting after
 chapter sixty-six A the following chapter:

 CHAPTER 66B. MASSACHUSETTS PRIVACY OF PERSONAL RECORDS ACT.

 Section 1. For the purposes of this chapter the following terms shall
 have the following meanings:

 "Personal data files", any machine readable information or information
 in a state of electronic, optic, or other computer based transmission
 which is capable of being read, stored, copied, transmitted, changed,
 or deleted by or through computer or telecommunications devices and
 which relates to or describes any person, including a corporation,
 partnership or sole proprietorship, or such person's real or personal
 property. It shall include, but not be limited to, magnetic tapes,
 disks, cartridges, floppy disks, CD-ROM's, optical cubes or other
 optical storage devices, documents printed in magnetic ink or OCR
 symbol sets, and any other medium capable of being read or stored at
 high speed, in large volume, or without substantial human
 intervention.  The term denotes the substance of the information as
 distinguished from the incidental medium of its storage or
 transmission.

 " Encrypted" , changed in form by programmed routines or algorithms so
 as to be unintelligible to any person without employing a suitable
 decryption routine or algorithm. 

 "Decryption", the reverse process of  encryption,  so as to restore any
 data so  encrypted  to its original, human readable form. 

 "Routine or algorithm", any series of discrete steps in a computer,
 microprocessor, or calculator native machine language which is
 performed as a unit to  encrypt  or decrypt data, or to present such
 decrypted data on an end user display medium; provided, however, that
 it shall not include source code written in any human readable
 language.

 "End user display medium", a video display terminal or paper.

 "Source code", any programming language used to produce the native
 machine language described in the definition of "routine or
 algorithm". 

 "Authorized end user", any person, including a corporation,
 partnership, sole proprietorship, or governmental body for whose
 specific use the data in question is produced. If shall specifically
 exclude any person, including a corporation, partnership, sole
 proprietorship, or governmental body into or through whose possession
 said data may pass before reaching said authorized end user. 

 "Numeric data", symbols representing exclusively quantities.  It shall
 specifically exclude expressions containing number which represent
 nonnumeric entities including, but not limited to, social security
 numbers, license numbers, bank account numbers, street addresses, and
 the like.

 "Custodian", a person, including a corporation, partnership, sole
 proprietorship, or governmental body, that has access of any kind
 whatsoever to personal data files. 

 "Live data", any personal data which currently represents or at any
 time in the past had represented any actual person, including a
 corporation, partnership, or sole proprietorship or such person's
 property.

 SECTION 2.  Personal data files within the commonwealth shall be
 encrypted.

 SECTION 3.  Decryption of  encrypted  data may be accomplished only by,
 for, or on behalf of the authorized end user of such data, and only to
 render such data into human readable form for the use of such
 authorized end user or an end user display medium.  Any intermediate
 storage or transmission of decrypted data in machine readable form
 shall be a violation of this chapter.

 SECTION 4.  Machine executable routines or algorithms used to decrypt
 encrypted  data shall reside only in those routines or algorithms which
 present the data to authorized end users upon end user media. Source
 code for such routines or algorithms shall reside only at the situs of
 the authorized end user or at the situs of a party engaged in the
 development or maintenance of said source code.  No party so engaged
 may use live data for any purpose whatsoever except as provided in this
 chapter.

 SECTION 5.  Any copy, excerpt, summary, extension, transmission, or
 other transfer of any personal data, whether or not originally
 encrypted,  shall be encrypted  during such transfer until it reaches
 the authorized end user.

 SECTION 6.  Notwithstanding any other provision of this chapter,
 numeric data may be stored in decrypted form during testing of summary
 or other numeric routines or algorithms in connection with development
 or maintenance of software whose purpose is the processing or display
 of such data for the use of the authorized end user, where such testing
 would be rendered impossible or unreasonably burdensome using
 encrypted  data.  For the purposes of this section, amounts used to
 calculate simple algebraic sums shall not qualify for decrypted storage
 under this section.

 SECTION 7.  Notwithstanding any other provision of this chapter, any
 personal data which is stored and maintained exclusively or generally
 for the purpose of providing access to such data by the public shall be
 exempted for the encryption  requirements this chapter.  The exemption
 provided hereby shall extend to excerpts, and compilations of such
 data, however and by whomever used.  Any and all other data from other
 sources which are not specifically exempted under this section or under
 sections nine or ten shall be  encrypted, whether or not merged,
 appended, inserted, or otherwise attached to exempted data, and are
 subject to all of the provisions of this chapter in the same manner as
 if such exempted data did not exist.

 SECTION 8.  Notwithstanding any other provision of this chapter, any
 routines or algorithms used for the decryption of  encrypted  data may
 be provided to the appropriate law enforcement agencies for the purpose
 of assuring compliance with various national, state, and local laws.
 For the purposes of this section, such law enforcement agencies shall
 be considered authorized end users.

 SECTION 9.  Notwithstanding any other provision of this chapter, any
 person may waive the protections afforded by this chapter. Evidence of
 such waiver must be given in writing by such person to each custodian
 of data pertaining to said person.  When more than one person is
 entitled to protection under this chapter, by virtue of joint ownership
 or other such relationship, no waiver shall be effective unless signed
 by all parties so involved.  Such waiver shall be construed to waive
 protection only with respect to the specific kinds or elements of
 information enumerated on its face, and shall operate to exclude only
 encryption  of said data by the particular custodian of such data as is
 named in said waiver and in whose possession to waiver is kept. The
 waiver may operate in perpetuity or be limited to a particular time.
 Any ambiguities in any waiver given under this section shall be
 resolved in favor of encryption of the most data colorable under its
 terms.

 SECTION 10.  Notwithstanding any other provision of this chapter,
 decrypted data may be stored in a secure location apart from the situs
 of any user of such data, provided that the sole purpose to which such
 data shall be put shall be to restore data which has been lost or
 corrupted. Any routines or algorithms used to restore used files using
 said decrypted data shall employ  encryption rountines or algorithms as
 required by this chapter.  For the purposes of this section, decryption
 routines or algorithms may be considered lost or corrupted if a
 reasonable belief exists that security employed in the custody of such
 routines or algorithms has been breached.

 SECTION 11.  Reasonable security shall be employed by persons in the
 management of the routines and algorithms used for the  encryption  and
 decryption of data, as required by this chapter. Such secuirty shall
 consist as a minimum in the storage of such routines and algorithms at
 one situs and the nature and location of its associated data at
 another.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                    BOOK REVIEW:  INFORMATION WARFARE
                   CHAOS ON THE ELECTRONIC SUPERHIGHWAY
                            By Winn Schwartau

 INFORMATION WARFARE - CHAOS ON THE ELECTRONIC SUPERHIGHWAY
 By Winn Schwartau.  (C)opyright 1994 by the author
 Thundermouth Press, 632 Broadway / 7th floor / New York, NY 10012
 ISBN 1-56025-080-1 - Price $22.95
 Distributed by Publishers Group West, 4065 Hollis St. / Emeryville, CA 94608
 (800) 788-3123

 Review by Scott Davis (dfox@fennec.com)

 If you only buy one book this year, make sure it is INFORMATION WARFARE!
 In my 10+ years of existing in cyberspace and seeing people and organizatons
 debate, argue and contemplate security issues, laws, personal privacy,
 and solutions to all of these issues...and more, never have I seen a more
 definitive publication. In INFORMATION WARFARE,  Winn Schwartau simply
 draws the line on the debating. The information in this book is hard-core,
 factual documentation that leaves no doubt in this reader's mind that
 the world is in for a long, hard ride in regards to computer security.
 The United States is open to the world's electronic terrorists.
 When you finish reading this book, you will find out just how open we are.
 
 Mr. Schwartau talks about industrial espionage, hacking, viruses, 
 eavesdropping, code-breaking, personal privacy, HERF guns, EMP/T bombs,
 magnetic weaponry, and the newest phrase of our generation...
 "Binary Schizophrenia". He exposes these topics from all angles. If you
 spend any amount of time in Cyberspace, this book is for you.

 How much do you depend on technology? 

 ATM machines, credit cards, toasters, VCR's, televisions, computers,
 telephones, modems...the list goes on. You use technology and computers
 and don't even know it! But the point is...just how safe are you from
 invasion? How safe is our country's secrets? The fact is - they are NOT
 SAFE! How easy is it for someone you don't know to track your every move
 on a daily basis? VERY EASY! Are you a potential victim to fraud,
 breech of privacy, or general infractions against the way you carry
 on your daily activities? YES! ...and you'd never guess how vulnerable
 we all are!

 This book will take you deep into places the government refuses to 
 acknowledge. You should know about INFORMATION WARFARE. Order your
 copy today, or pick it up at your favorite book store. You will not
 regret it.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        WHISPER WHO: A Unix tool

 Here is a handy little tool for you to use on your Unix machine. Follow the
 instructions provided!

 -------cut here-------------------cut here---------------cut here------------

/*****************************************************************************
 *  This program can be changed without too much trouble to a program        *
 *  that logs everybody in and out of a system.  Need to add                 *
 *  signal(SIGHUP,SIG_IGN) to it though, so it continues after you are gone. *
 *  This program whispers to you when somebody logs on or off, and is pretty *
 *  hard to kill. ( you have to send SIGKILL to kill this one.)              *
 *  As is right now, it will not stay active after you logoff. To prevent    *
 *  annoying anyone, just put it in your .profile.                           *
 *                                                                           *
 *  CUT THIS PART OUT OF THIS FILE AND NAME THE TEXT: wwho_1.c               *
 *                                                                           *
 *  To compile:   cc -o wwho wwho_1.c                                        *
 *            or  gcc -o wwho wwho_1.c                                       *
 *****************************************************************************/

#include <signal.h>
#include <stdio.h>
#include <sys/types.h>
#include <utmp.h>
#include <sys/stat.h>
#include <fcntl.h>

#define MAXPROCESSES 40

struct utmp who[MAXPROCESSES];   /* list of all rembered users on-line */
struct utmp u[MAXPROCESSES];     /* list of all users in the utmp file */
int counter = 0;                 /* number of users in memory */

void sig_hand(int sig) {
  register int x;
  x=0;
  switch(sig) {
    case 15: signal(SIGTERM,sig_hand);
    case 3: signal(SIGINT,sig_hand);
    for(x=0; x<counter; x++)
    printf(": Name: %s, Device: %s.\n",who[x].ut_name,who[x].ut_line);
    break;
    }
}

void main(int argc,char *argv) {
    int prio,      /* process id of 'child' process */
    u_handle, /* handle for the /etc/utmp file */
    z;        /* loop control varriable*/
    int pid;     /* process id of 'forked' process */

    if(argc>=2) prio = atoi(argv[1]);  /* if arg, then new prio = arg */
    if(argc < 2) prio = 20;   /* if no arg, then prio = 20 */
    pid = fork();            /* create new process */
    if(pid==-1) {            /* Cannot create new process error */
    printf(": cannot create process\n");
    exit(-1);
	}

    if(pid > 0 ) {   /* if initial program then print intro and exit */

    printf(": Wisper Who is now in effect.\n");
    printf(": Created process id %i\n",pid);
    exit(0);   /* exit copy of program that YOU ran */
	}
    nice(prio);  /* make low priority, be nice */
    signal(SIGQUIT,SIG_IGN); /* Ignore QUIT signal */
    signal(SIGINT,sig_hand);  /* ignore INTERRUPT signal */
    signal(SIGTERM,sig_hand);  /* Ignore TERMINATE signal */

    while(1) {     /* Main part of program.  Never ends */
		int x;
		register int y;

if((u_handle = open("/etc/utmp",O_RDONLY))==-1) { /* open utmp for reading */
printf(": Cannot Open /etc/utmp\n"); /* error in opening */
exit(0);
  }


   x = 0;   /* reset thr number of utmp entries to 0 */

   while(read(u_handle,&u[x],sizeof(u[x])) != 0) {  /* Read utmp file
                                                     * until EOF */
if(u[x].ut_type == USER_PROCESS) {  /* if not an user, then read next entry */
z = new_user(x);                /* check to see if new */
if(z==1) warn_em(x,0,0); /* if new, then warn */
    }
    x++;
 if(x>=MAXPROCESSES) {  /* TOO many process logged in. */
 printf(": Error -- More process are running than there are spaces\n");
 printf(": Error -- allocated for.\n");
 printf(": Error -- change 'MAXPROCESSES xx' to 'MAXPROCESSES %i'.\n",x+10);
 exit(-1);     /* Quit */
 }
 }

  close(u_handle);    /* close utmp */

 for(z=0; z<counter; z++) {         /* compare list to see if anybody */
     int c;                         /* logged out */

      c = 0;                        /* varriable that holds a 1 if *
                                     * still here, else a zero */

      for(y=0; y<x; y++) {          /* Loop to compare utmp file to *
                                     * remembered users */
      if(u[y].ut_type==USER_PROCESS) {  /* if process is a user...*/
      if(strcmp(who[z].ut_name,u[y].ut_name)==0) { /* compare */
      c=1;                            /* if same, break */
      break;
            }
            }
            }
      if(c!=1) warn_em(z,1,z);   /* if gone, warn */

            }
      sleep(10);
            }
}

/* new_user -- function that returns either a 1 or a 0 depending on
               whether that user is in the who list
            -- Pass it the entry number of the user in the utmp file */

int new_user(int y) {
    register int x;

    for(x=0; x<counter; x++) {     /* check to see if just logged in */
        if(strcmp(u[y].ut_name,who[x].ut_name)==0) return(0);
	}
    who[counter] = u[y];
    counter++;
	return(1);
}

/* warn_em  returns a 1 always.  Prints Messages to your device telling you
            whether somebosy logged in or out.
            All Normal Output, besides errors and intro */

int warn_em(int x,int code,int n_who) {
    char buff[9];
    buff[8]=0;
    if(code==0) {
    strncpy(buff,u[x].ut_name,8);
    printf(": %s has just logged in on device /dev/%s.\n",buff,u[x].ut_line);
    } else {
        strncpy(buff,who[x].ut_name,8);
        printf(": %s has just logged off.\n",buff);
        pack_who(n_who); /* make who list smaller */
	}
    return(1);              /* return OK */
}

/* pack_who  -- Packs the list of users on-line, and deletes the one that
                logged out.
             -- Pass it the number that the user was in the on-line list */

int pack_who(int dead) {    /* pack the who list of users on-line */
    register int z;         /* loop control */

  for(z=dead; z<counter-1; z++) {   /* loop to delete use that logged out */
  who[z] = who[z+1];
	}
    counter--;             /* decrement counter */
    return(1);             /* return OK */
}

 --------cut here-------------cut here---------------cut here---------------

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                              HACKER BARBIE

TO: Editors@fennec.com
Subject: 'Hacker' Barbie...

 (LA, California) Mattel announces their new line of Barbie products, the 
 "Hacker Barbie." These new dolls will be released next month. The aim of 
 these dolls is to revert the stereotype that women are numerophobic, 
 computer-illiterate, and academically challenged.
     
 This new line of Barbie dolls comes equipped with Barbie's very own 
 xterminal and UNIX documentation as well as ORA's "In a Nutshell" series. 
 The Barbie is robed in a dirty button-up shirt and a pair of worn-out jeans 
 with Casio all-purpose watches and thick glasses that can set ants on fire. 
 Pocket protectors and HP calculators optional.  The new Barbie has the 
 incredible ability to stare at the screen without blinking her eyes and to 
 go without eating or drinking for 12 hours straight. Her vocabulary mainly 
 consists of technical terms such as "IP address," "TCP/IP," "kernel," 
 "NP-complete," and "Alpha AXP's."
     
 "We are very excited about this product," said John Olson, Marketting 
 Executive, "and we hope that the Hacker Barbie will offset the damage 
 incurred by the mathophobic Barbie." A year ago, Mattel released Barbie 
 dolls that say, "Math is hard," with condescending companions Ken. The 
 Hacker Barbie's Ken is an incompetent consultant who frequently asks Barbie 
 for help.
     
 The leading feminists are equally excited about this new line of Barbie 
 dolls. Naomi Wuuf says, "I believe that these new dolls will finally 
 terminate the notion that women are inherently inferior when it comes to 
 mathematics and the sciences. However, I feel that Ken's hierarchical 
 superiority would simply reinforce the patriarchy and oppress the masses." 
 Mattel made no comment.
     
 Parents, however, are worried that they would become technologically behind 
 by comparison to the children when the Hacker Barbie comes out. "My daughter 
 Jenny plays with the prototype Hacker Barbie over yonder for two days," says 
 Mrs. Mary Carlson of Oxford, Mississippi, "and as y'all know, she now pays 
 my credit card bill. Ain't got no idea how she duz it, but she surely duz 
 it. I jus don't wanna be looked upon as a dumb mama." Mattel will be 
 offering free training courses for those who purchase the Hacker Barbie.
     
 The future Hacker Barbie will include several variations to deal with the 
 complex aspects of Barbie. "Hacker Barbie Goes to Jail" will teach computer 
 ethics to youngsters, while "BARB1E R1TES L1KE BIFF!!!" will serve as an 
 introduction to expository writing.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                              The WELL: 
             Small Town on the Internet Highway System
   
 by Cliff Figallo (fig@well.sf.ca.us)

 [This document was adapted from a paper presented to the "Public 
 Access to the Internet" meeting sponsored by the John F. Kennedy 
 School of Government at Harvard University in May, 1993.
 You may distribute and quote from this piece as you wish, but
 please include the request that my name and contact information be 
 included with any quotations or distribution.
 Thank you. -- C.F.]

 Introduction

   The Internet serves as a routing matrix for electronic mail 
 messages, file transfers and information searches.  Internet 
 sites, those machines and sub-networks that are "internetworked", 
 have thus far served mostly as file archives, email 
 addresses and administrative caretakers for their locally 
 serviced users.  Historically, these sites have been universities, 
 corporations or military and government installations.  With 
 the popularization and commercialization of the Internet, new 
 models of Internet sites are connecting to the web of high 
 speed data lines.  

   One unique Internet site, accessible by anyone with an Internet 
 account, is The Whole Earth Lectronic Link (hereafter referred to 
 by its popular name, The WELL).  In the future, the Internet will 
 certainly feature many small, homegrown, regional commercial 
 systems like The WELL.  Such systems will pay for their own 
 operations and for their Internet connections through user fees, 
 handling all of the billing and administrative tasks relating to their 
 users, developing their own local community standards of behavior 
 and interaction.  Their users will often leave the "home" system, 
 going out through Internet gateways to other regional systems or 
 searching for information in the myriad databases of the Net.  Internet 
 voyagers will drop in to visit the unique communities they find 
 outside their home systems, sampling the local cultural flavors and 
 meeting and conversing with the individuals who inhabit those 
 systems.  

   The main attractions of these local Internet "towns" will prove to be 
 their characteristic online conversations and social conventions and
 their focus on specialized fields of knowledge or problem solving.  
 The WELL is a seminal example of what these small pioneering 
 towns on the Internet highway system will be like.

   The WELL is a computer-mediated public conferencing and 
 email system linked to the Internet through BARRNet, the 
 regional Internet vendor.  The WELL's  headquarters are 
 located in Sausalito, California.  It is co-owned by Point 
 Foundation (producers of Whole Earth Review and the Whole 
 Earth Catalogs) and Rosewood Stone, a financial investment 
 company owned the founder and ex-owner of Rockport Shoes.

   The WELL was, from its founding in 1985 until January of 
 1992, accessible to its users only via direct or packet switched 
 dialup.  It had carried stored-and-forwarded USENET news 
 groups since soon after startup.  These files were imported via 
 regular phone links with Internet-connected sites.  Among its 
 users were some small minority of students, academics and 
 technical professionals with Internet accounts on other 
 systems.  The feasibility of the WELL connecting to the Internet 
 increased steadily through the 1980s until financial, technical 
 and political conditions allowed it to happen.  It is significant, 
 though, that the character of the WELL developed under 
 conditions of relative network isolation.  Indeed, part of the 
 justification given by BARRNet, the regional Internet service 
 provider, for allowing a commercial system like the WELL to 
 connect through their facilities was the unique character of the 
 WELL as an established system with thriving and interesting 
 discussion, and its perceived value as a an information-
 generating resource for the Net.  The WELL would, they 
 figured, make an interesting and potentially rewarding 
 stopover on any user's Internet Tour.

   The WELL is often associated with the term "online 
 community".  The idea that community can develop through 
 online interaction is not unique to the WELL.  But the WELL, 
 because of its organizational and technical history, has survived  
 primarily through the online personal interaction of its 
 subscribers and staff rather than through successful business 
 strategy developed by its owners and managers.  The 
 discussion and dialog contained and archived on the WELL are 
 its primary products.  The WELL "sells its users to each other" 
 and it considers its users to be both its consumers and its 
 primary producers.  Databases of imported information and 
 libraries full of downloadable software are scarcely present.  
 Third-party services such as stock-trading news, wire services, 
 airline reservation access and software vendor support have 
 never been offered to any significant extent.

   The WELL today counts around 7,000 paying subscribers.  It 
 has a growing staff of over 12 and a gross annual income 
 approaching $2 million.  It is a small but healthy business and 
 has historically spent very little on advertising and promotion.  
 It gets far more than its share of free publicity and notoriety 
 through the Press coverage as compared to much larger 
 commercial systems.  This is so in spite of what most people 
 would consider a "user-hostile" interface and relatively high 
 pricing.

   The WELL had a rather unique upbringing.  I will describe its 
 early growth and the foundations of its character in the rest of 
 this paper.  I do this from the point of view of having been the 
 person in charge for six years, though I took great pains to de-
 emphasize the "in charge" part whenever possible.  I tried to 
 focus more on maintenance and the distribution of responsibility 
 through the user community rather than on control.   Though my 
 record for making the WELL a technical showpiece is not 
 without blemish, my main emphasis was in preserving 
 and supporting the exercise of freedom and creativity by the 
 WELL's users through providing an open forum for their interaction.

   It is my assertion that the actual exercise of free speech and 
 assembly in online interaction is among the most significant 
 and important uses of electronic networking; and that the value 
 of this practice to the nation and to the world may prove 
 critical at this stage in human history.  I regard the WELL as a 
 sample of the kind of small, diverse, grassroots service 
 provider that can and should exist in profusion, mutually accessible 
 through the open channels on the Internet.  

   The possibility that the future "Internet" (or whatever replaces 
 it) may be dominated by monolithic corporate-controlled 
 electronic consumer shopping malls and amusement parks is 
 antithetical to the existence and activity of free individuals in 
 the electronic communications world, each one able to interact 
 freely with other individuals and groups there.

A Very Brief Biography of the WELL

   Founded in 1985 by Stewart Brand and Larry Brilliant as a 
 partnership of Point and NETI , the WELL came online in 
 February of 1985 and began taking paying customers April 1, 
 1985.  It's initial staff of one full-time and one part-time 
 employee grew to 12 paid employees and well over one 
 hundred online volunteers by 1992.   As of this date, The WELL 
 runs on a Sequent multi- processor mini-computer located in a 
 cramped room in a small office building next to the houseboat 
 docks in Sausalito, California.  The WELL has full Internet 
 connectivity which is currently offered for the use of its 
 subscribers at no surcharge.  Most users call in to the WELL 
 over regular phone lines and modems., and most long distance 
 customers reach the WELL using an X.25 commercial packet 
 network for an additional $4.00 per hour.  An increasing 
 number of users are logging in to the WELL via the Internet, 
 many using Internet accounts on commercial gatewayed 
 systems rather than the packet switching nets.

   The WELL's notable achievements are many, not the least of 
 which is that it has survived for eight years while so many 
 other startup systems, though much better-funded, have failed.  
 The Electronic Frontier Foundation was born largely out of the 
 free speech ferment that exists on the WELL and out of 
 discussions and debate that go on there concerning the unique 
 legal and regulatory paradoxes that confront users, managers 
 and owners of systems in this new communications medium.  
 These discussions also attract a population of journalists who 
 find cutting edge ideas and concepts arising constantly in the 
 WELL's forums.  Many other formal and informal organizations 
 and collaborations that are effecting the world today call the 
 WELL home.  

The WELL Story -- a Less Brief Biography

 Birth
 
   The WELL was the conceptual and partnered creation of Larry 
 Brilliant and Stewart Brand.  They agreed to have their 
 respective organizations cooperate in establishing and 
 operating a computer conferencing network that could serve as 
 a prototype for many regional (as opposed to national) 
 commercial systems.   "Let a thousand CompuServe's bloom," is 
 how Brilliant put it.

   Initial funding came from Brilliant's company, Networking 
 Technologies International (NETI) in the form of a leased VAX 
 11/750 computer and hard disks, UNIX system software, a 
 "conferencing" program called Picospan, and a loan of $90,000.  
 Point Foundation, the non-profit parent corporation of Whole 
 Earth Review,  contributed the name recognition of "Whole 
 Earth", the personal attraction of having Stewart Brand to 
 converse with online and the modest but important 
 promotional value of constant mention in the small circulation 
 but influential "Whole Earth Review" magazine.

   Business goals for The WELL were, from its inception, 
 purposefully flexible.  But the idea that interesting discussion 
 would attract interesting discussants was at the core of the 
 theory that drove the WELL's growth.  Initially, many free 
 accounts were offered to people who had, at one time or 
 another, been associated with Whole Earth publications and 
 events, or who were known by Whole Earth staff to be likely 
 productive and attractive participants (referred to, tongue-in-
 cheek, as "shills").  In April of 1985, the WELL began offering 
 subscriptions at $8 per month plus $3 per hour.

Initial Design and Rule making

    The WELL presented its first users with the sole disclaimer:   
 "You own your own words."  The owners of the WELL sought to 
 distance themselves from liability for any text or data posted 
 or stored online by WELL users while, at the same time, 
 providing a free space for creative, experimental and 
 unfettered communication.  An alternative interpretation of the 
 original disclaimer (now referred to as YOYOW) held that rather 
 than only laying responsibility for WELL postings at the feet of 
 the author, the phrase also imparted copyrighted ownership of 
 postings to the author under the implied protection and 
 enforcement of the WELL.  Management and ownership 
 resisted the onus of their serving as legal agent for the WELL's  
 users, recognizing the potential expense and futility of pursuing 
 people for electronically copying and using customers' words.  
 Thus, the evolving interpretation of YOYOW provided fuel for 
 years' worth of discussion on the topics of copyright,  
 intellectual property and manners in electronic space.  

   A general aversion to the making and enforcement of rigid 
 rules has continued at the WELL although incendiary incidents 
 and distressing situations have occasionally brought calls for 
 "more Law and Order" or absolute limits to speech.  WELL 
 management rejected these calls, resisting being put in the role 
 of policeman and judge except where absolutely necessary, and 
 espousing the view that the medium of online interpersonal 
 communication was (and still is) too immature, too formative to 
 be confined by the encumbrances of strict rules and 
 restrictive software.  The imposition by management of 
 arbitrary limitations on language and speech, aimed at 
 protecting the feelings or sensibilities of small groups of people 
 could not possibly protect all people's feelings and sensibilities.  
 Besides, by stifling free and open dialog, we might have lost 
 our chance to discover what kinds of interaction really worked 
 in this medium.  Interaction in public access systems seemed to 
 be much more productive, innovative, educational and 
 entertaining where there were fewer prohibitions imposed by 
 system management.  If limitations were to be imposed and 
 enforced, they could be handled best from within the user 
 population on a "local", not system wide basis.  The creation of 
 private interactive areas where such local rules held sway 
 allowed public forums to retain their openness while providing 
 more regulated "retreats" for those who felt they needed them. 

 Staff-Customer Collaboration
 
    Immediately after opening the system to public access, the 
 small WELL staff and the original participants began the 
 collaborative process of designing of a more friendly interface 
 from the raw Picospan software.  Picospan included a toolbox of 
 customization utilities that could be used to make changes on a 
 system-wide or at-user's-option basis.  Picospan was tightly-
 integrated with the UNIX operating system and could therefore 
 provide transparent access to programs written to operate in 
 the UNIX environment.  The libertarian, anti-authoritarian 
 philosophy of Picospan's author, Marcus Watts, showed through 
 in its design which prevented un-acknowledged censorship by 
 system administrators, forum moderators (hosts) or authors 
 themselves.  Picospan also allowed topics (discussion threads) 
 to be "linked" into several forums at once...a feature that aids 
 the cross-pollination of ideas and groups through the system.  
 The influence that Picospan has had on the WELL's 
 development as a community and hotbed of discussion cannot 
 be underestimated.  Its display of topics as continuously-
 scrolling dialog documents (rather than as fragmented 
 collections of individually-displayed responses) had a 
 tremendous effect on user involvement in ongoing discourse.

 Staff Background

    The background of four of The WELL's non-technical senior 
 managers--people who worked there during its first seven 
 years--must be considered very significant to the formation of 
 the WELL's open and independent culture.

   The first director of the WELL, Matthew McClure and myself, 
 his successor, both spent the decade of the 1970's living in an 
 intentional community of some renown called The Farm as did 
 the WELL's first customer service manager, John Coate, and his 
 successor, Nancy Rhine..  Undoubtedly, this experience of living 
 cooperatively in multi-family situations in a community that 
 reached a peak population of over 1500 adults and children, 
 had a profound influence on the style of management of The 
 WELL.  Principles of tolerance and inclusion, fair resource 
 allocation, distributed responsibility, management by example 
 and influence, a flat organizational hierarchy, cooperative 
 policy formulation and acceptance of a libertarian-bordering-
 on-anarchic ethos were all carryovers from our communal 
 living experience.  John Coate is known for having been integral 
 to the setting of a tone of the WELL where users and staff 
 intermingled both online and at the WELL's monthly office 
 parties.  He has authored a widely-distributed essay on 
 "Cyberspace Innkeeping" based on lessons learned in dealing 
 with customers in his time at the WELL..

 Maintaining a History
 
    An important component to the establishment of community in 
 any setting or medium is a historical record of its environs, its 
 people, and their works and the relationships and organizations 
 that defined the direction of the collective entity.  For a variety 
 of reasons besides the security of backups,  the WELL still has a 
 significant portion of its online interaction saved on archived 
 tape, on its user-accessible disks and in the possession of many 
 of its conference hosts who have made a practice of backing up 
 topics on their home machines before retiring them from the 
 WELL.  WELL users were always vocal in their insistence that a 
 history be kept and went so far as to create an Archives 
 conference where topics judged of historical significance from 
 other areas of the WELL were linked and eventually "frozen"  
 for future reference.  These valuable conversational threads, 
 this "history" of the WELL, contributes to its depth and feeling 
 of place and community.  New users and veterans alike can 
 refer to these archives for background to current discussion 
 and to sample the flavor of the WELL from its early days.  
 When new users, experiencing the same revelations that 
 stirred WELL veterans years ago, bring up their own 
 interpretations of "you own your words", they are referred to  
 the several preserved topics in Archives where lengthy online 
 deliberations on the subject have been preserved..

 Connections
 
    Originally, only direct dial modems could be used to reach the 
 WELL, but by the end of its first year of operation, an X.25 
 packet system was in place allowing long distance users to 
 reach the WELL at reasonable cost.  The WELL kept its San 
 Francisco focus because local callers had cheaper access and 
 could stay online longer for the same cost, but national and 
 international participants were now more encouraged to join in.

    Also, in 1986, Pacific Bell conducted a test of a regional packet-
 switched network for which the WELL was enrolled as a "beta" 
 site.  For most of a year, users from most of the San Francisco 
 Bay Area were able to dial in to the WELL without phone toll 
 charges.  This fortuitous circumstance helped boost the WELL's 
 subscription base and connected many valuable customers 
 from the Silicon Valley area into the growing user pool.

    Over time, the percentage of users from outside of the Bay 
 Area climbed slowly but steadily.  As word spread through 
 frequent unsolicited articles in the press, the WELL became 
 known as a locus for cutting edge discussion of technical, 
 literary and community issues, and it became even more 
 attractive to long distance telecommunicators. 

    On January 2, 1992, the WELL opened its connection to the 
 Internet through the regional provider, BARRNet.  After much 
 debugging and adjustment and a complete CPU upgrade, full 
 Internet service access was offered to WELL customers in June 
 of 1992.  Staff and users opened an Internet conference on the 
 WELL where discussions and Q&A take place and where new 
 features, discoveries and tools are shared.  The Internet 
 conference serves as a "living manual" to the resources, use and 
 news of the Net.

 Community
 
    In a medium where text is the only means of communication, 
 trust becomes one of the most difficult but essential things to 
 build and maintain.  With no audible or visual clues to go by, 
 the bandwidth for interpersonal communication is quite thin.  
 There are, though, ways in which trust can be built even 
 through the small aperture of telecommunicated text.

    By being deliberately non-threatening, owners and managers can 
 eliminate one of the major barriers to trust on the system.  One of the 
 most menacing conditions experienced by new users of public 
 conferencing systems is that of hierarchical uncertainty.  Who holds 
 the Power?  What is their agenda?  What are The Rules?  Who is 
 watching me and what I do?  Do I have any privacy?  How might a 
 "Big Brother" abuse me and my rights?  The WELL Whole Earth 
 parentage brought with it a historical reputation of collaboration 
 between publisher and reader.  Whole Earth catalogs and magazines 
 were widely-known for soliciting and including articles and reviews 
 written by their readers.  Whole Earth customers knew that the 
 publications had no ulterior motives, were not owned and controlled 
 by multi-national corporations and did not spend their revenues on 
 making anyone rich.  Readers supported the publications and the 
 publications featured and came clean with the readers.  We strove to 
 continue that kind of relationship with our customers on the WELL 
 although the immediacy of feedback often made openness a tricky 
 proposition.

    We realized that we were in a position of ultimate power 
 as operators of the system; able to create and destroy user 
 accounts, data, communications at will.  It was incumbent on 
 us, then, to make clear to all users our assumptions and the 
 ground rules of the WELL in order to minimize any concerns 
 they might have about our intentions.  Our aim was to be as 
 much out front with users as possible.  Indeed, John Coate 
 and I took the initiative, posting long autobiographical stories 
 from our communal past, inviting users to join us in problem-
 solving discussions about the system and the business around 
 it, confessing to areas of ignorance and lack of experience in the 
 technical end of the business, and actively promoting the users 
 themselves as the most important creators of the WELL's 
 product.

   Staff members were encouraged to be visible online and to be 
 active listeners to user concerns in their respective areas of 
 responsibility.  Staff took part in discussions not only about 
 technical matters and customer service, but about 
 interpersonal online ethics.  When the inevitable online 
 quarrels surfaced, staff participated alongside users in 
 attempts to resolve them.  Over time, both staff and users 
 learned valuable lessons and a "core group" of users began to 
 coalesce around the idea that some kind of community was 
 forming and that it could survive these periodic emotional 
 firestorms.  The ethical construct that one could say whatever 
 one wanted to on the WELL, but that things worked best if it 
 was said with consideration of others in mind, became 
 ingrained in enough peoples' experience that community 
 understandings developed.  These "standards" were not written 
 down as rules, but are noted conspicuously in the WELL's User 
 Manual and are mentioned online as observations of how 
 things really seem to work.  Productive communication in this 
 medium can take place if it is done with care.

    Beginning in 1986, the WELL began sponsoring monthly face-
 to-face gatherings open to all, WELL user or not.  Initially, 
 these Friday night parties were held in the WELL's small 
 offices, but as attendance grew and the offices became even 
 more cramped, the potluck gatherings, still called WELL Office 
 Parties (or WOPs) moved to other locations, eventually finding 
 a regular home at the Presidio Yacht Club near the foot of the 
 North end of the Golden Gate Bridge.  These in-person 
 encounters have been an integral and important part of the 
 WELL's community-building.  They are energetic, intense, 
 conversation-saturated events where people who communicate 
 through screen and keyboard day after day get to refresh 
 themselves with the wider bandwidth of physical presence.  
 Often, the face to face encounter has served to resolve 
 situations where the textual communications have broken 
 down between people. 

 Collaboration Part II
 
    The WELL was a bootstrap operation from its initial investment 
 in 1985.  As a business venture, it was undercapitalized and 
 struggled constantly to stay ahead of its growth in terms of its 
 technical infrastructure and staffing.  At the same time, it stuck 
 to the ideal of charging its users low fees for service.  The 
 undercapitalization of the WELL and the low user charges 
 combined to force management into a constant state of creative 
 frugality.  From the first days of operation, the expertise and 
 advice of users was enlisted to help maintain the UNIX 
 operating system, to write documentation for the conferencing 
 software, to make improvements in the interface and to deal 
 with the larger problems such as hardware malfunctions and 
 upgrades.

   Over the years, many tools have been invented, programmed 
 and installed at the suggestion of or through the actual labor of 
 WELL users.  In an ongoing attempt to custom design the 
 interface so as to offer a comfortable environment for any user, 
 the WELL has become, if not a truly user-friendly environment, 
 a very powerful tool kit for the online communications 
 enthusiast.  One of the basic tenets of the WELL is that "tools, 
 not rules" are preferred solutions to most people-based  
 problems.  Menu-driven tools were created to give control of 
 file privacy to users, allowing them to make their files 
 publicly-readable or invisible to others.  The "Bozo filter", 
 created by a WELL user, allows any user to choose not to see 
 the postings of any other user.  Some WELL veterans, after 
 years of teeth-gritting tolerance of an abrasive individual, can 
 now be spared any online exposure to or encounter with that 
 individual.

    Other tools have been written to facilitate file transfers, to 
 allow easy setup of USENET group lists, to find the cheapest 
 ways to access the WELL, and to extract portions of online 
 conversations based on a wide range of criteria.  These tools 
 have all been written  by WELL users, who received only free online 
 time in exchange for their work, or by WELL employees who were 
 once customers.

    Free time on the WELL (comptime) has always been awarded 
 liberally by WELL management in exchange for services.  At 
 one time, half of the hours logged on the WELL in a month was 
 uncharged, going to comptime volunteers or staff.  Hosting 
 conferences, writing software, consulting on technical issues 
 and simply providing interesting and provocative conversation 
 have all earned users free time on the WELL.  Much as we 
 would have liked to pay these valuable people for their 
 services, almost to a person they have continued to contribute 
 to the WELL's success as a business and public forum, 
 demonstrating to us that they considered the trade a fair one.

 Conclusion
  
   As can be seen, the WELL developed from its unusual roots in 
 some unique ways.  The purpose of this piece is not to advocate 
 more WELL clones on the Net, but to demonstrate that if the 
 WELL could make it, other systems of the WELL's size and 
 general description could spawn from equally unique 
 circumstances around the country and offer their own special 
 cultural treasures to the rest of the world through the Internet.  
 What has been learned at the WELL can certainly be of value 
 when planning new systems because the WELL experiment has 
 demonstrated that big funding bucks, elegant interface design, 
 optimum hardware  and detailed business planning are not 
 essential to growing a thriving online community and, in the 
 WELL's case, a successful for-profit business.  More important 
 is that the owners and managers of the systems openly foster 
 the growth of online community and that there be a strong 
 spirit of open collaboration between owners, managers and 
 users in making the system succeed.  These critical elements of 
 viable community systems are attainable by local and regional 
 civic networks, small organizations and entrepreneurs with 
 limited funding and technical skills... and some heart.

 *****************************

Cliff Figallo (fig@eff.org) is a Wide Area Community Agent who
also works part time as Online Communications Coordinator 
for the Electronic Frontier Foundation.  Before coming to work 
at EFF, Cliff was Director of the Whole Earth Lectronic Link for 
six years (Aug '86 through July '92).  Cliff now lives in the San 
Francisco area and works remotely at his job using the 
Internet, Pathways, the WELL, CompuServe and America Online daily.
He can be reached via email at the following addresses:
fig@well.sf.ca.us    fig@eff.org    fig@path.net    fig@aol.com
76711,320@compuserve.com

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 THE FEMINIZATION OF CYBERSPACE

 by Doctress Neutopia (neutopia@educ.umass.edu)

     During the final year of my doctoral work I discovered the new
 world of Cyberspace.  Having been involved in utopian thought for
 more than fifteen years, inventing my own utopia from the ideas of
 such futurists and architects as Charlotte Perkins Gilman,
 Starhawk, Eiane Eisler, Paolo Soleri, Buckminster Fuller, etc,
 which I call Neutopia, I find the world of virtual reality is the
 perfect place for my Neutopian imagination be to born into reality.
 The central nervous system of Neutopia is the evolving Global Brain
 which we are now seeing come about through information technologies
 and the world of Cyberspace.
     
     Cyberspace is changing the very nature of text.  Electronic
 text takes us into the age of non-text which means writing has
 become solely an electronic experience requiring no paper form. 
 Printed matter is no longer necessary in the world of Cyberspace. 
 In this world today, the power of ideas, and to some degree one's
 writing style and skills is the persuader. In the ideal sense,
 Cyberspace becomes a place for the autonomous individual, a place
 where the integrity of the Self is the determining factor of social
 prestige.  With the elimination of printed matter and the
 decentralized nature of email, a new relationship between
 authoress/author and audience is opening up.  Editors who have had
 the centralized control over the printed word are no longer the all
 powerful controller of literature since in Cyberspace the unknown
 poetess can post a message along side a literary giant.  Because of
 the democratizing aspects of the Usenet open forum, the matter in
 which one gains social status is also changing.  In Cyberspace,   
 literary merit is achieved through the depth and sincerity of one's
 message.  In other words, the old hierarchal structures of language
 and the old gatekeepers of ideas are being broken down as you read
 these words.
 
     Nevertheless, Cyberspace is no paradise on Earth.  Quite the
 contrary!  I don't believe I am being an extremist to say that
 there is a war against the feminist voice occurring in Cyberspace. 
 The Net term for such activity, which most of the postings of the
 discussion groups reflect, is called "flaming."  For me, the flames
 symbolize the "Burning Times" when civilization was moving from the
 Medieval Ages into the Renaissance and the rise the market economy.
 It was during this rebirth of classical thought when thousands of
 innocent women healers and religious leaders were being burned as
 heretics.
  
     A biologist friend has also pointed out to me that in his
 laboratory "flaming" means to sterilized a test tube from bacteria.
 In that sense, I feel that the "flaming" of my posts have been an
 attempt by some people to cleanse the Net from my non-conformist
 "disease".  After all, the Gaia Religion which I have been
 researching is about the role bacteria play in regulating life and
 love!

     Entering into the Computer Age, we find ourselves in another
 social transition.  The technological possibilities for
 revolutionary change on a world-wide level are now available to us.
 That is, if feminist ideology can come to the forefront of the
 dialogue.  Now, of course, as in the "real" world, the patriarchal
 religion of Capitalism is the dominant thought.  Anyone who opposes
 this thought are "flamed" for their "inappropriate behavior".  On
 many occasions, I have been "flamed" for my alternative Neutopian
 Vision, not by one individual, but by various Usenet and Listserve
 groups. 
 
     For example, I am subscribed to a Listserve called
 Leri@pyramid.com.  This group has about 200 people who are
 subscribed. There are two kinds of people on the myriad of
 Listserves, the Writers and the Lurkers.  Lurkers are people who
 compose the reading audience who occasionally voice an opinion, but
 for the most part, they are silent observers.  Of the writers, the
 majority are white upperly-mobile middle-class young men who are
 computer literate.  Many of them are from the scientific class who
 are busy creating the Technocracy.  When I began to point out the
 blatant sexist language and attitudes on Leri, I was "flamed" by
 members of this so called "virtual love commune." 
 
     We are seeing here a rise of a new form of tribalism.  If the
 tribal leaders (the Patriarchal Writers) sense a voice which might
 be threatening to the tribal harmony of the old-boys network, then
 the group attempts to eliminate that voice in opposition. 
 Unfortunately, for the most part, the educational system has not
 taught these young men to analyze and understand the reason why the
 feminist voice is annoying to their Establishment prevailing
 thought. Consequently, the Net has become but another sophisticated
 toy for rich minded college kids to entertain each other as the
 rest of the world starves to death and the global ecology
 collapses.

     There was much discussion which arose on Listserve Leri as to
 what to do about me.  Several writers declared my vision to be a
 "case of insanity." They even were discussing whether it was a case
 of biological or psychological aberration.  Others suggested that
 I needed to go to the self-help section of a book store and find a
 book which would help me fit into the society.  Others felt my
 "unhappy and depressed" character was a result of "inner confusion"
 and that if I changed myself [conform to their way of thinking],
 then I would be "liberated from oppression".  Still others believed
 that I would be saved if I found my way back to Christ or began to
 practice Buddhist meditation or yoga.
  
     Finally, it was decided that the best thing they could do with
 my heresy was to follow the example of the Shaker Community.  The
 worst punishment the Shakers did to a dissenting personality was to
 shun them and so this was what Listserve Leri proceeded to do to
 me.  Other technicians proposed to bar me by setting up the
 technology called "kill filters" so that my email messages would
 not even appear on their screens.
  
     There is also a IRC #leri channel where I began to go to
 explain my philosophy to the students in Real Time. When the
 conversation began to become controversial and conflicting ideas
 were pecking, the boys and the girls who think like boys, would
 type in an /ignore all neutopia messages so that I was blocked from
 the public dialogue.  Another tactic of censorship in IRC is the
 /kick ban which several of the boys threaten to set up so that I
 would not be kicked off the channel if I tried to enter it.  So
 much for democracy on the Net!

     During the holidays, Leri was going to hold a "fleshmeet" in
 New Mexico which all the members of the Leri Listserve were invited
 to so that people could meet one another in the living flesh. 
 However, when I expressed interested in attending the party, the
 hostess said that if I came "she would have me shot."  Then she
 wrote me a personal email with a one line message to the effect of
 "The Patriarchy Wins."  I was experiencing social ostracism for my
 feminist beliefs and it was a very loney and painful experience.

     But the worst treatment of all occurred on a sister list of
 Leri called Aleph@pyramid.com when the archivist said that he was
 deleting my posts from the archives.  This action was so malicious
 because I know this is what has happened to feminist thought
 throughout recorded history.  Women who resist the patriarchy are
 eliminated from the collective memory.  I recall a past life when
 I was being burned at the stake and the governmental/religious
 officials laughed at me as my flesh burned.  Before I fell
 unconscious from the smoke, the sinister officials took out my
 manuscripts which they had confiscated and threw them in the fire. 
 The messages of my life burned along with my body...my soul
 forgotten....my work unacknowledged...my poetic love verse
 destroyed. 
 
     The point is that there is a serious ideological war in
 progress in this underworld of Cyberspace, a place which also
 controls the nuclear weapons of the world through the Computer
 Empire.  This war is the same war which women have been struggling
 against for thousands of years.  As the millennium changes, so too
 is it time to end this war which is draining our vital resources
 that are needed to save the Biosphere from total destruction. It is
 time that women be acknowledged as the natural sovereigns of the
 species so that we will be in a position to use our knowledge and
 wisdom we have in creating a world where all our benevolent dreams
 find a way to self-actualize.

     My mission is to encourage Feminists to play an active role in
 the future of Cyberspace.  Here is a window of opportunity open for
 us to play our role essential in forming the future social
 architecture of Cyberspace.  If we, Feminists, do not act now and
 recruit other like minded Earthlings to take up the cause of the
 "Global Feminization of Cyberspace," then we will be caught in the
 same trap that we are in today.  It is time for us to demand a new
 world where everyone has access to the global resources...a world
 where everybody's spiritual and physical needs are met.  Only then
 will the Net become a vehicle of global emancipation and a home of
 the Neutopian thinker.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                  RESPONSE TO THE FEMINIZATION OF CYBERSPACE

 By Jason Webb (jwebb@world.std.com)

 I am writing in response to the article THE FEMINIZATION OF
 CYBERSPACE by Doctress Neutopia (neutopia@educ.umass.edu).  The issues
 raised and the accusations made in the article are very serious and
 deserve some discussion.  

 The author cites cases in which her opinions were repressed in several 
 different ways ranging from individual kill files to having her messages
 elminiated from the archives of the group.  It seems to me that the real
 issue at stake is what the purpose of the Listserve groups is. 

 Clearly, if the purpose of the group is to promote the free expression
 of ideas they are not succeeding.  It is true that the internet does eliminate
 discrimination based on physical characteriscics.  Predictably, however, 
 technology alone cannot create a better world: we have to be active in trying
 to create an environment where all ideas can be expressed without the fear of
 being ostracized.

 On the flip side, a few of the authors statements are disturbing
 because they imply that the male species is to blame for all of these
 problems.  For example:

 >When the conversation began to become controversial and conflicting ideas
 >were pecking, the boys and the girls who think like boys, would
 >type in an /ignore all neutopia messages so that I was blocked from
 >the public dialogue. 

 >It is time that women be acknowledged as the natural sovereigns of the
 >species so that we will be in a position to use our knowledge and
 >wisdom we have in creating a world where all our benevolent dreams
 >find a way to self-actualize.

 Girls who think like boys? Natural soverigns of the species?  

 It seems hypocritical that the author complains of experiencing
 ostracism for voicing her feminist beliefs and then goes on to make
 such exclusionary statements herself. 

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

      THE EASY-TO-USE SOLVE THE KENNEDY ASSASSINATION THEORY CHART

 By Gordon Fagan (flyer@fennec.com)

 Instructions:
 Write down the total # of persons involved.  Then write down the approximate 
 frame number of the Zapruder film that matches where you believe each shot 
 occurred.  Then it's a simple matter of going through the list and putting 
 an X under each shot number and beside each item that applies to that 
 particular shot.  If it doesn't apply, mark nothing.  If the item applies 
 but not to any particular shot number, then use the 0 shot#.  Mark  it with 
 an X for "conspiracy to kill" or an "O" for involved in the coverup (:It 
 also comes in handy for the "a tiger got him" crowd.:) I've tried to be as 
 thorough as possible, but to make sure everything was covered, I did leave 
 an "others" category with a fill-in-the-blank at the end of each section.  
 As for the exactness of your answers, use as close of approximations as you 
 feel comfortable with. Include all overlap, ie: if you believe Oswald fired 
 shot #4 but was under the command/control of Naval Intelligence - mark 
 Oswald and Naval Intelligence for shot #4.  For simultaneous shots, give 
 them both the same frame number.  It's pretty much self-explanatory once 
 you get into it.  Enjoy. 


  The JFK Conspiracy Theory Outline Form
 ---------------------------------------------------------------------------|
  Total number of persons involved
 ---------------------------------------------------------------------------|
 Conspiracy to Assassinate: __________
 ---------------------------------------------------------------------------|
 Conspiracy to Coverup: __________
 ---------------------------------------------------------------------------|
||||Shot# Reference line|||||||| 0  |  1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |
----------------------------------------------------------------------------|
Approx. Zapruder frame of shot#|    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
-------(:note: if you believe in more than 8 shots, see your doctor:)-------|
shot# fired from:
    (0 means spotter/involved non-shooter)
----------------------------------------------------------------------------|
TSBD-6th floor - east end      |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
TSBD-6th floor-other           |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
TSBD-roof                      |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
TSBD-other                     |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
GK-black dog man position      |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
GK-badgeman position           |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
GK-other                       |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Dal-Tex                        |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Dal. County Records Bldg       |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Dallas County Court Bldg       |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
storm drain                    |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
umbrella man                   |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
other:_______________________  |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
other:_______________________  |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|

shot# Fired by: (Include all overlap)
    (0 means involved in/knew about but fired no shots)
----------------------------------------------------------------------------|
Lee Harvey Oswald              |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Cuban (anti-Castro)            |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Cuban (pro-Castro)             |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Russian (anti-communist)       |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Russian (KGB/Pro-communist)    |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Marseille professional         |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
other professional             |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Mafia                          |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
CIA                            |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
FBI                            |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Naval Intelligence             |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Lyndon Johnson                 |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Clay Shaw                      |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
David Ferrie                   |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Roscoe White                   |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
J.D Tippit                     |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
Jack Ruby                      |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
umbrella man                   |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
George Hickey (S.S) - AR-15    |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
William Greer (S.S) - driver   |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
nazis                          |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
UFO's/MJ-12,etc.               |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
government conspiracy/coverup  |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
non-govt. conspiracy/coverup   |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
other:_______________________  |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
other:_______________________  |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|

shot# to hit:                                                
----------------------------------------------------------------------------|
John Kennedy                   |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
John Connally                  |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
James Tague                    |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
grass                          |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
sidewalk/road                  |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
limousine                      |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
street sign                    |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
targetting "rice" bag          |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
other:_______________________  |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|
other:_______________________  |    |    |    |    |    |    |    |    |    |
----------------------------------------------------------------------------|

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 The original Hacker Crackdown text file, hacker.crackdown, has been expanded
 and worked upon, and is now available in many formats, including ASCII (as
 before), TeX DVI, PostScript, etc.  Look in:

 ftp://ftp.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/
 gopher://gopher.eff.org/00/Publications/Bruce_Sterling/Hacker_Crackdown/
 http://www.eff.org/pub/Publications/Bruce_Sterling/Hacker_Crackdown/

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
                          MEEKS DEFENSE FUND

From Meeks Defense Fund <fund@idi.net>
Subject: Details on Brock Meeks Case

Dear Net Citizen:
 
 The recent Internet posting launching a fund raising drive in
 order to help Brock Meeks defray the legal expenses of a lawsuit
 brought against his news wire, CyberWire Dispatch, has drawn
 several inquiries for a summary of the issues involved in this
 case.  In response, we have put together the following summary. 
 (Please note, too, that the case was featured in the April 22
 (Fri.) issue of the Wall St. Journal (page B1))

 Sometime during February of this year, an electronic solicitation
 began appearing on the Internet from a company identified only as
 the "Electronic Postal Service" (EPS).

 The solicitation from EPS said the service, "will pay you money
 to receive commercial e-mail. EPS estimates you will be paid an
 average of 6.5 cents per commercial e-mail message.  It is
 estimated that the average commercial e-mail receiver can make
 $200.00 to $500.00 a year and likely more.  There is absolutely
 no charge, periodic charge, hourly charge or phone charge to
 receive or review EPS commercial e-mail.  The sender bears all of
 the cost.

 You are provided with a free EPS mailbox and you may access this
 EPS mailbox through a toll free phone number so there are no
 phone line charges... In addition... EPS offers you... full
 Internet access including network Internet e-mail remote log-in,
 file transfer capability and much more."

 To sign up you were required to call an 800 number or send for
 information to the EPS Internet account (eps@world.std.com).  You
 had to include your name and address.
 
 Brock called and asked for the EPS information.  It never came.
 Instead, he received an unwanted and unsolicited direct mailing
 from a company called Suarez Corporation Industries (SCI).  The
 mailing came in the form of a 6 page letter signed by Benjamin
 Suarez.  That mailing claimed that for a price of $159, Suarez
 would send you a book and software that could help you create a
 "net profit generation system" capable of earning anywhere from
 $30,000 to $1 million per year.

 Brock began investigating why he received the SCI mailing and
 soon found out that Suarez had obtained his name from the request
 for EPS information. More investigation found that the EPS
 account was registered to Suarez Corporation Industries.  Brock
 then looked into the background of this company.

 During his investigation into SCI, Brock discovered that state
 and federal enforcement agencies had brought actions against SCI
 result of their direct mailing practices.
 
 In his article, Brock expressed his personal disapproval of the
 SCI business activities. SCI objected to the article and has
 filed a defamation lawsuit claiming Brock made defamatory remarks
 and sought to disparage his products "and otherwise tortiously
 (sic) interfere with the plaintiff's ability to develop" EPS. 
 Suarez claims the Dispatch article lost him business and he is
 seeking compensatory and punitive damages and demanding an
 injunction to block Brock from writing further about SCI or its
 founder, Benjamin Suarez.

 The April 22 (page B1) issue of the Wall St. Journal says lawsuit
 "is one of the first U.S. libel cases to arise out of the
 free-for-all on the Internet... If it succeeds, some legal
 experts say it could spawn other complaints."
 
 For those who don't know Brock, he has a long history as a
 journalist writing in the on-line field, having written for Byte,
 Wired and other journals over the years.  He lives and works
 today in the Washington, D.C. area writing during the day for a
 communications trade journal.  Cyberwire Dispatch is his own
 creation.  The suit against him was filed in Ohio.  Without
 the generous offer of legal support from his current lawyers, who
 have offices in Ohio, Brock's situation would be even more dire.
 
 The Meeks case raises legal issues that may have far-reaching
 implications for freedom of speech and free expression on the
 internet.  If journalists are unable to pursue important
 investigative issues without fear of reprisal, then
 all of us will suffer.  This is exactly the type of chilling
 effect hat the First Amendment was intended to avoid and the
 reason we need your support. 
 
 Of course defamation laws are to be applied to the Net, but how
 they are applied -- and this case will be an important first step
 in that process -- could determine just how open and free people
 will feel to speak their minds.
 
 This is NOT a case in which a writer on the Internet has, in
 fact, libeled someone else.  Brock absolutely denies the charges
 against him.  And every lawyer that Brock has consulted and
 looked at the text Brock wrote, and the charges against him,
 believe that he ha not written anything that can fairly be
 characterized as libelous.
 
 The Legal Defense Fund is formed to assure that Brock is well
 defended. 

 As a reminder, contributions can be made in two ways, either
 tax-deductible or non-deductible.
 
 A special thanks goes to the Point Foundation for agreeing early
 on in the process to assist in organizing and serving as a
 collection agent for the Fund.
 

 If you have any questions, you can contact the Fund at
 Fund@idi.net.


 For tax-deductible contributions send those checks to:
  
  Meeks Defense Fund
  c/o Point Foundation
  27 Gate Five Road
  Sausalito, CA 94965
  
 For those who don't care about the tax deductible status, send
 contributions to:
  
Meeks Defense Fund
 c/o IDI
 901 15th St. NW
 Suite 230
 Washington, DC 20005
 
THE BROCK MEEKS DEFENSE FUND COMMITTEE
 
 Samuel A. Simon
 President, Issue Dynamics, Inc.*
 ssimon@idi.net   
 
 John Sumser
 Editor/Executive Director
 Whole Earth Review/ Point Foundation
 jrsumser@well.sf.ca.us

 Mitch Kapor
 Chair, Electronic Frontier Foundation*
 mkapor@eff.org
 
 David Farber
 The Alfred Fitler Moore Professor of Telecommunications Systems
 University of Pennsylvania*
 farber@central.cis.upenn.edu 
 
 Philip Elmer-DeWitt
 Senior Writer
 TIME Magazine*
 ped@panix.com

 Marc Rotenberg
 Electronic Privacy Information Center*
 Rotenberg@epic.org  

 Nicholas Johnson
 Former FCC Commissioner*
 1035393@mcimail.com

 Jerry Berman
 Electronic Frontier Foundation*
 jberman@eff.org

 Mike Godwin
 Electronic Frontier Foundation*
 
####################################################################
#      Meeks Defense Fund       |   Internet:   fund@idi.net       #
# ---------------------------------------------------------------- #   
#  c/o  IDI                     c/o Point Foundation               #
#  901 15th St. NW              27 Gate Five Road                  #
#  Suite 230                    Sausalito, CA  9465                #
#  Washington, DC  20005                                           #
####################################################################    

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                            HACKERS ON PLANET EARTH

 From: Emmanuel Goldstein (emmanuel@well.sf.ca.us)
 To: Editors@fennec.com

 HACKERS ON PLANET EARTH

 The First U.S. Hacker Congress

 Yes, it's finally happening. A hacker party unlike anything ever seen 
 before in this country. Come help us celebrate ten years of existence 
 and meet some really interesting and unusual people in the process. 
 We've rented out the entire top floor of a midtown New York hotel, 
 consisting of several gigantic ballrooms. The conference will run 
 around the clock all weekend long. 

 SPEAKERS AND SEMINARS: Will there be famous people and celebrity 
 hackers? Of course, but the real stars of this convention will be 
 the hundreds of hackers and technologically inclined people journeying 
 from around the globe to share information and get new ideas. 
 That is the real reason to show up. Seminars include: 
 social engineering, cellular phone cloning, cable TV security, 
 stealth technology and surveillance, lockpicking, boxing of all sorts, 
 legal issues, credit cards, encryption, the history of 2600, 
 password sniffing, viruses, scanner tricks, and many more in the 
 planning stages. Meet people from the Chaos Computer Club, Hack-Tic, 
 Phrack, and all sorts of other k-rad groups.

 THE NETWORK: Bring a computer with you and you can tie into the huge 
 Ethernet we'll be running around the clock. Show off your system and 
 explore someone else's (with their permission, of course). We will 
 have a reliable link to the Internet in addition. Finally, everyone 
 attending will get an account on our hope.net machine. We encourage 
 you to try and hack root. We will be giving away some valuable prizes 
 to the successful penetrators, including the keys to a 1994 Corvette. 
 (We have no idea where the car is, but the keys are a real 
 conversation piece.) Remember, this is only what is currently planned. 
 Every week, something new is being added so don't be surprised to find 
 even more hacker toys on display. We will have guarded storage areas 
 if you don't want to leave your equipment unattended.

 VIDEOS: We will have a brand new film on hackers called 
 "Unauthorized Access", a documentary that tells the story from 
 our side and captures the hacker world from Hamburg to Los Angeles 
 and virtually everywhere in between. In addition, we'll have 
 numerous foreign and domestic hacker bits, documentaries, 
 news stories, amateur videos, and security propaganda. There 
 has been a lot of footage captured over the years - this will 
 be a great opportunity to see it all. We will also have one 
 hell of an audio collection, including prank calls that put 
 The Jerky Boys to shame, voice mail hacks, and even confessions 
 by federal informants! It's not too late to contribute material!

 WHERE/WHEN: It all happens Saturday, August 13th and Sunday, 
 August 14th at the Hotel Pennsylvania in New York City 
 (Seventh Avenue, between 32nd and 33rd Streets, right across 
 the street from Penn Station). If you intend to be part of 
 the network, you can start setting up Friday night. 
 The conference officially begins at noon on Saturday and will 
 run well into Sunday night.

 ACCOMMODATIONS: New York City has numerous cheap places to stay. 
 Check the update sites below for more details as they come in. 
 If you decide to stay in the hotel, there is a special discounted 
 rate if you mention the HOPE Conference. $99 is their base rate 
 (four can fit in one of these rooms, especially if sleeping bags 
 are involved), significantly larger rooms are only about $10 more. 
 Mini-suites are great for between six and ten people - total cost 
 for HOPE people is $160. If you work with others, you can easily 
 get a room in the hotel for between $16 and $50. 
 The Hotel Pennsylvania can be reached at (212) PEnnsylvania 6-5000 
 (neat, huh?). Rooms must be registered by 7/23/94 to get the 
 special rate.

 TRAVEL: There are many cheap ways to get to New York City in August 
 but you may want to start looking now, especially if you're coming 
 from overseas. Travel agencies will help you for free. Also look in 
 various magazines like Time Out, the Village Voice, local alternative 
 weeklies, and travel sections of newspapers. Buses, trains, and 
 carpools are great alternatives to domestic flights. Keep in touch 
 with the update sites for more information as it comes in. 

 WANTED: Uncommon people, good music (CD's or cassettes), creative 
 technology. To leave us information or to volunteer to help out, 
 call us at (516) 751-2600 or send us email on the Internet at: 
 2600@hope.net.

 VOICE BBS: (516) 473-2626

 INTERNET: 
       info@hope.net     - for the latest conference information 
       travel@hope.net   - cheap fares and advisories 
       tech@hope.net     - technical questions and suggestions 
       speakers@hope.net - for anyone interested in speaking at the 
                           conference 
       vol@hope.net      - for people who want to volunteer 
          
 USENET NEWSGROUPS: 
       alt.2600               - general hacker discussion 
       alt.2600.hope.announce - the latest announcements 
       alt.2600.hope.d        - discussion on the conference 
       alt.2600.hope.tech     - technical setup discussion

 REGISTRATION: Admission to the conference is $20 for the entire weekend 
 if you preregister, $25 at the door, regardless of whether you stay for 
 two days or five minutes. To preregister, fill out this form, enclose $20, 
 and mail to: 2600 HOPE Conference, PO Box 848, Middle Island, NY 11953. 
 Preregistration must be postmarked by 7/31/94. This information is only 
 for the purposes of preregistration and will be kept confidential. Once 
 you arrive, you can select any name or handle you want for your badge.

 NAME: _______________________________________________________________

 ADDRESS: ____________________________________________________________

 CITY, STATE, ZIP, COUNTRY: __________________________________________

 PHONE (optional): ____________ email (optional): ____________________

 IMPORTANT: If you're interested in participating in other ways or 
 volunteering assistance, please give details on the reverse side. 
 So we can have a better idea of how big the network will be, please 
 let us know what, if any, computer equipment you plan on bringing and 
 whether or not you'll need an Ethernet card. Use the space on the back 
 and attach additional sheets if necessary.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     TV & MOVIE MANIA RADIO SHOW HITS THE INFORMATION SUPERHIGHWAY

 By Lauren Weinstein (lauren@vortex.com)

 LOS ANGELES -- In a first for an entertainment-oriented show, a
 version of the popular "Professor Neon's TV & Movie Mania" radio
 program begins worldwide distribution directly to listeners this
 week via the Internet (or as it is becoming popularly known,
 the "Information Superhighway").

 "The Internet now includes over 20 million users in more than 30
 countries, and is growing at an enormous rate," pointed out the
 show's producer, Lauren Weinstein of Vortex Technology.
 "Professor Neon's TV & Movie Mania has also broadcast via
 over-the-air stations, but it's apparent that the time has finally
 arrived when the global facilities of the Internet can bring this
 audio show to an even wider audience.  Nobody has ever used the
 Internet to transmit a show like this before," he added.

 "Professor Neon's TV & Movie Mania" is a unique show which
 features a look at a broad universe ranging from classic to
 current television, films, and videos, with a special emphasis on
 the unusual, odd, silly, strange, bizarre, cult, surreal, and
 weird.  The shows include reviews, interviews, and a wide range of
 special audio clips, trailers, and many other features.  

 The interview guest for the debut Internet version of the show is
 Robert Justman, a man whose work has greatly influenced classic
 television programs ranging from "The Outer Limits" (on which he
 was assistant director) to both the original "Star Trek" and "Star
 Trek: The Next Generation" (on which he was associate producer and
 co-producer, respectively).  Many of the most familiar aspects of
 these programs were the result of his ideas, and he speaks
 candidly with the show's enigmatic host, Professor Neon, about the
 production of these programs in this fascinating interview. 

 Professor Neon has featured programs focusing on topics ranging
 from "Plan 9 From Outer Space" (with guest "Vampira" who starred
 in the classic cult film), to Forrest J. Ackerman (publisher of
 "Famous Monsters" magazine), to shows focused on topics from "The
 Twilight Zone" to "The Three Stooges". 

 The half hour Internet version of the program is being distributed
 biweekly on the Internet via the Internet Multicasting Service in
 Washington D.C., on the "Internet Town Hall" channel, and is also
 available as a file for retrieval by any Internet user from the
 many Internet Multicasting / Internet Talk Radio archive sites
 around the world.  Users retrieving the audio files can then play
 them on virtually any workstation, PC, Mac, or other computer
 with even simple audio facilities.

 The most recent show, as well as other information regarding the
 program, can also be heard by calling Professor Neon's TV & Movie
 Mania Machine" on (310) 455-1212.

 The Internet version of the show is freely distributable via
 computer networks and BBS systems.  Use by over-the-air
 broadcasters requires the permission of Vortex Technology.  For
 more information regarding accessing the show via the Internet,
 please use the contact below.  Inquiries regarding other access
 and versions of the show for broadcast use are also invited.

 CONTACT: Lauren Weinstein at Vortex Technology, Woodland Hills, CA.
          (818) 225-2800 (9:30-5:30 PDT)
          lauren@vortex.com

 Notes to Internet folks:

 Information regarding the show, including current guest schedule, etc.
 is also available via FTP from site "ftp.vortex.com" (in the "tv-film-video"
 subdirectory) or via gopher from site "gopher.vortex.com" (under the
 "TV/Film/Video" menu item).

 For a list of Internet Multicasting Service / Internet Talk Radio archive
 sites to obtain (via FTP) the audio file for playback, send a message
 (content is not important) to:

         sites@radio.com

 The debut of the Internet version of the show will run via Internet
 Multicast from Interop on Thursday, May 5.  FTP to site "ftp.media.org"
 or "www.media.org" for schedule information.  The audio file of the show
 should become available in the archive sites for retrieval within a few
 days, though exact timing is variable.  The filenames will probably
 be "mania1.au" for the audio and "mania1.txt" for the accompanying
 descriptive text file, though the archive maintainers may change
 the names at some point to fit their overall naming system.  If you
 have trouble locating the files after a few days, please let us know.
 If you have any other questions regarding the program, feel free to
 email or call.

 In two weeks, our interview guest for the next show will be Joel Engel, the
 author of the definitive Rod Serling biography: "The Dreams and Nightmares
 of Life in the Twilight Zone," and of the newly released and highly
 controversial new book, "Gene Roddenberry: The Myth and the Man
 Behind Star Trek."

 If you have any questions for Mr. Engel please email them to: 

    neon@vortex.com

 as soon as possible.  Thanks much!

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%