💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JAUC › jauc1-5.phk captured on 2022-06-12 at 13:02:02.

View Raw

More Information

-=-=-=-=-=-=-


  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
  ======================================================================
  ISSN 1074-3111           Volume One, Issue Five         August 1, 1994
  ======================================================================
    
      Editor-in-Chief:               Scott Davis      (dfox@fc.net)
      Co-Editor/Technology:          Max Mednick      (kahuna@fc.net)
      Consipracy Editor:             Gordon Fagan     (flyer@fennec.com)
      Information Systems:           Carl Guderian    (bjacques@usis.com)
      Computer Security:             John Logan       (ice9@fennec.com)

      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC

      U.S. Mail:
      The Journal Of American Underground Computing 
      10111 N. Lamar #25
      Austin, Texas 78753-3601

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 IMPORTANT ADDRESSES - 
 ============================================================================
 To Subscribe to "TJOAUC", send mail to:              sub@fennec.com
 All questions/comments about this publication to:    comments@fennec.com
 Send all articles/info that you want published to:   submit@fennec.com
 Commercial Registration for Profitable Media:        form1@fennec.com
 Advertising Rates:                                   rates@fennec.com
 ============================================================================

 "The underground press serves as the only effective counter to a growing
 power, and more sophisticated techniques used by establishment mass media
 to falsify, misrepresent, misquote, rule out of consideration as a priori
 ridiculous, or simply ignore and blot out of existence: data, books,
 discoveries that they consider prejudicial to establishment interest..."

 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
 
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 Contents Copyright (C) 1994 The Journal Of American Underground Computing
 and/or the author of the articles presented herein. All rights reserved. 
 Nothing may be reproduced in whole or in part without written permission 
 of the Editor-In-Chief and/or the author of the article. This publication
 is made available periodically to the amateur computer hobbyist free of
 charge.  Any commercial usage (electronic or otherwise) is strictly
 prohibited without prior consent of the Editor, and is in violation of
 applicable US Copyright laws. To subscribe, send email to sub@fennec.com

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 DISCLAIMER AND NOTICE TO DISTRIBUTORS -

 NOTE: This electronic publication is to be distributed free of charge
 without modifications to anyone who wishes to have a copy. Under NO
 circumstances is any issue of this publication, in part or in whole, 
 to be sold for money or services, nor is it to be packaged with other 
 computer software, including, but not limited to CD Rom disks, without 
 the express written or verbal consent of the author and/or editor.
 To obtain permission to distribute this publication under any of the
 certain circumstances stated above, please contact the editor at one of
 the addresses above. If you have intentions of publishing this journal
 in any of the ways described above, or you are in doubt about whether or
 not your intentions conflict with the restrictions, please contact the
 editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
 This publication is provided without charge to anyone who wants it.
 This includes, but is not limited to lawyers, government officials,
 cops, feds, hackers, social deviants, and computer hobbyists. If anyone
 asks for a copy, please provide them with one, or mail the subscription
 list so that you may be added.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  LET THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING ADVERTISE FOR YOU.

  Computer services, Online access, Books, Software, Video, Music, 
  Wierdness, Publishing, Hardware, Anything!

  For more information, send electronic mail to: rates@fennec.com
  You will be mailed a detailed list of rates and other information.
  
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  COMING SOON!!!  The Journal's own World-Wide Web Home Page. You will be
  notified by mail when it is ready for use.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 5

                          TABLE OF CONTENTS

 1)  The Next Thirty Years:  Sociolegal Implications 
     Of The Information Technology Explosion                Steve Ryan

 2)  Advertising On The Net                                 Fawn Fitter
 3)  Availability Of TJOAUC; Overseas Fido Gateways         Editors
 4)  Cyberpasse Manifesto                                   Don Webb
 5)  AA BBS Convicted!                                      Anon News Svc
 6)  Open Platform Under Threat By Monopoly Interests       Anonymous
 7)  House Opens Vote Results; HR 3937                      Shabbir Safdar
 8)  High-Speed Internet Access Expanded; Minnesota         Dennis Fazio
 9)  Internet Access Now Available For All Minn. Teachers   Dennis Fazio
 10) Legion Of Doom T-Shirt Ad                              Chris Goggans
 11) White House Retreats On Clipper                        Stanton McCandlish
 12) Why Cops Hate Civilians                                Unknown
 13) Public Space On Info Highway                           Ctr. Media Ed.
 14) Software Key Escrow - A New Threat?                    Tim May
 15) Hoods Hit The Highway                                  Charlotte Lucas
 16) The Internet And The Anti-Net                          Nick Arnett

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  The Computer Is Your Friend         -Unknown
  Send Money, Guns, And Lawyers       -H. S. Thompson

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                THE NEXT THIRTY TEARS:  SOCIOLEGAL IMPLICATIONS
                  OF THE INFORMATION TECHNOLOGY EXPLOSION

 By Steve Ryan (blivion@nuchat.sccsi.com)

  [EDITOR'S NOTE:  This is facinating reading! It is a college thesis
  written by an attorney who is a friend of the JAUC staff. Please
  keep in mind that it was written in *1980* and is a fantastic
  and accurate look into the future from his perspective in 1980.
  Feel free to mail the editors with any comments on this one and
  especially feel free to drop Steve a note with your opinions.]


 I do romance the law.  It's alive, it's vibrant, its' bubling. Every time 
 society tries something, we have new laws.

 --Hon. Jack Pope, Associate Justice Supreme Court of Texas

 INTRODUCTION

 The purpose of this paper is twofold.  First, an attempt is made to 
 acquaint the reader with current trends in computer technology which are 
 likely to have a major impact on American life in the forseeable future, 
 and to provide an overview of the staggering dimensions of the information-
 handling revolution now in progress.  Second, the response of the American 
 legal system to this explosive growth in the application of computer 
 technology is examined critically and areas of current and future legal
 concern are outlined.  No attempt has been made to provide an in-depth 
 legal analysis of the current state of the law in any single area;  
 the reader in search of such is reffered to the numerous excellent legal 
 periodicals presently published in this field.

 I.  DATA-HANDLING SYSTEMS OF THE FUTURE
 
 It is difficult to overstate the rapidity oand magnitude of the
 technological advances occurring every year in the data processing industry.  
 New developments and applications of those developments are announced with 
 bewildering rapidity.  Enormous amounts of dollars are poured into research 
 and development every year by the American data processing industry, and 
 the pace of change is so rapid that those who work with customers must keep 
 current or risk having their knowledge and skills become obsolescent within 
 a year or two.

 HARDWARE
 
 This near-exponential rate of technical progress can be quantiativley 
 expressed through several different conceptual "handles."  The number of 
 additions per second performed by computers in the U.S. every year grew by 
 three orders of magnitude (factor 1,000) between 1955 and 1965, and again 
 by the same factor in the decade 1965-1975.  This number appears to be still 
 growing at the rate of 100% per year.  Between 1955 and 1975 C. P. U.
 memory size shrank by over four orders of magnitude (factor 10,000) and 
 this trend continues.  Speed of operation has been rising more linearly, 
 at the rate of two orders of magnitude (factor 100) per decade, and the 
 ultimate limiting speed (dictated by the speed with which the electrical 
 impulses propagate through conductors) is still almost two and a one-half
 orders of magnitude away.  The cost of computer storage devices is plunging 
 at the rate of nearly three orders of magnitude per decade.  The density 
 with which intergrated circuit chips can be packed with electronic 
 components is now measured in the millions devices per square inch.  It 
 has been projected that during this decade the percentage of the gross 
 national product contributed by the data processing industry (broadly 
 defined) will outstrip that contributed by the auto industry.

 COMMUNICATIONS

 Similar advances have been occurring in the communications industry, 
 slashing the cost of maintaining computer-to-user and computer-to-computer 
 information links.  The major trends are development of satellite, fiber 
 optic, and laswer methods of data transmission.  As initially developed, 
 the cost to lease a 900-channel transponder on a satellite was between on 
 and one-half and two million dollars per year.  In the first half of this 
 decade , this cost is expected to drop to $250,000 per year.  The greatest 
 expense of satellite utilization is the cost of placing it in orbit; this 
 will become cheaper by at least this tak.  The new generation of satellites 
 launched by reusable shuttle will offer a greater number of data channels
 and perform switching functions as well as relay tasks; and all of this 
 greatly reduced cost.  Annual growth of data communiccations through the 
 middle of this decade is projected to be 35 percent.  Additionally, federal 
 deregulation of and new competitor entry into the communications industry 
 is expected to lower data communications costs in the future.

 ECONOMICS
 
 This author believes that the rapidly falling costs of computer hardware 
 and data links carry tremendous implications for the future.  Economic 
 barriers to computer utilization are falling, and the end result will be 
 an exlosive profilferation of small personal and business computers and 
 intelligent terminals in an incredible variety of application.  The 
 structure of business relations and transactions will change radically
 as corporate America discovers that they cannot afford not to utilize 
 the new technology.

 It will simply become bad business to process most transactions through 
 human hands and the mails in the form of paper of documents, when powerful 
 microprocessors having large memories are available for literally pennies 
 per chip.  Speed-of-light datalinks cheaply available for these machines 
 will eliminate time lags as a source of inefficiency and boost productivity.

 PERSONAL COMPUTING

 The same factors that make widespread use of data handling equipment 
 inevitable in the business world will also have the effect of placing 
 small, cheap computers by the millions in nonbusiness or personal 
 applications.  Computers are possibly the most versatile tool human beings 
 have ever invented to extend their capabilities.  Because they deal with 
 pure information, their potential applications are limitless, or rather
 limited only by the ingenuity of their users.  Nowhere is this more 
 evident than in the brand-new field of personal computers. For better or 
 worse, the personal computer revolution is upon us.  The first true 
 personal computer was brought out in 1974 by M.I.T.S. Corporation.  
 Baded on the Intel 8080 Comuter-on-a-chip, the Model T of microprocessors, 
 it was sold by mail in kit form for $420.00.  Customer response was 
 overwhelming, and M.I.T.S. was unable to to keep up with demand.  At the 
 time of this writing, six years later, the American consumer is the
 target of an enormous marketing effort for similar small computers mounted 
 by such corparate giants as Texas Instruments, Tandy Corp. (Radio Shack), 
 Sears & Roebuck, and a host of smaller competitors.  Clearly, these 
 corporations believe in the market for and future of home computing enough 
 to back their beliefs with large capital investments.

 The home computer, with appropriate interfaces and accessory hadware, can 
 play games, balance its owner's checkbook, optimize household energy usage, 
 play music, store information, show movies, do typing, draw pictures, 
 give its owner access to any database or other systems accessible by phone, 
 send mail, and let the cat out.  Some enthusiasts predict that the home 
 computer will remake our way of life as drastically as the automobiles, and
 will be the most explosive consumer product in human history, having a more 
 revolutionary effect than any other object ever sold.  it is also predicted 
 that home and personal uses of computers will dwarf the ordinary computer 
 industry within five or ten years, and will do IBM great economic harm by 
 destroying the IBM-fostered image of computers as enormous, centralized,
 horrendouly expensive machines requiring the services of a band of devoted 
 priest-programmers.  These things remain to be seen.  This author believes 
 that the most profound effects on American society created by the 
 microcomputer revolution will not be the result of dedicating small 
 computers to specific business and personal tasks but rather will result 
 from the ability of these countless small C.P.U.'s to communicate with
 one another economically.

 THE CONCEPT OF "THE NET"

 In recent years, as communication technology began to catch up with advanced 
 computer technology, a trend toward distributed computation has occured in 
 systems design.  Instead of a massive central computer linked to many 
 unitelligent I/O terminals, this new method of system architecture links 
 a number of central processing units into a network in which tasks can be 
 distributed to different locations for maximum efficiency in processing.  
 Networks are very efficient method of processing where the amount of 
 processing needed increases faster than the amount of data to be 
 transferred, and where a common specialized resouce is shared among 
 geographically desperesed end users.  Minicomputers linked into centralized
 computers in some applications, and they can be linked in such a manner that 
 individual minicomputers can fail without affecting the operational status 
 of the network.

 Given the above-forecasted situation of millions of small business and 
 personal computers linked by common inexpensive communications channels, 
 it is easy to see how a gigantic, highly flexible meta-network of 
 minicomputers could be said to exist.  The terms "network" and "distributed 
 processin" have customarily been used to refer to relatively small, 
 tightly interfaced groups of processors and are thus inadequate to use in 
 reference to such a huge complex of computers as would be formed by the 
 potential linkage of all the home and business computers of America.  
 Therefore the term "The Net" will be used in this paper to refer to such 
 a potential structure. This term has already gained currency with some 
 writers who are concerned with the social implicaitons of such an 
 electronic network.

 Persons who are fearful of suspicious of the advent of The Net for whatever 
 reason, and persons who doubt that such a broadly-based and widely linked 
 national (and transnational) EDP system wil become an operational reality 
 in the near future will no doubt be suprised and/or dismayed to learn
 that two private information utilities which demonstrate the feasibility 
 and usefulness of the Net concept are already on line and available to 
 minicomputer users today.  These are The Source and MicroNet, both about a 
 year old.  These services are accessed through telephone lines, which will 
 be the primary method of Net linkage until new technology make satellite-
 based or fiber optic linkage economically competitive with ordinary 
 landline and microwave channels.  Accessing these services augments the 
 computing power and usefulness of a home computer to and amazing extent. 
 By linking to a large mainframe, the small ones gain the power to program 
 in many languages ordinarily unavailable to them and gain the use of 
 utility programs such as word processors and text editors.  Large libraries 
 of generally applicable business and financial programs and data are 
 available to subscribers, as well as stock market information.  Also 
 available are game programs, UPI news wire service, New York Times news 
 service, and the New York Times Consumer Data Base, which abstracts over 
 60 publications.

 The flexibility and broad utility of even these fledgling Net Linkage 
 systems is demonstrated by other revolutionary services information 
 utilities offer.  The Source offers electonic mail service to its 
 subscribers; when users log on, the system notifies them of any messages 
 or mail it is holding for them.  Users of the Source can also call a program 
 named CHAT, which enables direct two-way between any users simultaneously 
 logged on.  MicroNet offers a fasicinating computerized version of CB radio 
 in which the user selects a numbered "Channel" which, in effect is a 
 "public airwave" of this small Net.  All users linked on the same channel 
 receive every message transmitted on that channel;  they can either join 
 the discourse or remain passive and watch the coversations of others on 
 their CRT.  A disadvantage is that like CB, two users cannot transmit on 
 the same channel simultaneously without mutual interference.

 The Source and MicroNet are privately operated for profit and charge the 
 subscriber for registration as a user and access time.  An alternative 
 mode of linking isolated home computers is provided by Computer Community 
 Bulletin Boards (CCBBS), of which there are well over one hundred operating 
 now in the U.S. These are free services operated by a variety of small 
 computer users and related organizations, and are rapidly growing in 
 popularity. Unlike the information utilities, which have phone exchanges in
 most large cities and therby spare their users high connect charges, CCBB 
 users must pay long distance charges unless the usefulness of CCBBs is 
 that no two-way communication is possible, only message posting within 
 the system.  The software package needed to establish a CCBB costs only 
 about $65.

 One final, rather ominous aspect of the commercial information utilities 
 is that it is required of applicants for user status to have a 
 Mastercharge or Visa card account for billing purposes. In other words, 
 person without identity in the presently existing credit subnet are denied 
 access to these new private Net components.  As the Net incorporates more 
 data-handling subunits into itself and becomes more ubiquitous in American 
 life, it may strike users as unfair and coercive to discover that routing 
 one's financial transactions through the Net is a necessary prerequisite 
 to enjoying certain limited uses and benefites of The Net.

 It is impossible to summarize or secribe all potential structures and 
 applications of the net likley to impact our society in the future because 
 of the amorphousness inherent in its conceptualization. For example, 
 although every EDP device capable of linking to the Net must be considered 
 a part of it, this linage may be "broad" or "Narrow": a sensitive 
 Government EDP file system with heavy security would be only narrowly
 accessible from other Net components, whereas an individual's personal 
 computer would of necessity be broadly accessible form almost all other 
 Net components because of the wide variety of functions it performs (mail, 
 entertainment access, retail buying and recordkeeping, phone message 
 functions, etc.).  As each new Net subunit goes online to the common Net, 
 that subunit must determine (1) what it wants from the rest of the Net, 
 and (2) what it is willing to make available to those who can now access
 it as part of the net.  Thus, considerations of function and security 
 determine what role each subunit will play in relation to The Net as a 
 whole, and these considerations will be different for each subunit.  
 The net must not be thought of as monolithic block of EDP devices joined 
 together, but rater as a vast and turbulent population of dicrete subunits 
 whose only common characteristic is a need for the efficient communication 
 and optimal use of EDP technology provided by The Net's linkage.

 The Net will be far more than a group of computers exchanging data and 
 software; widespread acceptance and utiliztion of Net linkage and 
 effieciency concepts will probably eventually result in the routing of 
 most current non-EDP methods of information transfer through the omnipresent 
 microcomputers. It will become inefficient and unnecessary to have a TV 
 set, or a newspaper, or a mailbox, or a radio in one's house when
 comprehensive Net access through an efficient, centralized home computer
 (whose sole design function is information handling) is just a keystroke 
 away.  One theme which home computer/Net enthusiasts frequently sound these 
 days is that the Net will solve the petroleum crisis by making ti largely 
 unnecessary for people to leave their homes.  Why drive to an office when 
 one can transact business, give a lecture, attend a class, generate 
 documents, transfer information, access a huge variety of data bases, and 
 receive all communications at one's home keyboard?  The Net has the 
 potential of becoming America's primary avenue of business and even social 
 interaction in the forseeable future.
 
 One troubling question occurs as we examin the social consequence of the 
 Net ethic of efficiency as the ultimate justification for change: what 
 happens to individuals who, for economic or personal reasons, cannot or 
 will not participate in the net society?  Unless non-net modes of 
 information handling are retained in all areas of Net pre-eminence, these 
 individuals run the risk of effectibely becoming non-persons.  One 
 solution to this problem would be govermental maintenece of free public 
 computer terminals, where those unfortunate enough to lack the cash or 
 hardware necessary for net access could perform the necessary interactions 
 with their electronic society.  Hopefully, net Participants will keep open 
 non-net channels of comminication to forestall the possiblity that the 
 information revolution will create two classes of American citizens: 
 Net-priviledged and invisible.  Property utilized, The Net can be 
 beneficial in countless ways.  But even if its use becomes a new norm,
 legal protection is necessary to ensure that no citizen suffers injury or 
 diadvantage as a result of failing to join The Net.  This writer believes 
 that economic considerations related to efficiency and the technology 
 revolution now occurring cannot fail to propel us willingly down the road 
 to a Net society, even in the face of the vague hostility most people feel 
 toward the increasing intrusion of computers into their lives.  The day
 may yet come when The Net is so central to American life that a person 
 excluded from access to it by State action might successfully argue in 
 court that his Constitutional rights to freedom of speech and assembly 
 have been effectively abrogated.


 II. AREAS OF CONTINUING LEGAL CONCERN

 PRIVACY

 Privacy will continue to be a controversial issue as computer technology 
 increases in impact on the daily life of Americans.  The magnitude of the 
 perceived threat to individuals created by computer recordkeeping will 
 increase as the system-to-system network of computer linkages expands.  
 The scope of future Federal protective legislation will almost certainly 
 extend to regulate private data collectors as well as governmental ones.

 Efforts have already been made in this direction. In 1974, Congressional 
 legislation was proposed containing provisions making all private personal 
 record systems subject to F.O.I.A.- type controls on collection, accuracy, 
 and dissemination.  This bill also set up a Federal Privacy Board to 
 monitor and enforce its provisions, and provided criminal penalties for 
 its violation as well as vibil remedies for persons injured by unfair 
 information practices.

 The gradual development of a Net-Type structure of data processors and 
 their associated databases will surely result in extreme public concern 
 about its possible harmful uses.  It is thus a certainty that such a 
 system would be very heavily regulated by the congress under its commerce 
 and "federal media" powers.  In fact, it is impossible to conceive of how 
 the public would tolerate the existence of such an intimidating system 
 without detailed privacy controls on it.  The Privacy Act of 1974 is only 
 the first halting step toward the creation of a comprehensive code of fair 
 information practices necessary to let Americans enjoy the benefits of 
 advanced computer technology without fear.


 PROTECTION OF ECONOMIC INTERESTS

 Since copyright protection of proprietary computer software is inadequate 
 to protect novel ideas and algrorithms incorporated therein, and since 
 the patenablility of software has been effectively denied by Supreme Court 
 ruling, further protection of substantial financial investments made in 
 the development of software would seem to be necessary in the future.  
 Common law and State statutory protection of such programs as trade secrets 
 will probably be inadequate in many respects to afford the degree of 
 protection necessary to encourage heavy corporate investment in software 
 research and development, as the industry grows in importance to all areas 
 of economic life.  Public policy will militate that further protection 
 be granted by explicit statutory means. The most logical way to go about 
 this would be by act of Congress, under either of the broad copyright or 
 commerce powers.

 Congress has already realized that the trend toward the use of Electronic 
 Funds Transfers and the computerization of economic activity will present 
 unknown problems in the future.  Current EFT legislation in force has 
 established a commission charged with the duty of evaluating the future 
 development of this area and reporting to the congress its findings and 
 conclusions.  Present legislation concering EFT can only be considered a 
 skeleton of what will eventually prove necessary.


 THE PROBLEMS OF ABUSE AND VULNERABILITY

 The wide linkage capabilities of the components of The Net coupled with 
 the computerization of business records and transactions creates an 
 enormous potential for abuse in a variety of ways.  Theft of CPU time and 
 software, manipulation of financial records, destruction of datafiles, 
 and even sabotage of whole systems are just a few of the potential abuses 
 that might occur.  Computer people often see the compromise of a security 
 system designed to prevenet unauthorized access as a challenging 
 intellectual game, and try it even without criminal motive.  Already, one 
 consequence of wide use of timesharing and networking techiniques is the 
 widespread acceptance of the ethic that any programs which may be found to 
 be somehow accessible from remote terminals can be treated as used as if 
 in the public domain (the "Peninsula Ethic").  Security problems are the 
 number-one concern in the design and establishment of The Net.  The Net 
 concept is unworkable without means of controlling access and limiting
 possible manupulations of data contained in Net subunits.  Due to its 
 flexibility of linkage, security control in the Net will not be physical 
 in nature but will be provided by confidential coding and password 
 techniques.  Although generally speaking, what one person can do, another 
 can undo, new "trapdoor" cryptological techniques have been discovered
 that make it possible to create an access control code system that cannot 
 be cracked even by computers in a reasonable amount of time.  This offers 
 hope for the feasibility of a fairly abuse-free Net.

 Still, no security system can be said to be totally proof against 
 compromise.  Prevention of abuse is the job of computer sercurity 
 specialist, but the law can play a large role in discouraging abuse by 
 imposing sanctions for it.  The currecnt Federal criminal law provisions 
 applicable to computer abuse are a hodge-podge of miscellaneous statutes 
 generally oriented around traditional fraud and misappropriation-of-
 property concepts that often present difficulties in application to 
 computer-related wrongful activity.  In the future it will become necessary 
 to greatly refine our collective societal concepts of what contitutes 
 impermissible conduct in relation to computers and their manifold 
 applications.  The deterrent effect on persons tempted to misuse the vast 
 capbilities of computers would be greatly enhanced by the passage of 
 legislation targeted specifically at computer abuse rather than framed in 
 terms of traditional concepts of wrongdoing like fraud, theft, and 
 misappropriation.  Prosecutors, when confronted by an instance of computer 
 abuse that clearly has damaged someone in a criminal manner, should not be 
 forced to search among and "stretch" the applications of the miscellaneous 
 batch of statutory provisions enacted when computers were a laboratory 
 curiosty.

 Response to this problem has been made be Senator Abraham Ribibcoff of 
 Connecticut, the Charman of the Senat Governmenatal Affairs Committee.  
 In 1977, he sponsered legislation entitled The Federal Computer Systems 
 Protection Act of 1977,which has never been enacted.  This proposed law 
 provides comprehensive santions against (1) introduction of fraudulent 
 records into computer systems, (2) improper alteration of destruction of 
 computer records, (3) unauthorized use of computer facilities, and (4) use 
 of computers to steal property of data.  The bill was drafted to apply to 
 all computer systems used in interstate commerce, and not just those in
 use by the Federal Governmet.  Additionally, the measure eases the 
 jurisdictional and evidentiary burdens on prosecutors that make prosecution 
 of computer crime so difficult. Specific thought was given by the framers 
 of this legislation to the problems of unauthorized access and to the need 
 to assure the integrity of the growing EFTS network.  This bill is an 
 outstinding attempt to deal now with the computer abuse problems that will 
 become increasingly more threatening in the future, and it is an excellent 
 example of how the response of the legal system should aggressively track 
 the pace of technological development.

 CONCLUSION

 The next thirty years will be a time of swift and revolutionary change in 
 American life related to computer usage on an uprecedented scale.  At this 
 point in time, the emerging outline of the social and legal changes this 
 will inevitably cause are visible.  The first halting steps have been
 taken by congress to enact legislation dealing with the problems caused 
 by these changes, but the pace of progress is so rapid that there is 
 substantial time lag between the time a problem comes into existence and 
 the time our legal system turns its attention to the necessary solution.  
 This lag time must be reduced by increased awareness of the capabilities
 and coming applications of computers on the respective parts of legislators, 
 attorneys, and judges; it is the duty of the legal system to serve the 
 needs of its society, and our society cannot wait until tomorrow to be 
 given the legal safeguards and processes it needs today in the area of 
 data processing.
      
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                         ADVERTISING ON THE NET

 By Fawn Fitter (fsquared@netcom.com)
 This article is copyright 1994 by Fawn Fitter

 A cybersavvy business owner could be forgiven for thinking of the 
 Internet as an advertising opportunity like no other. After all, the Net, 
 with its 6,000 discussion groups known as "newsgroups," connects -- at 
 last count -- 2 million sites in 60 countries. That's 10 million 
 potential customers already self-sorted into 6,000 demographic slots, a 
 thought to make marketing executives weep with joy. 
 
 But while many commercial online services like CompuServe and Prodigy 
 have built electronic shopping malls where virtual vendors peddle their 
 wares, advertising is a touchy subject on the Internet itself. 
 
 Originally, commercial messages were banned on the government-funded 
 portions of the Net. Today, while they aren't forbidden, they are still 
 highly controversial. A practice known as "spamming" -- posting a message 
 to all 6,000 newsgroups at once -- has infuriated longtime citizens of 
 cyberspace.
 
 Not long ago, two Phoenix attorneys "spammed" the Net with a long post 
 touting their expertise in U.S. immigration law. Mere weeks later, 
 another advertiser followed suit, shilling thigh-reducing cream in every 
 group from alt.pagan to comp.sys.mac.advocacy. Both were kicked off their 
 respective Net access providers for inappropriate use.
  
 "The problem is not content, it's the appropriateness of the forum where 
 the ad appears," explained Mike Godwin, staff counsel for the Electronic 
 Frontier Foundation, which focuses on public interest and civil liberties 
 issues as they relate to computer communications. "The value of the 
 newsgroups lies in their being organized by subject matter. 'Spamming' is 
 like reshelving all the books in a library -- the information is there, 
 but it's impossible to find what's valuable."
 
 Although indiscriminate salesmanship is frowned upon, there are still 
 ways to advertise online without crossing the bounds of netiquette. The 
 simplest way is to keep ads short and tasteful, indicate in their subject 
 headers that they are advertisements so people can skip them if they so 
 choose, and post them only to appropriate groups. In other words, a legal 
 advice newsgroup is the wrong place for an ad for couples workshops.
 
 Signature files, which provide a tagged-on signature (or .sig, pronounced 
 "dot-sig") at the end of a user's post, are another inoffensive and 
 discreet way to promote a product or service provider. Many programmers 
 and consultants identify themselves in their .sigs, which are 
 automatically appended to their every post in any group they frequent.
 
 The now-infamous "green card lawyers" have been dumped unceremoniously 
 from several online systems and have been refused accounts by others. 
 Despite the furor against them, they've defended their actions in 
 postings and newspaper articles by claiming that mass-distributed 
 advertising on the Net is convenient and therefore inevitable. They've 
 even started their own Internet marketing company, Cybersell, to bring 
 that day closer. One of the lawyers argued on CNN that "spamming" was 
 like "picking up the newspaper and getting advertisements along with the 
 sports pages."
 
 But Howard Rheingold, author of The Virtual Community and a well-known 
 defender of the Net, thinks it's more like "going to your mailbox and 
 finding two letters, a magazine, and 65,000 pieces of junk mail, 
 postage-due."
 
 The Net works because people agree to give each other the minimal amount 
 of cooperation necessary to keep information flowing in a free but 
 organized way, Rheingold explained. "IIf people don't abide by an 
 agreement to limit discussion to the appropriate group, the groups lose 
 their function, and there will be no value in the system any more," he 
 said. But, he added, "the day will pass when sleazebags who try to take 
 advantage of the openness of the system will be shut out."
 
 Rheingold is executive editor of HotWired, an online magazine being 
 launched this fall by the publisher of WIRED. HotWired will bring in 
 revenue by soliciting "sponsors" rather than "advertisers," as the Public 
 Broadcasting System does, he said.
  
 In the future, advertisers may also spread the word by subsidizing 
 people's net usage, Godwin said. "They may say, 'look at our ads in 
 e-mail and we'll give you an hour's free online time'," he speculated. 
 "No one's actually done it yet, but companies are thinking about it."

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                      AVAILIBILITY OF THIS MAGAZINE
                   A Message from the editorial staff

      OVERSEAS FIDONET GATEWAYS NO LONGER SUPPORTED BY THIS MAGAZINE!

   We will do everything in our power to get this publication to you in
 a timely manner. And we certainly appreciate the hundreds of subscription
 requests that we have received. There is one slight issue regarding the
 distribution of this magazine that we must address. This new policy will
 take effect immediately.

 It is no longer feasable for us to add people to the mailing list who have
 OVERSEAS FIDONET GATEWAYS. The reason for this is that some administrators
 who operate these gateways are getting irate with the amount of traffic
 coming through their systems from the USA in the form of large electronic
 magazines. 

 AS LONG AS YOUR E-MAIL ADDRESS DOES NOT HAVE A "%" IN IT, YOU'RE OK!

 The second reason is that our mailing system may not handle the address
 line properly due to the fact that Fido addresses overseas are usually
 very long.

 We are currently working on a way to set up an automatic mailing list
 for those who do fit into this catagory so that you can have the magazine
 mailed back to you when you know that the traffic in your area will be low.
 We will update you as the situation develops.

 Thank you for your understanding.
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                           CYBERPASSE MANIFESTO

 By Don Webb (0004200716@mcimail.com)
 This has no Copyright, and may be reposted at will.

 We have long awaited the moment to release our manifesto, so that we would 
 not appear guilty of the sin of vanguardism.  Since Bart Nagle has noted 
 that book publishers now note books bearing the suffix "Cyber" in the 
 title passe, we realize that it is time to strike while the iron is cooling.  
 The Cyberpasse movement began on October 8, 1966 when the BBC aired *The 
 Tenth Planet* -- part of their popular %Dr. Who% series.  The Cybermen have 
 replaced their natural bodies with plastic and thus have become disease free 
 and nearly immortal.  They represent the ideal of the Cyberpasse movement.  
 Cyberpasse will overtake cyberpunk, because we created it as a front.  
 The movement has great wealth and power, and is an open conspiracy.  Any
 number may play, provided that they obey the Cyberlaws.  We are the rulers 
 of the world, the makers of the zeitgeist, and the oatmeal of reality.
 
 These are the Cyberlaws, the key to Cyberpasse:
 
 1.  You must own a computer.  It must be a boring computer with lots of 
     capacity for upward and downward networking.  You favorite phrase is 
     "The computer is a tool." You must pretend incompetence with your 
     computer, so that people explain things for you, and do things for you. 
     Thus you learn to tap the skills of lots of experts.
 
 2.  You must belong to a frequent flyer plan.  You'll travel a lot to see 
     other Cybermen.  You must own a futon to put up traveling Cybermen.  
     You must make your visitors look as boring as possible, so as not to 
     tip off your neighbors that you are a planetary ruler.
 
 3.  You must appear dull.  This is essential.  Everyone must view you as a 
     harmless amateur.  You must practice perfect manners, so you don't get 
     thrown out of places for being too dull.
 
 4.  You must foster a myth of a long-term illness. 
     Thusly you can call in sick for work, whenever a learning opportunity 
     presents itself.  Knowledge is power.
 
 5.  You must You must place yourself in the middle of various webs of 
     information.  Always share information, but always filter to extend 
     the Cybervalues of logic, and of slow and steady change.  You must deny 
     that you are trying to improve the world, as always appear to be a 
     shambling slow witted machine that just happens to pass along the
     correct information at one time.  Remember humans are hostile to change 
     agents.
 
 6.  You must make sure that they're a lot of cutting edge movements around 
     to draw fire.  As a long term way to secure this, be sure and strongly 
     support civil liberties issues.
 
 7.  You must always deny the importance of new information technologies. 
     This is not to stifle, but to make people think they are harmless. Always 
     argue that there is nothing new going on.  This will make people, less 
     likely to fear/resist certain changes.
 
 8.  You must act every day to bring about the change into a cybersociety.  
     Each act must may be downplayed, but it must be constant and quiet.  
     Accumulate power to make your actions a little stronger.  Afterall the 
     boss can OK the T1 phone lines for the business, and she can allow
     personal Email accounts.  Always have a boring explanation, economy, 
     efficiency, whatever.  But be sure you never allow a step backward.
 
 9.  You must deny there is an organized Cyberpasse movement.  Even to 
     yourself.
 
 10.  You must seek allies in all areas of society. 
  
 11.  You must never act in anger, but only with logic
      and harmonious feelings.  Our battles are not the day to day battles 
      of the news.  Our battle is that of the vegetable empire vast and slow.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                           AA BBS - CONVICTED !

 MEMPHIS, Tenn -- A federal jury convicted a California couple Thursday 
 of transmitting obscene pictures over a computer bulletin board.

 The case has raised questions, in this age of international computer 
 networks, about a 1973 U.S. Supreme Court ruling that defines obscenity 
 by local community standards.

 ``This case would never have gone to trial in California,'' defense lawyer 
 Richard Williams said.

 Prosecutor Dan Newsom, an assistant U.S. attorney, said the trial was the 
 first he knows of for computer bulletin board operators charged under federal 
 law with transmitting pornography featuring sex by adults.

 Robert and Carleen Thomas, both 38, of Milpitas, Calif., were convicted of 
 transmitting sexually obscene pictures through interstate phone lines via 
 their members-only Amateur Action Bulletin Board System.

 The Thomases were convicted on 11 criminal counts, each carrying maximum 
 sentences of five years in prison and $250,000 in fines.

 Thomas was acquitted on a charge of accepting child pornography mailed to him 
 by an undercover postal inspector.

 The Thomases refused to comment after the verdict. They remain free on 
 $20,000 bond to await sentencing, for which no date was set.

 Williams said his clients will appeal, arguing the jury was wrongly 
 instructed on how to apply the Supreme Court's standard on obscenity.

 The trial raised questions of how to apply First Amendment free-speech 
 protections to ``cyberspace,'' the emerging community of millions of 
 Americans who use computers and modems to share pictures and words on every 
 imaginable topic.

 Williams argued unsuccessfully before trial that prosecutors sought out a 
 city for the trial where a conservative jury might be found.

 During the weeklong trial jurors were shown photographs carried over the 
 Thomases' bulletin board featuring scenes of bestiality and other sexual 
 fetishes. Williams argued this was voluntary, private communication between 
 adults who knew what they were getting by paying $55 for six months or $99 
 for a year.

 Their conviction also covers videotapes they sent to Memphis via United 
 Parcel Service. The videotapes were advertised over the bulletin board.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

          OPEN PLATFORM UNDER THREAT BY MONOPOLY INTERESTS!!!

 Anonymously Submitted

 First off, I apologise for sending this anonymously, but my company is
 sufficiently close to the center of this dispute that the usual personal
 disclaimers would not be enough.  We have to do business with these people
 and public criticism of them could lead to disconnexion and the collapse of
 our business. 

 Recently the CIX Association (a Non-Profit 501(c)6 Trade Association) has
 chosen to make a change to its policies that will make entry into the
 internet extremely hard if not impossible for small companies or individuals
 or cooperatives. 

 Some background:  first there was the Arpanet, and it was for government
 organizations and academics only.  Slowly, private companies attached to the
 Arpanet, but only when they had legitimate reasons to communicate with the
 government organizations they connected to.  Soon, enough private
 organizations were connected that they saw advantages in talking to each
 other, and they put in direct links to each other because they couldn't
 transit the NSF backbone.  Sometimes the connexion agreements for these
 links were informally ad-hoc, other times the people connecting would come
 to a 'settlement agreement'.  This meant that at the end of each year, they
 would work out the net flow of traffic over their link, and the side that
 got the most benefit from it was contracted to pay the other side a cash
 settlement.  

 There were the bad old days, and getting full connectivity to non-academic
 sites by making lots of individual connexions was expensive.  

 Then along came the group of big companies who formed the CIX.  They wrote a
 contract that said that members would route each others packets without
 settlement.  People still made their own arrangements about who they
 physically connected to, and their share of the cost of the wire etc, but
 once connected, they could send packets to _anyone_ who was a
 mutually-connected CIX member.  And just to make sure there weren't pockets
 of unconnected members, every member had also to make sure they had a
 working path to the CIX backbone.  That way A could talk to B even if it
 meant going all the way to the CIX backbone in Falls Church VA.  

 In fact, most of the big vendors have direct connexions to each other, and
 the CIX backbone itself is seldom transited.  It's not an expensive or long
 wire--just a couple of routers in Falls Church.  

 Now, the arrangement that CIX has decided to enforce as of November is that
 they will route for their clients, and people directly connected to their
 clients, but not people a step further downstream than that.  Which means
 that the clients of CIX clients who re-sell services will have to become
 members of the CIX themselves, at a cost of $10000. 

 This isn't small change for the majority of sites that it affects, and it is
 particularly insidious in that it halts completely the process that was
 beginning to take place where bandwidth would be split into smaller and
 smaller units by smaller and smaller enterprises, until you got down to the
 level of a guy in his garage running 6 modems on his PC allowing access to
 local people over his SLIP or PPP line to his own access provider down his
 v.fast modem, that would be a small company running a 56K line up to their
 access provider, who might be a medium company running a T1 to a big
 provider. 

 With this change in policy, "Mom & Pop" internet connexions are no longer
 possible.  The game is for big players only.  And I mean BIG--calculations
 show that to reach break-even, a new vendor needs something like 400
 customers from the start.   

 The CIX board justifies their change in policy by claiming it will actually
 increase mutual interconnectivity, by adding more people to the communal
 interoperability agreement.  However, the facts are that the downstream
 sites who are affected by this would have routed all packets going through
 them anyway.  It is, quite simply, an attempt by the big players to lock the
 small players out of the market, to consolidate their oligarchy.  And the
 fact that they'll be collecting many many more $10,000 annual fees has not
 gone unnoticed either. 

 This is one area where government interference _to ensure interoperability
 only and to stop restrictive practises_ would be welcome by we smaller
 players.  All that the CIX contributes is a piece of paper saying that
 people will cooperate--the cost of their hardware is small beer.  People
 who are in the CIX have an incentive to stay in because it keeps the
 competition out.  People outside the CIX _could_ make their own mutual
 care because we can afford the fees (almost), and
 it keeps out up and coming competitors.  I don't feel this way, which is why
 I'm posting, and why I have to post anonymously.  But then, I don't own the
 company.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

          HOUSE RULES VOTE RESULTS; HR 3937 A DEAD END THIS YEAR

 By Shabbir J. Safdar (shabbir@panix.com)
 Organization: Voters Telecomm Watch (vtw@vtw.org)


 INTRODUCTION

 Voters Telecomm Watch keeps scorecards on legislators' positions on 
 legislation that affects telecommunications and civil liberties.
 If you have updates to a legislator's positions, from either:

        -public testimony,
        -reply letters from the legislator,
        -stated positions from their office,

 please contact vtw@vtw.org so they can be added to this list.

 General questions:      vtw@vtw.org
 Mailing List Requests:  vtw-list-request@vtw.org
 Press Contact:          stc@vtw.org
 Gopher URL:             gopher://gopher.panix.com:70/11/vtw
 WWW URL:                We're working on it. :-)

 RESULT OF THE HOUSE RULES COMMITTEE VOTE ON HR 3937

 Based on information gathered by volunteers, we've been able to
 piece together some of the positions of the House Rules Committee
 as to how they voted for/against opening up HR 3937 to amendments on
 the House floor.  [This is now somewhat moot, as is explained in the
 next section.]

 Extensive kudos go to
        Joe Thomas <jthomas@pawpaw.mitre.org>
        gaj@portman.com (Gordon Jacobson)
 who both did extensive work to help find this information.

 Here are the results we were able to obtain:

        [The committee voted 5-4 to open the bill]

                HOUSE RULES COMMITTEE MEMBERS

   Dist ST Name, Address, and Party       Phone            
   ==== == ========================       ==============  
      9 MA Moakley, John Joseph (D)       1-202-225-8273  
        UNSPECIFIED POSITION

      3 SC Derrick, Butler (D)            1-202-225-5301 
        UNSPECIFIED POSITION

     24 CA Beilenson, Anthony (D)         1-202-225-5911
        UNSPECIFIED POSITION

     24 TX Frost, Martin (D)              1-202-225-3605 
        UNSPECIFIED POSITION

     10 MI Bonior, David E. (D)           1-202-225-2106
        UNSPECIFIED POSITION

      3 OH Hall, Tony P. (D)              1-202-225-6465
        UNSPECIFIED POSITION

      5 MO Wheat, Alan (D)                1-202-225-4535
        UNSPECIFIED POSITION

      6 TN Gordon, Bart (R)               1-202-225-4231
        UNSPECIFIED POSITION

     28 NY Slaughter, Louise M. (D)       1-202-225-3615
        Voted "open"

     22 NY Solomon, Gerald B. (R)         1-202-225-5614
        Voted "open"

      1 TN Quillen, James H. (R)          1-202-225-6356
        Told a constituent he would vote for "open".

     28 CA Dreier, David (R)              1-202-225-2305
        UNSPECIFIED POSITION

     14 FL Goss, Porter J. (R)            1-202-225-2536
        UNSPECIFIED POSITION

 It is probably not worth the trouble to ask the remaining legislators
 how they voted unless you happen to chat with their staff often. 

 STATUS OF THE BILL (updated 7/21/94)

 If you read the appropriate newsgroups (or any major newspaper) you've
 seen the news about the Gore/Cantwell compromise.  Since everyone
 has reprinted it already, we'll not reprint it again, though we'll
 happily send you a copy should you have missed it.

 The upshot of this is that Rep. Maria Cantwell will not be offering
 her amendment and therefore HR 3937 is a dead end this year for
 liberalizing cryptography exports.  Since VTW is an organization dedicated
 to working on legislation, and there is no longer a piece of relevant
 legislation, we will be concentrating on other projects.  The "cantwell"
 section of our archive will be reworked, and the records of legislators
 that voted will be kept there for future reference.  [NOTE: these
 voting records will also be rolled into our 1994 Voters Guide]

 Here is the final schedule/chronology of the bill

 Jul 21, 94  Rep. Cantwell and Vice Pres. Al Gore compromise on seven
             principles, retreating on the Clipper chip; Rep. Cantwell
             chooses not continue to press the legislation or the amendment
             (see relevant articles in today's NY Times and Washington Post)
 Jul 20, 94  HR3937 comes to House floor; a "good" amendement will be offered
 Jul 11, 94  House Rules Committee marks HR3937 "open"; allowing amendments
 Jun 30, 94  [*** vote postponed, perhaps till the week of 7/11/94]
             House Rules Comm. decides whether to allow amendments
             on the bill when it reaches the House floor 
 Jun 14, 94  Gutted by the House Select Committee on Intelligence 
 May 20, 94  Referred to the House Select Committee on Intelligence 
 May 18, 94  Passed out of the House Foreign Affairs Committee on May 18
             attached to HR 3937, the General Export Administration Act
 Dec  6, 93  Referred to the Subcommittee on Economic Policy, Trade and
 Nov 22, 93  Referred to the House Committee on Foreign Affairs.

 1994 VOTERS GUIDE

 Voters Telecomm Watch believes that you should be informed about your
 legislators' positions on key issues.  We will be developing a survey
 to give to current legislators and their challengers that will gauge
 their positions on key issues involving telecommunications and civil
 liberties.  These results will be made publicly available on the net
 for you to use in casting your vote in November.

 We'll be depending on you to help get legislative candidates to fill
 out and return their surveys.  Please watch this space for the
 announcement of survey availability in the coming weeks.

 If you wish to participate in the development of the survey, feel free
 to join the working list by mailing a note to that effect to 

                       vtw@vtw.org

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

      HIGH-SPEED INTERNET ACCESS EXPANDED THROUGHOUT MINNESOTA

 By Dennis Fazio (dfazio@mr.net)

 Contact:
 Dennis Fazio, Executive Director
 Minnesota Regional Network
 511 11th Avenue South, Box 212
 Minneapolis, MN 55415
 (612) 342-2890
 dfazio@MR.Net

 Minneapolis, MN, July 18, 1994 -- The Minnesota Regional Network (MRNet), a
 nonprofit corporation that provides connections to the burgeoning world-wide
 Internet in Minnesota, has implemented a major statewide expansion by
 installing several additional access sites around the state using a new data
 transport technology called Frame Relay. This new technology is available as
 a regular service by US West?s !nterPRISE Networking Services division. It
 allows MRNet to expand its central hub sites, which are locations where many
 customer connections are gathered together, to the four corners of
 Minnesota, providing a more economical means of connection for colleges,
 schools, libraries, government agencies and businesses in any city or town
 in the state.

 The Internet, a high-speed network of networks, is a current major component
 of what is coming to be called the "Information Superhighway". It is
 composed of a multitude of computer and information networks including
 international links, national backbones, regional and state distribution
 networks and campus or corporate networks. These are all connected in a
 seamless whole creating an information infrastructure containing several
 million individual computers used by ten to twenty million people around the
 globe. In Minnesota, the Minnesota Regional Network or MRNet, is the primary
 statewide distribution network for Internet access.

 "The deployment of these new network switching technologies has the
 potential to revolutionize the creation of wide-area networks," says Dennis
 Fazio, Executive Director of MRNet. "It has reduced the cost of providing
 high-speed connections to customer sites, not only within the US West Frame
 Relay service areas, but even in the outlying towns beyond the suburbs and
 in between the major state metropolitan areas." 

 Previously, point-to-point phone circuits had to be connected and expensive
 multi-port hub equipment installed in hub sites. Frame Relay service allows
 MRNet to install smaller less complex and less expensive equipment since the
 aggregation of traffic from multiple customer connections is done within US
 West?s switching equipment. It is necessary to only have a single connection
 from the hub site into the Frame Relay service. Additionally, the end-site
 connection links are less expensive, since they now only need a termination
 point at the customer's site. The other end of the link is brought directly
 into the Frame Relay system and doesn?t incur any termination charges, which
 are the most expensive portion of a digital circuit. This means that it is
 now more economical to cover the entire state by extending links to the
 nearest Frame Relay service area than it is to distribute many more hubs to
 cover the large number of communities necessary to provide full state-wide
 access. Finally, Frame Relay service is a much higher quality of service,
 since all links are monitored and maintained 24 hours a day by US West?s
 advanced engineers and technicians.

 With this new expansion, MRNet can provide lower cost direct Frame Relay
 access in Duluth, Hibbing, Thief River Falls, Bemidji, Brainerd, Moorhead,
 Willmar, St. Cloud, Marshall, Owatonna and Rochester in addition to the Twin
 Cities metro area. Those towns outside these areas can be served by
 extending a link to one of these 12 distributed sites. 

 MRNet has established partnerships with the University of Minnesota in the
 Twin Cities and Duluth and the Minnesota State University System to share
 long distance trunk lines, which bring the outstate traffic to the Twin
 Cities for forwarding to the Internet, and to obtain space to house
 equipment.

 Beyond this initial new deployment, plans are being put in place to expand
 local calling access for dialup subscribers in other parts of the state.
 This will provide lower-cost links to the Internet for individuals and small
 organizations who cannot yet justify the effort and expense of a high-speed
 digital link. Presently, local calling access is available in the Twin
 Cities, Rochester and St. Cloud. Toll-free access is already available to
 Minnesota educators in all parts of the state through the InforMNs
 demonstration project, a joint effort implemented by MRNet, TIES and the
 Minnesota Department of Education. This effort is partially subsidized by
 the state to provide equal access to all state educators. There are now
 about 1,000 subscribers on the InforMNs system. 

 The ability to provide this state-wide network expansion was helped in part
 with funds from the National Science Foundation via a grant to CICNet, a
 regional network comprised primarily of the Big-10 Universities in which
 several state networks including Minnesota, Wisconsin, Iowa, Illinois,
 Michigan and Indiana participated. This was a for a project titled "Rural
 Datafication" whose purpose was to extend Internet access to areas not
 easily served in the major metropolitan areas. 

 The Minnesota Regional Network is an independent member-based nonprofit
 corporation that has been providing access to the Internet since 1988. Its
 mission is to enhance the academic, research and economic environment of the
 state through the use of computer and information networks. It is the
 leading provider of Internet access in Minnesota and now has more than 100
 colleges, universities, libraries, school districts, nonprofit
 organizations, government agencies and businesses listed as connected
 members. Additionally, over 250 individuals and small organizations or
 businesses have access via various forms of dialup connections. MRNet works
 cooperatively with the state?s higher education community, the state
 government and several other service organizations of all types to expand
 and increase the level and quality of world-wide network access for the
 improvement of education, general research and commercial business
 operations.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

       INTERNET ACCESS NOW AVAILABLE FOR ALL MINNESOTA TEACHERS

 By Dennis Fazio (dfazio@mr.net)


 MINNEAPOLIS-ST. PAUL, MN, July 24, 1994 -- Nearly 1,000 Minnesota teachers
 are cruising the information superhighway this summer via InforMNs -
 Internet for Minnesota Schools, a service offered to K-12 educators
 throughout the state.  Using the direct full-function access to the Internet
 that InforMNs provides, teachers browse through on-line databases and
 library catalogs around the world; they have access to U.S. government
 information from a number of agencies including NASA, the Department of
 Education, and the National Institutes of Health; and they share lesson
 plans, ideas for more effective teaching, and thematic classroom activities
 with other teachers and students. 

 For instance, the Wolf Studies Project of the International Wolf Center in
 Ely, Minnesota allows students and teachers around the world to hear, see,
 and track radio-collared wolves in the Superior National Forest via the
 Internet.  They can read reports, see pictures and video images, and hear
 sound files about the wolves' movement and activity that are posted on the
 Wolf Studies Project Gopher server.  In another project, students and
 teachers in Minnesota have been exchanging electronic mail with their
 counterparts in Kamchatka, Russia for the past year.  This August the
 Kamchatka Ministry of Education is sponsoring the Second Annual Educational
 Travel Seminar to the Russian Far East with the help of the Minnesota
 Global Education Resource Center.  These kinds of resources and activities,
 and the communication that happens between people, are what make the
 Internet what is -- a worldwide network of computers, resources, and the
 people that use them.

 InforMNs is available to teachers, administrators, and staff from any
 school district, public or private, in Minnesota.  Subscriptions run for a
 12-month period and can start at any time.  The fee is $20 per month, paid
 annually, and provides up to 30 hours of toll free access per month. 
 Software, user guides, and a toll free helpline for on-going support are
 included.  In addition, the InforMNs service provides one day of training
 for one person in each subscribing school building to prepare that person
 to give on-site assistance to his or her colleagues.  To subscribe or for
 more information, call InforMNs at (612) 638-8786 or send email to
 howe@informns.k12.mn.us.  

 InforMNs is funded in part by an appropriation from the state legislature
 to the Minnesota Department of Education (MDE) to provide Internet access
 to all Minnesota schools.  The appropriation subsidizes the cost of
 providing the service so that toll free dial-up access is ensured from any
 school in the state, regardless of its location.  Of the 1,000 subscribers,
 approximately half connect to the network via local calls in St. Cloud,
 Rochester, and the Twin Cities, and half use the InforMNs 800 toll free
 access number.  

 In addition to toll free access, InforMNs subscribers receive all the
 software they need to connect their Macintosh or IBM-compatible personal
 computers directly to the Internet.  After making a dial-up connection with
 an ordinary phone line and a modem, the InforMNs user's computer becomes
 one of the estimated two million computers now on the Internet worldwide. 
 This method of connection differs from the more familiar link to a bulletin
 board system or on-line service like Compuserve, where the user's access to
 the Internet is relayed through a central computer operated by the bulletin
 board owner or on-line service provider.  The InforMNs direct connection
 allows teachers to use all the features and resources available on the
 Internet including news groups, discussion lists, electronic mail,
 Gopher-organized resources, the World Wide Web, and file transfer. 
 Information flows from a distant Internet repository directly to the user's
 own Macintosh or PC.

 The InforMNs service is provided by a partnership of the Minnesota
 Department of Education, the Minnesota Regional Network (MRNet), and
 Technology Information and Educational Services (TIES).  In addition, the
 University of Minnesota and the Minnesota State University System (MSUS)
 share use of their telecommunications infrastructure with the project, and
 InforMNs was launched with the support of the Minnesota Educational Media
 Organization (MEMO) and the Project for Automated Libraries (PALS) at
 Mankato State University.

 For more information, contact:
 Marla Davenport, davenpo@informns.k12.mn.us, (612)638-8793
 Margo Berg, mberg@mr.net, (612)724-2705

 InforMNs - Internet for Minnesota Schools
 2665 Long Lake Road, Suite 250
 Roseville, MN  55113-2535

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                       LEGION OF DOOM T-SHIRTS

 By Chris Goggans <phrack@well.sf.ca.us>

 After a complete sellout at HoHo Con 1993 in Austin, TX this past
 December, the official Legion of Doom t-shirts are available
 once again.  Join the net luminaries world-wide in owning one of
 these amazing shirts.  Impress members of the opposite sex, increase
 your IQ, annoy system administrators, get raided by the government and
 lose your wardrobe!
 
 Can a t-shirt really do all this?  Of course it can!
 
 
 "THE HACKER WAR  --  LOD vs MOD"
 
 This t-shirt chronicles the infamous "Hacker War" between rival
 groups The Legion of Doom and  The Masters of Destruction.  The front
 of the shirt displays a flight map of the various battle-sites
 hit by MOD and tracked by LOD.  The back of the shirt
 has a detailed timeline of the key dates in the conflict, and
 a rather ironic quote from an MOD member.
 
 (For a limited time, the original is back!)
 
 "LEGION OF DOOM  --  INTERNET WORLD TOUR"
 
 The front of this classic shirt displays "Legion of Doom Internet World
 Tour" as well as a sword and telephone intersecting the planet
 earth, skull-and-crossbones style.  The back displays the
 words "Hacking for Jesus" as well as a substantial list of "tour-stops"
 (internet sites) and a quote from Aleister Crowley.
 
 All t-shirts are sized XL, and are 100% cotton.
 
 Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for
 postage.
 
 Send checks or money orders.  Please, no credit cards, even if
 it's really your card.
 
 
 Name:       __________________________________________________
 
 Address:    __________________________________________________
 
 City, State, Zip:   __________________________________________
 
 
 I want ____ "Hacker War" shirt(s)
 
 I want ____ "Internet World Tour" shirt(s)
 
 Enclosed is $______ for the total cost.
 
 Mail to:   Chris Goggans
            603 W. 13th #1A-278
            Austin, TX 78701
 
 
 These T-shirts are sold only as a novelty items, and are in no way
 attempting to glorify computer crime.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                     WHITE HOUSE RETREATS ON CLIPPER

 By Stanton McCandlish (mech@eff.org)

 Yesterday, the Clinton Administration announced that it is taking several
 large, quick steps back in its efforts to push EES or Clipper
 encryption technology.  Vice-President Gore stated in a letter to
 Rep. Maria Cantwell, whose encryption export legislation is today being
 debated on the House floor, that EES is being limited to voice
 communications only.

 The EES (Escrowed Encryption Standard using the Skipjack algorithm, and
 including the Clipper and Capstone microchips) is a Federal Information
 Processing Standard (FIPS) designed by the National Security Agency, and
 approved, despite a stunningly high percentage anti-EES public comments on
 the proposal) by the National Institute of Standards and Technology.  Since
 the very day of the announcement of Clipper in 1993, public outcry against
 the key "escrow" system has been strong, unwavering and growing rapidly.

 What's changed?  The most immediate alteration in the White House's
 previously hardline path is an expressed willingness to abandon the EES
 for computer applications (the Capstone chip and Tessera card), and push
 for its deployment only in telephone technology (Clipper).  The most
 immediate effect this will have is a reduction in the threat to the
 encryption software market that Skipjack/EES plans posed.  

 Additionally, Gore's letter indicates that deployment for even the telephone
 application of Clipper has been put off for months of studies, perhaps
 partly in response to a draft bill from Sens. Patrick Leahy and Ernest
 Hollings that would block appropriation for EES development until many
 detailed conditions had been met.

 And according to observers such as Brock Meeks (Cyberwire Dispatch) and
 Mark Voorhees (Voorhees Reports/Information Law Alert), even Clipper is
 headed for a fall, due to a variety of factors including failure in
 attempts to get other countries to adopt the scheme, at least one state
 bill banning use of EES for medical records, loss of NSA credibility after
 a flaw in the "escrowed" key system was discovered by Dr. Matt Blaze of
 Bell Labs, a patent infringement lawsuit threat (dealt with by buying off
 the claimant), condemnation of the scheme by a former Canadian Defense
 Minister, world wide opposition to Clipper and the presumptions behind it,
 skeptical back-to-back House and Senate hearings on the details of the
 Administration's plan, and pointed questions from lawmakers regarding
 monopolism and accountability.

 One of the most signigicant concessions in the letter is that upcoming
 encryption standards will be "voluntary," unclassified, and exportable,
 according to Gore, who also says there will be no moves to tighten export
 controls.

 Though Gore hints at private, rather than governmental, key "escrow," the
 Administration does still maintain that key "escrow" is an important part of
 its future cryptography policy. 

 EFF would like to extend thanks to all who've participated in our online
 campaigns to sink Clipper.  This retreat on the part of the Executive
 Branch is due not just to discussions with Congresspersons, or letters
 from industry leaders, but in large measure to the overwhelming response from
 users of computer-mediated communication - members of virtual communities
 who stand a lot to gain or lose by the outcome of the interrelated
 cryptography debates.  Your participation and activism has played a key
 role, if not the key role, in the outcome thus far, and will be vitally
 important to the end game!


 Below is the public letter sent from VP Gore to Rep. Cantwell.

 ******

 July 20, 1994

 The Honorable Maria Cantwell
 House of Representatives
 Washington, D.C.,  20515

 Dear Representative Cantwell:

        I write to express my sincere appreciation for your efforts to move
 the national debate forward on the issue of information security and export
 controls.  I share your strong conviction for the need to develop a
 comprehensive policy regarding encryption, incorporating an export policy
 that does not disadvantage American software companies in world markets
 while preserving our law enforcement and national security goals. 

        As you know, the Administration disagrees with you on the extent to
 which existing controls are harming U.S. industry in the short run and the
 extent to which their immediate relaxation would affect national security. 
 For that reason we have supported a five-month Presidential study.  In
 conducting this study, I want to assure you that the Administration will
 use the best available resources of the federal government.  This will
 include the active participation of the National Economic Council and the
 Department of Commerce.  In addition, consistent with the Senate-passed
 language, the first study will be completed within 150 days of passage of
 the Export Administration Act reauthorization bill, with the second study
 to be completed within one year after the completion of the first.  I want
 to personally assure you that we will reassess our existing export controls
 based on the results of these studies.  Moreover, all programs with
 encryption that can be exported today will continue to be exportable.

        On the other hand, we agree that we need to take action this year
 to assure that over time American companies are able to include information
 security features in their programs in order to maintain their admirable
 international competitiveness.  We can achieve this by entering into an new
 phase of cooperation among government, industry representatives and privacy
 advocates with a goal of trying to develop a key escrow encryption system
 that will provide strong encryption, be acceptable to computer users
 worldwide, and address our national needs as well.

        Key escrow encryption offers a very effective way to accomplish our
 national goals,  That is why the Administration adopted key escrow
 encryption in the "Clipper Chip" to provide very secure encryption for
 telephone communications while preserving the ability for law enforcement
 and national security.  But the Clipper Chip is an approved federal
 standard for telephone communications and not for computer networks and
 video networks.  For that reason, we are working with industry to
 investigate other technologies for those applications.

        The Administration understands the concerns that industry has
 regarding the Clipper Chip.  We welcome the opportunity to work with
 industry to design a more versatile, less expensive system.  Such a key
 escrow system would be implementable in software, firmware, hardware, or
 any combination thereof, would not rely upon a classified algorithm, would
 be voluntary, and would be exportable.  While there are many severe
 challenges to developing such a system, we are committed to a diligent
 effort with industry and academia to create such a system.  We welcome your
 offer to assist us in furthering this effort.

        We also want to assure users of key escrow encryption products that
 they will not be subject to unauthorized electronic surveillance.  As we
 have done with the Clipper Chip, future key escrow systems must contain
 safeguards to provide for key disclosure only under legal authorization and
 should have audit procedures to ensure the integrity of the system.  Escrow
 holders should be strictly liable for releasing keys without legal
 authorization.

        We also recognize that a new key escrow encryption system must
 permit the use of private-sector key escrow agents as one option.  It is
 also possible that as key escrow encryption technology spreads, companies
 may established layered escrowing services for their own products.  Having
 a number of escrow agents would give individuals and businesses more
 choices and flexibility in meeting their needs for secure communications.

        I assure you the President and I are acutely aware of the need to
 balance economic an privacy needs with law enforcement and national
 security.  This is not an easy task, but I think that our approach offers
 the best opportunity to strike an appropriate balance.  I am looking
 forward to working with you and others who share our interest in developing
 a comprehensive national policy on encryption.  I am convinced that our
 cooperative endeavors will open new creative solutions to this critical
 problem.

 Sincerely,
 Al Gore
 AG/gcs

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                         WHY COPS HATE CIVILIANS

 Author Unknown
 Posted By Don Montgomery (donrm@sr.hp.com)

      Why Cops Hate You or If You Have to Ask, Get Out of the Way

 Have you  ever been  stopped by  a traffic  cop and,  while he  was
 writing a  ticket or  giving you a warning, you got the feeling he would
 just love  to yank  you out  of the  car, right  through the window, and
 smash your face into the front fender?  Have you ever had a noisy little
 spat with  someone, and  a cop  cruising by  calls, Everything all right
 over there?

 Did you  maybe sense  that he  really hoped  everything was not all
 right, that  he wanted  one of  you to answer, No, officer, this idiot's
 bothering me?   That  all he  was looking  for was  an excuse  to launch
 himself from  the cruiser  and play  a drum  solo on your skull with his
 nightstick?

 Did you  ever call  the cops to report a crime, maybe someone stole
 something from  your car or broke into your home, and the cops act as if
 it were  your fault?   That they were sorry the crook didn't rip you off
 for more?   That  instead of looking for the culprit, they'd rather give
 you a  shot in  the chops  for bothering  them with your bullshit in the
 first place?

 If you've  picked  up  on  this  attitude  from  your  local  sworn
 protectors, it's  not just  paranoia.  They actually don't like you.  In
 fact  cops  don't  just  dislike  you,  they  hate  your  fucking  guts!
 Incidentally, for a number of very good reasons.

 First of  all, civilians  are so goddamn stupid.  They leave things
 lying around,  just begging  thieves to  steal them.   They park cars in
 high crime  areas and  leave portable  TVs,  cameras,  wallets,  purses,
 coats, luggage,  grocery bags  and briefcases in plain view on the seat.
 Oh, sure  maybe they'll  remember to  close all the windows and lock the
 doors, but  do you  know how  easy it is to bust a car window?  How fast
 can it be done?  A ten-year-old can do it in less than six seconds!  And
 a poor cop has another Larceny from Auto on his hands.  Another crime to
 write a  report on,  waste another  half hour on.  Another crime to make
 him look bad.

 Meanwhile the  asshole who  left the  family heirlooms  on the back
 seat in  the first  place is raising hell about where were the cops when
 the car  was being  looted.  He's planning to write irate letters to the
 mayor and  the police commissioner complaining about what a lousy police
 force you  have here;  they can't  even keep  my car from getting ripped
 off!  What, were they drinking coffee somewhere?

 And the cops are saying to themselves.  Lemme tell ya, fuckhead, we
 were seven  blocks away,  taking  another  stupid  report  from  another
 jerkoff civilian about his fucking car being broken into because he left
 his shit on the back seat too!

 These civilians  can't figure  out that  maybe they shouldn't leave
 stuff lying  around un-attended  where anybody  can just  pick it up and
 boogie.   Maybe they  should put the shit in the trunk, where no one but
 Superman is  gonna see it.  Maybe they should do that before they get to
 wherever they're  going just  in case  some riffraff  is hanging  around
 watching them while the car is being secured.

 Another thing  that drives  cops wild  is the, "surely this doesn't
 apply to  me" syndrome,  which never fails to reveal itself at scenes of
 sniper or barricade incidents.  There's always some asshole walking down
 the street  (or jogging  or driving) who thinks the police cars blocking
 off the  area, the  ropes marked  Police Line:   Do  Not Cross, the cops
 crouched behind  cars pointing  revolvers and  carbines and shotguns and
 bazookas at  some building  has nothing whatsoever to do with him, so he
 weasels around  the barricades  or slithers  under the restraining ropes
 and blithely continues on his way, right into the field of fire.

 The result  is that some cop risks his ass (or her's, don't forget,
 the cops include women now) to go after the cretin and drag him, usually
 under protest,  back to  safety.   All of  these cops, including the one
 risking his  ass, devoutly  hope  that  the  sniper  will  get  off  one
 miraculous shot and drill the idiot right between the horns, which would
 have two  immediate effects.   The  quiche-for-brains civilian  would be
 dispatched to  his  just  reward  and  every  cop  on  the  scene  would
 instantaneously be  licensed to  kill the  scumbag  doing  the  sniping.
 Whereupon the  cops would destroy the whole fucking building, sniper and
 all, in  about 30  seconds, which is what they wanted to do in the first
 place, except  the brass  wouldn't let  them  because  the  motherfucker
 hadn't killed anybody yet.

 An  allied  phenomenon  is  the  My  isn't  this  amusing  behavior
 exhibited, usually  by Yuppies  or other  members of  higher society, at
 some emergency  scenes.   For example,  a group  of trendy types will be
 strolling down  the street  when a  squad car  with lights  flashing and
 siren on  screeches up  to a  building.  They'll watch the cops yank out
 their guns  and run up to the door, flatten themselves against the wall,
 and peep  into the  place cautiously.   Now,  if  you  think  about  it,
 something serious  could be  happening here.   Cops  usually don't  pull
 their revolvers to go get a cup of coffee.  any five-year-old ghetto kid
 can tell  you these  cops are  definitely ready to cap somebody.  But do
 our society  friends perceive  this?   Do they stay out of the cops way?
 Of course  not!  They think it's vastly amusing.   And, of course, since
 they're not involved in the funny little game the cops are playing, they
 think nothing  can happen  to them!       While the ghetto kid is hiding
 behind a  car for  the shooting  to start,  Muffy and Chip and Biffy are
 continuing their  stroll, right  up to  the  officers,  tittering  among
 themselves about  how silly  the cops look, all scrunched up against the
 wall, trying  to look in  through the door without stopping bullets with
 their foreheads.

 What the  cops are  hoping at  that point is for a homicidal holdup
 man to  come busting  out the  door with  a sawed-off  shotgun.  They're
 hoping he  has it  loaded with  elephant shot,  and that  he immediately
 identifies our socialites as serious threats to his personal well-being.
 They're hoping  he has  just enough  ammunition to blast the shit out of
 the gigglers,  but not  enough to  return fire  when the cops open up on
 him.

 Of course,  if that  actually happens,  the poor  cops will be in a
 world of  trouble for not protecting the innocent bystanders.  The brass
 wouldn't even  want to  hear that  the shitheads  probably  didn't  have
 enough sense to come in out of an acid rain.  Somebody ought to tell all
 the quiche  eaters out  there to  stand back when they encounter someone
 with a  gun in  his hand,  whether he happens to be wearing a badge or a
 ski mask.

 Civilians also  aggravate cops  in a  number of other ways.  One of
 their favorite games is Officer, can you tell me?  A cop knows he's been
 selected to  play this game whenever someone approaches and utters those
 magic words.   Now, it's okay if they continue with How to get to so and
 so street?   or Where such and such a place is located?  After all, cops
 are supposed  to be  familiar with  the area they work.  But it eats the
 lining of  their stomachs  when some jerkoff asks, Where can I catch the
 number fifty-four bus?  Or, Where can I find a telephone?

 Cops look  forward to  their last  day before retirement, when they
 can safely  give these  douche bags the answer they've been choking back
 for 20  years:   No, maggot,  I can't  tell you where the fifty-four bus
 runs!   What does  this look  like an MTA uniform?  Go ask a fucking bus
 driver!   And, No,  dog breath, I don't know where you can find a phone,
 except wherever  your fucking  eyes see one!  Take your head out of your
 ass and look for one.

 And cops  just love  to find  a guy  parking his car in a crosswalk
 next to  a fire  hydrant at  a bus stop posted with a sigh saying, Don't
 Even Think  About Stopping, Standing, or Parking Here.  Cars Towed Away,
 Forfeited to  the Government,  and Sold at Public Auction.  And the jerk
 asks, Officer, may I park here a minute?

 What are  you nuts?   Of  course ya  can park  here!  As long as ya
 like!   Leave it  there all  day!   Ya don't  see anything  that says ya
 can't, do  ya?   You're welcome.   See  ya later.   The  cop then drives
 around the  corner and  calls a tow truck to remove the vehicle.  Later,
 in traffic  court, the  idiot will  be whining  to the  judge But,  Your
 Honor, I  asked an  officer if  I could park there, and he said I could!
 No, I don't know which officer, but I did ask! Honest!  No, wait, Judge,
 I can't afford five hundred dollars!  This isn't fair!  I'm not creating
 a disturbance!   I've got rights!  Get your hands off me!  Where are you
 taking me?  What do you mean , ten days for contempt of court?  What did
 I do?   Wait,  wait,...   If you  should happen  to see  a  cop  humming
 contentedly and  smiling to  himself for no apparent reason, he may have
 won this game.

 Wildly unrealistic civilian expectations also contribute to a cop's
 distaste for  the general  citizenry.  An officer can be running his ass
 off all  day or  night handling  call after  call and writing volumes of
 police reports,  but everybody thinks their problem is the only thing he
 has to  work on.  The policeman may have a few worries, too.  Ever think
 of that?   the sergeant is on him because he's been late for roll call a
 few days;  he's been  battling like  a badger  with his wife, who's just
 about to leave him because he never takes her anywhere and doesn't spend
 enough time at home and the kids need braces and the station wagon needs
 a major  engine overhaul and where are we gonna get the money to pay for
 all that  and we haven't had a real vacation for years and all you do is
 hang around with other cops and you've been drinking too much lately and
 I could've  married that  wonderful guy  I was going with when I met you
 and lived  happily ever  after and  why don't you get a regular job with
 regular days  off and  no night  shifts and  decent pay and a chance for
 advancement and no one throwing bottles or taking wild potshots at you?

 Meanwhile, that  sweet young thing he met on a call last month says
 her period is late.  Internal Affairs is investigating him on fucking up
 a disorderly  last week;  the captain  is pissed  at him  for tagging  a
 councilman's car; a burglar's tearing up the businesses on his post; and
 he's already  handled two robberies, three family fights, a stolen auto,
 and a half dozen juvenile complaints today.

 Now here he is, on another juvenile call, trying to explain to some
 bimbo, who's  the president of her neighborhood improvement association,
 that the  security of  Western Civilization is not really threatened all
 that much  by the kids who hang around on the corner by her house.  Yes,
 officer, I  know they're not there now.  They always leave when you come
 by.   But after  you're gone,  they come  right back, don't you see, and
 continue their  disturbance.   It's intolerable!   I'm  so upset,  I can
 barely sleep at night.

 By now,  the cops  eyes have  glazed over.    What  we  need  here,
 officer, she  continues vehemently,  Is greater attention to this matter
 by the  police.   You and  some other officers should hide and stake out
 that corner  so those  renegades wouldn't see you.  Then you could catch
 them in  the act!   Yes, ma'am, we'd love to stake out that corner a few
 hours every night, since we don't have anything else to do, but I've got
 a better idea, he'd like to say.  Here's a box of fragmentation grenades
 the Department  obtained from  the Army  just for  situations like this.
 The next  time you see those little fuckers out there, just lob a couple
 of these into the crowd and get down!

 Or he's  got and  artsy-craftsy type  who's  moved  into  a  tough,
 rundown neighborhood  and decides  it's gotta  be cleaned up.  You know,
 Urban Pioneers.   The  cops see  a lot  of them  now.   Most of them are
 intelligent(?), talented, hard-working, well-paid folks with masochistic
 chromosomes interspersed  among their otherwise normal genes.  They have
 nice jobs,  live in nice homes, and they somehow decide that it would be
 a marvelous  idea to  move into a slum and get yoked, roped, looted, and
 pillaged on  a regular  basis.   What else  do you  expect?   Peace  and
 harmony?  It's like tossing a juicy little pig into a piranha tank.

 Moving day:  Here come the pioneers, dropping all their groovy gear
 from their  Volvo station  wagon, setting it on the sidewalk so everyone
 can get  a good  look and  the food processor, the microwave, the stereo
 system, the  color TV,  the tape deck, etc.  At the same time, the local
 burglars are  appraising the goods unofficially and calculating how much
 they can get for the TV down at the corner bar, how much the stereo will
 bring at  Joe's garage, who might want the tape deck at the barber shop,
 and maybe mama can use the microwave herself.

 When the  pioneers get  ripped off,  the cops figure they asked for
 it, and  they got  it.   You want to poke your arm through the bars of a
 tiger cage?   Fuck you!  Don't be amazed when he eats it for lunch!  The
 cops regard  it as  naive for  trendies to  move into  crime  zones  and
 conduct their  lives the same way they did up on Society Hill.  In fact,
 they can't fathom why anyone who didn't have to would want to move there
 at all,  regardless of  how they want to live or how prepared they might
 be to  adapt their  behavior.   That's probably  because  the  cops  are
 intimately acquainted  with all  those petty  but disturbing  crimes and
 nasty little  incidents that  never make  the newspapers  but profoundly
 affect the quality of life in a particular area.

 Something else  that causes  premature aging  among cops  is the, I
 don't know who to call, so I'll call the police ploy.  Why, the cops ask
 themselves, do  they get so many calls for things like water leaks, sick
 cases, bats in houses, and the like, things that have nothing whatsoever
 to do  with law  enforcement or  the maintenance  of public order?  They
 figure it's  because civilians  are getting  more and more accustomed to
 having the government solve problems for them, and the local P.D. is the
 only governmental  agency that'll  even answer  the phone a 3:00 am, let
 alone send anybody.

 So, when  the call  comes over  the radio  to go  to  such-and-such
 address  for  a  water  leak,  the  assigned  officer  rolls  his  eyes,
 acknowledges, responds,  surveys the problem, and tells the complainant,
 Yep, that's  a water  leak all  right!   No doubt  about it. Ya probably
 ought to  call a  plumber!   And it  might not be a bad idea to turn off
 your main  valve for  a while.   Or,  Yep, your  Aunt Minnie's  sick all
 right!   Ya probably ought to get'er to a doctor tomorrow if she doesn't
 get any  better by  then.S   Or, Yep,  that's a bat all right!  Mebbe ya
 ought to open the windows so it can fly outside again!

 In the meantime our hero is wasting his time on this bullshit call,
 maybe someone  is having  a real  problem out there, like getting raped,
 robbed or  killed.   Street cops would like to work the phones just once
 and catch  a few  of these idiotic complaints:  A bat in your house?  No
 need to  send an officer when I can tell ya what to do right here on the
 phone, pal!  Close all your doors and windows right away.  Pour gasoline
 all over  your furniture.   That's  it.   Now, set  it on  fire and  get
 everybody outside!   Yeah,  you'll get the little motherfucker for sure!
 That's okay, call us anytime.

 Probably the  most serious beef cops have with civilians relates to
 those situations  in which  the use  of force  becomes necessary to deal
 with some desperado who may have just robbed a bank, iced somebody, beat
 up his wife and kids, or wounded some cop, and now he's caught but won't
 give up.  He's not going to be taken alive, he's going to take some cops
 with him, and you better say your prayers, you pig bastards!  Naturally,
 if the  chump's armed  with any  kind of  weapon, the  cops are going to
 shoot the  shit out  of him  so bad  they'll be able to open up his body
 later as  a lead  mine.  If he's not armed, and the cops aren't creative
 enough to find a weapon for him, they'll beat him into raw meat and hope
 he spends  the next  few weeks  in traction.  They view it as a learning
 experience for  the asshole.  You fuck up somebody, you find out what it
 feels like  to get  fucked up.  Don't like it?  Don't do it again!  It's
 called Street  Justice, and  civilians approve of it as much as cops do,
 even if they don't admit it.

 Remember how  the audience  cheered when  Charles Bronson fucked up
 the bad  guys in  Death Wish?  How they scream with joy every time Clint
 Eastwood's Dirty  Harry makes his day by blowing up some rotten scumball
 with his  .44 Magnum?  What they applaud is the administration of street
 justice.   The old  eye-for-an-eye concept, one of mankind's most primal
 instincts.  All of us have it, especially cops.

 It severely  offends and  deeply hurts  cops when they administer a
 dose of  good old-fashioned  street justice  only to have some bleeding-
 heart do-gooder  happens upon  the scene  at the  last minute,  when the
 hairbag is  at last  getting his just deserts, and start hollering about
 police brutality.   Cops  regard that  as very  serious business indeed.
 Brutality can get them fired.  Get fired from one police department, and
 it's tough to get a job as a cop anywhere else ever again.

 Brutality exposes  the cop  to civil  liability as well.  Also, his
 superior officers,  the police  department as  an agency, and maybe even
 the local  government itself.  You've seen those segments on 60 Minutes,
 right?   Some cop  screws up, gets sued along with everybody else in the
 department who  had anything to do with him, and the city or county ends
 up paying  the plaintiff  umpty-ump million  dollars, raising  taxes and
 hocking its  fire engines  in the process.  What do think happens to the
 cop who fucked up in the first place?  He's done for.

 On many occasions when the cops are accused of excessive force, the
 apparent brutality  is  a  misperception  by  some  observer  who  isn't
 acquainted with  the realities of police work.  For example, do you have
 any idea  how hard  it is to handcuff someone who really doesn't want to
 be handcuffed?   Without  hurting them?   It's almost impossible for one
 cop to  accomplish by  himself unless  he beats  the  hell  out  of  the
 prisoner first,  which would  also be viewed a brutality!  It frequently
 takes three or four cops to handcuff one son of a bitch who's determined
 to battle them.

 In situations  like that,  it's not  unusual for  the cops  to hear
 someone in  the crowd  of onlookers comment on how they're ganging up on
 the poor  bastard and  beating him  unnecessarily.  This makes them feel
 like telling  the complainer,  Hey,  motherfucker,  you  think  you  can
 handcuff this  shithead by  yourself without killing him first?  C'mere!
 You're deputized!  Now, go ahead and do it!

 The problem  is that,  in addition  to being  unfamiliar  with  how
 difficult it  is in the real world to physically control someone without
 beating  his   ass,  last-minute   observers  usually   don't  have  the
 opportunity to see for themselves, like they do in the movies and on TV,
 what a  fucking monster  the suspect  might be.   If  they  did,  they'd
 probably holler  at the  cops to  beat his  ass some  more.   They might
 actually even  want to  help!      The best thing for civilians to do if
 they think they see the cops rough up somebody too much is to keep their
 mouths shut  at the  scene, and  to make  inquiries of  the police brass
 later on.   There  might be  ample justification for the degree of force
 used that  just wasn't  apparent at the time of the arrest.  If not, the
 brass will  be very  interested in  the complaint.  If one of their cops
 went over  the deep end, they'll want to know about it.     Most of this
 comes down  to  common  sense,  a  characteristic  the  cops  feel  most
 civilians lack.   One of the elements of common sense is thinking before
 opening one's  yap or  taking other  action.   Just a  brief  moment  of
 thought will  often prevent  the utterance  of something  stupid or  the
 commission of  some idiotic  act that will, among other things, generate
 nothing but  contempt from  the average street cop.  Think, and it might
 mean getting  a warning instead of a traffic ticket.  Or getting sent on
 your way  rather than being arrested.  Or continuing on to your original
 destination instead of to the hospital.  It might mean getting some real
 assistance instead  of the runaround.  The very least it'll get you is a
 measure of  respect cops  seldom show  civilians.  Act like you've got a
 little sense,  and even  if the cops don't love you, at least they won't
 hate you.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

           PUBLIC SPACE ON INFO HIGHWAY: CALL CONGRESS ASAP!

By The Center For Media Education (cme@access1.digex.net)

People For the American Way is 300,000-member nonpartisan constitutional
liberties public interest organization. 2000 M Street NW, Suite 400,
Washington DC 20036.

 ACTION ALERT  --  From People For the American Way (DC)

 SENATE TO ACT ON INFO-HIGHWAY BILL -- ACTIVISTS NEEDED TO ENSURE THAT
 PUBLIC ACCESS PROVISIONS ARE INCLUDED.

 The Issue

 -  The "information superhighway" has the potential to give rise to a new
 era of democratic self governance by providing the means through which
 civic discourse can flourish.  Turning this into a reality means that
 those committed to promoting this new marketplace of ideas must be given
 the tools to use new telecommunications networks.

 -  A diverse coalition of public interest organizations is supporting
 legislation introduced by Senator Daniel Inouye (D-HI), Chairman of the
 Communications Subcommittee of the Senate Commerce Committee, to encourage
 this new marketplace of ideas by ensuring that the public has access to
 the information superhighway is protected (S. 2195). 

 -  Without reserved capacity, the ability of local governmental
 institutions, libraries, schools, public broadcasters and other nonprofit
 organizations to take advantage of new telecommunications technologies
 will be determined by private gatekeepers who have few economic incentives
 to permit those institutions without the means to pay commercial rates
 access to their networks.

 -  Without Senator Inouye's legislation, the information superhighway will
 carry little more than video games, movies on demand and home shopping. 

 -  There has been a great deal of rhetoric about the telecommunications
 networks of the future being of unlimited capacity.  This is certainly the
 goal.  However, it is necessary to ensure that between now and the time
 that such capacity is unlimited, that there is meaningful access available
 for those entities proving important educational, cultural, informational,
 civic and charitable services to the public.

 -  Senator Inouye's legislation must be included in the debate with the
 larger telecommunications legislation (S. 1822) introduced by Senator
 Ernest Hollings (D-SC), Chairman of the Senate Commerce Committee. 


 LEGISLATIVE TIMING

 Senator Hollings (D-SC), Chairman of the Commerce Committee, and Senator
 Danforth (R-MO), Ranking Minority Member of the Commerce Committee are
 busily working on amendments to S. 1822, a major telecommunications reform
 bill.  Next week, the full Committee is expected to consider these
 amendments.  Therefore, a public access provision must be included now.

 ACTION REQUEST 

 -  Please call Senator Hollings at the Commerce Committee and Senator
 Danforth (Ranking Minority Member) immediately!!  Ask them to support S.
 2195 and guarantee that requirements are put in place for public access at
 low or no-cost rates are included in the Chairman's Mark.  Phone calls on
 this issue by the public will have a profound effect on the outcome of
 this legislation--so please call!

  Senator Hollings  202-224-5115
  Senator Danforth  202-224-6154

 -  Please also call Senator Inouye and encourage him to continue to push
 for passage of S. 2195 and to seek it's combination with S. 1822.

  Inouye (D-HI)   202-224-3934

 -  Please try to find the time to make a few calls and ask the other
 Senators on the Commerce Committee to support S. 2195 and ensure public
 access provisions are included in S. 1822. Other Senators on the Commerce
 Committee are:

 Exon  (D-NB)   202-224-4224
 Ford  (D-KY)   202-224-4343
 Rockefeller (D-WV)  202-224-6472
 Kerry  (D-MA)   202-224-2742
 Breaux (D-LA)   202-224-4623
 Bryan (D-NV)   202-224-6244
 Robb (D-VA)   202-224-4024
 Dorgan (D-ND)   202-224-2551
 Matthews (D-TN)   202-224-4944 
 Packwood (R-OR)   202-224-5244
 Pressler (R-SD)   202-224-5842
 Stevens (R-AK)   202-224-3004
 McCain (R-AZ)   202-224-2235
 Burns (R-MT)   202-224-2644
 Gorton (R-WA)   202-224-3441
 Lott (R-Miss.)   202-224-6253
 Hutchison (R-TX)   202-224-5922

 -  Calling these Senators *works*!!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                   SOFTWARE KEY ESCROW - A NEW THREAT?

 By Timothy May (tcmay@netcom.com)

 At the June Cypherpunks meeting, Whit Diffie (co-inventor of
 public-key crypto, as you should all know) filled us in on a workshop
 on "key escrow" held in Karlsruhe, Germany. All the usual suspects
 were there, and I gather that part of the purpose was to bring the
 Europeans "into the tent" on key escrow, to deal with their objections
 to Clipper, and so on.

 Diffie described in some detail a software-based scheme developed by
 NIST (and Dorothy Denning, if I recall correctly) that, as I recall
 the details, avoids public key methods. Perhaps this was also
 described here on the list. I know Bill Stewart has recently discussed
 it in sci.crypt or talk.politics.crypto.

 What has me worried about it now is evidence from more than one source
 that this program is actually much further along than being merely a
 "trial balloon" being floated. In fact, it now looks as though the
 hardware-based key escrow systems will be deemphasized, as Al Gore's
 letter seems to say, in favor of software-based schemes. 

 While I've been skeptical that software-based schemes are secure (the
 bits are hardly secure against tampering), the addition of negotiation
 with another site (a lot like online clearing of digital cash, it
 seems) can make it nearly impossible for tampering to occur. That is,
 I'm now more persuaded that the NIST/NSA(?) proposal would allow
 software-based key escrow.

 Here's the rub:

 * Suppose the various software vendors are "incentivized" to include
 this in upcoming releases. For example, in 30 million copies of
 Microsoft's "Chicago" (Windows 4.0) that will hit the streets early in
 '95 (betas are being used today by many).

 * This solves the "infrastructure" or "fax effect" problem--key escrow
 gets widely deployed, in a way that Clipper was apparently never going
 to be (did any of you know _anybody_ planning to buy a "Surety"
 phone?).

 (Granted, this is key escrow for computers, not for voice
 communication. More on this later.)

 * Once widely deployed, with not talk of the government holding the
 keys, then eventual "mandatory key escrow" can be proposed, passed
 into law by Executive Order (Emergency Order, Presidential Directive,
 whatever your paranoia supports), an act of Congress, etc.

 I don't claim this scenario is a sure thing, or that it can't be
 stopped. But if in fact a "software key escrow" system is in the
 works, and is more than just a "trial balloon," then we as Cypherpunks
 should begin to "do our thing," the thing we've actually done pretty
 well in the past. To wit: examine the implications, talk to the
 lobbyist groups about what it means, plan sabotage efforts (sabotage
 of public opinion, not planting bugs in the Chicago code!), and
 develop ways to make sure that a voluntary key escrow system could
 never be made mandatory.

 (Why would _anyone_ ever use a voluntary key escrow system? Lots of
 reasons, which is why I don't condemn key escrow automatically.
 Partners in a business may want access under the right circumstances
 to files. Corporations may want corporate encryption accessible under
 emergencyy circumstances (e.g., Accounting and Legal are escrow
 agencies). And individuals who forget their keys--which happens all
 the time--may want the emergency option of asking their friends who
 agreed to hold the key escrow stuff to help them. Lots of other
 reasons. And lots of chances for abuse, independent of mandatory key escrow.)

 But there are extreme dangers in having the infrastructure of a
 software key escrow system widely deployed.

 I can't see how a widely-deployed (e.g., all copies of Chicago, etc.)
 "voluntary key escrow" system would remain voluntary for long. It
 looks to me that the strategy is to get the infrastructure widely
 deployed with no mention of a government role, and then to bring the
 government in as a key holder.

 (The shift of focus away from telephone communications to data is an
 important one. I can see several reasons. First, this allows wide
 deployment by integration into next-gen operating systems. A few
 vendors can be "incentivized." Second, voice systems are increasingly
 turning into data systems, with all the stuff surrounding ISDN,
 cable/telco alliances, "set-top" boxes, voice encryption on home
 computers, etc. Third, an infrastructure for software key escrow would
 make the backward extension to voice key escrow more palatable. And
 finally, there is a likely awareness that the "terrorist rings" and
 "pedophile circles" they claim to want to infiltrate are more than
 likely already using computers and encryption, not simple voice lines.
 This will be even more so in the future. So, the shift of focus to
 data is understandable. That it's a much easier system in which to get
 40-60 million installed systems _almost overnight_ is also not lost on
 NIST and NSA, I'm sure.)

 In other words, a different approach than with Clipper, where
 essentially nobody was planning to buy the "Surety" phones (except
 maybe a few thousand) but the government role was very prominent--and
 attackable, as we all saw. Here, the scenario might be to get 40-60
 million units out there (Chicago, next iteration of Macintosh OS,
 maybe Sun, etc.) and then, after some series of events (bombings,
 pedophile rings, etc.) roll in the mandatory aspects.

 Enforcement is always an issue, and I agree that many bypasses exist.
 But as Diffie notes, the "War on Drugs" enlistment of corporations was
 done with various threats that corporations would lose
 assets/contracts unless they cooperated. I could see the same thing
 for a software-based key escrow.

 A potentially dangerous situation. 

 I was the one who posted the Dorothy Denning "trial balloon" stuff to
 sci.crypt, in October of 1992, six months before it all became real
 with the announcement of Clipper. This generated more than a thousand
 postings, not all of them useful (:-}), and helped prepare us for the
 shock of the Clipper proposal the following April.

 I see this software-based key escrow the same way. Time to start
 thinking about how to stop it now, before it's gone much further.

 Putting Microsoft's feet to the fire, getting them to commit to *not*
 including any form of software-based key escrow in any future releases
 of Windows (Chicago or Daytona) could be a concrete step in the right
 direction. Ditto for Apple. 

 I'm sure we can think of other steps to help derail widespread
 deployment of this infrastructure.

 --Tim May

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
            HOODS HIT THE HIGHWAY; COMPUTER USERS WARNED OF SCAMS
 
 By Charlotte-Anne Lucas
 Austin Bureau of The Dallas Morning News
 REPRINTED WITH PERMISSION OF THE DALLAS MORNING NEWS
 
 AUSTIN -- Computer users, beware: Driving on the information highway,
 it's possible to get fleeced.
 
 Scam artists have hit the cyberspace, offering high-tech ponzi schemes,
 sending illegal electronic chain letters and hyping virtually worthless
 stock, according to state securities regulators across the nation.
 
 In Texas, regulators say an Austin retiree lost $10,000 in a fake mutual
 fund deal sold by a man who promoted his "money managing" skills through
 an on-line computer service.
 
 "The danger here is that cyberspace, which could be a beneficial way for
 consumers to do a better job of informing themselves, will instead be
 discredited as a haven for fast-buck artists," said Denise Voigt
 Crawford, the Texas Securities Commissioner.
 
 In New Jersey and Missouri on Thursday, securities regulators filed
 cease and desist orders against promoters who used computer links to
 tout allegedly fraudulent deals.  Texas regulators say it is likely that
 they will seek an indictment in the case of the nonexistent mutual fund.
 
 But with nearly 4 million computer users nationwide linked into
 commercial computer services and 20 million people on the internet,
 a world-wide computer network, "it is almost too big to police
 effectively," said Jared Silverman, chief of the New Jersey Bureau of
 Securities and chairman of a multi-state team that investigates computer
 fraud.
 
 In response, regulators in all 50 states issued a bulletin to
 investigators, describing the potential frauds and listing steps small
 investors can take to protect themselves.  "We're trying to tell people
 to be careful," said Ms. Crawford, "there is a new fraud on the
 horizon."
 
 Although regulators are concerned about the problem, Ms. Crawford
 acknowledges enforcement will be a challenge.  Because electronic
 conversations, or E-mail, are considered private, "we don't know what
 difficulties we are going to have getting subpoenas enforced or what
 kind of cooperation we will get from (commercial bulletin board
 systems)." [sic]
 
 Officials say promoters tend to advertise offers or stock tips on the
 financial bulletin board sections of on-line computer services such as
 CompuServe, America Online and Prodigy, or in the specialized discussion
 forums in the Internet.
 
 Regulators said that of 75,000 messages posted on one computer service
 bulletin board during a recent two-week period, 5,600 were devoted to
 investment topics.  While some commercial computer bulletin board
 services try to control the publicly posted investment tips, most do not
 try to control most communications on the service.
  
 What begins as innocent E-mail can end with an unwary investor "getting
 cleaned out by high-tech schemers," said Ms. Crawford.
  
 In Texas, the case under investigation began when an Austin retiree
 posted a public note in a commercial bulletin board system looking for
 conversations about the stock market, according to John A. Peralta,
 deputy director of enforcement at the Texas Securities Board.
 
 "He was contacted.  It turned into a private E-mail conversation, a
 telephone conversation and then exchanges through the mail," said
 Mr. Peralta.  But the person who promoted himself on the computer as a
 skilled money manager turned out to be unlicensed -- and the mutual fund
 the retiree invested in turned out to be nonexistent.
 
 Mr. Peralta said at least one other person, not from Texas, invested
 $90,000 in the same deal, "We are aware of two, but we don't really
 know," he said.  "There may be dozens of victims."
 
 Securities regulators began taking interest in on-line scams last fall,
 after Mr. Silverman -- a computer junkie -- raised the issue at a
 national meeting of regulators.  "I heard stories about things going on
 on computer bulletin board services, and I have been monitoring these
 things for close to a year," he said.
 
 In fact, the New Jersey case came from Mr. Siverman's off-hours cruising
 of an on-line service.  "I sit at a keyboard two hours a day -- to the
 chagrin of my wife -- scanning these things," he said.
 
 What he found was a promoter pushing an E-mail chain letter.  The
 promoter, identified only as from San Antonio, claimed that in exchange
 for $5, investors could earn $60,000 in three to six weeks.
 
 Regulators said participants were told to send $1 to each of five people
 on a list in the computer bulletin board, add their own name to the list
 and post it on 10 different computer bulletin board sites.
 
 That, regulators said in a statement, "amounted to a high-tech
 variation on the old pyramid scam, which is barred by federal and state
 laws."
 
 In Missouri, regulators Thursday moved against an unlicensed stockbroker
 for touting his services and "making duubious [sic] claims for stocks
 not registered for sale in the state."  Among other things, regulators
 said, the promoter falsely claimed that Donald Trump was a "major,
 behind-the-scenes player in a tiny cruise line" whose stock he pitched.
 
 Ms. Crawford said that while computer users may be sophisticated in some
 ways, they still are attractive targets because they tend to have
 discretionary income and frequently are looking for ways to invest their
 money.
 
 Some of the commercial services also allow users to use various aliases,
 making it all the more difficult for investigators to figure out who
 they are really communication with.
 
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                      THE INTERNET AND THE ANTI-NET

 By Nick Arnett (nicka@mccmedia.com)

 Two public internetworks are better than one

 Networking policy debates tend to paint a future monolithic internetwork
 that will follow consistent policies despite a number of independent
 operators.  Although that's how the interstate highway and telephone
 systems -- favorite metaphors for network futurists -- operate, historical
 comparisons suggest that it is probably not what the future holds.  Two
 distinct, interconnected publicly accessible digital internetworks are
 likely to emerge, which is surely better than just one.

 One of the future internetworks will grow out of today's Internet, whose
 roots are in the technology and scientific/academic communities, funded by
 government, institutions and increasingly, corporate and individual users.
 Although the Internet will support commercial services, they rarely will
 depend on advertising.  The other great internetwork will grow out of the
 technology and mass communications industries, especially cable and
 broadcast industries.  The "Anti-net" will rely on advertising revenue to
 recoup the cost of the infrastructure necessary to create cheap, high-speed
 bandwidth.  (I call this second network the Anti-net not to be a demagogue
 but to make a historical allusion, explained shortly.)  All three
 communities -- technology, science and academia, and mass media -- will
 participate in many joint projects.  The most successful new ventures often
 will arise from three-way collaborations; skills of each are essential to
 create and deliver network-based information products and services.

 The Internet community reacts with profound anger and resentment at
 Anti-net behavior on the Internet -- in net-speak, "spamming" advertising
 messages into hundreds of discussions.  The outrage is based in part on the
 idealistic traditions of academic and scientific freedom of thought and
 debate, but there's more behind it.  Anger and resentment fueled by the
 world's love-hate relationship with the mass media, particularly
 television, surface in many other contexts.  Nearly everyone in the modern
 world and large segments of the third world watches television; nearly all
 think broadcast television is stupid, offering a homogenized,
 sensationalized point of view that serves advertising interests above all
 others.  In competition with television's hypnotic powers, or perhaps
 simply due to the high cost of distribution, other mass media have followed
 suit.

 Idealistic defenders of the Internet's purity believe they are waging a
 humanitarian or even a holy war that pits a democracy of ideas against the
 mass media's empty promises and indulgences.  Television and its kin offer
 the false idols and communities of soaps, sitcoms and sports.  The mass
 media tantalize with suggestions of healing, wealth, popularity and
 advertising's other blessings and temptations.  Internet idealists even
 question the U.S. administration's unclear proposal of an "information
 superhighway," suspecting that the masses will be taxed only to further
 expand the Anti-net's stranglehold on information.

 The same kind of stage was set 500 years ago.  The convergence of
 inexpensive printing and inexpensive paper began to loosen the Roman
 Catholic church's centuries-old stranglehold on cultural information.  The
 church's rise to power centuries earlier had followed the arrival of the
 Dark Ages, caused in Marshall McLuhan's analysis by the loss of papyrus
 supplies.  The church quickly became the best customer of many of the early
 printer-publishers, but not to disseminate information, only to make money.
 The earliest dated publication of Johann Gutenberg himself was a "papal
 indulgence" to raise money for the church's defense against the Turk
 invasions.  Indulgences were papers sold to the common folk to pay for the
 Pope's remission of their sins, a sort of insurance against the wrath of
 God.  Indulgences had been sold by the church since the 11th century, but
 shortly after the arrival of printing, the pope expanded the market
 considerably by extending indulgences to include souls in purgatory.
 Indulgence revenue was shared with government officials, becoming almost a
 form of state and holy taxation.  The money financed the church's holy
 wars, as well as church officials' luxurious lifestyles.

 Jumping on the new technology for corrupt purposes, the church had sown the
 seeds of its own undoing.  The church had the same sort of love-hate
 relationship with common people and government that the mass media have
 today.  The spark for the 15th-century "flame war," in net-speak, was a
 monk, Martin Luther.  Outraged by the depth of the church's corruption,
 Luther wrote a series of short theses in 1517, questioning indulgences,
 papal infallibility, Latin-only Bibles and services, and other
 authoritarian, self-serving church practices.  Although Luther had
 previously written similar theses, something different happened to the 95
 that he nailed to the church door in Wittenburg.  Printers -- the "hackers"
 of their day, poking about the geographic network of church doors and
 libraries -- found Luther's theses.

 As an academic, Luther enjoyed a certain amount of freedom to raise
 potentially heretical arguments against church practice.  Nailing his
 theses to the Wittenburg door was a standard way to distribute information
 to his academic community for discussion, much like putting a research
 paper on an Internet server today.  In Luther's time, intellectual property
 laws hadn't even been contemplated, so his papers were fair game for
 publication (as today's Internet postings often seem to be, to the dismay
 of many).  Luther's ideas quickly became the talk of Europe.  Heresy sells,
 especially when the questioned authority is corrupt.  But the speed of
 printing technology caught many by surprise.  Even Luther, defending
 himself before the pope, was at a loss to explain how so many had been
 influenced so fast.

 Luther's initial goal was to reform the church.  But his ideas were
 rejected and he was excommunicated by his order, the pope and the emperor,
 convincing Luther that the Antichrist was in charge in Rome.  Abandoning
 attempts at reform, but accepting Biblical prophecy, Luther resisted the
 utopian goal of removing the Antichrist from the papacy.  Instead, as a
 pacifist, he focused on teaching and preaching his views of true
 Christianity.  Luther believed that he could make the world a better place
 by countering the angst and insecurity caused by the Antichrist, not that
 he could save it by his own powers. 

 Luther's philosophy would serve the Internet's utopians well, especially
 those who believe that the Internet's economy of ideas untainted by
 advertising must "win" over the mass media's Anti-net ideas.  The
 Internet's incredibly low cost of distribution almost assures that it will
 remain free of advertising-based commerce.  Nonetheless, if lobbying by
 network idealists succeeds in derailing or co-opting efforts to build an
 advertising-based internetwork, then surely commercial interests will
 conspire with government officials to destroy or perhaps worse, to take
 over the Internet by political and economic means.  Historians, instead of
 comparing the Internet to the U.S. interstate highway system's success, may
 compare it with the near-destruction of the nation's railroad and trolley
 infrastructure by corrupt businesses with interests in automobiles and
 trucking.

 (which, like the Internet, was originally funded for military purposes)

 The printing press and cheap paper did not lead to widespread literacy in
 Europe; that event awaited the wealth created by the Industrial Revolution
 and the need for educated factory workers.  Printing technology's immediate
 and profound effect was the destruction of the self-serving, homogenized
 point of view of a single institution.  Although today's mass media don't
 claim divine inspiration, they are no less homogenized and at least as
 self-serving.  The people drown in information overload, but one point of
 view is barely discernable from another, ironically encouraging
 polarization of issues.

 Richard Butler, Australia's ambassador to the United Nations, draws the
 most disturbing analogy of all.  Butler, a leader in disarmament, compares
 the church's actions to the nuclear weapons industry's unwillingness to
 come under public scrutiny.  Like the church and its Bible, physicists
 argued that their subject was too difficult for lay people.  Medieval popes
 sold salvation; physicists sold destruction.  Neither was questioned until
 information began to move more freely.  The political power of nuclear
 weapons has begun to fall in part due to the role of the Internet and fax
 communications in the dissolution of the Soviet Union.

 The truly influential and successful early publishers, such as Aldus
 Manutius, were merchant technologists who formed collaborations with the
 scientific/academic community and even the church, especially those who
 dissented against Rome.  Out of business needs for economies of scale, they
 brought together people with diverse points of view and created books that
 appealed to diverse communities.  The Renaissance was propelled in part by
 books that allowed geniuses such as Copernicus to easily compare and
 contrast the many points of view of his predecessors, reaching
 world-changing conclusions.

 Today we are at a turning point.  We are leaving behind a world dominated
 by easy, audiovisual, sensational, advertising-based media, beginning a
 future in which the mass media's power will be diluted by the low cost of
 distribution of many other points of view.  Using the Internet is still
 something like trying to learn from the pre-Gutenberg libraries, in which
 manuscripts were chained to tables and there were no standards for
 organization and structure.  But like the mendicant scholars of those days,
 today's "mendicant sysops," especially on the Internet, are doing much of
 the work of organization in exchange for free access to information.

 Today, the great opportunity is not to make copies of theses on the digital
 church doors.  It is to build electronic magazines, newspapers, books,
 newsletters, libraries and other collections that organize and package the
 writings, photos, videos, sounds and other multimedia information from
 diverse points of view on the networks.  The Internet, with one foot in
 technology and the other in science and academia, needs only a bit of help
 from the mass media in order to show the Anti-net how it's done.

 ------------
 Nick Arnett [nicka@mccmedia.com] is president of Multimedia Computing
 Corporation, a strategic consulting and publishing company established in
 1988.  On the World-Wide Web: <URL:http://asearch.mccmedia.com/>

 Recommended reading:  "The printing press as an agent of change:
 Communications and cultural transformation in early-modern Europe," Vols. I
 and II.  Elizabeth Eisenstein.  Cambridge University Press, 1979.

 Copyright (c) 1994, Multimedia Computing Corp., Campbell, Calif., U.S.A.
 This article is shareware; it may be distributed at no charge, whole and
 unaltered, including this notice.  If you enjoy reading it and would like
 to encourage free distribution of more like it, please send a contribution
 to Plugged In (1923 University Ave., East Palo Alto, CA 94303), an
 after-school educational program for children in under-served communities. 

 Multimedia Computing Corp.
 Campbell, California

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%