Category: Other Nonsense & Spam

The Doctrine Of The Mean (Chung-Yung)

THE DOCTRINE OF THE MEAN (CHUNG-YUNG)

The DOCTRINE OF THE MEAN is a monument of Chinese philosophy, culture and
government. This work reflects the state of Confucian thought some centuries
after Confucius. Regarded as a ‘Classic’, it profoundly influenced Neo-
Confucian thought, and it was one of the texts upon which Civil Service
examinations were based for some 600 years.

For further information, see Wing-Tsit Chan, A SOURCE BOOK in CHINESE
PHILOSOPHY, Princeton, 1969, E. R. Hughes, THE GREAT LEARNING and the MEAN IN
ACTION, New York, 1943, and Tu Wei-ming, CENTRALITY and COMMONALITY: AN ESSAY
ON CHUNG-YUNG, Hawaii, 1976.

The translation reproduced here is that of James Legge in THE CHINESE
CLASSICS, originally published in 1893, and still in print today, e.g. from
Dover.

I have made a few changes:

Text which is italicized in the original translation is here bracketed.
(Apparently italics indicate words which Legge considered implicit in the
original and which he added to make the sense clear.)

The text now follows the Wade-Giles romanization.

A few notes have been added in parentheses, primarily identifying proper
names.

A few terms are printed in small caps, but I felt to reproduce these as
capitals is too distracting, so they are now lowercase.

Titles are capitalized. (Some of Legge’s punctuation differs from current
usage, but I have elected not to do any more than this.)

Chapter numbers use Arabic instead of Roman numerals, and I have added extra
blank lines.
THE DOCTRINE OF THE MEAN

Translated by James Legge

Chapter 1.

1. What heaven has conferred is the called the nature; an accordance with
this nature is called the path [of duty]; the regulation of this path is
called instruction.
2. The path may not be left for an instant. If it could be left, it would
not be the path. On this account, the superior man does not wait till he sees
things, to be cautious, nor till he hears things, to be apprehensive.
3. There is nothing more visible than what is secret, and nothing more
manifest than what is minute. Therefore the superior man is watchful over
himself, when he is alone.
4. While there are no stirrings of pleasure, anger, sorrow, or joy, the
mind may be said to be in the state of equilibrium. When those feelings have
been stirred, and they act in their due degree, there ensues what may be
called the state of harmony. This equilibrium is the great root [from which
grow all the human actings] in the world, and this harmony is the universal
path [which they all should pursue.]
5. Let the states of equilibrium and harmony exist in perfection, and a
happy order will prevail throughout heaven and earth, and all things will be
nourished and flourish.

Chapter 2.

1. Chung-ni (Confucius) said, ‘The superior man [embodies] the course of
the Mean; the mean man acts contrary to the course of the Mean.
2. ‘The superior man’s embodying the course of the Mean is because he is
a superior man, and so always maintains the Mean. The mean man’s acting
contrary to the course of the Mean is because he is a mean man, and has no
caution.’

Chapter 3.

The Master (Confucius) said, ‘Perfect is the virtue which is according to
the Mean! Rare have they long been among the people, who could practise it!’

Chapter 4.

1. The Master said, ‘I know how it is that the path [of the Mean] is not
walked in:–The knowing go beyond it, and the stupid do not come up to it. I
know how it is that the path of the Mean is not understood:–The men of
talents and virtue go beyond it, and the worthless do not come up to it.
2. ‘There is no body but eats and drinks. But they are few who can
distinguish flavours.’

Chapter 5.

The Master said, ‘Alas! How is the path of the Mean untrodden!’

Chapter 6.

The Master said, ‘There was (the mythical sage-emperor) Shun:–He indeed was
greatly wise! Shun loved to question [others], and to study their words,
though they might be shallow. He concealed what was bad [in them] and
displayed what was good. He took hold of their two extremes, [determined] the
Mean, and employed it in [his government of] the people. It was by this that
he was Shun!’

Chapter 7.

The Master said, ‘Men all say, “We are wise;” but being driven forward and
taken in a net, a trap, or a pitfall, they know not how to escape. Men all
say “We are wise;” but happening to choose the course of the Mean, they are
not able to keep it for a round month.’

Chapter 8.

The Master said, ‘This was the manner of (my disciple) Hui:–he made
choice of the Mean, and whenever he got hold of what was good, he clasped it
firmly, as if wearing it on his breast, and did not lose it.’

Chapter 9.

The Master said, ‘The kingdom, it States, and its families, may be
perfectly ruled; dignities and emoluments may be declined; naked weapons may
be trampled under the feet;–but the course of the Mean cannot be attained
to.’

Chapter 10.

1. (Confucius’ disciple) Tzu-lu asked about energy.
2. The Master said, ‘Do you mean the energy of the South, the energy of
the North, or the energy which you should cultivate yourself?
3. ‘To show forbearance and gentleness in teaching others; and not to
revenge unreasonable conduct:– this is the energy of Southern regions, and
the good man makes it his study.
4. ‘To lie under arms; and meet death without regret:–this is the energy
of the Northern regions, and the forceful make it their study.
5. ‘Therefore, the superior man cultivates [a friendly] harmony, without
being weak.–How firm is he in his energy! He stands erect in the middle,
without flinching to either side.–How firm is he in his energy! When good
principles prevail in the government of his country, he does not change from
what he was in retirement.–How firm is he in his energy! When bad principles
prevail in the country, he maintains his course to death without changing.–
How firm is he in his energy!’

Chapter 11.

1. The Master said, ‘To live in obscurity, and yet practise wonders, in
order to mentioned with honour in future ages:–this is what I do not do.
2. ‘The good man tries to proceed according to the right path, but when he
has gone halfway, he abandons it:–I am not able [so] to stop.
3. ‘The superior man accords with the course of the Mean. Though he may
be all unknown, unregarded by the world, he feels no regret.–It is only the
sage who is able for this.’

Chapter 12.

1. The way which the superior man pursues, reaches far and wide, and yet
is secret.
2. Common men and women, however ignorant, may intermeddle with the
knowledge of it; yet in its utmost reaches, there is that which even the sage
does not know. Common men and women, however much below the ordinary standard
of character, can carry it into practise; yet in its utmost reaches, there is
that which even the sage is not able to carry into practise. Great as heaven
and earth are, men still find some things in them with which to be
dissatisfied. Thus it is that, were the superior man to speak of this way in
all its greatness, nothing in the world would be found able to embrace it,
and were he to speak of it in its minuteness, nothing in the world would be
found able to split it.
3. It is said in the Book of Poetry, ‘The hawk files up to heaven; the
fishes leap in the deep.’ This expresses how this [way] is seen above and
below.
4. The way of the superior man may be found, in its simple elements, in
the intercourse of common men and women; but in its utmost reaches, it shines
brightly through heaven and earth.

Chapter 13.

1. The Master said, ‘The path is not far from man. When men try to
pursue a course, which is far from the common indications of consciousness,
this course cannot be considered the path.
2. ‘In the Book of Poetry, it is said, “In hewing an axe-handle, in
hewing an axe-handle, the pattern is not far off.” We grasp one axe-handle to
hew the other; and yet, if we look askance from the one to the other, we may
consider them as apart. Therefore, the superior man governs men, according to
their nature, with what is proper to them, and as soon as they change [what is
wrong], he stops.
3. ‘When one cultivates to the utmost the principles of his nature, and
exercises them on the principle of reciprocity, he is not far from the path.
What you do not like when done to yourself, do not do to others.
4. ‘In the way of the superior man there are four things, to not one of
which have I as yet attained.–To serve my father, as I would require my son
to serve me: to this I have not attained; to serve my prince, as I would
requires my minister to serve me: to this I have not attained; to serve my
elder brother, as I would require my younger brother to serve me: to this I
have not attained; to set the example in behaving to a friend, as I would
require him to behave to me: to this I have not attained. Earnest in
practising the ordinary virtues, and careful in speaking about them, if, in
his practice, he has anything defective, the superior man dares not exert
himself; and if, in his words, he has any excess, he dares not allow himself
such license. Thus his words have respect to his actions, and his actions
have respect to words; is it not just an entire sincerity which marks the
superior man?’

Chapter 14.

1. The superior man does what is proper to the station in which he is; he
does not desire to go beyond this.
2. In a position of wealth and honour, he does what is proper to a
position of wealth and honour. In a poor and low position, he does what is
proper to a poor and low position. Situated among barbarous tribes, he does
what is proper to a situation among barbarous tribes. In a position of sorrow
and difficulty, he does what is proper to a position of sorrow and difficulty.
The superior man can find himself in no situation in which he is not himself.
3. In a high position, he does not treat with contempt his inferiors. In
a low situation, he does not court the favour of his superiors. He rectifies
himself, and seeks nothing from others, so that he has no dissatisfactions.
He does not murmur against Heaven, nor grumble against men.
4. Thus it is that the superior man is quiet and calm, waiting for the
appointments [of Heaven], while the mean man walks in dangerous paths, looking
for lucky occurrences.
5. The Master said, ‘In archery we have something like the way of the
superior man. When the archer misses the centre of the target, he turns
around and seeks the cause of his failure in himself.’

Chapter 15.

1. The way of the superior man may be compared to what takes place in
travelling, when to go to a distance we must first traverse the space that is
near, and in ascending a height, when we must begin from the lower ground.
2. It is said in the Book of Poetry, ‘Happy union with wife and children,
is like the music of lutes and harps. When there is concord among brethren,
the harmony is delightful and enduring. [Thus] may you regulate your family,
and enjoy the pleasure of your wife and children.’
3. The Master said, ‘In such a state of things, parents have entire
compliance!’

Chapter 16.

1. The Master said, ‘How abundantly do spiritual beings display the powers
that belong to them!
2. ‘We look for them, but do not see them; we listen to, but do not hear
them; yet they enter into all things, and there is nothing without them.
3. ‘They cause all the people in the kingdom to fast and purify
themselves, and array themselves in their richest dresses, in order to attend
at their sacrifices. Then, like overflowing water, they seem to be over their
heads, and on the right and left [of their worshippers].
4. ‘It is said in the Book of Poetry, “The approaches of the spirits, you
cannot surmise;–and can you treat them with indifference?”
5. ‘Such is the manifestness of what is minute! Such is the impossibility
of repressing the outgoings of sincerity!’

Chapter 17.

1. The Master said, ‘How greatly filial was Shun! His virtue was that of
a sage; his dignity was the throne; his riches were all within the four seas.
He offered his sacrifices in his ancestral temple, and his descendants
preserved the sacrifices to himself.
2. ‘Therefore having such great virtue, it could not but be that he should
obtain the throne, that he should obtain those riches, that he should obtain
his fame, that he should attain to his long life.
3. ‘Thus it is that Heaven, in the production of things, is sure to be
bountiful to them, according to their qualities. Hence the tree that is
flourishing, it nourishes, while that which is ready to fall, it overthrows.
4. ‘In the Book of Poetry it is said, “The admirable, amiable prince
displayed conspicuously his excelling virtue, adjusting his people, and
adjusting his officers. [Therefore], he received from Heaven the emoluments
of dignity. It protected him, assisted him, decreed him the throne; sending
from Heaven these favours, [as it were] repeatedly.”
5. ‘[We may say] therefore that he who is greatly virtuous will be sure to
receive the appointment of Heaven.’

Chapter 18.

1. The Master said, ‘It is only King Wen (the founder of the Chou dynasty)
of whom it can be said that he had no cause for grief! His father was King
Chi, and his son was King Wu. His father laid the foundations of his dignity,
and his son transmitted it.
2. ‘King Wu continued the enterprise of King T’ai (King Chi’s father),
King Chi, and King Wen. He once buckled on his armour, and got possession of
the kingdom. He did not lose the distinguished personal reputation which he
had throughout the kingdom. His dignity was the royal throne. His riches
were the possession of all within the four seas. He offered his sacrifices in
his ancestral temple, and his descendants maintained the sacrifices to
himself.
3. ‘It was in this old age that King Wu received the appointment [to the
throne], and (his brother) the Duke of Chou completed the virtuous course of
Wen and Wu. He carried up the title of king to T’ai and Chi, and sacrificed
to all the former dukes above them with the royal ceremonies. And this rule
he extended to the princes of the kingdom, the great officers, the scholars,
and the common people. If the father were a great officer, and the son a
scholar, then the burial was that due to a great officer, and the sacrifice
that due to a scholar. If the father were a scholar, and the son a great
officer, then the burial was that due to a scholar, and the sacrifice that due
to a great officer. The one year’s mourning was made to extend [only] to the
great officers, but the three years’ mourning extended to the Son of Heaven.
In the mourning for a father or mother, he allowed no difference between the
noble and the mean.’

Chapter 19.

1. The Master said, ‘How far-extending was the filial piety of King Wu
and the Duke of Chou!
2. ‘Now filial piety is seen in the skilful carrying out of the wishes of
our forefathers, and the skilful carrying forward of their undertaking.
3. ‘In spring and autumn, they repaired and beautified the temple-halls
of their fathers, set forth their ancestral vessels, displayed their various
robes, and presented the offering of the several seasons.
4. ‘By means of the ceremonies of the ancestral temple, they distinguished
the royal kindred according to their order of descent. By ordering the
parties present according to their rank, they distinguished the more noble
and the less. By the arrangement of the services, they made a distinction of
talents and worth. In the ceremony of general pledging, the inferiors
presented the cup to their superiors, and thus something was given the lowest
to do. At the [concluding] feast, places were given according to the hair,
and thus was made the distinction of years.
5. ‘They occupied the places of their forefathers, practised their
ceremonies, and performed their music. They reverenced those whom they
honoured, and loved those whom they regarded with affection. Thus they served
the dead as they would have served them alive; they served the departed as
they would have served them had they been continued among them.
6. ‘By the ceremonies of the sacrifices to Heaven and Earth they served
God, and by the ceremonies of the ancestral temple they sacrificed to Heaven
and Earth, and the meaning of the several sacrifices to ancestors, would find
the government of a kingdom as easy as to look into his palm!’

Chapter 20.

1. The Duke Ai (the ruler of the state of Lu) asked about government.
2. The Master said, ‘The government of Wen and Wu is displayed in [the
records],-the tablets of wood and bamboo. Let there be the men and the
government will flourish; but without the men, their government decays and
ceases.
3. ‘With the [right] men the growth of government is rapid, just as
vegetation is rapid in the earth; and moreover [their] government [might be
called] an easily-growing rush.
4. ‘Therefore the administration of government lies in [getting proper]
men. Such men are to be got by means of [the rulers’s own] character. That
character is to be cultivated by this treading in the ways of [duty]. And the
treading those ways of duty is to be cultivated by the cherishing of
benevolence.
5. ‘Benevolence is [the characteristic element of] humanity, and the
great exercise of it is in loving relatives. Righteousness is [the
accordance of actions with what is] right, and the great exercise of it is in
honouring the worthy. The decreasing measures of the love due to relatives,
and the steps in the honour due to the worthy, are produced by [the
principle] of propriety.
6. ‘When those an inferior situations do not possess the confidence of
their superiors, they cannot retain the government of the people.
7. ‘Hence the sovereign may not neglect the cultivation of his own
character. Wishing to cultivate his character, he may not neglect to serve
his parents. In order to serve his parents, he may not neglect to acquire a
knowledge of men. In order to know men, he may not dispense with a knowledge
of Heaven.
8. ‘The duties of the universal obligation are five, and the virtues
wherewith they are practised are three. The duties are those between
sovereign and minister, between father and son, between husband and wife,
between elder brother and younger, and those belonging to the intercourse of
friends. Those five are the duties of universal obligation. Knowledge,
magnanimity, and energy, these three, are the virtues universally binding.
And the means by which they carry [the duties] into practise is singleness.
9. ‘ Some are born with the knowledge [of those duties]; some know them
by study; and some acquire the knowledge after a painful feeling of their own
ignorance. But the knowledge being possessed, it comes to the same thing.
Some practise them with a natural ease; some from a desire for their
advantages; and some by strenuous effort. But the achievement being made, it
comes to the same thing.’
10. The Master said, ‘To be fond of learning is to be near to knowledge.
To practise with vigour is to be near to magnanimity. To possess the feeling
of shame is to be near to energy.
11. ‘He who knows these three things, knows how to cultivate his own
character. Knowing how to cultivate his own character, he knows how to
govern other men. Knowing how to govern other men, he knows how to govern the
kingdom with all its States and families.
12. ‘All who have the government of the kingdom with its States and
families have nine standard rules to follow;–viz. the cultivation of their
own characters; the nourishing of men of virtue and talents; affection towards
their relatives; respect towards the great ministers; kind and considerate
treatment of the whole body of officers; dealing with the mass of the people
as children; encouraging the resort of all classes of artisans; indulgent
treatment of men from a distance; and the kindly cherishing of the princes of
the States.
13. ‘By the ruler’s cultivation of his own character, the duties [of
universal obligation] are set forth. By honouring men of virtue and talents,
he is preserved from errors of judgement. By showing affection to his
relatives, there is no grumbling nor resentment among his uncles and brethren.
By respecting the great ministers, he is kept from error in the practise of
government. By kind and considerate treatment of the whole body of officers,
they are led to make the most grateful return for his courtesies. By dealing
with the mass of the people as his children, they are led to exhort one
another to what is good. By encouraging the resort of all classes of
artisans, his resources for expenditure are rendered ample. By indulgent
treatment of men from a distance, they are brought to resort to him from all
quarters. And by kindly cherishing the princes of the States, the whole
kingdom is brought to revere him.
14. ‘Self-adjustment and purification, with careful regulation of his
dress, and the not making a movement contrary to the rules of propriety:–this
is the way for a ruler to cultivate his person. Discarding slanderers, and
keeping himself from [the seductions of] beauty; making light of riches, and
giving honour to virtue:–this is the way for him to encourage men of worth
and talents. Giving them places [of honour] and larger emolument, and sharing
with them in their likes and dislikes:–this is the way for him to encourage
his relatives to love him. Giving them numerous officers to discharge their
orders and commissions:–this is the way for him to encourage the great
ministers. According to them a generous confidence, and making their
emoluments large:–this is the way to encourage the body of officers.
Employing them only at the proper times, and making the imposts light:–this
is the way to encourage the people. By daily examinations and monthly trials,
and by making their rations in accordance with their labours:–this is the way
to encourage the classes of artisans. To escort them on their departure and
meet them on their coming; to commend the good among them, and show compassion
to the incompetent:–this is the way to treat indulgently men from a distance.
To restore families whose line of succession has been broken, and to revive
States that have been extinguished; to reduce to order States that are in
confusion, and support those which are in peril; to have fixed times for their
own reception at court, and the reception of their envoys; to send them away
after liberal treatment, and welcome their coming with small contributions:–
this is the way to cherish the princes of the States.
15. ‘All who have the government of the kingdom with its States and
families have the above nine standard rules. And the means by which they are
carried into practise is singleness.
16. ‘In all things success depends on previous preparation, and without
such previous preparation there is sure to be failure. If what is to be
spoken be previously determined, there will be no stumbling. If affairs be
previously determined, there will be no difficultly with them. If one’s
actions have been previously determined, there will be no sorrow in connexion
with them. If principles of conduct have been previously determined, the
practise of them will be inexhaustible.
17. ‘When those in inferior situations do not obtain the confidence of
the sovereign, they cannot succeed in governing the people. There is a way to
obtain the confidence of the sovereign;–if one is not trusted by his
friends, he will not get the confidence of his sovereign. There is a way to
being trusted by one’s friends;–if one is not obedient to his parents, he
will not be true to friends. There is a way to being obedient to one’s
parents;–if one, on turning his thoughts in upon himself, finds a want of
sincerity, he will not be obedient to his parents. There is a way to the
attainment of sincerity in one’s self;–if a man do not understand what is
good, he will not attain sincerity in himself.
18. ‘Sincerity is the way of Heaven. The attainment of sincerity is the
way of men. He who possesses sincerity, is he who, without an effort, hits
what is right, and apprehends, without exercise of thought;–he is the sage
who naturally and easily embodies the [right] way. He who attains to
sincerity, is he who chooses what is good, and firmly holds it fast.
19. ‘To this attainment there are requisite the extensive study of what is
good, accurate inquiry about it, careful reflection on it, the clear
discrimination of it, and the earnest practise of it.
20. ‘The superior man, while there is anything he has not studied, or
while in what he has studied there is anything he cannot understand, will not
intermit his labour. While there is anything he has not inquired about, or
anything in what he has inquired about which he does not know, he will not
intermit his labour. While there is anything which he has not reflected on,
or anything in what he has reflected on which he does not apprehend, he will
not intermit his labour. While there is anything which he has not
discriminated, or his discrimination is not clear, he will not intermit his
labour. If there be anything which he has not practised, or his practise
fails in earnestness, he will not intermit his labour. If another man succeed
by one effort, he will use a hundred efforts. If another man succeed by ten
efforts, he will use a thousand.
21. ‘Let a man proceed in this way, and, though dull, he will surely
become intelligent; though weak, he will surely become strong.’

Chapter 21.

When we have intelligence resulting from sincerity, this condition is to
be ascribed to nature; when we have sincerity resulting from intelligence,
this condition is to be ascribed to instruction. But given the sincerity,
and there shall be the intelligence; given the intelligence, and there shall
be the sincerity.

Chapter 22.

It is only he who is possessed of the most complete sincerity that can
exist under heaven, who can give its full development to his nature. Able to
give its full development to his own nature, he can do the same to the nature
of other men. Able to give its full development to the nature of other men,
he can give their full development to the natures of animals and things. Able
to give their full development to the natures of creatures and things, he can
assist the transforming and nourishing powers of Heaven and Earth. Able to
assist the transforming and nourishing powers of Heaven and Earth, he may with
Heaven and Earth form a ternion.

Chapter 23.

Next to the above is he who cultivates to the utmost the shoots [of
goodness] in him. From those he can attain to the possession of sincerity.
This sincerity becomes apparent. From being apparent, it becomes manifest.
From being manifest, it becomes brilliant. Brilliant, it affects others.
Affecting others, they are changed by it. Changed by it, they are
transformed. It is only he who is possessed of the most complete sincerity
that can exist under heaven, who can transform.

Chapter 24.

It is characteristic of the most entire sincerity to be able to foreknow.
When a nation or family is about to flourish, there are sure to be happy
omens; and when it is about to perish, there are sure to be unlucky omens.
[Such events are] seen in the milfoil and tortoise, and affect the movements
of the four limbs. When calamity or happiness is about to come, the good
shall certainly be foreknown by him, and the evil also. Therefore the
individual possessed of the most complete sincerity is like a spirit.

Chapter 25

1. Sincerity is that whereby self-completion is effected, and [its] way is
that by which man must direct himself.
2. Sincerity is the end and beginning of things; without sincerity there
would be nothing. On this account, the superior man regards the attainment of
sincerity as the most excellent thing.
3. The possessor of sincerity does not merely accomplish the self-
completion of himself. With this quality he completes [other men and] things
[also]. The completing himself [shows his] perfect virtue. The completing
[other men and] things [shows his] knowledge. [Both these are] virtues
belonging to the nature, and [this is] the way by which a union is effected
of the external and internal. Therefore, whenever he–[the entirely sincere
man]–employs them,–[that is, these virtues,–their action will be] right.

Chapter 26.

1. Hence to entire sincerity there belongs ceaselessness.
2. Not ceasing, it continues long. Continuing long, it evidences itself.
3. Evidencing itself, it reaches far. Reaching far, it becomes large and
substantial. Large and substantial, it becomes high and brilliant.
4. Large and substantial;–this is how it contains [all] things. High
and brilliant;–this is how it overspreads [all] things. Reaching far and
continuing long;–this is how it perfects [all] things.
5. So large and substantial, [the individual possessing it] is the co-
equal of Earth. So high and brilliant, it makes him the co-equal of Heaven.
So far-reaching and long-continuing, it makes him infinite.
6. Such being its nature, without any display, it becomes manifested;
without any movement, it produces changes; and without any effort, it
accomplishes its ends.
7. The way of Heaven and Earth may be completely declared in one
sentence.–They are without any doubleness, and so they produce things in a
manner that is unfathomable.
8. The way of Heaven and Earth is large and substantial, high and
brilliant, far-reaching and long-enduring.
9. The heaven now before us is only this bright shining spot; but when
viewed in its inexhaustible extent, the sun, moon, stars, and constellations
of the zodiac, are suspended in it, and all things are overspread by it. The
earth before us is but a handful of soil; but when regarded in its breadth and
thickness, it sustains mountains like the Hua and the Yo, without feeling
their weight, and contains the rivers and seas, without their leaking away.
The mountain now before us appears only a stone; but when contemplated in all
the vastness of its size, we see how the grass and tress are produced on it,
and birds and beasts dwell on it, and precious things which men treasure up
are found on it. The water now before us appears but a ladleful; yet
extending our view to its unfathomable depths, the largest tortoises, iguanas,
iguanodons, dragons, fishes, and turtles, are produced in them, articles of
value and sources of wealth abound in them.
10. It is said in the Book of Poetry, ‘The ordinances of Heaven, how
profound are they and unceasing!’ The meaning is, that it is thus that Heaven
is Heaven. [And again], ‘How illustrious was it, the singleness of the
virtue of King Wen!’ indicating that it was thus that King Wen was what he
was. Singleness likewise is unceasing.

Chapter 27.

1. How great is the path proper to the Sage!
2. Like overflowing water, it sends forth and nourishes all things, and
rises up to the height of heaven.
3. All-complete is its greatness! It embraces the three hundred rules of
ceremony, and the three thousand rules of demeanor.
4. It waits for the proper man, and then it is trodden.
5. Hence, it is said, ‘Only by perfect virtue can the perfect path, in all
its courses, be made a fact.’
6. Therefore, the superior man honours his virtuous nature, and maintains
constant inquiry and study, seeking to carry it out to its breadth and
greatness, so as to omit none of the more exquisite and minute points which it
embraces, and to raise it to its greatest height and brilliancy, so as to
pursue the course of the Mean. He cherishes his old knowledge, and is
continually acquiring new. He exerts an honest, generous earnestness, in the
esteem and practise of all propriety.
7. Thus, when occupying a high situation he is not proud, and in a low
situation he is not insubordinate. When the kingdom is well-governed, he is
sure by his words to rise; and when it is ill-governed, he is sure by his
silence to command forbearance to himself. Is not this what we find in the
Book of Poetry,–‘Intelligent is he and prudent, and so preserves his person?’

Chapter 28.

1. The Master said, ‘Let a man who is ignorant be fond of using his own
judgment; let a man without rank be fond of assuming a directing power to
himself; let a man who is living in the present age go back to the ways of
antiquity;–on the persons of all who act thus calamities will be sure to
come.’
2. To no one but the Son of Heaven does it belong to order ceremonies, to
fix the measures, and to determine the written characters.
3. Now, over the kingdom, carriages have all wheels of the same size; all
writing is with the same characters; and for conduct there are the same rules.
4. One may occupy the throne, but if he have not the proper virtue, he
may not dare to make ceremonies or music. One may have the virtue, but if he
do not occupy the throne, he may not presume to make ceremonies or music.
5. The Master said, ‘I may describe the ceremonies of the Hsia dynasty,
but (the) Ch’i (dynasty) cannot sufficiently attest my words. I have learned
the ceremonies of the Yin (or Shang) dynasty, and in (state of) Sung they
still continue. I have learned the ceremonies of (the) Chou (dynasty), which
are not used, and I follow Chou.’

Chapter 29.

1. He who attains to the sovereignty of the kingdom, having [those] three
important things, shall be able to effect that there shall be few errors
[under his government].
2. However excellent may have been the regulations of those of former
times, they cannot be attested. Not being attested, they cannot command
credence, and not being credited, the people would not follow them. However
excellent might be the regulations made by one in an inferior situation, he is
not in a position to be honoured. Unhonoured, he cannot command credence, and
not being credited, the people would not follow his rules.
3. Therefore the institutions of the Ruler are rooted in his own character
and conduct, and sufficient attestation of them is give by the masses of the
people. He examines them [by comparison] with those of the three kings (the
founders of the three dynasties, Hsia, Shang or Yin, and Chou), and finds them
without mistake. He sets them up before heaven and earth, and finds nothing
in them contrary to their mode of operation. He presents himself with them
before spiritual beings, and no doubts about them arise. He is prepared to
wait for the rise of a sage a hundred ages after, and has no misgivings.
4. His presenting himself [with his institutions] before spiritual beings,
without any doubts arising about them, shows that he knows Heaven. His being
prepared, without any misgivings, to wait for the rise of a sage a hundred
ages after, shows that he knows men.
5. Such being the case, the movements of such a ruler, [illustrating his
institutions], constitute an example to the world for ages. His acts are for
ages a law to the kingdom. His words are for ages a lesson to the kingdom.
Those who are far from him, look longingly for him; and those who are near
him, are never wearied with him.
6. It is said in the Book of Poetry,–‘Not disliked there, not tired of
here, from day to day and night to night, will they perpetuate their praise.’
Never has there been a ruler, who did not realise this description, that
obtained an early renown throughout the kingdom.

Chapter 30.

1. Chung-ni handed down the doctrines of Yao and Shun, as if they had been
his ancestors, and elegantly displayed the regulations of Wen and Wu, taking
them as his model. Above, he harmonized with the times of heaven, and below,
he was conformed to the water and land.
2. He may be compared to heaven and earth in their supporting and
containing, their overshadowing and curtaining of all things. He may be
compared to the four season in their alternating progress, and to the sun and
moon in their successive shining.
3. All things are nourished together without their injuring one another.
The course [of the seasons, and of the sun and moon], are pursued without any
collision among them. The smaller energies are like river currents; the
greater energies are seen in mighty transformations. It is this which makes
heaven and earth so great.

Chapter 31.

1. It is only he, possessed of all sagely qualities that can exist under
heaven, who shows himself quick in apprehension, clear in discernment, of far-
reaching intelligence, and all-embracing knowledge, fitted to exercise rule;
magnanimous, generous, benign, and mild, fitted to exercise forbearance;
impulsive, energetic, firm, and enduring, fitted to maintain a firm hold;
self-adjusted, grave, never swerving from the Mean, and correct, fitted to
command reverence; accomplished, distinctive, concentrative, and searching,
fitted to exercise discrimination.
2. All-embracing is he and vast, deep and active as a fountain, sending
forth in their due season his virtues.
3. All-embracing and vast, he is like heaven. Deep and active as a
fountain, he is like the abyss. He is seen, and the people all reverence him;
he speaks, and the people all believe him; he acts, and the people all are
pleased with him.
4. Therefore his fame overspreads the Middle Kingdom, and extends to all
barbarous tribes. Wherever ships and carriages reach; wherever the strength
of man penetrated; wherever the heavens overshadow and the earth sustains;
wherever the sun and moon shine; wherever frosts and dews fall:–all who have
blood and breath unfeignedly honour and love him. Hence it is said,–‘He is
the equal of Heaven.’

Chapter 32.

1. It is only the individual possessed of the most entire sincerity that
can exist under heaven, who can adjust the great invariable relations of
mankind, establish the great fundamental virtues of humanity, and know the
transforming and nurturing operations of Heaven and Earth;–shall this
individual have any being or anything beyond himself on which he depends?
2. Call him man is his ideal, how earnest is he! Call him an abyss, how
deep is he! Call his Heaven, how vast is he!
3. Who can know him, but he who is indeed quick in apprehension, clear in
discernment, of far-reaching intelligence, and all-embracing knowledge,
possessing all heavenly virtue?

Chapter 33.

1. It is said in the Book of Poetry, ‘Over her embroidered robe she puts a
plain single garment,’ intimating a dislike to the display of the elegance of
the former. Just so, it is the way of the superior man to prefer the
concealment [of his virtue], while it daily becomes more illustrious, and the
way of the mean man to seek notoriety, while he daily goes more and more to
ruin. It is characteristic of the superior man, appearing insipid, yet never
to produce satiety; while showing a simple negligence, yet to have his
accomplishments recognized; while seemingly plain, yet to be discriminating.
He knows how what is distant lies in what is near. He knows where the wind
proceeds from. He knows how what is minute becomes manifested. Such an one,
we may be sure, will enter into virtue.
2. It is said in the Book of Poetry, ‘Although [the fish] sink and lie at
the bottom, it is still quite clearly seen.’ Therefore the superior man
examines his heart, that there may be nothing wrong there, and that he may
have no cause for dissatisfaction with himself. That wherein the superior
man cannot be equalled is simply this,–his [work] which other men cannot see.
3. It is said in the Book of Poetry, ‘Looked at in your apartment, be
there free from shame as being exposed to the light of heaven.’ Therefore,
the superior man, even when he is not moving, has [a feeling] of reverence,
and while he speaks not, he has [the feeling of] truthfulness.
4. It is said in the Book of Poetry, ‘In silence is the offering
presented, and [the spirit] approached to; there is not the slightest
contention.’ Therefore the superior man does not use rewards, and the people
are stimulated [to virtue]. He does not show anger, and the people are awed
more than by hatchets and battle-axes.
5. It is said in the Book of Poetry, ‘What needs no display is virtue.
All the princes imitate it.’ Therefore, the superior man being sincere and
reverential, the whole world is conducted to a state of happy tranquility.
6. It is said in the Book of Poetry, ‘I regard with pleasure your
brilliant virtue, making no great display of itself in sounds and
appearances.’ The Master said, ‘Among the appliances to transform the people,
sounds and appearances are but trivial influences. It is said in another ode,
“His virtue is light as a hair.” Still, a hair will admit of comparison [as
to its size]. “The doings of the supreme Heaven have neither sound nor
smell.”–That is perfect virtue.’

How To Eliminate Or Brush Off Telemarketing Calls

From news.Arizona.EDU!math.arizona.edu!CS.Arizona.EDU!uunet!cs.utexas.edu!math.ohio-state.edu!uwm.edu!uwvax!calypso.cs.wisc.edu!cargille Tue Aug 23 13:59:53 1994
Path: news.Arizona.EDU!math.arizona.edu!CS.Arizona.EDU!uunet!cs.utexas.edu!math.ohio-state.edu!uwm.edu!uwvax!calypso.cs.wisc.edu!cargille
From: cargille@calypso.cs.wisc.edu (Allan Cargille)
Newsgroups: uwisc.general,wi.general,alt.consumers.free-stuff
Subject: how to eliminate, brush off telemarketing calls
Followup-To: uwisc.forum
Date: 22 Aug 1994 20:36:25 GMT
Organization: University of WI, Madison — Computer Sciences Dept.
Lines: 40
Distribution: usa
Message-ID:
NNTP-Posting-Host: calypso.cs.wisc.edu
X-Newsreader: NN version 6.5.0 #3 (NOV)

Hi, I was really getting frustrated by telemarketers until I found
the information below. I thought others might appreciate it as well:

Consumers have a right request *not* to receive telemarketing calls.
The Direct Marketing Association has a “Telephone Preference Service”
list. You can only get on the list by writing them. They also do not
acknowledge your letter (at least, they didn’t ack mine). You can
write them at

DMA
P.O. Box 9014
Farmingdale, NY 11735

Include your phone number, and tell them you do not want to receive
telemarketing calls. This should probably also include the signature
of the person who has the phone in their name.

Another thing you can do to reduce telemarketing calls is to get in
the habit of never including your phone number on any warranty cards,
information requests, etc — or, if you do, indicate that you do not
want the information sold or redistributed.

Then when people call, if it sounds like a telemarketer (“Hello, is
this Mr. Cargille?”), just ask “Who’s calling, please?” When they
identify themselves and start to go into their pitch, just interrupt and
tell them you prefer not to receive telemarketing calls. Also ask
them to please take you off their list.

This has markedly decreased the number of nuisance calls we receive,
and now I can brush them off without my blood pressure going up.

Hope this helps,

allan

C. Allan Cargille “MadTown” (Madison), Wisconsin cargille@cs.wisc.edu
———————–
“In other national news this week, another thirty thousand preborn babies
were legally ripped into small pieces or poisoned to death.”

Divine Rights By Paul W. Will AK Koordar

DIVINE RIGHTS

by Paul W. Will
(AKA Koordar)

The contents of this article are suitable for use with AD&D (tm TSR
Hobbies Inc.) but are easily adaptable to any other major FRPG.

In considering the writing of this article, several
questions/problems became apparent. First was classification of Deities.
Second came the requirement of keeping the record keeping simple in a
complicated business (DMs already have their jobs cut out for them). And
finally; the correlate of such information previously set forth in both
the AD & D system and the fine pages of The Dragon Magazine (tm TSR
Hobbies Inc.)

With these things in mind; to work.

Gods; gods of war, passion, harvest, chance and more have been the
back-drop for countless civilizations in the past. The flavor of a
country and the personalities of it’s peoples all find some root in the
otherworldly personages and legends of their religions. Any AD&D (tm TSR
Hobbies Inc.) campaign gains something special when such things are
carefully interwoven into their fabric, but this is no easy task; and
can detract from a game as easily as not.

To add a religious note to your campaign there are two strategies;
1) Use a pantheon from the DDG.
2) Create your own, taylor made pantheon(s).

As for the first method, I suggest that you research the era and
and area(s) of power, as well as the legends and tales of the pantheon
in question, in depth. Grasp firmly the concepts and theologies before
implementing them. As far as general advice goes; that is the extent of
it.

Should you choose the second method however (and probably if not)
this article should be of interest to you.

Let us discuss the basics of deity-hood. Gods are divided into five
groups (as I have concluded from information derived from the DDG,
Dragon #68, and subsequent issues) in order of potence:
Greater (as per TD #68)
Major*
Minor**
Lesser (as per TD #68)
Demi-god (as per TD#68)
Saint (as per TD #71)

As Mr. Gygax has, in his ‘deities of the Flaeness’ series described
some of his gods as being ‘Major’ and ‘Minor’ without further
information given I will take this opportunity to give my own versions
of these:

*Major Gods:
Anti-magic shell (2) Protection from evil/good,
Command 3rd effect (2) +2, 30′ radius
Control weather Quest (2)
Cure critical wounds (2) Remove curse
Death spell (1) Remove fear
Dispel (evil/good, Restoration (2)
illusion, magic) (6 each) Resurrection (5)
Fly Shape change (2)
Gate (2) Summon #
Globe of invulnerability (1) Symbol (2)
Heal (2) Time stop (1)
Holy/Unholy word (2) Trap the soul (2)
Improved invisibility True seeing (4)
Improved phantasmal forces Wish (2)
Polymorph other (4)

* * Maximum hit dice of 35, no more than 5 creatures. * *

**Minor Gods:
Anti-magic shell (2) Polymorph other (2)
Command 3rd effect (2) Protection from evil/good
Control weather (2) +2, 25′ radius
Cure critical wounds (1) Quest (1)
Cure serious wounds (3) Remove curse
Death spell (1) Remove fear
Dispel (evil/good, Restoration (2)
illusion, magic) (4) Resurrection (4)
Fly Summon #
Gate (2) Symbol (2)
Heal (2) Trap the soul (1)
Holy/unholy word (2) True seeing (3)
Improved invisibility Wish (1)
Phantasmal forces

* * Maximum hit dice of 30, no more than 4 creatures. * *

With this errata out of the way, onward . ..

What, other than the obvious powers stated, differs each rank of
gods from the others? That is a question that is arduous to answer in a
generality. Some say it is the number and power of their worshipers,
this I say is a misleading if not unworkable idea. Which came first; the
god or the believer? Obviously this is something that you will have to
define for yourself, but I operate on the precept that the god(s) was
first, shortly followed by everything they created.

Another misconception (at least in my opinion) is that divine
beings gain power directly from their worshipers and in direct
proportion to the number of their faithful. If this were the case any
mortal might claim divinity simply because he or she had cowed a few
handfulls of weaker creatures into paying homage to the character in
question. This sort of behaviour, shows plainly that the requirements
for deifacation must be up-graded.

Gods are their own power-sources, or tap into great power stores
un-attainable to mortals, for their spell abilities. It is part of their
nature; why else would men (creatures capable of attaining great power
themselves [in the form of high levels]) live in awe of any god?

This leads to yet another strange question: why then, if gods are
self-sufficient for their existence, would ‘Divine Beings’ solicit even
the recognition of men?

First I must lay down here a postulate that I hold to be true and
workable in gaming.
1) any divine creature has the proverbial ‘snowball’s chance
in
hell’ to manifest it’s-self in any way on a plane (material
plane, that is) where it has no supplicants.

By this rule a god has effectively zero influence on a world where
he/she is without priests. Clerics might well be sent to far lands
(worlds), there to introduce their gods doctrines. A god does not cease
to exist merely because no-one believes in him any longer, the god in
question would simply take truck to planes where he or she finds the
fields more verdant. Thus on any reality where a god has the slightest
interest he or she would actively seek to spread-the-faith. Priests are
charged to do so, and are benefitted with spell capabilities to aid in
this task. The phrase: “Wherever goest thou faithful; there shall I
be.’, is an applicable statement here.

The god without a flock is able only to manifest on it’s native
plane, a dangerous place indeed for a god, but any gods reason for
opening material worlds to itself are sure to be deeper than ‘just to be
there’. Some gods are greedy and desire the wealth of their worlds,
other gods are curious, some wish to propagate their views, still others
simply feel a need for lesser creatures to pay them homage. A god might
simply be bored; eternity is a long time, and what about spiteful gods;
might they not seek only their nemisis’ failure in that enemy god’s
dealings with man? Other reasons are plentiful, referees should give
each god his or her own purpose for association with man; a task that
could (should with respect to at least a handfull of any pantheon’s
gods) be tied into THE BIG PICTURE.

What are the origins of your world, cosmos or multiverse? Devise
it. Was it the Big-Bang, a mating of celestial beings, or did the Cosmic
Dung Beetle roll amorphous materials into planets? Are the stars other
suns, carnal creatures thrust into the sky, or cracks and chinks in a
great universe encircling wall? The multiverse, is it divergent
realities stemming from Day One (ala Zelazny), or the results of two
ultimate beings unknowingly trying to create Everything, in the same
spot at the same time?

It stands to reason that the Creator(s) is a Greater god, or
perhaps a group of Greater and Major Gods. As for the rest consider the
following;

Greater God:
A) The most powerful Outer Realm creature of its alignment, or
B) Any of the most powerful Perpetual Beings.

Major God:
A) An Outer Realm creature of great power, or
B) The offspring of a Greater God.

Minor God:
A) An Outer Realm creature of average power, or
B) The offspring of a Major God.

Lesser God:
A) An Outer Realm creature of little power, or
B) The offspring of a Minor God.

Demi-God:
A) Any half-divine mortal who has shown ample merit to his/her
divine
parent and granted immortality.

Saint:
A) Any true mortal who shows extreme potential through the service
of
his/her Deity, and been granted an eternal afterlife, or
B) Any Demi-God not yet ascended.

I define the Outer Realm as “that which existed before the
creation, and which still exists beyond the borders of the creation.”

A “Perpetual Being” is one the “is because it is.” More to the
point let me give an example: Loroth is the “God of the Good Earth,” he
cane to be when the earth did and he represents all that is alive. His
priests take joy in life and its continuance, he is a Perpetual Being
because he is the physical embodiment of something that may one day
cease to exist (would this cause him to fade from existence?). His twin,
Mortis (God of Death), skips through Time, existing only in the instant
when something dies and within eyesight of that thing. He too is a
Perpetual Being, and may one day be no more. Neither could exist without
the other.

Further I have made mention of the Ascendance of Demi-Gods, this
takes place at the death of the mortal body of the Demi-God. After the
usual Astral Journey (DDG page 11) upon its arrival at the proper plane,
if it is the same plane as is native to its Divine parent then it will
become a full-fledged Demi-God. Until this time it is treated as having
only the powers of a Saint. Should the half-mortal choose in its life to
serve a cause other then that of its Divine parent’s, then there would
be slim chance of another God granting him/her immortality, and thus
would remain but a Saint eternally.

Feel free to alter the definitions as necessary, but remember, the
difference bewixt various ranks of Deities must be more then just the
number of Wishes they can crank-out in a day….

Pantheons all have one thing in common. That is that they each
reflect their respective civilizations. Of the dozen or so
pantheon/cultures that I examined in preparation of this work I found
that eleven had war-gods, seven had sun-gods, six; gods of sea. Further
there were five each, gods of thunder, storms, and love. Fully one-third
included gods of wind, death, nature, air, running waters, and a king of
gods. These things can tell one much about these cultures, if not of the
nature of man. War seems to be at the foremost of man’s thoughts, so he
epitomizes a god of destruction. The sun was a wonder to early man, thus
a deity represented it or vise-versa, be that god a cruel and glaring
one, or a warm and kind one. Likewise many cultures were based on their
sea-faring merchants or soldiers, they would naturally imagine a god of
the waters, who must surely watch over them, and be in control of the
seas depths and ravaging nature. Love (taken in any context) is
frequently thought of as a gift of a specific supernatural being. Air
and wind gods are attributes of sailing cultures, death and nature are
mysteries and thus deified. River-based cultures, of course, boast of
river-gods, and prevalent in family or monarch oriented cultures there
are found a “Ruler of the Gods.” The latter is often a patriarch or
matriarch, or even a matched set, this lets the church help in
controlling the lower castes.

As can now be seen, a coherent pantheon should be representative of
the culture(s) that gave rise to it (also vise-versa), and must set an
example for the whole civilization.

As stated previously, some pantheons’ rulers are
patri-/matri-archial. These pantheons have historically involved
incestuous relationships (again the lifestyles of the devout would,
detrimentally, reflect this). Although occasionally a new being might be
brought into the scene (perhaps from the pantheon of a conquered
nation), the nature and origins of these interlopers would likely be
jumbled or varied from church to church.

Here is a list of possible spheres of power for deities compiled
from twelve pantheons, and followed by a few additions of my own device,
the first three are more “Role-Types” commonly evidenced.

Creator Ruler Subverter War
Sun Fire Sea Thunder
Storms Death Love Wind Mature
Air Running Waters Rain Underworld*
Undead Poetry Music Magic Animal**
Archery Theft Luck Earth
Fertility Sky Night Smything
Knowledge Law Gambling Agriculture
Punishment Motherhood Guardian-of-dead Wealth
Evil Beauty Combat Hunting Strength
Moon Racing/Speed Winter Spring
Fall/Harvest Summer Cities Darkness
Devil*** Mountains Youth (eternal) Forests
Fate Medicine/Healing Chance Chaos
Life Good Gifts Justice
Multi-purpose Time Gravity Wine
Competition Travel

* Not necessarily representative of a single plane, but possibly in
charge of all of the dead souls of mortals.
** Representative of animal(s) held as sacred.
*** Usually the “Subverter” and of radical alignment.

The gods of a pantheon need not be of a single alignment, nor even
a group of related alignments. In my own campaign, my two pantheons each
represent a plethora of view-points and the full range of alignments.

Let the priest, and indeed the priesthood, fit the god. Little
details do count; the priests of Loroth (God of the Good Earth) never
wear shoes that their feet never leave the ground. The priests of Woolio
(Duke of the Drunk, and God of Gravity) must start the day with a ritual
called “Hair of the Dog” lest they be struck with mystic fits of
migraine…. Woolio, by the way, invented gravity so he could fall,
well, um, down.

The spells that each Deity can grant should be closely related to
the Deity’s philosophy, and sphere of power, thus Loroth cannot grant
such spells as Levitation, nor Wind Walk. Woolio’s priests are at a loss
to cast such spells as Neutralize Poison (alcohol is after all a poison,
and the reverse of this spell cast by Woolio’s adherants causes the
victim to be quite intoxicated…), and True Seeing.

Gods have to be limited in both the type and number of spells that
they can grant to their priests. The former so that the spells that
their priests cast conform to the theology. The latter so that priests
will usually choose at least on extremely potent god and possible on or
two additional gods, this will serve to simulate the side-byside style
of worship so common in pantheon religions. I offer this chart regarding
the number of spells each god can grant.

Spell Level:
1 2 3 4 5 6 7 Deity Rank: Greater: 12
12 12 9 7 5 3 Major: 12 12 9 7 5 3 1
Minor: 12 9 7 5 3 1 – Lesser: 9 7 5 3 1
– – Demi-God 7 5 3 1 – – – Saint: 5 3
1 – – – –

According to the AD&D system a Cleric gains his/her spells through
prayer, meditation, and study. First and Second level spells are gained
from the teachings of the church, wether by rote chants, reading prayer
books or similar means. Third, Fourth, and Fifth level spells are
communicated to the Cleric via the Deity’s servants: Saints, Devas,
lesser Devils or Demons, etc., as the priest prays. Finally Sixth and
Seventh level spells are granted by the deity itself.

Utilizing the rules outlined in this text observe the following
example.

Laurus the True is an eleventh level Cleric with a 14 Wisdom who
worships a Major God, a Lesser God, and a Saint of the Major God. Laurus
chooses the following numbers of spells from his deities:

Divinity:
Major Lesser Saint Spell Level: 1
3 3 1 2 2 2
0 3 1 1 2 4
1 2 – 5 0 2 –
6 1 – –

To receive the Sixth level spells he is in direct communication
with the Major Deity. The Major Deity sends a deva with the Third and
Fourth level spells.

A deva servitor of the Lesser God brings the Third through Fifth
level spells requested by the priest.

Finally the Saint himself (at least in spirit) visits the priest
with the Third level spells and possible any news of import.

In this scenario the priest would likely have a very close
relationship with the Saint, as the Saint consults with him on each day
bringing spell-knowledge.

The next step in meshing religion and Deities into the campaign is
to list each of the cities in it. Once such a list is complete, count
the churches in each city, adding them to the list categorically by
location. Now define whether each of the churches are mono- or poly-
theistic in beliefs. I recommend that such a list be patterned after the
example below.

KINGDOM CITY ALIGN- PRIM- SECOND- TE RTI-
MENT ARY ARY A RY

Southeron Portsmouth CG(N) Imparte Publius As sorte

Ghar-Dun N Ithain Woolio

Velton Velton NG Loroth Oberik Go ram

The categories of Kingdom and City are self explanatory. Alignment
is that of the Deity, or a consolidation of the Deities involved
(obviously no church should house more than a “one place” difference
between the alignments of its Deities [see DMG page 37, Alignment
Factors]). In the above example (the Southeron Kingdom, City of
Portsmouth), Imparte (the Benefactress) is Chaotic Good, Publius (the
Speaker) is Chaotic Neutral with Good tendencies, and Assorte is Chaotic
Neutral. All are of similar alignment, and their Credos are not
dissimilar, so a Cleric of one, might also recognize one or both of the
others. In this instance Imparte enjoys the position of “Most Exalted”,
having the majority of direct followers. The church is designated as
Chaotic Good with Neutral tendencies, as this is the direction of the
most “counts”, rational as follows.

Inclinations are: Good, Evil, Lawful, Chaotic, and Neutral.

The Primary Deity registers three (3) “counts” for each of its
Inclinations. The Secondary Deity registers two (2) for each of its
Inclinations, and the Tertiary Deity but one (1).

Tendencies are only half the normal value.

Add these “counts” up, the alignment is then derived from the
Inclinations with the most “counts”. In Portsmouth all of the
Inclinations are of Good, Chaos, and Neutral.

Inclinations
Good Chaotic Neutral Deity: Imparte
3 3 0 Publius 1
2 2 Assorte 0 1
1

Totals: 4 6 3

The results: Chaotic Good (heavy on the Chaos) with Neutral
tendencies.

Setting churches up like this will make the task of choosing
Deities much easier for the Cleric, as most priest will want to be
associated with just such an established organization. It also gives the
DM more control of the religious groups, and a better method of
recording them.

The Rules set forth in this article should facilitate religion
simulation, promote pantheonism, and greatly enhance any game while
keeping the effort at a minimum.

I hope you enjoy, and bid you good gaming.

The Circumstances Of Minor Planet Discovery, By Frederick Pilcher

THE CIRCUMSTANCES OF MINOR PLANET DISCOVERY

Frederick Pilcher
Illinois College
Jacksonville, IL 62650 USA

This file of minor planet discovery data has been prepared in machine
readable form for NSSDC and in hardcopy for ASTEROIDS II, (1988), ed. R. P.
Binzel, T. Gehrels, and M. S. Mathews (Tucson: Universiy of Arizona Press).
The machine readable list contains complete data for all numbered minor planets.
The hard copy contains complete data only for planets 2125 and forward, and
notes pertaining to these planets. Those for the preceding planets were listed
by the writer in ASTEROIDS, (1979), ed. T. Gehrels (Tucson: University of
Arizona Press), pp 1130-1154. A few mistakes in the first book have since been
found and corrected in the machine readable version, and the reader will note
small changes in the numbering of some of the NOTES. Diacritical marks for the
names of planets, increasingly omitted from machine readable lists, have been
added by hand to the hardcopy.

The first column, 4 characters, contains the permanent number; the second,
l6 characters, the official name; the third, for planets 330 and forward, the
provisional designation attached to the discovery apparition; the fourth, the
year, month, and day of discovery according to criteria explained below; the
fifth, the name of the discoverer, discoverers, or institution of discovery;
the sixth, the discovery place. The seventh column is used when needed for
notes referencing two or more discoverers with names of combined length too
great to fit in the discoverer column, to give a more complete description of
programs involving several persons, and to reference cases in which two
numbered planets were subsequently discovered to be identical and the number
and name of one of these was reassigned to a newly-discovered planet. Notes
have also been used to reference conflicting discovery claims and list
important independent discoveries which are no longer regarded as official.

The discovery date is in local mean time prior to 1 January 1925, and
in UT thereafter, and refers to the time of mid-exposure for planets discovered
by photographic means. In many cases the permanent number was assigned only
when several unnumbered planets observed in different years were found to be
identical, often many years after the discovery photographs were made. In
these cases the discovery date is the first of that series of photographic
observations from which the preliminary orbit was computed, and the provi-
sional designation is that associated with this particular set of observations.
Often earlier observations exist, but they are considered prediscoveries.
In some cases the discovery and subsequent observations permitted images to be
found on photographs obtained at the same observatory earlier in the discovery
apparition; these earlier observations are considered prediscoveries.

The following literature has been examined comprehensively to determine
the discovery data:

STRACKE, G., Identifizierungsnachweis der Kleinen Planeten (Berlin, 1938).
HERGET, P., Names of Minor Planets (University of Cincinnati Observatory,
1957, 1967).
Astronomische Nachrichten.
Astronomische Nachrichten Indices.
Monthly Notices of the Royal Astronomical Society.
Rechen-Institut Circulars.
Beobachtungs Zircular.
Minor Planet Circulars.
Lick Research Surveys on Minor Planets.
Turku Informo.

Acknowledgments. The authors wish to thank the following people for valuable
contributions to this work. B. Marsden has arduously searched the literature,
resolved various errors and discrepancies, and has passed judgment on con-
flicting discovery claims. J. Meeus and M. Combes have prepared an earlier
list of discovery data from which the present list was adapted and expanded,
and J. Meeus has provided a complete list of diacritical marks of names of
minor planets. K. Kelly and J. LoGuirato have proofread the material, and
provided coninuing advice and counsel.

A Very Massive Disclaimer

This product is meant for educational purposes only. Any resemblance to
real persons, living or dead is purley coincidental. Void where
prohibited. Some assembly required. List each check separately by bank
number. Batteries not included. Contents may settle during shipment.
Use only as directed. No other warranty expressed or implied. Do not
use while operating a motor vehicle or heavy equipment. Postage will be
paid by addressee. Subject to CAB approval. This is not an offer to
sell securities. Apply only to affected area. May be too intense for
some viewers. Do not stamp. Use other side for additional listings. For
recreational use only. Do not disturb. All models over 18 years of age.
If condition persists, consult your physician. No user-serviceable
parts inside. Freshest if eaten before date on carton. Subject to
change without notice. Times approximate. Simulated picture. No postage
necessary if mailed in the United States. Breaking seal constitutes
acceptance of agreement. For off-road use only. As seen on TV. One size
fits all. Many suitcases look alike. Contains a substaintial amount of
non-tobacco ingredients. Colors may, in time, fade. We have sent the
forms which seem to be right for you. Slippery when wet. For office use
only. Not affiliated with the American Red Cross. Drop in any mailbox.
Edited for television. Keep cool; process promptly. Post office will
not deliver without postage. List was current at time of printing.
Return to sender, no forwarding order on file, unable to forward. Not
responsible for direct, indirect, incidental or consequential damages
resulting from any defect, error or failure to perform. At
participating locations only. Not the Beatles. Penalty for private use.
See label for sequence. Substantial penalty for early withdrawal. Do
not write below this line. Falling rock. Lost ticket pays maximum rate.
Your cancelled check is your recipt. Add toner. Place stamp here. Avoid
contact with skin. Sanitized for your protection. Be sure each item is
properly endorsed. Sign here without admitting guilt. Slightly higher
west of the Mississippi. Employees and their families are not
eligible. Beware of dog. Contestants have been briefed on some
questions before the show. Limited time offer, call now to insure
prompt delivery. You must be present to win. No passes accepted for
this engagement. No purchase necessary. Processed at location stamped
in code at top of carton. Shading within a garment may occur. Use only
in well-ventilated area. Keep away from fire or flame. Replace with
same type. Approved for veterans. Booths for two or more. Check here
if tax deductible. Some equipment shown is optional. Price does not
include taxes. No Canadian coins. Not recommended for children.
Prerecorded for this time zone. Reproduction strictly prohibited. No
solicitors. No alcohol, dogs, or horses. No anchovies unless otherwise
specified. Restaurant package, not for resale. List at least two
alternate dates. First pull up, then pull down. Call toll free before
digging. Driver does not carry cash. Some of the trademarks mentioned
in this product appear for identification purposes only. Record
additional transactions on back of previous stub.

This supersedes all previous notices.

Neuropsychological Bases Of Educational Disabilities: Implications For Diagnosis And Remediation, By Robert Zenhausern, Ph.D., February, 1990 (January 8, 1993)

From: patth@sci.ccny.cuny.edu (Patt Bromberger)
Newsgroups: misc.handicap
Subject: Paper on Reading Disabilities
Message-ID:
Date: 8 Jan 93 20:00:12 GMT
Originator: wtm@sheldev.shel.isc-br.com
Lines: 1736

Index Number: 27023

NEUROPSYCHOLOGICAL BASES OF EDUCATIONAL DISABILITIES

Implications for Diagnosis and Remediation

Expert Paper Submitted to the United Nations
Disability Unit, Vienna
February, 1990

Robert Zenhausern, Ph.D.
Professor of Psychology
St. Johns University
Jamaica, NY 11439
USA

INTRODUCTION

The paragraphs below are in the form of a satire based on the
essay by Jonathan Swift entitled “A Modest Proposal” in which he
presented a solution to the “Irish Problem”. The parallel here is
Learning Disability and the inflexible ways these children are
taught. It is the objective of this paper to show that the problem
of the learning disenfranchised is one that can be solved by
increasing the flexibility with which we teach.
Another Modest Proposal:
A Swift Response to an Old Problem
The purpose of this essay is to examine the possibility that we
are systematically doing a disservice to a large segment of the
school population. Students who have auditory or visual
impairments have been allowed to use artificial means, such as
glasses or hearing aids, to correct their deficits. Indeed, it is
considered praiseworthy to identify such problems early and then
use the services of professionals who prescribe optical or
electronic devices which alleviate the deficiencies.
The consequences of such actions, however, have not been
considered fully. Such children may become lazy and make no
attempt to overcome their problems. What motivation will they have
to strengthen their perceptual weaknesses when such devices make
it unnecessary for them to do so? What will such people do if, for
whatever reason, such devices are not available? It is the
contention of this paper that artificial devices are crutches which
interfere with the complete development of the child. As such,
they should be eliminated.
Some might argue (and not without a modicum of validity) that
by eliminating those “support systems,” such children may not
progress beyond the elementary rudiments of learning. That,
however, should be secondary to the point that we are not dealing
directly with a serious problem. The fact that our present state
of knowledge does not allow us to correct such deficiencies should
not dissuade us from this course of action. Eventually specific
techniques will be developed to meet the problems of poor eyesight
and hearing in much the same way that techniques were developed to
alleviate reading and mathematical difficulties — and probably
with as much success. There is a minor problem in the fact that
many of the authority figures in the child’s environment use those
same artificial devices and thus do not serve as good role models.
Aside from the educational wisdom of this proposal, it has the
added advantage of eliminating the possibility of charges of
discrimination. Consider, for example, if someone raised the point
that a deficit in vision or hearing might be compared to a deficit
in arithmetic computation. They might argue that if vision can be
corrected by glasses why can a calculation deficit not be corrected
by the use of a calculator? It is difficult to counter these
arguments since the two deficits have so much in common. Even the
poor role model problem has a parallel since most of the authority
figures whom the children contact would have some difficulty in
taking a square root or doing long division of decimals by hand.
The conclusion is clear: take away glasses and hearing aids and
give the children with sensory defects the same advantages given
to children with calculation defects!
* * *
The essay is clearly satirical, but its point is clear. In
this Decade of the Disabled it is essential to consider the human
rights of the Learning Disabled to an education that more closely
fits their capabilities. The problems of the Learning Disabled are
unique because this is the only disabled group which is held
responsible for its disability. “If he worked harder, he could do
it”, says the frustrated teacher. No one expects a blind person
to see, if he or she “worked harder”. Furthermore, to call a child
“learning disabled” is to put the burden of responsibility on the
wrong person! It is our responsibility to teach much more than it
is the responsibility of the child to learn. It is we who should
be called teaching disabled. The purpose of this paper is to focus
attention on individual differences among both normal and learning
disabled children and to consider alternative approaches to
education and thus eliminate our teaching disability. The major
emphasis will be on the theory and remediation of reading
disability based on a 10 year program of research within a
neuropsychological framework. The initial Chapter will introduce
the concepts of cerebral asymmetry and hemisphericity and put them
in perspective for education today. The second Chapter will
discuss behavioral and physiological measures of individual
differences in neuropsychological functioning. The third Chapter
will describe a study that underlines the importance of these
individual differences in an educational setting. The fourth and
fifth Chapters will describe a series of studies dealing with the
theory, diagnosis and remediation of reading disability that has
been based on these neuropsychological concepts. The final Chapter
will be a summary that includes the basic information on the Direct
Access approach to reading with specific recommendations. It can
serve as an abstract of the whole paper.
This Introduction ends with a short quote, found hanging on
the walls of an elementary school in Greensboro, North Carolina and
attributed to Ken Dunn.

If children cannot learn the way we are teaching them,
then we must teach them the way they can learn.

CHAPTER 1
THE CEREBRAL HEMISPHERES OF THE BRAIN AND THE NEW PHRENOLOGY

Recent work in the areas of neuropsychology, especially that
of Sperry who won the Nobel Prize, has popularized the notion of
cerebral asymmetry. That is, the two hemispheres of the brain are
different in terms of the cognitive processes in which they excel.
There is clear evidence that the Left Hemisphere has unique control
of expressive speech and operates using a sequentially organized
system. The Right Hemisphere, on the other hand, has systems that
are more capable of spatially and pictorially oriented processing.

While there are clear differences between the hemispheres,
these differences have been overgeneralized into a new phrenology
of brain functions. A typical list of “Left Hemisphere Functions”
reads something like: logical, verbal, analytic, inductive,
controlled; the Right Hemisphere is often called: synthetic,
emotional, deductive, intuitive, and abstract. Some of these
labels are self-contradictory. The Left Hemisphere is called both
analytic and inductive and the Right Hemisphere both synthetic and
deductive. The term “abstract” has two diametrically opposed
meanings: an article abstract versus abstract art. These
inconsistencies aside, this neo-phrenological approach must be
rejected on the grounds that it is atomistic. A hemisphere is
neither verbal, logical, emotional, nor creative; it is a person
who has these characteristics! All behavior flows from the
integrated functioning of the whole brain. This does not mean,
however, that there are no individual differences associated with
the brain. The concept of Hemispheric Related Strategies provides
a framework on which to base an individual difference variable.
For the most part, the two hemispheres do the same things but
do them using different approaches. Cerebral asymmetries reflect
relative efficiency rather than a “can do-can’t do” dichotomy.
There seems to be one exception to this relative rather than
absolute difference between the hemispheres: for most people, only
the left hemisphere is capable of speech and of phonetic
representation (Levy, 1974). The isolated Left Hemisphere can tell
whether the two words “though” and “blow” rhyme but the isolated
Right Hemisphere can not, even though it may understand their
meaning. Rhyming demands that the written word be converted to an
auditory form and only the left hemisphere has this capability.
A second factor that differentiates the two hemispheres is their
type of processing systems: sequential for the left hemisphere and
parallel for the right hemisphere (see Bradshaw and Nettleton, 1981
for a review.) Compare these two situations: 1) You are given a
description of someone and must then identify that person; and 2)
You are shown a picture of the person and then must select the
person. The first task demands the sequential system of the left
hemisphere–the words, descriptive of the various facial features,
are read in sequence and must be combined into an overall
perception. The latter situation reflects the parallel system of
the right hemisphere — the picture is seen as a whole and various
facial features can be extracted. The picture is seen all at once
in parallel while the verbal description must be sequentially
processed. The sequential processing system of the Left
Hemisphere and its ability in speech production are the
characteristics that underlie the notion that the Left Hemisphere
is the verbal hemisphere. Language, by its very nature, is
sequential. Word order and syntax are essential to meaning–
language cannot be easily processed in parallel. Thus the left
hemisphere has been labeled the “verbal” hemisphere because its
sequential processing system is compatible with the sequential
nature of language, and its control of auditory linguistic
processes makes it essential for speech.
For other tasks, even though the processing system of either
hemisphere is compatible with the task, one hemisphere is clearly
superior. The example of face recognition shows intuitively that
the Right Hemisphere pictorial approach is better than a Left
Hemisphere written description. Note, however, that the task can
be done using Left Hemisphere strategies, but it takes a thousand
words to describe one picture. Spatial relations tasks are
also more easily handled using Right Hemisphere processes. Other
tasks can be handled equally well using the strategies of either
hemisphere. For example, a list of words could be learned by
converting and storing them as visual representations or in an
auditory form. The term Hemispheric Related Strategies can be used
to describe this relationship between observable behavior and its
underlying neuropsychological bases.

Hemispheric Cognitive Style
Two individuals, when faced with the same task, do not
necessarily use the same strategies, that is, people do things in
different ways. Sometimes those different approaches can be
associated with processing differences between the two cerebral
hemispheres. These different approaches can be termed Hemispheric
Related Traits. Hemispheric Cognitive Style is the tendency of an
individual to use distinct patterns of Hemispheric Related Traits.
It does not imply that one hemisphere is used exclusively, but that
individuals tend to approach tasks in unique and consistent ways.
For example, if a group of individuals were asked to remember the
words “dog, cat, tree, table, chair”, few would have difficulty.
If these same individuals were asked what strategies they used,
there would be wide variation. Some would report they repeated
the words to themselves, others that they “saw” the written form
of the word, and others would create images of the words.
These differences in memory strategies can be related to
Hemispheric Related Traits. A person who would be more likely to
use imaginal strategies could be said to use a right Hemispheric
Related Trait, and a person who used auditory strategies could be
said to use a left Hemispheric Related Trait. Some individuals
tend to use the Hemispheric Related Traits associated with one
hemisphere more than those of the other hemisphere and others show
little or no bias. Those who do favor the Hemispheric Related
Traits of one hemisphere can be said to have a Right or Left
Hemispheric Cognitive Style. It is important not to
overgeneralize the scope of Hemispheric Cognitive Style. The fact
that a person tends to use particular strategies implies neither
a disuse nor deficiency in one hemisphere of the brain. On a very
simple level, a right Hemispheric Cognitive Style individual has
access to the speech centers of the left hemisphere just as a left
Hemispheric Cognitive Style individual has access to the prosody
centers of the right hemisphere. Thus both right and left
Hemispheric Cognitive Style individuals rely on the integrated
functioning of both hemispheres for expressive speech, and, in
fact, all behavior. In an intact individual, no task can be
accomplished without the integrated functioning of both
hemispheres. To call an individual “left or right brained” is to
ignore the fact that all activity depends on the integrated
functioning of the whole brain. These differences, however, can
be related to different strategies with which people approach
specific tasks. One purpose of this paper is to show how these
strategy differences can affect the educational system. The next
chapter will describe how differences in Hemispheric Related Traits
can be measured. The following chapters will focus on the
application of these traits to mainstream and learning disabled
education.

CHAPTER 2
THE MEASUREMENT OF HEMISPHERIC COGNITIVE STYLE

Two distinct tools have been used in the measurement of
Hemispheric Cognitive Style, one behavioral and the other
physiological. The behavioral measure is a self rating
questionnaire and the physiological measure relies on the
predominant direction of Lateral Eye Movement (LEM).

The Hemispheric Preference Questionnaire
There are many questionnaires that have been used to measure
“hemisphericity” including many from popular magazines. Over the
past 12 years I have developed an instrument that has been
successfully used to separate right and left Hemispheric Cognitive
Styles. A copy of the questionnaire and its scoring key has been
included. The following studies used the instrument successfully.
Coleman and Zenhausern (1979) compared those who used right and
left Hemispheric Related Traits on a memory retrieval task. They
found the two groups differed on processing speed and the extent
of a left hemisphere bias induced by a verbal memory load. The
bias was four times stronger for the those who use left Hemispheric
Related Traits than for those who use right Hemispheric Related
Traits. Zenhausern and Nickel (1979) found that Right style
individuals learned a finger maze in fewer trials, in less time and
with fewer errors than Left style individuals. Zenhausern, Notaro,
Grosso, and Schiano (1981) presented right and left style
individuals with auditory messages in which there was a conflict
between verbal content and emotional tone of voice. Overall, those
who used right Hemispheric Related Traits responded significantly
more often to the inflection cues and those who use left
Hemispheric Related Traits significantly more often to the verbal
content. Zenhausern and Dunivin (1981) found that left style
subjects were more obsessive compulsive, while right style subjects
had more hysterical traits. Zenhausern and Parisi (1983) have
found that schizophrenics rate themselves as using left while
depressives rate themselves as using right hemisphere related
strategies. The instrument has been used in the area of
reading disability to distinguish two separate syndromes. Oexle
and Zenhausern (1980), Golden and Zenhausern (1981), Zenhausern
and Sinatra (1983), Maxwell and Zenhausern (1983) have found that
85% of reading disabled children rate themselves as using more
right than left hemisphere strategies. A copy of the test and its
scoring key can be found in Table 2.1.

Lateral Eye Movements
Research into the phenomenon of lateral eye movements (LEM)
as a behavioral measure of neuropsychological activity has been
pursued along two separate dimensions. LEM have been considered
a measure of both individual differences and task demands. From a
neuropsychological perspective, the individual difference aspects
have been associated with the concept of cognitive style and the
effects of task demands with hemispheric asymmetry. There is,
however, considerable controversy as to whether LEM do indeed have
neuropsychological relevance. The importance of LEM has been
overgeneralized to the point of faddism, which has led to a general
reluctance on the part of the scientific community to give them
credence. In addition, researchers in the area have sometimes
failed to distinguish between these two different aspects of LEM.

Table 2.1
The Preference Test for Hemispheric Related Strategies

Indicate your choice by assigning a number from 1 to 10 (with 1
being the lowest) on each question. To score the test, refer to
the scoring key below. Add the ratings for all the items that are
to be scored right and those that are to be scored left, subtract
the two and divide by 10. The larger number shows the predominant
preference and the greater the difference the larger the HRS
preference. You should then develop your own local norms, but as
a rule of thumb a score of .7 or higher can be considered a clear
indication of a preference for a Hemispheric Related Strategy.

Test Items

1) Do you base your decisions on objective facts rather than
feelings?
2) Are you psychic?
3) Do you like using symbols or images in solving problems?
4) Are you artistically or musically creative?
5) Are you logical?
6) Are you good at solving crossword puzzles?
7) Can you read quickly?
8) Are your daydreams vivid?
9) Can you think of synonyms for words easily?
10) Do you remember dreams?
11) Are your dreams vivid?
12) Are you fluent in using words?
13) Are you good at using images in remembering and thinking?
14) Do you use a playful approach to problem solving?
15) Do you use a serious, all business approach to problem
solving? 16) Do you like to keep experiences planned and
structured?
17) Do you like to read or think while sitting upright?
18) How much does your thinking consist of words?
19) How much does your thinking consist of mental imagery?
20) Do you like to explain something using visual presentation?

SCORING KEY

Item Scoring
1 L
2 R
3 R
4 R
5 L
6 L
7 L
8 R
9 L
10 R

Item Scoring
11 R
12 L
13 R
14 R
15 L
16 L
17 L
18 L
19 R
20 R
Individual Differences and LEM
Research into whether LEM
reflect individual personality differences was initiated by Day
(1964), who reported that the direction of LEM was related to
individual styles of coping with anxiety. Bakan (1971) was the
first to propose that the direction in which a person consistently
shifted gaze was related to which of the cerebral hemispheres an
individual used more often.
The relationship between LEM and various dimensions of
individual differences has been explored. Tucker and Suib (1978)
found that left-movers had higher scores on the Performance tests
of the WAIS and did better with imagery oriented questions while
right-movers had better scores on the Verbal subtests of the WAIS
and with questions that were letter and number oriented (e.g., how
many letters are in the word house). Gur and Gur (1975)
showed a relationship between direction of LEM and defensive style.
Predominantly rightward movers more often reported using projection
and “turning against others” as their main defenses, while
predominantly leftward movers reported using repression and denial
more often. LEM were again shown to be related to defensive styles
in males as measured by the Defense Mechanism Inventory (Krikorian
and Rafales, 1983). This effect was not replicated with females,
however (Thompson, Greenberg, Fisher, 1982). In addition, subjects
who moved their eyes bidirectionally rather than predominantly to
the left or the right were shown to have better adaptive coping
styles ratings on the adjective check list (Parrott, 1984).
Smokler and Shevrin (1979) showed that normal subjects with
hysterical tendencies made more leftward LEM than subjects with
obsessive compulsive tendencies. The latter group was more likely
to show rightward LEM. Gur (1978) and Schweitzer (1979) found that
schizophrenics had predominantly leftward LEM.
The relationship between LEM and cognitive styles has also
been explored. Subjects, who scored as left or right style
oriented on the Laterality Preference Schedule, were shown to have
consistent patterns of LEM, indicating the existence of consistent
patterns of information processing (Breitling and Bonnet, 1985;
Bruce, Herman, and Stern, 1982). When using the Your Style of
Learning and Thinking Test (SOLAT) to measure style of thinking,
however, no relationship was found between LEM and thinking style
preference (Alberts and McCallum, 1982). In addition, Owens and
Limber (1983) found no relationship between cognitive style and
LEM.
One area of interest in the cognitive style research is the
relationship between what are considered right style ways of
thinking (holistic and broad) and left style ways of thinking
(analytic and narrow) based on proposed functions of the individual
hemispheres. In support of the theory that eye movements indicate
hemispheric activation, and that left hemisphere activation is
associated with more analytic and narrow styles, Huang and Byrne
(1978) showed that narrow categorizers based on the Pettigrew’s
Category Width Scale made more leftward LEM than broad
categorizers.
Another area of interest has been the relationship between the
ability to recall dreams and LEM. Predominantly leftward LEM have
been associated with the ability to vividly recall dreams in male
subjects (Leboeuf, Mckay, Clark, 1983), but the same has not been
found with females (Van Nuys, 1985). A related issue is that of
creativity and LEM. Leftward eye movement has been associated with
thinking of more uses of objects on the Uses Test, which is often
used as a measure of creativity (Falcone and Loder, 1984).
Zenhausern (1987) has shown that LEM can differentiate between two
different types of reading disabled children. Specifically,
rightward LEM are characteristic of reading disabled children who
are unable to derive meaning from the written word despite being
able to say it. Leftward LEM are characteristic of reading
disabled children who are unable to pronounce the word despite
understanding what it means. This sampling of research indicates
the scope of individual differences that have been associated with
LEM. In their critique of the LEM literature, Ehrlichman and
Weinberger (1978) concluded that LEM are reliable measures of
individual differences. They found that despite differences in
methodology and experimental situations the direction a person
moves his or her eyes is a consistent behavior of that individual.
The individual difference studies above indicate their behavioral
relevance.

Functional Hemispheric Asymmetry and LEM
A second perspective on the nature of LEM was introduced by
Kinsbourne (1972) who proposed that LEM reflect the task demands
on the subject. He suggested that those tasks that require input
predominantly from the left hemisphere resulted in rightward LEM,
the direction away from the left hemisphere; those tasks that
required predominantly right hemisphere functions resulted in
leftward LEM, away from the right hemisphere. There has been
mixed support for this relationship between LEM and question type.
The critical variable has usually been whether rightward LEM are
associated with verbal questions, indicating a relationship between
a verbal task and left hemisphere activation. A wide variety of
what have been called “verbal” questions have been used, however.
Galin and Ornstein (1974) reported a relationship between
rightward LEM and logical problems and leftward LEM and visual
imagery tasks. Proverb interpretation has been shown to be
related to rightward LEM (Kinsbourne, 1972; Gur, 1975). Schwartz,
Davidson and Maer, 1977, found a relationship between LEM and task
demands. There have been recent reports of relationships
between both rightward LEM and verbal questions (Hugdahl and
Carlgren, 1981; Ogorman and Siddle, 1981) and leftward LEM and
visual spatial tasks (Swinnen, 1984). In addition to the
verbal/non-verbal dichotomy, emotionally laden questions were used
to elicit predominantly leftward LEM (Krikorian and Rafales, 1983;
Jamieson and Sellick, 1985).
Not all studies have resulted in significant findings. In
fact, Ehrlichman and Weinberger concluded that the evidence for a
relationship between LEM and question type was not convincing on
both empirical and theoretical grounds. From the empirical point
of view, they noted that of the 21 studies reviewed, 10 resulted
in rightward movement in response to verbal questions, and 11
resulted in no difference in LEM to verbal and non verbal
questions. The authors concluded that the literature thus did not
offer strong support that LEM were related to question type.
A re-evaluation of the empirical studies, however, indicates
that there is a consistent relationship found between the type of
question asked and the direction of LEM. In only one of the 21
studies reported by Erhlichman and Weinberger did verbal questions
lead to leftward LEM. While the conclusion that verbal questions
lead to rightward LEM may be in question, the conclusion that
verbal questions do not lead to leftward LEM is strongly supported.
There may be a relationship between task demands and LEM, but it
is not a simplistic “verbal question leads to rightward LEM
relationship”.
There is clear evidence that LEM are related to both the type
of question asked and individual difference factors. Therefore,
in any situation, LEM reflect the type of question asked
interacting with the individual differences and it is essential to
separate the two effects.
Two distinct tasks were used in a study by Zenhausern and
Kraemer (1989) to investigage the dual nature of LEM. One task is
purely informational and cannot be uniquely connected with either
hemisphere of the brain. The second task involves rhyming of non-
words which clearly demands the speech centers of the left
hemisphere. Two experimental questions were addressed. 1) Is the
direction of LEM consistent within an individual both across time
and across tasks? 2) Does the type of question asked have an
effect on the direction of LEM?
A total of 50 adult subjects were tested. There were 16 males
and 34 females, with an average age of 27 and a range of 16 to 50.
The stimuli for the rhyme task were four to five letter nonsense
words printed in black ink on white index cards and a series of
prepared questions.
The subjects were informed that they were participating in a
study involving the different ways in which people think. They
were asked two kinds of questions in a face to face encounter with
the experimenter. The subject responded yes or no with a nod or
shake of the head and the initial direction of eye movement to each
of 40 questions was recorded for each subject. These non-verbal
responses were used to eliminate left hemisphere involvement
through speech which was unrelated to the task. The 20
informational questions did not call on any clearly defined brain
areas (Is Miami the capitol of Florida?). The 20 rhyme questions,
on the other hand, clearly demanded the auditory linguistic
capabilities of the left hemisphere. The subject was shown a
nonsense word on an index card and told to remember it. The card
was removed and another nonsense word was verbally spelled by the
examiner and the subjects were asked whether the two words rhymed.
The subjects were tested in two blocks of 20 trials separated by
30 minutes. Within each block 10 informational and 10 rhyme
questions were asked.
The data were first explored by means of a correlational
analysis. Both test-retest and split half reliabilities for
informational questions and for rhyme questions are shown in Table
2.2. In addition, the correlation between rhyme and informational
questions is also presented. LEM are clearly a consistent measure
of individual differences with reliability coefficients averaging
approximately .80 for the same type of question. When the type of
question was changed, however, there was a dramatic drop in the
consistency of LEM although the correlations were still
significant. The direction of LEM changed as a function of task
demands, but not to the extreme that would result in no
correlation.

Table 2.2
Intercorrelations Among LEM for Information and Rhyme Questions

Split Half Test Retest
Rhyme .85 .78
Information .79 .83
Rhyme with Information .59

An initial analysis on the two 20 question blocks indicated
no significant differences and the two were collapsed into a single
set of questions. The data were then analyzed by means of a split-
plot analysis of variance with LEM Group (whether a subject had
predominantly rightward or leftward movement) as a between factor
and Task (Rhyme and Informational questions) and Direction of
Movement (Right, Left, and Stares) as between factors. Since the
scores are ipsative and the Grouping factor and dependent variable
are related, only the interactions are of interest in this design.
There was a significant interaction between the Direction of
Movement and Task. The results are shown in Table 2.3 below.

Table 2.3
Number and Direction of LEM as a Function of Type of Question

Task Direction of LEM
Right Left Stare

Rhyme 6.82 7.64 4.92
Information 5.50 7.50 6.50

Simple effects analysis indicated that the number of leftward
LEM to informational and rhyme questions were not significantly
different, but there were significantly more rightward LEM than
leftward LEM to rhyme questions. There were no interactions
involving the LEM Group factor, indicating that the effects of the
type of question were the same for both groups.
These results lead to two conclusions. The first is a
verification of the Ehrlichman and Weinberger (p 1093) conclusion
“…that LEM patterns are reliable characteristics of persons.”
Individuals do move their eyes in a consistent direction and
direction of LEM is a reliable measure of individual differences.
The questions, however, remain as to whether LEM differences can
be related to behavior and whether these behaviors have
neuropsychological implications. Some of the research reported
above has shown the scope of the variables that have been related
to differences in LEM. (A fuller listing can be found in Beaumont,
Young, and McManus, 1984). Not every study has shown that LEM
differences were related to differences in performance, but no one
should expect LEM to be related to all behavior.
The final question remains, however, as to whether LEM have
neuropsychological implications. In a very general sense, all
behavior results from brain activity and thus all behavior has
neuropsychological implications. From a more focused point of
view, LEM have been related to behaviors that neuropsychologists
have associated with the brain. The problem has been, however,
that the association of the behavior with the brain has not always
been clearly specified. Logical problems, proverbs, and spelling
have all been used as verbal tasks. These tasks are extremely
complex and clearly involve both hemispheres of the brain, even
though there may be a portion of the task that is especially
dependent on left hemisphere processing. This was clearly shown
in the present study since the rhyming task demanded the unique
ability of the left hemisphere to create the sound of the printed
word. The information task had no such clear connections to either
hemisphere of the brain. Both the correlations and analysis of
variance results pointed to the fact that LEM were different for
the two tasks, with an increase in the number of rightward
movements for the rhyming task. This change, however, was
relatively subtle. Even though the task demanded specific left
hemisphere input, subjects did not make predominantly rightward
LEM; there was only a shift in that direction. A subject who made
predominantly leftward movement continued to do so, but the number
of rightward movements increased and the number of stares
decreased.
Lateral Eye Movements have been shown to be a reliable measure
of individual differences, as well as a response to the type of
questions asked. The importance of both aspects, however, should
not be overemphasized. The individual difference aspect must be
investigated from a more behavioral point of view. Rather than
comparing a lawyer or a scientist with an artist, determine whether
a courtroom lawyer has more in common with an actor or a corporate
lawyer, or whether a geometrician has more in common with an artist
or an algebraist.
The LEM response to task demands must also be considered in
conjunction with the fact that any task demands the integrated
functioning of the whole brain. The variable extent to which a
task places special emphasis on one hemisphere must be considered
within this integrated functioning. LEM can be a useful tool, but
their value and meaning can be misunderstood all too easily. The
next Chapter provides evidence of the usefulness of LEM within a
normal classroom setting.
This chapter has presented the evidence that Hemispheric
Related Strategies can be measured by means of questionnaires and
LEM. The following chapters will provide evidence that this
individual difference variable has significance for education.

Chapter 3
THE INTERACTION OF HEMISPHERIC RELATED STRATEGIES
AND INDIVIDUAL DIFFERENCES

The purpose of this Chapter is to provide evidence that the
individual difference aspect of LEM has meaningful behavioral
correlates in an educational setting. No assumptions were made as
to the neuropsychological substrate of LEM. They were used simply
as a means of dividing subjects into two groups: those who move
their eyes predominantly to the right and those who move them
predominantly to the left. Half of the right movers were taught
a learning strategy involving verbal rehearsal and the other half
a learning strategy involving imagery. The same procedure was
followed for the left movers. The question was whether there is
a relationship between the typical direction of LEM and the
effectiveness of the two learning strategies.
The subjects were drawn from a pool of 120 average or above
average fifth and sixth graders in a suburban school system. A
series of verbal, spatial, imaginal, and informational questions
were asked in a face to face situation and the 72 subjects who had
the most extreme number of left movements and the most extreme
number of right movements participated in the study. The subjects
were divided into equal numbers of male and female right and left
movers.
Seventy-two words appropriate to fifth and sixth graders and
matched for abstractness, concreteness, and imagery were chosen
from the list provided by Pavivo, Yuille, and Madigan (1968). Two
equivalent sets consisting of 18 pairs, created from this list,
served as the learning stimuli. Two distractor lists of 12 pairs
each were also created using the same procedure. Each pair was
then photographed and developed as 35mm slides.
Each subject, tested individually, was seated approximately
4 ft. from a screen on which the 18 pairs of words were presented
by means of a slide projector for 4 sec. The child was then asked
to recall as many pairs of words as possible and the number of
correct pairs served as one dependent variable. The subjects were
then shown 24 pairs of words, half of which they had already seen
and half of which were distractors. These slides were then
presented and the subject had to indicate by switch closure whether
they had seen the word pair. Both accuracy and response time (in
milliseconds) were measured. Following this pre-training
procedure, half of the subjects whose LEM were predominantly
leftward and half whose LEM were predominantly rightward, were
taught a verbal rehearsal strategy in order to improve performance.
They were instructed to repeat the pairs of words as many times as
possible during the 4 sec interval between pairs. They were then
given six practice trials. The remaining subjects were instructed
on how to form an integrated image from the word pairs. They were
also given six practice trials. The subjects were then tested on
18 new pairs of words using the same procedures as in the pre-
training condition. This effectively created four groups: right
movers taught to use either imagery or verbal rehearsal strategies
and left movers taught the same strategies.
There were three dependent measures that were analyzed in this
study: the number of pairs recalled, the number of pairs
recognized, and the response time for recognition. The design for
all three variables was a split plot factorial with Direction
(leftward or rightward LEM) and Strategy (verbal rehearsal or
imagery) as the between factors and Time (before or after
training) as the within factor. The mean number of correct pairs
recalled under all conditions is shown in Table 3.1.

Table 3.1
Mean Number of Word Pairs Recalled for Right and Left Movers Under
Verbal Rehearsal and Imagery Instructions

Set Pre Test Post Test

Verbal
Left Movers 3.39 1.78
Right Movers 1.89 2.61
Imagery
Left Movers 2.61 3.28
Right Movers 2.39 2.56

The analysis of variance indicated no significant differences
involving Direction or Strategy, but there was a significant
interaction of Direction, Strategy. and Time. Simple effects
analysis indicated that children with rightward LEM did not change
as a result of imagery instructions, but made a significant
improvement as a result of verbal rehearsal instructions. Children
with leftward LEM made a significant improvement as a result of
imagery instructions, but showed a significant decrement as a
result of verbal rehearsal instructions.
Mean performance for the recognition scores is presented in
Table 3.2. The analysis of variance again indicated a significant
interaction between Direction, Strategy and Time.

Table 3.2

Set Pre Test Post Test

Verbal
Left Movers 29.28 27.61
Right Movers 28.11 29.44
Imagery
Left Movers 29.56 30.67
Right Movers 29.89 29.44

The simple effects analysis indicated that children with
rightward LEM showed a significant improvement using a verbal
rehearsal strategy and children with leftward LEM showed a
significant decrement using a verbal rehearsal strategy. The mean
reaction times for the recognition task is shown in Table 3.3. The
analysis of variance indicated that there was an overall decrease
in reaction time from pre to post testing and the same significant
three way interaction of Direction x Strategy x Time.

Table 3.3
Mean Reaction Times (in milliseconds) for the Recognition Task

Set Pre Test Post Test

Verbal
Left Movers 2059 2118
Right Movers 2447 1894
Imagery
Left Movers 2244 1829
Right Movers 1846 1627

Statistical analysis indicated that children with rightward
LEM were significantly faster using a verbal rehearsal strategy and
children with leftward LEM were significantly slower using a verbal
rehearsal strategy. The analyses of the three variables lead to the
single conclusion that children who have predominantly leftward LEM
should not be taught by a verbal repetition strategy.
From the theoretical perspective, these results support the
findings of Ehrlichman and Weinberger that LEM are a reliable
measure of an individual difference variable. It also provides
evidence of the validity of LEM; individuals who differed on LEM
showed differences on a relevant behavioral measure — verbal
learning. The most important question, however, is whether LEM
have any relationship to brain organization. Individuals who had
predominantly rightward LEM showed better retention when using the
left hemisphere oriented strategy of verbal rehearsal and
individuals who had predominantly leftward LEM showed decreased
retention when using the left hemisphere oriented strategy. These
are the facts, and while it is premature to draw firm conclusions,
these facts are consistent with the existence of a relationship
between LEM and brain organization. The clearest conclusion
from these findings is that children differ in the extent they can
benefit from a verbal repetition strategy in learning. From the
educational perspective it is clear that there are children in
schools who not only do not benefit from a verbal rehearsal
strategy, but whose performance is actually decreased. Spelling
and arithmetic tables are examples of subjects that usually stress
a rote memorization based on oral repetition. One alternative
would be to have the child repeatedly image the letters of the word
or number facts without verbalizing them. When it came time to use
the word or number fact the child would recall the image.
Educators must become more aware of the individual differences in
the way people learn. This becomes even more evident in the next
chapter where these individual differences can be seen to be at the
heart of what has been called reading disability.

Chapter 4
THE DIAGNOSIS OF READING DISABILITY

Although there is general agreement that reading disability
is not a single entity, there is considerably less than a consensus
as to the number of different syndromes that actually exist.
Neuropsychological assessment, the types of errors made with verbal
material, cognitive tests, and differences in processing strategies
have all been used in the classification of the reading disabled
into symptom-related subtypes. As many as five different subtypes
of reading disability have been found through the use of
neuropsychological tests.
For example, Mattis, French and Rapin (1978) reported three
groups and Doehring, Honshko, and Byans (1979) distinguished four
types. Fisk and Rourke (1979) Petroskas and Rourke (1979) have
identified subgroups which were consistent. These subtypes,
however, can be considered in terms of the presence or absence of
auditory linguistic deficits, a distinction reported throughout the
reading disability literature. Subtypes that include auditory
linguistic deficits comprise 80 to 90 percent of the total
population of reading disabled children. The smaller group has
usually been reported to show deficits in visual spatial
processing.
Boder (1973) examined the nature of the spelling errors made
by reading disabled children. She used the term dysphonetic to
describe the type of reading disability marked by linguistic and
phonetic difficulties; and the term dyseidetic to describe the type
which had difficulties with the overall visual spatial aspects of
the written word. Boder estimated that the dysphonetic group was
four to five times more prevalent than the dyseidetic group.
Pirozzolo (1979) used ratings, writing samples, and psychological
and neuropsychological tests to separate two reading disability
groups that were similar to those suggested by Boder. Bakker
(1982) proposed a similar distinction that he related to
hemispheric functioning. The auditory linguistic disabled reader
was not effective in the use of left hemisphere related tasks.
There was also an association of the visual spatial disabled reader
and the effective use of right hemisphere related strategies.
Zenhausern (1987) distinguished these two types on the basis
of both reading related tasks and the predominant direction of
their lateral eye movements. He found that the majority of
children with leftward lateral eye movements had difficulty
determining whether words in their sight vocabulary did or did not
rhyme. He also found that a group of children with predominantly
rightward lateral eye movements had no difficulty in determining
whether two words rhymed, but were deficient in determining whether
words and pictures represented the same concept. The auditory
linguistic group had difficulty converting a word to its sound and
the smaller group showed deficits in converting a word to its
meaning. He used the terms Phonetic and Semantic to describe this
distinction. From a behavioral perspective, phonetic disabled
readers are the children who struggle with every word when they
read aloud and thus lose continuity in the text. They are
frequently anomic and have a general difficulty with the auditory
linguistic aspects of reading, especially the grapheme to phoneme
conversion. The Semantic disabled reader, on the other hand, is the
child who will give a perfect word for word rendition of text, but
has no comprehension of the meaning of that text. The Semantic
disabled readers can convert words into their phonetic
representation, but this representation is not converted into its
meaning. They have no problems with the sound of a word but are
at deficit for tasks involving the meaning of words.
The original study was based on 13 Phonetic and 13 Semantic
readers from the second to fourth grades. One purpose of this
research was to determine whether these Phonetic and Semantic
subtypes would replicate across the entire elementary school
population. A second goal of this study was to replicate the
second finding of the original study. The Phonetic disabled readers
moved their eyes predominantly to the left and Semantic disabled
readers predominantly to the right. This second purpose was an
attempt to determine whether lateral eye movements can be used as
a marker variable for the two types of reading disability.
The subjects in this study were 160 children from the second
to the eighth grades. All were of at least average intelligence.
Forty children were selected at grades 2 or 3, grades 4 or 5,
grades 6 or 7, and grade 8. Of the 40 children at each age level,
20 were at or above grade level and 20 children were at least one
year below grade level in reading. Half of each group were chosen
on the basis of showing rightward LEM and half leftward LEM. The
predominant direction of LEM was determined individually for each
child. A series of 20 informational questions were asked in a face
to face situation and the predominant direction of LEM was noted.
Normal readers split evenly between right and left movers, but 84%
of the disabled readers were left movers.
There were four kinds of reading related tasks that used words
selected from the individual sight vocabulary of each child. A
rhyme task stressed the auditory linguistic aspects of the written
word and the remaining three tasks placed more emphasis on the
meaning of the words.
1) The rhyme stimuli consisted of 10 each of four types of
word pairs: a) words which neither rhymed nor had similar
orthography (tree/eats); b) words which were both phonetically
and orthographically similar (pool/cool);
c) words which were orthographically similar, but did not
rhyme (bone/gone); and d) words which were orthographically
dissimilar, but rhymed (by/tie). 2) The word match stimuli
consisted of 20 word pairs, one in upper case the other in lower
case which did or did not represent the same word (TREE/tree,
TREE/eats).3) The word/picture stimuli consisted of 20 word and
picture pairs, in which the word and picture did or did not
represent the same concept.
4) The synonym/antonym pairs consisted of words which meant
either the same or the opposite.
Each stimulus was presented on 35 mm slides and projected for
130 ms. The subjects were tested individually and responded
verbally as to the whether the words rhymed in the rhyme condition
and whether they matched or meant the same in each of the three
other conditions. All words used in the study were determined to
be in the sight vocabulary of all subjects on the basis of prior
testing.
The number of correct responses for all children on the four
grade levels was subjected to an analysis of variance for each of
the four tasks. The grouping factors included Grade Level, Reading
Ability, and Eye Movement Direction. The normal readers achieved
virtually perfect performance on all tasks and their results were
not included in the tables. The interaction of eye movement group
and the rhyme task was significant. The mean number of correct
responses for the interaction are presented in Table 4.1.

Table 4.1
Mean Number Correct on the Rhyme Task for Disabled Readers with
predominately Right and Left LEM at Four Grade Levels

LEM Grade Similar Dissimilar
Rhyme Non-Rhyme RhymeNon-Rhyme

Right 2-3 17.80 15.20 14.80 14.00
4-5 17.80 17.80 16.40 17.89
6-7 17.80 18.60 18.60 19.30
8 19.90 19.80 19.10 19.70
Left 2-3 16.10 5.90 7.40 14.40
4-5 16.10 10.30 10.20 17.30
6-7 16.80 13.60 12.50 18.50
8 9.60 12.00 10.40 17.60

On the basis of the simple effects analysis, those children who
had predominantly leftward eye movements were significantly more
impaired than those who moved predominately to the right. This was
particularly true on those conditions for which the orthography and
phonology of the words were inconsistent (bye/tie or bone/gone).
Those children with predominantly leftward lateral eye movements
are the Phonetic disabled readers who have difficulty with the
auditory linguistic aspects of reading. The analyses of
variance for the semantic tasks indicated a significant difference
between disability groups. The results from the three tasks are
presented in Table 4.2. Table 4.2
Mean Number Correct on the Uppercase/lowercase, Word/picture and
Synonym/antonym tasks for Disabled Readers with Right and Left LEM
at Four Grade Levels

LEM Grade Case Word Synonym

Right 2-3 15.70 7.90 8.65
4-5 17.50 7.80 6.55
6-7 18.80 13.40 13.05
8 15.90 15.90 15.00
Left 2-3 19.00 17.50 17.15
4-5 19.30 19.30 17.45
6-7 18.10 19.10 18.75
8 17.40 19.70 17.40

Again the normal readers performed almost flawlessly and the
disabled readers were inferior at every grade level. It was the
reading disabled readers with predominantly rightward LEM who were
the significantly more disabled group for these tasks. They were
significantly inferior on the word matching task, the word picture
task and the synonym antonym task. These children could create the
sound of a word from its orthography, but did not understand the
meaning of that word. This is a replication of a second type of
disabled reader, a Semantic subtype whose deficit involves the
meaning of words rather than their phonology. Rightward lateral
eye movements are a marker for this subtype. In the past, this
subtype has often been identified with visual spatial and
perceptual problems. This may be true but it is incidental to
their reading disability since they had no difficulty in perceiving
the words in the rhyme task. These results support the existence
of two subtypes of reading disability. The Phonetic disabled
reader has difficulty converting the written form of a word to its
phonetic counterpart. The Semantic disabled reader can convert a
word to its sound, but not its meaning.
There were two distinct patterns of errors made by the Phonetic
and Semantic disabled readers, but what is the relationship between
these patterns and reading disability? The answer to this question
lies in the way we teach reading. The next chapter is a discussion
of how these two deficits interact with current reading methods and
the effectiveness of a different approach to the reading process.

CHAPTER 5
THE THEORY AND REMEDIATION OF READING DISABILITY

Current teaching methods almost invariably use an indirect
phonological route to meaning in which the written word is
converted to its phonological counterpart so that meaning derives
from auditory comprehension. In practice, a child comes to school
with auditory comprehension, that is, hearing the word “ball” leads
to the concept of “a round, bouncy thing”. In reading, the letters
b-a-l-l must lead to the concept of “a round, bouncy thing”. In
virtually every case, the child is taught to see the word, say it,
and understand it from its sound. This is an effective technique
for two reasons. First, it takes advantage of the existing auditory
comprehension of children; second, it provides the background for
the future decoding of new words. As effective as this procedure
is for most children, a significant number of individuals are not
able to learn under this protocol and they comprise the majority
of the children we term “reading disabled.”
The Phonetic disabled reader has difficulty with the first step
of this indirect phonological route to reading, converting the
graphemic form of the word into its phonological counterpart. The
Semantic reading disabled readers have no difficulty with this
first step; they can make the grapheme to phoneme conversion. For
whatever reason, however, the sound of the word does not lead to
its comprehension.
The standard methods of teaching reading are well-entrenched and
educators sincerely believe that this indirect phonological route
to meaning is the best. Therefore, remediation for these “disabled
readers” means an intensification of what was not successful in the
past. Extensive drilling in phonetic skills has led to an emphasis
on teaching to weakness, rather than strength. The imbalance is
reflected in reading curricula and standardized tests that stress
phonetic decoding at the expense of comprehension. Phonetic
decoding is a means to the end of comprehension; it has become an
end in itself.
A new approach, Direct Access, has been developed which achieves
comprehension without the necessity of decoding. The Direct Access
method has one basic principle: the meaning of the printed word
should not be derived from the sound of that word. Any procedure
that avoids the grapheme to phoneme conversion is consistent with
this approach. The child is never required to read aloud, but
asked to explain what a passage meant. Trivial deviations in
verbiage, e.g., “jet” for “plane”, are de-emphasized. The stress
is on comprehension rather than a slavish word for word decoding.
One of the simplest procedures used in the method involves
pairing words and pictures until the written word triggers a
concept directly, rather than indirectly through its sound. The
child can then construct sentences composed of pictures in parallel
with sentences composed of words. Children automatically fill in
words like “a”, “the”, “in”, etc. when they comprehend the
sentence. In a very short period, the pictures are no longer
needed and the written word is understood on its own.
Several techniques are available for more abstract concepts.
One possibility involves a class discussion of, for example, our
legal system. The teacher can then show the class the word
“justice” and ask the children to draw a picture of justice. It is
not the picture itself that is important, but it serves as a link
between the written word and its conceptualization by the child.
Another possibility is a homework assignment requiring the child
to bring pictures to school that represent specific concepts.
Direct Access places only one constraint on the creativity of
teachers: Do not teach reading by deriving the meaning of a word
from the way it sounds. Phonic decoding is a skill that should be
developed, but it should not serve as the usual reading strategy
for these two groups of readers.
Maxwell and Zenhausern (1983) applied the method to First Grade
children who were “at risk” during the second semester. After 25
half-hour sessions, the children increased their comprehension
scores from the 26th to the 56th percentile on the Metropolitan
Achievement Test and increased their sight vocabulary by over 100
words. A comparable control group showed no gain in comprehension.
Minardi, Zenhausern, and Maxwell (1984) found similar results with
Junior and Senior High School children. Using the same regimen of
25 half-hour sessions, the Junior High School students gained an
average of 7 months and the Senior High School students an average
of 1.4 years.
The previous research on the Direct Access method of reading has
been limited to a small number of children taught by a single
teacher. The purpose of this study was to apply the method in a
large scale basis, using a broad range of grades and teachers.
A total of 209 children from grades 1 through 10 (with the
exclusion of Grade 9) who were at least one year below grade level
in reading and 240 children who were reading at least on grade
level were the subjects in this study.
A workshop explaining the theory and practice of the Direct
Access reading method was presented to teachers throughout a 32
school District in suburban North Carolina. After the workshop was
completed, those teachers who were interested were given further
experience. There were no absolute procedures specified, but the
teachers were shown various possibilities and were told to use any
techniques that did not depend on the indirect phonological route
to meaning. Following these sessions the children in the classes
taught by the teachers were given the Metropolitan Achievement Test
Form L as a pretest measure of their reading ability. The teachers
then used the Direct Access method exclusively for 10 weeks, after
which time the children were retested on the Metropolitan
Achievement Test Form M.
The results of the reading disabled children and a control group
are presented in Table 3. The average gain across the whole group
was almost 1 year and several grades showed gains of over 2 years.
Individual gains of 4 or more years were not uncommon. Given that
these results were obtained during only a 10-week period, the
Direct Access approach is clearly an effective strategy to use with
Phonetic and Semantic reading disabled children. In addition to
these objective gains, the teachers reported an extremely positive
reaction on the part of the students and have commented on the
effects of the method on both spelling and writing composition.
During the past year (1988-89) Greensboro and High Point, North
Carolina used the Direct Access approach. The average gain on the
State mandated California Achievement Test was over 20 percentile
points for those children. As a result, High Point has mandated
the Direct Access approach as the treatment of choice for children
who are “at risk” for reading. The approach has been used in
Currituck, North Carolina since September, 1989 and at Public
School 102 in New York City since January, 1990. There are plans
for incorporating Direct Access into a psychiatric hospital for
children, a Parochial school in New York City, and a school system
in East Greenwich, Rhode Island by February, 1990.

Table 1
Total Gains in Percentile and Grade Equivalent Scores for Direct
Access and Controls

Pre Post Gain
Per Grade Per Grade Per Grade

Grade 1
DA (38) 7 1.09 32 1.55 25 0.46
Control (27) 46 1.79 56 2.13 10 0.34
Grade 2
DA (21) 17 1.76 32 2.15 15 0.39
Control (36) 54 2.89 58 3.19 40 0.3

Grade 3
DA (28) 16 2.33 31 2.99 15 0.66
Control (28) 56 4.49 61 4.94 5 0.45

Grade 4
DA (52) 15 2.59 31 3.28 16 0.69
Control (53) 60 5.82 61 5.97 1 0.15
Grade 5
DA (20) 21 3.63 38 5.01 17 1.38
Control (38) 56 6.53 60 7.09 4 0.56

Grade 6
DA (13) 3 2.36 15 3.68 12 1.32
Control (17) 71 9.58 74 9.9 3 0.32
Grade 7
DA (21) 8 3.39 26 5.45 18 2.068
Control (18) 35 6.57 36 6.64 1 0.07
Grade 8
DA (9) 5 3.38 21 5.61 16 2.23
Control (10) 34 6.94 35 7.36 1 0.42
Grade 10
DA (7) 17 5.58 26 6.65 9 1.07
Control (13) 15 5.25 18 5.6 3 0.35

Total
Exper.(209) 12 2.27 29 3.22 17 0.95
Control (240) 52 5.35 56 5.71 4 0.36

This chapter has outlined some of the successes that have been
attributed to the Direct Access approach. The next Chapter is a
discussion of some of the methods that are consistent with Direct
Access.

CHAPTER 6
SUMMARY, CONCLUSIONS, RECOMMENDATIONS
Summary
Current teaching methods almost invariably use an indirect
phonological route to meaning in which the written word is
converted to its phonological counterpart so that meaning derives
from auditory comprehension. A child comes to school knowing that
the sound “ball” means the concept “a round, bouncy thing”. In
reading, the letters b-a-l-l must lead to the concept of “a round,
bouncy thing”. In virtually every case, the child is taught to see
the word, say it, and understand its meaning from its sound. This
is an effective technique for two reasons. First, it takes
advantage of the existing auditory comprehension of children;
second, it provides the background for the future decoding of new
words. As effective as this procedure is for most children, a
significant number of individuals are not able to learn under this
protocol and they comprise the majority of the children we term
“reading disabled.”
Kaliski, Zenhausern, and Andrews have shown that there are two
groups of children who have unique deficits that interact with
these standard strategies used for teaching reading. It is this
interaction that directly leads to reading disability. All the
children in grades 1 to 8 who were reading at least one year below
grade level were screened for inclusion in the study. The majority
of the reading disabled group (85 per cent) fall into the category
of children who have to struggle to pronounce every word and thus
lose all continuity in reading. They were termed Phonetic disabled
readers. The smaller group of reading disabled children can “read”
aloud fluently, but do not comprehend what was “read”. These
children were called Semantic disabled readers. The final sample
consisted of 80 children, 40 Phonetic and 40 Semantic disabled
readers, spread evenly across the 8 grades. The authors showed
that the Phonetic children could not determine whether two words
(which were known to be in their sight vocabulary) did or did not
rhyme. The Semantic group had no difficulty with a rhyme task, but
made considerably more errors than the normal readers and Phonetic
disabled readers in determining whether a word and a picture
represented the same concept. These two deficits can be directly
related to the indirect phonological approaches to the teaching of
reading. The Phonetic disabled reader can not convert the word to
its sound and thus can not take the first step required by these
reading methods. The Semantic disabled reader can perceive the
words and translate them to their sound but has difficulty in
comprehending the meaning of the written word from this sound. This
disabled reader can take the first step and convert the written
word to its phonological counterpart, but the sound does not lead
to meaning. The results of this study can be seen in Figures 1 and
2.

The standard methods of teaching reading are well-entrenched
and educators sincerely believe that this indirect phonological
route to meaning is the best. Therefore, remediation for these
“disabled readers” means an intensification of what was not
successful in the past. Extensive drilling in phonetic skills has
led to an emphasis on teaching to weakness, rather than strength.
The imbalance is reflected in reading curricula and standardized
tests that stress phonetic decoding at the expense of
comprehension. Phonetic decoding is a means to the end of
comprehension; it has become an end in itself. An alternative
approach to reading which does not depend on an indirect
phonological approach to comprehension, called Direct Access, has
one basic principle: the meaning of the printed word should not be
derived from the sound of that word. Any procedure that avoids the
grapheme to phoneme conversion is consistent with this approach.
The child is never required to read aloud, but is asked to explain
what a passage meant. Trivial deviations in verbiage, e.g., “jet”
for “plane”, are de-emphasized. The stress is on comprehension
rather than a slavish word for word decoding. Specific Direct
Access techniques will be discussed later in this chapter.
The first study involving Direct Access was by Maxwell and
Zenhausern (1982) who applied the approach to First Grade children
“at risk” in reading by the second half of the year. After 25 half-
hour sessions, the children increased their scores from the 26th
to the 56th percentile on the Metropolitan Achievement Test and
increased their sight vocabulary by over 100 words. A comparable
control group showed no gain. Minardi, Zenhausern, and Maxwell
(1983) found similar results with Junior and Senior High School
children. Using the same regimen of 25 half-hour sessions, the
Junior High School students gained an average of 7 months and the
Senior High School students an average of 1.4 years on the Reading
Comprehension scale of the Metropolitan Achievement Test.
During the Spring of 1988, over 200 reading disabled children
in grades 1 through 10 from 8 schools within the Guilford County
School System in Greensboro NC used the Direct Access approach.
The children were tested on the Metropolitan Achievement Test
before and after 10 weeks of using the approach. The average gain
was .95 years and every grade from Grade 6 onward gained at least
1 year, with the 7th and 8th grades showing gains of over 2 years.
In the Fall of 1988, High Point NC used the approach with 73
reading disabled children. After 7 weeks, there was an average
gain on the Woodcock Johnson of 15 months. The Kindergarten group
showed a 12 month gain; the primary, a 7 month gain, and the middle
school a 21 month gain. Both Greensboro and High Point, North
Carolina used Direct Access for the past year. On their State
mandated California Achievement Test, those children on Direct
Access instruction showed an average gain of 17 percentile points
above last year’s scores.

SELECTED DIRECT ACCESS TECHNIQUES
The results of the demonstration project and the use of Direct
Access in the past year in North Carolina clearly show that reading
disabled children can benefit from the Direct Access method of
teaching reading. To be able to read means that one can get
meaning from the printed word. The indirect phonological route
attempts to accomplish this by having the reader convert the
written word to its phonological counterpart and from this sound
derive meaning. Converting the word to its sound is a means to the
end of comprehension, not the comprehension itself. Direct Access
attempts to derive the meaning of the printed word not via its
sound, but directly. The stress is on comprehension, not decoding.
One of the first and most basic Direct Access techniques
consists of pairing an index card which contains a word and one
that contains a picture so that the child can consistently make the
pairing. At that point the child can read the word, that is, the
child can comprehend the printed word. Note that this is true
whether or not the child can say the word correctly or not. The
pictures can be provided by the teacher, cut from magazines for
homework by the child, or even drawn by the child. The question
of abstractions and hard to picture words at first seems
insurmountable, but it is surprising how easily a child will
develop and remember appropriate pictures. In connection with this
aspect, games can be developed to strengthen the connection between
the words and the pictures. Variations of Concentration and Old
Maid have been used successfully.
This pairing, however, is only the beginning of the Direct
Access approach. The typical reaction at this point is, “This is
nothing new.” or “We tried that 20 years ago and it did not work.”
The next step is the most critical. The words and pictures must
be combined into sentences. A word sentence can be covered by the
appropriate picture and vice versa. The child should not be asked
to read the sentence aloud, word for word. Rather, have the child
summarize the sentence, point to a picture from a series that
corresponds to it, or even draw a picture of the sentence. The
stress should always be on whether the child has understood the
basic meaning of the sentence rather than a word for word rendition
of it.
There are two important side benefits of this approach. One
is an increase in spelling skills. The second advantage is the
ease with which children can do creative writing using the cards.
It is a simple way to separate penmanship from writing. The child
could be asked to write the funniest (most exciting, etc.) sentence
they can from their words. The step from sentences to paragraphs
is minimal.
There are two basic approaches to class recitation within a
Direct Access framework. The phonetic disabled reader would be
asked to summarize a passage for the class and the teacher and
classmates could discuss the errors of omission and commission.
It also opens the door for class discussion on any relevant issues.
The semantic disabled reader would read aloud, but be required to
do so with expression to assure that the meaning and not only the
words were being read. Of course, any child could be given the
opportunity to use either approach.
Flash cards are a standard part of the classroom and can be
used within a Direct Access framework. Let the children have their
pictures in front of them when the words are flashed. They will
serve as a cue and minimize the chance of failure. As the children
progress, they can turn the pictures face down on the desk and only
turn them over as needed. This will strengthen skills and continue
to minimize the chance of failure. This technique could easily be
converted into a game where more points accrue if a card is not
turned over, but the child will always get some points.
What happens when children come across a word they have never
seen before? This is the usual response of people who first
encounter Direct Access. There are several approaches to this.
First and foremost, the child should be encouraged to determine the
meaning of the word from the context of the whole passage.
Second, the teacher can tell the child the word and immediately
have the child cut out or draw an appropriate picture for that
word.
Third, the child can be encouraged to look it up in the
dictionary just like anyone else who comes across a word with which
they are unfamiliar. The child may not be able to pronounce the
word, but its meaning will be known.
Fourth, phonetic decoding should be an essential part of any
reading program. It is an important skill and should not be
neglected. On the other hand, it should not be the main approach
to deriving meaning from the printed word for some children.
There is a temporary remediation procedure to use with Semantic
disabled readers. Have the child read aloud into a tape recorder.
Then the child can play back the tape while reading from the text
material. Although this is an awkward procedure it will allow the
child to get meaning from the printed word. Direct Access has a
technique for the teaching of spelling and number facts. It has
been shown that some children not only do not learn by verbally
repeating the word and letters (e.g. “cat, C-A-T, cat”, “6 times
3 is 18”) but this procedure can actually interfere with learning.
As an alternative have the child look at the word and practice
forming an image of the letters without saying anything (This is
essential!!). When it comes time to spell the word, have the child
bring back the image of the letters and copy them.
The Direct Access approach does not depend on a rigid structure
that the teacher must follow slavishly, but is a general principle
that can lead to unique and creative techniques. Furthermore, the
method is not limited to the disabled population, but may be an
effective strategy for all readers since it has some similarities
to “speed reading” techniques.

SUMMARY AND RECOMMENDATIONS
Summary
Reading Disability is as much a physical disability as
blindness, deafness and paralysis but a person with such a
disability has not received the help offered to those suffering
from the latter disorders. The reading disabled child is
considered responsible for the disability. The purpose of this
paper is to point out that these children can learn to read if only
we are willing to change the methods with which we teach reading.

The standard approaches to reading demand that the child
convert the written word to its sound and, from that sound, derive
the meaning. It was shown that 85% of the children we call reading
disabled have difficulty making that first step and the remaining
15% can convert the word to its sound, but this still does not give
them meaning. The Direct Access approach to reading can help both
types of children because meaning is not derived by converting the
printed word to its sound. Rather, the sound of the word is
derived from its meaning. Several specific techniques using this
approach have been discussed earlier in this Paper.
Our brain is capable of many fascinating and wondrous things.
Our conscious awareness of our surroundings is somehow derived from
light of various wavelengths falling on our retina and causing
neurons to fire and not fire. It is this pattern of neuronal
activity that gives us conscious experience. Even more amazing is
the ability to create literary, musical, and visual works of art.
It is the brain that is responsible for all of this. The brain
also has a rather obscure function. It can take an arbitrary
series of symbols (printed words) and convert them into an equally
arbitrary set of sounds (spoken words). This function pales
alongside literary and artistic masterpieces. Why have we made it
the basis of our educational system?
Recommendations
There are two major administrative recommendations that flow
from this paper. The first concerns the establishment of a centre
for learning disability to be associated with the Centre for Social
Development and Humanitarian Affairs. The second concerns the
development of a pilot project to investigate the effectiveness of
the Direct Access approach to reading.
1) A center for the dissemination of information and training in
learning disabilities should be established which would be called
the Learning Enhancement Centre of the Disabled Persons Unit.
The purpose of the Learning Enhancement Centre would be to
research and disseminate information on the theory and remediation
of educational disabilities and to provide training in the
remediation of these disabilities. The scope of this training
would include all educational approaches that stress the individual
styles of learning with a particular emphasis on the Direct Access
approach in reading. There would be two main educational foci:
1) ongoing workshops open to teachers from all member
countries; and 2) visiting teams which would provide on-site
training for those teachers who cannot travel to the Centre. In
addition, new teaching techniques would constantly be developed
and evaluated in real classroom situations. These teaching
techniques would take advantage of the latest technology, but the
effective use of more basic strategies would also be investigated.
The Centre would publish a newsletter to promulgate its activities
and share the latest innovations in teaching techniques.
2) A large scale pilot study should be initiated by the Learning
Enhancement Centre to evaluate the effectiveness of the Direct
Access approach across a wide variety of cultures. The Learning
Enhancement Centre would provide a series of workshops to train
teachers in the theory and practice of Direct Access. These
teachers would consist of individuals from various countries who
would then develop Direct Access projects in their country.
Consultants from the Learning Enhancement Centre would visit the
project sites to provide ongoing feedback to the teachers. These
same teachers can provide on site training for countries who are
unable to send teachers to the Centre. In addition to these
administrative recommendations, there are several educational
recommendations that are aimed at eliminating all forms of learning
disability. The aim of the Learning Enhancement Centre is to
implement these recommendations. 3) Individual preferences in
learning strategies should be taken into consideration in selecting
teaching strategies.
Both lateral eye movements and Hemispheric Preference Test data
should be collected on all children. Strategies of teaching that
are compatible with the learning strategies associated with these
Hemispheric Related Strategies should be incorporated into the
classroom. In addition, other measures of individual differences
in learning styles should be incorporated into the framework of the
Centre.
4) A testing program aimed at identifying individual differences
in learning styles should be developed at the Centre and
disseminated among the various member nations. Children can be
tested for Phonetic and Semantic reading disability by means of a
test derived from the results presented in Chapter 4. The Phonetic
Semantic Reading Scale (PSRS) requires a child to match written and
pictorial material on the basis of their sound or on the basis of
their meaning. The point would be to identify individuals who do
well on one portion of the test and poorly on the other to make a
differential diagnosis between the Phonetic and Semantic disabled.

5) The techniques described in the Selected Direct Access Technique
section above should be applied to these children.
These would include, but not be limited to:
a) Alternative forms of class recitation
b) De-emphasis of phonics
c) Use of word picture vocabulary cards
d) Emphasis on comprehension rather than decoding
6) The criteria for success should reflect the capabilities of the
child in conjunction with the demands of the culture rather than
artificial restrictions.
These would include, but not be limited to:
a) Speed should be de-emphasized
b) Tests should be given on an “open book” basis.
c) Calculators should be allowed on mathematics tests.
Note that these changes actually reflect the way people operate
in the real world. No successful business places unrealistic time
limits on workers or denies them use of tools and references.
7) An essential aspect of the Centre will be to develop new and
creative techniques aimed at the elimination of all forms of
learning disabilities.
While the emphasis at present is on developmental disabilities,
it is expected that this will expand to cover acquired
disabilities, especially those related to head injuries. The same
principles of educational remediation will be applied to cognitive
remediation. The major recommendation of this paper is that
learning disability should be recognized as a true disability and
treated in the same way as the more physical disabilities such as
deafness, blindness and paralysis. The learning disabled child
should not be considered at fault for the disorder, but should be
recognized as a person in need of special help. It is our
responsibility to supply that special help.
The emphasis must be on individualizing instruction rather than
finding the “one true method”. The good from all approaches must
be used with those who find it good and avoided for those who find
it not good. Only by tailoring our teaching to the unique style
of each student do we maximize their strengths rather than trying
to strengthen their minima.

BIBLIOGRAPHY

Alberts, F. L., & McCallum, R. S. (1982). The relationship among
three measures of cognitive style. Clinical Neuropsychology,4,
70-71.

Bakker, D. (1982) Cognitive deficits and cerebral asymmetry.
Journal of Research and Development in Education, 150, 49-54.

Beaumont, J., Young, A., & McManus (1984) Hemisphericity: A
critical review. Cognitive Neuropsychology, 1, 191-212.

Boder, E. (1973) Developmental dyslexia: A diagnostic approach
based on three atypical reading-spelling patterns.
Developmental Medicine and Child Neurology, 15, 663- 687.

Bradshaw, J. & Nettleton, N. (1981) The nature of hemispheric
specialization in man. Behavior and Brain Sciences, 4, 51-97

Breitling, D., & Bonnet, K. (1985). Lateralization of GSR, lateral
eye movements and a visual half-fields recognition task.
International Journal of Clinical Neuropsychology, 7, 140-143

Bruce, P. R., Herman, J. F., & Stern, J. (1982). Lateral eye
movements and the recall of spatial information in a familiar,
large-scale environment. Neuropsychologica, 20, 505-508.

Coleman, S. & Zenhausern, R. (1979) Processing speed, laterality
patterns, and memory encoding as a function of hemispheric
dominance. Bulletin of the Psychonomic Society, 14, 357-360.

Day, M. E. (1967) An eye-movement indicator of individual
differences in the psychological organization of attentional
process and anxiety. Journal of Psychology, 66, 51-62.

Denckla, M.B. (1979) Childhood learning disabilities. In. K.M.
Heilman and E.M. Valenstein (Eds.), Clinical Neuropsychology,
New York: Oxford University Press.

Dunn, R., Price, G., Bacilious, Z., & Zenhausern, R. (1983)
Learning Style — a predictor of school achievement. Momentum,
13, 47-48.

Dunn, R., Zenhausern, R., Cavanaugh, D., & Eberle, B. (1982)
Hemispheric preference the newest elements of learning style.
Journal of the National Association of Biology Teachers, 44,
291-294.

Dunn, R, White, R. & Zenhausern, R. (1984) Do educators create some
discipline problems? Illinois School Research and Development
Journal, 34, 56-67.

Ehrlichman, H., & Barrett, J. (1984) Right
hemisphere specialization for mental imagery: A review of the
evidence. Brain and Cognition, 2, 55-76.

Ehrlichman, H., & Weinberger, A. (1978) Lateral eye movements and
hemispheric asymmetry: A critical review. Psychological
Bulletin, 86, 1080-1101.

Falcone, D. J., & Loder, K. (1984). A
modified lateral eye movement measure, the right hemisphere,
and creativity. Perceptual and Motor Skills, 58, 823-830.

Fisk, J. & Rourke, B. (1979) Identification of subtypes of learning
disabled children at three age levels: A neuropsychological,
multivariate approach. Journal of Clinical Neuropsychology, 1,
289-310.

Furst, C. EEG asymmetry and visuospatial performance. Nature,
260, 254-255. Galin,D., & Ornstein, R. (1972) Lateral
specialization of cognitive mode: An EEG study.
Psychophysiology, 9, 412-418.

Galin, D., & Ornstein, R. (1975) Hemispheric specialization and
the duality of consciousness. Laterality and brain function.
Springfield, IL: C.C.Thomas.

Golden, M., & Zenhausern, R. (1983)
Grapheme to phoneme conversion: The basis of reading
disability? International Journal of Neuroscience, 20, 229-240.

Gur, R.E. (1978) Left hemisphere dysfunction and left hemisphere
overactivation in schizophrenia. Journal of Abnormal
Psychology, 87, 226-238.

Gur, R. E., & Gur, R. C. (1975). Defense mechanisms,
psychosomatic symptomatology, and conjugate lateral eye
movements. Journal of Consulting and Clinical Psychology,
43, 416-420.

Gur, R.E., Gur, R.C., & Harris (1975) Cerebral activation, as
measured by subjects’ lateral eye movements is influenced by
experimenter location. Neuropsychologia, 13, 35-44.

Gur, R.C., Packer, I, Hungerbuhler, J., Reivich, M., Obrist, W., & Amarner,
W.(1980) Differences in the ion of grey and white matter in the
human cerebral cortex. Science, 207, 1226-128.

Huang, M. S., & Byrne, B. (1978). Cognitive style and lateral eye
movements. British Journal of Psychology, 69, 85-90.

Hugdahl, K., & Carlgren, H. E. (1981). Hemispheric asymmetry as
indexed by differences in direction of initial conjugate
lateral eye movements (CLEMS) in response to verbal, spatial,
and emotional tasks. Journal of Mind and Behavior 2, 259-270.

Jamieson, J. L., & Sellick, T. B. (1985) Effects of subject-to-
experimenter distance and instructions on lateral eye movement.
Perceptual and Motor Skills, 60, 155-159.

Kaliski, M., Zenhausern, R., Andrews, R. (1989) The direct
access method of teaching reading and the diagnosis and
remediation of reading disability. International Journal
of Neuroscience, 44, 103-109.

Kinsbourne, M. (1972) Eye and head turning indicate cerebral
lateralization. Science, 176, 539-541.

Kinsbourne, M., & Warrington, E. (1963) Developmental factors in
reading and writing backwardness. British Journal of
Psychology, 54, 145-156.

Krikorian, R., & Rafales, L. (1983). Emotional stimulation,
defensive orientation, and hemispheric activation. Brain and
Cognition, 1, 371-380.

Leboeuf, A., McKay, P., & Clarke, K. (1983). Lateral eye movements
and dream recall in males: a reappraisal. Imagination,
Cognition, and Personality, 3, 61-68.

Lenhart, R. E. (1985) The effects of distance between interactants
and subject anxiety on conjugate lateral eye movements.
Brain and Cognition, 4(3), 328-337.

Levy, J. (1974) Psychobiological implications of bilateral
asymmetry. In S. Dimond & J. Beaumont (Eds.) Hemispheric
function and the human brain. New York: Wiley

Markman, S. & Zenhausern, R. (1988) The interaction of hemispheric related
strategies and individual differences in learning.
International Journal of Neuroscience, 43, 165-170.

Mattis, S., French, J., & Rapin, I. (1975) Dyslexia in children and young
adults: three independent neuropsychological syndromes.
Developmental Medicine and Child Neurology, 17, 150-163

Maxwell, M. & Zenhausern, R. (1983) Teaching reading to disabled
readers by eliminating the necessity for grapheme to phoneme
conversion. Paper presented at the Eastern Psychological
Association, Philadelphia.

Minardi, A., Zenhausern, R., & Maxwell, M. (1984) The remediation
of reading disability: a new approach. Paper presented at the
International Neuropsychology Convention, Houston.

Oexle, J. & Zenhausern, R. (1981) Differential hemispheric
activation in good and poor readers. International Journal of
Neuroscience, 15, 31-36.

Ogorman, J. & Siddle, D. (1981). The effects of question type and
experimenter position on bilateral differences in electrodermal
activity and conjugate lateral eye movements. Acta
Psychologica, 49, 43-51.

Owens, W., & Limber, J. (1983). Lateral eye movement as a measure
of cognitive ability and style. Perceptual and Motor Skills,
56, 711-719.

Parrott, C. A. (1983). Personality characteristics associated with
lateral eye movement patterns. Perceptual and Motor Skills,
58, 867-874.

Paivio, A., Yuille, J., & Madigan, S. (1968) Concreteness, imagery
and meaningfulness values for 925 nouns. Journal of
Experimental Psychology Monographs, 76, (1 pt. 2).

Petroskas, R. & Rourke, B. (1979) Identification of subtypes
of retarded readers: A neuropsychological, multivariate approach.
Journal of Clinical Neuropsychology, 1, 17-37.

Pirozzolo, F. (1979) The neuropsychology of developmental reading
disorders. New York: Praeger.

Schwartz, G., Davidson, R., & Maer, F. (1977). Right Hemisphere
Lateralization for Emotion in the Human Brain: Interactions
with cognition. Science, 190, 286-288.

Schweitzer, L. (1979). Differences of cerebral lateralization
among schizophrenic and depressed patients. Biological
Psychiatry, 14, 721-733.

Smokler, I. A., & Shevrin, H. (1979). Cerebral lateralization and
personality style. Archives of General Psychiatry, 36,
949-954.

Swinnen, S. (1984). Some evidence for the hemispheric asymmetry
model of lateral eye movements. Perceptual and Motor Skills,
58, 79-88.

Thompson, M., Greenberg, R. P., & Fisher, S. (1982). Defense
mechanisms, somatic symptoms, and lateral eye movements in
females. Perceptual and Motor Skills, 55, 939-942.

Tucker, D. M., Antes, J. R., Stenslie, C. E., & Barnhardt, T. M.
(1978). Anxiety and lateral cerebral function. Journal of
Abnormal Psychology, 87, 380-383.

Tucker, G. H., & Suib, M. R. (1978). Conjugate lateral
eye movement (CLEM) direction and its relationship to
performance on verbal and visuospatial tasks.
Neuropsychologica, 16, 251-254

Tucker, D. (1981) Lateral brain function, emotion, and
conceptualization. Psychological Bulletin, 89, 19-46.

Van Nuys, D. (1985) Lateral eye movement and dream recall: II sex
differences and handedness. International Journal of
Psychosomatics, 31, 3-7.

Weiten, W., & Etaugh, C. F. (1974) Lateral eye movement as related
to verbal and perceptual-motor skills and values. Perceptual
and Motor Skills, 36, 423-428.

Zenhausern, R. (1978) Imagery, cerebral dominance, and
style of thinking: A unified field model. Bulletin of
the Psychonomic Society, 12, 381-384.

Zenhausern, R. (1982) Rights and lefts and how they learn. Early
Years, 12, 51-67.

Zenhausern, R. (1983) Lateralized presentation
and hemispheric integration. American Psychologist, 38.

Zenhausern, R. (1987) The relationship of reading disability and
the techniques of teaching reading. International Journal of
Neuroscience, 34, 55-62.

Zenhausern, R. (1988) Eyes Right. Teaching K through 8, 23, 76-78.

Zenhausern, R. & Dunivin, D. (1981) Differential hemispheric
activation and handedness and hysterical and obsessive
personality styles. Bulletin of the Psychonomic Society, 17,
23-25.

Zenhausern, R., & Dunn, R. (1984) How brainy are you about the
brain? Early Years, 15, 46-49.

Zenhausern, R., Dunn, R., Cavanaugh, D. & Eberle, B. (1981) Do
right and left brained students learn differently. Roeper
Review, 4, 35-39.

Zenhausern, R. & Nickel, M. (1978) Hemispheric dominance in recall
and recognition. Bulletin of the Psychonomic Society, 13, 50-54.

Zenhausern, R. & Gebhard, M. (1979) Hemispheric dominance in recall
and recognition. Bulletin of the Psychonomic Society, 14, 71-73.

Zenhausern, R., Notaro, J. Grosso, J. & Schiano, P. (1980) The
interaction of hemispheric preference, laterality, and sex in
the perception of emotional tone and verbal content.
International Journal of Neuroscience, 13, 121-126.

Zenhausern, R. & Parisi, I. (1981) Brain dis-integration in
psychosis. Paper presented at International Neuropsychology
Society, Atlanta.

Zenhausern, R. & Sinatra, R.(1983) The rapid identification of poor
readers with a grapheme to phoneme deficit. Eastern
Psychological Association, Philadelphia.

—-
For more information contact:
Robert Zenhausern, Ph.D. Internet: drz@sjuvm.stjohns.edu
St. John’s University Bitnet: drz@sjuvm.bitnet
SB 15 Marillac Phone: 718-990-6447
Jamaica, NY 11439 Fax: 718-990-6705

Abbreviations For Map Regions

ABBREVIATIONS FOR MAP REGIONS (others will not be recognized)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
ADR Adriatic Sea DEN Denmark MOS Moscow SKA Skaggerak
AEG Aegean Sea ECH Eng.Channel MUN Munich SMY Smyrna
ALB Albania EDI Edinburgh NAF North Africa SPA Spain
ANK Ankara EMD East Medit. NAP Naples STP St.Petersburg
APU Apulia FIN Finland NAT NorthAtlantic SYR Syria
ARM Armenia GAL Galacia NOR Norway SWE Sweden
BAL Baltic Sea GAS Gascony NTS North Sea TRI Trieste
BAR Barents Sea GRE Greece NWS Norwegian Sea TUN Tunis
BEL Belgium HEL Helgoland B. PAR Paris TUS Tuscany
BER Berlin HOL Holland PIC Picardy TYR Tyrolia
BOH Bohemia ION Ionian Sea PIE Piedmont TYS Tyrrehnean Sea
BOT GulfofBothnia IRI Irish Sea POR Portugal UKR Ukraine
BLA Black Sea KIE Kiel PRU Prussia VEN Venice
BRE Brest LON London ROM Rome VIE Vienna
BUD Budapest LVP Liverpool RUH Ruhr WAL Wales
BUL Bulgaria LVN Livonia RUM Rumania WAR Warsaw
BUR Burgundy LYO Gulf of Lyon SER Serbia WMD West Medit.
CON Constantin. MAO Mid Atlantic SEV Sevastopol YOR Yorkshire
CLY Clyde MAR Marseilles SIL Silesia
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Decoding Social Security Numbers (September 8, 1992)

Article 2148 (25 more) in alt.privacy:
From: hhll@milton.u.washington.edu (Steven Hodas)
Subject: Decoding Social Security numbers
Date: 8 Sep 92 07:27:03 GMT
Organization: University of Washington
Lines: 43

I found this on CI$:

Decoding the Social Security Number
(from “Social-Security-Numbers And Other Telling Information:”
by Simson Garfinkel, published in the Whole Earth Review, Fall 1989)

The first three digits of a person’s Social Security Number indicate
the state that the person was living in at the time the number was
assigned (see table). The exceptions to this rule are numbers in the
700-729 range, which were issued by the Railroad Retirement agency, the
only such retirement plan to have its own block of SSNs.

The fourth and fifth digits indicate the group number. The sequence is
reported to be odd numbers from 01-09, then even numbers from 10-98, then
even numbers 02-08, and finally odd numbers 11-99. All numbers issued
before 1965 are either odd numbers between 01 and 09, or even numbers
between 10 and 98. The last four digits are the “serial number,” and run
from 0001 to 9999…

001-003 New Hampshire 318-361 Illinois 520 Wyoming
004-007 Maine 362-386 Michigan 521-524 Colorado
008-009 Vermont 387-399 Wisonsin 525 New Mexico
010-034 Massachusetts 400-407 Kentucky 585 New Mexico
035-039 Rhode Island 408-415 Tennessee 526-527 Arizona
040-049 Connecticut 416-424 Alabama 528-529 Utah
050-134 New York 425-428 Mississippi 530 Nevada
135-158 New Jersey 587-588 Mississippi 531-539 Washington
159-211 Pennsylvania 429-432 Arkansas 540-544 Oregon
212-220 Maryland 433-439 Louisiana 545-573 California
221-222 Delaware 440-448 Oklahoma 574 Alaska
223-231 Virginia 449-467 Texas 575-576 Hawaii
232-236 West Virginia 468-477 Minnesota 577-579 Washington, DC
232 N. Carolina (1) 478-485 Iowa 580 Virgin Islands
237-246 N. Carolina 486-500 Missouri 580-584 Puerto Rico
247-251 S. Carolina 501-502 N. Dakota 586 Guam
252-260 Georgia 503-504 S. Dakota 586 American Samoa
261-267 Florida 505-508 Nebraska 586 Phillipine Islands
589-595 Florida 509-515 Kansas 700-729 Railroad Retirement
268-302 Ohio 516-517 Montana
303-317 Indiana 518-519 Idaho

(1) Number 232, with middle digits 30, has been allocated to North Carolina
from West Virginia.

Fairmount Writes About James Dean

Fairmount bids farewell to Dean

James Byron Dean: Bad boy of the ’50s. He slouched. And there
was that studied, sometimes sullen smile. And the backswept hair that
foretold a young man moveing fast – too fast. And the gentle voice
that shouted defiance during those days when Ike was in the White House.
It has been 37(now 39) years since his name was etched in the
granite of his Indiana gravestone – and his image etched in the album
of American popular culture.
The icon remains untarnished:
The trio of movies in which he starred (East of Eden, Rebel Without
a Cause, Giant) continues to draw audiences – particularly in Europe.
His photograph is used today to sell shoes in so prestigious a
marketplace as The New Yorker magazine.
His legions of fans, many born after his death, continue to make
pilgrimages to the place on the Indiana landscape from which he came.
The placeis along Sand Pike, a two-lane blacktop road that splits
the otherwise-unbroken horizon of corn and soybean fields north of
Fairmount in Grant County in north-central Indiana.
Along the road, spread over two miles, are the shrines central to
the short life of James Dean, places to which the faithful flock,
particularly in late September near the anniversary of his death on the
30th – “9/30/55” in the cryptic code of his fans.
To the west of Sand Pike rises a typically Midwestern farmstead:
Two-story, white frame home resting on a fieldstone foundation. It has
an expansive front porch shaded by ancient oaks and sycamores, a porch
swing suspended from chains anchored in the roof. There is a normal
complement of outbuildings, and a stream meanders through the swales
and knolls in the land between the lawn and the tillable acreage.
It was here, on the farm of his aunt and uncle, Marcus and Ortense
Winslow, that James Dean grew from childhood to adolescence to maturity.
Dean’s cousin, Marcus Winslow, and his family now live here.
A mile to the south of the Winslow farm is a church, a Quaker
church. The Back Creek Friends Meeting. A circular drive approaches
the red brick building. True to Quaker and Midwestern values, the
church is unadorned. A mural of Christ as shepherd is the focal point
of the sanctuary, bathed in white light filtered through sharply vertical
and colorless windows.
And yet another mile to the south, is a cemetery. Park Cemetery.
As old as the Quaker community it was created to serve back before the
Civil War, it is the place where Fairmount, a community of 3,286, buries
its dead.
Fairmount, wrote Stewart Stern in his movie script for The James
Dean Story, is “not just a quaint little town, but a useful town, used
well and long by its people.”
Joseph Winslow, an ancestor of James Dean, established the first
farm in Fairmount Township of Grant County in 1830 – on the site that
is now the Marcus Winslow farm.
In 1850, a community was formed, which chose to call itself Pucker.
Pucker it was, and Pucker it remained, until 1870, when community
dissatisfaction with the moniker led to a renameing: Fairmount,
suggested by Joseph W. Balwin, who was attracted by the name of a park
in Philadelphia. Fairmount was incorporated on Dec. 10, 1870.
While James Dean may be the most widely celebrated son of Fairmount,
he is not alone. Among others:
Jim Davis, creator of the Garfield cartoon strip.
Phil Jones, former White House correspondent for CBS News.
Mary Jane Ward, author of the novel Snake Pit, an indictment of
mental health facilities in the late 1940’s.
Alvin Seal, an ichthyologist credited with major contributions
to the classification of Asiatic fish.
Robert Sheets, current director of the National Hurricane Center.
David Payne, a principal player in the creation of Oklahoma
Territory. He was the original Sooner.
In Park Cemetery, surrounded by the past generations of Fairmount,
is a granite gravestone, made remarkable only by the perpetual presence
of flowers, real and artificial.
The stone is a reddish pink, pock-marked by the work of pilgrims
who would take a fragment of the stone as a relic.
It is the final resting place of
James B. Dean
1931-1955
The stone is the second on the grave. The original was stolen in
1983 and was replaced before it was recovered in Fort Wayne in 1987.
It is to this place more than any other that the Dean faithful come.
They arrive in all seasons, at all times, in all vehicles. Most conduct
themselves with dignity; others, so eager for souvenirs, will strip an
ear of corn from a stalk in the field across the road and take it away.
Among those who come to this place, especially in late September,
are those who knew him.
On the afternoon of each September 30 since 1956 the family,
friends and followers of the actor who brooded his way into national
character have assembled at Back Creek Friends Church and at Park
Cemetery to play out a small drama of tribute. The roles have been set
by tradition.
There was the late Ortense Winslow, a reluctant participant for
whom the role became more burdensome each year. She and her late
husband, Marcus, reared the young man who blazed across the screen and
crashed in flames at 5:45 PM on Sept. 30, 1955, at a rural intersection
in San Luis Obispo County, Calif.

Phiction By Tristan Farnon Himself

80 Columns
Tristan Farnon presents…

+:-:-:-:-:-:-:+
| Dead End |
+:-:-:-:-:-:-:+ …another twistful adventure!

“Next, please.” said the attendent. Sarah had been working at Citicorp Savings
Bank for almost a year now. WHY? She asked herself. THIS HAS GOT TO BE THE MOST
BORING PLACE IN THE WORLD.

“Hello.” greeted the man politely. “My name is Max. In my left hand, I hold a
.22 caliber revolver.”

It took a few seconds for what he said to register in Sarah’s head. Then,
another few to actually realize what he meant. She froze.

“Please! Please…” smiled the man (if you could call it smiling – his eyes
were staring coldly at her, but his mouth was turned upward with a smile that
only LOOKED safe.) “Act natural. If you act as though something peculiar is
going on…I’m afraid I’ll have to shoot you.” his voice remained calm, but his
gun remained pointed.

“What do you want?” whispered Sarah.

“I’d like to make a withdrawl. A withdrawl of, say, ten thousand.”

“Let me check with my–”

“NO!” he commanded. “The money is in the drawer right in front of you. I’ll
take it in ten One-Thousand dollar amounts, please.”

Sarah quickly fumbled with the key to open the drawer. Hastily, she counted
out ten thousand dollars.

“Thank you. I would advise you to keep absolutely quiet and remain perfectly
still until I leave. My gun will be pointed at anyone and everyone within range.
Do you understand?”

“Yes.” replied Sarah, stiffening.

He quickly walked towards the exit. HURRY…HURRY…he thought. GET THE HELL
OUT OF HERE. YOU’RE ALMOST OUT THE DOOR. WALK NATURALLY.

Sarah let out a scream. “Stop him! He stole ten thousand dollars!! HELP!” The
security guard reached for his gun. “Freeze!”

Quickly drawing out his pistol, Max fired a shot at the guard. He crumpled to
the ground. Screams shot out from various locations of the bank. The second
security guard reached for his gun.

Instinctively, Max grabbed a young woman and held her in front of him. His gun
was pointed directly under her chin. He clicked the trigger back.

“ANYBODY MOVE AND I SHOOT A BULLET STRAIGHT UP HER SKULL!” he stated.

The guard dropped his gun to the floor. People stood around, not knowing quite
how to react.

“Nice to see you all. Have a nice day.” Still holding a handful of her long
blond hair, he pulled her out the door and into his car.

“Where are you taking me?” she cried.

“Shut up.” He started the car, and drove off at a speed that almost broke the
sound barrier. Keeping one hand on the wheel, he kept his other hand holding his
pistol, which was pointed straight at her.

“What’s your name.” he didn’t ask it…he said it.

“Cathy.” she whispered. “Where are we going. You don’t NEED me anymore. Let me
out of the car. Please.”

“Be quiet. We’re going to count my money – that’s where we’re going.”

They got out of the car right in front of his apartment.

“Get inside,” he commanded.

She walked across the room and sat on the bed, not looking at him. WHY DOES HE
WANT ME HERE? WHAT DOES HE WANT FROM ME?

“Look.” he said, and flashed the $10,000 in front of her face. “Quite a steal,
isn’t it?” She said nothing. “ISN’T IT!” he screamed.

“YES!” she screamed back, with tears in her eyes. “I WANT TO GET OUT!!”

“Have a drink.” he poured her a glass of scotch.

She decided to go along with him. “Thank you,” she whispered.

“Have you ever SEEN that much money before in your LIFE?” he boasted.

“No…I haven’t.”

“You’re a nice girl. A very nice girl.” he said. She said nothing. “See this?
See this gun? Watch.” He opened up the wheel and took all four bullets out of
the cage. “We’ll forget about the gun. Now we can enjoy ourselves.”

“What are you doing?”

“What does it look like?” he smiled…unbuttoning his shirt.

“LEAVE ME ALONE! DON’T COME NEAR ME!” she shrieked.

“Why? Don’t you like me? You do like me, don’t you? DON’T YOU!”

She smiled. “I like you…do you know why?”

“Because I’m rich. I’m a rich man.”

“Nope.” she said, reaching into her purse.

“They why?”

“Because you’re my first case.” she said, pulling out a gold badge and a
rather large pistol. “You’re under arrest.”

+:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:+
“Dead End” – Copyright (C) February 5th 1986 by Tristan Farnon
+:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:+

The Star Wars: Dark Forces FAQ By Karsten A. Loepelmann (Version 1.0, February 10, 1995)

_______ ___ ______ ___ __
/ _____ / _ | __ / / /
/ /####/ // / | |#| |##| |# / /
/ /#/ / /#/ /__| |#| |#_| |#
/ /#/ / /#/ __ |#| _ / # \
/ /#/ / /#/ /##| |#| |# # #
/ /#/__/ /#/ /#/ | |#| |## # ##
/________/#/__/#/ |__|#|__|##__ #__\##__
##############/ ######### #### ###/ ####/
__________ ________ ________ _______ ________ _______
/ _______// ______ | _____ / _____ / _____ / _____
/ /########/ /#####/ / | |####| | | |####_# ####/ / #####/
/ _____/#// /#/ / /#/ | |____| | | | ##/# ____ # ______
/ /######// /#/ / /#/ | ____ / | | # __ #_____
/ /#/ / /#/ / /#/ | |####| | | __ # #/ #####
/ /#/ / /#/_/ /#/ | | | || |_____/ / # ____ ___#
/___/#/ ________/#/ |__| |__|_________// #______/_______/
####/ ########/ |##| |##||#########/ #######/########/

_____________ _____________ ______________
/ / / /
/ _________/#// _________ / ________
/ /##########// /######### # #######
/ /#/___ | |#_______#| |# #
/ / | |# #
/ ______/#/ | _________ | # #
/ /#######/ | /######### | # #
/ /#/ | |#| |#| | # ___/
/ /#/ | |#| |#| | # _
/____/#/ |_____|#| |#|_____| # __________
#####/ |#######| |#######| ############______
#######/

—————————————————————————-
STAR WARS:
DARK FORCES
FAQList
“The dark side of the force
Just got darker.”

Version 1.10
Last updated: February 10, 1995

compiled and maintained by
Karsten A. Loepelmann
kloepelm@gpu.srv.ualberta.ca
kloepel@psych.ualberta.ca

This FAQList is copyright 1995 by Karsten A. Loepelmann. All rights reserved.
Permission is granted for reproduction, distribution, transmission, or storage
for noncommercial purposes only, on the condition that the contents are not
changed in any way. Permission for any other use or distribution of this
FAQList must be obtained from the rights holder, Karsten A. Loepelmann. All
trademarks herein are acknowledged as the property of their respective owners.
Star Wars is a registered trademark of Lucasfilm Ltd. Dark Forces is a
trademark of LucasArts Entertainment Company. Header created by Bren Lynne
(bren@gold.interlog.com).

Preferred forum for discussion is:
news:alt.games.dark-forces

Due to low propagation of the above newsgroup, an alternate forum is:
news:comp.sys.ibm.pc.games.action

Abbreviations used:
DF = Dark Forces
LA = LucasArts
TD = Thermal Detonator
DT = Dark Trooper

Contents:
* indicates a section changed since the last release of this FAQ
+ indicates a new section added since the last release of this FAQ

+ 0.0 Dark Forces FAQList
1.0 Introduction
* 1.1 What is “Dark Forces”?
* 1.2 When will DF be released, already!?
* 1.3 What media format is DF offered on?
* 1.4 What is required to run DF?
+ 1.4.1 What kind of sound support does DF have?
+ 1.4.1.1 Sound card tips
1.5 Why no modem play?
1.6 How much will DF cost?
1.7 Is DF canon?
+ 1.8 Will there be any sequels to DF?
+ 1.8.1 Will any sequels offer a multiplayer option?
2.0 Is there a DF demo available?
* 2.1 Where is the demo available from?
* 2.2 Is there a demo editor?
+ 2.3 Will the demo level be in the full game release?
* 3.0 DF vs. DOOM
3.1 Isn’t DF just a ripoff of iD Software’s DOOM?
3.2 Does DF kick DOOM’s butt?
3.3 Is DF easier than DOOM?
4.0 What are some DF command-line options and undocumented features?
5.0 What are the secret areas in the Prologue Mission 1 demo?
5.1 Red Key Door
5.2 A New Area
5.3 Thermal Detonator/Shield Unit Storage
5.4 Ground Floor Zero
* 5.5 Outer Ledge and Caves
5.6 The Big One
5.6.1.1 Method 1: Troublesome Windows
5.6.1.2 Method 2: A Leap of Faith
* 5.6.2 To the Outer Wall
5.7 The Death Star Plans
5.8 A Revolution
5.9 A Diversion and a Grate Finish
6.0 Weapons, shields, and objects
6.1 What weapons are there?
6.1.1 Fists
6.1.2 Modified Bryar Rifle (“blaster”)
* 6.1.3 Stormtrooper Rifle
6.1.4 Thermal Detonators
6.1.5 Imperial Repeater Rifle (“autogun”)
6.1.6 Jeron Fusion Cutter
6.1.7 IM Claymore Mine
6.1.8 Packered Mortar Gun
+ 6.1.9 Weapon Supercharge
6.2 How is aiming/targeting accomplished?
+ 6.3 How do the shields work?
* 6.4 What do those little black robots that run on the ground do?
6.4.1 How do you shoot them?
6.5 What does the ‘Spider-Gem’ do?
* 6.6 What does the red switch behind the hidden panel in the ‘Emperor’s
Lounge’ do?
7.0 Misc questions
7.1 Who are the people behind DF?
+ 7.2 Has George Lucas provided any input to DF?
+ 7.3 What are .GOB files?
* 7.3.1 What software was used to create the .GOB files?
+ 7.3.2 How should a custom .GOB file be loaded?
* 8.0 Problems running DF?
8.1 How can I contact LA?
9.0 References

============================================================================
0.0 Dark Forces FAQList

This file is a list of Frequently-Asked Questions about the MS-DOS game “Dark
Forces.” It’s also a file of answers to those questions 😉 I welcome any
feedback, questions, answers, and suggestions. You can send email to either of
my addresses. I also scan the Usenet newsgroups comp.sys.ibm.pc.games.action
and alt.games.dark-forces semi-regularly. This file is available in the AOL
Star Wars Software Library, the Action Games forum on CompuServe, as well as
the wpi.wpi.edu Star Wars FTP archive. (With that kind of distribution, I
don’t intend on establishing a mailing list.)

What I’d like to have is more info on solving problems running DF, especially
with regard to sound cards. I’d also like to have Dark Forces snugly spinning
in my NEC 3Xi as soon as possible 🙂

Dark Forces fans are fortunate that DF project leader Daron Stinnett has
agreed to provide me with inside info on DF. Many of the questions below were
answered with info provided to me by Daron (thanks!). In fact, he’s even
outlined the contents of the .GOB files (see section 7.3)! Send your questions
to me; I will relay them to Daron and include them in the FAQ.
-KAL
(hate to say it, but…)
May the Force be with You

1.0 Introduction
1.1 What is “Dark Forces”?
[*** Warning: Spoilers in paragraphs below! ***]

Dark Forces (“DF”) is LucasArts’ (“LA”) new first-person perspective game. It
is based on a LA-developed ‘Jedi Engine’, which according to the company
supports “full 3D objects, a realistic lighting model, atmospheric effects
(haze, fog, etc.), Gouroud shading, animating textures, 3D viewing angles and
more.”

Missions encompass 14 different worlds, each with a unique look and feel.
This is not a static environment, according to project leader Daron Stinnett:
“the worlds extend out in all directions. There are elevators to take you to
multiple floors, bridges over flowing water, catwalks, air shafts and other
architectural features. We wanted an active environment, so ships come and
go at the flight decks, rivers sweep along, platforms and conveyor belts
move, and much of the machinery functions.”

In this game, you play Kyle Katarn, a mercenary once employed by the Empire,
now working for the Rebel Alliance. Kyle’s first mission is to steal the plans
for the Death Star. However, Kyle stumbles upon the Imperial Admiral Mon Mohc’s
plans to create battalions of mechanized “Dark Troopers” — specially enhanced
stormtroopers which could spell the end of the rebellion. In Dark Forces, the
player, as Katarn, must travel to varied locations — such as the rebel base on
the planet Agamar and the Gromas Mines, a Star Destroyer, the Imperial City on
Coruscant, and the spaceport moon of Nar Shadda — to stop the Empire from
unleashing the Dark Troopers…

The characters inhabiting the game are familiar ones from the Star Wars
universe, and include Imperial Stormtroopers and officers, Gamorreans,
interrogation droids, the monster from the trash compactor, and Boba Fett
(and maybe even Princess Leia, Darth Vader, and Jabba the Hutt). You will be
able to use nine different weapons; among them fists, blaster, blaster rifle,
thermal detonators, autogun, mortar gun, fusion cutter, Claymore mines, and
an assault cannon. (For more, see section 6.1. No, there are no lightsabres.
Why not? Because the protagonist, Kyle Katarn, is *not* a Jedi. Yet. 😉

In your DF directory, you will find the file TXT.MSG, which is the source for
the messages displayed on-screen during the game. This file lists some
interesting objects — such as ice cleats and gas mask — not found in the
demo. Scott H. Novack (scottn@csfcorp.com) hacked this file:
So, in the spirit of the recent Star Wars commercial on TV, I’ve changed,
among other things, the message “1 Battery Pack” to “1 Energizer”. 🙂

1.2 When will DF be released, already!?

Hold your horses. Do you want it good, or do you want it now? (Yeah, I know:
you want both!) Note that LA doesn’t provide an exact shipping or release
date. Also, the estimated release date apparently depends on which customer
service representative you speak with!

Bottom line (as of 2/1/95):
Late February/early March, 1995

1.3 What media format is DF offered on?

Right now, DF is being offered on MPC CD-ROM *only*. Although it has been
rumoured, there are apparently *no* plans to offer DF on floppies later.
Daron Stinnett notes:
I don’t think so. We considered it, but it doesn’t look like the
retailers want a floppy version.
LA has not announced that there will be a version of DF for the Apple
Macintosh computers, which is not a denial 😉

1.4 What is required to run DF?

COMPUTER: IBM and 100% compatibles
OPERATING SYS: MS-DOS 5.0 or higher
CPU: 386/33 DX Minimum (486 strongly recommended)
MEMORY: 8 megabytes system memory (6.5 megabytes EMS free)
INPUT DEVICE: Mouse required, joystick supported
VIDEO: VGA (Local Bus, or PCI Recommended)
SOUND CARD: Various popular sound cards supported; see section 1.4.1.

The full release of DF requires a CD-ROM drive. The drive need not adhere to
the MPC2 standard of a 300kb/s transfer rate, but the faster your drive, the
faster you’ll load the levels. DF actually exceeds certain MPC2 requirements
(i.e., you *must* have 8 Mb RAM). Yes, you need at least 8 (eight) megabytes
of RAM — no, this is *not* a typo. Time to upgrade that PC XT! (There are
rumours of people running the DF demo with Dark Forces Demo Version: 0.163D
>………………………………
>FILE: c:projjedisrcmainmain.c, LINE: 1484, ASSERT: COULD NOT LOAD LEVEL
>AVAILABLE MEMORY: 4272K LARGEST BLOCK: 3135K
>
>
>PRESS ANY KEY TO EXIT…

Type:
df -advanced
result:

>Dark Forces Demo Version: 0.163D
>……………….
>
>Dark Forces Advanced Controller Mode…
>
>Control Structure Version: 18616458.7341812
>Control Structure Address: 0H
>ERROR: Bad Control Structure Version Number
>ERROR: Terminating Advanced Controller Mode…
>
>
>Press Any Key To Continue…

5.0 What are the secret areas in the Prologue Mission 1 demo?
[*** Warning! Spoilers ahead! ***]

5.1 Red Key Door

To get the red key, go outside the complex to Floor 0. As you exit Floor 1,
there will be two doors in front of you–one to your left, one to your
right. Go in either one, and shoot the stormtrooper. There will be an
elevator which you will take up a level. Shoot any enemies; the Imperial
officer is the one with the red key. Run over the key and go back to Floor
1. Now you can go through the red door and take the elevator up a level.

5.2 A New Area

In the red key area, there is a round, red switch on the wall. Press the
switch and jump down to Floor 1. There will be a new area now open, to the
right of where you started the game. Kill any enemies there.

5.3 Thermal Detonator/Shield Unit Storage

While in the new area described in the section above, turn around as if to
leave this area the way you came. There will be a switch on the wall. Press
this and return to the red key area (Floor 2). Go to the round switch again,
and look across the hallway. There will be a ‘closet’ that has opened up. To
get to it, you must run fast (hold down the left [SHIFT] key and jump [X] at
the last moment. You will retrieve some shield packs and Thermal Detonators.

5.4 Ground Floor Zero

Go outside to Floor 0 again. Check your map with [TAB]. You exited Floor 1 at
a location of 6:00 on an analog clock; on the outside wall, between 11:00 and
12:00, there is a crack in the wall. (It’s pretty tough to see; it looks a
little like an “X”.) Use a TD to blow open the crack (stand back a ways!).

Enter the cave; if it’s too dark, turn on your headlight with the [F5] key.
You will find 5 TDs and a Weapon Supercharge!

5.5 Outer Ledge and Caves

Go into the area opened up by pressing the round switch in the red key area.
(This is the area behind the walls to your right as your started the game.)
Take the round elevator up to Floor 2. Shoot any enemies. Go up to the
Northmost part of the Floor (don’t fall off!). Point yourself West. You
should see a ledge on the outer wall that has three shield units on it. Back
up as far East as your can go, and take a running jump to reach the ledge.
Pick up the shields.

Now face the wall; if you turn to your right you should see another, very
narrow ledge. You will see two cracks in the wall here. Open them up with a
couple of TDs. Now do a tiny run and jump to this ledge. Turn on your
headlight to see. The left cave contains energy units and the autogun. The
right cave contains medkits and an extra life (the spinning red New Republic
insignia).

5.6 The Big One
5.6.1.1 Method 1: Troublesome Windows

Go into the red key area again. There you will see two windows to the outside.
You must get to the other side. Some have found it easy to get through the
right window by taking a crouching run and jumping at the last moment. Others
can only get through by doing a crouching run *backwards* and jumping (it’s
worked for me). Go to section 5.6.2.

5.6.1.2 Method 2: A Leap of Faith

Go to Floor 2 again, as described in section 5.5. Go to the Southmost point,
where it forms a little ‘peninsula’. There is another peninsula for the East
side of this Floor. You must jump across from the West side to the East side.
(It may help to use the Map view.) It *is* possible to run and jump almost
immediately and reach the other side.

5.6.2 To the Outer Wall

Go to the NorthEast corner of this Floor, and point yourself to the
NorthEast. You should be able to see a crack in the outer wall. Throw a TD
to the crack (hold down the fire control for a second or so to get some
distance). Back up a ways, and run and jump into the cave. Turn on your
headlight. You cannot open the door on your right. Go deeper into the cave
until you hit a wall. You can open the wall, which reveals a switch. Press
the switch to open the door by the cave mouth. Go through the door, and
press the switch on the wall. This will lower the wall. Drop down.

Now you’re on Floor 0 again, but to your left will be a new area. Go through
the door. This area will contain a lot of neat stuff. First up will be some
axe-wielding Gamorrean guards who are, for some odd reason, a lot tougher
than stormtroopers. Be on the lookout for TD-tossing Quarren (“Squid Heads”).
There are also seeker remotes, which are much more lethal than the ones Luke
Skywalker practiced with. You will also find *lots* of goodies! Among them,
the Mortar Gun and mortar shells, TDs, Fusion Cutter, Claymore mines, a
battery cell, infrared goggles, and a ‘revive’ gem.

Go to the door of the central room. In the room are several dangerous
interrogator droids. You’ll see why this room is called the “Emperor’s
Lounge”: there are a couple of pictures of Palpatine. On the wall is a
panel, behind which is a switch. Pressing this switch will start a few enemy
generators. When you leave this area, there will be a *lot* of stormtroopers
and floating probe droids (“probots”). Note: you don’t *have* to flip the
‘enemy generator’ switch if you don’t want to!

Interestingly, the probots don’t appear consistently each time you play.
Sometimes they do, sometimes they don’t. It is not clear why this occurs.
Also, some enemies will tend to come back to life after this switch has been
activated!

5.7 The Death Star Plans

Go to the new area described in section 5.2. Take the stairs behind the
round elevator. Behind the first door is a stormtrooper and a brownish
mechanism, which is part of the elevator mechanism. If you have followed
this walkthru so far, the elevator will be in the upright position, and you
will be able to step into the secret area behind the mechanism and pick up
some energy cells and shield units.

Continue down and past the holo of the Death Star, turn left down the hallway.
You will see an Imperial officer behind a counter. Shoot him and any others.
Behind the counter is a switch which will open the wall behind you . Go into
this new room and take the red circuit board. “This is too easy. Now to get
to my ship!”

5.8 A Revolution

Go through the door on your left, and go *past* the door of the round elevator
until you reach a lone stormtrooper. Blast him. Now face East. Go up to the
wall and open it. It will turn, and you must move ahead to enter the room.
Blast the stormtroopers and soldiers. Pick up the TDs, rifles, energy packs,
and shield units. To exit, go back up to the wall and open it again.

5.9 A Diversion and a Grate Finish

Now take the round elevator up. Blast any stormtroopers here. (In this
courtyard, you can open a grate in front of a duct leading down. If you take
this, you will land right where you started, which is kind of pointless. This
is presumably how Kyle entered the Imperial Base in the first place.)

Go out into the courtyard, where your ship is waiting. You’ve accomplished
your objectives! (Hit [ESC] to end.)

*** If I’ve left out any secret areas, please let me know where they are and
how to reach them.
*** If my description makes no sense, let me know and I’ll attempt to
clarify my instructions.

6.0 Weapons, shields and objects
6.1 What weapons are there?
6.1.1 Fists
Good luck! 😉

6.1.2 Modified Bryar Rifle (“Blaster”)
Fires coherent packets of intense light energy, also called bolts.

6.1.3 Stormtrooper Rifle
Also fires bolts, but more rapidly. Also, each bolt takes *two* units of
energy, whereas the blaster uses only one. Note that it appears the player
is only allowed a certain number of shots at any given moment (e.g., when
you shoot a near wall, the rifle fires more rapidly than when firing at a
more distant target). Uses the same ammo as the blaster; you can carry a
maximum of 500 rounds.

6.1.4 Thermal Detonators
When activated, a TDs produce a fusion reaction which causes a small
explosion. Princess Leia threatened to use one in _Return of the Jedi_. The
longer you hold down the primary fire button (e.g., the [CTRL] key), the
farther you toss the TD when you release it. Hitting secondary fire (e.g.,
[z]) tosses the TDs with a time delay before detonation.

6.1.5 Imperial Repeater Rifle (“autogun”)
Fires blue energy bolts. Pressing primary fire shoots off a single bolt,
whereas pressing secondary fire shoots off a trio of bolts simultaneously
in a triangular configuration.

6.1.6 Jeron Fusion Cutter
Fires green energy bolts. Pressing primary fire shoots bolts successively
from each of the four chambers. Pressing secondary fire launches all four
chambers simultaneously

Scanning Masers For Informational Retreval (December 22, 1990)

(word processor parameters LM=8, RM=75, TM=2, BM=2)
Taken from KeelyNet BBS (214) 324-3501
Sponsored by Vangard Sciences
PO BOX 1031
Mesquite, TX 75150

There are ABSOLUTELY NO RESTRICTIONS
on duplicating, publishing or distributing the
files on KeelyNet!

December 22, 1990

CRYSTAL1.ASC
——————————————————————–

Scanning Masers for Information Retrieval

This file is inspired by the TV show, “Science Fiction Theatre”.
One of their segments had to do with spying on a conference. The
method used was unknown and was traced to what appeared to be a
bottle of ant poison.

The show used the term “Crystal of Deception”. Unfortunately, I do
not remember the EXACT technique although it can be narrowed down to
only two.

The first technique used a clear fluid placed in the bottle of ant
poison. This fluid hardened (crystallized) over time. As the fluid
crystallized, the matrix thus formed recorded the sonic waves
present just as recordings are made in plastic or wax.

The second technique used a seed crystal onto which the new fluid
accumulated. Much like the saturated solutions used to “grow”
crystal formations. Since the absorption was somewhat regular over
time, it would also record sonic patterns.

Of the two, I think the seed crystal technique to be the most
logical since the initiator of the growth process would already be
present.

By using M.A.S.E.R. (molecular amplification by stimulated emission
of radiation) energy in a scanning pattern, the sounds could be
recovered.

When the molecules are excited, they produce modulations in the
audible spectrum which can be recovered much like radio signals are
broadcast on the AM (amplitude modulation) bands.

Scanning is done by raking the focussed beam over the area in an X
and Y pattern (vertical and horizontal to produced a 2 dimensional
pattern). Of course, by adding a Y vector (through phase
conjugation) we could scan a 3 dimensional matrix.

For a twist, the show used a rock which when scanned yielded voices
and screams. Of course, the rock was a piece of lava from Mt.
Vesuvius and had “captured” the screams of the dying inhabitants as
the lava cooled. A very interesting concept.

Page 1

Needless to say, the aggregation rate and the size and thus response
time of the particles would play a distinct part in the clarity,
fidelity and resolution of the recording.

Note that Star Trek used a credit card size piece of plastic to
record both video and audio. Science fiction it might be FOR NOW
but it does have possibilities.

Also remember the claims of Richard Shaver regarding what he said
were images recorded in stone geodes by some ancient civilization.

The geodes were sliced into thin plates which could be projected
onto a wall to see the images.

I have seen photos of these images and they are somewhat reminiscent
of intelligible patterns. By today’s standards they have almost no
merit, however.

Bear in mind that most images, either audible or visual, are direct
reproductions of ANALOG patterns (amplitude variations).

This crystal recording technique simply points to another phenomenon
that might produce a useable technology.
——————————————————————–

If you have comments or other information relating to such topics
as this paper covers, please upload to KeelyNet or send to the
Vangard Sciences address as listed on the first page.
Thank you for your consideration, interest and support.

Jerry W. Decker………Ron Barker………..Chuck Henderson
Vangard Sciences/KeelyNet

——————————————————————–
If we can be of service, you may contact
Jerry at (214) 324-8741 or Ron at (214) 242-9346
——————————————————————–

Page 2

Cyberpoet’s Guide To Virtual Culture Journal (March 14, 1994)

[] [] [] []
[] [] [] [] [] []
[] [] [] [] [] [][][]
[][] [] [][][] [][][] [] []
[] [] [] [] [] [] [] [] [][]
[] [] [] [][][] [][][] [] [][][]

A Cyberpoet’s Guide to Virtual Culture Journal

Issue.1.00 3-14-94
————————————————————————

XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXXxX
x x
X -=*=- X
x C O N T E N T S ! x
X X
x 1- Editorial o Welcome to Kibble the zine x
X 2- Guest FAQ o Clipper News & action. X
x 3- Ongoing projects o Interpedia – Internet Encyclopedia x
X 4- Upcoming conferences o DEFCON ][ – July 22, 23, 24 – 1994 X
x 5- Letters to the editor o x
X 6- Editorial Policy o X
x x
XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXXxX

Information wants to be free. Believe it, pal.
-=- Bruce Sterling

If only you could see what I’ve seen through your eyes.
-=- Blade Runner

I think that a new kind of replicator has recently emerged on this
very planet. it is staring us in the face. It is still in its infancy,
still drifting clumsily about in its primeval soup, but already it is
achieving evolutionary change at a rate which leaves the old gene panting
far behind…..
-=- Richard Dawkins [concerning memes]

The techno-underground is a direct descendant of the hippy revolution.
-=- Select Magazine (April ’92)

They made LSD illegal. I wonder what they’re going to do about this
stuff.
-=- Jerry Garcia (about VR)

Cyberpunk is really about the present.
-=- Rudy Rucker

On the Internet, no one knows that you’re a dog.
-=- New Yorker Comic

-=- 1- Editorial |
——————/

Welcome to the first issue of Kibble: the cyberpoet’s guide to virtual
culture journal. Why ‘kibble’ you may ask? A logical question. Phillip K
Dick fans will have already grep’d that ‘kibble’ is a word used in his
famous tome “Do Androids Dream of Electric Sheep”, which later was made
into a movie we know as _BladeRunner_. Kibble then, is the extraneous
stuff laying around. The things society has cast off to the junkyards and
backyards everywhere. But more specifically, the refuge that has
overflown the borders of the junkyards and that has begun to clutter up
our streets, our minds, our friendships and our politics. Yes, there
seems to be alot of kibble around these days.

Who really gives a shit about the Whitewater affair. It’s just political
kibble cluttering up my mind. I wanna know how to get more and better jobs
in Califormia. How to solve the war in the old Yugoslavia. And I want to
know why if there is so much extra wheat in America that we have to pay
people not to grow it, then why are there people starving today? Kibble
is the drug war and the anti-gang crusade, instead of the education war
and the youth brigade crusade. Kibble is the gov’ts adoption of the
clipperchip when the clipper functions are already old tech and wasted
spending. Kibble is the FBI’s attempt assemble an interception site on the
Internet for all datapackets. Kibble is the inability of one person to
smile at the next while walking down the street for fear of getting robbed
or shot.

I guess this isn’t so much the kibble zine as it is the anti-kibble zine.
But that doesn’t have quite the ring to it. So don’t be fooled by the
title. We accept Kibble and non-kibble alike (we don’t like to
discriminate). Can society exist without kibble? probably not, but as
J.F. Sebastion feared, we might soon be consumed by our kibble. I join
him in his concern.

-=- 2- Guest FAQ |
——————/

ooooooooooooooooooooooooooooooooooooooooooooooooooooooo
o This issue’s guest FAQ : Prempted by News o
o (send me your FAQs for inclusion) o
ooooooooooooooooooooooooooooooooooooooooooooooooooooooo

This section left (not)blank in the request that you read up on the
clipper fiasco currently going on with the US gov’t. Those of you of
international flavor reading this might be a good idea, for it could help
you prevent this error in your country.

Pointers on where to look for Clipper info

USENET –
comp.org.eff.talk
alt.privacy.clipper What you don’t know can hurt you.
alt.security.pgp The Pretty Good Privacy package.
alt.politics.datahighway You’ve read about it. Now Bitch about it.

FTP
ftp.eff.org pub/EFF/Policy/Clipper/
soda.berkeley.edu pub/cypherpunks

GOPHER
gopher.eff.org eff/policy/clipper
wired.com

Forwarded message:
From: jberman@eff.org Jerry Berman
Date: Mon, 7 Mar 1994 19:09:22 -0500
Subject: Leahy to hold hearings on Clipper Chip!

Dear Friends on the Electronic Frontier:

I have some good news to share with you. Senator Leahy just sent me a
letter indicating that he *will* be scheduling hearings on the
Administration’s Clipper Chip proposal. I would like to thank all of you
who sent us messages to forward to him urging hearings. I’m sure that
stack of messages we printed out made a significant impact on the Senator
— the stack was over seven inches tall! (We look forward to the day when
no trees will have to be sacrificed in the furtherance of democracy!)

And if you haven’t written a message to Rep. Cantwell yet about her
proposed amendment to the Export Control Act, please do so and forward it
to cantwell@eff.org. This is an address we set up to enable us to collect
messages in support of her bill. We have been printing out messages and
delivering them each week — so far we’ve received over 4500 letters of
support. For more information on the Cantwell bill, send a message to
cantwell-info@eff.org.

Thanks again. We’ll let you know as soon as the Clipper hearing gets
scheduled.

Sincerely,

Jerry Berman
EFF Executive Director

-.-.-.-.-.-.-. forward from Sen. Leahy -.-.-.-.-.-.-.-.-.-.

United States Senate
Committee on the Judiciary
Washington, DC 20510

March 1, 1994

Mr. Jerry Berman
Executive Director
Electronic Frontier Foundation
1001 G Street, Suite 950 East
Washington, DC 20001

Dear Jerry,

Thank you for forwarding to me the many thoughtful and informative messages
you received over the Internet regarding the Administration’s recent
approval of an escrowed encryption standard, known as the Clipper Chip.

Many of the messages urge Congress to hold hearings to review the
Administration’s Clipper Chip standard. In fact, I intend to hold a
hearing before the Judiciary Subcommittee on Technology and the Law, which
I chair, to consider the important issues raised by the Clipper Chip. I
will let you know when a date for the hearing is scheduled.

Thank you again.

Sincerely,

/s/ PATRICK J. LEAHY
United States Senator

PJL/jud
-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.

JOIN EFF!!
==========

EFF’s work as a civil liberties organization in Washington has been very
successful, but the realization of our goals of freedom and privacy online
can only come with the active and vocal participation of the entire online
community. Now that you have personally experienced both the threat of the
loss of your privacy and the power having won the first battle, won’t you
take that next step and become a member of EFF?

By joining EFF, you will help us to expand our reach to educate and involve
an even greater number of people in the shaping of these critical issues.
Your tax-deductible donation will tie you into the EFF information network
and support our public policy and legal work. As a member, you will be
guaranteed timely the timely information and mechanism you need to respond
on these issues. Our voices in unity *do* make a difference.

-stuff deleted–

o How to get PGP o

When in the Course of human events, it becomes necessary for one
people to ensure their own right to privacy, they get PGP :-).

Tired of sending your e-mail on postcards? Send me mail at
<qwerty@netcom.com with Subject "Bomb me!" to get Gary Edstrom's PGP FAQ
and my "Here's How to MacPGP!" guide. (They are also available by
anonymous ftp to netcom.com in /pub/gbe and /pub/qwerty).

PGP is the free encryption program designed by Phil Zimmerman, and is
available for most any computer.

-=Xenon=-

======================================================================

-=- 3- Ongoing projects |
————————-/

So you want to get in on the action. Here are some various projects which
are starting up or in process around the net. Like any other culture, the
net requires constant tuning and growth. These are some of the more overt
methods of doing just that. In addition these projects are a great way of
accomplishing what the cyberpoet is constantly searching for . . . a
net.community.

o Interpedia – Internet Encyclopedia mailing list

This is to inform you about the proposed Internet Encyclopedia, or
Interpedia and the mailing-list for discussion of it.

The original idea, due to Rick Gates, was for volunteers to
cooperatively write a new encyclopedia, put it in the public domain,
and make it available on the Internet. Participants on the
mailing-list have expanded the concept by noting that the
bibliography entries and references provided with Interpedia articles
could include hypertext links to other resources available on the
Internet. Unlike any printed encyclopedia, the Interpedia could be
kept completely up-to-date. Indeed, it could include hypertext links
to ongoing discussions, and perhaps evolve into a general interface
to all resources and activities on the Internet.

If you find these ideas interesting, please join the Interpedia
mailing-list by sending a message to
interpedia-request@telerama.lm.com with the body of the message
containing the word ‘subscribe’ and your e-mail address, as follows:

subscribe your_username@your.host.domain

Owner: Doug Luce interpedia-request@telerama.lm.com
Interpedia List Maintainer
Telerama Public Access Internet

-=- 4- Upcoming conferences |
—————————–/

xxxxxxxxxxxxxxxxxxxxxxxx xx DEF CON ][ Convention Initial Announcement
xxxxxxxXXXXxxxxxxxxxxxxxxx xx DEF CON ][ Convention Initial Announcement
xxxxxxXXXXXXxxxxxx x x DEF CON ][ Convention Initial Announcement
xxxxxXXXXXXXXxxxxxxx x DEF CON ][ Convention Initial Announcement
xxxxXXXXXXXXXXxxxx xxxxxxxxx DEF CON ][ Convention Initial Announcement
xxxXXXXXXXXXXXXxxxxxxxxxx x DEF CON ][ Convention Initial Announcement
xxXXXXXXXXXXXXXXxxxxxx xx x DEF CON ][ Convention Initial Announcement
xxxXXXXXXXXXXXXxxxxxxxx DEF CON ][ Convention Initial Announcement
xxxxXXXXXXXXXXxxxxxxxx x xx DEF CON ][ Convention Initial Announcement
xxxxxXXXXXXXXxxxxxxxxxx xx x DEF CON ][ Convention Initial Announcement
xxxxxxXXXXXXxxxxxxxxx x DEF CON ][ Convention Initial Announcement
xxxxxxxXXXXxxxxxxxxxxxxxxx DEF CON ][ Convention Initial Announcement
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx DEF CON ][ Convention Initial Announcement

READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE

=============================================================================

What’s this? This is the initial announcement and invitation to DEF CON ][,
a convention for the “underground” elements of the computer culture. We try
to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
Virii coders, programmers, crackers, Cyberpunk Wannabees, Civil Liberties
Groups, CypherPunks, Futurists, Artists, Etc..

WHO: You know who you are, you shady characters.
WHAT: A convention for you to meet, party, and listen to some speeches
that you would normally never hear.
WHEN: July 22, 23, 24 – 1994
WHERE: Las Vegas, Nevada @ The Sahara Hotel

So you heard about DEF CON I, and want to hit part ][? You heard about the
parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
check it out in person? Load up your laptop muffy, we’re heading to Vegas!

Here is what Three out of Three people said about last years convention:

“DEF CON I, last week in Las Vegas, was both the strangest and the best
computer event I have attended in years.” — Robert X. Cringely, Info World

“Toto, I don’t think we’re at COMDEX anymore.” — Coderipper, Gray Areas

“Soon we were at the hotel going through the spoils: fax sheets, catalogs,
bits of torn paper, a few McDonald’s Dino-Meals and lots of coffee grounds.
The documents disappeared in seconds.” — Gillian Newson, New Media Magazine

DESCRIPTION:

Last year we held DEF CON I, which went over great, and this year we are
planning on being bigger and better. We have expanded the number of
speakers to included midnight tech talks and additional speaking on Sunday.
We attempt to bring the underground into contact with “legitimate” speakers.
Sure it’s great to meet and party with fellow hackers, but besides that we
try to provide information and speakers in a forum that can’t be found at
other conferences.

While there is an initial concern that this is just another excuse for the
evil hackers to party and wreak havok, it’s just not the case. People come
to DEF CON for information and for making contacts. We strive to distinguish
this convention from others in that respect.

WHAT’S NEW THIS YEAR:

This year will be much larger and more organized than last year. We have a
much larger meeting area, and have better name recognition. Because of this
we will have more speakers on broader topics. Expect speaking to run
Saturday and Sunday, ending around 5 p.m. Some of the new things expected
include:

> An INet connection with sixteen ports will be there, _BUT_ will only
provide serial connections because terminals are too hard to ship. So
bring a laptop with communications software if you want to connect to the
network. Thanks to cyberlink communications for the connection.

> There will be door prizes, and someone has already donated a Cell Phone
to give away.

> Dr. Ludwig will present his virii creation awards on Sunday.

> A bigger and better “Spot The Fed” contest, which means more shirts to
give away.

> More room, we should have tables set up for information distribution.
If you have anything you want distributed, feel free to leave it on the
designated tables. Yes, this year there will be a true 24 hour
convention space.

> A 24 hour movie / video suite where we will be playing all type of stuff.
VHS Format. Mail me with suggested titals to show, or bring your own.

> Midnight Tech Talks on Friday and Saturday night to cover the more
technical topics and leave the days free for more general discussions.

WHO IS SPEAKING:

I was going to run a list of the current speakers we have lined up, but at
this point things are still fluid. In a few months when the speakers list
is more solidified I will release it. I’ll name the poeple who have
committed to attending in the next announcement. Trust me.

WHERE THIS THING IS:

It’s in Las Vegas, the town that never sleeps. Really. There are no clocks
anywhere in an attempt to lull you into believing the day never ends. Talk
about virtual reality, this place fits the bill with no clunky hardware. If
you have a buzz you may never know the difference. It will be at the Sahara
Hotel. Intel as follows:

The Sahara Hotel: 1.800.634.6078
Room Rates: Single/Double $55, Tripple $65, Suite $120
(Usually $200) + 8% tax
Transportation: Shuttles from the airport for cheap

NOTE: Please make it clear you are registering for the DEF CON ][
convention to get the room rates. Our convention space price is
based on how many people register. Register under a false name if
it makes you feel better, ‘cuz the more that register the better for
my pocket book. No one under 21 can rent a room by themselves, so
get your buddy who is 21 to rent for you and crash out. Don’t let
the hotel people get their hands on your baggage, or there is a
mandatory $3 group baggage fee. Vegas has killer unions.

OTHER STUFF:

If you check out Wired like 1.5 or 1.6 there was a blurb about the new
Luxor hotel with it’s total VR experience. It looks like the first true VR
ride / experience for a group of people, it seats eight. Intense. A friend
was just over there, and tested out the various rides. Not to be outdone
the new MGM grand (Largest hotel in the world) has a ride called the R360
which is basically a gyroscope they trap you into with goggles. We should
get a group together and make a mass trek over there and check it out.
If enough people are interested I’ll call and see if we can book a time
to reserve space for a bunch of us. Both are within walking distance.

I’ll whip up a list of stuff that’s cool to check out in town there so if for
some reason you leave the awesome conference you can take in some unreal
sites in the city of true capitalism.

MEDIA:

Some of the places you can look for information from last year include:

New Media Magazine, September 1993
InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely
Gray Areas Magazine, Vol 2, #3 (Fall 1993)
Unix World, ???
Phrack #44

COST:

Cost is whatever you pay for a hotel room split however many ways, plus
$15 if you preregister, or $30 at the door. This gets you a nifty 24 bit
color name tag (We’re gonna make it niftier this year) and your foot in the
door. There are fast food places all over, and there is alcohol all over
the place but the trick is to get it during a happy hour for maximum
cheapness.

============================================================================

-=- 5- Letters to the editor |
—————————–/

This is a new section, please see our policy regarding letters.

From: Lauren N.
Mucho E-Pizza & E-Beer at you for your efforts!
___
| ~~–.
|%=@%%/
|o%%%/
__ |%%o/
_,–~~ | |(_/ ._
,/’ m%%%%| |o/ / `.
/’ m%%o(_)%| |/ /o%%m `
/’ %%@=%o%%%o| /(_)o%%% `
/ %o%%%%%=@%%| /%%o%%@=%%
| (_)%(_)%%o%%| /%%%=@(_)%%% |
| %%o%%%%o%%%(_|/%o%%o%%%%o%%% |
| %%o%(_)%%%%%o%(_)%%%o%%o%o%% |
| (_)%%=@%(_)%o%o%%(_)%o(_)% |
~%%o%%%%%o%o%=@%%o%%@%%o%~ /
. ~o%%(_)%%%o%(_)%%(_)o~ ,/
_ ~o%=@%(_)%o%%(_)%~ _/
`_~~o%%%o%%%%%~~_/’
`–..____,,–‘

#XXXX– #/—`
###XXX// – —-##= – —
##XX///-` ` — –##- – –_
###XX//- = – #/ – – —
###XX//- # #= = = |||
###XX |##- / #X- ==||
##X| | #-/ | | ||=====–)
#|| | #- | | || | |
-|| | | | | || | |
|| | | | | || | |
|| | | | | || | |
|| | | | | || | |
|| | | | | ||_______/)
|| | | | | ||=====//)
|| | | | | ||
|| | | | | ||
-| | | | | |/
==== | | |====
===============
Cheers!

***editors note: Thanks I enojoyed them both.***

-= 6- Editorial Policy |
———————–/

-=*=-

The Cyberpoet’s Guide to Virtual Culture and the associated Ezine
“Kibble: the Cyberpoet’s Guide to Virtual Culture Journal” is a
semi-monthly publication of John Frost (frost@netcom.com). Kibble is
dedicated to publishing information/articles/stories that affects the
culture of the Internet. Submissions to Kibble are encouraged although
the editors must reserve the right to edit them. Letters to the editor
may be sent to frost@netcom.com and should have the word “Kibble” in the
subject. Each letter will appear with the authors name and email address.
Anonymous letters will not be printed without a working response
address. The editors reserve the right to edit letters and encourage
accuracy and brevity.

-=*=-

Kibble is currently planning to release an issue centered on issues of
Gender and the Net. We especially encourage people to send in articles,
papers, opinion peices (or whatever) dealing with that topic. Thank you.

———————————————————————–

As far as I know this zine (and the guide itself) is archived at mindvox &

ftp//ftp.eff.org//pub/net_info/cyberpoet.gvc
ftp//etext.archive.umich.edu//pub/Zines/Cyberpoet
ftp//vela.oakland.edu//pub/tribe/publications
USENET//alt.cyberspace, alt.cyberpunk, alt.virtual.culture

Please inform me of any other archival so that I may make mention of
it here.

Kibble, it’s format, theme and articles are copyright 1993,1994 John Frost
[frost@netcom.com], except where the copyright is retained by the original
author. The rights to distribute and reproduce this document are granted
in accord with the Agitprop guidelines founded by Bruce Sterling. A copy
of those guidelines may be found via ftp at ftp.eff.org
ftp/pub/Publications/Bruce_Sterling/README or at EFF’s gopher site. Other
uses and non-electronic reproduction of this document must first be
cleared, in writing, with John Frost. Under no circumstance may
money/script/funds be charged for access to this document, beyond the
money charged for general access to the system it is found on. Kibble may
not be distributed on any disk/tape/device with a capacity of more then 80
megs.


John Frost (also Indigo) | So we have erected a glowing altar in the
frost@netcom.com <- best | center of our lives that feeds on our terror,
frost@lclark.edu <-2ndbest | and fear has become our national religion.
Indig0 on IRC | -John Perry Barlow
Indigo on MediaMOO | on the current state of TV
PGP public key avaiable | -=-
upon request | without PGP your email is just a postcard.

Cyberpoet’s Guide To Virtual Culture Part 5 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p5/5

Part V of V – 3.14.94 A Cyberpoet’s Guide to Virtual Culture

-=- 05.Offline Interests
o Magazines
o Bibliography

-=- 05.Offline Interests
——————————————————
-=- 05.1.Magazines |
———————–

aXcess
PO Box —–
San Deigo, CA 920??
-“Music, Cyberculture, Style” professes the banner.
I give them high marks for the music and
cyberculture, and low marks for the Style
and the definate Southern California centricity
of the articles. But this *was* the first issue
-$4 an issue, $?? for 6 issues.

Boardwatch
Black Ice
Body Art

bOING bOING
PO Box 18432
Boulder, CO 80308
-cyberpunk zine. Not as glossy as the others that
have recently debuted, but who needs all those
pretty pictures anyway.
-$4 an issue, $14 for 4 issues

Communications of the ACM
Critique: Studies in Contemporary Fiction
Cryonics Magazine
CyberEdge Journal
Cybertek
Disco Family Plan
Edge Detector

EFF Effector
Membership Coordinator
Electronic Frontier Foundation
1001 G Street, N.W.
Suite 950 East
Washington, DC 20001 USA

Membership rates:
$20.00 (student or low income membership)
$40.00 (regular membership)

-the print magazine of the Electronic Frontier
Foundation. A bible of constitutional thought and
action regarding the online world.
-A $40 membership will merit you a subscription.
Join yesterday! (Backdate your check =)

EXTROPY: The Journal of Trans-humanist Thought
PO Box 57306
Los Angeles, CA 90057-0306
-There are also a few Mailing lists and USENET
groups that follow this subject. Check those out
before checking out this magazine.
-$9 two issues (one year)

FactSheet-Five
Seth Friedman
PO Box 170099
San Francisco CA 94117-0099
-independently-oriented reviewers of the
zine culture. It was gone, but now it’s back.
-1 issue $4, 6 issues $20 (or more)

FAD Magazine
Fluxu8
Freakbeat
Full Disclosure
Future Sex
Hack-Tic
The HardCore
Interference on the Brain Screen

Internet Business Journal
E-mail: 72302.3062@compuserve.com
phone: (613) 747-6106.
$149 ($179 Canadian) for a one year (6 issue plus six supplements)

Internet World
E-mail: meckler@jvnc.net.
Phone: (800)-MECKLER. [Subscription price?]

Intertek
Interzone
Iron Feather Journal
Isaac Asimov’s Science Fiction magazine
The Journal of Complex Systems
The Magazine of Fantasy and Science Fiction

Matrix News
E-mail: mids@tic.com
Published in online and paper editions.
Online edition is $25 for 12 monthly issues ($15 for students.)

Mondo 2000
PO Box 10171
Berkeley, CA 94709
415.845.9018 (phone)
415.649.9630 (fax)
mondo2k@well.sf.ca.us
mondo2k@mindvox.phantom.com
-your guide to all things cyberpunk and some things
not. The Original magazine to document this
virutal culture, but, unless they change for the
next issue, not the best.
-$24 for 5 issues (published quarterly, maybe)

Nootropic News

Online Access
E-mail: 70324.343@compuserve.com
Subscription is $19.80 for 8 issues

Pixel: The Magazine of Scientific Visualization
Pixel Vision
Robot Experimenter
Science Fiction Eye
Science Fiction Studies
Sector 9737
Sound Choice
Audio Evolution network
SOUND News and Arts
TAP
Technology Works
Territories

2600
PO Box 752
Middle Island, NY 11953-0752
516.751.2600 (office)
516.751.2608 (fax)
2600@well.sf.ca.us
-the famous hacker’s zine. Still ticking.
-subscriptions are $21 for 4 issues (published
quarterly)
-back issues are $25 / year

Urb Magazine
US RAVE Magazine
Verbum: The Journal of Personal Computer Aesthetics
Virus 23
Whole Earth Review

WIRED
info@wired.com
-The magazine is hot! and made quite a buzz
across the internet for weeks after it debuted
-now it is publishing 12 months a year
-$4 an issue. $29.95 / year.

Zine Exchange

-=- 05.2.Bibliography |
————————

??? American Flagg – comic
Cyberpunk – comic
Dirty Pair – comic
Judge Dredd – comic
Vertigo Series – DC comics

Anonymous – Go Ask Alice. Diary of 15 year-old girl in the drug world
– Computers: Crimes, Clues, and Controls. Hacking

Abraham, Ralph – A Visiual Introduction to Dynamical Systems Theory
– The Visual Mathematics Library

Acker, Kathy – Blood and Guts in High School (fiction)
– Don Quixote, which was a dream (fiction)
– Empire of the Senseless (fiction)
– Great Expectations (fiction)
– The Adult Life of Toulouse-Lautrec
– In Memoriam to Identity

Adams, Douglas – The Meaning of Liff (fiction)
– The Hitchhiker’s Guide to the Galaxy (fiction)
– The Restaurant at the End of the Universe (fiction)
– Life, the Universe, and Everything (fiction)
– So Long, and Thanks For All the Fish (fiction)
– Mostly Harmless (fiction)
– Dirk Gently’s Holistic Detective Agency (fiction)
– The Long Dark Tea Time of the Soul (fiction)

Aldiss, Brian Wilson – Barefoot in the Head (fiction)
– Enemies of the System (fiction)

Algren, Nelson – Man with the Golden Arm (fiction)

Army, U.S. – Computer-Related Crime

Artaud, Antonin – The Peyote Dance

Ashby, W. Ross – An Introduction to Cybernetics

Asimov, Isaac – The Robot Novels
– Robots: Machines in Man’s Image
– The Foundation Series

Austakalnis, Steve & David Blatner – Silicon Mirage. Vr

Bachman, Richard – The Running Man (fiction)

Ballard, J. G. – The Atrocity Exhibition (Re/Search publication)
– Crash (fiction)
– Concrete Island
– High rise

Barlow, John Perry – Everything We Know is Wrong (forthcoming)

Barnes, Steven – Gorgon Child (fiction)
– Streetlethal (fiction)

Barrow, John and Frank Tipler – The Anthropic Cosmological Principle

Barry, Judith – Public Fantasy. PoMo

Bass, Thomas – The Eudaemonic Pie. Chaos

Bateson, Gregory – Steps to an Ecology of Mind
– Mind and Nature: Necessary Unity

Baudrillard, Jean – The Anti-Aesthetic: Essays on Postmodern Culture
– Body Invaders: Panic Sex in America (ed.)
– The Ecstacy of Communication
– America
– Simulations
– In the Shadow of the Silent Majorities
– Seduction
– Cool Memories

Bear, Greg – Blood Music (fiction)
– Eon (fiction)
– Eternity (fiction; sequel to Eon)
– Beyond Heaven’s River (fiction)
– Forge of God (fiction)
– Great Sky River (fiction)
– Psychlone (fiction)
– Strength of Stones (fiction)
– The Wind Froma Burning Woman (fiction)

Beck, Jerome, & Rosenbaum, Marsha – Pursuit of Ecstacy: The MDMA Experience

Bell, Madison Smartt – The Washington Square Ensemble
– Waiting for the End of the World

Belsito, Peter – HardCore California
– Notes from the Pop Underground

Benedikt, Michael – Cyberspace: First Steps
+ the canonical cyberspace resource.

Benford, Gregory – Against Infinity

Bernal, J. D. – The World, the Flesh, and the Devil

Bester, Alfred – Computer Connection (fiction)
– Golem 100 (fiction)
– The Demolished Man (fiction)
– The Stars My Destination (fiction)

Betanacourt, G. – Johnny Zed (fiction)

Bethke, Bruce – Cyberpunk (fiction)
– Elimination Round (fiction)

Bey, Hakim – T.A.Z.

Black, Bob – The Abolition of Work and Other Essays
– Friendly Fire
– Rants and Mineral Tracts (with Adam Parfrey, eds.)

Blake, William – The Mariage of Heaven and Hell

Blankenship, Loyd (Steve Jackson Games) – GURPS Cyberpunk RPG

Bloombecker, Buck – Spectacular Computer Crimes

Blumlein, Michael – The Movement of Mountains (fiction)

Bova, Ben – Exiled from Earth (fiction)

Bradbury, Ray – Fahrenheit 451 (fiction)

Brecher, Edward M. (Consumer’s Union) – Guide to Licit and Illicit Drugs

Breton, Andre – What is Surrealism? Selected Writings
– Manuifestos of Surrealism

Brin, David -Earth (fiction)

Brockman, John (ed) – Speculations: Reality Club 1
– Doing Science: Reality Club 2
– Ways of Knowing: Reality Club 3

Brunner, John – The Shockwave Rider (fiction)
– Stand on Zanzibar (fiction)
– The Jagged Orbit (fiction)
– The Sheep Look Up (fiction)
– The Stone that Never Came Down (fiction)

Budrys, Algis – Michaelmas (fiction)

Burger, Ralf – COmputer Viruses: A High Tech Disease

Burgess, Anthony – A Clockwork Orange (fiction)
– The End of the World News: An Entertainment.

Burroughs, William S. – Interzone (fiction)
– Naked Lunch (fiction)
– Nova Express (fiction)
– The Soft Machine (fiction)
– Ticket That Exploded (fiction)
– The Wild Boys: A Book of the Dead (fiction)
– The Third Mind
– The Yage Letters
– The Adding Machine: Selected Essays
– The Last Words of Dutch Schultz
– The Western Lands
– Cities of the Red Night

Butler, Jack – Nightshade (fiction)

Cadigan, Pat – MindPlayers (fiction)
– Indigo (fiction)
– Patterns (fiction)
– Synners (fiction)

Card, Orson Scott – Ender’s Game (fiction)

Carlisle, Anne – Liquid Sky (fiction)

Chambers, Iain – Popular Culture: The Metropolitan Experience (fiction)

Chesebro, James w. and Donald g. Bonsall – Computer-mediated
Communication:
human relationships in a computerized world

Churchland, Patricia – Neurophilosophy:…Unified Science of the Mind/Brain

Consumer Reports – Complete Drug Reference

Cornwall, Hugo – Datatheft. Hacking
– Hacker’s Handbook III. Hacking.

Crick, Francis – Life Itself: It’s Origin and Nature

Cross, Ronald Anthony – Prisoners of Paradise (fiction)

Crowley, Aleister – Diary of a Drug Fiend
– Magick Without Tears

Davies, Paul – The Accidental Universe

Davis, Douglas – Art and the Future

Dean, Ward – Smart Drugs & Nutrients. Nootropics, smart drugs

Deken, Joseph – Computer Images: State of the Art

Delany, Paul and George Landlow (eds) – Hypermedia & Literary Studies

Delany, Samuel – Dahlgren (fiction)
– Babel 17 (fiction)
– Nova (fiction)
– The Edge of Space: Three Original Novellas of SF

Delgado, Jose – Physical Control of the Mind: Towards Psychocivilized

DeLillo, Don – White Noise (fiction)

Denning, Peter J. (ed. ACM) – Computers Under Attack

Denton, Bradley – Wrack’n’Roll (fiction)

de Quincy, Thomas – Confessions of an English Opium Eater

Derrida, Jacques – Of Grammatology
– Speech and Phenomena
– Writing and Difference

Dick, Philip K. – Do Androids Dream of Electric Sheep
(Blade Runner)(fiction)
– Flow My Tears the Policeman Said (fiction)
– Vulcan’s Hammer (fiction)
– Ubik (fiction)
– A Scanner Darkley (fiction)

Dickson, Gordon – The R-Master (fiction)

Dobbs, Bob – Book of the SubGenius

Dozois, Gardner – Slow Dancing Through Time (fiction)

Drexler, Eric – Engines of Creation. Nanotechnology
– Unbounding the Future: The Nanotechnology Revolution

Duchamp, Marcel – The Complete Works of Marcel Duchamp

Eco, Umberto – Foucault’s Pendulum (historical fiction)
– Travels in Hyper Reality: Essays

Effinger, George Alec – A Fire in the Sun (fiction)
– When Gravity Fails (fiction)
– The Exile Kiss (fiction)

Eisner, Bruce – Ecstacy: The MDMA Story

Em, David – The Art of David Em: 100 Computer Paintings

Farren, Mick – The Long Orbit (fiction)

Faust, Clifford – The Company Man (fiction)
– A Death of Honor (fiction)

Feynman, Richard – QED: The Strange Theory of Light and Matter

Fjermedal, Grant – The Tomorrow Makers (fiction)

Foley, James et al – Computer Graphics: Principles and Practice

Ford, John – Web of Angels (fiction)

Forester, Tom – Computer Ethics. Hacking, viruses, etc

Foster, Alan Dean – Cyber Way (fiction)

Friedman, David – The Machinery of Freedmon. Anarchy

Furst, Stevyn – Hallucinogens and Culture

Gerrold, David – When Harlie Was One

Gibson, William – Burning Chrome (fiction)
– Count Zero (fiction)
– The Difference Engine (with Bruce Sterling)(fiction)
– Mona Lisa Overdrive (fiction)
– Neuromancer (fiction)
– Virtual Light (fiction)
– Agrippa: A Book of the Dead (poem: multimedia)

Gleick, James – Chaos: The Making of a New Science

Goodman, Cynthia – Digital Visions: COmputers and Art

Gracie & Zarkov – Notes from Underground. Drugs

Griffith, Winter – Complete Guide to Prescription and
Nonprescription Drugs

Grof, Stanislov – The Human Encounter with Death. Death, Psychology, LSD
– Realms of the Human Unconscious. LSD, Subconscious.

Gunderloy, Mike and Cari Goldberg Janice – Zine Culture

Gyson, Brion and Terry Wilson – Here to Go: Planet 101

Hafner, Katie with John Markoff – Cyberpunk: Outlaws and Hackers…Frontier

Hamit, Francis & Wes Thomas – Virtual Reality: Adventures in Cyberspace

Hand, Elisabeth – Winterlong (fiction)
Aestival Tide (fiction)
Icarus Descending (fiction)

Harasim, Linda, ed. – Global Networks: computers and international
communication

Harraway, Donna – Simians, Cyborgs & …

Harrison, Harry – Make Room! Make Room! (fiction)

Harry, M. – Computer Underground: Hacking, Piracy, Phreaking, & …Crime

Hattori, Katura – What’s Virtual Reality?

Hawke, Simon – Psychodrome (fiction)

Hawking, Stephen – A Brief History of Time

Heinlein, Robert – The Moon is a Harsh Mistress (fiction)
– Notebooks of Lazarus Long (fiction)
– Stranger in a Strange Land (fiction)
– Time Enough for Love (fiction)
– not to mention all the others he wrote

Helsel, Sandra & Judith Roth – Virtual Reality: Practice, Theory, & Promise

Herbert, Nick – Faster Than Light: Superluminal Loopholes in Physics
– Quantum Reality: Beyond the New Physics

Herer, Jack – Hemp & Marijuana Conspiracy: The Emperor Wears No Clothes

Hoffman, Abbie – Steal This Book
– Steal This Urine Test: Fighting Drug Hysteria
– Soon To Be a Major Motion Picture
– Best of Abbie Hoffman

Hofmann, Albert – Insight/Outlook
– LSD: My Problem Child

Hofstadter, Douglas R. – The Mind’s I: Reflections on Self & Soul

Holmes, Thomas – Electronic and Experimental Music

Home, Stewart – The Assault on Culture

Hooper, Judith – Would the Buddha Wear A Walkman? Catalogue of Consciousness

Hoy, ??? – Loompanics Greatest Hits

Hoyle, Fred and Chandra Wickramasinghe – Living Comets

Hutchison, Michael – Mega-brain. Consciousness, Brain growth, stimulation

Huxley, Aldous – Brave New World (fiction)
– Brave New World Revisited (fiction)
– The Doors of Perception. Mescaline encounters
– Ends and Means. Nature of ideals and realization
– Heaven and Hell
– Island (fiction)
– Moksha. Hallucinogens, religious experiences, visions
– Perennial Philosophy. Philosophy and religion

Huyssen, Andreas – After the Great Divide: Modernism, Mass Culture,
Postmodern

Jacobsen, Linda (ed) – Cyberarts: Exploring art and technology

Jahn, robert and Brenda Dunne – Margins of Reality..Consciousnes….

Jeter, K. W. – Death Arms (fiction)
– Dr. Adder (fiction)
– Farewell Horizontal (fiction)
– Infernal Devices (fiction)
– The Glass hammer (fiction)

Kadrey, Richard – Metrophage (fiction)

Kawaguchi, Yoichiro – Growth Metamorphogenesis. Computer art

Kehoe, Brendan – Zen and the Art of the Internet

Kerouac, Jack – On the Road

Kelly, James Patrick – Look Into the Sun (fiction)

Kelly, Kevin – SIGNAL: Communications Tools of the Information Age

Kesey, Ken – Sometimes a Great Notion. Autobiography
– Further Inquiry. Tales of the Merry Pranksters

Key, William Bryan – Subliminal Seduction
– Media Sexploitation
– The Clam-Plate Orgy

Kowalski, Roy – The Science of Virtual Reality and Virtual Environments

Kroker, Arthur, and David Cook – The Postmodern Scene

Krol, Ed – The Whole Internet User’s Guide & Catalog

Krueger, Myron W. – Artificial Reality
– Artificial Reality II

Kunetka, James – Nature’s End (fiction)

Lacan, Jacques – Television

Laidlaw, Marc – Dad’s Nuke (fiction)
– Neon Lotus (fiction)

Landreth, Bill – Out of the Inner Circle. Hacking

Langston, Christopher – Artificial Life 1
– Artificial Life 2

LaQueye Tracey and Jeanne Ryer – The Internet Companion

Laurel, Brenda – The Art of Human-Computer Interface Design
– Computers as Theatre

Leary, Timothy – Changing My Mind, Among Others
– Flashbacks
– Info Psychology
– Neuropolitiques
– Politics of Ecstacy
– Psychedelic Experience

LeGuin, Ursula – Always Coming Home (fiction)

Lee, Marvin – Acid Dreams: CIA, LSD, and the Sixties

Lem, Stanislaw – Memoirs Found in a Bathtub (fiction)
– Solaris
– The Futuroligcal Congress
– The Cyberiad
– One Human Minute
– Fiasco
– A Perfect Vacuum
– Imaginary Magnitude

Lennon, John – Lost Prophetic Writings

Levy, Steven – Hackers. Origins of hackers

Lewit, S. N. – Cyberstealth (fiction)
– Dancing Vac (fiction)

Leyner, Mark – My Cousin, My Gastroenterologist (fiction)
– American Made (fiction)
– I Was an Infinitely Hot and Dense Dot (fiction)

Lilly, John – Center of the Cyclone: An Autobiography of Inner Space
– The Deep Self: Profound Relaxation….Isolation Tank
– Programming and Meta-programming the Human Biocomputer
– Simulations of God: The Science of Belief
– The Dyadic Cyclone: Autobiography of a Couple
– The Scientist: A Metaphysical Autobiography
– John Lilly, so far…

Lippard, Lucy R. – Contemporary Art and the Art of Prehistory

Lovecock, James – Gaia: A New Look at Life on Earth

Lucky, Robert (executive director of bell labs)
– silicon dreams: information, man, and machine. 1992
+ how information theory shapes the world of computers.

Ludlow, ??? – Hasheesh eater: The Life of Pythagorean. published in 157!

Lyotard, Jean-Francois – The Postmodern Condition: A Report on Knowledge

Lyttle, ??? – Psychedelic Monographs and Essays Volumes #1-5

Maddox, Tom – Halo (fiction)

Malacalypse the Younger – The Principia Discordia.

Mandlebrot, Benoit – The Fractal Geometry of Nature

Marcus, Greil – Lipstick Traces: A Secret History of the 20th Century

Mason, Lisa – Arachne (fiction)

McAfee, John – Computer Viruses, Worms….And Other Threats to your System

McAffrey, Larry – Storming the Reality Studio. Cyberpunk, postmodern fiction
– Across the Wounded Galaxies

McDonald, Ian – Out on Blue Six (fiction)

McHale, Brian – Postmodern Fiction

McKenna, Dennis – The Invisible Landscape

McKenna, Terence – The Archaic Revival
– Food of the Gods
– True Hallucinations

McLellan, H. – Virtual Reality: A Selected Bibliography

McLuhan, Marshall – Verbi-Voco-Visual Explorations
– Through the Vanishing Point: Space in Poetry & Painting
– >>From Cliche to Archetype
– Culture is our Business
– Take Today: The Executve as Drop-Out
– The City as Classroom: Understanding Media & Language
– Laws of Media: The New Science
– The Global Village: TransformAtions in World Life…

Milan, Victor – The Cybernetic Samurai (fiction)
– The Cybernetic Shogun (fiction)

Minsky, Marvin – Society of Mind
– Robotics
– The Turing Option

Misha – Red Spider, White Web (fiction)

Mondo 2000 – A User’s Guide to the New Edge

Moorcock, Michael – The Cornelious chronicles (fiction)

Moravec, Hans – Mind Children

Morgan, Ted – Literary Outlaw: Life & Times of William S. Burroughs

Murphy, Pat – The Falling Woman (fiction)

Myers, Norman – Gaia: An Atlas of Planet Management

Nelson, Theodor – Cumpter Lib/Dream Machines
– Literary Machines

Orwell, George – 1984 (fiction)

Otomo, Katsuhiro – Akira

Pagels, Heinz – The Cosmic Code: Quantum Physics As Language of Nature

Palmer, Thomas – Dream Science (fiction)

Parker, Don – Fighting Computer Crime

Parsegian, V. Lawrence – This Cybernetic World. Cybernetics

Parfrey, Adam – Apocalypse Culture. Pomo/industrialism
– Rants and Incendiary Tracts

Pearson, Durk and Sandy Shaw – Life Extension: Practical Scientific Approach
– Life Extension Companion

Peitgen, Heinz-Otto and Peter Richter – The Beauty of Fractals

Pelton, Ross – Mind Food & Smart Pills. Neuropharmacology

Penley, Constance & Andrew Ross (eds.) – Technoculture

Perry, Paul – On the Bus. Story of Ken Kesey and Merry Pranksters
– Haight-Ashbury: A History

Pfohl, Stephen – Death at the Parasite Cafe

Pickover, Clifford – Computers and the Imagination

Pirsig, Robert – Zen and the Art of Motorcycle Maintenance

Platt, Charles – The Silicon Man

Pohl, Frederick – Beyond the Blue Event Horizon (fiction)
– Gateway (fiction)
– Heechee Rendezvous (fiction)
– Man Plus (fiction)
– The Annals of the Heechee (fiction)

Porush, David – The Soft Machine: Cybernetic Fiction

Potter, Beverly – Way of the Ronin. Career, vocation changes

Powell, William – The Anarchists Cookbook. Drug abuse, explosives, firearms

Pynchon, Thomas – Crying of Lot 49 (fiction)
– Gravity’s Rainbow (fiction)
– V (fiction)
– Vineland (fiction)

Quarterman, John S. – The Matrix. Computer Networks

Rand, Ayn – For the New Intellectual. Philosophy

Ratsch, ??? – Gateway to Inner Space

Regis, Ed – Great Mambo Chicken & the Transhuman Condition

Re/Search – Industrial Culture Handbook. Industrial musicians profiles
– Modern Primitives
– PRANKS!
– Angry Women

Rheingold, Howard – Virtual Reality. Cybernetics, virtual reality, simulation
– Virtual Communities

Rivlin, Robert – The Algorithmic Image: Graphic Images of the Computer Age

Roberts, Steven – Computing Across America

Robinson, Spider – Mindkiller: A Novel of the Near Future (fiction)

Ronell, Avital – The Telephone Book: Technology, Schizophrenia, ….
– Crack Wars: Literature, Addiction, Mania

Roszak, Theodore – The Cult of Information: The Folklore of Computers…

Rucker, Rudy – Software (fiction)
– Wetware (fiction)
– The Secret of Life (fiction)
– Masters of Space and Time (fiction)
– Spacetime Donuts (fiction)
– The 5th Franz Kafka (fiction)
– White Light (fiction)
– Mind Tools: The 5 Levels of Mathematical Reality
– The Fourth Dimension: A Guided Tour of the Higher Universes
– Transreal! (fiction)
– Semiotext(e) (ed. w/ Robert A. Wilson, Peter Wilson)
– M2k: User’s Guide to the New Edge (ed. w/ RU Sirius et al)

Ruelle, David – Chance and Chaos

Russo, Richard Paul – Inner Eclipse (fiction)
– Subterranean Gallery (fiction)
– Destroying Angel (fiction)

Ryan, Thomas – The Adolescence of PI (fiction)

Sarfatti, Jack – Space-Time and Beyond

Schafer, Murray – The Tuning of the World. Electronic Music

Schultes, Richard Evans – Plants of the Gods: Origins of Hallucinogens

Schodt, Frederik – Inside the Robot Kingdom: …Coming Robotopia

Sheldrake, Robert – A New Science of Life:….Formative Causation
– The Rebirth of Nature: Greening of Science and God
– The Presence of the Past: Morphic Resonance ….

Shelley, Mary – Frankenstein (fiction)

Sherman, Barry – Glimpses of Heaven, Visions of Hell. VR

Shiner, Lewis – Frontera (fiction)
– Deserted Cities of the Heart (fiction)
– Slam (fiction)

Shirley, John – Eclipse (fiction)
– Eclipse Corona (fiction)
– Eclipse Penumbra (fiction)
– Total Eclipse (fiction)
– City Come A’Walkin’ (fiction)
– Heatseeker (fiction)
– Transmaniacon (fiction)
– A Splendid Chaos (fiction)

Shulgin, Ann and Alexander – PIKHAL: A Chemical Love Story
– The Controlled Substance Act

Sieber, Ulrich – International Handbook on Computer Crime

Sirius, R.U. & Rudy Rucker (eds) – A User’s Guide to the New Edge

Smith, Thomas – Industrial Light & Magic: The Art of Special Effects

Solomonides, Tony and Les Levidow – Compulsive Technology…

Spinrad, Norman – Agent of Chaos (fiction)
– Little Heroes (fiction)
– Other Americas (fiction)
– Streetman (fiction)
– Bug Jack Barron (fiction)

Stafford, Peter – Psychedelics Encyclopedia

Stang, Ivan – High Weirdness By Mail. Fringes of culture sources
– Three-Fisted Tales of Bob. Subgenius

Starks, ??? – Cocaine Fiends and Reefer Madness. Drugs on film

Stelarc – Obsolete Body Suspensions

Stephenson, Neal – Snow Crash (fiction)

Sterling, Bruce – Artificial Kid (fiction)
– Crystal Express (fiction)
– Difference Engine (with William Gibson)
– Involution Ocean (fiction)
– Islands in the Net (fiction)
– Mirrorshades: A Cyberpunk Anthology (editor)
– Schismatrix (fiction)
– The Hacker Crackdown: Law and Disorder..Frontier
– Globalhead (fiction)

Stevens, Jay – Storming Heaven: LSD & the American Dream

Stoll, Clifford – The Cuckoo’s Egg. Hacking

Sturgeon, Theodore – More Than Human (fiction)

Swanwick, Michael – Vacuum Flowers (fiction)
– In the Drift (fiction)
– Stations of the Tide (fiction)

Swezey, ??? – AMOK Dispatch

Tamm, Eric – Brian Eno: His Music and the Vertical Color of Sound

Thom, Rene – Semiophysics: A Sketch

Thompson, Hunter S. – Fear and Loathing on the Campaign Trail ’72
– The Great Shark Hunt: Gonzo Papers 1
– Generation of Swine: Gonzo Papers 2
– Songs of the Doomed: Gonzo Papers 3

Todd, Stephen and William Latham – Evolutionary Art and Computers

Toffler, Alvin – Future Shock. Social Change
– The Third Wave. Social Change
– War- Anti-War

Turkle, Sherry – The Second Self: Computers & the Human Spirit

2030, F.M. – Upwingers
– Are You A Transhuman?

Tzara, Tristan – Seven Dada Manifestos and Lampistries

Vallee, Jacques – The Network Revolution: Confessions of a Computer Scientist

Varley, John – The Ophiuchi Hotline (fiction)
– Millenium (fiction)

Vinge, Vernor – Marooned Across Real-time (fiction)
– True Names and Other Dangers (fiction)
– Threats and Other Promises (fiction)
– The Peace War (fiction)

Vollman, William – You Bright and Risen Angels (fiction)

Wade, ??? – Anarchist’s Guide to the BBS

Warhol, Andy – Diaries
– POPism: The Warhol 60’s

Weil, Andrew – Marriage of Sun & Moon: Quest for Unity in Consciousness
– Natural Mind: Investigation of Drugs and Higher Consciousness
– Chocoloate to Morphine: Understanding Mind-Active Drugs

Wells, H.G. – The Island of Dr. Moreau

Whole Earth Catalog – Essential Whole Earth Catalog
– The Fringes of Reason
– Signal, Communications for the Information Age
– Software Catalog
– Whole Earth Access Mail Order Catalog

Wiener, Norbert – Cybernetics: Control & Communication in Animal and Machine
– The Human Use of Human Beings

Williams, Walter Jon – Angel Station (fiction)
– Facets (fiction)
– Hardwired (fiction)
– Solips System (fiction)
– Voice of the Whirlwind (fiction)

Wilson, Robert Anton – Cosmic Trigger
– Cosmic Trigger 2
– Historical Illuminatus Chronicles (fiction)
The Earth Will Shake
Nature’s God
The Widow’s Son
– Illuminati Papers
– The Illuminatus! Trilogy (fiction)
– Ishtar Rising
– Masks of the Illuminati (fiction)
– New Inquisition
– Prometheus Rising
– Quantum Psychology
– Right Where You are Sitting Now
– Schrodinger’s Cat Trilogy (fiction)
– Sex & Drugs, A Journey Beyond Limits
– The Earth Will Shake (fiction)
– The Widow’s Son (fiction)
– The Book of the Breast
– Natural Law, or Don’t put a Rubber on your Willy
– Wilhelm Reich in Hell
– Coincidence: A Head Test

Windling, Terri (editor) – Borderlands (fiction)
– Bordertown (fiction)

Wolfe, Tom – Electrik Kool-Aid Acid Test. Kesey & Pranksters & Haight-Ashbury

Wolfram, Stephen – Mathematica: System for Doing Mathematics by Computer

Womack, Jack – Ambient (fiction)
Terraplane (fiction)
Heathern (fiction)
Elvissey (fiction)

Wright, Robert – Three Scientists and Their Gods. Information age

Zahn, Timothy – Cobra (fiction)
– Cobra Bargain (fiction)
– Cobra Strike (fiction)

oooooooooooooooooooooooooooooooooooooooooooooo
o -=- Final Words -=- o
oooooooooooooooooooooooooooooooooooooooooooooo

As you can see this document is shorter in some sections then in other.
But it’s a living document. It will grow and morph through time. If you
want to add anything to it… or see a new section… just send me a
note.

I have to give credit where it’s due… many thanks to Andy Hawks for
starting the FutureCulture elist, the home of this document. The
inspiration and content of the cyberpoet’s guide comes largely from the
FutureCulture FAQ, which was authored by Andy. Others who contributed in
detail and spirit are Freeside’s Thesisnet-FAQ, John December’s
Internet-cmc, and Scott Yanoff’s Internet Services List. Many thanks to
them as well.

Requests to join the FutureCulture E-list should be directed as follows:

The list is officially: futurec@uafsysb (bitnet)
futurec@uafsysb.uark.edu (internet)
[this is where all posts to the list should be sent]

to subscribe, mail to:
listserv@uafsysb (bitnet)
listserv@uafsysb.uark.edu (internet)

body of message is:
subscribe FUTUREC your name

to leave the list, same as above except:
unsubscribe FUTUREC your name

if you want to receive a copy of your own posts (“reflector” mode):
set futurec repro

if you want to receive a daily digest instead of realtime:
set futurec digest

to get help and more info:
info refcard

-=> The End <=-

o o / _ o __| / |__ o _ o / o
/| | / ___o o | o/ o/__ / | /|
/ / | /) | ( /o / ) | ( / | / /

Check out the newest section of the Cyberpoet's Guide. The Ezine

[] [] [] []
[] [] [] [] [] []
[] [] [] [] [] [][][]
[][] [] [][][] [][][] [] []
[] [] [] [] [] [] [] [] [][]
[] [] [] [][][] [][][] [] [][][]

(c) copyright 1994 John Frost

Cyberpoet’s Guide To Virtual Culture Part 4 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p4/5

Part IIII of V – 3.14.94

A Cyberpoet’s Guide to Virtual Culture –

-=- 04.Resources & References
o Online how-to’s
o Similar Lists
o Assorted Online Resources
o Access Points

——————————————————
-=- 04.1.Online how-to’s |
—————————-

Admittedly, the the more exotic centers of virtual culture have a steep
learning curve. There are plenty of places, however, that require hardly
any excess knowledge at all. Fortunately, a plethora of manuals, books and
FAQs (Frequently Asked Question lists) exist to help you through your
troubled times.

o Zen and the Art of the Internet
by Brendan Kahoe
– ftp at
ashley.cs.widener.edu /pub/zen
csn.org pub/net/zen
quartz.rutgers.edu pub/internet/zen
relay.cs.toronto.edu pub/zen
mrcnext.cso.uiuc.edu gutenberg/etext92/zen10*

o ftp ftp.sura.net
/pub/nic
– How-to’s about internet (email, ftp, telnet, etc.)

o nic.merit.edu
/documents
– Gold in Networks!
– Hitchikers Guide to the Internet
– New User’s Questions
– What is the Internet
/resources
– Internet Cruise

o ftp.eff.org.
/pub/Net_info
– Big Dummy’s Guide to the Internet

o server.cs.virginia.edu
/pub/techreports/CS-91-19.ps.Z
– Virtual Reality on Five Dollars a Day
by Randy Pausch, U. of Virginia, Tech Report CS-91-19

o news.answers
– On USENET. (also see misc.answers)

-=- 04.2.Similar lists |
————————–

Hey, I wasn’t the first one to have this idea. There are a variety of
other lists out there that can direct you to Oft’ used Internet resources.

o gopher to una.hh.lib.umich.edu
– inetdirs/
– A project called the Internet Clearing House (very nice work ppl)

o Bert’s BigFun List
– ftp cerberus.cor.epa.gov pub/misc/bigfun

o Electric Mystics Guide
– ftp panda1.uottawa.ca pub/religion
– guide to religious things on the net.
– if you are techno-pagan they don’t include you, sorry.

o FutureCulture FAQ
– ftp sites
ftp.eff.org /pub/cud/papers/future
ftp.css.itd.umich.edu /poli/future.culture.d
redspread.css.itd.umich.edu
ftp.u.washington.edu /public/alt.cyberpunk
– Also through thesisnet and listserv
– started by Andy Hawks (ahawks@nyx.cs.du.edu) as
a compendium of all things futureculture
– now maintained by the list members of FutureCulture.

o Internet Services – FAQ
– USENET alt.internet.services news.answers
– FTP rtfm.mit.edu:/pub/usenet/news.answers/

o The Jargon File (same as The Hacker’s Dictionary)
– ftp sites
wuarchive.wustl.edu /pub
ftp.uu.net /doc
merit.edu /pub/doc
nic.funet.fi /pub/doc
pit-manager.mit.edu /pub
– nice. You’ll like it.

o the internet and computer-mediated communication

– ftp ftp.rpi.edu pub/communications/internet-cmc
– an all-encompassing list of internet-accessible
information (so why are you still reading this) 🙂

o alt.cyberpunk faq
– ftp ftp.u.washington.edu pub/alt.cyberpunk/
– restricted to the purview of the newsgroup
– a WWW – HTML hypertext version now exists… keen!

-=- 04.3.Assorted Online Resources |
————————————–

o Almanac of Events
– “On this day” information. For the trivia minded.
– finger copi@oddjob.uchicago.edu
– mail geiser@pictel.com to join the mailing list

o Anonymous post
– mail anonymus+ping@tygra.michigan.com “help”
– mail help@anon.penet.fi “help”

o Archeological Dbase
telnet cast.uark.edu or telnet 130.184.71.44 (Login: nadb)
– National Arch. Database information management system.

o BBSlists –
– National Graphical BBS List
+ mail beezer@cc.utah.edu
+ USENET alt.bbs.*

o CARL telnet pac.carl.org or 192.54.81.128
– Online database, book reviews, magazine fax delivery

o current cites
– ftp ftp.lib.berkeley.edu /pub/Current.Cites
ftp.eff.org pub/journals
– Over 30 journals in librarianship and information
technology are scanned for selected articles on optical
disk technologies, computer networks and networking,
information transfer, expert systems and artificial
intelligence, electronic publishing, and hypermedia and
multimedia. Brief annotations accompany most of the
citations.

o DataBase Via Finger
– finger help@dir.su.oz.au
– Query databases, find newsgroups, access archie, etc., via finger.

o Empire Schoolhouse telnet nysernet.org (login: empire)
– K-12 resources, discussion groups, etc.
– A gopher based BBS in NY.

o FEDIX/MOLIS/HERO telnet fedix.fie.com or telnet 192.111.228.33
– info. on scholarships, minority assistance, etc.
– alternative access via Gopher world menu

o ftp by mail
– mail ftpmail@decwrl.dec.com “help”

o History Databases telnet ukanaix.cc.ukans.edu
– History databases

o Hpcwire telnet hpcwire.ans.net (Login: hpcwire)
– menu-driven information searches.

o human-computer interaction bibliography (hcibib)
mail hcibib@rumpus.colorado.edu message body “help”

– a publically accessible mail-based retrieval system for
searching Human-Computer Interaction journals, conference
proceedings and books. Users can send in both word
queries and relevance feedback queries. Over 3200
abstracts from non-electronic sources.

o Hytelnet
Are you familiar with HYTELNET by Peter Scott? This is a hypertext
program for PC, Mac and other platforms that lists ostensibly ALL
telnet-accessible resources on the Net, all over the world. Updates are
almost constant and are mailed to Scott’s mailing list members.

You can anonymous ftp the files from ftp.usask.ca or telnet to that same
address and check out a (slow) Unix version of HYTELNET.
(on Netcom you can just type )

o USENET posts thru email
– News Mail Servers mail [newsgroup]@cs.utexas.edu
– Post to Usenet news via email.(eg. [newsgroup] = alt-bbs)

o virtual center for the study of virtual spaces (vcsvs)
mail vcsvs-request@nicco.sscnet.ucla.edu asking for info
– ftp nicco.sscnet.ucla.edu /pub/papers

-=- 04.4.Access Points |
—————————–

So, you say, I’ve got this wonderful Internet access setup at work or
school… what happens when I graduate or lose my job? Or perhaps you’ve
got a friend who is moving to the otherside of the continent. Is there a
way for you to remain in contact over email? Fortunately, there are easy
answers to these queries.

-o0 Lists to checkout 0o-

o Community Networks Surv
ftp atlas.ce.washington.edu
pub/seattle-community-network/community-networks/surveys
– A collection of data regarding freenet’s around
the world.

o Pdial/Kaminski List
ftp rtfm.mit.edu pub/usenet/news.answers/pdial
USENET: news.answers, alt.internet.access.wanted, alt.bbs.lists
– A nearly complete list of access points to the
the Internet. Check the Pdial list first.
– Area Codes with access as of Oct 1st 1993.
(may not be local to your prefix, check phone book)

201 jvnc-tiger
202 CAPCON clarknet express tmn
203 jvnc-tiger
205 nuance
206 eskimo GLAIDS halcyon netcom nwnexus olympus
212 echonyc maestro mindvox panix pipeline
213 crl dial-n-cerf kaiwan netcom
214 metronet netcom
215 jvnc-tiger PREPnet
216 OARnet wariat
217 prairienet
301 CAPCON clarknet express tmn
303 cns csn netcom nyx
310 class crl dial-n-cerf kaiwan netcom
312 mcsnet netcom
313 michnet MSen
401 anomaly ids jvnc-tiger
403 PUCnet
404 crl netcom
408 a2i netcom portal tellink
410 CAPCON clarknet express
412 PREPnet telerama
415 a2i class crl dial-n-cerf IGC netcom portal tellink well
416 hookup.net uunorth
419 OARnet
503 agora.rain.com netcom
503 teleport
504 sugar
508 anomaly nearnet northshore novalink
510 class crl dial-n-cerf holonet netcom
512 realtime
513 fsp OARnet
514 CAM.ORG
516 jvnc-tiger
517 michnet
519 hookup.net uunorth
602 crl evergreen indirect
603 MV nearnet
609 jvnc-tiger
613 uunorth
614 OARnet
616 michnet
617 delphi nearnet netcom northshore novalink world
619 class crash.cts.com cyber dial-n-cerf netcom
703 CAPCON clarknet express netcom tmn
704 concert Vnet
707 crl
708 mcsnet
713 blkbox nuchat sugar
714 class dial-n-cerf express kaiwan netcom
717 PREPnet
718 maestro mindvox netcom panix pipeline
719 cns csn oldcolo
804 wyvern
814 PREPnet
815 mcsnet
818 class dial-n-cerf netcom
906 michnet
907 alaska.edu
908 express jvnc-tiger
916 netcom
919 concert

-o0 Public Access Sites & Freenets 0o-

o Freenets
telnet nyx.cs.du.edu or 130.253.192.68 (login: new)
– Free account, with access to various UNIX features.
telnet hermes.merit.edu or telnet 35.1.48.150
telnet m-net.ann-arbor.mi.us or telnet 35.208.17.4
– Which host: um-m-net Enter ‘g’ for guest. login: newuser
telnet yfn.ysu.edu login: visitor

______ _____ __ __ ______
/ ___ / __ / “-. /__ _
____ / \ -. \/_/ / __
_____\ _____\ _\”_ _ /_
/_____/ /____ / /_/ /_/ /_/ /_/ In Part 5 of 5
copyright 1994 John Frost

Cyberpoet’s Guide To Virtual Culture Part 4 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p3/5

Part III of V – 3.14.94

A Cyberpoet’s Guide to Virtual Culture –

-=- 03.Virtual hangouts
o Elists & newsgroups
o e.Cafes (irc, bbs)
o Parks & Rec

-=- 03.1.Elists & newsgroups |
——————————-

Two of the most common forms of discourse in virtual culture occur on the
elist (or electronic mailing list) and the USENET newsgroup. While the
up-to-date listings of what elists or newsgroups are up and running are
available on the newsgroup news.answers or the ftp site rftm.mit.edu
(/pub/usenet-by-group/rec.answers) it is very time consuming to examine
each list thouroughly. The following are a few lists which either have
helped to form virtual culture or deal with various aspects of it.

-oO Elists Oo-

o List of eLists
– ftp ftp.nisc.sri.com /netinfo/interest-groups.

o Acadlist
– ftp KSUVXA.KENT.EDU /library
– Acadlist – list of academic elists

o 21st-Century list
21ST-C-L@BRUFPB.BITNET
– post your views on the 21st-century.

o ACE-MG
almanac@esusda.gov
Americans Communicating Electronically
primary info source on government action to improve public access

o ACTNOW-L
LISTSERV@BROWNVM.BITNET
– College Activism/Information list.
– To subscribe to this list, send the command,
SUBSCRIBE ACTNOW-L /

o ADV-ELO
LISTSERV@UTFSM.BITNET
– Sub Adv-elo
– to discuss the latest advances in electronics.

o ADV-INFO
LISTSERV@UTFSM.BITNET
– Sub Adv-info
– list to discuss the latest advances in computing.

o AIDSNEWS
– send email to LISTSERV@RUTVM1.BITNET
– message body: SUBSCRIBE AIDSNEWS Your_Full_Name

o ALA-WO
listserv@uicvm.uic.edu
regular reports on legislation and access
effecting library networks

o Alternative Institutions
AltInst-request@cs.cmu.edu
– High Signal to noise ratio.

o amnesty@VMS.CIS.PITT.EDU
Listserv@VM1.NODAK.EDU
– Amnesty International’s Elist
– message body: sub amnesty

o Anarchy List
anarchy-list-request@cwi.nl
– discussion of all aspects of anarchy

o Anne Rice
ngustas@HAMPVMS.BITNET
– the works of Anne Rice.
– To subscribe, send a request to ngustas@HAMPVMS.BITNET.

o APOGEES
listserv@VM1.NODAK.EDU
– message body: sub apogees full name
– information management with a business slant

o ArachNet: E-Journal of Virtual Culture
listserv@kentvm.kent.edu
– message body: SUB ARACHNET
– journal of all aspects of on-line life
– ftp archive ftp byrd.mu.wvnet.edu /pub/ejvc

o Artificial Life
alife-request@cognet.ucla.edu
– artificial life

o AUtopia (Pirate Ship Utopia)
autopia-rquest@wixer.cactus.rg
– a floating technology-oriented commune
– run by Jagwire X, cool ideas….

o BBS-L
LISTSERV@SAUPM00.BITNET
– To help people with getting BBS’s going and online
– Message body: subscribe bbs-l full_name

o BIOSPH-L Biosphere
LISTSERV%UBVM.BITNET@VM1.NODAK.EDU
– message text: SUB BIOSPH-L Your Name

o CET-MG
almanac@esusda.gov
Communities in Economic Transition – for rural and small town groups

o CNI-PUBINFO@CNI.ORG
LISTSERV@CNI.ORG
– CNI (Coalition for Networked Information) Access to
Public Information Working Group.

o COMMUNET
listserv@uvmvm.uvm.edu
– Community and Civic Networks

o COMMUNITY-ACCESS
community-access-request@parc.xerox.com
– Community Access Issues

o Computers and Academic Freedom
listserv@eff.org
– put add comp-academic-freedom-news
or
add comp-academic-freedom-talk
in the first line
– computing freedom, mostly deals with college campuses
– (Usenet) alt.comp.acad-freedom.talk or news

o Comp-Soc@LIMBO.INTUITIVE.COM
– to sub contact moderator @ taylor@LIMBO.INTUITIVE.COM
– Society and Computers Information Technology

o COM-PRIV
com-priv-request@psi.com
Commercialization/Privatization of Inet

o CO_PUB_INFO
listproc@resudox.net
Canada’s Coalition for Public Information

o COUNCIL
LISTSERV@SJSUVM1.SJSU.EDU
– Global Council Forum — Moving Beyond the Nation-State
– Like the UN but different. =)

o CPSR
LISTSERV@GWUVM.EDU
– Computer Professionals for Social Responsibility
– an elist for CPSR-related materials and announcements
– an elist for CPSR-related materials and announcements

o CRTNet
t3b@psuvm.psu.edu
– email LISTSERV@PSUVM.bitnet
message body: SUB CRTNET
– information theory and technologies

o Cybernetics
listserv@bingvaxu.cr.birminghamton.edu
– message body: sub cybsys-l full_name

o Cypherpunks
cypherpunks@toad.com
– public key encryption, remailers, e-privacy list

o Cypherpunks Announcement List
cypherpunks-announce-request@toad.com
– lower volume

o Derrida
listserv@cfrvm.bitnet
– message body: subscribe derrida full_name
– deconstructionalists Unite 🙂

o DEVEL-L Technology Transfer in International Development
LISTSERV@AUVM.BITNET
– message text: SUB DEVEL-L Your Name

o Digital Games Review
digital-games-request@intuitive.com
– mail info@limbo.intuitive.com
[body: ‘help’ and ‘listall Digital.Games’]
– SNES, Sega, etc.

o Edtech
edtech@msu.edu
– Educational Technology

o EFF News (EFFector Online)
effnews-request@eff.org
– subscribe to the electronic version of EFF’s
zine, the EFFector (catchy huh!)

o E-List Review Service
listserv@kentvm.kent.edu
– message body: sub libref-l your name
– a useful list, if you are looking to add to your
elist load (most people can handle 2 or 3).

o ETHICS-L@TWNMOE10.bitnet
– ETHICS-L is for discussions of ethics in computing.

o Extropians
extropians-request@gnu.ai.mit.edu
exi-daily-request@gnu.ai.mit.edu
exi-essay-request@gnu.ai.mit.edu
– nanotechnology, cryonics, anarcho-capitalist
politics, technological extension of human
intelligence and perception
– serious discussion from an informative perspective
– the first two addresses are for realtime and
digest versions, respectively, the third is for
essays and longer posts of interest only

o FNORD-L
listserv@ubvm.bitnet
– Message body: sub fnord-l
– philosophies of Leary, Robert Anton Wilson, Dr.
Lilly, etc.

o FringeWare, Inc.
fringeware-request@wixer.cactus.org
– Paco Xander Nathan’s company
– Your online shopping mall for all that’s kewl

o FutureCulture
listserv@UAFSYSB.UARK.EDU
– message body: sub futurec
– discussion of new edge, cyebrculture,
technoculture.
– Discussion of future culture and all things
that entails. (a lot).

o Future Technologies List
future-tech-request@cs.umb.edu
– artificial intelligence, nanotech, etc.

o GLOMOD-L
GLOMOD-L@UHCCVM.bitnet
– The Global Modeling Forum

o GNET
gnet_request@dhvx20.csudh.edu
– Toward a Truely Global Network
– archives @ dhvx20.csudh.edu

o GopherJewels
sub: LISTPROC@EINET.NET
share interesting gopher finds.

o ICPT-L
listserv@guvm.georgetown.edu
– Internet Research
– message body “index ipct-l

o The Information Professional’s List
– to join ask for info from jcook@netcom.com
– for verifiable private investigators, fee-based information brokers,
document retrieval liasons, commercial intelligence specialists, or
related professional. Professional resumes requested.

o Leri-L
leri-request@pyramid.com
– archives at penguin.gatech.edu pub/leri
– mailing list devoted to meta-programming,
philosophy, expanding consciousness, etc.
and a ton of chat.
– #leri is a popular channel on IRC.

o Libernet
– Sub address: LIBERNET-REQUEST@DARTMOUTH.EDU
– Archives Coos.dartmouth.edu
– Pertaining to all things libertarian.

o Masonic SIG
contact: Peter Trei (Internet) PTREI@ASGARD.BBN.COM
– Freemasonry, their philosophy et al.
– the place to lurk for conspiracy theorists! =)

o MERTON-L@BYRD.MU.WVNET.EDU
– sub address: LISTSERV@BYRD.MU.WVNET.EDU
– MERTON-L was formed for substantive discourse on research
and scholary inquiry to create and and develop knowledge about
contemplative life.

o Mind Machine Digest
mind-l-request@asylum.sf.ca.us
– ftp asylum.sf.ca.us /pub/mind-l
ftp.u.washington.edu /public/alt.cyberpunk
– brain stimulation, nootropics, etc.

o Net Happennings: (MODERATED) high volume
Includes a variety of interesting postings from around the Internet
including new Gopher announcements.
– To subscribe send a subscribe message to:
listserv@internic.net
SUBSCRIBE NET-HAPPENNINGS firstname lastname

o Neuron Digest
neuron-request@cattell.psych.upenn.edu
-neural networks

o NEWNIR-L (MODERATED)
NEWNIR-L-Request%ITOCSIVM.bitnet@icineca.cineca.it
announces postings regarding new information sources including
Gopher, Telnet, FTP, WAIS and WWW. Moderate volume

o PACS-L
listserv@uhupvm1.uh.edu
Library & Public Access Computer Systems

o PostModern Culture Journal
PMC@cc.ncsu.edu [sub pmc-list your name]
LISTSERV@CC.NCSU.EDU
archive: ftp.cc.ncsu.edu
– message body: GET PMC-TALK GUIDE
PMC-TALK F=MAIL

o Postmodern Culture Talk
listserv@cc.ncsu.edu
– [sub pmc-talk your_first_name your_last_name]

o PowerGlove List
listserv@karazm.math.uh.edu

– ftp karazm.math.uh.edu /pub/VR

o RISKS Digest
risks-request@csl.sri.com
– ftp crvax.sri.com risks
– the RISKS of computing in our lives

o RURALDATA
ruraldata-info-request@cic.net
Rural Datafication Project ) planning rural community access to
the Internet

o RRE News Service
rre-request@weber.ucsd.edu
– Subject: subscribe
– these days most of the messages concern the social and political
aspects of computers.

o SOCHIST Social History
LISTSERV@VM.USC.EDU
– message text: SUB SOCHIST Your Name

o Subgenius
Subgenius-request@mc.lcs.mit
– ftp quartz.rutgers.edu /pub/subgenius

o TechnoNomads (Steve Roberts)
technomads-request@bikelab.sun.com
– the guy featured on Donahue & Mondo’s list
– nomadness, ham radio, mobile communities, etc.

o Telecom Privacy Digest
telecom-priv-request@pica.army.mil

o Telecom Digest
telecom-request@eecs.nwu.edu
– deals with all aspects of telecommunications

o ThesisNet
thesisnet@pobox.upenn.edu
– thesisnet-request@pobox.upenn.edu
– to ‘subscribe’ ‘unsubscribe’ and/or ‘faq’

o ThinkNet
thinknet@world.std.com
– philosophy, systems theory

o Virtual Reality List
listserv@uiucvmd.bitnet
– message body: subscribe virtu-l

o VPIEJ-L@VTVM1
LISTSERV@VTVM1.CC.VT.EDU
– An e-conference for electronic publishing issues
– (Usenet) BIT.LISTSERV.VPIEJ-L

o Y-RIGHTS@SJUVM.BITNET
Listserv@sjuvm.bitnet
– Youth Rights, open to all.

-o0 Newsgroups 0o-

A short bit on the Usenet Hierarchy. Alt.groups is supposed to stand for
alternative, but should probably stand for adolescent. These are news
groups waiting to grow up and consequently have a low signal to noise
ratio. But like adolescents, if you really listen to them, you can gleem
some really neat insights. When Alt.groups get a large enough following or
a serious enough topic, they tend to graduate into other prefixes; ie,
comp. (computer) rec. (recreation), sci. (science), bit. (Bitnet
listservs), soc. (social, society). What this means generally, is that the
group becomes heady and cliqueish. But if you’re persistant ad polite, you
can usually elicit a response from somebody. One final comment about
USENET, anything I said above is likely to be untrue at any moment in
time. Thus the attraction of USENET for even the most experienced
cyberpoets.

alt.3d Three-dimensional imaging.
alt.activism Activities for activists.
alt.aldus.pagemaker Forget expensive user support, come here instead.
alt.amateur-comp The Amateur Computerist.
alt.angst Anxiety in the modern world.
alt.artcom Artistic Community, arts & communication.
alt.astrology Twinkle, twinkle, little planet.
alt.atheism.* Godless heathens next on Oprah
alt.bbs.ads Ads for various computer BBS’s.
alt.bbs.internet BBS systems accessible via the Internet.
alt.bbs.lists Postings of regional BBS listings.
alt.best.of.internet Sort of an oxymoron.
alt.binaries.* Pictures, programs, multimedia, etc.
alt.books.anne-rice A Biting look at the author and her books
alt.buddha.short.fat.guy Religion. And not religion. Both. Neither.
alt.california The state and the state of mind.
alt.cd-rom That shiny amazing disc and it’s users.
alt.censorship Discussion about restricting speech/press.
alt.co-ops Discussion about co-operatives.
alt.comp.acad-freedom.* Academic freedom issues related to computers.
alt.consciousness All aspects of consciousness.
alt.conspiracy Be paranoid –‘they’ are out to get you.
alt.cult-movies Movies with a cult following
alt.culture.usenet A self-referential oxymoron.
alt.culture.internet A place to comment reflexively
alt.cyberpunk High-tech low-life.
alt.cyberpunk.chatsubo Cyberpunk fiction.
alt.cyberpunk.movement Cybernizing the Universe.
alt.cyberpunk.tech Cyberspace and Cyberpunk technology.
alt.cyberspace and how it should work.
alt.devilbunnies Probably better left undescribed.
alt.discordia All hail Eris, etc.
alt.dreams What do they mean?
alt.drugs Recreational pharmaceuticals.
alt.fan.douglas-adams Author of “Hitchhiker’s Guide to the Galaxy”.
alt.fan.frank-zappa Is that a Sears poncho?
alt.fan.hofstadter Douglas Hofstadter and Godel, Escher, Bach.
alt.fan.mst3k Mystery Science Theatre 3000 tv show.
alt.fashion All facets of the fasion industry discussed.
alt.gathering.rainbow For discussing the annual Rainbow Gathering.
alt.gopher Discussion of the gopher information service.
alt.gothic Things mournful and dark. Gothic lifestyle’s
alt.graffiti Usenet spraypainters and their documenters.
alt.hackers Boats of projects currently under develpment.
alt.history.what-if Really worth reading every now and then
alt.hypertext Discussion of hypertext
alt.illuminati See alt.cabal. Fnord.
alt.individualism Individualist discussions
alt.industrial Industrial culture, etc.
alt.internet.access.wanted People looking for internet access
alt.internet.services Internet services
alt.irc Internet Relay Chat material.
alt.magick For discussion about supernatural arts.
alt.meditation.transcendental Contemplation of states beyond.
alt.memetics Ideas spread like genes. A new discipline.
alt.mindcontrol You WILL read this group and ENJOY it!
alt.music.alternative For groups with 2 or less Platinum albums.
alt.news-media Don’t believe the hype.
alt.online-service Commercial online services, and the Internet.
alt.out-of-body Nobody’s home.
alt.pagan Discussions about paganism & religion.
alt.paranormal Phenomena which are not explicable.
alt.politics.* Politics.
alt.postmodern Postmodernism, semiotics, deconstruction.
alt.privacy Privacy issues in cyberspace.
alt.prose Postings of original writings.
alt.psychoactives Better living through chemistry.
alt.radio.pirate Discussions surrounding pirate radio.
alt.radio.scanner Discussion of scanning radio receivers.
alt.rave Rave culture.
alt.religion.computers People who believe computing is “real life.”
alt.religion.kibology He’s Fred, Jim.
alt.rock-n-roll.* Counterpart to alt.sex and alt.drugs.
alt.security Security issues on computer systems.
alt.security.pgp The Pretty Good Privacy package.
alt.sex.* Postings of a purient nature.
alt.skate-board Discussion of all apsects of skate-boarding.
alt.skinheads The skinhead culture/anti-culture.
alt.slack Posting about the Church of the Subgenius.
alt.society.ati The Activist Times Digest. (Moderated)
alt.society.civil-disob Civil disobedience.
alt.society.civil-liberties Individual rights.
alt.society.revolution Discussions on revolution(s).
alt.society.sovereign Independantistes, unite!
alt.spam.tin Spam is neither particle nor wave.
alt.techno-shamanism Can’t program your VCR? Consult a TechnoShaman.
alt.thrash Thrashlife.
alt.uu.future Does Usenet University have a viable future?
alt.wired Wired Magazine.
alt.zines Small magazines, mostly noncommercial.
bionet.info-theory Discussions about biologicalinformation theory.
bionet.neuroscience Research issues in the neurosciences
bionet.women-in-bio Discussions about women in biology.
bit.listserv.biosph-l Biosphere, ecology, Discussion List.
bit.listserv.cyber-l CDC Computer Discussion.
bit.listserv.disarm-l Disarmament Discussion List.
bit.listserv.edpolyan Professionals and Students Discuss Education.
bit.listserv.edtech Educational Technology elist.
bit.listserv.emusic-l Electronic Music Discussion List.
bit.listserv.ethics-l Discussion of Ethics in Computing.
bit.listserv.frac-l FRACTAL Discussion List.
bit.listserv.4ad-l The 4AD recording label.
bit.listserv.film-l Film making and reviews List.
bit.listserv.fnord-l New Ways of Thinking List.
bit.listserv.frac-l FRACTAL Discussion List.
bit.listserv.gutnberg GUTNBERG Discussion List.
bit.listserv.ioob-l Industrial Psychology.
bit.listserv.mbu-l Megabyte University – Computers and Writing.
bit.listserv.sganet Student Government Global Mail Network.
bit.listserv.valert-l Virus Alert – Urgent Virus Warnings.
bit.listserv.vpiej-l Electronic Publishing Discussion List.
bit.listserv.xtropy-l Extropians
comp.ai Artificial intelligence discussions.
comp.ai.neural-nets All aspects of neural networks.
comp.ai.philosophy Philosophical aspects of AI.
comp.bbs.misc BBS Discussion
comp.dcom.telecom Telecommunications digest. (Moderated)
comp.graphics Computer graphics, art, animation.
comp.graphics.research Highly technical computer graphics discussion.
comp.graphics.visualization Info on scientific visualization.
comp.internet.library Discussing electronic libraries.
comp.music Applications of computers in music research.
comp.org.eff.news News from the Electronic Frontiers Foundation.
comp.org.eff.talk Discussion of EFF goals, strategies, etc.
comp.org.issnnet The International Student Society for Neural
Networks.
comp.publish.cdrom.* Concerning cdrom publishing.
comp.research.japan The nature of research in Japan. (Moderated)
comp.risks Risks to the public from computers. (Moderated)
comp.robotics All aspects of robots and their applications.
comp.security.misc Security issues of computers and networks.
comp.simulation Simulation methods, problems, uses. (Moderated)
comp.society The impact of technology on society. (Moderated)
comp.society.cu-digest The Computer Underground Digest. (Moderated)
comp.society.development Computer technology in developing countries.
comp.society.folklore Computer folklore & culture, past & present.
comp.society.futures Events in technology affecting future computing.
comp.sys.* Everything you would ever need to know about
computer systems
comp.theory Theoretical Computer Science.
comp.theory.cell-automata Discussion of all aspects of cellular automata.
comp.theory.dynamic-sys Ergodic Theory and Dynamical Systems.
comp.theory.self-org-sys Topics related to self-organization.
misc.activism.progressive Information for Progressive activists.
misc.int-property Discussion of intellectual property rights.
misc.legal.computing Discussing the legal climate of computing.
news.announce.important General announcements to all. (Moderated)
news.future The future technology of network news systems.
rec.arts.animation Discussion of various kinds of animation.
rec.arts.anime Japanese animation fen discussion.
rec.arts.comics Comic books and strips, graphic novels.
rec.arts.int-fiction Discussions about interactive fiction
rec.arts.sf-lovers Science fiction lovers’ newsgroup.
rec.arts.sf-reviews of science fiction/fantasy/horror works.
rec.arts.sf.announce Major announcements of SF. (Moderated)
rec.arts.sf.fandom Discussions of SF fan activities.
rec.arts.sf.marketplace Personal for-sale notices of SF materials.
rec.arts.sf.misc Science fiction lovers’ newsgroup.
rec.arts.sf.movies Discussing SF motion pictures.
rec.arts.sf.reviews Critiques of sf stories. (Moderated)
rec.arts.sf.science Real and speculative aspects of SF science.
rec.arts.sf.tv Discussing general television SF.
rec.arts.sf.written Discussion of written sf and fantasy.
rec.music.gdead A group for (Grateful) Dead-heads.
rec.music.industrial Discussion of industrial-related music styles.
rec.music.makers For performers and their discussions.
rec.music.newage “New Age” music discussions.
rec.music.synth Synthesizers and computer music.
rec.music.video Discussion of music videos.
rec.radio.amateur.misc Amateur radio practices.
rec.radio.noncomm Topics relating to noncommercial radio.
rec.radio.shortwave Shortwave radio enthusiasts.
rec.video Video and video components.
rec.video.releases Pre-recorded video releases.
sci.bio.technology Any topic relating to biotechnology.
sci.chaos The science of Chaos.
sci.cryonics People who freeze themselves after death.
sci.crypt Different methods of data en/decryption.
sci.fractals Objects of non-integral dimension and other chaos.
sci.lang.japan The Japanese language, both spoken and written.
sci.logic Logic: math, philosophy & computational aspects.
sci.nanotech Molecular-scale machines. (Moderated)
sci.philosophy.tech Technical philosophy: math, science, logic, etc.
sci.psychology Topics related to psychology.
sci.skeptic Skeptics discussing pseudo-science.
sci.space Space. The Final Frontier…not!
sci.virtual-worlds Virtual reality. (Moderated).
sci.virtual-worlds.apps Applications of VR technology.
soc.culture.japan Everything Japanese.
soc.culture.usa The culture of the United States of America.
talk.bizarre The unusual, bizarre, curious, and often stupid.
talk.philosophy.misc Philosophical musings on all topics.
talk.politics.drugs The politics of drug issues.
talk.politics.space Non-technical issues affecting space exploration.

-=- 03.2.Cafes |
————————-

If you see a net.user with more then one window open, chances are one of
those windows is linked to an electronic cafe. Like ER, these coffeehouse
atmospheres are prime spots for chatting or perhaps a little gaming or
roleplaying. The two most plentiful forms of these cafes in virtual
culture are Mu*s, or Multi-User Dimension or Dungeon (MUDS, MUSE, MUSH,
etc), and IRC, or Internet Relay Chat and of course the orginal, the BBS.
But new versions, offshoots, and even completely different surroundings
are likely to spring up at anytime and often do.

-o0 IRC 0o-

o IRC (Internet Relay Chat) Info
cs.bu.edu
ftp.eff.org /pub/irc
cs.utk.edu /pub
speedy.cs.uiuc.edu /pub

o IRC telnet server (Login: irc)
telnet irc.demon.co.uk or 158.152.1.74
telnet sci.dixie.edu 6668 or telnet 144.38.16.2 6668
telnet irc.tuzvo.sk 6668 or telnet 192.108.157.3 6668
– Internet Relay Chat via telnet.

o Virtual culture IRC channels
#Autopia Jagwire X’s Autopia group
#ccc Chaos Computer Club (“/msg CCCServ info” for CCC info)
#cDc Cult of the Dead Cow
#CyberPunk Cyberpunk (“/msg CyberBot info” for CPBot Files)
#drugs Drugs (“/msg LearyBot info” for LearyBot Files)
#free.acid Hehehe
#future FutureCulture
#hack Hacking
#leri For the discussion of Metaprograming and
Expanding Consciousness
#mindvox MindVox
#phreak Hackers and Phreakers
#Rave_Scen Raves
#report News reports from hot spots around the world
#tribe Of, about, with the tribe elist.
#wired Concerning the magazine

-o0 The world of Internet BBS’ 0o-

o Am. Philos. Assoc. eis.calstate.edu
– gopher gate.oxy.edu
– Philosophy.

o Auggie BBS bbs.augsburg.edu (141.224.128.3)
login bbs
– Friendly… good archives.

o Badboy nameserver.aue.com
login bbs/new

o Badboy’s Inn badboy.aue.com
login bbs

o Chatsubo chatsubo.nersc.gov
login guest

o Cimmaron bugs.mty.itesm.mx
login bbs/new (limited hours)

o Cleveland Free-Net freenet-in-[a|b|c].cwru.edu
129.22.8.[75|76|82]
– Usenet, MUD, USA Today, Interest groups, local mail

o Eagle’s Nest seabass.st.usm.edu
login bbs/bbs

o Endless Forest, The forest.unomaha.edu
login ef

o Fedworld fedworld.doc.gov
– A bbs run by the NIST to house US gov’t documents.

o Greta’s garbo.uwasa.fi
login bbs/new

o ISCABBS bbs.isca.uiowa.edu 128.255.40.203
login new
– largest bbs with 12,000 + users and over 200 online connections

o Island Net
telnet to island.amtsgi.bc.ca (134.87.180.1)
or dial 604-477-5163. A ‘guest’ account is available

o Kids kids.kotel.co.kr
login kids/new

o Mars Hotel solaria.ee.msstate.edu
login bbs/bbs

o Monochrome mono.city.ac.uk
login mono /psswd mono
– oh that british humour.

o NEBBS nebbs.nersc.gov
login guest

o OUBBS oubbs.telecom.uoknor.edu
– catering to University of Oklahoma students

o Prism BBS bbs.fdu.edu
login bbs

o Quartz BBS quartz.rutgers.edu
login bbs

o Ragged Edge, the wagner.musicnet.ua.edu

o SCF BBS freedom.nmsu.edu (128.123.1.14)
login bbs

o SkyNet hpx5.aid.no
login skynet
– Norway

o Shadow shadow.acc.iit.edu 192.41.245.143
login

o Sunset BBS paladine.hacks.arizona.edu
login bbs

o Virtual Rave sfraves.stanford.edu 7282
login new

o YaBBS phred.pc.cc.cmu.edu 8888 128.2.111.111 8888

-o0 Other Net Cafes 0o-
o usenet
-alt.callahans
+ Callahan’s bar for puns and fellowship.

-=- 03.3.Parks & Rec. |
————————-

Q. Of course, what is a culture without fun & games? (A. Boring.) Even the
most dedicated hacker craves a little fun everynow and then. Here is some
of the fun stuff to explore.

-o0 Elists & Zines 0o-

o Cyberpunk RPGs
cyberrpg-request@veritas.com
– Elist discussing cyber orriented RPGs

o FlashLife (CP RPGs)
flashlife-request@netcom.com
– Elist discussing cyber orriented RPGs.

o Ravelists
– DCRAVES
listserv@auvm.american.edu
sub dcraves
– Florida Raves
steve@sunrise.cse.fau.edu
– Manchester
manchester-request@irss.njit.edu
ftp irss.njit.edu /pub/manchester
bands from manchester, raving, shoegazing, etc.
– MidWest Raves
mw-raves-request@engin.umich.edu
– NE (NorthEastern) Raves
ne-raves-request@silver.lcs.mit.edu
– SFRaves (SanFrancisco Raves)
sfraves-request@soda.berkeley.edu
+ rave culture, mostly in the Bay Area
– SoCal Raves (Southern California)
socal-raves-request@ucsd.edu
– SouthEast Raves
listserv@american.edu
‘SUBSCRIBE SERAVES Your name’ in body
– UK Dance (Raves)
listserv@orbital.demon.co.uk
subscribe uk-dance

-o0 FTP sites 0o-

o soda.berkeley.edu
/pub/sfraves
– Alt.rave FAQ
+ Brian B’s excellent rave FAQ

-o0 Mu*s 0o-

o MUD Info
oinker.ucsb.edu /pub/mud
jwisdom@gnu.ai.mit.edu
– “mud list” in subject

o MUD List
A list of future or cyber- oriented MUDs. MUDs go up and down a lot, so,
not my fault if you can’t access them.

AbacusMUD abacus.hgs.se 130.238.204.10 4080
BattleTech 129.72.2.48 3026
CyberWorld elf.etsu.edu 192.43.19.199.27 3000
Global MUSH lancelot.cif.rochester.edu 4207
Infinity 129.10.10.33 3000
LambdaMOO parc.xerox.com 8888
MariMUSE pc2.pc.maricopa.edu 140.198.16.12 4228
MediaMOO purple-crayon.media.mit.edu 8888
MicroMUSE michael.ai.mit.edu 18.43.0.177

SciFiMUSH zaphod.cs.uwindsor.ca 137.207.224.3 1972
SpaceMadness riemann.math.okstate.edu 139.78.1.15 6250
StarFireMUSE agronomy.auburn.edu 131.204.60.2 4201
Star Raiders ub.d.umn.edu 131.212.32.6 2000
TrekMUSE nebula.lib.vt.edu 128.173.7.183 1701
TrippyMUSH 128.153.16.13 7567
Virtual Realities coyote.wustl.edu 128.252.136.100 3019

-o0 Game Servers, Etc 0o-

o Backgammon Servers telnet ouzo.rog.rwth-aachen.de 8765
– Backgammon! (Login: guest)

o Eliza-type Interactive AI
– telnet to debra.dgbt.doc.ca ( login: chat)

o Chess Server telnet to 129.15.10.21 5000
– Play/watch real-time chess w/ human opponents.
– Type ‘help’ for help

o Game Server telnet castor.tat.physik.uni-tuebingen.de
– a myriad online games. (Login: GAMES)

o GO Server telnet hellspark.wharton.upenn.edu 6969
– Ancient Chinese Secret. Now on the Internet!

o Iowa Politcl. Stk Mkt telnet ipsm.biz.uiowa.edu
– Buy & sell shares in political candidates.
(Non profit research proj)

o The Oracle
– mail oracle@cs.indiana.edu w/ subject: help
– The Usenet Oracle answers all your questions!

o Scrabble telnet phoenix.aps.muohio.edu 7777
– The popular Milton Bradley board game. (unable to connect)

___
______ _____ __ __ ______
/ ___ / __ / “-. /__ _
____ / \ -. \/_/ / __
_____\ _____\ _\”_ _ /_
/_____/ /____ / /_/ /_/ /_/ /_/ In Part 4 of 5
copyright 1994 John Frost

Cyberpoet’s Guide To Virtual Culture Part 2 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p2/5

Part II of V – 3.14.94

Cyberpoet’s Guide to Virtual Culture –

-=- 02.Cultural Signposts
o Libraries – cyber-repositories of data
-o- FTP sites
-o- Telnetable Repositories
-o- Gopher Space
o Museums, galleries, ezines & stuph
-o- Art FTP sites
-o- Art Centered Elists
-o- Ezines
-o- Misc Internet Art
o Organizations & Gov’t

-=- 02.Places
——————————————————
-=- 02.1.Libraries |
————————-

Like a child who enjoys reading, a cyberpoet will return often to hir
favorite net.repository of information and check for new ‘books.’ Unlike
everyday reality [ER], there are thousands of libraries and also unlike ER
they are usually less then 100 keystrokes away. No fossil fuel is burned;
they are almost never closed; and the cost of use is minimal, undoubtedly
a few steps in the right direction.

A cyberpoet with a good memory or a handy Personnal Digital Assistant
[PDA](such as a Newton, Sharp, or Intelligent Agent) will often be able to
list off hir favorite net.repositories upon request. However it is often
useful to have a pre-made list of common sites to forward if time is short
or the PDA is without batteries. Consider this such a list.

-o0 FTP sites 0o-
the self service library

~o 141.214.4.135
– UnderWorld Industries
– 8.3 format *yuck* =)

~o alfred.carleton.ca
pub/freenet/working.papers/
– Volumes of information on Freenets and Internet Use

~o aug3.augsburg.edu
/pub/bbs-lists
– Lists of BBS’s internet and dial-up
– also the archives of the Auggie BBS.

~o bertha.pyramid.com
– leri, cybernews info
– an archive on personal freedom

~o byrd.mu.wvnet.edu
/pub/ejvc/
– Electronic journal on virtual culture archives
/pub/history
– History archives, databases, other…
– Some internet History
– Mostly political and military now.
/pub/merton
– Merton-L archives

~o cert.sei.cmu.edu
/pub
– Computer/Internet Security (those guys in red shirts)
– Computer Emergency Response Team FAQ (anti-viral)
– virus-l archives

~o coombs.anu.edu.au
/coombspapers
– a variety of research papers about the ‘internet’ etc.
– some papers on buddhism.

~o dhvx20.csudh.edu
/global.net
– Toward a truely global network
– Archives on networks around the world, mostly 3rd world.
(Maybe it’s his first time around.)

~o dla.ucop.edu
/pub/internet
– Library Resources Guide

~o etext.archive.umich.edu
– a wealth of text archives
– recipient of the most discriptive e-address award

~o ftp.cica.indiana.edu
/pub/pc/win3
– Windows software archive Also the home of the

~o ftp.cpsr.org
– Tap-Info archives (Ralph Nader’s Internet Group)
/cpsr/work
– CPU: an ezine for cpsr news and info.
/cypherpunks
– cypherpunks archive

~o ftp.cwru.edu
/hermes
– Supreme Court ASCII rulings.
– Also available thru telnet and gopher.

~o ftp.eff.org
– preferred access: gopher
– recently reorganized to server you better.
– There is no way I could cover all the good stuff available here.
It is my suggestion that you spend some time skimming each
document to grok its true purpose.
– also note that all the zines & journals have been moved to
etext.archive.umich.edu and the IRC archive has been moved
to ftp.kei.com /pub/irc

/pub/Alerts – Up to the minute alerts for the iNet community.
/pub/CAF – Computer Academic Freedom Archives
/banned – banned books list.
/pub/EFF – misc, newsletters & eff Policy
/pub/Groups – Info/archives from groups on the outposts.faq
/pub/Net_info – Big Dummy Guide, Cyberpoet’s Guide and more.
/pub/Publications – written material from the likes of
– Bruce_Sterling, Esther_Dyson, John_Gilmore, CuD,
John_Perry_Barlow, Mike_Godwin, Mitch_Kapor and more

~o ftp.kei.com
/pub/irc
– irc elist archives.

~o ftp.msstate.edu
– History – Africa & Americas
– fineart_online (an epub and archives)

~o ftp.nevada.edu
/pub/guitar
– Guitar Chords, Tablature.

~o ftp.rpi.edu
/pub/communications
– internet-cmc (also known as the december list).

~o ftp.u.washington.edu
[] the alt.cyberpunk archives that used to be maintianed here []
[] are missing. If you know where they are now, please update me []
[] ditto the alt.drugs archives []

/pub/virtual-worlds
– a library of information of Virtual Reality

~o ftp.uwp.edu–
– THE central repository for music information
– Lyrics, gifs, discographies, etc, etc, etc…

o grind.isca.uiowa.edu (128.255.19.233)
/info/articles
– Academic papers and news articles about hacking
/info/hacking
– Quotations from “experts” about hackers and hacking
/info/jfk
– JFK conspiracy files, alt.conspiracy.jfk archives
– you can telnet to this ftp site, login iscabbs

o KSUVXA.KENT.EDU
/library
– Acadlist – list of academic elists

~o lysita.lysator.liu.se
– many texts (including SF zines and stories)
– Magick, religion et al.
– Black7 disc. list archives =)

~o media-lab.media.mit.edu
/access/
– information concerning the mit media lab in
particular, see ProjList, the list of
medialab-related projects

~o mrcnext.cso.uiuc.edu
/pub/etext
– Project Gutenberg and other etext holdings (books!)

o ftp.cc.ncsu.edu
/pub/ncsu/pmc
– General files about postmodernism
– Avital Ronell Interview
– Dead Doll Humility
by Kathy Acker
– Notes Toward an Un-written Non-Linear
Electronic Text “The End of Print Culture”
A Work in Progress
by Michael Joyce
– Play it Again, Pac-Man
by Charles Bernstein

~o netcom.com
/pub/amcgee/*
– leftist, liberal, activism stuff.
/pub/fixion
– collabrative fiction, but more.
/pub/Guides
– the Internet Mall (commercial entities on the net)
/pub/aleph
– Unofficial archive aleph@pyramid.com e-list.
/pub/alm
– FreeBSD Unix-related files and info
/pub/bskendig
– programming docs MUF on TinyMUCKs; useful MUF programs
/pub/btf
– Computer Underground Digest; Funhouse
/pub/bverreau
– solar eclipse photography; GIF and JPEG images
/pub/css
– Socially Responsible Investment Oppty.
/pub/dwu/InsightsHumor
– misc stuff that are funny or insightful
/pub/eblade
– lpmud and other misc.
/pub/fb
– TinyMUCK 2.2fb mud server source code, and muf source code.
/pub/fdesign
– Design & print IFS fractals, advanced features
/pub/forge
– Documentation and demo files of FORGE product set.
/pub/gasman
– Quotes, witticisms, etc. stolen from others for YOUR usage.
/pub/gleep
– Anime pictures, original and just colorized.
/pub/imf
– Interesting Mac shareware/free
/pub/johnl
– E-zine-list (list of net-accessible zines); CRASH zine
/pub/katbrown
– info on Kathleen Brown’s Campaign for California Governor
/pub/kevitech
– Internet Underground Music Archive curent info; cool stuff.
/pub/kgreene
– Synaesthsorium Archives
/pub/lemay
– Short stories; mostly horror, gothic
/pub/qwerty
– Xenon’s ftp site. PGP FAQ and “Here’s How to MacPGP!”
/pub/rone
– Miscellaneous files and assorted junque; pictures; News.
/pub/sjourney
– Oingo Boingo Electronic Newsletter backissues;
/pub/totse
– Temple of the Screaming Electron BBS
/pub/vidgames
– Electronic Game FAQ’s; Mortal Kombat II; Game Genie
/pub/zzyzx
– public keyserver; pseudonym registry anon.penet.fi

~o nexus.yorku.ca
/pub/Internet-info
– Lot’s of stuff, including High Weirdness.

o nic.funet.fi
/pub/culture
– Cultural Information

o nicco.sscnet.ucla.edu
[] Gone! ugh… anyone know any mirrors? []
/pub/papers/
– a course in sociology and cyberspace by Peter Kollock
– Mark Smith’s masters thesis
– virtual center for the study of virtual spaces archives

~o nifty.andrew.cmu.edu
/pub/QRD
– AIDS info/gay rights info
/pub/erotica
– like it says… erotica (a fair sized archive too)

o oak.oakland.edu
– software archive for PCs and UNIX.

o obi.std.com
/pub/obi
– On-Line Text (published works)

o ocf.berkeley.edu
/pub/Library
– lib. of docs, bible, lyrics, etc.

o panda1.uottawa.ca pub/religion
– Electric Mystics Guide
– Much religious stuff

o parcftp.xerox.com
[] down due to (hacking?) back soon []
/pub/MOO/papers/
– mud-related perspectives on social worlds in vr
– stuph.

o penguin.gatech.edu
pub/leri/articles
– Timothy Leary’s 8 Circuit Model

o pilot.njin.net
pub/ftp-list/ftp.list
– List of FTP Sites (1992 version)

o quartz.rutgers.edu or cathouse.org
/pub/humor
– text/humor files (tv, sex..)

o rtfm.mit.edu
– USENET FAQ repository
– General Net Info
– tends to be a little techie (RFC’s and the like)

o sulaw.law.su.oz.au
/pub/law
– Law libraries and legal research.

o slopoke.mlb.semi.harris.com
/pub/loopy
– Loopy (Quantum Gravity & String Theory)
/pub/magick
– Magick, not parlor tricks.
/pub/scripture.*
– Church of Virtuality/Reality
/pub
– High Weirdness
+ Guide to some interesting stuph
– The Human Evasion
+ by Celia Green
– Hypertext and Hypermedia: A Selected Bibliography
+ by Terence Harpold
– Principia Discordia
+ by Malacalypse the Younger
– wilson.on.cis
+ Interview with Robert Anton Wilson
– Temporary Autonomous Zones (TAZ)
+ by hakim Bey
+ a defining work of virtual space.
– New Maps of HyperSpace
+ Terence McKenna
– schizmat
+ Tom Maddox on Schizmatrix (by B. Sterling)

o soda.berkeley.edu
/pub/cypherpunks
– CryptoAnarchist Manifesto
– Cryptography Glossary

o sounds.sdsu.edu
– sounds archive

o sunset.cse.nau.edu
– pictures, sounds

o sunsite.unc.edu
/pub/docs
– internet-info
/pub/multimedia/OTIS
– OTIS archives.

o wiretap.spies.com
/Clinton
– Clinton Public Docs & Speeches

o wuarchive.wustl.edu
– pictures, sounds

-o0 Telnetable Repositories 0o-

o CARL telnet pac.carl.org or 192.54.81.128
– Online database, book reviews, magazine fax delivery

o FedWorld Gateway telnet fedworld.doc.gov or 192.239.92.201
– Access to some gov’t databases, files, libraries, etc.

o Hpcwire telnet hpcwire.ans.net (Login: hpcwire)
– menu-driven information searches.

o InterNIC telnet rs.internic.net
– Gopher, WAIS, Whois, finger, book orders, etc

o Law Library telnet liberty.uc.wlu.edu (login: lawlib)
– State,Computer,Law Library.

o LawNet telnet lawnet.law.columbia.edu (login: lawnet)
– Law/Judicial info and catalogs access.

o Library of Congress telnet locis.loc.gov
– lib. of congress, legislative info, and copyright info.

o NSSDCA nssdca.gsfc.nasa.gov
login as “NODIS” no password
– online catalog of NASA material

o Rutgers CWIS telnet info.rutgers.edu
– (CIA World Factbook, Religious/Gov’t Texts)
– Recommend select LIBRARY
– dictionary/thesaurus/familiar-quotations

o World Wide Web info.cern.ch
– an attempt to build an online hypertext reference work.

-o0 Gopher Space 0o-

A menu based realm of information access. To use these gopher servers,
‘gopher gopher.server.name’, (unless otherwise noted) else hunt them down
from the global menu. Much gopher stuff is duplicated at ftp sites, and
vica versa.

o GopherJewels@EINet.net
share interesting gopher finds via this elist
sub: LISTPROC@EINET.NET
msg: sub gopherjewels

o gopher ba.com
Bell Atlantic Gopher
URL=”gopher://ba.com/”
The seven baby bells have made a gopher to store information
about their task force on the future of the baby bells and the
information super highway

o gopher cns.cscns.com
offers: ASCII Clip Art, USA Today, UPI News,
Commerce Biz Daily, Classifieds

o gopher cypher.esusda.gov
location of foundation center libraries
and book listing funding info sources

o gopher english-server.hss.cmu.edu
A variety of info… worth a surf. Lots of links.. almost uptodate

o telnet fatty.LAW.cornell.edu (login: gopher)
– mucho stuph concerning LAW, legal issues, gov’t.

o gopher.eff.org
– legal issues in cyberspace. privacy, freedom, etc.

o telnet GOPHER.GSFC.NASA.GOV (login: gopher)
– nasa info & GSFC info (was Nicolas BBS)
– images
– a selection of internet resources
– a selection of internet resources

o gopher lan.vita.org
3rd WORLDNETWORK DEVELOPMENT

o gopher gopher.mta.ca
Mount Allison University Gopher
– on-line art Galler

o gopher mudhoney.micro.umn.edu
– gnews-archive
– big archive too

o telnet nicol.jvnc.net or telnet 128.121.50.2 (Login: nicol)
– Access to internet resources
– Elec. Publishing Service (library resources)

o gopher peg.cwis.uci.edu 7000
URL: gopher://peg.cwis.uci.edu:7000/11/gopher.welcome/peg/GOPHERS
An example of a well organized gopher (kewl stuff too)

o gopher una.hh.lib.umich.edu
– helpful directories for the Inet
– much more stuff (really incredible)

o wiretap.spies.com
– collection of etexts
– white house releases

o is.internic.net
– alternative: telnet is.internic.net login gopher
– pointers to and fulltext of resource guides
– information about the internet itself

-o0 World Wide Web 0o-

Although others would claim that WWW isn’t the latest greatest thing
on the Internet, it is just beginning to come into wider use (what with
the advent of Mosaic at al). So, like a good soldier, I have added this
section. It is small now, but with your support, and a keen eye, it will
grow fast.

Introducing Lynx. The solution too your dialup WWW needs.

o Lynx (a textbased WWW server)
code available via ftp at ftp2.cc.ukans.edu pub/lynx
or try out lynx by telnetting to:
ukanaix.cc.ukans.edu ( login: www )
www.twi.tudelft.nl ( login: lynx )
millbrook.lib.rmit.edu.au (login: lynx )

o http://141.214.4.176/uwi/reviews.html
– Look here for “What’s Hot and Cool” on the Web.

o http://www.cen.uiuc.edu/
– a variety of Internet guides here

o http://www.eff.org/CAF/cl-index.html
– (A live index to “newsy” civil-liberties related Net material)

o http://www.ics.uci.edu/~ejw/csr/cyber.html
The Cyberspace Report, a radio show aired on KUCI, 88.9 FM

o http://www.ncb.gov.sg
– Singapore National Computer board

o http://nearnet.gnn.com/GNN-ORA.html
– O’Reilly & Associates Global Network News

o http://solar.rtd.utk.edu/friends/home.html
– New Russia-American Friends and Partners

o http://sunsite.unc.edu/expo.ticket_office.html
A virtual World’s Fair that lets you tour exhibits from around
the world and, at the end of the day, hop on a computerized
shuttle bus for a trip to the official Expo restaurant.

o http://tlg.org/
The Little Garden cooperative has a WWW service online,

o http://www.ifi.uio.no/~mariusw/nexus/
– Nexus elist info

o http://www.wired.com
– WiReD magazine

o http://zapruder.pds.med.umich.edu/uwi.html
– Contains Hot and Cool- pointers and reviews of Web spots
– Worth a long look(and probably point you to even cooler sites)

-=- 02.2.Museums, galleries & stuph |
—————————————

Every subculture has art it can call it’s own. Indeed, some would say that
without art it would not really be a culture at all. The world of
virtual culture is no exception. Civilizations, uncivilized that they are,
have been prone to collecting art in museums, supposedly to make public
viewing easier. The result, however, is that only a few people see this
art every year and the scarcity of this viewing makes the art-world seem
elitist. To some extent, this has been replicated in virutal space.

However, the medium of the net allows for wider distribution and new
spaces for all forms of art. New spaces, even new artforms, pop up all the
time and hopefully find their way into this document. This activity seems
to be both motivated by and motivating a groundswell in popular art and
computer mediated art.

-o0 Gopher, FTP & WWW sites 0o-

o Agrippa available @
gopher spinaltap.micro.umn.edu

o alt.pictures.fine-art.*
archives can be found the file
ftp uxa.ecn.bgu.edu /pub/fine-art

o Amine Info
– oinker.ucsb.edu /pub/anime

o collection of sci-fi stories
– http://tardis.ed.ac.uk/~charlie/fictionhome.html

o gopher cs4sun.cs.ttu.edu
– Ascii pics and other art

o GIF Pictures (general archives)
– ahkcus.org
– apocalypse.engr.ucf.edu /pub/images
– hubcap.clemson.edu /pub
– solaria.cc.gatech.edu /pub

o Music
– ftp.uwp.edu /pub/music
+ Music (lyrics/discographies/etc.)

o mtv www page
– www.mtv.com

o OTIS (Operative Term Is Stimulate) archives
– sunsite.unc.edu /pub/multimedia/pictures/OTIS
+ original e-art

o Spunk Press archive:
gopher: o etext.archive.umich.edu:/politics/Spunk
AnonFTP: o etext.archive.umich.edu:/pub/politics/Spunk
WWW: o http://www.cwi.nl/cwi/people/Jack.Jansen/spunk/Spunk_Home.html

o Survival Research Laboratories (SRL) Info
– ftp.u.washington.edu /public/alt.cyberpunk
+ info on the industrial robot group
[] missing in action – do you know of copies? []

o WAX: The Discovery of Television Among the Bees
a film by Davids Blair
– ftp.u.washington.edu /public/alt.cyberpunk
– reviews and info about David Blair’s cyberdelic film
[] missing in action – do you know of copies? []

-o0 Art Centered Elists 0o-

o FineArt Forum
fast@garnet.berkeley.edu

– elist on arts on the net and elsewhere

o Gibraltar
gibraltar-request@maestro.mitre.org
– discussion of artistic and progressive music

o NetJam
netjam-request@xcf.berkeley.edu
– MIDI, musc makers, etc.

o Phillip K. Dick
pkd-list-request@wang.com
– list celebrating the famous sf author

o Playlist
playlist-request@ecst.csuchico.edu
– alternative radio/dj playlists and discussion

-o0 Ezines 0o-

o Armadillo Culture
sokay@mitre.org
– cool ezine

o ArtCom
artcomtv@well.sf.ca.us
– interfacing art and communicaion
– usenet alt.artcom

o BLINK
– FTP: blink.acns.nwu.edu:/pub/blink
– WWW: – http://www.acns.nwu.edu/blink/
– Gopher: gopher.well.sf.ca.us
– Issues surrounding the intersection of consciousness and
technology.

o Computer Underground Digest
– An open forum dedicated to sharing information and the
presentation and debate of diverse views.
– FTP: ftp.eff.org:/pub/Publications/CuD
etext.archive.umich.edu:/pub/CuD/cud
aql.gatech.edu;/pub/eff/cud
ftp.ee.mu.oz.au:/pub/text/CuD (Australia)
nic.funet.fi:pub/doc/cud (Finland)
ftp.warwick.ac.uk:pub/cud (United Kingdom)

o CORE
core-journal@eff.org
– fictional/essay e-zine
– ftp ftp.eff.org for back issues

o Crash
– Guide to traveling through the underground. Alternative travel
stories, hints, and tips.
– FTP: netcom.com:/pub/johnl/zines/crash

o Drum
– Interesting ASCII layout concept.
– FTP: etext.archive.umich.edu:/pub/Zines/Drum
– Gopher: gopher.well.sf.ca.us
etext.archive.umich.edu

o Fact Sheet 5 – the e.version
– FTP: etext.archive.umich.edu:/pub/Factsheet.Five
– Gopher: gopher.well.sf.ca.us
etext.archive.umich.edu

o Hi-Rez
– Electronic Journal for CyberBeatniks
– FTP: etext.archive.umich.edu:/pub/Zines/CyberPunk/HI-REZ
– Gopher: etext.archive.umich.edu

o Holy Temple of Mass Consumption
– strong ties to the finest SubGenius traditions
– ftp: quartz.rutgers.edu /pub/journals/HToMC

o interface
– FTP: etext.archive.umich.edu:/pub/Zines/Interface
– Gopher: etext.archive.umich.edu

o InterText (was Athene)
– FTP: network.ucsd.edu:/intertext
etext.archive.umich.edu:/pub/Zines/Literary/
– Gopher: etext.archive.umich.edu

o Line_Noiz_
– ae687@freenet.carleton.ca for info
– to sub send email to dodger@fubar.bk.psu.edu
– with the body: Subscription LineNoiz

o Meta
– ftp ftp.netcom.com:/pub/mlinksva
– cryptography, electronic publishing, free software development,
intellectual property, internet commercialization, privacy and
virtual communities.

o Morpho_online
– etext.archive.umich.edu
– alt.cyberpunk

o Obscure Electronic
– Profiles the people in this publishing subculture
– FTP: etext.archive.umich.edu:/pub/Zines/Obscure.Electric
– Gopher: gopher.well.sf.ca.us
etext.archive.umich.edu

o Parthenogenesis
– FTP: etext.archive.umich.edu:/pub/Zines/Parthenogenesis
– Gopher: etext.archive.umich.edu

o Quanta
export.acs.cmu.edu /pub/quanta
ftp.eff.org /pub/cud/misc/journals
-fiction ezine

o Scream Baby
ftp.eff.org /pub/journals/ScreamBaby
red.css.itd.umich.edu /poli
ftp.css.itd.umich.edu /poli

o SOUND News and Arts
quartz.rutgers.edu /pub/journals
– e-version of the popular zine

o The Undiscovered Country
– the undiscovered country is a netzine regarding
life/art/literature/cyberspace/philosophy/etc.
– FTP: etext.archive.umich.edu:/pub/Zines/Literary/

o UnPlastic News
ftp.eff.org /pub/cud/misc/journals

o Voices from the net
voices-request@andy.bgsu.edu
ftp sites for Voices are:
etext.archive.umich.edu /pub/Zines/Voices
aql.gatech.edu /pub/Zines/Voices_from_the_Net

-o0 Misc Internet Art 0o-

o Adam Curry’s Cyber-Sleaze Report
– finger adam@mtv.com or hotlist@mtv.com
– worth putting in your .logout file

o Coke Machines et al.
– finger info or graph@drink.csh.rit.edu
– finger coke@cs.cmu.edu
+ Tap that coke machine.
– finger franklin@ug.cs.dal.ca
+ Random Star Trek quotes.
– finger buckmr@rpi.edu
+ U.S. Top Pop singles for the week.
– finger nasanews@space.mit.edu
+ Nasa daily news briefs
– finger normg@halcyon.halcyon.com
+ Weekly Nielsen TV ratings
– internet coffee machine (with Jpeg of coffee)
+ http://www.cl.cam.ac.uk/coffee/coffee.html

-=- 02.4.Organizations & Gov’t |
————————————-

The internet is international, national and pinpoint local; private,
public, profit, non-profit, all at the same time. This structure makes it
not only unreasonable to impose a government upon the net, but nearly
impossible. So when you talk about Gov’t on the net, you are talking about
the Goverment’s attempts to reach out to the net.citizens and, ideally, to
listen to them.

-o0 The Legislative Branch 0o-

o Congress Email/FTP
– mail congress@hr.house.gov and ftp ftp.senate.gov
– sadly I only found two senators who were using this (Alaska &
Mass)

o The Congress is in the process of establishing its own electronic public
access links. You can get more information from any of the following.
Please remember that these are not connected in any way to any White
House online projects (due to the separation of powers), so if you have
any problems with their systems, you will have to contact their system
administrators for assistance.

Senate gopher site: gopher ftp.senate.gov
Senate ftp site: ftp ftp.senate.gov
Library of Congress: telnet locis.loc.gov
” ” ” : ftp seq1.loc.gov
” ” ” : gopher marvel.loc.gov
Government documents: gopher esusda.gov
Government documents: gopher sunsite.unc.edu

-o0 The Executive Branch 0o-

The official Party Line: “The White House e-mail system is under
construction. This is a new project and suffers from all of the problems
common to a startup operation. The Communications office is currently
working on defining what this system will do, as well as trying to come up
with equipment and staffing to make sure that it works. E-mail messages
are currently being printed out and responses are being sent out via US
Mail.

“Nobody wants this new venture to work more than the staff that has
devoted so many hours to getting it up and running. But much time and
effort will be required before the system is truly interactive. In the
mean time, they will need a little patience from the electronic community.
If you send a message to the White House, please include a US Post office
address for replies.”

On the Internet, send to:
president@whitehouse.gov or vice.president@whitehouse.gov

-o0 Other 0o-

o Voice of America
ftp ftp.voa.gov
gopher gopher.voa.gov
– Voice of America Newsfiles (very very interesting. hm?)

o FCC (Federal Communications Commision)
Open to the public since 2-22-94
ftp ftp.fcc.gov

o California Gov’s Race
ftp ftp.netcom.com
– /pub/katbrown – info on Kathleen Brown’s Campaign for California
Governor

-=- 02.5.Organizations |
—————————–

Home, home on the net. The ability of the Internet to bring people
together who share common interests is amazing. Someone may start a
mailing list to discuss a local environmental problem, then suddenly
someone from halfway around the world joins in and you learn they are
having the same problem as well. Before you know it, the mailing list
becomes a clearing house for information regarding environmental
pollution. That is one sort of organization on the net. Other’s join the
net with the explicit intention of operating as an Organization. Both are
growing in numbers everyday.

This is the last time this section will be in the Guide.
In the future please refer to the
-=> OUTPOSTS <=-
on the Electronic Frontier
list maintained by Stanton McCandlish .
available via ftp from ftp.eff.org or EFF’s gopher.
OUTPOSTS is posted every 21 days to the groups
comp.org.eff.talk
alt.politics.datahighway
alt.internet.services
comp.answers
alt.answers
news.answers

______ _____ __ __ ______
/ ___ / __ / “-. /__ _
____ / \ -. \/_/ / __
_____\ _____\ _\”_ _ /_
/_____/ /____ / /_/ /_/ /_/ /_/ In Part 3 of 5
copyright 1994 John Frost

Cyberpoet’s Guide To Virtual Culture Part 1 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p1/5

____________________._____________________________________________________
_._______________________________________________________________________.
_…______________________________________________________________________
_________________…____.. _____ . _______….________….. . .. ____.__

////////////////////////////////////////////////////////////////////
// |
// \ // /////// |
// \ // // |
// \ // // |
///////////// yberpoet’s Guide to \//irtual ///////ulture |
|
A multipart guide to the electronic frontier. 039414 o

-=- 01.Introduction
——————————————————

Beyond the hype, behind the glamour, underneath the sea of buzzwords,
icons and flames a new subculture is spreading in this petri dish known as
the Internet. Here science and art – media and mind – combine in a cyborg
frenzy to create this replicant cousin to cyberpunk and hacking. It is a
subculture with no name, few labels, but thousands of common attractors,
which link together before our eyes like digital DNA to create, in the
helix of the autologue, a new frontier for participants in these wide
virtual spaces to explore.

Any document that attempts to cover an emerging culture is doomed to be
incomplete. Even more so if the culture has no overt identity (at least
none outside virtual space). But the other side of that coin presents us
with the oportunity to document the ebb and flow, the moments of growth
and defeat, the development of this young culture.

Although young, there is rich history and varied philosophies for this
group to draw on. From cyberpunk, the quest for access to information and
a vision of the future (the cyber) has been exorcised from the
distopic and ‘punk’ish views of the monster the media has made of
cyberpunk. From the Hacker ethic, we get the rally cry that “infomation
wants to be free.” From the workings of the Internet, we see the desire
for universal access and the pursuit of Jeffersonian Democracy (kapor)
that is manifested itself partially through the anarchy inherent in the
system and partially through the efforts of many net.users.

This document, although significantly different, attempts to pick up where
the FutureCulture FAQ (by andy hawks) left off. It should act as a
starting point for those new to the net, as one avenue to reach a level
of net.literacy, and as a handy reference point for those already
comfortable in this pocket of the net.

It is a road map to the interesting viewpoints, hot dog stands, museums,
flora and fauna that dots this constantly changing landscape of virtual
space. Explore these sites. Dig in the cyborganic gardens. Report back
your findings, so that others may follow. And they will.

-oO -==- Oo-

[Cyberpoet] Cyber-, having to do with information flow, human and
computer use/combinations, computer mediated communication. -Poet, one who
makes art with words, an artist, a renaissance trait. A cyberpoet is one
who strives to be artful in their use of virtual space. Someone who makes
frequent trips to the edge of technology/culture/society and then reports
back to anyone who will listen. The avant-guard of virtual culture.
Someone who, like a renaissance man, has their eye on the future and their
nose in its knowledge, technologies and politics.

-oO -==- Oo-

-=- 01.2.Contents |
————————-

Part I

-=- 01.Introduction
o preface
o contents -=>what you are reading>From A to Z
==================
================
================
==========

-=- 01.Lexicon of Virtual Culture
——————————————————
-=- 01.3.The dictionary |
—————————

Virtual Culture — >>From A to Z

ADSL (Asynchronous Digital Subscriber Loop) – The transmission method
likely to be used to send movies, tv shows and sports – at the viewers
request – over existing telephone lines right to your television. Look for
this to be available and affordable in the next two years. This is the
main contender to ISDN, the winner will provide the link between 50
channels and 500 channels, 50,000 channels or (hopefully) more.

Agrippa: A Book of the Dead – A collaboration between author William
Gibson, publisher Kevin Begos Jr., and artist Dennis Ashbaugh. This
art-work contains engravings by Ashbaugh which appear or disappear in
light and an on-disk semi-autobiographical poem by William Gibson which
is unreadable after having been read once. Agrippa is notable because in
many respects it blurs the lines concerning what art is, and adds fuel to
the fire on issues of property rights and intellectual property. A
highlight of 1992 was the release of Gibson’s poem on to the net.

Artificial Life – man-made systems that exhibit characteristics associated
with the concept of “life”.

Artificial Reality – similar to virtual reality, but more interactive,
with the participant being part of, not just experiencing, the artificial
environment.

Barlow, John Perry – A drummer for the Grateful Dead and co-founder of the
EFF. Now a net.denizen who speaks often on virtual culture and cyberspace
sociology and technology.

BBSes – electronic Bulletin Board Systems. Begun in the late 70’s, a form
of virtual community existing in cyberspace where participants (usually
using aliases) may send and receive public and private messages to each
other on any topic imaginable, transfer software (copyrighted and/or
public domain), play on-line games, etc. There is the “over-ground” BBS
world where aliases are less common and illegal activities are avoided in
discussion, and the computer underground where illegal activities and
discussions are very common, members use aliases, and illegal information
and/or software is exchanged.

Boxing – A variety of electronic devices used to aid in phreaking. The
original was the blue box, used from the mid 60’s to the mid 80’s, which
allowed long distance phone calls to be made for free. A variety of other
similar instruments accomplishing different tasks have been developed,
some purely comical, some quite practical.

Chaos – Chaos is a state that garners a lot of respect in cyberculture, to
the point of being a techno-pagan religion. Many people are self-described
Chaoticians.

Chaos Theory – A field of science revolving around simplistic equations
involving a large number of variables. Gave rise to fractals, a form of
cyberdelic art. For further info on the subject, James Gleick’s “Chaos:
Making a New Science” is suggested.

C0dez Doodz – Essentially a phreaker’s version of pirates. People who seek
out telco codes to be used to gain long distance (ld) telephone calls
without paying for them. Scourge of the computer underground.

Communitek – an informational technology that provides the potential for a
community to develop in cyberspace. For example, within the net, IRC and
elists are two communiteks.

Computer Underground – “A group organized in secrecy, hidden behind
aliases, to promote the free exchange of information regarding anything
and everything including, but not limited to: computers, telephones,
radios, chemicals, and ideas.” (Thanx to The Butler for this definition)
The mainstay of communication for the computer underground is cyberspace,
more specifically BBSes. The computer underground is composed of hackers,
phreakers, pirates, anarchists, and other cyberpunks.

Cyber- – A prefix taken from cybernetics generally used in popular culture
to mean anything that is technologically oriented.

Cyberculture – Often used in the media to denote aspects of “life as a
cyberpunk.” Yet if we are to follow strict meaning, cyberculture is more
accurately defined as an information-based culture.

Cyberdeck – Term originated by William Gibson to refer to a computer used
by deck cowboys that can connect to the matrix.

Cyberdelic – “Cyber-art”. Examples include fractals, computer-generated
pictures and/or music, virtual worlds, etc. (sidebar – fractal pict)

Cybernetics – The study of communication systems in living organisms and
machines, the mathematical analysis of the flow of information.

Cyberpunk – Begun as a literary movement in the 80’s, an off-shoot of
normal science fiction. Unique in that it generally occurs in the present
or not so distant future, the characters are often considered “punks”
(social deviants) and technology, (the cyber aspect), is prominent.
“Neuromancer” by William Gibson, published in 1984, is considered by most
to be the “bible” of cyberpunk. Another prominent author is Bruce
Sterling, editor of another worthy cyberpunk collection, “Mirrorshades”.
Other examples of cyberpunk include Max Headroom (TV show) and BladeRunner
(movie). Cyberpunk is special in that it has evolved from a purely
literary movement to a realistic subculture. Many “techno-punks” (i.e.,
hackers) are considered cyberpunks. Other contributing factors to the
cyberpunk subculture include: virtual reality, hallucinogenic and
nootropic drugs, and industrial and punk music. For an in-depth, detailed
look at cyberpunk fiction and cyberpunk culture, “Storming the Reality
Studio,” ed. by Larry McCaffery is suggested.

Cyberspace – “The electronic frontier.” A completely virtual environment:
the sum of all BBSes, computer networks, and other virtual communities.
Unique in that it is constantly being changed, exists only virtually, can
be practically infinite in “size”, communication occurs instantaneously
world-wide – physical location is completely irrelevant most of the time.
Some include video and telephone transmissions as part of cyberspace.

Cypherpunks – net.folks who have evolved from hacking to encryption and
concern with creating multiple anonymous identities.

Deck Cowboys – Futuristic, some say fantasy, version of a computer hacker
or a modern-day cyberpunk.

Electronic Frontier Foundation – (EFF). Organization founded by Mitch
Kapor (of Lotus fame) and John Perry Barlow (writer and Grateful Dead
songwriter) to establish laws for cyberspace and apply the constitution to
virtual communities. The EFF has recently morphed into a strong lobbying
force in Washington D.C..

Elist (email-lists) – An electronic discussion group that anyone with an
email address can subscribe to. Email addresses for the elist members are
stored on a single computer. When you send email to that machine, it will
automatically bounce your letter to every other subscriber. Thousands of
these elists, covering almost every topic, exist on the Internet for your
reading pleasure and more are materializing weekly.

Ezine – An net version of the small press magazine (known as a zine)
culture. Usually ezines exist only on the net, but more and more
paper-zines are distributing an electronic version as well. (sidebar, some
zines to watch for)

F2F – face to face meeting (also FTF)

Flame – Disagreement (hell, full fledged war sometimes) occurring in
cyberspace. Common on Usenet.

Fleshmeet – a F2F meeting. Often a party of some sort where people who
have met previously on the net get together.

Fractals – Images created using chaos theory. A mish-mash of colors
presented in a pattern that repeats itself many times over. A popular
type of fractal image is one created using the “Mandlebrot set”. Fractals
are considered cyberdelic art.

Gibson, William – Considered by most to be the “father” of cyberpunk,
along with Bruce Sterling. His works include the infamous “Neuromancer”,
“Count Zero”, “Mona Lisa Overdrive” (these 3 works are known as the sprawl
series), “The Difference Engine” with which he was co-author with Bruce
Sterling, and “Burning Chrome” a collection of short stories. A recent
work of his is a poem in “Agrippa: A Book of the Dead”. Gibson says he
will no longer be writing the “classic” cyberpunk novels he is famous
for. His latest work is entitled “Virtual Light” is futuristic fiction
was released in August.

Global Village – Famous term coined by Marshall McLuhan, exemplified by
the net.

Gopher – A menu driven service useful for grep’ing info off the net. You
forgot your friend’s email address, look here. Need to read the latest
issue of “Voices from the net” (An electronic text based zine or ezine),
look here. Searching for a file to read or software to download, use
Gopher. Over 1200 individual gopher sites exist and the number is growing
weekly.

Grep – search, or scan.

Grok – Word with roots in Shamanism that is akin to gnow. and implies a
thorough and complete holistic understanding. Popularized in Robert A.
Heinlein’s _Stranger in a Strange Land_.

Hacker – 60’s (1st) generation (orig. MIT): one who tinkers with
software, electronics, computer hardware, etc. 80’s (2nd) WarGames
generation: one who enters computer systems without permission with
either malicious or non-malicious intent, to gain, alter, or destroy
information (labeled as crackers by the 60’s generation). 90’s (3rd)
generation: often called cyberpunks, mostly non-malicious crackers
interested in information for the sake of information, and not hacking for
the sake of the hack – sometimes calling themselves “information
liberators”, they have re-adopted more of the original hacker ethic of the
60’s that mainly states “all information should be free”, “access to
computers should be unlimited and total” and “promote decentralization”.
This new, 3rd generation is commonly associated with the computer
underground, despite its mostly non-malicious intent.

Identity Hacking – The use of pseudo-anonymity or false accounts to
put ones self off as another person on the Internet. Not nice.

Infonomics – The idea of an economy based on information, which obviously
holds many different properties from our current state of the world.

Internet – A large and very popular world-wide computer network begun by
the Department of Defense in the 60’s that connects educational
institutions, corporations, organizations, and military and government
installations around the globe. Some organizations exist that offer
Internet access to the general public for an hourly,monthly or yearly fee.
Suggested are places like the WELL, MindVox, Nyx (which is free of cost),
Netcom, etc. Many Internet users partake in reading and contributing to
Usenet, playing MUDs, FTPing text files and programs free of charge at the
various FTP sites, and ‘telnet’ing to other Internet sites. Because of its
accessibility at a relatively low cost, size (the largest computer network
in the world), connectivity, and infinite amounts of information, many
network users prefer the Internet to such services as CompuServe (often
called Compu$erve on the Internet) or Prodigy (which is more restricting
in its content). The Internet has something to offer for everyone. There
are many helpful books published about how to use the Internet, some are
available right on-line. Once you gain access to the Internet, it is
suggested that you read the ‘news.announce.newusers’ and
‘news.newusers.questions’ and ‘news.answers’ newsgroups on Usenet.

IRC – Internet Relay Chat. Realtime communication forums between Internet
users all over the world.

ISDN – Integrated Services Digital Network. A communitek hopefully coming
soon to a house near you, basically it will greatly expand the potential
for information coming into your house, such as having 700 cable TV
channels, interactive realtime video-phones, and far off in the future
possible even realtime networked interactive 3d virtual reality.

Kapor, Mitch – One of EFF’s founders (along with John Perry Barlow). He
started the Lotus software company and built it into one of the top 5
software companies in the world, then left to start the EFF. In addition
to working at the top of EFF ladder, he frequently writes stories for
magazines and newspapers, interviews on the TV and is often called to
testify before congressional hearings.

Knowbot – provides a uniform user interface to heterogeneous remote
information services. A predecesor to the Intelligent Agent.

Legion of Doom – (LoD). A legendary group of hackers from the computer
underground. When they disbanded, some members went on to form a computer
security firm (ComSec), Loyd Blankenship wrote GURPS Cyberpunk for Steve
Jackson Games and some ended up in jail from Operation Sundevil.

Matrix – Term coined by William Gibson that refers to the consensual
hallucination of cyberspace.

Meme – An “agent of communicative resonance,” or more simply, “an
information virus.” Memetics is the study and theories behind the root
structures of information itself.

MindVox – A virtual community in cyberspace, also a BBS connected to the
Internet. A nexus of the computer underground and cyberpunk and virtual
reality began by Phantom Access Technologies, former members of the Legion
of Doom. See also the WELL.

Mirrorshades – A very important collection of cyberpunk fiction by various
authors, most of whom are labeled as the mirrorshades group. This book is
edited by Bruce Sterling and should be available in most bookstores.

Mirrorshades Group – Original collection of cyberpunk authors which
includes William Gibson, Bruce Sterling, Tom Maddox, Lewis Shiner, John
Shirley, SF Eye magazine editor Steve Brown, Rudy Rucker, Pat Cadigan, and
others.

Mondo 2000 – Very popular cyberpunk and new edge magazine. Recently
challenged by a new magazine, WIRED.

MUD – Multi-User Domain, Multi-User Dungeon, or Multi-User Dimension. MUDs
are multi-user role-playing-games of sorts that exist on the Internet for
entertainment purposes. MUDs are essentially text-based virtual worlds
which players (participants) may explore, change, or add on to. In most
cases, the MUD is actually a “game” with scores, player attributes,
levels, etc., but some MUDs are with more social goals in mind. MUDs tend
to be based around different science fiction genres such as fantasy,
space, or even cyberpunk.
More recently MUDs have SIDEBAR – MU*’s have a somewhat unfortunate
developed new uses. Research, SIDEBAR – of being addicting. I attribute
conferencing, and more SIDEBAR – this to the strong feeling of
academic MUDs are popping SIDEBAR – community one gets from mudding.
up like wildflowers these SIDEBAR – Students have been known to drop
days and indicate a possible SIDEBAR – out of school just to MUD. Others
trend in the Internet, that SIDEBAR – have fallen in love over a mu*
being integration of services. SIDEBAR – only to later realize the other
SIDEBAR – player doesn’t feel the same.
Nanotechnology – the science SIDEBAR – I recommend going cold turkey as
of “micro-machines”. Small SIDEBAR – the only solution to the MUDding
gears or other machines seen SIDEBAR – addiction. =)
only by a microscope, that
can be used in areas such as medicine and health, art, and other
technologies.

Net – A computer network. Often used to mean the Internet when referred to
as “the net”.

Netrip – Many similarities exist in some people’s minds between
psychedelic drugs and the net, and a netrip is the state of literally
getting “high” off the net, accompanied by distortions in space and time,
a gnowledge of the net itself, an intense desire to communicate your
subconscious to the rest of the net, etc.

New Edge – Fringe culture and fringe science, mostly techno-oriented, and
very popular in Southern California. Mondo 2000 is a magazine devoted to
the new edge.

Nexus – The dictionary defines a “nexus” as a “a connection, tie, or link
between individuals of a group, members of a series, etc.” When applied to
virtual cultures and the networked humans which comprise them, a NEXUS is
basically a domicile/workspace/cultural-center formed in real-life by
people who have met and established relationships over the Net. They
purchase and secure group Internet access, and thus control their own
node, living in close proximity, since creativity blossoms in people when
surrounded with creativity; since similar approaches to work and life can
re-inforce each other. We have seen this happen on the Net; the NEXUS
community intends to manifest it in reality, to integrate it into our
lifestyle.

Nootropics – A new science revolving around drugs used to increase
intelligence, aid in memory, enhance brain activity, etc. Touted as a fad
by some, others claim that use of nootropics actually work. See also
SmartDrinks.

Operation Sundevil – Secret Service operation begun in 1990 intended to
destroy the computer underground by confiscating BBSes and detaining
hackers.

Paste Bomb – Sometimes a litteral core dump. Via the Mac’s Cut and Paste
capability, take random bits of data from one’s hard drive and paste it
into an online conversation, email, mud, whatever. Eris Lives. Sci-fi
author Bruce Sterling is a notorious paste bomber. Get in the habit

Phrack – An important magazine existing only in cyberspace, of interest to
the computer underground. It’s founder, Craig Neidorf, now works for the
Electronic Frontier Foundation.

Phreaker – Hacking the phone system. Usually meaning to get phone calls
for free, whether by boxing or calling card fraud. Individual phreakers
are called phreaks.

Pirate – One who copies software illegally. Commonly associated with the
computer underground. Although commonplace, pirates are looked down upon
as with codez d00dz . (sidebar SPA and the big corporation pirates)

Post-industrial – The state of the world, including megacorp zaibatsus, an
evolving infonomics, etc.

Post-modern – Literary, artistic, cultural, and philosophical movement
revolving around the post-industrial world in which we live, and the
unique aspects of the trends of modern society.

Raves – A ‘dying’ subculture revolving around all-night dance parties.
Typically, the parties are generally illegal and thus a complex process is
involved to find out where they are located. Rave music is generally
techno or house , the parties usually include 1 or more DJs. Also present
in many cases are “chill out rooms” which feature more ambient music.
Lasers, blaring music, cyberdelic images, SmartDrinks and drugs most often
MDMA {X, XTC, Ecstasy, E}, LSD {acid}, ketamine, or nootropics) are all
general contributors to the rave experience. Raves are usually held in
warehouses, and last until the next morning. Another large part of rave
culture is the flyers – used to find out where your next party will be.
Raves are meant to be very happy events, everyone ideally should be open
and free, laying aggressions and inhibitions aside for the night. Some
have likened the rave experience to “a weekly roving techno-woodstock for
the 90’s.” Rave fashion includes over-sized baggy t-shirts and pants,
hooded sweat-shirts, ski caps, and usually bright colors, as well as
accessories such as whistles, Cat In The Hat hats, “doctor” masks,
VapoRub, etc. Many factors have led to an often heard questions these
days, “where have all the ravers gone?” (one answer is… they’ve gone Retro)

RTFM – Read The Fucking Manual. An abbreviation used when clueless
questions are asked about subjects that are answered in the manual or FAQ.

Shaman – An overused word that in ancient and modern cultures implies one
who is a wise medicine man or healer, with a keen understanding of the
ways of things. Used increasingly in modern culture, especially in
conjunction with techno-paganism.

Slipstream – Term used to denote cyberpunk fiction, particularly pre-1984
fictional works that have been influential to the mirrorshades group or
that closely resemble cyberpunk, but are sometimes outside of the sf
genre. An example would be William S. Burroughs.

SmartDrugs – nootropics.

SmartDrinks – Similar to SmartDrugs, or nootropics, the intent of these
substances, loaded with vitamins, minerals, amino acids, and other healthy
substances, is to aid in brain functioning. Smart Drinks are most often
consumed at raves, thus, the purpose of some smart drinks is to “energize”
the drinker, not to make them smarter.

Sprawl – Word used by William Gibson to mean large mega-cities, and places
where different cities collide. Southern California and New York City
might be early examples of the sprawl. This word is used often in modern
times as “urban sprawl”.

Steve Jackson Games – RPG manufacturers that have played a key role in the
evolution of cyberpunk and the computer underground. Operators of the
Illuminati BBS and makers of GURPS Cyberpunk, an RPG guide written by Loyd
Blankenship, a member of the Legion of Doom.

Sterling, Bruce – considered by most to be the “co-founder” of cyberpunk
along with William Gibson. He is the editor of “Mirrorshades: A cyberpunk
anthology,” which is considered the quintessential collection of cyberpunk
works by the mirrorshades group. Some of his other works include “Islands
in the Net”, “Schismatrix”, “Involution Ocean”, “The Artificial Kid”, “The
Difference Engine” which he co-authored with Gibson and “The Hacker
Crackdown” a non-fiction account of the computer underground and Operation
Sundevil, including the Electronic Frontier Foundation, Phrack, the Legion
of Doom, Steve Jackson Games, etc. Sterling has also been a vocal member
of the net. Keep your eyes open, you never know where he will surface next.

Social Engineering – Technique by which hackers or crackers acquire
information, such as names and passwords. Essentially a modern-day con,
often conducted via phone conversations, such as portraying oneself as a
telco employee.

TBT – Talking by Typing.

Techno- – prefix similar to cyber-, referring to anything which has its
roots in current or futuristic technology.

Techno – type of music made almost entirely with the help of computers,
revolving around a fast-paced drum beat (as high as 160 BPM), sampling,
and synthesizers.

Technoculture – The idea of a culture with a strong foundation rooted in
technology. Often used loosely in association with cyberculture and new edge.

Techno-paganism – Literally the worshipping of technology. Many people
*believe* that, for example, the net has some magic or is a sentient
entity in itself, or that technology can be an agent of evolution.
(sidebar Aleph spew)

Teledildonics – Virtual sex in a virtual environment. Term often used by
the new edge community. (sidebar: from new CD to magazine to etc)

Toasternet – Putting together a LAN, WAN or Internet hook up with the
cheapest of technology. Read up on Toasternets on the Wells Gopher.

Usenet – A collection of “newsgroups” on the Internet, in which Internet
users may post or read messages on almost any subject imaginable. The
topics of discussion are divided up into the individual newsgroups, which
total about 2000 on average. Usenet is divided into various large
sections, including the ‘alt’ernative newsgroups, the ‘comp’uter
newsgroups, the ‘sci’ence newsgroups and the ‘talk’ newsgroups, among
others. Some groups are moderated, while most remain completely
uncensored. Usenet is often referred to as Abusenet for its all-too
familiar flames and appearance of perpetual chaos.

Virtual Community – any group or gathering that exists in cyberspace. This
could be a BBS, a hacking group, a net, or even a zaibatsu.

Virtual Culture – the collection of virtual communities, and the cultural
aspects unique to those communities.

Virtual Reality – a consentual hallucination of a world existing only in
cyberspace. Modern day virtual reality uses helmets, gloves, and body
suits to create such a world, which is first created on a computer and
connected to the vr devices. A goal of some virtual reality researchers is
to generate a completely alternate reality. Research in vr includes
networking people, so spatial limitations are meaningless. The
possibilities of vr-generated environments are as limitless as the
imagination.

Virtual World – a world existing in cyberspace created and used with
virtual reality technologies.

WELL – The Whole Earth ‘Lectronic Link. An important gridpoint in the
matrix, a virtual community in cyberspace, also a BBS connected to the
Internet. A group concerned mostly with cyberpunk, virtual reality,
nootropics, and other aspects of the new edge. Many celebreties have an
account on the Well.

WIRED – A new magazine devoted to exploring virtualspace and new
technologies. Wired is not as new edge as Mondo 2000 and seemingly gives
off a more corporate news oriented format. However, it is a refreshing
view and perhaps infonomics first steps into the public realm. (The TIME
magazine of virtual culture.)

Wirehead – a hardware hacker.

Zaibatsu – Japanese term used a lot by William Gibson that means a large
mega-corporation, such as Sony for example.

______ _____ __ __ ______
/ ___ / __ / “-. /__ _
____ / \ -. \/_/ / __
_____\ _____\ _\”_ _ /_
/_____/ /____ / /_/ /_/ /_/ /_/ In Part 2 of 5
copyright 1994 John Frost

How To Be A Couch Potato In The Nineties By Francis U. Kaltenbaugh

How To Be A Couch Potato In The Nineties
by Francis U. Kaltenbaugh

Do you want to be with the technically-correct in-crowd, who have
already prepared for television in the nineties? You better hurry to
obtain a few needed essentials. Your old television, operating in
the background, even with its stereo speakers, single remote
controlling your vcr, cable box, and TV, is passe. There is a new
age dawning in the art of television watching; it is — Interactive
Viewing. You too can be a part of this new Couch Potato mentality by
following a few simple rules. Do not get left behind! Follow the
simple suggestions that follow:

o You must purchase a 35-inch screen television (bare minimum);
bigger is better here. Or your neighbors will tease you, “Nah-na!
Mine is bigger than yours.” You need: quad stereo speakers, split-
screen(s), built-in voice activated VCR programing, self-timers, a
minimum of 300 cable ready channels and the largest screen your
wallet can handle. Then, with the addition of a CD-ROM, you are
ready to interact properly with your computer aided TV.

o Purchase a fully automated satellite dish that includes the
proverbial black-box, which unscrambles virtually all channels. This
will dissuade those channel hoppers, who always lay hands on the
remote before you do. Since they will have to browse about 300
channels, after their first time through, they will realize — three
hours later — they missed the show they intended to watch before the
commercials started.

o Have someone install the above. You must realize your time is
too precious to waste on menial labor tasks, when instead, you could
be watching/interacting with your TV.

o Test your couch; is it large enough to serve as a bed, and
dining room table, while still allowing room for you, and selected
friends and family to lounge comfortably? If not, replace it
immediately. You must be comfortable to interact well.

o Stock your refrigerator, freezer, and pantries with easy to
prepare (microwave) and ready-to-eat foods and snacks. The closer
your snacks are to the TV/CD-ROM, the more quickly you will be able
to interact with your system.

o If you don’t have someone to serve you, it may be a good idea
to make arrangements for this contingency. Or be adventurous, do it
yourself, but also get a monitor for the kitchen. It’s always best to
carry your remote with you wherever you go. Don’t settle for those
puny laser-light activated remotes (line-of-sight only), get one that
will penetrate walls. Always be in charge during your interactions.
Just because you are in the third floor bathroom, that’s no
reason why you shouldn’t be able to continue interacting with that
Soap Opera in the downstairs living room — simply crank up the
volume to a comfortable sound level for yourself. Besides, while
you’re gone you don’t want someone channel surfing in your absence.

o After all the above steps are completed, get fired from your
job, draw unemployment and food stamps. Then grab snacks and drinks,
sit down and RELAX! Enjoy your remote controlled interactive
environment. You can really interact now, much like you used to
when working, only differently.

Spare no expense and be a part of the new breed of Couch Potato, or
“THEY” will pass you by. Or you could really get RADICAL and read
Electronic Books and Magazines — I hear it’s the rage among all the
Nerds.
—————————————————————-
Francis U. Kaltenbaugh is a 40 something computer enthusiast, who
enjoys video stimulations. Two children keep things interesting, one
an 18 year-old Marine, and a ten year-old girl, whose only response
is, “Why?” Francis, who has two books in progress and articles out
everywhere, feels fiction is a mainstay of life — for everyone.
———————————————————————
Sound Byte:

God is Dead. – Nietzsche

Nietzsche is Dead. – God

Do NOT Wear Contact Lenses Near Electric Arcs!

4

Please copy this and distribute to anyone you know who might wear
contacts or work around equipment that generates ARCS.

Two recent incidents have uncovered a previously unknown phenomenon of
the most serious gravity.

1. At Duquesne Electric a worker threw an electrical switch into a
closed position, which produced a short-lived electrical spark.

2. An employee at UPS flipped open the colored lense of his welding
helmet to better position the welding rod. He inadvertently struck
the metal rod to be welded producing an electric arc.

BOTH MEN WERE WEARING CONTACT LENSES. Upon returning home from work,
they removed the contact lenses, and THE CORNEA OF THE EYE WAS REMOVED
ALONG WITH THE LENS. RESULT: PERMANENT BLINDNESS!!!

The electric arc generates microwaves that instantly bond the cornea of
the eye to the lens, by drying up the fluid between the eye and the
lens. THIS TRAUMA (INJURY) IS PAINLESS AND THE INDIVIDUAL NEVER KNOWS
THAT AN INJURY HAS OCCURRED UNTIL THE CONTACT LENS IS REMOVED!!
-Pause- [C]ontinue, [N]onStop, [S]top? [C]

As this phenomenon was UNKNOWN, no Federal, State, or local safety and
health agency has regulations on this matter but they are pursuing the
investigation and hopefully will take immediate action.

In the meantime, it is suggested that NO CONTACT LENSES BE WORN by
anyone who is potentially subject to an electrical sparking situation.

From John Voss
Commonwealth Electric Co.
Lincoln, Nebraska

Submitted to Borderland Research by Dennis Bullard
———————————————————————-
Borderland Sciences Research Foundation, Inc.,
PO BOX 429,
Garberville, California, 95440-0429 USA.
———————————————————————-
Carried by Grey Matter Computer Services

Bulletins updated: ALL
-Pause- [C]ontinue, [N]onStop, [S]top? [C]

How To Be A Computer Consultant: A Guide

GETTING STARTED – Part 1

The one nice advantage to being a Computer Consultant is that you
are self-employed. To be self-employed you have to act self-
employed. If you don’t believe it, no one else will either.

CHOOSING A BUSINESS NAME:

When you sit down to choose a Business Name think long
lasting and professional. First, try your name or initials
with the words “& Associates” by it. If you don’t like
that approach, then go through the yellow pages of your
your phone book and check the listings of “Computer
Stores”, “Computer Design and Consultants” and “Employment
Agencies” and look at names. Ask friends and relatives
for suggestions. Your Business Name makes a very
important statement about you, so take your time. It
will be worth it.

BUSINESS ADDRESS:

Most of us like to be home based. For those of you who
can afford the luxury of a private office, this section
is not for you. However, if you do plan to work from
your home, read on.

I have friends who have used their apartment numbers as
“Suite” numbers. That is fine. But if you own a home or
have a mail box like mine which collects so much junk mail
that I usually take the whole pile, sometimes including
important bills, and throw it in the trash.

So the answer for me was to check into P. O. Box’s. This
also protects you from having clients show up at your door
demanding work at strange hours.

The United States Post Office Boxes are the most reasonable
cost wise. However, if you plan to receive items shipped
UPS, you will not be able to receive them at this P. O.
address.

For those of you who don’t mind $10 to $12 a month, there is
another alternative. There are P. O. Box rental companies
which have a street address you can use. You then use the
Box number as your “Suite” number. Since this is a street
address, UPS will deliver parcels to you here. Check the
yellow page listing under “Mail Receiving Service”, to
find one of these service near you. This is also the
address that will go on your letterhead.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

GETTING STARTED – Part Two

BUSINESS CARDS AND LETTERHEAD:

The first step to take for networking with clients and
people you will be meeting is to have business cards and
letterhead stationery.

If your budget is tight, there are printers listed in the
yellow pages who offer overnight “Starter Packages” which
consist of 500 letterhead, 500 envelopes and 500 business
cards for a reasonable fee.

If you are more ambitious, you may want to go to a type-
setter and choose a print style and/or a logo and have
“boards” prepared for custom designed stationery. Fees
vary so you should do some calling on quotes for typesetting
of your letterhead, envelopes and business cards.

To save money on printing costs, when you use an
independent typesetter to design your own format, you can
buy your own paper for your stationery. In the yellow pages
under “Paper” you can usually find “Self Help Service
Centers”. By purchasing your own paper and envelopes from
these centers, you save a substantial amount of money. Plus
you get to choose what you want and not what the printer
gives you.

If you wish to have your letterhead printed on continous
form paper there are printers listed under “Printers –
Continuous & Individual Form” in the yellow pages. However,
if you use the “Starter Package” as mentioned above you
probably will not receive the “die” used for printing
your stationery. The quick overnight jobs are ususally
done with paper “die”, so it’s life span is very short.
When you have your stationey set up by a typesetter, they
paste your information for letterhead, envelopes and
business cards on “boards”. The printer then uses these
“boards” to make metal “die” for printing your stationery.
These metal “die” can be used over and over provided you
store them in such a manner so they do not get scratched.
The printer can then use these metal”die” to print
continuous form paper.

Of course, you can always pay the continous form printer
to prepare the proper “die” for you, in the event you
have not gone the custom typesetting route but want this
type of stationery.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

GETTING STARTED – Part Three

FICTICIOUS BUSINESS NAME STATEMENT:

If you are newly starting out as a Computer Consultant and
plan to be a one man operation, there is a very cost
effective way to being a legitimate business entity without
incorporating. This is done by filing a “Ficticious
Business Name Statement”. Most local newspapers offer this
service. The easiest way of obtaining the Ficticious Business
Name Statement form is to call whatever newspaper you decide
on and ask them to send you the appropriate information
needed for filing.

Once you receive the form in the mail, fill it out. When the
form is completed, mail it back to the newspaper with the
proper filing fees (at this writing it was $40.00).

A notice will run in the newspaper for four weeks.

If there is no contesting of your business name from any
other proprietor in this period, then you will receive
a “Proof of Publication” form showing the dates your
notice ran. Your notice will be attached and a filing date
will be listed above the notice.

At this point you are an official bonafide business.
Congratulations!

Now, I’m sure some of you are asking, “But I want to
be on my own. I don’t need a business. I can still take
advantage of the tax benefits for being self employed. Why
should I want to do this?” The answer is you can take it
to the bank.

BUSINESS CHECKING ACCOUNT:

It is always a good idea to have a business checking account
for numerous reasons: 1) This is a very convenient way of
keeping your personal and business expenses separate; 2) If
you plan to sell products on a retail level, a business
account looks good when you are signing an agreement with
the distributor. It gives the air that you are an
established firm; and, 3) You create a business bank
reference, which never looks bad when you apply for loans.
There are many more reasons, but these are the ones that have
been important to me.

Before you open a Business Checking Account, call around to
various banks and see what their requirements and fees are
for a business account. Some banks require a minimum
opening balance of $500 and some require $1,000. Don’t
hesitate to interview your bank. Make an appointment with
one of the chief officers and find out about lines of
credit towards outstanding invoices, loans and their
feelings about small businesses in general. If you cannot
get an appointment, then write them off. Your business
would mean nothing to them anyway.

Do not open your account with a Savings and Loan. Even
though some advertise free checking accounts and will open
an account in your business name, you cannot borrow money
against business invoices. You may find yourself not
being able to get the proper help you need as your business
grows.

So, now you have selected a bank. In order to open the
account you will need to take the “Proof of Publication”
form sent to you verifying that you are in fact a bonafide
business and the minimum deposit.

The next step is to wait for the printed checks to arrive
in the mail. If you want, you can order continuous form
checks instead. This is not done through the bank but
from outside vendors and printers.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

GETTING STARTED – Part Four

BUSINESS PHONES:

Yes, getting a business line is more expensive than a
private line but there are very good benefits for you.

Number one, you can be listed under your business name,
or if you have decided to stay solo, a business line lets
you be listed in the yellow pages as well.

One word of caution…beware of the Yellow Pages Sales Reps.
They will do their darndest to make you feel your business
will not survive without a quarter page, five hundred dollar
a month ad. Keep in mind that you want your business to
support you! You do not want to support your business!

For example, I chose two directories I wanted to be listed
in and selected a one line bold face print for the white
pages and took 5 different subject listings in the yellow
pages with the standard bifocal print and no frills. My
phone charges run about $30. a month with these two
directories. The most important thing is that you are
listed. In your business, networking pays off more than
advertising in the Yellow Pages.

Los Angeles is serviced by two different phone companies.
One is General Telephone and the other is Pacific Telephone.
When I first started my business, I wanted to be listed in
the Beverly Hills phone directory also. So the infamous
Yellow Page Sales Rep gladly took my request. When I
received the directory, I found out it was a Neighborhood
Phone Book directory. I was never told this. When I called
asking why I wasn’t in the main directory for Beverly Hills,
I was told that Beverly Hills was covered by Pacific
Telephone and I would need a Pacific Telephone line to be
listed. That was $46 down the drain.

Do some research if you live in a metropolitan area with
more than one phone company. Stay within the areas your
phone company services. Again, I will repeat…much of your
success will be through networking, not a phone listing.

Don’t forget a good answering machine or service either.

*Excerpted from the Computer Consultant’s Consultant,
copyright 1985, by Valerie Hood, all rights reserved

GETTING STARTED – Part 5

BUSINESS PERMIT:

If you are going to conduct a business, and advertise as
one, at least in the state of California, you are required
to obtain a “Business Permit” from the city you are
conducting your business in.

You can obtain the Permit from the “City Clerk – Tax and
Permit Division”. You must go and apply in person.

The initial Business Permit cost me $30. My white cash
register receipt was proof of my business until I received
the permit in the mail. It is called a “City of Los
Angeles Tax Registration Certificate”.

Due to zoning laws, in California, you are not allowed to
conduct business with clients in your home. This is due
to foot traffic and fire laws. So, use your home address
as a “Business Address For Mail Purposes Only”. I did not
use my P. O. Address as a business address just in case the
Fire Marshall or someone else showed up at my 3″ by 5″ box
to post “Maximum Occupancy Allowed”. I was told by the clerk
that I was supposed to pick and deliver any materials from
clients.

Each year you will be sent an “Annual Tax Renewal” form to
retain your Business Permit. The more you earn through
your business the more your Business Tax will be. However,
this tax can be deducted as a business expense on the
“Schedule C – Profit or (Loss) From a Business or
Profession” which is filed with your 1040 Federal Income
Tax Return.

One word of caution is to remember that the Business
Permit is valid from January 1st to December 31 of each
year. If you file for a Business Permit in December and
pay your $30, don’t be surprised in January, one month
later, when you are billed for another $30. That’s how
the system works.

*Excerpted from The Computer Consultant’s Network,
copyright 1985, by Valerie Hood, all rights reserved

GETTING STARTED – Part Six

RESALE NUMBER:

If you are planning to provide clients with supplies, plan
to set up computer systems, sell software or anything else
relating to your business, you need to apply for a Resale
Number.

To obtain a Resale Number check for the nearest “Board of
Equalization” to you under “State Government Offices –
California State of” in white pages of your phone
directory. Remember I am writing in regards to procedures
for Los Angeles, California. Check with other retailers
in your area and ask what the requirements are to obtain
a Resale Number.

You will have to apply in person. The best time to go and
apply is when the office first opens. Otherwise, the wait
can be quite lengthy. When you arrive, ask for the proper
papers to fill out to apply for a new Resale Number.
After you have filled out the questionaire and returned it
to the receptionist, it will be forwarded to an interviewer.
The interviewer will call your name and go over your
questionaire and ask you questions. It is at this point
that you will be denied or permitted to obtain a Resale
Number.

One of the questions will be how much you estimate in sales
for the upcoming year. Depending on the amount, you may be
required to put up a deposit against future taxes to
establish your account. Be honest with them…if you cannot
estimate the yearly sales, then tell them so.

Additionally, before you can obtain a Resale Number you must
have already had made a sale. Otherwise, you will not be
permitted a Resale Number until you do.

Once you have been approved, every quarter you will receive
a “State, Local and District Sales and Use Tax Return”.
When you make a sale, you charge the client sales tax. It
is with this Return that you pay the State the sales tax
you have collected for that quarter.

The advantage to having a Resale Number is that you are
allowed to purchase merchandise at “Wholesale Prices” from
distributors of products. This discount is usually anywhere
from 20% to 50% depending upon the quantity of merchandise
purchased. You, the Reseller, are not charged sales tax
on the wholesale price of your purchase. However, you are
required to charge the appropriate Sales Tax on the “Retail
Price” of the merchandise upon sale to a customer. The
difference between your wholesale price and your retail price
is your “Profit Margin”. On top of your consulting fees,
the additional profit can be a nice enhancement to your
financial status especially if you are setting up computer
systems and obtaining them at a discount from the distributors.

If you plan to do this, most companies have you sign an
agreement and complete a credit application as a “VAR”
(Value Added Reseller). If you are interested in being a VAR,
a business checking account and a resale number are a must.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

ADVERTISING

I have found one very reasonable ways to go. It costs $55.
as of this writing.

“MIS WEEK Consultants Directory”. The directory is printed twice
a year. There is a Spring Directory and a Fall Directory. The
directory is an alphabetical listing of consulting firms and
services and also has a geographic listing of consulting firms by
regions served.

My ad has always paid for itself. To be honest, from that
listing one company alone has sent me business for two
years. It is the only sure fire avenue I have seen pay off
immediately.

To inquire for advertising in MIS WEEK, you can contact the New
York office directly at (212) 741-4010 (for an ad counselor) or
741-4014 (for space reservations) or write to Classified
Advertising Department, MIS Week, 7 East 12th Street, New York,
New York 10003.

Or contact:

615 South Flower Street
Suite 200
Los Angeles, California 90017
(213) 612-0725

MIS Week also features a special “Consulting Services” section
which runs every fourth issue of each month. One column inch is
1-15/16″. The rates as of this writing are as follows:

Open rate $55.00 per column inch
3 consecutive times $51.00 ” ” ”
6 times in one year $49.50 ” ” ”
12 times in one year $48.00 ” ” ”

I honestly cannot say if this every fourth week advertising
actually works. I asked for some samples and I received one year
old issues and the consultants section was very sparse. I would
highly recommend just sticking to the bi-yearly directories.

*Excerpted from The Computer Consultant’s Network,
copyright 1985 by Valerie Hood, all rights reserved

PUBLICATIONS

One of the major secrets to success is to be well informed. With
all the publications on the market today, it is easy to be
overwhelmed with literature.

When I decided to delve into this new electronic world, I admit,
I knew nothing. I was a newly reformed computer phobic. I knew
there was something fascinating to this whole area but I didn’t
know how to find it. At this stage, I was only as far as Valdocs
and my QX-10. The infamous A> at the CP/M system level scared me
half to death. But, I was going to make a living at this.

I have found the longer we are in the industry, the lazier we get
about staying on top of even the littlest detail. I mean, it has
got be such an impactful piece of news such as “NEW UNIX 5
MEGABYTE BUBBLE MEMORY PORTABLE TO HIT THE MARKET FOR $1,000” to
catch out attention. I admit I am finding myself falling into
that.

Eventually, the day will come when you will be found by every
publication possible. Most of them will look worthy. Some of
them will be reasonable in price and some will be quite
expensive. These expensive publications try to make you feel how
“elite” you will be if you subscribe. There are the many
software directories that are very valuable to have. In my
research and in actually subscribing to one with a 30 day trial
offer, I found a very impressive subscription service. For me,
it paid for itself within one week. It is called DATA SOURCES.

I found this one quite by accident. Contrary to what I said
above about being found, I found Data Sources. It was a tiny ad
in one of the OEM newspapers. It had a 30 day trial offer so my
curiosity said, “Why not?”

About six weeks later a package arrived. It was about 8 1/2 by
11 by 4 inches and weighed about 10 or more pounds. I opened it
and found 2 large directories. One labeled “Software” and one
labled “Hardware – Data Communications”. Of course, there was
the invoice staring at me…AMOUNT DUE – $159.00. Gasp! So I
started looking through all of the information and was sold in
five minutes. I do not know what the price will be at the time
of this writing. A regular subscription rate is $210.00 for the
year.

Data Sources updates these directories 4 times a year.
Presently my 1st Quarter 1985 issue is marked up with notes,
indexed and coded. The software volume looks like I’ve used this
for 10 years already and it’s only one month old. Am I going to
have to do this again in the 2nd Quarter?

Data Sources contains approximately 21,000 software packages, for
hundreds of business and vertical market applications and are
indexed by function compatiblility, package name and company.
There are approximately over 18,000 hardware and data
communications products, from micros to mainframes, printers to
comm processors and everything inbetween, are categorized and
described for instant reference. Approximately 9,000 companies
are profiled with complete contact information and pertinent
details for vendor qualification.

I used Data Sources to locate all of the companies listed in
Chapter 2 which are consulting houses and handle personnel. This
saved me a lot of time in research.

Once you subscribe to Data Sources there is a Hotline to answer
any questions you may have. Third party maintenance companies
and dial-up security equipment companies have been recently added
to the directory. Check it out at your local library.

It is a must for the serious computer professional.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

P.S. Details, details….the address is:

Data Sources
P.O. Box 5845
Cherry Hills, NJ 08034

Editor: Kathy Thompson

Is approximately $179 a year, updated quarterly and well worth it.

CONTRACTS AND FEES

You probably think this is going to an answer to all of your
questions regarding Contracts and Fees. Wrong. There is really
no right answer or perfect form agreement that is going to work
for everyone…the truth is, everyone is different. My advice is
to seek a reputable attorney in computer law and spend an hour
talking to him/her.

If you are consultant being hired through a personnel agency or
through another consulting house, they usually will carry their
own agreements for you to sign.

I would also suggest to talk with other consultant’s about their
agreements. Ask if they have encountered any problems and how
they handled the situation. Ask for tips or tricks of the trade
they have learned. For example, one of my electronic pen pals,
Frank, is a consultant. I asked him what he could suggest for
other consultants. Since he does programming, he makes sure that
it states in the contract that all programs developed by him
remain his sole property until paid in full. He further suggests
to find out through various contacts as much as you can about the
company, who they deal with, how they conduct business and pay
their bills.

Fees are another world of inconsistencies. What do you charge?
How do you decide? Well, from my experience I have seen a
programmer making $8 to $10 an hour while an ex-Burger King
Employee comes in at $12.50 an hour just to sit down and play
with a piece of software and give a novice point of view. I have
seen people with years of mainframe experience making $25 an hour
while another person makes $40 an hour teaching off-the-shelf
word processing programs to individuals.

I have spoken with head hunters who chuckle telling me of people
who come out of aerospace with one to two years experience and
want $30 to $35 dollars an hour. He goes on laughing. Then I
say, “Well I’ve only been in microcomputers for one and half
years and I’m making $30 to $40 an hour, depending on the job.”
He chokes and patronizingly says, “Well, honey, that’s because
you’re smart.” And I say, “Aren’t they?”

In my opinion, go for what you feel you are worth. The worst
that can happen is to hear, “We don’t want to pay that much”.
Then you’re open to negotiate.

If an offer comes along, talk to other consultants and see how
they feel. But get more than one opinion. You do not want to
sell yourself short. For example, I have one friend who makes
$25 an hour programming on a certain mainframe. I have another
friend who swears that kind of job is not worth more than $9 an
hour.

So…bottom line, go for what you feel you are worth. If that
doesn’t work and you honestly want that particular job or
contract, negotiate. There is such a thing as a raise, even in
consulting.

Another area which is important is what to charge as a retainer.
A retainer is put into effect when a client may need you on call
but doesn’t know when. So he pays you a monthly retainer to be
available for a day or so many days a month.

Dr. Jeffrey Lant, in his book, “The Consultant’s Kit”, which I
highly recommend, suggests that you take your daily rate and
times that times four and that is your monthly retainer fee.
However, this is for only being available one day a month. He
suggests you charge your hourly fee over and above the day used.

Then again, I have seen proposal’s cross my desk where the person
charges only their daily rate as the monthly retainer rate.
Naturally, I much prefer Dr. Lant’s suggestion.

Sometimes, for those of you who also do software training and
education, client’s want to remain very cost effective and have
you come in for only one or two hours. Somehow they are always
the ones 50 miles away. After gas, car maintenance, the time of
getting ready, one to two hours does not quite seem worth it. I
would advise you to state up front that you charge a 4 hour
minimum and milage. The usual response I get is, “Oh. Ok. What
time can you be here?”

There are no set rules. Do research. Talk to an attorney. Most
importantly, Network.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

BUSINESS EXPENSES AND WRITE OFFS

I was caught off guard at all of the consultants I would run into
who did not realize the benefits they were entitled to as
independent contractors. When I was working permanent full time,
I still had a business on the side earning additional income.
Under the law this is considered self-employment. I was able to
deduct certain allowable expenses for that business, even though
I was employed full time by a permanent employer. These
allowances were taken on the “Schedule C – Profit or (Loss) From
a Business or Profession (Sole Proprietorship)”. This Schedule is
an addendum to your “1040 – U.S. Individual Income Tax Return”.

Yes, I am going to tell you to speak with an accountant, or take
a tax course, but this is an area where it is the same for
everyone, so examples can be given. The IRS also has booklets
you can order which explain in detail your rights to being self-
employed.

If you are a Partnership or a Corporation you cannot use Schedule
C and should consult with an accountant. But, for the purposes
of this book, we are concentrating on the individual self-
employed consultant.

Below I will list the areas which are considered to be allowable
decuctions that are imprinted on Schedule C and try to explain
them. Again, I stress to order booklets from the IRS and/or
speak to an accountant. Allowable deductions are:

1. Advertising – You are allowed to deduct any expenses you
incur for advertising as long as it pertains to promoting your
business to the public for purposes of generating income. This
would cover ads in any media (i.e. newspapers, magazines, radio
or television).

2. Bad debts from sales or services – Since we work on what
the IRS calls a “Cash Method” you are not allowed to deduct any
bad debts as of this writing unless you had previously reported
the amount as income.

We, the Cash Method Taxpayers, have to deal with collection
agencies, small claims court and attorneys to handle our money
matters.

3. Bank service charges – These can be bank charges on
business checking accounts (i.e. monthly fee plus per check
charge) or business credit card erroneous bank charges (i.e. the
charges the bank charges for using the automated teller).
Remember, these are only for those charges used in connection
with your business.

4. Car and truck expenses – This is a touchy area. It always
seems to change every year. So vaguely this allows you to deduct
the percentage of the monthly payment of your car used for
business. For example, you may need your car for 50% personal
and 50% business. Your monthly payment is $250. Considering the
car has been used for the business for the entire year you take
$250 x 12 = $3,000 x 50% = $1,500 as your allowable deduction.

You are also allowed to deduct the cost of maintenance and
repairs as well as gas and car washes. Parking fees and tolls
would be applied here also.

As I said, this is one of those touchy areas. Do your homework.

5. Commissions – This could be a deduction when you hire an
advertising agency and they place your advertising for you.
Usually the standard agency commission is 15%. Since this is
considered to be the agencies income, on which they will pay
taxes, you are allowed to deduct it.

Additionally, this could also be sales commissions you have paid
to personnel or other contractor’s working with you.

6. Depletion – This does not apply to us.

7. Depreciation and Section 179 deduction from Form 4562 –
You can deduct a certain percentage of the cost of assets you buy
to use in your business to hold or produce investment income.

Since your car is a business expense, you may be able to
depreciate the business portion. Seek the advice of an
accountant. Please make note that if you lease your car you are
not entitled to a depreciation deduction.

Our obvious depreciation expense would be our computers. You
cannot depreciate software. The law is getting sticky about
computers. You must be able to prove over 50% business use at
the time of this writing.

Some of the assets depreciated may also qualify you to take an
investment tax credit. Again, you know, talk to an accountant.

This is not used when you include any depreciation amounts in
Part III of Schedule C – Costs of Good Sold and/or Operations.

8. Dues and publications – Your subscription to business
related publications (books, magazines, newspapers, newsletters)
if needed for business are deductible.

Additionally, any dues paid for membership in professional
associations are deductible (i.e. dues to join the Independent
Computer Consultants Association).

9. Employee benefit programs – Amounts go here that are
not included in pension and profit-sharing plans mentioned later.
Contributions to insurance, health and welfare programs go here.
For example, even though we are not, but if we were Writers Guild
Members, we would be required to pay 10% on top of our salary to
the Pension, Health and Welfare Fund. This amount would be
deducted here.

10. Freight – If you do not include this in the Cost of Goods
Sold and/or Operations section, charges you incur for freight
shipping costs would go here. For example, your computer goes
down, the warranty has expired, the store you purchased it from
is out of business and you are forced to ship it to the
distributor for repair. The cost of shipping would be deducted
here.

11. Insurance – Auto Insurance, Renters/Business Insurance
premiums would be deducted here.

12. Interest on business indebtedness – If you have loans
incurred for business reasons, the interest you pay is deducted
here.

13. Laundry and cleaning – Does not apply to us.

14. Legal and professional services – Legal costs incurred
pertaining to your business can be deducted here. This also
would allow for other consulting fees, accountants, etc.

15. Office expense – This is a strange one. Expense amounts
go here that don’t fit anywhere else. There is a place for
“Other expenses”, so this is up in the air. Talk to an
accountant. Things I put here can go in the “Other expenses”, so
I suppose it’s up to you, as long as you can verify it being an
expense.

16. Pension and profit-sharing plans – You should enter
amounts here made as an employer on your behalf (but not
voluntary contributions you made as an employee on your behalf).
You will have to file form 5500-C or 5500-R if you fill this in
with less than 100 participants. This is another area where you
will need advice.

17. Rent on business property – This is where Uncle Sam gets
real sticky. Since for the purposes of this book we work from
our homes read this one with caution. You are only allowed to
deduct that percentage portion or square footage of the home used
strictly for business. You better be able to prove this too.
The law will not allow the deduction if there is any personal
activity affiliated in this area. A separate bedroom is better
for an office, that way the deduction is more solid.

18. Repairs – Since your warranty was up on the computer you
had to pay for the cost of the repair. That amount goes here.

19. Supplies – If you don’t include in Cost of Goods Sold
and/or operations, amounts for ribbons, disks, paper, pens and
whatever else would go here.

20. Taxes – Taxes reimbursed to the state with your Resale#
and local Business permit taxes would be deducted here. If you
paid cash for an item, the sales tax could be deducted here also.

21. Travel and entertainment – Amounts are allowed here only
for expenses incurred in connection with your business. Airline
tickets, dinners/lunches with clients, hotel accomodations, etc.
Tread lightly on those conventions held in the Bahamas or on
Cruise ships. Make sure you can prove this is legitmate without
a doubt.

22. Utilities and telephone – This is self explanatory. This
is where it is a nice idea to have a business line so there will
be no questions as to what were personal calls and what were
business.

23. Wages – Any amounts you paid for outside help would be
deducted here. This does not allow for amounts paid to yourself.
If you pay an individual person over $1,000. you are required by
law to file a 1099 form to Uncle Sam.

24. Windfall profit tax – This does not apply to us.

25. Other expenses – Now this is where I may put what is an
office expense. It gets confusing to me. But items I deduct
here are items like Business Gifts, P.O. Box rental, Postage,
Xeroxing, Typesetting, and other subscription services needed for
the business like CompuServe, MCI Mail, Telex, etc.

This is where we would add up all of our deductions and subtract
them from our Gross receipts/sales amount. This amount would be
our profit or (loss) from the business and would be carried over
to the proper line on the 1040 form.

There is a part three which I have mentioned a few times but
basically applies to those of you who are going to be carrying an
inventory.

State returns will vary from state to state so you know what to
do. Yes, speak with an accountant.

SELF-PUBLISHING

How to publish your software/books without a high overhead:

1) Get it copyrighted. Call the Federal Building (213-688-3800)
and request the proper copyright filing forms for software
programs/books.

2) Next step is to get your IBSN #.

Send a letter requesting a block of ISBN numbers to Emery I.
Koltay, Director, U.S. IBSN and SAN Agency, R.R. Bowker
Company, 205 East 42nd Street, New York, New York 10017.
The block (amount) of numbers you receive depends on the
amount of items you want to publish within the next year.

Request a SAN number at the same time. You can also
request “The IBSN System’s User Manual” and Bowker’s
brochure describing its products and services for
publishers.

I’ll explain the SAN number later. It just makes everything
easier for stores and distibutors to order material from
you.

3) Write the CIP Division, Library of Congress, Washington,
D.C. 20540 and request a Publisher’s Response Form and
“Cataloging in Publication: Information for Participating
Publishers.”

4) Now write Beverly Palacio, ABI Department, R.R. Bowker
Company, 205 East 42nd Street, New York, New York 10017
and request information on getting listed in “The
Advance Book Information” (ABI) Program.

This is free. This gets you listed on the Books in Print
database available to libraries and book sellers/
distributors on line.

5) Then write Jaime Ariza, Sales Representative, R.R. Bowker
company, 205 East 42nd Street, New York, New York 10017
for a media kit for a listing in the PTLA (The Publishers
Trade List Annual.

This does cost. As far as you are concerned you can pay
only $30 to get a single title listing. This directory
is used by thousands of libraries and bookstores. You have
to have your IBSN number first.

6) And last but not least write, Rosemary Catoggio, R.R.
Bowker Company, 205 East 42nd Street, New York, New York
and request a media kit on getting listed in the
“Microcomputer Market Place”.

No, it doesn’t stop here. But for $31.00 plus some, you will be
able to reach thousands of potential buyers. You can receive
advance sales from these listings and take them to the bank if
you need publishing capital.
�����������������������������������

COMSEC Bulletin #1 (February 17, 1990)

THIS IS COMSEC BULLETIN #1, FEBRUARY 17, 1990. FOR FURTHER
INFORMATION, CONTACT THE COMSEC BBS (202) 334-1304 OR CALL OUR
OFFICE AT (301) 670-0512 AND LEAVE A MESSAGE.

About the Bulletin

The COMSEC Bulletin is published to provide a means of informing
COMSEC Association members of the business of the association. It
is published on a random basis with news that can affect members.
Please note, the ‘COMSEC Journal’, which will be the association’s
premier publication, will be published quarterly and should not be
confused with the bulletin.

The association wants to thank all of our members for their
patience during the associations transition. We hope that you will
be satisfied with your membership in the coming year.

What’s Inside

– Surveillance Expo ’89
– Annual COMSEC membership meeting
– Using a Spectrum Analyzer
– Audio Tapes Available
– Washington DC COMSEC Chapter News
– S&L’s Phone Bugged
– Membership Certificates and Cards
– Advertising
– TECHNET Data Systems – First COMSEC Corporate Sponsor
– Call to all writers
– Competitive Intelligence
– Hacker enters GRUMMAN Corp computer

Surveillance EXPO ’89

For those of our members who weren’t able to make it to
Surveillance Expo ’89 we missed you. Needless to say the Expo was a
rousing success with exhibitors and speakers that represented the
entire spectrum of the security field. The Association is glad to
have been one of the cornerstones that made this years Expo happen
and we have already begun making preparations for the next Expo to
be held 28-30 November, 1990. Mark that date on your calendars and
plan to attend.

Annual COMSEC Membership Meeting

The annual COMSEC membership meeting was held on December 13, 1989
following the last Expo seminar of the day. Although participation
could have been better , a majority of the board of the directors
were present enabling us to make decisions that will affect the
association for the following year.

A number of topics were covered that all of the association members
should be aware of. For those of you who were unable to attend they
will be covered briefly.

The first topic that was covered was membership goals for the
coming year. Currently the association has a small but growing
number of members. In order to provide reasonable membership
benefits, cover the associations overhead and increase the name
recognition of the association we have to increase the number of
members that the association has. A number of ideas were floored
that may help. It was first suggested that we limit our recruitment
of new members to the Washington, DC area. Its a matter of simple
logistics.

Since a large portion of our members reside in the DC area and the
national chapter has its offices in the area the recruitment of new
members can be closely monitored. However this means that members
outside of the DC area would suffer. Because of this the board
decided that a 75/25% split of effort would be used to recruit new
members with the majority of effort occurring in the Washington
area.

The next topic covered was the formation of local chapters. The
Association is proud to note that the first local chapter has been
established in the Washington area. The local chapter president is
Mike Brumbaugh (phone 703-739-8313) and he has some interesting
ideas. The first meeting of the Washington chapter will be in the
month of April. If you are interested in attending please give him
a call.

The discussion covered then covered the possibility of starting
other local chapters. A number of inquiries have been made but
other than this there has been no progress. The major problem is
finding individuals that are motivated enough to start a chapter.
Its a difficult task and it takes a special kind of person to
undertake the responsibilities and headaches associated with
forming a local chapter. Because of the responsibilities associated
with starting a local chapter it was decided that each local
chapter president would also automatically become a member of the
board of directors and would not be affected by the rule that board
members cannot miss more than two consecutive board meetings.

It was also decided that the minimum number of people required to
start a local chapter would be increased from 5 to 10. It was felt
that the more people involved in the initial formation of the local
chapter the better the chances of success.

Another topic discussed was the possibility of the COMSEC
association joining forces with the National Computer Security
Association. The Board of Directors and the director of NCSA
believe that both organizations would profit from a merging of
resources. The board plans on discussing this option further during
the first meeting of FY90. This meeting will be held the 3rd
Saturday of January. Subsequent board meetings will be held the 3rd
Saturday of the first month of a calendar quarter: January, April,
July and October.

The final item of discussion was the status of the COMSEC Journal.
The journal will be the cornerstone of the association and will
provide timely articles of interest to all members of the
association. Currently a number of articles are in the works for
the March issue. These articles include Telecommunication network
security problems and a story about a hacker who broke into a major
telecommunications network. There might be an article on STU III if
we can get it in time for publication. The association has also
approached a number of companies to inquire if they might be
interested in submitting articles for publication.

Finally, the association is attempting to compile a listing of
companies/ individuals involved in providing specialized security
services. One of the concerns is how to provide a listing that
holds some credibility. Members suggestions are welcomed and will
be provided to the board of directors for consideration.

Possibilities include a certification or training program.

Overall the annual meeting was a success and the next meeting will
even be better. Plan on being there.

Using a Spectrum Analyzer

The association received an interesting call a few weeks ago from
someone who was attempting to use a spectrum analyzer to locate an
clandestine listening device.

The problem with any specialized piece of equipment is that the
user must be aware of the limitations of the equipment that they
are using and also apply a little thought to how to systematically
locate a transmitter once there is a positive indication that it
exists.

In this particular case a spectrum analyzer with a audio speaker
must be utilized. Without a speaker the operator of the analyzer
cannot tell whether they are looking at a signal that is caused by
RF interference, a genuine signal put out by commercial transmitter
or a clandestine transmitter that is located in the room or
building.

Remember, in this particular instance we are discussing only one of
many means that some type of device may be utilized to listen to a
conversation in a room.

First, place a sound source in the room you are checking. Your
analyzer should also be located nearby since most transmitters of
this type have a limited range. You should then go slowly through
the frequency range to locate a signal source transmitting the same
audio that the sound source is transmitting. If you should find
that there is a transmitter located nearby, the sound source can be
moved in the room to see where it is best picked up by the
transmitter. At this point a physical search would have to be done.

Audio Tapes Available

Audio tapes of all the seminars given at EXPO 89′ are available to
COMSEC members. They can be obtained by contacting:
Audio Archives International
3043 Foothill Blvd
Suite #2
Crescenta, CA 91214

Washington DC COMSEC Chapter News

The first meeting of the DC chapter will be April 1990. Mike
Brumbaugh is looking for help in setting up a successful chapter
and meeting. If you are interested in helping him, mike can be
reached at 703-739-8313. Mike said that details of the first
meeting will be sent to members as they become available.

S & L’S Phone Bugged

The Washington Post noted in a recent article that the phone used
by California state S&L examiners had been bugged. The phone, which
was supposed to be a private line, had been tampered with so the
investigators calls could be monitored from other phones in the
building. (Editors note: I’m not sure bugged is the correct word,
jury rigged sounds more like it. Besides who, in their right mind
would pass sensitive information of any type in the same building
they are working in.) Private Investigators were called in to track
down were the calls were being monitored from but were unable to
because the key to the phone room could not be found! When they
returned two days later the phone lines had been returned to
normal. The bugged phone was cited as one of the ways that Lincoln
Savings & Loan attempted to frustrate regulators.

Hacker, Age 15, Enters GRUMMAN Corporation Computer System

A youth from Levittown, New York gained access to the computer that
Grumman uses to handle military customers including the Pentagon.

Grumman stated that all the material that the youth had gained
access to was recovered and he was caught because Grumman’s own
computers detected his illegal entry into the system.

Membership Certificates and Cards

Membership certificates and cards will be sent to all members in
the months of January and February. The association wants to
apologize to all our members for the delay. For those of you that
received the membership cards with a expiration date of 1-1-90, you
may send them back and we’ll send you a new one with a correct
date.

Advertising

Both the COMSEC BULLETIN and the COMSEC JOURNAL will accept paid
advertising. This will allow both publications to increase their
scope and provide even more pages per issue. If you are interested
in placing any type of advertising in either publication contact
the COMSEC Association at 301-670-0512.

TECHNET DATA SYSTEMS – First COMSEC Corporate Sponsor

Technet Data Systems has become the COMSEC Associations first
corporate sponsor. Technet is a small corporation that provides
computer services ranging from installation of small and large
systems to troubleshooting existing systems. Located in the
Washington, DC area the have provided a wide range of services to
large and small corporations. TECHNET also will custom build a
system to fit in your price range.

They can be reached at 703-471-8714 or by writing :
44901 Falcon Place
Suite 110
Sterling, VA 22170

Call To Writers

COMSEC members, you can now enhance your professional prestige and
even give your company a plug by authoring a article for
publication in the COMSEC JOURNAL. The association is seeking
individuals who can speak authoritatively on different aspects of
the security field and wish to become involved. If you are one of
those professionals with a knack for writing let the association
know.

Competitive Intelligence

For those of us who believe that corporate spying has gone the way
of the EDSEL, think again. Todays term of competitive intelligence
may sound nicer but major corporations still spend large sums to
stay one step ahead of their competition.

Most companies simply employ improved telecommunications and
computer systems to evaluate their competitors but others have gone
as far as hiring ex-FBI agents to uncover information. The
undercover work may be as straightforward as reading the other guys
employee publications or as complicated as analyzing all of a
competitors operations. One major US corporation has admitted that
they have sent their personnel to count smokestacks, delivery
trucks and employees cars at a rival facility. A spokesperson for
the corporation stated “This type of information can help you
determine how well your rival is doing.” One of this competitive
intelligence firms most prized intelligence coups was a competitors
in-house phone book, which was used to reconstruct and estimate the
competitions pricing structure.

Here are a few examples of major corporations that utilize
information on their competitors.

* AT&T has an 800-man world-wide network of employees who
monitor competitors sales teams, trade publications and
research papers for the latest developments. This
information is fed into a data base, analyzed and then
supplied to key management on a daily basis.

* Kraft Inc analyzes point-of-purchase scanner data to get
not only price information but also product features and
promotional programs. Kraft has also gone to the extreme
of hiring consultants to interview competitors under the
guise of “independent market research.”

Chat Of Different Colors And Patterns Of Cat Fur (Choose Your Cats!)

ЙННННННННННННННННННННННННННННННННННННННННСНННННННННННННННННННННННННН
є і Dense Black
є і B*D*
МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Standard Solids oo aaC* iissww і Black
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є BiДColors oo aaC* iiS*ww і Black & White
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Tortoiseshells Oo aaC*T* iissww і Tortie
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Calicos Oo aaC*T* iiS*ww і Calico
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Standard Tabbies oo A*C*T* iissww і Tabby
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Patched Tabbies oo A*C*T* iiS*ww і Brown Patched Tabby
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Torbies Oo A*C*T* iissww і Torbie
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Patched Torbies Oo A*C*T* iiS*ww і Patched Torbie
МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Shaded Solids oo aaC* I*ssww і (Silver) Smoke
є і Shaded Silver
є і (Silver) Chinchilla
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Torties Oo aaC*T* I*ssww і Tortie Chinchilla
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Tabbies oo A*C*T* I*ssww і Silver Tabby
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Golden Solids oo A*C*TTa iissww і Golden Chinchilla
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Torties Oo A*C*TTa iissww і Golden Tortie Chinchilla
МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Spotted Tabbies oo A*C*T* iissww і Bronze
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Shaded oo A*C*T* I*ssww і Silver
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Abyssinians oo A*C*Ta* iissww і Ruddy
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Shaded oo A*C*Ta* I*ssww і Silver

МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Orientals oo aaC* iissww і Ebony
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Burmese oo aacbcb iissww і Sable
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Tonkinese oo aacbcs iissww і Natural Mink
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Siamese oo aacscs iissww і Seal Point
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Colorpoint Torties Oo aacscsT* iissww і Seal Tortie Point
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Tabbies oo A*cscsT* iissww і Seal Lynx Point
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Torbies Oo A*cscsT* iissww і Seal Torbie Point
МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Vans oo Wv* і Black Van
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Dominant Whites W* і White
ИННННННННННННННННННННННННННННННННННННННННПНННННННННННННННННННННННННН

Color Chart

СНННННННННННННННННННННННННСНННННННННННННННННННННННННННН
і Dilute Black і Dense Brown
і B*dd і b*D*
ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Blue і Chestnut
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue & White і Chestnut & White
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Tortie і Chestnut Tortie
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Calico і Chestnut Calico
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Tabby і Chestnut Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Patched Tabby і Chestnut Patched Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Torbie і Chestnut Torbie
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Patched Torbie і Chestnut Patched Torbie
ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Blue Smoke і Chestnut Smoke
і Shaded Blue і Chestnut Shaded
і Blue Chinchilla і Chestnut Chinchilla
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Tortie Chinchilla і Chestnut Tortie Chinchilla
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Silver Blue Tabby і Silver Chestnut Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і і Honey Chinchilla
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і і Honey Tortie Chinchilla
ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Bronze Blue і Bronze Chocolate
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Silver Blue і Silver Chocolate
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue і Chestnut
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Silver Blue і Silver Chestnut

ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Blue і Chocolate
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue і Champagne
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Mink і Honey Mink
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Point і Chocolate Point
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Tortie Point і Chocolate Tortie Point
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Lynx Point і Chocolate Lynx Point
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Torbie Point і Chocolate Torbie Point
ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Blue Van і Chocolate Van
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і White і White
ПНННННННННННННННННННННННННПНННННННННННННННННННННННННННН

СННННННННННННННННННННННННННННСННННННННННННННННННННННННННСННННННННННННННННННННН
і Dilute Brown і Dense LightДBrown і Dilute Light Brown
і b*dd і blblD* і blbldd
ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Lavender і Cinnamon і Fawn
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender & White і Cinnamon & White і Fawn & White
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Tortie і Cinnamon Tortie і Fawn Tortie
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Calico і Cinnamon Calico і Fawn Calico
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Tabby і Cinnamon Tabby і Fawn Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Patched Tabby і Cinnamon Patched Tabby і Fawn Patched Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Torbie і Cinnamon Torbie і Fawn Torbie
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Patched Torbie і Cinnamon Patched Torbie і Fawn Patched Torbie
ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Lavender Smoke і і
і Lavender Shaded і і
і Lavender Chinchilla і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Tortie Chinchilla і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Silver Lilac Tabby і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і і і
ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Bronze Lavender і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Silver Lilac і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender і Red і Fawn
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Silver Lilac і Silver Red і Silver Fawn

ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Lilac і Caramel і Fawn
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Platinum і Cinnamon і Fawn
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Champagne Mink і Cinnamon Mink і Fawn Mink
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lilac Point і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lilac Tortie Point і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lilac Lynx Point і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lilac Torbie Point і і
ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Lilac Van і Cinnamon Van і Fawn Van
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і White і White і White
ПННННННННННННННННННННННННННННПННННННННННННННННННННННННННПННННННННННННННННННННН

СНННННННННННННННННННСННННННННННННННННННННН»
і Dense Orange і Dilute Orange є
і OOD* і OOdd є
ШНННННННННННННННННННШННННННННННННННННННННН№
і Red і Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red & White і Cream & White є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Tabby і Cream Tabby є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Patched Tabby і Cream Patched Tabby є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ШНННННННННННННННННННШННННННННННННННННННННН№
і Red Smoke і Cream Smoke є
і Red Shaded і Cream Shaded є
і Red Chinchilla і Cream Chinchilla є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Silver Red Tabby і Silver Cream Tabby є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Copper Chinchilla і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ШНННННННННННННННННННШННННННННННННННННННННН№
і Copper і Bronze Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Silver Red і Silver Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і True Red і Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і True Silver Red і Silver Cream є

ШНННННННННННННННННННШННННННННННННННННННННН№
і Red і Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red і Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Mink і Cream Mink є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Point і Cream Point є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Lynx Point і Cream Lynx Point є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ШНННННННННННННННННННШННННННННННННННННННННН№
і Auburn Van і Cream Van є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і White і White є
ПНННННННННННННННННННПНННННННННННННННННННННј

How To Get Into College By Ian Osmond

How To Get Into College
by
Ian Osmond (AKA Xiphias Gladius, Esq.)

Getting into college these days is a competitive business.
Luckily, you’re competing against people who have no clue
what they are doing. Unluckily, neither do you. So, with
the clue or two you may glean from this manuscript, you will
be ahead of the game.

Colleges look at the following five things, which will
be dealt with in this paper in order of importance:
A. Transcript
B. SAT/ACT scores
C. Teacher recommendations
D. Essays
E. Resume – a list of all the stuff you’ve done besides
school

Section 1 – Transcript

For those of you who don’t recognize the term, this is
the official copy of your grades in High School. “What?” you
cry? ” thought those were practice grades!” Never fear!
Your problem can be solved simply with a bobby pin, some
white-out and a ball-point pen!

The locks on school file cabinets are rather pitiful.
Frankly, I’ve never successfully picked one, but I am a klutz
anyway, and need a professional lock-gun to pick my teeth.
Nonetheless, once you have your official transcript in your
sweaty little hands, your work is nearly done.

My High School makes it easy. Each year’s grade record
is printed on a separate standard oversize mailing label.
The final GPA and class rank are printed on a standard normal
mailing label. The printing is done with a nine-pin dot-
matrix printer on draft quality. A student from Arlington
High merely needs to procure five mailing labels, re-print
his/her transcript, with the grades s/he INTENDED to get, re-
calculate and print his/her GPA, and put down a new,
reasonable, class rank.

Section 2 – SAT/ACT Scores

The Scholastic Aptitude Test and the American College
Test are the two standard tests requested by colleges. YOU
NEED TAKE ONLY ONE OF THESE! Of the two, the ACT provides
the more accurate indicator of probable performance in
college, as it tests reading, math, deductive reasoning, and
science ability. NOBODY in the Northeast takes the ACT.

A really good score on the SAT is about 1100 – 1200, and
there are three ways to do this. The first, and most highly
recommended, is to be a genius. Failing that, take a lot of
expensive SAT preparatory courses. The third method requires
some work.

First, practice your guidance counselor’s signature.
Second, steal one piece of his/her stationery. Sign up to
take the SAT somewhere other than your school. Bribe a local
genius to take the test for you. Type a description of the
genius on the stationary, saying that the person of that
description is you, and sign it WITH THE GUIDANCE COUNSELOR’S
NAME. This method has several advantages. You get a better
score on the SAT, the genius gets extra pocket money and a
chance to practice taking the test, and, you don’t have to
wake up early on a Saturday.

Section 3 – Teacher Recommendations

If no teacher really likes you a lot, try bribery, or
blackmail if you are getting short of cash.

Section 4 – Essays

Another cash-intensive area, there is much precedent for
bribery here, too. Again, if you can’t, merely pay someone
who can. After all, when you get right down to it, isn’t
that the basis of our economic system? Really, that’s the
foundation of Western Civilization, so how could it be wrong?

Section 5 – Your Resume

This section is weighted the least of the five major
areas, which is unfortunate, because, with a little work,
your resume can be spectacular! It is worth your while to
turn in an outstanding resume, not only to get into college,
but also as practice for later life, in the business world.

The major rule in college resume writing is: there is
nothing too insignificant, pointless, pitiful, or stupid to
put on a resume. Hey, let’s face it, colleges are pretty
much looking for length. I’d like to give you a few examples
of things you could put on a college resume, with real-world
translations.

College Translation / Comments
I led an improvisational performance I was the class
troupe that staged impromptu routines clown.
for the amusement of my classmates
at periodic points during the year.

A home-course in hostile negotiations I fought with my
gave me the skills necessary to enter parents.
into contract in today’s competitive
business world.
Independent research into the effects Oh, c’mon – you can
of certain chemical substances on the figure this one
human neurosystem. out!

Studied the trade of locksmithing Hey, I really know
in order to learn a trade and become a someone who did
more-rounded individual this!

Utilizing hard-to-come-by periodicals, I collect rare
I increased my appreciation of art- Swedish porn mags.
photography, and of the human form

Independent research into computer Well, I was
security systems and cryptoanalysis, arrested, but
specifically as it pertains to the the judge really
Internet, and to the UNIX operating liked me!
system, gave me an opportunity to meet
contacts who may be important in later
life.

My leadership position in a local Our gang managed to
youth group taught me responsibility, increase its turf
loyalty, and trust. I was able to lead six blocks last
our organization through a period of month.
growth and expansion.

As you can see, there is nothing which can’t be phrased
in a positive manner! A few pointers on how to phrase things:
1. Stick in the phrase “independent research” a lot. You
can do well with these words.
2. Keep a thesaurus handy. You don’t want to use the exact
same words too often.
3. Colleges like stuff that shows leadership and maturity –
aim for that in how you phrase stuff.
4. Don’t use profanity.
5. Do use a spell-checker. Nothing is more embarrassing to
you and to the college than your claiming that you won a
“speling bee”.
6. Get everything in BEFORE THE DEADLINE.

I hope this paper has been useful to you, and good luck
to you as you go through the college application process.
Remember, many of the skills you will learn from this process
will be useful in later life, too!

><iphias Gladius, Esq.

A List Of Animal Collectives

The following is a list of animal collectives

Group Name Animal Type
———- ———–
Band gorillas
Bed clams, oysters
Bevy quail, swans
Brace ducks
Brood chicks
Cast hawks
Cete badgers
Charm goldfinches
Chattering choughs
Cloud gnats
Clowder cats
Clutch chicks
Clutter cats
Colony ants
Congregation plovers
Covey quail,partridge
Crash rhinoceri
Cry hounds
Down hares
Drift swine
Drove cattle,sheep
Exaltation larks
Flight birds
Flock sheep,geese
Gaggle geese
Gam whales
Gang elks
Grist bees
Heard elephants
Horde gnats
Husk hares
Kindle kittens
Knot toads
Leap leopards
Leash greyhounds,foxes
Litter pigs
Mob kangaroos
Murder crows
Muster peacocks
Mute hounds
Nest vipers
Nest,Nide pheasants
Pack hounds
Pair horses
Pod whales
Pride lions
School fish
Sedge,Siege cranes
Shoal fish,pilchards
Skein geese
Skulk foxes
Sleuth bears
Sounder boars,swine
Span mules
Spring teals
Swarm bees
Team ducks,horses
Tribe,Trip goats
Troop kangaroos,monkeys
Volery birds
Watch nightingales
Wing plovers
Yoke oxen

—- END —-

What You Should Know About Collection Agencies

==)— P TO PAUSE S TO STOP —(==

What You Should Know About Collection Agencies

“Cosmopolitan” (November 1984) pp 136-143

Karen Hartney laughed when she pulled the lavishly illustrated book on
Galapagos Islands wildflowers out of her mailbox. She hadn’t ordered the
book, wasn’t about to pay for it, and felt no obligation to go to the
trouble and expense of returning it.
Two weeks later, she was billed $29.95, plus mailing and handling. She
threw the statement in the trash. In time, the letters grew nasty,
demanding payment and warning that her credit rating would suffer if she
didn’t respond promptly. When a collection agent began calling her at work,
she snapped.
“Leave me alone,” Karen hissed. “I never wanted that dumb book
anyway!”
“You might have thought of that before you decided to keep it,” the man
responded. “I think the word for taking things that aren’t yours is
‘stealing.'”
Karen (whose name has been changed) was furious– but also worried.
Could the collection agency harm her credit rating, contact her employer,
neighbors, landlord? Most of all, she just wanted the harassing calls and
letters to stop. Though resentful, she mailed the payment– now a full
$37.50, including interest and collection charges.
Karen’s case is not an isolated one. Despite the strong new consumer
protection laws passed in recent years, abuses still exist, and a sizeable
minority of retailers and collection agencies engage in such illegal
collection practices. Charging for unordered goods is only one of the many
activities that are prohibited by federal law. (If, by the way, you receive
unrequested merchandise as Karen did, you are under no obligation to pay.
You may treat it as a free gift, but you should notify the sender, in
writing, of your intention as soon as you receive a “bill”.)
The thorniest problems occur when a debt is truly owed and a consumer,
through overextension or inadvertence, falls behind in paying it. In this
case, the account is often turned over to a collection agency, which may
behave unethically in its effort to recoup the money.
“Some of the most extreme cases we see involve actual threats of
violence,” reports Diane Conner, staff attorney for the Credit Practices
Division of the Federal Trade Commission (FTC). “Children have been told
over the phone, ‘Tell your parents they’re going to jail tomorrow if we
don’t get the money.’ We’ve also heard about collection agencies trying to
add on illegal fees of up to 100 percent of the original debt.”
Federal law protects you against such abusive practices. By knowing
which tactics are illegal and how to stop them, you can avoid being a
victum.

BEYOND THE LEGAL LIMIT______________________________________________________

The following are violations of consumer protection laws:

REPETITIVE CALLING OR CALLS AT UNUSUAL TIMES OR PLACES. Some collection
agents will call a consumer repeatedly during a single day, or telephone
late at night without permission– both of which are clearly illegal under
the Fair Debt Collection Practices Act (FDCPA).
Calls at work are not considered “harassing” if an office is the most
convenient place for you to receive the call– but, says Diane Conner, “If
the agent knows that your employer does not allow you to receive personal
calls at work, or if you’ve asked not to be contacted there, then it would
be a violation.”

CALLS TO PERSONS OTHER THAN THE CONSUMER. If a collection agent has
business with you, you are the only person with whom he may discuss that
business. “We frequently hear that a collection agent has called an
employer, or perhaps a neighbor, and left an “urgent message’ that the
consumer should call XYZ Collection Agency regarding payment of a debt,”
reports Bill McDonough, an FTC staff attorney. “The only motive would be to
embarass the consumer, and it’s against the law.”

ABUSIVE, OBSCENE, OR THREATENING LANGUAGE. Late bill payers have been
called deadbeats and bums, subjected to rude and obscene language, and given
veiled as well as direct threats of violence and imprisonment. If this
happens, end the conversation immediately, requesting that you never be
contacted again. Follow up with a brief letter barring future contact with
the collection agency. You may then wish to file a complaint with the FTC
or state consumer protection agency, or pursue private legal action.

MISLEADING THREATS OF LEGAL ACTION. No one has the right to make false
threats or to claim that legal action has been or is about to be instituted
if that’s not the case. Also prohibited are papers that look like official
notices from a state agency or court of law– including documents with
headings that mimic a common legal form (such as “Ace Collection Agency v.
Jane Consumer”) or ones that use an agency name similar to that of a state or
federal agency.

OTHER ABUSIVE BEHAVIOR. Because debt collectors show infinite
ingenuity, the Fair Debt Collection Practices Act covers scores of other
forbidden tricks, from tacking on collection charges not authorized by
contract or law, to using false names and publishing lists of consumers in
debt. Realizing that it could not forsee every possible abuse, Congress
even added a prohibition against any “harassing, oppressive, and abusive
conduct”– a general phrase that increases the power of the courts and the
Federal Trade Commission to protect you against improper collection
practices.

STEPS TOWARD SELF-DEFENSE____________________________________________________

What can you do if you’re the victum of an overeager collection agency?
Your first and simplest option under the FDCPA is to request in writing that
all collection contacts stop. Once you do that, the collection agency is
not allowed to call or write to demand payment; it can only advise you of
new action, such as the referring of your account back to the creditor or
the filing of legal action.
if the harassment continues, you may wish to contact your state
consumer agency. According to Cyra Narva of the Consumer Assistance
Division of the Massachusetts State Banking Department, these agencies will
often intervene to solve the problem. “Usually,” Narva reports, “the
consumer is content just to know that the rug has been pulled out from under
the collection agency and that the abusive practices will stop.”
The agencies won’t compensate you for their past harassment; however a
successful lawsuit might. You could bring suit under the FDCPA and, if
successful, recover a cash judgement of actual damages suffered, attorney’s
fees, sourt costs, and a special statutory award of up to one thousand
dollars.
“If a consumer has been truly injured,” says Willard Ogburn, deputy
director of the National Consumer Law Center, “he or she is entitled to be
compensated. The fact that attorney’s fees may be recovered in a successful
case encourages some attorneys to pursue strong cases on a commission basis,
while the possibility of an extra statutory award of up to a thousand
dollars acts as an extra incentive to the consumer. Meanwhile, the public
interest is served as collection agencies learn that violating consumer
protection laws can be very expensive.”
Whatever decision you make, you’re sure to reap some gratification from
simply standing up for your rights and the rights of others like you.
Rudeness and abuse need never be tolerated, and you can see to it that
they’re not.

+———————————-+ +———————————–+
| STOPPING TROUBLE | | CONSUMER AGENCIES THAT CAN |
| BEFORE IT STARTS | | HELP YOU PROTECT YOURSELF |
| | | |
| Healthy credit use is not | | THE FEDERAL TRADE COMMISSION |
| inconsistent with sound | | (FTC). Your regional office |
| personal finance management, | | can advise you of your rights |
| but if you overextend, these | | and may even make an investi- |
| measures should enable you to | | gation if a collection agency’s |
| resolve the problem without | | abuse has been severe or if |
| becoming vulnerable to further | | yours is one of several com- |
| embarassment or harassment: | | plaints against the same |
| | | agency. Meanwhile, let both |
| IMMEDIATELY CONTEST IN WRITING | | creditor and collection agency |
| ANY INACCURATE CHARGES, AND | | know that you’ve alerted the |
| REQUEST VERIFICATION. | | FTC. Their attitudes may not |
| No collection activities may | | improve, but their behavior |
| proceed until a charge is | | probably will. |
| verified: Waiting may make a | | |
| challenge more difficult. | | STATE CONSUMER PROTECTION |
| | | AGENCY. In some states, this |
| IF YOU REALIZE THAT YOU ARE | | government office can arbitrate |
| NOT GOING TO BE ABLE TO MAKE | | a dispute and order that |
| REQUIRED PAYMENTS ON A DEBT, | | abusive practices be stopped. |
| CONTACT THE CREDITOR. Most | | If your debt is undisputed or |
| are understanding and co- | | can be proved, the agency can |
| operative if you propose an | | help you negotiate a reasonable |
| alternate payment plan at the | | extended-payment plan; it may |
| first sign of trouble. Review | | also have greater power to |
| your own budget, determine a | | intervene in an individual case |
| monthly amount you can afford | | than a regional FTC office |
| to pay, then explain the | | would. |
| problem to the creditor and | | To learn what state services |
| offer to pay the lesser | | are available to protect you |
| amount. | | against collection harassment, |
| | | contact your state government |
| DON’T ALLOW YOUR ACCOUNT TO BE | | information-office or your |
| TRANSFERRED TO A COLLECTION | | state attorney general’s |
| AGENCY THROUGH YOUR OWN | | office. |
| INACTION. Creditors use | | |
| collection agencies to goad | | If the improper conduct comes |
| the reluctant or forgetful. | | from an attorney practicing law |
| A creditor who understands | | in the collection area, contact |
| that you are overextended but | | your LOCAL BAR ASSOCIATION, and |
| doing the best you can will | | ask for the disciplinary board |
| have no reason to resort to | | or licensing agency that |
| such measures. | | receives complaints against |
| Many people are too anxious | | lawyers. They probably won’t |
| or embarassed to approach a | | step in directly; however, a |
| creditor about dificulty in | | lawyer who knows that a |
| making payments. Remember that | | complaint is being checked |
| the creditor, whether a merch- | | generally takes more care to |
| ant or a banker, wants to keep | | act within legal and ethical |
| your business. An amicable | | bounds. |
| resolution is in “everyone’s” | | |
| interest. | | CONSUMER CREDIT COUNCELING |
| | | AGENCIES. Frequently the |
+———————————-+ | problem is less one of outright |
| harassment than of anxiety and |
| increasingly short tempers on |
| both sides. A nonprofit con- |
| sumer credit counceling agency |
| has no official enforcement |
| power, but it “can” help you |
| assess your financial situation |
| and act as a mediator in making |
| more mutually suitable payment |
| arrangements. |
| |
+———————————–+

Downloaded From P-80 Systems…..

The Consequences Of Clean Cold Fusion

THE CONSEQUENCES OF CLEAN COLD FUSION

Copyright (c) 1989 by Martin L. Buchanan. Permission to
reproduce this entire article in free publications or
postings is granted.

This posting predicts the economic, political, and social
consequences of clean cold fusion. It predicts dates for
particular consequences and gives free investment advice.

This article refers to a Fleischmann-Pons fusion reactor
as a “Puff” reactor (Pons/Utah/Fleischmann/fusion). The
associated process is the Puff process.

PREMISES

1. The Puff process works as claimed.
2. The amount of ionizing radiation produced can be made
low enough that use in vehicles, homes, and offices
is practical.

PREDICTION #1: RAPID DEVELOPMENT

Puff experiments can and will be done by garage shop operations.
The Puff process will be well-characterized in a few months.
Experimental Puff engines will be constructed this year. An
experimental Puff vehicle will be constructed by the end of ’89.

By the end of 1990 there will be working prototypes of Puff
cars, trucks, light aircraft, and home heating/electrical plants.

PREDICTION #2: POLITICAL OPPOSITION THAT FAILS

Threatened economic interests will wage fierce battles to restrict
use of Puff technology. The first U.S. battles will be in
federal regulatory agencies and then the Congress:

* Appeals for the federal government to restrict experimentation
and access to deuterium and certain metals.

* Proposed federal laws that would forbid the use of Puff in
vehicles or homes, or that would impose such stringent radiation
limits that shielding makes Puff impractical.

Supporting restrictions will be oil companies, electric utilities,
some environmentalists, and Congress-critters from oil- and
coal-producing states. Opposing restrictions will be auto
manufacturers, airplane manufacturers, general business lobbies,
businesses with high energy costs, and advocates of the free
market, such as the Libertarian Party. The public will decide
with a deluge of mail and phone calls supporting Puff 10:1.

When the battle to forbid Puff fails in Congress, there
will be these new federal legislative ideas:

* Federal tax/license fees on Puff reactors to reduce the
deficit and fund the new Federal Fusion Administration.

* Federal taxes on Puff inputs such as deuterium, heavy water,
and certain metals.

* Transition assistance from taxpayers for certain impacted
industries and workers.

* Billions for cold fusion research so that we stay ahead of
the Japanese. There will be hundreds of grant proposals
from unemployed Tokamak jockeys.

The battle will also move to state and local governments where
state laws and local ordinances banning Puff, regulating Puff,
or requiring licenses will be fought. Some short-lived ordinances
will be passed in places like Cambridge, Mass. or Berkeley, CA.
Licensing could become commonplace. However, bans or radiation
restrictions beyond what health requires will eventually be
repealed.

PREDICTION #3: F/P PATENT GRANTED AND UPHELD

Fleischmann and Pons will be granted a broad patent covering
all use of cold fusion in a metal lattice to generate energy.
The University of Utah and probably the University of
Southampton will share in the largess.

The patent-holders will license the patent on very generous
terms, seeking a one-time payment for each Puff built in
proportion to its power output. For example, a $.001/W capacity
(tenth of a cent per Watt = $1.00 per Kilowatt capacity) license
fee could generate a revenue stream of billions of dollars per
year within a few years.

The universities, the inventors, and the inventors’ heirs will
be among the richest institutions and persons in the world
as we enter the 21st century.

PREDICTION #4: SCHEDULE

1989 Process characterized.

Experimental Puff engine and vehicle.

1990 Forecasters dub the new decade “The Fusing Nineties.”

Working prototypes of Puff cars, trucks, light aircraft,
home heating plants, and home electrical plants.

1991 Auto companies introduce Puff models. Puff vehicle
prices are initially high but drop rapidly.

Puff hot water heater on the market.

1992 Portable computer appears powered by Puff and
thermocouple.

Puff home electrical power system on the market.

1993 Light aircraft manufacturers introduce Puff models.

First large Puff ship puts to sea.

1994 First Puff central power station with more than
100M Watts capacity.

First Boeing Puff 797F (“F” for fusion) enters
commercial service.

1995 Puff-powered ion-electric rocket deployed in
orbit (for orbital transfers, not surface to orbit).

PREDICTION #5: INVESTMENTS

These investments will benefit:

Companies involved in extracting heavy water or in building
new heavy water plants.

Mining companies extracting the metals used, such as
Palladium.

Vehicle manufacturers including auto-makers, airplane-makers,
ship-builders, truck-builders, and locomotive-builders.

Companies that build electric generating plants; they have
the expertise to build Puff-based plants.

Companies that can manufacture cheap and very sensitive
radiation detectors.

Companies that can build cheap Puff-based desalination plants.

Energy-intensive industries, such as aluminum
companies

Real estate and retail businesses around the University of
Utah and possibly the University of Southampton.

These investments will suffer in the long run:

Fossil fuel (oil and coal) extracting, refining,
distributing, and retailing.

The preexisting nuclear energy industry (based on fission).

Companies manufacturing solar-electric, hydro-electric,
and wind-electric equipment.

Parts manufacturers and anything related to internal
combustion engines. This includes tuneup shops,
vehicle repair shops, and so on.

Electric utilities and natural gas utilities.
Electric utilities won’t disappear but will be under
price pressure due to home or business direct generation
of power from their own Puff plants.

PREDICTION #6: GEOPOLITICAL CONSEQUENCES

Economies based on fossil-fuel extraction will decline in
relative wealth (though their absolute wealth may be greater
in a more abundant world) and in relative power: Saudi
Arabia, Iran, Iraq, the Persian Gulf states, Brunei, Mexico,
Venezuela, Texas, Louisiana, Alaska, West Virginia. Those
economies with large financial reserves and small populations,
such as Saudi Arabia, will do much better than those with
large populations and no financial reserves, such as Mexico.
(Note that the list of affected areas does not pretend to be
complete.) A diverse economy such as Texas will handle
the transition much better than a one-product economy.

Japan and the U.S. will be stronger, eventually freed from
any dependence on imported fossil fuels (total dependence in
Japan’s case), and with market-oriented cultures that will
quickly take advantage of these new developments. The same
will be true of Korea and Taiwan.

The growing economic pie/increased abundance made possible
by Puff technology will aid the process of perestroika/glasnost/
restructuring in the communist nations, from the Soviet Union
to Eastern Europe to China.

PREDICTION #7: MACROECONOMIC CONSEQUENCES

Puff will fuel an economic boom as the world replaces a large
part of its capital stock. Of course some investments and
areas will fare poorly in the transition.

PREDICTION #8: POLITICAL AND CULTURAL CONSEQUENCES

Puff will result in:

* More positive attitudes towards science and technology

* More young people interested in science and technology

* More positive attitudes towards markets, freedom, and
classical liberal/libertarian ideas

* More openness to entrepreneurs, crackpots, and others
with new ideas

* More skepticism about the value of government-funded
science

* Less “zero-sum” thinking = less trade protectionism
and less anti-immigration sentiment

PREDICTION #9: CONTINUED INNOVATION

Puff will lead us to a new understanding of nuclear processes.
This new understanding and the innovative efforts of thousands
of engineers and scientists will overcome initial Puff
limitations if physically possible. Some possible innovations
include:

* Desktop deuterium factory. Someone will build a miniaturized
device to separate heavy water or deuterium from water.

* Air-powered Puff plant. An advanced Puff plant may take water
vapor out of the air and extract the deuterons that it needs
to power itself.

* Cold fusion-powered Earth to orbit rocket. The initial Puff
has relatively low operating temperatures, because the palladium
lattice must be solid. Presently unknown cold fusion techniques
may allow much higher power densities and operating temperatures.
Such a rocket could use plain water for its reaction mass if
a high-enough exhaust velocity is achieved.

* Miniaturized Puff plants. For example, a Puff-powered artificial
heart.

PREDICTION #10: OPENING THE HIGH FRONTIER

Even without direct cold fusion surface to orbit rockets, cold
fusion will help open the high frontier of space in these ways:

* Low power costs for laser launching or launch loops or LINAC
(linear-accelerator)-assisted launching or antimatter production
if antimatter is used for energy storage on such vehicles
(see Forward’s “Mirror Matter” book).

* Unbounded power for ion drive ships in space.

* It *may* be profitable to mine the Moon or asteroids for
certain metals.

* With a wealthier global civilization on Earth and much lower
space travel costs, millions of people will be able to afford
space travel for pleasure.

I’ll close with a final prediction: within 30 years, you will
be able to buy a personal spaceship that will take you and your
family to the Moon and back. Its price will be under one
million 1989 dollars.

Cold Nuclear Fusion Bibliography (March 1, 1992)

From LISTSERV@VM1.NoDak.EDU Sun Mar 1 16:51:37 1992
Flags: 000000000000
Return-Path:
Received: by world.std.com (5.61+++/Spike-2.0)
id AA09790; Sun, 1 Mar 92 16:51:31 -0500
Received: from VM1.NoDak.EDU (via [134.129.111.1]) by relay1.UU.NET with SMTP
(5.61/UUNET-internet-primary) id AA25283; Sun, 1 Mar 92 16:49:18 -0500
Message-Id:
Received: from NDSUVM1.BITNET by VM1.NoDak.EDU (IBM VM SMTP V2R2)
with BSMTP id 9439; Sun, 01 Mar 92 15:47:34 CST
Received: by NDSUVM1 (Mailer R2.07) id 3275; Sun, 01 Mar 92 15:47:31 CST
Date: Sun, 1 Mar 1992 15:47:26 -0600
From: Revised List Processor (1.7b)
Subject: File: “FUSION CNF-PAT” being sent to you
To: fhapgood@WORLD.STD.COM

—————————————————————–
COLD NUCLEAR FUSION BIBLIOGRAPHY
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Dieter Britz alias britz@kemi.aau.dk
Kemisk Institut, Aarhus Universitet, DK-8000 Aarhus C

Section 3 (Patents); 85 entries; latest update: 26-Feb-92
—————————————————————–
This bibliography is in five parts:
1. Books.
2. Articles published in journals; no patents, preprints or
conferences.
3. Patents
4. News, reports, comments in scientific magazine/journals (like
Science)
5. Published articles peripheral to cold fusion (background facts
etc)
6. Unpublished writings, preprints, supplied by Vincent Cate, and
available from him and (18-Jul-91) a collection of palladium
hydride references plus abstracts and annotations supplied by
Terry Bollinger, and copyrighted by him.

In most cases, the customary publication citation system is
followed, i.e. author(s), journal name, volume, year, page number
and title, if any. Unless otherwise stated, the papers are in
English. Some comments are appended to each citation; these are
the compiler’s and may reflect a given personal interest. Where
the compiler has not actually seen the article the citation
source is stated (mostly Chemical Abstracts), and the comments
taken from it. Many of the items are marked with /.

================================================================

Section 3: Patents
^^^^^^^^^^^^^^^^^^
—————————————————————-
Assmann H, Hofer G, Hoffmann R, Martin J;
Ger. Offenl. DE 39163397 A1, 19-May-89.
“Verfahren und Einrichtung zur Fusion von leichten Atomkernen”
(Method and apparatus for the fusion of light nuclei)
** .. especially of deuterium nuclei, from an electrolyte
containing these, or tritium, or lithium ions, in heavy water or
superheavy water, etc. The special feature here is that the anode
is made out of a material, such as Au, Pt or Pd, and is heated to
over 100 degC, preferably to 1000 degC, in order to partly
dissolve and deposit on the Pd cathode, so as to activate it.
—————————————————————-
Bagnulo L; Eur. Pat. Appl. EP 402,988 19-Dec-90.
Cited in Chem. Abstr. 114:216542 (1991).
“A process, with relevant plants and devices, for the production
of energy through the industrial application of plausible
dynamics concerning controlled cold nuclear fusion”.
** “…nuclear fusion in metals, esp. Pd and Ti, which readily
absorb H and its isotopes. The process is based on the absorption
by these metals, through electrolysis of [sic; ‘or’ meant?]
gas-pressurising, of D or its mixts. with T or He, followed by
their consequent liberation within cracks, created in the metal
mass either by mech. or metallurgical means.”
—————————————————————-
Belton GR; PCT Int. Appl. WO 90 13,124, 21. April 1989.
Cited in Chem. Abstr. 115:17343 (1991).
“Cold nuclear fusion method and apparatus”.
** “A method and app. are described for generating thermal energy
by cold fusion by increasing the activity of a monoat. D species
to a level at which there is significant cold fusion. The method
and the app. comprise contacting Pd or any other material capable
of taking up D with a gaseous atm. comprising D and subjecting
the gaseous atm. to an elec. field to generate a sufficiently
high activity of the monoat. D species to achieve nuclear fusion
reactions in the Pd”. (Quoted from Chem. Abstr.)
—————————————————————-
Brumlik, GC, Cvijanovich GC, Johnson K;
PCT Int. Appl. WO 90 16,070, 27-Dec-90.
Cited in Chem. Abstr. 114:216545 (1991).
“Catalyzed nuclear fusion of heavy isotopes of hydrogen”.
** A nuclear fusion device and method for D or T are described
having a solid/ liq. phase of noble metals in contact with
another phase contg. D or T where the nuclei of D or T are moved
into the lattice of the liq. or solid noble metal by means of
diffusion, mech. forces, or by elec. or magnetic means to undergo
temp.- and lattice-assisted nuclear fusion”.?/Nov-90
—————————————————————-
Coupland DR, Doyle ML, Potter RJ, McGill Ir;
PCT Int. Appl. WO 90 15,415, 13-Dec-90.
Cited in Chem. Abstr. 114:216546 (1991).
“Cold-fusion support”.
** “Materials are described which are effective to support cold
fusion when loaded with D, e.g. Pd modified to change the local
environment for D under cold fusion conditions. Particular
modifications are alloys or dispersions of Pd with Ce, Ag, LaNi5,
and Ti. Other modifications concern the grain size. Excess heat
and T and n have been detected”.?/Dec-90
—————————————————————–
Dies KF; Ger. Offenl. DE 3913002 A1, 25.10.1990 (in German).
“Process for the generation of fusion energy by the use of
Fe-(2)M alloys, which are produced by electrolysis as well as by
lysis (etching)”.
** The title has “Fe-(2)M” but the abstract has the more probable
“(2)H-Fe”, i.e. Fe-D compounds (“alloys”). There may be additions
of such iron-group metals as Cr, Ti, Zr, Mn etc, to enhance
deuteride stability. Pt or Pd can also be used. Both with
electrolysis and etching in deuterated acids such as DCl, DF,
DBr, D2SO4 and HNO3, the metal is infused with deuterium, and we
have “etch fusion”, a new word. Fe, Ni or Co rods can be used
either normal or in the austenitic form.
—————————————————————–
Drexler J; PCT Int. Appl. WO 91 02,359, 21-Feb-91.
Cited in Chem. Abstr. 114:2554494 (1991).
“Distributed accumulator for energy conversion”.
** “A cell is described for producing thermal energy by
absorption or adsorption of D and lithon into D ion-permeable and
li-ion-permeable particulates supported on a surface of an
accumulator in the form of a mesh, rods, sheets, or membranes, or
within a gelatin-like matrix. Deuterons and lithons are produced
by electrolyte ionization in a liq. contg. high purity D2O, and
net elec. charge on a D-permeable and lithon-permeable
particulate is controlled by allowing neg. charged OD- radicals
to accumulate on the surface of the particulates that balance out
the pos. charged deuterons and lithons”. (Quoted from CA).
—————————————————————–
Dufour J; S. African ZA 90 05,389, 11-Jul-89.
Cited in Chem. Abstr. 115(22):242246 (1991).
“Energy source system”.
** “Energy is produced by: loading a body with >=1 H isotope
where at least a part of the body comprises >=1 metal capable of
forming a metal hydride-type lattice system; arranging the body
as an electrode of a capacitor means in an elec. circuit along
with another electrode connected with an externally controllable
voltage supply means; operating the voltage supply means; and
recovering energy produced in the body by operating the voltage
supply means. The system produces energy by a process commonly
known as cold fusion”. (Direct quote from CA).
—————————————————————–
Forrat F; Fr. Demande FR 2,647,943 06-Jun-89.
Cited in Chem. Abstr. 115(10):101349 (1991).
“Reactor for electrolytic nuclear fusion in solid electrolyte”.
** “The title reactor comprises a solid electrolyte, e.g. glass,
crystal, ceramics, electrolytically or chem.-vapor deposited
film. An a.c. current is applied to generate fusion and heat
energy is recovered by a fluid. The reactor can be used for
isotope prodn.” (Quoted direct from CA).
—————————————————————–
Fujishima A, Ito K;
Jpn. Kokai Tokkyo Koho JP 03 06,490, 5-Jun-89.
Cited in Chem. Abstr. 115:59226 (1991).
“Controlling cold nuclear fusion based on electrochemistry”.
** “In controlling cold nuclear fusion based on electrochem., a
cathode contg. a temp.-controlling device is used to adjust the
temp. of the anode”. (Quoted from CA).
—————————————————————–
Fukami A, Kumafuji H;
Jpn. Kokai Tokkyo Koho JP 03,35,193 3-Jul-89.
Cited in Chem. Abstr. 115:80705 (1991).
“Lanthanum nickel cathode for electrolytic exothermic tritium
formation”.
** “The cathode consists of Pd-coated LaNi5 alloy used in
(3)H-formation by electrolyzing an electrolytic soln. contg. D2O
and small amt. base with a Pt anode and a cathode to produce
larger energy than required for the electrolysis. The cathode may
be built in a porous Al2O3 container instead of Pd-coating. The
cathode had high H absorption”. (Direct quote from CA)
—————————————————————–
Gamo T, Niikura J, Taniguchi N, Hatoh K, Adachi K (Matsushita
Electric Industrial Co. Ltd.);
European Pat. Appl. EP 0 395 066 A2, 26.04.1990.
“Apparatus for cold nuclear fusion”.
** Prepared by a German representative (patent lawyer?), this
incredibly badly written patent application claims a number of
“preferred embodiments” for cold fusion. One is electrolysis at a
cathode of an alloy capable of occluding hydrogen isotopes, such
as Ti, Zr, and the like, in an electrolyte containing a compound
of hydrogen isotope and oxygen such as heavy water including
alkali metal ions such as Li+, K+ and the like. “Tritiums”,
“noutrons” may be produced by making use of “lithiums” and by the
“tonnel” effect. There is a list of example alloys for use as
cathode, all having larger hydrogen occlusion ability than “Pb”
and the like. An example shows that at the end of an
electrolysis, 5 times the starting concentration of T is found,
proving that cold fusion had taken place. Also, 500 neutrons of
2.45 MeV were detected or 10 times the background. In the second
preferred embodiment, some amorphous alloys are used, not having
“a crystal lattice rule of a long period”, meaning (presumably)
no long-range order. Some of these appear to have a rather high
hydrogen uptake. Crumbling was never observed and again, excess
tritiums are seen. The third embodiment uses a large (7 mm
diameter) spherical cathode. In this way, the collision
probability for deuterons is enhanced in the centre of the
electrode and in this way, the nuclear fusion reaction was caused
easily and an enormous energy was obtained (I am quoting). Two to
ten times the background neutron count was detected in an
example. In another example, two spherical alloy samples were
charged with D2 gas, and then a high-frequency discharge passed
between them. Neutrons at 1000 times the background was observed;
using pure H2, the neutron flux was the same as the background.
Temperature cycling was also tried, and neutrons detected.
—————————————————————–
Hagelstein PL; Int. Pat. Appl. WO 90/13129, 1-Nov-90.
“Fusion apparatus”.
** “Fusion apparatuses for coupling fusible material to a
quantized mode in coherent fusion are provided. Method for
optimization of reactor operation, control of the coherent fusion
reaction and extraction of usable energy generated are provided”.
Some of the means of doing this are: containing the fusible
material (deuterium) in an electrically conductive radially
symmetric vessel and initiating fusion through coupling to
plasmon modes or by radially polarizing insulating crystals, or
by lining the vessel with radially disposed rod-like projections
electrically connected in series with an oscillator and in series
with a computer controlled variable load for extracting the
energy; acoustic excitation or excitement by alpha particles or
cosmic rays. The inventor’s theory is given (twice), p.48 shows a
letter to Florence and Sam and there are 138 claims.
—————————————————————–
Hasegawa M, Hosono N; Eur. Pat. Appl. EP 414,399, 27-Feb-91.
Cited in Chem. Abstr. 114:255493 (1991).
“Process for storing hydrogen, and apparatus for cold nuclear
fusion and method for generating heat energy, using the process”.
** “A process for storing H comprises placing a H storing member
in a H gas atm. and generating a discharge in the H gas atm.,
thereby occluding the H in the H storing member. An app. for cold
fusion by using the above process is also claimed”. (Quoted from
CA).
—————————————————————–
Hora H, Miley GH; Ger. Offenl. DE 3810806 A1, 11.10.1990
(in German).
“Verfahren und Anordnung zu Kernverschmelzungsreaktionen bei
tiefen Temperaturen” (Method and apparatus for nuclear fusion
reactions at low temperatures).
** Professors Hora and Miley (editor of Fusion Technology) write
that the electrolytic charging of Pd or Ti with deuterium leads
to surface contamination. This is avoided by charging with
deuterium gas under pressure, which is one of their inventions
here laid bare. The 9 claims widen this concept to include any
metallic element in “the eighth group of the periodic table”
being exposed to H2, D2 or T2 gas, temperature control during
such a process, absorption of neutrons, alpha or beta emission,
the admixture of such isotopes as (11)B, (6)Li and (7)Li to the
metals, attainment of high hydrogen isotope concentration in the
metal, the use of electric discharge towards this end, the use of
high-surface forms of the metals or mixtures thereof, control of
the metal hydrides’ compressibility and finally, the use of these
processes for initiating an explosive nuclear fission [sic]
reaction. Since this is an Offenlegungsschrift and not (yet) a
full patent, no details are given of how all this is implemented.
—————————————————————–
Hosono N; Jpn. Kokai Tokkyo Koho JP 03,215,785, 19-Jan-90.
Cited in Chem. Abstr. 116:12355 (1992).
“Thermal-energy generators based on cold nuclear fusion”.

** “A thermal-energy generator based on cold nuclear fusion,
contains: (1) a container of D gas; (2) a pair of electrodes, at
least 1 of which is formed of a H-storing metal; (3) a means to
apply voltage on the electrodes to cause elec. discharge in the
presence of D gas between them; (4) a thermal conductor to
transfer heat generated at the electrodes to a coolant; and (5) a
converter, to heat, of the kinetic energy of n generated by cold
nuclear fusion on the H-storing metal”. (Direct quote from CA).

—————————————————————–
Hosono N; Jpn. Kokai Tokkyo Koho JP 03,215,786, 19-Jan-90.
Cited in Chem. Abstr. 116:12356 (1992).
“Apparatus for on cold nuclear fusion using solar energy”.
** “The app. contains: (1) a solar-energy-based elec. generator;
(2) a means to generate D by electrolysis of heavy H2O using
electricity from the generator; (3) a means to adsorb D using a
metal; (4) a means to contain D generated by (2); (5) a
cold-nuclear-fusion device in (4), which comprises a pair of
discharge electrodes, at least 1 of which is made of the
H-adsorbing metal; and (b) [sic] a device to apply voltage to the
electrodes to cause elec. discharge”. (Direct quote from CA).
—————————————————————–
Igarashi M; Jpn. Kokai Tokkyo Koho JP 02,280,086, appl. 21-Apr-89.
Cited in Chem. Abstracts 115:37282 (1991).
“Cold nuclear fusion and apparatus”.
** “In cold nuclear fusion based on the electrolysis of heavy
H2O, an ionic conductor placed between anode and cathode contains
D+, and the cathode is formed of a material (e.g. Li) which can
store H. The ionic conductor may also contain T+”. (Quoted from
Chem. Abstr.).
—————————————————————–
Ishikawa A, Katsumi M;
Jpn. Kokai Tokkyo Koho JP 03 78,691, 23-Aug-89.
Cited in Chem. Abstr. 116(6):47853 (1992).
“Power generation by cold nuclear fusion”.
** “Thermal energy is generated by implanting D in a substance
(e.g. Pd) to cause cold nuclear fusion, and the thermal energy is
converted into elec. power by thermoelec. means”. (Direct quote
from CA).
——————————————————————
Ishikawa Y, Ogata H, Saho N, Mihara Y;
Jpn. Kokai Tokkyo Koho JP 02,276,990, 13-Nov-90.
Cited in Chem. Abstr. 114:255488 (1991).
“Nuclear fusion at room temperature”.
** “In the nuclear fusion based on the electrolysis of heavy H2O,
a D-absorbing cathode has a porous structure. To increase the
absorption rate of O [sic], small amt. of As, CN-, S2- and/or Cl-
is added to the heavy H2O”. (Quoted from CA).
——————————————————————
Ishikawa Y, Ogata H, Saho N, Mihara Y;
Jpn. Kokai Tokkyo Koho JP 02,276,992, 13-Nov-90.
Cited in Chem. Abstr. 114:255487 (1991).
“Deuterium absorption in nuclear fusion”.
** “In nuclear fusion, D is absorbed, in vapor phase, by a
neg.-biased material (e.g. Pd). The material may be a film formed
by chem.-vapor or sputter deposition in a D atm.” (Quoted from
CA).
—————————————————————–
Iwamatsu S; Jpn. Kokai Tokkyo Koho JP 02,298,891, 15-May-89.
Cited in Chem. Abstr. 115:80698 (1991).
“Nuclear fusion reactor”.
** “A nuclear fusion reactor includes (1) a compartment for
forming a plasma >From O2O [sic] or D, (2) a compartment for
accelerating D ions in the plasma, (3) a compartment for
projecting this D ion beam toward a metal target (e.g. Pd), and
(4) a target support as well as a heat exchanger.” (Direct quote
from CA)
—————————————————————–
Iwamatsu S; Jpn. Kokai Tokkyo Koho JP 02,304,393, 18-May-89.
Cited in Chem. Abstr. 115:59228 (1991).
“Cold nuclear fusion based on heavy-water electrolysis”.
** “Cold nuclear fusion is based on the electrolysis of D2O and
uses cathodes >From Ni or a Ni-Pd alloy”. (Quoted from CA).
—————————————————————–
Iwamatsu S; Jpn. Kokai Tokkyo Koho JP 02,306,193, 19-May-89.
Cited in Chem. Abstr. 115(12): 122213 (1991).
“Cold nuclear fusion based on heavy-water electrolysis”.
** “In cold nuclear fusion based on D2O electrolysis, a cathode
bar from a H absorbing metal (and Pd) is used, and a Pt coated Ti
anode plate is placed around the cathode bar”. (Direct quote from
CA).
——————————————————————
Iwamatsu S; Jpn. Kokai Tokkyo Koho JP 02,307,093, 22-May-89.
Cited in Chem. Abstr. 115:59227 (1991).
“Cold nuclear fusion based on heavy-water electrolysis”.
** “In cold nuclear fusion, pressured O or its plasma is
introduced into a container made of Pt, Ti or a Pd-Ti alloy.
Nuclear fusion is caused on the inner wall of the container.
Alternatively, the container is filled with a powder of Pt, Ti,
or the Pd-Ti alloy before the introduction of D or its D plasma.
Voltage may be applied to the D plasma, forming D ions”. (Quoted
from CA).
—————————————————————–
Iwamatsu S; Jpn. Kokai Tokkyo Koho JP 02,311,792, 27-Dec-90.
Cited in Chem. Abstr. 114:255498 (1991).
“Method of cold fusion”.
** D2 gas or plasma state D or ionized D gas is absorbed into a
H2-absorbing alloy. Pd may be loaded inside and/or on the surface
of the alloy. The method does not necessarily require
electrolysis. Thus, a H2-absorbing alloy is exposed to D2 gas to
absorb as much as 1000 times the vol. of the alloy, to cause cold
nuclear fusion The heat evolved by the cold fusion can be extd.
via heat exchangers”. (Quoted from CA).
——————————————————————
Iwamatsu S; Jpn. Kokai Tokkyo Koho JP 02,297,093, appl. 11-May-89.
Cited in Chem. Abstracts 115:37284 (1991).
“Method of cold fusion”.
** “A cathode consisting of a Pd container or Pd tube contg.
pressurized D2 is exposed to D+ ions or D plasma atm. or
subjected to accelerated driving of D. Thus, an elec. current is
applied to a Pt anode and a Pd pipe cathode contg. pressurized D
gas, then cold fusion occurs at a high probability at the surface
or inside of the Pd pipe cathode. The same effect can be achieved
by exposing the Pd cathode to D2O or D plasma gas and accelerated
driving of D ions.” (Quoted from Chem. Abstr.)
——————————————————————
Iwamatsu S; Jpn. Kokai Tokkyo Koho JP 02,306,192, appl. 19-May-89.
Cited in Chem. Abstracts 115:37287 (1991).
“Method of cold fusion”.
** “At least the cathode plate to be immersed in heavy water is
of Ti material. The electrodes can be an alternative to precious
metal electrodes. Thus, a Ti plate, preferably porous Ti cathode
and a Ti plate of Pt-plated Ti plate anode are immersed in heavy
water, and elec. current is applied to the electrodes to cause
cold fusion at the cathode. The cathode can be a Pd-plated Ti
plate”. (Quoted from CA)
—————————————————————–
Jones SE, Palmer EP, Czirr JB, Rafelski J, Price R;
PCT Int. Appl. WO 90 13,125, 26. April 1989.
Cited in Chem. Abstr. 115:17342 (1991).
“Piezonuclear fusion”
** “Several methods of loading a host material with D and
promoting nuclear cold fusion either by elec. current or heating
and cooling are claimed. The loading methods include electrolysis
of D2O, exposure to D, thermal cycling of host material under D,
catalytic infusion etc”. (Quoted from CA).
——————————————————————
Joshi AV; PCT Int. Appl. WO 90 13,127 18-Apr-89.
Cited in Chem. Abstr. 115:80697 (1991).
“Electrolytic apparatus for dissociation of compounds containing
hydrogen isotopes”.
** “An improved app. is described for high temp. electrolytic
decompn. of compds. contg. H isotopes, e.g. D. The app. includes
a solid state electrolyte capable of conducting O, H+, Li or Na
ions, an anode porous to O adherent to one surface of the solid
state electrolyte, and a H-absorbing cathode such as Fe, Ti, Mg,
Ni, Pd or their alloy, adherent to another surface of the solid
state electrolyte. The app. is placed in a H isotope medium and
1-2 V of d.c. passed through the electrodes. Upon application of
this voltage D2 is absorbed in the cathode. Once the satn. of D2
in cathode occurs fusion begins to take place, thus releasing
heat energy. A cold fusion process using a molten electrolyte is
also claimed”. (Direct quote from CA).
—————————————————————–
Kanno Y; Jpn. Kokai Tokkyo Koho JP 02,281,185, appl. 21-Apr-89.
Cited in Chem. Abstracts 115:37283 (1991).
“Acceleration of cold nuclear fusion by ultrasound”.
** “Cold nuclear fusion based on electrolysis of D2O is
accelerated by applying ultrasound to D2O” (quoted from CA).
—————————————————————–
Kasahara M, Negishi H;
Jpn. Kokai Tokkyo Koho JP 03 53,194, 21-Jul-89.
Cited in Chem. Abstr. 115(18):192159 (1991).
“Power generators based on cold nuclear fusion”.
** “A power generator based on cold nuclear fusion utilizes heavy
H2O, a Pt anode, a Pd cathode, and an elec. power source, is
characterized in that the Pd cathode is porous”. (Direct quote
from CA).
—————————————————————–
Kasahara M, Negishi H;
Jpn. Kokai Tokkyo Koho JP 03 53,195, 21-Jul-89.
Cited in Chem. Abstr. 115(18):192158 (1991).
“Power generators based on cold nuclear fusion”.
** “A power generator based on cold nuclear fusion, which
utilizes heavy H2O, a Pt anode, a Pd cathode, and an elec. power
source, is characterized in that the Pd cathode is porous, and it
is under vibration”. (Direct quote from CA).
—————————————————————–
Kumafuji H, Fukami A;
Jpn. Kokai Tokkyo Koho JP 03,35,192 3-Jul-89.
Cited in Chem. Abstr. 115:80704 (1991).
“Uranium cathode for electrolytic exothermic tritium formation”.
** “The cathode consists of Pd-coated U used in (3)H-formation by
electrolyzing an electrolytic soln. contg. D2O and small amt.
base with a Pt anode and a cathode to produce larger energy than
required for the electrolysis. The cathode may be built in a
porous Al2O3 container instead of Pd-coating. The cathode had
high H absorption”. (Direct quote from CA)
—————————————————————–
Kuwano Y, Nasako K, Fujitani S, Yonezaki T, Furukawa A, Yonezu I,
Moriwaki K, Kameoka S, Saito T, Furukawa S;
Jpn. Kokai Tokkyo Koho JP 02,280,088, 20-Apr-89.
Cited in Chem. Abstr. 115:59220 (1991).
“Systems for cold nuclear fusion, heat transport, and
thermoelectric cells”.
** “In a cold-nuclear-fusion-system, in which an anode from an
O-generating metal (e.g. LaNi5), and a H-absorbing cathode are
placed in electrolyte-contg. D2O: (1) the cathode is formed of a
H-occluded alloy; and (2) an elec. field is applied between the
electrodes. A D-compd. (e.g. D2S) may be added to the
electrolyte. A heat-transport system uses heat generated by the
cold-fusion system, and the H gas adsorbed [sic] and released by
the H-occluded alloy is employed as a heat-transfering [sic]
medium. A thermoelec.-cell system comprises the cold fusion
system and a thermoelec. cell”. (Quoted from CA)
—————————————————————–
Martin J; Ger. Offenl. DE 3915153 A1, 15.11.1990 (in German).
“Process and apparatus for the uptake of hydrogen in a solid”.
** Expressed very generally, this invention is about the uptake of hydrogen
isotopes in a solid that is capable of taking it up. This could be, for
example, a palladium cathode in a cold fusion arrangement, or a hydrogen
storage material in a vehicle. The essence of the invention is to solve the
problem of an active layer, that enables hydrogen uptake; such a layer is here
generated continuously by means of, e.g., a dilute palladium salt in the
electrolyte (causing Pd deposition in a spongy, active form), or by means of
surface radiation treatment of the material. Various other means are covered.
——————————————————————————
Mikami A, Kuroki K, Furukawa S, Nasako K, Yonezu I, Moriwaki K;
Jpn. Kokai Tokkyo Koho JP 02,306,194, 19-May-89.
Cited in Chem. Abstr. 115:59223 (1991).
“Apparatus for cold nuclear fusion and heat-transport system”.
** “The app. consists of a cathode-comprising tank from a H-absorbing metal,
D2O contg. an electrolyte, and a cathode immersed in the D2O, while elec.
insulated from the tank. Nuclear fusion of D is conducted in the cathode with
the application of an elec. field between the electrodes. A heat-transport
system is based on the absorption and releasing of H (heat-transfering medium)
by the H-absorbing metal”. (Quoted from CA).
——————————————————————————
Mills RL; PCT Int. Appl. WO 90 13,126 Nov. 1990; US Appl. 341,733, 21-Apr-89.
Cited in: Chem. Abstr. 114:173685 (1991).
“Energy/matter conversion methods and structures”.
** “A method and app. for releasing energy comprise: selecting a 1st and a 2nd
atom; detg. the resonance orbital shrinkage nergy levels of the e orbitals of
the 2 atoms; providing 2 energy holes substantially equal to each of the
shrinkage energy levels of the atoms; and juxtaposing the atoms and energy
holes to produce nuclear fusion of the atoms. The cold fusion takes place when
the energy is removed from the electron orbitals of atoms by the energy holes
permitting redn. of the at. orbitals and attractive nuclear forces to act. The
energy holes can be provided by using a catalytic ion-pair, each ion having
ionization energy close to the resonance orbital shrinkage energy of one of
the ions. A table of numerous such ion-pairs is also presented.”
——————————————————————————
Mizugai T; Jpn. Kokai Tokkyo Koho JP 02,271,288, 6-Nov-90.
Cited in Chem. Abstr. 114:216547 (1991).
“Nuclear fusion employing heavy fermion effect within a solid material”.
** “Deuterium ((2)D, or (2)D and (3)T) is made to be absorbed by a heavy
fermion compd. or a composite of the heavy fermion compd. and a H-storing
material, to cause nuclear fusion. The method uses electrons with
extraordinary heavy mass due to the heavy fermion effect in solid state to
shield elec. charge of the deuteron to cause nuclear fusion with a small
unit”. ?/Nov-90
——————————————————————————
Motomiya T; Jpn. Kokai Tokkyo Koho JP 02,293,692, 04-Dec-90.
Cited in Chem. Abstr. 114:255491 (1991).
“Cold nuclear fusion”
** “Cold nuclear fusion includes: (a) introducing a D gas (ca. 1E-03 Torr)
into a vacuum chamber contg. a planar or curved cathode plate from an elec.
conductor (e.g., P2) which is likely to form a hydride, and a needlelike anode
>From a refractory elec. conductor; (b) applying d.c. to form an elec. field of
ca. 30 V/Angstrom between the electrode tips for the ionisation of D; and (c)
accelerating D ions toward the cathode plate; so that the plate absorbs and
enriches D ions”. (Quoted from CA)
——————————————————————————
Nakanishi F, Tatsumi M, Tada K;
Jpn. Kokai Tokkyo Koho JP 02,287,289, 27-Nov-90.
Cited in Chem. Abstr. 114:255490 (1991).
“Power generator based on cold nuclear fusion”
** “A power generator based on cold nuclear fusion which involves electrolysis
of D2O is characterized in that D and O generated by the electrolysis are
burned back to D2O, which is returned to the electrolysis tank”.
(Quoted from CA)
——————————————————————————
Nakano H; Jpn. Kokai Tokkyo Koho JP 03 02,690, 31-May-89.
Cited in Chem. Abstr. 115:59224 (1991).
“Deuterium-absorbing materials in cold nuclear fusion”.
** “A D-absorbing material (e.g. Pd) used in cold nuclear fusion has an
amorphous structure. Nuclear fusion of D atoms has increased efficiency”.
(Quoted from CA).
——————————————————————————
Neeb KH, Hoffmann R, Martin J; Ger. Offen. DE 3,920,312, 3-Jan-91.
Cited in Chem. Abstr. 114:216543 (1991).
“Method and apparatus for fusion of light particles in solid getter”.
** “The title method of fusion of H and/or its isotopes in a solid getter
comprises an electrode, e.g. Pd, a center electrode, and an electrolyte where
the getter and the light particles are irradiated and/or bombarded with
radiation and/or particles, e.g., n, alpha-particles, or (3)He ions. One of
the ways to implement the above process is incorporating an alpha-emitting
nuclei [sic] in the cathode material. The above process increases cold fusion
probability. ?/Jan-91
——————————————————————————
Nishiyama I, Nanbu Y; Jpn. Kokai Tokkyo Koho JP 03 51,794, 19-Jul-89
Cited in Chem. Abstr. 115(20):217010 (1991).
“Cold nuclear fusion apparatus”.
** “The app., equipped with a device for heavy-H2O electrolysis, is
characterized in that the cathode of the device is formed at a
graphite-alkali-metal interlayer compd. (e.g. C8K)” (Direct quote from CA).
——————————————————————————
Nobunaga H; Jpn. Kokai Tokkyo Koho JP 02,297,094, appl. 11-May-89.
Cited in Chem. Abstracts 115:37285 (1991).
“Method for hydrogen nuclear fusion”.
** “In cold fusion by applying elec. voltage between a pair of electrodes
immersed in heavy water, an elemental metal selected from alkali metal, alk.
earth metal, rare earth elements, Sc, V, Cr, Ni, Cu, Zn, Nb, Hf and Ta is used
as the cathode material. Thus, a Au anode and a La cathode are set in a
container holding heavy water contg. a metal salt. When 20 V const. potential
was applied between the electrodes, H2 (sic) bubble appeared on the cathode
surface in several minits [sic] suggesting initial sorption of D+ ions within
the cathode, and emission was obsd. of n, gamma-rays and heat. When Mn was
used as the cathode, bubbles appeared immediately, but no n and gamma-emission
were obsd. Metals capable of forming hydrides seemed to be able to cause cold
fusion”. (Quoted from Chem. Abstr., including “(sic)” but not “[sic]”).
——————————————————————————
Nobunaga H; Jpn. Kokai Tokkyo Koho JP 02,297,095, appl. 11-May-89.
Cited in Chem. Abstracts 115:37286 (1991).
“Method for hydrogen nuclear fusion”.
** “In nuclear fusion by applying elec. voltage between a pair of electrodes
immersed in heavy water to cause cold fusion at the cathode, an alloy contg.
>=1 of rare earth elements, Mg, Ni, Co, Fe and Ti is used as the cathode
material. Thus, a Au anode and a LaNi5 cathode are set in a container holding
heavy water contg. a metal salt. When 20 V const. potential was applied, H
bubbles appeared on the LaNi5 cathode surface suggesting initial sorption of
D+ ions in the cathode, and emission was obsd. of n, gamma-rays and heat. No n
and gamma-rays were obsd. with a stainless steel (SUS 304) cathode. Metal
capable of forming hydrides seemed to be able to cause cold fusion”. (Quoted
>From Chem. Abstr., including “(sic)” but not “[sic]”).
——————————————————————————
Noninski V, Noninski Kh; PCT Int. Appl. WO 91 01,493, 20-Jul-89.
Cited in Chem. Abstr. 114:2554496 (1991).
“Method and device for the determination of the obtained energy during
electrolytic processes”.
** “A method and app. for use in detg. the quantity of energy obtained during
electrolytic processes is disclosed. The app. includes a Dewar vessel contg.
a measured quantity of H2O. An electrolyte cell is hermetically sealed in the
vessel. A plurality of thermocouples is positioned within the vessel for
purposes of measuring temps. within the vessel. A magnetic stirrer is mounted
in the bottom of the vessel. The app. can be used in cold fusion exts.”.
(Quoted from CA).
——————————————————————————
Ogata H, Saho N, Ishikawa Y, Mihara Y;
Jpn. Kokai Tokkyo Koho JP 02,276,989, 5-Apr-89.
Cited in Chem. Abstr. 115:59218 (1991).
“Apparatus for nuclear fusion at room temperature”.
** “The app. comprises a container for heavy H2O, electrodes placed in the
heavy H2O, an elec. power source, a means to circulate the heavy H2O between
the container and a heat exchanger, and a system of a heating medium, which
comments [sic] the heat exchanger and a power-extn. compartment”.
(Quoted from CA).
——————————————————————————
Ogino S; Jpn. Kokai Tokkyo Koho JP 03,194,493, 22-Dec-89.
Cited in Chem. Abstr. 115:289488 (1991).
“Cold nuclear fusion apparatus”.
** “The app. comprises an anode, a cathode, and an electrolyte bath contg.
heavy H2O, where the cathode is formed of V, Sr, Y, Nb, Hf or Ta, and adsorbs
D produced by the electrolysis of heavy H2O”. (Direct quote from CA).
——————————————————————————
Ogino S; Jpn. Kokai Tokkyo Koho JP 03,194,494, 22-Dec-89.
Cited in Chem. Abstr. 115:289489 (1991).
“Cold nuclear fusion apparatus”.
** “The app. comprises an anode, a cathode, an electrolyte bath, and a means
to expose cathode metal, where the electrolytic bath contains heavy H2O, the
cathode is formed of a D-adsorbing metal, and the means keeps active the
surface of the cathode metal”. (Direct quote from CA).
——————————————————————————
Ojiri H, Nakamura M; Jpn. Kokai Tokkyo Koho JP 03,150,284, 20-Sep-89.
Cited in Chem. Abstr. 115(22): 242242 (1991).
“Apparatus for cold nuclear fusion”.
** “An app. for cold nuclear fusion includes: (a) a chamber with a means to
guide a D-contg. gas into it, and a exhaust means; (b) a plasma-generating
means; and (c) a reactive substrate on which is a H-absorbing metal (e.g.,
Pd). Nuclear fusion is caused by contacting a plane of the gas with the
reactive substance”. (Direct quote from CA).
——————————————————————————
Omori, T; Jpn. Kokai Tokkyo Koho JP 03,105,494, 07-Nov-89.
Cited in Chem. Abstr. 115(22): 242243 (1991).
“Apparatus for cold nuclear fusion”.
** “The app., which includes a reaction tank contg. D2O, a pair of discharge
electrodes in the tank, and a power source to apply pulsed voltage on the
electrodes, and which causes nuclear fusion based on D ion generation by
pulsed voltage, and a pressure wave produced by underwater plasma discharge,
is equipped with a partition structure around the plasma-discharge area, which
controls the pressure of the wave”. (Direct quote from CA).
——————————————————————————
Onchi M, Tarui H, Kuroki K; Jpn. Kokai Tokkyo Koho JP 03 07,113, 5-Jun-89.
Cited in Chem. Abstr. 115:59225 (1991).
“Cooker based on cold nuclear fusion”.
** “The title cooker comprises an outer container and an inner container for
cooking materials, where the space between the 2 containers is filled with
D2O. An anode (e.g. Pt) to generate O and a cathode from a H-absorbing
material (e.g. Pd) are placed in the D2O, close to the inner container, and an
elec. field is applied between the 2 electrodes to cause the electrolysis of
D2O”. (Quoted from CA).
——————————————————————————
Pons S, Fleischmann M, Walling CT, Simons JP;
World Pat. Appl. WO 90/10935. 12 March 1990.
“Method and apparatus for power generation”.
** about 100 pp.; it starts off by naming 7 earlier US pat. applications,
going back to March 13, 1989, of specific claims such as heat generation,
neutron beam method, power generation. This one combines all of these, and
“relates to methods and apparatuses for generating heat, neutrons, tritium or
electrical power, and in one illustration, to an apparatus which utilises heat
produced by compressing low atomic weight nuclei in a metal lattice under
conditions which produce excess heat, possibly involving nuclear fusion”.
A number of materials, preferably palladium or other metals, are suggested,
as well as deuterium, to produce heat, tritium and “neutron beams” by
collimation; these can then be used for neutron radiography, – diffraction,
– activation, etc. In all, 50 claims are made. New ideas, not previously
exposed in the authors’ publications, are the formation of the isotopic
hydride by transfer from another hydride (LiD etc) to the metal; and the use
of radioactive dopants in order to knock the PdD lattice with neutrons, alpha
or beta particles.
——————————————————————————
Rabinowitz M, Worledge DH; Int. Pat. Appl. WO 90/13128, 1-Nov-90.
“Enhancing nuclear fusion rate in a solid”.
** Methods for increasing the collision rate of light isotopes in a carrier
(i.e. deuterium in Pd, Ti etc). One way is to constrain the isotope to one-
dimensional motion by making the carrier in the form of thin filaments, or by
providing thin channels, or thin layers, within it. This is done by a number
of techniques such as vapour deposition, sputtering and ion bombardment or by
using material that has such channels or layers naturally. The use of heavy
fermion material will yield electrons with large effective mass, which will
aid in overcoming the Coulomb barrier between deuterons and the like. Other
suggestions are made. 21 claims are made.
——————————————————————————
Rabinowitz M, Santucci J, Worledge DH; Int. Pat. Appl. WO 90/14670, 29-Nov-90.
“Isotope deposition, stimulation, and direct energy conversion for nuclear
fusion in a solid”.
** The invention provides techniques for deposition of light isotopes in a
hydrogen absorbing solid and their stimulation to accelerate their fusion,
in various embodiments such as a metal with planar, channel construction,
thermal (laser) stimulation to produce high hydrogen isotope concentration,
laser ablation to produce a shock wave, and the use of ultrasonics for aiding
with the loading and stimulation. Techniques for the conversion of the energy
to electricity are included. The metal is loaded by alternate vapour
deposition of metal, deuterium, metal, etc, in thin layers. 16 claims.
——————————————————————————
Sadoway DR; PCT Int. Appl. WO 91 06,959, 16-May-91.
Cited in Chem. Abstr. 115(18):192160 (1991).
“Media for solid state fusion”.
** “Apps. for electrochem. as well as thermochem. fusion are provided.
Material systems consisting of D storage intermetallic compd., transition
metal/rare earth metal intermetallic compd. and elemental material cathodes
are combined with compatible electrolytes including solid deuteride
electrolytes, cryogenic electrolytes, and supercrit. D in electrochem. fusion
app. wherein a magnetic field may be provided to enhance fusion initiation in
the cathodes. The invention enables the operation of these electrochem. and
thermochem. fusion apps. over a wide range of temps. and pressures which may
be adjusted to optimise the efficiency of the solid state fusion reaction”.
(Direct quote from CA).
——————————————————————————
Saho N, Ogata H, Ishikawa Y, Mihara Y;
Jpn. Kokai Tokkyo Koho JP 02,276,991, 5-Apr-89.
Cited in Chem. Abstr. 115:59219 (1991).
“Apparatus for nuclear fusion at room temperature”.
** “The app. which comprises a heavy-H2O container, electrodes placed in the
container, and an elec. power source, is characterized in that: (1) a coolant
fills the cathode interior; and (2) the coolant-circulation system includes
means to condense the coolant vapor, and to ext. power. The b.p. of the
coolant may be set lower that that of heavy H2O”. (Quoted from CA).
——————————————————————————
Scaramuzzi F, De Ninno A; Podda S, Frattolillo A, Lollobattista G, Martone M,
Mori L, Martinis L; Eur. Pat. Appl. EP 0 394 204, 11-Apr-90.
“A system for producing neutrons and heat by nuclear fusion in a gas absorbed
on a metal”.
** A system, and “an equipment” for pressurised gas-phase deuterising of
metals, and temperature cycling, so as to produce cold fusion. Some neutron
emission results are shown.
——————————————————————————
Schoessow GJ; PCT Int. Appl. WO 91 02,360, 30-Jun-89.
Cited in Chem. Abstr. 114:2554497 (1991).
“Electrochemical nuclear process and apparatus for producing tritium, heat,
and radiation”.
** “A process for the prepn. and recovery of T, heat energy, and radiation
energy by electrolysis of a liq. medium contg. D2O in an electrolytic cell
having a cathode of Pd, or certain other elements by operating the process at
ca. 10-300 degC and an app. for this process are described the cathode
comprises a central solid geometrical mass and the anode is an open top
cup-shaped vessel positioned adjacently below and encircling the cathode.
(Quoted from CA).
——————————————————————————
Shaffer G; PCT Int. Appl. WO 91 01,037, 13-Jul-89.
Cited in Chem. Abstr. 114:2554492 (1991).
“Chemo-nuclear fusion methods”.
** “A method of causing D mols. to combine to become He atoms in the presence
of a Pd catalyst comprises providing a reactor chamber contg. D2O and a Pd
catalyst, introducing controlled amts. of D into the chamber so that the D
mols. are absorbed by the Pd catalyst where the Pd catalyst executes a
simultaneous shift of 2 electrons, leaving 2 stripped D nuclei trapped in
single Pd clathrate cages. The juxtaposed D nuclei in a single cage and having
the effect of the absorption energy exerting tremendous compressive forces
collapse to form an alpha-particle and release relativistic energy as
gamma-ray or kinetically as heat. Finally, the evolved heat is transferred to
perform useful work”. (Quoted from CA)
——————————————————————————
Steinert C; Ger. Offenb. DE 3,923,468, 15-Jul-89.
Cited in Chem. Abstr. 115(14):146547 (1991).
“Fusion reactor”.
** “A nuclear fusion reactor concept based on cold fusion is described. The
reactor comprises a series of fusion chambers sepd. by expansion chambers.
Electrodes serve as hydrodynamic seals for the entrance and outlet of
electrolytes from the fusion chambers. The fusion chambers also connected to
each other, e.g. by capillary tubes. The expansion rooms have
pressure-sensitive windows for irradn. with laser beams, surrounding the
fusion chambers is moderator”. (Direct quote from CA).
——————————————————————————
Takahashi A; Jpn. Kokai Tokkyo Koho JP 03 06,491, appl. 04-Jun-89.
Cited in Chem. Abstracts 115:37288 (1991).
“Nuclear fusion device”.
** “Ti or Pd adsorbed H, D or T is irradiated with electromagnetic wave, or
exposed to an elec. field or magnetic field to cause nuclear fusion. Thus, a
cyclindrical cathode composed of Au or Pt is covered with a light-transmitting
cover such as heat-resistant glass, and sealed with a heat-resistant bottom
plate. The anode consisting of Ti or Pd is placed in an environment mainly
composed of H, D or T. D.c. is applied to the electrodes. D2 evolved by the
electrolysis is adsorbedinto the anode, and compacted among the elemental
lattices up to a level of 10**2, and when irradiated at the specific
condition, causes nuclear fusion producing (3)He and n”.
(Quoted from CA).
——————————————————————————
Tanaka M, Hattori S; Jpn. Kokai Tokkyo Koho JP 02,278,189, 19-Apr-89.
Cited in Chem. Abstr. 114:255489 (1991).
“Power generator and heater based on cold nuclear fusion”.
** “A power generator based on cold nuclear fusion comprises: (1) a device for
electrolysis of D2O; (2) a steam generator utilizing hot D2O; (3) a steam
turbine; (4) a steam condenser; (5) a pump to send H2O from the condenser to
the steam generator; (6) a means to burn D with O; (7) A steam heater; and (8)
a pump to send D2O from the steam generator and the steam heater to the
electrolysis device. A heater based on cold nuclear fusion comprises: (1) a
device for electrolysis of D2O; (2) a 1st means to heat a fluid with hot D2O
or D2O steam from the electrolysis device; (3) a means to burn D with O; (4) a
2nd means to heat the fluid or a 2nd fluid requiring higher temp., with the
D2O steam from the combustion means; and (5) a pump to send D2O from the 1st
and 2nd heating means to the electrolysis device” (Quoted from CA)
——————————————————————————
Taniguchi N, Gamo K, Niikura J, Adachi K;
Jpn. Kokai Tokkyo Koho JP 03,107,791, 21-Sep-89.
Cited in Chem. Abstr. 115:289486 (1991).
“Apparatus for cold nuclear fusion”.
** “The app. includes a cathode to adsorb (in crystal lattices or on the
surface) a H isotope(s), an anode from a metal, its oxide, or its hydroxide,
and an electrolyte contg. at least a H isotope. The electrodes are
film-shaped. Nuclear fusion is caused based on the electrolysis of the
electrolyte.” (Direct quote from CA).
——————————————————————————
Tokunaga H; Jpn. Kokai Tokkyo Koho JP 03 69,504, 04-Aug-89
Cited in Chem. Abstr. 115(20):217011 (1991).
“Preliminary treatment of hydrogen holder”.
** “Before adsorbing D (for cold nuclear fusion), a H holder (e.g. Pd) is
either heated or placed in vacuum. The process can ext. H from the H holder,
and adsorb highly pure D”. (Direct quote from CA).
——————————————————————————
Tosaka S; Jpn. Kokai Tokkyo Koho JP 03,33,687 13-Feb-91.
Cited in Chem. Abstr. 115:80703 (1991).
“Laminated electrode structure for cold fusion”.
** “The electrode consists of >= 1 Pd layer and >= 1 Pt layer via a continuous
pore-having porous elec. insulating layer. The Pd layers may be connected with
outer electrode layers. The electrode had wide Pd area for high-efficiency
cold fusion”. (Direct quote from CA)
——————————————————————————
Tsuda S, Nakamura N, Nakano S; Jpn. Kokai Tokkyo Koho JP 02,302,693, 17-May-89.
Cited in Chem. Abstr. 115:59221 (1991).
“Apparatus for cold nuclear fusion using solid bodies”.
** “The app. comprises a solid body contg. a large amt. of D, and a means to
supply excitation energy to the body. The solid body may be of C, Si, Ge, Sn
or Pb. The energy may be supplied by heating, elec.-field application,
electromagnetic-wave application, and/or supersound application”. (Quote from
CA).
——————————————————————————
Van Noorden PJ; Neth. Appl. NL 89 02,962, 01-Dec-89.
Cited in Chem. Abstr. 115(22):242244 (1991).
“Process and apparatus, and the use of the apparatus in electrolysis-nuclear
fusion”.
** “The process comprises the application of a magnetic field. The app.,
comprising an electrolytic cell equipped with 2 electrodes, addnl. comprises
means for generating a magnetic field in the electrolytic cell. The use of the
app. comprises filling the cell with an electrolyte comprising LiD dissolved
in heavy water. The use of the magnetic field increases the rate at which the
alleged cold fusion occurs in the D-loaded Pd electrodes. The electrodes (Pt
anodes and Pd and Ti cathodes) are connected to one elec. source, and the
means for generating the magnetic field, i.e., a cooled, hollow coil, is
connected to another elec. source, i.e. a battery”. (Direct quote from CA).
——————————————————————————
Van den Bogaert J; Belg. BE 1,002,781, 5-Jun-89.
Cited in Chem. Abstr. 116:12357 (1992).
“Energy production by nuclear fusion”.
** “In this process, in which a fusible material is absorbed in the crystal
lattice of a H-absorbing material that has a neg. elec. polarity, the fusible
material is, or is being, absorbed by a H-absorbing material in the form of
individual particles having a neg. electrostatic charge, after which the
polarity of the particles is changed from neg. to pos. This process is esp.
aimed at the controlled fusion of D, optionally mixed with T, in the crystal
lattice of the H-absorbing material, at high efficiency. The H-absorbing
material is a metal or alloy consisting of, or contg., >=1 element selected
from, Pd, Ti, Zr, V, Th, Nb, Ta, Ni and Fe. A turbulent aerosol or suspension
of colloidal or cryst. particles (av. particle size 0.1-0.001 mu) in D is
supplied in an upflow through a vertical quartz tube internally coated with an
elec. conductive coating or metal foil, e.g., Al or Cu, connected to the neg.
electrode of a d.c. source. A cooled pos. charged plate (anode) is located
above the tube, the polarity of the particles contg. the absorbed D is changed
upon contact with the anode, and the pos. ions, e.g. triton, formed by nuclear
fusion are then expelled from the Pd particles. The ions then flow downwards,
are neutralised at the cathode in the conical bottom of the reactor, and the
Pd particles are then sepd. from the aerosol in, e.g., a hydrocyclone. The Pd
particles may be elec. charged in an insulating oil, e.g. a silicone oil. The
heat generated by the fusion is removed by the heat transfer medium with which
the anode is cooled”. (Direct quote from CA).
——————————————————————————
Wada N; Jpn. Kokai Tokkyo Koho JP 03 160,395, 18-Nov-89
Cited in Chem. Abstr. 115(20):217014 (1991).
“Cold nuclear fusion in solids, and apparatus therefor”.
** “The process includes: (a) evaluating a reaction chamber; (b) activating a
solid body (e.g. Pd) which adsorbs a nuclear-fusion-causing gaseous material
(e.g. D); (c) supplying a predetd. amt. of the gaseous material; and (d)
allowing the body to adsorb the gaseous material close to satn. The surface of
the solid body may be cleaned in short time by glow discharge. An app. for the
process includes means to take out heat caused by the nuclear fusion”.
(Direct quote from CA).
——————————————————————————
Wada N; Jpn. Kokai Tokkyo Koho JP 03 160,396, 18-Nov-89
Cited in Chem. Abstr. 115(20):217013 (1991).
“Cold nuclear fusion in solids”.
** “The process includes: (1) allowing a solid to adsorb a nuclear-fusion-
-causing material (as an eutectic element) to almost satn.; and (2) exciting
the solid (by, e.g., elec. discharge) to cause sudden supersatn., which
creates high local concn. of the material”. (Direct quote from CA).
——————————————————————————
Wada N; Jpn. Kokai Tokkyo Koho JP 03 160,397, 18-Nov-89
Cited in Chem. Abstr. 115(20):217012 (1991).
“Forming elements by cold nuclear fusion in solids”.
** “The process includes: (a) evacuating a reaction chamber; (b) activating a
gas-adsorbing body (e.g. Pd) in the vacuum chamber; (c) supplying a
nuclear-fusion-causing gaseous material into the chamber; (d) allowing the
body to adsorb the gaseous material to satn.; (e) causing nuclear fusion by
the material adsorbed in the body; and (f) recovering the fusion product”.
(Direct quote from CA).
——————————————————————————
Wadsworth ME; Guruswamy S, Byrne JG, Li J;
Can. Pat. Appl. CA 2,023,216, 15-Aug-89.
Cited in Chem. Abstr. 115(10):100641 (1991).
“Method of preparing electrodes for use in heat-generating apparatus”.
** “An improved method of treating material for use in a heat-generating
method involving the absorption of H isotope into the material comprises
treating the material to substantially remove impurities in the surface region
and then depositing a thin film of a substance capable of absorbing on the
surface of the material. An optional addnl. treatment is to substantially
remove H already absorbed in the material, then heat the material in an atm.
of H isotope to percharge the material with the H isotope. A method of
producing electrode and method of enhancing absorption are also claimed”.
(Direct quote from CA).
——————————————————————————
Watanabe M, Takahashi A, Sumita K; Eur. Pat. Appl. EP 0 394 980, 31-Oct-90.
“Cold nuclear fusion apparatus”.
** First, a metal must be used that can absorb deuterium to high
concentrations; then, the deuterium’s harmonic oscillation energy in the metal
must be raised, preferably “by discharge of deuterium gas, optical irradiation
or supersonic energy”. In another embodiment, a pair of parallel metal plates
are subjected to pulsed voltages to induce gas charge and discharge, so as to
enhance cold fusion.
——————————————————————————
Yamaguchi E, Nishioka T; Jpn. Kokai Tokkyo Koho JP 03,20,696 19-Jun-89.
Cited in Chem. Abstr. 115:80700 (1991).
“Cold nuclear fusion”.
** “D ions are generated in vacuum (= 1 keV,
and projected at a fixed target contg. Pd, Ni, Ti, graphite and/or B nitride
so that nuclear fusion of D is caused at = 98% pure D2 plus a little
H2 and He. There are further details of heat exchange for the heat produced,
prevention of overheating of the magnets etc.
——————————————————————————
Yamazaki S; Eur. Pat. Appl. 0 393 463, 09.04.90
“Electrode for nuclear fusion and method for using the same”.
** This patent, as the previous patent of the same inventor (with others)
tries to provide reliable cold fusion. Here, instead of microwave resonance
with magnetism, a high frequency electric field (“500 KHz to 500 MHz, for
example 13.56 MHz”) produces the plasma, again beaming it at the Pd (or Ti)
target.
——————————————————————————
Yamazaki S, Miyanaga A, Takemura Y; Eur. Pat. Appl. 0 393 464, 09.04.90
“Apparatus for plasma nuclear fusion”.
** This patent appears to this abstractor to concern the same invention as
Pat. Appl. 0 393 461 of the same day, same inventors (+ one), but with a more
detailed and more carefully expressed description.
——————————————————————————
Yamazaki S, Miyanaga A, Takemura Y; Eur. Pat. Appl. 0 393 465, 09.04.90
“Method for producing plasma nuclear fusion”.
** This patent appears to this abstractor to concern the same invention as
Pat. Appl. 0 393 463 of the same day, same inventors (-2), but with a more
detailed and more carefully expressed description.
—————————————————————————
Yamazaki S; Euro. Pat. Appl. EP 0 392 324, 3-Apr-1990.
“Electrochemical nuclear fusion method”.
** Yamazaki (working for the Semiconductor Energy Laboratory Co., Japan)
starts by summarising what is wrong with the way Jones+(89) carry out
electrolytic cold fusion. The use of atmospheric pressure reduces the
probability of cold fusion; the reaction tends to occur at a localised section
of the electrode from the rise in temperature at that point; poisoning of the
cathode leads to side reactions and product decomposition, and the deuterium
ends up in the atmosphere, so the amount used for fusion is small; says Y.
The invention describes a pressurised cell, with the evolved gases (which are
kept separate) providing the pressure. A heat exchanger removes the excess
heat, thus keeping the cell temperature down. The cathode is either Pd or Ti,
the electrolyte being a mixture not unlike that of Jones+(89). Neutrons are
measured by a detector; nuclear fusion “is obviously accelerated when the
reaction at the cathode is implemented under high pressure”. Up to 200 atm
can be used. The neutrons released can cause subsequent nuclear fusion by
breeding, so there is some danger of an atomic explosion, which can be
prevented by controlling the extent of electrolysis. This is done by pulsing
the current, to a level not exceeding the critical nuclear fusion value.
Two example experiments showed that the neutron flux is proportional to the
pressure, and can be controlled by the duty ratio of the pulsed current.
Excess heat was also observed.
——————————————————————————
Yamazaki S; Euro. Pat. Appl. EP 0 392 325, 3-Apr-1990.
“Electrochemical nuclear fusion method”.
** This appears to be the same as EP 0 392 324, but phrased a little more
formally. Note that Chem. Abstracts has this under the name Shunpei, Yamazaki;
this is probably because the inventor’s name is given as “Shunpei Yamazaki”
here, as opposed to “Yamazaki, Shunpei” in the other patent application.
——————————————————————————
Yoshimura S; Jpn. Kokai Tokkyo Koho JP 03 82991, 25-Aug-89.
Cited in Chem. Abstr. 115(22): 242241 (1991).
“Energy converters based on electrochemical nuclear fusion”.
** “The app. contains an electrolytic cell comprising a cathode from an
alkali-metal-doped pi-electron-type compd., a noble-metal anode, heavy H2O,
and an electrolyte contg. a support material, where the cathode and anode are
immersed in the electrolyte”. (Direct quote from CA).
——————————————————————————

Boston Area Nightclubs: Compiled April 16, 1990)

BOSTON AREA NIGHTCLUBS
==========================
(compiled – 4/16/90)

CLUB LOCATION TELEPHONE

Avenue C 5 Boylston Pl. Boston 617-423-3832
Axis 13 Lansdowne St. Boston 617-262-2437
Bunratty’s 186 Harvard Ave. Allston 617-254-9820
The Cage 161 Brighton Ave. Allston 617-787-8959
Cantares 13 Springfield St. Cambridge 617-547-6300
Catch A Rising Star 30 J.F.K. St. Cambridge 617-661-9887
The Channel 25 Necco St. Boston 617-451-1050
Citi 15 Lansdowne St. Boston 617-262-2425
Club III 608 Somerville Ave. Somerville 617-623-6957
Club M 137 Main St. Cambridge 617-547-1887
Club M-80 969 Commonwealth Ave. Boston 617-254-2054
Commonwealth Brewing Co. 138 Portland St. Boston 617-523-8383
Copperfield’s 98 Brookline Ave. Boston 617-247-8605
Deringer’s 45 Emerson Ave. Brockton 508-583-2710
Ed Burke’s 808 Huntington Ave. Boston 617-232-2191
Edible Rex 251 Old Concord Rd. Billerica 508-667-6393
Green Street Station 131 Green St. Jamaica Plain 617-522-0792
Grog 13 Middle St. Newburyport 508-465-8008
Ground Zero 512 Mass. Ave. Cambridge 617-492-9545
Grover’s 392 Cabot St. Beverly 508-927-7121
G.T.’s City Limits 225 Blossom St. Lynn 617-592-1836
Harper’s Ferry 158 Brighton Ave. Allston 617-254-9743
Hendi’s Lounge 1270 Weston St. Lowell 508-937-0402
Hub Club 533 Washington St. Boston 617-451-6999
Jazz Haute Cafe 148 Rantoul St. Beverly 508-922-2208
Johnny D’s 17 Holland St. Somerville 617-776-9667
The Jumbo 1133 Broadway Somerville 617-623-7680
Lai Lai Restaurant 700 Mass. Ave. Cambridge 617-876-7000
Man Ray 21 Brookline St. Cambridge 617-864-0400
Meaghan’s 93A Front St. Scituate 617-545-1313
Middle East Restaurant 472 Mass. Ave. Cambridge 617-492-8151
Molly’s 1651 Brighton Ave. Allston 617-783-2900
Necco Place 1 Necco St. Boston 617-426-7744
Nick’s Comedy Stop 100 Warrenton St. Boston 617-482-0930
Nightstage 823 Main St. Cambridge 617-497-8200
Nostalgia 797 Wollaston Beach Rd. Quincy 617-479-8989
Paradise 967 Commonwealth Ave. Boston 617-254-2052
Passim 47 Palmer St. Cambridge 617-492-7679
Pearl Street 10 Pearl St. Northampton 413-584-7771
The Plough & Stars 912 Mass. Ave. Cambridge 617-492-9653
Rat 528 Commonwealth Ave. Boston 617-536-2750
Regattabar 1 Bennett St. Cambridge 617-661-5000
Ryles 212 Hampshire St. Cambridge 617-876-9330
Scottie’s Roadhouse Route 1 Rowley 508-948-2241
Sir Franco 321 Somerville Ave. Somerville 617-623-3050
Sit ‘n Bull 163 Main St. Millis 508-879-7232
Stitches 835 Beacon St. Boston 617-424-6995
The Tam 1648 Beacon St. Brookline 617-277-0982
Tom Caruso’s 1050 Revere Beach Pkwy. Chelsea 617-889-4911
T.T. The Bears 10 Brookline St. Cambridge 617-492-0082
Union Street 107 Union St. Newton Centre 617-964-6684
Venus De Milo 7 Lansdowne St. Boston 617-491-9595
Western Front 343 Western Ave. Cambridge 617-492-7772
Willow Jazz Club 699 Broadway Somerville 617-421-9333
Winnie’s Pub 1691 Tremont St. Boston 617-566-8651
Zanzibar 1 Boylston Pl. Boston 617-451-1955
Zoots 228 Tremont St. Boston 617-451-5997

===================== END OF FILE ===================================

This list comes to you courtesy of:

R N’R
Boston, Ma.
(617) 267-2332

Specializing in Rock N’ Roll information and over 90 online games!
Membership is FREE!