[alt.society.cu-digest] C-u-D, #1.26

TK0JUT2%NIU.BITNET@UICVM.uic.edu (08/05/90)

  ****************************************************************************
                  >C O M P U T E R   U N D E R G R O U N D<
                                >D I G E S T<
              ***  Volume 1, Issue #1.26 (Aug 2, 1990)   **
  ****************************************************************************

MODERATORS:   Jim Thomas / Gordon Meyer  (TK0JUT2@NIU.bitnet)
ARCHIVISTS:   Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
            views of the moderators. Contributors assume all responsibility
            for assuring that articles submitted do not violate copyright
            protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


CONTENTS:
File 1:  Moderators' Corner
File 2:  GURPS: Review of Steve Jackson's Cyperpunk Game (Gordon Meyer)
File 3:  Cyberspace Subculture in Real Life (Mike Godwin)
File 4:  Update on RIPCO BBS and Dr. Ripco (Jim Thomas)
File 5:  The Current TAP  (TAP Editors)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
***  CuD #1.26, File 1 of 5: Moderators' Comments                ***
********************************************************************

Date:      28 July, 1990
From:      Moderators
Subject:   Moderators' Corner

++++++++++
In this file:
  1) Keith Henson's Address
  2) FTP Information
  3) Len Rose Update

+++++++++++++++++++++++++++++
KEITH HENSON'S ADDRESS
+++++++++++++++++++++++++++++

In CuD 1.25, we printed an article by Keith Henson.  For those wanting to
know how to contact him for more information or to make donations, his
address is:  HKHENSON@CUP.PORTAL.COM

+++++++++++++++++++++++++
FTP INFORMATION
+++++++++++++++++++++++++

Some users have had problems obtaining files from the FTP site.  Remember
that it is case sensitive, and the directories are not immediately obvious
without the directory list. To prevent abuse of the system, we furnish the
file list only to subscribers of CuD. A second FTP site will be available
in a few weeks.

+++++++++++++++++++
LEN ROSE UPDATE
+++++++++++++++++++

As of Friday, Aug. 3, Len Rose's case awaits trial in federal court in
Baltimore. According to one source, Len was offered an arrangement in which
he could plead guilty to one count of computer fraud and receive at least
some prison time, but would have his computer equipment returned, or take
the case to trial and take his chances.

Len is currently represented by a public defender because of lack of
resources to retain a specialist in computer crime cases.  He remains
unemployed, and has moved into a motel with his family.  He told us that,
because his equipment and crucial files were seized, his business was
essentially shut down and he was deprived of his livelihood. This means that
he not only cannot support his family, but cannot retain legal counsel of
his choice.  He said he was feeling isolated and "abandoned" and wasn't
sure what his legal options were.

We will present a detailed update of Len's situation in CuD 1.27.  Len's
public defender can be contacted at (301)-381-4646.


********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

********************************************************************
***  CuD #1.26: File 2 of 5: GURPS Review (by Gordon Meyer) ***
********************************************************************

Date:    Fri, 20 Jul 90 01:19 CDT
From: Gordon Meyer
Subject: GURPS: Review of Steve Jackson's Cyperpunk Game


*****************************************************************
*            Fear and Loathing in the Secret Service            *
*                 A synopsis of GURPS Cyberpunk                 *
*                         Gordon Meyer                          *
*            (with apologies to Hunter S. Thompson)             *
*****************************************************************

On March 1, 1990 the United States Secret Service raided the offices of
Steve Jackson Games (SJG) in Austin, Texas.  The raid was in conjunction
with an ongoing investigation into the activities of a computer underground
group known as the Legion Of Doom.  In the process of the raid at Steve
Jackson the agents seized files, computer equipment, and other assorted
materials, including the soon-to-be-released book entitled GURPS CYBERPUNK.

As of this writing (July 19, 1990) the majority of the material seized has
been returned, but the four month lag time cost the company much in revenue
and development time.  The financial impact has been said to have caused
lost income in the several thousand dollars range, and the layoff of nearly
half the SJG staff.  In spite of the difficulties of re-creating the book
from notes, draft copies, and comments from beta testers, SJG released
GURPS Cyberpunk approximately ten weeks ago.  Sales thus far have been
good, according to author Loyd Blankenship, and the reaction has been
positive to "the most realistic cyperpunk game on the market".

WHAT IS GURPS CYBERPUNK?

This "review" is being written for the purpose of exploring a book that was
confiscated, prior to publication, by the United States Secret Service. It
is not a critique of the book itself.  My intent is to discuss GURPS
Cyperpunk in a framework that examines what it contains in general, not in
specific, and most certainly not from the perspective a Role Playing Game
aficionado.  When the Secret Service confiscated GURPS Cyberpunk they
remarked it was actually a "handbook for computer crime" (p.5). Thus giving
us an excellent ideal-type by which we can (with tongue-in-cheek) define
the essential elements, if not the specific contents, of a government
identified "crime manual".

GURPS Cyberpunk is but one module of the General Universal Role Playing
System ("GURPS").  Role Playing Games (RPG) are complex simulations where
players role play the actions and persona of a character in a mythical
world.  Many RPG's are written for one specific setting, such as "Dungeons
and Dragons" (not a SJG product by the way) where play takes place in a
medieval world of magic, wizards, and (naturally) dragons.  GURPS, on the
other hand, is an award-winning system whereby nearly any type of world or
setting can be simulated based on the same set of GURPS rules and
guidelines.  GURPS Cyberpunk is a supplement to the GURPS Basic Set, giving
the players specific rules and background material needed to play a game
that takes place in a "cyperpunk" setting.

CYBERPUNK?

A discussion of "cyberpunk", as a genre and movement in and of itself,
would eclipse this review.  For our purposes we'll define cyberpunk as a
science fiction genre where the world is presented as gritty, corrupt, and
unfair, yet infused with rampant high technology being used for personal
and corporate gain.  Loyd Blankenship, the author of GURPS Cyberpunk and
managing editor at SJG, describes it like this:

     The cyberpunk future is vibrant - pulsating with life, from the
     streets to the high-rises. Paradoxically, however, that life is cheap,
     perhaps because there's so much of it - there might be twenty million
     people in Tokyo or New York.

     Cyberpunk is a style defined by two elements.  The first is
     interaction of man with technology. Computers are as common as
     dishwashers in the cyberpunk future, and the dividing line between man
     and machine is sometimes blurred....The second element found in most
     cyberpunk work is that of struggle. The world is divided into two
     groups - the haves and the have-nots - with a vast chasm between them.
     Those with power wish to keep it; those without, want to get it. (p.4)

In discussing the role playing aspects of a cyberpunk world Blankenship
writes:

     The conventional gaming morality of good versus evil has a limited
     role in the genre. What are the reference points? Characters in
     cyberpunk literature are constantly committing unethical, illegal or
     immoral acts, but they sometimes do so for purposes we could define as
     "good."  Conversely, a repressive government may define behavior as
     "good" that stifles the human spirit and grinds individuals into the
     dust. In cyberpunk, there are rarely blacks and whites, but there are
     many shades of gray. (pp.4-5)

If one considers GURPS Cyberpunk to be a literary work, rather than a
"mere" rule book for gaming, it becomes a valuable reference work for
exploring the cyberpunk genre.  Blankenship has even thoughtfully included
a selected bibliography of distinctive cyperpunk novels and movies. Those
interested in learning more about the cyberpunk future will find
bibliography quite helpful.

THE GURPS CYBERPUNK WORLD.

The book is divided into six sections, covering each element that the "Game
Master" (the person who, in essence, referees and directs the game for the
other players) should consider when planning his game or scenario.  These
sections, which will be discussed in turn, are:

        Characters Cyberwear Technology and Equipment Netrunning World
        Design Campaigning

CHARACTERS:

The inhabitants of the GURPS Cyberpunk world, and thus the personas players
can choose to adopt in game play, are many and varied.  Consistent with the
overall theme of the genre they primarily consist of low-life and/or
corrupt individuals interested mostly in personal gain.  Some of the
characters types discussed in the book include Assassins (which can be
associated with a particular mega-corporation or freelancers), Bodyguards,
Brokers (legitimate resellers, black marketeers, etc), Celebrities, Cops
(corrupt and otherwise), Corporate (good, bad, or indifferent the corporate
worker will always put company and career interests first. These characters
are also known as "suits"), Drifters, Mobsters, Reporters, and Slicers
(doctors who specialize in installing artificial supplements to the human
body. See "cyberwear" below).

There are many more roles and occupations that players can adopt.  The
GURPS Cyberpunk world is rich in options and offers something at every
level of social strata.


CYBERWEAR:

In the cyberpunk world science and medicine have met, mated, and forever
changed the meaning of "cosmetic surgery".  In this section the various
"optional equipment" players can purchase or obtain for their characters is
discussed. Cybernetic implants or replacement parts, such as eyes with
infrared or microscopic abilities, are available providing the player has
enough money and chutzpah to risk the surgery.  The cyberpunk body shops
offer everything from razor sharp retractable blades that fit under your
fingernails, to ROM chips and computer interfaces grafted directly onto the
cerebral cortex.  This section is a must read of "gadget freaks" of the
future!

TECHNOLOGY AND EQUIPMENT:

This section discusses the weapons (such as slugthrowers, lasers, and
grenades), equipment (such as ROM burners, batteries, vehicles), and drugs
(both legal and illegal), that are found in the game's world.  The
accessories found here are consistent with the overall theme, and in many
cases represent logical extensions of present day technology.

NETRUNNING:

The unifying concept of most Cyberpunk stories is the existence of a
world-wide computer network, know simply as "the net".  As GURPS Cyberpunk
points out, certainly the seeds for this network were already in place in
the late 1980's. The fact that so many of your are able to receive CuD on a
timely basis is testimony to this. GURPS Cyberpunk extrapolates the present
net into a future where it is a pervasive element of everyday life.

"Netrunners", the player characters who are specialists in the art of
penetrating the security of computers on the net, can be highly valued
members of the player team. The net and it's computers play such a large
role in the cyberpunk society that the skills of a "hacker" are often
needed to successfully complete a scenario.  (Other player character types
available are "console cowboys" or "interface jocks" who are essentially
netrunners-for-hire, plying their skills at freelance system penetration.)

Because so much of the cyberpunk future depends on computer interaction the
bulk of the "Netrunning" chapter is dedicated to describing the equipment
and layout of the net.

The computers described in GURPS Cyberpunk are futuristic, but not
unrealistically so.  They range from "dedicated computers" performing one
task, to "Megacomputers" which can control the traffic, sewage, power, and
all other maintenance functions for an entire city.

The net itself is, in some ways, much like the existing networks of today.
It consists of Government, Banking, Military, Educational, and Private
systems linked together through interconnections and gateways.  Three
different types of nodes are available for "jacking into" the net (public,
normal, and secure) with each protected (or not protected in some cases)
with various degrees of "ICE" (Intrusion Countermeasure Electronics), the
security software of the future.

The net is accessed using a "cyberdeck", a small dedicated computer that
connects directly to the users neural system allowing the network and its
data to be visualized as it is transversed.  Thus when a netrunner is
jacked in she is virtually cut-off from the outside, totally immersed in
the experience of using the net.

For the netrunner, the visual experience of being "jacked in" is one where
the information is "seen" floating in space before ones eyes.  The image,
which is being electronically projected onto the optical nerve, can be one
of three styles. Marquee style, where all information appears in text form,
"Icon style" similar to the graphical user interface used in today's
machines, or "Environmental style" where the net appears to be a complete
and fully defined landscape with nodes, computers, and data appearing as
physical structures which can be entered and explored (perhaps somewhat
like that presented in the movie TRON).

If a Netrunner wishes to penetrate the ICE protecting a corporate computer
he can use one of several techniques which may (depending on luck and the
attributes or skills the character has) prove successful.  Some of the
techniques discussed in the GURPS manual include guessing passwords,
bluffing information out of inside sources (also known as "social
engineering"), and using specialized Cyberdeck programs to distract or
disable the security system.

If a Netrunner character successfully obtains access they must then take
actions to secure their goal...whatever that goal may be.  The GURPS
Cyberpunk manual includes a brief discussion of several things the player
may attempt such as copying or downloading information, monitoring other
users, remote execution of programs, and searching a database.  Note that
these discussions are quite brief, and merely explain in conceptual and
atmospheric terms what each action might entail.  For example, here are two
such sections in their entirety:

     Creating New Accounts: This can only be done from a superuser account.
     A fictitious entry is made in the system user file - the creator
     chooses whether to set it up as a normal account or as a superuser.
     Normal users are less powerful, but tend to attract less attention; a
     new superuser can do anything, but may be noticed quickly. If the
     netrunner can accomplish his goal with a normal account, or if he has
     confidence in his Promote program, he should stick with a standard
     account.  The decker should keep in mind that everything he does is
     probably being logged - unless he has a very trustworthy Erase
     program, he should plan on abandoning an account after using it for
     any noticeable scams.  Each week there is a chance that the fake
     account will be discovered by routine system administration. The GM
     [game master] should secretly roll 3d [dice] for each bogus account.
     If the machine is public a result of 4 or less indicates discovery;
     this increases to 6 or less on a normal machine and 8 or less on a
     secure machine. Increase these numbers by 2 if the fake account has
     superuser privileges.  Possible actions upon discovery range from
     simple deletion of the account to heavy Alarming and a Trace program.
     (pp.79-80)

     TRANSFERRING COMMODITIES: With the advent of electronic fund
     transfers, money is shuffled by communication lines instead of armored
     trucks. By shuffling the appropriate numbers a good netrunner can give
     himself "legitimate" access to millions of dollars in cash, precious
     metals, products or anything else that is used in commerce.
     Transferring commodities is simple - the exact appearance depends on
     the Environmental Interface being used [marquee, icon, etc. see above
     discussion], but the decker basically "picks up" the commodity with a
     Computer hacking roll [of the dice], and then "carries" it with him to
     another node, or uses a Transfer program to move it. What really
     happens is that he netrunner steals the routine codes and invoice
     number for the valuta, then erases them from the true owner's system.
     he must then arrange for delivery.  (p.82)

Other topics included in this chapter include detailed instructions on how
the GM can determine the structure of the network before the game begins by
using dice to randomly decide such things as number of nodes, contents of
the systems, complexity of the security, and so on.  This information is
later used in game play when a netrunner player attempts to access
individual nodes on the net.

Finally, throughout this chapter (and much of the book) there are numerous
"sidebar" articles containing background and supportive information which
is intended to add to the realism of the game.  The sidebar topics in this
chapter include a discussion of Integrated Services Digital Network (ISDN),
Types of pseudonyms used by netrunners, Tempest surveillance equipment,
Data encryption, The Social Consequences of Neural Interfaces, Phreaking,
Strange Protocols, Trashing, and a list of current (1990) network names
around the world.  As an example here is the complete entry for "Chat
Systems":

    One of the most popular types of system on the net will be realtime
    conference centers - commonly called chat systems. These are nodes with
    a high number of incoming lines which allow users to communicate (both
    publicly and privately) with each other.  Hackers commonly use chat
    systems to discuss targets, or to trade information. The anger is that
    one is never sure of the identities of the other callers.  Hacker chat
    systems on current networks (such as Altgers or tchh in West Germany
    and QSD in France) have evolved elaborate protocols for hackers to deal
    with each other. These include the use of coded phrases to initiate
    conversation, avoidance of "real" names, and many other methods to
    ensure security.  The second danger of a chat system is that the users
    must trust the management.  Any time that a netrunner is using an
    unfamiliar chat system, the GM should roll 3d. On a 7 or less, the
    conversation is being monitored and possible recorded.  What happens
    after that is up to the GM. (p.69)

The other sidebar topics follow a similar pattern.  The topic is discussed
briefly, with some historical and a smattering of specific information
thrown in, then the specific instructions on how this information can be
incorporated into game play.

THE REST OF THE BOOK:

The remaining chapters in the book are "World Design" which discusses
considerations such as political climate, economic system, Urban Settings,
etc., and "Campaigning" which covers others items the GM will want to
consider such as setting the atmosphere, pace of the game, group dynamics,
and determining the theme.

CONCLUSION:

The bulk of this overview has focused on the "netrunning" chapter since it
is the information contained therein that the Secret Service was probably
most interested in.  Having placed the chapter within the framework and
intent of the book as a whole it become obvious that the discussion of
"hacking" is far from the instructional text book the government believed
it to be.  What GURPS Cyberpunk has done is to take a pre-existing science
fiction genre (cyberpunk) and create descriptions and guidelines that allow
role playing gamers to adopt accurate and realistic scenarios.

The question remains, however, if GURPS Cyberpunk has given away any
so-called "Secrets of the Computer Underground".  The answer is most
certainly that it has not.  Even the sidebar discussions about access
levels and backdoor programs reveal little more than "Superusers have the
most power of any account" and "Some programs may have secret passwords
that bypass regular system security".  Hardly information one couldn't
obtain from many other sources, including mainstream books on computer
security.

In fact, one group that may find this book to be helpful in the real world
is the computer security community.  Various members of the CU have often
suggested that computer facilities shred their trash, prohibit default
passwords, and other simple security measures.  If one concludes that this
is indeed a handbook for breaking into computers then it follows that it is
also a handbook on preventing hackers from doing so.

The audience of role playing games is a difficult crowd to please.
Successful games must offer excitement, intrigue, and logical consistency
in detail and rules.  As Blankenship noted while discussing GURPS
Cyberpunk, "A role playing game requires the suspension of disbelief.  The
closer a game is to reality the easier it is to suspend."  All things
considered, Steve Jackson Games has done an admirable job of bringing
realism and coherence to the cyberpunk world.

POSTSCRIPT:  Steve Jackson Games has set up a BBS for discussion and
questions about its products.  The Illuminati, once closed by the Secret
Service as a part of the raid on SJG, is now back online and awaiting your
calls.  512-447-4449  (2 lines, 2400 baud, 24 hours a day).  Tell 'em CuD
sent you.


********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

********************************************************************
***  CuD #1.26: File 3 of 5: Cyberspace & Real Life (M. Godwin)***
********************************************************************

Date: 29 Jul 90 06:30:19 GMT
To: alt-society-cu-digest@CS.UTEXAS.EDU
From: mnemonic@WALT.CC.UTEXAS.EDU(Mike Godwin)
Subject: Cyberspace Subculture in Real Life

I think it ought to be of particular interest to sf-lovers and other folks
interested in the interaction between technological advance and society
that Craig Neidorf, the major Legion of Doom defendant, had his case
discharged on Friday, when it became apparent that BellSouth, in their
eagerness to help the federal government, apparently contrived an
outrageously high valuation for the information that Neidorf and others are
alleged to have "stolen."

The case resonates with cyberpunk fiction for a couple of reasons.  The
first is obvious: the federal government's crackdown this winter and spring
has been aimed at stamping out an underground subculture of technically
proficient but non-mainstream computer hackers, a few of whom are genuinely
amoral, but all of whom are regarded by government and industry as
potential threats.

The second concerns the extend to which a corporate entity, BellSouth,
manipulated the government into terrorizing more than a hundred--and
intimidating thousands more--computer hobbyists. It's an exercise of
corporate dominance that an sf fan is tempted to describe as "Gibsonesque."

Has justice triumphed? Only in a sense. Neidorf had the advantage of being
the editor and publisher of PHRACK, which meant that his actions had First
Amendment implications that even the technophobes can understand. But even
with that advantage, it took a lot of effort to publicize the case, much of
which is attributable to John Barlow and Mitch Kapor of the Electronic
Frontier Foundation, and Neidorf's family has been emotionally and
financially oppressed by the burden of his defense.

Nor is this the only social cost exacted by the federal crackdown; it's
also the case that countless BBSs and individual system owners have either
ended or limited public access to their systems for fear of having their
property seized as evidence.

Gibson's future is shaping itself right now, and it behooves those of us
who are interested in shaping that future to get involved right now.  Those
who are computer professionals should consider associating themselves with
Computer Professionals for Social Responsibility, a group that has received
a grant from the Electronic Frontier Foundation. CPSR can be contacted by
writing or calling the following people:

Marc Rotenberg CPSR Washington Office 1025 Connecticut Avenue, NW Suite
1015 Washington, DC 20036 202/775-1588

Gary Chapman CPSR National Office P.O. Box 717 Palo Alto, CA 94302
415/322-3778


Two good background articles are John Barlow's "Crime and Puzzlement,"
which appears in the August issue of WHOLE EARTH REVIEW, and the Julian
Dibell article "On Line and Out of Bounds," which appears in the July 24
issue of the VILLAGE VOICE. There was a small newspaper article on the
dismissal of the Neidorf case in Saturday's NEW YORK TIMES; there should be
an article of some sort on the dismissal in Monday's issue of NEWSWEEK.

An on-line journal that is tracking these social and legal issues as they
develop is the Computer Underground Digest, which is published by Jim
Thomas and Gordon Meyer at Northern Illinois University. You can subscribe
to the digest by requesting a subscription from Thomas and Meyer at
TK0JUT2@NIU.bitnet or TK0JUT1%NIU.BITNET@uicvm.uic.edu.



--Mike



Mike Godwin, UT Law School  |"... and first I put my arms around him yes
No longer a bar-exam nerd   | and drew him down to me so he could feel my
mnemonic@ccwf.cc.utexas.edu | breasts all perfume yes and his heart was
(512) 346-4190              | going like mad and yes I said yes I will Yes."


********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

********************************************************************
***  CuD #1.26: File 4 of 5: Update on RIPCO BBS & Dr. Ripco***
********************************************************************

Date:    Mon, 30 Jul 90 22:54 CDT
From:    Moderators (TK0JUT1.cs.niu.edu)
Subject: Update on RIPCO BBS and Dr. Ripco


One forgotten victim in the Sundevil sweeps has been Dr. Ripco, sysop of
RIPCO bbs, which was considered one of the top CU hangouts and text file
boards in the country. Dr. Ripco's equipment, including numerous disks,
several computers, and telecom equipment, was confiscated by Secret Service
agents with a seizure warrant on May 8. Although no computer-related
charges have been filed, no equipment has been returned.

When we caught up with DR a few days ago, he explained that local (Chicago)
police who accompanied federal agents on the seizures found several pistols
in the storage building where the computer equipment was located. Under a
Chicago ordinance, possession of weapons is a misdemeanor, and DR was cited
for failure to register the weapons.  The guns were new, never fired, and
still in their box.  If we caught the details correctly, he entered a
guilty plea, they took away the guns, and he was given six months
supervision and will not have a record.

The Doc indicated that he himself did not participate much in the modem
world, and one reason he has been silent is because he isn't fully aware of
all the digests and e-mail connections that exist, and depends for his news
on local media (good luck on that one, DR) and word-of-mouth from friends.
He has not yet retained an attorney to re-acquire his equipment, because he
believed it would be given back relatively soon. Now, nearly three months
after the seizure, he is concerned.

DR indicated that, unlike the experience of others, the SS was relatively
polite, if ignorant about technical matters. Although wearing bullet proof
vests, their guns were not drawn and they did not attempt to hassle him
(despite some snide comments by one agent).  He emphatically indicated that
the searches and confiscations were not necessary, because if they had
contacted him, he would have cooperated fully.

The Doc claimed that, to his knowledge, little illegal activity occured on
the board. He thought that perhaps some of his files might be considered
"bad taste," but they were not in his judgment illegal.  Public message
logs from mid-1988 to May 7, 1990, support his claim.  Despite some
posturing, few of the over 600 users abused the board.

In many ways, the situation is like that of Steve Jackson, whose equipment
was confiscated and board shut down because of some vague notion of
"possible wrong-doing."  RIPCO seems to have been targeted in part because
of its longevity and in part because it had one of the better text file
collection in country. It was a gathering point for many of the most active
computer underground types, and the number was reportedly blocked by at
least one telecom LD server because of phreaks calling.

If we are correct in our reasons for why RIPCO was shut down, it further
indicates the chilling effect of Sundevil. Providing textfiles as a
resource is not illegal, nor, to date, has the government claimed that Dr.
Ripco in fact did anything illegal.  Yet, his equipment is gone and the
modem world lost a fine board.

The moderators emphasize to those who think that RIPCO was nothing more
than a phreak/hacker board that it provided some of the best chat we have
seen. Discussions ranged from current events to sophisticated philosophical
issues. Despite the usual number of dolts one might expect in a community
of over 600, the users were generally well-informed, articulate, and
stimulating.

The closing of RIPCO is symbolic for two reasons.  First, as one of the
longest running CU boards, it served as a cultural meeting place.  The CU
community is transitory, with participants coming and going as their
interest fades and is rekindled.  RIPCO served as place to reunite old
friends and meet new ones.  Although most of the "elite" CU didn't frequent
RIPCO regularly, they would often "stop in" just to check their e-mail or
see what the latest text files were.  Thus, RIPCO was functional for
entering and maintaining contact with the CU community as a whole.

It is also interesting to note that RIPCO had long suffered under a sort of
"common knowledge" that it was highly "infested" with law enforcement
agents.  This assumption was fed both by it's longevity and openess to the
public.  When it was closed down, the general CU reaction was one of sorrow
(because it was such a familiar part of the community) and confusion
(because of its reputation for being legal and above board).  There was
also some question as to why the "feds" would shut down what was assumed to
be a source of information they were using to obtain leads into the
activity of the CU.


There is a chance that Dr. Ripco might resume the board, and we encourage
him to do so. RIPCO was an asset to the modem world and many of us miss it.
Dr. Ripco's account of his experience will appear in CuD 1.27.


********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

********************************************************************
***  CuD #1.26: File 5 of 5: The Current TAP (TAP Editors)  ***
********************************************************************

From: TAP
Subject: The Current Tap
Date: Mon, 30 Jul 90 20:37:55 EDT


TO: CuD Editors
FR: Aristotle, TAP Editor.

It had some to my attention that you may be confused about what TAP
Magazine is all about.  In this mail, I will aid you by explaining how TAP
came into our hands and why it is printed.  If you should have any further
questions, feel free to e-mail the address that this is sent from.

HOW WE CAME INTO PRINTING TAP.  Since the first time I came into the
techno-underground scene, I had always heard of a 'cool' magazine called
TAP in New York.  After searching for a set of issues, my friend and I came
into purchasing a complete set.  At that time I had been reading 2600 for
about three years and my friend and I agreed that what the
techno-underground needed was a publication (in hardcopy form), that would
print article concerning all corners of the techno-underground.  We liked
2600 and the other magazines (when they came out), but we just felt that
info on telephones and computers was not enough.  There are a multitude of
ways someone can hack.  To us, hacking computers, phones, cable systems,
satellite systems, and LIFE, were all equally interesting.  Well since
there was no current magazine that we knew of which dealt with all the
above things, we decided TAP had been the perfect magazine for the
situation.  After pondering on what we could do with it, we tried to
contact the last editors.  We admit that we did not get a hold of the past
editor until we had complete an issue, Number 92.  We did though, get in
touch with both Cheshire Catalyst and Tuc after our first issue was done.
Cheshire Catalyst was sent a copy for his 'approval' and he proceeded to
give us permission to resume TAP where he had left off.  Tuc expressed his
approval after seeing 92 and speaking with us at Summercon 89, in St.
Louis.  Cheshire, at first, decided he would let us print but he would not
openly admit that we had his permission until we were established as a
reputable publication.  Well, after we showed Tuc and Cheshire the
magazine, Cheshire gave his full cooperation with our production of TAP and
even offered some helpful words of wisdom on running TAP.  I am not going
to get into the debate of whether we are the original TAP, but I would like
to say that you could not get any closer to the original than we are.  TAP
never had one consistent editor.  Many people edited TAP and published it.
The way we see it is that we are just following in the footsteps of the
original editor.  I suppose you could call it a tradition, TAP WAS HANDED
DOWN TO ME PERSONALLY BY THE LAST EDITOR.

WHAT TAP IS ALL ABOUT.  TAP is printed for the sole purpose of promoting
the free distribution of useful information concerning the
techno-underground.  Every so often we will print articles concerning
politics or human rights but that is part of the flavor of TAP.  If we
decide that some info fits the format of the magazine, we print it.  The
staff of TAP has always believed in opposing any and all censorship.

SUBSCRIPTION RATES. One of the major reasons for our deciding to print TAP
was that there was a gaping hole in the market.  The only popular
hack/phreak publication that we could find was 2600.  With 2600 asking $18
for four issues, we felt something had to be done for the people that could
not afford something that expensive.  Therefore, we decided to give TAP
away.  Everyone should have the ability to access TAP.   Since TAP is free,
we also decided against copyrighting our magazine.  Anyone if free to copy
any part of TAP at their own free will.  The only thing we ask is that we
get credit in their reproduction for what we produced.  To get a copy of
TAP, all a subscriber has to do is send us a 25 cent stamp to cover
postage.  We will pay all other costs.  The price might go up to 50 cents
soon as we are using larger envelopes which cost more to mail.  If someone
wants to get a subscription, he/she only needs to send the correct amount
of postage for the amount of issues he/she wants to receive.  We like to
get subscriptions in lots of 10 or less issues.  Anything over 10 issues is
considered a donation.  Back issues of all 100 issues are also being
offered now.  These will cost actual money.

			-marci yesowitch


********************************************************************

------------------------------

                           **END OF CuD #1.26**
********************************************************************