💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JAUC › jauc1-6.phk captured on 2022-06-12 at 13:02:05.

View Raw

More Information

-=-=-=-=-=-=-





  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically
  ======================================================================
  ISSN 1074-3111           Volume One, Issue Six         October 1, 1994
  ======================================================================

      Editor-in-Chief:               Scott Davis      (dfox@fc.net)
      Co-Editor/Technology:          Max Mednick      (kahuna@fc.net)
      Consipracy Editor:             Gordon Fagan     (flyer@fennec.com)
      Information Systems:           Carl Guderian    (bjacques@usis.com)
      Computer Security:             John Logan       (ice9@fennec.com)

      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC

      U.S. Mail:
      The Journal Of American Underground Computing
      10111 N. Lamar #25
      Austin, Texas 78753-3601

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 IMPORTANT ADDRESSES -
 ============================================================================
 To Subscribe to "TJOAUC", send mail to:              sub@fennec.com
 All questions/comments about this publication to:    comments@fennec.com
 Send all articles/info that you want published to:   submit@fennec.com
 Commercial Registration for Profitable Media:        form1@fennec.com
 Advertising Rates:                                   rates@fennec.com
 ============================================================================

 "The underground press serves as the only effective counter to a growing
 power, and more sophisticated techniques used by establishment mass media
 to falsify, misrepresent, misquote, rule out of consideration as a priori
 ridiculous, or simply ignore and blot out of existence: data, books,
 discoveries that they consider prejudicial to establishment interest..."

 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 Contents Copyright (C) 1994 The Journal Of American Underground Computing
 and/or the author of the articles presented herein. All rights reserved.
 Nothing may be reproduced in whole or in part without written permission
 of the Editor-In-Chief and/or the author of the article. This publication
 is made available periodically to the amateur computer hobbyist free of
 charge.  Any commercial usage (electronic or otherwise) is strictly
 prohibited without prior consent of the Editor, and is in violation of
 applicable US Copyright laws. To subscribe, send email to sub@fennec.com

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 DISCLAIMER AND NOTICE TO DISTRIBUTORS -

 NOTE: This electronic publication is to be distributed free of charge
 without modifications to anyone who wishes to have a copy. Under NO
 circumstances is any issue of this publication, in part or in whole,
 to be sold for money or services, nor is it to be packaged with other
 computer software, including, but not limited to CD Rom disks, without
 the express written or verbal consent of the author and/or editor.
 To obtain permission to distribute this publication under any of the
 certain circumstances stated above, please contact the editor at one of
 the addresses above. If you have intentions of publishing this journal
 in any of the ways described above, or you are in doubt about whether or
 not your intentions conflict with the restrictions, please contact the
 editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
 This publication is provided without charge to anyone who wants it.
 This includes, but is not limited to lawyers, government officials,
 cops, feds, hackers, social deviants, and computer hobbyists. If anyone
 asks for a copy, please provide them with one, or mail the subscription
 list so that you may be added.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  LET THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING ADVERTISE FOR YOU.

  Computer services, Online access, Books, Software, Video, Music,
  Wierdness, Publishing, Hardware, Anything!

  For more information, send electronic mail to: rates@fennec.com
  You will be mailed a detailed list of rates and other information.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  COMING SOON!!!  The Journal's own World-Wide Web Home Page. You will be
  notified by mail when it is ready for use.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  NOW AVAILABLE: If you do not have FTP access, and would like to get back
  issues of the Journal, please mail:  info@fennec.com  for more information

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  We are sorry for the bounce test problems for this issue...we have (had)
  a new way of mailing, but it obviously failed miserably.  We have the
  issue corrected.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 6

                          TABLE OF CONTENTS

 Cyberdoggles And Virtual Pork                              Carl Guderian
 EFF Summary Of The Edwards/Leahy Digital Telephony Bill    Stanton McCandlish
 Zine FAQ                                                   Jerod Pore
 Legion Of Doom T-Shirts Ad                                 Chris Goggans
 A Point And Click Society                                  Scott Davis
 Keynote Address: Crypto Conference                         Bruce Sterling
 Jackboots On The Infobahn                                  John Perry Barlow
 Notes From Cyberspace, Volume 3                            Readers
 Pornography Fouls Internet                                 Paul Pihichyn
 Security / Coast FTP                                       Unknown
 On the Subject of CyberCulture                             George Phillips
 A Comment On Clipper                                       Azrael
 Sex, The Internet And The Idiots                           K.K. Campbell
 NBC's Anti-Net Campaign                                    Alaric
 The Miami Device Project                                   Marty Cyber
 Cybersell                                                  Michael Ege
 Some Info On Green Card Spam                               Unknown
 Cable Resources On The Net                                 John Higgins
 IDS Announces New Rochelle, New York POP (AC 914)          green@ids.net
 The Media List                                             Adam M. Gaffin
 A TeleStrategies Event/Commercial Internet eXchange        Unknown
 Scream Of Consciousness From WIRED 1.1                     Stewart Brand
 Digital Cash Mini-FAQ For The Layman                       Jim Miller
 Patent Searching Email Server Now Open                     Gregory Aharonian
 Five "Hackers" Indicted for Credit Card/Computer Fraud     CUD/AP Wire
 Clipper T-Shirts                                           Norman Harman
 Cybernews Debuts                                           Patrick Grote
 PC Magazine Declares The PIPELINE Best Internet Service    James Gleick
 Scout Report Subscriptions Exceed 10,000                   Internic
 The Future Of The Net Is At Hand                           James Parry
 Galactic Guide FAQ                                         Steve Baker
 Employment Background Checks                               Agre/Harbs

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  The Computer Is Your Friend         -Unknown
  Send Money, Guns, And Lawyers       -H. S. Thompson

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

       CYBERDOGGLES AND VIRTUAL PORK - A SCENARIO FOR INTERNET II

 By Carl Guderian <bjacques@usis.com>

 As one battle gets underway another is joined. While the EFF and others
 work to defend the noisy, colorful anarchy of the Net from the net.cops,
 the latter have begun gearing up for the endgame. If it's true that the
 electronic frontier is getting crowded while its newer colonists consider
 it too bare, then another system will be needed in a few years. That's the
 virtual Valley of Megiddo, the site of the (next) Final Battle between the
 techno-romantics and the corporate greyfaces. Internet II, or whatever
 they'll call it, is now only a vague idea in the minds of a few bureaucrats
 and infotainment industry execs, but it'll wind up a Mall of America,
 Panopticon, City of Quartz, or some other negative social metaphor (Brazil?).
 The first Internet grew up free because it was defined wholly by the users.
 Internet II, by contrast, will be a hybrid of corporate and government
 visions, combining the worst of both in a kind of Mendelian genetic
 distribution in which all offspring are defective. To the government it's
 a tax base and surveillance network; to industry it's a direct channel
 to a self-selecting, well-heeled market. To users the Internet is a
 community for which they've worked too hard to let it be taken away without
 a fight.

 The most obvious model for the Internet II standard is the U.S., or any
 other, civilian space program. It is about nothing so much as itself. The
 aerospace companies that are today inseparable from national space
 establishments make rockets or communications satellites. Like the designers
 of Internet II, they are concerned with delivering product (audiences) to
 the customers (advertisers). People generally support the space program
 because they hope it will open up space travel to everybody, from
 interplanetary honeymooners to lunar Libertarians (Jetsonian democracy!).
 Likewise, the Internet is popular because it's a vehicle for forming
 communities and getting free stuff. But Internet II will be about bandwidth,
 markets and security. The last item is emphasized because such a huge
 investment must be protected somehow, from the users of course. Whatever
 vision there might have been will be refocused instead on infrastructure.
 Call it information superhighway hypnosis, a trail of yellow stripes
 stretching to the horizon. Truly a vision to stir the soul.

 The pork barrel politics that characterize all big government projects will
 find a new arena on Internet II. The government can no longer pay for
 megaprojects like Internet II, but it can grant electronic Letters of
 Marque for companies to plunder the virtual seas under the federal colors.
 Obviously, the company or consortium that gets to write the new, none-dare-
 call-it-proprietary Internet protocols will have a leg up on competitors,
 sorta like the advantage Microsoft officially doesn't have over other
 developers for Windows.  In the current and upcoming Congressional funding
 battles, watch for posturing by lawmakers from whatever states the
 infotainment conglomerates call their nominal homes (Austin? Provo? Los
 Gatos?).

 The relatively meager funding doled out by the government will become an
 instrument of control, and privacy and free expression on Internet II will
 be the first to go. While Reagan preached getting the government off the
 backs of the people, Transportation Secretary Elizabeth (Mrs. Bob) Dole
 ordered states to raise drinking ages and enforce seat-belt laws or else
 lose federal funding for highway development. The states meekly complied.
 Would-be government contractors will be told, adopt a Clipper-like standard
 or don't bother to apply. Infotainment industry execs will be grilled by
 Congress for allowing "pone" on the net. Subsequently, said execs will
 promise to read private e-mail and censor discussions in exchange for easy
 passage of whatever bill they're promoting at the time. In 1985, the Parents
 Music Resource Center, led by Tipper (Mrs. Albert) Gore and financed by the
 likes of Mike Love of the Beach Boys, instigated Senatorial hearings on
 raunchy rock lyrics. Recording studio heads and distributors agreed to
 label and categorize "offensive" music in hopes Congress would tax blank
 tapes to offset revenue losses the industry attributed to home taping.
 Happily, the bill died and the hearings degenerated into a circus. But
 community standards on Internet II may be those of Memphis, Tennessee, if a
 recent court decision stands, and the only cyber-sex will be the user
 squealing like a pig for multimedia producers, petty bureaucrats, and self-
 appointed moral watchdogs. Government attempts to rein in the Internet
 community will continue no matter which party is in power. Repression smells
 the same whether it's for "national security," "community standards,"
 or raising PG kids in an X-rated world.

 Corporate plans for Internet II are even less palatable. The future dream
 is a shopping scheme, a Third Mall from the Sun. This corporate paradigm
 will kill the Internet as surely as will government interference and turn
 it into ?an Internet of shopkeepers. In a shopping mall the offerings are
 calculated to offend no one, so they please no one. Though a mall could, in
 theory, serve diverse interests, in reality it does not. Individual tastes
 being what they are, a customer could be offended by what it finds upon
 wandering into the wrong shop, and may leave the mall without buying
 anything. As a result, the mall loses the customer to a rival mall. To avoid
 this risk, the mall operator rents to shops with watered down selections,
 nothing too daring. Similarly, in a corporate online service, the range of
 allowable discussion topics is kept small to prevent users from who access
 the wrong discussion groups. Though it?s possible to restrict access to the
 forum without censoring discussion within it, most services take the lazy way
 out and forbid them altogether, in case a user objects to their very
 existence. So much for open discussion on Internet II.

 The corporate vision accommodates shopkeepers who hate customers who browse
 but don't buy. Customers can turn a mall into a kind of public space for the
 price of a few sodas and pizza slices. Americans online on Internet II,
 however, will have to pay by the hour just to hang around. The ticking clock
 will prompt them to hurry up and pay for something to download. After being
 on the clock at work, consumers will get to log on and shop on the clock.
 Constant reminders of a rising bill will discourage idle chatting on the
 newsgroups, further restricting discussion on Internet II.

 Security will become an issue as cyberspace, once considered a kind of
 public space, becomes privatized. As with Los Angeles, Internet II will be
 vandalized by users who will take no pride in it because they will not own
 it. The Secret Service will work as mall cops for the owners of Internet II.
 The promise of "500 channels" betrays the limits of corporate vision.
 Internet II will be "one-to-many" like cable TV instead of the "many-to-many"
 structure of the common carriers, because the former facilitates billing and
 control by local monopolies. Also, customers are not accustomed to
 pay-per-call on a local line, but they're getting used to pay-per-view
 programming on cable. Will you cuss and spit when you drop offline during a
 rainstorm? You will...with [censored].

 In the end, the corporate Internet will be designed for consumption, not
 community. Online services consider the latter an impediment to steady
 profits. Bovine consumers shop contentedly on 500 channels; discontented
 talkers just hog the lines. If corporate services had to destroy online
 communities that spring up like weeds in their well-kept yards, they would.
 Fortunately, they won?t have to; the Online Mall is barren ground.

 By some estimates, 1998 is the deadline to keep the Net from turning into
 the Third Mall from the Sun or that sanitized 1901 Kansas-style underground
 city in "A Boy and His Dog."  Here are ways to kill that serpent in its
 shell.

 - Breathe down the necks of the architects of Internet II.
 Infotainment industry demands may require physical features that
 facilitate billing and copyright protection. The IRS and the cops will
 certainly want their own window into the Net. What the users want,
 assuming they know, is considered irrelevant. Change that by working
 through groups like the Electronic Frontier Foundation, but keep them from
 accepting "compromise" measures to wiretap "only" certain communications
 channels. It's like prison etiquette, in which the proper response to a
 proprietary hand on the shoulder is either a sock on the jaw or meek
 acceptance of what comes next. Given what's at stake, such a savage ethic
 applies. Freedom lent is freedom lost.

 - Boycott obvious government lapdogs.
 Do not surrender the Internet to the government; it has no legitimate
 claim to it. The Internet is like an abandoned military base built into a
 community by squatters. The original tenants have long ago gotten their
 money's worth from it and cannot take credit for the value added by the
 new settlers. The Internet communications standard, TCP/IP, which turned
 all the networks into the Internet, is public domain. The feds don't own
 it any more than they own the measurement of one U.S. gallon. The
 government still owns high-speed backbones, such as the National Science
 Foundation's NSFnet, and it can and does allow semi-private consortia like
 Merit to operate and maintain them. The users should claim the Internet,
 however, by usufruct ("fruitful use"), a legal concept under which
 squatters gain the right to occupy a structure in exchange for having
 improved it.  If all else fails, boycott Internet II and go back to
 TCP/IP. The latter may not have the bandwidth and the bells and whistles
 of Internet II, but it works well enough and won't have wiretap-friendly
 features built into it. Most projected growth will come from the online
 services dumping settlers by the millions on Internet II, taking the load
 off the present Internet. Currently dedicated but unused Internet addresses
 can be redistributed. TCP/IP, the current protocol, can support 20+ million
 people worldwide, which is probably the proportion of the population
 willing and able to protect their freedom online. Even without an Internet,
 there are systems that will work in a pinch, like FIDOnet, invented by Tom
 Jennings and a few others. Using personal computers and ordinary phone
 lines, FIDOnet delivers e-mail to 30,000+ sites in the world. So
 alternatives exist, though it would be a shame to have to abandon a
 community just when it was starting to mature.  De-evolution of the
 Internet community is a likely outcome but it's not inevitable. For the
 first time since the Whiskey Rebellion there's a chance to redirect
 American history from the seemingly endless march to centralized control.
 The technology is pretty cheap and widely available (unlike rockets), so
 it's a rare opportunity for real grass-roots action to create something
 that people can actually use. Internet doesn't have to go the way of other
 Big Science projects. But it will take a real fight; the other side won't
 deal if it doesn't think it has to. At stake is the future of the online
 community. Civilization built in an Autonomous Zone or pay-per-view
 surveillance (guess who pays?) in the Third Mall from the Sun:
 WHICH WILL IT BE? Those words fill the screen, accompanied by Raymond
 Massey whispering and chorus singing same, in "Things to Come."  Fadeout).

 The Third Mall from the Sun concept belongs to late comic genius Bill Hicks.
 Burn joss money in his memory to help cover his bar tab in the afterlife.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
 IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
 YOU LIVE IN TEXAS.  ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
 PRIVACY.  IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

       EFF SUMMARY OF THE EDWARDS/LEAHY DIGITAL TELEPHONY BILL

 From Stanton McCandlish <mech@eff.org>

 OVERVIEW
 --------

 The Edwards/Leahy Digital Telephony bill places functional requirements on
 telecommunications carriers in order to enable law enforcement to continue
 to conduct authorized electronic surveillance. It allows a court to impose
 fines on carriers that violate the requirements, and mandates that the
 processes for determining capacity requirements and technical standards be
 open and public.  The bill also contains significant new privacy
 protections; including an increased standard for government access to
 transactional data (such as addressing information contained in electronic
 mail logs), a requirement that information acquired through the use of pen
 registers or trap and trace devices not disclose the physical location of an
 individual, and an expansion of current law to protect the radio portion of
 cordless telephone conversations from unauthorized surveillance.


 SCOPE OF THE BILL.  WHO IS COVERED?
 -----------------------------------

 The requirements of the bill apply to "telecommunications carriers", which
 are defined as any person or entity engaged in the transmission or
 switching of wire or electronic communications as a common carrier for hire
 (as defined by section 3 (h) of the Communications Act of 1934), including
 commercial mobile services (cellular, PCS, etc.).  The bill also applies to
 those persons or entities engaged in providing wire or electronic
 communication switching or transmission service to the extent
 that the FCC finds that such service is a replacement for a substantial
 portion of the local telephone exchange.

 The bill does not apply to online communication and information services
 such as Internet providers, Compuserve, AOL, Prodigy, and BBS's. It also
 excludes private networks, PBX's, and facilities which only interconnect
 telecommunications carriers or private networks (such as most long
 distance service).


 REQUIREMENTS IMPOSED ON CARRIERS
 --------------------------------

 Telecommunications carriers would be required to ensure that they
 possess sufficient capability and capacity to accommodate law enforcement's
 needs.  The bill distinguishes between capability and capacity
 requirements, and ensures that the determination of such requirements occur
 in an open and public process.


 CAPABILITY REQUIREMENTS
 -----------------------

 A telecommunications carrier is required to ensure that, within four years
 from the date of enactment, it has the capability to:

 1.      expeditiously isolate the content of a targeted communication
         within its service area;

 2.      isolate call-identifying information about the origin and
         destination of a targeted communication;

 3.      enable the government to access isolated communications at a point
         away from the carrier's premises and on facilities procured by the
         government, and;

 4.      to do so unobtrusively and in such a way that protects the privacy
         and security of communications not authorized to be intercepted
         (Sec. 2601).

 However, the bill does not permit law enforcement agencies or officers to
 require the specific design of features or services, nor does it prohibit a
 carrier from deploying any feature or service which does not meet the
 requirements outlined above.


 CAPACITY REQUIREMENTS
 ---------------------

 Within 1 year of enactment of the bill, the Attorney General must
 determine the maximum number of intercepts, pen register, and trap and
 trace devices that law enforcement will require four years from the date of
 enactment.  Notices of capacity requirements must be published in the
 Federal Register (Sec. 2603).   Carriers have 4 years to comply with
 capacity requirements.

 PROCESS FOR DETERMINING TECH. STANDARDS TO IMPLEMENT CAPABILITY REQUIREMENTS
 ----------------------------------------------------------------------------

 Telecommunications carriers, through trade associations or standards
 setting bodies and in consultation with the Attorney General, must
 determine the technical specifications necessary to implement the
 capability requirements (Sec. 2606).

 The bill contains a 'safe harbor' provision, which allows a carrier to meet
 its obligations under the legislation if it is in compliance with publicly
 available standards set through this process.   A carrier may deploy a
 feature or service in the absence of technical standards, although in such
 a case the carrier would not be covered by the safe harbor provision and
 may be found in violation.

 Furthermore, the legislation allows any one to file a motion at the FCC in
 the event that a standard violates the privacy and security of
 telecommunications networks or does not meet the requirements of the bill
 (Sec. 2606).  If petitioned under this section, the FCC may establish
 technical requirements or standards that:

 1)      meet the capability requirements (in Sec. 2602);

 2)      protect the privacy and security of communications not authorized
         to be intercepted, and;

 3)      encourage the provision of new technologies and services to the
         public.


 ENFORCEMENT AND PENALTIES
 -------------------------

 In the event that a court or the FCC deems a technical standard to be
 insufficient, or if law enforcement finds that it is unable to conduct
 authorized surveillance because a carrier has not met the requirements of
 this legislation, the Attorney General can request that a court issue an
 enforcement order (an order directing a carrier to comply), and/or a fine
 of up to $10,000 per day for each day in violation (Sec. 2607).  However, a
 court can issue an enforcement order or fine a carrier only if it can be
 determined that no other reasonable alternatives are available to law
 enforcement.  This provision allows carriers to deploy features and
 services which may not meet the requirements of the bill.  Furthermore,
 this legislation does not permit the government to block the adoption or
 use of any feature or service by a telecommunications carrier which does
 not meet the requirements.

 The bill requires the government to reimburse carriers for all reasonable
 costs associated with complying with the capacity requirements. In other
 words, the government will pay for upgrades of current features or
 services, as well as any future upgrades which may be necessary, pursuant
 to published notices of capacity requirements (Sec. 2608).

 There is $500,000,000 authorized for appropriation to cover the costs of
 government reimbursements to carriers.  In the event that a smaller sum is
 actually appropriated, the bill allows a court to determine whether a
 carrier must comply (Sec. 2608 (d)).  This section recognizes that
 telecommunications carriers may not  be responsible for meeting the
 requirements if the government does not cover reasonable costs.

 The government is also required to submit a report to congress within four
 years describing all costs paid to carriers for upgrades (Sec. 4).


 ENHANCED PRIVACY PROTECTIONS
 ----------------------------

 The legislation contains enhanced privacy protections for transactional
 information (such as telephone toll records and electronic mail logs)
 generated in the course of completing a communication.  Current law permits
 law enforcement to gain access to transactional information through a
 subpoena.   The bill establishes a higher standard for law enforcement
 access to transactional data contained electronic mail logs and other
 online records.  Telephone toll records would still be available through a
 subpoena.   Under the new standard, law enforcement is required to obtain a
 court order by demonstrating specific and articulable facts that electronic
 mail logs and other online transactional records are relevant and material
 to an ongoing criminal investigation (Sec. 10).

 Law enforcement is also prohibited from remotely activating any
 surveillance capability.  All intercepts must be conducted with the
 affirmative consent of a telecommunications carrier and activated by a
 designated employee of the carrier within the carrier's facilities (Sec.
 2604).

 The bill further requires that, when using pen registers and trap and trace
 devices, law enforcement will use, when reasonably available, devices which
 only provide call set up and dialed number information (Sec. 10).  This
 provision will ensure that as law enforcement employs new technologies in
 pen register and trap and trace devices, it will not gain access to
 additional call setup information beyond its current authority.

 Finally, the bill extends the Electronic Communications Privacy Act (ECPA)
 protections against interception of wireless communications to cordless
 telephones, making illegal the intentional interception of the radio
 portion of a cordless telephone (the transmission between the handset
 and the base unit).


 CELLULAR SCANNERS
 -----------------

 The bill makes it a crime to possess or use an altered telecommunications
 instrument (such as a cellular telephone or scanning receiver) to obtain
 unauthorized access to telecommunications services (Sec. 9).  This
 provision is intended to prevent the illegal use of cellular and other
 wireless communications services.  Violations under this section face
 imprisonment for up to 15 years and a fine of up to $50,000.


 IMPROVEMENTS OF THE EDWARDS/LEAHY BILL OVER PREVIOUS FBI PROPOSALS
 ------------------------------------------------------------------

 The Digital Telephony legislative proposal was first offered in 1992 by the
 Bush Administration.  The 1992 version of the bill:

 *       applied to all providers of wire or electronic communications
         services (no exemptions for information services, interexchange
         carriers or private networks);

 *       gave the government the explicit authority to block or enjoin a
         feature or service that did not meet the requirements;

 *       contained no privacy protections;

 *       contained no public process for determining the capacity
         requirements;

 *       contained no government reimbursement (carriers were responsible
         for meeting all costs);

 *       would have allowed remote access to communications by law
         enforcement, and;

 *       granted telecommunications carriers only 18 months to comply.

 The Bush Administration proposal was offered on capitol hill for almost a
 year, but did attract any congressional sponsors.

 The proposal was again offered under the Clinton Administration's FBI in
 March of 1993.  The Clinton Administration's bill was a moderated version
 of the original 1992 proposal:

 *       It required the government to pay all reasonable costs incurred by
         telecommunications carriers in retrofitting their facilities in
         order to correct existing problems;

 *       It encouraged (but did not require), the Attorney General to consult
         with telecommunications industry representatives and standards
         bodies to facilitate compliance,

 *       It narrowed the scope of the legislation to common carriers, rather
         than all providers of electronic communications services.

         Although the Clinton Administration version was an improvement
         over the Bush Administration proposal, it did not address the
         larger concerns of public interest organizations or the
         telecommunications industry.  The Clinton Administration version:

 *       did not contain any protections for access to transactional
         information;

 *       did not contain any public process for determining the capability
         requirements or public notice of law enforcement's capacity needs;

 *       would have allowed law enforcement to dictate system design and
         bar the introduction of features and services which did not meet
         the requirements, and;

 *       would have allowed law enforcement to use pen registers and trap and
         trace devices to obtain tracking or physical location information.


 Locating Relevant Documents
 ===========================

 ** Original 1992 Bush-era draft **

 ftp.eff.org, /pub/EFF/Policy/FBI/Old/digtel92_old_bill.draft
 gopher.eff.org, 1/EFF/Policy/FBI/Old, digtel92_old_bill.draft
 http://www.eff.org/pub/EFF/Policy/FBI/Old/digtel92_old_bill.draft
 bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital
      Telephony; file: digtel92.old

 ** 1993/1994 Clinton-era draft **

 ftp.eff.org, /pub/EFF/Policy/FBI/digtel94_bill.draft
 gopher.eff.org, 1/EFF/Policy/FBI, digtel94_bill.draft
 http://www.eff.org/pub/EFF/Policy/FBI/digtel94_bill.draft
 bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital
      Telephony; file: digtel94.dft


 ** 1994 final draft, as sponsored **

 ftp.eff.org, /pub/EFF/Policy/FBI/digtel94.bill
 gopher.eff.org, 1/EFF/Policy/FBI, digtel94.bill
 http://www.eff.org/pub/EFF/Policy/FBI/digtel94.bill
 bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital
      Telephony; file: digtel94.bil


 ** EFF Statement on sponsored version **

 ftp.eff.org, /pub/EFF/Policy/FBI/digtel94_statement.eff
 gopher.eff.org, 1/EFF/Policy/FBI, digtel94_statement.eff
 http://www.eff.org/pub/EFF/Policy/FBI/digtel94_statement.eff
 bbs: +1 202 638 6120 (8N1, 300-14400bps), file area: Privacy - Digital
      Telephony; file: digtel94.eff

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                              'ZINE FAQ

 By Jerod Pore (jerod23@well.sf.ca.us)

 This file is Shareright 1994 by Jerod Pore;  you may (and please do) copy,
 reproduce, replicate and distribute this information however, whereever
 and in whatever format, and as often as you wish, as long as this sentence
 is included.

 Answers to Frequently Asked Questions.

 What are zines?

 Zines are small press publications with a press run of 15 - 5,000.  They
 often deal with obscure or controversial subjects, or they're about the
 life of the publisher, or they're about the latest underground muzak
 sensation.

 How does one find out about zines?

 The best place to start is with Factsheet Five or Factsheet Five-Electric.
 We review 1,000 - 1,500 zines every three months (more or less).  We
 provide ordering information, size, quality of reproduction, contents and
 what we think about a zine.  Once you get a few zines that sound
 interesting, you'll notice other zines referred to.  Pretty soon you'll
 have more reading material then you know what to do with.


 How does one produce a zine?

 That's beyond the scope of this document.  But my stock answer is go to
 lunch at 11:30 am, get back by 12:15 and you should have plenty of time
 to use the equipment at school or at work.  Write down your thoughts (I
 suggest doing artwork on your own time), photocopy 40 or 50 copies, send
 one to us and to a few zines you think would be interested in yours.
 You may want to get the Zine Publishers' Resource guide, either $3.00
 from Seth at the address below, or the prior version is available from
 the ftp and gopher sites.


 How does one get the zines?

 When ordering zines, cash is the best medium of exchange.  Forget what
 your mother told you about evil thieves stealing one dollar bills out of
 mail boxes.  If you absolutely must send a check or money order (and a
 money order is preferred over a check), then make it out to the name in
 the address portion of the reviews.  However, many people publish zines
 under pseudonyms.  Unless available only for a ridiculous amount of money,
 just send cash.

 Many zines, especially personal zines, science fiction fanzines and
 anarchist zines are available for what is quaintly known as "The Usual."
 "The Usual" is your zine or tape or record or calendar in trade, or a
 well-written Letter of Comment on the subject of the zine, or $2 - $3.
 Be warned about a few things.  There are no guarantees.  Checks are
 likely to be thrown away.  Some zine names with especially offensive
 titles have often had their mail thrown away by self-righteous born-
 again postal workers, I kid you not!  If the name of the zine is apt to
 offend your third-grade teacher, don't put it on the envelope.  Some
 zines published in rather provincial parts of the world won't get their
 mail if the publisher's name isn't on the envelope, so whatever the name
 is in address, that's the name that should go on the envelope.  I can
 work only with what information is provided me.  I'll post any special
 requirements that are conveyed to me.  If a zine is free, you may want
 to help out with some stamps.  Free often translates as "The Usual," and
 many anarchists will accept food stamps.


 How to contact us with questions, etc. regarding F5 - either the paper
 or electronic versions.

 The email address for Factsheet Five and Factsheet Five - Electric is:
 jerod23@well.sf.ca.us

 Once upon a time, Seth had an email address.  It may be reactivated in the
 future.  The phone number for Factsheet Five (paper only) is +1-415-668-1781


 Where should stuff be sent?

 For anything that can't be sent electronically, which is most of the
 stuff we deal with;  comments, questions, feedback, donations, zines and
 other contributions to the defense of free expression rights around the
 world should be sent to either of these addresses:

 Factsheet Five
 Seth Friedman
 PO Box 170099
 San Francisco CA  94117-0099
 (This is the *only* address for subscriptions to the paper version)

 Factsheet Five
 Jerod Pore
 1800 Market St.
 San Francisco CA   94102-6297
 (This address is good for items that can't be sent to a PO Box)

 If you have a preference of reviewers, then send your zine to either of
 the above addresses as you see fit.  Please, though, send your zine to
 just *ONE* address.  Multiple copies just slow us down.  I do most of
 the Fringe, Hate, Rant, SubGenius and Science Fiction/Fantasy zines.
 Seth either reviews or distributes the rest.

 We have a couple of long-time reviewers for two niches.  They publish
 their own review zines so you get twice the coverage.  We must stress that
 you send poetry to Luigi-Bob, because poetry sent to San Francisco won't
 be reviewed for a couple of issues.

 Send your queer, bi or especially prurient zines to:

 Larry-bob
 Queer Zine Explosion
 PO Box 591275
 San Francisco CA  94159-1275

 Send all poetry or prose/poetry zines with lots of poetry to:

 Luigi-Bob Drake
 Burning Press
 PO Box 585
 Lakewood OH   44107

 How does one obtain the reviews of zines?

 The files that comprise Factsheet Five - Electric are available for
 online reading or downloading from WELL or with a gopher client with
 gopher gopher.well.sf.ca.us.  The files are also available via anonymous
 ftp from etext.archive.umich.edu in /pub/Factsheet.Five. The prior issue
 is in /pub/Factsheet.Five/Last.Issue. The WWW site is  http://www.well.com/
 You may subscribe to Factsheet Five - Electric by emailing me with
 "subscribe" in the subject line and your email address as the *entire* text.
 The files are sent out as they become available.  Email subscriptions are
 sent out *last*, as it's a real pain in the ass for me to deal with.
 F5-E is available from other ftp and gopher sites, as well as BBS's around
 the world, but I don't track other locations.


 What is the best method of receiving the review files?

 The WELL is the "best" place.  Not only is The WELL the greatest BBS in
 CyberSpace (no, I don't get a kickback;  I pay $30-50 a month to be on
 WELL) it's the homebase for F5 - Electric.  The most recent files are
 there.  Online zines that are sent to me are there.  News, gossip and
 rumours about zines and other underground media are there.  2600, Full
 Disclosure, bOING-bOING and other zinesters are there.  The
 WELL is, however, somewhat expensive at $15.00 a month and $2.00 an
 hour.  After WELL, ftp, gopher or WWW are the next best ways of getting
 the files.

 Our ftp sites accept anonymous as a login and your return address as a
 password.  For some people, especially those of you on FidoNet, Compu$erve
 and other services with email-only gateways to The Internet, email is the
 *only* way to get the files.   Unfornuately, the large file sizes (files
 range from 8 - 100k) prevent many locations from receiving them through
 email, especially uunet and uucp sites.



 How do ftp, gopher and WWW users know when new or updated files are
 available?

 For now, updates to F5-E will be announced in the newsgroups that
 attract people interested in zines:  alt.zines and rec.mag
 An excellent suggestion was made about having an email service that
 announces just the names of the new or updated files to ftp users.
 I've juggled two email subscription lists, so this idea will be too much
 of a hassle to implement. I don't know if the zines-list is still active.
 If it is, I might send announcements out that way.

 What is alt.zines?

 alt.zines is a Usenet newsgroup about zines.  It's where we discuss zine
 publishing, hype our zines, bitch about mainstream publications trying
 to coopt zines and so forth.  It's unmoderated, but there's a few of us
 there most of the time to answer these questions over&over&over and to
 point out that your slick publication about Christian technology with a
 circulation of over 150,000 is *not* a zine.

 Much of the posts in alt.zines are xposted to rec.mag, to benefit people
 at sites where the anal-retentive administrators refuse to carry the
 alt. hierarchy.


 May the files be reprinted or posted elsewhere?

 All files (just like this one) are shareright.  You may reproduce the
 information contained within them freely as long as others may reproduce
 that same information.  In other words, you may use but not copyright
 these files.  Shareright does not prevent you from charging money (or
 whatever your preferred medium of exchange is) for distribution.
 Including pertinent parts of this file, and giving credit to the
 reviewers is especially good for your karma, but not absolutely required
 to use what you wish of the review files.  We're more interested in the
 widespread dissemination of the information.  BBS operators are
 especially encouraged to make whatever files you deem appropriate
 available to your users.

 How does one submit reviews?

 For now, email the reviews to me.  This could be subject to change, once
 we work out everything.  Each file will have reviews of one or more
 zines that are somehow categorized together by subject matter or by
 reviewer.  Also feel free to post to alt.zines reviews of zines you have
 come across or to hype your own zines.  I've adopted the nerdy HTML format
 that is used for WWW browsing.

 While sticking to the format is nice, it is not necessary, as long as
 all pertinent information is included.  However if the reviews are to be
 accessible by the Web, then you had better do them this way.
 Please keep all reviews in vanilla ASCII format. Also keep them shareright.

 We are especially in need of reviews ezines and of zines that are published
 outside of North America.  Now, I get zines from Australia and, since I
 used to live there, I understand the dialect and cultural references.
 We don't have the resources to review zines that aren't published in
 English. I'd rather that F5-Electic not be an English only publication.
 If you get zines from other parts of the world and are willing to review
 them, please send the reviews to me.

 We are carrying a listing of ezines, thanks to johnl@netcom.com, but we
 would like to get more reviews of ezines, too.

 What are the subscription rates and/or sample copy prices for the print
 version of Factsheet Five?

 Single issues:
 US    Newsstand Cover Price:             $3.95  (Marketing sucks!)
 US    via 1st Class:                     $6.00
 Canada, Mexico:                          $6.00
 Elsewhere in the world:                  $9.00

 Six issue Subscription:
 US 3rd Class:                            $20.00
 Friend Rate*                             $40.00

 * First class, in an envelope, with the publisher's eternal gratitude AND
 the occassional subscriber goodie, like the Zine Publisher's Guide, or

 2 pounds of zines for $3.00.
 Canada, Mexico:                          $35.00
 UK, Europe, Latin America                $45.00
 Asia, Africa, Pacific                    $55.00


 "We accept for payment cash (US or otherwise), check or money order drawn
 in US funds (payable to Factsheet Five), or IRCs (at the rate of $0.50
 each).  Prisoners may get single issues by paying in stamps."

 Please foward orders to:
 R. Seth Friedman
 P.O. Box 170099
 San Francisco, CA 94117-0099


 Will the subscription list (for the paper version) be sold?

 Seth plans making the list available to lots of cool companies like
 Archie McPhee, Blue Ryder, Co-Op America, and Kitchen Sink Press.  If
 you have an aversion to receiving cool catalogs and other neat stuff in
 the mail, just mention it with your order.  We'll be sure to keep your
 address private.

 What about the subscription list to the electronic version?

 The only thing I'll do with the email list is dump it when I get fed up
 with emailling huge files.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 LEGION OF DOOM T-SHIRTS!! Get 'em

 By Chris Goggans <phrack@well.sf.ca.us>

 After a complete sellout at HoHo Con 1993 in Austin, TX this past
 December, the official Legion of Doom t-shirts are available
 once again.  Join the net luminaries world-wide in owning one of
 these amazing shirts.  Impress members of the opposite sex, increase
 your IQ, annoy system administrators, get raided by the government and
 lose your wardrobe!

 Can a t-shirt really do all this?  Of course it can!

 "THE HACKER WAR  --  LOD vs MOD"

 This t-shirt chronicles the infamous "Hacker War" between rival
 groups The Legion of Doom and  The Masters of Destruction.  The front
 of the shirt displays a flight map of the various battle-sites
 hit by MOD and tracked by LOD.  The back of the shirt
 has a detailed timeline of the key dates in the conflict, and
 a rather ironic quote from an MOD member.

 (For a limited time, the original is back!)

 "LEGION OF DOOM  --  INTERNET WORLD TOUR"

 The front of this classic shirt displays "Legion of Doom Internet World
 Tour" as well as a sword and telephone intersecting the planet
 earth, skull-and-crossbones style.  The back displays the
 words "Hacking for Jesus" as well as a substantial list of "tour-stops"
 (internet sites) and a quote from Aleister Crowley.

 All t-shirts are sized XL, and are 100% cotton.

 Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for
 postage.

 Send checks or money orders.  Please, no credit cards, even if
 it's really your card.


 Name:       __________________________________________________

 Address:    __________________________________________________

 City, State, Zip:   __________________________________________


 I want ____ "Hacker War" shirt(s)

 I want ____ "Internet World Tour" shirt(s)

 Enclosed is $______ for the total cost.

 Mail to:   Chris Goggans
            603 W. 13th #1A-278
            Austin, TX 78701

 These T-shirts are sold only as a novelty items, and are in no way
 attempting to glorify computer crime.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        A POINT AND CLICK SOCIETY
                   LEARN TO DRIVE, OR GET OFF THE ROAD

                              An Editorial

 By Scott Davis (dfox@fc.net)

 As a computer support professional, I am unfortunate enough to see some
 of the developments pertaining to the Internet as they occur. I say
 "unfortunate" not because what I see is so terrible, but what I see never
 ceases to knock me off of my feet. What I am referring to is the massive
 wave of new people coming on to the "Inpho-s00per Highway" who if not for
 icons to click on and a mouse to click with, would not be able to use a
 personal computer...much less some global network. Uhh..uhh I thank I'm
 referrin' to that "Inter-Net" thang...

 People are being sucked into a revolution of digital "Everything".
 Computers do their taxes, balance their books, order groceries and other
 products, and deliver electronic mail...among other things. But, it bugs me
 to no end to see somebody with an e-mail address from AOL. It makes me
 want to mail them back and tell them "HEY! Did you know that you are on
 the dirt road that runs beside the Internet?" Or tell them to "Get out
 of the ghetto of the Internet." "Do you know what you're doing?"

 What the big companies have done is give the masses a loaded gun... and
 the masses have never fired a weapon in their life! They've given them
 a Porsche 944...and they've never driven a car. But I also question the
 common sense of the average computer user. "Do you know what this computer
 does?" The bottom line is that there are more things to do with this thing
 than point and click on all of your pretty applications.

 Services such as AOL promote things like "electronic mail" and "Access to
 the Internet". But how many people who purchased the software did any
 reading or research as to WHAT the Internet is. WHAT is electronic mail?
 I know that I'll probably get a thousand flames for this article, and
 they'll say 'We were all newbies once!" I am completely aware of that,
 but when we (people who have been on the Net for 5+ years) were new,
 we had to learn every aspect of what we were getting into. There was no
 point-and-click options. If we did not know command line operations,
 we didn't surf! One problem can be contributed to the press. This is
 the fact that they have made "The Internet" and Info-SuperHighway"
 buzz-phrases that people are going to be attracted to because they
 sound "cool".

 There are no PC-based computers being marketed without Dos and Windows
 to this editor's knowledge. When the customer sees "Dos and Windows",
 how many people do you think say, "Hey Look...it's got Dos too!"
 It simply does not happen. Who cares what an operating system is, right?
 Well, the fact is...you better care. Because without an operating system,
 you wouldn't be able to point and click on you pretty little icons.

 I commend AOL, Compuserve, Microsoft and others who develop software
 for the masses. They do a fine job and a great service to the world.
 Computing just would not be the same without them (I guess).

 Computers are being mass-marketed and distributed to the public like
 social security cards. For the big-boys in the industry, this is good.
 It means profit, jobs, and market-share...and that sometime soon, every
 household in America will have at least one computer (or doorstop) and the
 owner will not know the first thing about it.

 Commercial software manufacturers and Internet service providers are
 looking at this as a slaughter. Rounding up the cattle, as it were.
 This is fine with me, but it is the end-user's responsibility to
 do work on his/her own to know what this "Hi-Tek-Hiway" is. There are
 ways not to become sheep. And if you don't do your homework, you don't
 deserve better.

 I think that people should be required to attend some in-depth computer
 courses before being able to buy one.

 * Computer Basics: This class would last a total of 100 hours. Two hours
   a night, three nights a week.  Windows and other applications would not
   be discussed. The students would have to prove that they are proficient
   in Dos, Unix, or whatever command-line operating system their PC used.
   At the end of the 100 hour course, if they passed the command-line stuff,
   they would be permitted to attend a class that provided instruction
   on GUI's and other software.

 * Internet Basics 101:  If the sheep are so eager to get on this damn
   SuperHighway, learn what it is about. Learn where it origninated and
   what it can do. --- and learn how NOT to be a headache to others.
   Ethics would be a portion of the instruction. Learn who you are,
   evaluate your place on the Net, and know that no matter who you are...
   there are bigger and better hackers out there.

 * Learn the difference between the Highway and the shoulder.

 * What is "REAL" access and just a gateway to where you WISH you were.

 * Hardware Troubleshooting:  If my floppy disk drive is not working, I'd
   kinda like to know what to do to see if it is actually broken. If you
   purchased a $30,000 car and there were no service centers in the world,
   wouldn't you like to know how to change your oil?

 * Telecommunications Instruction:  What is a modem? What does it do?
   Learn how to use non-commercial telecom software. Find some modem
   software package that does not come from a major service provider
   or is not used with the most popular GUI in the world...and call up a
   few local bulletin board systems. Also, if my modem is not functioning,
   I'd like to know some of the reasons why, and try to correct them.

 These are some simple suggestions that I believe everyone should do before
 purchasing a computer system. Of course, if you have been using computers
 for an extended period of time and proclaim to know how they work, there
 would be a CLEP test for you. Answer 5 questions about hardware, three
 questions on Internet, and answer NO to the question "Do you use Windows?"
 and you'll be on your way home with that new system. This is certainly not
 an attempt to hammer commerical services and/or providers, certain
 software programs designed to make computing easier, or the people who
 use them. It's simply a statement saying "Know what you're doing, make
 yourself open to fluctuations in trends, educate yourself on global
 networking, and have a nice day." There is no excuse for ignorance. Open
 your documentation, go to the book store, whatever. Do your homework.
 Otherwise, pull over...you're going to jail for driving without a license.

 There are political fights going on right now over different aspects of
 this "SuperHighway" that you're so eager to get on. The decisions made
 will ultimately affect you. Do you care? You should. There are lawyers,
 lobbyists, organizations such as the Electronic Frontier Foundation,
 and many individuals fighting for your right to use the services that
 you use. They are fighting to keep it "usable."

 In closing, be alert, be aware...and get educated. The light at the end of
 the tunnel to success might be a locomotive!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
 IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
 YOU LIVE IN TEXAS.  ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
 PRIVACY.  IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%


               KEYNOTE ADDRESS : CRYPTOGRAPHY CONFERENCE

 By Bruce Sterling (bruces@well.sf.ca.us)

       Hello everybody.  It's quite an honor to be delivering the
 keynote address -- a *thankfully brief* keynote address -- at this
 conference.  I hope to clear the decks in short order, and let you
 spend an engrossing afternoon, listening to an intense discussion of
 complex and important public issues, by highly qualified people, who
 fully understand what they're talking about.  Unlike myself.

       Before all this begins, though, I do want to establish a
 context for this conference.  Let me briefly put on my professional
 dunce-hat, as a popular-science writer, and try to make it clear to
 you exactly what the heck is going on here today.

 Cryptography.   The science and study of secret writing, especially
 codes and cypher systems.  The procedures, processes, measures and
 algorithms for making and using secret exchanges of information.
 *Secret*  exchanges, done, made and conducted without the knowledge of
 others, whether those others be governments, competitors, local, state
 or federal police, private investigators, wiretappers, cellular
 scanners, corporate security people, marketers, merchandisers,
 journalists, public health officials, squads for public decency,
 snoopy neighbors, or even your own spouse, your own parents, or your
 own children.

       Cryptography is a way to confine knowledge to the initiated and
 the privileged in your circle, whatever that circle might be:
 corporate co-workers, fellow bureaucrats, fellow citizens, fellow
 modem-users, fellow artists, fellow writers, fellow
 influence-peddlers, fellow criminals, fellow software pirates, fellow
 child pornographers.

       Cryptography is a way to assure the privacy of digital way to
 help control the ways in which you reveal yourself to the world.  It
 is also a way to turn everything inside a computer, even a computer
 seized or stolen by experts, into an utterly scrambled Sanskrit that
 no one but the holder of the key can read.  It is a swift, powerful,
 portable method of high-level computer security.   Electronic
 cryptography is potentially, perhaps, even a new form of information
 economics.

       Cryptography is a very hot issue in electronic civil liberties
 circles at the moment.  After years of the deepest, darkest,
 never-say-anything, military spook obscurity, cryptography is out of
 the closet and openly flaunting itself in the street.  Cryptography is
 attracting serious press coverage.  The federal administration has
 offered its own cryptographic cure-all, the Clipper Chip.
 Cryptography is being discussed openly and publicly, and practiced
 openly and publicly.  It is passing from the hands of giant secretive
 bureaucracies, to the desktop of the individual.   Public-key
 cryptography, in particular, is a strange and novel form of
 cryptography which has some very powerful collateral applications and
 possibilities, which can only be described as bizarre, and possibly
 revolutionary.   Cryptography is happening, and happening now.

       It often seems a truism in science and technology that it takes
 twenty years for anything really important to  happen:  well,
 Whitfield Diffie was publishing about public-key cryptography in 1975.
 The idea, the theory for much of what will be discussed today was
 already in place, theoretically, in 1975.  This would suggest a target
 date of 1995 for this issue to break permanently out of the arid world
 of theory, and into the juicy, down-and-dirty real world of politics,
 lawsuits, and money.  I rather think that this is a likely scenario.
 Personally, I think the situation's gonna blow a seam.  And by
 choosing to attend this EFF and EFF-Austin conference in September
 1993, you are still a handy two years ahead of the curve.  You can
 congratulate yourself!

       Why do I say blow a seam?  Because at this very moment, ladies
 and gentlemen, today, there is a grand jury meeting in Silicon Valley,
 under the auspices of two US federal attorneys and the US Customs
 Service.  That grand jury is mulling over possible illegality,
 possible indictments, possible heaven-knows-what, relating to supposed
 export-law violations concerning this powerful cryptography
 technology.  A technology so powerful that exporting cryptographic
 algorithms requires the same license that our government would grant
 to a professional armaments dealer.   We can envision this federal
 grand jury meeting, in San Jose California, as a kind of dark salute
 to our conference here in Austin, a dark salute from the forces of
 the cryptographic status quo.  I can guarantee you that whatever you
 hear at this conference today, is not gonna be the last you hear about
 this subject.

       I can also guarantee you that the people you'll be hearing from
 today are ideal people to tell you about these issues.  I wrote a book
 once, partly about some of these people, so I've come to know some of
 them personally.   I hope you'll forgive me, if I briefly wax all
 sentimental in public about how wonderful they are.  There will be
 plenty of time for us to get all hardened and dark and cynical later.
 I'll be glad to help do that, because I'm pretty good at that when I
 put my mind to it, but in the meantime, today, we should feel  lucky.
 We are lucky enough to have some people here who can actually tell us
 something useful about our future.  Our real future, the future we can
 actually have, the future we'll be living in,  the future that we can
 actually do something about.

       We have among us today the board of directors of the Electronic
 Frontier Foundation.  They are meeting in Austin in order to pursue
 strategy for their own national organization, but in the meantime,
 they also have graciously agreed to appear publicly and share their
 expertise and their opinions with us Austinites.  Furthermore, they
 are not getting a dime out of this; they are doing it, amazingly, out
 of sheer public-spiritedness.

       I'm going to introduce each of them and talk about them very
 briefly.  I hope you will reserve your applause until the end.
 Although these people deserve plenty of applause, we are short on
 quality applause resources.  In fact, today we will be rationing
 applause care, in order to assure a supply of basic, decent,
 ego-boosting applause for everyone, including those unable to
 privately afford top-quality applause care for the health of their own
 egos.  A federal-policy in-joke for the many Washington insiders we
 have in the room today.

       Very well,  on to the business at hand.  Mitch Kapor is a
 cofounder of the Electronic Frontier Foundation, a software designer,
 a very prominent software entrepreneur, a philanthropist, a writer and
 journalist, and a civil liberties activist.  In 1990, when Mr. Kapor
 co-founded EFF, there was very considerable legal and constitutional
 trouble in the world of cyberspace.  Mitch spoke out on these
 sometimes-arcane, sometimes-obscure issues, and he spoke loudly,
 repeatedly, publicly, and very effectively.  And when Mitch Kapor
 finished speaking-out, those issues were no longer obscure or arcane.
 This is a gift Mitch has, it seems.  Mitch Kapor has also quietly done
 many good deeds for the electronic community, despite his full
 personal knowledge that no good deed goes unpunished.  We very likely
 wouldn't be meeting here today, if it weren't for Mitch, and anything
 he says will be well worth your attention.

       Jerry Berman is the President and Director of Electronic
 Frontier Foundation, which is based in Washington DC.  He is a
 longtime electronic civil liberties activist, formerly the founder and
 director of the Projects on Privacy and Information Technology for the
 American Civil Liberties Union.  Jerry Berman has published widely on
 the legal and legislative implications of computer security and
 electronic communications privacy, and his expertise in networks and
 the law is widely recognized.  He is heading EFF's efforts on the
 national information infrastructure in the very thick of the
 Clinton-Gore administration, and Mr Berman, as you might imagine, is a
 very busy man these days, with a lot of digital irons in the virtual
 fire.

       Mr. Kapor and Mr Berman will be taking part in our first panel
 today, on the topic of EFF's current directions in national public
 policy.  This panel will last from 1:45 to 3PM sharp and should be
 starting about fifteen minutes after I knock it off and leave this
 podium.   We will allow these well-qualified gentlemen to supply their
 own panel moderation, and simply tell us whatever is on their minds.
 And I rather imagine that given the circumstances, cryptography is
 likely to loom large.  And, along with the other panels, if they want
 to throw it open for questions from the floor, that's their decision.

       There will be a fifteen-minute break between each panel to
 allow our brains to decompress.

        Our second panel today, beginning at 3:15,  will be on the
 implications of cryptography for law enforcement and for industry, and
 the very large and increasingly dangerous areas where police and
 industry overlap in cyberspace.  Our participants will be Esther Dyson
 and Mike Godwin.

       Esther Dyson is a prominent computer-industry journalist.
 Since 1982, she has published a well-known and widely-read industry
 newsletter called Release 1.0.  Her industry symposia are justly
 famous, and she's also very well-known as an industry-guru in Central
 and Eastern Europe and the former Soviet Union.  Ms Dyson is very
 knowledgeable, exceptionally well-informed, and always a healthy
 distance ahead of her time.  When it comes to the computer industry,
 Esther Dyson not only knows where the bodies are buried, she has a
 chalk outline ready-and-waiting for the bodies that are still upright!
 She's on the Board of EFF as well as the Santa Fe Institute, the
 Global Business Network, the Women's Forum, and the Poynter Institute
 for Media Studies.

       Mike Godwin is the legal services council for EFF.  He is a
 journalist, writer, attorney, legal theorist, and legal adviser to the
 electronically distressed.  He is a veteran public speaker on these
 topics, who has conducted many seminars and taken part in many fora
 all over the United States.  He is also a former Austinite, a graduate
 of the UT School of Law, and a minor character in a William Gibson
 novel, among his other unique distinctions.  Mike Godwin is not only
 in EFF inside the beltway of Washington, but is on the board of the
 local group, EFF-Austin.  Mike Godwin is a well-known, one might even
 say beloved, character in the electronic community.  Mike Godwin is
 especially beloved to those among us who have had machinery sucked
 into the black hole of a federal search-and-seizure process.

       Our third panel today, beginning at 4:45,  will be the uniquely
 appropriate Cypherpunk Panel.  Our three barricade-climbing,
 torch-waving,  veteran manifesto-writers will be John Perry Barlow,
 John Gilmore and Eric Hughes.

       Mr Eric Hughes is NOT a member of the EFF Board of Directors.
 Mr Hughes is the moderator of the well-known, notorious even, Internet
 cypherpunk mailing list.  He is a private citizen and programmer from
 the Bay Area of California, who has a computer, has a modem, has
 crypto-code and knows how to use it!  Mr Hughes is here today entirely
 on his own, very considerable, initiative, and we of EFF-Austin are
 proud to have him here to publicly declare anything and everything
 that he cares to tell us about this important public issue.

       Mr John Gilmore *is* a member of the EFF Board.  He is a
 twenty-year veteran programmer, a pioneer in Sun Microsystems and
 Cygnus Support, a stalwart of the free software movement, and a
 long-term electronic civil libertarian who is very bold and forthright
 in his advocacy of privacy, and of private encryption systems.   Mr
 Gilmore is, I must say, remarkable among UNIX and GNU programmers for
 the elegance and clarity of his prose writings.  I believe that even
 those who may disagree with Mr Gilmore about the complex and important
 issues of cryptography, will be forced to admit that they actually
 understand what Mr Gilmore is saying.  This alone makes him a
 national treasure.  Furthermore, John Gilmore has never attended
 college, and has never bought a suit.  When John Gilmore speaks his
 mind in public, people should sit up straight!

       And our last introductee is the remarkable John Perry Barlow.
 Journalist, poet, activist, techno-crank, manifesto-writer, WELLbeing,
 long-time lyricist for the Grateful Dead, co-founder of Electronic
 Frontier Foundation, member of the Wyoming Republican Party, a man who
 at last count had at least ten personal phone numbers, including two
 faxes, two cellulars and a beeper;  bon vivant, legend in his own
 time, a man with whom superlatives fail, art critic, father of three,
 contributing editor of MONDO 2000, a man and a brother that I am proud
 to call truly *my kind of guy:* John Perry Barlow.

       So these are our panelists today, ladies and gentlemen:  a fine
 group of public-spirited American citizens who, coincidentally, happen
 to have a collective IQ high enough to boil platinum.   Let's give
 them a round of applause.

       (((frenzied applause)))

       Thank you.  Ladies and gentlemen, EFF-Austin is not the EFF.
 We are a local group with our own incorporation and our own unique
 organizational challenges.  We are doing things on a local scale,
 where the National EFF  cannot operate.  But we know them, and we
 *like* them, and we are proud to have them here.  Furthermore, every
 time some Austin company, such as Steve Jackson Games Incorporated, or
 the currently unlucky Austin Codeworks, publishers of a program called
 "Moby Crypto," find themselves in some strange kind of federal hot
 water, we are not only proud to know the EFF, we are *glad* to know
 them.  Glad, and *grateful!*   They have a lot to tell us today, and
 they are going to tell us things they believe we really need to know.
 And after these formal panels, this evening from 8 to 10, we are
 going to indulge in a prolonged informal session of what we Austinites
 are best at:  absorbing alcohol,  reminiscing about the Sixties, and
 making what Mitch Kapor likes to call "valuable personal contacts."

       We of EFF-Austin are proud and happy to be making information
 and opinion  on important topics and issues available to you, the
 Austin public, at NO CHARGE!!

       Of course, it would help us a lot, if you bought some of the
 unbelievably hip and with-it  T-shirts we made up for this gig, plus
 the other odd and somewhat overpriced, frankly, memorabilia and
 propaganda items that we of EFF-Austin sell, just like every other
 not-for-profit organization in the world.  Please help yourself to
 this useful and enlightening stuff, so that the group can make more
 money and become even more ambitious than we already are.

       And on a final note, for those of you who are not from Austin,
 I want to say to you as an Austinite and member of EFF-Austin, welcome
 to our city.  Welcome to the Capital of Texas.  The River City.  The
 City of the Violet Crown.  Silicon Hills.  Berkeley-on-the-Colorado.
 The Birthplace of Cyberpunk.  And the Waterloo of the Chicago Computer
 Fraud and Abuse Task Force.

       You are all very welcome here.

       So today,  let's all learn something, and let's all have some
 fun.  Thanks a lot.

     | Disclaimers :  You are encouraged to re-distribute this   |
     | document electronically. Any opinions expressed belong to |
     | the author and not the organization.  (c) 1993.           |
     [From the EFF-Austin online newsletter, _WORD_, Issue #9]

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 -Editor's Note: This is a little old...but still good and important reading!

 =-=-=-=-=-=-Copyright 1993,4 Wired USA Ltd.  All Rights Reserved=-=-=-=-=-=
 -=-=For complete copyright information, please see the end of this file=-=-

                       JACKBOOTS ON THE INFOBAHN

 By John Perry Barlow (WIRED 2.04)

 Clipper is a last ditch attempt by the United States, the last great power
 from the old Industrial Era, to establish imperial control over cyberspace.

 [Note: The following article appeared in the April 1994 issue of WIRED.
 We, the editors of WIRED, are net-casting it now in its pre-published form
 as a public service. Because of the vital and urgent nature of its message,
 we believe readers on the Net should hear and take action now. You are free
 to pass this article on electronically; in fact we urge you to replicate it
 throughout the net with our blessings. If you do, please keep the copyright
 statements and this note intact. For a complete listing of Clipper-related
 resources available through WIRED Online, send email to <infobot@wired.com>
 with the following message: "send clipper.index". - The Editors of WIRED]

 On January 11, I managed to schmooze myself aboard Air Force 2. It was
 flying out of LA, where its principal passenger had just outlined his
 vision of the information superhighway to a suited mob of television, show-
 biz, and cable types who  fervently hoped to own it one day - if they could
 ever figure out what the hell it was.

 From the standpoint of the Electronic Frontier Foundation the speech had
 been wildly encouraging. The administration's program, as announced by Vice
 President Al Gore, incorporated many of the concepts of open competition,
 universal access, and  deregulated common carriage that we'd been pushing
 for the previous year.

 But he had said nothing about the future of privacy, except to cite among
 the bounties of the NII its ability to "help law enforcement agencies
 thwart criminals and terrorists who might use advanced telecommunications
 to commit crimes."

 On the plane I asked Gore what this implied about administration policy on
 cryptography. He became as noncommittal as a cigar-store Indian. "We'll be
 making some announcements.... I can't tell you anything more." He hurried
 to the front of the  plane, leaving me to troubled speculation.

 Despite its fundamental role in assuring privacy, transaction security, and
 reliable identity within the NII, the Clinton administration has not
 demonstrated an enlightenment about cryptography up to par with the rest of
 its digital vision.

 The Clipper Chip - which threatens to be either the goofiest waste of
 federal dollars since President Gerald Ford's great Swine Flu program or,
 if actually deployed, a surveillance technology of profound malignancy -
 seemed at first an ugly legacy  of the Reagan-Bush modus operandi. "This is
 going to be our Bay of Pigs," one Clinton White House official told me at
 the time Clipper was introduced, referring to the disastrous plan to invade
 Cuba that Kennedy inherited from Eisenhower.

 (Clipper, in case you're just tuning in, is an encryption chip that the
 National Security Agency and FBI hope will someday be in every phone and
 computer in America. It scrambles your communications, making them
 unintelligible to all but their  intended recipients. All, that is, but the
 government, which would hold the "key" to your chip. The key would
 separated into two pieces, held in escrow, and joined with the appropriate
 "legal authority.")

 Of course, trusting the government with your privacy is like having a
 Peeping Tom install your window blinds. And, since the folks I've met in
 this White House seem like extremely smart, conscious freedom-lovers -
 hell, a lot of them are Deadheads -  I was sure that after they were fully
 moved in, they'd face down the National Security Agency and the FBI, let
 Clipper die a natural death, and lower the export embargo on reliable
 encryption products.

 Furthermore, the National Institutes of Standards and Technology and the
 National Security Council have been studying both Clipper and export
 embargoes since April. Given that the volumes of expert testimony they had
 collected overwhelmingly opposed  both, I expected the final report would
 give the administration all the support it needed to do the right thing.

 I was wrong. Instead, there would be no report. Apparently, they couldn't
 draft one that supported, on the evidence, what they had decided to do
 instead.

 THE OTHER SHOE DROPS

 On Friday, February 4, the other jackboot dropped. A series of
 announcements from the administration made it clear that cryptography would
 become their very own "Bosnia of telecommunications" (as one staffer put
 it). It wasn't just that the old  Serbs in the National Security Agency and
 the FBI were still making the calls. The alarming new reality was that the
 invertebrates in the White House were only too happy to abide by them.
 Anything to avoid appearing soft on drugs or terrorism.

 So, rather than ditching Clipper, they declared it a Federal Data
 Processing Standard, backing that up with an immediate government order for
 50,000 Clipper devices. They appointed the National Institutes of Standards
 and Technology and the  Department of Treasury as the "trusted" third
 parties that would hold the Clipper key pairs. (Treasury, by the way, is
 also home to such trustworthy agencies as the Secret Service and the Bureau
 of Alcohol, Tobacco, and Firearms.)

 They reaffirmed the export embargo on robust encryption products, admitting
 for the first time that its purpose was to stifle competition to Clipper.
 And they outlined a very porous set of requirements under which the cops
 might get the keys to your  chip. (They would not go into the procedure by
 which the National Security Agency could get them, though they assured us
 it was sufficient.)

 They even signaled the impending return of the dread Digital Telephony, an
 FBI legislative initiative requiring fundamental reengineering of the
 information infrastructure; providing wiretapping ability to the FBI would
 then become the paramount  design priority.

 INVASION OF THE BODY SNATCHERS

 Actually, by the time the announcements thudded down, I wasn't surprised by
 them. I had spent several days the previous week in and around the White
 House.

 I felt like I was in another remake of The Invasion of the Body Snatchers.
 My friends in the administration had been transformed. They'd been subsumed
 by the vast mindfield on the other side of the security clearance membrane,
 where dwell the  monstrous bureaucratic organisms that feed on fear. They'd
 been infected by the institutionally paranoid National Security Agency's
 Weltanschauung.

 They used all the telltale phrases. Mike Nelson, the White House point man
 on the NII, told me, "If only I could tell you what I know, you'd feel the
 same way I do." I told him I'd been inoculated against that argument during
 Vietnam. (And it does  seem to me that if you're going to initiate a
 process that might end freedom in America, you probably need an argument
 that isn't classified.)

 Besides, how does he know what he knows? Where does he get his information?
 Why, the National Security Agency, of course. Which, given its strong
 interest in the outcome, seems hardly an unimpeachable source.

 However they reached it, Clinton and Gore have an astonishingly simple
 bottom line, to which even the future of American liberty and prosperity is
 secondary: They believe that it is their responsibility to eliminate, by
 whatever means, the  possibility that some terrorist might get a nuke and
 use it on, say, the World Trade Center. They have been convinced that such
 plots are more likely to ripen to hideous fruition behind a shield of
 encryption.

 The staffers I talked to were unmoved by the argument that anyone smart
 enough to steal a nuclear device is probably smart enough to use PGP or
 some other uncompromised crypto standard. And never mind that the last
 people who popped a hooter in the  World Trade Center were able to get it
 there without using any cryptography and while under FBI surveillance.

 We are dealing with religion here. Though only ten American lives have been
 lost to terrorism in the last two years, the primacy of this threat has
 become as much an article of faith with these guys as the Catholic
 conviction that human life begins  at conception or the Mormon belief that
 the Lost Tribe of Israel crossed the Atlantic in submarines.

 In the spirit of openness and compromise, they invited the Electronic
 Frontier Foundation to submit other solutions to the "problem" of the
 nuclear-enabled terrorist than key escrow devices, but they would not admit
 into discussion the argument that  such a threat might, in fact, be some
 kind of phantasm created by the spooks to ensure their lavish budgets into
 the post-Cold War era.

 As to the possibility that good old-fashioned investigative techniques
 might be more valuable in preventing their show-case catastrophe (as it was
 after the fact in finding the alleged perpetrators of the last attack on
 the World Trade Center), they  just hunkered down and said that when
 wiretaps were necessary, they were damned well necessary.

 When I asked about the business that American companies lose because of
 their inability to export good encryption products, one staffer essentially
 dismissed the market, saying that total world trade in crypto goods was
 still less than a billion  dollars. (Well, right. Thanks more to the
 diligent efforts of the National Security Agency than to dim sales
 potential.)

 I suggested that a more immediate and costly real-world effect of their
 policies would be to reduce national security by isolating American
 commerce, owing to a lack of international confidence in the security of
 our data lines. I said that Bruce  Sterling's fictional data-enclaves in
 places like the Turks and Caicos Islands were starting to look real-world
 inevitable.

 They had a couple of answers to this, one unsatisfying and the other scary.
 The unsatisfying answer was that the international banking community could
 just go on using DES, which still seemed robust enough to them. (DES is the
 old federal Data  Encryption Standard, thought by most cryptologists to be
 nearing the end of its credibility.)

 More frightening was their willingness to counter the data-enclave future
 with one in which no data channels anywhere would be secure from
 examination by one government or another. Pointing to unnamed other
 countries that were developing their own  mandatory standards and
 restrictions regarding cryptography, they said words to the effect of,
 "Hey, it's not like you can't outlaw the stuff. Look at France."

 Of course, they have also said repeatedly - and for now I believe them -
 that they have absolutely no plans to outlaw non-Clipper crypto in the US.
 But that doesn't mean that such plans wouldn't develop in the presence of
 some pending "emergency."  Then there is that White House briefing
 document, issued at the time Clipper was first announced, which asserts
 that no US citizen "as a matter of right, is entitled to an unbreakable
 commercial encryption product."

 Now why, if it's an ability they have no intention of contesting, do they
 feel compelled to declare that it's not a right? Could it be that they are
 preparing us for the laws they'll pass after some bearded fanatic has
 gotten himself a surplus nuke  and used something besides Clipper to
 conceal his plans for it?

 If they are thinking about such an eventuality, we should be doing so as
 well. How will we respond? I believe there is a strong, though currently
 untested, argument that outlawing unregulated crypto would violate the
 First Amendment, which surely  protects the manner of our speech as clearly
 as it protects the content.

 But of course the First Amendment is, like the rest of the Constitution,
 only as good as the government's willingness to uphold it. And they are, as
 I say, in the mood to protect our safety over our liberty.

 This is not a mind-frame against which any argument is going to be very
 effective. And it appeared that they had already heard and rejected every
 argument I could possibly offer.

 In fact, when I drew what I thought was an original comparison between
 their stand against naturally proliferating crypto and the folly of King
 Canute (who placed his throne on the beach and commanded the tide to leave
 him dry), my government  opposition looked pained and said he had heard
 that one almost as often as jokes about roadkill on the information
 superhighway.

 I hate to go to war with them. War is always nastier among friends.
 Furthermore, unless they've decided to let the National Security Agency
 design the rest of the National Information Infrastructure as well, we need
 to go on working closely with  them on the whole range of issues like
 access, competition, workplace privacy, common carriage, intellectual
 property, and such. Besides, the proliferation of strong crypto will
 probably happen eventually no matter what they do.

 But then again, it might not. In which case we could shortly find ourselves
 under a government that would have the automated ability to log the time,
 origin and recipient of every call we made, could track our physical
 whereabouts continuously,  could keep better account of our financial
 transactions than we do, and all without a warrant. Talk about crime
 prevention!

 Worse, under some vaguely defined and surely mutable "legal authority,"
 they also would be able to listen to our calls and read our e-mail without
 having to do any backyard rewiring. They wouldn't need any permission at
 all to monitor overseas calls.

 If there's going to be a fight, I'd rather it be with this government than
 the one we'd likely face on that hard day.

 Hey, I've never been a paranoid before. It's always seemed to me that most
 governments are too incompetent to keep a good plot strung together all the
 way from coffee break to quitting time. But I am now very nervous about the
 government of the  United States of America.

 Because Bill 'n' Al, whatever their other new-paradigm virtues, have
 allowed the very old-paradigm trogs of the Guardian Class to define as
 their highest duty the defense of America against an enemy that exists
 primarily in the imagination - and is  therefore capable of anything.

 To assure absolute safety against such an enemy, there is no limit to the
 liberties we will eventually be asked to sacrifice. And, with a Clipper
 Chip in every phone, there will certainly be no technical limit on their
 ability to enforce those  sacrifices.

 WHAT YOU CAN DO

 GET CONGRESS TO LIFT THE CRYPTO EMBARGO

 The administration is trying to impose Clipper on us by manipulating market
 forces. By purchasing massive numbers of Clipper devices, they intend to
 induce an economy of scale which will make them cheap while the export
 embargo renders all  competition either expensive or nonexistent.

 We have to use the market to fight back. While it's unlikely that they'll
 back down on Clipper deployment, the Electronic Frontier Foundation
 believes that with sufficient public involvement, we can get Congress to
 eliminate the export embargo.

 Rep. Maria Cantwell, D-Washington, has a bill (H.R. 3627) before the
 Economic Policy, Trade, and Environment Subcommittee of the House Committee
 on Foreign Affairs that would do exactly that. She will need a lot of help
 from the public. They may not  care much about your privacy in DC, but they
 still care about your vote.

 Please signal your support of H.R. 3627, either by writing her directly or
 e-mailing her at cantwell@eff.org. Messages sent to that address will be
 printed out and delivered to her office. In the subject header of your
 message, please include the  words "support HR 3627." In the body of your
 message, express your reasons for supporting the bill. You may also express
 your sentiments to Rep. Lee Hamilton, D-Indiana, the House Committee on
 Foreign Affairs chair, by e-mailing hamilton@eff.org.

 Furthermore, since there is nothing quite as powerful as a letter from a
 constituent, you should check the following list of subcommittee and
 committee members to see if your congressional representative is among
 them. If so, please copy them your  letter to Rep. Cantwell.

 > Economic Policy, Trade, and Environment Subcommittee:

 Democrats: Sam Gejdenson (Chair), D-Connecticut; James Oberstar, D-
 Minnesota; Cynthia McKinney, D-Georgia; Maria Cantwell, D-Washington; Eric
 Fingerhut, D-Ohio; Albert R. Wynn, D-Maryland; Harry Johnston, D-Florida;
 Eliot Engel, D-New York; Charles Schumer, D-New York.

 Republicans: Toby Roth (ranking), R-Wisconsin; Donald Manzullo, R-Illinois;
 Doug Bereuter, R-Nebraska; Jan Meyers, R-Kansas; Cass Ballenger, R-North
 Carolina; Dana Rohrabacher, R-California.

 > House Committee on Foreign Affairs:

 Democrats: Lee Hamilton (Chair), D-Indiana; Tom Lantos, D-California;
 Robert Torricelli, D-New Jersey; Howard Berman, D-California; Gary
 Ackerman, D-New York; Eni Faleomavaega, D-Somoa; Matthew Martinez, D-
 California; Robert Borski, D-Pennsylvania;  Donal Payne, D-New Jersey;
 Robert Andrews, D-New Jersey; Robert Menendez, D-New Jersey; Sherrod Brown,
 D-Ohio; Alcee Hastings, D-Florida; Peter Deutsch, D-Florida; Don Edwards,
 D-California; Frank McCloskey, D-Indiana; Thomas Sawyer, D-Ohio; Luis
 Gutierrez, D-Illinois.

 Republicans: Benjamin Gilman (ranking), R-New York; William Goodling, R-
 Pennsylvania; Jim Leach, R-Iowa; Olympia Snowe, R-Maine; Henry Hyde, R-
 Illinois; Christopher Smith, R-New Jersey; Dan Burton, R-Indiana; Elton
 Gallegly, R-California; Ileana  Ros-Lehtinen, R-Florida; David Levy, R-New
 York; Lincoln Diaz-Balart, R-Florida; Ed Royce, R-California.

 BOYCOTT CLIPPER DEVICES AND THE COMPANIES WHICH MAKE THEM.

 Don't buy anything with a Clipper Chip in it. Don't buy any product from a
 company that manufactures devices with Big Brother inside. It is likely
 that the government will ask you to use Clipper for communications with the
 IRS or when doing business  with federal agencies. They cannot, as yet,
 require you to do so. Just say no.

 LEARN ABOUT ENCRYPTION AND EXPLAIN THE ISSUES TO YOUR UNWIRED FRIENDS

 The administration is banking on the likelihood that this stuff is too
 technically obscure to agitate anyone but nerds like us. Prove them wrong
 by patiently explaining what's going on to all the people you know who have
 never touched a computer and  glaze over at the mention of words like
 "cryptography."

 Maybe you glaze over yourself. Don't. It's not that hard. For some hands-on
 experience, download a copy of PGP - Pretty Good Privacy - a shareware
 encryption engine which uses the robust RSA encryption algorithm. And learn
 to use it.

 GET YOUR COMPANY TO THINK ABOUT EMBEDDING REAL CRYPTOGRAPHY IN ITS PRODUCTS

 If you work for a company that makes software, computer hardware, or any
 kind of communications device, work from within to get them to incorporate
 RSA or some other strong encryption scheme into their products. If they say
 that they are afraid to  violate the export embargo, ask them to consider
 manufacturing such products overseas and importing them back into the
 United States. There appears to be no law against that. Yet.

 You might also lobby your company to join the Digital Privacy and Security
 Working Group, a coalition of companies and public interest groups -
 including IBM, Apple, Sun, Microsoft, and, interestingly, Clipper phone
 manufacturer AT&T - that is  working to get the embargo lifted.

 ENLIST!

 Self-serving as it sounds coming from me, you can do a lot to help by
 becoming a member of one of these organizations. In addition to giving you
 access to the latest information on this subject, every additional member
 strengthens our credibility  with Congress.

 > Join the Electronic Frontier Foundation by writing membership@eff.org.

 > Join Computer Professionals for Social Responsibility by e-mailing
 cpsr.info@cpsr

 .org. CPSR is also organizing a protest, to which you can lend your support
 by sending e-mail to clipper.petition@cpsr.org with "I oppose Clipper" in
 the message body. Ftp/gopher/WAIS to cpsr.org /cpsr/privacy/

 crypto/clipper for more info.

 In his LA speech, Gore called the development of the NII "a revolution."
 And it is a revolutionary war we are engaged in here. Clipper is a last
 ditch attempt by the United States, the last great power from the old
 Industrial Era, to establish  imperial control over cyberspace. If they
 win, the most liberating development in the history of humankind could
 become, instead, the surveillance system which will monitor our
 grandchildren's morality. We can be better ancestors than that.

 San Francisco, California

 Wednesday, February 9, 1994

                                    * * *

 John Perry Barlow (barlow@eff.org) is co-founder and Vice-Chairman of the
 Electronic Frontier Foundation, a group which defends liberty, both in
 Cyberspace and the Physical World. He has three daughters.


 =-=-=-=-=-=-=-=-=-=-=-=WIRED Online Copyright Notice=-=-=-=-=-=-=-=-=-=-=-=

           Copyright 1993,4 Wired USA Ltd.  All rights reserved.

  This article may be redistributed provided that the article and this
  notice remain intact. This article may not under any circumstances
  be resold or redistributed for compensation of any kind without prior
  written permission from Wired Ventures, Ltd. If you have any questions
  about these terms, or would like information about licensing materials
  from WIRED Online, please contact us via telephone (+1 (415) 904 0660)
  or email (info@wired.com).

       WIRED and WIRED Online are trademarks of Wired Ventures, Ltd.

 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                         NOTES FROM CYBERSPACE
                               VOLUME 3

 By Jonathan Yarden (jyarden@iglou.iglou.com)
 Subject: Mosaic on Digital Satellite System

 Anyone else out there getting a serious hard-on on the Digital Satellite
 System?  From what I have heard this puppy is doing IP via satellite.
 For that matter, I can't think of any other real way to do what it does.
 Here is a partial list of 'features:'

 1. The DSS system is designed to asychronously receive data.  Each DSS
 receiver has a unique ID allowing it to process packetized wide-band data
 (which in most cases is MPEG encoded video).  This happens *whenever* the
 unit is operational.

 2. The modem in the DSS receiver is for the sending of requests and
 receipt of data from a local or long distance 'service.' The majority of
 requests are for 'keys' to decode channels, but could also be used to send
 subscription requests for other services.

 3. There is a magnetic 'card' used to hold information about the types of
 services currently subscribed to by the DSS user.  The card is readable
 as well as writeable.

 THE BIG IDEA

 Knowing that data flow in Mosaic is almost 99% server to client, this
 opens up a rather fast way to do Mosaic.  For that matter, since most of
 the people who surf are just passing thru or getting data, this is a fast
 data pipe to just about anything.  The only catch would be that the
 sending speed would be maxed out at about 14.4kbps.  But, if you are on
 the client end of a 2GB FTP session, well you get the picture...

 2nd reason:

 According to TRACEROUTE (unix hamsters, try this at home...) CIX is
 basically 'metering' data traffic onto their routes.  First 16K goes real
 fast, then you hit the bottom of the process queue (sounds VAXen, doesn't
 it?) and it's the loser in a snail race.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
 IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
 YOU LIVE IN TEXAS.  ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
 PRIVACY.  IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        PORNOGRAPHY FOULS INTERNET

 By Paul Pihichyn (pihichyn@freepress.mb.ca)

 There is a river of slime in the gutters of the information highway
 and it's giving cyberspace a bad name.  The virtual community, it appears,
 has been invaded by the same scum that has slithered into the real
 communities across the land.  We're talking pornography, with a capital P,
 right there on the Internet.

 Maybe you caught the report on CNN last week about the Lawrence Livermore
 Laboratory in California.  It seems some sleezeball there had loaded several
 gigabytes of filth into a server that was connected to the Internet, and
 promptly made it available to all 20 million-plus 'Netsurfers.  It's
 probably not surprising that in a community of 20 million, you are going to
 find the same sad mix that you will find in the general population.  But,
 somehow, I though the Internet would attract a better class of humanity.

 Nevertheless, the Internet has become the largest and most accessable source
 of pornographic material on the planet - and the real danger is it's
 accessible to anyone with a PC and modem, even to children.

 Journalist Erik Lacitis (elak.news@times.com) said it best recently in the
 Seattle times: "... has there ever been a bigger collection of mean-
 spirited, emotionally-deficient, just plain-weird, and mostly utterly
 boring people?"  He prefaced the remark by saying he was taking a vacation
 from the Internet and going back to the real world. Actually, it would make
 more sense for those 'Net-bound weirdos to be taking a reality check.

 Hiding behind their cloak of anonymity, these folks hurl hateful insults at
 those with whom they disagree or feel they can bully by virtue of their
 perceived superior knowledge of the nooks and crannies of the Internet.
 It is on the Usenet that these really dumb things often take place. Now tell
 me, does the world really need a forum called alt.sex.pictures.female,
 or alt.sex.bondage?  Or maybe just plain old alt.sex? I think not.

 The crap on these forums is pretty crude.  Obscene by many community
 standards.  And also pretty silly.  Racy stories written by pimply-faced
 adolescent boys pretending to be ravishingly over-sexed and under-loved
 young women is hardly the stuff on which to build a world-wide information
 superhighway.

 Remember, the Internet is a network of networks, each linked through a host
 site - often a university or some other educational facility.  Some of these
 host sites have taken steps to clean up their little corner of the Internet.

 Troll Usenet through the server at the University of Manitoba, and you won't
 find the newsgroups alt.sex.pictures.female, or alt.sex.bondage.
 The U of M, along with several other Internet providers, has denied its
 users access to some of the more blatantly pornographic newsgroups. Though
 some people may complain that this is censorship, an infringement on the
 freedom of the Internet, I take my hat off to those who made the decision
 to try to keep the Internet decent place to work and play.

 There have been incidents reported of Internet users actually being stalked,
 electronically, by some of the weirder weirdoes out there.  The really scary
 part is that some of the cyberstalkers have actually slithered into the real
 world and attempted face-to-face encounters.

 The 'Net anonymity also give a lot of jerks a chance to be mean.  If there
 is a crude remark that has ever been made about women, you'll find it posted
 on the 'Net.  It seems, as Lacitis wrote, the Internet is populated with
 men who never grew up.

 Big as it is, the Internet is still in its infancy.  It will take time to
 gain some maturity, to find a way to weed out the cretins and perverts.
 Once you get around the crud on the Internet, you will find it a wonderful
 place to learn, work and do business.

 By Paul Pihichyn, pihichyn@freepress.mb.ca

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                    SECURITY / COAST FTP archive on-line

                  Announcing the COAST Security FTP Archive!

 The COAST group at Purdue are happy to (finally) announce the
 availability of our security archive.  The archive is currently
 available via FTP, with extensions to gopher and WWW planned soon.

 The archive currently contains software, standards, tools, and other
 material in the following areas:

     * access control
     * artificial life
     * authentication
     * criminal investigation
     * cryptography
     * e-mail privacy enhancement
     * firewalls
     * formal methods
     * general guidelines
     * genetic algorithms
     * incident response
     * institutional policies
     * intrusion detection
     * law & ethics
     * malware (viruses, worms, etc)
     * network security
     * password systems
     * policies
     * privacy
     * risk assessment
     * security related equipment
     * security tools
     * social impacts
     * software forensics
     * software maintenance
     * standards
     * technical tips
     * the computer underground

 The collection also contains a large set of site "mirrors" of
 interesting collections, many of which are linked by topic to the rest
 of the archive.

 You can connect to the archive using standard ftp to
 "coast.cs.purdue.edu".   Information about the archive structure and
 contents is present in "/pub/aux"; we encourage users to look there,
 and to read the README* files located in the various directories.

 If you know of material you think should be added, please send mail to
 security-archive@cs.purdue.edu and tell us what you have and where we
 can get a copy. In order of preference, we would prefer to get:

   -- a pointer to the source ftp site for a package
   -- a pointer to a mirror ftp site for the package
   -- a uuencoded tar file
   -- a shar file
   -- a diskette or QIC tape

 If you are providing software, we encourage you to "sign" the software
 with PGP to produce a standalone signature file.  This will help to
 ensure against trojaned versions of the software finding their way
 into the archive.

 Any comments or suggestions about the archive should be directed to
 "security-archive@cs.purdue.edu" -- please let us know what you think!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                     ON THE SUBJECT OF CYBERCULTURE

 By George Phillips (ice9@fennec.com)

 I hate to be an asshole, but my friends will tell you I'm pretty good at it.
 I usually try to keep an open mind about a lot of things, but some things
 just get under my skin.  Today, it's this damn cyberculture thingy! I
 thought the hype was subsiding, but now it seems to have sprouted back up
 like a festering pustule on the mouths of everyone.  Let's just ask the
 question: What is cyberculture?  Is it some coffee-shop hallucination
 romance dreamed up by some art-school boy with no social outlet? Is it some
 third-rate term developed by the editors of certain magazines to justify
 their existance? Was it created from a desperate attempt at giving a name to
 people who just don't fit in? ...or is there something real to all this
 fantasy? Let's take a closer look.

 I went out and looked for anything "cyber." Magazines, books, people, places,
 clothes, and things. I started out by picking up a magazine called
 "Mondo-2000".  I'm sure I heard somewhere that this was a "cyber-oriented"
 magazine. The cover art did nothing for me as far as helping define what
 "cyber" was. After a time, I quickly realized that this magazine caters to
 junior/highschool children with Nintendos and acne.  I saw nothing "cyber"
 about it.  In fact, I really saw no real culture. Sure it had art, music,
 graphics, features, etc...but doesn't every magazine? What is keeping me
 from calling Time or Newsweek "Cyber-mags"? Could it be?  Is "cyber" just
 another buzz-word like "virtual?"  No!

 William Gibson writes about people in the future accessing a matrix called
 cyberspace.  This is the "virtual" area between computer systems.  No doubt
 one can see the parallels between his matrix and our Internet.  But is this
 all there is to it?  No.  There are people called "cyberpunks" that access
 this matrix and exploit it to their own ends.  These are very good books, by
 the way.  I enjoyed reading them.  There has got to be a parallel between
 his cyberpunks and the hackers of today. Although the books are excellent,
 I have yet to see what "Cyber-Culture" is.  (Hearing theme song from
 Jeopardy in my head...)

 Billy Idol recorded an album called CyberPunk. Chained to my chair and
 threatened with death if I did not listen to this "K-Rad" CD, I formed the
 opinion that Billy Idol has too much free time on his hands. The makeup of
 this album has absolutely nothing to do with the title, or subjects in any
 William Gibson book.  Thats not to say its not a good album.  I'm sure there
 are many out there who like his work, but as far as my quest was concerned,
 this was a dead end.  I just don't comprehend the reasoning behind such
 a venture.

 Exhausted with my household search for the eternal answer, I decided to
 hit the streets and find some real, live, cyber-people. I heard that this
 culture usually hangs out in clubs or raves that play loud alternative
 industrial dance music.  I found a couple places like that in Houston and
 Austin, so I decided to give it a try.  I chose a club in Houston, Texas.
 The lights were hypnotic.  The smart-drinks were flowing. The people were
 dancing and zoning on the special effects of the club.  I picked out the
 most "cyber-looking" people I could find.  I knew what to look for because I
 just recently picked through a Mondo-2000 magazine to see what their be-all
 end-all definition of a cyber-person was.  These people could barely figure
 out how to turn on a computer!  How could they call themselves "cyber?"
 Am I wrong when I say that the whole term "Cyber" has at least SOMETHING to
 do with computers? Needless to say, I was rather disappointed in the
 ignorance of these lifeless wanna-bees and misled by all of the advertising
 of this ever-elusive "Cyber-Culture". Color me confused.

 Well, I figured that if anyone knew about "Cyber-Culture," it would have to
 be the computer underground.  This is supposed to be one of the smartest,
 most alternitive, techno-literate group around. There was a convention going
 on in Las Vegas called DefCon II. Played-up to be one of the largest
 gatherings of computer underground enthusiasts, I had to go. Although it is
 sad that this term "Cyber", while used so widely today, is hard to define.
 I am sad that I had to go to Las Vegas to find "Cyber"...if it was even
 there.

 This was obviously a place where "cyber-culture" came together!  I decided
 to attend and look around.  What I found was a large group of people
 drinking, smoking, viewing porn and talking about the latest security holes.
 These people were nothing like the people in Mondo-2000 or any other
 Cyber-rags.  Where was their strange, multi-color clothing?  So this is
 cyber-culture?

 I hit a few coffee shops, followed a group that I would bet that I saw in
 Mondo, tried psudo-virtual-reality hangouts, tried their smart drinks,
 smoked their tobacco, attempted being "trendy", and contemplated art
 in the most cyber-sense. My return: ZIP! NADA! NOTHING!

 From all of my travels and studies, I came up with a few theories.  Although
 possibly distorted, I feel they are, for the most part true.

 Cyberculture is:

  1) A bunch of burn-outs in a coffee shop, reading trendy "alternative"                              magazines, analyzing "alternative" music, and going to raves.

  2) A bunch of kids doing large amounts of drugs, drinking smart-drinks,
     wearing flanel, attending "alternative" concerts like Woodstock '94
     hopelessly babbling on about topics that they know nothing about.

  3) Cigarettes and alcohol.

 I find none of these interesting and frankly, I don't see whats so damn
 fascinating about them! ...and still cannot determine why it is called
 "Cyber".  I am getting to hate this term more each time I have to write or
 say it...because it means NOTHING!

 So, if anyone finds "Mr. or Ms. Cyber" please let me know. I am not claiming
 to be a know-it-all, but when the press, the public, and society in general
 latches on to a term which evidently globally-defines a people or attitude,
 and THEN rams it down my throat on the front page of the newspaper and on
 the six o' clock news, I have the RIGHT to know what in the hell it means.

 Have a virtual-cyber-underground-mondo-networkable-fiber-opticable day!

 Alternative viewpoints are not welcome because this is my cyber-column.
 Get your own! Take a pill and get a life.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                           A COMMENT ON CLIPPER

 By Azrael (reinoa@ccaix3.unican.es)

 Greetings to all fellow cyberpunks, hackers, modem enthusiasts,
 programmers, viri-coders, civil-rights activists, anarchists, crypto-
 mathematicians and all.

 The echoes of the Clipper polemics are heard even here in Spain, mainly
 thru a distorted view given by the pre-net mass media, and the very few
 people hooked to some kind of comms net.

 The way I see it, it is NOT that awful that the government of the USA is
 trying (in its best tradition) to limit liberty and privacy through the
 implantation of mandatory 'crippled' encryption or 'key escrows' or
 secure-phones or what have you. Remember the good old theory of the shield
 and the sword. If there is no enemy, there is no battle, and if there's
 no battle, there's no point in hacking, anarchism, sabotage, and public
 opinion campaigns. If there's no threat to our freedom or privacy, our
 skills will decay, weaken, and we'll submit in the end to the exigences
 of those in power.

 Security in computer systems should be improved upon, so that hackers have
 to keep up to it. Anti-virus packages have to get better, so that virus
 makers develop new techniques. In the same way, threatened privacy in
 electronic communications will be an incentive for enterprising people
 to create new methods of avoiding eavesdropping, by the development of
 new, better and faster cryptographic algorithms.

 As long as we keep 'en garde', they can't beat us. They just can't. But
 if they leave us alone for a time, we'll grow in pride and self-confidence
 and a false sense of security, while they have time to re-arm. In that
 way, they'll have us in the end.

 Fight the power! (and be glad you need to)

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                   SEX, THE INTERNET AND THE IDIOTS

 By K.K. Campbell (eye@io.org)

 There are two breeds of moron attracted to the Internet's relation to sex
 -- reporters and wankers. These categories may overlap, but that's beside
 the point.

 Canadian newsmedia owe a great deal of Internet education to Judge Francis
 Kovacs and his infamous Karla Homolka trial publication ban. That elevated
 the Internet to headline material. It is humorous to watch reporters/
 editors grope for net.literacy.

 Talk with Justin Wells (stem@sizone.pci.on.ca) and Ken Chasse
 (root@sizone.pci.on.ca), the chaps who created alt.fan.karla-homolka as a
 lark, then found themselves hounded by reporters asking for "banned
 information, please." Or check out The Star's early stories, where Usenet
 newsgroups are called "computer billboards" -- whatever the hell those are.

                             MEDIA MORONS

 Mainstream journalists without a rallying issue like a trial ban invariably
 end up with nothing better to do then bang the drum about the 3 Ps:
 pedophilia, piracy and pornography.

 Take the recent Internet "child molesters" silliness. Some teen somewhere
 is enticed into sex with an adult -- through America On Line, not the
 Internet -- and we have an "epidemic." Chicago's Harlan Wallach
 (wallach@mcs.com) reported in alt.internet.media-coverage how some dink
 named James Coates wrote a column for the July 15 Chicago Tribune called
 "Beware cybercreeps lurking on the Internet."  True enough. But Coates'
 purpose is to frighten the middle class with some probably made-up story
 about "Vito," who cruises the net hoping "to have sex with children in
 wheelchairs."

 I understand Coates' pain. I can't spend 10 minutes in Internet Relay Chat
 (IRC) before someone asks if I'm a child in a wheelchair looking for a sex
 partner. Wallach told eye Coates has been going like this for months now --
 "a master at work."

 Couple of weeks ago, California nuclear research facility Lawrence
 Livermore Labs discovered one computer held some dirty pictures. An employee
 gave away a password. Someone used that access to store the images. People
 could connect and get them. Nothing was hacked. Big deal.

 But on July 13, CNN reporter Don Knapp swooped in to whip up
 hysteria. Doom was clearly imminent.

 "Computer security specialists were surprised to find what may be the
 largest computer collection ever of hardcore pornography at the nation's
 top nuclear weapons and research laboratory," Knapp intoned ominously.
 Almost 2000 megs! Gol-ly! (Incidentally, 99 per cent of it was individual
 shots of nude/semi-nude women, no sexually explicit acts. Playboy stuff.)

 CNN rang Wired magazine writer Brian Behlendorf (brian@wired.com) and woke
 him at home, excited about "a big break-in at Laurence Livermore." Hackers
 and porno! If CNN was lucky, the hacker was a child molester. Behlendorf
 consented to an interview. CNN immediately asked him to "find some pictures
 of naked women on the Net for us." Behlendorf recounted the incident: "I
 really wasn't interested in doing that. I don't know of any FSP/FTP sites
 off hand anyways, and really didn't want to be associated with pictures of
 NEKKID GRRLS."*

 But amiable Behlendorf slid over to alt.binaries.pictures.supermodels and
 grabbed a picture of a model in a swimsuit. He also picked up a landscape,
 a race car and a Beatles album cover "to show that other images get sent
 over Usenet as  well," naively thinking this point would be made -- though
 he stresses he by no means condones distributing copyrighted images,
 "clean" or otherwise. Behlendorf was then made to sit beside a terminal
 displaying Ms String-Bikini throughout all his comments. "They made me keep
 returning to that  damn bikini image ... over and over."

 But intrepid reporter Don Knapp assured us all is well -- for now.
 "Spokespeople for the national laboratories insist that at no time were the
 pornographers, nor the software pirates, able to cross over from the
 research network into the classified network. The labs say that, while they
 are embarrassed, national security was not breached."

 Whew.

               YOU'RE GETTING VERY STUP- ERR, SLEEPY...

 Then you have regular net.wankers. Whoever said, "Never underestimate the
 intelligence of the American public," must read alt.sex.* newsgroups.

 For instance, the charismatic Aabid (aabid@elm.circa.ufl.edu) wrote a
 touching post called "I would like an enema myself!" to newsgroup sci.chem
 (science: chemistry). "Looking for a Middle Eastern M or F to help me with
 my enema desires. If you can be of assistance please email me." Readers of
 sci.chem were very intrigued and Aabid has made many interesting new
 friends.

 The greatest example of alt.sex stupidity is: The Hypnosis Program.

 As a joke, Indiana's Steve Salter (ssalter@silver.ucs.indiana.edu) posted to
 alt.sex.stories that he had a "hypnosis program" -- which you cleverly slip
 onto another person's computer where it will so mesmerize the unsuspecting
 target, he/she becomes your SEXUAL PLAYTHING, BENDING TO YOUR EVERY WHIM!
 For weeks after, global village idiots pestered him for copies.

 "I must have received over a hundred requests via private email or in
 alt.sex.stories for a copy of the program," Salter told eye. He had to
 publicly post a reply to stem the tide: "No offense, but get a rather
 large clue. There is no such animal. That was a joke. I thought it was
 obvious. How many people out there really want to hypnotize someone
 secretly? What the fuck is wrong with all of you?! What age group are
 we dealing with here? There is no such program!!! Sheesh..."

 Personally, I'm in agreement with David Romm
 (71443.1447@compuserve.com) who wrote: "I really liked the hypnosis
 program. It was much better than Cats."

                          MASSAGE MY MEDIUM

 To get your own porn, there are lots of sites. Ask for the latest in
 the alt.sex groups. Check out alt.binaries.pictures.erotica to grab a
 few images. For text erotica, read in alt.sex.stories .

 If you can't access alt.sex groups because, say, your university is run by
 prudes, write (ahem) "Hot Stuff" (anon1ea3@nyx10.cs.du.edu) for details
 about his mail-server. He makes available hundreds of stories. We at eye
 have yet to sample this collection but are intrigued by two items: "Perils
 of Red Tape," which we assume reveals the lust-riddled world of civil
 service, and "Tales from the Network," the story of lonely boys sitting
 around Friday nights fingering their groins in IRC, praying someone with a
 female-sounding alias drops by.


 * FootNote: NEKKID GRRLS is idiomatic fresh-off-the-BBS net.wanker-
   speak. This language can be learned by hanging around newsgroups
   like alt.2600 . To convince others you are a deadly cool net.cruiser,
   write: "HEY, elite pir-8 d00ds! I got more NEKKID GRRLS philes than
   ANY OF U!!!! And U censorship loosers can SUCK MY DICK!!!!!" Send it
   to alt.sex . Make sure to cross-post to the comp.sys.ibm.* hierarchy
   because PCs are the most common computer and you will reach a wider
   audience. If you can manage it, post through an anonymous account
   and leave your personal signature with real address in the text of
   the message.

             +++++++++++++++++++++++++++++++++++++++++++
 Retransmit freely in cyberspace        Author holds standard copyright
 Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
 Mailing list available                           http://www.io.org/eye
 eye@io.org           "Break the Gutenberg Lock..."        416-971-8421

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                          JAUC For Windows Project
                       SCHEDULED FOR JANUARY RELEASE


 By Scott Davis (dfox@fc.net)

 The development team at Fennec Information systems is currently working on
 a project called "JAUC for Windows".  This software will be a large
 Windows-based help file with ALL the issues of The Journal Of American
 Underground Computing, Editor's page with tons of info on the editorial
 staff, as well as a LOT of other information regarding the Internet...
 all accessible with the click of a mouse in Windows. The scheduled release
 date for this piece of software is sometime in January. A furious effort
 is underway to provide you with this file as soon as possible. You will be
 required to have Windows 3.0, 3.1, or some other Windows-based product.
 It will work with Windows For Workgroups, NT, Chicago, Daytona, etc...
 The file will be available for FTP from TWO sites on the Internet. Those
 sites will more than likely be FC.NET and ETEXT.ARCHIVE.UMICH.EDU.
 You will be sent a small note (if you are on our mailing list) when this
 product becomes available. At this time, the only method of distribution
 is FTP. We are working on other ways to get this out. We will update you.
 If you have any questions regarding this product, please mail:

 jauc-win@fennec.com

 You will be mailed any updates automatically.

 Editor.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        NBC's ANTI-NET CAMPAIGN

 By Alaric (Alaric@f111.n106.z1.fidonet.org)

 A most heinous act of info-terrorism has beem committed against the net
 community by "Dateline", NBC's pseudo-news propaganda ministry.

 To further the government's need to destroy the haven of free speech known
 as cyberspace, NBC has successfully deluded much of their reactionary
 brain-dead audience into beleiving that NETWORKS ARE DANGEROUS - BBS's ARE
 CRIMINAL.  Something must be done!  (Something will be done - read on...)

 The September 1 episode of Dateline paraded adventursome youths who had
 lost the occasional finger while honing their pyrotechnical skills with
 anarcho-terrorist data gleaned from BBSs and the net.  Forrest "Goebbels"
 Sawyer whined that the young and restless data-seekers of the 90's have easy
 access to exciting netware titles such as "Bomb Making For Fun and Profit"
 and "Anarchist's Cookbook" with no governmental interference of any kind!
 The existence of such networks and their accessibility by Gen-X misfits
 poses a clear and present danger to the national security of the United
 States.

 You may recall the first such attempt at an anti-net freedom propaganda
 campaign failed miserably and was aborted.  Not enough concerned citizens
 fell for the ruse of nets being an unfettered sanctuary for child porn
 mongers, NAMBLA dating services and wily molesters.  Since the first trial
 balloon was floated and quickly transpired, Plan-B has been put into action.
 Let's see how many suckers will fall for this one, "Computer networks are
 a dangerous source of subversive terrorist information and the children
 must be protected." (Janet Reno was conspicuously absent from said
 broadcast)

 A CongressMan-ic Oppresive named Ed Markey (Dem. Mass 7th Dist) is trying
 to hold hearings on the dangers of computer networking and supposedly try
 to draft some legislation that would allow the governmnet to regulate the
 nets or BBSs.  Undoubtedly the legislation if passed will have a chilling
 effect on net traffic, which frankly is getting way out of hand if you ask
 any bureaucrat with something to hide. Severe penalties will be brought
 against any sysop who allows minors to access anything that might be
 contrued as dangerous.  No doubt this definition will eventually receive
 a broad enough interpretation to forbid instructions on the manufacture of
 smoke bombs, casting of all lead ammunition, cleaning a .22 rifle, and even
 slingshot repair.  The true goal of such legislation of course is not to
 "protect the children", but to stifle the grassroots organizing of anti-
 statist groups and to squash the tide of truth that is flooding cyberspace
 and often embarrassing government and corporate interests.

 Look for a "Child Protection Act" subtitled "concerning minors' access to
 dangerous information" to come before Congress within 18 months.  Sysops
 will become responsible for what information gets to whom and what they do
 with it, regardless of the diligence they show in keeping the nets safe.
 Disclaimers and signed age statements will no longer suffice.  You WILL be
 responsible for the information travelling though your board or newsgroup
 and you WILL be held accountable.

 Is the Pen more Powerful than the Sword?  This question may never be
 answered fully, so why not hold on to both?  Yet the propaganda forces and
 strong arm tactics forces that managed to squeak by the ban on assault
 swords will now be unleashed on the modern-day pamphleteers of the net.
 Al Gore wants to build a kinder and gentler super-information tollroad to
 keep your pens in line.

 Netters will be able to mount a powerful counter-attack that will surprise
 the hell out of Big Brother and Little Rock Sister.  Notify Rep. Markey that
 we are watching and ready to fight.  Fax-blast his office.  Dig into his
 dirt and spread liberally.  Likewise show NBC that we are listening. Reach
 out and touch these folks as follows:

 dateline@news.nbc.com

 Representative Edward J. Markey (D-7th)
 Malden, MA
 Office phone (in DC):  202-225-2836
 Energy and Commerce

 Markey is the Chairman of the subcomittee on
 Telecommunications and Finance - under Energy and Commerce
 202-226-2424  subcommitee phone
 202-226-2447  subcommitee fax

 This post should be crossposted and distributed.

 "They can have my net access when they pry the 486 from my
 dead, carpel tunnel syndrome-infested hands."

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                  CYBERSPACE, MIAMI, CHAOS, AND CLINTON
                        THE MIAMI DEVICE PROJECT

 By Marty Cyber (cyb@gate.net)

 From December 8-11, 1994, Prez Clinton and Veep Gore, the Administration's
 point-man on the Infobahn will be coming to Miami to host the 35
 democratically elected heads of government of every country in the Western
 Hemisphere from Canada to Tierra del Fuego.

 The event is called the Summit of The Americas, and you folks who read Wired
 and ARE wired should plug into this event via the Internet and via any other
 bit-radiation-receiver-transmitter-device you have access too.  I'd like to
 get your ideas on how Cyberspace and Cybertech could help make the Summit a
 success from the point-of-view of telecomm and info-technologies --- in a
 word, to try to begin building and operating a Global Brain and Nervous
 System for Planet Earth that can help us all in private, public, academic
 and community sectors use Cyberspace to create some kind of movement toward
 a New World Order out of the Chaos and Complexity we are now trying to surf
 on, without a truly functional "cybersurfboard."

 I'm attaching a couple of files that could stimulate some interesting
 exchanges --- and hoping to get the likes of Negroponte, Kelly, Kapor,
 Fields, Minsky, Schank, Bruckman, Clinton, Gore, Mesarovich, Forrester,
 Shannon, Wiener, Prigogine, Crowley, Castro, Mas Canosa, Irving,
 Brown, Chiles, Cuomo, Tyson, Simon, Beer, Gleick, --- and YOU ---
 to all kick in some ideas on how to use the Miami Summit as a kickoff
 environment for launching a World Summit on The Future via Cyberspace.


 Do give me some "negative feedback," as the cyberneticians have been known
 to say.

 And if any of you would like to warm your cybernetic buns in Miami in
 December --- real buns or virtual buns --- give me some "bit-radiations."
 I've got an Art Deco apartment building in the heart of Miami Beach's
 cyberhip South Beach, and might be able to put you up.

 Clinton's awareness of, and ability to use, the Principles of Chaos,
 Complexity, Cybernetics and other modern organizational management and
 learning techniques may be decisive in determining if his Administration
 is able to create a New World Order on the Edge of the Current Turbulent
 ORDER/CHAOS Meridian.

 Unfortunately, day-to-day decisiomaking and policy selection in the White
 House frequently has so much noise injected on its channels from Whitewater,
 Senator Damato-type ignoramus-based partisan-politics, that serious policy
 problems like Cuba, and other Foreign, Domestic and Economic matters tend
 toward more chaotic and less orderly states.

 What the White House could use --- perhaps initially placed within its
 Office of Science and Technology Policy --- is a National Cybernetics
 Council.  This group would consist of the nation and the world's specialists
 in Complex Systems Theory, Chaos, Cybernetics, Cyberspace, and a new field
 which integrates all of the above: CYBERTECTURE: The design, construction,
 and operation of "cybernetic systems" for government, business, education
 and city-planning.

 Pete Nelson is correct in suggesting that we need politicians and polities
 that can "embrace change, uncertainty, paradox and contradiction," but we
 also must equip the public, private, academic and community sectors of
 American (and World) Society to deal with this new level of complexity.

 In December, if current White House plans stay in place, President Clinton
 and VP Al Gore, Clinton's point-man in advancing his Administration's high-
 level policy objective of building a National and Global Information
 Infrastructure (NII/GII) --- the highly publicized "Information Superhighway"
 --- both of American Government's top-managers will travel to Miami to host
 the Summit of The Americas December 8-11, 1994.

 Although the primary agenda topics for all the invited democratically elected
 leaders of every coutry in the Western Hemisphere from Canada to the southern
 tip of Latin America will be Economic Integration, Democratic Political
 Systems, and extending NAFTA into WHFTA (a Western Hemisperhic Free Trade
 Agreement), and important sub-topic will be infrastructure -- especially
 Telecommunications and Information Infratructure.

 With "the Cybertecture of Cybersystems, policy makers and their politiescan
 steer through the current chaotic turbulences of today into a new, and
 hopefully better, world order of tomorrow.

 Clinton and Gore, with the proper cybertools, may be just what the world
 needs now.  Our non-profit consulting partnership in Miami Beach, "The MIAMI
 DEVICE PROJECT/RESEARCH AND DEVELOPMENT PARTNERSHIP, has developed a concept-
 paper for this December Summit of the Americas that could help Clinton, and
 the rest of use, develop and use the cybersystems we need to steer into our
 21st Century Future.

 The following text is a summary of our first draft of the Miami Device
 Project concept.  We'd appreciate your feedback, comments, critiques, and
 suggestions on how to create a World Summit on The Future during December
 1994 and January 1995 on the Internet and other related media such as print,
 broadcast, multimedia, and face-to-face conferences.  Also broadening the
 audiences for the work of the Santa Fe Institute, Bill Gleick, Ilya
 Prigogine, Mitchell Waldrop, and the other leading theorists and
 practitioners of Chaos/Complexity theory, and related researchers in
 Cybernetics and Management of Large Organizations, such as Barry Clemson,
 Jay Forrester, Stafford Beer, Mike Mesarovic, and the related work at US
 Government Research Labs as well as the great industrial research labs at
 IBM and ATT, could also bring the power of science to the problems of public
 policy and decision-making.


                    THE MIAMI DEVICE PROJECT:
             AN AMERICAN AND INTERNATIONAL MISSION-QUEST
                        FOR CYBERSPACE

 Something important, chaotic and with a hidden sense of latent order is
 happening in Cyberspace and Real-Space.

 Nobody who is honest can say they truly know, see, can predict or control
 what is happening  with The Net, also known as:

 THE INFORMATION SUPERHIGHWAY.
 THE NATIONAL INFORMATION INFRASTRUCTURE.
 THE GLOBAL INFORMATION INFRASTRUCTURE.
 THE INFO BAHN.
 THE ELECTRONIC/DIGITAL SUPERHIGHWAY.
 CYBERSPACE.

 America and The World need models, mavens, moxie, methodologies and, last
 but not least, money --- to design, build, test, market and operate the
 National and Global Information Infrastructures.  But most of all, the
 emerging Cyberspace Industry will need multimedia forums and discourse,
 even face-to-face conferences, that will clarify and shape the complex and
 relevant issues we must deal with as we enter the on-ramps to the Info
 Superhighway, and try to avoid the "road-kills" of entities both corporate
 and ideational that took the wrong turns.  These forums and discourses may
 turn out to be the second most important set of discussions since the
 founding of the United States in 1776 in the shaping and shaping of America
 and the World as we approach the 21st Century.  Adding to the complexity
 of the discussions about Cybernetic-Cyberspace technologies, applications
 and markets will be the fact that we will be using these ver same networks
 to discuss and develop their evolution  ---- hopefully a democratic exchange
 of views from the many stakeholders and users of the Net who will design and
 live in the rapidly evolving civilization, societies and communities
 (virtual and real) that will be spawned by CyberTech, and the cultural,
 economic, political and community structures Cyberspace will enable.

 Cyberspace represents a new and irresistible era in the evolution of human
 culture and business under the sign of technology --- but what is turyly
 wonderful is that we still have the opportunity to shape the application of
 Cybertech toward an Age of Utopia rather than Dystopia.

 What is being born and can be shaped by discussion and effort is something
 that every normal child or animal possesses at birth, but has never fully
 existed intact over the entire face of the planet:

 A BRAIN FOR PLANET EARTH; A GLOBAL CENTRAL NERVOUS SYSTEM;
 A WORLD-WIDE SENSE AND PARTICIPATION IN A GLOBAL COMMUNITY;
 A CYBERNETIC CITY.

 The relevant discourses and forums must rationally and humanely deal with
 all the relevant issues connected with the new cybertechnologies and
 cybermedia --- and they are too important to the future of the planet to be
 left in the hands of government, business or universities alone.  The
 community and the public but get informed and stay involved with the
 evolution of  the Net.

 We have termed this multi-dimensional quest and process

 THE MIAMI DEVICE PROJECT TOWARD PARADISE REGAINED ---
 FOR GREATER MIAMI BEACH, SOUTH FLORIDA, AND THE
 WORLD-CLASS CITIES, CITIZENS, & NATIONS OF THE FUTURE.

 Why Miami?  Why not Cambridge, or New York, or Chicago, or Los Angeles,
 or Milan, or Berlin or Paris London or Tokyo?

 In the history of the planet over the ages, from the time humankind first
 emerged from the primordial ooze, there have always been a succession of
 great city-regions that entered the world stage as truly world-class,
 international and cosmopolitan centers of trade, culture, education,
 technolgy, finance, transportation, and concentration of talent, dreams,
 wheels and deals.

 Just as the Central Florida region around Cape Canaveral and the Kennedy
 Space Center identified itself as America and the World's launch-pad and
 testbed for Aerospace, so is the Greater Miami Beach and South Florida
 region of the Sunshine State begun it movement toward center-stage as the
 nation and the planet's laboratory and test-bed for mankind's thrust into
 the truly Final and Next Frontier: Cyberspace.

 The Greater Miami Beach/South Florida region of 4 million, supported by a
 unique partnership of its private, public, academic and community sectors
 called The Miami Device Project, has been selected by the Clinton
 Administration to host in our region in December of 1994 the first, Western
 Hemisphere-Latin American Summit Conference, to be led by President
 Clinton and Vice-President Gore themselves.

 Greater Miami Beach's strategic geographic location and tropical, earthquake-
 free (though occasionally hurricane-prone) has positioned the region as an
 international gateway to not only Latin America and The Caribbean, but to
 Europe, Asia, and North America, also.  A great airport .... the world's
 largest cruise-ship port and one of the most active seaports ... and coming
 soon, the world's first Cyberport-Teleport-Cyberspaceport ... a laboratory
 and crucible where the model Cybernetic City of The Future will be forged.

 Greater Miami Beach and it's multimedia links and partnerships with other
 sister cities, states, and nations intends to do for the science, art and
 business of cybernetic computer communications something similar, but much
 more benevolent for humanity, what the Manhattan Project did during World
 War II with the technology of thermonuclear energy, from which the atomic
 bomb was created.

 BUT THERE WILL BE A FUNDAMENTAL DIFFERENCE IN MISSION AND VISION IN THE MIAMI
 DEVICE PROJECT AS OPPOSED TO THE MANHATTAN PROJECT:  The Miami Device
 Project's focus is to create and to provide universal access to knowledge
 tools and multimedia information systems for the human community, in both
 America and world-wide --- and to help design, build and sustain a truly
 Global Village and Cybernetic City where art, science, philosophy,
 technology and business can provide the human spirit with the lift of a
 driving dream into the 21st Century --- a Cybernetic Century of peace,
 prosperity and co-evolution for man, his systems, and our children.


 Norbert Wiener, the MIT professor of mathematics and inventor of the word
 and field of cybernetics, once commented in his book, "cybernetics and
 Society: the Human Use of Human Beings:" Mankind and society can only be
 truly understood by a study of the messages they transmit; in the future,
 messages between man and man, man and machine, and machine and machine
 will play an increasingly important role."

 If children can be considered messages we send to a future we may never see
 ourselves, the human children of our loins will themselves create new
 futures with the children of our minds --- our systems, networks and
 knowledge bases --- as humanity leaps toward the stars in our inner and
 outer universes.

 A First Draft on April 22, 1994, Friday Night,
 in Miami Beach, Florida, USA --- by Marty Cyber.

 (PS: Lab space and residential space grants are available in beautiful,
 sunny South Miami Beach's Art Deco District, where Miami Device is
 attempting to create a Science Deco District. if you cyberesearchers in
 Boston, New York, Washington or beyond are seeking weather-friendlier
 climates in December and afterwards, give me a call, e-mail, or letter
 outlining your own research interests and comments about the  MDP Project.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
 IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
 YOU LIVE IN TEXAS.  ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
 PRIVACY.  IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                               CYBERSELL (TM)

 From Michael Ege (Michael_Ege@designlink.com)

 [Editor's Note: I HAVE NO FUCKING IDEA why someone who, in my opinion,
 misused the net, disregarded the complaining of others, and vowed to
 do it again, gets off dictating their new-found policy to us. They
 evidently want this to be written in stone.  I think the rules below
 are good...and have been obeyed for decades by those with any tact!
 Evidently, the "Green Card Spammers" are just now getting a clue
 and want to take credit for ethics that already exist.  Get a
 life MARTHA!  -Ed.]

 Contact: Martha Siegel
 Cybersell(tm)
 602/661-5202

 SUGGESTED INTERNET COMMERCIAL SPEECH GUIDELINES

 Explanatory Preface

 The Internet is the most powerful communication tool in the world, today
 and for the forseeable future. Recently the circulation of an advertisement
 by two lawyers for their legal services raised tremendous controversy as to
 the manner and location that ads should be placed on the Internet.

 Two years ago the National Science Foundation lifted the ban on Internet
 advertisements that they had previously imposed. Yet, the idea of
 commercialism an advertising in this increasingly pervasive medium is still
 controversial. The primary anti-ad forces can be found among the academics
 and technical workers who were the early residents of the Internet. Where
 advertising is an integral part of other mediums, this highly vocal faction
 is attempting, not without some success, publicly to characterize
 advertisers as inferior to others who supply information via computer.

 While the ad critics do not speak with a single voice, but rather express a
 diversity of opinions, several elements emerge with some consistency.
 First, there is an overall presumption that advertising is unwanted and
 useless.  Even though those who who have made the pioneering forays into
 Internet advertising have met with financial  success (proving that
 advertising messages are indeed accepted) the vocal minority continues to
 insist otherwise. Based on this faulty premises advertisers are told that
 custom demands that they approach customers only in an indirect manner.
 Specifically, advertisers are told that it is apropriate to to places ads
 only on channels set aside to carry nothing but advertising. Alternatively,
 an advertiser may place a message at a fixed locale in cyberspace but must
 use other mediums such as billboards and television ads to announce the
 computer location and ask the customer to go and look for it.

 It is unanimously agreed that noone controls the Internet and there is no
 legal requirment to follow these dictates. Nevertheless the vocal Internet
 minority that custom requires adherence to its outdated philospophy.

 The guidlines presented here refuse to recognize the unreasonable nature of
 those who are anti-advertising, Commercial activity on the Internet is a
 valuable and worthwhile use of this resource and advertising is a key
 element of such commercial use. It should be recognized that virtually no
 busines can be successful without advertising. The old-think view of some
 Net extremists that advertising is as an unwanted an unpleasant annoyance
 to be marginally tolerated is not good for the development of the Internet,
 nor healthy for the World economy.

 Recently special groups and networks devoted exclusively to product and
 service promotion have begun to be established. While these are an exciting
 pert of the development of the Information Superhighway, it is not
 acceptable or practical for advertising to be kept in a restricted area,
 separate from other Internet activities. Advertising is not relegated to
 such an inferior position in any other medium, thus it should not be so
 with respect to the Internet.

 Neither those who advertise on the Internet be forced to do so passively.
 In no ther medium is it required that a potential customer deliberately
 seek out an advertisement rather than having it placed before him or her.
 The idea that the only acceptable way to advertise on the Internet is a
 system where a non-computer medium is utilized to request that a potential
 customer look for such information at a particular site in cyberspace is a
 totally unacceptable limitation. Such convoluted methods are not effective
 or convenient for the advertiser or the consumer.

 The easy, free flow of information is the goal of the Internet. Advertising
 is valuable and useful information. It is the concept of free flow that
 should govern any Internet advertising policy.

 GUIDELINES

 * Usenet
 It is recognized that the Usenet is only public gathering place currently
 existing on the Internet. It is a legal and appropriate forum in which to
 place commercial messages.

 * Distribution
 Distribution of advertising messages to newsgroups on the Usenet will be
 based upon the demographic and /or interst of users of the newsgroups,
 ensuring that the newsgroups selected are those most often used by people
 likely to be interested in a particular commercial message.

 * Identity
 All commercial messages should be readiliy identifiable so users can read
 them in a fully informed manner. For example, a conventional, easily
 recognizable "AD" identifier in the title of all commercial message
 offerings may serve this purpose.

 * Filtering
 Advertisers shall respect the right of all individual Internet users to,
 though the use of existing or evolving technology, filter out commercial
 messages if they so choose. However, any upsteam provider short of the end
 users should refrain from making that decision for the individual, who may
 welcome a particular commercial message. Anything else would amount to
 censorship.

 * Sincerity
 Commercial messages should be offered only when there is a sincere belief
 that the information will prove useful to Internet users. The inclusion of
 useful information with the advertising copy is encouraged. However, it is
 als recognized that solicitation of purchases and directions on how to make
 such purchases are a validethical pursuit of the advertiser, as well as a
 useful convenience fot the consumer.

 (In addition to the above Internet-specific guidelines, the following
 suggestions are based upon time-tested, proven codes already in existence.
 {Sources are cited with each entry})

 * Truth
 Advertising shall tell the truth and shall reveal significant facts, the
 concealment of which would mislead the public (AAF's Advertising Principle
 of American Business)

 * Responsibility
 Advertising agencies and advertisers shall be willing to provide
 substantiation of all claims made (WSJ Guide to Advertising Policy and
 Production)

 * Taste and Decency
 Advertising shall be free of statements, illustrations, or implications
 that are offensive to good taste or public decency (Same Source)

 * Substantiation
 Advertising claims shall be substantiated by evidence in possession of the
 advertiser and advertising agency, prior to making such claims.
 (Advertising Principles of American Business)

 * Omission
 An advertisement as a whole (ed. note: original says "shoe") may be
 misleading although every sentence separately considered is literally true.
 Misrepresentation may result not only from direct statements but from
 omission of material facts (Better Business Bureau Code of Advertising)

 * Testimonials
 Advertising containing testimonials shall be limited to those of competent
 witnesses who are reflecting a real and honest opinion or experience.
 (Advertising Principles of American Business)

 * Composition
 The composition and layout of advertisements should be such as to minimize
 the possibility of misundertanding. (BBB Code)

 * Price Claims
 Advertisers shall not knowingly create advertising that contains price
 claims which are misleading. (AAAA Standards and Practices)

 * Unprovable Claims
 Advertising shall avoid the use of exaggerated or uprovable claims. (WSJ
 Guide)

 * Claims by Authorities
 Advertisers will not knowingly create advertising that contains claims
 insufficiently supported or that distorts the true meaning or practical
 application of statements made by professional or scientific authority.
 (Standards and Practices)

 * Guarantees and Warranties
 Advertiser of such shall be explicit with sufficient information to apprise
 consumers of their principal terms and limitations, or, when space and time
 restrictions pleclude such disclosures, the advertisement shall clearly
 reveal where the full text of the guarantee or warranty can be examined
 before purchase. (Advertising Principles)

 * Bait Advertising
 Advertising shall not offer products or services for sale unless such offer
 is constitutes a bona fide effort to sell the advertised products or
 services and is not a device to switch consumers to other goods or
 services, usually higher price. (Same Source)

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                      SOME INFO ON GREEN CARD SPAM

 The first surprise is that "pericles.com" has disappeared from the PSI
 name servers and from the "whois" database!  But they have a new
 domain, "SELL.COM".  The change happened just two days ago:

  % whois pericles.com
    No match for "PERICLES.COM".

  % whois pericles-dom
    No match for "PERICLES-DOM".

  % whois canter
    Canter & Siegel (SELL-DOM) SELL.COM
    Canter, Laurence A. (LC42)
    postmaster@SELL.COM
    (602) 661-3911 [and some other entries that are irrelevant here]

  % whois sell-dom
    Canter & Siegel (SELL-DOM)
    P.O.Box 13510 Scottsdale, AZ 85267

  Domain Name: SELL.COM

  Administrative Contact: Canter, Laurence A.  (LC42) postmaster@SELL.COM
  (602) 661-3911 Technical Contact, Zone Contact: Network Information and
  Support Center (PSI-NISC) hostinfo@psi.com (518) 283-8860

  Record last updated on 09-Aug-94.

  Domain servers in listed order:

  NS.PSI.NET 192.33.4.10 NS2.PSI.NET 192.35.82.2

  % whois lc42
    Canter, Laurence A. (LC42)
    postmaster@SELL.COM
    Canter & Siegel P.O.Box 13510 Scottsdale, AZ 85267 (602) 661-3911

  Record last updated on 09-Aug-94.

  Queries from nslookup asking for an IP address or MX record for
  sell.com yield no fruit.  The query "ls sell.com" is refused by the PSI
  name servers.

  But it seems logical to ask about "cyber.sell.com", and sure enough,
  it's there:

  cyber.sell.com inet address = 199.98.145.99 cyber.sell.com preference =
  5, mail exchanger = cyber.sell.com

  This is the same address that pericles.com had until a couple of days
  ago.  It still has no backup mail exchanger, but that may not be so
  important any more, because....

  The host at this address is no longer a PC running Microsoft Windows.
  It's now a Unix box!  That's right: if you try to telnet to this host,
  at the customary port 23, you're greeted with this prompt:

  UNIX System V Release 4.2 (cybersell) (pts/0)

  login:

  There are also server processes listening on ports 512(rexecd), 513
  (rlogind) and 514 (rshd).

  They've got an FTP server (port 21), but it doesn't accept "anonymous"
  or "ftp" as a user name.

  They've also got an SMTP server listening (port 25), but it apparently
  does not implement the "vrfy", "expn", or "help" commands--all of these
  yield "502 ... Not recognized" error replies.  The "rcpt to" command
  seems to accept any recipient name as legitimate--any validity check
  must come later, after it has already accepted the mail.

  They don't have an NNTP(119), Gopher(70), or Web(80) server--at least
  not on the conventional ports for such services.

  They do have a few other active ports: echo(7), discard(9),
  daytime(13), ttytest(19), and time service (37).

  There's also something that answers a connection to port 199, but I
  have no idea what that service might be.  Anyone else know?

  If you do a traceroute, you get this: ....  9 psi-nsf.psi.net
  (192.41.177.246) 27 ms 31 ms 27 ms 10 core.net155.psi.net (38.1.2.3)
  145 ms 129 ms 145 ms 11 serial.phoenix.az.psi.net (38.1.10.37) 227 ms
  195 ms 195 ms 12 38.2.37.6 (38.2.37.6) 230 ms 184 ms 238 ms 13
  cyber.sell.com (199.98.145.99) 195 ms 215 ms 219 ms

  Someone who knows more about routing and networks than me might be able
  to analyze this for information about the nature of their connection.
  What is "38.2.37.6"?  It has no hostname, and if you try to telnet to
  it, it asks for a password without first asking for a username.

  I hope all of the above information is useful to the rest of the Usenet
  community.  If you've got your site aliased to "pericles.com", you
  should consider adding a new alias of "cyber.sell.com".  I look forward
  to hearing more information from others more knowledgeable than myself.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                      CABLE RESOURCES ON THE NET

 By John Higgins (higgins@dorsai.dorsai.org)

 Updated September 1994 Compiled by Multichannel News. Copyrighted by
 John M. Higgins 1994. All rights reserved. Additional copyright information
 at bottom.

 Multichannel News Contacts:
 Marianne Paskowski, editor-in-chief (Mpcable@aol.com)
 John M. Higgins, finance editor: (higgins@dorsai.dorsai.org)

 Multichannel News subscription information: 800-247-8080. A bargain at
 $89/year.  Editorial Department: Voice) 212-887-8390; Fax) 212-887-8384

               -=-=-=-=-=-=-=THE BEST CABLE STUFF-=-=-=-=-=-=-=
  Telecomreg (mailing list); Cable Regulation Digest (newsletter); fcc.gov
   (document archive); FCC Daily Digest (finger); cablelabs.com (document
    archive); rec.video.cable-tv (Usenet newsgroup); Edupage (newsletter)
                               -=-=-=-=-=-=-

 For a bunch folks wanting to rule the info highway, cable's status on the
 Internet echoes MTV:Unplugged. There are some signs of senior execs
 starting to tap in, but they're few and far between. There are domains
 listed in the name of cable companies (TCI, Cablevision Systems, Viacom)
 but many seem to be inactive. Comcast and Viacom are on hopelessly limited
 MCI Mail systems that regularly snarl. To steal a line, cable execs hope to
 build the highway but they can't drive.

 Example: Recently I needed a copy of the freshly revised Hollings bill
 S.1822. I couldn't get it out of the Senate, the National Cable Television
 Association or any cable source. But I surfed over to Bell Atlantic's
 Internet site (ba.com) and grabbed the whole thing (including amendments).
 The telcos are clearly hipper to this info highway stuff than the cable
 kids.

 The good news is that the number of Internet resources useful to cable
 professionals is growing. The bad news is that they're primarily provided
 by telcos and regulators. But it's a start. Here's a cluster of cable
 resources of all sorts that I've encountered.

 GIMME FEEDBACK! Send us updates, particularly on the technical side. (And
 not just how to pirate HBO and pay-per-view porno, please.)

 "Differently clued" cable newbies should feel free to contact us with any
 questions on how to navigate. Many of these resources are NOT accessible to
 subscribers of Prodigy, America On-Line and Compu$erve.

 A similar list of broadcasting resources on the net is compiled by Neil
 Griffin (ngriffin@nyx.cs.du.edu).

 ** Mailing Lists

 TELECOMREG: A mailing list focusing on telecomunications regulation.
 Subscribers got an early peek at the FCC's latest cable price formula,
 Founded by Barry Orton, a consultant to municipal regulators, TELECOMREG is
 very high volume and fairly high quality.
 How to get on it: E-mail (listserver@relay.adp.wisc.edu; SUBSCRIBE
 TELCOMREG YOUR NAME)

 SCTE-LIST: A mailing list on cable technology apparently tied to the
 Society of Cable Television Engineers that just cranked up. It's too new to
 judge the quality.
 How to get on it: E-mail (listserver@relay.adp.wisc.edu; SUBSCRIBE
 SCTE-LIST YOUR NAME)

 I-TV: Discussion list centered on two-way Interactive Television. Very
 new, and appears to be focusing mostly on education and community
 development. So far it's pretty lame, but that could change. Expect lots
 of public-access types to be kicking around, as opposed to folks actually
 trying to make a business of it. Uploading press releases is -- for some
 bizzare reason -- encouraged.
 How to get on it: E-Mail (listserv@knowledgework.com; SUB I-TV YOUR
 NAME).

 TELECOM DIGEST: Oriented toward voice telephony, but covers all sorts of
 telecommunications topics. Fairly techie.
 How to get on it: E-mail (telecom-request@eecs.nwu.edu; SUBSCRIBE
 YOUR@ADDRESS); Usenet (comp.dcom.telecom).

 ** Publications

 CABLE REGULATION DIGEST: A weekly summary of regulatory news from
 Multichannel News. The best way to obtain it each week is on the TELECOMREG
 list.
 How to get it: FTP (ftp.vortex.com: /tv-film-video/cable-reg)
 Gopher (gopher.vortex.com : /TV/Film/Video)

 FCC DAILY DIGEST: Washington telecom lawyer Robert Keller attaches the
 most recent edition and referenced documents to his "finger" file. A really
 nice effort by Keller. Be sure to open your capture buffer first, as the
 file is many screens long.
 Also available at the fcc.gov ftp and gopher site. (see below).
 How To Get It: Finger (finger rjk@telcomlaw.com).

 EDUPAGE: Tip sheet on information technology and media issued three
 times weekly. Quickie summaries primarily of newspaper articles,
 primarily from the majors.
 How to get it. E-Mail (listproc@educom.edu, SUB EDUPAGE YOUR NAME).

 FITZ'S SHOPTALK: Daily dispatches on the TV business, primarily networks
 and local stations put there's plenty of cable in there. Put out by media
 headhunter Don FitzPatrick. Primarily summaries of wire-service and major
 newspapers, but also includes some full-text reprints.
 How to get it: E-mail (shoptalk-request@gremlin.clark.net, SUBSCRIBE
 YOUR@ADDRESS).

 SKYGUIDE: This one's from a Brit that doubtless watches too much TV. The
 Euro cable and satellite television scene. Concentrates on BSkyB but also
 romps off onto the continent.
 How to get it: E-mail (bignoise@cix.compulink.co.uk), Usenet {preferred!}
 (alt.satellite.tv.europe).

 SATNEWS: A newsletter about satellite television broadcasting around the
 world.
 How to get it: E-mail: (listserv@orbital.demon.co.uk, SUBSCRIBE YOUR
 NAME).

 ** FTP, Gopher, and WWW Sites

 CABLELABS: Finally, a cable-specific document archive! CableLabs, the
 industry's R&D greenhouse, has established an anonymous FTP archive at
 cablelabs.com. It's still "under construction", as they say. There's a
 small collection of techie documents in it so far, but more is promised.
 How to get there: FTP (ftp.cablelabs.com); WWW (http://www.cablelabs.com/).

 FEDERAL COMMUNICATIONS COMISSION: Loads of documents, orders, etc. but
 they're poorly orgainized.
 How to get there: Gopher (fcc.gov); FTP (fcc.gov).

 PEPPER & CORAZZINI: A D.C. telecom law firm has put up an archive of
 documents and memos by their lawyers on related to broadcasting, cable,
 common carriers, PCS and information law. P&C's e-mail contact is Neal J.
 Friedman (nfriedma@clark.net)
 How to get there: Gopher (gopher.iis.com//11/p-and-c); FTP
 (ftp.iis.com/companies/p-and-c) WWW (http://www.iis.com/pandc-home.html).

 NTIA: National Telecommunications and Information Administration has a
 document site, notably from Clinton's National Info Infrastructure
 committe. Seems to be down frequently.
 How to get there: Gopher (ntia.doc.gov); FTP (ntia.doc.gov).

 BELL ATLANTIC: Telco propaganda (press releases, speeches, Congressional
 testimony) mixed in with lots of useful regulatory documents.
 How to get there: Gopher (ba.com); FTP (ba.com).

 MFJ TASK FORCE: More RBOC lobbying on-line. But it's a hell of a lot
 better than anything cable has to offer.
 How to get there: Gopher (bell.com).

 C-SPAN: The public-affairs network has a gopher site with a whole mess of
 programming info for viewers.
 How to get there: Gopher (c-span.org); ftp (c-span.org).

 CNN: For reasons I haven't quite figured out, the University of Maryland
 has a gopher site carrying the text of CNN's Headline News stories, putting
 up dozens of national and international news stories daily, with an archive
 going back several days.
 How to get there: Gopher (info.umd.edu).

 ** Usenet Groups

 The quality of cable info on Usenet newgroups is mixed. The most active
 cable group is rec.video.cable-tv. It once was dominated by tips on
 stealing cable. However, in recent months three cable system-level execs
 from Time Warner (Dean Stauffer), Continental (Scott Westerman) and Century
 (Lloyd Sanchez) have virtually turned the group around by patiently and
 respectfully responding to cable subscribers' questions, legit complaints
 and outright rants. Informed and informative answers, what a concept! Give
 them a raise.

 Usenet is one way to sample what subscribers are buzzing about. Is your
 company included on the recent list of "worst cable companies"?

 rec.video.cable-tv        Most active.
 alt.cable-tv.re-regulate  Traffic has really picked up. Lots of
                           complaining subscribers.
 alt.satellite.tv.europe   Active group on Euro cable and satellite
                           programming.
 alt.politics.datahighway  Not too bad.
 alt.tv.public-access      Reportedly exists, but I've never seen it.
 comp.dcom.telecom         Moderated discussion of telco issues. Telecom
                           Digest appears here.
 alt.dcom.telecom          Breakaway group started by telco folks
                           irritated by the ones dominating
                           comp.dcom.telecom
 alt.dcom.catv             I've NEVER seen pertinent traffic on this group.
 alt.tv.comedy.central     Dull.
 alt.tv.mst3k              Comedy Central's Mystery Science Theater 3000.
 alt.tv.hbo                Hardly any traffic.
 alt.tv.nickelodeon        Fans of the kid's network.
 alt.fan.ren-and-stimpy    'Nuff said.

 ** FAQ's

 There's a few frequently-asked-questions lists kicking about. The Cable
 TV FAQ is all about pirating HBO (YAWN!), with many technical details.
 Can't find the archive site, however. The DBS and wireless cable FAQs are
 more useful to non-pirate professionals.

 All three are posted are posted in rec.video.cable-tv periodically. High-
 power DBS is in rec.video.satellite. I'll add archive sites as I find them.

 CABLE TV FAQ
 How to get it: Usenet (rev.video.cable-tv).

 WIRELESS CABLE FAQ How to get it: FTP (rtfm.mit.edu:/pub/usenet/
 rec.video.cable-tv/Wireless_Cable_TV_FAQ); Usenet (rec.video.cable-tv).

 HIGH-POWER DBS FAQ: Not archived anywhere.
 How to get it: Usenet (rec.video.cable-tv, rec.video.satellite).

 ** Canada

 Mooseland has its own cluster of resources:

 USENET GROUPS:
  can.infohighway
  can.infobahn

 MAILING LISTS
  PAC-HIWAY: Run by Public Advisory Council on Information Highway Policy.
  How to get it: E-mail: (listprocessor@cunews.carleton.ca; SUBSCRIBE YOUR
 NAME)

 ISCNEWS: Mailing list of news releases, fact sheets, etc. from the
 federal agency Communications Canada
 How to get it: E-mail (listserv@debra.dgbt.doc.ca; SUBSCRIBE ISCNEWS
 YOUR NAME)

 THE INTERNET JOURNAL OF GOVERNMENT RELATIONS: Bi-weekly commentary on
 government action regarding information technology, trade and
 procurement in North America, but primarily Canada.
 How to get it: E-mail (pcanniff@fox.nstn.ns.ca)

 SITES
 INDUSTRY CANADA: Canada's equivalent to the U.S. Department of Commerce
 How To Get There: Gopher (debra.dgbt.doc.ca /Industry Canada Docs)
 FTP (debra.dgbt.doc.ca /pub  look in both "gazette" and "isc" directories)
 WWW: (http://debra.dgbt.doc.ca/isc/isc.html)


  Copyright 1994 by John M. Higgins. This list may be redistributed
 provided that the article and this notice remain intact. This article may
 not under any circumstances be resold or redistributed for compensation of
 any kind without prior written permission from John M. Higgins. That
 includes publication by magazine or CD-ROM. But if you're interested,
 talk to me.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

              IDS ANNOUNCES NEW ROCHELLE, NEW YORK POP (AC 914)

 From: green@ids.net


 InteleCom Data Systems, Inc, operators of the IDS World Network, the
 worlds first full-service Internet Access service geared towards end-users,
 announces the latest of its new Points of Presence to be brought online.

 New Rochelle, New York members may access IDS via (914) 637-6100  at speeds
 of up to 28.8k baud using the new V.FAST technology.

 IDS offers dialup Internet access for a low flat monthly fee, as well as
 PersonalSLIP - a dial-on-demand, low-cost SL/IP service starting at $20
 per month.

 Here is our standard electronic brochure.  For more information, contact
 IDS Customer Service at (800) IDS-1680.


  :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.
                          The IDS World Network
                         Internet Access Service
  :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.


 A great place for the beginner to start with, and an easy enough place for
 the experienced user to fully utilize the facilities on the Internet.

        Features:

             o Usenet NEWS
                o Internet Mail
                   o TELNET, FTP, FINGER, TALK
                      o Menu Driven Interface
                         o UPI Newswire
                            o VAX/VMS DCL Access
                               o Low affordable prices

 The IDS World Network Internet Access Service is a great meeting place on
 the Internet.  We offer free BBS service to everyone; message areas and
 local email are all free.  Stop in - meet and talk with people from all
 over the world... from Albania to Zimbabwe.  Yugoslavia... Russia...
 Germany... Australia... and all of them participate in our online message
 bases, providing inteligent discussion and an excellent way to make the
 world a bit smaller by bringing everyone together electronicly.  Subjects
 range from local parking tickets to the global environment and possible
 solutions for world problems.

 The IDS World Network was the first system to obtain NSFnet access for
 members - we're the longest running Internet "public access" service,
 with years of experience providing easy access for beginners, and ease
 of use for experienced Internet gurus.

 We have a network of several machines handling the load at our Operations
 Center in Rhode Island, with dedicated NEWS servers, SL/IP servers and UUCP
 machines.

 Now we're reachable through the CompuServe Packet Network - for just $4 per
 hour on top of the regular monthly subscription rates, you can access the IDS
 World Network from any local number for the CompuServe Packet Network - for
 your nearest CPN number, call our customer service line at (800) IDS-1680.
 The rates for using IDS through the CompuServe network are just $4 per hour,
 day or night - no higher rate for peak usage.  PersonalSLIP and other SL/IP
 services are not available through the CompuServe Packet Network, although
 IDS UUCP services are...

 INTERNET SERVICES

 Users have their own workspace with unlimited file size storage; files
 remain in the workspace for 24 hours (giving the user ample time to
 download files to their personal computer).

 Service types:

 Standard Account - All Internet functions, standard menu account, VAX/VMS
 DCL Access.  Services arranged by category in an easy-to-use, menu
 driven interface.  All for $15 per month ($17 per month when dialing
 through Miami).

 PersonalSLIP - Your own Internet SL/IP connection, Dial-On-Demand.  $20/month
 for 20 hours, $2/hr each additional hour.  POP Mail service included
 for mail storage and retrieval, for use with popular email programs
 such as Eudora, QVTnet, and others.  Also includes NNTP server access
 for offline/online NEWS reading.

 Dedicated PersonalSLIP - Your own Internet SL/IP connection, 24 hours a day,
 7 days a week, your own Single-Host IP address and Domain Name, $75/month
 There is a $450 startup charge for this service.

 Dedicated SL/IP - Network connections for multiple hosts and all of the above
 for $200/month.  There is a $450 startup charge for this service.

 UUCP Services - Connect your BBS or your own private system.  We support
 14.4k baud modems on all of our UUCP lines.  One-time setup fee of $25, plus
 $20/month for mail and up to 100 newsgroups, $35/month for up to 500,
 $45/month for a full feed.  One time fee of $25 for those wishing to
 apply for their own domain.

 ATTENTION TEACHERS AND EDUCATORS

 IDS works heavily with teachers and educators around the world to help
 bring them together to utilize the Internet in the classroom.  If you'd
 like more information, send electronic mail to info@ids.net.  Rhode Island
 teachers:  contact Reo Beaulieu at the RI Department of Education for your
 free account.

 CURRENT DIALUP CALLING AREAS

 Middle Rhode Island     (401) 884-9002
 Northern Rhode Island   (401) 273-1088
 Southern Rhode Island   (401) 294-5779
 Miami, Florida          (305) 534-0321
 Merrit Island, Florida  (407) 453-4545 (Brevard County, FL)
 New Rochelle, New York  (914) 637-6100
 All CompuServe Packet Network numbers.

Other Florida areas forthcoming.


 -->  ALL USERS MUST ADHERE TO ACCEPTABLE USE POLICIES OF THE APPROPRIATE <--
 -->                              NETWORKS                                <--

 To access the IDS World Network;  telnet to ids.net [155.212.1.2], or dial
 us via modem at (401) 884-9002.  If you are dialing direct, type IDS at the
 first prompt and then sign on as GUEST when it asks for a Username.

 Web users, try the <A HREF="http://www.ids.net">IDS Web Server</A>.

 For Customer Service, send email to info@ids.net, or call (800) IDS-1680
 voice.  Within Rhode Island, call (401) 884-7856.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                                THE MEDIA LIST

 By Adam M. Gaffin (adamg@world.std.com)

 This is a listing of newspapers, magazines, TV stations and other media
 outlets that accept electronic submissions from readers and viewers, along
 with their main e-mail addresses.  It would be almost impossible to
 maintain a listing of individual reporters, editors and the like;  if you
 want to reach a specific person, try sending a request to the given media
 outlet's general address (but see below for a one-time listing for the
 Ottawa Citizen).  If you are submitting a letter to the editor or an op-ed
 piece, it's a good idea to include your mail address and a daytime phone
 number.  Publications generally try to verify authorship and will not run
 submissions without some way to check whether you really wrote the item
 to which your name is attached.

 Please send any additions, deletions or corrections to the address at the
 end of this list.  Look for new editions in the alt.journalism,
 alt.internet.services and comp.misc newsgroups.  My thanks to all who have
 contributed!  Because of these kind folks, this list is now substantially
 longer than it was just a week ago.

 SPECIAL NOTE:  The last part of this list contains the e-mail addresses
 for reporters and editors at the Ottawa Citizen.  Thanks to the Citizen for
 the information.


 DAILY NEWSPAPERS

 Middlesex News, Framingham, Mass.       mnews@world.std.com
 Boston Globe
      Story Ideas                        news@globe.com
      Circulation Requests               circulation@globe.com
      Letters to the Editor              letter@globe.com
      Submissions to "Voxbox" column     voxbox@globe.com
      Comments on Coverage/Ombudsman     ombud@globe.com
      Ask the Globe                      ask@globe.com
      Thursdays Calendar Section         list@globe.com
      Health & Science Section           howwhy@globe.com
      Confidential Chat                  chat@globe.com
      City Weekly Section                ciweek@globe.com
      Religion Editor                    religion@globe.com
      Arts Editor                        arts@globe.com

 Champaign-Urbana (Ill.) News-Gazette    gazette@prairienet.org

 Chronicle-Telegram, Elyria, Ohio        macroncl@freenet.lorain.oberlin.edu
 Colorado Daily, Boulder, Colo           colorado_daily@onenet-bbs.org
 The Guardian, U.K.                      letters@guardian.co.uk
      Notes and Queries                  nandq@guardian.co.uk
 Morning Journal, Lorain, Ohio           mamjornl@freenet.lorain.oberlin.edu
 Ottawa Citizen, Ottawa, Ont.            ottawa-citizen@freenet.carleton.ca
 Portland Oregonian                      oreeditors@aol.com
 Sacramento Bee                          sacbedit@netcom.com
 Phoenix Gazette                         phxgazette@aol.com
 St. Petersburg (Fla.) Times             73174.3344@compuserve.com
 San Diego Union-Tribune                 computerlink@sduniontrib.com
 San Francisco Examiner                  sfexaminer@aol.com
 San Jose Mercury-News                   sjmercury@aol.com
 Santa Cruz County (Calif.) Sentinel
       Letters to the editor             sented@cruzio.com
       News desk                         sentcity@cruzio.com
 Seattle Times                           edtimes@hebron.connected.com
 Tico Times, Costa Rica                  ttimes@huracon.cr
 Washington Square News, NYU             nyuwsn@aol.com

 WEEKLY NEWSPAPERS

 Hill Times, Ottawa, Ont.                ab142@freenet.carleton.ca
  Journal Newspapers, D.C. area           thejournal@aol.com
  The Mirror, Montreal, Quebec            mirror@fc.babylon.montreal.qc.ca
  Palo Alto Weekly, Palo Alto, Calif.     paweekly@netcom.com.
  The Village Voice, New York, N.Y.       voice@echonyc.com

   MAGAZINES

 American Journalism Review              amerjourrv@aol.com
 Brown Alumni Monthly, Providence, R.I.  bam@brownvm.brown.edu
 Business Week                           bwreader@mgh.com
 Chronicle of Higher Education           editor@chronicle.merit.edu
 Details                                 detailsmag@aol.com
 Frank Magazine, Ottawa, Ont.            ag419@freenet.carleton.ca
 Focus, Germany                          100335.3131@compuserve.com
 GQ                                      gqmag@aol.com
 Illinois Issues, Springfield, Ill.      wojcicki@eagle.sangamon.edu.
 Mother Jones                            x@mojones.com
 The New Republic                        editors@tnr.com
 New Scientist, U.S. bureau              75310.1661@compuserve.com
 Oberlin Alumni Magazine                 alummag@ocvaxc.cc.oberlin.edu.
 OutNOW!, San Jose, Calif.               jct@netcom.com
 Playboy                                 playboy@class.com
 S.F. Examiner Magazine                  sfxmag@mcimai.com
 Scientific American                     letters@sciam.com
 Soundprint                              soundprt@jhuvms.hcf.jhu.edu
 Der Spiegel, Germany                    100064.3164@compuserve.com
 Stern, Hamburg, Germany                 100125.1305@compuserve.com
 Sky & Telescope, Cambridge, Mass.       skytel@cfa.harvard.edu
 Spectrum, New York, N.Y.                n.hantman@ieee.org
 Stern, Hamburg, Germany                 100125.1305@compuserve.com
 Time                                    timeletter@aol.com
 Ultramarathon Canada                    an346@freenet.carleton.ca
 USA Weekend                             usaweekend@aol.com
 U.S. News and World Report              71154.1006@compuserve.com
 Wired                                   editor@wired.com

 NEWS/MEDIA SERVICES

 Cowles/SIMBA Media Daily                simba02@aol.com
 Media Page                              mpage@netcom.com
 Newsbytes                               newsbytes@genie.geis.com

 NEWSLETTERS

 Dealmakers                              Ted.Kraus@property.com
 Information Law Alert                   markvoor@phantom.com
 Multichannel News                       higgins@dorsai.dorsai.org
 Society of Newspaper Design             fairbairn@plink.geis.com
 Spec-Com Journal                        spec-com@genie.geis.com
 Western Producer, Saskatoon             fairbairn@plink.geis.com

 RADIO AND TV STATIONS AND NETWORKS

 CJOH-TV, Ottawa, Ont. Can.              ab363@freenet.carleton.ca
 KARK, Little Rock, Ark.                 newsfour@aol.com
 KOIN, Portland, OR.                     koin06A@prodigy.com
 WBFO, Buffalo, N.Y.                     wbfo@ubvms.cc.buffalo.edu
 WBFO-FM, NPR, Buffola, NY.              wbfo@ubvms.cc.buffalo.edu
 WCBS-AM, CBS, NYC.                      news88@prodigy.com
 WCVB-TV, Boston, Mass.                  wcvb@aol.com
 WCCO-TV, Minneapolis, Minn.             wccotv@mr.net
 WDCB Radio, Glen Ellyn, Ill.            scotwitt@delphi.com
 WEOL-AM, Elyria, Ohio                   maweol@freenet.lorain.oberlin.edu.
 WNWV-FM, Elyria, Ohio                   maweol@freenet.lorain.oberlin.edu.
 WNYC, New York, N.Y., "On the Line"     76020.560@compuserve.com
 WRVO-FM, Oswego, N.Y.                   wrvo@oswego.edu
 WTVF-TV, Nashville, Tenn.               craig.owensby@nashville.com
 WVIT-TV, New Britian, Conn              wvit30a@prodigy.com
 WXYZ-TV, ABC, Detroit.                  wxyztv@aol.com
 WWWE 1100 AM  Cleveland, OH             talk11a@prodigy.com
 BBC "Write On"                          iac@bbc-iabr.demon.com.uk
 CBC Radio, "Brand X"                    brandx@winnipeg.cbc.ca
 Fox TV                                  foxnet@delphi.com
 Maine Public TV, "Media Watch"          greenman@maine.maine.edu
 Monitor Radio Int'l "Letterbox"         letterbox@wshb.csms.com
 NBC News, New York, N.Y.                nightly@nbc.ge.com
 NBC News, "Dateline"                    dateline@nbc.ge.com
 NPR "Talk of the Nation"                totn@aol.com
 NPR "Talk of the Nation/Sci. Friday"    scifri@aol.com
 NPR "Fresh Air"                         freshair@hslc.org
 NPR "Weekend All Things Considered"     watc@cap.gwu.edu
 NPR "Weekend Edition/Sunday"            wesun@clark.net

 COMPUTER PUBLICATIONS

 Communications News                     489-8359@mcimail.com
 Corporate Computing                     439-3854@mcimail.com
 Computerworld                           computerworld@mcimail.com
 Communications Week                     440-7485@mcimail.com
 Data Communications                     416-2157@mcimail.com
 Datateknik, Sweden                      datateknik@dt.etforlag.se
 Enterprise Systems Journal              543-3256@mcimail.com
 Home Office Computing                   hoc@aol.com
 Information Week                        informationweek@mcimail.com
 Infoworld                               letters@infoworld.com
 The Internet Business Journal           mstrange@fonorola.net
 The Internet Letter                     netweek@access.digex.net
 iX, Germany                             post@ix.de
 Journal of C Language Translation       jclt@iecc.com
 LAN Times                               538-6488@mcimail.com
 Network Computing                       network_computing@mcimail.com
 Network Management                      network@world.std.com
 PC Magazine                             157.9301@mcimail.com
 PC Week                                 557-0379@mcimail.com
 Telecommunications                      311-1693@mcimail.com
 Windows User                            75300.3513@compuserve.com

 --------------
 Ottawa Citizen (please note that all of these addresses save the last one
 are at Ottawa Freenet, which has a domain of freenet.carleton.ca; to
 reach Doug Yonson from outside the Freenet, for example, write
 af719@freenet.carleton.ca).

     af719 Doug Yonson             The Citizen's FreeNet coordinator
     ac583 Peter Calamai           Editorial Page Editor
     ae273 Johanne Vincent         Editorial Page assistant
     ae836 Tony Cote               Action Line columnist
     ah206 Alana Kainz             High technology reporter/columnist
     ac806 Deborah Richmond        High Priority editor
     ag955 Francine Dube           Social trends reporter
     af391 Peter Hum               Reporter
     ai997 Mike Shahin             Outaouais Reporter
     ae451 William Speake          Part-time reporter
     ag696 Hilary Kemsley          Years Ahead columnist (seniors issues)
     ai379 Drew Gragg              Assistant Photo Director
     af227 Jack Aubry              National Reporter (aboriginal affairs)
     ae379 Daniel Drolet           Reporter
     al715 Liisa Tuominen          Librarian
     ak570 Michael Groberman       Theatre critic
     am906 Robert Sibley           Reporter
     an643 Dave Rogers             Reporter
     ao096 Wanita Bates            Consumer, fashion reporter
     an552 Tony Lofaro             Reporter
     am100 Seymour Diener          Asst news editor, real estate columnist
     ao483 Mark Richardson         Reporter
     ap171 Karen Murphy-Mackenzie  Copy staff
     ao450 Bernard Potvin          Copy staff
     ap764 Massey Padgham          Foreign editor
     aq148 Carolyn Abraham         Police reporter
     aq438 Shelley Page            Science reporter
     Rick Laiken, 71277.3651@compuserve.com  Assistant managing editor
                                             (OCRINET contact, newsroom
                                             computer systems specialist
                                             & libel expert)


 What follows are new entries and corrections for the Media List, which is
 a listing of newspapers, radio stations, etc. that accept electronic
 submissions. This is NOT the complete list.  You can obtain the entire
 list via ftp at ftp.std.com as customers/periodicals/Middlesex-
 News/medialist. If you'd rather receive the list and updates automatically
 via e-mail, write to

     majordomo@world.std.com

 Leave the "subject:" line blank.  As your message, write:

     subscribe medialist

 To leave the list, write to majordomo@world.std.com with a message of

     unsubscribe medialist


 NOTES ON USING THIS LIST: If you want a publication to print your letter,
 include your postal address and phone number for verification purposes.
 Also, please consider NOT using this list to send a mass mailing to every
 single listed media outlet. A bicycling magazine is unlikely to be
 interested in your thoughts on abortion, no matter how cogent they are,
 for example.

 My thanks again to all who have contributed!  Comments and suggestions --
 and especially addresses of unlisted media organizations -- are most
 welcome.  Please send them to adamg@world.std.com (please note the 'g' in
 adamg; adam@world.std.com is a very nice person who has been graciously
 forwarding mis-addressed e-mail, but he is not me).

 NEWSFLASH:  The New York Times is planning a formal Internet connection,
 we read on the CARR-L mailing list, sometime this summer or early fall.
 Once in place, the domain will be nytimes.com. CARR-L is a list for
 talking about the use of computers in newsrooms and journalistic research.
 To subscribe, send e-mail to listserv@ulkyvm.bitnet.  Leave the "subject:"
line blank, and as your message, write: subscribe carr-l Your Name
(substituting, of course, your name).

 NOTE: Listings marked with an asterisk are corrections.

 DAILY NEWSPAPERS

 The Baltimore Sun
     To reach reporters or comment
     on the paper (NO letters to the
     editor or subscription requests)   baltsun@clark.net
 The Columbus (Ohio) Dispatch            crow@cd.columbus.oh.us
     Letters to the editor              letters@cd.columbus.oh.us
 Jerusalem (Israel) Post                 jpost@zeus.datasrv.co.il
 The Olympian, Olympia, Wash.            olympian@halcyon.com

 WEEKLY NEWSPAPERS

 City Sun, New York, N.Y.
      Computer column                   sysop@f618.n278.z1.fidonet.org

 COLLEGE NEWSPAPERS

 The Muse, Memorial Univ., Newfoundland  muse@morgan.ucs.mun.ca
 The Tech, MIT, Cambridge, Mass.
      Advertising                       ads@the-tech.mit.edu
      Arts                              arts@the-tech.mit.edu
      News                              news@the-tech.mit.edu
      Sports                            sports@the-tech.mit.edu
      Archive management                archive@the-tech.mit.edu
      Circulation and subscriptions     circ@the-tech.mit.edu
      Free calendar listings            news-notes@the-tech.mit.edu
      General questions                 general@the-tech.mit.edu
      Letters to the editor             letters@the-tech.mit.edu
      Photography department            photo@the-tech.mit.edu

 MAGAZINES

 *American Journalism Review
     Letters to the editors/queries
     (NO press releases)               editor@ajr.umd.edu
 Electric Shock Treatment, U.K.
 (innovative and experimental music)   bd1@mm-croy.mottmac.co.uk
 *Inside Media                          mediaseven@aol.com
 Interrace Magazine, Atlanta            73424.1014@compuserve.com

 NEWS/MEDIA SERVICES AND PRESS ASSOCIATIONS

 Conus Washington/TV Direct              conus-dc@clark.net

 RADIO AND TELEVISION NETWORKS

 CNN Global News                         cnnglobal@aol.com
 * NBC, "Dateline"                        dateline@news.nbc.com

 RADIO AND TELEVISION STATIONS

 KXTV-TV, Sacramento, Calif.             kxtv@netcom.com

 COMPUTER PUBLICATIONS

 *Network Computing                      editor@nwc.com
 *Personal Computer World                editorial@pcw.ccmail.compuserve.com
 3W  Magazine: The Internet with a
 Human Face                            3W@ukartnet.demon.co.uk
 Windows Computer Shareware              5648326@mcimail.com

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
 IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
 YOU LIVE IN TEXAS.  ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
 PRIVACY.  IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

            A TeleStrategies Event co-chaired by the
              Commercial Internet eXchange (CIX)

        TeleStrategies' Internet Conference and Expo '94
           Monday October 10 - Wednesday October 12
              Sheraton Crystal City, Arlington VA

 Conference Track (Tue October 11 - Wed October 12):Publishing,  Marketing
 and Advertising on the Internet

 Pre-Conference Tutorial (Mon October 10): Understanding Internet

 Technologies For Non-Engineers And Strategic Planners

 Demonstration Track (Mon October 10 - Wed October 12):Online Demonstrations
 Of Internet Services, Products And Access Technologies

 Workshop Track (Tue October 11 - Wed October 12):How To Do Business On The
 Internet

 Exhibitions (Mon October 10 - Wed October 12)

 CONFERENCE TRACK - Tuesday, October 11, 1994
 Publishing , Marketing and Advertising on the Internet

 8:00-9:00  Registration

 9:00-10:00 - INTERNET: THE OUTLOOK FOR
              COMMERCIALIZATION AND GROWTH

 John Curran, Product Manager, BBN Technology Services
 Bill Washburn, Executive Director, Commercial Internet Exchange (CIX)

 10:00-10:15  Coffee Break

 10:15-12:00 - NEWSPAPER AND BOOK PUBLISHING ON
               THE INTERNET
 Jeff Crigler, Director, Market Development, Network Advanced Services
 Division, IBM

 Laura Fillmore, President, Online Bookstore
 William S. Johnson, Publisher, Palo Alto Weekly

 12:00-2:00  Hosted Lunch and Exhibits

 2:00-2:45 - INTERNET USERS: WHO ARE THEY?
 Magdalena Yesil, Partner, Management Forum

 2:45-3:15 - INTERNET BILLING
 Gary Desler, Senior Vice President, Network Solutions

 3:15-3:30  Coffee Break

 3:30-5:30 - CREATING BUSINESS MODELS FOR THE INTERNET
 Gordon Cook, President, Cook Network Consultants
 Chris Locke, President, MecklerWeb Corporation
 Cathy Medich, Executive Director, CommerceNet
 Robert Raisch, President, The Internet Company

 5:30-6:30  Reception and Exhibits


 CONFERENCE TRACK - Wednesday, October 12, 1994
 Publishing , Marketing and Advertising on the Internet

 8:30-10:00 - HOW TO MARKET AND ADVERTISE EFFECTIVELY
 Andrew Frank, Director, Software Development, Ogilvy & Mather Direct
 Erica Gruen, Senior Vice President, Television, Information
 and New Media, Saatchi & Saatchi Advertising Worldwide
 Judith Axler Turner, a head of the working group on advertising for the
 Coalition for Networked Information

 10:00-10:30  Coffee Break and Exhibits

 10:30-12:00 - COPYRIGHT AND LICENSING ISSUES
 Kathlene Krag, Assistant Director, Copyright and New Technology Association
 of American Publishers, Inc.

 Steve Metalitz, Vice President and General Counsel Information
 Industry Association
 Martha Whittaker, General Manager, The UnCover Company

 12:00-12:30 - VIDEO VIA THE INTERNET
 Ed Moura, Vice President, Marketing and Sales Hybrid Networks, Inc.

 12:30-2:00  Hosted Lunch and Exhibits

 2:00-3:30 - INFORMATION SERVICES AND THE INTERNET
 Brad Templeton, President, ClariNet Communications
 Richard Vancil, Vice President, Marketing, INDIVIDUAL, Inc.
 Representative, America Online

 3:30-3:45  Coffee Break

 3:45-5:00 - INTERNET PUBLISHING AND MARKETING TOOLS
 Bruce Caslow, Systems Engineer, Mesa Technologies
 John Kolman, Vice President, NOTIS Systems, Inc.
 Kevin Oliveau, Engineer, WAIS, Inc.

 Pre-Conference Tutorial
 UNDERSTANDING INTERNET TECHNOLOGIES
 FOR NON-ENGINEERS AND STRATEGIC PLANNERS
 Monday, October 10, 1994  - 9:00 a.m. to 5:00 p.m.

 Presented By: John Curran, BBN Technology Services;
 Bruce Antleman, Information Express;
 Bruce Caslow, Mesa Technologies; and Stephen Crocker,
 Trusted Information Systems, Inc.

 This one-day tutorial is for the non-engineer, strategic planner,
 entrepreneur or anyone who has to understand the Internet in order to make
 business decisions about emerging commercial opportunities. This tutorial
 covers not only Internet technologies, economics and leading-edge
 opportunities, but also looks at operational issues such as security,
 addressing and network management from a business development perspective.

 1. INTERNET OVERVIEW: What is the Internet? Who controls it? How do you get
 connected? What can you do with it? Who pays for it? Who are the players
 domestically and internationally? What is the role of the NII and NREN? Why
 are the RBOCs, cable TV companies, IXCs and PDA vendors interested in
 Internet? Why all the attention to commercialization? How is the Internet
 likely to evolve over the next few years?

 2. INTERNET ACCESS, NAVIGATION AND APPLICATIONS:
 How to find, share and sell information on the Internet. The basic
 application tools and navigation/search systems (FTP, Telnet, Archie, Gopher,
 Mosaic, World Wide Web, WAIS, etc.). Access service providers (CIX, PSI,
 Sprint and others). Access options (dial-up, dedicated, frame relay, cable
 TV and wireless).New entrepreneurial developments.

 3. INTERNET TECHNOLOGIES: Role of TCP/IP. MAC vs. PC products. LAN access
 (SLIP, PPP, frame relay, etc.) and WAN and ATM developments. IPX, DECNET and
 APPLETALK. Leading edge vendors and where their products are headed. IP
 addressing. How to obtain addresses (Class A,B,and C). CIDR, Internet DNS and
 how to register. Setting up an E-mail server, bulletin board and directory
 service.

 4. INTERNET SECURITY AND MANAGEMENT: Security concerns, policies and
 procedures. Defeating password sniffing. Firewalls and available firewall
 toolkits. Encryption, authentication and Clipper Chip issues. Other
 operational concerns related to doing business on the Internet. Guidelines
 for managing a commercial Internet service. SNMP management tools and
 products.

 WORKSHOP TRACK - Tuesday, October 11, 1994
 HOW TO DO BUSINESS ON THE INTERNET

 9:00-10:15 - GETTING CONNECTED TO THE INTERNET
 Howard McQueen, President, CD Consultants

 10:15-10:45  Coffee Break

 10:45-12:00 - CREATING A BUSINESS PRESENCE ON THE INTERNET
 Duffy Mazan, Partner, Electric Press, Inc.

12:00-2:00 Lunch and Exhibits

 2:00-3:15 - MOSAIC
 Bruce Caslow, Systems Engineer, Mesa Technologies

 3:15-3:30  Break

 3:30-5:00 - BUSINESS USES OF THE INTERNET
 Al Dhir, President, Internet Access Group, Inc.

 5:00-6:30  Reception and Exhibits


 WORKSHOP TRACK - Wednesday, October 12, 1994
 HOW TO DO BUSINESS ON THE INTERNET

 9:00-10:15 - SECURITY: SINGLE SIGN ON
 Tom McHale, Director of Marketing and Product Development for North America,
 ICL, Inc.

 10:15-10:45  Coffee Break

 10:45-12:00 - CORPORATE AND BUSINESS TRAINING OVER THE INTERNET
 Speaker to be announced

12:00-2:00  Lunch and Exhibits

 2:00-3:15 - NETIQUETTE: HOW TO DO BUSINESS ON THE INTERNET WITHOUT GETTING
 "FLAMED" Paul Kainen, President, Kainen Technology Services

 ONLINE INTERNET DEMONSTRATION TRACK
 Monday, October 10, 1994

 2:00-5:00 p.m.
 Track A: DEMYSTIFYING THE INTERNET
 Paul Kainen, President, Kainen Technology Services

 Track B: DEMONSTRATIONS BY WAIS, Inc. and Performance Systems International

 5:00-6:30 Reception and Exhibits

 ONLINE INTERNET DEMONSTRATION TRACK
 Tuesday, October 11, 1994

 9:00 a.m.-12:00 p.m.
 Track A: DEMYSTIFYING THE INTERNET
 Bruce Caslow, Systems Engineer, Mesa Technologies

 Track B: DEMONSTRATIONS BY:Semaphore Communications - Internet security
 products -  CD Consultants

 12:00-2:00  Lunch and Exhibits

 2:00-5:00
 Track A: DEMONSTRATIONS BY Spry, Inc.  "Internet in a Box" Online Bookstore

 Track B: DEMONSTRATIONS BY MecklerWeb
 Corporation and "Palo Alto Weekly," the first general circulation newspaper
 on the Internet

 5:00-6:30  Reception and Exhibits

 ONLINE INTERNET DEMONSTRATION TRACK
 Wednesday, October 12, 1994

 9:00-12:00
 Track A: DEMONSTRATIONS BY America Online -  demo of their current
 information services and NOTIS Systems, Inc. - demo of new, easy-to-use
 publishing tool for the Internet

 Track B: DEMONSTRATION BY Hybrid Networks, Inc. and Mesa Technologies -
 MOSAIC at 56 KBPS

12:00-2:00  Lunch and Exhibits

 2:00-3:15
 Track A: DEMONSTRATION BY LEGI-SLATE

 Track B: DEMONSTRATION BY Gestalt Systems, Inc.

 CURRENT ONLINE DEMONTRATIONS
 Monday, October 10 - Wednesday, October 12

 Current Demonstrations Conducted By: WAIS, Inc.,  SemaphoreCommunications,
 CD Consultants, Spry, Inc., Online Bookstore,MecklerWeb Corporation,
 "Palo Alto Weekly," America Online, NOTIS Systems, Inc., Hybrid Networks,
 Inc.,  Mesa Technologies,Legi-Slate, Performance Systems International
 and Gestalt Systems, Inc.

 EXHIBIT HOURS
 Monday, October 10 - 5:00-6:30 p.m.
 Tuesday, October 11 - 12:00-6:30 p.m.
 Wednesday, October 12 - 10:00-2:00 p.m.

 For more information about exhibiting, call Jackie McGuigan at (703)
 734-7050.  For more information or registration call (703) 734-7050.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                         SCREAM OF CONSCIOUSNESS

 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
 =-=-=-=-=Copyright 1993,4 Wired Ventures, Ltd.  All Rights Reserved-=-=-=-=
 -=-=For complete copyright information, please see the end of this file=-=-
 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

 WIRED 1.1
 Scream of Consciousness
 ***********************

 Paglia: Brash, Self-Promoting and Possibly the next Marshall McLuhan

 Interviewed by Stewart Brand

 (Editor's note - Paglia's faxed corrections of this article became a
 critical part of the design and layout. Hence, it has lost much that
 cannot be conveyed in ASCII over the electronic BBS's or the Internet. We
 strongly suggest you refer to the original in the magazine itself for the
 complete context).

 Camille Paglia, bad girl of feminism, has a knack for outraging listeners
 one moment, and then having them nod their heads in agreement the next. In
 rapid-fire broadcast mode, Paglia jumps from Aristotle to Madonna, soap
 opera to cathedral, all in one sentence. A tape recorder has trouble
 picking out her cascading words (Paglia faxed the accompanying text
 corrections to WIRED's offices late one Saturday night) and makes
 absolutely no progress in capturing her total body animation as she acts
 out each phrase. A media creature through and through, Paglia has been
 cavorting in the limelight of network TV and sold-out lectures ever since
 her 1991 book, Sexual Personae (the first of two volumes), poked the eye
 of both conservatives and liberals. Intrigued by Paglia's intellectual
 resemblance to Marshall McLuhan - patron saint of WIRED magazine - Stewart
 Brand, the author of the Media Lab, caught up with Paglia in the court of
 a San Francisco hotel.

 BRAND: Have you mapped your success against Marshall McLuhan's? Remember
 how that happened? Here was a guy, like you he was on the fringe of
 academia, Catholic oriented, basically a literary creature. He starts
 holding forth in a epigrammatic way about culture and media, and suddenly
 AT&T and everybody else wants to talk to him. Paglia comes along, does
 what you've done...

 PAGLIA: ...Influenced by McLuhan. Neil Postman, who I had the Harper's
 magazine discussion with, said something that was very moving to me. He
 said at the end of that evening, "I was a student of Marshall McLuhan and
 I have never been with someone who reminded me more of McLuhan. When you
 were sitting with McLuhan in the middle of the night, all you would see
 was the tip of his cigar glowing, and you would hear him making these huge
 juxtapositions. Even his writing never captured the way McLuhan's mind
 worked. Your mind works exactly the same, the way you bring things
 together and they ssssizzle when you bring them together."

 BRAND: So you read McLuhan in college.

 PAGLIA: McLuhan was assigned in my classes. Everyone had a copy of his
 books. There were so many things that were happening at that moment -
 McLuhan, Norman O. Brown, Leslie Fiedler, Allen Ginsberg. There was
 enormous promise of something that was going to just blast everything open
 in cultural criticism. What the heck happened? It wasn't just a
 conservative administration in the '70s and '80s. That's not it. It was a
 failure on the part of the '60s generation itself. You feel it a little
 bit in "Blow Up," or just like reading about Jimi Hendrix and the way the
 women looked, the way the groupies looked - how fabulous the groupies
 were. They were so sexy and so ballsy! It was amazing how those '60s
 chicks talked. This was the real feminism. Even women got less powerful.
 We have had a general cultural collapse.

 BRAND: What did you make of McLuhan?

 PAGLIA: We all thought, "This is one of the great prophets of our time."
 What's happened to him? Why are these people reading Lacan or Foucault who
 have no awareness at all of mass media? Why would anyone go on about the
 school of Saussure? In none of that French crap is there any reference to
 media. Our culture is a pop culture. Americans are the ones who have to be
 interpreting the pop culture reality.

 When I was in England earlier this summer for the release of the Penguin
 paperback of Sexual Personae, I was having fits because of no TV there. I
 felt like I was in prison. Then I got to Amsterdam, and Amsterdam was
 better because they had everything on satellite. That was interesting in a
 kind of sociological way. They have German TV and Italian TV and French
 TV, but it is still not equivalent to what we have. What we have is total
 domination by the pop culture matrix, by the mass media matrix. That's the
 future of the world.

 BRAND: Is pop culture and mass media the same thing?

 PAGLIA: For me, yes. I teach a course called "Mass Media." I think that it
 should be required for every liberal arts graduate - the whole history of
 mass media, traced from the 1830s newspapers all the way to today.

 BRAND: Between Volume 1 and the forthcoming Volume 2 of Sexual Personae is
 the arrival of mass media. When you have mass media, is art different?

 PAGLIA: I call the 20th century "The Age of Hollywood." I believe that
 mass media and pop culture is the culture of the 20th century. There's a
 big break at World War II. The last great works of high art are with World
 War I. You have Picasso and T. S. Eliot, and I feel that modernism in
 literature exhausted itself in its first generation - Proust, Joyce,
 Wolfe; that was it. What else? That's why I have my provocative
 statements, such as for me the best novel after World War II is Auntie
 Mame. I mean that literally. The only writers of fiction interesting to me
 at all after World War II are decadent or comedic. These are to me the
 only modes that work literarily after World War II. So Genet and Tennessee
 Williams are major figures for me.

 My publisher is always trying to get me to read novels - Saul Bellow, A.S.
 Byatt. I say, "Why would I want to read a serious novel?" Because a
 serious novel today is already too reactionary, by trying to reinterpret
 contemporary reality in verbal terms, making a verbal structure - no, no,
 no. To me, the rhythms of our thinking in the pop culture world, the
 domination by image, the whole way the images are put together, and so on
 are way beyond the novel at this point. If a novelist does emerge now who
 is a product of pop culture and mass media, it's going to look quite
 different on the page. It won't necessarily look fragmented. I don't
 believe in that post-modernist thing of cutting things up. But the rhythms
 of it are going to be fast rhythms, and it's going to be surreal, flashing.

 In my famous encounter with Susan Sontag in 1973, I had a bitter
 disappointment when I invited her to Bennington and we tried to talk, and
 I couldn't talk to her. I had felt like "Finally, a woman on my level,"
 and her mind seemed so sloooow. It took me ten years before I realized
 what it was. She was born before World War II. There's no way her brain is
 like my brain. I suddenly realized, half my brain is different. I mean,
 half my brain is the traditional Apollonian logo-centric side which was
 trained by the rigorous public schools of that period, but the other half
 is completely an electrified brain. Essentially, what I'm doing is what
 all the '60s was doing, which was exploring the way that brain works. I
 have been exploring both sides of the brain in my work. But we need both.
 Not having both I think is a disaster for the young today because I have
 them in my classes.

 BRAND: You agree with Neil Postman's Amusing Ourselves to Death on this?

 PAGLIA: I agree with Neil Postman that we need both. We cannot have one,
 or one over the other. These young kids, they're lost.

 BRAND: If somebody's got both sides of their brain electric, what happens?

 PAGLIA: I think that they become hysterical. They become very susceptible
 to someone's ideology. The longing for something structured, something
 that gives them a world view, is so intense that whatever comes along,
 whether it's fascism or feminist ideology (which to me are inseparable),
 they'll glom onto it and they can't critique it. You see the inability of
 the young to critique this can of worms that feminism gives them -
 "patriarchy" and all this stuff - the inability to think through issues
 like date rape. I was screamed at by girls at Brown about date rape. Later
 I encountered them by chance on the streets of Philadelphia - they
 happened to be touring the country registering voters this summer - and I
 said ask me some questions. These girls were juniors at Brown and their
 minds couldn't even focus long enough for a reply. (Paglia mimics
 fluttering inarticulate interruptions.)

 They didn't have the base of education that I did, the rigorous public
 school education. The consequence is my mind can play in the realm of the
 mass media and that's my creativity as a person, the solid, rigorous
 building of the Apollonian skills on one side of the brain, and then the
 free play. To me, this is the great model of the human mind. It's
 incredible to go back and forth between those two things. This is why I
 don't need anybody in my life, because I have so much in my brain playing
 with each other. It's fantastic.

 When I was in England early in the summer, I was interviewed by some
 Cambridge women and had an incredible intellectual conversation. They were
 full of knowledge and insight. There's no TV whatever in Cambridge.

 BRAND: So all they do is Neil Postman's long cool argument.

 PAGLIA: Well, no. Actually, drinking a lot is what they seem to be doing.
 I think it must be that their extreme, extreme development of words is so
 exhausting. The amount that the educated class is drinking there, I
 couldn't believe it. I saw the public drunkenness in Cambridge of
 university men, staggering drunkenness, and I thought, that's what they
 have instead of pop culture: alcohol.

 The minute I hit London I realized no one looks at each other. I asked
 people there, "How does anyone pick up anyone, how do you ever meet
 anyone?" I was told, "The men never look at you. They respect your
 privacy." Well, OK. I was near the British Museum and we were going to a
 lecture; I needed something to eat, and walked into a pub at 4 o'clock. It
 was respectable - intellectuals and so on. The drunkenness! You could feel
 the sex was in there, in the pubs and the drinking. We've got the sex in
 our popular culture, and the feminists hate it - "sex and violence!" - but
 I think ours is far healthier.

 This is a very healthy culture as long as we keep up the rigorous
 training. The kids' true culture is pop culture - they already live in
 that - so that's why I oppose all this use of TV in school. I want
 education movie-based, in the way that we had in college. From the moment
 I arrived in college in 1964 we were immersed in films. I saw something
 like 800 films. The true multiculturism is foreign films, foreign films
 with subtitles, so you hear the language. That's the way to teach sex, the
 way to talk about male/female sex roles: movies. The way to teach what
 Lacan or Foucault claim to be doing - the relativity of a memory - is
 "Last Year in Marienbad." Did they meet at Marienbad or not? The
 inflections of emotion on people's faces, interrelations of subtleties, of
 non verbal subtleties of interpersonal sexual relations, are shown by
 cinema. Date-rape feminists want to insist, "No always means no." You'd
 never believe that if you were seeing cinema.

 When I think about it, these were mint-condition films. I realize what an
 incredible gift I had. It was a magic moment. There had been the art
 houses in the '50s in the urban centers and suddenly my generation had
 film on the college campuses in the '60s. We were seeing films - Fellini,
 Antonioni - that were five years old. We saw prints in mint condition. No
 one anywhere has that now. The quality of the prints has degenerated, and
 the films are being shown as videos. The way you develop the eye is to see
 great photography, the great high-contrast black-and-white in those films.

 Here's my proposal. A proper job for funding of the arts is to underwrite
 a national consortium of archives of all the classic films. They are too
 expensive to maintain at individual colleges and universities. What I
 envision is, when you go to any college of four years, by your fourth
 year, by rotation, a superb print of every classic film will have been
 shown. We happen to have a very bad print of "Persona" at my school. I
 have to tell the class, "Remember that scene where Bibi Andersson is
 standing, wearing a black dress against a white wall? I have to describe
 to you what Sven Nykvist photography really looked like there. It's a
 blazing white, very rock textured stucco, deep textured. The glossy sun
 glints in her blond hair..."

 This is ridiculous. Classic films are major works of art, and this is
 where the funding should go.

 BRAND: Film had that depth and that quality. Would you also have a
 television course offered?

 PAGLIA: Well, a course in mass media to introduce the student to a history
 of the technologies, the way network news is put together, how different
 our advertisements are from those in Europe, and so on.

 BRAND: What about content? You watch soap operas, right? Which ones?

 PAGLIA: "The Young and the Restless" is my favorite. For 17 years I've
 been watching that. "As the World Turns" is my second favorite. I have the
 TV on with the sound off most of the day. Not early in the morning because
 at that point I'm still dreaming. I'm waking up and I want to remember my
 dreams, so I don't want too many images at that point. By mid-morning it
 is on, on for the rest of the day until 1. I've been poor up to now, and
 my dream is to have someday a bank of TVs, where all the different
 channels could be on and I could be monitoring them. I would love that.
 The more the better. I love the tabloid stuff. The trashier the program
 is, the more I feel it's TV.

 BRAND: Why?

 PAGLIA: Because that's TV's mode. That's the Age of Hollywood. The idea of
 PBS - heavy-duty "Masterpiece Theater," Bill Moyers - I hate all that.

 BRAND: How about the ads?

 PAGLIA: I love ads. There's a section on ads in Volume 2 of Sexual
 Personae. Like Andy Warhol, I have been in love with ads since my earliest
 childhood. That is the way I think. One of the reasons that I probably got
 this famous is because I think and talk in ad terms, in sound-bite terms.
 People say, "She promotes herself." When I was young, I thought in
 newspaper headline terms: "Paglia Falls Off Chair." I feel totally a part
 of mass media. Everyone knows ads are the best part of television, but the
 way the ads work - it's also the way MTV videos work - it's just flash
 flash flash images, symbol symbol symbol. You know, the way that ads are
 structured is not unlike the way the Catholic Church was plastered with
 ads, essentially, for saint this, saint that. To me there was an absolute
 continuity between the Catholic Church and ads.

 See, this is where I drew up my theory that popular culture is the
 eruption of the varied pagan elements in Western culture - that
 Judeo-Christianity never did defeat paganism as history books claim, but
 rather it was driven underground. We've had three major eruptions of
 paganism. One at the Renaissance, and most people would accept that.
 Another was Romanticism, when the chthonic or daemonic element came up
 with all those vampires and the nature cult. And now the third great
 eruption is the 20th century Age of Hollywood. Gore Vidal agrees.
 Hollywood is the great thing that America has done and given to the world.

 BRAND: What happens to those eruptions after a while? Do they eventually
 self-defeat?

 PAGLIA: Well, no, because each one of the eruptions became part of the
 fabric of the future. The eruption of paganism at the Renaissance led
 eventually to the recovery of science, and science has been the greatest
 challenge to Judeo-Christianity. Many want to get rid of the church and
 say it is the biggest source of evil. I hate that talk. A proper society
 will strengthen all its institutions. I want to strengthen the church and
 to strengthen the sex industry. I think they play off each other. Both
 should fight with each other and be strengthened. There will always be a
 craving for religion, and if we don't get it from Catholicism, which is a
 very profound system, you're going to get it from feminist ideology.

 BRAND: Are you glad of the Latin Mass coming back?

 PAGLIA: Where is it coming back?

 BRAND: A few Catholic churches apparently are bringing back the Latin
 Mass, and the hierarchy stopped forbidding it. People like it; they like
 the mysticism.

 PAGLIA: I thought that was a tremendous loss when the church dispensed
 with all that ceremony and imagery and beauty...

 BRAND: ...Priests turning their backs on the congregation...

 PAGLIA: ...Turning their backs. The hierarchy of it, the hieraticism of
 it, that sense of the holy, the mystical, the awesome. What they've got
 now is more authentically like early Christianity. You have a bunch of
 peasants sitting together and holding hands. But what I love is what
 Martin Luther saw was bad, which was the whole pagan element of the
 Italian Catholic Church, the heir of the Roman Empire.

 BRAND: You say pop culture is the third wave of pagan and chthonic stuff.
 You say chthonic stuff is dangerous, and you ride on its danger. Is pop
 culture dangerous?

 PAGLIA: Well, if the culture becomes only that, I think it is, because
 it's filled with hallucinations. Of course that's what I love about it.
 It's surreal. But there are practical realities in everyday life that have
 to be solved - the procedures of corporate life, of academic life, all of
 the boring things that have to be done in a systematic manner, and we have
 be taught those systems. The Apollonian systems also are a heritage of the
 Greco-Roman period. The Apollonian part of the brain is absolutely
 necessary for us to exist as rational citizens. The problem with the New
 Age stuff is it's like all up here, you know (gesturing vaguely aloft). As
 for the channelers, my acting students could do better accents. Credulity
 is a product of lack of rigorous education.

 Here's what I'm saying in my work. You need to pay homage to both Apollo
 and Dionysus. Both are great gods. Both must be honored. We need a balance
 between the two. That's all.

                                    * * *

 =-=-=-=-=-=-=-=-=-=-=-=WIRED Online Copyright Notice=-=-=-=-=-=-=-=-=-=-=-=

         Copyright 1993,4 Wired Ventures, Ltd.  All rights reserved.

   This article may be redistributed provided that the article and this
   notice remain intact. This article may not under any circumstances
   be resold or redistributed for compensation of any kind without prior
   written permission from Wired Ventures, Ltd.

   If you have any questions about these terms, or would like information
   about licensing materials from WIRED Online, please contact us via
   telephone (+1 (415) 904 0660) or email (info@wired.com).

        WIRED and WIRED Online are trademarks of Wired Ventures, Ltd.

 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

                   DIGITAL CASH MINI-FAQ FOR THE LAYMAN

 By Jim Miller (Jim-Miller@suite.com)

 [If you're on the cypherpunks mailing list, you've already seen this.]

 Here's a description of digital cash that I recently wrote up.  I've
 intentionally generalized and oversimplified the descriptions to keep from
 getting bogged down in the details, but I feel the information is
 accurate.

 Q: How is digital cash possible?
 A: Public-key cryptography and digital signatures (both blind and
 non-blind signatures) make digital cash possible.  It would take too long
 to go into detail how public-key cryptography and digital signatures work.
 But the basic gist is that banks and customers would have public-key
 encryption keys.  Public-key encryption keys come in pairs.  A private key
 known only to the owner, and a public key, made available to everyone.
 Whatever the private key encrypts, the public key can decrypt, and vice
 verse.  Banks and customers use their keys to encrypt (for security) and
 sign (for identification) blocks of digital data that represent money
 orders.  A bank "signs" money orders using its private key and customers
 and merchants verify the signed money orders using the bank's widely
 published public key.  Customers sign deposits and withdraws using their
 private key and the bank uses the customer's public key to verify the
 signed withdraws and deposits.

 Q: Are there different kinds of digital cash?
 A: Yes.  In general, there are two distinct types of digital cash:
 identified digital cash and anonymous digital cash.  Identified digital
 cash contains information revealing the identity of the person who
 originally withdrew the money from the bank.  Also, in much the same
 manner as credit cards, identified digital cash enables the bank to track
 the money as it moves through the economy.  Anonymous digital cash works
 just like real paper cash.  Once anonymous digital cash is withdrawn from
 an account, it can be spent or given away without leaving a transaction
 trail.  You create anonymous digital cash by using numbered bank accounts
 and blind signatures rather than fully identified accounts and non-blind
 signatures.

 [To better understand blind signatures and their use with digital cash, I
 highly recommend skimming through chapters 1 - 6 of Bruce Schneier's book
 _Applied Cryptography_ (available at your favorite technical book store).
 Bruce does a very good job of describing the wide variety of interesting
 things you can do when you combine computers, networks, and cryptography.
 The first half-dozen chapters are quite readable, even to the layman.  He
 doesn't get into the heavy-duty math until later in the book.]

 There are two varieties of each type of digital cash: online digital cash
 and offline digital cash.  Online means you need to interact with a bank
 (via modem or network) to conduct a transaction with a third party.
 Offline means you can conduct a transaction without having to directly
 involve a bank.  Offline anonymous digital cash is the most complex form
 of digital cash because of the double-spending problem.

 Q: What is the double-spending problem?
 A: Since digital cash is just a bunch of bits, a piece of digital cash is
 very easy to duplicate.  Since the copy is indistinguishable from the
 original you might think that counterfeiting would be impossible to
 detect.  A trivial digital cash system would allow me to copy of a piece
 of digital cash and spend both copies.  I could become a millionaire in a
 matter of a few minutes.  Obviously, real digital cash systems must be
 able to prevent or detect double spending.

 Online digital cash systems prevent double spending by requiring merchants
 to contact the bank's computer with every sale.  The bank computer
 maintains a database of all the spent pieces of digital cash and can
 easily indicate to the merchant if a given piece of digital cash is still
 spendable.  If the bank computer says the digital cash has already been
 spent, the merchant refuses the sale.  This is very similar to the way
 merchants currently verify credit cards at the point of sale.

 Offline digital cash systems detect double spending in a couple of
 different ways.  One way is to create a special smart card containing a
 tamper-proof chip called an "Observer" (in some systems).  The Observer
 chip keeps a mini database of all the pieces of digital cash spent by that
 smart card.  If the owner of the smart card attempts to copy some digital
 cash and spend it twice, the imbedded Observer chip would detect the
 attempt and would not allow the transaction.  Since the Observer chip is
 tamper-proof, the owner cannot erase the mini-database without permanently
 damaging the smart card.

 The other way offline digital cash systems handle double spending is to
 structure the digital cash and cryptographic protocols so the identity of
 the double spender is known by the time the piece of digital cash makes it
 way back to the bank.  If users of the offline digital cash know they will
 get caught, the incidents of double spending will be minimized (in
 theory).  The advantage of these kinds of offline systems is that they
 don't require special tamper-proof chips.   The entire system can be
 written in software and can run on ordinary PCs or cheap smart cards.

 It is easy to construct this kind of offline system for identified digital
 cash.  Identified offline digital cash systems can accumulate the complete
 path the digital cash made through the economy.  The identified digital
 cash "grows" each time it is spent.  The particulars of each transaction
 are appended to the piece of digital cash and travel with it as it moves
 from person to person, merchant to vender.  When the cash is finally
 deposited, the bank checks its database to see if the piece of digital
 cash was double spent.  If the digital cash was copied and spent more than
 once, it will eventually appear twice in the "spent" database.  The bank
 uses the transaction trails to identify the double spender.

 Offline anonymous digital cash (sans Observer chip) also grows with each
 transaction, but the information that is accumulated is of a different
 nature.  The result is the same however.  When the anonymous digital cash
 reaches the bank, the bank will be able to examine it's database and
 determine if the digital cash was double spent.  The information
 accumulated along the way will identify the double spender.

 The big difference between offline anonymous digital cash and offline
 identified digital cash is that the information accumulated with anonymous
 digital cash will only reveal the identity of the spender if the cash is
 double spent.  If the anonymous digital cash is not double spent, the bank
 can not determine the identity of the original spender nor can it
 reconstruct the path the cash took through the economy.

 With identified digital cash, both offline or online, the bank can always
 reconstruct the path the cash took through the economy.  The bank will
 know what everyone bought, where they bought it, when they bought it, and
 how much they paid.  And what the bank knows, the IRS knows.

 By the way, did you declare that $20 bill your Grandmother gave you for
 your birthday?  You didn't?  Well, you wont have to worry about forgetting
 those sorts of things when everybody is using fully identified digital
 cash.  As a matter of fact, you wont even have to worry about filing a tax
 return.  The IRS will just send you a bill.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

           PATENT SEARCHING EMAIL SERVER is now open for business

 By Gregory Aharonian (srctran@world.std.com)


    APS PATENT SEARCHING ARRIVES ON THE INTERNET!!!!!!!!!!!!!!!!
    (well only in a real limited way for the time being :-)

 A few weeks ago, I announced plans to provide limited patent searching
 over the Internet, where you can get a list of patents by specifying the
 class/subclass.

 I have decided to do this in two stages.  To test out the email-server
 software I am writing, I first plan to allow email requests to retreive parts
 of the PTO classification manuals (see below).  Once things are running
 smoothly, I will then add the capability to retrieve patent titles by
 class/subclass.

 So feel free to start sending in requests to the address listed below:

 search@world.std.com

 wish me luck, and start thinking philanthropic.  By the way, if someone has a
 machine readable version of the WIPO international classification system,
 please send it to me so I can add it to the server.  At some point when I
 have lots of equipment, I will sort US patents by their international
 classification.

 Greg Aharonian
 Internet Patent News Service

                              ====================

                          Internet Patent News Service
                                 September 1994

                           PATENT TITLES EMAIL SERVER
                              search@world.std.com

 The Internet Patent News Service is pleased to announced the availability
 of the Patent Titles email server, where people can retrieve lists of patent
 titles dating back to 1970 for any USPTO class/subclass, and patent numbers
 for additional patents dating back to the 1800's.  The Patent Titles email
 server is the first step in our efforts to make the entire USPTO APS patent
 text database system accessible over the Internet.

 Approximately one gigabyte of data has been prepared and attached to the
 Internet.  As all of the equipment and network access is borrowed, I am
 limiting access to an email server until I get a better feel for demand for
 the data, and until I can raise funding to set up a proper Internet server.

 Unless the bandwidth and processing load overwhelms the equipment I am
 borrowing, the service will be free.

 To use the email server, send requests to the Internet address:

 search@world.std.com

 using any of the following commands sent as text in the body of the email
 message:

 SENDTO  account-name@internet.site.adr

 This command is mandatory of all requests and is where you specify the email
 address you want the information sent to. Occasionally From: lines in email
 addresses do not provide a correct return address (at least in my experience
 doing the Internet Patent News Service).

 SEND INTRO
 SEND HELP

 Either of these commands will return this message.

 SEND UCLASSES

 This command will return an index to the approximately 400 patent classes
 that are currently being used, for example:
 Class: 69     Leather Manufacturers

 SEND UCLASS XXX

 This command will return that section of the USPTO's Manual of Classification
 covering patent class XXX.  For example, the command "SEND CLASS 69" would
 return a list of all of the subclasses in Class 69 by number and title.
 These files range in size from 5K to 120K.  What follows is a section
 of Class 69:

  Subclass  Subclass
  Number    Title
  1       MACHINES
  1.5     .Belt-stretching
  3       .Horse collar shaping
  4       .Horse collar stuffing

 SEND UCLASS COMPUTING

 This command will return those sections of the USPTO's Manual of
 Classification covering patent classes 395 and 364, the two main classes
 dealing with hardware and software.

 SEND IPNSINFO

 This command will return an introductory message to my Internet Patent News
 Service.

 SEND CONSULT

 This command will return an introductory message to my patent searching
 consulting services I offer.

 SAVE COMMENT

 This command lets me know your request is actually a comment about the email
 server operation, or any inaccuracies you detect in the patent information
 being sent out.

 As I am parasiting the equipment to run the server (which basically means
 that I operate the server at nite and on weekends), please send your requests
 in at the end of the workday or on weekends.  Within a day or so, you will
 receive back ny email whatever you requested.

 SECURITY
 A very important concern for anyone using this email server is secrecy,
 that what they are searching for is not revealed to others. As a potential
 inventor, I appreciate this as much as anyone else.  While I plan to save the
 email addresses of people who use the server (but not their search request),
 no other information will be retained.  The email address information will be
 saved to study who, and how often, people are using the server.  I would
 appreciate any suggestions on how to ensure security beyond this.

 Please excuse any mishaps that occur as I get this service off the ground.
 This email server is a classic hack that will get better in time as people
 use it.  In turn, the experience gathered in running the server will be
 invaluable in demonstrating the feasibility of making massive amounts of
 patent data available over the Internet.

 Also, get ready for that voluntary registration fee I mention in my intro
 piece to the Internet Patent News Service.  If the Patent Titles email server
 is successful, and you all like it, this fall I plan to coordinate an effort
 to put all of the patent abstract information since 1970 onto the Internet,
 making it available through email servers, Gopher, WAIS and Mosaic. But first
 things first, getting the Patent Titles email server working.

Greg Aharonian
Internet Patent News Service

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

            Five "Hackers" Indicted for Credit Card/Computer Fraud

 From CuD Moderators <cudigest@mindvox.phantom.com>
 Computer Underground Digest

 (AP WIRE - Thurs, Sept. 8, 1994)

     NEW ORLEANS (AP) -- "Dr. Demonicus," "Renegade" and four other
hackers used computers to steal credit card numbers and used them to
buy $210,000 in gold coins and high-tech hardware, federal prosecutors
said Wednesday (Sept 8, '94).

The nine-count indictment unsealed Wednesday charged five men from
Louisana and one from New York with conspiracy, computer fraud, access
device fraud and wire fraud, U.S. Attorney Eddie Jordan Jr. said.

Some fo their hacker nicknames were included. They were identified as
Dwayne "Dr. Demonicus" Comeger, 22; Brian Ursin, 21; John Christopher
"Renegade" Montegut, 24; Timothy "Revelation" Thompson, 21; James
McGee, 25; and Raymone "Wiseguy" Savage, 25, of Richmond Hills, N.Y.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                              CLIPPER T-SHIRTS

 By Norman Harman (normh@crl.com)

 Information and opposition to the Clipper proposal is strong on the
 Internet.  But it is far too unknown to the 'outside' community.  Everyone
 concerned by this issue should inform all the people they know of its
 implications.  One way to increase awareness and show your opinion is to
 wear it:).

 I would like to offer an anti Clipper/Skipjack T-shirt.  They would be white
 with black printing and cost approximately $5.00 plus $2.90 shipping to US
 locations. That is the cost to produce one shirt.  I am trying to spread
 awareness not make money.

 I need to know if people are interested in this idea and what should the
 shirts say?

 Two quick ideas are:
    "Skip Skipjack"
    or
    "Just Say No to Clipper"

 Please send comments, suggestions, and questions to normh@crl.com.  If more
 than a few people are interested I will go ahead and have the shirts made
 and post how to get one.

 A worthy cause is better if it benefits another good cause so the shirts
 will be silk-screened by Zerolith, part of a non-profit organization that
 employs, shelters, and assists homeless youth.  If you would like to talk
 with Zerolith or donate money directly here is how to contact them.

         Zerolith
         3075 21st Street
         San Francisco, CA 94110-2626
         415.641.1014 voice
         415.641.1474 fax

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                            CYBERNEWS DEBUTS

 By Patrick Grote (patrick.grote@supportu.com)

                         *** PRESS RELEASE ***

 CyberNews
 11221 Manchester Rd., Suite 313, St. Louis, MO 63122
 Contact:    Patrick Grote, patrick.grote@supportu.com
 Phone:      (314) 984-9691
 FAX:        (314) 984-9981

 FOR IMMEDIATE RELEASE

       CyberNews, A Monthly Publication,  Debuts With A Stunning
                    Success for Readers/Advertisers

 St. Louis, MO, September 8 _ CyberNews, a new monthly electronic
 publication, debuted today featuring over 25 hard hitting, real world
 software reviews, a tell all interview with shareware king Scott Miller
 of Apogee Software, the people that brought the world Castle Wolfenstein
 and a feature by the leaders in the Work at Home field, Paul and Sarah
 Edwards.

 CyberNews is unique in electronic publications, commonly referred to
 as zines, due to the fact they are advertiser supported and 85% of the
 information is generated from everyday people. "Too many reviews today
 are done to please the advertiser. Heck, most of the traditional press
 basically reprint press releases. People need to know what
 software/hardware works and what problems may crop up. Unbiased reviews
 are what we strive for," detailed Patrick Grote, Publisher, Marketing.

 Available in three formats, CyberNews is readable by anyone. A
 Windows Help file format supports a color graphical excursion that
 anyone with Windows, Windows for Workgroups or WindowsNT can view. "We
 wanted to bring the electronic publication into a new era of color and
 production," notes Roger Klein, Publisher, Production.

 The ASCII version features the ability to be enjoyed by anyone with
 a  PC, dumb terminal or device that has the ability to read standard
 ASCII text. According to Patrick Grote, Publisher, Marketing, "the goal
 was to make CyberNews as Internet friendly as possible. Since we use
 straight ASCII everyone who can access the Internet can read our
 publication."

    The ReadRoom format allows Sysops to add CyberNews to their BBS
 quickly without having to run a conversion program. "Sysops are the
 backbone of the information superhighway. They are engineer, designer,
 construction worker and user wrapped into one. We realized we can't
 ignore their needs," explained Publisher, Marketing, Patrick Grote.

        To grab latest issue of CyberNews, you can check these sources:

 Internet:   wuarchive.wustl.edu:/pub/MSDOS_UPLOADS/zines
             polecat.law.indiana.edu:/pub/Incoming
             ftp.fonorola.net:/in.coming

 CompuServe: Work at Home (GO WORK in GENERAL LIBRARY), IBM APP
   (GO IBMAPP in ELECTRONIC PUBLICATIONS LIBRARY),
   Novell User (GO NOVUSER in NEW UPLOADS LIBRARY),
   International Trade Forum (GO TRADE in Section 1).

 FidoNet:       You can freq the files 1:100/380:
 CYBER  - All three versions
 CYBERR - The ReadRoom version.
 CYBERA - The ASCII version.
 CYBERW - The Windows version.

 Delphi: PCSIG

 America Online: Computing and Software

 Email: Send requests or questions to subscribe@supportu.com

 PG - Publisher, CyberNews, patrick.grote@supportu.com
 A Publication on the Leading Edge - 09/13/94

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

         PC MAGAZINE DECARES THE PIPELINE BEST INTERNET SERVICE

 By James Gleick (gleick@pipeline.com)

 We at the Pipeline are very pleased to announce that the editors of PC
 Magazine, comparing all the major Internet service providers from America
 Online and Delphi down to the Pipeline, have declared that our young
 service is the best choice.

 We have a lot of room for improvement, we know, but coming in our first
 year, this is gratifying.

 "A true beauty queen," Robin Raskin, PC Magazine's editor, writes in the
 October 11 issue. "The Pipeline is an elegantly conceived program; we've
 seldom seen a Version 1.x program that's as well thought out. Watch as the
 Pipeline continues to grow; the Internet will be a better place because of
 this package."

 We hope so. Anyway, we'd like to take the opportunity to offer Internet
 users (or would-be Internet users) a free copy of our software, to try
 out in demo mode. It's available for Windows or Macintosh. Send your
 address to windisk@pipeline.com or macdisk@pipeline.com. For general
 information, you may send email to info@pipeline.com.

 James Gleick
 The Pipeline

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

              SCOUT REPORT SUBSCRIPTIONS EXCEED 10,000 MARK

 From InterNIC Info Scout (scout@is.internic.net)

 To all InterNauts:

 Subscriptions for the Scout Report have exceeded 10,000!

 And 10,000 InterNauts can't be wrong!

 To celebrate this milestone, this week's Scout Report will be a double
 issue and include many resources you may have missed during the recent
 end-of-summer weeks.  It's now Fall, so clean out those electronic
 closets and make room for some new 'Net resources ready for exploration!
 The September 16 issue will also include an expanded NetBytes section to
 accommodate a large number of recently released sources of information
 about using the Internet.

 If you haven't yet subscribed or told your friends and colleagues, now is
 the time. Spread the news by word-of-net.  Below are instructions for
 subscribing or receiving a copy of this week's issue by email, gopher, and
 WWW.

 The Scout Report is a weekly publication provided by InterNIC Information
 Services to assist InterNauts in their ongoing quest to know what's new
 on and about the Internet. It focuses on those resources thought to be of
 interest to the InterNIC's primary audience, researchers and educators,
 however everyone is welcome to subscribe and there are no associated
 fees.

 The Scout Report is posted on the InterNIC InfoGuide's gopher and
 WorldWideWeb servers where you can easily follow links to the resources
 which interest you. Past issues are stored on the InfoGuide for quick
 reference, and you can search the InfoGuide contents to find the specific
 references you need.  The Scout Report is also distributed in an HTML
 version for use on your own host, providing fast local access for yourself
 and other users at your site.

 Join thousands of your colleagues already using the Scout Report as a
 painless tool for tracking what's new on the 'Net!

 Best regards,
 InterNIC Info Scout

 Scout Report Contents

 Subject-oriented online resources are organized by access method:

 *  WWW
 *  Gopher
 *  Email/FTP

 Resources and announcements related to the network are included in:

 *  National Information Infrastructure
 *  NetBytes

 Recreational resources for perusing after hours (of course) are listed
 here:

 *  Weekend Scouting

 *** New section coming the week of September 23 -- a place for selected
 interesting services on the 'Net which are fee based, provided by
 commercial organizations, or best of all, offer virtual shopping:

 Commercial Services



 Scout Report Access Methods
 ------------------------------

 ** To receive the special double-issue of the Scout Report by email
 (gopher and WWW access methods are listed below) send mail after
 September 16 to:

 mailserv@is.internic.net
 and in the body of the message type:
 send /scout-report/9-16-94

 **  To receive the email version of the Scout Report automatically each
 weekend, subscribe to the scout-report mailing list which is used
 exclusively for one Scout Report message each week:

 send mail to:

 majordomo@is.internic.net

 in the body of the message, type:

 subscribe scout-report

 to unsubscribe to the list, repeat this procedure substituting the word
 "unsubscribe" for subscribe.


 **  To receive the Scout Report in HTML format for local posting,
 subscribe to the scout-report-html mailing list, used exclusively to
 distribute the Scout Report in HTML format once a week. Send mail to:

 majordomo@is.internic.net

 in the body of the message, type:

 subscribe scout-report-html


 **  To access the hypertext version of the Report, point your WWW client
 to:

 http://www.internic.net/infoguide.html


 >> Gopher users can tunnel to:

 is.internic.net

 select:  Information Services/Scout Report.




 *----------------------------------------------------------------
 Copyright 1994 General Atomics.

 The InterNIC provides information about the Internet and the resources on
 the Internet to the US research and education community under the
 National Science Foundation Cooperative Agreement No. NCR-9218749. The
 Government has certain rights in this material.

 Any opinions, findings, and conclusions or recommendations expressed in
 this publication are those of the author(s) and do not necessarily
 reflect the views of the National Science Foundation, General Atomics,
 AT&T, or Network Solutions, Inc.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

          IMPORTANT PROCLAMATION: THE FUTURE OF THE NET IS AT HAND!

 By James "Kibo" Parry (kibo@world.std.com)

 P R O C L A M A T I O N   &   M A N I F E S T O
 ***********************************************

 WHEREAS, the computer network named USENET has insurmountable flaws:

 => It is cluttered with thousands of disorganized groups.
 => It is difficult to use due to the various software interfaces.
 => It is infected with viruses, especially in the .signatures.
 => There is no formal rulebook and no official administration.
 => Bozos abound.
 => Power-crazed maniacs frequently try to manipulate Usenet at their whim.

 These problems are most important.  THEREFORE, in an official and secret
 democratic vote, Kibo has been duly elected LEADER OF THE NET.  To correct
 this heinous situation, LEADER KIBO has decided to take bold measures,
 a brave new initiative, detailed herein.

 WAKE UP, IT'S 1994!  THE FUTURE WILL NOT WAIT FOR A VOTE!

 Here is what Leader Kibo has decided--what MUST be done--what WILL be done:

 PHASE ONE.  GLOBAL RMGROUPS FOR ALL USENET GROUPS WILL BE
             ISSUED ON 4/15/94, 06:00 GMT.

 A Day Without Usenet shall pass, and it will be a time of rest for
 government employees.  Many will discover life, or at least television.
 Desperate soc.singles readers will have nervous breakdowns.  ClariNet
 will go bankrupt.  UUNET's modems will cool off.  The world
 will rotate a full three hundred sixty degrees just the same.

 Every Usenet group, and all its associated problems, will have been
 wiped off the face of the Earth forever by the might of the rmgroup.
 Of course, to prevent any power-crazed maniacs from putting the
 groups back, the newsgroup `control' will be rmgrouped FIRST.  Thus,
 the situation will be permanent.  Nobody will undo the Pax Kibotica!

 PHASE TWO.  NEWGROUPS FOR THE GROUPS IN THE NEW HIERARCHY WILL
             BE ISSUED ON 4/16/43, 06:00 GMT.

 The new network shall be named HAPPYNET, as it will be a Better Place.
 Usenet is dead.  Long live HappyNet!

 ********* HAPPYNET: THE NET THAT'S HAPPIER THAN YOU! *********

 UNDER THE AUSPICES OF THE ALL-WISE LEADER KIBO,
 THE NEW NETWORK SHALL BE ORGANIZED THUSLY:

 Three hierarchies encompassing ALL HUMAN DISCOURSE:

 =>  nonbozo.*

 =>  bozo.*

 =>  megabozo.*

 All topics discussed on Usenet, and even deeper topics which COULD
 be discussed on Usenet but AREN'T, will fit nicely in those three--
 NO EXCEPTIONS.  Extensive time and motion studies have been
 performed in the name of efficiency to maximize your pleasure!
 Existing groups will be moved into the new organization
 scheme, resulting in nonbozo.news.announce.newusers, bozo.rec.pets,
 megabozo.talk.bizarre, nonbozo.comp.virus, bozo.alt.sex,
 megabozo.alt.fan.lemurs, bozo.postmodern, megabozo.org.mensa,
 nonbozo.clari.news.urgent, megabozo.megabozo.megabozo.religion.kibology,
 etc., as determined by scientific measurements of the bozosity of the
 groups, measured by Leader Kibo's Council On Scientific Bozosity and the
 faculty of Rensselaer Polytechnic Institute (Troy, NY), world leaders in
 bozosity assessment.  These truly scientific procedures were developed
 and pre-tested by Drs. Todd M. McComb and Tim Gallagher and are patented
 to prove that they are good!

 It is estimated that the statistical breakdown of HappyNet will be thus:

  1.0000%  nonbozo.*
 90.0000%  bozo.*
  9.0000%  megabozo.*     (Computations courtesy of Bell Labs)

 Bozo.* will, of course, be subdivided logically:  bozo.nerd.*, bozo.tv.*,
 bozo.inane.*, bozo.boring.*, bozo.sex.*, bozo.argue.*.

 New groups will also be added for MAXIMUM ENJOYMENT.  The network would
 be a very unfair place if only Leader Kibo were allowed to propose new
 groups.  Instead, because Leader Kibo is benevolent and omnisagaciously
 father-like, he will create WHATEVER GROUP YOU WANT (even, say,
 megabozo.kibo.is.a.blenny!) provided that (a) you follow the Official
 Procedure, filing all five copies of your request in triplicate and then
 making seven carbons of each, and (b) you pay Leader Kibo $160 for each
 letter in the new group's name, and $720 for each period.  UNLIKE SOMEARCHAIC SYSTEMS, VOWELS DO NOT COST EXTRA.  PAT SAJAK IS EVIL!

 Of course, thanks to Leader Kibo's awesome foresight, new groups will
 probably not be needed.  A simple computer program will generate all
 groupnames from *.aaaaa.aaaaa.aaaaa.aaaaa to *.zzzzz.zzzzz.zzzzz.zzzzz.
 This will encompass ALL possibilities in a COMPLETELY LOGICAL FASHION,
 maximally efficient yet FUN!  Prudence and foresight by LEADER KIBO!

 There will even be a .d group for every regular group.  In fact,
 the .d groups will even have their own .d.d groups for metadiscussion
 of whether or not the new .d.d.d and .d.d.d.d groups are needed at all!

 The wealth of new groups will also cut down on those annoying egomaniacal
 posters who try to post the same article to EVERY group, because it will
 become physically impossible to post to ALL groups within a MORTAL LIFETIME!

 But wait, there's more--over six billion groups MORE will be added at
 HappyNet's inception--free of charge!

 ********* HAPPYNET: EVERYONE IS EQUALLY EQUAL! *********

 To promote EQUALITY and POLITICAL CORRECTNESS (the good kind), Leader
 Kibo has decided to correct the inequality of the distribution of
 "personal" groups.  Some people, or groups of people, currently are
 popular enough to have groups named in their honor: alt.weemba,
 alt.fan.john-palmer, alt.fan.monty-python, alt.fan.dave-barry,
 alt.fan.mike-jittlov, alt.fan.naked-guy, alt.religion.kibology,
 alt.fan.alok-vijayvargia, alt.fan.harry-mandel.  Because everyone is
 equal before the eyes of wise Leader Kibo, it was decided that EVERYONE
 WILL HAVE THEIR OWN GROUP on HappyNet.  This will celebrate the
 global diversity of our users, demonstrating for once and for all
 that they are all unique, but unique in exactly the same way!

 A scientific questionnaire developed specifically for the purpose will be
 mailed to everyone on the planet.  It will read:

   Dear Citizen Of The New Network,

   You are being given your own HappyNet group.  Its placement
   will depend on your answer to this simple question.

   ARE YOU A BOZO? (CHECK EXACTLY ONE)    [] YES   [] NO

                                  I care,
                                  Leader Kibo

 People who answer "yes" will be given groups in bozo.personal.*, and
 people who answer "no" will be given groups in megabozo.personal.*.
 People who refuse to answer, or show contempt for the process, will be
 taken (by the Network Security Patrol Force) to the Citadel Of Judgment
 to appear before the Council Of Bozosity, who will examine the person and
 assign them either bozo.weenie.* or megabozo.weenie.*.

 Of course, this would be POINTLESS if anyone in the world were DENIED
 ACCESS to HappyNet.

 ********* HAPPYNET: A NET IN EVERY POT! *********

 Net access will be provided to EVERY SINGLE PERSON, LIVING, UNBORN, OR
 DEAD, thanks to the new TELESCREENS which will be installed in every room
 of every building on the planet.  Not only will this encourage higher net
 communications volume, it will also help Leader Kibo be a good leader, as
 it will allow Leader Kibo to instantly broadcast to all his subjects, and
 to see how they are feeling and what they are doing.

 But simple TELESCREENS in LIVING ROOMS, BEDROOMS, and BATHROOMS are
 not enough to ensure FREEDOM and EQUALITY.  Neural transceivers will
 be implanted, FREE, at BIRTH in all newborns, allowing them to "jack in"
 to HappyNet, transmitting articles, sounds, and even GIF files at
 the speed of thought!  They won't even have to worry about spelling--
 they'll just THINK and their EVERY THOUGHT will be broadcast into
 EVERYONE ELSE'S HEADS!

 And because Leader Kibo CARES and values YOUR opinion, this will even
 allow Leader Kibo to know what his subjects are THINKING, thanks to the
 heroic actions of the NETWORK SECURITY PATROL FORCE.

 ********* HAPPYNET: WE KNOW WHAT YOU'RE THINKING *********

 The Network Security Patrol Force, or NSPF, will be composed of volunteer
 system administrators who wish to enforce the continued accuracy,
 relevance, and acceptability of HappyNet postings.  They will monitor,
 censor, and cancel bad postings, made by EVIL SUBVERSIVES who attempt to
 DEPRIVE you of your HAPPINESS.  These SUPPRESSIVE PERSONS will be
 hunted down and suppressed!

 NSPF officers have really spiffy uniforms, especially the shiny gas masks,
 well-balanced batons, six-inch-thick shoulder pads and twelve-inch cleats.

 And, of course, they will punish evildoers, night or day.  HappyNet
 never sleeps.

 ******* HAPPYNET: SLEEP TIGHT WITH ALL THE SECURITY IN THE WORLD! *********

 But what of those EVIL organizations that simply want to SPY on you?  Well,
 the NSPF won't have to even TRY to prevent that, because the LOGICAL PLAN
 of HAPPYNET will defeat that automatically!  If some three-letter government
 agency wants to SCAN all articles for WORDS LIKE "NUCLEAR BOMB" or
 "WHITEWATER", it will be IMPOSSIBLE because not even the fastest
 computer in the WORLD--the CRAY-9000--could search ALL THOSE GROUPS, EVER!!!

 ********* HAPPYNET: ACCURACY IS EVERYTHING ON HAPPYNET! *********

 Here are examples of infractions against the unwritten rules of HappyNet,
 and the punishments the NSPF will bring against the villains.


 .signature longer than four lines: Forced to read "War And Peace" at 110
 baud.

 .signature has giant ASCII graphic: Forced to read "War And Peace" at 110
 baud on a Braille terminal after having fingers rubbed with sandpaper.

 Posting an article consisting solely of "Me too!": Poster's legal name is
 officially changed to "Me Too".

 Calling a newsgroup a "bboard" or "notesfile": Forced to memorize
 Webster's Ninth.

 Spelling "too" as "to", "it's" as "its", "lose" as "loose", "you're"
 as "your", or any of the following--"wierd", "Anti-Semetic", "senerio",
 or "masterbation": Forced to write out Webster's Ninth ten times.

 Asking what ":-)" means: Drawing, quartering, and turning sideways.

 Using "<g>" instead of ":-)": being sent back to GEnie, AOL, Delphi, etc.

 Sending a newgroup message without permission of Leader Kibo: Poster is
 forced to adopt twelve wacky sitcom children.

 Posting flames outside of a *.flame group: Poster is allowed to read only
 groups about fluffy puppies.

 Posting "Please send e-mail, since I don't read this group": Poster is
 rendered illiterate by a simple trepanation.

 *Plonk*ing outside talk.bizarre: Poster is *plonked*--LITERALLY.

 Asking for people to send cards to Craig Shergold:  Poster must answer
 all of Craig's mail.

 Posting the "Dave Rhodes: MAKE MONEY FAST" scam:  Poster must answer all
 of Craig's and Dave's mail while also memorizing the script to every
 episode of "Knight Rider" and doing voice exercises like saying
 "NANCY, HAND THE MAN THE DANDY CANDY" ten million times and also
 being forced to eat cottage cheese we found piled up on the sidewalk.

 Posting to aus.* from the USA: Poster is deported to Australia after having
 a "Kick Me, Mate" sign glued to their forehead.

 Posting an article with a malformed address so that mail bounces when
 people reply: Poster and/or their admin are sent back to kindergarten.

 .signature huge script letters: Poster is forced to tattoo HappyNet
 slogans on their body in huge script letters.

 Excess CAPITALIZATION & PUNCTUATION!!!!!!!!!!!!!: Poster is issued a new
 keyboard without capitals or punctuation.  The space bar will be clearly
 labelled.

 *Excess*asterisks*in*.signature*: Poster is hit with one shuriken for
 each asterisk.

 Articles quoted in followup, but no new semantic content appended: Poster
 is forced to watch a "Small Wonder" marathon on cable TV.

 Advertising on the net: Poster is forced to pay Leader Kibo for the
 advertising time.

 Asking help for some program but not saying what sort of computer you're
 using: Poster's computer is reduced to 1K RAM.

 Arguing over whose computer is better: Being introduced to Leader Kibo,
 whose custom Turbissimo MoNDO Zeugma 6866688786/XA/sxe/IV computer is far
 better than theirs and will make them cry in humiliation.

 Giving away the secret of "The Crying Game": No punishment.

 Making fools of people in rec.org.mensa with pranks: No punishment
 necessary for something that simple.  After all, some people could
 even do it by accident.

 Referring to the NSPF as "The Thought Police": Execution.

 Humor impairment: Execution.

 Saying "Imminent death of the net predicted!": Imminent execution of
 poster predicted.

 Mentioning Star Trek outside of the Star Trek groups: "Star Trek:
 Deep Space Nine" is cancelled, and all tapes of the original series are
 burned.  William Shatner will direct all future movies.


 There are other helpful rules and regulations, but they are double secret.

 Of course, various branches of the NSPF will specialize in various
 enforcements: the Spelling Squad, the Grammar Goons, the Definition
 Draconians, the Typo Tyrants, the Capitalization Captains, the Pedantic
 Patriots, the Cross-Post Crushers, the Cascade Commandos, and
 the .signature .specialforce.  There will even be a special detail to
 track down, and burn, copies of the Green Golfball Joke.

 ********* HAPPYNET: MODERATION IN ALL THINGS! *********

 The concept of moderated groups will be retained for a few groups,
 with minor changes.

 Alt.flame (renamed megabozo.alt.flame) will be moderated by Dave Lawrence,
 as his news.announce.newgroups duties have been assumed by Leader Kibo.
 Dick Depew will be assigned the task of making up an imaginative
 Message-ID for every article in the world.  (He will also unleash random
 daemons onto the net to destroy the unpleasant signal to noise ratio
 completely.)

 A program that determines how funny an article is by measuring the
 frequency of the "k" sound (an elementary comedic principle discovered in
 Kukamonga, Arkansas) will replace rec.humor.funny moderator Maddi Hausmann,
 allowing her to devote full time to assisting Brad Templeton's
 nonbozo.clarinet.* duties.

 Serdar Argic will be the official underliner of HappyNet.  Every time
 the word "turkey" is mentioned, he will post a followup underlining and
 circling it.  This will be a tremendous help to people looking for
 low-fat recipes.

 Jay O'Connell has volunteered to personally deliver an envelope labelled
 THESE ARE ALL THE TOPLESS PICTURES OF MARINA SIRTIS THERE ARE to all
 users to prevent them from asking for them over and over.  This should
 reduce the bandwidth by an estimated 90%.

 Iain Sinclair will ensure that the link between Australia and the rest of
 the world is down on a regular schedule, instead of an irregular one.
 He has also been commissioned to design the NSPF uniforms, with the
 blessings of the Florida Citrus Council and the California Leather Council.

 And, of course, a world-class anonymous-posting server will be
 established.  Not only will it remove your name from your postings (so
 that you don't have to worry about defending your opinions) but it will
 also eliminate the opinions themselves.  Thus, don't be surprised to see
 a lot of anonymous postings in bozo.alt.sex.stories saying simply
 "I have no opinion on homosexuality."  HappyNet will help us all to get
 along, even the people with no names.

 But what about those disclaimers that state that your opinion is not
 that of IBM, McDonalds, MIT, Scientology, etc.?

 Disclaimers are NOT required on articles, therefore you MUST include
 the following:

   DISCLAIMER: THIS DISCLAIMER IS NOT REQUIRED BY LEADER KIBO.
   THIS ARTICLE DOES NOT NECESSARILY REPRESENT THE OPINIONS OF LEADER KIBO.
   THIS ARTICLE DOES NOT NECESSARILY DISAGREE WITH LEADER KIBO EITHER.
   HAVE A NICE DAY!

 Also, for your protection, Leader Kibo has filed a copyright claim on
 HappyNet.  Thus, any postings without a copyright notice become the
 intellectual property of Kibo.  This will keep random people from
 commercially exploiting your ideas, because they won't be
 YOUR ideas any more!  It's THAT SIMPLE.  STREAMLINE EVERYTHING!

 ******** HAPPYNET: A BLAST TO LIGHT OUR GLOWING FUTURE! ********

 HappyNet as currently implemented is just one communications medium.
 But this will blast our way into the foundation of the future:
 Eventually, HappyNet will be expanded to replace the other
 `conventional' media, such as newspapers, television, radio, standup
 comedy, and sex.  .signatures will be sixty-second commercials.  Alt.sex
 (bozo.alt.sex) will be interactive and finally worth reading.

 A PBS series, "Great RFCs, Past and Present" will be filmed to replace
 the boring old text RFCs.  A Fox series, hosted by Dr. Ruth Westheimer,
 will replace "Emily Postnews".

 The Sony Walkman will become obsolete thanks to the Sony rnman.  The
 instructions will be on a separate device, the Sony manman.

 Once everyone in the world is hooked into the giant HappyNet neural
 network and their brains merge into one gigantic community of mind
 (with an IQ well over THREE HUNDRED!), local events will be instantly
 communicated everywhere in the world.  For example, people in Sri Lanka
 will be able to INSTANTLY receive dozens of "Hey, we're having a minor
 earthquake here in San Francisco RIGHT NOW!" postings INSTANTLY, instead
 of having to wait weeks.  Rumors of such important events as DeForest
 Kelley's death will also propagate instantly, but this is not really
 a drawback: it enables the NSPF to detect them and snuff them out faster!

 HappyNet is an important part of this well-balanced future.  In fact,
 it is the ONLY part.  Without HappyNet, there could be no future.
 Usenet paves the road to misery and ruin with its cascades, cross-posts,
 flame wars, forgeries, and .signature viruses.  HappyNet does not pave
 this road--where it's going, we don't NEED roads!  HappyNet bravely
 journeys into an unknown, but not unpleasant future.  Everyone WILL
 be happy, happier than human beings can possibly be.

 Although it will take HappyNet months, maybe years, to improve all
 areas of daily existence in all possible ways, it will be obvious to
 the most casual reader that HappyNet is better than Usenet.
 Those who aren't casual readers--well, they will come to agree.
 In time, they will even love me.  In fact, soon they will beg to
 love me!  But I, Leader Kibo, want only the best for everyone.
 After all, I am one of the readers of Usenet, so I can make the
 readers of Usenet happy by making me happy FIRST.  DEATH TO USENET!
 LONG LIVE HAPPYNET!  TO THE MOON!

 ********* HAPPYNET: YOU CONTROL HOW IT CONTROLS YOU *********

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 [Editor's Note: Here is a FAQ from a very cool program. It is like the
  ultimate information database, but has a humorus kick to it. I will
  soon be published in this program. So, here's the FAQ. I highly suggest
  that you ftp the software.]

        ALT.GALACTIC-GUIDE FAQ -- MONTHLY POSTING -- Mk. II Release 1.1

 By Steve Baker (swbaker@vela.acs.oakland.edu)
 Organization: Project Galactic Guide Mothership

               _____   _____  _____       ______ ___   ____
              |  __ \ / ____|/ ____|\ | /|  ____/ _ \ / __ \
              | |__) | |  __| |  __  \|/ | |__ | |_| | |  | |
              |  ___/| | |_ | | |_ |--o--|  __||  _  | |  | |
              | |    | |__| | |__| | /|\ | |   | | | | |__| |
              |_|     \_____|\_____|/ | \|_|   |_| |_|\___\_\
             Project Galactic Guide Frequently Asked Questions

                FAQ  Mk. II  Release 1.1  18 September 1994


 This is the Mostly All-New FAQ (Frequently Asked Questions) information file
 for the Usenet group alt.galactic-guide.  This file is intended to provide
 you with answers to your frequently asked questions and is 97% fat-free with
 no preservatives or artificial flavours.


 Contents
 --------
 1.0  What is this newsgroup?
 2.0  Who's in charge around here?
 2.1  So who do I send articles to?
 3.0  Format of the articles
 3.1  Article content and legal stuff
 3.2  So where can I get article ideas then?
 3.3  The article lifecycle
 4.0  The PGG Mothership
 4.1  Mothership mirror sites
 4.2  Supported computer platforms
 4.3  Other ways to get PGG materials
 5.0  World-Wide Web (WWW) sites
 6.0  Miscellaneous questions


 1.0  What is this newsgroup?
 ----------------------------
 This newsgroup was created for the sole purpose of allowing uninterrupted
 communication between people involved in Project Galactic Guide.  What is
 this project, you ask?

 It all started back in, oh, November of 1991 in the alt.fan.douglas-adams
 newsgroup.  For the uninformed, Douglas Adams is the author of a series
 of humourous s/f books centering on the Hitchhiker's Guide to the Galaxy.
 In these books, the characters write for and frequently consult a sort of
 electronic encyclopedia which has an entry on just about everything.

 Paul said, "Hey, why don't we create a REAL guide to the galaxy?" and
 everyone else said, "Sounds good, let's do it!".  So, with great fervor
 we started working on the skeletal structure of Project Galactic Guide,
 although at that time, we often called it "The HitchHiker's Guide the Known
 Galaxy."

 It was originally supposed to be about REAL things (as opposed to made-up
 things), but we eventually broke down and decided to incorporate
 EVERYTHING.  So, now we'll take humorous entries about fictitious things
 (done in the Douglas Adams style, of course), and humorous entries about
 real things (also done in the Douglas Adams style, of course).


 2.0  Who's in charge around here?
 ---------------------------------
 Well, not anyone, really.  Er, actually, I suppose there *are* a couple of
 froods who tend to have a bit more input about things than others, but
 really it's mostly chaotic.  Well, not actually *chaotic* but instead maybe
 something a bit more like a good recess.

 The aforementioned Paul Clegg is one of PGG's Founding Fathers.  He is
 easily identifiable by his "...Paul" signature.  Paul wrote the first PGG
 FAQ, upon which this document is derived.  Today, Paul's an Editor and has
 many Wise Things to say about topics, issues, concerns, thoughts, ideas,
 problems, suggestions, and comments.  His action figure should be available
 for the holiday season (along with the PGG Mothership playset), and he is
 available via email at:  cleggp@rpi.edu

 Steve Baker helped get the project rolling with his "The Guide!" software
 for IBM/MS-DOS machines in the spring of 1992.  Steve usually answers to
 the nom de plume "Stevadelic."  Today, Steve's an Editor, the Librarian,
 Captain of the PGG Mothership, and actively avoids doing required updates
 and bug fixes to the TG! system.  (He claims to be too busy working on
 Klingon language translation software.)  You can send email to Steve at
 the address:  swbaker@vela.acs.oakland.edu

 Roel van der Meulen joined the project in the fall of 1993, and is an
 active PGG Field Researcher Recruiter (he finds new articles and authors
 for PGG, in addition to his own work).  He also maintains the PGG archives
 contents file and one of the fine WWW sites.  Roel's Internet email address
 is:  vdmeulen@rulrol.leidenuniv.nl

 Jeff Kramer is compiling the "PGG Report," a regular newsletter with lots
 of great information about the Project and its activities.  He also admin's
 one of the PGG WWW sites.  Jeff is available at:  lthumper@bga.com

 Ryan Tucker provides articles, ideas, and crazy text art (like the FAQ
 logo), as well as up-to-date Iowa weather reports (as long as there's a
 tornado).  Ryan's available at:  rtucker@worf.infonet.net

 There's a lot of others out there who have contributed t-shirt designs,
 press card information, articles, ideas, suggestions, comments, et al...
 but to avoid this becoming one of those "Hi folks"-type things, I'll just
 leave it at that.


 2.1  So who do I send articles to?
 ----------------------------------
 Paul is available from September until April or May (during the college
 school year), and Steve is on-line and available year-round.  Both Paul
 and Steve also have America Online accounts, so they're available there
 as well.  Now that I think about it, Steve actually collects email accounts
 (he's now up to six different active, on-line email accounts, which is
 quite a lot of passwords to get straight).

 To answer the question, however, let's just say that you should send
 articles to one of the PGG Editors:

      cleggp@rpi.edu                       -- Paul
      swbaker@vela.acs.oakland.edu         -- Steve

 We also have a third editor, Michael Bravo, who handles articles written
 in the Russian language.  If you have written an article in Russian, please
 send them to Michael (mbravo@octopus.spb.su).


 3.0  Format of the articles
 ---------------------------
 The articles that are accepted are organized by category and compiled in
 article "archives."  Each archive file contains 25 accepted Guide entries.
 These archives are stored and available for download from the PGG
 Mothership.

 We've decided upon a simple ASCII text format for the article entries.  The
 specs on the format are contained in the "article.new" file.  It's really
 pretty simple, with just a few header token-type things that define useful
 stuff.

 The fine folks at PGG spent about a year discussing, debating, formulating,
 postulating, configuring, finalizing, and neglecting a nifty but complex
 text format.  It was complete with crazy text formatting things and lots of
 other fun and wonderful features, but it never really caught on.  Oh well.

 We're currently investigating the possibilities of porting the article
 archives into HTML (HyperText Markup Language) for use with html and WWW
 viewers.  For now, however, standard ASCII files are just fine!


 3.1  Article content and legal stuff
 ------------------------------------
 You're welcome to write about anything.  Yes, no matter how bizarre or
 crazy, please write about it.  Really.  Anything.

 Er, except, we don't want you to regurgitate Adams' material.  Not only is
 this very unoriginal, it's also known as plagiarism.  (Unless DNA himself
 decides to write it for us!)

 In general, please do NOT copy other people's work or ideas.  We don't want
 the project stopped because we violated some silly copyright law!


 3.2  So where can I get article ideas then?
 -------------------------------------------
 We have a PGG Idea Bank, chock full of great ideas that beg for exploring.
 They're frequently posted to the alt.galactic-guide newsgroup, and all are
 available on-line at the Mothership.

 When posting an idea, be sure to include your name and email address for
 proper credit down the road.  Conversely, when using an idea, just go ahead
 and write your article and credit the idea's originator in the header
 information.


 3.3  The article lifecycle
 --------------------------
 This describes what your Friendly Neighbourhood PGG Editor does and presents
 "a day in the life of an article" so to speak.  Erm, actually, the articles
 themselves don't really speak much; that's just an expression, so let's
 carry on.

 1) A young, up-and-coming comedian/researcher/student/author/human/whatever
    stumbles across, gets hit with, becomes infected by, is arrested in, or
    otherwise has a great idea for an article (or consults the Ideabank,
    which is sometimes less painful).

    She/he/it/they then write an article about the person/place/thing and
    send the article to an editor via email.  (Please see Section 2.1,
    above, for info on who the editors are and where to send stuff.)

 2) The editor send a message back to the author, stating something like:
    "Blah blah, thanks for the article, blah blah blah, I'll edit it for
    format and stuff, blah blah, you'll get it back pretty soon for author
    confirmation, blah blah, give me all your money, etc. etc."

    This message is the author's "receipt" that the editor received the
    article submission.  If you don't get one of these, then the editor
    hasn't received your article yet!

 4) The editor edits the article and performs routine grammar and spell-
    checker things on the article.  Note: if the editor thinks that the
    article (1) violates a copyright law, (2) is a copy of other work, or
    (3) is hopelessly lame, the editor may nix the article for good.

 5) Assuming that everything is fine with the article, the editor then sends
    it back to the author for "author confirmation."  (This is often times
    abbreviated as A/C.  Humm, if the author and the editor had a Direct
    Connection, would this be AC/DC?)

 6) The author reviews the modified article, and then lets the editor know
    that things are alright.  If the author has additional changes with the
    article, they go back to step one and start over.

 7) Once the article is approved, the editor assigns the unique Article ID
    information and sends the article to the PGG Librarian.  The Librarian
    adds the approved article into the article archives and posts the
    article to alt.galactic-guide.


 4.0  The PGG Mothership
 -----------------------
 The Mothership is an Anonymous FTP site where you can download PGG info,
 articles, programs, t-shirt images, reports, and other great stuff.  To
 get to the PGG Mothership, FTP to the following site:

      Lexical:    vela.acs.oakland.edu
      Numeric:    141.210.10.2
      URL:        ftp://vela.acs.oakland.edu/pub/galactic-guide

 When you connect, use the [ anonymous ] user ID and specify your full
 Internet email address as the password.

 The Mothership is [ pub/galactic-guide ], which is actually just a link
 to [ pub/swbaker ].  Thus, if you're using an FTP server which doesn't show
 the logical links, go into the [ swbaker ] directory.

 Anyway, beneath this directory are additional directories for each of
 the particular computer programs and general Hitchhiker's Guide fan stuff.
 There is a separate FAQ file on the PGG Mothership which describes these
 directories and the files they contain in more detail.


 4.1  Mothership mirror sites
 ----------------------------
 If having all of the PGG archives, programs, gif files, and other goodies
 at one centralized location isn't good enough for you, you may be pleased
 to know that it isn't!  That is to say, the stuff is available from more
 than one Anonymous FTP site.

 The PGG Mothership is mirrored at:

      Lexical:     ftp.cs.city.ac.uk
      Numeric:     138.40.91.9
      URL:         ftp://ftp.cs.city.ac.uk/pub/galactic-guide


 4.2  Supported computer platforms
 ---------------------------------
 While having the articles themselves is pretty fun, actually being able to
 do something with them is even better.  The following computer platforms
 are supported with PGG article reader systems:

      o  Acorn Archimedes
         Author contact: Alex McLintock (alexmc@biccdc.co.uk)

      o  Amiga

      o  Atari ST

      o  IBM/MS-DOS (also works within Windows, OS/2, DESQview, etc.)
         Author contact: Steve Baker (swbaker@vela.acs.oakland.edu)

      o  Macintosh
         Author contact: Rickard Andersson (rickard@softlab.se)

      o  Unix
         Author contact: Dave Gymer (dpg@cs.nott.ac.uk)

      o  X Windows
         Author contact: David Squire (squizz@cs.curtin.edu.au)

 Each of the programs is available in its own subdirectory on the Mothership.
 Questions about a particular program's use or functionality should be
 directed to the program's author or posted to alt.galactic-guide.


 4.3  Other ways to get PGG materials
 ------------------------------------
 There's a lot of BBS systems that carry Project Galactic Guide stuff.
 Honestly -- I'm positive there's a lot of them... although the FAQ file
 doesn't really reflect this.  Yet.  Just give us some time and soon
 this list will have a lot of numbers.  Really.

      Area/Region       BBS Name                          Number
      ---------------   ------------------------------    ----------------
      Mass., USA        Sea of Noise                      +1 203 886 1441


 In addition, you may contact one of the following hoopy froods who have
 volunteered to distribute PGG materials in their local countries:

      Country           Contact
      ---------------   ------------------------------
      Denmark           Christian Moensted
                        Almindingen 66
                        2860 Soeborg
                        (email: moensted@diku.dk)


 5.0  World-Wide Web (WWW) sites
 -------------------------------
 For those who can view html documents (including users of Mosaic, Cello,
 and WinWeb), there are a number of froody WWW sites:

      URL:       http://www.strw.leidenuniv.nl/~vdmeulen/index.html
      Operator:  Roel van der Meulen

      URL:       http://web.cs.city.ac.uk/pgg/guide.html
      Operator:  Nick Williams

      URL:       http://www.realtime.net/~lthumper/
      Operator:  Jeff Kramer

      URL:       http://www.willamette.edu/pgg/
      Operator:  James Tilton

 These all have links to the Article Archives, the PGG Mothership, format
 and article information, and many have on-line archive search and article
 retrieval capabilities.


 6.0  Miscellaneous questions
 ----------------------------
 Q:  What's with 42, who is Douglas Adams, and why should I carry a towel?
 A:  Please see the alt.fan.douglas-adams Usenet group; they'll be happy to
     supply you with amplitudes of answers.

 Q:  How can I get a PGG Press Card?
 A:  As soon as they're finished, you'll be able to get an Official PGG
     Press Card from Jason Kohles (jason.kohles@m.cc.utah.edu).

 Q:  What good are the PGG Press Cards?
 A:  They may actually get you in some places, and besides they look cool.
     There's an article on what to do with your Press Card; check it out!

 Q:  What's up with the PGG t-shirts?
 A:  Among others, Stephane Lussier (stef@phoque.info.uqam.ca) has come
     up with some great graphics and motif ideas for the Official PGG
     t-shirt.  They're available for review on the Mothership.  As soon as
     we decide on how the shirts will look, and as soon as someone makes
     the shirts, then you'll be able to order them!  For more information,
     just follow the t-shirt threads on alt.galactic-guide.

 Q:  Do you need more editors?
 A:  Not really.  How can you become an editor?  Well, lots of money would
     definitely help (just kidding).  Anyway, until the project completely
     consumes both Paul and Steve to the point of exhaustion, we're probably
     all set.

 Q:  Is there a Macintosh Guide Reader?
 A:  YES!  Please see Section 4.2, above.

 Q:  Is there a Microsoft Windows-based Guide Reader?
 A:  Sorta.  It's being developed.  Under construction.  Something like that.

 Q:  Is this the end of the PGG FAQ?
 A:  Yes.

 Q:  Really?
 A:  I mean it this time.

 Q:  Are you sure about that?
 A:  Absolutely.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                      PRE-EMPLOYMENT BACKGROUND CHECKS

 From: Phil Agre (pagre@weber.ucsd.edu)
 and Christine Harbs (charbs@teetot.acusd.edu)

 Although the enclosed fact sheet from The Privacy Rights Clearinghouse only
 applies to California, it might provide a model for other jurisdictions
 worldwide.

 The Privacy Rights Clearinghouse has a new gopher of useful legal and
 practical stuff about privacy.  Telnet to teetot.acusd.edu
 (or 192.55.87.19) and log in as "privacy".

 You can now reach the Privacy Rights Clearinghouse's useful gopher directly
 at gopher.acusd.edu.  You'll find PRC under menu item 4, USD Campus-Wide
 Information System.


 **************************************
 The Privacy Rights Clearinghouse
 The Center for Public Interest Law
 5998 Alcala Park
 San Diego, CA  92110
 (619) 260-4806
 (619) 260-4753 (fax)
 e-mail prc@teetot.acusd.edu
 gopher gopher.acusd.edu
 Hotline: +1 800-773-7748 (Calif. only) +1 619-298-3396
 ***************************************

 Fact sheet No. 16 Copyright 1994, Center for Public Interest Law
 August 1994

        Employment Background Checks: A Jobseeker's Guide

 **Why would an employer want to do a background check?

 Whether you are hired or promoted for a job may depend on the information
 gathered by the employer in a background check.  Employers use them to
 verify the accuracy of information provided by jobseekers. Background
 reports may also uncover information left out of the application or
 interview.

 Today, more employers are being sued for "negligent hiring" for not checking
 carefully enough into the background of a potential employee. If an
 employee's action hurts someone, the employer may be liable. That is one
 reason more background checks are being conducted.

 The "information age" also accounts for the increase in background checks--
 the availability of computer databases containing millions of records of
 personal data. As the cost of searching these sources drops, employers are
 finding it more feasible to conduct background checks.

 **I don't have anything to hide. Why should I worry?

 While some people are not concerned about background investigations, others
 are uncomfortable with the idea of an investigator poking around in their
 personal history. In-depth background checks could unearth information
 that is irrelevant, taken out of context or just plain wrong.

 A further concern is that the report might include information that is
 illegal to use for hiring purposes or which comes from questionable
 sources. Since in most cases employers are not required to tell applicants
 that a background check is being done, jobseekers may not have the
 opportunity to respond to negative or misleading data.

 **What types of information might be included in a background check?

 Background reports can range from a verification of an applicant's Social
 Security number to a detailed account of the potential employee's history
 and acquaintances. Here are some of the pieces of information that might be
 included in a background check:

 - Driving records   - Vehicle registration   - Credit records
 - Criminal records  - Social Security no.    - Education records
 - Court records     - Workers' compensation  - Bankruptcy
 - Character references   - Neighbor interviews    - Medical records
 - Property ownership     - Employment verification
 - Military service records   - State licensing records

 **Which companies conduct background checks?

 There are many companies that specialize in conducting pre-employment
 background checks. They typically use public records databases to compile
 reports. The following is a partial list of companies that perform a
 variety of services for employment background checking: Avert, Interfact,
 Equifax Employment Services, CDB Infotek, Employers Mutual Assoc.,
 Employers Information Service, Trans Union, Information Resource
 Service Co.,  Pinkerton Security & Investigation Services.

 With the information age upon us, it is easier for employers to gather
 background information themselves. Much of it is computerized, allowing
 employers to "log on" to public records and commercial databases directly
 through commercial online services.

 Employers may also create a "clearinghouse" of information about potential
 employees. A group of employers establish a data exchange program to screen
 applicants. The database is comprised of information submitted by the member
 companies about their employees. When a jobseeker submits an application
 to a member company, that employer will check with the clearinghouse for
 information on the applicant.

 **What types of information *can't* the employer consider?

 Federal and state laws limit the types of information employers can use in
 hiring decisions.

 o Arrest information. Although arrest record information is public record,
 in California employers cannot seek out the arrest record of a potential
 employee. However, if the arrest resulted in a conviction, or if the
 applicant is out of jail but pending trial, that information can be used.
 (California Labor Code @ 432.7)

 o Criminal history. In California, criminal histories or "rap sheets"
 compiled by law enforcement agencies are not public record. Only certain
 employers such as public utilities, law enforcement, security guard firms,
 and child care facilities have access to this information. With the advent
 of computerized court records and arrest information, however, there are
 private companies that compile virtual "rap sheets." (California Penal Code
 @@ 11105, 13300)

 o Workers' compensation. When an employee's claim goes through the state
 system or the Workers' Compensation Appeals Board, the case becomes public
 record. Only if an injury might interfere with one's ability to perform
 required duties may an employer use this information. Under the federal
 Americans with Disabilities Act, employers cannot use medical information
 or the fact an applicant filed a workers' compensation claim to
 discriminate against applicants. (42 USC @12101)

 o Bankruptcies. Bankruptcies are public record. However, employers cannot
 discriminate against applicants because they have filed for bankruptcy.
 (11 USC @525)

 **Aren't some of my personal records confidential?

 The following types of information may be useful for an employer to make a
 hiring decision. However, the employer is required to get your permission
 before obtaining the records. (For more information, see PRC Fact Sheet
 No. 11, "From Cradle to Grave: Government Records and Your Privacy.")

 o Education records. Under both federal and California law, transcripts,
 recommendations, discipline records and financial information are
 confidential. A school should not release student records without the
 authorization of the student or parent. However, a school may release
 *directory information*, which can include name, address, dates of
 attendance, degrees earned, and activities, unless the student has given
 written notice otherwise. (California Education Code @@ 67100, 76200;
 20 USC @1232g)

 o Military service records. Under the federal Privacy Act, service records
 are confidential and can only be released under limited circumstances.
 Inquiries must be made under the Freedom of Information Act. Even without
 the applicant's consent, the military may release name, rank, salary, duty
 assignments, awards and duty status. (5 USC @@ 552, 552a)

 o Medical records. In California, medical records are confidential.  There
 are only a few instances when a medical record can be released without your
 knowledge or authorization. If employers require physical examinations
 after they make a job offer, they have access to the results. The Americans
 with Disabilities Act allows a potential employer to inquire only about
 your ability to perform specific job functions. (California Civil Code @
 56.10;42 USC @12101)

 There are other types of questions such as age and marital status and
 certain psychological tests that employers cannot use when interviewing.
 These issues are beyond the scope of this fact sheet. If you have further
 questions, look under "For more information" at the end of this fact sheet
 or call the PRC Hotline.

 **What can my former employer say about me?

 Often a potential employer will contact an applicant's past employers. A
 former boss can say anything [truthful] about your performance. However,
 most employers have a policy to only confirm dates of employment, final
 salary, and other limited information. California law prohibits employers
 from intentionally interfering with former employees' attempts to find jobs
 by giving out false or misleading references. (California Labor Code @ 1050)

 Documents in your personnel file are not confidential and can be revealed
 by an employer. Only medical information in a personnel file is
 confidential.  If you are a state or federal employee, however, your
 personnel file is protected under the California Information Practices Act
 or the federal Privacy Act of 1974 and can only be disclosed under limited
 circumstances.  Under California law, employees have a right to review
 their own personnel files, and make copies of documents they have signed.
 (California Civil Code @ 56.20; California Labor Code @@432, 1198.5;
 California Government Code @ 1798; 5 USC @552a)

 **Does the applicant have a right to be told when a background check is
 requested?

 The *only* times an applicant must be told if a background check is
 conducted is if the employer requests an "investigative consumer report"
 or a credit report. The investigative consumer report may contain
 information about your character, general reputation, personal
 characteristics and lifestyle. The information in the report is typically
 compiled from interviews with neighbors, friends, associates and others who
 might have information about you.

 Under both California and federal law, the applicant must be notified if
 an employer requests an investigative consumer report. (California Civil
 Code @ 1786; 12 USC @1681d. Also see Fact Sheet No. 6, "How Private is My
 Credit Report?")

 An employer can also order a copy of your credit report, which is less
 detailed than an investigative report. However, a credit report can still
 tell an employer a lot about you. It may contain public records information
 such as court cases, judgments, bankruptcies and liens; also, outstanding
 credit accounts and loans, and the payment history for each account. Credit
 report entries remain in the report for up to ten years.

 In California, if an employer checks your credit file, you must be notified
 and given an opportunity to see the file. Also, when a report is requested
 for employment purposes, the credit bureau must block all references to age,
 marital status, race, religion and medical information. Although federal
 and state laws allow credit bureaus to include criminal record information,
 it is an industry policy not to do so. (California Civil Code @@ 1785.18,
 1785.20.5)

 **What can the job applicant do to prepare?

 Although you cannot *prevent* an employer from doing a background check,
 you can take steps to be ready for questions the employer might ask once
 the investigation is conducted.

 o Order a copy of your credit report. If there is something you do not
 recognize or that you disagree with, dispute the information with the
 creditor or credit bureau before you have to explain it to the interviewer.
 (See PRC Fact Sheet No. 6, "How Private is My Credit Report?")

 o Check public records files. If you have an arrest record or have been
 involved in court cases, go to the county where this took place and inspect
 the files. Make sure the information is correct and up to date. Request a
 copy of your driving record from the Department of Motor Vehicles (DMV),
 especially if you are applying for a job that may involve driving.

 o Ask to see a copy of your personnel file from your old job. Even if you
 do not work there anymore, you have a right to see your file until at least
 a year from the last date of employment. You are allowed to make copies of
 documents in your file that have your signature on them. (California Labor
 Code @ 432.) You may also want to ask if your former employer has a policy
 about the release of personnel records. Many companies limit the amount of
 information they disclose.

 o Read the fine print carefully. When you sign a job application, you may
 also be signing a statement that waives your right to a copy of your credit
 report. You might also be authorizing the disclosure of other personal
 data, such as educational records, medical records and financial data.
 Unfortunately, jobseekers are in an awkward position, since refusing to
 authorize a background check may jeopardize the chances of getting the job.

 o Tell neighbors and work colleagues, past and present, that they might
 be asked to provide information about you. This helps avoid suspicion and
 alerts you to possible problems.

 o If you feel comfortable, ask the interviewer about the company's employee
 privacy policies. Find out if the potential employer plans to do a
 background check, and ask to see a copy.

 **For more information

 o Equal Employment Opportunity Commission (see the Government Pages in
 your phone book).

 o California Labor Commission (see the Government Pages in your phone
 book).

 o Pacific Disability and Business Technical Assistance Center for questions
 about the Americans with Disabilities Act, (800) 949-4232.

 o Documented Reference Check, (800) 742-3316 (verifies references of former
 employers; fee charged).

 If you have additional questions about privacy, contact the PRC Hotline
 at (800) 773-7748.

 Copyright  1994 Center for Public Interest Law August 1994
 ***************************************************************************
 The Clearinghouse is a nonprofit organization dedicated to educating
 Californians about personal privacy issues. It is funded by a grant from the
 Telecommunications Education Trust and operates under the auspices of the
 University of San Diego School of Law's Center for Public Interest Law.
 ***************************************************************************

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 WE ENCOURAGE YOU TO SEND MAIL TO YOUR SYSTEM ADMINISTRATORS ASKING THEM
 IF THEY OFFER THEIR SYSTEM LOGS TO GOVERNMENT AGENCIES - ESPECIALLY IF
 YOU LIVE IN TEXAS.  ACTIONS SUCH AS THIS MAY BE A VIOLATION OF YOUR
 PRIVACY.  IF YOU DISCOVER THIS TO BE THE CASE, MAIL US!

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%