Found at: gopher.meulie.net:70/EFFector/effect02.02

########## ########## ########## |                    THE GREAT WORK:|
########## ########## ########## |               By John Perry Barlow|
####       ####       ####       |                                   |
########   ########   ########   |            HACKER MANIA CONTINUES!|
########   ########   ########   |   Excerpts from the Geraldo Circus|
####       ####       ####       |                                   |
########## ####       ####       | DID MORRIS "GET WHAT HE DESERVED?"|
########## ####       ####       |               A Letter to InfoWeek|
EFFector Online           November 27,1992         Volume 2, Number 2|

THE GREAT WORK by John Perry Barlow
MCI FRIENDS & FAMILY by Craig Neidorf


                         The Great Work
          For the January, 1992  Electronic Frontier column
                 in Communications of the ACM
                      by John Perry Barlow

Earlier in this century, the French philosopher and anthropologist
Teilhard de Chardin wrote that evolution was an ascent toward what
nto unity, creating the collective organism of Mind. When I first
encountered the Net, I had forgotten my college dash through
Teilhard's Phenomenon of Man. It took me a while to remember where

Whether or not it represents Teilhard's vision, it seems clear we
are about some Great Work here...the physical wiring of collective
other mind in full-duplex broadband is one which, for a hippie
mystic like me, has clear theological implications, despite the
ronic fact that most of the builders are bit wranglers and
this assembled neurology, silicon, and optical fiber Think?

Teilhard was a Roman Catholic priest who never tried to forge a
SLIP connection, so his answers to that question were more
conventionally Christian than mine, but it doesn't really matter.
We'll build it and then we'll find out.

And however obscure our reasons, we do seem determined to build it.
Since 1970, when the Arpanet was established, it has become, as
a month, a curve which plotted on a linear trajectory would put
every single human being online in a few decades.

Or, more likely, not. Indeed, what we seem to be making at the
moment is something which will unite only the corporate, military,
and academic worlds, excluding the ghettos, hick towns, and suburbs
and the Know Nots, who will count for little but the labor and
consumption necessary to support it.

theological issues aside, its most profound consequence should be
the global liberation of everyone's speech. A truly open and
accessible Net will become an environment of expression which no

When Mitch Kapor and I first founded the Electronic Frontier
Foundation, we were eager to assure that the rights established by
the First Amendment would be guaranteed in Cyberspace. But it
First Amendment is a local ordinance.

While we haven't abandoned a constitutional strategy in assuring
free digital commerce, we have also come to recognize that, as
Mitch put it, "Architecture is politics." In other words, if the
Net is ubiquitous, affordable, easy to access, tunnelled with
encrypted passageways, and based on multiple competitive channels,
no local tyranny will be very effective against it.  

A clear demonstration of this principle was visible during the
truth. Faxes and e-mail messages kept the opposition more current
anarchy of the Net.

Well, I could have myself a swell time here soliloquizing about
through electronics, but all great journeys proceed by tedious
ncrements. Though the undertaking is grand, it is the nuts and
bolts...the regulatory and commercial politics, the setting of
are so complex and boring as to erode the most resolute enthusiasm,
but if they don't get done, It doesn't.

So we need to be thinking about what small steps must be undertaken
today. Even while thinking globally, we must begin, as the bumper
opportunities, and preferred courses of action within the
boundaries of the United States.

To a large extent, America is the Old Country of Cyberspace. The
first large interconnected networks were developed here as was much
of the supporting technology. Leaving aside the estimable French
Minitel system, Cyberspace is, in is present condition, highly
American in culture and language. Though fortunately this is
ncreasingly less the case, much of the infrastructure of the Net
electronic future will be founded.

order of business is the creation of what we call the National
ubiquitous digital web, accessible to every American in practical,
economic, and functional terms.  This network would convey, in
addition to traditional telephone service, e-mail, software, faxes,
n time, High Definition Television as well as other media as yet
barely imagined.

ncluding the existing telephone, cable, publishing, broadcast, and
appropriately open to free enterprise, we can expect the emergence
of both new companies and new kinds of companies. Properly
computer business look like a precursor to the Real Thing.

As a first step, we are proposing that Congress and state agencies
establish regulatory mechanisms and incentives that will:

   Establish an open platform for information services by speedy
nation-wide deployment of "Personal ISDN".

   Ensure competition in local exchange services in order to

   Promote free expression by reaffirming principles of common

   Foster innovations that make networks and information services
easier to use.

   Protect personal privacy.

That's a tall bill, most of which I will have to take up in

For the last two years, the Internet community has generally
Education Network as the next major component of the Great Work.
This has been regrettable. NREN, as presently envisioned, would do
little to enable the settlement of ordinary folks in Cyberspace.
Rather it would make plusher accommodations for the "mountain men"
already there.

Actually, NREN has been and may continue to be useful as a "policy
testbed." By giving Congress a reason to study such legal connundra
as unregulated common carriage and the intermingling of public and
as of this writing, it has become a political football. If the
House version (H656) of the High Performance Computing Act passes
Administration will surely veto it, and we'll be back to Square

Meanwhile,  ISDN, a technology available today, has languished.
copper phone line can provide two full-duplex 64 kbs digital
channels. These can be used independently,  concurrently, and
complex than that. Garden variety ISDN contains three channels. The
third is a 16 kbs "signal" channel, used for dialing and other

anyway or will install soon. Even at the currently languid

While those who live their lives at the end of a T1 connection may
consider 64 kbs to be a glacial transfer rate, the vast majority of
too slow and too user-hostile to create "critical mass" in the
online market.

We also believe that ISDN, whatever its limitations, is rapid
enough to jump start the greatest free market the world has ever
known. Widespread deployment of ISDN, combined with recent
Adobe's John Warnock calls the "ascii jail", delivering to the home
time multimedia. Much of the information which is now
nappropriately wedged into physical objects...whether books,
advent of the PC had on computing.

We admit that over the long term only fiber has sufficient
bandwidth for the future we imagine. But denying "civilian" access
to Cyberspace until the realization of a megabillion buck end-to-
end fiber network leaves us like the mainframe users in the 60's
the original PC.

Just as consumers were oblivious to the advantages of FAX
technology until affordable equipment arrived, we believe there is
a great sleeping demand for both ISDN and the tools which will
exploit it. And then there's the matter of affording the full fiber
national network. Until the use of digital services has become as
common as, say, the use of VCR's, Joe Sixpack's willingness to help

Given that most personal modem users are unaware that ISDN even
exists while the old elite of Internet grossly underestimates its
able to claim lack of consumer demand in their reluctance to make
t available. A cynic might also point to its convenience as a
like "Allow us to be information providers  or we starve this
technology," has been one of their longest levers.

This issue should now be moot. Judge Greene ruled in July that the
telcos could start selling information. They got what they wanted.
Now we must make them honor their side of the bargain.

Unfortunately it still seems they will only let us use their
end, they have managed to convince several state Public Utility
Commissions that they should be allowed to charge tariffs for ISDN
costs. In Illinois, for example, customers are paying 10 to 12
cents a minute for an ISDN connection. This, despite evidence that
the actual telco cost of a digitally switched phone connection,
computer business, 1200% is not an ethical gross margin. And yet
the telcos claim that more appropriate pricing would require

Unfortunately, the computer industry has been either oblivious to
the opportunities which ISDN presents or reluctant to enter the
s understandable. National telecommunications policy has long been
an in-house project of AT&T. It is brain-glazingly prolix by design
and is generally regarded as a game you can't win unless you're on
the home team. The AT&T breakup changed all that, but the industry

Assurance of Local Competition

vastly more complex place. Who provides what services to whom, and
under what conditions, is an open question in most local venues.
Even with a scorecard you can't tell the players since many of them

Legislation is presently before the Edward Markey's (D-MA)
Subcommittee on Telecommunications and Finance (a subset of the
House Energy and Commerce Committee) which would regulate the entry
of the Regional Bells into the information business. The committee
s correctly concerned that the RBOC's will use their
nfrastructure advantage to freeze out information providers. In
other words, rather as Microsoft uses DOS and Windows.

Somewhat hysterical over this prospect, the Newspaper Publishers
Association and the cable television companies have seen to the
ntroduction of a House Bill 3515 by Rep. Jim Cooper (D-TN) which
for the next decade. The bill would bar existing telephone service

Of course neither approach would serve the public interest. The
telcos have had so little experience with competition that we can't
expect them to welcome it. And while eventually there will be local

We need a bill which would require the telcos to make ISDN open and
affordable to all information providers, conditioning their entry
nto the information business to the willing delivery of such

The computer industry has an opportunity to break the gridlock
between the telcos and the publishers. By representing consumer
nterests, which are, in this case, equivalent to our own, we can
missing in the debate has been technical expertise which serves
neither of the existing contenders.

Finally, the Public Utilities Commissions seem unaware of the
earth would a housewife want with a 64 kbs data line? This is
another area in which both consumers and computer companies need to
be heard from.

What You Can Do

Obviously, the first task upon entering a major public campaign is
nforming oneself and others. In this, many Communications readers
as RISKS digest, Telecom Digest, and the EFFectors regularly
monitoring those newsgroups. I'm tempted to tell you to join the
EFF and support our Washington lobbying efforts, but I probably
abuse this podium with our message too much as it is.

Once you're up to speed on these admittedly labyrinthine issues,
there are three levers you can start leaning against.

First, Congress will be actively studying these matters for the
than those self-servingly extended by the telcos and the

"Please let me and my staff know what policies you and
others in the computer industry believe would best
s open and innovation is rewarded. I also want to
learn what lessons from the computer industry over the
on structuring the information and communication
networks of the future."

Second, it is likely that the Public Utility Commission in your

Finally, you can endeavor to make your own company aware of the
opportunities which ISDN deployment will provide it as well as the
computer business employs your toils, ISDN will eventually provide
a new market for its products.

Though these matters are still on the back pages of public
awareness, we are at the threshold of one of the great passages in
the history of both computing and telecommunications. This is the
eve of the electronic frontier's first land rush, a critical moment
for The Great Work.

Friday, November 15, 1991


                   GETTING WHAT HE DESERVED?
              An Open Letter to Information Week
                        by Mike Godwin

Manhasset, N.Y. 11030

Dear editors:
Week ("Morris Got What He Deserved") is, sadly, only the latest example 
of the kind of irrational and uninformed discourse that too often colors 
might have written a very different column.

The following are only a few of Dorn's major factual errors:       He 
Morris did not know what he was doing--his mistake was being slovenly." 
Yet even the most casual reading of the case, and of most of the news 
coverage of the case, makes eminently clear that the sophists Dorn 
also writes that "Any effort to break into a system by an unauthorized 
things, should per se be illegal." This is also the position of the 
Electronic Frontier Foundation, which Dorn nevertheless criticizes for 
being "out of step with the industry." Yet the issue of whether 
unauthorized computer access should be illegal also was never an issue 
n the Morris case.

Dorn writes that "Those defending Morris squirm when trying to explain 
they existed. But none of the people or organizations Dorn quotes has 
ever claimed that his actions were harmless. This too was never an issue 
n the Morris case.

Dorn makes much of the fact that Morris received only "a trivial fine 
and community service." But the focus both in the trial and in its appeal 
construed to make such a distinction.

Dorn writes that "To say that those who intrude and do no lasting damage 
are harmless is to pervert what Congress and those who drafted the 
legislation sought to do: penalize hackers." Indeed, this would be a 
(EFF), and caterwauling from the Computer Professionals for Social 
Responsibility--all out of step with the industry. They seem so 
frightened that the law may reach them that they elected to defend 
Morris's indefensible actions." Dorn's distortions here verge on libel, 
that the law will apply to us. Instead, we are concerned, as all 
citizens should be, that the law make appropriate distinctions between 
ntentional and unintentional harms in the computer arena, just as it

A more glaring factual error occurs one paragraph later, when he writes 
that "The Supreme Court says intruders can be convicted under the law 
because by definition an intrusion shows an intent to do harm. That 
takes care of Morris." The Supreme Court has never said any such thing--after 
all, the Court declined to hear the case. Even the lower courts in the 
Morris case made no such claim.

What is far more "sickening" than even Dorn's imaginary versions of our 
concerns about the Morris case is his irresponsibility in making 
unsubstantiated charges that even a cursory familiarity with the facts 
could have prevented. In the course of his article, Dorn manages to get 
one thing right--he writes that "The law is not perfect--it needs 
clarification and reworking." This has been our position all along, and 
t is the basis for our support of Morris's appeal. It is also public
knowledge--Dorn could have found out our position if he had bothered to 
ask us.

Mike Godwin
Staff Counsel


                     MCI FRIENDS & FAMILY:
                    From Problem To Solution
                       by Craig Neidorf

An alarming situation was brought to my attention a couple of weeks ago. 

A friend called me up and said, "Hey did you know I can get your MCI 
Friends & Family calling list?" I asked him what he was talking about 
and he explained by use of a demonstration. He proceeded to three-way us to 
the 800-FRIENDS (800-374-3637) We were greeted by an automatic 
electronic messaging system:

"Welcome to MCI Friends & Family Circle Update line!" 

"Please enter your telephone number beginning with your area code."

(He did)

"Thank you."

"One moment please while we access your account." 

"To verify your MCI account, Please enter your 5-digit zip code."

(He did)

"Congratulations and thank you for being one of our valued friends and 
family customers."

"Your calling circle consists of 5 members." 

"If you would like to inquire about a specific member or nominee to your 
circle press one (1)."

"To hear the status of each person in your calling circle press two 

(He choose 2)

"The following people are active members of your calling circle. You 

"Your friend at (XXX)YYY-ZZZZ"
"The person at (XXX)YYY-ZZZZ"
"Your sister at (XXX)YYY-ZZZZ"
"Your mother at (XXX)YYY-ZZZZ"
"Your friend at (XXX)YYY-ZZZZ"

"Your home number is active on your circle so that you will save 20% 

"To inquire about a specific circle member press one(1)." 

"To speak to an MCI operator press zero (0)." 

We played with this for a few minutes and then hung up. I could not 
believe what he had found or the potential for invasion of privacy 
against MCI customers that this FRIENDS program created. 

My friend told me that the FRIENDS line also carried status about other 
case, he had found that the FRIENDS automated service even identified a 
number that belonged to another friend's mother in Spain. 

How did you access this information on people? Just by entering their 
telephone number and zip code. After that, their calling list is an open 

little assistance. She took down my name and number and told me she would pass 
this information on to Alan Postell, a manager at MCI who could help me. 

nterested in learning about and correcting the situation. He took down
lots of information about my concerns and said he was sending a full 
Circle program. My advice was to use a unique identifier like part of 
the billing identification number found only on the bill the customer 

news circulated across RISKS and Telecom Digest and finally it attracted 
the attention of Emmanuel Goldstein (the editor of 2600 Magazine, 
WBAI in New York called "Off The Hook." He proceeded to demonstrate 
MCI's problem very graphically by putting the MCI Friends number on the air 
and calling it up. This incident brought even more attention on the issue 
and along with hundreds of other calls, finally forced MCI to realize that 
changes were necessary.

On November 6, 1991, MCI changed its policy. You can still call 1-800- 
FRIENDS and enter your telephone number, but now instead of your zip 
code, the system asks you for the last three digits of your billing 
dentification number. Mr. Postell called me on November 8th to inform
me about these changes and thank me since it was my idea that they decided 
to implement. Additionally, he claimed that very soon, customers will 
also be able to enter the telephone numbers of people they believe are 
on the list and then the computer service will respond by telling them if 
this is the case.

little argument. I would still prefer something longer than 3 digits of 
the billing identification number, but I can live with it. 


                      HACKER MANIA CONTINUES!
                 How It Wasn't Told Over the Tube

Hackers.  A mish-mosh of disinformation, lurid film clips, and 
unrestrained ignorance, the show demonstrated once again how much work 
s left for all of us to do in educating the media and the general public
to the realities, rather than the fantasies, that are engendered through 
computer-based communications.

For those who might have missed the "report", here's a transcript of key 

Excerpts from: _Now_It_Can_Be_Told_: "Mad Hackers' Key Party" 
Hosted by Geraldo Rivera (Sept. 30, 1991) 

Geraldo: I'm Geraldo Rivera. And now, It can be told. 

Emmanuel Goldstein, Krista Bradford, Cliff Stoll, Phiber Optik, Winn Schwartau, 
and other bit players. Focus of discussion is on hacking as "terrorism" 
and generous film and news clips of terrorism and war scenes interwoven 
amongst discussion of dangers of hackers to national security. We pick 
up the dialogue when Don Ingraham (Alameda County (Calif.) prosecutor and 
Craig Neidorf (former editor of PHRACK) join in> 

Geraldo: Joining us now via satellite from Oakland, CA is the Assistant 
District Attorney Don Ingraham ... for Alameda County and he has been 


Geraldo: Don, how do you respond to the feeling common among so many 
the flaws in our security systems?

Don: Right, and just like the people who rape a coed on campus are 
exposing the flaws in our nation's higher education security. It's 
absolute nonsense. They are doing nothing more than showing off to each 
other, and satisfying their own appetite to know something that is not 
theirs to know.

Geraldo: Don, you stand by, Craig as well. And when we come back we'll 
the Mad Hacker Craig Neidorf. 

Geraldo: We're back with Craig Neidorf, a former University of Missouri 
that he has put together this very impressive scrapbook.

lightning bolt hitting what looks to be a crown [Knight Lightning] 
...And on the right it looks like a graphic saying "Knight Lightning" and below 
that is a black circle with a white lightning bolt, and next to that is 
a triangle that looks very similar to the triangle with an eye that 
appeared on the cover of _GURPS_Cyberpunk_ [which said in it, the book 
that was seized by the Secret Service! see page 4...- but the one on KL 
s illegible]>

Geraldo: Knight Lightning I guess that was your code? 

KL: It was my editor handle.

Geraldo: That's your handle. OK. And from Oakland, CA we are talking 
might say, to put people like Craig behind bars. Don, do you think 
Craig's lucky that he's not behind bars right now? 

Don: Yes, I think he's extraordinarily lucky. He was part of a 
conspiracy, in my opinion, to take property that wasn't his and share it 
compromised by, unfortunately, released by another Bellcore subsidiary. 
But was certainly not through any doing of HIS that he is a free man.

Geraldo: So you think that his activities stink, then. 

Don: Absolutely. No Question about it.

Geraldo: Craig, you wanna respond? Are you doing something for the 

KL: Well I was merely publishing a newsletter. I didn't go out and find 
this document. Rather it was sent to me. In many ways it could be 
compared to Daniel Ellsberg sending the Pentagon Papers to the New York 

Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg? 

Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's 
nterest. The E911 codes, which is the citizen's link to the police
the central service to the community....... 

Geraldo: You broke into the 911 system? He broke into the 911 system!

KL: No, that's not correct. I never entered any 911 telephone system.

Don: I didn't say he entered into it. What I said was that he and Riggs 
conspired together to take a code that they knew was necessary to 911 
and to take it apart to see how it worked. They never had the owner's 

Geraldo: Alright, lemme ask you this.... 

KL: The court found that there was no conspiracy here. 

Geraldo: You were acquitted. You were vindicated at least from criminal 
nside the White House computer.

KL: Yes they have.

Geraldo: And they've been inside the Pentagon computer. 

KL: Yes.

Geraldo: And if Saddam Hussein hired some hackers whether they're from 
Holland or any other place, he could've gotten into these computers, 

KL: Presumably, he could've.

Geraldo: And gotten some valuable information. 

KL: It's definitely possible.

Geraldo: And you still think hackers are performing a public service? 

KL: That's not what I said. I think that those kind of activities are 
that are not performing malicious acts, while they should be punished 

Geraldo: You're response to that Don?

Don: I don't think they're being punished very much at all. We're having 
trouble even taking away their gear. I don't know one of them has done 
out that even Mitnick who is a real electronic Hannibal Lecter ... did not 

Geraldo:  An electronic Hannibal Lecter. OK, stand by, we'll 
be back with more of this debate in a moment... 

Geraldo: Back with Craig Neidorf and prosecutor Don Ingraham. Craig, do 
you think hackers are voyeurs or are they potentially terrorists? 

KL: I think they resemble voyeurs more than terrorists. They are often 
times looking at places where they don't belong, but most hackers do not 
ntend to cause any damage.

Geraldo: Do you buy that Don?

Don: If they stopped at voyeurism they would be basically sociopathic, 
but not doing near the harm they do now. But they don't stop at looking, 
that's the point. They take things out and share them with others, and 
they are not being accountable and being responsible as to whom they are 

Geraldo: Can they find out my credit rating? I know that's not a 
national security issue, but I'm concerned about it. 

Don: Piece of cake.

Geraldo: No problem.

Don: Assuming....

Geraldo: Go ahead. Assuming I have a credit rating...hahahah.... 

Don: Assume that the credit is not carried by someone who is using 
adequate security.

Geraldo: But you think Craig it's not problem. 

KL: I think it's no problem.

Geraldo: Give me quickly the worst case scenario. Say Abu Nidal had you 

KL: I'm sorry?

Geraldo: Abu Nidal, notorious .....

KL: As far as your credit rating?

Geraldo: No, not as far as my credit rating.. The world, national 

KL: Well, hackers have gotten into computer systems owned by the 
anything that was ever classified. But even some unclassified 
nformation could be used to the detriment of our country.

Geraldo: Like the counter-terrorist strategy on January 15th, the day of 
the deadline expired in the Persian Gulf. 

KL: Perhaps if Saddam Hussein had somehow known for sure that we were 

Geraldo: Don, worst case scenario, 30 seconds? 

Don: They wipe out our communications system. Rather easily done. Nobody 
talks to anyone else, nothing moves, patients don't get their medicine. 
We're on our knees.

Geraldo: What do you think of Craig, quickly, and people like him? 

Don: What do I think of Craig? I have a lot of respect for Craig, I 
think he's probably going to be an outstanding lawyer someday. But he is 
contributing to a disease, and a lack of understanding ethically, that 
s causing a lot of trouble.

Geraldo: One word answer. As the computer proliferate won't hackers also 

Knight Lightning: I think we're seeing a new breed of hacker. And some 
of them will be malicious.

Geraldo: Some of them will be malicious. Yes, well, that's it...for now. 



After a number of requests and much discussion, we have created a new 
membership category for EFF.  This membership allows organizations to
organization can, if it wishes designate up to five individuals as 
active members in the organization.  Five copies of EFFECTOR and all other 
materials produced by or made available by the EFF will be sent to the 
organization or the designated members.



and activities into other realms of the electronic frontier, we need the
financial support of individuals and organizations.

becoming a member now. Members receive our quarterly newsletter,
EFFECTOR, our bi-weekly electronic newsletter, EFFector Online (if you
believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Your membership/donation is fully tax deductible.

Our memberships are $20.00 per year for students, $40.00 per year for

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
explicit permission, we assume that you do not wish your membership

>>>---------------- EFF@eff.org MEMBERSHIP FORM ---------------<<<

Mail to: The Electronic Frontier Foundation, Inc. 
         155 Second St. #22 
         Cambridge, MA 02141

            $20.00 (student or low income membership)
            $40.00 (regular membership)
            $100.00(Corporate or company membership.
                    This allows any organization to 
                    become a member of EFF. It allows
                    such an organization, if it wishes
                    to designate up to five individuals
                    within the organization as members.)

    [  ] I enclose an additional donation of $___________



Address: __________________________________________________

City or Town: _____________________________________________

State:_______ Zip:________ Phone:(    )_____________(optional)

FAX:(    )____________________(optional)

Email address: ______________________________

to my Mastercard [  ]  Visa [  ]  American Express [  ]  


Expiration date: ____________

Signature: ________________________________________________


other non-profit groups from time to time as it deems 
appropriate   [ ]. 

                   EFFector Online is published by                   |
                  The Electronic Frontier Foundation                 |
                 155 Second Street, Cambridge MA 02141               |
                 Phone:(617)864-0665 FAX:(617)864-0866               |
                     Internet Address: eff@eff.org                   |
 Reproduction of this publication in electronic media is encouraged  |
               To reproduce signed articles individually,            |
          please contact the authors for their express permission.   |