**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 1, Issue #1.26 (Aug 2, 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith USENET readers can currently receive CuD as alt.society.cu-digest. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1: Moderators' Corner File 2: GURPS: Review of Steve Jackson's Cyperpunk Game (Gordon Meyer) File 3: Cyberspace Subculture in Real Life (Mike Godwin) File 4: Update on RIPCO BBS and Dr. Ripco (Jim Thomas) File 5: The Current TAP (TAP Editors) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #1.26, File 1 of 5: Moderators' Comments *** ******************************************************************** Date: 28 July, 1990 From: Moderators Subject: Moderators' Corner ++++++++++ In this file: 1) Keith Henson's Address 2) FTP Information 3) Len Rose Update +++++++++++++++++++++++++++++ KEITH HENSON'S ADDRESS +++++++++++++++++++++++++++++ In CuD 1.25, we printed an article by Keith Henson. For those wanting to know how to contact him for more information or to make donations, his address is: HKHENSON@CUP.PORTAL.COM +++++++++++++++++++++++++ FTP INFORMATION +++++++++++++++++++++++++ Some users have had problems obtaining files from the FTP site. Remember that it is case sensitive, and the directories are not immediately obvious without the directory list. To prevent abuse of the system, we furnish the file list only to subscribers of CuD. A second FTP site will be available in a few weeks. +++++++++++++++++++ LEN ROSE UPDATE +++++++++++++++++++ As of Friday, Aug. 3, Len Rose's case awaits trial in federal court in Baltimore. According to one source, Len was offered an arrangement in which he could plead guilty to one count of computer fraud and receive at least some prison time, but would have his computer equipment returned, or take the case to trial and take his chances. Len is currently represented by a public defender because of lack of resources to retain a specialist in computer crime cases. He remains unemployed, and has moved into a motel with his family. He told us that, because his equipment and crucial files were seized, his business was essentially shut down and he was deprived of his livelihood. This means that he not only cannot support his family, but cannot retain legal counsel of his choice. He said he was feeling isolated and "abandoned" and wasn't sure what his legal options were. We will present a detailed update of Len's situation in CuD 1.27. Len's public defender can be contacted at (301)-381-4646. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ ******************************************************************** *** CuD #1.26: File 2 of 5: GURPS Review (by Gordon Meyer) *** ******************************************************************** Date: Fri, 20 Jul 90 01:19 CDT From: Gordon Meyer Subject: GURPS: Review of Steve Jackson's Cyperpunk Game ***************************************************************** * Fear and Loathing in the Secret Service * * A synopsis of GURPS Cyberpunk * * Gordon Meyer * * (with apologies to Hunter S. Thompson) * ***************************************************************** On March 1, 1990 the United States Secret Service raided the offices of Steve Jackson Games (SJG) in Austin, Texas. The raid was in conjunction with an ongoing investigation into the activities of a computer underground group known as the Legion Of Doom. In the process of the raid at Steve Jackson the agents seized files, computer equipment, and other assorted materials, including the soon-to-be-released book entitled GURPS CYBERPUNK. As of this writing (July 19, 1990) the majority of the material seized has been returned, but the four month lag time cost the company much in revenue and development time. The financial impact has been said to have caused lost income in the several thousand dollars range, and the layoff of nearly half the SJG staff. In spite of the difficulties of re-creating the book from notes, draft copies, and comments from beta testers, SJG released GURPS Cyberpunk approximately ten weeks ago. Sales thus far have been good, according to author Loyd Blankenship, and the reaction has been positive to "the most realistic cyperpunk game on the market". WHAT IS GURPS CYBERPUNK? This "review" is being written for the purpose of exploring a book that was confiscated, prior to publication, by the United States Secret Service. It is not a critique of the book itself. My intent is to discuss GURPS Cyperpunk in a framework that examines what it contains in general, not in specific, and most certainly not from the perspective a Role Playing Game aficionado. When the Secret Service confiscated GURPS Cyberpunk they remarked it was actually a "handbook for computer crime" (p.5). Thus giving us an excellent ideal-type by which we can (with tongue-in-cheek) define the essential elements, if not the specific contents, of a government identified "crime manual". GURPS Cyberpunk is but one module of the General Universal Role Playing System ("GURPS"). Role Playing Games (RPG) are complex simulations where players role play the actions and persona of a character in a mythical world. Many RPG's are written for one specific setting, such as "Dungeons and Dragons" (not a SJG product by the way) where play takes place in a medieval world of magic, wizards, and (naturally) dragons. GURPS, on the other hand, is an award-winning system whereby nearly any type of world or setting can be simulated based on the same set of GURPS rules and guidelines. GURPS Cyberpunk is a supplement to the GURPS Basic Set, giving the players specific rules and background material needed to play a game that takes place in a "cyperpunk" setting. CYBERPUNK? A discussion of "cyberpunk", as a genre and movement in and of itself, would eclipse this review. For our purposes we'll define cyberpunk as a science fiction genre where the world is presented as gritty, corrupt, and unfair, yet infused with rampant high technology being used for personal and corporate gain. Loyd Blankenship, the author of GURPS Cyberpunk and managing editor at SJG, describes it like this: The cyberpunk future is vibrant - pulsating with life, from the streets to the high-rises. Paradoxically, however, that life is cheap, perhaps because there's so much of it - there might be twenty million people in Tokyo or New York. Cyberpunk is a style defined by two elements. The first is interaction of man with technology. Computers are as common as dishwashers in the cyberpunk future, and the dividing line between man and machine is sometimes blurred....The second element found in most cyberpunk work is that of struggle. The world is divided into two groups - the haves and the have-nots - with a vast chasm between them. Those with power wish to keep it; those without, want to get it. (p.4) In discussing the role playing aspects of a cyberpunk world Blankenship writes: The conventional gaming morality of good versus evil has a limited role in the genre. What are the reference points? Characters in cyberpunk literature are constantly committing unethical, illegal or immoral acts, but they sometimes do so for purposes we could define as "good." Conversely, a repressive government may define behavior as "good" that stifles the human spirit and grinds individuals into the dust. In cyberpunk, there are rarely blacks and whites, but there are many shades of gray. (pp.4-5) If one considers GURPS Cyberpunk to be a literary work, rather than a "mere" rule book for gaming, it becomes a valuable reference work for exploring the cyberpunk genre. Blankenship has even thoughtfully included a selected bibliography of distinctive cyperpunk novels and movies. Those interested in learning more about the cyberpunk future will find bibliography quite helpful. THE GURPS CYBERPUNK WORLD. The book is divided into six sections, covering each element that the "Game Master" (the person who, in essence, referees and directs the game for the other players) should consider when planning his game or scenario. These sections, which will be discussed in turn, are: Characters Cyberwear Technology and Equipment Netrunning World Design Campaigning CHARACTERS: The inhabitants of the GURPS Cyberpunk world, and thus the personas players can choose to adopt in game play, are many and varied. Consistent with the overall theme of the genre they primarily consist of low-life and/or corrupt individuals interested mostly in personal gain. Some of the characters types discussed in the book include Assassins (which can be associated with a particular mega-corporation or freelancers), Bodyguards, Brokers (legitimate resellers, black marketeers, etc), Celebrities, Cops (corrupt and otherwise), Corporate (good, bad, or indifferent the corporate worker will always put company and career interests first. These characters are also known as "suits"), Drifters, Mobsters, Reporters, and Slicers (doctors who specialize in installing artificial supplements to the human body. See "cyberwear" below). There are many more roles and occupations that players can adopt. The GURPS Cyberpunk world is rich in options and offers something at every level of social strata. CYBERWEAR: In the cyberpunk world science and medicine have met, mated, and forever changed the meaning of "cosmetic surgery". In this section the various "optional equipment" players can purchase or obtain for their characters is discussed. Cybernetic implants or replacement parts, such as eyes with infrared or microscopic abilities, are available providing the player has enough money and chutzpah to risk the surgery. The cyberpunk body shops offer everything from razor sharp retractable blades that fit under your fingernails, to ROM chips and computer interfaces grafted directly onto the cerebral cortex. This section is a must read of "gadget freaks" of the future! TECHNOLOGY AND EQUIPMENT: This section discusses the weapons (such as slugthrowers, lasers, and grenades), equipment (such as ROM burners, batteries, vehicles), and drugs (both legal and illegal), that are found in the game's world. The accessories found here are consistent with the overall theme, and in many cases represent logical extensions of present day technology. NETRUNNING: The unifying concept of most Cyberpunk stories is the existence of a world-wide computer network, know simply as "the net". As GURPS Cyberpunk points out, certainly the seeds for this network were already in place in the late 1980's. The fact that so many of your are able to receive CuD on a timely basis is testimony to this. GURPS Cyberpunk extrapolates the present net into a future where it is a pervasive element of everyday life. "Netrunners", the player characters who are specialists in the art of penetrating the security of computers on the net, can be highly valued members of the player team. The net and it's computers play such a large role in the cyberpunk society that the skills of a "hacker" are often needed to successfully complete a scenario. (Other player character types available are "console cowboys" or "interface jocks" who are essentially netrunners-for-hire, plying their skills at freelance system penetration.) Because so much of the cyberpunk future depends on computer interaction the bulk of the "Netrunning" chapter is dedicated to describing the equipment and layout of the net. The computers described in GURPS Cyberpunk are futuristic, but not unrealistically so. They range from "dedicated computers" performing one task, to "Megacomputers" which can control the traffic, sewage, power, and all other maintenance functions for an entire city. The net itself is, in some ways, much like the existing networks of today. It consists of Government, Banking, Military, Educational, and Private systems linked together through interconnections and gateways. Three different types of nodes are available for "jacking into" the net (public, normal, and secure) with each protected (or not protected in some cases) with various degrees of "ICE" (Intrusion Countermeasure Electronics), the security software of the future. The net is accessed using a "cyberdeck", a small dedicated computer that connects directly to the users neural system allowing the network and its data to be visualized as it is transversed. Thus when a netrunner is jacked in she is virtually cut-off from the outside, totally immersed in the experience of using the net. For the netrunner, the visual experience of being "jacked in" is one where the information is "seen" floating in space before ones eyes. The image, which is being electronically projected onto the optical nerve, can be one of three styles. Marquee style, where all information appears in text form, "Icon style" similar to the graphical user interface used in today's machines, or "Environmental style" where the net appears to be a complete and fully defined landscape with nodes, computers, and data appearing as physical structures which can be entered and explored (perhaps somewhat like that presented in the movie TRON). If a Netrunner wishes to penetrate the ICE protecting a corporate computer he can use one of several techniques which may (depending on luck and the attributes or skills the character has) prove successful. Some of the techniques discussed in the GURPS manual include guessing passwords, bluffing information out of inside sources (also known as "social engineering"), and using specialized Cyberdeck programs to distract or disable the security system. If a Netrunner character successfully obtains access they must then take actions to secure their goal...whatever that goal may be. The GURPS Cyberpunk manual includes a brief discussion of several things the player may attempt such as copying or downloading information, monitoring other users, remote execution of programs, and searching a database. Note that these discussions are quite brief, and merely explain in conceptual and atmospheric terms what each action might entail. For example, here are two such sections in their entirety: Creating New Accounts: This can only be done from a superuser account. A fictitious entry is made in the system user file - the creator chooses whether to set it up as a normal account or as a superuser. Normal users are less powerful, but tend to attract less attention; a new superuser can do anything, but may be noticed quickly. If the netrunner can accomplish his goal with a normal account, or if he has confidence in his Promote program, he should stick with a standard account. The decker should keep in mind that everything he does is probably being logged - unless he has a very trustworthy Erase program, he should plan on abandoning an account after using it for any noticeable scams. Each week there is a chance that the fake account will be discovered by routine system administration. The GM [game master] should secretly roll 3d [dice] for each bogus account. If the machine is public a result of 4 or less indicates discovery; this increases to 6 or less on a normal machine and 8 or less on a secure machine. Increase these numbers by 2 if the fake account has superuser privileges. Possible actions upon discovery range from simple deletion of the account to heavy Alarming and a Trace program. (pp.79-80) TRANSFERRING COMMODITIES: With the advent of electronic fund transfers, money is shuffled by communication lines instead of armored trucks. By shuffling the appropriate numbers a good netrunner can give himself "legitimate" access to millions of dollars in cash, precious metals, products or anything else that is used in commerce. Transferring commodities is simple - the exact appearance depends on the Environmental Interface being used [marquee, icon, etc. see above discussion], but the decker basically "picks up" the commodity with a Computer hacking roll [of the dice], and then "carries" it with him to another node, or uses a Transfer program to move it. What really happens is that he netrunner steals the routine codes and invoice number for the valuta, then erases them from the true owner's system. he must then arrange for delivery. (p.82) Other topics included in this chapter include detailed instructions on how the GM can determine the structure of the network before the game begins by using dice to randomly decide such things as number of nodes, contents of the systems, complexity of the security, and so on. This information is later used in game play when a netrunner player attempts to access individual nodes on the net. Finally, throughout this chapter (and much of the book) there are numerous "sidebar" articles containing background and supportive information which is intended to add to the realism of the game. The sidebar topics in this chapter include a discussion of Integrated Services Digital Network (ISDN), Types of pseudonyms used by netrunners, Tempest surveillance equipment, Data encryption, The Social Consequences of Neural Interfaces, Phreaking, Strange Protocols, Trashing, and a list of current (1990) network names around the world. As an example here is the complete entry for "Chat Systems": One of the most popular types of system on the net will be realtime conference centers - commonly called chat systems. These are nodes with a high number of incoming lines which allow users to communicate (both publicly and privately) with each other. Hackers commonly use chat systems to discuss targets, or to trade information. The anger is that one is never sure of the identities of the other callers. Hacker chat systems on current networks (such as Altgers or tchh in West Germany and QSD in France) have evolved elaborate protocols for hackers to deal with each other. These include the use of coded phrases to initiate conversation, avoidance of "real" names, and many other methods to ensure security. The second danger of a chat system is that the users must trust the management. Any time that a netrunner is using an unfamiliar chat system, the GM should roll 3d. On a 7 or less, the conversation is being monitored and possible recorded. What happens after that is up to the GM. (p.69) The other sidebar topics follow a similar pattern. The topic is discussed briefly, with some historical and a smattering of specific information thrown in, then the specific instructions on how this information can be incorporated into game play. THE REST OF THE BOOK: The remaining chapters in the book are "World Design" which discusses considerations such as political climate, economic system, Urban Settings, etc., and "Campaigning" which covers others items the GM will want to consider such as setting the atmosphere, pace of the game, group dynamics, and determining the theme. CONCLUSION: The bulk of this overview has focused on the "netrunning" chapter since it is the information contained therein that the Secret Service was probably most interested in. Having placed the chapter within the framework and intent of the book as a whole it become obvious that the discussion of "hacking" is far from the instructional text book the government believed it to be. What GURPS Cyberpunk has done is to take a pre-existing science fiction genre (cyberpunk) and create descriptions and guidelines that allow role playing gamers to adopt accurate and realistic scenarios. The question remains, however, if GURPS Cyberpunk has given away any so-called "Secrets of the Computer Underground". The answer is most certainly that it has not. Even the sidebar discussions about access levels and backdoor programs reveal little more than "Superusers have the most power of any account" and "Some programs may have secret passwords that bypass regular system security". Hardly information one couldn't obtain from many other sources, including mainstream books on computer security. In fact, one group that may find this book to be helpful in the real world is the computer security community. Various members of the CU have often suggested that computer facilities shred their trash, prohibit default passwords, and other simple security measures. If one concludes that this is indeed a handbook for breaking into computers then it follows that it is also a handbook on preventing hackers from doing so. The audience of role playing games is a difficult crowd to please. Successful games must offer excitement, intrigue, and logical consistency in detail and rules. As Blankenship noted while discussing GURPS Cyberpunk, "A role playing game requires the suspension of disbelief. The closer a game is to reality the easier it is to suspend." All things considered, Steve Jackson Games has done an admirable job of bringing realism and coherence to the cyberpunk world. POSTSCRIPT: Steve Jackson Games has set up a BBS for discussion and questions about its products. The Illuminati, once closed by the Secret Service as a part of the raid on SJG, is now back online and awaiting your calls. 512-447-4449 (2 lines, 2400 baud, 24 hours a day). Tell 'em CuD sent you. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ ******************************************************************** *** CuD #1.26: File 3 of 5: Cyberspace & Real Life (M. Godwin)*** ******************************************************************** Date: 29 Jul 90 06:30:19 GMT To: alt-society-cu-digest@CS.UTEXAS.EDU From: mnemonic@WALT.CC.UTEXAS.EDU(Mike Godwin) Subject: Cyberspace Subculture in Real Life I think it ought to be of particular interest to sf-lovers and other folks interested in the interaction between technological advance and society that Craig Neidorf, the major Legion of Doom defendant, had his case discharged on Friday, when it became apparent that BellSouth, in their eagerness to help the federal government, apparently contrived an outrageously high valuation for the information that Neidorf and others are alleged to have "stolen." The case resonates with cyberpunk fiction for a couple of reasons. The first is obvious: the federal government's crackdown this winter and spring has been aimed at stamping out an underground subculture of technically proficient but non-mainstream computer hackers, a few of whom are genuinely amoral, but all of whom are regarded by government and industry as potential threats. The second concerns the extend to which a corporate entity, BellSouth, manipulated the government into terrorizing more than a hundred--and intimidating thousands more--computer hobbyists. It's an exercise of corporate dominance that an sf fan is tempted to describe as "Gibsonesque." Has justice triumphed? Only in a sense. Neidorf had the advantage of being the editor and publisher of PHRACK, which meant that his actions had First Amendment implications that even the technophobes can understand. But even with that advantage, it took a lot of effort to publicize the case, much of which is attributable to John Barlow and Mitch Kapor of the Electronic Frontier Foundation, and Neidorf's family has been emotionally and financially oppressed by the burden of his defense. Nor is this the only social cost exacted by the federal crackdown; it's also the case that countless BBSs and individual system owners have either ended or limited public access to their systems for fear of having their property seized as evidence. Gibson's future is shaping itself right now, and it behooves those of us who are interested in shaping that future to get involved right now. Those who are computer professionals should consider associating themselves with Computer Professionals for Social Responsibility, a group that has received a grant from the Electronic Frontier Foundation. CPSR can be contacted by writing or calling the following people: Marc Rotenberg CPSR Washington Office 1025 Connecticut Avenue, NW Suite 1015 Washington, DC 20036 202/775-1588 Gary Chapman CPSR National Office P.O. Box 717 Palo Alto, CA 94302 415/322-3778 Two good background articles are John Barlow's "Crime and Puzzlement," which appears in the August issue of WHOLE EARTH REVIEW, and the Julian Dibell article "On Line and Out of Bounds," which appears in the July 24 issue of the VILLAGE VOICE. There was a small newspaper article on the dismissal of the Neidorf case in Saturday's NEW YORK TIMES; there should be an article of some sort on the dismissal in Monday's issue of NEWSWEEK. An on-line journal that is tracking these social and legal issues as they develop is the Computer Underground Digest, which is published by Jim Thomas and Gordon Meyer at Northern Illinois University. You can subscribe to the digest by requesting a subscription from Thomas and Meyer at TK0JUT2@NIU.bitnet or TK0JUT1%NIU.BITNET@uicvm.uic.edu. --Mike Mike Godwin, UT Law School |"... and first I put my arms around him yes No longer a bar-exam nerd | and drew him down to me so he could feel my mnemonic@ccwf.cc.utexas.edu | breasts all perfume yes and his heart was (512) 346-4190 | going like mad and yes I said yes I will Yes." ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ ******************************************************************** *** CuD #1.26: File 4 of 5: Update on RIPCO BBS & Dr. Ripco*** ******************************************************************** Date: Mon, 30 Jul 90 22:54 CDT From: Moderators (TK0JUT1.cs.niu.edu) Subject: Update on RIPCO BBS and Dr. Ripco One forgotten victim in the Sundevil sweeps has been Dr. Ripco, sysop of RIPCO bbs, which was considered one of the top CU hangouts and text file boards in the country. Dr. Ripco's equipment, including numerous disks, several computers, and telecom equipment, was confiscated by Secret Service agents with a seizure warrant on May 8. Although no computer-related charges have been filed, no equipment has been returned. When we caught up with DR a few days ago, he explained that local (Chicago) police who accompanied federal agents on the seizures found several pistols in the storage building where the computer equipment was located. Under a Chicago ordinance, possession of weapons is a misdemeanor, and DR was cited for failure to register the weapons. The guns were new, never fired, and still in their box. If we caught the details correctly, he entered a guilty plea, they took away the guns, and he was given six months supervision and will not have a record. The Doc indicated that he himself did not participate much in the modem world, and one reason he has been silent is because he isn't fully aware of all the digests and e-mail connections that exist, and depends for his news on local media (good luck on that one, DR) and word-of-mouth from friends. He has not yet retained an attorney to re-acquire his equipment, because he believed it would be given back relatively soon. Now, nearly three months after the seizure, he is concerned. DR indicated that, unlike the experience of others, the SS was relatively polite, if ignorant about technical matters. Although wearing bullet proof vests, their guns were not drawn and they did not attempt to hassle him (despite some snide comments by one agent). He emphatically indicated that the searches and confiscations were not necessary, because if they had contacted him, he would have cooperated fully. The Doc claimed that, to his knowledge, little illegal activity occured on the board. He thought that perhaps some of his files might be considered "bad taste," but they were not in his judgment illegal. Public message logs from mid-1988 to May 7, 1990, support his claim. Despite some posturing, few of the over 600 users abused the board. In many ways, the situation is like that of Steve Jackson, whose equipment was confiscated and board shut down because of some vague notion of "possible wrong-doing." RIPCO seems to have been targeted in part because of its longevity and in part because it had one of the better text file collection in country. It was a gathering point for many of the most active computer underground types, and the number was reportedly blocked by at least one telecom LD server because of phreaks calling. If we are correct in our reasons for why RIPCO was shut down, it further indicates the chilling effect of Sundevil. Providing textfiles as a resource is not illegal, nor, to date, has the government claimed that Dr. Ripco in fact did anything illegal. Yet, his equipment is gone and the modem world lost a fine board. The moderators emphasize to those who think that RIPCO was nothing more than a phreak/hacker board that it provided some of the best chat we have seen. Discussions ranged from current events to sophisticated philosophical issues. Despite the usual number of dolts one might expect in a community of over 600, the users were generally well-informed, articulate, and stimulating. The closing of RIPCO is symbolic for two reasons. First, as one of the longest running CU boards, it served as a cultural meeting place. The CU community is transitory, with participants coming and going as their interest fades and is rekindled. RIPCO served as place to reunite old friends and meet new ones. Although most of the "elite" CU didn't frequent RIPCO regularly, they would often "stop in" just to check their e-mail or see what the latest text files were. Thus, RIPCO was functional for entering and maintaining contact with the CU community as a whole. It is also interesting to note that RIPCO had long suffered under a sort of "common knowledge" that it was highly "infested" with law enforcement agents. This assumption was fed both by it's longevity and openess to the public. When it was closed down, the general CU reaction was one of sorrow (because it was such a familiar part of the community) and confusion (because of its reputation for being legal and above board). There was also some question as to why the "feds" would shut down what was assumed to be a source of information they were using to obtain leads into the activity of the CU. There is a chance that Dr. Ripco might resume the board, and we encourage him to do so. RIPCO was an asset to the modem world and many of us miss it. Dr. Ripco's account of his experience will appear in CuD 1.27. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ ******************************************************************** *** CuD #1.26: File 5 of 5: The Current TAP (TAP Editors) *** ******************************************************************** From: TAP Subject: The Current Tap Date: Mon, 30 Jul 90 20:37:55 EDT TO: CuD Editors FR: Aristotle, TAP Editor. It had some to my attention that you may be confused about what TAP Magazine is all about. In this mail, I will aid you by explaining how TAP came into our hands and why it is printed. If you should have any further questions, feel free to e-mail the address that this is sent from. HOW WE CAME INTO PRINTING TAP. Since the first time I came into the techno-underground scene, I had always heard of a 'cool' magazine called TAP in New York. After searching for a set of issues, my friend and I came into purchasing a complete set. At that time I had been reading 2600 for about three years and my friend and I agreed that what the techno-underground needed was a publication (in hardcopy form), that would print article concerning all corners of the techno-underground. We liked 2600 and the other magazines (when they came out), but we just felt that info on telephones and computers was not enough. There are a multitude of ways someone can hack. To us, hacking computers, phones, cable systems, satellite systems, and LIFE, were all equally interesting. Well since there was no current magazine that we knew of which dealt with all the above things, we decided TAP had been the perfect magazine for the situation. After pondering on what we could do with it, we tried to contact the last editors. We admit that we did not get a hold of the past editor until we had complete an issue, Number 92. We did though, get in touch with both Cheshire Catalyst and Tuc after our first issue was done. Cheshire Catalyst was sent a copy for his 'approval' and he proceeded to give us permission to resume TAP where he had left off. Tuc expressed his approval after seeing 92 and speaking with us at Summercon 89, in St. Louis. Cheshire, at first, decided he would let us print but he would not openly admit that we had his permission until we were established as a reputable publication. Well, after we showed Tuc and Cheshire the magazine, Cheshire gave his full cooperation with our production of TAP and even offered some helpful words of wisdom on running TAP. I am not going to get into the debate of whether we are the original TAP, but I would like to say that you could not get any closer to the original than we are. TAP never had one consistent editor. Many people edited TAP and published it. The way we see it is that we are just following in the footsteps of the original editor. I suppose you could call it a tradition, TAP WAS HANDED DOWN TO ME PERSONALLY BY THE LAST EDITOR. WHAT TAP IS ALL ABOUT. TAP is printed for the sole purpose of promoting the free distribution of useful information concerning the techno-underground. Every so often we will print articles concerning politics or human rights but that is part of the flavor of TAP. If we decide that some info fits the format of the magazine, we print it. The staff of TAP has always believed in opposing any and all censorship. SUBSCRIPTION RATES. One of the major reasons for our deciding to print TAP was that there was a gaping hole in the market. The only popular hack/phreak publication that we could find was 2600. With 2600 asking $18 for four issues, we felt something had to be done for the people that could not afford something that expensive. Therefore, we decided to give TAP away. Everyone should have the ability to access TAP. Since TAP is free, we also decided against copyrighting our magazine. Anyone if free to copy any part of TAP at their own free will. The only thing we ask is that we get credit in their reproduction for what we produced. To get a copy of TAP, all a subscriber has to do is send us a 25 cent stamp to cover postage. We will pay all other costs. The price might go up to 50 cents soon as we are using larger envelopes which cost more to mail. If someone wants to get a subscription, he/she only needs to send the correct amount of postage for the amount of issues he/she wants to receive. We like to get subscriptions in lots of 10 or less issues. Anything over 10 issues is considered a donation. Back issues of all 100 issues are also being offered now. These will cost actual money. ******************************************************************** ------------------------------ **END OF CuD #1.26** ********************************************************************