Computer underground Digest    Sun  Nov 2, 1997   Volume 9 : Issue 79
                          ISSN  1004-042X

      Editor: Jim Thomas ([email protected])
      News Editor: Gordon Meyer ([email protected])
      Archivist: Brendan Kehoe
      Shadow Master: Stanton McCandlish
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Field Agent Extraordinaire:   David Smith
      Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.79 (Sun, Nov 2, 1997)

File 1--RC5 Cracked -  The unknown message is...  (fwd)
File 2--Justice Dept charges Microsoft w/violating 199 order
File 3--Microsoft's reaction the the DOJ lawsuit
File 4--Small Minds Think Alike
File 5--Illinois Library Decides Not to Filter Net
File 6--Gullibility Virus Warning
File 7--Bandwidth Turnabout: Not Just Fair Play But Future Wave?
File 8--Islands in the Clickstream
File 9--Kashpureff in custody. (fwd)
File 10--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Mon, 27 Oct 1997 08:43:38 -0500
From: Albert Garrido <[email protected]>
Subject: File 1--RC5 Cracked -  The unknown message is...  (fwd)

    Hi, I'm sending the message below for inclusion in the next CuD issue.

    ---

    Below is the original press release detailing RC5-56 bit encryption
    being cracked by the Bovine effort at http://www.distributed.net

    Please note that the Bovine effort has not stopped, and has moved onto
    cracking RC5-64.  See for details.


 ----------
From--  David McNett <[email protected]>[:]
Sent--  Wednesday, October 22, 1997 3:14 PM
Subject--       [rc5] The unknown message is...

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It is a great privilege and we are excited to announce that at 13:25
GMT on 19-Oct-1997, we found the correct solution for RSA Labs' RC5-
32/12/7 56-bit secret-key challenge.  Confirmed by RSA Labs, the key
0x532B744CC20999 presented us with the plaintext message for which we
have been searching these past 250 days.

The unknown message is: It's time to move to a longer key length

In undeniably the largest distributed-computing effort ever, the
Bovine RC5 Cooperative (http://www.distributed.net/), under the
leadership of distributed.net, managed to evaluate 47% of the
keyspace, or 34 quadrillion keys, before finding the winning key.  At
the close of this contest our 4000 active teams were processing over
7 billion keys each second at an aggregate computing power equivalent
to more than 26 thousand Pentium 200's or over 11 thousand PowerPC
604e/200's.  Over the course of the project, we received block
submissions from over 500 thousand unique IP addresses.

The winning key was found by Peter Stuer <[email protected]> with
an Intel Pentium Pro 200 running Windows NT Workstation, working for
the STARLab Bovine Team coordinated by Jo Hermans
<[email protected]> and centered in the Computer Science
Department (DINF) of the Vrije Universiteit (VUB) in Brussels,
Belgium.  (http://dinf.vub.ac.be/bovine.html/).  Jo's only comments
were that "$1000 will buy a lot of beer" and that he wished that the
solution had been found by a Macintosh, the platform that represented
the largest portion of his team's cracking power.  Congratulations
Peter and Jo!

Of the US$10000 prize from RSA Labs, they will receive US$1000 and
plan to host an unforgettable party in celebration of our collective
victory.  If you're anywhere near Brussels, you might want to find
out when the party will be held.  US$8000, of course, is being
donated to Project Gutenberg (http://www.promo.net/pg/) to assist
them in their continuing efforts in converting literature into
electronic format for the public use.  The remaining US$1000 is being
retained by distributed.net to assist in funding future projects.

Equally important are the thanks, accolades, and congratulations due
to all who participated and contributed to the Bovine RC5-56 Effort!
The thousands of teams and tens of thousands of individuals who have
diligently tested key after key are the reason we are so successful.

The thrill of finding the key more than compensates for the sleep,
food, and free time that we've sacrificed!

Special thanks go to all the coders and developers, especially Tim
Charron, who has graciously given his time and expertise since the
earliest days of the Bovine effort.  Thanks to all the coordinators
and keyserver operators: Chris Chiapusio, Paul Chvostek, Peter
Denitto, Peter Doubt, Mishari Muqbil,  Steve Sether, and Chris
Yarnell.  Thanks to Andrew Meggs, Roderick Mann, and Kevyn Shortell
for showing us the true power of the Macintosh and the strength of
its users.  We'd also like to thank Dave Avery for attempting to
bridge the gap between Bovine and the other RC5 efforts.

Once again, a heartfelt clap on the back goes out to all of us who
have run the client.  Celebrations are in order.  I'd like to invite
any and all to join us on the EFNet IRC network channel #rc5 for
celebrations as we regroup and set our sights on the next task.  Now
that we've proven the limitations of a 56-bit key length, let's go
one further and demonstrate the power of distributed computing!  We
are, all of us, the future of computing.  Join the excitement as the
world is forced to take notice of the power we've harnessed.

Moo and a good hearty laugh.

Adam L. Beberg - Client design and overall visionary
Jeff Lawson - keymaster/server network design and morale booster
David McNett - stats development and general busybody

------------------------------

Date:    Sun, 02 Nov 97 00:08 CST
From:  Cu Digest <[email protected]>
Subject: File 2--Justice Dept charges Microsoft w/violating 199 order

FOR IMMEDIATE RELEASE                                          AT
MONDAY, OCTOBER 20, 1997                           (202) 616-2771
                                              TDD (202) 514-1888


           JUSTICE DEPARTMENT CHARGES MICROSOFT WITH
                   VIOLATING 1995 COURT ORDER


Asks Court to Impose $1 Million a Day Fine if Violation Continues

    WASHINGTON, D.C. -- The Department of Justice asked a
federal court today to hold Microsoft Corporation--the world's
dominant personal computer software company--in civil contempt
for violating terms of a 1995 court order barring it from
imposing anticompetitive licensing terms on manufacturers of
personal computers.

    The petition filed today by the Department's Antitrust
Division alleges that Microsoft violated the court order by
requiring PC manufacturers to license and distribute Microsoft's
Internet browser, called Internet Explorer, as a condition of
licensing Microsoft's Windows 95.  Most PC makers preinstall
Windows 95--the dominant PC operating system--at the factory on
the PCs they sell.

    "Microsoft is unlawfully taking advantage of its Windows
monopoly to protect and extend that monopoly and undermine
consumer choice," said Attorney General Janet Reno.

    The Department brought today's action to enforce the earlier
court order, and to prevent Microsoft from being able to expand
and protect its monopoly in the PC operating system market by
anticompetitive means.  The Department also wants to ensure that
PC manufacturers and consumers will be able to choose among
competing software products.

    "Our main concern is that by violating the court order,
Microsoft is using an unlawful advantage to beat back an
important competitive challenge to its Windows monopoly," said
Joel I. Klein, Assistant Attorney General in charge of the
Department's Antitrust Division.  "Even as we go forward with
this action today," Klein added, "we also want to make clear that
we have an ongoing and wide-ranging investigation to determine
whether Microsoft's actions are stifling innovation and consumer
choice."

    Much of Microsoft's market power today results because most
applications programs for PCs--programs such as word processing,
spread sheets and money managers--are written to work with
Microsoft's Windows 95 PC operating system, the Department said.
Unfettered competition among Internet browser products could lead
to development of a computer environment in which business and
consumer applications would work regardless of which operating
system was installed on the PC.  Software companies are currently
developing applications that use an Internet browser as the user
interface and work on other operating systems as well as with
Windows 95.

    Microsoft's operating system is installed on more than 80
percent of the nation's PCs, and preinstallation on PCs at the
factory is Microsoft's main distribution channel.

    Under the 1995 court order, Microsoft is prohibited from
forcing computer makers to license any other Microsoft product as
a condition of licensing Windows 95.  Many PC manufacturers want
the ability to choose freely among competing software products
when they decide what to package with their PCs in order to offer
their customers the best mix of software products available.

    The petition charges that Microsoft has conditioned licenses
to Windows 95 on manufacturers' licensing of Internet Explorer
and that it has denied manufacturers' requests not to ship
Internet Explorer on new PCs with Windows 95.

    The Department stressed that it is not taking sides in the
"browser war" between Microsoft and its rival, Netscape
Communications Corporation, or in any emerging competition
between Windows and other products.

    "Microsoft is not entitled to require computer manufacturers
and consumers to take Internet Explorer when they license Windows
95," said Klein.  "Each of Microsoft's products should compete on
its own merits."

    Klein stressed, however, that today's action in no way
prevents consumers or PC manufacturers from voluntarily choosing
to obtain Internet Explorer and Windows 95, either together or
separately, if they so wish.

    In its petition, the Department asked the court:

    *  To stop Microsoft from requiring PC manufacturers to
       accept Internet Explorer as a condition of receiving Windows 95.

    *  To require Microsoft to notify consumers of PCs that have
       Windows 95 that they are not required to use Internet Explorer,
       that they are free to use any compatible Internet browser, and to
       give consumers simple instructions about how to remove the
       Internet Explorer icon from their PC desktop if they choose.

    *  To impose large daily fines--$1 million--on Microsoft if
       it continues to violate the court's order.

    *  To strike down broad portions of non-disclosure
       agreements that Microsoft requires those with whom it does
       business to sign.

    The non-disclosure agreements may deter companies and
individuals from coming forward voluntarily to provide
information about Microsoft to the Department.  Moreover, they
sometimes require signatories to notify Microsoft first before
complying with the Department's formal requests, or even court
orders, for such information.

    Microsoft has advised the Department that it would not
insist on prior disclosure when the Department approaches
companies or individuals and assures them that it will keep
information confidential.  But, this informal agreement, Klein
said, does not address the concerns of parties who wish to come
forward voluntarily.

    Klein stressed the importance of full, voluntary disclosure
of information relevant to the Department's larger investigation
of Microsoft's practices.  He expressed concern that the broad
non-disclosure agreements could possibly hamper its investigation
and indicated that, to remove any possible impediment, even if
unintended, the Department was seeking a court order.

    "We need a court order to clear the air here so that anyone
with relevant information will feel free to come talk to the
Department without any fear of intimidation or reprisal," Klein
said.  "We will not let Microsoft or anyone else burden that
fundamental right."

    Today's petition was filed in U.S. District Court for the
District of Columbia, where the 1995 consent decree was entered.

    Microsoft will have an opportunity to respond to the
Department's petition in writing within 11 days.  At that time,
the judge will decide whether a hearing is appropriate.

------------------------------

Date: Thu, 30 Oct 1997 21:54:52 -0700
From: Jack Dean <[email protected]>
Subject: File 3--Microsoft's reaction the the DOJ lawsuit

Here's an interesting press release on Microsoft's reaction to the the DOJ
lawsuit:

REDMOND, Wash. - Oct. 21, 1997 -- In direct response to accusations
made by the Department of Justice, the Microsoft Corp. announced today
that it will be acquiring the federal government of the United States of
America for an undisclosed sum.

"It's actually a logical extension of our planned growth," said Microsoft
chairman Bill Gates, "It really is going to be a positive arrangement for
everyone."

Microsoft representatives held a briefing in the oval office of the White
House with U.S. President Bill Clinton, and assured members of the press
that changes will be "minimal." The United States will be managed as a
wholly owned division of Microsoft. An initial public offering is planned
for July of next year, and the federal government is expected to be
profitable by "Q4 1999 at latest," according to Microsoft president Steve
Ballmer.

In a related announcement, Bill Clinton stated that he had "willingly and
enthusiastically" accepted a position as a vice president with Microsoft,
and will continue to manage the United States government, reporting
directly to Bill Gates. When asked how it felt to give up the mantle of
executive authority to Gates, Clinton smiled and referred to it as "a
relief." He went on to say that Gates has a "proven track record", and
that U.S. citizens should offer Gates their "full support and
confidence." Clinton will
reportedly be earning several times the $200,000 annually he has earned
as U.S. president, in his new role at Microsoft.

Gates dismissed a suggestion that the U.S. Capitol be moved to Redmond as
"silly," though did say that he would make executive decisions for the U.S.
government from his existing office at Microsoft headquarters. Gates went
on to say that the House and Senate would "of course" be abolished.
"Microsoft isn't a democracy," he observed, "and look how well we're doing."

When asked if the rumored attendant acquisition of Canada was proceeding,
Gates said, "We don't deny that discussions are taking place." Microsoft
representatives closed the conference by stating that United States
citizens will be able to expect lower taxes, increases in government
services and discounts on all Microsoft products.

About Microsoft
---------------
Founded in 1975, Microsoft (NASDAQ "MSFT") is the worldwide leader in
software for personal computers, and democratic government. The company
offers a wide range of products and services for public, business and
personal use, each designed with the mission of making it easier and more
enjoyable for people to take advantage of the full power of personal
computing and free society every day.

About the United States
-----------------------
Founded in 1789, the United States of America is the most successful
nation in the history of the world, and has been a beacon of democracy and
opportunity for over 200 years. Headquartered in Washington, D.C., the
United States is a wholly owned subsidiary of Microsoft Corporation.


(from www.MacsOnly.com)

------------------------------

Date: Fri, 31 Oct 1997 13:10:47 -0800 (PST)
From: "Brock N. Meeks" <[email protected]>
Subject: File 4--Small Minds Think Alike

Source - : [email protected]

CyberWire Dispatch Bulletin

Washington --In this boneyard of Washington, DC it doesn't take
long for big dawgs and small alike to bark.  A couple of small
ones yipped it up today.

Rep. Marge (no relation to Homer) Roukema, R-N.J. and Sen. Lauch
(??) Faircloth, R-N.C. introduced a bill to amend the
Communications Act that would ban convicted sex offenders from
using the Internet.

"We must protect our children by denying convicted violent sex
offenders this form of access to their victims," Roukema said.
[Hey, you knew THAT line was coming...]

Roukema calls this a "practical, workable bill."  Because known
sex offenders must register, the bill will work! she says.  No,
no, no, this is NOT an infringement of the 1st Amendment.  After
all, she says, if a felon can be denied the right to vote, a
violent sex offender can certainly be denied the right to
'cruise' the Internet looking for victims," she says.

[Okay.  Line up HERE: to take your one free shot at this brain
dead logic.]

The bill bars interactive service providers from giving sex
offenders an account.  Break that law and you get fined $5,000
for each day the perp is online.

Meeks out...

------------------------------

Date: Fri, 17 Oct 1997 18:19:13 GMT
From: [email protected]
Subject: File 5--Illinois Library Decides Not to Filter Net

Cyber-liberties Update
October 17, 1997


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Illinois Library Decides Not to Filter Net, Others Consider Restricting
Policies

Deciding that parents are in the best position to decide what their
children may view on the Internet, the Des Plaines, Ill., Public Library
recently installed Internet browsers on two computers located in the
children's section of the library without installing blocking software,
reports the Freedom Forum First Amendment Center at Vanderbilt University.
<http://www.fac.org/>.

In an interview with the First Amendment Center, Library Administrator
Sandra Norlin explained that "while we make suggestions on what we think
are the best sites for children, we are not the right people to be
determining each child's maturity level and each family's system of values.
Our policy is based on high regard for the people in our community and
their ability to make wise and prudent decisions for themselves."

Library officials also cited problems with filtering software in their
decision not to install it and that the software creates a false sense of
security in parents, the First Amendment Center reports.

"We felt that filtering software was not the appropriate action to take,"
Norlin said. "It's the 'one-size-fits-all' approach. =85 Everyone has the
same restrictions placed on them. No one would have the individual
opportunity to make their own decisions."

Meanwhile, in Virginia Fairfax County officials this week proposed a policy
which would allow parents of children under age 13 to prohibit their
children from using the Internet in public libraries.  Library officials
claimed that the policy may be the only solution since they cannot arrive
at a consensus on the filtering issue.

Under the policy being considered by the county's library board, a child's
parents or guardians would have the right to notify the library system that
they did not want him or her to be given access to the Internet. Children
13 and older still would have unrestricted access.

Other local libraries in the Washington, D.C. area are also considering
whether to install filtering software.  However, the Loudoun County library
board, which voted in July to install screening software on all computers
is reconsidering the policy.

Last month, the San Jose, Ca., City Council overwhelmingly rejected a
proposal that would have mandated restriction of Internet access in public
libraries, however, neighboring local counties are continuing to consider
filtering proposals, Ann Brick, a staff attorney with the ACLU of No. Ca.
said.

Filtering software is particularly problematic because it often blocks a
much wider spectrum of speech than legally obscene speech, Brick said,
adding that the decision to filter runs counter to the Supreme Court
decision in Reno v. ACLU from this year.

"The Supreme Court in Reno v. ACLU held that the Internet, as much as the
books and newspapers found in our public libraries, is entitled to the very
highest level of First Amendment protection which means that Internet
censorship in the library off limits for government, including City
Councils," she said.

++++++++++++++++++++

About Cyber-Liberties Update:

ACLU Cyber-Liberties Update Editor:
Cassidy Sehgal ([email protected])
American Civil Liberties Union
National Office 125 Broad Street,
New York, New York 10004

To subscribe to the ACLU Cyber-Liberties Update, send a message to
[email protected] with "subscribe Cyber-Liberties" in the body of your
message. To terminate your subscription, send a message to
[email protected] with "unsubscribe Cyber-Liberties" in the body.

------------------------------

Date: Thu, 30 Oct 1997 23:57:13 -0600
From: Avi Bass <[email protected]>
Subject: File 6--Gullibility Virus Warning

********************************************************************
           WARNING, CAUTION, DANGER, AND BEWARE!
           Gullibility Virus Spreading over the Internet!
********************************************************************


WASHINGTON, D.C.--The Institute for the Investigation of Irregular
Internet Phenomena announced today that many Internet users are becoming
infected by a new virus that causes them to believe without question every
groundless story, legend, and dire warning that shows up in their inbox or
on their browser.  The Gullibility Virus, as it is called, apparently
makes people believe and forward copies of silly hoaxes relating to cookie
recipes, email viruses, taxes on modems, and get-rich-quick schemes
[perhaps conspiracy theories should be included here].

"These are not just readers of tabloids or people who buy lottery tickets
based on fortune cookie numbers," a spokesman said. "Most are otherwise
normal people, who would laugh at the samestories if told to them by a
stranger on a streetcorner."  However, once these same people become
infected with the Gullibility Virus, they believe anything they read on
the Internet.

"My immunity to tall tales and bizarre claims is all gone," reported one
weeping victim.  "I believe every warning message and sick child story my
friends forward to me, even though most of the messages are anonymous."

Another victim, now in remission, added, "When I first heard about Good
Times, I just accepted it without question.  After all, there were dozens
of other recipients on the mail header, so I thought the virus must be
true."  It was a long time, the victim said, before she could stand up at
a Hoaxees Anonymous meeting and state, "My name is Jane, and I've been
hoaxed."  Now, however, she is spreading the word.  "Challenge and check
whatever you read,"  she says.

Internet users are urged to examine themselves for symptoms of the virus,
which include the following:

     *  the willingness to believe improbable stories
        without thinking

     *  the urge to forward multiple copies of such
        stories to others

     *  a lack of desire to take three minutes to check
        to see if a story is true

T. C. is an example of someone recently infected.  He told one reporter,  "I
read on the Net that the major ingredient in almost all shampoos makes your
hair fall out, so I've stopped using shampoo."  When told about the
Gullibility Virus, T. C. said he would stop reading email, so that he would
not become infected.

Anyone with symptoms like these is urged to seek help immediately. Experts
recommend that at the first feelings of gullibility, Internet  users rush to
their favorite search engine and look up the
item tempting them to thoughtless credence.  Most hoaxes, legends, and tall
tales have been widely discussed and exposed by the Internet community.

Courses in critical thinking are also widely available, and there is online
help from many sources, including

     *  Department of Energy Computer Incident Advisory
        Capability at
             <http://ciac.llnl.gov/ciac/CIACHoaxes.html>

     *  Symantec Anti Virus Research Center at
             <http://www.symantec.com/avcenter/index.html>

     *  McAfee Associates Virus Hoax List at
             <http://www.mcafee.com/support/hoax.html>

     *  Dr. Solomons Hoax Page at
             <http://www.drsolomons.com/vircen/hoax.html>

     *  The Urban Legends Web Site at
             <http://www.urbanlegends.com>

     *  Urban Legends Reference Pages at
             <http://www.snopes.com>

     *  Datafellows Hoax Warnings at
             <http://www.Europe.Datafellows.com/news/hoax.htm>

Those people who are still symptom free can help inoculate themselves
against the Gullibility Virus by reading some good material on evaluating
sources, such as

     *  Evaluating Internet Research Sources at
             <http://www.sccu.edu/faculty/R_Harris/evalu8it.htm>

     *  Evaluation of Information Sources at
             <http://www.vuw.ac.nz/~agsmith/evaln/evaln.htm>

     *  Bibliography on Evaluating Internet Resources at
             <http://refserver.lib.vt.edu/libinst/critTHINK.HTM>

Lastly, as a public service, Internet users can help stamp out the
Gullibility Virus by sending copies of this message to anyone who forwards
them a hoax.

*******************************************************************
This message is so important, we're sending it anonymously!  Forward it to
all your friends right away!  Don't think about it!  This is not a chain
letter!  This story is true!  Don't check it out!  This story is so timely,
there is no date on it!  This story is so important, we're using lots of
exclamation points!  For every message you forward to some unsuspecting
person, the Home for the Hopelessly Gullible will donate ten cents to
itself.  (If you wonder how the Home will know you are forwarding these
messages all over creation, you're obviously thinking too much.)

*******************************************************************

    ACT NOW!  DON'T DELAY!  LIMITED TIME!  NOT SOLD IN ANY STORE!

             *******************************************

------------------------------

Date: Tue, 21 Oct 1997 20:36:08 -0400
From: Paul Kneisel <[email protected]>
Subject: File 7--Bandwidth Turnabout: Not Just Fair Play But Future Wave?

The readers of CuDigest might be interested in the latest service offered
by my ISP (that I have not yet explored or signed up for.)

We read how the telco's are complaining that Internet users are eating
excessively into their bandwidth because the average net connection lasts
longer than the average "wail mail" voice phone call.

It seems that some ISPs have a different opinion in the matter. They've
started to shift their excess data bandwidth to become value-added
long-distance providers.

It makes one wonder about the "accuracy" of the telco claims.

-- tallpaul
++++++++++

Dear NYCT Customer,

NYCT is proud to announce the newest, most innovative, money saving
service:

NYCT LONG DISTANCE

It's the world's first paperless long distance service designed
exclusively for internet users.  You'll use your phone the same as you
do today, but pay unbelievably low rates (better than the advertised
rates of the major carriers) and get great on-line features - never
before available.  Some (but not all) of these features are:

On-line call detail and statements, in dbase or ACSCII format.

Don't recognize a number on your on-line phone bill?  Click on a
number, and we'll give you the name and   address of whose number it is.

View your calls from yesterday or one year ago on-line.

On-line address book, created and updated automatically every time you
made a call.

Your mom says you never call - with a click of your mouse we'll tell
you, on-line, every time you've   called her and what you've spent.

Calling card:  great rates, and get news, weather, sports and
entertainment.

On-line 411 directory service (110 million business and residential
listings).

24 x 7 on-line customer service (no more voicemail hell).

And much More!

To learn more and to subscribe to NYCT Long Distance, go to :
http://nyct.quadracom.com

Here you'll learn all about the available features and you can sign up
to be a NYCT Long Distance customer.

Thanks.

Andrew E. Coren
--
________________________________________________________________
:  Andrew E. Coren, President       TOTAL SOLUTION PROVIDERS     :
:  New York Connect.Net, Ltd.       internet services,networks,  :
:  http://www.nyct.net              hardware,programming,support :
:  212-293-2620                                                  :
:      " BRINGING NEW YORK THE INTERNET SERVICES IT DESERVES "   :
:________________________________________________________________:

------------------------------

Date: Fri, 10 Oct 1997 06:50:15
From: Richard Thieme <[email protected]>
Subject: File 8--Islands in the Clickstream

Islands in the Clickstream:
               The Voice of the Computer


I was disappointed when hour-long cartoons of Peanuts were made for
television. I had been reading the comic strip for years, and when I read
the words in balloons above the characters heads, I heard their voices
inside my head as a kind of echo -- the way you probably hear my voice
inside your head as you read these words.

That voice -- private, well-modulated, always just right -- was replaced by
a real childs voice that didnt sound right at all. It sounded like a
child, a real child, not the Charlie Brown in my head.  By providing too
much information, the movie makers yanked Peanuts from the world of
imagination and turned it into one more concrete thing in the world of
sensation, a fetish stripped of its magical properties.

Computer engineers pay close attention to the world of sensation as they
struggle to develop computers that act like human beings. They more they
try, however, the more it seems they miss the mark. Artificial intelligence
and robotics experts design crabs that scuttle around their labs like
low-grade idiots. Few laypeople are excited when a robot distinguishes a
cube from a ball and lifts it off the ground.

The best robots are designed for tasks, not to look like living creatures.
Let them do their jobs, and well provide the personality.

A decade ago, Joseph Weizenbaum of MIT became upset when an employee
interacted with ELIZA, the simple interactive therapist he designed,  as
if ELIZA were a real person.. His employee even asked him to leave the room
so she could have a private conversation.

Weizenbaum was alarmed at the ease with which people projected personality
and presence onto the computer. He thought it was bad, instead of just
whats so. Now two men from Stanford -- Byron Reeves and Clifford Nass --
have carried out some wonderful studies that reveal how and why we respond
to computers as if they are real people (The Media Equation: How People
Treat Computers, Television and New Media like Real People and Places -
Stanford and Cambridge: 1996).

Their studies state the obvious, but -- as usual -- it was so obvious, we
missed it. Our brains evolved to help us survive, and we react,
unconsciously and automatically, as if something that looks or acts like a
person IS a person. Our top-level program may say something else --
its only a movie, for example, when were frightened during a horror
flick -- but that wouldnt be necessary if we didnt think it was real.

Artificial intelligence and virtual reality are not necessary to make us
think a computer is smart. Less is more. Too much detail, too much
information, overwhelms our imaginations.

Computers are inherently social actors, Nass said at a Usability
Professionals Association conference. He used flattery as an example.
Were suckers for flattery, even when we know it isnt true. So computer
programs that flatter the user are consistently judged to be smarter and
better at playing games, and users enjoy using them more. And  ... people
ALWAYS deny thats what theyre doing.

We act the way we act, not the way we think we act.

We need friends, we need allies, Nass explained, and when they tied blue
armbands around both users and computers and said they were a team, the
users believed their computers were friendlier, smarter, better, just as we
do about our human team-mates. Again, no one knew they were doing it.

The voices of our computers -- the ones we hear in our heads -- are always
just right. If designers simply provide the opportunity for projection and
facilitate the transaction in a seamless way, well do most of the work and
add emotional richness and content. Get in the way too much, its like that
little paperclip guy on Windows programs, always in your face. I dont know
anyone who wants that animation dancing on their screen all the time like a
fly you cant swat.

The Infocom interactive text games from the 1980s were powerfully
evocative.  Games like Trinity, A Mind Forever Voyaging, and Hitchhikers
Guide to the Galaxy used clever text and poetic imagery to invite us to
co-create landscapes as magical as those I remember from childrens books.
With larger platforms and memory devices, games evolved into interactive
movies that shut down that process. When graphics dominate the interface,
theres less room for the activity of the imagination.

Children imagine so much,  Eleanor Roosevelt observed, because they have so
little experience. As our experience grows, the magical landscapes of our
childhood vanish, replaced with interstate highways, convenience stores and
power lines. A little more imagination and a little less information
wouldnt hurt. It gives our souls some room to maneuver. If  computers
provide just enough cues to elicit our projections, well do the rest.
Well endow distributed networks, human and non-human alike,  with
personality, presence, and intentionality as the ancient Greeks saw gods in
every rock and grove and thunderstorm.

Cyberspace is space indeed, brimful of gods and goddesses, angels and
demons waiting to become flesh. Thats neither good nor bad, its just
whats so. Digital deities are emerging now in the brackish tidewaters of
cyberspace, where all life begins. If  we accept responsibility for
understanding how we co-create them, how we interact with the Net and the
entire universe unconsciously and automatically, then we can cooperate with
how our brains work anyway.  They make up the game whether we want them to
or not. Out there and in here are metaphors, defining preconditions of
perception as space. The grid is imaginary, and the grid is real. Thats
the playing field of our lives so we might as well learn the rules, then
work and play with gusto and be all used up when the game is done.

**********************************************************************

Islands in the Clickstream is a weekly column written by
Richard Thieme exploring social and cultural dimensions
of computer technology. Comments are welcome.

Feel free to pass along columns for personal use, retaining this
signature file. If interested in (1) publishing columns
online or in print, (2) giving a free subscription as a gift, or
(3) distributing Islands to employees or over a network,
email for details.

To subscribe to Islands in the Clickstream, send email to
[email protected] with the words "subscribe islands" in the
body of the message. To unsubscribe, email with "unsubscribe
islands" in the body of the message.

Richard Thieme is a professional speaker, consultant, and writer
focused on the impact of computer technology on individuals and
organizations.

Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.

ThiemeWorks on the Web:         http://www.thiemeworks.com

ThiemeWorks  P. O. Box 17737  Milwaukee WI 53217-0737  414.351.2321

------------------------------

Date: Fri, 31 Oct 1997 10:40:31 -0800 (PST)
From: Sharif Torpis <[email protected]
Subject: File 9--Kashpureff in custody. (fwd)

Forwarded message:
Date--Fri, 31 Oct 1997 10:40:20 -0500 (EST)
From--Marc Hurst <[email protected]

Eugene Kashpureff, known for his redirect of the NSI web page,
was apprehended this morning in Toronto by undercover RCMP
detectives.

Pending a deportation hearing, he will be returned to New York to
face Felony Wire Fraud charges that were sworn out against him
after he had settled out of court with NSI in regard to their
civil suit.

Early in the week Eugene relinquished control of the Alternic to
an adhoc industry group and that group will be making an
announcement in the next few days.

A this time I have no further information to volunteer.

Sincerely
Marc Hurst

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <[email protected]>
Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

    SUBSCRIBE CU-DIGEST
Send the message to:   [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

        In ITALY: ZERO! BBS: +39-11-6507540

 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
   Web-accessible from: http://www.etext.org/CuD/CuD/
                 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
 URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

------------------------------

End of Computer Underground Digest #9.79
************************************