Computer underground Digest    Wed  May 10, 1995   Volume 7 : Issue 37
                          ISSN  1004-042X

      Editors: Jim Thomas and Gordon Meyer ([email protected]
      Archivist: Brendan Kehoe
      Shadow Master: Stanton McCandlish
      Field Agent Extraordinaire:   David Smith
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Goddess of Judyism Editor:   J. Tenuta

CONTENTS, #7.37 (Wed, May 10, 1995)

File 1--Response to "Digital Copyright Problem" (re: CuD 736)
File 2--Commentary on NPR  in re the Exon Bill (EPIC fwd)
File 3--Noam Chomksy on the Internet (fwd)
File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

From: "David Gersic" <[email protected]>
Date:          Tue, 9 May 1995 13:04:03 CDT
Subject: file 1--Response to "Digital Copyright Problem" (re: CuD 736)

-=> Subject--File 2--A solution to the digital copyright problem
-=>
-=>          Fixing the Digital Copyright Dilemma with Telerights:
-=>                  Copying is easy; decryption is not
-=>

I have several problems with this proposal, not the least of which is
that it won't work.

-=>       After reading the National Information Infrastructure debate on
-=> intellectual property reform in the digital age, one could conclude that
-=> computers and copyrights have come to an impasse.

They have. At best, the current copyright code does not map well onto
the computer information it is being applied to.

-=>       Some have proposed drastically curtailing electronic technology in
-=> order to protect future publishers.

I think that this would be a Very Bad Thing. We are on the verge of
being able to disseminate more information, faster, and more
directly, than ever before. It's a cliche by now, but the computer is
doing to print media what the printing press did to the monks. And
just like the monks, the print media are attempting to maintain their
monopoly on information distribution. It didn't work last time, it'd
be a shame to let it work this time.

-=> disk into RAM.  They want to ban the electronic resale or renting of
-=> copyrighted material fearing that the piracy which has plagued software
-=> will plague movies and books when they enter cyberspace.

Who are "they"? Pirating movies has been around forever, as has
music. Sure, the quality may be off a little on the copy, but that
has never stopped people from enjoying their illicit copies anyway. A
local couple (Chicago) was just arrested recently for bootlegging
movies. They were sneaking a pocket cam-corder into movie theaters,
taping the movies from the audience, then selling the copies. Sure,
it was a *lousy* copy, but they were making money anyway. Rock
concert boot-legs have been around forever too.

-=>       I call this a system of 'telerights.'
-=>       A user would buy an encrypted copy of the document from the author
-=> or publisher.  Each individual version would have a different key, so
-=> the user could make many duplicates but in essence only own the one
-=> 'copy' that was paid for.  When the user wanted to use the document, it
-=> would contact its publisher for the key.  If no other versions with the
-=> same key were in use, the publisher would send the key to the user's
-=> machine and the document would decrypt itself into an area of temporary
-=> memory like RAM.  When the user was done, the document would delete the
-=> decrypted version.

Problems:

1) You're assuming that I'll have a network connection wherever I
might want to use this document that I've "bought". If I carry my
laptop out under a tree to sit in the sunshine, I'm screwed and have
to go back inside where the ethernet is. OTOH, if *you* want to run
the T1 to my house and provide a wireless network solution for a
five or six square mile area around my house, I'd be delighted to
talk about it...

2) You're assuming that the network connection in #1 is of no cost to
me. If I'm using an ISDN link to the 'net, I have to pay for it on a
per-call basis. So, each time I want to refer to a diagram in this
document I have to insert a quarter in the coin slot in the side of
my monitor. The phone company may love this idea, but it's going to
be expensive for the user. Plus, if that document has a link to
another document, there's another phone call to validate the new
document, and possibly a third one to get back to my original
document.

3) What if I don't *want* the publisher to follow my actions and
interests? The civil libertarians will love this idea... Given the
current interest in the "militias" and people like Tim McVeigh,
wouldn't it be nice to be able to query the publishers of all bomb-
related documents to see who has been reading them? And, going back
to the ISDN mentioned in #2, it'd be even easier to figure out where
they were reading the documents from. I'm not paranoid, but I'm sure
that the FBI would love to be able to find/trace people that they are
interested in this easily, and given the current public mood to give
the FBI the power to investigate people who have not (to their
knowledge) violated any laws, that's a scary proposition. Or, maybe I
just don't think that it's anybody's business but mine what I read,
when I read it, or *where* I read it.

-=>       The old problem of piracy would be turned on its head.  The user
-=> instead of the publisher would have to worry about theft.  When someone
-=> stole his copy, they would steal his use of it as well.  There would be
-=> no assurance the person you buy used information from would delete their
-=> old copies.

This is the biggest falacy in the whole proposition. You've missed
the basic method of software piracy; remove the copy protection. What
is proposed here is not really that much different from a "key-disk"
protection that comes with many games. And, it will be no harder to
bypass. You've substituted high-tech for the simpler key-disk, but
basically it comes down to:

   1) start the program
   2) query something to see if this is valid to run
   3) if ok, jump to real start of program
   4) else exit

All you have to do to bypass this scheme is to find step #3 in the
code and change it to remove the "if ok" part. People have been doing
this since the Apple ][ was popular, and have gotten quite good at
it over the last decade. As long as the program is running on *my*
CPU, in *my* machine, you have no real way to keep me from changing
it to run the way *I* want it to. Unless all program execution will
be done on the other end of a network link with only display data
being shipped to me (see objection #1 and #2 above), the whole scheme
will be bypassed within the first *hour* of somebody trying it.

-=>       The government does not need to alter existing copyright laws;

Actually, I don't think that modification of the existing laws will
work; I think that they're going to have to write an entire new set
to handle what the computer industry is doing to information and
information technology.

-=>       On the consumer end, there is the privacy issue.  Any company that
-=> both maintains other people's teleright accounts and publishes its own
-=> documents will be tempted to use for financial gain private information
-=> about other companies' customers.

Tempted? I get enough junk mail, cold-callers on my phone, and other
unsolicited sales contacts for stuff that I'm *not* interested in
now. Given this sort of data collection ability, I'm sure that I'd
get a *lot* more.

-=>       The issue of encryption itself is sticky because there are already
-=> two established and ideologically opposed groups fighting about it.  The
-=> government must be coaxed into relaxing its objections to strong
-=> encryption and Clipper opponents must learn to accept a key escrow
-=> standard to which the government has warranted access.

There's also the "export" problem. What if I take my laptop to Iraq
with me? Can I still read my encrypted copy of Time magazine, or do I
have to wait until I get back to the US?

-=>       The government must also encourage software and computer companies
-=> to accept some level of professionalization.  With the proper tools and
-=> knowledge it will be possible to trap keys or decrypted documents stored
-=> in temporary memory.  These tools and skills must be tightly regulated
-=> and those sections of the operating system must be shut off from amateur
-=> tampering.

Can't be done. As long as there is a book on programming available,
some people will mis-use their knowledge to pirate stuff. Just like
as long as there is a book on basic high school chemistry available,
people will be able to build bombs. That's the problem with
information; it's neither 'good', nor 'bad', it just is. It's the
people who *use* the information that make it helpful, or dangerous.

-=> This may cause angst among some programmers but for most of
-=> us this should not be a burden.  It does, after all, take a license (and
-=> the proper employer) to tamper with phone boxes and electric meters.

It does? Since when? Sure, *legally* it takes that, but I can go to
the hardware store and purchase everything I need to actually do it.
Blowing up buildings is illegal too, and we can see how well *that*
set of laws protects us from having our building blown up.

-=> One would have to vastly restrict low level media access to make
-=> unencrypted telerights work because it would be easy to pull raw
-=> information off the disk with a sector editor.  With encryption, the
-=> restrictions are narrower and easier to enforce because the data is
-=> coded wherever it is stored in permanent form.  Only certain sections of
-=> the runtime environment need to be restricted.

As long as the decryption is done on the local machine, it's never
going to be secure. If you modify the operating systems in use (even
assuming that MSDOS finally goes away) to make it more secure, it's
no more difficult to remove the security from *my* copy of the
operating system, or to write my own O/S without your security
measures. Look at Linux. Sure, it's been a lot of work, but it's not
impossible to write an O/S that works.

-=>       We are, to use the old Chinese pejorative, living in interesting
-=> times.  Why the Chinese have historically found this undesirable I do
-=> not know.  Their word for 'crisis' means both 'danger' and 'opportunity'

I think that they got the balance just about perfect with that
thought. There is a lot of opportunity right now, and there is also
quite a bit of danger. I include well-meaning proposals like this in
the "danger" category, because they involve a loss of privacy that
I'm not sure is balanced by any tangible gain for me, the user.

-=> ------------------------------------------------------------------------
-=>
-=>  Wade Riddick is a graduate student and National Science Foundation
-=>       Fellow in the Government Department at the University of Texas at
-=>       Austin.  His email address is [email protected].
-=>
-=> ------------------------------

Hmm. Ok. I'm just another net.admin/programmer out here in the world.
Maybe I don't know any better, but I worry when the government
(or, in this case, somebody majoring in government) wants to help me.

Interesting times indeed...

------------------------------

Date: 6 May 1995 21:34:29 -0400
From: Marc Rotenberg <[email protected]>
Subject: file 2--Commentary on NPR  in re the Exon Bill (EPIC fwd)

The transcript of yesterday morning's NPR program on the Exon bill
follows.  Yours truly and EPIC Advisory Board member Eli Noam went at
it with Senator Exon.  The program went very well. The bill is
obviously in trouble.

- - -

On another civil liberties front, we could really use your help with
the $500,000,000 for the FBI wiretap program. With the folks in
Washington falling over one another to see who can put together the
most draconian terrorism legislation, the money for the national
surveillance plan remains the key to the bills.  The Clinton
administration just proposed raising all civil fines by 40% (!) to
fund the payoff to telephone companies so the FBI can wiretap more
phones.


Also, Dave Banisar just finished going through the wiretap reports for
1994.  Here are the key numbers  (Some of this will be in a Newsweek
story on the stands later this week):

-- wiretapping reached an all-time high in 1994, 1,154 taps authorized
for federal and state combined up from 976 in 1993.

-- 75% of all taps were authorized for narcotics investigations, 8%
for gambling, and 8% for racketeering

-- Not a single tap was authorized for investigations involving
"arson, explosives, or weapons" in 1994.  In fact, such an order
hasn't been approved since the late 1980s. Keep that in mind when
people say wiretapping is necessary to prevent tragedies like Oklahoma
City.

-- Only 17% of all conversations intercepted were deemed
"incriminating" by prosecutors.  That figure is at an all-time low (in
the early '70s it was closer to 50%), and it means that the FBI is
gathering far more information through electronic surveillance
unrelated to a criminal investigation than ever before.

-- Also, the duration of the taps is way up, now around 40 days on
average. Twenty years ago, it was closer to 18.

We really need the help of civil liberties and free expression groups
with this campaign. For those who are sympathetic but think
wiretapping is not a First Amendment issue, take a look at Herbert
Mitgang, _Dangerous Dossiers: Exposing the Secret War Against
America's Greatest Authors_ or recall the FBI's "Library Awareness
Program" of the 1980s.

The FBI's claim that new technologies are frustrating wiretap is
completely without support.  But if the $500,000,000 to make the
network wiretap ready is appropriated, the current trends will be
amplified: more surveillance, longer duration, less well targeted -->
less privacy for all Americans.

Check out our web page http://epic.org/terrorism/ or send a message to
[email protected].  We even set up an 800 number for folks who want to
send mailgrams.

And send comments to me if you have suggestions.

Thanks,

Marc.

                ====================

                   Copyright 1995 National Public Radio
                                     NPR

                    SHOW: Morning Edition (NPR 6:00 am ET)

                                 May 5, 1995

                             Transcript # 1600-3

TYPE: Package

SECTION: News; Domestic

LENGTH: 788 words

HEADLINE: Senator Wants to Police Internet Porno

GUESTS: Sen. J. JAMES EXON (D NB); ELI NOAM, Tele-Information
Institute, Columbia University; MARC ROTENBERG, Electronic Privacy
Information Center

BYLINE: JOHN NIELSEN

HIGHLIGHT:
The Senate telecommunications reform bill will now include an
amendment to ban materials considered lewd and lascivious on the
Internet. Some critics fear the government would become Internet
police.

BODY:
  BOB EDWARDS, Host: Some senators are concerned about sexually
oriented communication on the Internet, the global network of
computers.  An amendment to the Senate's telecommunications reform
bill would ban materials considered indecent, lewd, or lascivious.
Supporters say the idea is to protect children. NPR's John Nielsen
reports.

JOHN NIELSEN, Reporter: Democratic Senator James Exon of Nebraska
says he marvels at the Internet.  With it, people all over the
world can now meet and interact, they can talk privately, they can
talk in groups, they can look at pictures, and they can sell each
other information.  Exon considers it the biggest advance in
communications technology since the invention of the printing
press.  But Exon also thinks the Internet has one gigantic
failing.  He says there's an awful lot of pornography on this
system and it's almost all accessible to everyone who goes online.
A child with basic computer skills easily can stumble into the
equivalent of a pornographic bookstore, Exon says, and he doesn't
think that should be legal.

Sen. J. JAMES EXON (D-NB): I cannot imagine that the framers of
the Constitution intended that pornography, in and of itself,
would be protected under the First Amendment.  Certainly not for
kids.

JOHN NIELSEN: That's why Exon and Washington Republican Slade
Gorton recently attached an anti-smut amendment to the Senate's
telecommunications reform bill. It would punish people who
transmit 'obscene, lewd, lascivious, filthy, or indecent
materials' with fines of up to $100,000, or jail terms of up to
two years.  Anti-smut organizations have applauded the broadly
worded amendment; so has South Dakota Republican Larry Pressler,
author of the telecommunications reform bill.

But critics say these anti-smut rules are dangerously vague.  Eli
Noam, of Columbia University's Tele-Information Institute, says
they're tougher in some ways than telephone smut laws, which allow
consenting adults to say or hear anything they want to each other.

ELI NOAM, Tele-Information Institute, Columbia University: What
the Exon-Gorton amendment would do, in effect, would make such
conversations potentially illegal and, furthermore, would apply a
very vague standard to it.

JOHN NIELSEN: Marc Rotenberg, of the Electronic Privacy
Information Center, has a different concern.  He fears the new law
will turn prosecutors in conservative parts of the country into a
kind of Internet police.  For instance, these prosecutors might
argue that paintings and books from out-of-town libraries and
museums violate community norms.  Rotenberg says that could keep
those libraries and museums off the Internet completely.

MARC ROTENBERG, Electronic Privacy Information Center: You may
have to stop and think for a moment.  I mean, in your art
collection you got to wonder about some of those Impressionists.
Can we put everything that we've got currently hanging on the
walls, can we put that stuff online?

JOHN NIELSEN: Now, Senator Exon's staff has tried hard to answer
criticisms of the anti-porn bill.  They've dropped language that
would have held online carriers like CompuServe and America Online
responsible for the actions of their customers, and they've added
language restricting the government's right to monitor Internet
conversations.  But that last change may have created as many
problems as it solved.  In a letter released this week, the
Justice Department said restrictions on digital wire-tapping could
cripple government efforts to catch computer hackers and to track
suspected terrorists.

Spokesmen for Senator Exon say they don't think that's true, but
the senator says he's perfectly willing to hear his critics out.
He'll also consider more revisions.

Sen. J. JAMES EXON: And I don't mind taking the hits from some
people that accuse me of wanting to be a censor because all of
that has fed interest in the story and millions of people know
about it now that had no idea of the magnitude of the problem
before I first introduced the bill.

JOHN NIELSEN: Right now the bill's future is uncertain.  When the
Senate telecommunications bill comes up for a final vote this
month, Democratic Senator Patrick Leahy of Vermont will try to
push the anti-smut debate aside for at least six more months.
That would give the Justice Department time to develop an
alternative to Exon's anti-smut plan.  I'm John Nielsen in
Washington.


  The preceding text has been professionally transcribed.
However, although the text has been checked against an audio
track, in order to meet rigid distribution and transmission
deadlines, it may not have been proofread against tape.

------------------------------

Date: Tue, 9 May 1995 00:33:30 -0500 (CDT)
From: David Smith <[email protected]>
Subject: file 3--Noam Chomksy on the Internet (fwd)

              ---------- Forwarded message ----------

[Noam Chomksy - interview in "GeekGirl" magazine]

Noam Chomsky interviewed by RosieX and Chris Mountford

Chris Mountford: Professor Chomsky what do you see as the present influence
of technology - primarily low cost small powerful computers and global
public information networks - the technology of the so-called information
revolution, on the mass media power in the future?

*THE FIRST EDGE*

Noam Chomsky: Well, I think it's double edged and you can already see the
competing/conflicting tendencies developing. Up until now it's been pretty
much a monopoly of relatively privileged sectors, of people who have access
to computers in universities and so on. Say, in the academic world it's
turned out to be a very useful way of communicating scientific results, but
in the area we are talking about it has been used pretty efficiently in
distributing information and setting up interconnections etc. Do you have
peacenet or something equivalent in Australia?

Rosie X: Yes the Pegasus Network..

NC: Okay, in the US and particularly Europe, Peacenet puts across tons of
information and also loads of specialist Bulletin Boards where groups with
particular interests and concerns interact and discuss all sorts of things.
The main journal that I write for is Z magazine, an independent left
journal. They have a Z bulletin board which leftie types subscribe to. They
are now bringing in the readership of other media left, so on some issues
(eg East Timor) it's just been invaluable in organising. The reason for
that is most of the information about it isn't in the mainstream. So for
example a lot of it comes from Australia and until recently the Australian
press was really accessible only to special lucky people...it was
accessible to me cos I have friends here, who have been clipping madly for
20 years and sending me stuff, but that's not much help to the population.
These days it's readily available, like say the Dili massacre, you know all
the news was out at once. Other issues have come to the fore, which is all
a positive consequence of the technology.

*THE SECOND EDGE*

NC:However there's a downside, several in fact. One aspect of it which is
hard to quantify, but I see it very clearly myself. I am deluged with mail,
in fact I spend 20hrs a week or so just answering letters, and often they
are long interesting letters.It's a reflection of the fact that global
society is very atomised and very much alone. They think they are the only
person who thinks in a particular way. I constantly get letters saying I
read something you wrote and I thought I was the only person in the world
who had these crazy ideas and so on. Things have been so atomised and
broken down and de-personalised that people have lost the normal bonds of
association and communication, and so there's tons of mail. Recently e-mail
has been mounting very fast, and its to the point where I have to stop
answering it, cos its physically impossible, so I am now have to send form
letters saying, "I just can't do it"...send me snail-mail...

*BIG BROTHER INCORPORATED*

NC: The big effect which I still haven't mentioned and the one that worries
me most is what the corporate world is telling us they have in mind. And
what they are telling us they have in mind is taking the whole thing over
and using it as a technique of domination and control. In fact I recall
reading an article in maybe the Wall Street Journal or somewhere which
described the great potential of this system and they gave two examples to
illustrate their point; one for the female market and one for the male
market. Of course the ideal was to have every human being spend every spare
moment alone in front of the tube and now it's interactive! So for women
they will be watching some model advertising some crazy product which no
sane human being would want, but with enough PR aura around, and since it's
interactive they can have home delivery in ten minutes. For men, they said
every red blooded American male is supposed to be watching the super bowl.
Now it's just passive and you watch the super bowl and drink beer with your
buddies, and so on, but with interactivity what we can do is, before the
coach sends in the next play, everyone in the audience can be asked to
punch in what they think it oughtta be. So they are participating, and then
after the play is called they can flash on the screen 43% said it should
have been a kick instead of a pass...or something, so there you have it
something terrific for men and women. And this was not intended as a
caricature; that's exactly the kind of thing they have in mind and you can
see it make sense ...if I were a PR guy working for Warner Communications
that's just what I'd be working on. Those guys have billions of $ that they
can put into this, and the whole technology including the Internet can go
in this direction or it can go any other direction. Incidentally the whole
thing is simply reliving things that have gone on with earlier
communication technologies and it's well worth having a look at what
happened. Some very clever left type academics and media people have
charted the course of radio in US since the 20s. In the US things took
quite a different course from the rest of the world in the 1920s, the
United States is a very business run society with a very high class
business community. Like vulgar Marxists with all the values reversed,
their stuff reads like Maoist tracks have the time just change the words
around.

*BACK TO THE ROOTS*

NC: In the 20s there was a battle. *radio* was coming along, everyone knew
it wasn't a marketable product like shoes. It's gonna be regulated and the
question was, who was gonna get hold of it? Well, there were groups,
(church groups, labor unions were ex tremely weak and split then, & some
student groups), but it was a very weak civil society, and it had been a
very repressive period just after Wilson's red scare, which had just
smashed up the whole society. There were people who tried to organise to
get radio to become a kind of a public interest phenomenon; but they were
just totally smashed. I mean it was completely commercialised, it was
handed over under the pretext it was democratic, cos if you give it to the
big corporations then it's pure democracy. So radio in the US became almost
exclusively commercialised - they were allowed a student radio station
which reached three blocks or something. Now the rest of the world went the
other way, almost everywhere else it became public. Which means it was as
free as the society is - you know never very free but at least to whatever
extent people can affect what a government does, which is something after
all - to that extent radio was a public good. In the US, the opposite. Now
when TV came along in the US it wasn't even a battle. By then business
dominance was so overwhelming that the question never even arose. It became
purely private. In the 1960s they allowed public radio and tv but in an
interesting way. [The] public could act to some extent through the
parliamentary institutions, and congress had imposed some conditions on
public interest requirements on the big networks, which means they had to
spend two percent of their time at 3am Sunday allowing a community group
on...or something...and then every year they had to file reports to the
federal communications commission saying, 'yeah here is the way we met our
responsibility', which was mainly a nuisance as far as CBS was concerned.
Actually I knew someone who worked in one of their offices and she told me
they had to spend all sorts of time lying about what they were doing and it
was a pain in the neck. At some point they realised it would be better to
just get the burden off their heads and allow a marginal public system
which would be very poorly funded and marginalised and under state
corporate control anyway, and then they wouldn't even have to pretend any
longer, and that's pretty much how those two modes of communications turned
out.

*NOAM'S NO NEWBIE*

N.C: ...to tell you something personally I have a daughter in Nicaragua,
and Nicaragua in the 80s was under a complete ban.You couldn't get a letter
down there, but we were communicating thanks to the Pentagon. Thanks to the
Pentagon and the fact that I'm at MIT, I was the on the ARPANET, and it's
not meant for people like me but they can't get me out, and so my daughter
(who had a connection) and I during the terrorist war were actually
communicating thanks to the Pentagon.

RX: Ahh, did you use or do you use cryptography?

NC: I just don't care about secrecy. In fact one thing I have learned over
the years in resistance, and been close to long jail sentences and been in
trials. I know this system pretty well, and the one thing I've discovered
over the years is to be complet ely public. The intelligence systems are so
ideologically fanatic that they can not understand public opposition. I
mean I can give you exact examples of this. They assume that everybody is
as nutty as they are and so they spend all their time and energy trying to
figure out the connections to North Korea or something like that, the idea
that someone could honestly and openly say "I defy the Government, I reject
what you're doing, I'm gonna subvert it and so on"... they simply dismiss.
The safest thing always is to be quite public. Furthermore there is no way
to protect yourself from the National Security Administration snooping, you
know, and they don't bother, they don't have the resources and if they had
they couldn't do anything with them cos they are to stupid to use the
information.

*IS TECH ENOUGH?*

CM: I'd actually like to take you up there on your point about one of the
negatives of corporate control. At the moment a large number of online
communities or groups who consider themselves communities don't have the
problem you mentioned, junk e-mail, because their group communications are
public, there's no possibility of responding to everything - that was given
up long ago - quality is judged by the viewer. Perhaps it's easier to find
what you are looking for with this technology, you can do more than change
channel. Compounding with that, unlike broadcast media which as you
mentioned were appropriated by corporations, this is not broadcast this is
not one-to-many but any-to-any, it can be one on one or one to a very large
audience.

NC: The same is true of cable TV for example, theoretically you can have
dozens of cable television channels, and in fact, in the US there are laws
which require the major corporations to fund independent cable stations.
Well the net effect is that virtually nothing happens and the reason is
because [of] the distribution for resources, energy and organisation, so
what you are saying is theoretically true. But the way it works out in
practice is a reflection of the state of activism and organisation and
resource allocation and so on. Incidentally the public nets where everyone
is talking to one another have, in my opinion, the same degraded character
as the individual e-mail messages; people are just too casual in what comes
across...the effect is you often get good things, but buried...the quality
of what people are doing is actually declining because of their intense
involvement in these e-mail interactions which are have such an
overwhelming character when you get involved in them. And it's kind of
seductive, not personally for me, but I know people get seduced by the
computer and sitting there banging around at it. It has a negative
potential and a certain positive potential, but I think it's a double edged
sword

*FLAMES, FLAMES AND THE FUTURE*

RX: What about flaming, is it a sign of human nature having been oppressed
for so long that people are hell bent on vetting their anger in a medium
where they can be anonymous.

NC: I don't think its very different from personal interactions, people
throw things at each other and hit each other...its quite common place

RX: Do you think anger is an initial stage of the technology?

NC: I think the way the technology is likely to go is unpredictable... if I
had to make a guess, my guess is corporate take-over, and that to the
extent that it's so far tax payer supported and it's a government
institution or whatever people call it, in fact it's a military
installation/system at base and they are letting it go, and the reason they
are letting it go is cos they are not concerned about the positive effects
it has, because they probably feel, maybe correctly, that it's overwhelmed
by the n egative effects...and these are things people have to achieve -
they are not going to be given as gifts...like the Pentagon is not going to
give people as a gift a technique for free communication which undermine
the major media; if its going to take out that way it will be cos of
struggle like any other victory for freedom.

*ANYONE'S TOOL*

CM: Do you think that the technology is inherently democratic?

NC: There is no technology which is inherently democratic or no technology
which is inherently oppressive for that matter, technology is usually a
fairly neutral thing. The technology doesn't care really whether it's used
for oppression or liberation, it's how people use it.

CM: If you have what's probably pretty close to a level playing field, even
with a cheap set-up, and have basically the same capability to publish
whatever you produce as everyone else does, a quality document or whatever,
(not just half-baked junk e-mail) it can be distributed more easily than
traditional product- based means. Then you work in the looming financial
link, what you mentioned before - people leaving their subscriptions
behind, that could perhaps become all electronic.

NC: First of all the business...about level playing field is all a bit of a
joke, I mean type writers and paper are also a level playing field but that
doesn't mean that the mass media system is equally distributed among the
population. What's called a level playing field, is just capitalist
ideology, its not a level playing field when power is concentrated. And
even if, formally speaking, a market is meant to be a level playing
field...but we know what that means..as to using this type of technology,
the threat to left institutions is severe in my opinion. If people do or
become so anti-social and so controlled by market ideology even people on
the left, that they will drop their support for independent left media
institutions because they can get something free, those institutions will
decline and they won't be anything over the Internet, as what goes over the
Internet now is things that come out of the existing institutions. If those
are destroyed nothing is going to come out that counts. There are ways
around this, for example you could subscribe to some Internet forums...for
example Time Magazine are putting their stuff out free on the Internet and
this makes a lot of sense for them because a journal like Time does not
make money when they sell subscriptions, they lose money. They make money
from advertising, so they are delighted to not have to distribute the thing
physically...they are delighted to give it away free, because then they
don't have the cost of selling it at news stands and sending subscriptions.
They still get the same income mainly from advertising, but that's not true
for say Z magazine, they don't live on advertising they live on
subscriptions..

RX: What other publications do you read, and do you ever peak at Wired...or
other high tech publications?

NC: I'm not much into high tech culture...even though I am at MIT, and my
wife works at educational technology and my son is a computer fanatic. I
don't have time to read Zines, I don't find them very enlightening.

      ---------------------------------------------------------
Needless to say Noam Chomsky declined giving us his e-mail address!!

------------------------------


------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <[email protected]>
Subject: file 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to  [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CUDIGEST <your name>
Send it to  [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
        Brussels: STRATOMIC BBS +32-2-5383119 2:291/[email protected]
        In ITALY: Bits against the Empire BBS:  +39-464-435189
        In LUXEMBOURG: ComNet BBS:  +352-466893

 UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                 uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

 JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
                 ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
 URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

------------------------------

End of Computer Underground Digest #7.37
************************************