💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › JOAUC › jauc03.txt captured on 2022-06-12 at 13:02:16.

View Raw

More Information

-=-=-=-=-=-=-



  THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Periodically

  ======================================================================

  ISSN 1074-3111           Volume One, Issue Three        April 30, 1994

  ======================================================================

    

      Editor-in-Chief:         Scott Davis      (dfox@fennec.com)

      Technology Editor:       Max Mednick      (kahuna@bga.com)

      Consipracy Editor:       Gordon Fagan     (flyer@fennec.com)

      Network Security:        George Phillips  (ice9@bga.com)



      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC



      U.S. Mail:

      The Journal Of American Underground Computing 

      10111 N. Lamar #25

      Austin, Texas 78753-3601



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 IMPORTANT ADDRESSES - 

 ============================================================================

 To Subscribe to "TJOAUC", send mail to:              sub@fennec.com

 All questions/comments about this publication to:    comments@fennec.com

 Send all articles/info that you want published to:   submit@fennec.com

 Commercial Registration for Profitable Media:        form1@fennec.com

 ============================================================================



 "The underground press serves as the only effective counter to a growing

 power, and more sophisticated techniques used by establishment mass media

 to falsify, misrepresent, misquote, rule out of consideration as a priori

 ridiculous, or simply ignore and blot out of existence: data, books,

 discoveries that they consider prejudicial to establishment interest..."



 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)

 

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 Contents Copyright (C) 1994 The Journal Of American Underground Computing

 and/or the author of the articles presented herein. All rights reserved. 

 Nothing may be reproduced in whole or in part without written permission 

 of the Editor-In-Chief and/or the author of the article. This publication

 is made available periodically to the amateur computer hobbyist free of

 charge.  Any commercial usage (electronic or otherwise) is strictly

 prohibited without prior consent of the Editor, and is in violation of

 applicable US Copyright laws. To subscribe, send email to sub@fennec.com



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



 DISCLAIMER AND NOTICE TO DISTRIBUTORS -



 NOTE: This electronic publication is to be distributed free of charge

 without modifications to anyone who wishes to have a copy. Under NO

 circumstances is any issue of this publication, in part or in whole, 

 to be sold for money or services, nor is it to be packaged with other 

 computer software, including, but not limited to CD Rom disks, without 

 the express written or verbal consent of the author and/or editor.

 To obtain permission to distribute this publication under any of the

 certain circumstances stated above, please contact the editor at one of

 the addresses above. If you have intentions of publishing this journal

 in any of the ways described above, or you are in doubt about whether or

 not your intentions conflict with the restrictions, please contact the

 editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com

 This publication is provided without charge to anyone who wants it.

 This includes, but is not limited to lawyers, government officials,

 cops, feds, hackers, social deviants, and computer hobbyists. If anyone

 asks for a copy, please provide them with one, or mail the subscription

 list so that you may be added.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



     THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 3



                          TABLE OF CONTENTS



  1)   Visa Establishes International Consortium...      NewsWire

  2)   Cyberspace Cowboy                                 Maureen Harrington

  3)   A Message From The Vice President                 Al Gore

  4)   Legion Of Doom T-Shirts                           Chris Goggans

  5)   Computers Tnd The Second Amendment                Carl Guderian

  6)   How To Survive The First Year Of Law School..     Mike Godwin

  7)   Notes From Cyberspace - 2nd Edition               Readers

  8)   Editorial Of The Month [A Humorous Diddy]         Marco Landin

  9)   Whitehouse Electronic Publications FAQ            Stanton McCandlish

  10)  Redefining The Modem User                         Ed Cavazos

  11)  Texas ISDN - Request For Comments                 Public Util. Comm.

  12)  Test Scores, Funny, But Makes You Wonder          Anonymous

  13)  An Interview With Tom Jennings                    Jon Lebkowsky

  

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                 J.R. "Bob" Dobbs - The Ultimage SubGenius

                  @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

                  @@@@@@@^^~~~~~~~~~~~~~~~~~~~~^^@@@@@@@@

                  @@@@@@^     ~^  @  @@ @ @ @ I  ~^@@@@@@

                  @@@@@            ~ ~~ ~I          @@@@@

                  @@@@'                  '  _,w@<    @@@@

                  @@@@     @@@@@@@@w___,w@@@@@@@@  @  @@@

                  @@@@     @@@@@@@@@@@@@@@@@@@@@@  I  @@@

                  @@@@     @@@@@@@@@@@@@@@@@@@@*@[ i  @@@

                  @@@@     @@@@@@@@@@@@@@@@@@@@[][ | ]@@@

                  @@@@     ~_,,_ ~@@@@@@@~ ____~ @    @@@

                  @@@@    _~ ,  ,  `@@@~  _  _`@ ]L  J@@@

                  @@@@  , @@w@ww+   @@@ww``,,@w@ ][  @@@@

                  @@@@,  @@@@www@@@ @@@@@@@ww@@@@@[  @@@@

                  @@@@@_|| @@@@@@P' @@P@@@@@@@@@@@[|c@@@@

                  @@@@@@w| '@@P~  P]@@@-~, ~Y@@^'],@@@@@@

                  @@@@@@@[   _        _J@@Tk     ]]@@@@@@

                  @@@@@@@@,@ @@, c,,,,,,,y ,w@@[ ,@@@@@@@

                  @@@@@@@@@ i @w   ====--_@@@@@  @@@@@@@@

                  @@@@@@@@@@`,P~ _ ~^^^^Y@@@@@  @@@@@@@@@

                  @@@@^^=^@@^   ^' ,ww,w@@@@@ _@@@@@@@@@@

                  @@@_xJ~ ~   ,    @@@@@@@P~_@@@@@@@@@@@@

                  @@   @,   ,@@@,_____   _,J@@@@@@@@@@@@@

                  @@L  `' ,@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

                  @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

 

 

 THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - April 30,1994 ISSN 1074-3111

 ============================================================================



 EDITOR'S NOTES:

 

 FREE-NET: I had intended to do some kind of informative article on

 the Free-Net systems around the world for this issue. In my attempts to 

 get information, I mailed about 60 individuals/groups requesting information

 on their organization. I contacted persons in several countries as well as

 many, many people here in the states. ...and low and behold, only 2 people

 responded offering information. Half did not reply at all, and the other

 half (minus the two brave souls mentioned above) replied saying that they

 had not developed an organization, had no info, no volunteers, etc...

 Go figure...(Is Free-Net the Vapor-Ware of the 90's??)



 PUBLISHING:  Our original publishing schedule has gone to hell-in-a-handbasket

 to say the least. We will probably release 2 or 3 times per quarter.



 Order some Legion Of Doom T-Shirts!



 Share this issue with all of the little boys and girls that you know who

 have an e-mail address.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                VISA ESTABLISHES INTERNATIONAL CONSORTIUM FOR 

                     ELECTRONIC PURSE SPECIFICATIONS



 /PRNEWSWIRE (C)opyright 1994



  SAN FRANCISCO, March 22 /PRNewswire/ -- Visa today formed an international

 consortium of market leaders in the consumer payments industry to develop

 common specifications for a new way to pay -- an "Electronic Purse," a card

 with a micro chip that can be used instead of cash and coins for everything

 from vending machines to public transportation.



  The Electronic Purse would consist of a micro-chip embedded in a credit

 card, debit card, or stand alone card to store value electronically.  

 The card would replace cash and coins for small-ticket purchases (less than 

 U.S. $10), such as gasoline stations, pay phones, road/bridge tolls, video 

 games, school cafeterias, fast food restaurants, convenience stores, and 

 cash lanes at supermarkets. Cardholders can "reload" the micro-chip and 

 control the amount of value stored in the card's memory.  The Electronic 

 Purse provides cardholders with the security and convenience of carrying 

 less cash and coins, eliminating the need for exact change.  Many 

 participants in this worldwide effort are currently pilot testing electronic 

 purse products, additional pilots are expected in late 1995.

 

  Joining forces with Visa to develop international technical specifications

 for the Electronic Purse are: Banksys; Electronic Payment Services, Inc.,

 (EPS); Financial Information Systems Center, (FISC); Groupement des Cartes

 Bancaires, (CB); NationsBank Corporation; Sociedad Espanola de Medios de 

 Pago, (SEMP); Sociedade Interbancaria de Servicos, S.A., (SIBS); and 

 Wachovia Corporation.  To ensure worldwide representation, limited additional 

 payment systems that have invested energies in open-market electronic purse 

 projects, will be invited to join.  In addition, Visa will form a parallel 

 group with technology companies to ensure the specifications support low-cost, 

 efficient production of necessary equipment.



  "The goal of our combined efforts is to lead the market into the next

 frontier of payment processing -- the automation of cash and coins," said Ed

 Jensen, president and chief executive officer, Visa International. "The 

 highly complementary capabilities of the participating companies will allow 

 us to address issues for all aspects of smart card-based electronic purse 

 solutions, including the cards themselves, point-of-sale systems, networks 

 and back-end interchange and settlement systems."



  This announcement reflects Visa's commitment to providing superior,

 convenient payment services to its member financial institutions who serve

 consumers and merchants around the globe.  The consortium was formed in

 response to member requests that Visa take the lead in facilitating the

 addition of an electronic purse to existing credit and debit cards, as well 

 as the introduction of a stand alone card.  Visa will leverage its global 

 brand presence by teaming up with strategic partners to develop common 

 standards.

 

  "The most critical step in making this concept a global market reality is

 the definition of open standards that can be shared among all participants,"

 said Wesley Tallman, president, Visa Products and Information Services.

 "Recognizing that important domestic electronic purse developments are

 underway, the consortium will leverage the expertise of all participants.

 Group 'knowledge sharing,' especially with our European participants that 

 have made significant advancements in the chip card arena, will facilitate 

 the development of a specification that is relevant to markets worldwide."

 The technological specifications will govern the standards needed to 

 establish an infrastructure that supports electronic purse payments.



  The worldwide market for automating cash transactions remains virtually

 untapped.  According to the Bank for International Settlement, consumer cash

 transactions in the U.S. alone exceed 300 billion per year.  By contrast,

 bank-facilitated consumer transactions, such as credit and debit cards,

 checks, and wire transfers total only 60 billion per year.  As these figures

 indicate, there is a vast market potential for automating cash transactions.

 "EPS has been investing significant resources to develop smart card solutions

 since 1991," stated David Van Lear, chairman and chief executive officer of

 Electronic Payment Services, Inc.  "Combining the resources of these industry

 leaders will accelerate market acceptance."

 

  Just as the standard operating environments have fueled the growth of the

 personal computer industry, the specifications that emerge from this

 collective effort will provide the essential framework to ensure

 compatibility, reduce development time and cost, and open up the market for

 others.

 

 International payment system participants included in this cooperative

 effort are:



 Banksys -- based in Brussels, Belgium, is a leading European specialist in

 electronic funds transfer (EFT) and payment security. Banksys operates the

 automated teller machine (ATM) and point-of-sale (POS) network on behalf of

 all card issuing banks in Belgium.  Besides Belgium, 10 other countries are

 equipped with the Banksys system. Banksys is entrusted with the development 

 of the Belgian Electronic Purse project, with pilot testing expected to begin 

 in December 1994.

 

 Electronic Payment Services, Inc.(EPS) -- based in Wilmington, Del., is the

 leading electronic funds transfer company in the United States with an annual

 transaction volume of 1.7 billion.  EPS is the holding company for BUYPASS

 Corporation and MONEY ACCESS SERVICE INC., operator of the MAC(R) network.



 Financial Information Systems Center (FISC) -- based in Taipei, Taiwan, is a

 government organization that supports electronic purse initiatives in that

 country.  Through its members, FISC has issued 80 thousand integrated circuit

 cards and has installed more than one thousand point-of-sale systems with

 integrated circuit card readers.

 

 Groupement des Cartes Bancaires (CB) -- based in Paris, is the country's

 payment cards organization that has succeeded in launching the world's 

 largest integrated circuit card program, with more than 22 million cards in

 circulation generating 2.2 billion transactions per year.

 

 NationsBank Corporation -- headquartered in Charlotte, N.C., is the third

 largest banking company in the United States with approximately $158 billion

 in assets, more than 1,900 retail banking centers in nine states and the

 District of Columbia, and consumer offices in 33 states. NationsBank is a

 financial services company providing products and services nationally and

 internationally to individuals, businesses, corporations, institutional

 investors and government agencies.

 

 Sociedad Espanola de Medios de Pago (SEMP) -- based in Madrid, SEMP is a

 sister company of Visa Espana, a group member of Visa banks in Spain.  SEMP

 operates Sermepa, the card processing company of Visa Espana.



 Sociedade Interbancaria de Servicos, S.A., (SIBS) -- based in Lisbon,

 Portugal, is the country's leading bank payments company which provides

 electronic clearing services and operates the national Multibanco ATM and

 EFT/POS networks.  As an extension to its service offerings, SIBS, is

 introducing the Multibanco Electronic Purse, (MEP).

 

 Visa International -- headquartered in the United States, is the world's

 leading consumer payments system with more than 333 million cards issued, 

 more than 11 million acceptance locations, and the largest global ATM 

 network.



 Wachovia Corporation -- with dual headquarters in Atlanta, and

 Winston-Salem, N.C., is one of the United States' leading debit card issuers

 and provides credit card services to three million cardholders nationwide.

 

 /NOTE TO EDITORS:  In December 1993 Visa International, MasterCard

 International and Europay announced an agreement to form a joint working

 group to develop a common set of technical specifications for the 

 integration of microprocessor chips in payment cards -- commonly known  as 

 "Integrated Circuit," "Chip," and "Smart" cards.  The electronic currency 

 specifications referenced in this release will enable the  electronic purse 

 application to be added to the integrated circuit  cards./

 

   /CONTACT:  Albert Coscia of Visa, 415-432-2039/



 03/28 VISA TECHNOLOGY GROUP SUPPORTS ELECTRONIC PURSE SPECIFICATIONS



  SAN FRANCISCO, /PRNewswire/ -- Visa today announced the formation

 of a technology group of international manufacturers to support the 

 adaptation of specifications for a variety of technologies that will 

 facilitate the issuance and acceptance of the "Electronic Purse" -- a payment 

 card that stores value electronically and is designed to replace cash and 

 coins for a wide range of low-value (under U.S. $10) consumer payments.

 

   The technology group will work with Visa who recently formed an

 international consortium of payment systems that will develop common

 specifications for Electronic Purse programs.  Because plans are underway 

 for the card to be used globally in a variety of venues -- including, 

 gas/petrol stations, grocery stores, convenience stores, fast food 

 restaurants, school cafeterias, and for such routine items as telephone calls 

 from pay phones, road/bridge tolls and video games -- a number of 

 technologies required to support card acceptance in global markets will be 

 examined by the group.

 

   The first suppliers to join the international technology group are 

 VeriFone, Inc., the leading global provider of point-of-sale transaction 

 systems, and Gemplus, SCA, the world's leading manufacturer of smart cards.  VeriFone and

 Gemplus have formed a joint venture, called VeriGem, to pursue electronic

 purse opportunities.  To ensure worldwide representation, additional

 technology leaders who have invested energies in electronic purse 

 applications will be invited to join the group.

 

   In addition to acceptance technologies, "loading" systems that enable

 cardholders to restore currency value into the micro chip will also be

 analyzed.  Automated Teller Machines (ATMs) are expected to play an important

 role in loading value into the electronic purse. Future loading methods, such

 as specialized devices located at merchant locations or in the home, will 

 also be explored.  Operating both the largest international consumer payment

 network, VisaNet, and the world's largest ATM network puts Visa in a unique

 position to lead this global effort.

 

   "As with all emerging technologies, consultation with suppliers responsible

 for physically implementing the technology is critical to ensuring the

 viability of the product design," said Wesley Tallman, president, Visa

 Products and Information Services. "As market leaders in the payment systems

 field, all of those who have joined us in this initiative are truly partners

 in paving this 'express lane' of the electronic payment superhighway."

 

   Tallman emphasized that the technology group will be charged with ensuring

 that the specifications developed by the consortium support low-cost,

 efficient production of necessary systems and equipment.

 This group approach has been a key tool in support of Visa's product and

 market development efforts.  In December 1992, Visa formed a manufacturer's

 group to support development efforts for security specifications of 

 integrated circuits on payment cards. Still active today, this group lends 

 critical on-going support and expertise to Visa's chip card efforts.  

 Participants in this international group include: Bull, CPS (France); 

 Gemplus, (France); Giesecke and Devrient (Germany); Schlumberger Industries 

 (France); and Toshiba Corporation (Japan).  Visa expects and welcomes the 

 participation of these and other technology partners in the electronic purse 

 effort.

 

   Hatim Tyabji, chairman, president and chief executive officer of VeriFone,

 agreed with the need for a supplier's group that would lend systems expertise

 to this effort.  "Establishing worldwde specifications is the essential first

 step in the global standardization of the electronic purse, uniting all

 industry participants on a common playing field with a common set of rules.

 The endorsement and support of the electronic purse by Visa, its member banks

 and leading worldwide payment systems send a strong message to the industry 

 -- the electronic purse is no longer merely a possibility, but a real market

 direction," said Tyabji.

 

   "With their high storage capacity, programmability and increasing

 affordability, smart cards are now poised to move beyond specialized

 applications and become a truly universal payment medium," said Dr. Marc

 Lassus, president and chief executive officer of Gemplus.  "We share the

 consortium's vision of the electronic purse, and are excited about helping 

 to bring speed, reliability and efficiency of smart card-based electronic 

 cash to markets around the globe."

 

   Visa International, headquartered in San Francisco, California, is the

 world's leading consumer payments system with more than 333 million cards

 issued, more than 11 million acceptance locations, and the largest global 

 ATM network.



  VeriFone, Inc., based in Redwood City, California, is a leading global

 provider of Transaction Automation solutions used to deliver payment

 processing and other transaction services to various retail market segments,

 as well as the healthcare and government benefits market.  The company has

 more than 30 facilities located throughout Asia, Europe and the United States.

 To date, VeriFone has shipped more than 3.4 million Transaction Automation

 systems, which have been installed in more than 70 countries.  Net revenues 

 in 1993 were U.S. $258.9 million.

 

   Gemplus Card International, based in Gemenos, France, is the leading

 worldwide manufacturer of smart cards.  Gemplus' cards are used for secure

 transactions in public and cellular telephone, banking, pay TV,

 transportation, healthcare and defense applications.  The company has three

 manufacturing facilities: two near Marseilles, France, and one near 

 Stuttgart, Germany.  Current Gemplus production exceeds 14 million cards 

 per month.  The company has direct sales offices in 12 countries and a 

 distribution network covering an additional 50 countries worldwide.  The 

 company's 1993 revenues were U.S. $130 million.

 

   NOTE:  Gemplus is a registered trademark of Gemplus Card International.

 VeriFone is a registered trademark of VeriFone, Inc. Visa is a registered

 trademark of Visa International, Inc.

 

     /NOTE TO EDITORS:  On March 22, 1994, Visa announced the formation of an

 international consortium to develop worldwide technical specifications for 

 the Electronic Purse.  The supplier's group discussed in this release is a

 complementary effort, serving Visa  in a consultative or advisory capacity.

 

   /CONTACT:  Albert Coscia of Visa, 415-432-2039/



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  

                         CYBERSPACE COWBOY



     John Perry Barlow rides the range on the electronic frontier

 

 By Maureen Harrington

 

 PINEDALE WY-  John Perry Barlow isn't exactly your average

 computer big shot.  Burly and bearded, prone to an eccentric mix

 of gaudy cowboy shirts and Italian leather jackets, he's a far

 cry from a pencil neck geek with a pocket protector and a Mensa

 membership.  His interest in technology tends less to megabytes

 than toward souping up the V-8 in his pickup.

 

 But neither is he cut out for a corporate dance card.  Barlow's

 sarcasm would get him tossed out of most boardrooms.

 

 Despite his unusual resume'- lyricist for the Grateful Dead,

 former Students for a Democratic Society organizer with an

 impeccable Republican pedigree, and failed Wyoming cattle rancher

 with the heart of an environmentalist- Barlow, 46, found a niche

 in computers. Accidentally.

 

 He's an outlaw at heart who lost his home on the range and found

 another.  Barlow intends to keep the electronic frontier free of

 rustlers, ruffians and the strong and long arm of the feds.  Just

 as he fought to keep the West free of polluters, developers and

 the strong and long arm of the law.

 

 The computer community has its first cultural historian, critic

 and social activist.  Barlow has set out to watchdog the goings

 on in cyberspace- the intangible place between the computer key

 board and the dots that appear on the computer screen.

 

 He's become, by dint of his megaverbal skills and nontechnical

 point of view, the cowboy conscience of the computer culture. 

 He's regarded by computer CEO's, journalists who follow the

 industry and the wildcatters who swoop through systems as the man

 to ask about the future of technology.

 

 Barlow not only writes and speaks about the future that is racing

 down the information highway, he puts his talent where his mouth

 is: he helped found the Electronic Frontier Foundation (EFF) in

 1991, along with Mitch Kapor, inventor of Lotus 1-2-3, the best-

 selling spreadsheet software in the world and with an assist from

 Steve Wozniak, Apple computer's onetime whiz kid.

 

 Kapor and Barlow started the foundation to protect the right to

 privacy in cyberspace.  They had both been visited by federal

 agents looking for the second-story men of the computer industry-

 hackers.  They became alarmed.

 

 The tale of Kapor and Barlow's friendship has become one of the

 first cyberspace legends.

 

 "I was sitting here in Pindale, enjoying this new found world on

 my computer, when an FBI agent shows up asking me what I might be

 doing on it," said Barlow.

 

 At the time, Barlow was unaware of a growing government concern

 about what they considered computer crimes of the most heinous

 nature.

 

 "A nice guy, but he was expert in cattle rustling, not in high-

 tech crime," recalled Barlow.  "I tried to explain it to him, but

 he didn't really understand computers.  He went on back to the

 office."

 

 Barlow got on the techies' horn- the WELL, a computer bulletin

 board- and alerted users all over the country to what happened. 

 In Connecticut, at about the same time, Kapor also  had been 

 visited by the feds.  Like Barlow, Kapor was concerned about

 government invasion in this newly forming world.

 

 He and Barlow got together via computers, naturally.  Later

 Kapor, on the way to the West Coast from his home on the East

 Coast, dropped into Wyoming in his private jet to talk with

 Barlow.

 

 As Barlow tells it, "Here we are two very different guys- one

 from Long Island, who has been a leader in this field for years

 and me, a small town Wyoming rancher who just figured out how to

 turn these things on.  I felt like I'd known Mitch all my life."

 

 In a few hours at a kitchen table in Wyoming, the two men

 conceived the first civil rights group for high-tech's new age.

 

 EFF, now headquartered in Washington, D.C., raises money for

 lobbying and provides funds for the defense of so-called

 "computer criminals."  Their first projects were helping with the

 legal defense of hackers who the founders don't think deserved

 such harsh treatment by the feds.

 

 "Oh, hell, these were kids mostly," said Barlow.  "Just fooling

 around.  They were being treated like major criminals.  This

 hacking is a lot like boys going out to abandoned buildings and

 looking around.  Yeah, the property owners don't like it, but

 it's part of a boy's life as far as I can tell."

 

 Barlow and Kapor have been bitterly criticized for their support

 of what many in corporate America- the software and telephone

 companies, in particular- say are serious criminals.

 

 Barlow takes that into consideration: "Crimes should be

 prosecuted.  There are some real bad things being done on these

 machines.  But that doesn't mean that we shouldn't be watching

 out for misuse of  (government) power and helping to protect the

 innocent.  We're into educating people about this stuff, as much

 as anything."

                          -----------

 

 Barlow doesn't fit, by nature or training, into either the

 techno-wonk category or the big money elite that has developed

 around the technology.  Nonetheless, both factions of the

 computer culture listen to him.

 

 He's preaching the sermon of change, from his high-tech pulpit:

 the computer bulletin board.  Barlow can be read on The WELL (one

 of the first and largest bulletin boards) as well as in the op-ed

 pages of the New York Times and the slick computer-lifestyle

 magazines, Wired and Mondo 2000.

 

 He's been profiled in the New York Times and quoted as an expert

 on the computer culture in scores of newspapers and

 newsmagazines.  Remarkably, Barlow had never used a computer

 until four years ago.  He caught on fast.

 

 "Oh, Jesus," he said, rolling his eyes, impatient with ordinary

 definitions of jobs.  "I'm a techno-crank.  I've got all kinds of

 hats on and most of them don't fit exactly.  But let's just say I

 came into computers late, but I was able to see fairly quickly

 some of the possibilities and problems of this new reality.

 

 "I got my first computer to do some of the accounting work for

 the ranch (The Bar Cross, outside Pinedale), in the late '80's. 

 I discovered that you could talk to people on it.  I got

 fascinated."

 

 "Fascinated," for most of us, constitutes a hobby.

 

 For Barlow, fascination turned into a new career.  Caught in the

 double bind of rising taxes and expenses and lower prices for

 cattle, Barlow had to sell the Bar Cross, which had been in the

 family for three generations.  Just as that part of his life was

 ending, he was catapulted into cyberspace.  And his future.

 

 Barlow is one of the few nontechnoids who has caught the

 attention of the citizenry of cyberspace.  In fact, he was the

 first to co-opt the word "cyberspace" from sci-fi novelist

 William Gibson and use it in everyday language.

 

 According to Bruce Sterling, a journalist, novelist and

 accomplished chronicler of computer culture, "Barlow saw that the

 world of electronic communications, now made visible through the

 computer screen, could no longer be regarded as just a tangle of

 high-tech wiring.  Instead it had become a place, cyberspace,

 which demanded a new set of metaphors, a new set of rules and

 behaviors."

 

 Sitting in his mothers home in Pinedale, wearing a short kimono

 over jeans and boots, Barlow had been on the phone, fax and modem

 all morning.  Mim Barlow, from whom he inherited his

 conversational skills, was decked out in bright red lipstick and

 matching rhinestone earrings.

 

 She has no problem, pointing out that although her son "was a

 brilliant child- quite interesting to raise- I thought for sure

 he was doomed.

 

 "His father and grandfather were alcoholics, and he was going

 down the same road."

 

 Barlow no longer drinks.

 

 "Hell, he was headed for juvenile delinquency," said Mim Barlow.

 "No question.

 

 "We got him out of town.  Sent him to Fountain Valley, a prep

 school outside of Colorado Springs.  Best thing that ever

 happened to this town."

 

 The best thing that happened to her son, too, he freely admitted:

 

 "I'm forever in debt to that school.  It saved me.  I hope my

 three girls will be able to go there, if I can afford it."

 

 (Barlow is divorced from his wife Elaine, who remains in Pinedale

 with their three children.  Barlow commutes between Wyoming and

 New York City.  He serves on the board of Fountain Valley.)

 

 Barlow met his fate at prep school: Bob Weir, a co-founder of the

 Grateful Dead and life-long friend.  Barlow has been writing for

 the Grateful Dead since 1970, including the lyrics for "Hell In a

 Bucket," "Picasso Moon," and "I need a Miracle."  The royalties

 kept the family ranch afloat for years and pay Barlow's bills

 now.

 

 "There's a resurgence in interest in the band and I'm actually

 picking up the pace a little," said Barlow.

 

 "You know I saw Bobby Weir last year," interjected Barlow's

 eighty something mother.  "He didn't look so good.

 

 "This one," she nodded at her son like he's a questionable head

 of beef, "looks better."

 

 Barlow shot his mother a look of mild disgust.  "Hell, Ma, Bob's

 had a *life*.  It shows, that's all."

 

 Barlow has had quite a life, too.

 

 After graduating from Wesleyan University in Connecticut, he was

 swept into the counterculture.  He went to India.  Rode

 motorcycles around Europe and was in and out of Haight-Ashbury. 

 He wandered back to the United States, in the early '70's, and

 was headed to Hollywood for a job, when he stopped at the family

 ranch on the way to Glamourville.  He didn't get out of Wyoming.

 

 "The ranch was in a mess.  My dad had been sick.  We were in

 debt.  I found something I could put my hand to.  I was a hippie

 that was running cattle and trying to keep the land.  I got

 married and had kids."

 

 Along the way, true to his deep Republican roots, he became an

 activist.  Two generations of Barlows were in the Wyoming Senate. 

 John Perry may have gotten there too, but he narrowly missed

 winning a Senate seat in 1987 running as a Republican.

 

 Instead, he became involved in the small town life.  He set out

 to protect that way of life by becoming an environmentalist-

 rancher, which is considered a bit of an oxymoron in the West. 

 But environmentalism is, in Barlow's estimation, "inevitable. 

 You've got to conserve the land."

 

 The loss of his land still rankles.  Driving through the Bar

 Cross acreage, now owned, as many ranches around Pinedale are, by

 a wealthy "weekend rancher," Barlow tightens up a little:  "I did

 the best I could.  I just couldn't make a go of it."

 

 Barlow sold his land at, "about break-even."

 

 He's been living mostly in New York for the past several years,

 writing for various magazines and becoming more and more famous

 on the electronic grapevine.  He travels constantly and is as

 provocative a speaker as he is writer.  While his income is still

 largely from royalties, he's commanding more attention and fees

 as a speaker.  He's spoken in China to a scientific congress and

 has been asked to help explain the future of information to the

 CIA.

 

 Barlow doesn't find that such an odd task for a social activist:

 "Like so many organizations, the CIA is waking up to the fact

 that they know nothing about this technology.  And, they are

 realizing that if they don't know about the revolution in

 information, they will be left behind.

 

 "People who don't accept this change are going to be left behind. 

 What we once thought of as power and wealth is changing.  Who's

 in charge is changing."

 

 Barlow's business card may say it all:  There are nine phone,

 fax, modem, and beeper numbers.  Under his name, his title reads,

 "cognitive dissident."

 

 In a new book, "The Hacker Crackdown: Law and Disorder on the

 Electronic Frontier" (Bantam $23), Sterling calls Barlow, "a

 computer networker of truly stellar brilliance.  He has a poet's

 gift of concise, colorful phrasing.  He also has a journalist's

 shrewdness, an off-the-wall, self deprecating wit and a

 phenomenal wealth of simple personal charm."

 

 Sterling adds that Barlow is "a gifted critic...who coins the

 catchphrases and the terms of debate that become the common

 currency of the period."

 

 John Perry Barlow has become the poet laureate of technologies

 new age.

 

 He's the hackers' hero- patrolling the borders of the newly

 discovered frontiers of technology.  If anyone is going to

 explain the social, legal and personal implications of all the

 megachange coming down the high-tech pike, it's Barlow.

 

 As he has written in the latest edition of Wired:  "In the little

 hick town I come from, they don't give you much credit for just

 having ideas.  You are judged by what you make of them."

 

 Using that criterion, Barlow may just have a future in

 cyberspace.

 

 *** Maureen Harrington is a Denver Post staff writer. ***  



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                    A MESSAGE FROM THE VICE PRESIDENT

                        ON NETWORK ACCESS REFORM

  

 By Al Gore (vice.president@whitehouse.gov)

 

 Greetings.  I'll leave it to others to carry on the important work

 former president Clinton started in health care reform after discovering

 that 37 million Americans have no health insurance.

 

 Now that Clinton has magnanimously stepped down, rather than embroil the

 US in lengthy Whitewater hearings, and I'm president, I plan to make it

 my top priority to deal with a really serious problem.  As horrifying

 and unthinkable as it is in this day and age, 212 million Americans

 don't have network access.

 

 The current network situation is an intolerable and inefficient

 hodgepodge of private, university, and government access providers.

 People in different parts of the country pay different amounts for

 network access.  Different providers give different levels of service.

 There's no excuse for this.  Access to the net -- *equal* access to the

 net -- is a fundamental human right.

 

 Tipper and I have developed a program which will guarantee equal access

 to the information superhighway to all Americans, tall or poor, rich or

 thin, white or non-smokers.

 

 All access to the net will be through one's employer.  Employers will

 deal only with large centralized network access providers.  There will

 be only one provider in each area of the country, cutting down on

 wasteful duplication.  All providers will be heavily regulated, and

 will be required to offer the exact same services for the exact same

 prices.  All employers will be required to participate, and to pay the

 full costs.

 

 Unemployed people's access will be paid for by the government.  This

 is not expected to require any tax increase.  At least, not a very large

 tax increase.  At least, not before the next election.

 

 Since individuals will not be charged for the services, some may be

 tempted to abuse the privilege.  Especially because many newsgroups are

 known to be highly addictive.  To prevent this, newsgroup access will be

 available only by prescription.

 

 For instance, if someone wants access to alt.sex, they would schedule

 an appointment with their Primary Network Consultant.  In a few weeks,

 when the appointment comes up, they'd come in at 8 am and get to speak

 briefly with their Consultant at some time that day or evening.  The

 Consultant would refer them to a sex consulatant or other specialist,

 as appropriate.  After a few weeks, they'd have a similar appointment

 with the specialist, who would then prescribe alt.sex or some other

 newsgroup as appropriate.  They would take the prescription to their

 Network Access Provider to get the prescribed newsgroup added to their

 .newsrc.  To prevent fraud and corruption, all prescriptions will be

 carefully tracked by the government in large databases, closely secured

 against everyone who doesn't have the carefully guarded top secret

 phone number for modem access (202-456-1414).  Also, all prescriptions

 automatically expire after 30 days.  They can be renewed only after

 another appointment with one's Primary Network Consultant and the

 specialist he refers one to.

 

 FTP, IRC, Gopher, WAIS, World Wide Web, Archie, telnet, rlogin, finger,

 and e-mail, may also be made available by prescription, if they are

 approved by the Federal Data Administration (FDA).  For reasons of

 public safety, network services and newsgroups not approved by the

 FDA will be strictly banned.  Anyone caught owning, using, producing,

 providing, or advocating unapproved services, mailing lists, or

 newsgroups, will be subject to zero tolerance -- everything they

 own will be forfeited to the government, without a trial.

 

 Also, anyone who rents an apartment or gives a job to a suspected

 network abuser will be subject to zero tolerance.  Of course, this

 being a free country, nobody will actually be sent to prison without

 a fair trial.  Since nobody who's accused will be able to afford an

 attorney, the government will provide them with an attorney of our

 choice without charge.  And anyone guilty of three offenses will serve

 a mandatory life sentence without parole.

 

 Similarly with anyone who writes, posesses, distributes, manufactures,

 sells, uses, posts, backs up, saves, promulgates, perpetrates, forwards,

 or laughs at, a spoof that makes official government policies or

 proposals look ridiculous.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                        LEGION OF DOOM T-SHIRTS!! 



 By Chris Goggans <phrack@well.sf.ca.us>



 After a complete sellout at HoHo Con 1993 in Austin, TX this past

 December, the official Legion of Doom t-shirts are available

 once again.  Join the net luminaries world-wide in owning one of

 these amazing shirts.  Impress members of the opposite sex, increase

 your IQ, annoy system administrators, get raided by the government and

 lose your wardrobe!

 

 Can a t-shirt really do all this?  Of course it can!

 

------------

 

 "THE HACKER WAR  --  LOD vs MOD"

 

 This t-shirt chronicles the infamous "Hacker War" between rival

 groups The Legion of Doom and  The Masters of Destruction.  The front

 of the shirt displays a flight map of the various battle-sites

 hit by MOD and tracked by LOD.  The back of the shirt

 has a detailed timeline of the key dates in the conflict, and

 a rather ironic quote from an MOD member.

 

 (For a limited time, the original is back!)

 

 "LEGION OF DOOM  --  INTERNET WORLD TOUR"

 

 The front of this classic shirt displays "Legion of Doom Internet World

 Tour" as well as a sword and telephone intersecting the planet

 earth, skull-and-crossbones style.  The back displays the

 words "Hacking for Jesus" as well as a substantial list of "tour-stops"

 (internet sites) and a quote from Aleister Crowley.

 

 All t-shirts are sized XL, and are 100% cotton.

 

 Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for

 postage.

 

 Send checks or money orders.  Please, no credit cards, even if

 it's really your card.

 

 

  Name:       __________________________________________________

 

  Address:    __________________________________________________

 

  City, State, Zip:   __________________________________________

 

 

  I want ____ "Hacker War" shirt(s)

 

  I want ____ "Internet World Tour" shirt(s)

 

  Enclosed is $______ for the total cost.

 

 

     Mail to:   Chris Goggans

                603 W. 13th #1A-278

                Austin, TX 78701

 

  These T-shirts are sold only as a novelty items, and are in no way

  attempting to glorify computer crime.

  

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



            Computers and the Second Amendment: An Opening Volley



 By Carl Guderian (bjacques@cypher.com)

 

     A friend and I were talking the other night about needing to defend

 oneself against one's own government. He was talking about guns; I was

 talking about encryption. We were talking about the same thing. I read a lot

 of debates in which the arguments for restricting computing are strikingly

 similar to those for gun control. Am I the only one who sees the parallels?

 It's certainly forced me to take another look at the gun issue.



     The last few years have given us all an appreciation for the

 Constitution, or what's left of it. Most of the action in the personal

 computer user community is centered around the First Amendment, particularly

 the rights to free expression and peaceable assembly. We've also had our

 noses rubbed in official disregard for the Fourth, Fifth, and Sixth

 Amendments. All of this has been (and is still being) discussed elsewhere.

 Tonight's topic is the Second Amendment, the people's right to keep and bear

 arms (a well regulated militia being essential to the security of a free

 state), in relation to personal computers and private networks.



      Until recently, I didn't give much thought to the gun issue, since I

 don't own a gun and probably won't be getting one anytime soon. Unless I

 move to Arizona, I can't pack heat everywhere I go, so I probably won't

 have a shooting iron handy when I really need it to shoo away a mugger if I

 run into one. The best way for me to win such an encounter is to prevent it

 from ever taking place. According to Sun Tzu, a battle is won or lost

 before it is ever fought. I don't hide out in the suburbs, but I don't

 stroll down Main at midnight with my wallet hanging around my neck, either.

 Weapons are better than nakedness, but wits are better than

 both. The existence of priests and businessmen proves it. So much for that.



     Freedom of computing, it now turns out, has a lot in common with the

 citizen's right to own a gun. Both rights are being attacked in a similar

 manner.



     Proponents of restrictions love to wave a bogeyman in our faces to get

 us to blindly go along with their hastily cooked-up bills. George Hennard

 helped a bill restricting "assault" weapons get more attention than it

 deserved. Likewise, Sen. Joe Biden touts Senate Bill 266 as protection from

 crazed hackers who might trigger World War III or, worse, steal corporate

 secrets and sell them to the Japanese. And let's not forget the drug

 kingpins who might keep their communications secret from the Law. As a law-

 abiding citizen, you've got nothing to hide so this doesn't affect you

 <grin>.



     S.B. 266 essentially mandates a government backdoor into any encryption

 scheme marketed for public use. Secrecy becomes the exclusive domain of the

 government and its partners, such as corporations doing work of vital

 military or economic importance. The rest of us have to endure possible

 casual surveillance or be proscribed for daring to keep secrets from Uncle

 Sam.



     Not just no, but No, Goddammit! Privacy is scarce enough as it is.

 Every day my file gets passed around the federal and corporate nets like a

 cheerleader at a frat party. Cheap, widespread encryption is one of the few

 physical methods available for enforcing privacy, just as in the private

 ownership of guns kept the government honest in the past. Encryption is a

 window blind pulled down in the face of the hotel dick.



     "A well-regulated militia necessary to the security of a free State,

 the right of the people to keep and bear arms, shall not be infringed."



     Historically, citizen ownership of guns has been useful for repelling

 invaders, enforcing Manifest Destiny, and keeping central government from

 getting too many ideas about control. There have been some problems in the

 past. The Whiskey Rebellion, Shays' Rebellion, and Quantrill's Raiders spring

 to mind, but no one has seriously considered disposing of the Second

 Amendment.  The last real invasion was in 1815 and we've killed off most of

 the Indians, so what does that leave?

 

     Guns in the house are no match for a government determined to do you

 ill (though they may slow down a death squad). That's probably why

 Republicans can lust for control over everyone else yet fight gun control.

 Even the Tuff-On-Crime bill making it's way through the pipeline has no real

 provision for gun control (it may, however, okay warrantless searches made

 in "good faith" and further weaken habeas corpus). Republicans know as well

 as anyone else that guns are small potatoes when someone else has all the

 money and information.



     Rights, even those guaranteed by the Constitution, are really

 guaranteed only to the extent that they are hard for a government to

 violate. Early Americans were either well-armed or westward bo

 und, qualities needed in citizens opening a new frontier. However, the 1900 

 census found America with no more frontiers; there was no more West to go to. 

 The previous census, in 1890, was the first automated census, using punched

 Hollerith cards to perform a ten-year job in six weeks. For the first time,

 the government could use machines to track its citizens' movements. Control

 began where the frontier ended. Modern American history has been a running

 battle between individual rights and government control.



     Cheap, widely available data encryption is one of two new developments

 that are tipping the scales in the citizen's favor. Explosive growth of

 computer network use (the number of Internet users grew by 90% last year) is

 the other, enabling small groups to get the political jump on big ones by

 getting vital information over the wire quickly to just about anyone who

 needs it. Data encryption enforces privacy by keeping your e-mail from

 prying eyes. It represents the first physical 

 means of keeping the Fed's nose out of your private business.



      It's too bad encryption is not widely used outside of businesses.

 Because so few people use encryption, agencies such as the NSA have an easy

 job of spying on American citizens. I'm not giving away any secrets, but

 here is how I would do it. Though it's theoretically possible to parse

 every phone conversation and data transmission, doing so is a waste of

 resources.  Profiling and other tools tell an agency which 10% of the



 population is the real threat (90% of the threat comes from 10% of the

 population).  Encryption used by other than corporations and government

 agencies is considered suspect and bears cracking by agency supercomputers.

 Fortunately for the NSA, unofficial secure traffic is not very large.

 However, this could change if, say , companies marketed secure

 communications as an alternative to the postal system (Feds can't open your

 e-mail, but you can't fax drugs eitherDlife is full of tradeoffs), or



 Americans started using encryption as a matter of course just because it's

 s imply none of the government's damned business what a private citizen

 does if he or she is not the subject of an actual criminal investigation

 (instead of a fishing expedition). Either or both of these developments

 would severely tax the government's ability to casually spy on its own

 people. It might even force the Feds to wonder if it's really worth it.

 Maybe.



     A problem with encryption is that there are very few good schemes out 

 there.  The DES algorithm is best known, but it was created by the NSA. No

 comment. The RSA (Rivest-Shamir-Adelman) algorithm is superior to DES, but

 MIT owns it and licenses cost money (DES is free). There is supposed to be 

 a freeware package based on or comparable to RSA, but it could also be NSA

 suckerware.  It's easy to get paranoid about this. A bigger problem with

 encryption is that most Americans don't value privacy enough to make the

 extra effort to secure their communications.



      The government may or may not be systematically running small networks

 and bbs's out of business by busting them right and left. That's open to

 debate.  The No Such Agency is almost certainly tapping their lines,

 though. In the short term, it would be stupid not to. That is its job. In

 the long run, though, this speeds the collapse of the Republic by dangerously 

 concentrating power.



     Power tends to accumulate. The more power one group has, the more it

 can get. Eventually, one group gets too much of it and spends most of its

 time securing it at the expense of others, whether it needs to or not

 (eventually it needs to). The firs t impulse of one of the other groups is

 to usurp the power from the first group, all with the highest of motives, of

 course. This leads to exactly the same problems. The only way to prevent an

 endless succession of power grabs is to disperse power as widely as

 possible, among people interested in limiting it for everyone. This is where

 checks and balances come in. "All power to the people (soviets)" is a

 disastrous substitute, as (thankfully) other people learned in 1798 and

 1917. All of this is explained at length and more clearly in On Power: Its

 Nature and the History of its Growth, by Bertrand de Jouvenel (Viking Press,

 New York, 1949).  The book is long out of print, but it's well worth your

 while to check it out and photocopy it somewhere. Other good references

 include Democracy in America (1835) and The Old Regime and the 

 French Revolution (1856), both written by Alexis de Tocqueville. You can find 

 those at a used bookstore.



     Theory aside, it can be shown that a people completely dependent on

 their government for security lose their ability to come to that

 government's aid in times of external danger. At that time, the people

 further drain those resources by requiring protection from themselves. The

 less capable a people become, the more fearful they get, eventually voting

 in a police state. Hitler was elected.



     Computer users face similar dangers. Additionally, economics play a

 large role. A person with a computer is a nearly self-sufficient engine of

 wealth.  Economic competition is constant. Denial of personal rights to

 privacy of information removes the individual's ability to protect an idea

 before bringing it to the market. Computer users are thus unable to create.

 All they can do is consume or, at best, labor for someone else.

 Entrepreneurs and small business owners, both key agents of pr

 ogress , are effectively locked out. A nation of employees economically 

 dependent on bosses is an economic nonstarter. Freedom of  computer use and 

 the right to privacy are thus essential to the economic security of a free 

 state.



     The kind of power bestowed by guns, personal computers and absolute

 data privacy implies a need for a personal sense of responsibility. Both

 viruses and encryption programs are far easier to make and distribute than

 plastic Glock-11 automatic pistols. Some sort of regulation is required.

 This is where the "well-regulated militia" part of the Second Amendment

 comes in and this is the most difficult part of the issue.



      My definition of a "well-regulated militia" falls somewhere between

 the NRA and the National Guard. If there were an NRA for computer network

 users I'd probably be in it. I think the stakes are higher with computers

 than they are with guns. I want to see more people with computers and

 modems, to ensure the widest possible dispersal of computing power. For

 this to work, all users should be made aware of the power and

 responsibility of owning a computer ("Only a madman would give a loaded

 revolver to an idiot"DFredric Brown). If there are kids in the house, they

 must be taught to respect guns and computers as early as possible. In a

 well-defended, well-connected house, one can live without fear. Only then

 can a citizen look past the distracting horrorshows put on by the

 politicians and pundits to hide the real issues. Who will see to it that

 responsibilities accompany rights?  Part of the answer, believe it or not

 comes from the government. Laws already exist to cover most serious crimes

 committed with a computer.



     Where the law is insufficient, professional/lobbying groups such as the

 Electronic Frontier Foundation, the Computer Professionals for Social

 Responsibility, and the Association for Computing Machinery are helping to

 draw up new laws to deal with new kinds of crimes. It's early in the game,

 but the above organizations seem to be working for fairness.



     For the control addicts in government, this may not be enough. Tough.

 Computer user organizations are working hard to approach government the way

 we all were taught to do it in high school civics, and they seem to be

 making it work. Can the EFF, CPSR, or the ACM control hackers? Of course

 not.  That's what the law is for (demographics suggest that the rapid growth

 of network use will not be accompanied by an equally rapid rise in hacking

 incidents. The hacking scene is maturing with the rest of the population.

 Most hacker heroes are born-again capitalists who might make even better

 role models as long as they don't forget where they came from).

 

     Computer user groups educate while seeking to disperse power, which the

 NRA also does to some extent. The EFF especially tries to reach out to

 potential allies by demystifying computer technology for nonusers and even

 the cops.  Let's face itDthe nervous man with the gun is not going to go

 away, so we might as well try to calm him down a little.



     Finally, computer network users have their talents to use as

 negotiating chips. A government that refuses to respect their rights will

 lose their economic cooperation. The network-based economy makes an Atlas

 Shrugged-style withdrawal very feasible. The government will have its

 illusion of control while computer users work ordinary jobs while

 moonlighting in the Netherlands and piling up ones and zeroes (Swiss francs)

 in Brunei, all in the comfort of one's suburban home. The result will be an

 Italian-style economyDlackluster on the surface and lively underground.

 Germany lost the A-bomb by chasing out a half-dozen geniuses in the

 Thirties. If America wants to be a player in the global economic contest, it

 needs to treat its citizens with respect.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



               HOW TO SURVIVE THE FIRST YEAR OF LAW SCHOOL

                       AT THE UNIVERSITY OF TEXAS



 by Mike Godwin (mnemonic@eff.org)



 (Copyright 1988,1992. This article may be freely distributed on any

 computer forum, including commercial online services. To reproduce it

 in print or in any other non-computer medium, please seek permission

 from the author.)



 You went to a decent college, you scored well on your Law School

 Admission Test, and you ranked in the top 10 percent of your class.  So,

 now that you're here at The University of Texas School of Law, you can

 look forward to an unbroken string of acadernic successes, right?



 Not so fast. No matter how easy you found undergraduate school to be,

 law school is a different story. And the sooner you learn that, the

 better your chances of coming out of the law-school game a winner.



 First, disabuse yourself of any notions about your natural academic

 superiority. Sure, you're good, but so is everyone else in your class.

 And since everyone is graded against everyone else on a curve, the

 chances are nine out of 10 that you'll be in the bottom 90 percent of

 your class, regardless of your undergraduate performance.

  

 This means that law-school success doesn't come merely from knowing the

 law; you have to know it better than most of your peers.  So you can't

 be complacent.

 

 If you start heeding the following hints early in your first semester,

 they'll improve your chances of hot job offers...and maybe even an

 editorship on the law review.

 

 Class Participation

 

 If you saw the movie "The Paper Chase" (and odds are that you did, or

 you wouldn't be here), you probably know that large classes in law

 school normally are run by "the Socratic method."  Rather than

 lecturing, the professor will assign some reading for the day and

 conduct the class by asking students questions about the material.

 

 Watching the movie, you probably got the impression that the best 

 law students are those who are eager and able to answer the 

 professor's questions.  Don't be fooled.  Glibness and self-possession 

 in class are only roughly correlated to exam performance, and your 

 grades are based almost entirely on final exams, not on your 

 quickness in the classroom.  Because the finals are graded 

 anonymously, the professor won't even be able to link your 

 classroom participation with the exam.

 

 It's far wiser to spend your time mastering the principles behind 

 each case you read rather than memorizing its facts.  If you try the 

 latter tactic, your brain will be too muddled with facts at exam time 

 to allow you to apply the law.  Don't worry about the inevitable 

 instances in which a professor tries to embarass you for knowing 

 less than he does.  (I refer to the professor as "he" because almost all 

 UT law professors are male.  Most are white, too).  You can get your 

 revenge by earning an honors grade in the course.

 

 Class Preparation

 

 Keep up with the assigned reading.  Onerous though the reading may 

 be, it's easier to keep up than to catch up.  And reading the cases for 

 the day will enable you to answer most of the questions any 

 professor tries to throw at you.

 

 If for some reason you do get behind on the reading, however, don't 

 panic.  This happens to some of the best law students.  Attend class 

 anyway, even if you haven't read that day's class materials.  The 

 professor's Socratic questions will clue you in to the issues he expects 

 you to know for the exam.

 

 Professors

 

 Some law professors are frightening; others are charming.  

 Ultimately, however, their personalities don't matter very much.  

 Whether he likes you or not, each professor will grade your exam 

 according to the curve.  There's no such thing as an "easy" law course, 

 although you may find some lectures more tolerable than oothers.  If 

 the material is easy for you, it may well be easy for everybody, so the 

 curve can get you anyway.

 

 While some law professors make a pretense of keeping office hours, 

 most of them don't really want to see you outside the classroom, a 

 milieu they prefer because that's where they have all the control.  

 Any question you want to ask a professor probably can be answered 

 by a "hornbook" (legal treatise) anyway, and library is full of 

 hornbooks.

 

 Don't expect too much sympathy from your professors.  After all, law 

 school is a game they've *won.*  They may have some sort of abstract 

 pity for the poor contracts student who's agonizing over Sec. 2-207 of

 the Uniform Commercial Code, but under no cirumstances will you be able to 

 persuade them to change your grade.

 

 Briefing your cases

 

 The rule here is "Condense, condense, condense." Nothing's more 

 pathetic than the law nerd whose brief is longer than the case 

 excerpt in the casebook. Remember this rule: Each case has one or 

 two main ideas. Find them, and you'll have what you need to know 

 for the exam.

 

 And good, *brief* briefs can be easily incorporated in your study 

 outline.

 

 Some professors like to ask tricky questions about the fact pattern of 

 a case during the lecture, but don't write these details down.

 

 Instead, make notes in the margin or highlight key facts of your 

 casebook. If you've read the case, you should be able to remember 

 the facts long enough to get through the class period. And if the

 professor stresses a particular type of fact pattern in the lecture,

 he's signalling to you a possible exam issue. Note the issue, not the

 facts of the particular case.

 

 Buying study aids

 

 Basically, there are two types of study aids you can buy for first-

 year courses: commercial outlines and hornbooks. A commercial 

 outline is a prepackaged, detailed skeleton of the material you

 need to know for a particular course. There are several brands of 

 outlines, and each has something to recommend it. The Legalines 

 outlines track particular casebooks, while the Emanuel Law Outlines 

 and Gilbert Law Summaries are more general, although they will 

 include many of the cases in your casebook.

 

 You may find it best to buy Legalines outlines for each of your 

 courses except contracts. (The UT professors who wrote the contracts 

 casebook designed it in a way that makes it difficult to produce a 

 commercial outline for it.) Then you can supplement the Legalines 

 with general-purpose outlines like Emanuel's and Gilbert's for 

 courses you're having trouble with. Be aware that occasionally the case

 summaries and discussions in the commercial outlines are *mistaken*--

 let your professor and your classmates supplement your take on a given

 case or issue.

 

 Some students buy "hornbooks" for particular 

 subjects, but for a first-year student the treatises often go into too 

 much unnecessary detail. Theyre also very expensive, and in general 

 it's best not to buy them; but you may want to make an exception for 

 contracts, which many students find a particularly subtle and 

 difficult branch of law. The Calamari and Perillo hornbook is good for 

 general contract law, while the White and Summers hornbook is 

 necessary for a thorough understanding of the parts of your 

 contracts course that deal with the Uniform Commercial Code. You 

 may also want to consult UT Professor Charles Alan Wright's treatise 

 on the law of federal courts for your civil-procedure class.

 Finally, if you signed up early for a bar-review course (believe it

 or not, some people do this during their first year), some bar-review

 courses will allow you to "check out" their reviews of black-letter 

 law.

 

 Study Groups

 

 Try to get into one. When you find a likely group, make sure that 

 most of the people in the group are dedicated enough to stick with it. 

 Discussing difficult ideas with other law students is a good way of 

 making sure you understand them. In general, study groups work 

 best with about five people, with each person concentrating on one of 

 the five first-year courses you'll be taking each semester. If you 

 have a choice about which course to concentrate on, choose the 

 course you think you'll find most difficult; your responsibility to 

 your friends in the study group will give you an added incentive to 

 master that material.

 

 Computers

 

 Buy a computer--you can purchase them at near-wholesale cost at 

 the Texas Union MicroCenter on 21st Street. Only if you own a 

 computer will you be able to produce and edit a legible course outline 

 in a hurry.  You'll need two types of software:  a good word 

 processing program to help you with the briefs and memos you have 

 to produce for your legal research and writing seminar, and an 

 outline program to produce the course outlines you'll need for exams.  

 (Some word processors include outlining capability--in general, those

 word processors are not as good at outlining as programs designed for just

 that purpose.)

 

 If you buy a Macintosh, the outlining software of choice is MORE; if you

 own an IBM PC, buy Thinktank or Grandview.. Both products are available

 at local computer stores.

 

 Exam-taking strategy

 

 Your heart's beating rapidly, your palms are sweaty, and your mind is a

 blank.  Yes, you're taking your first law-school exam. How on earth do

 you handle those exam questions?

 

 The first thing to remember is that all law-exam questions are more or

 less alike. Each describes an invented and often quite complex situation

 that, had it occurred in real life, would probably generate one or more

 lawsuits. Following the fact situation is usually a question or

 instruction such as "Describe the potential legal claims and liabilities

 of each party."

 

 Your best strategy, when you outline your answer, is to pretend you're

 the lawyer for each party in turn.  Pretending to be Smith's lawyer,

 quickly list all the legal principles from your course outline that

 could advance Smith's case against Jones. Now play the part of Jones'

 lawyer how would you answer each of these legal arguments or claims? What

 counterclaims could you use against Smith? What will Smith say in

 response to your responses? What other parties in the fact situation

 could sue or be sued? And so on.

 

 Inevitably, you'll see some obvious legal issues in the fact pattern.

 You have to deal with them, of course, but don't make the fatal mistake

 of assuming that by handling the obvious or major issues you've written

 a good exam answer. After all, your peers probably share your gift for

 seeing the obvious.

 

 So, how do you make sure you catch the subtle issues as well as the

 straightforward ones? When you're preparing for the exam, condense your

 outline into a checklist of one- or two-word shorthand expressions for

 legal principles.  Memorize the checklist, and recite it in your head

 each time you pretend to be the attorney for one of the parties. (Better

 yet--write it down on your scratch paper at the beginning of your exam

 as soon as you're allowed to start writing, before you even read the

 first question.  The checklist will remind you of issues you'd otherwise

 overlook.

 

 Practice Exams

 

 Besides creating a legal-issues outline, the best way to prepare for

 exams is to take practice exams.  Almost all professors keep their old

 exams on file in the lbirary.  After you've done the bulk of your study

 outlines, photocopy your professors' exams from the last couple of

 years.  Then sit down with a friend and practice outlining exams answers

 based on the old questions.  Don't bother writing a full exam answer!

 Time yourself, and give yourself about as much time to outline each

 answer as you would during a real exam.  YOu should budget about a third

 of the time you're given to answer an essay question for outlining your

 answer (e.g., 20 minutes for a 60-minute question).

 

 After each question, compare your outlined answer with your friend's.

 He or she will have seen some points you missed, and vice versa.  This

 pinpoints issues you may tend to overlook during the real exam.

 

 Other matters

 

 Four of your first-year law courses -- contracts, torts, civil procedure,

 and property -- will last your entire first year. You'll also take two

 semester-long courses: criminal law in the fall and constitutional law

 in the spring.

 

 Thus, if you have to concentrate on any particular exam during winter

 midterms, concentrate on criminal law; that's the only exam you'll take

 in your first semester that counts as a grade for an entire course.

 Conversely, the exam for the three-hour constitutional-law course in the

 spring will count less toward your average than the exams for your

 year-long courses, which are each worth five or six hours' credit.

 

 Don't get too competitive.  It's the friends you make during your first

 few months as a law student who'll help you get through the year.  Don't

 be deluded into thinking that other students are the enemy; they're not.

 It's the system you've got to beat, and you can do it with the right

 attitude.  A vicious competitive streak, however, tends to undermine

 your karma in the long run.

 

 Finally, try to enjoy yourself.  The law really can be fun to learn if

 you let yourself relax.  Most people who make it through the first year

 look back at it as a time of rapid intellectual growth and the building

 of mental discipline.  Don't regard law school as just the

 stepping-stone to a career.  A law-school education has value in itself

 -- it will teach you a lot about what makes our society tick.



  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                           NOTES FROM CYBERSPACE

                               2nd Edition



 Notes From Cyberspace will be a feature of every issue of this publication.

 They are little tidbits, notes, comments, etc... from people like you.

 If you have any comments, we certainly encourage you to send them in.

 (comments@fennec.com)



 ============================================================================

                   

 NOTES FROM CYBERSPACE - ARTICLE 1

 By Rodney Perkins

 Subject: THEY ARE OUT TO GET YOU!  A piece of POST-LOGIC.

  

 Is that tuna fish I smell? No, its the CONSPIRACY. As avid readers of this 

 magazine probably already know, the conspiracy has tried to use its poison 

 tentacles to steal eggs from our snake pit. For now, our eggs are safe. One

 day, however, they might try it again. We will be there, knife in hand, 

 ready to chop off their offending appendages. Yes, they will probably try 

 to squirt their government ink in our eyes but we will continue to fight

 with the weapons given to us by (insert savior here).	 We must take a stand  

 against the pervasive eye of the conspiracy's octopi (yes, it rhymes). You 

 must ask yourself "What can I do to help stop this reign of tyranny from 

 the unseens and the who-whats-its?" You must continue to fight against the

 shickelgrubers, the boot boys and the LOGIC-WEAVERS! You must never fall 

 for LOGIC, you must always use POST-LOGIC (real men always think in POST-

 LOGIC). Confusion and ambiguity are the weapons in this war. Turn their

 MEDIASPEAK, GOOBLEDYGOOK and BAFFLEGAB against them! Weave great webs of 

 Orwellian nightmare language!  Master the art of circular logic! When they 

 ask you what you believe, tell them "I believe what you believe. Just don't 

 practice it".	 Are you confused yet? Good! You get "it"!



 ===========================



 NOTES FROM CYBERSPACE - ARTICLE 2

 By John Logan (ice9@bga.com)

 Subject: ON THE SUBJECT OF GOVERNMENT...



 Welcome to a new age!  Yes this is a world where technology has hit an all 

 time high. It seems there is no other way to go but up.  Funny, that 

 includes taxes, cost of living, and trouble in government. Yes, this is the 

 day and age that we are subjected to, by our wonderful president Mr. William

 Jefferson Clinton, successor to the New World Order...  Most Americans are 

 probably still wondering "Just what is this 'New World Order?'" Well, lets 

 talk about that:



 The New World Order is a product of the Trilateral Committee, made up of the 

 World's key leaders. In this form of government, the entire world will be 

 broken up into 3 'Nation States':  Europe, The Asias, and The Americas.  

 The worlds decisions will be made by the 'elected' presidents of each nation 

 state. The entire world will be on a common market with a universal currency.

 I'm sure we have all heard of - the 'credit.' Yes for years we have been 

 getting oriented to this system, whether in movies, or by our banking system.

 Well, in the near future, there will be very few private banks, we will 

 store our credits (for a small fee) in the World Bank.  We will be forced to 

 carry around credit chips that, when inserted into a machine, will access 

 our account number, list what is to be purchased, and the price.  Forget 

 about tax evasion!! It will all be AUTOMATICALLY DEDUCTED from out accounts.  

 Yes, the new government will be a cross between Capitalism and Communism.

 They will know our every move. Business owners will still be allowed to keep 

 their businesses but they will have to pay exorbitant taxes. State security 

 will be at an all time high. There will be no middle class.  Citizens will 

 be either very rich or very poor. The machine has already started.  Our 

 wonderful government does not want a car on the road that is over 10 years 

 old. A bill has already been passed limiting parts for the cars that fit in 

 this 'danger zone.'  It is now impossible to get manufacturer parts for

 these cars. If you have a problem, you must use after-market parts and hope 

 that it fits specifications. Todays cars are built to last 10 years or less.  

 Its a sad thing that more people do not understand what is coming down the

 proverbial 'road.' The governing machine is going to run right over the 

 common people like a steam roller. People won't even know what happened.  

 Take a look around!  The New World Order is not nearly as wonderful as our 

 government would like us to think. Don't worry, it won't be long and we won't 

 have to worry about what they want us to think. They will soon control that 

 too! WE HAVE BEEN WARNED.  NOW ITS TIME TO DO SOMETHING ABOUT IT!



 =============================



 NOTES FROM CYBERSPACE - ARTICLE 3

 By Dan Wilson

 Subject: Fight the Power!

 

 As I sit here writing this, I can't help wondering what the hell is going on.  

 Why is it that every time a group a people find some new freedom or form of 

 expression, the government steps in to suffocate it?  Just look at the	

 National Endowment for the Arts controversy or the PMRC. Why must a small

 group of paranoid people try to force their fears down all of our throats? 

 I must admit that when these things first began happening, I just sat by

 thinking to myself that it was a crock of sh*t without doing anything about

 it. It didn't strike close enough to home for me to get involved.  Recently,

 however, there's been a series of events that have struck close to home and

 have forced me to take action. The events to which I'm referring are none

 other than the government's recent attempts at bringing the computer world 

 to justice (as they define it, of course).



 It's really disturbing to hear about the methods the feds used to crack down 

 on "dangerous" users. Unsigned search warrants have been used to gain entry 

 to homes where all sorts of equipment, computer related or not, was 

 confiscated while no charges were specified. There have also been cases of

 holding guns to children's heads while a raid was going on.  What kind of

 gestapo tactics are these?  Have these guys never heard of the Bill of 

 Rights? This isn't the America I was told about as a kid; it sounds a 

 helluva lot more like those "evil" communist countries that I was taught to 

 hate. The only logical conclusion that can be drawn here is that the 

 government is very afraid. Why else would they dedicate so much effort to

 something they know so little about?  These guys don't have a clue as to

 what's going on out here in cyberspace.  That's the source of the problem.

 Here we sit with these marvelous machines in front of us. Touch a few keys

 and any information that we want to exchange can be sent anywhere in minutes.

 This must seem like a pretty major threat to a government that so often 

 relies on misinformation and cover-ups in order to scam the public into 

 believing what	it wants them to believe. We can't be controlled like the 

 media bozos who drone bullsh*t through the idiot box at us.  We can't be 

 censored like the newspaper or the radio.  In fact, this is probably the 

 truest form of	information exchange we have available today.  That alone is 

 worth fighting	for.



 It could also be that they are afraid of a society where people are judged 

 solely on their thoughts and ideas.  We have no style whores here. Race, 

 creed, color and religion are insignificant and pointless in cyberspace;

 they serve no purpose.  There can be no discrimination, there can only be

 disagreement with someone's opinions.  To me, this is pretty close to a

 perfect society.  It is refreshing to judged on what I think and how I 

 express myself rather than by the color of my skin or the origin of my 

 birth. In a society like this, the government cannot play people off 

 against one another. They have no ground on which to stand.  Perhaps it's 

 this lack of footing that makes them nervous.  Whatever it is, it's got them 

 thinking that they need to	put a stop to it and "bring it under control".  

 We are a far too dangerous force for them to just ignore.  This fact should 

 be remembered and taken advantage of, information is the key!  Less than an 

 hour ago, I posted issue number six of this magazine on Internet along with 

 messages urging others to read it.  In a matter of minutes it was all over 

 the world.  Maybe this will draw others into the fold, maybe not.  

 Regardless, it'll force them to think and maybe to take action themselves.

 

 

 @-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@-==-@



 NOTES FROM CYBERSPACE - ARTICLE 4

 By Anonymous Attorney

 Subject: POCKET LAW...Quick Reference Card



 Hey, copy this down and keep it in your wallet for those situations where

 you might be suppressed by the power-hungry infidels of humanity.

 

 My lawyer has instructed me not to talk to anyone about my case or anything

 else, and not to answer any questions or reply to accusations. On advice of

 counsel and on the ground of my rights under the State and Federal

 Constitutions, I shall talk to no one in the absence of counsel. I shall

 not give any consents or make any waivers of my legal rights. Any request

 for information or for consent to conduct searches, papers, property,

 or effects should be addressed to my lawyer. I request that my lawyer

 be notified and allowed to be present if any identification, confrontations,

 tests, examinations, or investigations of any sort are conducted in my case,

 and I do not consent to any such identification, confrontations, tests,

 examinations, or investigations.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                          EDITORIAL OF THE MONTH



 By Marco Landin

 

		[This article is fiction/humor]

        (Excerpt from INdigest, Feb 1994, Interview with

        the Elusive and Unintelligible Mfactor)



    INd:  In your most recent book, "I Don't Want My Children To Grow Up

 Around Those Filthy UNIX", you seemed to display a sense of farce that isn't

 too commonly seen amongst the Great Internet Poets of the Apocalypse.  Tell

 us, why do you see the 21st century as the Golden Age of Lunacy?



    Mf:  [wearing pajamas and Mickey Mouse ears]  Well, it's like this.  In

 the early 80's we perfected the concept of an international communications

 database.  It was populated solely by research personnel.  MIT grads,

 military, Elvis.  Purely serious study going on.  Then, in the late 80's and

 mid-90's, there was a practical applications boom, where savvy businessfolk

 rolled up their sleeves and sank their elbows into the datastream.  Now, as

 we near the End Times, we find that the greatest structure ever created by

 man -the Internet- is being vacated by its corporate and research personnel

 and a whole buttload of social misfits and weirdos are moving in by the

 droves.  Look at me for instance.  No, you better not.  Wanna jawbreaker?



   INd:  No, thank you.  Are you saying that the new computer literacy is

 making this once rich and fertile forest of intellect and commerce into a

 vast mental wasteland where the only thing that stirs is an occasional,

 barbed, tumbleweed of a pun based on bathroom jokes?

 

   Mf:  Well, yes, and I'm thankful for it!  I mean, have you SEEN what

 happens to the human body when the brain is used too much?  Glasses,

 unsocial behavior, a goofy voice, and insatiable masturbatory compulsions

 become the trademark of the computer genius.  Why if I had to choose between

 looks and brains,  I'd sure as hell pick looks, cause looks can get you

 brains, and the corollary is not as true.  I feel very lucky to have both.



   INd:  In the book, you mention a few extreme cases of individuals who have

 no business on UNIX and who yet not only live in it, they can't do without

 it.



   Mf:  Indeed, there seem to be many odd cases.  Take for example Cherry,

 the erotic dancer from Norway who has an Internet Address.  She works out 36

 hours a day, dances every night, goes out with friends, HAS FRIENDS!!!  And

 yet she still finds time to moderate a newsgroup, cherry.pop.tart, I mean,

 how does she do that?  Then there's the Internet node for the Eskimo Len

 Terrorist With Teret's Syndrome Association.  What does THAT have to do with

 worldwide communications?  Then of course, there's the newsgroup 

 alt.binaries.pictures.bestiality.  Need more be said???  The freaks are

 moving in as the contractors and architects move out.  Isn't it beautiful?



   INd:  What's your plan in life, Mr. Mfactor?



   Mf:  In this day and age, making plans is dangerous.  That's why I have

        several.



   INd: Please, share with us your most visionary.



   Mf:  Moving to Norway and finding Cherry.  Soon.  Like NOW.

   

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



          WHITE HOUSE ELECTRONIC PUBLICATIONS AND PUBLIC ACCESS EMAIL

                          FREQUENTLY ASKED QUESTIONS



 By Stanton McCandlish (mech@eff.org)



                         Updated April 2, 1994

                           Table Of Contents



  I.   Searching and Retrieving White House documents.

          -  Publications@WhiteHouse.GOV

          -  WAIS

          -  GOPHER

          -  FedWorld BBS

  

  II.  Signing up for Daily Electronic Publications.

          A.  Widely Available Sources.

          B.  Notes on Widely Available Sources.

          C.  Direct Email Distribution.

          D.  Email Summary Service.

  

  III. Sending Email to the White House.

          -  Internet Direct

  

  IV.  Sending Email to Congress

          -  Internet Direct

  

  V.   Submitting Updates to the FAQs.

  

  

  I.  HOW DO I SEARCH AND RETRIEVE WHITE HOUSE ELECTRONIC PUBLICATIONS?

  

  The White House is pleased to announce the establishment of an Internet

  address for retrieving White House publications.  We have set up an

  Almanac server to process requests by email.  To receive instructions on

  using this server, send a message to:

  

          Publications@WhiteHouse.GOV

  

  In the body of the message, type:

  

          send info

  

  Various additional sites are archiving the press releases as distributed. 

  What follows is an incomplete list of some of the sites containing the

  documents that have been released to date.  This FAQ will be updated to

  reflect new sites as they become known.

  

           SITE                   DIRECTORY

  

  1. SUNSITE.UNC.EDU      pub/academic/political-science/whitehouse-papers

  2. FTP.CCO.CALTECH.EDU        /PUB/BJMCCALL

  3. FTP MARISTB.MARIST.EDU

  4. CPSR.ORG                   /CPSR/CLINTON

  5. FedWorld Online System     703-321-8020  8-N-1  or:

                                Telnet fedworld.doc.gov

  6. GOPHER.TAMU.EDU            11/.dir/president.dir

  

  

  Notes:  The following are notes on how to log in and get

          information from the above sites.

  

  1.      Office for Information Technology at the University of

          North Carolina maintains the full collection of White

          House electronic releases available for search with WAIS and

          also accessible via Gopher and FTP.

  1.a     WAIS

          (:source

          :version 3

          :database-name "/home3/wais/White-House-Papers" :ip-

                  address "152.2.22.81"

          :ip-name "sunsite.unc.edu"

          :tcp-port 210

          :cost 0.00

          :cost-unit :free

          :maintainer "pjones@sunsite.unc.edu"

  

          :description "Server created with WAIS release 8 b5 on  

          Feb 27 15:16:16 1993 by pjones@sunsite.unc.edu These are the

          White House Press Briefings and other postings dealing with

          William Jefferson Clinton and Albert Gore as well as members

          of the President's Cabinet and the first lady Hillary Rodham

          Clinton, Chelsea, Socks and others in Washington DC. Dee Dee

          Meyers and George Stephanopoulos.  Other good words:

          United States of America, Bill Al Tipper Democrats USA 

          US These files are also available via anonymous ftp 

          from sunsite.unc.edu The files of type filename used in 

          the index were: 

          /home3/ftp/pub/academic/political-science/whitehouse-

           papers/1993 ")

  

          Folks without WAIS clients or gophers that act as WAIS

          clients may telnet to sunsite.unc.edu and login as swais 

          to access this information via WAIS.

  

  1.b     GOPHER is a distributed menu system for information access on the

          Internet developed at the University of Minnesota. gophers are

          client-server implementations and various gopher clients are

          available for nearly any computing platform.  You may now use

          gopher clients to access the White House Papers and other

          political information on SunSITE.unc.edu's new gopher server.

          You may also add links from your local gopher server to

          SunSITE for access to the White House Papers.

  

          For gopher server keepers and adventurous clients to access

          SunSITE you need only know that we use the standard gopher

          port 70 and that our internet address is SunSITE.unc.edu

          (152.2.22.81). Point there and you'll see the references to

          the Politics areas.

  

          For folks without gopher clients can telnet to sunsite.unc.edu

          to try out gopher access. You need to have access to internet

          telnet and:

          

                          telnet sunsite.unc.edu

                          login: gopher 

          The rest is very straight forward. Browsing options end with a

          directory mark (/), searching options end with an question mark 

          (?).

          There's plenty of on-line help available.

  

  2.      No special instructions.

  

  3.      The CLINTON@MARIST log files which contain all the official

          administration releases distributed through the MIT servers

          are available via anonymous FTP. These logs contain in

          addition to the official releases, the posts that comprise the

          ongoing discussion conducted by the list subscribers. 

          To obtain the logs:

          FTP MARISTB.MARIST.EDU - the logs are in the CLINTON directory

          and are named CLINTON LOG9208 thru CLINTON LOGyymm where yymm

          stands for the current year and month. Problems should be

          directed to my attention: URLS@MARISTC.BITNET or

          URLS@VM.MARIST.EDU. 

          Posted by Lee Sakkas - owner, CLINTON@MARIST

  

  4.      Computer Professionals for Social Responsibility is

          providing all Clinton documents on technology and privacy

          at the CPSR Internet Library, available via

          FTP/WAIS/Gopher at cpsr.org /cpsr/clinton (and in other

          folders as relevant). For email access, send a message

          with the word "help" at the 1st line of text to

          listserv@cpsr.org.

  

  5.      The FedWorld Computer System, operated by the National Technical

          Information Service, archives White House papers in a

          traditional BBS type file library.  Connect to FedWorld by

          calling (703) 321-8020.  No parity, eight data bits and one stop

          bit (N-8-1).  FedWorld accommodates baud speeds of up to 9,600.

          It is also possible to Telnet to FedWorld at FedWorld.doc.gov.

          White House papers are located in the W-House library of files.

          To access this library from the main FedWorld menu, 

          enter <f s w-house>.  Files are named with the first four digits

          being the release month and day (e.g. 0323XXX.txt).  Some

          standard abbreviations after the date include:

   

                  rem - Remarks by the President

                  pc  - Press Conference transcript

                  pr  - Press Release

                  AM  - AM Press Briefing

                  PM  - PM Press Briefing

                  sch - The President's public schedule

                  spch- Text of major speeches.

   

          These files are saved in ASCII format.  Files can be viewed

          online by requesting to download a file and then selecting

          (L)ist as the download protocol.   This will display the file a

          screen at a time.  White House papers are kept in the above

          format for up to two months.  Papers more than two months old

          are compressed using Pkzip into a single file that contains all

          of the files for that month (e.g.  0193.zip contains all papers

          released during January 1993).  In addition to White Documents,

          FedWorld also provides a gateway to more than 100 government

          funded BBSs and computer systems.

  

  6.      Texas A&M University GOPHER Server makes available White House

          press releases and other documents.  This archive includes

          information from 1992 until the present time and is updated

          as new documents are released.  Gopher users can reach the

          Texas A&M server by choosing it from their local server's list

          of other gophers, or by pointing their gopher clients to

          GOPHER.TAMU.EDU.

  

          After connecting to the A&M server, take the following path to

          reach the White House menus:

  

          "Browse Information by Subject" --> 

          "Political Science"  -->

                  "Information from the White House"

  

          Gopher maintainers and other intrepid souls are welcome to point

          directly to the A&M White House archive.  The server is

          GOPHER.TAMU.EDU and the path is 11/.dir/president.dir.

  

  

  II.  HOW DO I SIGN UP FOR ELECTRONIC PUBLICATIONS BY THE WHITE HOUSE?

  

  The White House Communications office is distributing press releases

  over an experimental system developed during the campaign at the MIT

  Artificial Intelligence Laboratory.

  

  You can obtain copies of all the press releases from a wide variety of

  on-line services or discussion groups devoted to either national

  politics in general or President Clinton in particular.  These are

  listed in sections I and II.

  

  Section IIc explains how you can sign up to receive press releases

  directly from the experimental MIT system by using an automated email

  server.  The present system was not designed to handle high levels of

  message traffic. A more powerful system will become available in due

  course, and in the meantime, it would be appreciated if you used this

  service sparingly.  One appropriate current use is secondary

  redistribution and archiving. If you use it, you will be carried forward

  when the more powerful system that replaces it.

  

  

  IIa. WIDELY AVAILABLE SOURCES

  

  1.  On USENET/NETNEWS, electronic publications are found on a variety

      of groups:

  

          Direct Distribution

  

                  alt.politics.clinton

                  alt.politics.org.misc

                  alt.politics.reform

                  alt.politics.usa.misc

                  alt.news-media

                  alt.activism

                  talk.politics.misc

  

          Indirect Distribution

  

                  misc.activism.progressive

                  cmu.soc.politics

                  assocs.clinton-gore-92 

  

  2.  On CompuServe: GO WHITEHOUSE

  3.  On America Online: keyword WHITEHOUSE or THE WHITEHOUSE or CLINTON

  4.  On The WELL: type whitehouse

  5.  On MCI: type VIEW WHITE HOUSE

  6.  On Fidonet: See Echomail WHITEHOUSE

  7.  On Peacenet or Econet: See pol.govinfo.usa.

  8.  On The Meta Network: Go Whitehouse

  9.  On GEnie: Type WHITEHOUSE or WHRT,  or MOVE 1600

  10. On CompuServe, see the Democratic Forum: Go Democrats

  

  IIb. NOTES ON WIDELY AVAILABLE SOURCES

  

  2.      CompuServe's White House Forum (GO WHITEHOUSE) is devoted to

          discussion of the Clinton administration's policies and

          activities. The forum's library consists of news releases and

          twice daily media briefings from the White House Office of Media

          Affairs. CompuServe members can exchange information and

          opinions with each other in the 17 sections in the forum's

          message area. The message board spans a broad range of topics,

          including international and United Nations activities, defense,

          health care, the economy and the deficit, housing and

          urban development, the environment, and education and national

          service.

  

  3.      On America Online, the posts are sent to the White House Forum,

          located in the News & Finance Department of the service or

          accessible via keywords: "white house" or "clinton".  The White

          House Forum on America Online contains the press releases from

          the White House, divided into the categories "Appointments",

          "Budget", "Congress", "Education", "Economy", "Foreign Policy",

          "Health Care", "Housing", "Labor", "Law and Order", "Meetings &

          Speeches", "Proclamations", "Technology", and "Vice President".

          The area features a message board so you can discuss the

          releases with other AOL members, a searchable database for easy

          retrieval of releases that interest you, a Library for longer

          releases from the White House, and a library that members can

          upload files of interest for other members.

  

  4.      MCI Mail users access daily information on the  administration's     

          programs provided by the White House through MCI Mail bulletin

          boards.  The available boards are: WHITE HOUSE ECONOMIC, WHITE

          HOUSE FOREIGN, WHITE HOUSE SOCIAL, WHITE HOUSE SPEECHES and

          WHITE HOUSE NEWS.  A listing of these boards can also be

          obtained by simply typing VIEW WHITE HOUSE at the COMMAND

          prompt.

  

  5.      On The Meta Network, material is posted in the White house

          conference and is accessible via keywords (matching on document

          titles and subject categories) as well as full text search.

          Discussions on specific initiatives take place in special

          interest forums, e.g.  health, technology, and reinventing

          government.

  

  9.      GEnie's White House RoundTable has been established to

          distribute and discuss the official press releases and files

          relating to the White House and the Clinton Administration. The

          files library holds all of the press releases on the official

          mailing list, and the Bulletin Board has Categories set up with

          topics relating to all aspects of the Administration and

          Executive Branch of government.  Letters to the White House can

          be entered easily online with a menu option on the WHITEHOUSE

          page.

  

  10.     CompuServe's Democratic Forum (GO DEMOCRATS) is the Democratic

          Party's online information service covering the activities of

          the Clinton administration. The sysops of the Democratic Forum

          work for the Democratic National Committee, and are directly

          involved in managing the forum and responding to online

          questions. The Democratic Forum provides access to documents

          from the White House Office of Media Affairs, with vigorous

          discussion and debate in the message sections about the impact

          of the Clinton Administration's policies and proposals. The

          Democratic Forum also holds a regular weekly online conference

          with special guests on current topics.

  

  

  IIc. DIRECT EMAIL DISTRIBUTION

  

  If you don't have access to the these accounts or if you would prefer to

  receive the releases via email, then this section details how to

  sign up for this service.  The server is not set up to answer email

  letters, comments or requests for specific information.  To reach this

  MIT server, send email:

  

                  To: Clinton-Info@Campaign92.Org

                  Subject: Help

  

  The server works by reading the subject line of the incoming message and

  taking whatever action that line calls for. If you want to sign up to

  automatically receive press releases, then your subject line would begin

  with the word RECEIVE.  You can then specify what kind of information

  you are interested in receiving. The categories of information are:

  

  ECONOMY

                  Get releases related to the economy such as budget

                  news, technology policy review, etc.

  

  FOREIGN

                  Get releases related to foreign policy such as

                  statements on Bosnian airdrop, Haitian refugee status,

                  etc.

  

  HEALTH          Get releases related to health care policy, without

                  receiving any other social issues.  Use this instead

                  of social.

  

  SOCIAL

                  Get releases related to social issues like National

                  Service (Student Loan) program, abortion, welfare

                  reform, etc.

  

  SPEECHES                    

                  All speeches made by the President and important

                  speeches made by other Administration officials.

  

  NEWS

                  Transcripts of press conferences released by the White

                  House Communications office, as well as the

                  President's remarks in photo ops and other Q&A

                  sessions.

  

  ALL             All of the above

  

  So, if you wanted to sign up to get releases related to the economy

  your email message would look like this:

  

          To: Clinton-Info@Campaign92.Org

          Subject: RECEIVE ECONOMY

  

  When you send a signup message to the clinton-info server, it sends you

  back a status message letting you know what distribution streams you are

  signed up for. If you ever want to check on what groups you are signed

  up for send the following message:

  

          To: Clinton-Info@Campaign92.Org

          Subject: STATUS

  

  *****You can stop receiving email releases by sending a REMOVE message

  to the clinton-info server. The word REMOVE would be followed by

  whatever distribution stream you wanted to drop. If you wanted to stop

  receiving message about the ECONOMY then your mail would look like this:

  

          To: Clinton-Info@Campaign92.Org 

          Subject: REMOVE ECONOMY

  

  You could substitute SOCIAL, FOREIGN, HEALTH, SPEECHES, NEWS or ALL for

  ECONOMY in the above message and you would be dropped from that

  distribution list. If you send the subject line REMOVE ALL, then you

  will be taken off the email distribution system all together and will

  not receive further releases of any kind.

  

  You can also ask for help from the automated server.  Send an email

  query as follows:

  

          To: Clinton-Info@Campaign92.Org

          Subject: HELP

  

  The server will respond by sending you a detailed form that will guide

  you through the process of signing up for the various distribution

  streams.  As you will quickly discover, there is a automatic form

  processing interface that parallel the quick and easy subject line

  commands discussed here. More detailed help is available by sending an

  email query as follows:

  

          To: Clinton-Info@Campaign92.Org

          Subject: Please Help!

  

  Finally, if you want to search and retrieve documents, but you do not

  have access to the retrieval methods discussed in section II, you can do

  this via email through the MIT server. You can obtain the WAIS query

  form by sending an email query as follows:

  

          To: Clinton-Info@Campaign92.Org

          Subject: WAIS

  

  Once you have identified the documents that you want, be careful not

  to request them all at once, because you may be sent a message

  containing all the documents and this message may be too big for some

  mail delivery systems between the email server and you.

  

  D. EMAIL SUMMARY SERVICE

  

  The Extension Service of the U.S. Department of Agriculture provides a 

  daily summary of White House electronic publications.  

  

  1. Subscriptions

  

  To subscribe to the USDA Extension Service White House Summary service, 

  send a message to: 

  

          almanac@ESUSDA.GOV

  

  In the body of the message, type: 

  

          subscribe wh-summary

  

  To Unsubscribe from the USDA Extension Service White House Summary

  service, send a message to:

  

          almanac@ESUSDA.GOV

  

  In the body of the message, type: 

  

          unsubscribe wh-summary

  

  2. Document Retrieval

  

  To request a specific document from the daily summaries, send a message

  to:

  

          almanac@ESUSDA.GOV

  

  In the body of the message, type: 

  

          send white-house #####

          (where ##### is the request number for the document)

  

  3. Document Search

  

  A user-friendly search facility is also available to search the

  white-house documents archived at ESUSDA.GOV. To search, send a message

  to:

  

          almanac@ESUSDA.GOV

          

  In the body of the message, type: 

  

          search white-house keyword1 keyword2

  

  4. Catalogue of Summaries and Documents

  

  Back issues and the catalog of the summaries or the documents contained

  at ESUSDA.GOV can also be retrieved through our almanac server. To get

  the summary catalog, send a message

  

          To:   almanac@ESUSDA.GOV

  

  In the body of the message, type: 

  

          send wh-summary catalog 

  

  5. Further Information

  

  If you have any questions about Almanac, please contact:

  

          wh-admin@ESUSDA.GOV

  

  III.  HOW DO I SEND EMAIL TO THE WHITE HOUSE?

  

  We are pleased to introduce this new form of communication with the

  White House for the first time in history.  As we work to reinvent

  government and streamline our processes, this electronic mail project

  will help put us on the leading edge of progress.  Please remember,

  though, this project is still very much under construction.  The Office

  of Correspondence is currently working on defining what this system

  will do, as well as addressing equipment and staffing needs.

  

  When you send a message to the White House you will receive an immediate

  acknowledgment that your message has been received.  This is the only

  electronic response you will receive at this stage of development; if

  you include your street address in your message, you may receive a

  response by U.S. Mail.  Please be assured that every electronic mail

  message received is read and analyzed by staff.  Your concerns, your

  praise, your suggestions, and your ideas are carefully recorded and

  reported to the President and Vice President weekly.

  

  You can send email to the following addresses:

  

  Internet Direct:        President@WhiteHouse.GOV

                          Vice.President@WhiteHouse.GOV

  

  

  IV.  HOW DO I SEND EMAIL TO CONGRESS?

  

  The House and the Senate are conducting electronic communications

  projects.  You can access Congressional information via the protocols

  listed below. For additional information, please contact the offices of

  your Representative or Senators.

   

  

  Site            Protocol        Host/connection

  

  House

  

                  Email           Congress@hr.House.GOV

                  Gopher          Gopher.House.GOV

                                  [URL: "Gopher://Gopher.House.GOV/11"]

  

  Senate

  

                  Gopher          Gopher.Senate.GOV

                                  [URL: "Gopher://Gopher.Senate.GOV/11"]

                  FTP             FTP.Senate.GOV

  

  Library of Congress

  

                  Gopher          Marvel.LOC.GOV

                                  [URL: "Gopher://Marvel.LOC.GOV/11"]

                  FTP             seq1.LOC.GOV

                  Telnet          LOCIS.LOC.GOV

  

                     

  

  Please note that these are not connected in any way to any White House

  online projects, so if you have any problems with Congressional systems,

  you will need to contact their system administrators for assistance.

  

  V.  HOW DO I SUBMIT UPDATES FOR THIS FAQ?

  

  Please send corrections, deletion and additions to this FAQ to:



                  Publications-Comments@WhiteHouse.GOV

                  

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

  



                       REDEFINING THE MODEM USER:

     HOW THE MEDIA TOOK TWO PERFECTLY HARMLESS WORDS AND RUINED THEM



 By Ed Cavazos



     Computer telecommunication hobbyists always seem to find themselves

 being labeled by the media in ways which help spread fear and

 misunderstanding.  For some reason, there is no term in the vernacular to

 describe someone who uses their computer and modem not as a tool to

 perpetrate illegal activities, but as an electronic link to the world.

 Whenever one comes along, it gets used in a way which always implies

 illicit behavior.





             "Hacker": From Computer Guru to Computer Terrorist



     The word "hacker" is already lost.  When Stephen Levy's 1984 book

 "Hackers: Heroes of the Computer Revolution" was published, the word was

 used in a way that was devoid of the negative associations prevalent today.



 In fact, the blurb on the back cover of the paperback described hackers as:



          "Spellbound explorers totally committed to

           experimenting with the infinite new possibilities

           of the computer.."



 And Levy himself (in the Preface) described his subjects as "those computer

 programmers and designers who regard computing as the most important thing

 in the world."  Levy was concerned that some were using the term as a

 derogatory one to describe someone who wrote bad code. This innocent

 definition of the word could be traced back to the days when MIT Model

 Railroad enthusiasts were described that way.



     But those days are gone.  Listen to what the National Law Journal

 (September 16, 1991) noticed:



     "...there is a widespread public perception that so-called

     computer hackers get their kicks out of breaking into top-secret

     government computer systems and wreaking havoc with destructive

     programs called computer viruses."



 And Katie Hafner a computer crime journalist was quoted in Waldensoftware's

 Computer Newslink,( Autumn 1991, Vol. 6, Issue 1) as remarking:



     "With the release of the movie "War Games" in 1983, in which a

     teenager almost triggers World War III from his little home

     computer, the definition of hacker changed overnight. Suddenly,

     hacker took on a very negative connotation. Now it's defined in

     Webster's as somebody who tries to break into computers."



 The media has helped turn what was at one time considered a complimentary

 term into something that connotes violence, illegality and destruction.

 To be called a hacker today is an accusation.  Through misuse, the media is

 warping the word even further.  When Geraldo Rivera interviewed Craig

 Neidorf for his television show "Now it Can Be Told" he referred to Craig

 (an electronic publisher) as "The Mad Hacker."  Geraldo's loose usage of

 the term ignores the fact that Craig was never accused of breaking into a

 system, or gaining illegal access anywhere.





             Cyberpunk: From Science Fiction to Sensationalism



     When William Gibson, Bruce Sterling and other science fiction writers

 began writing a new type of science fiction in the 1980's, critics searched

 for a way to describe it.  They settled (to the disappointment of some of

 the very writers they were describing) on "Cyberpunk."  The term still

 refers to a genre of science fiction. "Science fiction with an attitude,"

 is how the April 20, 1990 Washington Post described it. At the stretches of

 its usage, it describes a new world view which is composed of a collage of

 computers and information, of countercultural electronic expression.



     But, as happened before, the media decided that definition wasn't good

 enough.  When Katie Hafner and John Markoff decided to write a book on

 computer crime, they stole the term for their cover. "Cyberpunk: Outlaws

 and Hackers on the Computer Frontier" was the result. Now, all of a sudden,

 Cyberpunk doesn't refer to a sci-fi or cultural movement, it refers to a

 cynical hacker.  When asked to describe a "typical Cyberpunk" Hafner

 explains:



     "They are typically alienated suburban teenage boys who find an

     alternative world in computers. Pengo, who we wrote about in the book,

     is a pretty good example. He lives in Berlin and dresses in black.

     Then again, who in Berlin doesn't? But he was almost a caricature of

     himself. He smoked hand-rolled cigarettes. When he worked at his

     computer, he had his headphones on all the time listening to

     synthesized music. He started hacking when he was fifteen and by

     seventeen he started spying for the KGB by hacking over the networks."

     (Waldensoftware's Computer Newslink, August 1991)



     Even William Gibson, Cyberpunk's founding father, who wrote of

 cyberspace and a new society noticed it. "I've been credited of inspiring a

 whole new generation of techno-delinquents," he remarks in the February 19,

 1989 Boston Globe.  If only we could hear Gibson's reaction two years

 later, when the term which once described his writing style is now being

 used to describe computer criminals.



     The word "Cyberpunk" had a real mystique to it.  To turn it into a

 term to describe the "alienated suburban teenage boy" is to ruin some of

 that feel.  Moreover, it serves to confuse and concern a public which is

 already paranoid and somewhat hysterical about anybody who admits to using

 a computer and modem for long periods of time.  Responsible journalists

 should shy away from sensationalistic tactics like misusing an already well

 defined term like this.





                          The Need for A New Word



     What is needed is new terminology.   There are a myriad of totally

 legal and legitimate uses for modems and personal computers.  People do

 everything online from perusing library card catalogs to meeting their

 perfect romantic match.  On BBS's there are livid discussions of issues

 ranging from politics to religion -- from art to science. And online

 services like Prodigy and Compuserve are watching their user base swell

 annually.  Soon, perhaps the media will accept a word that describes a

 person interested in communicating electronically without implying illegal

 activity.  "Hacker" and "Cyberpunk" are ruined. "Modem Enthusiast" sounds

 too much like a term fresh from the pages of Reader's Digest.  Hopefully,

 someone will provide us with a new term which truly describes the millions

 of modem users who "live, play and thrive" in cyberspace.  Until that time,

 we can only sit and watch as the mainstream media stumbles along trying to

 understand and describe a phenomenon one gets the feeling it knows very

 little about.

 

  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                    PUBLIC UTILITY COMMISSION OF TEXAS

       REQUESTS COMMENTS ON INTEGRATED SERVICES DIGITAL NETWORK (ISDN)



 The Public Utility Commission of Texas (the Commission) has

 established a project (Project No. 12756) to examine Integrated

 Services Digital Network (ISDN) issues.  The Commission seeks comments

 from interested parties in response to the following questions.  If

 your answers would differ depending upon time-frame considerations,

 please provide answers for each time-frame.  Parties are requested to

 organize their comments to address the specific questions asked in the

 order asked and are encouraged to include an executive summary

 emphasizing the main points of their comments to each question.



 Comments (13 paper copies) should contain a reference to Project No.

 12756 and should be submitted to John M. Renfrow, Secretary of the

 Commission, Public Utility Commission of Texas, 7800 Shoal Creek

 Boulevard, Austin, Texas 78757, no later than April 30, 1994. 



 Informal comments may be sent to Ms. Pam Whittington at the Commission

 via e-mail addressed to:



          pam.tel@email.puc.texas.gov



 Or you may call her at (512) 458-0100.



 1. To which local exchange carriers (LECs) should a rule on ISDN

 apply?  Why?



 2. Should ISDN-based services be considered to be a replacement of or

 successor for "plain old telephone service"?  Why?



 3. Should all Texas customers and customer classes have access to

 ISDN?  Why?  If not, why not?  What policies should be adopted by the

 Commission regarding customer access to ISDN?  Why?



 4. What are the policies which the Commission should adopt regarding

 the determination of costs and the pricing of ISDN and ISDN-based

 services?  Explain why. Provide detailed cost information for each

 position if available.



 5. Should the manner in which ISDN is deployed affect the price?  How?



 6. Should the Commission grant regulatory incentives, penalties, or

 flexibility in exchange for a LEC's provision of ISDN?  Why?  If yes,

 describe the incentives, penalties, or flexibility.



 7. Does the Commission have jurisdiction to compel the provision of

 ISDN?  Why?  Explain the legal basis for your position.



 8. Should the LECs be required to provide ISDN services in a manner

 that is conducive to competition in the provision of ISDN?  Why?  If

 so, how?



 9. What policies should the Commission adopt regarding the deployment

 of ISDN?  Should the Commission directly mandate deployment, require

 deployment to be driven by customer demand, or require deployment in

 some other manner?  Why?  Describe in detail how.



 10. Describe in detail how these policies regarding deployment should

 be implemented and enforced.



 11. If customer driven demand deployment was ordered by the Commission, 

 should the trigger for deployment be thirty customer requests for ISDN

 per central office?  Why?  If not, why not, and provide evidence to

 support your position.  If thirty requests is not the appropriate

 number, explain what is.



 12. Should LEC compliance with deployment requirements be monitored on

 a periodic basis by the Commission?  If so, explain in detail how and

 why.



 13. What are the appropriate time frames for completion of deployment

 of ISDN in a LEC's service territory and in the entire state respectively?  

 Why?



 14. What are the technological options of the LECs with respect to the

 system upgrades necessary to deploy ISDN within their service areas?

 Explain in detail how the costs should be determined and reported to

 the Commission.



 15. Are there any other policies, aspects, technical characteristics,

 costs, or obstacles (e.g. switch architecture, software, or SS7)

 regarding deployment that the Commission should consider?  If yes,

 list and describe each and explain why.  Provide detailed cost

 information for each item if available.



 16. What policies regarding ISDN standards should be adopted by the

 Commission?  Why?



 17. To what standards (e.g. National ISDN, ITU-T standards, etc.)

 should the Commission require ISDN be deployed and provided?  Why?



 18. What specific service capabilities (e.g. bearer services,

 teleservices, supplementary services, etc.) should be required to be

 provided to customers?  Why?



 19. How should the policies regarding ISDN be implemented by the

 Commission?  Why?  If tariff filings were required, what should they

 contain?  Why?



 20. What end-user applications (e.g. telemedicine, distance learning,

 telecommuting, and video conferencing) using ISDN are available?  Will

 these applications be available using technology other than ISDN?

 Should the Commission consider this in its rulemaking?  Why?



 21. Does Texas need ISDN to compete with other states?  Why?



 22. Would the widespread availability of ISDN have a beneficial impact

 (e.g., through telecommuting, video conferencing, etc.) on Texas'

 compliance with the Clean Air Act?  Explain how.



 23. Are there any other aspects or characteristics of providing ISDN

 that should be considered by the Commission?  If yes, describe each

 and explain why.



 Parties interested in providing additional comments are welcome to do

 so.  The Commission also welcomes data and documentation supporting

 the parties' comments.  General Counsel and staff will review the

 comments and use them in preparing a recommendation to the Commission.



 Comments (13 paper copies) should contain a reference to Project No.

 12756 and should be submitted to John M. Renfrow, Secretary of the

 Commission, Public Utility Commission of Texas, 7800 Shoal Creek

 Boulevard, Austin, Texas 78757, by April 30, 1994.



 Informal comments may be sent to Ms. Pam Whittington at the Commission

 via e-mail addressed to:



          pam.tel@email.puc.texas.gov



 Or you may call her at  (512) 458-0100.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                                  EXAM PAPERS



 [Editor's Note: These are supposed to be actual answers from the tests of

 some students. There were no indications as to which grade-level they were

 in...but just between me and you, I hope that they weren't college kids.

 If so, ...I weep for the future.]



  ACTUAL EXCERPTS FROM STUDENT EXAM PAPERS:



- Charles Darwin was a naturalist who wrote the organ of the species.

- Benjamin Franklin produced electricity by rubbing cats backwards

- The theory of evolution was greatly objected to because it made man think.

- Three kinds of blood vessels are arteries, vanes, and caterpillars.

- The dodo is a bird that is almost decent by now.

- To remove air from a flask, fill it with water, tip the water out, and

  put the cork in quick before the air can get back in.

- The process of turning steam back into water again is called conversation.

- A magnet is something you find crawling over a dead cat.

- The Earth makes one resolution every 24 hours.

- The cuckoo bird does not lay his own eggs.

- To prevent conception when having intercourse, the male wears a

  condominium.

- To collect fumes of sulfur, hold a deacon over a flame in a test tube.

- Parallel lines never meet, unless you bend one or both of them.

- Algebraical symbols are used when you do not know what you are talking

  about.

- Geometry teaches us to bisex angles.

- A circle is a line which meets its other end without ending.

- The pistol of a flower is its only protection against insects.

- The moon is a planet just like the Earth, only it is even deader.

- Artificial insemination is when the farmer does it to the cow instead of

  the bull.

- An example of animal breeding is the farmer who mated a bull that gave a

  great deal of milk with a bull with good meat.

- We believe that the reptiles came from the amphibians by spontaneous

- generation and the study of rocks.

- English sparrows and starlings eat the farmers grain and soil his corpse.

- By self-pollination, the farmer may get a flock of long-haired sheep.

- If conditions are not favorable, bacteria go into a period of adolescence.

- Dew is formed on leaves when the sun shines down on them and makes them

  perspire.

- Vegetative propagation is the process by which one individual manufactures

  another individual by accident.

- A super-saturated solution is one that holds more than it can hold.

- A triangle which has an angle of 135 degrees is called an obscene

  triangle.

- Blood flows down one leg and up the other.

- A person should take a bath once in the summer, and not quite so often in

  the winter.

- The hookworm larvae enters the human body through the soul.

- When you haven't got enough iodine in your blood you get a glacier.

- It is a well-known fact that a deceased body harms the mind.

- Humans are more intelligent than beasts because human branes have more

  convulsions.

- For fainting:  rub the person's chest, or if a lady, rub her arm above the

  hand, instead.

- For fractures:  to see if the limb is broken, wiggle it gently back and

  forth.

- For a dog bite:  put the dog away for several days.  If he has not

  recovered, then kill it.

- For a nosebleed:  put the nose much lower than the body.

- For drowning:  climb on top of the person and move up and down to make

  artificial perspiration.

- To remove dust from the eye, pull the eye down over the nose.

- For head colds:  use an agonizer to spray the nose until it drops into

  your throat.

- For snakebites:  bleed the wound and rape the victim in a blanket for shock.

- For asphixiation:  apply artificial respiration until the patient is dead.

- Before giving a blood transfusion, find out if the blood is affirmative or

  negative.

- Bar magnets have north and south poles, horseshoe magnets have east and west

  poles.

- When water freezes you can walk on it.  That is what Christ did long ago in

  wintertime.

- When you smell an odorless gas, it is probably carbon monoxide.



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%



                      Interview with Tom Jennings

                     by Jon Lebkowsky, jonl@io.com

                       reprinted with permission



     Originally published in Fringe Ware Review #1, ISSN 1069-5656.

         Copyright (c)1993 by the author.  All rights reserved.

              For more details, contact: fringeware@io.com

 

 Our FWI prez recently had a chance to chat with Tom Jennings, who commented

 afterwards: "Think you can mention somewhere that I'm a fag anarcho nerd

 troublemaker/activist? It is important, and to me as well. It always gets

 buried. Lots of people like to know, especially scared people with no

 images of people who are gay and reasonably functional in some way." Tis

 our pleasure to honor Tom, whose work has been so brilliant and so far out

 on the Fringe, that when the US gov't precluded computer technology exports

 during the Cold War, they basically forgot/ignored a certain fag anarcho

 nerd from the Bay Area... As a result, Tom's FidoNet now provides the basis

 for computer networking in Eastern Europe, former USSR and most of the

 Third World, as well as a extraordinary conduit throughout the rest of the

 world.

 

 Tom: This people tracking stuff... what little I know of it sounds very

 creepy. I don't want a box that reports where the hell I am all the time,

 when I walk in the room, it can tell some local machine I'm there. It's

 none of anyone's goddamn business. It's the corporate culture invasion on

 real life, like the top 1% who make all the money, and think everyone's

 gonna live like them.

 

 Jon: Well, if you're living in an ivory tower, after you live there for a

 while, you start to think, not that it's YOUR environment, but it's THE

 environment.

 

 T: Yeah, it is reality, but it's a local one. Everyone they know is like

 that... well, they don't know everybody.

 

 J: In a conversation I had the other day with Allucquere Rosanne Stone, she

 talked about ubiquitous computing, that computers or computing will be

 invisible, it will be so omnipresent...

 

 T: That's what Alan Kay pointed out years ago, that when technology gets

 done right, you don't even see it. When you walk in a room, your hand

 flicks a switch... how much thought do you give to that stupid light

 switch? Hopefully very little. The light comes on, and... Telephones are

 getting close to that.

 

 J: Even better, there's some rooms you walk into and the light switches on

 automatically, because there's motion detectors.

 

 T: Yeah.

 

 

 Anarchy In The A-C-K

 

 J: Tell me about FidoNet. As I said, I'm sorta ignorant on the subject...

 

 T: I have a weird point of view on it, of course, having designed it...

 February or March of '94 will be it's tenth year. It is a network, a

 collection of bulletin boards. It is a loose confederation, and it is

 completely and thoroughly and utterly decentralized. There is literally no

 top. Most of it's members have a narrow view of it because they have this

 particular reality filter on all the time from living amongst hierarchy

 addicts. But FidoNet's most basic element is a bulletin board. What FidoNet

 is, is a set of protocols that lets the bulletin boards communicate.

 FidoNet started as a bunch of bulletin boards, running my Fido software.

 FidoNet was added later, to allow point-to-point email between Fido boards.

 

 J: Did you start with just a single BBS?

 

 T: It started with my system. I was writing software for Phoenix Software,

 which is now Phoenix Technologies. I was their first employee. I did all

 their portable MS-DOS stuff prior to the ROM BIOS they did, which was

 partly based on my previous work with "portable" MS-DOS... we were doing

 MS-DOS installations in three days, and charging exorbitant sums... and

 delivering really good stuff, people got their money's worth, and got it

 damn fast! We had it down to an art of just totally portable stuff. So I

 had this portable attitude toward hardware, and wrote a bulletin board sort

 of based on it.

 

 FidoNet is more importantly a social mechanism. It was pretty obvious from

 the start that it was going to be a social monster, almost more so than a

 technical thing. And it had to do with the original environment of bulletin

 boards, which were around for quite a while by the time I got around to

 doing Fido. Every bulletin board was completely different, run by some

 cantankerous person who ran their board the way that they saw fit, period.

 So FidoNet had to fit in that environment.

 

 J: A very anarchic environment.

 

 T: Yes, explicitly anarchic. Most people just ran them for their own

 reasons, and they were just separated by large distances of time and space,

 so they remained locally oriented. I just ran across old interviews and old

 documentation from '83 - '84, and we were saying it then. It was just...

 people didn't hear it, it just went in one ear and out the other. They

 think 'Oh, anarchism, that means throwing rocks at the cops!' Well

 sometimes, I suppose, but that's mostly a cop's definition of it.

 

 

 The Revolution Will Be Packetized

 

 J: The sense of the bomb throwing anarchist, I guess, is sort of in the

 sense of political disorder...

 

 T: ...which was a specific event in the 20's in San Francisco having to do

 with union labor busts. And blackmail... this guy Tom Mooney, a bomb was

 planted and blame arranged to fall on Tom Mooney, tossing his ass in jail,

 putting the blame squarely on the anarchists.

 

 J: Anarchy has this sorta bad connotation, but anarchy itself is not unlike

 what so many seem to want to embrace now. I think the libertarian

 philosophy is fairly anarchic, and you find it widespread throughout the

 net. It's basically a hands-off philosophy.

 

 T: I think people often take it too seriously, like various anarchist camps

 that have more rules than not. I consider it a personal philosophy, not a

 political thing at all. It has nothing to do with party-type politics.

 

 J: If it becomes overtly political, it ceases to be anarchy...

 

 T: Yeah, more or less, and I don't really care about what's considered

 politics per se, it's personal interaction, how I treat other people and

 how they treat me, and my relations to other people, it's anarchism... I

 always call it Paul Goodman style, which is the principle that people work

 together better if they're cooperating than if they're coerced. Very

 simple, nothing to do with goddamn party politics. It has to do with how

 you treat people that you have to work with. And that's what FidoNet was

 based on, very explicitly. It was sort of laid over the top of a lot of

 Fido bulletin boards, and let them talk to each other in a straightforward

 point-to-point manner.

 

 

 Just How Big Is It?

 

 J: Was it just Fido boards?

 

 T: Just Fido at the time, because it required a fairly low-level of

 restructuring of the innards, message bases and stuff. And Fido is a pretty

 good bulletin board, has been for years, though now it's definitely old

 fashioned. I haven't done a revision to Fido for over two years.

 

 J: Are you thinking about doing that?

 

 T: No, I'm thinking about dropping it. <laughter> I've thought about it,

 and it's over. So FidoNet started up in spring of '84 with two systems, me

 and my friend John Madill and within four months there were twenty or

 fifty... by the end of the year, it was approaching 100 by the next

 February, in nine months. It started growing really fast. And every single

 one was run by somebody for their own reasons in their own manner for their

 own purposes, so FidoNet had to accommodate this. And this is nothing

 unusual, in one sense. All computer networks are essentially run this way.

 The Internet is. There's no central Internet authority where you go to get

 a system in Internet, you just put it online, and find people to help you,

 register with the NIC [Network Information Center] which is just a

 convention for handling names.

 

 J: Sort of ideally cooperative.

 

 T: Yeah, it's quite cooperative, and you don't really get kicked out unless

 you technically screw up, or do something massively illegal or glaringly

 obvious. Most likely technical, like don't answer mail for a long time.

 Most electronic things are like that. It didn't start to take off until

 Echomail came by, which was done by this guy named Jeff Rush in Dallas as a

 way to talk among Dallas sysops about organizing pizza parties. It's a

 fully distributed, redundant database using FidoNet netmail to transport

 the records in the distributed database. It's functionally equivalent to

 Usenet, they gate back and forth very easily.

 

 J: Can you link FidoNet very easily to Internet or UUCP Mail?

 

 T: There's gateways between [FidoNet and UUCP] operating. You can just set

 up the UFGate package... [FidoNet and the Internet] they have totally

 different paradigms. IP, the Internet stuff, is fully connected all the

 time. When you want to connect to a system in Finland, you just rub packets

 with them and they come back in generally under a second. FidoNet is all

 store and forward, offline processing...

 

 J: How big is it now?

 

 T: Just short of 20,000 systems.

 

 J: Wow, that's a lot...

 

 T: It's doubled in a year... I think more than doubled in a year. It's been

 doubling every year for a long time <laughs>.

 

 

 QQBEGIN PGP PUBLIC KEY BLOCKQQ

 

 J: There's a lot of discussion today of encryption schemes, are you

 involved in that?

 

 T: Actually, yeah, I use it routinely.

 

 J: Using PGP?

 

 T: Yeah. FidoNet was pretty intentionally involved in getting PGP

 ubiquitous the first time around... an intentional, conscious quick-dump of

 about 10,000 copies in a week, starting on a Monday, just to be sure that

 it was unstoppable, and it spread very quickly. Now there's all kinds of

 arguments over whether it's legal, or whether it's going to incriminate me

 to use PGP, and the traffic into the network itself...

 

 J: It wouldn't be a criminal issue...

 

 T: People believe all kinds of crazy nonsense.

 

 J: Somebody has a patent on the algorithm, is that it?

 

 T: Yeah, and some people are afraid that if they send or pass encrypted

 data, that the police will bust into the house and steal the computer, all

 this kind of stuff... FidoNet sprung up fully-formed out of seeming nowhere

 into the rest of the computer world. Most people on the Internet have

 access to it through schools or industry. They went to school, then they

 got a job, and they grew up with maintained Internet connectivity... they

 were brought up into the sort of Internet-hood.

 

 J: I think that's changing a bit...

 

 T: Oh, it is changing, it will continue to change, and someday it will be

 incomprehensible that it was this way, but as of today, it's sort of how it

 is. FidoNet did not come from that direction at all. It came from... the

 usual white guys who could afford a computer :-), but in the best tradition

 of radio and astronomy, they were at least amateurs, it's truly an amateur

 network. It is not professional, as in "profession"... "professional" is

 frequently used to mean legitimate, as opposed to amateur...

 

 J: You mean "hobbyist?"

 

 T: Yeah, amateur as a word became disparaging, but we mean it actually in

 the older sense, like the radio amateur sense. We don't do it for money,

 it's done for the sake of itself. So for the most part, FidoNet members

 never had that traditional kind of connectivity, and also didn't have the

 corporate culture, and didn't have the computer network culture, so it

 basically formed in the dark, on its own.

 

 

 550 Flavors of Culture

 

 J: Speaking of the word "culture," do you find that within the FidoNet

 universe, there's a particular set of cultural predilections? Does there

 tend to be a general kind of group or community that uses FidoNet?

 

 T: Well, it's like any of those things, it's really subjective. But, yeah,

 there do seem to be, in my travels on Internet and FidoNet, distinct

 flavors. One is not better than the other, I can tell you that, culturally

 speaking. The Internet people say, "Oh, but the flame level on FidoNet is

 so awful." Bullshit. The flame level on the Internet is just as high. It's

 in loftier language, five line signatures, and all that kind of crap... but

 I'm sorry, it's not any better, it's just different. What it is, is less

 alien to them, more comfortable... and vice-versa from the FidoNet side.

 It's more comfortable, it's more familiar, the language used and the

 acronyms and the smiley faces, all of that junk.

 

 There is a FidoNet flavor, through the usual sociological things. The

 people who originally populated it defined this vague common set, and

 people who come onto it self-select ("Oh, I like that!") and join it, and

 then enhance it, or they're sort of neutral and they come in and they just

 absorb it because... you know, you start hanging out with people, and you

 pick up their manner of speaking. And there are people, of course, who are

 utterly opposed to this, and want to make it professional and some just

 don't care, and live in a corner of it.

 

 But yeah, there are things in common, and I have a hard time putting my

 finger on what they are. It is fiercely independent, utterly, fiercely

 independent. It is viciously anti-commercialization. It has a long history

 of some nasty politics, some really enlightened politics, and I think in a

 lot of ways they have more pragmatic view, and a better view Q better

 meaning more functional in today's world Q than people who haven't had to

 pay their own phone bills.

 

 J: Some people argue that you can't have strictly online community, and

 others believe that you can. Some feel that there has to be some kind of

 face-to-face interaction. In the Internet there has not been as much of

 that until it began to become more broadly accessible to regular people...

 

 T: The Internet is still completely and thoroughly inaccessible... I'm

 sorry, it is simply not accessible. You have to have a large amount of

 hardware or an intimate relationship with someone who does, like you have

 to go to school or something. Otherwise you're paying money... and there

 are people who fall through the cracks...

 

 J: How about public access Internet?

 

 T: Yeah, but if there's more than 100 terminals in the U.S. that any

 average person could walk up to and figure out how to use in less than a

 week, I would be surprised. It still takes huge amounts of specialized

 knowledge.

 

 J: But the technical side is fairly dense...

 

 T: Oh, yeah... I've been an SWTP, CP/M, DOS hacker and hardware hacker for

 fifteen fucking years, twenty years, and UNIX is so intimidating,

 arbitrarily difficult to use... a lot of the users have this macho attitude

 that "Well, you should have to plow through it, I did." The whole

 priesthood nonsense. It's stupid. And the argument whether online culture

 is possible or not, that ain't where it's gonna get decided. It either gets

 made or it doesn't. I think there are online communities. The people who

 are doing it aren't asking themselves, "Are we an online community?"

 They're just going about their business. They're not tangible enough to

 really get documented except in hindsight, you look back and say "Oh, yeah,

 those people are" or "No, they really weren't, when push came to shove,

 they didn't stay together."

 

 J: At EFF-Austin we've been a little more self-conscious about it, we've

 actually been trying to do some community-building, to try to structure an

 online community in Austin where we'd have some force to get things done,

 various projects. One of the things we're doing that other EFF-related

 groups haven't been doing is arts projects, and in doing those things, in

 talking to some of the people who are interested in doing that, I realized

 that there are a lot of writers and artists who are hungry to get online.

 They know it's there, they'd like to be using it, but they can't get access

 to it because they can't, unless they stumble into it, find a system

 that'll give them an account. It's kind of like what you were saying about

 barriers... but I wonder if, in the FidoNet world, you find writers and

 artists using FidoNet to share information and to form arts communities?

 

 T: Well, there's a lot more less-technical people involved, because you can

 put a $300 system together, line cord to phone jack. That just means that

 the entry level is a lot lower. And it's functional as hell! I mean, So

 what if it's slow? 5 seconds or 100 milliseconds, what's the difference to

 most people?

 

 

 All Look Completely Different

 

 J: The link, the network, is strictly for email? Or do you have some other

 stuff, file transfer... ?

 

 T: Oh, there's lots of file transfer stuff. In some ways it's a lot more

 sophisticated than the FTP stuff from the user's point of view. There's

 this thing called the SDN, the Software Distribution Network, which looks

 like a conference for files, where the objects are not messages, but files.

 And they're stored in a redundant manner, some locally concentrated, some

 far away and scattered. It's kind of nebulous, like most network things

 are. They do monthly announcements of new files, and most of it's

 shareware, or free. You can do things like file attach (send with a

 message), and file requests (file fetch via message).

 

 FidoNet doesn't have the problem that a lot of older networks have, with

 seven bit channels and all that crap. We have eight bit channels with 32

 bit CRCs. We do run into the alien system problems... ASCII character sets

 vs. the cyrillic alphabets and all that kinda stuff. Those problems are

 about as chaotic as they are anywhere else.

 

 J: How about remote login?

 

 T: No... the systems in FidoNet are radically different. There's Radio

 Shack color computers, there's CP/M machines, Apple IIs, giant DOS

 machines, giant LANs of UNIX boxes, all running common protocols in a far

 broader hardware base than most, even UNIX boxes. There's no unified

 operating system, there's a set of protocols, there's 40 or 50 different

 mailers, and FidoNet interfaces in bulletin boards, and they all look

 completely different. So it's at a much higher level of abstraction than

 the FidoNet gets defined at. I bet a lot of the Internet, some huge

 proportion, is UNIX...

 

 J: You certainly need some kind of standard to be interoperable to the

 extent that the Internet is, don't you?

 

 T: No, where the real compatibility is is the TCP/IP layer, and that's rock

 solid, and that's the thing in common. All the rlogin, telnet, and ftp

 stuff partly user paradigm, rather than just a set of protocols. It's well,

 and fine, and wonderful, and I love it, but it does put a real crimp on

 style.

 

 [Ed Cavazos, almost-attorney and vice-prez of EFF-Austin, shows up and

 settles in to listen. The conversation continues.]

 

  The Color Of Money

 

 T: A lot of FidoNet is so radically different, you can't get people to

 either hear it or understand what's going on, because it's NOT like any of

 the others, and it was intentionally not made like the others, and some of

 the really basic principles that seem random are intentional... they're in

 writing, and have been in writing for seven years. The strictly American

 anarchist principles that it's based on are written into the policy

 documents.

 

 We actually had in '85, '86, '87 an attempted takeover by a corporation

 that was formed from within, it was like a cancer that became a giant boil

 on the surface, called IFNA, the International FidoNet Association, that

 was sort of a good idea, or a potentially good idea, when we started it at

 the 200 node level. By the time it got around to being implemented, at 500

 nodes, the world had utterly changed. With 200 people, you can run it like

 a club. It was 90% U.S., 90% white guys with computers, and at the 500 node

 level, it was about 20% European and definitely, obviously growing. It

 hopped the puddle, with systems appearing in South America, scattered, but

 you know how that goes... when you get one, then you get two, and then

 four, and they start to grow.

 

 We were very naive, and I was right in the middle of it. Some of us learned

 quickly, this isn't going to work! But this corporation grew, and became a

 501(c)(3), and like all of those things, they get power-hungry, and they

 get grabby of territory, and we had to fight it off, and it was fought off

 by the constituents of the network... and it was killed off. They had

 gained control of the copyright and the trademarks, and they were fought

 off. The network, instead of dying, like everyone predicted, thrived.

 

 J: So how did this fight go?

 

 T: It was fought by lawyers and proxy votes and all the usual crap, in a

 goddamn hotel in San Jose, was the final straw...

 

 J: Were you a part of this corporation at all?

 

 T: Well, a bunch of us started it... at first, we were brainstorming what

 we could do... deals on modems, some obvious stuff. And we'd have a

 spokesperson from FidoNet who'd attend the EMA meetings once a year and

 represent bulletin board operators and FidoNet members in electronic

 privacy things and the technical trade stuff and the obvious things. And

 those are still lacking, we still need them. But it was established really

 early that everyone not only retains control of their system, but they're

 expected to do their part to run it, because there is no one else to run

 it. And as simple as it sounds, it's a really radical act to get that

 across, so that people don't just sit on their butts. And of course, the

 usual 10% does the work, and 90% sits on their butts, but that's fine, too.

 

 

 Double Plus Plus Good

 

 T: FidoNet's a little odd, unlike the Internet, which has a domain name

 system... you say "Connect to toad.com," it says, ".com, okay, over there,

 toad... here's the address," and you go after it. FidoNet has what appears

 to be a centralized database that every system in the net has, a copy of

 this at the moment 2 megabyte long ASCII database, with 20,000 records in

 it. And it's updated every week, it contains the full physical and logical

 information about the entire network... phone number, system name,

 restrictions on use, protocols supported, some ASCII text, like system

 name, and city, all that kind of junk. It contains the hierarchical

 addressing scheme of the network, and it contains a lot of redundancy.

 

 J: Given that there's no central authority, who maintains this database?

 

 T: A local autonomous unit in FidoNet... First... the terminology in

 FidoNet is point-node-net-zone. Points aren't really part of FidoNet,

 they're a peculiar thing... a node is the basic unit, it is a bulletin

 board or a mail-only site, generally a phone number with a modem on it. A

 net is a cluster of Fidos, a cluster of nodes, like San Francisco has Net

 125, SFBay Net, 75-80 systems. A node in a net is the basic social

 organizational unit. It was designed to be small enough to comprehend in

 regular old terms, like we all know and love, clubs and that kind of

 group... when they get too big they tend to fragment into pieces, which

 become autonomous units, then nets are collected into the real-life

 geography of continents.

 

 The North American phone system is alien to the Western European ones, and

 they have lots of mutually-alien phone systems. The North Americans tend to

 be a lot less political... Zone 1 encompasses Mexico, U.S., and Canada, and

 nobody ever batted an eye over it. It's like, "Oh, okay, that makes sense."

 In Europe, they're fiercely defensive of the political boundaries, and it's

 really silly. Local autonomy was the critical thing to make it work,

 because who's going to allow somebody in New Jersey to dictate how they're

 going to run their system? There'd be no way to exert any kind of control,

 and once you start getting into control wars, you spend all your time doing

 that.

 

 So the way the node list is made is that every net fragment makes its own

 chunk of the node list, which is a very straightforward task, even though

 it ends up being work. They're passed up through regional coordinators who

 take these fragments, and everybody gets a copy of everybody else's weekly

 list, and each of them compiles a giant list, then they do a difference,

 this week from last week, and mail out that difference back down the tree.

 So if you chopped off half the network and smashed it flat, it would

 regenerate itself. It's a balance of terror, that's what it is. It's a

 genuine balance of terror in responsibility and power. What you get for

 that redundancy is that no one can cut you out of the network, no one can

 declare that you can't communicate.

 

 In the UUCP world none of this happens because the social environment is

 much more substantial... universities, Hewlett Packard... Your neighbors,

 in theory, can cut you off, and you disappear, no one knows about you, if

 you're eliminated from the bang path, no one can talk to you, and that's

 it, you don't exist, it's as simple as that.

 

 In FidoNet, and this has happened recently in England... a bunch of

 religious fundamentalists by just hammering away gained control of large

 chunks of the FidoNet in the U.K., and they started having fits... "Why,

 there's perverts on this board, and we're not gonna have 'em in FidoNet!"

 <laughter> And they clipped them out of the goddamn list, they removed the

 entries from the U.K. list. You sort of noticed they disappeared, but those

 people can still communicate, they can mail you their fragment,

 hand-generated if necessary, and all the node list processors let you

 incorporate private lists, and you can reply back, just like that. No one

 can be cut out of the network.

 

 If you start thinking about it, you realize that there are a number of good

 and bad side effects from this. Like, if you have some real asshole

 troublemaker, there's nothing you can do about it. Like, unless somebody

 comes in and pulls out a gun or something, it's kinda hard to get someone

 kicked out of a more or less public place... well, [here in] the hotel

 would be relatively easy, but out in the street, you've just gotta live

 with your neighbors. And the same is true in the FidoNet. You have to learn

 to live with your neighbors, and vice versa. The flaming assholes have to

 learn how to behave well enough to not be utterly censured. Which is what

 generally happens to them... people just ignore them.

 

 There was one guy, he was another fundamentalist Christian nut case. He was

 amusing, actually. He was a "true Bible" believer, this was called

 pre-rapture, or something or other, some pre-rapture network... he was

 persecuted by all sides, and he loved it. He was mailing everybody this

 gibberish, pages and pages of gibberish. And there's programs that just

 filter out mail, and you say, I don't wanna see mail from this address...

 

 J: A bozofilter.

 

 T: Yeah, basically, it's a bozofilter, we've had 'em for a long time. And

 there's also another one that's called bounce... whenever you get anything

 from this guy, bounce it back. It appends a bit of text that says "This

 message is refused at site so-and-so, have it back," which IRRITATES

 people! But it just works out that people, even the crazy ones are social

 organisms. We don't really like to be disliked too widely, we like to have

 an audience, if nothing else. So that's the underpinnings...

 

 FidoNet has been very flexible technically. When technological changes or

 opportunities come by, within a year half the net supports them. In about

 '85 U.S.JRobotics very smartly discovered bulletin boards, and they

 realized the way it works is, even though there's a relatively small number

 of bulletin board sysops, if you're bulletin board caller, who do you look

 to to see what hardware to buy? The sysop. And they ask, "What kind of

 modem do you have... oh, it must be pretty good if you use it," because

 when it's bad, they mouth off to hundreds of people about it.

 

 So USR basically courted the FidoNet, and said "What do you want to see in

 a modem?" The first modem they did this with was the Courier 2400, which

 was 600 bucks new at the time, or 700 bucks. They offered a 50% off deal,

 down to about 300 or 400 dollars, which was a bargain, relatively speaking.

 We wanted true flow control, and a symmetrical modem with basic AT command

 set, and they did it. It was an instant success. And then they did the HST,

 much to most of the industry's annoyance, they did this kludgey proprietary

 asymmetrical protocol 9600 one way, 300 baud the other way... they came to

 us again, and we worked out more handshake stuff, and started changing

 protocols on our side.

 

 FidoNet was originally based on xmodem, which is amazingly similar to

 X.25's packet ack, like Kermit, only much more efficient than Kermit, and

 very much like UUCP-G, only it's not windowed... block ack block ack block

 ack... it's fine at 2400 baud and below, above 2400 baud it was not good.

 We had asymmetrical modems that collapsed. So there had been another

 protocol called Wazoo around, and it instantly became hot, because it did

 protocol negotiation when you started a session, and it could pick ZMODEM

 [trademark Chuck Forseberg], which is fully-windowed, screaming fast, you

 can run it ackless. You could work the hell out of an HST in ways that

 other protocols couldn't. Internet protocols and UUCP-G were just useless,

 in other words, the modem was useless for existing protocols. So FidoNet's

 historically been very flexible, technology-wise.

  

 McLuhanites: Myopy, My Opium

 

 Ed: Are you familiar with John Quarterman? Have you seen his maps of

 FidoNet?

 

 T: No, I haven't seen his maps of FidoNet. [Quarterman did show 'em off

 later in the conference.] I talk to him occasionally, I republished one of

 his articles in FidoNews a while ago... FidoNews is a weird phenomenon in

 itself... a 20,000 circulation weekly newsletter in its tenth year. It sort

 of goes unacknowledged... FidoNet has a giant credibility problem, because

 it sprang forth fully-formed 'way outside all traditional computer things,

 and because it works on PCs and Radio Shack Color Computers (which actually

 turns out to be a nice processor, it runs OS9 on a 6809... you can run

 multiusers on a $99 packaged machine). It's really some amazing software.

 

 FidoNews was designed in '84 in the first year as the meta-net, to discuss

 the net itself, to discuss the social end of the net. In the first issue

 was a retired Air Force colonel or something, whining about the military

 retirement process, and people instantly said, "This is supposed to be a

 technical newsletter, this is FidoNet..." and I said, "No, bullshit, it's

 not. I'm tired of just this techie crap. Do you talk on the phone about

 your telephone all the time? 'Gee, I've got a great new phone, it's got all

 these pushbuttons...' and you get bored very quickly. It's like radio

 amateurs talking about their goddamn antennas." Who wants to put up with

 that stuff?

 

 J: We've been talking about that a lot. There's three or four magazines

 devoted to online cultures, cultures of the Matrix, that focus on the

 Internet a lot. Wired is one, Mondo in a real different way, and

 bOING-bOING, of course, in a REAL different way. And we realized that a lot

 of the articles are preoccupied with the carrier, with the technology for

 carrying messages, and not so much with the messages themselves or the

 cultures themselves, the sorts of cultures that are evolving.

 

 T: Yeah, they forget that what we're making is a goddamn conduit; it's a

 medium, it's not content! A content comes with it, because they're brand

 new mediums, they fail a lot, and they need to be developed... all software

 sucks, and all hardware sucks, so you end up talking about it a lot, but

 yeah, that's not the point.

 

 J: What's really more fascinating is what's at either end of the conduit...

 

 T: Yeah, the telephone proved that. It's actually a way to convey social

 information, emotion, that's why telephones worked, you can talk over them.

 How many ways can you say "No" with a keyboard? Not very many. 25 or 50 if

 you're incredibly ingenious. Smiley faces and uppercase... All the cultural

 information is stripped. And a lot of it has simply been access. Those at

 the gates determine who comes in. If you own the $5,000 PC...

 

 J: Is that what brings you here [to the fourth conference on Computers,

 Freedom, and Privacy), access issues?

 

 T: Yeah, that's why I'm always skeptical of large-scale networks. While I'm

 on the Internet, I don't have any pretensions of being... "Why, the world

 is connected!" No, one percent of one percent is connected, barely, and the

 tools really suck. Through no fault of the authors, they're incredible

 works, the foundation to a world. But they're hardly accessible to everyone

 in the world.

 

 J: I had to buy my access to the Internet, at first. The WELL...

 

 T: Mine I get because I'm managing a small IP cooperative, and I get it

 sort of as a perk to my $400 to $500 salary for what is essentially a

 full-time job.

 

 J: Actually, I've been able to pick up other accounts since, but the only

 way that I could have got in in the first place was by buying access,

 because I'm not really very technical. My interests are more

 sociopolitical, I guess...

 

 T: I don't really have any serious problems with the way things exist. For

 better or worse, that's the way that all complicated things have been

 developed in our little Western history timeline. It takes resources and

 effort and energy, and they do spread out, eventually. And they get defined

 along the way, they definitely have basic cultural assumptions glued into

 them at the very base.

 

 J: It allows a more distributed way of organizing and doing things...

 

 T: We'll see if it's ever as good as the telephone is. It doesn't get much

 better than the telephone, when you think about its position in society.

 Like Bruce said in his Hacker Crackdown, you notice them when you don't

 have one, they're so ubiquitous, they're like light switches. You don't

 think of a telephone, it's not an exciting object.

 

 J: I can remember when there was a single phone in the house, and it was a

 big deal to have a second phone, which was usually on the same line. And

 now I have three phone lines, and one is a dedicated data line. I don't

 think I know many people who don't have at least two or three phones in

 their house.

 

 T: I'm down to two, and I consider that rarefied... I only need two lines

 now, after having six at one point, all these bulletin boards and data

 lines, now it's like, oh, a voice line, and a data line...

 

 J: I prefer asynchronous text swapping, but I'm not sure why, maybe a

 personal idiosyncrasy. It seems funny to me, because Matisse Enzer, the

 support guy on the WELL... when we're having a problem, and we can't quite

 figure out how to communicate about it, he always says, "Well look, why

 don't I call you up, and we'll talk about it." And I always say, "No, wait,

 I don't wanna talk, I just wanna text!" <laughter>

 

  -----

 Originally published in Fringe Ware Review #1, ISSN 1069-5656.

 Copyright (c)1993 by the author.  All rights reserved.

 For more details, contact: fringeware@io.com



 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 

.