1997-10-19 - InfoWar Epilogue 4 (Part III of ‘The True Story of the InterNet’)

Header Data

From: Matthew Ghio <ghio@temp0119.myriad.ml.org>
To: cypherpunks@toad.com
Message Hash: 37dc9b47a590aa7c4873dd2554f93030879340c54d1043e55f944db55568f0c9
Message ID: <344976F5.5889@temp0119.myriad.ml.org>
Reply To: N/A
UTC Datetime: 1997-10-19 03:31:39 UTC
Raw Date: Sun, 19 Oct 1997 11:31:39 +0800

Raw message

From: Matthew Ghio <ghio@temp0119.myriad.ml.org>
Date: Sun, 19 Oct 1997 11:31:39 +0800
To: cypherpunks@toad.com
Subject: InfoWar Epilogue 4 (Part III of 'The True Story of the InterNet')
Message-ID: <344976F5.5889@temp0119.myriad.ml.org>
MIME-Version: 1.0
Content-Type: text/html

Title: The True Story of the Internet Part II









The True Story of the InterNet

Part III


InfoWar

Final Frontier of the Digital Revolution

Behind the ElectroMagnetic
Curtain


by TruthMonger <tm@dev.null>




Copyright 1997 Pearl Publishing



InfoWar Table of Contents

Epilogue 
gomez


Epilogue


Subject: Re: Just say "No" to key recovery concerns...keep
OpenPGP pure
From: Adam Back <aba@dcs.ex.ac.uk>
To: tcmay@got.net
CC: shamrock@cypherpunks.to, cypherpunks@cyberpass.net,
eric@sac.net

Tim May <tcmay@got.net> writes:
> I'll try a different way of making my points...

> At 9:12 PM -0700 10/14/97, Lucky Green wrote:
> >I can't help but see a difference between enforcing
to encrypt to a
> >default key and storing the user's key outright. IMHO,
the former entails
> >less potential for abuse.
> 
> All other things being equal, maybe the former is slightly
less intrusive
> than the latter. But maybe not even this, as the two give
the same results.
> After all, what's the real difference between "all mail,
incoming and
> outgoing, must also be encrypted to a CMR key" and "you
must deposit a copy
> of your key with us"?


CMR keys are the root of all evil in pgp5.5. Without them almost
any
permutation of recovery care to construct would be less useful
to the
GAK'ers, for all the organizational, and inconvenience reasons
Tim
describes. Governments have problems handling complexity. 

So make their job complex. If you were one of the people writing
the
IRS tax software back in the 60s, and you were in deep cover,
a
proto-cypherpunk, and were bright enough to see the future
possibilities you would have done all you could to fuck up the
IRS
system. You would have obfuscated the code. You would have put
logic
bombs in it. You would have destroyed the source code
surreptitiously. (Destroying source code has analogies to destroying

keys at earliest opportunity, you are destroying something which
your
enemy needs).

Any bets as to if any of this actually happened on purpose? I
reckon
so.

So, do you all reckon we can make task of fielding GAK impossibly

complex for such a big disorganized government?

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>

)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`





gomez

I used to be a bright-eyed young computer guerrilla myself, many
years ago, but I guess I have grown a little less radical as I
have matured, since it now bothers me when youngsters such as
Adam Back attempt to encourage others to sabotage the code of
decent, hard-working programmers.
This matter is of particular concern to me, since Basis, Inc.
initially built the Purchasing and Contracting application in
the IRS National Office, to run under UNIX on Zilogs, with a preSQL
Informix database. Thus Back's intimations of "deep cover
proto-cypherpunks" sabotaging the IRS could quite possibly
cause serious harm to my professional reputation, in light of
the wild-eyed claims made about me in 'The True Story of the InterNet'
manuscripts.

I have grown quite tired of being the target of some half-baked,
delusional psychopath who is making me a character in the bizarre
prevarications which drool from his mind, onto the printed page.

I made the mistake of taking pity on a poor fellow one night in
a Berkeley bar, buying him a few drinks in return for the atrocious
tunes he played on a cheap, pawn shop guitar, and soon found him
showing up on my doorstep every time he hit town, looking for
a handout. Later, I found out that he had forged a letter of recommendation
in my name, in order to help himself get established in the computer
industry. It was very disturbing to discover some of the atrocities
he had done under cover of affiliation with myself and Basis,
Inc., causing me a great amount of legal problems.

Now, after believing that his obsessive-compulsive fixation on
me (because of his affection for my Jack Russell Terriers) was
a thing of the past, I find that he is now pushing some crazy
theory in regard to the Y2K problem, which is really a fairly
insignificant matter that he has blown all out of proportion,
and that he has drawn Adam Back into his madness to one degree
or another.
Mr. Back seems, from what little I know of him, to be a fairly
reasonable individual, but lately he has been sinking into the
same type of illogical rants and conspiracy rhetoric that the
imbecile who calls himself the Author is notorious for. And now
Back is making veiled references to persons connected to 'The
True Story of the InterNet' obfuscating the IRS software code
and planting logic bombs in it.

Of particular concern to me is the fact that I personally had
a hand in a rather innocent affair that resulted in our company
making some coding changes which could possibly be misconstrued
to indicate that we were involved in some type of testing of a
Year2000 bomb in the IRS software code.

One of the requirements for the application we built for the IRS
was that no PO (Purchase Order) could be issued without a signed
Requisition being referenced. Also, no PO could reference a Requisition
issued outside the current fiscal year.
Thus, no PO could be written for a Requisition from the previous
year.

But...the BIG But...the IRS staff had long been doing this...violating
the strict letter of the IRS rules-especially around the beginning
of a new fiscal year.
Lacking a current fiscal year requisition, they referenced one
dated the previous (just closed) fiscal year.

Suddenly, however, our application stopped their usual practice
dead in the water, once certain PO's could not be processed because
we required reference to valid (current year) Requisitions. We
later discovered that the staff had been "cheating"
by defeating our system's logic, after we were called in to tighten
up all the design's enforcement of logic. Next thing you know,
we were asked to relax the logic.

I would like to stress that it is a matter of record that the
calendar year related problems were a result of the government
specifications and requirements for the application, and not the
result of some devious plot on the part of myself or Basis, Inc.,
to surreptitiously investigate the potential for designing code
that would take advantage of the unique problems surrounding the
advance from the 1999 calendar year to the year 2000 in order
to bring the IRS system to its knees.

Neither was the fact that the garnisheeing of my paycheck by the
IRS stopped shortly after our work on the IRS system started in
any way related to my work on their system. It was merely a coincidence
of timing.
Conspiracy theorists might also make much of the fact that several
Basis applications programmers shortly thereafter took jobs with
the IRS for half of their former pay, but this can be explained
by their desire for the long-term security and benefits that come
with working for the federal government. The fact that most of
them left the IRS and returned to Basis shortly after completing
a major reworking of the calendar year updating system which locked
the IRS irrevocably into two digit year entries indicates nothing
more than the fact that they preferred living on the Left Coast.

People often offer raised eyebrows when discovering that I went
from having my paycheck garnisheed to receiving a $150,000 tax
refund on a $100,000 salary, each year, but this is because they
fail to take into account the fact that my work as a Research
Faculty member for the Center for Policy Alternatives at MIT involved
an interdisciplinary research center with links to Sloan School,
which gave me access to superior financial management advice.

The Center's close relationship to MIT's engineering departments
was in no way connected to any sort of covert government activity,
nor to any secret work on the development of the forerunners of
today's InterNet in a manner that would make it possible for powerful
non-elected Committees and secret Commissions to take control
of a large segment of government and society.

The Center for Policy Alternatives ceased to exist years ago,
and the rumors that the Center was merely moved underground to
secretly work toward establishing organizations such as FEMA,
and the like, are preposterous.

I am really growing sick and tired of the lies and slander that
surround myself and Basis, Inc., as a result of the jealousy of
other major league computer companies over our success at the
peak of the Open Systems computer consulting industry.
The constant insinuations that we cannot be trusted with highly
sensitive systems such as those at the IRS and PacBell, simply
because of our early history as Deadheads, is an insult to our
integrity. To suggest that Acidhead Grateful Dead fans all have
radical political agendas is no more true than suggesting that
all Malcolm X followers are black.

Well, OK, maybe that's a bad example...

Regardless, I would like to put to rest, once and for all, the
preposterous rumors that have been circulating which link myself
and other top computer industry executives to some mythical secret
organization whose aim is to subvert the legitimate machinations
of authority and the established power structure.
  I totally deny any connection to 'The True Story of the InterNet'
or to anyone involved in the writing and/or dissemination of the
manuscripts, and I would advise others to do the same.

Copyright  TruthMonger <gomez@BASISINC.com>

"Last one seen fixing it, gets the blame."


"The Xenix Chainsaw Massacre"

"WebWorld & the Mythical Circle of Eunuchs"

"InfoWar (Part III of 'The True Story of the InterNet')

Soviet Union Sickle of Eunuchs Secret WebSite










Thread