Computer underground Digest Sun Jan 23 1994

 Computer underground Digest    Sun  Jan 23 1994   Volume 6 : Issue 09

                           ISSN  1004-042X


       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

       Archivist: Brendan Kehoe (Improving each day)

       Acting Archivist: Stanton McCandlish

       Shadow-Archivists: Dan Carosone / Paul Southworth

                          Ralph Sims / Jyrki Kuoppala

                          Ian Dickinson

       Coppice Editor:    P. Bunyan


CONTENTS, #6.09 (Jan 23 1994)

File 1--Brendan's mom thanks the Net

File 2--"The Prisoner: Phiber Optik Goes Directly to Jail"

File 3--Letter of Concern in Amateur Action BBS Procedures

File 4--Some thoughts on censorship (Re Am. Action "Porn" Raid)

File 5--Lobby the Feds via PC

File 6--More on "The Rating Game" (Re:CuD 6.03, 6.04)

File 7--PUB.RCDS #1: online polit disclosures + leg.online (AB1624)

File 8--GOV-ACCESS #2 interests; radio chat; joining this list


Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are

available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The

editors may be contacted by voice (815-753-0303), fax (815-753-6302)

or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL

60115.


Issues of CuD can also be found in the Usenet comp.society.cu-digest

news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of

LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT

libraries and in the VIRUS/SECURITY library; from America Online in

the PC Telecom forum under "computing newsletters;"

On Delphi in the General Discussion database of the Internet SIG;

on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG

WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020

CuD is also available via Fidonet File Request from 1:11/70; unlisted

nodes and points welcome.

EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;

          In ITALY: Bits against the Empire BBS: +39-461-980493


ANONYMOUS FTP SITES:

  AUSTRALIA:      ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.

  EUROPE:         ftp.funet.fi in pub/doc/cud. (Finland)

  UNITED STATES:

                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud

                  etext.archive.umich.edu (141.211.164.18)  in /pub/CuD/cud

                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD

                  halcyon.com( 202.135.191.2) in mirror2/cud

                  ftp.warwick.ac.uk in pub/cud (United Kingdom)

  KOREA:          ftp: cair.kaist.ac.kr in /doc/eff/cud


COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing

information among computerists and to the presentation and debate of

diverse views.  CuD material may  be reprinted for non-profit as long

as the source is cited. Authors hold a presumptive copyright, and

they should be contacted for reprint permission.  It is assumed that

non-personal mail to the moderators may be reprinted unless otherwise

specified.  Readers are encouraged to submit reasoned articles

relating to computer culture and communication.  Articles are

preferred to short responses.  Please avoid quoting previous posts

unless absolutely necessary.


DISCLAIMER: The views represented herein do not necessarily represent

            the views of the moderators. Digest contributors assume all

            responsibility for ensuring that articles submitted do not

            violate copyright protections.


----------------------------------------------------------------------


Date: Wed, 19 Jan 1994 13:38:42 -0800

From: Jeffrey L. Needleman <needje@MSEN.COM>

Subject: File 1--Brendan's mom thanks the Net


((MODERATORS' NOTE: Brendan's recovery has been described as

"miraculous." We received a short, but "typically Brenan" note from

him Thursday evening, and he's progressing far better than expected.

Those wishing to contribute to his medical fund or send a card can do

so at:


   Brendan Kehoe

   c/o Brendan's Friends

   Cygnus Support

   One Kendall Square

   Cambridge, MA 02139


=======================================


A few weeks before his accident, Brendan Kehoe was named the Board Leader

of the Internet Bulletin Board on the PRODIGY Information Service, a

national service which is a joint venture of IBM and Sears.


Alice Kehoe has an account on PRODIGY and posted the message that follows:


>         INTERNET BB

>TOPIC:   GENERAL

>TIME:    01/16  7:34 PM

>

>TO:      ALL

>FROM:    ALICE KEHOE   (EMGX48C)

>SUBJECT: BRENDAN

>

>Hi, I'm Brendan's mom -

>Since I can't get to the Net right now, thought this might

>be one way, at least, of reaching some of the wonderful

>folks who've so generously sent along masses of cards, mes-

>sages, and letters since word of Brendan's accident made its

>way through Cyberspace. Your thoughtful kindness means such

>a very great deal to all of us ...

>Although there is still a very, very long way to go, and

>months of rehab in the offing, Brendan is progressing at a

>far faster rate than his doctors had ever anticipated. He is

>able to feed himself; can walk with assistance; and, has

>even managed a few words now and again, often more or less

>in context.

>He is still at Philadelphia's Hospital of the University of

>Pennsylvania, but we (his brother, Derry, and I) anticipate

>moving him to a Boston long-term rehab facility in about a

>week or two. (We live in Maine, but Boston's about as close

>as we can get for the type of care he needs.)

>Your thoughts, good wishes, and most importantly, prayers

>have been an immeasurable support and life-line to all three

>of us. Thank you, so VERY much!

>

>Regards and God bless,

>Alice

>

>PS: Would someone who can link into the Net be kind enough

>to convey our gratitude Out There?? Thanks!

>

>


Jeff Needleman, DMVR98B@prodigy.com

(I'm the MemRep for the Computer Bulletin Board on PRODIGY.)


------------------------------


Date: Thu, 20 Jan 1994 21:25:21 -0500 (EST)

From: Julian Dibbell <julian@PANIX.COM>

Subject: File 2--"The Prisoner: Phiber Optik Goes Directly to Jail"


           The Prisoner: Phiber Optik Goes Directly to Jail


                 By Julian Dibbell (julian@panix.com)

              (From The Village Voice, January 12, 1994)



Phiber Optik is going to prison this week and if you ask me and

a whole lot of other people, that's just a goddamn shame.


    To some folks, of course, it's just deserts. Talk to phone-company

executives, most computer-security experts, any number of U.S.

attorneys and law-enforcement agents, or Justice Louis Stanton of the

Southern District of New York (who handed Phiber his year-and-a-day in

the federal joint at Minorsville, Pennsylvania), and they'll tell you

the sentence is nothing more than what the young hacker had coming to

him. They'll tell you Phiber Optik is a remorseless, malicious invader

of other people's computers, a drain on the economic lifeblood of our

national telecommunications infrastructure, and/or a dangerous role

model for the technoliterate youth of today.


    The rest of us will tell you he's some kind of hero. Just ask.

Ask the journalists like me who have come to know this 21-year-old

high-school dropout from Queens over the course of his legal travails.

We'll describe a principled and gruffly plain-talking spokesdude whose

bravado, street-smart style, and remarkably unmanipulative

accessibility have made him the object of more media attention than

any hacker since Robert Morris nearly brought down the Internet. Or

ask the on-line civil libertarians who felt that Phiber's commitment

to nondestructive hacking and to dialogue with the straight world made

him an ideal poster boy for their campaign against the repressive

excesses of the government's war on hackers. You might even ask the

small subset of government warriors who have arrived at a grudging

respect for Phiber's expertise and the purity of his obsession with

the workings of the modern computerized phone system (a respect that

has at times bordered on parental concern as it grew clear that a 1991

conviction on state charges of computer trespass had failed to curb

Phiber's reckless explorations of the system).


    But for a truly convincing glimpse of the high regard in which

Phiber Optik is held in some quarters, you'd have to pay an on-line

visit to ECHO, the liberal-minded but hardly cyberpunk New York

bulletin-board system where Phiber has worked as resident technical

maven since last spring. Forsaking the glories of phonephreaking for

the workaday pleasures of hooking the system up to the Internet and

helping users navigate its intricacies, he moved swiftly into the

heart of ECHO's virtual community (which took to referring to him by

the name his mother gave him -- Mark -- as often as by his nom de

hack). So that when he was indicted again, this time on federal

charges of unauthorized access to phone-company computers and

conspiracy to commit further computer crimes, ECHO too was drawn into

the nerve-racking drama of his case.


    As the "coconspirators" named in the indictment (a group of

Phiber's friends and government-friendly ex-friends) pleaded guilty

one by one, there remained brave smiles and high hopes for Phiber's

jury trial in July. By the time the trial date arrived, however,

Phiber had made an agonizing calculus of risks and decided to plead

guilty to one count each of computer intrusion and conspiracy. ECHO

was left on tenterhooks waiting for the day of the sentencing. Given

Mark's newfound enthusiasm for more legitimate means of working with

computers and his undisputed insistence at the time of his plea that

he had never damaged or intended to damage any of the systems he broke

into, it seemed reasonable to wish for something lenient. A long

probation, maybe, or at worst a couple months' jail time. After all,

the infamous Morris had done considerably greater harm, and he got off

with no jail time at all.


When the news arrived, therefore, of Phiber's 12-month prison sentence

(plus three years' probation and 600 hours of service), it hit like a

slap in the face, and ECHO responded with a massive outburst of dismay

and sympathy. ECHO's director, Stacy Horn, posted the information at 3

p.m. on November 3 in the system's main conference area, and within 24

hours the place was flooded with over 100 messages offering

condolences, advice on penitentiary life, and curses on Judge Stanton.

Not all the messages were what you'd want to call articulate

("shit," read the first one in its entirety; quoth another:

"fuckfuckfuck-fuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuckfuck"),

nor was all the advice exactly comforting ("Try not to get killed,"

a sincere and apparently quite prison-savvy Echoid suggested; "Skip

the country," proposed one user who connects from abroad, inviting

Phiber to join him in sunny South Africa).  But the sentiment

throughout was unmistakably heartfelt, and when Phiber Optik finally

checked in, his brief response was even more so:


    "I just finished reading all this and...I'm speechless. I

couldn't say enough to thank all of you."


    He didn't have to thank anybody, of course. Motivated by genuine

fellow feeling as this electronic lovefest was, it was also the last

step in the long-running canonization of Phiber Optik as the digital

age's first full-fledged outlaw hero, and making somebody else a hero

is not necessarily the most generous of acts. For one thing, we tend

to get more from our heroes than they get from us, and for another, we

tend to be heedless of (when not morbidly fascinated by) the very high

psychic overhead often involved in becoming a hero -- especially the

outlaw kind. To their credit, though, the Echoids proved themselves

sensitive to the weight of the burden Phiber had been asked to take

on. As one of them put it: "Sorry Mark. You've obviously been made a

martyr for our generation."


    There was some melodrama in that statement, to be sure, but not

too much exaggeration. For ironically enough, Judge Stanton himself

seemed to have endorsed its basic premise in his remarks upon passing

sentence. Not unmoved by the stacks of letters sent him in support of

Phiber Optik's character and motivations, the judge allowed as how a

less celebrated Phiber Optik convicted of the same crimes might not

deserve the severity of the discipline he was about to prescribe (and

in Phiber's case it could be argued that 12 months locked up without a

computer is severe enough to rate as cruel and unusual). But since

Phiber had made of himself a very public advertisement for the ethic

of the digital underground, the judge insisted he would have to make

of the sentence an equally public countermessage. "The

defendant...stands as a symbol here today," said Stanton, making it

clear that the defendant would therefore be punished as one too.


    The judge did not make it clear when exactly it was that the

judicial system had abandoned the principle that the punishment fits

the crime and not the status of the criminal, though I suppose that

happened too long ago to be of much interest. More frustratingly, he

also didn't go into much detail as to what it was that Phiber Optik

was to stand as a symbol _of_. In at least one of his remarks,

however, he did provide an ample enough clue:


    "Hacking crimes," said Judge Stanton, "constitute a real threat

to the expanding information highway."


    That "real threat" bit was a nice dramatic touch, but anyone

well-versed in the issues of the case could see that at this point the

judge was speaking symbolically. For one thing, even as practiced by

the least scrupulous joyriders among Phiber Optik's subcultural peers,

hacking represents about as much of a threat to the newly rampant

telecommunications juggernaut as shoplifting does to the future of

world capitalism. But more to the point, everybody recognizes by now

that all references to information highways, super or otherwise, are

increasingly just code for the corporate wet dream of a pay-as-you-go

telecom turnpike, owned by the same megabusinesses that own our phone

and cable systems today and off-limits to anyone with a slender wallet

or a bad credit rating. And _that_, symbolically speaking, is what

Phiber Optik's transgressions threaten.


    For what did his crimes consist of after all? He picked the locks

on computers owned by large corporations, and he shared the knowledge

of how to do it with his friends (they had given themselves the

meaningless name MOD, more for the thrill of sounding like a

conspiracy than for the purpose of actually acting like one). In

themselves the offenses are trivial, but raised to the level of a

social principle, they do spell doom for the locks some people want to

put on our cyberspatial future. And I'm tempted, therefore, to close

with a rousing celebration of Phiber Optik as the symbol of a spirit

of anarchic resistance to the corporate Haussmannization of our

increasingly information-based lives, and to cheer Phiber's hero

status in places like ECHO as a sign that that spirit is thriving.


    But I think I'll pass for now. Phiber Optik has suffered enough

for having become a symbol, and in any case his symbolic power will

always be available to us, no matter where he is. Right now, though,

the man himself is going away for far too long, and like I said,

that's nothing but a goddamn shame.



*********************************************************************

Julian Dibbell                                       julian@panix.com

*********************************************************************


------------------------------


From: hkhenson@CUP.PORTAL.COM

Subject: File 3--Letter of Concern in Amateur Action BBS Procedures

Date: Thu, 20 Jan 94 23:30:28 PST


          H. Keith Henson

          799 Coffey Ct.

          San Jose, CA  95123

          408-972-1132


          Hon. Wayne D. Brazil

          U.S. Magistrate-Judge

          450 Golden Gate Ave.

          15th Floor, Courtroom A

          San Francisco, CA  94102


          January 19, 1994



          Dear Judge Brazil:


          This letter is to express my concerns about search warrant

          3.94.3005.WDB you issued on January 6 of this year to David

          H. Dirmeyer.  (I am assuming you issued it; the copy of the

          warrant persented at the time of the search did not have a

          signature on it, but did have your name typed in.)


          Under "PROPERTY TO BE SEIZED," point A refered to a computer

          system used for publishing, and thus protected from warrants

          under Title 42, Section 2000aa.  (The "Newspaper Privacy

          Protection Act" requires supenas except very limited cases.)


          This computer also contained electronic communications

          between many of the 3500 people who used this system.  Title

          18, Setion 2703 (Electronic Communication Privacy Act)

          requires specific warrants to seize, or even block access to

          such electronic communications.


          In conversation with Postal Inspector Dirmeyer at the time

          of the search, I asked if he was aware of the these laws.

          He told me that he was.  In an additional conversation last

          Saturday morning with him and a police officer he stated

          that he had discussed the ECPA and 2000aa issues as well as

          the Steve Jackson Games type of liability issues with you

          before the warrant was issued.


          Agent Dirmeyer admitted to me Saturday that he was the

          "Lance White" whose records were being sought under points H

          and I of the search warrant, and that you were aware of, and

          approved, the deception involved.  Dirmeyer/White also

          stated in writing that he sent an unsolicited package of

          child pornography to the person at the address of the search

          warrant, and (verbally to me) that this was "normal

          investigation procedure."


          I realize that Judges are not much concerned with warrants

          after they are issued.  However, I was so astounded by the

          statements of Agent Dirmeyer, that I decided to at least let

          you know about them.


          Sincerely,



          H. Keith Henson


------------------------------


Date: Fri, 21 Jan 1994 23:19:17 CST

From: "AMERICAN EAGLE PUBLICATION INC." <0005847161@MCIMAIL.COM>

Subject: File 4--Some thoughts on censorship (Re Am. Action "Porn" Raid)


From--Mark Ludwig, ameagle@mcimail.com


After reading about the latest porno-BBS raids, and the fact that one

reader cancelled his sub to CUD because he was sick of hearing about

it, I wanted to make a few comments. It seems like pornography is

always and forever a 1st amendment/freedom of speech issue, but I

don't think it is a very good test of the 1st amendment.


I've been writing and publishing technical literature about computer

viruses for a few years now--as well as arguing that viruses are not

something that should be suppressed because (a) people need good,

solid technical information if they want to defend themselves against

viruses, and (b) because viruses are not simply totally evil.

Obviously, some are pretty bad, but at the same time, you have

arguably beneficial ones like Cruncher and Potassium Hydroxide.

Likewise, they may provide valuable insights into other disciplines,

as discussed in my recent book, Computer Viruses, Artificial Life and

Evolution.


My work has been subject to an incredible amount of censorship. But

not government-sponsored censorship. I've been censored by the

press--those who were once the vanguard of freedom of the press have

become its worst enemy in my eyes. Let me explain . . .


Around about December 7 I received a call from ___, sales

representative at the Computer Shopper. She informed me that they were

not going to allow us to advertise in their magazine anymore.

Evidently they had received complaints about our advertisement and

decided, like so many other journals, that their readers are too

immature and irresponsible to handle such things and, for the good of

society, they'd better deprive them of such information.


Did they review our materials prior to their decision? No.


Did they give us an opportunity to answer the complaints they

received? No.


In fact, Ziff Davis' high and mighty legal department proved totally

unwilling to even speak to me, preferring to hide behind a sales rep

instead. And no one at Ziff would put anything in writing.


This may sound preposterous to you, but it's happened to me time and

time again. A fair number of magazines have terminated our advertising

without ever reviewing our materials or discussing the matter with us.

These include Dr. Dobbs, Computer Language (who didn't even bother to

inform us they had dropped our ad), Computer Craft, and Nuts and Volts

(who reconsidered and reinstated us after about a year).


What sets the Computer Shopper apart is that they are the porn king of

computer magazines. In the context of a dozen pages of ads which sell

everything from Seymour Butts, Erotic Fantasies, Porkware and Deep

Throat to the gay Man Power, the decision to pull our ad came as a

real surprise. Evidently the omniscient legal department at Ziff has

come to the inspired realization that our materials are much worse

than blatant pornography--without ever looking at anything we sell!


Personally, I find it difficult to understand what a porno CD has to

do with computers, except that it goes in a CD ROM reader in your

computer. But that's kind of like selling x-rated videos in a

technical magazine about TVs. The only logic I can see to it is the

idea that perhaps the techies who read magazines like the Shopper are

sexually unfulfilled people who must fantasize to satisfy their animal

lusts. At least, I suppose that's what Ziff's pundits think, and

that's why they run the ads. It makes their customers happy.


On the other hand, technical information about computer viruses makes

a lot of sense in a computer magazine. After all, they are a

phenomenon that most computer users are going to have to deal with

sooner or later, and they are something that some of us find

interesting for purely technical reasons.


Pornography has long been a point of contention in the battle over

free speech simply because--in the Supreme Court's words--it has no

"socially redeeming value." And if one is free to appeal to only the

basest human lusts, so the argument goes, then any more noble ideas

will also be protected.


These kinds of arguments are fallacious though. The whole idea of

freedom of speech was born in the reformation, not with an eye to

protecting pornographers, but with an eye to protecting thinkers--and

specifically religious reformers--people who saw the corruption of the

state-church and who spoke out to condemn it and change it.


Good ideas can often be far more dangerous to those in power than bad

ideas. And porn is at best a bad idea. It won't threaten anyone in

power, and it acts like an opiate to society. It is a diversion. So to

suffer its existence isn't a good test of the freedom of speech. On

the other hand, what happens when somebody has a really good idea that

sets to naught the ideas which those in power use to remain in power?

(e.g. "taxation without representation is wrong") That is truly

threatening. Will the idea be suppressed by legal means?  Will it be

buried under a flood of propaganda? This is the REAL testing ground. A

society which permits porn, but suppresses real ideas isn't free at

all.


The whole issue of cryptography is case and point. In this age, the

dissemination or withholding of information has become a real tool of

power. In the past century, government secrets have multiplied without

number, while government has steadily demanded more and more

information about its citizens, and access to more information on

demand. Good cryptography is a threat to the ability to gather

information, and a stumbling block on the road to total control. So it

is being suppressed.


Now, when we see flagrant intrusions into our freedom by

government--such as in cryptography--our tendency is to point the

finger at government--"those guys." But--at least here in America--we

are the government. We voted it into power. And, no matter where, all

governments exist only with the consent of the governed. Perhaps it is

grudging consent, or fearful consent, but it is consent none the less.

The only one who really may not consent is probably in solitary

confinement or a slave-labor camp being whipped. So when we see

government intruding on freedom of speech or some such thing, we can

only rightly see it as a sickness in all of society. And it should be

no surprise to find the press--which has traditionally been thought of

as the vanguard of the freedom of speech--suppressing it. The Computer

Shopper, Dr. Dobbs, etc., etc., just have the same sickness as the

government and everyone else.


Frankly, I think we live in a generation where a majority of people

prefer security to freedom. You can see it everywhere.  Clinton is no

dummy, and I think his new theme is not just a stupid idea, but the

result of research. He knows what Americans--for the most part--have

come to expect, and he's going to at least promise it to them (even

though he cannot possibly deliver the reality of it, even if he has

spoken of a "new covenant"). I think it's a shrewd move. Every

president since Carter in 1976 has been elected on the basis of the

economy. Financial security has proven to be more important to the

average american than freedom, election after election. In short,

freedom isn't really an issue of national importance anymore, though

some of us still value it deeply. Security is the issue that gathers

the crowds and wins the votes.


There is an important idea here: freedom or security? The America of

200 years ago was founded on the idea of freedom under God. That

doesn't mean unrestrained freedom, but freedom within a given moral

code. It meant you were free to follow the profession of your choice,

go (or not go) to the church of your choice, to speak respectable

opinions, and free to live where you wanted, and keep what you earned.

It did not mean you were free to loot your neighbor or sell your

daughter as a prostitute. Now in a state ruled by this paradigm of

freedom, there are always questions about how far those freedoms go.


Today, however, there has been a paradigm shift in our society. The

question is no longer how far we can go with freedom without

endangering society. Rather, the question which government and the

people seem concerned about is how to maximize security--e.g. how to

assure an ever growing abundance of material possessions, and reduce

the risk of losing them. That's why the economy is such a big issue in

government. If freedom were our objective, we'd try to get the

government out of the economy, rather than trying to get government to

manipulate it more effectively.


Now the paradigm of security leads directly to 1984--a totally

controlled, totalitarian society. If you keep pushing the idea of

security, that's where you end up. A totally controlled society is

very secure, and no one in power ever makes a mistake. And that's

where I think America is headed.


Some kind of revolution or civil war isn't going to help things a bit

either. At best, such a cataclysm will be only the event which brings

the full totalitarianism upon us.  That's because this love affair

with security is in the people's hearts. It's not government vs. the

people. It's still government of the people by the people. And if the

people want security, then they'll install the government which best

promises them that. This is and always has been a totalitarian regime.

And if revolution won't work, it's hard to put your faith in some

milder type of reform.


I say all of this because it's the only way I can understand the

censorship I've faced. It's the only way you can twist your mind to

believe that what I do is worse than pornography. Even though there

are such things as beneficial viruses, even though viruses might give

us some valuable insights into other scientific disciplines, even

though they have military value, they are a potential threat to the

general security. And to have people walking around who know how to

create them is a threat to the general security. So as long as you are

operating under the paradigm of security, you cannot tolerate virus

writing. Thus, the press censors the press. Computer Shopper censors

American Eagle Publications, and throws their contract out the window

without ever even evaluating their materials.


If the government steps into the picture and enforces some kind of

official censorship against viruses through legislation, it will only

be because the private sector has chosen it already. It will be

because there are a lot of well-heeled businesses pushing it, and a

lot of magazines that won't address the issue honestly in editorials,

and won't let anyone else do it in advertising. That's the age old

formula for totalitarianism.


For these reasons I honestly don't think pornography is the issue

that's pushing the limits of the 1st amendment. The real hot issue

that those of us who value freedom should be giving our attention to

is security vs. freedom. That's where the paradigm shift is taking

place, and where the future will be won or lost. Right now, it would

seem that security is winning out by default.


In the long run, an unearthly security is a false hope. But I'd far

rather see it exposed for what it is by intelligent people using their

brains effectively in my generation, than having it exposed by a

government whip over several generations.


In short, porn isn't the real 1st amendment issue it's cracked up to

be. More often than not, its technical knowledge that really ruffles

the feathers today.


------------------------------


Date: Tue, 11 Jan 94 21:54:54 PST

From: David.Batterson@F290.N105.Z1.FIDONET.ORG(David Batterson)

Subject: File 5--Lobby the Feds via PC


                            Lobby The Feds Via PC

                             by David Batterson


     Here's another one of those programs to let "We The People" [at

least those with PCs] tell those lame-brained, no-account lazy

politicians and bureaucrats in Washington who's the boss.


     A while back Parsons Technology offered us Personal Advocate (now

sold for $29, DOS), and Symantec has Write Your Congressman! (also in

a DOS version for $29.95).  [Symantec uses a rather sexist,

politically incorrect title, doesn't it?  Well, they actually bought

the program (along with ACT!) from a Texas company.]


     A tiny company in San Rafael, CA [where this reporter used to

live] got on its soapbox, and decided to do it even better.  Or at

least they've tried to.


     Soapbox Software offers Federal SoapBox (FSB) Ver. 1.2 that

"brings you the power and know how of Washington insiders by combining

a graphic flow chart of the Federal Government, detailed listings of

policy makers, powerful search functions and easy-to-use

communications tools, allowing you to contact the right people in

Washington at the right time."  OK, so much for marketing hype.


     After testing out this software, I really don't think it has

Artificial Intelligence capability (so it knows if you contacted the

correct person in a timely fashion).  I didn't just fall off a turnip

truck.  Nor does it search very well for every person you want to

find.


     For example, I did a "Search by Person" for Dee Dee Myers.  It

found her OK, since she is the current Press Secretary.  But when I

tried to search for former PR whiz George Stephanopoulos, ol' lonesome

George could not be located (even though I knew he was in the White

House chain of command somewhere.


     So I looked under Executive Office of the President, where I

found some guy named Clinton.  I clicked on "Data," and following data

on the Big Guy, there was the "Office Staff" listed.  In that group

was listed "George Stephanopoulos, Sr. Advisor."


     Now is there any good reason why FSB's search capability can't

also locate a staff member by name?  Cheesch!  I think the only reason

must be "bad programming."


     The software does have some useful features, such as being able

to create customized mailing lists, exporting data for use in your

database program, federal documents, biographies, legislative

committee assignments, text editor, an online glossary, federal BBSs,

and so on.


     The program now has an interface to MCI Mail, but only works if

you want to send PAPER mail or a fax.  Note: you CANNOT send e-mail,

for instance, to the MCI Mail ID: WHITE HOUSE, or send Internet

e-mail.  Boo!  I hope that future versions of FSB fix this oversight.


     FSB is sold as a subscription.  The rather hefty price of $129

gets you the DOS software plus three quarterly updates; additional

years are $49.  Windows and Mac versions are on the way, the company

told me.


     Info: SoapBox Software, 10 Golden Gate Drive, San Rafael, CA

94901; 415-258-0292, FAX: 415-258-0294, 800-989-7627 (orders),

Internet:  5942208@mcimail.com, CompuServe: 71614,2373, MCI Mail:

594-2208.


                                 #


Computer reporter/reviewer David Batterson looks forward to the day

when most federal, state, county and city officials are online, so we

can zap 'em with e-mail.  [Will he live so long?]  You may contact him

via The Internet:  dbatterson@mcimail.com, or:

david.batterson@f290.n105.z1.fidonet.org.

 * Evaluation copy of Silver Xpress. Day # 50

 --- via Silver Xpress V4.00 [NR]

 --

uucp: uunet!m2xenix!puddle!290!David.Batterson

Internet: David.Batterson@f290.n105.z1.fidonet.org


------------------------------


Date: Wed, 19 Jan 1994 19:52:04 -0500

From: Bryce Eustace Wilcox <wilcoxb@NAG.CS.COLORADO.EDU>

Subject: File 6--More on "The Rating Game" (Re:CuD 6.03, 6.04)


THE RATING GAME (In re CuD 6.03, 6.04)


Stephen Williams (sdw@meaddata.com) has proposed one of THOSE ideas.  An

idea that is simple in design but stunning in potential function.  I

heartily congratulate him and add my own two bits:


>Basically, I suggested that special messages be standardized that

>would endorse messages for certain distributions.  Old (existing...)

>news software would just pass the messages like others, but news

>systems that wanted to rate or hide improper messages could pay

>attention to them.  My software would probably take the form of

>patches to INN and tin, etc.  There would be positive and negative

>endorsements, of course with the possibility of signature keys, etc.


This last possibility intrigues me the most.  A "majority vote" to

indicate "value" or "content" of a message wwould simply emulate the

current media paradigm: "lowest common denominator".  If instead of

simply tallying yay and nay votes, I can tailor my own software to

recognize specific signatures and give them added weight (<giggle>  I

just realized that if this were to happen there might be people whose

names I would include with a negative weight factor...) then we would

have a really nice system going.  I see several problems right off the

bat, some practical and some hypothetical.


  Prob 1: authentification.  We must prevent forgery of signatures.

Apparently (according to Phil Zimmerman's PGP doc file), public key


   Prob 1a: Public key encryption.  Are we ever going to have

widely-used public key encryption available?  Insert the whole patent

controversy here.


   Prob 1b: bandwidth (numerous apologies and requests for correction

if I misuse any technical term in my enthusiastic ignorance).  PGP

keys are 32, 64, or 128 bytes long.  Multiply that by the number of

endorsements tacked onto any given message and multiply *that* by the

number of messages and notice a major technical problem.


  Prob 2: the end results.  will this kind of consensual

discrimination lead to a polarizing/tribalizing effect on society?

Whatever the mass media's faults (and I think they are legion), it

*has* served to give people a common culture.  But with the technology

and the society changing the way that it is I really can't imagine a

return to the mass media paradigm nor the "messy Internet" paradigm.

I think Stephen William's anarchic, organic paradigm is definitely the

way to go.


[Though this message is getting a bit long, I think I should pause to

defend/ explain my use of the word "anarchy".  I am using the simple

definition "absence of control or regulation".  (Of course I do *not*

mean absence of self-control or self-regulation!)  The "anarchy" that

I envision in the informational realm is a state in which it is

impossible or at least socially unacceptable for any entity to delete

or substantially alter information without the permission of the

author.  Of course some other mechanism will be needed to sort, sift

and organize information and that is why I am so excited about Stephen

William's idea.]


------------------------------


Date: Tue, 18 Jan 1994 05:32:39 -0800

From: Jim Warren <jwarren@WELL.SF.CA.US>

Subject: File 7--PUB.RCDS #1: online polit disclosures + leg.online (AB1624)


Jan. 18, 1994


This starts a new series of online Updates and occasional panic-mode

Action Alerts regarding specific legislative and regulatory efforts to

assure modern [online, computer-assisted] access to public government

records -- legislative, executive and judicial; federal, state and local.

Most of these postings will fit on one or two printed pages; some will be

noticeably longer.

  ** Any time you wish to NOT receive further postings, just lemmie know

and I'll delete you from the distribution list. **


NEWS TO YOU?

  As I begin this series, I am adding a large number of eaddrs for folks

who have either explicitly requested information in the last several

months about online state legislation, or have otherwise been suggested as

likely-interested in computer-assisted access to public records.

  Reiterating:  Yer on the list until you ask to be off the list.



PROPOSAL FOR COMPUTER-ASSISTED ACCESS TO POLITICAL DISCLOSURES NOW ONLINE

  I have finally found time to upload my 28-page [printed], Jan. 1st

implementation proposal that has been circulating in state and local

political circles since ~Jan. 4th:

    "Computerized Political Disclosures:

     Doing It with Minimal Cost and Maximum Utility."

  This details how to conveniently and economically computerize the filing

of and computer-assisted public access to state and local campaign-finance

disclosures, officials' statements of economic interests, and state

lobbyists' disclosures.  Local-government Clerks and Voter Registrars can

implement it for a one-time cost of ~$10,000 (if they don't already have a

spare PC).  Filings and statewide public access for state offices can be

implemented for as little as $12,000 for a minimal adequate system, plus

perhaps $200/month for statewide access too all disclosures within hours of

them being filed.  (It is likely, however, that they may spend 3 to 5 times

the minimum capital amount -- but will incur significant other savings in

staff and resources and provide wildly-improved statewide services.)

Copies in MacWord5 and/or RTF format are available by anonymous-ftp, WAIS,

gopher, Veronica, etc. from:

    Internet-host:  cpsr.org

    In directory:   /cpsr/states/california/polidisclos

[If you are on the WELL, you can copy them directly from my home directory.]


  On Jan. 11th, I met with Deputy Chief Secretary of State Tony Miller and

his staff, who had reviewed the proposal.  They were enthusiastic about it,

and projected that they will need little or *no* additional budget allocation

to do it.

  It will, however, require some legislative authorizations and mandates.

It appears likely that State Senator Tom Hayden will amend the needed

language into his campaign-reform bill, SB758.  I should know more within

two weeks or less.



FOUR BILLS INTRODUCED TO OPEN UP ALREADY-COMPUTERIZED PUBLIC RECORDS

  Assembly Members Debra Bowen (D, Marina del Rey) and Tom Bates (D, Oakland-

Berkeley) have introduced a total of four bills seeking modern access to

California's computerized public records.  Call their offices for copies:

  Bowen: 916-445-8528, Mary Winkley    Bates: 916-445-7554, Rachel Richman

More in future updates.  Privacy advocates, please note:  A "public" record,

by definition, does NOT include personal information that is not public.



SON OF AB1624 [Or "OFFSPRING OF ...", for the politically-correct  :-)  ]

  These notices are a follow-on to 34+ online notices regarding the 1993

California Legislature's Assembly Bill 1624 (by Bowen).

Now Calif. Govt. Code 10248, AB1624 mandates that all California state

legislation-in-progress, state statutes and the state Constitution be

available via the Internet, without charge by the state.

  For antiquitarians' interest, those online notices plus other related

postings are available by anonymous-ftp, WAIS, gopher, Veronica, etc. from:

    Internet-host:  cpsr.org

    In directory:   /cpsr/states/california/AB1624.



STATE LEGISLATION ONLINE:  AB1624 WHEN?

  AB1624 was signed into law on Oct. 11th and took effect Jan. 1, 1994.

  At the end of December, bill-author Bowen's office said the Legislative

Counsel - which operates the Legislative Data Center (LDC)- had estimated

they would be online and operational by Jan. 10th.  Last week, Bowen's

office reported that Legis.Counsel was then estimating they would be online

and publicly operational by Friday, Jan. 21st.

  It continues to be my sincere belief that the LDC staff *are* *diligently*

trying to get the system operational.  Don't blame them; I honestly believe

they are doing the best they can with the time and resources allotted to them

by their management.

  However, I find it arrogant disregard by the Chief Legislative Counsel,

that he ignores requests for progress details - especially amazing in that

the entire issue in AB1624 is the public's right to know what their/our

government is doing.  All the worse, his lack of a public statement causes

his computer staff unjustified ill-repute among the public, and that ain't

right!

  If they're not online by about the 23rd, I will send another update

giving the name, address, phone number and fax number of the responsible

party, the Chief Legislative Counsel, and folks can explore his responsive-

ness, directly.

  When I know more, you'll know more.


Mo' as it Is.

--jim

Jim Warren, columnist for MicroTimes, Government Technology, BoardWatch, etc.

jwarren@well.sf.ca.us  -or-  jwarren@autodesk.com

345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/415-851-2814

[organizer & Chair, First Conference on Computers, Freedom & Privacy (1991);

InfoWorld founder (1978); PBS's "Computer Chronicles" first host; blah blah]


  >>Permission herewith granted for unlimited reposting and recirculation.<<



------------------------------


Date: Wed, 19 Jan 1994 15:06:18 -0800

From: Jim Warren <jwarren@WELL.SF.CA.US>

Subject: File 8--GOV-ACCESS #2 interests; radio chat; joining this list


Jan. 19, 1994


SOME DIMENSIONS OF THE GOV-ACCESS/PUB-RCDS TURF


  Note:  Access to public records is one component of a broader issue -- the

input side (from the public's perspective, the perspective of this list).

  Functionality in which citizens may be interested:


    access to information, online feedback to officials & agencies

    online access, offline bulk-data access, info services (not just data)

    personal use, nonprofit-organization use, commercial/tax-paying use

    public dissemination, community discussion (town-sized to Village Earth)

  Level(s) of government in which citizens may be interested:

    city/town, county/parrish, state, federal, multi-national

    <specific areas of special interest>

  Types of public government information in which citizens may be

    interested:  political disclosures, legislative, judicial/courts,

    all public records <specific topics of special interest>


If yer willin', it would be nice to know your interests -- which will

*not* be disclosed to anyone else, unless your identifying specifics

are removed.  **If you respond, please be SURE to indicate whether you

are already on this distribution list -- i.e., you received this,

directly to your eaddr.**


SF BAY AREA TALK-SHOW ABOUT COMPUTER-AIDED PUBLIC ACCESS TO GOVERNMENT

  I have been invited to have an hour-long radio talk-show chat about

computer-assisted access to government -- legislative information,

political disclosures, computerized public records, etc. (and I hope

to include privacy concerns in the discussion, too, e.g. commercial

abuse of driver lic info).

  More importantly, it's on one of the biggest stations in the San

Francisco Bay Area, and it's in radio's *prime* time -- the weekday

p.m. commute hours!


    The Peter B. Collins Show

    KSFO-AM/KYA-FM  (560-KHz/93-MHz)

    5:30 p.m. - 6:30 p.m., Monday, January 24th


[ If you are knowedgeable computer-aided gov-access issues, why not

contact *your* area's radio talk-show producers (ask for the producer;

not the host), and see if they will have you and/or knowledgable

collegues discuss them? ]



TO BE ADDED TO THIS GOV-ACCESS INFORMATION-DISTRIBUTION LIST


  Several people pointed out that I neglected, in posting #1, to state how

new-comers can be added to this distribution list.   Tsk! <blush>

(This list has been growing for about 9 months; originally focused only on

one specific California bill mandating free online legislative access.)

  Email your request to    jwarren@well.sf.ca.us


  At a minimum, state the email address you wish added to the list.

If you are willing, please also include your traditional contact info:

name, work, organization, snailmail address, voice phone, fax.


  Please note: So far, this is an information distribution list; not a

discussion list.  However, several of us are planning moderated and

unmoderated USENET news-groups on these topics -- that will *not*

conflict with existant news-groups and lists.  Yes, as soon as there

are coherent draft-plans, this list will hear of them.


Jim Warren, columnist for MicroTimes, Government Technology, BoardWatch, etc.


  >>Permission herewith granted for unlimited reposting and recirculation.<<


------------------------------


End of Computer Underground Digest #6.09

************************************


Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS