💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JAUC › jauc1-1.phk captured on 2022-06-12 at 13:01:53.

View Raw

More Information

-=-=-=-=-=-=-


  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Quarterly
  ===================================================================
  ISSN 1074-3111           Volume One, Issue One       March 19, 1994
  ===================================================================

      Editor-in-Chief:         Scott Davis
      NetSurfer:               John Logan
      It's A Conspiracy!:      Gordon Fagan

      E-Mail - editors@fennec.com
      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC

      U.S. Mail:
      The Journal Of American Underground Computing 
      10111 N. Lamar #25
      Austin, Texas 78753

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  To Subscribe to "TJOAUC", send mail to:              sub@fennec.com
  All questions/comments about this publication to:    comments@fennec.com
  Send all articles/info that you want published to:   submit@fennec.com
  Commercial Registration for Profitable Media:        form1@fennec.com

 "The underground press serves as the only effective counter to a growing
 power, and more sophisticated techniques used by establishment mass media
 to falsify, misrepresent, misquote, rule out of consideration as a priori
 ridiculous, or simply ignore and blot out of existence: data, books,
 discoveries that they consider prejudicial to establishment interest..."

 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
 
  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  Contents Copyright (C) 1994 The Journal Of American Underground Computing
  and/or the author of the articles presented herein. All rights reserved. 
  Nothing may be reproduced in whole or in part without written permission 
  of the Editor-In-Chief and/or the author of the article. This publication
  is made available quarterly to the amateur computer hobbyist free of charge.
  Any commercial usage (electronic or otherwise) is strictly prohibited
  without prior consent of the Editor, and is in violation of applicable
  US Copyright laws. To subscribe, send email to sub@fennec.com

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  DISCLAIMER AND NOTICE TO DISTRIBUTORS -

  NOTE: This electronic publication is to be distributed free of charge
  without modifications to anyone who wishes to have a copy. Under NO
  circumstances is any issue of this publication, in part or in whole, 
  to be sold for money or services, nor is it to be packaged with other 
  computer software, including, but not limited to CD Rom disks, without 
  the express written or verbal consent of the author and/or editor.
  To obtain permission to distribute this publication under any of the
  certain circumstances stated above, please contact the editor at one of
  the addresses above. If you have intentions of publishing this journal
  in any of the ways described above, or you are in doubt about whether or
  not your intentions conflict with the restrictions, please contact the
  editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com

  This publication is provided without charge to anyone who wants it.
  This includes, but is not limited to lawyers, government officials,
  cops, feds, hackers, social deviants, and computer hobbyists. If anyone
  asks for a copy, please provide them with one, or mail the subscription
  list so that you may be added.

  The articles and information printed herein are the property of the author
  and / or The Journal Of American Underground Computing. An electronic mail
  address of the author will be provided when made available to us so that you
  can contact the author with your comments. No article in this publication
  can be reprinted without the permission of the author / editor. Any attempt
  to do so will be in direct violation of United States Copyright laws.
  Any attempt to sell this publication in part or in whole, on CD Rom or
  while packaged with any other software bundle without the express consent
  of the editor is also a direct violation of United States Copyright laws.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

     THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 1

                          TABLE OF CONTENTS

 1) Introduction To TJOAUC                               Editors    
 2) Control Of Information In The Mass Media             Gordon Fagan
 3) Some Thoughts On Clipper, NSA, ...                   Jim Bidzos
 4) CIA Corrupt, Stupid, Should Be Abolished             Mark Lane
 5) Legion Of Doom T-Shirts...get 'em!!                  Chris Goggans

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

      Introduction To The Journal Of American Underground Computing

 By The Editors (editors@fennec.com)

        First of all, I want to personally thank you for taking the time
 to read this electronic publication. The editors of this publication had a
 large hand in The World View Magazine, a publication that became defunct as
 of January 1, 1993. We had become stagnant with that publication, so we
 jointly agreed to ditch it. Since then, we have received hundreds of
 subscription requests for the magazine. After consulting with each other
 for several months, we have decided to do a "new-and-improved" version of
 that popular magazine...but under a different name. And in a more official
 capacity I might add. So here it is...Issue one, Volume one. The format for
 this magazine is totally undefined. The decision to do it this way is better
 than focusing on a certain area in the sense that we can cover anything and
 everything...and people will not be suprised when they see an article that
 is "out of character". Also, I hope that it will inspire people to write
 about whatever they feel intimate with...be it politics, computer networking,
 hacking, etc...or any remote aspect of such topics. So please read on, and
 keep in mind that we encourage you to comment on anything you agree with,
 disagree with, like, dislike, etc...we will print comments like that.
 Your input is necessary. Thanks for reading, and enjoy. A special thanks
 goes to "The Spotlight", a weekly publication in our nation's capital for
 permission to reprint, etc...Thanks to Don Markey!
 
  Editors

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 CONTROL OF INFORMATION IN THE MASS MEDIA

 By Gordon Fagan (fagang@ccmail.us.dell.com)


 The Public's right to know is not always what the Public ends up
 getting. The Public frequently gets one-sided, biased information
 and not just from the mass media. It's easy to have a long arm that
 protects the special interest groups: this kind of a "one world
 family" of insiders that is capable of affecting federal judges,
 U.S. attorneys, to slant or obstruct justice, to hide or cover up
 crucial information, and to interfere with our liberties.

 There has been a major campaign on the part of the Central
 Intelligence Agency to place Central Intelligence Agency agents, in
 various news media posts.  Documents have been found on this.  It was
 called "Operation Mocking Bird".  They placed operatives in places
 like TIME Magazine and LIFE Magazine, the New York Times, inside CBS
 and ABC News.  The National Student Association and other student
 groups were also targeted.

 Originally, the intent of "Operation Mocking Bird" was to make
 certain that these major media outlets and student organizations
 reflected an adequately anti-communist perspective. And then, of
 course, as they became entrenched and in-place, any time the Central
 Intelligence Agency wanted a story killed or distorted they would
 contact their agents inside.  They have bragged openly in private
 memos back and forth inside the Agency about how proud they are of
 having very important "assets" inside virtually every major news
 media in the United States.

 For example, the Chief National Security Correspondent for TIME
 Magazine, Bruce Van Voorst, is a regular Central Intelligence
 Agency officer.  It turns out that Ben Bradlee from the Washington
 Post was a regular Central Intelligence Agency officer prior to
 coming to his post at the Washington Post.  Bob Woodward at the
 Washington Post was the Point-Briefer for U.S. Naval Intelligence
 of the Joint Chiefs-of-Staff before he went over to the Washington
 Post.  What we're told in the media (and what we're told officially
 from Government sources) and what is the truth are frequently at
 varying degrees against each other.

 We find these people constantly in the news media.  When the New
 York Times was refusing to print any information about Oliver North,
 Richard Secord, Albert Hakim and Rob Owen, and all of the other men
 who, throughout 1985 and 1986, were engaged in a massive criminal
 conspiracy to violate the Boland Amendment prohibiting any weapons
 shipments to the Contras, and who were involved in smuggling TOW
 missiles to Iran.  Keith Schneider, who was one of the reporters
 assigned to look into the issue, said that the Times was refusing to
 print any of it because their high-level sources inside the Central
 Intelligence Agency refused to confirm the stories.

 This kind of relationship between self-conscious "assets" of the
 Covert Operations Director of the Central Intelligence Agency is a
 political police force on an international level to protect the
 ostensible economic interests of United States industries by placing
 these people inside a news media which, under the First Amendment,
 ostensibly has the responsibility to critique and investigate
 potential injustices on the part of the State, inside the Government
 is an extraordinarily dangerous development here in the United States.

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  Article printed with permission of the author, Jim Bidzos
  Jim Bidzos is the President and CEO of RSA Data Security, and is a 
  well respected authority in the area of security and encryption.

      SOME THOUGHTS ON CLIPPER, NSA, AND ONE KEY ESCROW ALTERNATIVE

 By Jim Bidzos (bidzos@rsa.com)

 In a recent editorial, Dr. Dorothy Denning of Georgtown University
 argued in support of the U.S. government's proposed Clipper Chip, a
 security device that would allow law enforcement to decipher the
 communications of users of such devices.

 Dr. Denning attempts to argue that Clipper is necessary for law
 enforcement agencies to be able to do their job.  I'm not going to
 argue that one; there are plenty of people who can argue that
 compromising privacy for all citizens in order  to aid law enforcement
 is a bad idea more effectively than I, particularly in the Clipper
 case, where the arguments from law enforcement are dubious at best.
 (The current justification is inadequate; there may be better reasons,
 from a law enforcement perspective, but we haven't heard them yet.)

 Without doubt, law enforcement and intelligence are huge stakeholders
 in the debate over encryption. But every individual and corporation in
 the U.S. must be included as well. Are NSA's actions really in the
 best interests of all the stakeholders? Are there alternatives to the
 current key escrow program?

 If one steps back and looks at what has happened over the last few
 years, one might well question the government's approach with Clipper,
 if not its motivation, for dealing with this problem.  (I believe it
 may even be possible to conclude that Clipper is the visible portion
 of a large-scale covert operation on U.S. soil by NSA, the National
 Security Agency.) Over a number of years, through their subversion of
 the Commerce Department (who should be championing the causes of U.S.
 industry, not the intelligence agencies), NSA has managed to put many
 U.S. government resources normally beyond their control, both legally
 and practically, to work on their program of making U.S. and
 international communications accessible.

 The first step was the MOU (Memorandum of Understanding) between the
 Commerce Department's National Institute of Standards and Technology
 (NIST) and the Defense Department's NSA.  This document appears to
 contravene the provisions of the Computer Security Act of 1987, the
 intent of which was to give NIST control over crypto standards-making
 for the unclassified government and commercial sectors.  The MOU
 essentially gave NSA a veto over any proposals for crypto standards by
 NIST.

 By using the standards making authority of NIST, NSA is attempting to
 force the entire U.S.  government to purchase Clipper equipment since
 only NIST-standard equipment may be purchased by government agencies.
 This purchasing power can then be used to force U.S. manufacturers to
 build Clipper products or risk losing government business.  (GSA is 
 currently questioning NSA's authority to control government-wide
 procurement, and should continue to do so.)  This of course not only
 subsidizes Clipper products, but could make Clipper a de facto
 standard if the costs associated with alternatives are too high.
 These costs to industry, of ignoring Clipper, come in the form of lost
 government market share, costly support for multiple versions of
 incompatible products, and non-exportability of non-Clipper products. 

 It also appears that NSA is desperately seeking a digital signature
 standard that would force users to take that signature capability
 wrapped up with a Clipper chip.  If this is the case, as it appears to
 be, then NSA has is trying to use what is probably the most powerful
 business tool of the information age as a means to deny us its
 benefits unless we subsidize and accept Clipper in the process.  This
 would, if true, be an unprecedented abuse of government power to
 influence U.S.  industry and control individual privacy.  (Clipper is
 part of a chip called Capstone, which is where their proposed digital
 signature standard would be used.)

 The overall cost of these policies is unknown.  We only know that NSA
 has spent a considerable amount of money on the program directly.
 Other costs are not so obvious. They are:  

 - A burdened U.S. industry, which will have to build multiple products
 or more expensive products that support multiple techniques;

 - A low-intensity "trade war" with the rest of the world over
 encryption;

 - Lost sales to U.S. companies, since international buyers will surely
 go to non-U.S. suppliers for non- Clipper encryption, as may buyers in
 the U.S.;

 - Potential abuses by government and loss of privacy for all citizens.

 Does NSA truly believe they can displace other methods with Clipper?
 With over three million licensed, documented RSA products, the
 technology they feel threatened by, in use in the U.S. today? Not
 likely; therefore, they have already decided that these costs are
 acceptable even if they only delay the inevitable, and that U.S.
 industry and U.S. taxpayers should bear these costs, whatever they
 are.  This policy was apparently developed by unelected people who
 operate without oversight or accountability.  Does the White House
 really support this policy? 

 It has been reported that NSA is attempting to gain support from
 foreign governments for escrow technology, especially if "local
 control" is provided.  Even if NSA can convince their sister
 organizations around the world to support key escrow (by offering
 Clipper technology with a do-your-own-escrow option), will these other
 organizations succeed in selling it to their government, industry and
 citizens?  Most countries around the world have much stronger privacy
 laws and a longer history of individual privacy than the U.S.

 WHY AGAIN WHEN IT DIDN'T WORK THE FIRST TIME?

 Many seem to have forgotten or are not aware that the Clipper program
 is not new, and it's also not the first time NSA has attempted to
 force communications security on U.S. industry that it could
 compromise.  In the mid-80's, NSA introduced a program called the
 Commercial COMSEC Endorsement Program, or CCEP. CCEP was essentially
 Clipper in a black box, since the technology was not sufficiently
 advanced to build lower-cost chips.  Vendors would join CCEP (with the
 proper security clearances) and be authorized to incorporate
 classified algorithms into communications systems.  NSA had proposed
 that they themselves would actually provide the keys to end-users of
 such systems.  The new twist is access by key escrow. 

 To see how little things have changed, consider this quote: "...RSA
 Data Security, Inc.  asserts that since CCEP-2 is not published and
 therefore cannot be inspected by third parties, the NSA could put a
 'trap door' in the algorithm that would enable the agency to inspect
 information transmitted by the private sector.  When contacted, NSA
 representative Cynthia Beck said that it was the agency's policy not
 to comment on such matters."  That was in 1987. ("The Federal Snags in
 Encryption Technology," Computer and Communications Decisions, July
 1987, pp.  58-60.)

 To understand NSA's thinking, and the danger of their policies,
 consider the reply of a senior NSA official when he was asked by a
 reporter for the Wall Street Journal if NSA, through the CCEP program,
 could read anyone's communications: "Technically, if someone bought
 our device and we made the keys and made a copy, sure we could listen
 in. But we have better things to do with our time." (The Wall Street
 Journal, March 28, 1988, page 1, column 1, "A Supersecret Agency Finds
 Selling Secrecy to Others Isn't Easy," by Bob Davis.) Another NSA
 official, in the same Journal story, said "The American Public has no
 problem with relying on us to provide the technology that prevents the
 unauthorized launch of nuclear weapons. If you trust us to protect
 against that, you can trust us to protect private records."  Remember
 that the Cold War was still on at that time.  

 Law enforcement and intelligence gathering are certainly impeded by
 the use of cryptography.  There are certainly legitimate concerns that
 these interests have.  But is the current approach really the way to
 gain support from industry and the public?  People with a strong
 military and intelligence bias are making all the decisions. There
 seem to be better ways to strike a balance. 

 AN ALTERNATIVE PROPOSAL

 One approach would be to have NIST develop a standard with three
 levels.  The first level could specify the use of public-key for key
 management and signatures without any key escrow.  There could be a
 "Level II" compliance that adds government key escrow to message
 preparation.  "Level III" could be key escrow controlled by the user,
 typically a corporation.  Would this work? The first level, meeting
 the standard by itself, would back up the government's claim that key
 escrow is voluntary; if I want privacy and authentication without key
 escrow, then I can have it, as the government has claimed I can.
 Actions speak louder than words.

 Why would any vendors support Level II?  There would be several
 reasons. They would find a market in the government, since the
 government should purchase only Level II products. (I would certainly
 like our public servants to use key escrow, just as I want work
 product paid for by my corporation to be accessible. Of course, anyone
 can buy Level I products for home and personal use.)  So the
 government can still influence the private sector by buying only
 products that include Level II compliance. Also, Level II products
 would be decontrolled for export. This way the market can decide;
 vendors will do what their customers tell them to.  This satisifies
 the obvious desire on the part of the government to influence what
 happens with their purchasing power.

 Level III would allow any user to insert escrow keys they control into
 the process.  (Level II would not be a prerequisite to Level III.) My
 company may want key escrow; I, as an individual, may want to escrow
 my keys with my attorney or family members; a standard supporting
 these funtions would be useful.  I don't necessarily want or need the
 government involved.   

 NIST already knows how to write a FIPS that describes software and
 hardware implementations, and to certify that implementations are
 correct. 

 This approach cetainly isn't perfect, but if the administration really
 believes what it says and means it, then I submit that this is an
 improvement over a single key escrow FIPS foisted on everyone by NSA,
 and would stand a much better chance of striking a workable balance
 between the needs of the government and the right of individuals to
 privacy.  Therefore, it RISKS much less than the current plan.

 The real problem with the way NSA works is that we don't find out what
 they're really doing and planning for decades, even when they're
 wrong.  What if they are?  

 In the 60's and 70's, the CIA was out of control, and the Congress,
 after extensive hearings that detailed some of the abuses of power by
 the CIA, finally moved to force more accountability and oversight.  In
 the 80's and 90's, NSA's activities should be equally scrutinized by a
 concerned Congress.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 SYSOPS: CAN YOU GO TO JAIL ?

 By Jeff A. Heyens
 Additional Comments By chris@eastern.eastern.com
 
     We have a new problem.  Everyone knows that lately there has 
 been a crackdown on Bulletin Boards which carry pornography, 
 pirated software, etc.  There is, however, a new and much more 
 powerful threat which is threatening to stop all privately run 
 BBS's. 
 
     The Canadian Radio and Telecommunications Commission (CRTC) 
 is currently in the process of setting itself up to regulate 
 Public bulletin boards.  They want to make it an offense to run a 
 BBS without a CRTC license.  If licensing comes into effect, the 
 BBS scene will quite literally shrivel up and die. 
 
     Consider the example of radio in the 40's and 50's.  Before 
 the CRTC was formed, anyone could broadcast radio signals legally 
 from their home on any bandwidth.  Fearing obscenity and extreme 
 access to information, the CRTC was formed to sell licenses to 
 broadcasters.  Without such a license, you could be prosecuted 
 for broadcasting.  The result of this action can be seen today:  
 the only radio stations we see are totally mainstream and are 
 hell-bent on making profit, not pleasing listeners or informing 
 the public. 
 
     We all know that the bulletin board systems are a great way 
 to get alternative information.  We can get information on the 
 Paul Teele / Karla Homolka trials.  We can get new insights as to 
 what is really happening in the former Yugoslavia through the 
 giant Internet.  We currently have access to multitudes of 
 information that isn't available through the mainstream media. 
  
     If licensing comes into affect, we will LOSE this access.  
 Not only will the pirate boards be hunted down and exterminated, 
 but all currently LEGAL PUBLIC DOMAIN BBS's will also be made 
 illegal unless they can afford a license.  And who do you think 
 will get licenses?  Only those willing to follow the CRTC 
 guidelines for radio and television.  Corporations and rich 
 executives.  The BBS world, our underground paradise (if you 
 will) is in great danger of becoming a commercial hell like the 
 rest of today's media. 
 
     We don't yet know what the proposed licensing fee will be, 
 but it could anywhere in the area of $300-$5,000.  This could 
 also depend on the size of the BBS.  However, most BBS's will 
 simply close up shop if the government wants a license.  The 
 government will simply weed out all the little guys and support 
 the big guys.  
 
     This WILL HAPPEN, and sooner than you think!  The U.S. 
 Government has already started doing this, with the new 
 Information SuperHighway being the flag-ship of government 
 regulated systems.  The Canadian government is going farther, and 
 must be stopped now. 
  
     Before I go into my plan of action, I want to tell you that 
 if licensing comes into effect, if will be basically impossible 
 to beat the system.  All pirate radio stations in North America 
 have been crushed by the government in a matter of months.  
 Imagine how easy it will be to crush pirate bulletin board 
 systems (and by that I simply mean BBS's without a license) with 
 traceable phone numbers.  Bell Canada would be sure to help the 
 CRTC bust those boards.  And the RCMP would have a real easy time 
 busting any boards with illegal software, because those boards 
 would not have licenses.  The CRTC finds the board through Bell, 
 arrests the sysop for running a board without a license, then 
 informs the RCMP that this sysop was allowing copyrighted 
 material to be transferred through his/her bbs.  That sysop, for 
 the first time in his/her life, is suddenly looking at a possible 
 jail term.


     COULD YOU IMAGINE GOING TO JAIL FOR RUNNING A BBS???????? 
 
 That, I admit, is the extreme case, but it is looking more and 
 more likely as time goes on.  If you're as pissed off about this 
 as I am, then keep reading, because I have a plan of 
 action/protest to stop this from happening. 
 
     WE are the only people out there who can stop this from 
 transpiring.  Only the extremely computer literate, those of us 
 who know the ins and outs of the BBS scene and computers 
 generally, will be able to generate an argument strong enough to 
 counter the argument of the government and the CRTC.   
 
     I've been a user in different parts of Ontario for about six 
 years.  I currently go to York University for Computer Science 
 and my plan is to organize a campaign of users who will be 
 willing to petition the government to stop this craziness.  My 
 sister is a lawyer and also an occasional user of the boards.  
 She would be willing to confront the CRTC on legal grounds if we 
 have enough support from YOU.  I have to hear from you.  In order 
 to force the CRTC to at least seriously listen to our argument, 
 we need a lot of names, and a lot of letters to your local MP and 
 to the CRTC.   
  
     If I have enough support, I will set up a BBS which is 
 dedicated to keeping you informed.  I will keep up to date as to 
 what the CRTC is doing and open up discussion concerning what we 
 should do about it.  I would also print out all the messages on 
 the board and send them off to the prime minister, the CRTC and 
 our local MP's.  At the same time, my sister and I will prepare a 
 legal argument to present to the government and the CRTC.  IF we 
 have the support of your names and your letters behind us, the 
 CRTC will be forced to stop. 
  
 OUR GOAL:  To stop the CRTC from requiring the licensing of 
 bulletin board systems and get it written into the law books that 
 private, home run bbs's are totally legal and should never be 
 regulated, in the interests of free information. 
  
 
     PLEASE send me E-mail or letter mail with your thoughts.  I 
 WILL set up the bbs and get this ball rolling if we have enough 
 support!  Please send this file to other BBS's and get this 
 information out.  Contact me if you want to be involved.  We need 
 all your support! 
  
       Support USERS AGAINST THE LICENSING OF BBS's (UALBBS). 
 
                    KEEP PRIVATE BBS's LEGAL! 
 
 *** Begin Additional Comments: ***
 
 Reading the preceding document has brought a few thoughts to
 my mind.  First of all, there has been much apprehension about
 what the computerization of society holds for the freedom of the
 common citizen.  It seems that the more powerful a thing is, the
 more potential it has for both good and bad; and there is no doubt
 that the computerization of information is powerful indeed.
 
 On one side, the computerization of society holds the potential
 for a centralized authoritarian regime that could not have been
 dreamed of previously.  In the near future, there will be no further
 need for cash money and there will be no economic activity beyond
 the reach central intelligence and control.  And there will be no
 personal information that will be kept secret from the authorities.
 Even the USSR, with the model of central authority we feared most,
 could could not have been capable of realizing the degree of control,
 the dawn of which, we now witness.

 But the evil that we feared in Communism infects our own society.
 Abstract concepts such as truth and justice are minimum requirements
 for spiritual beings, yet we deny the spiritual and cling to the
 material.  If we assert that we are but material beings, how real
 can the spiritual necessities really be?  And yet, in order for
 us to have any hope of happiness, these must be acknowledged in
 any formula for a culture and society we might propose.  Even So,
 we increasingly embrace a purely materialist interpretation of
 existence in which such things as truth and justice, if not
 outright delusional, are relative.
  
 If we continue to embrace the same cosmology as drove the Soviet
 repression, and the tools of a police state become available,
 what of government's temptation to become the definer of truth and
 justice and all the things which are the very breath of life
 for the human soul?  Even one who is completely seduced by
 materialism would have to be blind indeed not to perceive what
 an enormous poison this is.
  
 On the other side, the proliferation of information technology has the
 same sort of potential as the cheap portable video camera.  The
 particular aspect of this potential I'm addressing has been made most
 obvious by the effect the video camera has had in totalitarian
 countries, namely, that it is increasingly difficult for these
 governments to suppress the truth of events by simple denial and
 propaganda.  The proliferation of information technology can
 have a parallel with the advent of the Guttenberg press, which made
 it more difficult for the Inquisition to suppress the works of 
 heretics-- but only if it is allowed.  If the Church had tried
 to regulate the press, it would have been possible to operate them
 underground.  This is not the case with BBSs because the telephone
 network can be programmed to log all modem communications.
  
 From the positive aspect of information technology, there comes the
 potential for a democratic process that has not been practical
 until now.  As information technology becomes more accessible,
 there could come a world in which an average Joe might write an
 article about picking his nose, and it would have no less
 distribution than if it had been published in MacLean's or Newsweek.
 
 Although the suppression of pornography and other abuses has its
 attractiveness, the complete and unregulated liberation of
 information is our only defense against its dark side.  The
 scope of the suffering that information enslavement can inflict
 upon us is so great that "preventing misuse" can only be an
 excuse of those who would enslave us.
  
 Any move that leaves the dark potential of the new technology
 in place, while invalidating its positive aspects, leaves the
 potential for authoritarian abuse in place, while invalidating
 our only true defense.  Any such move is quite obviously
 a move toward enslaving us.  If any cause is worthy of struggle,
 the preservation of information liberty is indeed such a cause.
  
 Three other thoughts:  
 
 1) If the traditional media loses its preeminence to the "new"
 media, it shows a flaw in the traditional media.  Then, the 
 success of the alternative media will be the excuse for imposing
 the same regulation on the alternative media as on the traditional.
 But this will have the effect of imposing the same mediocrity into
 the alternative media as made the traditional media less
 attractive.  Such are the politics of information enslavement.
 
 2) Radio and television are vulnerable to interference from
 the incompetent and abusive.  But private BBSs must be explicitly
 dialled into.  Can the regulators seriously contend that they
 might protect us from information that we must access in
 such a deliberate and specific manner?
 
 3) If private BBSs are regulated, uucp and FidoNet, which amount
 to networks of BBSs for machines, will also be.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 The following article reprinted from "The Spotlight" in Washington D.C
 with permission from Asst. Editor Don Markey.
 
                CIA CORRUPT, STUPID, SHOULD BE ABOLISHED

        We're spending untold billions on any international spying
        operation that can't figure out what it's own people are
        doing.  It's time for a change.

 By Mark Lane

 The arrest of Aldrich Hazen Ames, former head of the CIA's Soviet
 counterintelligence branch, as a Soviet spy, raises some seminal questions
 about the value of the CIA.  With the fox and his wife, Maria del Rosario
 Casas Ames, also charged as a Soviet spy, in charge of the henhouse, it is
 time to wonder about the fate of the chickens.  

 During September, 1985, Vitaly Yurchenko, a senior KGB official, defected.
 Ames was assigned to debrief him.  Yurchenko, after that debriefing,
 escaped from his CIA controllers while having dinner with them in a
 restaurant in Georgetown and then returned to the Soviet Union. 

 Edward Lee Howard, a CIA officer, was under secret FBI surveillance during
 the same period.  He too fled to the Soviet Union after he learned that he
 was about to be arrested.  Until now the CIA and FBI have been unable to
 figure out how Howard learned of his imminent incarceration. 

 There is a simple rule employed by police departments throughout the
 United States to spot a possibly corrupt cop.  Is he living beyond his
 means?  Even unsophisticated local police organizations which do not
 regularly spy on their own colleagues or subject them to lie detector
 tests, as does the CIA, have established a relatively sound and simple
 method to locate potentially corrupt officers.  Did he buy a Cadillac
 instead of a Ford?  How can he afford to build a garage or construct an
 addition to his house? 

 During his highest paid year with the CIA, Ames earned under $70,000.  His
 wife was a student.  Last year he bought a new Jaguar -- which cost about
 his annual income after taxes, unless it was loaded with extras.  He also
 bought a house in Arlington, Virginia (a Washington suburb) worth well
 over half-a-million dollars, a large farm and a number of condominiums in
 Columbia, his wife's country of birth.  He paid for the Virginia house --
 $540,000 -- in cash. 

 Apparently he was paid approximately $1.5 million by the Soviet Union
 during the last several years and spent it all on a luxurious life style. 
 And now, we are informed by the CIA that no one at the agency noticed the
 improved Ames lifestyle during the past decade.  

 The Ames case is reminiscent of the case of CIA officer Edwin P. Wilson
 who engaged in a similar grand life, while earning a relatively meager
 salary at the CIA.  He was subsequently charged and convicted of illegally
 shipping explosives to Libya.  For years Wilson lived on a huge baronial
 estate in Virginia, kept horses and permitted other CIA officers,
 including his superiors, to send their children over to his mansion and
 stables to ride the horses. 

 The CIA later claimed to be astonished that Wilson had some other income. 
 He claimed the agency knew it all along and that he was the victim of a
 change in policy toward Libya in the smoke-filled rooms in Langley,
 Virginia (headquarters of the CIA) where the resident scholars engage in
 thinking too convoluted and too secret thoughts for ordinary Americans to
 comprehend.  Wilson is now in prison and the CIA is newly astonished by
 Ames. 

 Most Americans have not yet decided to forgive the CIA for murdering
 President John F. Kennedy and the leaders of other states.  The only
 justification for its existence, immoral though it may be, is that at
 least it is effective.  That excuse has now expired.  So should the CIA. 

 The American people deserve an intelligence agency created in the
 post-Communist world, one designed not to plot, overthrow and kill, but to
 inquire and determine.  An organization which can predict, based on work
 on the ground and contacts, trouble spots such as in Bosnia before they
 erupt, a financial crisis in Japan secured through evaluation and study of
 trends by competent scientists, the uprising of Mexican indigenous people
 before we enter into a NAFTA which makes us partners of their oppressors
 -- all of these would be of great value to America. 

 Above all, a democratic society deserves an intelligence agency designed
 to meet the needs of such a country, not designed for a totalitarian
 state. 

 This portion of the story ends on a light note.  The "Washington Times"
 reported in front page headlines that the Russians may lose billions of
 dollars in U.S. aid due to their perfidy of spying on us.  Just recently
 Philip Heyman, a Justice Department high official, over the objection of
 Janet Reno, the attorney general and his superior, demanded that Jonathan
 Pollard, the American who spied for Israel, be freed.  Pollard was paid in
 dollars which the United States had sent to Israel as part of its enormous
 contribution to that state. 

 I am still looking for the headline that suggests that Israel may lose
 billions of dollars in U.S. aid.  


 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                 LEGION OF DOOM T-SHIRTS!! Get 'em

 By Chris Goggans <phrack@well.sf.ca.us>

After a complete sellout at HoHo Con 1993 in Austin, TX this past
December, the official Legion of Doom t-shirts are available
once again.  Join the net luminaries world-wide in owning one of
these amazing shirts.  Impress members of the opposite sex, increase
your IQ, annoy system administrators, get raided by the government and
lose your wardrobe!
 
Can a t-shirt really do all this?  Of course it can!
 
--------------------------------------------------------------------------
 
"THE HACKER WAR  --  LOD vs MOD"
 
This t-shirt chronicles the infamous "Hacker War" between rival
groups The Legion of Doom and  The Masters of Destruction.  The front
of the shirt displays a flight map of the various battle-sites
hit by MOD and tracked by LOD.  The back of the shirt
has a detailed timeline of the key dates in the conflict, and
a rather ironic quote from an MOD member.
 
(For a limited time, the original is back!)
 
"LEGION OF DOOM  --  INTERNET WORLD TOUR"
 
The front of this classic shirt displays "Legion of Doom Internet World
Tour" as well as a sword and telephone intersecting the planet
earth, skull-and-crossbones style.  The back displays the
words "Hacking for Jesus" as well as a substantial list of "tour-stops"
(internet sites) and a quote from Aleister Crowley.
 
--------------------------------------------------------------------------
 
All t-shirts are sized XL, and are 100% cotton.
 
Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for
postage.
 
Send checks or money orders.  Please, no credit cards, even if
it's really your card.
 
 
Name:       __________________________________________________
 
Address:    __________________________________________________
 
City, State, Zip:   __________________________________________
 
 
I want ____ "Hacker War" shirt(s)
 
I want ____ "Internet World Tour" shirt(s)
 
Enclosed is $______ for the total cost.
 
 
Mail to:   Chris Goggans
           603 W. 13th #1A-278
           Austin, TX 78701
 
 
These T-shirts are sold only as a novelty items, and are in no way
attempting to glorify computer crime.

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

        In the super-state, it really does not matter at all what
        actually happened.  Truth is what the government chooses 
        to tell you.  Justice is what it wants to happen. 
                    --Jim Garrison, New Orleans District Attorney

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%