Computer underground Digest    Sun June 7, 1992   Volume 4 : Issue 25

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Associate Editor: Etaion Shrdlu, Jr.
       Newest Authormeister: B. Kehoe
       Arcmeister: Bob Kusumoto
       Downundermeister: Dan Carosone

CONTENTS, #4.25 (June 7, 1992)
File 1--Detailed Summary of X-Press (Response to CuD 4.24)
File 2--Study of E-Mail/Computer-Mediated Communication
File 3--Major Congressional Candidates Commit to Elec. Civil Liberties
File 4--Internet Society Details
File 5--GEnie RTC with Hafner (Co-author of CYBERPUNK)

Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie in the PF*NPC RT libraries, on
the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from
ftp.eff.org (192.88.144.4), chsun1.spc.uchicago.edu, and
ftp.ee.mu.oz.au.  To use the U. of Chicago email server, send mail
with the subject "help" (without the quotes) to
archive-server@chsun1.spc.uchicago.edu.  European distributor: ComNet
in Luxembourg BBS (++352) 466893.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted as long as the source
is cited.  Some authors do copyright their material, and they should
be contacted for reprint permission.  It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to
computer culture and communication.  Articles are preferred to short
responses.  Please avoid quoting previous posts unless absolutely
necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

----------------------------------------------------------------------

Date: Fri, 5 Jun 92 04:48 EST
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
Subject: File 1--Detailed Summary of X-Press (Response to CuD 4.24)

In CUD #4.24, the transcript of Cisler's forum on Genie mentioned
X-Press.  Here is a more detailed description of what X-Press is.

++++++++++++++++++++++++++++++

Excerpts from: "Connecting Your Computer to Cable TV
                Doubles the Dimensions of Cyberspace"
                by Michael E. Marotta
(originally published Aug 1991 by TELECOMPUTING, Albuq, NM)

X-PRESS Informations Services, Ltd., of Denver Colorado, makes it
possible for your home computer to receive and store news via cable
(or satellite) television.  X-PRESS X-Change is their basic service;
they also sell an "executive" connection geared to businesses.

X-PRESS X-Change is a basic consumer information service provided by
cable television companies to personal computers.  The service is a
constant stream of worldwide news, sports, and weather supplemented
with articles on lifestyle, shopping, and entertainment.  Conferencing
with other users is also possible.

International news is the key feature of X-Change.  In addition to the
Associated Press, there are nine other news feeds.  Tass and Xinhua
send news in English from the USSR and China.  English-language news
also comes from OPEC, Taiwan and Japan.  NOTIMEX sends out news in
Spanish from Mexico.  User can define up to 16 keywords for which the
computer will automatically scan.  The results can be stored to disk
for later evaluation.

The service is generally compatible with IBM-PC, Apple // and
Macintosh, Atari and Amiga computers.  It is most compatible with
IBM-PCs including the XT, AT and PC/2 lines.  To run with an Apple //c
or //e, requires a super serial card.  As you would expect, only the
Atari-ST series can be used and Amiga owners must have a 500, 1000 or
2000.  This is a 16-bit service.

Also, there are some differences in the kinds of special features the
various kinds of personal computers will support.  For example, all of
them will news and stock quotes and all can write news stories to disk
for future reference.  However, only IBM, Atari and Amiga systems can
accept futures and options information.

To connect to X-Change, you buy an interface kit for $99.95. If your
cable television service already offers X-change there is no other
charge.  Executive service costs $19.95 per month.  The cost of the
modem is higher, also, $149.95.  If your cable television provider
does not carry X-Change and doesn't want to, then you can use a
satellite dish.  The signal comes from Galaxy-1 transponders 7 (WTBS)
and 18 (CNN) but you don't have to subscribe to these to use the
InfoCipher equipment.  Via satellite the Executive service costs
$26.95 per month.

Both the Executive and basic products give you access to financial
information.  For instance basic service includes the ability to track
128 symbols from 2000 securities.  X-PRESS Executive provides quotes
on 30,000 securities.   In addition, stocks, Treasury rates, CDs,
Broker Call Loans and foreign exchange rate, and selected metal prices
are also available. X-PRESS also provides software for tracking and
analyzing financial data.  The output is compatible with Lotus 1-2-3.

Conferencing is also possible.  X-PRESS clients can dial in via a
Tymnet 800 number.  Users can read and post messages in several areas.
X-PRESS then selects messages to be posted on the television feeds.
The "Pen Pals" conference is popular with grade schoolers.  High
school students benefit from a "Science and Technology" conference
that leans toward NASA activities.  Thus, X-PRESS is basically a BBS
via cable television or satellite.  Of necessity, the information flow
is generally one way, from X-PRESS to you.

------------------------------

Date: Fri 53 Jun 1992 17:22:51 CST
From: Jim Thomas<tk0jut1@niu.bitnet>
Subject: File 2--Study of E-Mail/Computer-Mediated Communication

A novel study is being proposed by a number of participants of the
bitnet Computer-Mediated Communication (CMC) newsgroup.  It may be the
first such study--done by researchers scattered around the world who
have never met--of its kind.  The CMC forum focuses on academic
discussions related to the impact of computer and related technology
on forms, content, and structure of communication. Those interested
can subscribe by sending the command:  JOIN CMC <name> to:
COMSERVE@RPIECS Here is a summary of the research:

                 ++++++ original post follows +++++++


 Date-         Wed, 3 Jun 1992 19-19-00 IST
 From-         Sheizaf Rafaeli <KBUSR@HUJIVM1.BITNET>
 Subject-      E-Group study update

E-Groups study,  outline #3, update

As promised, here is a short summary of what has happened (for those
tuning-in late):

It began with a discussion of the dynamics of discussions. David
Levine, of UC Berkeley, proposed a 'bad posts drive out good'
postulate, that ignited many of us. A group of us have agreed to
attempt a joint study of the longevity and process of e-group
discussions.

We are now doing two things:

        1) Mobilizing: identifying participants and collecting 'pledges'.
        2) Conceptualizing: identifying research questions and hypotheses,
           with an eye toward a study or two.

There seem to be, in the works, two parallel efforts.  One line of
inquiry will be qualitative. The purpose in this study will be an
in-depth analysis of the dynamics occuring within a list. Prof. Brenda
Danet will, I hope, fill in more details on this effort.

The second project is shaping up to be a content-analysis of a
representative sample of archived discussions, which may (later) be
linked to surveys of users, moderators, participant observations, etc.
Under discussion are the hypotheses such a data set can address.

The e-group content analysis is an attempt to quantify group behavior
(formation, cohesion, dispersal) on e-lists. The hypotheses suggested so
far predict sensitivity of the threads of discussion to combinations of
the following variables:

        * Length of messages
        * language of message
        * presence and nature of subject header
        * presence and nature of stylized signature
        * writer status
        * writer gender
        * dependency on previous messages (posts)
        * use of quotes from previous posts
        * tone (sarcasm, information, plea, threat, support, 'lecture')
        * use of questions, challenges
        * extent of use of nonverbal cues in message
        * presence of "flames"
        * metacommunication, that is communication about communication
        * personal interest vested in post
        * reference to external communication sources

We intend to 'massage' these concepts into a workable codebook. If the
numbers of participants stay where they are right now, the onerous
nature of content analysis grunt work wont even be that bad. We should
be able to generate reliable data.

The codebook will then be used to content-analyze series of messages.
Hopefully, we will end up with enough data to identify threads of
discussions, and "communities" forming, lasting and/or disbanding.
Eventually, if this works, we'll have at least two products on our
hands:

        a. a large data set all can dip into.
        b. the experience of having collaborated without meeting.

I believe either of the two is good enough reason to try.

Under discussion, currently, are:

        1) Hypotheses and research questions.
        2) Items for inclusion in the codebook.
        3) Individual lists for inclusion in the sample,
           or - alternatively - a method for selecting lists.


Nothing is set in stone yet. It is all, literally, bits in the wind. So
join in, Please!



Sheizaf Rafaeli
Hebrew University of Jerusalem
sheizafr@shum.huji.ac.il
or KBUSR@HUJIVM1

------------------------------

Date: Mon, 1 Jun 92 10:59:51 PDT
From: jwarren@AUTODESK.COM(Jim Warren)
Subject: File 3--Major Congressional Candidates Commit to Elec. Civil Liberties

Five Leading San Francisco Peninsula Congressional Candidates Sign
Explicit Commitments to Protect "Electronic Civil Liberties"

All but one of the six leading candidates for California's 14th
Congressional District have formally committed to protect traditional
constitutional liberties against technological threats.  All three
Republican candidates and two of the three leading Democratic
candidates signed formal commitments.

The 14th District covers northern "Silicon Valley" and the southern
half of the San Francisco Peninsula.

This is believed to be the first time that major-party congressional
candidates have ever committed to explicit action to protect
technology-related civil liberties.

The candidates' signed statements that were much more than
nice-sounding, equivocating "God, mother and apple-pie" principles.
They made explicit commitments to take explicit action in their
first/next term in Congress.

Those 14th Dist candidates who signed the formal statement (below)
included:
Dixon Arnett (R),      Tom Huening (R),        Ted Lempert (D),
Tom Nolan (D),         Mike Maibach (R) and    Chuck Olson (L).

Gerry Andeen (D) sent a statement about the issues, but made NO
COMMITMENTS.

Anna Eshoo (D) FAILED TO RESPOND AFTER FOUR REQUESTS, as did
then-candidate James Blackman (D), after three requests.  The multiple
requests were faxed and mailed to the candidates between Apr. 4th and
Apr. 13th, along with an explanatory cover letter.

Lempert was the first to respond -- apparently by return mail -- and
added a two-page statement regarding technological threats to personal
privacy and his commitment to seek protection against them, as well.

  Arnett's response also noted that he was one of the cosponsors of
the Privacy Section that was added to the California Constitution
during his tenure in the state Assembly.

In addition, ten other Libertarian candidates signed the formal
statement, apparently circulated by Libertarian activists, primarily
using the computer nets.  Those signing included:
Alan F. Barksdale (U.S. Senate from Alabama),
Richard Boddie (U.S. Senate from California),
James Elwood (8th House Dist from California),
June R. Genis (U.S. Senate from California),
Robert D. Goodwyn (22nd California State Assembly Dist),
Chuck Hammill (47th California State Assembly Dist),
James J. Ludemann (California State Assembly),
George L. O'Brien (12th House Dist from California),
Anton Sherwood (12th California State Assembly Dist),
Mark Valverde (13th California State Assembly Dist) and
Will Wohler (3rd California State Senate Dist).

  Note:  This Libertarian sign-up resulted entirely from one copy
being sent by electronic-mail to June Genis (San Mateo County) and one
to Mark Hinkle (Santa Clara County activist).

Several others responded without committing to action:

  U.S. Senate candidate Tom Campbell (R) also sent a statement about
the issues, but offered NO COMMITMENTS TO EXPLICIT ACTION, as did
Glenn Tenney (D, 12th House).

  This effort was an outcome of disclosures before and during the
First Conference on Computers, Freedom & Privacy, held near San
Francisco International Airport in March, 1991.  It drew over eighty
pages of public and trade press coverage, internationally.

This is the statement that was signed by the indicated candidates:

           Guaranteeing Constitutional Freedoms into the 21st Century

Preface

    Harvard Law Professor Laurence H. Tribe, one of the nation's
leading Constitutional scholars, views technological threats to our
traditional constitutional freedoms and protections as so serious that --
for the first time in his career -- he has proposed a Constitutional
Amendment:

    "This Constitution's protections for the freedoms of speech,
press, petition and assembly, and its protections against unreasonable
searches and seizures and the deprivation of life, liberty or property
without due process of law, should be construed as fully applicable
without regard to the technological method or medium through which
information content is generated, stored, altered, transmitted or
controlled."

    -- First Conf. on Computers, Freedom & Privacy, 3/27/91, Burlingame CA

    In the absence of such a constitutional clarification, legislation
and regulation are the only alternatives to assure that citizens are
protected from technological threats against their constitutional
rights and freedoms.


                    Candidate's Commitment to Action

    Preface:  It has been over two centuries since our Constitution
and Bill of Rights were adopted.  The great technological changes in
the interim --especially in computing, telecommunications and
electronics -- now pose a clear and present danger to the rights and
protections guaranteed in those great documents.  Therefore:

    Commitment:  In the first legislative session after I am
[re]elected, I will author or co-author legislation reflecting the
following specifics, and I will actively support and testify in favor
of any similar legislation as may be introduced by others.  Further, I
will actively seek to include in such legislation, explicit personal
civil and/or criminal penalties against any agent, employee or
official of the government who violates any of these statutes.  And
finally, I will keep all citizens who express interest in legislative
progress on these matters fully and timely informed.

    The protections guaranteed in the Constitution and its Amendments
shall be fully applicable regardless of the current technology of the
time. This particularly includes, but is not limited to:

    Speech:  Freedom of speech shall be equally protected, whether by
voice or in written form as in the 18th Century, or by electronic
transmission or computer communication as in the 20th Century and
thereafter.

    Press:  Freedom of the press shall be equally protected, whether
its information is distributed by print as in the 18th Century, or by
networked computers or other electronic forms, as in the 20th Century
and thereafter.  Liability for content:  Just as a printer is not
liable for content of leaflets printed for a customer, so also shall
the owner or operator of a computer or electronic or
telecommunications facility be held harmless for the content of
information distributed by users of that facility, except as the owner
or operator may, by contract, control information content.  Those who
author statements and those who have contractual authority to control
content shall be the parties singularly responsible for such content.

    Assembly:  Freedom of assembly shall be equally protected, whether
by face-to-face meeting as in the 18th Century, or by computer-based
electronic-conference or other teleconference as in the 20th Century
and thereafter.  The right to hold confidential meetings shall be
equally protected, whether they be by personal meeting in private
chambers, or by computer-assisted or electronic-based means.

    Self-defense:  The right of the people to keep and use computers
and communications connections shall not be abridged by the
government.

    Search & seizure:  The right of the people to be secure in their
papers and effects, against unreasonable searches and seizures, shall
be fully applicable to their electronic mail, computerized information
and personal computer systems.

Warrants:  No warrants for search or seizure shall issue for
computerized information, but upon probable cause, supported by oath
or affirmation, and particularly describing the computer system to be
searched and the specific information to be seized.

Secure information vaults:  Just as search and seizure of letters in a
post-office, and papers in a bank-vault lock-box, and surveillance of
telephone conversations by wire-tap, each require a separate warrant
for each postal address, lock-box and telephone line, so also shall a
separate warrant be required for each electronic-mail address and/or
computer files of each suspect, when stored in a computer facility or
archive shared by others.  And further, computer files stored in a
shared facility or archive by or for a citizen who is neither named in
a warrant nor associated with a suspect so-named, may not be used
against that un-named citizen, if seized or discovered during legal
search of or for files of a suspect.

    Self-incrimination:  No person shall be compelled in any civil or
criminal case to be a witness against himself or herself, nor be
compelled to provide information retained only in their mind, nor
otherwise be compelled to assist the translation or decoding of
information that he or she believes may be self-incriminating.

    Property: Private property shall not be taken for public use without
just compensation, nor shall such property be used nor sold by any
government agency for less than fair market value, in which case all such
proceeds shall promptly derive singularly to its last owner prior to
government seizure.

    Speedy release:  Anyone not accused of a crime shall enjoy the
right to a speedy release and return of all of their property, as may
be seized under any warrant, particularly including their computerized
information.  The government shall be fully liable for any damage
befalling property or information they have seized.


[ Additional copies of this model candidate's position commitment are
available from:
  Jim Warren, Electronic Democracy Initiatives,
  345 Swett Road, Woodside CA 94062; (415)851-7075, fax/(415)851-2814;
  electronic-mail/  jwarren@autodesk.com  -or-  jwarren@well.sf.ca.us
For identification purposes, only:  organized and chaired the First
Conference on Computers, Freedom & Privacy (3/91), received one of the
Electronic Frontier Foundation's first Pioneer Awards (3/92), is a
"futures" columnist for MicroTimes, an Autodesk Board member, the founder
of InfoWorld, PBS-TV "Computer Chronicles" founding host, etc. ]

------------------------------

Date:    Tue, 2 Jun 1992 17:54:44 GMT
From: NEELY_MP@DARWIN.NTU.EDU.AU(Mark P. Neely, Northern Territory Univ.)
Subject: File 4--Internet Society Details

Details of the Internet Society for the readers of CuD:-

   >From: Geoff Huston <G.Huston@aarnet.edu.au

   >The Internet Society Newsletter is a publication of the Internet
   >Society, sent to members of the Internet Society free of charge.

   >To receive a subscription you need to join the Internet Society
   >as a personal member. Regular membership is $70 US p.a. and
   >student membership is $25 US p.a. The Internet Society is a
   >non-profit professional society whose objective
   >is facilitate and support the technical evolution of the
   >Internet  as a research and education infrastructure.

   >To join send you details (name, address, email) to the Internet
   >Society at
   >isoc@nri.reston.va.us

   >cheers

   >Geoff Huston

------------------------------

Date: 30 May 92 21:08:09 EDT
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 5--GEnie RTC with Hafner (Co-author of CYBERPUNK)

  ______________________________________________________
 |                                                      |
 |  The Public Forum * NonProfit Connection RoundTable  |______
 |______________________________________________________|      |
   |  Sysops' GE Mail: PF$    RTC Sunday 9pm EDT:  MOVE 545;2  |______
   |___________________________________________________________|      |
     |  News, Current Events, Government, Societal Issues, Nonprofits |
     |________________________________________________________________|

                   Real-time Conference on Cyberpunk
                                  with
                              Katie Hafner
                             (May 24, 1992)
  ====================================================================

      (C) 1992 by GEnie (R) and Public Forum*NonProfit Connection

           This file may be distributed only in its entirety
                      and with this notice intact.


CYBERPUNK: Outlaws and Hackers on the Computer Frontier has intrigued
everyone from William (Neuromancer) Gibson to Mitch (Lotus Development)
Kapor.

On May 24 at 9pm ET, author Katie Hafner joined us to talk about the
social consequences of computer networks and the communities that have
grown up around them.  The government has both raided local BBSs and
solicited proposals for a "weaponized virus." What rules of the road
would you make for computer networks? Former news editor of Data
Communications magazine, Katie was correspondent for Business Week
specializing in technology and computers.  A graduate of the University
of California at Santa Barbara, with an M.A. from Columbia University
School of Journalism, she's now working on a book about German
reunification. The New York Times' John Markoff is co-author of
Cyberpunk.

This RTC is the third in the Public Forum's month-long program on
Technology and Society.  Our next RTC is May 31. And don't miss lively
discussion of Science, Technology and Society in bulletin board category
7, and check out the files on technology and society in our library.
See Cat 7/Topic 1 for details.

An electronic meeting place for friends, family and national "town
meetings," GEnie is an international online computer network for
information, education and entertainment. For under $5.00/month, GEnie
offers over 50 special interest bulletin boards and unlimited electronic
mail at no extra charge during evenings, weekends and holidays. GEnie is
offered by GE Information Services, a division of General Electric
Company.

In the Public Forum*NonProfit Connection, thousands of people every day
discuss politics and a wide range of social and nonprofit issues.  A
neutral arena for all points of view, the PF*NPC is presented by Public
Interest Media, a nonprofit organization devoted to empowering people
through the socially productive use of information and communication
technology. For more information about GEnie or the Public Forum, call
1-800-638-9636 or send electronic mail to tsherman@igc.org.

 To sign up for GEnie service, call (with modem in HALF DUPLEX)
 800-638-8369.  Upon connection, type HHH.  At the U#= prompt, type
 XTX88367,GENIE <RETURN>.  The system will prompt you for information.

 ====================================================================

        __________________________________________________________
    -=((    The Public Forum * NonProfit Connection RoundTable    ))=-
  -==(((           GEnie Page 545 - Keywords PF or NPC            )))==-
    -=((__________________________________________________________))=-



<SHERRY.PF>              I'd like to welcome everyone to the RTC. Katie, why
          don't you say a few words and introduce yourself.

<[Katie] PRESS11>        let's see... john markoff (my husband) and i wrote
                         cyberpunk over a period... of about three years and
                         it came out last summer. but the book isn't cheap, so
                         luckily, the papberback is coming out next month
                         let's see...what else?....oh yes, now i'm living in
                         berlin... most of the time, working on a second book.

<SHERMAN>                Let me explain the process here . . . Before we get
          started, a word about the process . . . At the
          beginning, only Katie and people asking questions
          will be able to talk so that everyone gets a turn . .
                         If you have a question, type /RAI to raise your
          hand. I'll call on you in order. Please type your
          question, but DON'T hit <return> to send it. When
          you're called on, THEN hit <return> to send your
          question quickly . . . so we'll have time for more
          questions . . . It's good to use three periods if you
          have more to say and to put GA for "go ahead" at the
          end of a final phrase . . . So let's see those
          /RAIsed hands and I'll start calling on you! GA

<[Darryl] D.JENT>        Katie, did you actually meet Kevin Mitnick & the
          others in your book ga

<[Katie] PRESS11>        yes. i met everyone in the book. the only one who
          didn't cooperate with the book was kevin... kevin is
          the hacker we wrote about in the first section of the
          book... a member of an l.a. gang of phone phreaks and
          hackers called the roscoe gang... he wanted to be
          paid to talk to us, and i explained to him (and his
          grandmother, who was working as his agent...) that
          journalists, for obvious ethical reasons, do not (if
          they're good journalists, that is)... pay sources fo
          information.

<[Gene] G.STOVER>        When do you think cyberspace will be available to the
          general public? What part will NREN and ISDN play in
          this? <ga>

<[Katie] PRESS11>        it already is... the more bandwidth, the more
          cyberspace! ga

<SHERMAN>                After a few more people have had a chance to ask
          questions . . . I'll give everyone a second or third
          or fourthchance . . . <grin> Richard, your question?

<[Richard] R.GILLIAM3>   Who was the publisher for each edition?

<[Katie] PRESS11>        simon & schuster did the hardcover, and an imprint of
                         S&S... called Touchstone is doing the paperback. ga

<[Richard] R.GILLIAM3>   Who was your editor at the publishing house. (Sorry
          for my unfamiliarity with the commands)

<[Katie] PRESS11>        my editor? a very nice guy who doesn't know a lot
                         about technology named Bob Bender ga

<SHERRY.PF>              Katie, I read _The Cuckoo's Egg_, and was fascinated
          -- and appalled. Have The Powers That Be become any
          more security conscious, or at least any more willing
          to listen in the event something like that happens
          again?

<[Katie] PRESS11>        it's still pretty bad, security-wise out there...
          there are lots of loopholes. everywhere. ga

<[2] eric] E.SHCHNEIDER> did he give you permission to write about him ..... m

<[Katie] PRESS11>        no. no one gave us permission. we're journalists, not
          movie producers. ga

<[Andrea] A.DUDA>        We read about the really sensational cases of
          hackers. How much of a problem are they overall? And
          in trying to limit their activities, do we lose more
          than we gain (since we limit other, legitimate, users
          as well)?

<[Katie] PRESS11>        i think that the press reports that blow the hacking
          incidents out of proportion.... do a real disservice
          to society... that is, i think that now the public at
          large has an exaggerated fear of hackers. in the
          book... we tried to write very realistically about
          what really happened... and i do think that we're
          treading aline between restricting access too much
          and leaving systems too wide open. ga

<[Darryl] D.JENT>        Katie, What was your feelings about the chaos club in
                         Germany?

<[Katie] PRESS11>        i like them a lot... they're very different from
                         hackers in the united states, and that was kind of
                         interesting...

<[Darryl] D.JENT>        How much of their activities did you get to witness
          ga

<[Katie] PRESS11>        wau holland, the founder of chaos, is an old 60's
          radical, and a liberatarian who's categorically
          opposed to authority ga

<[Tom] SHERMAN>          Katie, did you see Darryl's second qeustion -- how
          much of their activities did you get to witness?

<[Katie] PRESS11>        oops. sorry... yeah. i hung out with pengo in berlin
          for several weeks... and of course i witnessed quite
          a bit... he was good (at hacking, that is), but more
          of a talker, really, than anything else... the really
          talented one in that group was probably markus hess,
          the one who was in the berkeley computers and who
          gave cliff stoll such a heart attack... and in the
          end, they all got scared and ratted on each other and
          three of them went to jail (well, hess's parents
          bailed him out) ga

<[Tom] SHERMAN>          Katie, who do you think is going to draw that line
          between too little restriction and too much? What
          role does the public play? ga

<[Katie] PRESS11>        i guess we have to draw the line... i mean, we are
          all sitting in cyberspace right now, and we're pretty
          much respecting the rules of the road... and if we
          want to keep the feds from telling us what we can and
          cannot do in cyberspace then we have to come up with
          rules that are acceptable to us and to them. ga

<[Andrea] A.DUDA>        How do you think the "rules of the road" will change
          when commercial firms become more evident with NREN?
          Are they more concerned about security than
          universities, etc.?

<[Katie] PRESS11>        in a way it's too bad because anything that goes
          commercial takes on a formal flavor that can be
          restrictive... but that's not always the case... but
          yes, they are concerned about security, particularly
          because of all the security firms out there telling
          them they should be. ga

<[Andrea] A.DUDA>        One of the things I like about the Internet is being
          able to go to various computers for information. Do
          you think the whole system will become more
          restrictive to accommodate the commercial firms?

<[Katie] PRESS11>        new technology such as cryptography... will tend to
          make commercialization work because it will make
          breaking into systems more difficult. ga

<[Tom] SHERMAN>          Katie, would you say something about the differences
          between European and US regulations governing
          security and privacy -- and the potential for
          problems with the European Community?

<[Katie] PRESS11>        the europeans have always (like in all things) been a
          little bit behind the u.s.... in hacking laws. the
          most interesting thing about it is that as soon as a
          country makes it illegal to break into computers...
          then the hacking drops precipitously (or maybe the
          underground goes deeper)... the international folks
          at the ec are already trying to come up with uniform
          laws governing computer security throughout the
          european community. yawn. ga

<[Phillip] P.MAY2>       katie, do you feel there is a greater potential for
          abuse of systems from "insiders", i.e. employees of
          companies who implement the systems, or outsiders
          like those described in you r book .? ga

<[Katie] PRESS11>        of course there is... it's pretty widely known that
          almost all of the white-collar crime out there that
          uses computers and is most expensive to business is
          committed by insiders... but companies get very
          embarrassed by that... and they tend not to report
          those crimes... they'd rather report crimes that seem
          to be committed by juvenile delinquents... not their
          own people! ga

<[Darryl] D.JENT>        What is nren & Katie what is the new book about. More
          hackers or what?... I loved your first book, read it
          in two days ga

<[Katie] PRESS11>        national research and education network, designed to
          send data above a gigabit... and tie all the nation's
          supercomputer centers together and it's federally
          funded. the book i'm working on now... is about a
          particular house in gemrany. just over the glienicker
          bride (where all the spies used to be exchanged)...
          in berlin. nothing to do with computers.

<[Tom] SHERMAN>          Darryl, check out the article from the Whole Earth
          Review about data highways; it's in our file library
          (with permission, of course :-) Darryl, follow up
          question?

<[Darryl] D.JENT>        Sounds interesting still, I'll thanks

<[Richard] R.GILLIAM3>   Stock exchanges and currency exchanges are close to
          24 hour world-wide operation. How possible will it be
          for insiders to undetectable manipulate the
          markets?GA

<[Katie] PRESS11>        quite possible. have you heard about the $170
          million or so that disappeared mysteriously from
          volkswagen's books?... this happened a few years
          ago. ga

<[Richard] R.GILLIAM3>   No. I haven't heard the VW story. I think the
          potential for financial hacking is enormous GA

<[Katie] PRESS11>        i think you're absolutely right... and i think we
          (the public) only hear about a very small fraction of
          the stuff that goes on. ga

<[Tom] SHERMAN>          Before we move into open discussion, I want to take a
                         second to . . . thank all of you for your question
                         and, especially, . . . to thank Katie for joining us!

<[Katie] PRESS11>        it was fun! sorry about all my typing blunders :-)

<[Tom] SHERMAN>          And now for the winners of our contest . . . Thanks
                         to Simon & Schuster, the publishers of CYBERPUNK, for
                         donating four copies of the book to our contest
                         winners. Thanks to everyone for submitting such
                         imaginative entries!. . . The envelope please . . .

                         For the best scenarios describing constructive uses
                         of hacking, T.CAMPBELL11 and M.VANCE1. And for
                         destructive uses, S.CURTISIII1 and D.TAMPLIN.
                         Congratulations to Tim, Vance, Stan and David! I'll
                         now open the room so that all of us can type . . .

<[Tom] SHERMAN>          No one counts typing blunders, Katie, not in here!

<[Richard] R.GILLIAM3>   RTC spell-checkers. The next cyber-frontier! <g>

<[Andrea] A.DUDA>        Are the contest winners all in one place where we can
          read them?

<[Tom] SHERMAN>          Yes, the contest entries are in Cat 7/Topics 16 and
                         17, except . . . for one that was sent by e-mail
                         because the author thought it too dangerous to post
                         in public

<[Tom] SHERMAN>          Katie, what do you think about the FBI's interest in
          legislation requiring the phone companies to make
                         digital phone transmission accessible to them? (Did
                         you see Marc and Janlori on Koppel's program the
                         other night?)

<[Katie] PRESS11>        it's the stupidest thing i've ever heard of. it will
          never work... people will just buy cheap encryption.

<[Darryl] D.JENT>        Katie, have you meet meet William Gibson & How
          surprised are you at the way his books have become
          reality?

<[Tom] SHERMAN>          Hmmm, say a little more about that, would you?

<[Katie] PRESS11>        i've talked to him on the phone. i'd like to meet
          him, though. he's extremely tall, i hear ... but what
          part has become reality? ga

<[Fomalhaut] J.PAXSON>   Darryl, pray that the world itself does not become
          that horrible.

<[Katie] PRESS11>        you're not kidding.

<[Darryl] D.JENT>        I was meaning the way virtual reality is shaping

<[Darryl] D.JENT>        Most of what I've read about VR lately was in his
          books

<[Fomalhaut] J.PAXSON>   I've had some success with virtual reality using
          x-specs and stereo headphones.

<[Richard] R.GILLIAM3>   Experiment surgery has been done for the hearing
          impaired, wiring the bones between the ear and the
          brain so that some sound can be heard. This is, I
          suggest, a rudimentary form of the cyber-wiring that
          is certain to come.

<[Tom] SHERMAN>          Richard, will they just wire digital jacks where our
          ears used to be?

<[Katie] PRESS11>        that's been done for the blind, too.

<[Andrea] A.DUDA>        Interesting thought, Richard. Imagine what happens if
          someone messes with that!

<SHERRY.PF>              I heard that on a talk show just this morning,
          Richard!

<[Richard] R.GILLIAM3>   Yes, Tom. Expect that eventually it will be done by
          radio receivers, not wires.

<[Tom] SHERMAN>          Will there be an OFF switch?

<[Richard] R.GILLIAM3>   Let's hope so, Tom

<SHERRY.PF>              That'll depend on whether or not we end up in 1984 or
          Brave New World.

<[Tom] SHERMAN>          Is this what Gene meant when he said we'd all be on
          the network?

<[Darryl] D.JENT>        Katie, what is the wildest computer lab you have
          visited as far as technologically advanced?

<[Richard] R.GILLIAM3>   I've often thought it was just a question of who got
          us first---the cyberpunks or the genetic engineers.
          Eventually it will be both.

<[Katie] PRESS11>        it's a toss-up between the media lab and xerox parc

<[Darryl] D.JENT>        It that the media lab at MIT?

<SHERRY.PF>              Is that Xerox in Leesburg, VA?

<[Katie] PRESS11>        yeah, and xerox parc in palo alto

<SHERRY.PF>              I haven't been to Palo Alto, but I've been to
          Leesburg. It's pretty wild too. ;)

<[Darryl] D.JENT>        hAVE YOU MET mARVIN mINSKY at MIT, He has wrote some
          wild books about the brain & AI

<[Katie] PRESS11>        yes. he's a wild guy. you should meet his daughter

<[Darryl] D.JENT>        Tom, I didn't get a chance to, but will I loved his
          book Society of the Mind.

<[Katie] PRESS11>        i've never read that.

<[Darryl] D.JENT>        It's about using Artificial Intelligence & trying to
          mimic the brain

<[Darryl] D.JENT>        About how the easiest things we do as humans are the
          hardest to get a computer to do.

<[Tom] SHERMAN>          Katie's already stayed longer than I asked and so . .
                         I want to thank her again for joining us and . . . to
                         remind all of you that Jerry Berman, formerly of the
                         ACLU and now . . . head of the D.C. office of the
                         Electronic Frontier Foundation will . . . be our
                         guest next Sunday! . . . Do join us and, during the
                         week, . . . take a minute to add your thoughts to our
                         bulletin board discussion about . . . technology and
                         society in Category 7 . . . All of you . . . are
                         welcome to stay as long as you like. Katie. thanks
                         again!

<[Darryl] D.JENT>        Such as moving Thanks, Katie, will have to read your
                         new book. Good luck

<[Richard] R.GILLIAM3>   Thanks Katie, Tom. Enjoyed the RTC. Looking forward
          to visiting again.

<SHERRY.PF>              You can get to the PF*NPC bulletin board on page
          8011;1 -- it's a Basic service.


    -----# Participants #-----

<[Andrea] A.DUDA>
<[Darryl] D.JENT>
<[Dave] D.THOMPSON74>
<[2] eric] E.SHCHNEIDER>
<[Gene] G.STOVER>
<[Fomalhaut] J.PAXSON>
<J.PRESLEY1>
<[Lamont] L.INGALLS>
<MCFARMER>
<[Phillip] P.MAY2>
<[Katie] PRESS11>
<[Richard] R.GILLIAM3>
<[Tom] SHERMAN>
<SHERRY.PF>
<[Tom] T.BARKER6>

   __________________________________________________________________
  |  Rights & responsibilities, government, politics, minority civil |_
  |    rights, volunteerism, nonprofit management, the media, the    | |
  |  environment, international issues, gay/lesbian/bisexual issues, | |
  |       women & men, parenting, youth organizations and more!      | |
  |__________________________________________________________________| |
    |__________________________________________________________________|

       ________             PF$  PF*NPC Sysops      _____________
      |        |_                                  | Weekly RTC: |_
      | The    | |      SHERMAN  Tom Sherman       | 9pm Eastern | |
      | PF*NPC | |        SCOTT  Scott Reed        | on Sundays! | |
      | Staff: | |     CHERNOFF  Paul Chernoff     | Type M545;2 | |
      |________| |     GRAFFITI  Ric Helton        |_____________| |
        |________|       SHERRY  Sherry              |_____________|

        __________________________________________________________
    -=((    The Public Forum * NonProfit Connection RoundTable    ))=-
  -==(((           GEnie Page 545 - Keywords PF or NPC            )))==-
    -=((__________________________________________________________))=-


 |
 | This listing was generated by LRTC Version 1.00
 | (C)opyright by Hartmut W. Malzahn, 1991. All rights reserved.
 |

                                 # # #

------------------------------

End of Computer Underground Digest #4.25
************************************