Computer underground Digest    Sun  Oct 24 1993   Volume 5 : Issue 83
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
    Copy Erattaer: Etaoin Shrdlu, III

CONTENTS, #5.83 (Oct 24 1993)
File 1--CuD is taking TWO WEEKS OFF (Returning 7 November)
File 2--Elansky Accepts Plea Agreement (Hartford BBS update)
File 3--A Foreign Embassy Information Infrastructure
File 4--DES Broken?
File 5--Computers & Sustainable Society
File 6--Students Suspended For Electronic Documents
File 7--NOMA (Nat'l Online Media Association) BBS Org. Formed
File 8--A Reporter meets "cyberpunks" (news item)
File 9--"Cyber Comics" (Monterey Cty Coast Weekly Summary)
File 10--Belated response to F. Cohen (CuD 5.80)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;
          In ITALY: Bits against the Empire BBS: +39-461-980493

ANONYMOUS FTP SITES:
  AUSTRALIA:      ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
  EUROPE:         nic.funet.fi in pub/doc/cud. (Finland)
  UNITED STATES:
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud
                  etext.archive.umich.edu (141.211.164.18)  in /pub/CuD/cud
                  ftp.eff.org (192.88.144.4) in /pub/cud
                  halcyon.com( 202.135.191.2) in /pub/mirror/cud
                  ftp.warwick.ac.uk in pub/cud (United Kingdom)

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

----------------------------------------------------------------------

Date: Sun 24 Oct 1993 15:19:41 CDT
From: CuD Moderators <cudigest@mindvox.phantom.com>
Subject: File 1--CuD is taking TWO WEEKS OFF (Returning 7 November)

CuD will be taking two weeks off, beginning after this issue (5.83).
Conference and other travel from Oct 27 thru Nov 3, and "cold-turkey"
withdrawal from all computer activity during that week means that
we won't be answering mail for that eight day period. But, send in
the articles and we'll deal with them on return.

The next CuD (#5.84) will come out Sunday, 7 November.

------------------------------

Date: Sat, Sep 23 1993 11:22:18 CDT
From: CuD Moderators (tk0jut2@mvs.cso.niu.edu)
Subject: File 2--Elansky Accepts Plea Agreement (Hartford BBS update)

((MODERATORS' NOTE: The case of Michael Elansky (Ionizer), sysop of
the former Ware House BBS in West Hartford, Ct., is drawing to a
close. Elansky was arrested in August for making "anarchy files," both
written by a 15 year old four years ago, available on his BBS.
Although the case was compounded by Elansky's previous legal problems,
the arrest specifically for possession of Constitutionally protected
literature was seen by CuD editors and many others as a potential
threat to freedom of expression in cyberspace (see CuD 5.69, 5.71,
5.72, 5.78).

While not formally dropping the charges for the literature, a failure
that we find troubling, the charges will not be pursued.  As Richard
Brown, Elansky's attorney, observes, the prosecutor appears to have
violated the Constitution. If so, it would be refreshing to the
prosecutor held to the same standards of criminal liability to which
Elansky and others are held.

We are indebted to the anonymous reader who provided the information
from the Hartford Courant, edited to conform to "fair use"
guidelines)).

++++++++

     "WEST HARTFORD MAN MAY GET 3-YEAR TERM IN BOMB RECIPE CASE"
       By Matthew Kauffman, The Hartford Courant, Oct. 23, 1993

          A 21-year-old West Hartford man will not be prosecuted
      for running a computer bulletin board that told how to make
      bombs and kill law-enforcement agents, but faces as many as
      three years in prison on other charges.

((The article explains that Elansky has been held in jail since August
on $500,000 bond. As part of a plea agreement on Friday, Elansky
admitted to two violations of probation that could include up to three
years in state prison)).

          But Elansky's attorney asked Superior Court Judge Thomas
      P. Miano to impose no additional prison time. After an hour,
      Miano halted the Friday sentencing hearing without deciding
      whether Elansky belongs behind bars.

((The judge indicated that he simply didn't know enough Elansky to
make a decision, and required additional time)).

          Authorities have portrayed Elansky as a dangerous young
      man, obsessed with explosives and antagonistic toward
      police. When officials gained access to the bulletin board,
      they found a file replete with bomb recipes and techniques
      for "maiming or mortally wounding" law enforcement agents. A
      Massachusetts man has since acknowledged writing the file.

                        ................

          Elansky was given a suspended sentence in 1988 after
      police found two pipe bombs and gunpowder in a basement
      workroom of his home.  Elansky's father, David Elansky, said
      Friday that the devices were small incendiaries Elansky had
      constructed as part of a pyrotechnic display sanctioned by
      Hall High School, where Elansky was a student.

          He was arrested again last fall and charged with
      participating in a burglary at Hall High School in which
      several bottles of volatile chemicals were stolen. In his
      basement, police found homemade explosives _ which David
      Elansky said were part of a high school graduation show. A
      door in the basement, authorities said, had been rigged with
      a device that would propel a glass bottle at intruders.
      That charge also would not be prosecuted as part of Friday's
      plea bargain.

                        .................

          In Superior Court in Hartford Friday, Brown harshly
      criticized the August arrest, saying the information on the
      computer was protected by the First Amendment.

          "It's my very strong feeling that the state of
      Connecticut, in its zeal to get something on this defendant,
      violated the constitution of the United States, the
      constitution of the state of Connecticut and perhaps certain
      laws," Brown said.

((Elansky's attorney held up a copy of the Anarchist's Cook, purchased
at Barnes and Noble, for $20, according to the story.  As indicated in
CuD 5.78, the volume, along with numerous other over-the-counter
publications available to anyone with purchase price, contains
explicit instructions for pyrotechnic and other forms of destruction.
Such volumes are protected under the First Amendment)).

                          ............

          Brown said Elansky may not have taken the criminal
      justice system or his probation seriously, but said that
      changed the day in August he was put in jail. Since then,
      Brown said, Elansky has been assaulted twice, has witnessed
      a hanging and has had to bribe other inmates daily to ensure
      his safety.

------------------------------

Date: Sat 23 Oct 1993 2:21:17 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 3--  A Foreign Embassy Information Infrastructure

((MODERATORS' NOTE:  The following, reprinted from The Well's EFF
conference, describes another proposal for connecting the world in
cyberspace.  Reprinted with the permission of the author
(amicus@well.sf.ca.us)

Author:    Ross Stapleton, Intelligence Community Management Staff

The US Government should organize and subsidize the creation of an
Internet-based information infrastructure for the foreign embassies
sited in Washington DC, in order to encourage those embassies to host
information of interest to US audiences, to facilitate delivery of US
government information to those embassies (and through them, to the
sponsoring countries' governments and populace), and to establish a
better means for US citizens to correspond with foreign governments.

The Washington DC-based diplomatic community is a convenient scope for
such a program: having the prospective users local to Washington would
make them easier to train and support through the start-up phase; the
existing US information infrastructure is much better than many parts
of the international and foreign infrastructure; and many or most of
the embassies are already repositories for information (albeit largely
in nonelectronic form today) that they could be encouraged to provide
to a US audience.

There are a total of XX embassies in the Washington DC area, along
with YY foreign and international government missions.

The program would have three major goals:

1. Provide a means for foreign governments, initially through their
embassies, to provide a broad range of information of interest to US
citizens through the developing US information infrastructure;

2. Provide the US government a faster, more efficient, and more direct
means of providing a broad range of information of interest to foreign
governments, initially through their embassies (in both the first two
goals, it could be expected that embassies would also develop better
means to exchange information with their sponsoring governments--very
likely through the Internet--and to lessen their obligation to serve
as intermediaries);

3. Provide a focus for US citizen interest in foreign countries, for
correspondence with foreign officials and governments.

As one possible implementation strategy, the US State Department could
commission the creation of an Internet site (e.g., a domain of
"embassies.int") and provide funding for service, support and
training, as well as for some amount of communications equipment to be
provided to participating embassies (the last might be unnecessary
where participating embassies could provide their own resources, or
where corporate or other sponsors might be found to contribute
resources).   At a minimum, each participating embassy would have at
least one Internet account (e.g., "ecuador@embassies.int") for
electronic mail purposes.   Each embassy that chose to expand its
investment in the facility could be provided with its own subdomain
(e.g., "france.embassies.int") for the provision of additional
services.

Each participating embassy should agree at a minimum to provide (1)
simple correspondence, which need be nothing more than an
auto-response message instructing on how to reach the embassy via
traditional means (telephone, fax or letter), (2) basic information on
embassy services (e.g., how to receive and file forms for visas), and
(3) additional information (economic, cultural, etc.) likely to be of
interest to a US audience, in order to build up the program's general
information resources, to be made available to the public through
standard Internet research tools (e.g., WAIS, Gopher, etc.).

The US State Department, with other US foreign policy agencies, would
make use of the program for the dissemination, to the embassies, of
policy and other materials.   This would provide the US government
with an efficient and timely means to disseminate information to the
whole of the participating embassy community (and this could be done
in a manner that would permit the embassies to "pull" information of
interest rather than have it "pushed" at them, allowing for a far
greater volume of information to be made available without
overburdening the recipients).

------------------------------

Date: Fri 22 Oct 92 23:41:43 CDT
From: jonpugh@NETCOM.COM(Jon Pugh)
Subject: File 4--DES Broken?

I recently read a report in a bit of email named the SURFPUNK
Technical Journal <surfpunk@versant.com> that a Canadian researcher
recently presented a paper describing a dedicated chip designed to
break DES.  The article claimed that this chip could be manufactured
for $10.50 and that a machine with %30,000 of these could be built for
$1,000,000 which would have a 100% probability of breaking ANY DES
encryption in a maximum of 7 hours (3.5 hours on the average).

I was wondering if the CuD authors or readers had heard anything of
this and could verify or denounce its authenticity.  This seems like
news that ought to be in CuD.  As is usual with things of this nature,
I seem to have moved the file to some other disk and do not have it
accessible here to quote from, but if you are interested I may be able
to locate it and send it along later.

Perhaps the Surfpunks would care to comment?

------------------------------

Date: Fri, 15 Oct 1993 01:42:16 EDT
From: phyland@AOL.COM
Subject: File 5--Computers & Sustainable Society

NEWS RELEASE

Worldwatch Institute
1776 Massachusetts Ave., N.W.
Washington, DC  20036
tel: (202)452-1999
fax: (202)296-7365
e-mail: worldwatch@igc.apc.org

HOLD FOR RELEASE
6 p.m. EDT
Saturday, September 25, 1993

     COMPUTERS OFFER NEW TOOLS FOR SOLVING ENVIRONMENTAL PROBLEMS


      Faster, cheaper computers, better programs, and rapidly
expanding international computer networks are becoming extraordinary
tools for environmental protection and sustainable development,
according to Global Network:  Computers in a Sustainable Society, a
new Worldwatch Institute study.

      Computers have made it possible to model the effects of air
pollution on the global climate, as well as to track changes in global
temperature.  Biologists now use computerized animal collars to study
endangered species, monitoring their every movement.  Microchips
govern the functions of energy-efficient lights, advanced windmills
and solar power installations.  And thousands of environmental
activists and organizations around the world are using computer
networks to exchange news and coordinate campaigns.

      There are environmental costs to computerization, however.
"Swept up in our visions of the potential power of computers, we have
failed to come to grips with their impacts," said author John E.
Young.  "Few people realize that Silicon Valley, birthplace of the
computer industry, is also home to the highest concentration of
hazardous-waste sites in the United States.  Or that computers now use
about as much electricity each year as the entire country of Brazil."

      In addition, for computers to realize their potential to promote
environmental sustainability, the report stresses, more attention
needs to be devoted ensuring public access to computerized
information.

      Computer modeling now makes it possible to identify
environmental problems before they become overwhelming, by
manipulating thousands of variables.  Scientists had theorized since
1896 that carbon dioxide emissions could warm the global atmosphere,
but it was not until the early 1980s--when sufficiently powerful
computers became available--that climate simulations were able to
project with confidence the effects of increased carbon dioxide on
climate.

      In British Columbia, the Sierra Club of Western Canada is using
computers to create detailed maps of forest cover on Vancouver Island.
Their system has revealed that only 23 percent of the island's
original low-elevation, temperate rain forests--an increasingly
endangered ecosystem--remain uncut.  Eighty-two percent of the
island's land is currently allocated to logging.  This information has
proved vital in the fight to gain government protection for ancient
rainforests on the island.

      Linked together by telecommunications networks, computers are
also rapidly becoming an important means of communication for
environmentalists and other researchers and activists.  The largest
collection of computer networks--the Internet--already serves 11
million users; its transmissions are estimated to double every five
months.

      The 11 interconnected networks of the Association for
Progressive Communications (APC) make up the world's largest assembly
of on-line environmental information and activists.  The APC
networks--which include Econet/Peacenet in the United States--now link
more than 17,000 activists in 94 countries.

      The APC's computer conferences convey information that is
detailed, global, and breathtakingly up-to-date.  Recently, for
example, an APC posting on rainforests reported the murder of Yanomami
Indians in a remote corner of the Amazon Basin days before major
United States newspapers.

      The Washington, D.C.-based Right-to-Know Computer Network (RTK
Net) offers free, online access to the U.S. government's Toxics
Release Inventory (TRI).  The TRI database provides information on
industrial releases of toxic chemicals from some 24,000 U.S.
industrial facilities.  Grassroots groups around the country have used
TRI information to produce dozens of reports on  pollution, garnering
public attention and spurring industry cleanup efforts in a number of
states.  Agenda 21, accepted by all United Nations members at the 1992
Earth Summit in Rio de Janeiro, recommends that all nations move to
establish such pollution tracking systems.

      While computer networks are most extensive in the United States,
Europe, and Japan, they also reach into many developing countries, as
well as the newly democratic states of Eastern Europe and the former
Soviet Union.  Sophisticated communications programs that can run on
inexpensive computers are helping link users in remote areas with the
rest of the world--often overcoming inadequate telephone systems in
the process.

      Yet Global Network emphasizes that the computer industry needs
to address its own contributions to environmental pollution.  There
are now 23--and there have been as many as 29--federal Superfund
hazardous-waste cleanup sites in Silicon Valley, most of them
attributed to hazardous substances leaking from electronics facilities
into groundwater.  Many of those substances--such as glycol ethers,
linked to high rates of miscarriages among electronics workers--can
cause serious human health problems.

      The Worldwatch study recommends that governments and computer
manufacturers expand their efforts to redesign computers and
manufacturing processes to minimize environmental problems.One such
project--the U.S. Environmental Protection Agency's (EPA) Energy Star
Computers program--already promises major benefits.  It offers the use
of a special advertising logo to firms whose computers, monitors, or
printers meet power-saving standards.  Nearly 150 makers of computers,
components, and software have signed up.  EPA officials estimate that
if Energy Star products capture two-thirds of the market by the year
2000, their use could prevent carbon dioxide emissions equal to the
annual output of 5 million automobiles.

      Global Network cautions that computers will not solve all the
world's problems, but argues that they can help people "think
globally," as Rene Dubos once recommended.  If applied appropriately,
Young suggests, "Computers can give us global eyes and ears in an age
where our actions often have worldwide impacts."

      "Made easy to use and accessible to all, computers and computer
networks could become a force for reducing the environmental impacts
of industrial civilization, ending poverty, and strengthening
participatory democracy," Young concludes."

                               - END -

John E. Young is a senior researcher at the Worldwatch Institute, a
Washington, D.C.-based global environmental think tank.

------------------------------

Date: Sat, 23 Oct 93 16:26:51 PDT
From: ug384@FREENET.VICTORIA.BC.CA(Jeff Kosiorek)
Subject: File 6--Students Suspended For Electronic Documents

Two Mount Olive (N.J.) High School freshmen have been given three days
of in school suspension for possession of documents protected under
the First Amendment.  School administrators have decided that they
have the right to censor any document or material they feel is
inappropriate. Two students in the high school were caught in
possession of computer disks containing copies of the "Jolly Roger
Cookbook" which is widely available, and completely legal, on computer
bulletin boards everywhere. The disks were confiscated, parents were
notified, and police were involved in the investigation into materials
which are protected under the Constitution.

Where do school officials get the right to censor any type of
publication a student may have in his or her possession? Furthermore,
how can they punish these youths when even the investigating officer,
Detective Joseph Kluska said, "It's not illegal to know how to do
these things." The students were not in anyway using the information
found in the cookbook for illegal activities yet they are being
punished only because the vice principal, John DiColo, deems them
"inappropriate".

In a school where they profess the merits of the American Constitution
and the rights protected therein, the hypocrisy is absurd.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

I just thought everyone might like to know what was going on in my
neck of the woods. I find it absolutely ridiculous that these students
are being punished for something that is completely legal. I feel the
only reason it is made an issue is because of the fact it was found on
computer disks. Who would have stood for the seizing of a paperback
book and punishment of the student who possessed it? It would be
really nice if the EFF could pick up on this and put some pressure on
the school to exonerate these students. Any individual interested in
making their opinion heard, please write to the school at: Mount Olive
HS
      Flanders, NJ 07836
      USA
The telephone number for the school is: (201) 927-2200.
The local paper that first carried an article on the topic was:
      The Mount Olive Chronicle
      336 Route 46
      PO Box 174
      Budd Lake, NJ 07828

Feel free to copy and distribute this article.  
--
Jeff Kosiorek
ug384@freenet.victoria.bc.ca

------------------------------

Date: Sun, 24 Oct 1993 16:12:10 CDT
From: Lance Rose <elrose@echonyc.com>
Subject: File 7--NOMA (Nat'l Online Media Association) BBS Org. Formed


                               NOMA
                 National Online Media Association

                                    Contacts: Phill Liggett
                                              LIGGETT@delphi.com
                                              (203)233-3163

                                              Lance Rose
                                              elrose@echonyc.com
                                              (201)509-1700

 FOR IMMEDIATE RELEASE

 A new trade association, the National Online Media Association
 (NOMA), was formed at ONE BBSCON '93 in Colorado Springs on August
 27th, 1993.  NOMA comprises BBS operators, Internet service
 providers, and other online media and services.

 NOMA's mission is to act for the BBS and online service industry
 on matters of national importance by creating an industry presence
 in Washington, D.C. and other means; assist its members at the
 state and local levels; educate the public on the unique social,
 business and legal roles of BBS's and other online services;
 establish appropriate industry standards and guidelines;
 promote business development in the industry; and maintain and
 provide access to resources and industry information for use by the
 public and the industry.

 An 11 person Organizing Committee was elected to develop a proposal
 for NOMA's charter, bylaws, membership requirements, structure, and
 form of leadership.  The proposal is to be completed and
 distributed within the BBS and online services industry by November
 30th, 1993.

 Discussion areas are being set up immediately for those interested
 in participating in NOMA's early development.  An Internet mailing
 list is available to all those interested at natbbs@echonyc.com
 (subscribe to natbbs-request@echonyc.com).  A conference area is
 also being made available on the Delphi national information
 service.

 The members of NOMA's Organizing Committee are:

 Phill Liggett - Chairperson
 LIGGETT@delphi.com

 Joe Balshone
 BALSHONE@delphi.com

 Celeste Clark
 BBS #: (805)520-2300

 Pat Clawson
 76357.3572@compuserve.com

 P. Victor Grambsch - Secretary
 PVICTOR@delphi.com

 Tony McClenny
 BBS#: (703)648-1841

 Robert Pataki
 PUGDOG@delphi.com

 W. Mark Richmond
 BBS#: (209)685-8487

 Steve Sprague
 steve.sprague@uboa.org

 Jim Taylor
 jim.taylor@F5.N310.Z1.FIDONET.ORG

 Bill Wilt
 wilt@aol.com

 In addition, three advisors agreed to assist NOMA's Organizing
 Committee:

 Mike Godwin, Esq.
 mnemonic@eff.org

 David Johnson, Esq.
 djohns06@reach.com

 Lance Rose, Esq.
 elrose@echonyc.com

 For further information, please contact Phill Liggett, (203)233-
 3163 or Lance Rose, Esq., (201)509-1700

 Mailing Address:    NOMA
                     c/o Phill Liggett
                     Solutions, Inc.
                     89 Seymour Avenue,
                     West Hartford, CT  06119

------------------------------

Date: Sat, 23 Oct 93 21:35:31 -0700
From: haynes@CATS.UCSC.EDU(Jim Haynes)
Subject: File 8--A Reporter meets "cyberpunks" (news item)

This week's (October 21) "Coast Weekly", a Monterey County free
entertainment (mostly) paper has an article on "hacking" by staff
writer Nicole Volpe.  I'll quote part of an introduction from the
editorial page.

       "While interviewing computer hackers for this issue, it
       occurred to me that there are a lot of similarities between
       reporters and cyberpunks - We share a belief in freedom of
       information, a general suspicion of those in power who
       operate secretly, and an unfortunate tendency to invade
       privacy.

       This reporter got a taste of what it's like to be on the
       receiving end of privacy invasion when a hacker I was
       interviewing handed me a printout of personal information
       about me that he had retrieved, using nothing more than my
       home phone number.  His reasons were valid enough - he
       wanted to be sure I was who I said I was.  As a reporter I
       was impressed with the investigation, but on a personal
       level, it gave me the creeps.  It was a lesson they don't
       teach you in J-school..."

The main article covers the exploits of some crackers in the Monterey
area, their concern about the Clipper proposal, some stuff about
arrests of crackers in other parts of the country, and an interview
with a security man from Metromedia's long distance business.  The
latter says, "If you picked up the phone a year ago, dialed one digit,
and then hung up, I could go back and find out what that one digit
was.  All the records are stored on magnetic tape."  He goes on to say
about the prospect of seizing and confiscating valuable equipment, "The
cops are a little more aggressive in going after these kinds of crimes
when they learn about that aspect of it."

A companion article by Hannah Nordhaus, a San Francisco freelance
writer, tells about the use of networking and BBSes by all kinds of
groups, from white-supremacisist to leftists, and everything in
between.

------------------------------

Date: Sat, 23 Oct 93 22:13:17 -0700
From: haynes@CATS.UCSC.EDU(Jim Haynes)
Subject: File 9--"Cyber Comics" (Monterey Cty Coast Weekly Summary)

"Cyber Comics" by Matt Ashare (in Coast Weekly for October 21, 1993 -
says it originally appeared in Boston Phoenix, doesn't say when.)

      "Comic books are a longtime fixture in America's
      traditional love of escapism.  primarily they've been a
      forum for exploring the realm of fantasy and science
      fiction...

      The most popular comics have also touched on the themes
      of the day.  Superman of the '50s was a clean cut
      crusader for Truth, Justice, and the American Way;... The
      genetically mutated X-Men came of age as the effects of
      radiation and other biological toxins were becoming an
      issue in the '60s; to the extent that they were shunned
      by 'normal' society, they personified the tensions in an
      increasingly diverse racial, ethnic, and cultural
      landscape.

      The scientific frontier that offers the most
      possibilities these days is the computer, and sure
      enough, computer-based themes like virtual reality,
      artificial intelligence AIl, and hacking are rapidly
      finding their way into the pages of comic books.  At the
      same time the comic-book vision of reality and the future
      has darkened to accommodate the contemporary perception
      that the world isn't the friendly place it was when Clark
      Kent was growing up in Smallville....

      The first comic-book experiments with cyberpunk began a
      decade ago, with more sophisticated precursors to the
      graphic novel like Frank Miller's "Ronin"...issued by DC
      Comics in 1983...[Ronin's] most telling enemy is a
      thoroughly hostile, violent, and lawless urban reality
      where one of his few allies is the computer.

      Merging form and content, First Comics published
      "Shatter", the first fully computer generated comic, in
      1985....a loose affiliation of renegade, non-superhero
      protagonists has to confront another common cyberpunk
      enemy - a government controlled by a powerful,
      exploitative, multinational corporation.  The kind of
      government that cyberpunk fiction seems made of.
      [for?]...

      ...DCs computer-generated "Digital Justice" graphic
      novel, a Batman program is booted up to counter the
      Joker's computer virus.  Hey, even the Punisher's arch
      enemy, the Kingpin, gets a little assistance from a
      skateboarding hacker kid these days.

      More recently, both DC and Marvel have introduced new
      series that deal almost exclusively with cyberpunk
      themes.  "The Hacker Files" which ended its 12-issue run
      this summer, is part of the same DC universe that's home
      to traditional heroes in tights like Green Lantern, but
      the protagonist is a scruffy thirtysomething hacker who
      uses computers instead of superpowers to fight his
      battles.

      ...Lewis Shiner, a writer whose 1984 novel Frontera(Bane)
      was part of the first cyberpunk wave, at the creative
      helm of "The Hacker Files"... 'Right after that computer
      virus at the Pentagon,' recalls Shiner, 'Bob Greenberger
      [a DC editor] calmed me and asked, "Why don't you do a
      comic about that and we'll get all these kid hackers
      started reading comics."...'

      As Shiner sees it, 'the idea of empowerment is what's
      behind a lot of superheroes, and the computer represents
      a source of empowerment to kids these days, so it's only
      natural...'

"Wild Thing", Marvel Comics described...

      Beyond providing some colorful, escapist thrills, comic
      books like "Wild Thing" present a bleak, paranoid view of
      the future.  Multinationals rule the world, violence and
      betrayal are commonplace, virtual reality is a new kind of
      drug, and computers are the heroes' only real friends."

------------------------------

Date: Sun, 24 Oct 1993 10:07:48 -0700
From: bjones@WEBER.UCSD.EDU(Bruce Jones)
Subject: File 10--Belated response to F. Cohen (CuD 5.80)

To recap the argument to date, Fredrick B. Cohen (fc@jupiter.saic.com)
notes (CuD 5.78) that he once applied for permission to export
crypto technology and was granted permission to do so.  Finding it
relatively easy to obtain permission, he fails to see what the fuss
is about.  I counter (CuD 5.79) that I see no reason why anyone
should have to apply for permission in the first place.  He responds
(CuD. 5.80) with:

>... why should I need any permission from the government for
>anything?  Perhaps I shouldn't, but the fact is, [the gov't has]
>the power, and if you work within the structure, you may find that
>it is not as oppressive as you thought.

"Not as oppressive as [I you we] thought" implies some oppression.

Now, perhaps I am again mis-reading you and all you are really
saying is that, if the government imposes restrictions on specific
activities and then allows permission, upon application, for citizens
to engage in those activities, there is little or no problem.  I
disagree.  It is important for a people who would be free to stay
alive to the dangers inherent in all forms of power -- especially
those that take away rights and then hand them back under license
as privileges.

As I noted at the end of my first response, one of the founding
ideas of the United States of America is that the government
of the US is ideologically and legally constrained by the powers
granted it under law, and all other rights and privileges belong,
by default, to the people.  Mr. Cohen asks:

>Where does the constitution say this?  I agree that I would prefer
>it that way, but I don't think there is any basis in law for your
>statement.

These ideals and ideas are part of two important documents, founding
our country.  The idea arises first, early in:

THE DECLARATION OF INDEPENDENCE:
In Congress, July 4, 1776,
THE UNANIMOUS DECLARATION OF THE THIRTEEN UNITED STATES OF AMERICA

[Paragraph 3]
That to secure these rights [life, liberty, and the pursuit of
happiness], Governments are instituted among Men, deriving their
just powers from the consent of the governed.

And is instantiated in Law in:

THE CONSTITUTION OF THE UNITED STATES OF AMERICA

Amendment IX                                          (1791)
The enumeration in the Constitution, of certain rights, shall
not be construed to deny or disparage others retained by the people.

Amendment X                                           (1791)
The powers not delegated to the United States by the Constitution,
nor prohibited by it to the states, are reserved to the states
respectively, or to the people.

The government doesn't have rights.  Amendment IX above says, quite
clearly, that the people have rights, some enumerated under the
Constitution, and others not enumerated but extant nevertheless.
The government, under Amendment X requires permission from the
people to engage in specified acts.

Many agencies of our government seem to have forgotten these passages
and they act as though their agencies and agents have the moral, legal,
and ethical right to hand down decisions on how we may live.  Just
because they get away with such high-handed behavior most of the time
doesn't make the agencies, the agents, or their decisions just. Nor
as they discovered in the Steve Jackson Games case, and may again
discover with PGP, does it make their actions legally justifiable.

------------------------------

End of Computer Underground Digest #583
************************************