Category: Other Nonsense & Spam

The Lotus Eclair: Too Fat To Race

Lotus Eclair – Too Fat To Race

Most Lotus enthusiasts are aware that the 1970’s Elite
took its name from the original Elite of the late 1950’s, but
not many realise that the Eclat derives it’s name from a much
earlier model – the Lotus Eclair.

The exact origin of this tasteful little sports racer is
unknown. Thought to originate from the Betty Crocker design
school, several rather advanced features were included: The
yeast-west mounted engine, rack and rolling-pin steering and
coil-over choc absorbers made the Eclair a very popular little
number in its day.

The road version of the car had a beautifully flexible
little ohc (over-head cream) 600 mil engine developing a
whopping 215 calories, while the works race version had double
overhead cream and an even greater 250 calories (one problem
being that it tended to run a bit rich.)

One particularly notable example was quite successfully
raced by the great Gordon Bleu. He put alcohol in the mixture
for an even more potent result, but it also made the vehicle
less predictable. (A large squirt away from the line and the
wee Lotus simply did donuts.) Bleu’s first attempt at racing
was abysmal – well into the race he overcooked it and had a
massive melt-down. He was lucky to escape with only burnt
fingers.

The second time out, however, things began to go right.
It was the Meal Miglia and weather conditions were not favourable
(the Lotus may have been superb in the dry, but in the rain it
handled like a wet sponge), but in spite of severe icing Bleu
fought on and successfully creamed the opposition.

Unfortunately from there it was all down-hill. Gordon
desserted Team Lotus and claimed he could privately eat anything
that would care to take him on. This he did, and was several
times disqualified for breaking weight restrictions.

With the demise of Gordon Bleu’s racing career the little
Eclair, sadly, was doomed and the model that we photographed is
thought to be the only one left. (The rest having decayed or
been eaten away.) Restoration is not really a practical
proposition, so the only hope is that another well preserved
specimen may surface.

Until then we are very grateful that we were able to get
a taste of such a car, magnificent with its cream stripe and
real chocolate upholstery.

Technical Data:
Make: Lotus Price: $3.95
Model: Eclair Engine: SOHC 600 mil
Body type: Choux Monocoque Output: 215 calories
Steering: Rack & Rolling Pin
Suspension: Gas Shocks at rear (caused by too much alcohol)
Max Speed: Over 200 mph (Air New Zealand in flight catering)
Standing 1/4: 1 min 15 secs (with fruit & causing indigestion)
Sitting 1/4: 2 min 45 secs (Ahh – much more comfortable, thanks)
0-60 mph: 6.7 secs (Balanced on lap whilst driving a Europa)

Phil Quagg.

—————————————————————————–
Donated by Phil Quagg for the library of:
The Banana Republic BBS & El Presidente (Sysop)… Thanks Phil!
—————————————————————————–

Dream Interpretation And Symbology By Raymond Buckland

Chat file opened 07/26/89 17:20:42
———————————-

DREAM INTERPRETATION AND SYMBOLOGY

Raymond Buckland
Typed in for PAN
by Lewis
(508)/795-7628

You have probably spent countless hours of trying unsuccessfully to
decipher the seemingly senseless riddles of your dreams. You are puzzled when
a dream of attending Aunt Minnie’s funeral proves not in the least prophetic
as, ten years later, Aunt Minnie is still going strong. You’re totally
baffled at intimate exchanges with people you wouldn’t normally go near. You
are amazed at dreamaing of doing things that are physically impossible in your
everyday life. You end up with total frustration in youur attempts to make
any sense of the strange goings-on in your elusive dreams. Yet you still feel
that somewhere there must be an answer… but where? What is the key?

As an element of the Universal Consciousness your super-conscious
awareness is totally versed in Universal Symbolism. Since the super-conscious
mind tends to speak in its own language, your dreams can be expected tocontain
some of this language of Universal Symbols. But even though it has its own
language the super-conscious mind is aware that you will respond best to those
symbolds with which your conscious mind is most familar. Therefore, it will
use terms and symbols from your everyday life. Oftimes it will use the
symbolism from recent events that are fresh in your memory. These impressions
from your personal physical life are called Personal Symbolism.

Universal Symbolism includes those things that remain true for all
humankind throughout the ages. Inclued are colors, numbers, form and sexual
ideniity (ie: male and female) They come from the super-consciousness and
therefore are timeless. A case in point is transportation–the universal
symbol of spiritual advancement. As material technology has advanced, the
application of symbology has kept pace. So transportation may take one of the
modern forms of conveyance, such as rockets, planes, steamships, trains or
automobiles, or one of the timeless modes of riding on the back of and animal
or walking.

It would be impossible to list all the universal symbols here but a
general sampling is given in the file titled “universal symbols”

INTERPRETING YOUR DREAMS

The eminent psychologist arl Jung once stated: “No dream symbol can be
separated froom the individual who dreams it.” Keep this thought in mind as
you study the following concepts. Notice that almost all of the universal
symbols have various shades of meanings. The interpretation of such symbols
can only be done by YOU, the dreamer, through consideradition of your own
feelings towards the dream, the symbol and your own intuition.

The dream is a comples and almost limitless combination of symbols. it
can be analytical, judgemental or therapeutic in nnature. The majority of
dreams are analytical. That is, they provide a means for the higher self to
comment on your everyday life and your spiritual development. It will analyze
how you aare relating to your enviorment and your fellow man and woman. A
small percentage of your dreams are of a prophetic nature, to warn and prepare
you for future eveents (the percentage of prophetic dreaams vary greatly from
one personn to another but it is estimated that perhaps one dream in twenty
concerns the future) Don’t imediately jump to the conclusion that what you
dream about brother Bob, or cousin Mary is an indication of something that is
about to happen to him or her. It may be but far more likely is not. Along
with this incidently it should be noted that invariably the pricciiple
characters in your dream are actually representing YOU–or some aspect of you.
So when you dream of your sister Suzy arguing with you about something, you
are actually seeing a representation of an inner conflict+– one part of you
at odds with another part (perhaps your male aspect agaiinst your female
aspect) with the image of sister Suzy being used simply aas a recognizable
form that you can accept.

Again depending on the individual, the number of therapeutic dreams
varies from person to person. It simply deepends on the need of the
individual. If a person has a strong feeling of inferority, their therapy may
be to dream of being a powerful, capable and attractiive person. In this way,
the Higher Self is compensating for the dreamers psychological lack. If a
person has a strong feeling of superiority they might be taken down a peg or
two by a dream that depicts him or her as a weak defenseless and inferior
person. Thus the dream often attempts to overcome character defects.

Prophetic dreams will only occur when the indivual needs to be prepared
for an event in the future. Even though you may not consciously remember it,
the dream prepares you, subconsciously for the shock that it to come. Not all
precognitive dreams are of signigcant events: some may even appear quite
trival. But they are important just the same. They program and prepare the
subconscious and conscious minds over a period of time, to deal with the
future events and situations in a proper manner.

REMEMBERING DREAMS

The obvious first step in dream interpretation is to remember them. If
you have trouble in remembering your dreams, the probable reason is that your
have ignored them for so long that the subconscious no longer tries to bring
them to your conscious memory. If this is the case, you must program yourself
to remember. This can be done through affirmation. During meditation annd
just befopore going to sleep tell yourself very firmly, “I WILL REMEMBER MY
DREAMS”, Do this three times. Release the command. Then again tell yourself
very firmly three times “I WILL REMEMBER MY DREAMS”. Release the thought.
Then for the third timerepeat the three commands “I WILL REMEMBER MY DREAMS”.
So you instruct yourself 9 times in all.

The second step in interpretation is recording the dreams. Place a pad
and a penciil by your bed for this purpose. This very act, in itself,
reinforces the command to remember. Whenyou first awaken–evenn before that
eye-opening cup of coffee–jot down notes on what you remember. Don’t worry
about trying to get everything in perfect order at this point. The important
thing is to capture what you can, even if you only have time to make a few
brief nots. You will find that later on you will be able to recall more of
the details of the dream. Then write down all the details that you can
remember. Describe the people, their identities, occupations,clothes, the
state of their emotions and their activities. Note your attitude towards them
and their attiudes towards you. Describe everything you see, feel and hear.
Pay special attention to the numbers of things and their colors. It is all
important. Then try to arrange your notes in the order in which they were
dreamed.

Once you have completed your notes and organized them you can begin the
task of interpretation. First of all, examine the dream to see if it fits any
of the events of the preceding day. This will explain a few of your dreams.
If this test fails then you must determine whether the dream is literal or
symbolic.
A LITERAL dream is one in which the main dream character or image is a
real person or thing in your life or on your mind at the time. If the literal
interpretation makes sense, you may have found the key. When the literal
interpretatioon fails to make sense the dream is obviously symbolic.

A SYMBOLIC dream is one in which the dream character and images cannot be
taken literally as a real person or thing. Then the image is that of an aspect
of you, the dreamer. Then the ancient wisdom of the Universal Symbols should
be applied.

As you first begin to work with symbology, you may still have diffculty
unraveling the tangled threads; you may only decipher part of the mystery.
Don’t worry about this for it is quite natural in the beginning. Continue to
affirm that you will remember. Continue to faithfully record all of the
details that you can. As you do you will find that the symbols will gradually
begin to clear as you and your higher self develop a dialogue that you can
consciously understand. The hidden symbol in one dream will suddenly be
revealed in another. When this begiins to happen yopou should start to
compile your own personal Dream Dictionary. Take a notebook that is not used
for any other purpose and divide it into alphabetical sections. As you
discover the meanings of new symbols, write them down. Soon you will find
that youu have an extensive set of personal symbols which will permit nearly
total interpretation of all your dreams.

PERSONAL SYMBOLS

Many published books on dream interpretation provide the reader with
hundreds of symbols and simplified interpretation. Other than listings of
Universal symbols, such books are totally misleading. Each of us has his or
her own unique personal symbology, hased on our experiences in this life. For
example, two eldery ladies dream of a cat. One of the ladies has lived a
spinster life shared with a successionof cats that she has loved and pampered.
The second lady has a very traumatic memory of a wild cat which scratched
her severly during her childhood. It is obvious that a single
interpretationof “cat” will not satisfy moth dreamers. To the first lady, the
cat is a warm, loving, companion. To the second, the cat is an evil,
dangerous creature that brings pain. Therefore, it is neccessary for the
dreamer to analyze the symbol from the standpoint of his or her own personal
feelings.

THE REPETITIVE DREAM

Many dreams are repeated in order to emphasize their meaning or to insure
that they are noticed. This may or may notbe obvious to thedreamer. Usually
dreams come in a series of three. Sometimes their symbology will be quite
similar. At other times you may record three dreams of entirely different
symbology but upon their interpretation find that the underlying theme for
eaach is almost identical. In either case the source of the dream is
attempting to insure that the message gets through and is understood. A dream
repeated over days, weeks or perhaps months, indicates something that you have
not taken action on. Oncce you understand and respond to, the dream, through
action or a change in attiude, the dream will cease to occur.

Generally the recurring dream is one of the following:
A) Precognitive or prophetic
B) Compensation for an improper attiude
C) The result of a traumatic incident which has left a negative
impression.

GROUP DREAMS

Among the more spiritually advanced is an occasional tendency to actively
share or participate in a dream with someone else. In these cases, the two
people ar very much in tune with one another on a psychic of emotional level.
It does not mean that they are “soul mates” destined for one another. Rather
they are in harmony at some levels in this particular time of their lives and
are undergoing similar adjustments on the spiritual plane. Interpretation of
the dream should be done the same as with an ordinary dream but with the other
oerson in the dream interpreted as an aspect of yourself.

DREAMS versus OUT OF BODY EXPERIENCES

The memory of out of body experiences (OOBE’s)has the same elusive
quality as the dream. Consequently it is often difficult to separate the two.
One marked difference is the sensation of awareness. In a dream. the visual
awareness of theself is in one direction only. As with physical sight, you
“see” only what is in front of you. in the OOBE, however your awareness is
all-encompassing. You see not only what is in front but also what is behind,
above, below and on the sides–all at the same time. Do not attempt to
interpret an OOBE as you would a dream.

What Does DOD Mean?

Newsgroups: rec.motorcycles
From: jrwaters@eos.ncsu.edu (JACK ROGERS WATERS)
Subject: Re: What does DoD mean?
Message-ID:
Organization: North Carolina State University, Project Eos
Date: Mon, 22 Feb 1993 05:14:25 GMT
Lines: 841

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~ Make no Mistake, I am the Red Fishnet. ~
~ DoD#1919 ~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This is a periodic posting intended to answer the Frequently Asked
Question: What is the DoD? It is posted the first of each month, with
an expiration time of over a month. Thus, unless your site’s news
software is ill-mannered, this posting should always be available.
This WitDoDFAQ is crossposted to all four rec.motorcycles groups in an
attempt to catch most new users, and followups are directed to
rec.motorcycles.

Last changed 3-Nov-92 to add a section containing updates to some stats
and the List Of Rides, credit to creators of various DoD trinkets, and
some minor formatting changes. Also the first attempt at automating the
posting of this FAQ. A version number has also been added. Since all
previous version were before recorded history, I declare this to be:

VERSION 1.00

This collection was originally assembled by Lissa Shoun, from the
original postings. With Lissa’s permission, I have usurped the title of
KotWitDoDFAQ. Any corrections, additions, bribes, etc. should be aimed at
blgardne@javelin.sim.es.com.

————————————————————————

Contents:
How do I get a DoD number? by Blaine Gardner DoD #46
DoD “Road Rider” article by Bruce Tanner DoD #161
What is the DoD? by John Sloan DoD #11
The DoD Logo by Chuck Rogers DoD #3
The DoD (this started it all) by The Denizen of Doom DoD #1
The DoD Anthem by Jonathan Quist DoD #94
Why you have to be killed by Blaine Gardner DoD #46
The rec.moto.photo.archive courtesy of Bruce Tanner DoD #161
Patches? What patches? by Blaine Gardner DoD #46
Letter from the AMA museum by Jim Rogers, Director DoD #395
The DoD Rules by consensus
Other rec.moto resources by various Keepers DoD #misc
The rec.moto.reviews.archive courtesy of Loki Jorgenson DoD #1210
Updated stats & rides info by Ed Green (DoD #111) and others

————————————————————————

If the most Frequently Asked Question in rec.motorcycles is “What is the
DoD?”, then the second most Frequently Asked Question must be “How do I
get a DoD number?” That is as simple as asking the Keeper of the List
(KotL, accept no substitue Keepers) for a number. If you’re feeling
creative, and your favorite number hasn’t been taken already, you can
make a request, subject to KotL approval. (Warning, non-numeric, non-
base-10 number requests are likely to earn a flame from the KotL. Not
that you won’t get it, but you will pay for it.)

By now you’re probably asking “So who’s the KotL already?”. Well, as
John Sloan notes below, that’s about the only real “secret” left around
here, but a few (un)subtle hints can be divulged. First, it is not myself,
nor anyone mentioned by name in this posting (maybe :-), though John was
the original KotL. Second, in keeping with the true spirit of Unix, the
KotL’s first name is only two letters long, and can be spelled entirely
with hexadecimal characters. (2.5, the KotL shares his name with a line-
oriented text utility.) Third, he has occasionally been seen posting
messages bestowing new DoD numbers (mostly to boneheads with bad e-mail
addresses). Fourth, there is reason to suspect the KotL of being a
Dead-Head.

(PS: While John mentions below that net access and a bike are the only
requirements for DoD membership, that’s not strictly true these days, as
there are a number of Denizens who lack one or both.)

Blaine (Dances With Bikers) Gardner blgardne@javelin.sim.es.com

————————————————————————

“Denizens of Doom”, by Bruce Tanner (DoD 0161)

[Road Rider, August 1991, reprinted with Bruce’s permission]

There is a group of motorcyclists that gets together and does all the normal
things that a bunch of bikers do. They discuss motorcycles and
motorcycling, beverages, cleaning fluids, baklavah, balaclava, caltrops,
helmets, anti-fog shields, spine protectors, aerodynamics, three-angle valve
seats, bird hits, deer whistles, good restaurants, racing philosophy,
traffic laws, tickets, corrosion control, personalities, puns, double
entendres, culture, absence of culture, first rides and friendship. They
argue with each other and plan rides together.

The difference between this group and your local motorcycle club is that,
although they get together just about everyday, most have never seen each
other face to face. The members of this group live all over the known world
and communicate with each other electronically via computer.

The computers range from laptops to multi-million dollar computer centers;
the people range from college and university students to high-tech industry
professionals to public-access electronic bulletin-board users. Currently,
rec.motorcycles (pronounced “wreck-dot-motorcycles,” it’s the file name for
the group’s primary on-line “meeting place”) carries about 2250 articles per
month; it is read by an estimated 29,000 people. Most of the frequent
posters belong to a motorcycle club, the Denizens of Doom, usually referred
to as the DoD.

The DoD started when motorcyclist John R. Nickerson wrote a couple of
parodies designed to poke fun at motorcycle stereotypes. Fellow computer
enthusiast Bruce Robinson posted these articles under the pen name, “Denizen
of Doom.” A while later Chuck Rogers signed off as DoD nr. 0003 Keeper of
the Flame. Bruce was then designated DoD nr. 0002, retroactively and, of
course, Nickerson, the originator of the parodies, was given DoD nr. 0001.

The idea of a motorcycle club with no organization, no meetings and no rules
appealed to many, so John Sloan — DoD nr. 0011 — became Keeper of the
List, issuing DoD numbers to anyone who wanted one. To date there have been
almost 400 memberships issued to people all over the United States and
Canada, as well as Australia, New Zealand, the United Kingdom, France,
Germany, Norway and Finland.

Keeper of the List Sloan eventually designed a club patch. The initial run
of 300 patches sold out immediately. The profits from this went to the
American Motorcycle Heritage Foundation. Another AMHF fund raiser —
selling Denizens of Doom pins to members — was started by Arnie Skurow a
few months later. Again, the project was successful and the profits were
donated to the foundation. So far, the Denizens have contributed over $1500
to the AMA museum. A plaque in the name of the Denizens of Doom now hangs
in the Motorcycle Heritage Museum.

As often as possible, the DoD’ers crawl out from behind their CRTs and go
riding together. It turns out that the two largest concentrations of
DoD’ers are centered near Denver/Boulder, Colorado, and in California’s
“Silicon Valley.” Consequently, two major events are the annual Assault on
Rollins Pass in Colorado, and the Northern versus Southern California
“Joust.”

The Ride-and-Feed is a bike trip over Rollins Pass, followed by a big
barbecue dinner. The concept for the Joust is to have riders from Northern
California ride south; riders from Southern California to ride north,
meeting at a predesignated site somewhere in the middle. An additional plan
for 1991 is to hold an official Denizens of Doom homecoming in conjunction
with the AMA heritage homecoming in Columbus, Ohio, in July.

Though it’s a safe bet the the Denizens of Doom and their collective
communications hub, rec.motorcycles, will not replace the more traditional
motorcycle organizations, for those who prowl the electronic pathways in
search of two-wheeled camaraderie, it’s a great way for kindred spirits to
get together. Long may they flame.

“Live to Flame — Flame to Live” [centerbar]

This official motto of the Denizens of Doom refers to the ease with which
you can gratuitously insult someone electronically, when you would not do
anything like that face to face. These insults are known as “flames”;
issuing them is called “flaming.” Flames often start when a member
disagrees with something another member has posted over the network. A
typical, sophisticated, intelligent form of calm, reasoned rebuttal would be
something like: “What an incredibly stupid statement, you Spandex-clad
poseur!” This will guarantee that five other people will reply in defense
of the original poster, describing just what they think of you, your riding
ability and your cat.

————————————————————————

_The Denizens of Doom: The Saga Unfolds_

by John Sloan DoD #0011

Periodically the question “What is DoD?” is raised. This is one of
those questions in the same class as “Why is the sky blue?”, “If there
is a God, why is there so much suffering in the world?” and “Why do
women inevitably tell you that you’re such a nice guy just before they
dump you?”, the kinds of questions steeped in mysticism, tradition,
and philosophy, questions that have inspired research and discussion
by philosophers in locker rooms, motorcycle service bays, and in the
halls of academe for generations.

A long, long time ago (in computer time, where anything over a few
minutes is an eternity and the halting problem really is a problem) on
a computer far, far away on the net (topologically speaking; two
machines in the same room in Atlanta might route mail to one another
via a system in Chicago), a chap who wished to remain anonymous (but
who was eventually assigned the DoD membership #1) wrote a satire of
the various personalities and flame wars of rec.motorcycles, and
signed it “The Denizen of Doom”. Not wishing to identify himself, he
asked that stalwart individual who would in the fullness of time
become DoD #2 to post it for him. DoD #2, not really giving a whit
about what other people thought and generally being a right thinking
individual, did so. Flaming and other amusements followed.

He who would become the holder of DoD membership #3 thought this was
the funniest thing he’d seen in a while (being the sort that is pretty
easily amused), so he claimed membership in the Denizens of Doom
Motorcycle Club, and started signing his postings with his membership
number.

Perhaps readers of rec.motorcycles were struck with the vision of a
motorcycle club with no dues, no rules, no restrictions as to brand or
make or model or national origin of motorcycle, a club organized
electronically. It may well be that readers were yearning to become a
part of something that would provide them with a greater identity, a
gestalt personality, something in which the whole was greater than the
sum of its parts. It could also be that we’re all computer nerds who
wear black socks and sneakers and pocket protectors, who just happen
to also love taking risks on machines with awesome power to weight
ratios, social outcasts who saw a clique that would finally be open
minded enough to accept us as members.

In a clear case of self fulfilling prophesy, The Denizens of Doom
Motorcycle Club was born. A club in which the majority of members have
never met one another face to face (and perhaps like it that way), yet
feel that they know one another pretty well (or well enough given some
of the electronic personalities in the newsgroup). A club organized
and run (in the loosest sense of the word) by volunteers through the
network via electronic news and mail, with a membership/mailing list
(often used to organize group rides amongst members who live in the
same region), a motto, a logo, a series of photo albums circulating
around the country (organized by DoD #9), club patches (organized by
#11), and even an MTV-style music video (produced by #47 and
distributed on VHS by #18)!

Where will it end? Who knows? Will the DoD start sanctioning races,
placing limits on the memory and clock rate of the on-board engine
management computers? Will the DoD organize poker runs where each
participant collects a hand of hardware and software reference cards?
Will the DoD have a rally in which the attendees demand a terminal
room and at least a 386-sized UNIX system? Only time will tell.

The DoD has no dues, no rules, and no requirements other than net
access and a love for motorcycles. To become a member, one need only
ask (although we will admit that who you must ask is one of the few
really good club secrets). New members will receive via email a
membership number and the latest copy of the membership list, which
includes name, state, and email address.

The Denizens of Doom Motorcycle Club will live forever (or at least
until next year when we may decided to change the name).

Live to Flame – Flame to Live

————————————————————————

The DoD daemon as seen on the patches, pins, etc. by

Chuck Rogers, car377@druhi.att.com, DoD #0003

🙁 DoD )-:
🙁 x __ __ x )-:
🙁 x / / x )-:
🙁 x / / ——/- x )-:
🙁 L | / / / | F )-:
🙁 I | / / | L )-:
🙁 V / __ / __ / A )-:
🙁 E / / / M )-:
🙁 | | / | | E )-:
🙁 T | | . | _ | . | | )-:
🙁 O | ___// \___/ | T )-:
🙁 _/ / O )-:
🙁 F ___ ___/ )-:
🙁 L / / L )-:
🙁 A vvvvv / I )-:
🙁 M | ( ) | V )-:
🙁 E | ^^^^^ | E )-:
🙁 x _______/ x )-:
🙁 x x )-:
🙁 x rec.motorcycles x )-:
🙁 USENET )-:

————————————————————————

The DoD

by the Denizen of Doom DoD #1

Welcome one and all to the flamingest, most wonderfullest newsgroup of
all time: wreck.mudder-disciples or is it reak.mudder-disciples? The
Names have been changes to protect the Guilty (riders) and Innocent
(the bikes) alike. If you think you recognize a contorted version of
your name, you don’t. It’s just your guilt complex working against
you. Read ’em and weep.

We tune in on a conversation between some of our heros. Terrible
Barbarian is extolling the virtues of his Hopalonga Puff-a-cane to
Reverend Muck Mudgers and Stompin Fueling-Injection:

Terrible: This Hopalonga is the greatest… Beats BMWs dead!!

Muck: I don’t mean to preach, Terrible, but lighten up on the BMW
crowd eh? I mean like I like riding my Yuka-yuka Fudgeo-Jammer
11 but what the heck.

Stompin: No way, the BMW is it, complete, that’s all man.

Terrible: Nahhhh, you’re sounding like Heritick Ratatnack! Hey, at
least he is selling his BMW and uses a Hopalonga Intercorruptor!
Not as good as a Puff-a-cane, should have been called a
Woosh-a-stream.

Stompin: You mean Wee-Stream.

Terrible: Waddya going to do? Call in reinforcements???

Stompin: Yehh man. Here comes Arlow Scarecrow and High Tech. Let’s see
what they say, eh?

Muck: Now men, let’s try to be civil about this.

High Tech: Hi, I’m a 9 and the BMW is the greatest.

Arlow: Other than my B.T. I love my BMW!

Terrible: B.T.???

Arlow: Burley Thumpison, the greatest all American ride you can own.

Muck: Ahhh, look, you’re making Terrible gag.

Terrible: What does BMW stand for anyway???

Muck, Arlow, High: Beats Me, Wilhelm.

Terrible: Actually, my name is Terrible. Hmmm, I don’t know either.

Muck: Say, here comes Chunky Bear.

Chunky: Hey, Hey, Hey! Smarter than your average bear!

Terrible: Hey, didn’t you drop your BMW???

Chunky: All right eh, a little BooBoo, but I left him behind. I mean
even Villy Ogle flamed me for that!

Muck: It’s okay, we all makes mistakes.

Out of the blue the West coasters arrive, led by Tread Orange with
Dill Snorkssy, Heritick Ratatnack, Buck Garnish, Snob Rasseller and
the perenial favorite: Hooter Boobin Brush!

Heritick: Heya Terrible, how’s yer front to back bias?

Terrible: Not bad, sold yer BMW?

Heritick: Nahhh.

Hooter: Hoot, Hoot.

Buck: Nice tree Hooter, how’d ya get up there?

Hooter: Carbujectors from Hell!!!

Muck: What’s a carbujector?

Hooter: Well, it ain’t made of alumican!!! Made by Tilloslert!!

Muck: Ahh, come on down, we aren’t going to flame ya, honest!!

Dill: Well, where do we race?

Snob: You know, Chunky, we know about about your drop and well, don’t
ride!

Muck: No! No! Quiet!

Tread: BMW’s are the greatest in my supreme level headed opinion.
They even have luggage made by Sourkraut!

High: My 9 too!

Terrible, Heritick, Dill, Buck: Nahhhhh!!!

Stompin, Tread, High, Chunky, Snob: Yesss Yessssss!!!

Before this issue could be resolved the Hopalonga crew called up more
cohorts from the local area including Polyanna Stirrup and the
infamous Booster Robiksen on his Cavortin!

Polyanna: Well, men, the real bikers use stirrups on their bikes like
I use on my Hopalonga Evening-Bird Special. Helpful for getting
it up on the ole ventral stand!

Terrible: Hopalonga’s are great like Polyanna says and Yuka-Yuka’s and
Sumarikis and Kersnapis are good too!

Booster: I hate Cavortin.

All: WE KNOW, WE KNOW.

Booster: I love Cavortin.

All: WE KNOW WE KNOW.

Muck: Well, what about Mucho Guzlers and Lepurras?

Snob, Tread: Nawwwwww.

Muck: What about a Tridump?

Terrible: Isn’t that a chewing gum?

Muck: Auggggg, Waddda about a Pluck-a-kity?

Heritick: Heyya Muck, you tryin’ to call up the demon rider himself?

Muck: No, no. There is more to Mudder-Disciples than arguing about make.

Two more riders zoom in, in the form of Pill Turret and Phalanx Lifter.
Pill: Out with dorsal stands and ventral stands forever.

Phalanx: Hey, I don’t know about that.

And Now even more west coasters pour in.
Road O’Noblin: Hopalonga’s are the greatest!

Maulled Beerstein: May you sit on a bikejector!

Suddenly more people arrived from the great dark nurth:
Kite Lanolin: Hey, BMW’s are great, men.

Robo-Nickie: I prefer motorcycle to robot transformers, personally.

More riders from the west coast come into the discussion:
Aviator Sourgas: Get a Burley-Thumpison with a belted-rigged frame.

Guess Gasket: Go with a BMW or Burley-Thumpison.

With a roar and a screech the latest mudder-disciple thundered in. It
was none other that Clean Bikata on her Hopalonga CaBammerXorn.
Clean: Like look, Hopalonga are it but only CaBammerXorns.

Muck: Why??

Clean: Well, like it’s gotta be a 6-banger or nothin.

Muck: But I only have a 4-banger.

Clean: No GOOD!

Chunky: Sob, some of us only have 2-bangers!

Clean: Inferior!

Stompin: Hey, look, here’s proof BMW’s are better. The Bimmer-Boys
burst into song: (singing) Beemer Babe, Beemer Babe give me a
thrill…

Road, Terrible, Polyanna, Maulled, Dill etc.: Wadddoes BMW stand for?

Heritick, Stompin, Snob, Chunky, Tread, Kite, High, Arlow: BEAT’S ME,
WILHEM!

Road, Terrible, Polyanna, Maulled, Dill etc.: Oh, don’t you mean BMW?

And so the ensuing argument goes until the skies clouded over and the
thunder roared and the Greatest Mudder-Disciple (G.M.D.) of them all
boomed out.
G.M.D.: Enough of your bickering! You are doomed to riding
Bigot & Suction powered mini-trikes for your childish actions.

All: no, No, NO!!! Puhlease.

Does this mean that all of the wreck.mudder-disciples will be riding
mini-trikes? Are our arguing heros doomed? Tune in next week for the
next gut wretching episode of “The Yearning and Riderless” with its
ever increasing cast of characters. Where all technical problems will
be flamed over until well done. Next week’s episode will answer the
question of: “To Helmet or Not to Helmet” will be aired, this is heady
material and viewer discretion is advised.

————————————————————————

Script for the Denizens of Doom Anthem Video

by Jonathan E. Quist DoD #94

[Scene: A sterile engineering office. A lone figure, whom we’ll call
Chuck, stands by a printer output bin, wearing a white CDC lab coat,
with 5 mechanical pencils in a pocket protector.]

(editor’s note: For some reason a great deal of amusement was had at
the First Annual DoD Uni-Coastal Ironhorse Ride & Joust by denizens
referring to each other as “Chuck”. I guess you had to be there. I
wasn’t.)

Chuck: I didn’t want to be a Software Systems Analyst,
cow-towing to the whims of a machine, and saying yessir, nosir,
may-I-have-another-sir. My mother made me do it. I wanted
to live a man’s life,
[Music slowly builds in background]
riding Nortons and Triumphs through the highest mountain passes
and the deepest valleys,
living the life of a Motorcyclist;
doing donuts and evading the police;
terrorizing old ladies and raping small children;
eating small dogs for tea (and large dogs for dinner). In short,

I Want to be A Denizen!

[Chuck rips off his lab coat, revealing black leather jacket (with
fringe), boots, and cap. Scene simultaneously changes to the top of
an obviously assaulted Rollins Pass. A small throng of Hell’s Angels
sit on their Harleys in the near background, gunning their engines,
showering lookers-on with nails as they turn donuts, and leaking oil
on the tarmac. Chuck is standing in front of a heavily chromed Fat
Boy.]

Chuck [Sings to the tune of “The Lumberjack Song”]:

I’m a Denizen and I’m okay,
I flame all night and I ride all day.

[Hell’s Angels Echo Chorus, surprisingly heavy on tenors]:
He’s a Denizen and he’s okay,
He flames all night and he rides all day.

I ride my bike;
I eat my lunch;
I go to the lavat’ry.
On Wednesdays I ride Skyline,
Running children down with glee.

[Chorus]:
He rides his bike;
He eats his lunch;
He goes to the lavat’ry.
On Wednesdays he rides Skyline,
Running children down with glee.

[Chorus refrain]:
‘Cause He’s a Denizen…

I ride real fast,
My name is Chuck,
It somehow seems to fit.
I over-rate the worst bad f*ck,
But like a real good sh*t.

Oh, I’m a Denizen and I’m okay!
I flame all night and I ride all day.

[Chorus refrain]:
Oh, He’s a Denizen…

I wear high heels
And bright pink shorts,
full leathers and a bra.
I wish I rode a Harley,
just like my dear mama.

[Chorus refrain]

————————————————————————

Why you have to be killed.

Well, the first thing you have to understand (just in case you managed
to read this far, and still not figure it out) is that the DoD started
as a joke. And in the words of one Denizen, it intends to remain one.

Sometime in the far distant past, a hapless newbie asked: “What does DoD
stand for? It’s not the Department of Defense is it?” Naturally, a
Denizen who had watched the movie “Top Gun” a few times too many rose
to the occasion and replied:

“That’s classified, we could tell you, but then we’d have to kill you.”

And the rest is history.

A variation on the “security” theme is to supply disinformation about
what DoD stands for. Notable contributions (and contributers, where
known) include:

Daughters of Democracy (DoD 23) Doers of Donuts
Dancers of Despair (DoD 9) Debasers of Daughters
Dickweeds of Denver Driveway of Death
Debauchers of Donuts Dumpers of Dirtbikes

Note that this is not a comprehensive list, as variations appear to be
limited only by the contents of one’s imagination or dictionary file.

————————————————————————

The rec.moto.photo archive

First a bit of history, this all started with Ilana Stern and Chuck
Rogers organizing a rec.motorcycles photo album. Many copies were made,
and several sets were sent on tours around the world, only to vanish in
unknown locations. Then Bruce Tanner decided that it would be appropriate
for an electronic medium to have an electronic photo album. Bruce has not
only provided the disk space and ftp & e-mail access, but he has taken
the time to scan most of the photos that are available from the archive.

Not only can you see what all these folks look like, you can also gawk
at their motorcycles. A few non-photo files are available from the
server too, they include the DoD membership list, the DoD Yellow Pages,
the general rec.motorcycles FAQ, and this FAQ posting.

Here are a couple of excerpts from from messages Bruce posted about how
to use the archive.

**********************************************************

Via ftp:

cerritos.edu [130.150.200.21]

Via e-mail:

The address is server@cerritos.edu. The commands are given in the body of the
message. The current commands are DIR and SEND, given one per line. The
arguments to the commands are VMS style file specifications. For
rec.moto.photo the file spec is [DOD]file. For example, you can send:

dir [dod]
send [dod]bruce_tanner.gif
send [dod]dodframe.ps

and you’ll get back 5 mail messages; a directory listing, 3 uuencoded parts
of bruce_tanner.gif, and the dodframe.ps file in ASCII.

Oh, wildcards (*) are allowed, but a maximum of 20 mail messages (rounded up to
the next whole file) are send. A ‘send [dod]*.gif’ would send 150 files of
50K each; not a good idea.

Bruce Tanner (213) 860-2451 x 596 Tanner@Cerritos.EDU
Cerritos College Norwalk, CA cerritos!tanner

**********************************************************

A couple of comments: Bruce has put quite a bit of effort into this, so
why not drop him a note if you find the rec.moto.photo archive useful?
Second, since Bruce has provided the server as a favor, it would be kind
of you to access it after normal working hours.

————————————————————————

Patches? What patches?

You may have heard mention of various DoD trinkets such as patches &
pins. And your reaction was probably: “I want!”, or “That’s sick!”, or
perhaps “That’s sick! I want!”

Well, there’s some good news and some bad news. The good news is that
there’s been an amazing variety of DoD-labeled widgets created. The bad
news is that there isn’t anywhere you can buy any of them. This isn’t
because of any “exclusivity” attempt, but simply because there is no
“DoD store” that keeps a stock. All of the creations have been done by
individual Denizens out of their own pockets. The typical procedure is
someone says “I’m thinking of having a DoD frammitz made, they’ll cost
$xx.xx, with $xx.xx going to the AMA museum. Anyone want one?” Then
orders are taken, and a batch of frammitzes large enough to cover the
pre-paid orders is produced (and quickly consumed). So if you want a
DoD doodad, act quickly the next time somebody decides to do one. Or
produce one yourself if you see a void that needs filling, after all
this is anarchy in action.

Here’s a possibly incomplete list of known DoD merchandise (and
perpetrators). Patches (DoD#11), pins (DoD#99), stickers (DoD#99),
motorcycle license plate frames (DoD#216), t-shirts (DoD#99), polo shirts
(DoD#122), Zippo lighters (DoD#99) [LtF FtL], belt buckles (DoD#99), and
patches (DoD#99) [a second batch was done (and rapidly consumed) by
popular demand].

All “profits” have been donated to the American Motorcyclist Association
Motorcycle Heritage Museum. As of June 1992, over $5500 dollars has been
contributed to the museum fund by the DoD. If you visit the museum,
you’ll see a large plaque on the Founders’ Wall in the name of “Denizens
of Doom, USENET, The World”, complete with a DoD pin.

————————————————————————

Here’s a letter from the AMA to the DoD regarding our contributions.

~Newsgroups: rec.motorcycles
~From: Arnie Skurow
~Subject: A letter from the Motorcycle Heritage Museum
~Date: Mon, 13 Apr 1992 11:04:58 GMT

I received the following letter from Jim Rogers, director of the Museum,
the other day.

“Dear Arnie and all members of the Denizens of Doom:

Congratulations and expressions of gratitude are in order for you and the
Denizens of Doom! With your recent donation, the total amount donated is
now $5,500. On behalf of the AMHF, please extend my heartfeld gratitude
to all the membership of the Denizens. The club’s new plaque is presently
being prepared. Of course, everyone is invited to come to the museum to
see the plaque that will be installed in our Founders Foyer. By the way,
I will personally mount a Denizens club pin on the plaque. Again, thank
you for all your support, which means so much to the foundation, the
museum, and the fulfillment of its goals.

Sincerely,

Jim Rogers, D.O.D. #0395
Director

P.S. Please post on your computer bulletin board.”

As you all know, even though the letter was addressed to me personally,
it was meant for all of you who purchased DoD goodies that made this
amount possible.

Arnie

————————————————————————

The Rules, Regulations, & Bylaws of the Denizens of Doom Motorcycle Club

From time to time there is some mention, discussion, or flame about the
rules of the DoD. In order to fan the flames, here is the complete text
of the rules governing the DoD.

Rule #1. There are no rules.
Rule #0. Go ride.

————————————————————————

Other rec.motorcycles information resources.

There are several general rec.motorcycles resources that may or may not
have anything to do with the DoD. Most are posted on a regular basis,
but they can also be obtained from the cerritos ftp/e-mail server (see
the info on the photo archive above).

A general rec.motorcycles FAQ is maintained by Dave Williams.
Cerritos filenames are FAQn.TXT, where n is currently 1-5.

The DoD Yellow Pages, a listing of motorcycle industry vendor phone
numbers & addresses, is maintained by bob pakser.
Cerritos filename is YELLOW_PAGES_Vnn, where n is the rev. number.

The List of the DoD membership is maintained by The Keeper of the List.
Cerritos filename is DOD.LIST.

This WitDoD FAQ (surprise, surprise!) is maintained by yours truly.
Cerritos filename is DOD_FAQ.TXT.

Additions, corrections, etc. for any of the above should be aimed at
the keepers of the respective texts.

————————————————————————

(Loki Jorgenson loki@Physics.McGill.CA) has provided an archive site
for motorcycle and accessory reviews, here’s an excerpt from his
periodic announcement.

**********************************************************

The Rec.Motorcycles.Reviews Archives (and World Famous Llama
Emporium) contains a Veritable Plethora ™ of bike (and accessories)
reviews, written by rec.moto readers based on their own experiences.
These invaluable gems of opinion (highly valued for their potential to
reduce noise on the list) can be accessed via anonymous FTP, Email
server or by personal request:

Anonymous FTP: ftp.physics.mcgill.ca (132.206.9.13)
under ~ftp/pub/DoD
Email archive server: rm-reviews@ftp.physics.mcgill.ca
Review submissions/questions: rm-reviews@physics.mcgill.ca

NOTE: There is a difference in the addresses for review submission
and using the Email archive server (ie. an “ftp.”).

To get started with the Email server, send an Email message with a line
containing only “send help”.

NOTE: If your return address appears like
domain!subdomain!host!username
in your mail header, include a line like (or something similar)
path username@host.subdomain.domain

If you are interested in submitting a review of a bike that you
already own(ed), PLEASE DO! There is a template of the format that the
reviews are kept in (more or less) available at the archive site .
For those who have Internet access but are unsure of how anonymous
FTP works, an example script is available on request.

**********************************************************

Reviews of any motorcycle related accessory or widget are welcome too.

————————————————————————

Updated stats & rec.motorcycles rides info

Some of the info cited above in various places tends to be a moving
target. Rather than trying to catch every occurence, I’m just sticking
the latest info down here.

Estimated rec.motorcycles readership: 35K [news.groups]

Approximate DoD Membership: 975 [KotL]

DoD contributions to the American Motorcyclist Association Motorcycle
Heritage Museum. Over $5500 [Arnie]

Organized (?) Rides:

Summer 1992 saw more organized rides, with the Joust in its third
year, and the Ride & Feed going strong, but without the Rollins Pass
trip due to the collapse of a tunnel. The East Coast Denizens got
together for the Right Coast Ride (RCR), with bikers from as far north
as NH, and as far south as FL meeting in the Blueridge Mountains of
North Carolina. The Pacific Northwest crew organized the first Great
Pacific Northwest Dryside Gather (GPNDG), another successful excuse for
riding motorcycles, and seeing the faces behind the names we all have
come to know so well. [Thanks to Ed Green for the above addition.]

Also worth mentioning are: The first rec.moto.dirt ride, held in the
Moab/Canyonlands area of southern Utah. Riders from 5 states showed up,
riding everything from monster BMWs to itty-bitty XRs to almost-legal
2-strokes. And though it’s not an “official” (as if anything could be
official with this crowd) rec.moto event, the vintage motorcycle races
in Steamboat Springs, Colorado always provides a good excuse for netters
to gather. There’s also been the occasional Labor Day gather in Utah.
European Denizens have staged some gathers too. (Your ad here,
reasonable rates!)
————————————————————————

Blaine Gardner @ Evans & Sutherland blgardne@javelin.sim.es.com BIX:blaine_g
580 Arapeen Drive, SLC, Utah 84108 Favorite road signs:
Dumper of Dirtbikes #46 FJ1200 Winding Road Next 77 Miles
My other motorcycle is a Quadracer Caution: Passing Areas Not Marked

Blaine Gardner @ Evans & Sutherland blgardne@javelin.sim.es.com BIX:blaine_g
580 Arapeen Drive, SLC, Utah 84108 Favorite road signs:
Dumper of Dirtbikes #46 FJ1200 Winding Road Next 77 Miles
My other motorcycle is a Quadracer Caution: Passing Areas Not Marked

The Doctrine Of The Mean (Chung-Yung)

THE DOCTRINE OF THE MEAN (CHUNG-YUNG)

The DOCTRINE OF THE MEAN is a monument of Chinese philosophy, culture and
government. This work reflects the state of Confucian thought some centuries
after Confucius. Regarded as a ‘Classic’, it profoundly influenced Neo-
Confucian thought, and it was one of the texts upon which Civil Service
examinations were based for some 600 years.

For further information, see Wing-Tsit Chan, A SOURCE BOOK in CHINESE
PHILOSOPHY, Princeton, 1969, E. R. Hughes, THE GREAT LEARNING and the MEAN IN
ACTION, New York, 1943, and Tu Wei-ming, CENTRALITY and COMMONALITY: AN ESSAY
ON CHUNG-YUNG, Hawaii, 1976.

The translation reproduced here is that of James Legge in THE CHINESE
CLASSICS, originally published in 1893, and still in print today, e.g. from
Dover.

I have made a few changes:

Text which is italicized in the original translation is here bracketed.
(Apparently italics indicate words which Legge considered implicit in the
original and which he added to make the sense clear.)

The text now follows the Wade-Giles romanization.

A few notes have been added in parentheses, primarily identifying proper
names.

A few terms are printed in small caps, but I felt to reproduce these as
capitals is too distracting, so they are now lowercase.

Titles are capitalized. (Some of Legge’s punctuation differs from current
usage, but I have elected not to do any more than this.)

Chapter numbers use Arabic instead of Roman numerals, and I have added extra
blank lines.
THE DOCTRINE OF THE MEAN

Translated by James Legge

Chapter 1.

1. What heaven has conferred is the called the nature; an accordance with
this nature is called the path [of duty]; the regulation of this path is
called instruction.
2. The path may not be left for an instant. If it could be left, it would
not be the path. On this account, the superior man does not wait till he sees
things, to be cautious, nor till he hears things, to be apprehensive.
3. There is nothing more visible than what is secret, and nothing more
manifest than what is minute. Therefore the superior man is watchful over
himself, when he is alone.
4. While there are no stirrings of pleasure, anger, sorrow, or joy, the
mind may be said to be in the state of equilibrium. When those feelings have
been stirred, and they act in their due degree, there ensues what may be
called the state of harmony. This equilibrium is the great root [from which
grow all the human actings] in the world, and this harmony is the universal
path [which they all should pursue.]
5. Let the states of equilibrium and harmony exist in perfection, and a
happy order will prevail throughout heaven and earth, and all things will be
nourished and flourish.

Chapter 2.

1. Chung-ni (Confucius) said, ‘The superior man [embodies] the course of
the Mean; the mean man acts contrary to the course of the Mean.
2. ‘The superior man’s embodying the course of the Mean is because he is
a superior man, and so always maintains the Mean. The mean man’s acting
contrary to the course of the Mean is because he is a mean man, and has no
caution.’

Chapter 3.

The Master (Confucius) said, ‘Perfect is the virtue which is according to
the Mean! Rare have they long been among the people, who could practise it!’

Chapter 4.

1. The Master said, ‘I know how it is that the path [of the Mean] is not
walked in:–The knowing go beyond it, and the stupid do not come up to it. I
know how it is that the path of the Mean is not understood:–The men of
talents and virtue go beyond it, and the worthless do not come up to it.
2. ‘There is no body but eats and drinks. But they are few who can
distinguish flavours.’

Chapter 5.

The Master said, ‘Alas! How is the path of the Mean untrodden!’

Chapter 6.

The Master said, ‘There was (the mythical sage-emperor) Shun:–He indeed was
greatly wise! Shun loved to question [others], and to study their words,
though they might be shallow. He concealed what was bad [in them] and
displayed what was good. He took hold of their two extremes, [determined] the
Mean, and employed it in [his government of] the people. It was by this that
he was Shun!’

Chapter 7.

The Master said, ‘Men all say, “We are wise;” but being driven forward and
taken in a net, a trap, or a pitfall, they know not how to escape. Men all
say “We are wise;” but happening to choose the course of the Mean, they are
not able to keep it for a round month.’

Chapter 8.

The Master said, ‘This was the manner of (my disciple) Hui:–he made
choice of the Mean, and whenever he got hold of what was good, he clasped it
firmly, as if wearing it on his breast, and did not lose it.’

Chapter 9.

The Master said, ‘The kingdom, it States, and its families, may be
perfectly ruled; dignities and emoluments may be declined; naked weapons may
be trampled under the feet;–but the course of the Mean cannot be attained
to.’

Chapter 10.

1. (Confucius’ disciple) Tzu-lu asked about energy.
2. The Master said, ‘Do you mean the energy of the South, the energy of
the North, or the energy which you should cultivate yourself?
3. ‘To show forbearance and gentleness in teaching others; and not to
revenge unreasonable conduct:– this is the energy of Southern regions, and
the good man makes it his study.
4. ‘To lie under arms; and meet death without regret:–this is the energy
of the Northern regions, and the forceful make it their study.
5. ‘Therefore, the superior man cultivates [a friendly] harmony, without
being weak.–How firm is he in his energy! He stands erect in the middle,
without flinching to either side.–How firm is he in his energy! When good
principles prevail in the government of his country, he does not change from
what he was in retirement.–How firm is he in his energy! When bad principles
prevail in the country, he maintains his course to death without changing.–
How firm is he in his energy!’

Chapter 11.

1. The Master said, ‘To live in obscurity, and yet practise wonders, in
order to mentioned with honour in future ages:–this is what I do not do.
2. ‘The good man tries to proceed according to the right path, but when he
has gone halfway, he abandons it:–I am not able [so] to stop.
3. ‘The superior man accords with the course of the Mean. Though he may
be all unknown, unregarded by the world, he feels no regret.–It is only the
sage who is able for this.’

Chapter 12.

1. The way which the superior man pursues, reaches far and wide, and yet
is secret.
2. Common men and women, however ignorant, may intermeddle with the
knowledge of it; yet in its utmost reaches, there is that which even the sage
does not know. Common men and women, however much below the ordinary standard
of character, can carry it into practise; yet in its utmost reaches, there is
that which even the sage is not able to carry into practise. Great as heaven
and earth are, men still find some things in them with which to be
dissatisfied. Thus it is that, were the superior man to speak of this way in
all its greatness, nothing in the world would be found able to embrace it,
and were he to speak of it in its minuteness, nothing in the world would be
found able to split it.
3. It is said in the Book of Poetry, ‘The hawk files up to heaven; the
fishes leap in the deep.’ This expresses how this [way] is seen above and
below.
4. The way of the superior man may be found, in its simple elements, in
the intercourse of common men and women; but in its utmost reaches, it shines
brightly through heaven and earth.

Chapter 13.

1. The Master said, ‘The path is not far from man. When men try to
pursue a course, which is far from the common indications of consciousness,
this course cannot be considered the path.
2. ‘In the Book of Poetry, it is said, “In hewing an axe-handle, in
hewing an axe-handle, the pattern is not far off.” We grasp one axe-handle to
hew the other; and yet, if we look askance from the one to the other, we may
consider them as apart. Therefore, the superior man governs men, according to
their nature, with what is proper to them, and as soon as they change [what is
wrong], he stops.
3. ‘When one cultivates to the utmost the principles of his nature, and
exercises them on the principle of reciprocity, he is not far from the path.
What you do not like when done to yourself, do not do to others.
4. ‘In the way of the superior man there are four things, to not one of
which have I as yet attained.–To serve my father, as I would require my son
to serve me: to this I have not attained; to serve my prince, as I would
requires my minister to serve me: to this I have not attained; to serve my
elder brother, as I would require my younger brother to serve me: to this I
have not attained; to set the example in behaving to a friend, as I would
require him to behave to me: to this I have not attained. Earnest in
practising the ordinary virtues, and careful in speaking about them, if, in
his practice, he has anything defective, the superior man dares not exert
himself; and if, in his words, he has any excess, he dares not allow himself
such license. Thus his words have respect to his actions, and his actions
have respect to words; is it not just an entire sincerity which marks the
superior man?’

Chapter 14.

1. The superior man does what is proper to the station in which he is; he
does not desire to go beyond this.
2. In a position of wealth and honour, he does what is proper to a
position of wealth and honour. In a poor and low position, he does what is
proper to a poor and low position. Situated among barbarous tribes, he does
what is proper to a situation among barbarous tribes. In a position of sorrow
and difficulty, he does what is proper to a position of sorrow and difficulty.
The superior man can find himself in no situation in which he is not himself.
3. In a high position, he does not treat with contempt his inferiors. In
a low situation, he does not court the favour of his superiors. He rectifies
himself, and seeks nothing from others, so that he has no dissatisfactions.
He does not murmur against Heaven, nor grumble against men.
4. Thus it is that the superior man is quiet and calm, waiting for the
appointments [of Heaven], while the mean man walks in dangerous paths, looking
for lucky occurrences.
5. The Master said, ‘In archery we have something like the way of the
superior man. When the archer misses the centre of the target, he turns
around and seeks the cause of his failure in himself.’

Chapter 15.

1. The way of the superior man may be compared to what takes place in
travelling, when to go to a distance we must first traverse the space that is
near, and in ascending a height, when we must begin from the lower ground.
2. It is said in the Book of Poetry, ‘Happy union with wife and children,
is like the music of lutes and harps. When there is concord among brethren,
the harmony is delightful and enduring. [Thus] may you regulate your family,
and enjoy the pleasure of your wife and children.’
3. The Master said, ‘In such a state of things, parents have entire
compliance!’

Chapter 16.

1. The Master said, ‘How abundantly do spiritual beings display the powers
that belong to them!
2. ‘We look for them, but do not see them; we listen to, but do not hear
them; yet they enter into all things, and there is nothing without them.
3. ‘They cause all the people in the kingdom to fast and purify
themselves, and array themselves in their richest dresses, in order to attend
at their sacrifices. Then, like overflowing water, they seem to be over their
heads, and on the right and left [of their worshippers].
4. ‘It is said in the Book of Poetry, “The approaches of the spirits, you
cannot surmise;–and can you treat them with indifference?”
5. ‘Such is the manifestness of what is minute! Such is the impossibility
of repressing the outgoings of sincerity!’

Chapter 17.

1. The Master said, ‘How greatly filial was Shun! His virtue was that of
a sage; his dignity was the throne; his riches were all within the four seas.
He offered his sacrifices in his ancestral temple, and his descendants
preserved the sacrifices to himself.
2. ‘Therefore having such great virtue, it could not but be that he should
obtain the throne, that he should obtain those riches, that he should obtain
his fame, that he should attain to his long life.
3. ‘Thus it is that Heaven, in the production of things, is sure to be
bountiful to them, according to their qualities. Hence the tree that is
flourishing, it nourishes, while that which is ready to fall, it overthrows.
4. ‘In the Book of Poetry it is said, “The admirable, amiable prince
displayed conspicuously his excelling virtue, adjusting his people, and
adjusting his officers. [Therefore], he received from Heaven the emoluments
of dignity. It protected him, assisted him, decreed him the throne; sending
from Heaven these favours, [as it were] repeatedly.”
5. ‘[We may say] therefore that he who is greatly virtuous will be sure to
receive the appointment of Heaven.’

Chapter 18.

1. The Master said, ‘It is only King Wen (the founder of the Chou dynasty)
of whom it can be said that he had no cause for grief! His father was King
Chi, and his son was King Wu. His father laid the foundations of his dignity,
and his son transmitted it.
2. ‘King Wu continued the enterprise of King T’ai (King Chi’s father),
King Chi, and King Wen. He once buckled on his armour, and got possession of
the kingdom. He did not lose the distinguished personal reputation which he
had throughout the kingdom. His dignity was the royal throne. His riches
were the possession of all within the four seas. He offered his sacrifices in
his ancestral temple, and his descendants maintained the sacrifices to
himself.
3. ‘It was in this old age that King Wu received the appointment [to the
throne], and (his brother) the Duke of Chou completed the virtuous course of
Wen and Wu. He carried up the title of king to T’ai and Chi, and sacrificed
to all the former dukes above them with the royal ceremonies. And this rule
he extended to the princes of the kingdom, the great officers, the scholars,
and the common people. If the father were a great officer, and the son a
scholar, then the burial was that due to a great officer, and the sacrifice
that due to a scholar. If the father were a scholar, and the son a great
officer, then the burial was that due to a scholar, and the sacrifice that due
to a great officer. The one year’s mourning was made to extend [only] to the
great officers, but the three years’ mourning extended to the Son of Heaven.
In the mourning for a father or mother, he allowed no difference between the
noble and the mean.’

Chapter 19.

1. The Master said, ‘How far-extending was the filial piety of King Wu
and the Duke of Chou!
2. ‘Now filial piety is seen in the skilful carrying out of the wishes of
our forefathers, and the skilful carrying forward of their undertaking.
3. ‘In spring and autumn, they repaired and beautified the temple-halls
of their fathers, set forth their ancestral vessels, displayed their various
robes, and presented the offering of the several seasons.
4. ‘By means of the ceremonies of the ancestral temple, they distinguished
the royal kindred according to their order of descent. By ordering the
parties present according to their rank, they distinguished the more noble
and the less. By the arrangement of the services, they made a distinction of
talents and worth. In the ceremony of general pledging, the inferiors
presented the cup to their superiors, and thus something was given the lowest
to do. At the [concluding] feast, places were given according to the hair,
and thus was made the distinction of years.
5. ‘They occupied the places of their forefathers, practised their
ceremonies, and performed their music. They reverenced those whom they
honoured, and loved those whom they regarded with affection. Thus they served
the dead as they would have served them alive; they served the departed as
they would have served them had they been continued among them.
6. ‘By the ceremonies of the sacrifices to Heaven and Earth they served
God, and by the ceremonies of the ancestral temple they sacrificed to Heaven
and Earth, and the meaning of the several sacrifices to ancestors, would find
the government of a kingdom as easy as to look into his palm!’

Chapter 20.

1. The Duke Ai (the ruler of the state of Lu) asked about government.
2. The Master said, ‘The government of Wen and Wu is displayed in [the
records],-the tablets of wood and bamboo. Let there be the men and the
government will flourish; but without the men, their government decays and
ceases.
3. ‘With the [right] men the growth of government is rapid, just as
vegetation is rapid in the earth; and moreover [their] government [might be
called] an easily-growing rush.
4. ‘Therefore the administration of government lies in [getting proper]
men. Such men are to be got by means of [the rulers’s own] character. That
character is to be cultivated by this treading in the ways of [duty]. And the
treading those ways of duty is to be cultivated by the cherishing of
benevolence.
5. ‘Benevolence is [the characteristic element of] humanity, and the
great exercise of it is in loving relatives. Righteousness is [the
accordance of actions with what is] right, and the great exercise of it is in
honouring the worthy. The decreasing measures of the love due to relatives,
and the steps in the honour due to the worthy, are produced by [the
principle] of propriety.
6. ‘When those an inferior situations do not possess the confidence of
their superiors, they cannot retain the government of the people.
7. ‘Hence the sovereign may not neglect the cultivation of his own
character. Wishing to cultivate his character, he may not neglect to serve
his parents. In order to serve his parents, he may not neglect to acquire a
knowledge of men. In order to know men, he may not dispense with a knowledge
of Heaven.
8. ‘The duties of the universal obligation are five, and the virtues
wherewith they are practised are three. The duties are those between
sovereign and minister, between father and son, between husband and wife,
between elder brother and younger, and those belonging to the intercourse of
friends. Those five are the duties of universal obligation. Knowledge,
magnanimity, and energy, these three, are the virtues universally binding.
And the means by which they carry [the duties] into practise is singleness.
9. ‘ Some are born with the knowledge [of those duties]; some know them
by study; and some acquire the knowledge after a painful feeling of their own
ignorance. But the knowledge being possessed, it comes to the same thing.
Some practise them with a natural ease; some from a desire for their
advantages; and some by strenuous effort. But the achievement being made, it
comes to the same thing.’
10. The Master said, ‘To be fond of learning is to be near to knowledge.
To practise with vigour is to be near to magnanimity. To possess the feeling
of shame is to be near to energy.
11. ‘He who knows these three things, knows how to cultivate his own
character. Knowing how to cultivate his own character, he knows how to
govern other men. Knowing how to govern other men, he knows how to govern the
kingdom with all its States and families.
12. ‘All who have the government of the kingdom with its States and
families have nine standard rules to follow;–viz. the cultivation of their
own characters; the nourishing of men of virtue and talents; affection towards
their relatives; respect towards the great ministers; kind and considerate
treatment of the whole body of officers; dealing with the mass of the people
as children; encouraging the resort of all classes of artisans; indulgent
treatment of men from a distance; and the kindly cherishing of the princes of
the States.
13. ‘By the ruler’s cultivation of his own character, the duties [of
universal obligation] are set forth. By honouring men of virtue and talents,
he is preserved from errors of judgement. By showing affection to his
relatives, there is no grumbling nor resentment among his uncles and brethren.
By respecting the great ministers, he is kept from error in the practise of
government. By kind and considerate treatment of the whole body of officers,
they are led to make the most grateful return for his courtesies. By dealing
with the mass of the people as his children, they are led to exhort one
another to what is good. By encouraging the resort of all classes of
artisans, his resources for expenditure are rendered ample. By indulgent
treatment of men from a distance, they are brought to resort to him from all
quarters. And by kindly cherishing the princes of the States, the whole
kingdom is brought to revere him.
14. ‘Self-adjustment and purification, with careful regulation of his
dress, and the not making a movement contrary to the rules of propriety:–this
is the way for a ruler to cultivate his person. Discarding slanderers, and
keeping himself from [the seductions of] beauty; making light of riches, and
giving honour to virtue:–this is the way for him to encourage men of worth
and talents. Giving them places [of honour] and larger emolument, and sharing
with them in their likes and dislikes:–this is the way for him to encourage
his relatives to love him. Giving them numerous officers to discharge their
orders and commissions:–this is the way for him to encourage the great
ministers. According to them a generous confidence, and making their
emoluments large:–this is the way to encourage the body of officers.
Employing them only at the proper times, and making the imposts light:–this
is the way to encourage the people. By daily examinations and monthly trials,
and by making their rations in accordance with their labours:–this is the way
to encourage the classes of artisans. To escort them on their departure and
meet them on their coming; to commend the good among them, and show compassion
to the incompetent:–this is the way to treat indulgently men from a distance.
To restore families whose line of succession has been broken, and to revive
States that have been extinguished; to reduce to order States that are in
confusion, and support those which are in peril; to have fixed times for their
own reception at court, and the reception of their envoys; to send them away
after liberal treatment, and welcome their coming with small contributions:–
this is the way to cherish the princes of the States.
15. ‘All who have the government of the kingdom with its States and
families have the above nine standard rules. And the means by which they are
carried into practise is singleness.
16. ‘In all things success depends on previous preparation, and without
such previous preparation there is sure to be failure. If what is to be
spoken be previously determined, there will be no stumbling. If affairs be
previously determined, there will be no difficultly with them. If one’s
actions have been previously determined, there will be no sorrow in connexion
with them. If principles of conduct have been previously determined, the
practise of them will be inexhaustible.
17. ‘When those in inferior situations do not obtain the confidence of
the sovereign, they cannot succeed in governing the people. There is a way to
obtain the confidence of the sovereign;–if one is not trusted by his
friends, he will not get the confidence of his sovereign. There is a way to
being trusted by one’s friends;–if one is not obedient to his parents, he
will not be true to friends. There is a way to being obedient to one’s
parents;–if one, on turning his thoughts in upon himself, finds a want of
sincerity, he will not be obedient to his parents. There is a way to the
attainment of sincerity in one’s self;–if a man do not understand what is
good, he will not attain sincerity in himself.
18. ‘Sincerity is the way of Heaven. The attainment of sincerity is the
way of men. He who possesses sincerity, is he who, without an effort, hits
what is right, and apprehends, without exercise of thought;–he is the sage
who naturally and easily embodies the [right] way. He who attains to
sincerity, is he who chooses what is good, and firmly holds it fast.
19. ‘To this attainment there are requisite the extensive study of what is
good, accurate inquiry about it, careful reflection on it, the clear
discrimination of it, and the earnest practise of it.
20. ‘The superior man, while there is anything he has not studied, or
while in what he has studied there is anything he cannot understand, will not
intermit his labour. While there is anything he has not inquired about, or
anything in what he has inquired about which he does not know, he will not
intermit his labour. While there is anything which he has not reflected on,
or anything in what he has reflected on which he does not apprehend, he will
not intermit his labour. While there is anything which he has not
discriminated, or his discrimination is not clear, he will not intermit his
labour. If there be anything which he has not practised, or his practise
fails in earnestness, he will not intermit his labour. If another man succeed
by one effort, he will use a hundred efforts. If another man succeed by ten
efforts, he will use a thousand.
21. ‘Let a man proceed in this way, and, though dull, he will surely
become intelligent; though weak, he will surely become strong.’

Chapter 21.

When we have intelligence resulting from sincerity, this condition is to
be ascribed to nature; when we have sincerity resulting from intelligence,
this condition is to be ascribed to instruction. But given the sincerity,
and there shall be the intelligence; given the intelligence, and there shall
be the sincerity.

Chapter 22.

It is only he who is possessed of the most complete sincerity that can
exist under heaven, who can give its full development to his nature. Able to
give its full development to his own nature, he can do the same to the nature
of other men. Able to give its full development to the nature of other men,
he can give their full development to the natures of animals and things. Able
to give their full development to the natures of creatures and things, he can
assist the transforming and nourishing powers of Heaven and Earth. Able to
assist the transforming and nourishing powers of Heaven and Earth, he may with
Heaven and Earth form a ternion.

Chapter 23.

Next to the above is he who cultivates to the utmost the shoots [of
goodness] in him. From those he can attain to the possession of sincerity.
This sincerity becomes apparent. From being apparent, it becomes manifest.
From being manifest, it becomes brilliant. Brilliant, it affects others.
Affecting others, they are changed by it. Changed by it, they are
transformed. It is only he who is possessed of the most complete sincerity
that can exist under heaven, who can transform.

Chapter 24.

It is characteristic of the most entire sincerity to be able to foreknow.
When a nation or family is about to flourish, there are sure to be happy
omens; and when it is about to perish, there are sure to be unlucky omens.
[Such events are] seen in the milfoil and tortoise, and affect the movements
of the four limbs. When calamity or happiness is about to come, the good
shall certainly be foreknown by him, and the evil also. Therefore the
individual possessed of the most complete sincerity is like a spirit.

Chapter 25

1. Sincerity is that whereby self-completion is effected, and [its] way is
that by which man must direct himself.
2. Sincerity is the end and beginning of things; without sincerity there
would be nothing. On this account, the superior man regards the attainment of
sincerity as the most excellent thing.
3. The possessor of sincerity does not merely accomplish the self-
completion of himself. With this quality he completes [other men and] things
[also]. The completing himself [shows his] perfect virtue. The completing
[other men and] things [shows his] knowledge. [Both these are] virtues
belonging to the nature, and [this is] the way by which a union is effected
of the external and internal. Therefore, whenever he–[the entirely sincere
man]–employs them,–[that is, these virtues,–their action will be] right.

Chapter 26.

1. Hence to entire sincerity there belongs ceaselessness.
2. Not ceasing, it continues long. Continuing long, it evidences itself.
3. Evidencing itself, it reaches far. Reaching far, it becomes large and
substantial. Large and substantial, it becomes high and brilliant.
4. Large and substantial;–this is how it contains [all] things. High
and brilliant;–this is how it overspreads [all] things. Reaching far and
continuing long;–this is how it perfects [all] things.
5. So large and substantial, [the individual possessing it] is the co-
equal of Earth. So high and brilliant, it makes him the co-equal of Heaven.
So far-reaching and long-continuing, it makes him infinite.
6. Such being its nature, without any display, it becomes manifested;
without any movement, it produces changes; and without any effort, it
accomplishes its ends.
7. The way of Heaven and Earth may be completely declared in one
sentence.–They are without any doubleness, and so they produce things in a
manner that is unfathomable.
8. The way of Heaven and Earth is large and substantial, high and
brilliant, far-reaching and long-enduring.
9. The heaven now before us is only this bright shining spot; but when
viewed in its inexhaustible extent, the sun, moon, stars, and constellations
of the zodiac, are suspended in it, and all things are overspread by it. The
earth before us is but a handful of soil; but when regarded in its breadth and
thickness, it sustains mountains like the Hua and the Yo, without feeling
their weight, and contains the rivers and seas, without their leaking away.
The mountain now before us appears only a stone; but when contemplated in all
the vastness of its size, we see how the grass and tress are produced on it,
and birds and beasts dwell on it, and precious things which men treasure up
are found on it. The water now before us appears but a ladleful; yet
extending our view to its unfathomable depths, the largest tortoises, iguanas,
iguanodons, dragons, fishes, and turtles, are produced in them, articles of
value and sources of wealth abound in them.
10. It is said in the Book of Poetry, ‘The ordinances of Heaven, how
profound are they and unceasing!’ The meaning is, that it is thus that Heaven
is Heaven. [And again], ‘How illustrious was it, the singleness of the
virtue of King Wen!’ indicating that it was thus that King Wen was what he
was. Singleness likewise is unceasing.

Chapter 27.

1. How great is the path proper to the Sage!
2. Like overflowing water, it sends forth and nourishes all things, and
rises up to the height of heaven.
3. All-complete is its greatness! It embraces the three hundred rules of
ceremony, and the three thousand rules of demeanor.
4. It waits for the proper man, and then it is trodden.
5. Hence, it is said, ‘Only by perfect virtue can the perfect path, in all
its courses, be made a fact.’
6. Therefore, the superior man honours his virtuous nature, and maintains
constant inquiry and study, seeking to carry it out to its breadth and
greatness, so as to omit none of the more exquisite and minute points which it
embraces, and to raise it to its greatest height and brilliancy, so as to
pursue the course of the Mean. He cherishes his old knowledge, and is
continually acquiring new. He exerts an honest, generous earnestness, in the
esteem and practise of all propriety.
7. Thus, when occupying a high situation he is not proud, and in a low
situation he is not insubordinate. When the kingdom is well-governed, he is
sure by his words to rise; and when it is ill-governed, he is sure by his
silence to command forbearance to himself. Is not this what we find in the
Book of Poetry,–‘Intelligent is he and prudent, and so preserves his person?’

Chapter 28.

1. The Master said, ‘Let a man who is ignorant be fond of using his own
judgment; let a man without rank be fond of assuming a directing power to
himself; let a man who is living in the present age go back to the ways of
antiquity;–on the persons of all who act thus calamities will be sure to
come.’
2. To no one but the Son of Heaven does it belong to order ceremonies, to
fix the measures, and to determine the written characters.
3. Now, over the kingdom, carriages have all wheels of the same size; all
writing is with the same characters; and for conduct there are the same rules.
4. One may occupy the throne, but if he have not the proper virtue, he
may not dare to make ceremonies or music. One may have the virtue, but if he
do not occupy the throne, he may not presume to make ceremonies or music.
5. The Master said, ‘I may describe the ceremonies of the Hsia dynasty,
but (the) Ch’i (dynasty) cannot sufficiently attest my words. I have learned
the ceremonies of the Yin (or Shang) dynasty, and in (state of) Sung they
still continue. I have learned the ceremonies of (the) Chou (dynasty), which
are not used, and I follow Chou.’

Chapter 29.

1. He who attains to the sovereignty of the kingdom, having [those] three
important things, shall be able to effect that there shall be few errors
[under his government].
2. However excellent may have been the regulations of those of former
times, they cannot be attested. Not being attested, they cannot command
credence, and not being credited, the people would not follow them. However
excellent might be the regulations made by one in an inferior situation, he is
not in a position to be honoured. Unhonoured, he cannot command credence, and
not being credited, the people would not follow his rules.
3. Therefore the institutions of the Ruler are rooted in his own character
and conduct, and sufficient attestation of them is give by the masses of the
people. He examines them [by comparison] with those of the three kings (the
founders of the three dynasties, Hsia, Shang or Yin, and Chou), and finds them
without mistake. He sets them up before heaven and earth, and finds nothing
in them contrary to their mode of operation. He presents himself with them
before spiritual beings, and no doubts about them arise. He is prepared to
wait for the rise of a sage a hundred ages after, and has no misgivings.
4. His presenting himself [with his institutions] before spiritual beings,
without any doubts arising about them, shows that he knows Heaven. His being
prepared, without any misgivings, to wait for the rise of a sage a hundred
ages after, shows that he knows men.
5. Such being the case, the movements of such a ruler, [illustrating his
institutions], constitute an example to the world for ages. His acts are for
ages a law to the kingdom. His words are for ages a lesson to the kingdom.
Those who are far from him, look longingly for him; and those who are near
him, are never wearied with him.
6. It is said in the Book of Poetry,–‘Not disliked there, not tired of
here, from day to day and night to night, will they perpetuate their praise.’
Never has there been a ruler, who did not realise this description, that
obtained an early renown throughout the kingdom.

Chapter 30.

1. Chung-ni handed down the doctrines of Yao and Shun, as if they had been
his ancestors, and elegantly displayed the regulations of Wen and Wu, taking
them as his model. Above, he harmonized with the times of heaven, and below,
he was conformed to the water and land.
2. He may be compared to heaven and earth in their supporting and
containing, their overshadowing and curtaining of all things. He may be
compared to the four season in their alternating progress, and to the sun and
moon in their successive shining.
3. All things are nourished together without their injuring one another.
The course [of the seasons, and of the sun and moon], are pursued without any
collision among them. The smaller energies are like river currents; the
greater energies are seen in mighty transformations. It is this which makes
heaven and earth so great.

Chapter 31.

1. It is only he, possessed of all sagely qualities that can exist under
heaven, who shows himself quick in apprehension, clear in discernment, of far-
reaching intelligence, and all-embracing knowledge, fitted to exercise rule;
magnanimous, generous, benign, and mild, fitted to exercise forbearance;
impulsive, energetic, firm, and enduring, fitted to maintain a firm hold;
self-adjusted, grave, never swerving from the Mean, and correct, fitted to
command reverence; accomplished, distinctive, concentrative, and searching,
fitted to exercise discrimination.
2. All-embracing is he and vast, deep and active as a fountain, sending
forth in their due season his virtues.
3. All-embracing and vast, he is like heaven. Deep and active as a
fountain, he is like the abyss. He is seen, and the people all reverence him;
he speaks, and the people all believe him; he acts, and the people all are
pleased with him.
4. Therefore his fame overspreads the Middle Kingdom, and extends to all
barbarous tribes. Wherever ships and carriages reach; wherever the strength
of man penetrated; wherever the heavens overshadow and the earth sustains;
wherever the sun and moon shine; wherever frosts and dews fall:–all who have
blood and breath unfeignedly honour and love him. Hence it is said,–‘He is
the equal of Heaven.’

Chapter 32.

1. It is only the individual possessed of the most entire sincerity that
can exist under heaven, who can adjust the great invariable relations of
mankind, establish the great fundamental virtues of humanity, and know the
transforming and nurturing operations of Heaven and Earth;–shall this
individual have any being or anything beyond himself on which he depends?
2. Call him man is his ideal, how earnest is he! Call him an abyss, how
deep is he! Call his Heaven, how vast is he!
3. Who can know him, but he who is indeed quick in apprehension, clear in
discernment, of far-reaching intelligence, and all-embracing knowledge,
possessing all heavenly virtue?

Chapter 33.

1. It is said in the Book of Poetry, ‘Over her embroidered robe she puts a
plain single garment,’ intimating a dislike to the display of the elegance of
the former. Just so, it is the way of the superior man to prefer the
concealment [of his virtue], while it daily becomes more illustrious, and the
way of the mean man to seek notoriety, while he daily goes more and more to
ruin. It is characteristic of the superior man, appearing insipid, yet never
to produce satiety; while showing a simple negligence, yet to have his
accomplishments recognized; while seemingly plain, yet to be discriminating.
He knows how what is distant lies in what is near. He knows where the wind
proceeds from. He knows how what is minute becomes manifested. Such an one,
we may be sure, will enter into virtue.
2. It is said in the Book of Poetry, ‘Although [the fish] sink and lie at
the bottom, it is still quite clearly seen.’ Therefore the superior man
examines his heart, that there may be nothing wrong there, and that he may
have no cause for dissatisfaction with himself. That wherein the superior
man cannot be equalled is simply this,–his [work] which other men cannot see.
3. It is said in the Book of Poetry, ‘Looked at in your apartment, be
there free from shame as being exposed to the light of heaven.’ Therefore,
the superior man, even when he is not moving, has [a feeling] of reverence,
and while he speaks not, he has [the feeling of] truthfulness.
4. It is said in the Book of Poetry, ‘In silence is the offering
presented, and [the spirit] approached to; there is not the slightest
contention.’ Therefore the superior man does not use rewards, and the people
are stimulated [to virtue]. He does not show anger, and the people are awed
more than by hatchets and battle-axes.
5. It is said in the Book of Poetry, ‘What needs no display is virtue.
All the princes imitate it.’ Therefore, the superior man being sincere and
reverential, the whole world is conducted to a state of happy tranquility.
6. It is said in the Book of Poetry, ‘I regard with pleasure your
brilliant virtue, making no great display of itself in sounds and
appearances.’ The Master said, ‘Among the appliances to transform the people,
sounds and appearances are but trivial influences. It is said in another ode,
“His virtue is light as a hair.” Still, a hair will admit of comparison [as
to its size]. “The doings of the supreme Heaven have neither sound nor
smell.”–That is perfect virtue.’

How To Eliminate Or Brush Off Telemarketing Calls

From news.Arizona.EDU!math.arizona.edu!CS.Arizona.EDU!uunet!cs.utexas.edu!math.ohio-state.edu!uwm.edu!uwvax!calypso.cs.wisc.edu!cargille Tue Aug 23 13:59:53 1994
Path: news.Arizona.EDU!math.arizona.edu!CS.Arizona.EDU!uunet!cs.utexas.edu!math.ohio-state.edu!uwm.edu!uwvax!calypso.cs.wisc.edu!cargille
From: cargille@calypso.cs.wisc.edu (Allan Cargille)
Newsgroups: uwisc.general,wi.general,alt.consumers.free-stuff
Subject: how to eliminate, brush off telemarketing calls
Followup-To: uwisc.forum
Date: 22 Aug 1994 20:36:25 GMT
Organization: University of WI, Madison — Computer Sciences Dept.
Lines: 40
Distribution: usa
Message-ID:
NNTP-Posting-Host: calypso.cs.wisc.edu
X-Newsreader: NN version 6.5.0 #3 (NOV)

Hi, I was really getting frustrated by telemarketers until I found
the information below. I thought others might appreciate it as well:

Consumers have a right request *not* to receive telemarketing calls.
The Direct Marketing Association has a “Telephone Preference Service”
list. You can only get on the list by writing them. They also do not
acknowledge your letter (at least, they didn’t ack mine). You can
write them at

DMA
P.O. Box 9014
Farmingdale, NY 11735

Include your phone number, and tell them you do not want to receive
telemarketing calls. This should probably also include the signature
of the person who has the phone in their name.

Another thing you can do to reduce telemarketing calls is to get in
the habit of never including your phone number on any warranty cards,
information requests, etc — or, if you do, indicate that you do not
want the information sold or redistributed.

Then when people call, if it sounds like a telemarketer (“Hello, is
this Mr. Cargille?”), just ask “Who’s calling, please?” When they
identify themselves and start to go into their pitch, just interrupt and
tell them you prefer not to receive telemarketing calls. Also ask
them to please take you off their list.

This has markedly decreased the number of nuisance calls we receive,
and now I can brush them off without my blood pressure going up.

Hope this helps,

allan

C. Allan Cargille “MadTown” (Madison), Wisconsin cargille@cs.wisc.edu
———————–
“In other national news this week, another thirty thousand preborn babies
were legally ripped into small pieces or poisoned to death.”

Divine Rights By Paul W. Will AK Koordar

DIVINE RIGHTS

by Paul W. Will
(AKA Koordar)

The contents of this article are suitable for use with AD&D (tm TSR
Hobbies Inc.) but are easily adaptable to any other major FRPG.

In considering the writing of this article, several
questions/problems became apparent. First was classification of Deities.
Second came the requirement of keeping the record keeping simple in a
complicated business (DMs already have their jobs cut out for them). And
finally; the correlate of such information previously set forth in both
the AD & D system and the fine pages of The Dragon Magazine (tm TSR
Hobbies Inc.)

With these things in mind; to work.

Gods; gods of war, passion, harvest, chance and more have been the
back-drop for countless civilizations in the past. The flavor of a
country and the personalities of it’s peoples all find some root in the
otherworldly personages and legends of their religions. Any AD&D (tm TSR
Hobbies Inc.) campaign gains something special when such things are
carefully interwoven into their fabric, but this is no easy task; and
can detract from a game as easily as not.

To add a religious note to your campaign there are two strategies;
1) Use a pantheon from the DDG.
2) Create your own, taylor made pantheon(s).

As for the first method, I suggest that you research the era and
and area(s) of power, as well as the legends and tales of the pantheon
in question, in depth. Grasp firmly the concepts and theologies before
implementing them. As far as general advice goes; that is the extent of
it.

Should you choose the second method however (and probably if not)
this article should be of interest to you.

Let us discuss the basics of deity-hood. Gods are divided into five
groups (as I have concluded from information derived from the DDG,
Dragon #68, and subsequent issues) in order of potence:
Greater (as per TD #68)
Major*
Minor**
Lesser (as per TD #68)
Demi-god (as per TD#68)
Saint (as per TD #71)

As Mr. Gygax has, in his ‘deities of the Flaeness’ series described
some of his gods as being ‘Major’ and ‘Minor’ without further
information given I will take this opportunity to give my own versions
of these:

*Major Gods:
Anti-magic shell (2) Protection from evil/good,
Command 3rd effect (2) +2, 30′ radius
Control weather Quest (2)
Cure critical wounds (2) Remove curse
Death spell (1) Remove fear
Dispel (evil/good, Restoration (2)
illusion, magic) (6 each) Resurrection (5)
Fly Shape change (2)
Gate (2) Summon #
Globe of invulnerability (1) Symbol (2)
Heal (2) Time stop (1)
Holy/Unholy word (2) Trap the soul (2)
Improved invisibility True seeing (4)
Improved phantasmal forces Wish (2)
Polymorph other (4)

* * Maximum hit dice of 35, no more than 5 creatures. * *

**Minor Gods:
Anti-magic shell (2) Polymorph other (2)
Command 3rd effect (2) Protection from evil/good
Control weather (2) +2, 25′ radius
Cure critical wounds (1) Quest (1)
Cure serious wounds (3) Remove curse
Death spell (1) Remove fear
Dispel (evil/good, Restoration (2)
illusion, magic) (4) Resurrection (4)
Fly Summon #
Gate (2) Symbol (2)
Heal (2) Trap the soul (1)
Holy/unholy word (2) True seeing (3)
Improved invisibility Wish (1)
Phantasmal forces

* * Maximum hit dice of 30, no more than 4 creatures. * *

With this errata out of the way, onward . ..

What, other than the obvious powers stated, differs each rank of
gods from the others? That is a question that is arduous to answer in a
generality. Some say it is the number and power of their worshipers,
this I say is a misleading if not unworkable idea. Which came first; the
god or the believer? Obviously this is something that you will have to
define for yourself, but I operate on the precept that the god(s) was
first, shortly followed by everything they created.

Another misconception (at least in my opinion) is that divine
beings gain power directly from their worshipers and in direct
proportion to the number of their faithful. If this were the case any
mortal might claim divinity simply because he or she had cowed a few
handfulls of weaker creatures into paying homage to the character in
question. This sort of behaviour, shows plainly that the requirements
for deifacation must be up-graded.

Gods are their own power-sources, or tap into great power stores
un-attainable to mortals, for their spell abilities. It is part of their
nature; why else would men (creatures capable of attaining great power
themselves [in the form of high levels]) live in awe of any god?

This leads to yet another strange question: why then, if gods are
self-sufficient for their existence, would ‘Divine Beings’ solicit even
the recognition of men?

First I must lay down here a postulate that I hold to be true and
workable in gaming.
1) any divine creature has the proverbial ‘snowball’s chance
in
hell’ to manifest it’s-self in any way on a plane (material
plane, that is) where it has no supplicants.

By this rule a god has effectively zero influence on a world where
he/she is without priests. Clerics might well be sent to far lands
(worlds), there to introduce their gods doctrines. A god does not cease
to exist merely because no-one believes in him any longer, the god in
question would simply take truck to planes where he or she finds the
fields more verdant. Thus on any reality where a god has the slightest
interest he or she would actively seek to spread-the-faith. Priests are
charged to do so, and are benefitted with spell capabilities to aid in
this task. The phrase: “Wherever goest thou faithful; there shall I
be.’, is an applicable statement here.

The god without a flock is able only to manifest on it’s native
plane, a dangerous place indeed for a god, but any gods reason for
opening material worlds to itself are sure to be deeper than ‘just to be
there’. Some gods are greedy and desire the wealth of their worlds,
other gods are curious, some wish to propagate their views, still others
simply feel a need for lesser creatures to pay them homage. A god might
simply be bored; eternity is a long time, and what about spiteful gods;
might they not seek only their nemisis’ failure in that enemy god’s
dealings with man? Other reasons are plentiful, referees should give
each god his or her own purpose for association with man; a task that
could (should with respect to at least a handfull of any pantheon’s
gods) be tied into THE BIG PICTURE.

What are the origins of your world, cosmos or multiverse? Devise
it. Was it the Big-Bang, a mating of celestial beings, or did the Cosmic
Dung Beetle roll amorphous materials into planets? Are the stars other
suns, carnal creatures thrust into the sky, or cracks and chinks in a
great universe encircling wall? The multiverse, is it divergent
realities stemming from Day One (ala Zelazny), or the results of two
ultimate beings unknowingly trying to create Everything, in the same
spot at the same time?

It stands to reason that the Creator(s) is a Greater god, or
perhaps a group of Greater and Major Gods. As for the rest consider the
following;

Greater God:
A) The most powerful Outer Realm creature of its alignment, or
B) Any of the most powerful Perpetual Beings.

Major God:
A) An Outer Realm creature of great power, or
B) The offspring of a Greater God.

Minor God:
A) An Outer Realm creature of average power, or
B) The offspring of a Major God.

Lesser God:
A) An Outer Realm creature of little power, or
B) The offspring of a Minor God.

Demi-God:
A) Any half-divine mortal who has shown ample merit to his/her
divine
parent and granted immortality.

Saint:
A) Any true mortal who shows extreme potential through the service
of
his/her Deity, and been granted an eternal afterlife, or
B) Any Demi-God not yet ascended.

I define the Outer Realm as “that which existed before the
creation, and which still exists beyond the borders of the creation.”

A “Perpetual Being” is one the “is because it is.” More to the
point let me give an example: Loroth is the “God of the Good Earth,” he
cane to be when the earth did and he represents all that is alive. His
priests take joy in life and its continuance, he is a Perpetual Being
because he is the physical embodiment of something that may one day
cease to exist (would this cause him to fade from existence?). His twin,
Mortis (God of Death), skips through Time, existing only in the instant
when something dies and within eyesight of that thing. He too is a
Perpetual Being, and may one day be no more. Neither could exist without
the other.

Further I have made mention of the Ascendance of Demi-Gods, this
takes place at the death of the mortal body of the Demi-God. After the
usual Astral Journey (DDG page 11) upon its arrival at the proper plane,
if it is the same plane as is native to its Divine parent then it will
become a full-fledged Demi-God. Until this time it is treated as having
only the powers of a Saint. Should the half-mortal choose in its life to
serve a cause other then that of its Divine parent’s, then there would
be slim chance of another God granting him/her immortality, and thus
would remain but a Saint eternally.

Feel free to alter the definitions as necessary, but remember, the
difference bewixt various ranks of Deities must be more then just the
number of Wishes they can crank-out in a day….

Pantheons all have one thing in common. That is that they each
reflect their respective civilizations. Of the dozen or so
pantheon/cultures that I examined in preparation of this work I found
that eleven had war-gods, seven had sun-gods, six; gods of sea. Further
there were five each, gods of thunder, storms, and love. Fully one-third
included gods of wind, death, nature, air, running waters, and a king of
gods. These things can tell one much about these cultures, if not of the
nature of man. War seems to be at the foremost of man’s thoughts, so he
epitomizes a god of destruction. The sun was a wonder to early man, thus
a deity represented it or vise-versa, be that god a cruel and glaring
one, or a warm and kind one. Likewise many cultures were based on their
sea-faring merchants or soldiers, they would naturally imagine a god of
the waters, who must surely watch over them, and be in control of the
seas depths and ravaging nature. Love (taken in any context) is
frequently thought of as a gift of a specific supernatural being. Air
and wind gods are attributes of sailing cultures, death and nature are
mysteries and thus deified. River-based cultures, of course, boast of
river-gods, and prevalent in family or monarch oriented cultures there
are found a “Ruler of the Gods.” The latter is often a patriarch or
matriarch, or even a matched set, this lets the church help in
controlling the lower castes.

As can now be seen, a coherent pantheon should be representative of
the culture(s) that gave rise to it (also vise-versa), and must set an
example for the whole civilization.

As stated previously, some pantheons’ rulers are
patri-/matri-archial. These pantheons have historically involved
incestuous relationships (again the lifestyles of the devout would,
detrimentally, reflect this). Although occasionally a new being might be
brought into the scene (perhaps from the pantheon of a conquered
nation), the nature and origins of these interlopers would likely be
jumbled or varied from church to church.

Here is a list of possible spheres of power for deities compiled
from twelve pantheons, and followed by a few additions of my own device,
the first three are more “Role-Types” commonly evidenced.

Creator Ruler Subverter War
Sun Fire Sea Thunder
Storms Death Love Wind Mature
Air Running Waters Rain Underworld*
Undead Poetry Music Magic Animal**
Archery Theft Luck Earth
Fertility Sky Night Smything
Knowledge Law Gambling Agriculture
Punishment Motherhood Guardian-of-dead Wealth
Evil Beauty Combat Hunting Strength
Moon Racing/Speed Winter Spring
Fall/Harvest Summer Cities Darkness
Devil*** Mountains Youth (eternal) Forests
Fate Medicine/Healing Chance Chaos
Life Good Gifts Justice
Multi-purpose Time Gravity Wine
Competition Travel

* Not necessarily representative of a single plane, but possibly in
charge of all of the dead souls of mortals.
** Representative of animal(s) held as sacred.
*** Usually the “Subverter” and of radical alignment.

The gods of a pantheon need not be of a single alignment, nor even
a group of related alignments. In my own campaign, my two pantheons each
represent a plethora of view-points and the full range of alignments.

Let the priest, and indeed the priesthood, fit the god. Little
details do count; the priests of Loroth (God of the Good Earth) never
wear shoes that their feet never leave the ground. The priests of Woolio
(Duke of the Drunk, and God of Gravity) must start the day with a ritual
called “Hair of the Dog” lest they be struck with mystic fits of
migraine…. Woolio, by the way, invented gravity so he could fall,
well, um, down.

The spells that each Deity can grant should be closely related to
the Deity’s philosophy, and sphere of power, thus Loroth cannot grant
such spells as Levitation, nor Wind Walk. Woolio’s priests are at a loss
to cast such spells as Neutralize Poison (alcohol is after all a poison,
and the reverse of this spell cast by Woolio’s adherants causes the
victim to be quite intoxicated…), and True Seeing.

Gods have to be limited in both the type and number of spells that
they can grant to their priests. The former so that the spells that
their priests cast conform to the theology. The latter so that priests
will usually choose at least on extremely potent god and possible on or
two additional gods, this will serve to simulate the side-byside style
of worship so common in pantheon religions. I offer this chart regarding
the number of spells each god can grant.

Spell Level:
1 2 3 4 5 6 7 Deity Rank: Greater: 12
12 12 9 7 5 3 Major: 12 12 9 7 5 3 1
Minor: 12 9 7 5 3 1 – Lesser: 9 7 5 3 1
– – Demi-God 7 5 3 1 – – – Saint: 5 3
1 – – – –

According to the AD&D system a Cleric gains his/her spells through
prayer, meditation, and study. First and Second level spells are gained
from the teachings of the church, wether by rote chants, reading prayer
books or similar means. Third, Fourth, and Fifth level spells are
communicated to the Cleric via the Deity’s servants: Saints, Devas,
lesser Devils or Demons, etc., as the priest prays. Finally Sixth and
Seventh level spells are granted by the deity itself.

Utilizing the rules outlined in this text observe the following
example.

Laurus the True is an eleventh level Cleric with a 14 Wisdom who
worships a Major God, a Lesser God, and a Saint of the Major God. Laurus
chooses the following numbers of spells from his deities:

Divinity:
Major Lesser Saint Spell Level: 1
3 3 1 2 2 2
0 3 1 1 2 4
1 2 – 5 0 2 –
6 1 – –

To receive the Sixth level spells he is in direct communication
with the Major Deity. The Major Deity sends a deva with the Third and
Fourth level spells.

A deva servitor of the Lesser God brings the Third through Fifth
level spells requested by the priest.

Finally the Saint himself (at least in spirit) visits the priest
with the Third level spells and possible any news of import.

In this scenario the priest would likely have a very close
relationship with the Saint, as the Saint consults with him on each day
bringing spell-knowledge.

The next step in meshing religion and Deities into the campaign is
to list each of the cities in it. Once such a list is complete, count
the churches in each city, adding them to the list categorically by
location. Now define whether each of the churches are mono- or poly-
theistic in beliefs. I recommend that such a list be patterned after the
example below.

KINGDOM CITY ALIGN- PRIM- SECOND- TE RTI-
MENT ARY ARY A RY

Southeron Portsmouth CG(N) Imparte Publius As sorte

Ghar-Dun N Ithain Woolio

Velton Velton NG Loroth Oberik Go ram

The categories of Kingdom and City are self explanatory. Alignment
is that of the Deity, or a consolidation of the Deities involved
(obviously no church should house more than a “one place” difference
between the alignments of its Deities [see DMG page 37, Alignment
Factors]). In the above example (the Southeron Kingdom, City of
Portsmouth), Imparte (the Benefactress) is Chaotic Good, Publius (the
Speaker) is Chaotic Neutral with Good tendencies, and Assorte is Chaotic
Neutral. All are of similar alignment, and their Credos are not
dissimilar, so a Cleric of one, might also recognize one or both of the
others. In this instance Imparte enjoys the position of “Most Exalted”,
having the majority of direct followers. The church is designated as
Chaotic Good with Neutral tendencies, as this is the direction of the
most “counts”, rational as follows.

Inclinations are: Good, Evil, Lawful, Chaotic, and Neutral.

The Primary Deity registers three (3) “counts” for each of its
Inclinations. The Secondary Deity registers two (2) for each of its
Inclinations, and the Tertiary Deity but one (1).

Tendencies are only half the normal value.

Add these “counts” up, the alignment is then derived from the
Inclinations with the most “counts”. In Portsmouth all of the
Inclinations are of Good, Chaos, and Neutral.

Inclinations
Good Chaotic Neutral Deity: Imparte
3 3 0 Publius 1
2 2 Assorte 0 1
1

Totals: 4 6 3

The results: Chaotic Good (heavy on the Chaos) with Neutral
tendencies.

Setting churches up like this will make the task of choosing
Deities much easier for the Cleric, as most priest will want to be
associated with just such an established organization. It also gives the
DM more control of the religious groups, and a better method of
recording them.

The Rules set forth in this article should facilitate religion
simulation, promote pantheonism, and greatly enhance any game while
keeping the effort at a minimum.

I hope you enjoy, and bid you good gaming.

The Circumstances Of Minor Planet Discovery, By Frederick Pilcher

THE CIRCUMSTANCES OF MINOR PLANET DISCOVERY

Frederick Pilcher
Illinois College
Jacksonville, IL 62650 USA

This file of minor planet discovery data has been prepared in machine
readable form for NSSDC and in hardcopy for ASTEROIDS II, (1988), ed. R. P.
Binzel, T. Gehrels, and M. S. Mathews (Tucson: Universiy of Arizona Press).
The machine readable list contains complete data for all numbered minor planets.
The hard copy contains complete data only for planets 2125 and forward, and
notes pertaining to these planets. Those for the preceding planets were listed
by the writer in ASTEROIDS, (1979), ed. T. Gehrels (Tucson: University of
Arizona Press), pp 1130-1154. A few mistakes in the first book have since been
found and corrected in the machine readable version, and the reader will note
small changes in the numbering of some of the NOTES. Diacritical marks for the
names of planets, increasingly omitted from machine readable lists, have been
added by hand to the hardcopy.

The first column, 4 characters, contains the permanent number; the second,
l6 characters, the official name; the third, for planets 330 and forward, the
provisional designation attached to the discovery apparition; the fourth, the
year, month, and day of discovery according to criteria explained below; the
fifth, the name of the discoverer, discoverers, or institution of discovery;
the sixth, the discovery place. The seventh column is used when needed for
notes referencing two or more discoverers with names of combined length too
great to fit in the discoverer column, to give a more complete description of
programs involving several persons, and to reference cases in which two
numbered planets were subsequently discovered to be identical and the number
and name of one of these was reassigned to a newly-discovered planet. Notes
have also been used to reference conflicting discovery claims and list
important independent discoveries which are no longer regarded as official.

The discovery date is in local mean time prior to 1 January 1925, and
in UT thereafter, and refers to the time of mid-exposure for planets discovered
by photographic means. In many cases the permanent number was assigned only
when several unnumbered planets observed in different years were found to be
identical, often many years after the discovery photographs were made. In
these cases the discovery date is the first of that series of photographic
observations from which the preliminary orbit was computed, and the provi-
sional designation is that associated with this particular set of observations.
Often earlier observations exist, but they are considered prediscoveries.
In some cases the discovery and subsequent observations permitted images to be
found on photographs obtained at the same observatory earlier in the discovery
apparition; these earlier observations are considered prediscoveries.

The following literature has been examined comprehensively to determine
the discovery data:

STRACKE, G., Identifizierungsnachweis der Kleinen Planeten (Berlin, 1938).
HERGET, P., Names of Minor Planets (University of Cincinnati Observatory,
1957, 1967).
Astronomische Nachrichten.
Astronomische Nachrichten Indices.
Monthly Notices of the Royal Astronomical Society.
Rechen-Institut Circulars.
Beobachtungs Zircular.
Minor Planet Circulars.
Lick Research Surveys on Minor Planets.
Turku Informo.

Acknowledgments. The authors wish to thank the following people for valuable
contributions to this work. B. Marsden has arduously searched the literature,
resolved various errors and discrepancies, and has passed judgment on con-
flicting discovery claims. J. Meeus and M. Combes have prepared an earlier
list of discovery data from which the present list was adapted and expanded,
and J. Meeus has provided a complete list of diacritical marks of names of
minor planets. K. Kelly and J. LoGuirato have proofread the material, and
provided coninuing advice and counsel.

A Very Massive Disclaimer

This product is meant for educational purposes only. Any resemblance to
real persons, living or dead is purley coincidental. Void where
prohibited. Some assembly required. List each check separately by bank
number. Batteries not included. Contents may settle during shipment.
Use only as directed. No other warranty expressed or implied. Do not
use while operating a motor vehicle or heavy equipment. Postage will be
paid by addressee. Subject to CAB approval. This is not an offer to
sell securities. Apply only to affected area. May be too intense for
some viewers. Do not stamp. Use other side for additional listings. For
recreational use only. Do not disturb. All models over 18 years of age.
If condition persists, consult your physician. No user-serviceable
parts inside. Freshest if eaten before date on carton. Subject to
change without notice. Times approximate. Simulated picture. No postage
necessary if mailed in the United States. Breaking seal constitutes
acceptance of agreement. For off-road use only. As seen on TV. One size
fits all. Many suitcases look alike. Contains a substaintial amount of
non-tobacco ingredients. Colors may, in time, fade. We have sent the
forms which seem to be right for you. Slippery when wet. For office use
only. Not affiliated with the American Red Cross. Drop in any mailbox.
Edited for television. Keep cool; process promptly. Post office will
not deliver without postage. List was current at time of printing.
Return to sender, no forwarding order on file, unable to forward. Not
responsible for direct, indirect, incidental or consequential damages
resulting from any defect, error or failure to perform. At
participating locations only. Not the Beatles. Penalty for private use.
See label for sequence. Substantial penalty for early withdrawal. Do
not write below this line. Falling rock. Lost ticket pays maximum rate.
Your cancelled check is your recipt. Add toner. Place stamp here. Avoid
contact with skin. Sanitized for your protection. Be sure each item is
properly endorsed. Sign here without admitting guilt. Slightly higher
west of the Mississippi. Employees and their families are not
eligible. Beware of dog. Contestants have been briefed on some
questions before the show. Limited time offer, call now to insure
prompt delivery. You must be present to win. No passes accepted for
this engagement. No purchase necessary. Processed at location stamped
in code at top of carton. Shading within a garment may occur. Use only
in well-ventilated area. Keep away from fire or flame. Replace with
same type. Approved for veterans. Booths for two or more. Check here
if tax deductible. Some equipment shown is optional. Price does not
include taxes. No Canadian coins. Not recommended for children.
Prerecorded for this time zone. Reproduction strictly prohibited. No
solicitors. No alcohol, dogs, or horses. No anchovies unless otherwise
specified. Restaurant package, not for resale. List at least two
alternate dates. First pull up, then pull down. Call toll free before
digging. Driver does not carry cash. Some of the trademarks mentioned
in this product appear for identification purposes only. Record
additional transactions on back of previous stub.

This supersedes all previous notices.

Neuropsychological Bases Of Educational Disabilities: Implications For Diagnosis And Remediation, By Robert Zenhausern, Ph.D., February, 1990 (January 8, 1993)

From: patth@sci.ccny.cuny.edu (Patt Bromberger)
Newsgroups: misc.handicap
Subject: Paper on Reading Disabilities
Message-ID:
Date: 8 Jan 93 20:00:12 GMT
Originator: wtm@sheldev.shel.isc-br.com
Lines: 1736

Index Number: 27023

NEUROPSYCHOLOGICAL BASES OF EDUCATIONAL DISABILITIES

Implications for Diagnosis and Remediation

Expert Paper Submitted to the United Nations
Disability Unit, Vienna
February, 1990

Robert Zenhausern, Ph.D.
Professor of Psychology
St. Johns University
Jamaica, NY 11439
USA

INTRODUCTION

The paragraphs below are in the form of a satire based on the
essay by Jonathan Swift entitled “A Modest Proposal” in which he
presented a solution to the “Irish Problem”. The parallel here is
Learning Disability and the inflexible ways these children are
taught. It is the objective of this paper to show that the problem
of the learning disenfranchised is one that can be solved by
increasing the flexibility with which we teach.
Another Modest Proposal:
A Swift Response to an Old Problem
The purpose of this essay is to examine the possibility that we
are systematically doing a disservice to a large segment of the
school population. Students who have auditory or visual
impairments have been allowed to use artificial means, such as
glasses or hearing aids, to correct their deficits. Indeed, it is
considered praiseworthy to identify such problems early and then
use the services of professionals who prescribe optical or
electronic devices which alleviate the deficiencies.
The consequences of such actions, however, have not been
considered fully. Such children may become lazy and make no
attempt to overcome their problems. What motivation will they have
to strengthen their perceptual weaknesses when such devices make
it unnecessary for them to do so? What will such people do if, for
whatever reason, such devices are not available? It is the
contention of this paper that artificial devices are crutches which
interfere with the complete development of the child. As such,
they should be eliminated.
Some might argue (and not without a modicum of validity) that
by eliminating those “support systems,” such children may not
progress beyond the elementary rudiments of learning. That,
however, should be secondary to the point that we are not dealing
directly with a serious problem. The fact that our present state
of knowledge does not allow us to correct such deficiencies should
not dissuade us from this course of action. Eventually specific
techniques will be developed to meet the problems of poor eyesight
and hearing in much the same way that techniques were developed to
alleviate reading and mathematical difficulties — and probably
with as much success. There is a minor problem in the fact that
many of the authority figures in the child’s environment use those
same artificial devices and thus do not serve as good role models.
Aside from the educational wisdom of this proposal, it has the
added advantage of eliminating the possibility of charges of
discrimination. Consider, for example, if someone raised the point
that a deficit in vision or hearing might be compared to a deficit
in arithmetic computation. They might argue that if vision can be
corrected by glasses why can a calculation deficit not be corrected
by the use of a calculator? It is difficult to counter these
arguments since the two deficits have so much in common. Even the
poor role model problem has a parallel since most of the authority
figures whom the children contact would have some difficulty in
taking a square root or doing long division of decimals by hand.
The conclusion is clear: take away glasses and hearing aids and
give the children with sensory defects the same advantages given
to children with calculation defects!
* * *
The essay is clearly satirical, but its point is clear. In
this Decade of the Disabled it is essential to consider the human
rights of the Learning Disabled to an education that more closely
fits their capabilities. The problems of the Learning Disabled are
unique because this is the only disabled group which is held
responsible for its disability. “If he worked harder, he could do
it”, says the frustrated teacher. No one expects a blind person
to see, if he or she “worked harder”. Furthermore, to call a child
“learning disabled” is to put the burden of responsibility on the
wrong person! It is our responsibility to teach much more than it
is the responsibility of the child to learn. It is we who should
be called teaching disabled. The purpose of this paper is to focus
attention on individual differences among both normal and learning
disabled children and to consider alternative approaches to
education and thus eliminate our teaching disability. The major
emphasis will be on the theory and remediation of reading
disability based on a 10 year program of research within a
neuropsychological framework. The initial Chapter will introduce
the concepts of cerebral asymmetry and hemisphericity and put them
in perspective for education today. The second Chapter will
discuss behavioral and physiological measures of individual
differences in neuropsychological functioning. The third Chapter
will describe a study that underlines the importance of these
individual differences in an educational setting. The fourth and
fifth Chapters will describe a series of studies dealing with the
theory, diagnosis and remediation of reading disability that has
been based on these neuropsychological concepts. The final Chapter
will be a summary that includes the basic information on the Direct
Access approach to reading with specific recommendations. It can
serve as an abstract of the whole paper.
This Introduction ends with a short quote, found hanging on
the walls of an elementary school in Greensboro, North Carolina and
attributed to Ken Dunn.

If children cannot learn the way we are teaching them,
then we must teach them the way they can learn.

CHAPTER 1
THE CEREBRAL HEMISPHERES OF THE BRAIN AND THE NEW PHRENOLOGY

Recent work in the areas of neuropsychology, especially that
of Sperry who won the Nobel Prize, has popularized the notion of
cerebral asymmetry. That is, the two hemispheres of the brain are
different in terms of the cognitive processes in which they excel.
There is clear evidence that the Left Hemisphere has unique control
of expressive speech and operates using a sequentially organized
system. The Right Hemisphere, on the other hand, has systems that
are more capable of spatially and pictorially oriented processing.

While there are clear differences between the hemispheres,
these differences have been overgeneralized into a new phrenology
of brain functions. A typical list of “Left Hemisphere Functions”
reads something like: logical, verbal, analytic, inductive,
controlled; the Right Hemisphere is often called: synthetic,
emotional, deductive, intuitive, and abstract. Some of these
labels are self-contradictory. The Left Hemisphere is called both
analytic and inductive and the Right Hemisphere both synthetic and
deductive. The term “abstract” has two diametrically opposed
meanings: an article abstract versus abstract art. These
inconsistencies aside, this neo-phrenological approach must be
rejected on the grounds that it is atomistic. A hemisphere is
neither verbal, logical, emotional, nor creative; it is a person
who has these characteristics! All behavior flows from the
integrated functioning of the whole brain. This does not mean,
however, that there are no individual differences associated with
the brain. The concept of Hemispheric Related Strategies provides
a framework on which to base an individual difference variable.
For the most part, the two hemispheres do the same things but
do them using different approaches. Cerebral asymmetries reflect
relative efficiency rather than a “can do-can’t do” dichotomy.
There seems to be one exception to this relative rather than
absolute difference between the hemispheres: for most people, only
the left hemisphere is capable of speech and of phonetic
representation (Levy, 1974). The isolated Left Hemisphere can tell
whether the two words “though” and “blow” rhyme but the isolated
Right Hemisphere can not, even though it may understand their
meaning. Rhyming demands that the written word be converted to an
auditory form and only the left hemisphere has this capability.
A second factor that differentiates the two hemispheres is their
type of processing systems: sequential for the left hemisphere and
parallel for the right hemisphere (see Bradshaw and Nettleton, 1981
for a review.) Compare these two situations: 1) You are given a
description of someone and must then identify that person; and 2)
You are shown a picture of the person and then must select the
person. The first task demands the sequential system of the left
hemisphere–the words, descriptive of the various facial features,
are read in sequence and must be combined into an overall
perception. The latter situation reflects the parallel system of
the right hemisphere — the picture is seen as a whole and various
facial features can be extracted. The picture is seen all at once
in parallel while the verbal description must be sequentially
processed. The sequential processing system of the Left
Hemisphere and its ability in speech production are the
characteristics that underlie the notion that the Left Hemisphere
is the verbal hemisphere. Language, by its very nature, is
sequential. Word order and syntax are essential to meaning–
language cannot be easily processed in parallel. Thus the left
hemisphere has been labeled the “verbal” hemisphere because its
sequential processing system is compatible with the sequential
nature of language, and its control of auditory linguistic
processes makes it essential for speech.
For other tasks, even though the processing system of either
hemisphere is compatible with the task, one hemisphere is clearly
superior. The example of face recognition shows intuitively that
the Right Hemisphere pictorial approach is better than a Left
Hemisphere written description. Note, however, that the task can
be done using Left Hemisphere strategies, but it takes a thousand
words to describe one picture. Spatial relations tasks are
also more easily handled using Right Hemisphere processes. Other
tasks can be handled equally well using the strategies of either
hemisphere. For example, a list of words could be learned by
converting and storing them as visual representations or in an
auditory form. The term Hemispheric Related Strategies can be used
to describe this relationship between observable behavior and its
underlying neuropsychological bases.

Hemispheric Cognitive Style
Two individuals, when faced with the same task, do not
necessarily use the same strategies, that is, people do things in
different ways. Sometimes those different approaches can be
associated with processing differences between the two cerebral
hemispheres. These different approaches can be termed Hemispheric
Related Traits. Hemispheric Cognitive Style is the tendency of an
individual to use distinct patterns of Hemispheric Related Traits.
It does not imply that one hemisphere is used exclusively, but that
individuals tend to approach tasks in unique and consistent ways.
For example, if a group of individuals were asked to remember the
words “dog, cat, tree, table, chair”, few would have difficulty.
If these same individuals were asked what strategies they used,
there would be wide variation. Some would report they repeated
the words to themselves, others that they “saw” the written form
of the word, and others would create images of the words.
These differences in memory strategies can be related to
Hemispheric Related Traits. A person who would be more likely to
use imaginal strategies could be said to use a right Hemispheric
Related Trait, and a person who used auditory strategies could be
said to use a left Hemispheric Related Trait. Some individuals
tend to use the Hemispheric Related Traits associated with one
hemisphere more than those of the other hemisphere and others show
little or no bias. Those who do favor the Hemispheric Related
Traits of one hemisphere can be said to have a Right or Left
Hemispheric Cognitive Style. It is important not to
overgeneralize the scope of Hemispheric Cognitive Style. The fact
that a person tends to use particular strategies implies neither
a disuse nor deficiency in one hemisphere of the brain. On a very
simple level, a right Hemispheric Cognitive Style individual has
access to the speech centers of the left hemisphere just as a left
Hemispheric Cognitive Style individual has access to the prosody
centers of the right hemisphere. Thus both right and left
Hemispheric Cognitive Style individuals rely on the integrated
functioning of both hemispheres for expressive speech, and, in
fact, all behavior. In an intact individual, no task can be
accomplished without the integrated functioning of both
hemispheres. To call an individual “left or right brained” is to
ignore the fact that all activity depends on the integrated
functioning of the whole brain. These differences, however, can
be related to different strategies with which people approach
specific tasks. One purpose of this paper is to show how these
strategy differences can affect the educational system. The next
chapter will describe how differences in Hemispheric Related Traits
can be measured. The following chapters will focus on the
application of these traits to mainstream and learning disabled
education.

CHAPTER 2
THE MEASUREMENT OF HEMISPHERIC COGNITIVE STYLE

Two distinct tools have been used in the measurement of
Hemispheric Cognitive Style, one behavioral and the other
physiological. The behavioral measure is a self rating
questionnaire and the physiological measure relies on the
predominant direction of Lateral Eye Movement (LEM).

The Hemispheric Preference Questionnaire
There are many questionnaires that have been used to measure
“hemisphericity” including many from popular magazines. Over the
past 12 years I have developed an instrument that has been
successfully used to separate right and left Hemispheric Cognitive
Styles. A copy of the questionnaire and its scoring key has been
included. The following studies used the instrument successfully.
Coleman and Zenhausern (1979) compared those who used right and
left Hemispheric Related Traits on a memory retrieval task. They
found the two groups differed on processing speed and the extent
of a left hemisphere bias induced by a verbal memory load. The
bias was four times stronger for the those who use left Hemispheric
Related Traits than for those who use right Hemispheric Related
Traits. Zenhausern and Nickel (1979) found that Right style
individuals learned a finger maze in fewer trials, in less time and
with fewer errors than Left style individuals. Zenhausern, Notaro,
Grosso, and Schiano (1981) presented right and left style
individuals with auditory messages in which there was a conflict
between verbal content and emotional tone of voice. Overall, those
who used right Hemispheric Related Traits responded significantly
more often to the inflection cues and those who use left
Hemispheric Related Traits significantly more often to the verbal
content. Zenhausern and Dunivin (1981) found that left style
subjects were more obsessive compulsive, while right style subjects
had more hysterical traits. Zenhausern and Parisi (1983) have
found that schizophrenics rate themselves as using left while
depressives rate themselves as using right hemisphere related
strategies. The instrument has been used in the area of
reading disability to distinguish two separate syndromes. Oexle
and Zenhausern (1980), Golden and Zenhausern (1981), Zenhausern
and Sinatra (1983), Maxwell and Zenhausern (1983) have found that
85% of reading disabled children rate themselves as using more
right than left hemisphere strategies. A copy of the test and its
scoring key can be found in Table 2.1.

Lateral Eye Movements
Research into the phenomenon of lateral eye movements (LEM)
as a behavioral measure of neuropsychological activity has been
pursued along two separate dimensions. LEM have been considered
a measure of both individual differences and task demands. From a
neuropsychological perspective, the individual difference aspects
have been associated with the concept of cognitive style and the
effects of task demands with hemispheric asymmetry. There is,
however, considerable controversy as to whether LEM do indeed have
neuropsychological relevance. The importance of LEM has been
overgeneralized to the point of faddism, which has led to a general
reluctance on the part of the scientific community to give them
credence. In addition, researchers in the area have sometimes
failed to distinguish between these two different aspects of LEM.

Table 2.1
The Preference Test for Hemispheric Related Strategies

Indicate your choice by assigning a number from 1 to 10 (with 1
being the lowest) on each question. To score the test, refer to
the scoring key below. Add the ratings for all the items that are
to be scored right and those that are to be scored left, subtract
the two and divide by 10. The larger number shows the predominant
preference and the greater the difference the larger the HRS
preference. You should then develop your own local norms, but as
a rule of thumb a score of .7 or higher can be considered a clear
indication of a preference for a Hemispheric Related Strategy.

Test Items

1) Do you base your decisions on objective facts rather than
feelings?
2) Are you psychic?
3) Do you like using symbols or images in solving problems?
4) Are you artistically or musically creative?
5) Are you logical?
6) Are you good at solving crossword puzzles?
7) Can you read quickly?
8) Are your daydreams vivid?
9) Can you think of synonyms for words easily?
10) Do you remember dreams?
11) Are your dreams vivid?
12) Are you fluent in using words?
13) Are you good at using images in remembering and thinking?
14) Do you use a playful approach to problem solving?
15) Do you use a serious, all business approach to problem
solving? 16) Do you like to keep experiences planned and
structured?
17) Do you like to read or think while sitting upright?
18) How much does your thinking consist of words?
19) How much does your thinking consist of mental imagery?
20) Do you like to explain something using visual presentation?

SCORING KEY

Item Scoring
1 L
2 R
3 R
4 R
5 L
6 L
7 L
8 R
9 L
10 R

Item Scoring
11 R
12 L
13 R
14 R
15 L
16 L
17 L
18 L
19 R
20 R
Individual Differences and LEM
Research into whether LEM
reflect individual personality differences was initiated by Day
(1964), who reported that the direction of LEM was related to
individual styles of coping with anxiety. Bakan (1971) was the
first to propose that the direction in which a person consistently
shifted gaze was related to which of the cerebral hemispheres an
individual used more often.
The relationship between LEM and various dimensions of
individual differences has been explored. Tucker and Suib (1978)
found that left-movers had higher scores on the Performance tests
of the WAIS and did better with imagery oriented questions while
right-movers had better scores on the Verbal subtests of the WAIS
and with questions that were letter and number oriented (e.g., how
many letters are in the word house). Gur and Gur (1975)
showed a relationship between direction of LEM and defensive style.
Predominantly rightward movers more often reported using projection
and “turning against others” as their main defenses, while
predominantly leftward movers reported using repression and denial
more often. LEM were again shown to be related to defensive styles
in males as measured by the Defense Mechanism Inventory (Krikorian
and Rafales, 1983). This effect was not replicated with females,
however (Thompson, Greenberg, Fisher, 1982). In addition, subjects
who moved their eyes bidirectionally rather than predominantly to
the left or the right were shown to have better adaptive coping
styles ratings on the adjective check list (Parrott, 1984).
Smokler and Shevrin (1979) showed that normal subjects with
hysterical tendencies made more leftward LEM than subjects with
obsessive compulsive tendencies. The latter group was more likely
to show rightward LEM. Gur (1978) and Schweitzer (1979) found that
schizophrenics had predominantly leftward LEM.
The relationship between LEM and cognitive styles has also
been explored. Subjects, who scored as left or right style
oriented on the Laterality Preference Schedule, were shown to have
consistent patterns of LEM, indicating the existence of consistent
patterns of information processing (Breitling and Bonnet, 1985;
Bruce, Herman, and Stern, 1982). When using the Your Style of
Learning and Thinking Test (SOLAT) to measure style of thinking,
however, no relationship was found between LEM and thinking style
preference (Alberts and McCallum, 1982). In addition, Owens and
Limber (1983) found no relationship between cognitive style and
LEM.
One area of interest in the cognitive style research is the
relationship between what are considered right style ways of
thinking (holistic and broad) and left style ways of thinking
(analytic and narrow) based on proposed functions of the individual
hemispheres. In support of the theory that eye movements indicate
hemispheric activation, and that left hemisphere activation is
associated with more analytic and narrow styles, Huang and Byrne
(1978) showed that narrow categorizers based on the Pettigrew’s
Category Width Scale made more leftward LEM than broad
categorizers.
Another area of interest has been the relationship between the
ability to recall dreams and LEM. Predominantly leftward LEM have
been associated with the ability to vividly recall dreams in male
subjects (Leboeuf, Mckay, Clark, 1983), but the same has not been
found with females (Van Nuys, 1985). A related issue is that of
creativity and LEM. Leftward eye movement has been associated with
thinking of more uses of objects on the Uses Test, which is often
used as a measure of creativity (Falcone and Loder, 1984).
Zenhausern (1987) has shown that LEM can differentiate between two
different types of reading disabled children. Specifically,
rightward LEM are characteristic of reading disabled children who
are unable to derive meaning from the written word despite being
able to say it. Leftward LEM are characteristic of reading
disabled children who are unable to pronounce the word despite
understanding what it means. This sampling of research indicates
the scope of individual differences that have been associated with
LEM. In their critique of the LEM literature, Ehrlichman and
Weinberger (1978) concluded that LEM are reliable measures of
individual differences. They found that despite differences in
methodology and experimental situations the direction a person
moves his or her eyes is a consistent behavior of that individual.
The individual difference studies above indicate their behavioral
relevance.

Functional Hemispheric Asymmetry and LEM
A second perspective on the nature of LEM was introduced by
Kinsbourne (1972) who proposed that LEM reflect the task demands
on the subject. He suggested that those tasks that require input
predominantly from the left hemisphere resulted in rightward LEM,
the direction away from the left hemisphere; those tasks that
required predominantly right hemisphere functions resulted in
leftward LEM, away from the right hemisphere. There has been
mixed support for this relationship between LEM and question type.
The critical variable has usually been whether rightward LEM are
associated with verbal questions, indicating a relationship between
a verbal task and left hemisphere activation. A wide variety of
what have been called “verbal” questions have been used, however.
Galin and Ornstein (1974) reported a relationship between
rightward LEM and logical problems and leftward LEM and visual
imagery tasks. Proverb interpretation has been shown to be
related to rightward LEM (Kinsbourne, 1972; Gur, 1975). Schwartz,
Davidson and Maer, 1977, found a relationship between LEM and task
demands. There have been recent reports of relationships
between both rightward LEM and verbal questions (Hugdahl and
Carlgren, 1981; Ogorman and Siddle, 1981) and leftward LEM and
visual spatial tasks (Swinnen, 1984). In addition to the
verbal/non-verbal dichotomy, emotionally laden questions were used
to elicit predominantly leftward LEM (Krikorian and Rafales, 1983;
Jamieson and Sellick, 1985).
Not all studies have resulted in significant findings. In
fact, Ehrlichman and Weinberger concluded that the evidence for a
relationship between LEM and question type was not convincing on
both empirical and theoretical grounds. From the empirical point
of view, they noted that of the 21 studies reviewed, 10 resulted
in rightward movement in response to verbal questions, and 11
resulted in no difference in LEM to verbal and non verbal
questions. The authors concluded that the literature thus did not
offer strong support that LEM were related to question type.
A re-evaluation of the empirical studies, however, indicates
that there is a consistent relationship found between the type of
question asked and the direction of LEM. In only one of the 21
studies reported by Erhlichman and Weinberger did verbal questions
lead to leftward LEM. While the conclusion that verbal questions
lead to rightward LEM may be in question, the conclusion that
verbal questions do not lead to leftward LEM is strongly supported.
There may be a relationship between task demands and LEM, but it
is not a simplistic “verbal question leads to rightward LEM
relationship”.
There is clear evidence that LEM are related to both the type
of question asked and individual difference factors. Therefore,
in any situation, LEM reflect the type of question asked
interacting with the individual differences and it is essential to
separate the two effects.
Two distinct tasks were used in a study by Zenhausern and
Kraemer (1989) to investigage the dual nature of LEM. One task is
purely informational and cannot be uniquely connected with either
hemisphere of the brain. The second task involves rhyming of non-
words which clearly demands the speech centers of the left
hemisphere. Two experimental questions were addressed. 1) Is the
direction of LEM consistent within an individual both across time
and across tasks? 2) Does the type of question asked have an
effect on the direction of LEM?
A total of 50 adult subjects were tested. There were 16 males
and 34 females, with an average age of 27 and a range of 16 to 50.
The stimuli for the rhyme task were four to five letter nonsense
words printed in black ink on white index cards and a series of
prepared questions.
The subjects were informed that they were participating in a
study involving the different ways in which people think. They
were asked two kinds of questions in a face to face encounter with
the experimenter. The subject responded yes or no with a nod or
shake of the head and the initial direction of eye movement to each
of 40 questions was recorded for each subject. These non-verbal
responses were used to eliminate left hemisphere involvement
through speech which was unrelated to the task. The 20
informational questions did not call on any clearly defined brain
areas (Is Miami the capitol of Florida?). The 20 rhyme questions,
on the other hand, clearly demanded the auditory linguistic
capabilities of the left hemisphere. The subject was shown a
nonsense word on an index card and told to remember it. The card
was removed and another nonsense word was verbally spelled by the
examiner and the subjects were asked whether the two words rhymed.
The subjects were tested in two blocks of 20 trials separated by
30 minutes. Within each block 10 informational and 10 rhyme
questions were asked.
The data were first explored by means of a correlational
analysis. Both test-retest and split half reliabilities for
informational questions and for rhyme questions are shown in Table
2.2. In addition, the correlation between rhyme and informational
questions is also presented. LEM are clearly a consistent measure
of individual differences with reliability coefficients averaging
approximately .80 for the same type of question. When the type of
question was changed, however, there was a dramatic drop in the
consistency of LEM although the correlations were still
significant. The direction of LEM changed as a function of task
demands, but not to the extreme that would result in no
correlation.

Table 2.2
Intercorrelations Among LEM for Information and Rhyme Questions

Split Half Test Retest
Rhyme .85 .78
Information .79 .83
Rhyme with Information .59

An initial analysis on the two 20 question blocks indicated
no significant differences and the two were collapsed into a single
set of questions. The data were then analyzed by means of a split-
plot analysis of variance with LEM Group (whether a subject had
predominantly rightward or leftward movement) as a between factor
and Task (Rhyme and Informational questions) and Direction of
Movement (Right, Left, and Stares) as between factors. Since the
scores are ipsative and the Grouping factor and dependent variable
are related, only the interactions are of interest in this design.
There was a significant interaction between the Direction of
Movement and Task. The results are shown in Table 2.3 below.

Table 2.3
Number and Direction of LEM as a Function of Type of Question

Task Direction of LEM
Right Left Stare

Rhyme 6.82 7.64 4.92
Information 5.50 7.50 6.50

Simple effects analysis indicated that the number of leftward
LEM to informational and rhyme questions were not significantly
different, but there were significantly more rightward LEM than
leftward LEM to rhyme questions. There were no interactions
involving the LEM Group factor, indicating that the effects of the
type of question were the same for both groups.
These results lead to two conclusions. The first is a
verification of the Ehrlichman and Weinberger (p 1093) conclusion
“…that LEM patterns are reliable characteristics of persons.”
Individuals do move their eyes in a consistent direction and
direction of LEM is a reliable measure of individual differences.
The questions, however, remain as to whether LEM differences can
be related to behavior and whether these behaviors have
neuropsychological implications. Some of the research reported
above has shown the scope of the variables that have been related
to differences in LEM. (A fuller listing can be found in Beaumont,
Young, and McManus, 1984). Not every study has shown that LEM
differences were related to differences in performance, but no one
should expect LEM to be related to all behavior.
The final question remains, however, as to whether LEM have
neuropsychological implications. In a very general sense, all
behavior results from brain activity and thus all behavior has
neuropsychological implications. From a more focused point of
view, LEM have been related to behaviors that neuropsychologists
have associated with the brain. The problem has been, however,
that the association of the behavior with the brain has not always
been clearly specified. Logical problems, proverbs, and spelling
have all been used as verbal tasks. These tasks are extremely
complex and clearly involve both hemispheres of the brain, even
though there may be a portion of the task that is especially
dependent on left hemisphere processing. This was clearly shown
in the present study since the rhyming task demanded the unique
ability of the left hemisphere to create the sound of the printed
word. The information task had no such clear connections to either
hemisphere of the brain. Both the correlations and analysis of
variance results pointed to the fact that LEM were different for
the two tasks, with an increase in the number of rightward
movements for the rhyming task. This change, however, was
relatively subtle. Even though the task demanded specific left
hemisphere input, subjects did not make predominantly rightward
LEM; there was only a shift in that direction. A subject who made
predominantly leftward movement continued to do so, but the number
of rightward movements increased and the number of stares
decreased.
Lateral Eye Movements have been shown to be a reliable measure
of individual differences, as well as a response to the type of
questions asked. The importance of both aspects, however, should
not be overemphasized. The individual difference aspect must be
investigated from a more behavioral point of view. Rather than
comparing a lawyer or a scientist with an artist, determine whether
a courtroom lawyer has more in common with an actor or a corporate
lawyer, or whether a geometrician has more in common with an artist
or an algebraist.
The LEM response to task demands must also be considered in
conjunction with the fact that any task demands the integrated
functioning of the whole brain. The variable extent to which a
task places special emphasis on one hemisphere must be considered
within this integrated functioning. LEM can be a useful tool, but
their value and meaning can be misunderstood all too easily. The
next Chapter provides evidence of the usefulness of LEM within a
normal classroom setting.
This chapter has presented the evidence that Hemispheric
Related Strategies can be measured by means of questionnaires and
LEM. The following chapters will provide evidence that this
individual difference variable has significance for education.

Chapter 3
THE INTERACTION OF HEMISPHERIC RELATED STRATEGIES
AND INDIVIDUAL DIFFERENCES

The purpose of this Chapter is to provide evidence that the
individual difference aspect of LEM has meaningful behavioral
correlates in an educational setting. No assumptions were made as
to the neuropsychological substrate of LEM. They were used simply
as a means of dividing subjects into two groups: those who move
their eyes predominantly to the right and those who move them
predominantly to the left. Half of the right movers were taught
a learning strategy involving verbal rehearsal and the other half
a learning strategy involving imagery. The same procedure was
followed for the left movers. The question was whether there is
a relationship between the typical direction of LEM and the
effectiveness of the two learning strategies.
The subjects were drawn from a pool of 120 average or above
average fifth and sixth graders in a suburban school system. A
series of verbal, spatial, imaginal, and informational questions
were asked in a face to face situation and the 72 subjects who had
the most extreme number of left movements and the most extreme
number of right movements participated in the study. The subjects
were divided into equal numbers of male and female right and left
movers.
Seventy-two words appropriate to fifth and sixth graders and
matched for abstractness, concreteness, and imagery were chosen
from the list provided by Pavivo, Yuille, and Madigan (1968). Two
equivalent sets consisting of 18 pairs, created from this list,
served as the learning stimuli. Two distractor lists of 12 pairs
each were also created using the same procedure. Each pair was
then photographed and developed as 35mm slides.
Each subject, tested individually, was seated approximately
4 ft. from a screen on which the 18 pairs of words were presented
by means of a slide projector for 4 sec. The child was then asked
to recall as many pairs of words as possible and the number of
correct pairs served as one dependent variable. The subjects were
then shown 24 pairs of words, half of which they had already seen
and half of which were distractors. These slides were then
presented and the subject had to indicate by switch closure whether
they had seen the word pair. Both accuracy and response time (in
milliseconds) were measured. Following this pre-training
procedure, half of the subjects whose LEM were predominantly
leftward and half whose LEM were predominantly rightward, were
taught a verbal rehearsal strategy in order to improve performance.
They were instructed to repeat the pairs of words as many times as
possible during the 4 sec interval between pairs. They were then
given six practice trials. The remaining subjects were instructed
on how to form an integrated image from the word pairs. They were
also given six practice trials. The subjects were then tested on
18 new pairs of words using the same procedures as in the pre-
training condition. This effectively created four groups: right
movers taught to use either imagery or verbal rehearsal strategies
and left movers taught the same strategies.
There were three dependent measures that were analyzed in this
study: the number of pairs recalled, the number of pairs
recognized, and the response time for recognition. The design for
all three variables was a split plot factorial with Direction
(leftward or rightward LEM) and Strategy (verbal rehearsal or
imagery) as the between factors and Time (before or after
training) as the within factor. The mean number of correct pairs
recalled under all conditions is shown in Table 3.1.

Table 3.1
Mean Number of Word Pairs Recalled for Right and Left Movers Under
Verbal Rehearsal and Imagery Instructions

Set Pre Test Post Test

Verbal
Left Movers 3.39 1.78
Right Movers 1.89 2.61
Imagery
Left Movers 2.61 3.28
Right Movers 2.39 2.56

The analysis of variance indicated no significant differences
involving Direction or Strategy, but there was a significant
interaction of Direction, Strategy. and Time. Simple effects
analysis indicated that children with rightward LEM did not change
as a result of imagery instructions, but made a significant
improvement as a result of verbal rehearsal instructions. Children
with leftward LEM made a significant improvement as a result of
imagery instructions, but showed a significant decrement as a
result of verbal rehearsal instructions.
Mean performance for the recognition scores is presented in
Table 3.2. The analysis of variance again indicated a significant
interaction between Direction, Strategy and Time.

Table 3.2

Set Pre Test Post Test

Verbal
Left Movers 29.28 27.61
Right Movers 28.11 29.44
Imagery
Left Movers 29.56 30.67
Right Movers 29.89 29.44

The simple effects analysis indicated that children with
rightward LEM showed a significant improvement using a verbal
rehearsal strategy and children with leftward LEM showed a
significant decrement using a verbal rehearsal strategy. The mean
reaction times for the recognition task is shown in Table 3.3. The
analysis of variance indicated that there was an overall decrease
in reaction time from pre to post testing and the same significant
three way interaction of Direction x Strategy x Time.

Table 3.3
Mean Reaction Times (in milliseconds) for the Recognition Task

Set Pre Test Post Test

Verbal
Left Movers 2059 2118
Right Movers 2447 1894
Imagery
Left Movers 2244 1829
Right Movers 1846 1627

Statistical analysis indicated that children with rightward
LEM were significantly faster using a verbal rehearsal strategy and
children with leftward LEM were significantly slower using a verbal
rehearsal strategy. The analyses of the three variables lead to the
single conclusion that children who have predominantly leftward LEM
should not be taught by a verbal repetition strategy.
From the theoretical perspective, these results support the
findings of Ehrlichman and Weinberger that LEM are a reliable
measure of an individual difference variable. It also provides
evidence of the validity of LEM; individuals who differed on LEM
showed differences on a relevant behavioral measure — verbal
learning. The most important question, however, is whether LEM
have any relationship to brain organization. Individuals who had
predominantly rightward LEM showed better retention when using the
left hemisphere oriented strategy of verbal rehearsal and
individuals who had predominantly leftward LEM showed decreased
retention when using the left hemisphere oriented strategy. These
are the facts, and while it is premature to draw firm conclusions,
these facts are consistent with the existence of a relationship
between LEM and brain organization. The clearest conclusion
from these findings is that children differ in the extent they can
benefit from a verbal repetition strategy in learning. From the
educational perspective it is clear that there are children in
schools who not only do not benefit from a verbal rehearsal
strategy, but whose performance is actually decreased. Spelling
and arithmetic tables are examples of subjects that usually stress
a rote memorization based on oral repetition. One alternative
would be to have the child repeatedly image the letters of the word
or number facts without verbalizing them. When it came time to use
the word or number fact the child would recall the image.
Educators must become more aware of the individual differences in
the way people learn. This becomes even more evident in the next
chapter where these individual differences can be seen to be at the
heart of what has been called reading disability.

Chapter 4
THE DIAGNOSIS OF READING DISABILITY

Although there is general agreement that reading disability
is not a single entity, there is considerably less than a consensus
as to the number of different syndromes that actually exist.
Neuropsychological assessment, the types of errors made with verbal
material, cognitive tests, and differences in processing strategies
have all been used in the classification of the reading disabled
into symptom-related subtypes. As many as five different subtypes
of reading disability have been found through the use of
neuropsychological tests.
For example, Mattis, French and Rapin (1978) reported three
groups and Doehring, Honshko, and Byans (1979) distinguished four
types. Fisk and Rourke (1979) Petroskas and Rourke (1979) have
identified subgroups which were consistent. These subtypes,
however, can be considered in terms of the presence or absence of
auditory linguistic deficits, a distinction reported throughout the
reading disability literature. Subtypes that include auditory
linguistic deficits comprise 80 to 90 percent of the total
population of reading disabled children. The smaller group has
usually been reported to show deficits in visual spatial
processing.
Boder (1973) examined the nature of the spelling errors made
by reading disabled children. She used the term dysphonetic to
describe the type of reading disability marked by linguistic and
phonetic difficulties; and the term dyseidetic to describe the type
which had difficulties with the overall visual spatial aspects of
the written word. Boder estimated that the dysphonetic group was
four to five times more prevalent than the dyseidetic group.
Pirozzolo (1979) used ratings, writing samples, and psychological
and neuropsychological tests to separate two reading disability
groups that were similar to those suggested by Boder. Bakker
(1982) proposed a similar distinction that he related to
hemispheric functioning. The auditory linguistic disabled reader
was not effective in the use of left hemisphere related tasks.
There was also an association of the visual spatial disabled reader
and the effective use of right hemisphere related strategies.
Zenhausern (1987) distinguished these two types on the basis
of both reading related tasks and the predominant direction of
their lateral eye movements. He found that the majority of
children with leftward lateral eye movements had difficulty
determining whether words in their sight vocabulary did or did not
rhyme. He also found that a group of children with predominantly
rightward lateral eye movements had no difficulty in determining
whether two words rhymed, but were deficient in determining whether
words and pictures represented the same concept. The auditory
linguistic group had difficulty converting a word to its sound and
the smaller group showed deficits in converting a word to its
meaning. He used the terms Phonetic and Semantic to describe this
distinction. From a behavioral perspective, phonetic disabled
readers are the children who struggle with every word when they
read aloud and thus lose continuity in the text. They are
frequently anomic and have a general difficulty with the auditory
linguistic aspects of reading, especially the grapheme to phoneme
conversion. The Semantic disabled reader, on the other hand, is the
child who will give a perfect word for word rendition of text, but
has no comprehension of the meaning of that text. The Semantic
disabled readers can convert words into their phonetic
representation, but this representation is not converted into its
meaning. They have no problems with the sound of a word but are
at deficit for tasks involving the meaning of words.
The original study was based on 13 Phonetic and 13 Semantic
readers from the second to fourth grades. One purpose of this
research was to determine whether these Phonetic and Semantic
subtypes would replicate across the entire elementary school
population. A second goal of this study was to replicate the
second finding of the original study. The Phonetic disabled readers
moved their eyes predominantly to the left and Semantic disabled
readers predominantly to the right. This second purpose was an
attempt to determine whether lateral eye movements can be used as
a marker variable for the two types of reading disability.
The subjects in this study were 160 children from the second
to the eighth grades. All were of at least average intelligence.
Forty children were selected at grades 2 or 3, grades 4 or 5,
grades 6 or 7, and grade 8. Of the 40 children at each age level,
20 were at or above grade level and 20 children were at least one
year below grade level in reading. Half of each group were chosen
on the basis of showing rightward LEM and half leftward LEM. The
predominant direction of LEM was determined individually for each
child. A series of 20 informational questions were asked in a face
to face situation and the predominant direction of LEM was noted.
Normal readers split evenly between right and left movers, but 84%
of the disabled readers were left movers.
There were four kinds of reading related tasks that used words
selected from the individual sight vocabulary of each child. A
rhyme task stressed the auditory linguistic aspects of the written
word and the remaining three tasks placed more emphasis on the
meaning of the words.
1) The rhyme stimuli consisted of 10 each of four types of
word pairs: a) words which neither rhymed nor had similar
orthography (tree/eats); b) words which were both phonetically
and orthographically similar (pool/cool);
c) words which were orthographically similar, but did not
rhyme (bone/gone); and d) words which were orthographically
dissimilar, but rhymed (by/tie). 2) The word match stimuli
consisted of 20 word pairs, one in upper case the other in lower
case which did or did not represent the same word (TREE/tree,
TREE/eats).3) The word/picture stimuli consisted of 20 word and
picture pairs, in which the word and picture did or did not
represent the same concept.
4) The synonym/antonym pairs consisted of words which meant
either the same or the opposite.
Each stimulus was presented on 35 mm slides and projected for
130 ms. The subjects were tested individually and responded
verbally as to the whether the words rhymed in the rhyme condition
and whether they matched or meant the same in each of the three
other conditions. All words used in the study were determined to
be in the sight vocabulary of all subjects on the basis of prior
testing.
The number of correct responses for all children on the four
grade levels was subjected to an analysis of variance for each of
the four tasks. The grouping factors included Grade Level, Reading
Ability, and Eye Movement Direction. The normal readers achieved
virtually perfect performance on all tasks and their results were
not included in the tables. The interaction of eye movement group
and the rhyme task was significant. The mean number of correct
responses for the interaction are presented in Table 4.1.

Table 4.1
Mean Number Correct on the Rhyme Task for Disabled Readers with
predominately Right and Left LEM at Four Grade Levels

LEM Grade Similar Dissimilar
Rhyme Non-Rhyme RhymeNon-Rhyme

Right 2-3 17.80 15.20 14.80 14.00
4-5 17.80 17.80 16.40 17.89
6-7 17.80 18.60 18.60 19.30
8 19.90 19.80 19.10 19.70
Left 2-3 16.10 5.90 7.40 14.40
4-5 16.10 10.30 10.20 17.30
6-7 16.80 13.60 12.50 18.50
8 9.60 12.00 10.40 17.60

On the basis of the simple effects analysis, those children who
had predominantly leftward eye movements were significantly more
impaired than those who moved predominately to the right. This was
particularly true on those conditions for which the orthography and
phonology of the words were inconsistent (bye/tie or bone/gone).
Those children with predominantly leftward lateral eye movements
are the Phonetic disabled readers who have difficulty with the
auditory linguistic aspects of reading. The analyses of
variance for the semantic tasks indicated a significant difference
between disability groups. The results from the three tasks are
presented in Table 4.2. Table 4.2
Mean Number Correct on the Uppercase/lowercase, Word/picture and
Synonym/antonym tasks for Disabled Readers with Right and Left LEM
at Four Grade Levels

LEM Grade Case Word Synonym

Right 2-3 15.70 7.90 8.65
4-5 17.50 7.80 6.55
6-7 18.80 13.40 13.05
8 15.90 15.90 15.00
Left 2-3 19.00 17.50 17.15
4-5 19.30 19.30 17.45
6-7 18.10 19.10 18.75
8 17.40 19.70 17.40

Again the normal readers performed almost flawlessly and the
disabled readers were inferior at every grade level. It was the
reading disabled readers with predominantly rightward LEM who were
the significantly more disabled group for these tasks. They were
significantly inferior on the word matching task, the word picture
task and the synonym antonym task. These children could create the
sound of a word from its orthography, but did not understand the
meaning of that word. This is a replication of a second type of
disabled reader, a Semantic subtype whose deficit involves the
meaning of words rather than their phonology. Rightward lateral
eye movements are a marker for this subtype. In the past, this
subtype has often been identified with visual spatial and
perceptual problems. This may be true but it is incidental to
their reading disability since they had no difficulty in perceiving
the words in the rhyme task. These results support the existence
of two subtypes of reading disability. The Phonetic disabled
reader has difficulty converting the written form of a word to its
phonetic counterpart. The Semantic disabled reader can convert a
word to its sound, but not its meaning.
There were two distinct patterns of errors made by the Phonetic
and Semantic disabled readers, but what is the relationship between
these patterns and reading disability? The answer to this question
lies in the way we teach reading. The next chapter is a discussion
of how these two deficits interact with current reading methods and
the effectiveness of a different approach to the reading process.

CHAPTER 5
THE THEORY AND REMEDIATION OF READING DISABILITY

Current teaching methods almost invariably use an indirect
phonological route to meaning in which the written word is
converted to its phonological counterpart so that meaning derives
from auditory comprehension. In practice, a child comes to school
with auditory comprehension, that is, hearing the word “ball” leads
to the concept of “a round, bouncy thing”. In reading, the letters
b-a-l-l must lead to the concept of “a round, bouncy thing”. In
virtually every case, the child is taught to see the word, say it,
and understand it from its sound. This is an effective technique
for two reasons. First, it takes advantage of the existing auditory
comprehension of children; second, it provides the background for
the future decoding of new words. As effective as this procedure
is for most children, a significant number of individuals are not
able to learn under this protocol and they comprise the majority
of the children we term “reading disabled.”
The Phonetic disabled reader has difficulty with the first step
of this indirect phonological route to reading, converting the
graphemic form of the word into its phonological counterpart. The
Semantic reading disabled readers have no difficulty with this
first step; they can make the grapheme to phoneme conversion. For
whatever reason, however, the sound of the word does not lead to
its comprehension.
The standard methods of teaching reading are well-entrenched and
educators sincerely believe that this indirect phonological route
to meaning is the best. Therefore, remediation for these “disabled
readers” means an intensification of what was not successful in the
past. Extensive drilling in phonetic skills has led to an emphasis
on teaching to weakness, rather than strength. The imbalance is
reflected in reading curricula and standardized tests that stress
phonetic decoding at the expense of comprehension. Phonetic
decoding is a means to the end of comprehension; it has become an
end in itself.
A new approach, Direct Access, has been developed which achieves
comprehension without the necessity of decoding. The Direct Access
method has one basic principle: the meaning of the printed word
should not be derived from the sound of that word. Any procedure
that avoids the grapheme to phoneme conversion is consistent with
this approach. The child is never required to read aloud, but
asked to explain what a passage meant. Trivial deviations in
verbiage, e.g., “jet” for “plane”, are de-emphasized. The stress
is on comprehension rather than a slavish word for word decoding.
One of the simplest procedures used in the method involves
pairing words and pictures until the written word triggers a
concept directly, rather than indirectly through its sound. The
child can then construct sentences composed of pictures in parallel
with sentences composed of words. Children automatically fill in
words like “a”, “the”, “in”, etc. when they comprehend the
sentence. In a very short period, the pictures are no longer
needed and the written word is understood on its own.
Several techniques are available for more abstract concepts.
One possibility involves a class discussion of, for example, our
legal system. The teacher can then show the class the word
“justice” and ask the children to draw a picture of justice. It is
not the picture itself that is important, but it serves as a link
between the written word and its conceptualization by the child.
Another possibility is a homework assignment requiring the child
to bring pictures to school that represent specific concepts.
Direct Access places only one constraint on the creativity of
teachers: Do not teach reading by deriving the meaning of a word
from the way it sounds. Phonic decoding is a skill that should be
developed, but it should not serve as the usual reading strategy
for these two groups of readers.
Maxwell and Zenhausern (1983) applied the method to First Grade
children who were “at risk” during the second semester. After 25
half-hour sessions, the children increased their comprehension
scores from the 26th to the 56th percentile on the Metropolitan
Achievement Test and increased their sight vocabulary by over 100
words. A comparable control group showed no gain in comprehension.
Minardi, Zenhausern, and Maxwell (1984) found similar results with
Junior and Senior High School children. Using the same regimen of
25 half-hour sessions, the Junior High School students gained an
average of 7 months and the Senior High School students an average
of 1.4 years.
The previous research on the Direct Access method of reading has
been limited to a small number of children taught by a single
teacher. The purpose of this study was to apply the method in a
large scale basis, using a broad range of grades and teachers.
A total of 209 children from grades 1 through 10 (with the
exclusion of Grade 9) who were at least one year below grade level
in reading and 240 children who were reading at least on grade
level were the subjects in this study.
A workshop explaining the theory and practice of the Direct
Access reading method was presented to teachers throughout a 32
school District in suburban North Carolina. After the workshop was
completed, those teachers who were interested were given further
experience. There were no absolute procedures specified, but the
teachers were shown various possibilities and were told to use any
techniques that did not depend on the indirect phonological route
to meaning. Following these sessions the children in the classes
taught by the teachers were given the Metropolitan Achievement Test
Form L as a pretest measure of their reading ability. The teachers
then used the Direct Access method exclusively for 10 weeks, after
which time the children were retested on the Metropolitan
Achievement Test Form M.
The results of the reading disabled children and a control group
are presented in Table 3. The average gain across the whole group
was almost 1 year and several grades showed gains of over 2 years.
Individual gains of 4 or more years were not uncommon. Given that
these results were obtained during only a 10-week period, the
Direct Access approach is clearly an effective strategy to use with
Phonetic and Semantic reading disabled children. In addition to
these objective gains, the teachers reported an extremely positive
reaction on the part of the students and have commented on the
effects of the method on both spelling and writing composition.
During the past year (1988-89) Greensboro and High Point, North
Carolina used the Direct Access approach. The average gain on the
State mandated California Achievement Test was over 20 percentile
points for those children. As a result, High Point has mandated
the Direct Access approach as the treatment of choice for children
who are “at risk” for reading. The approach has been used in
Currituck, North Carolina since September, 1989 and at Public
School 102 in New York City since January, 1990. There are plans
for incorporating Direct Access into a psychiatric hospital for
children, a Parochial school in New York City, and a school system
in East Greenwich, Rhode Island by February, 1990.

Table 1
Total Gains in Percentile and Grade Equivalent Scores for Direct
Access and Controls

Pre Post Gain
Per Grade Per Grade Per Grade

Grade 1
DA (38) 7 1.09 32 1.55 25 0.46
Control (27) 46 1.79 56 2.13 10 0.34
Grade 2
DA (21) 17 1.76 32 2.15 15 0.39
Control (36) 54 2.89 58 3.19 40 0.3

Grade 3
DA (28) 16 2.33 31 2.99 15 0.66
Control (28) 56 4.49 61 4.94 5 0.45

Grade 4
DA (52) 15 2.59 31 3.28 16 0.69
Control (53) 60 5.82 61 5.97 1 0.15
Grade 5
DA (20) 21 3.63 38 5.01 17 1.38
Control (38) 56 6.53 60 7.09 4 0.56

Grade 6
DA (13) 3 2.36 15 3.68 12 1.32
Control (17) 71 9.58 74 9.9 3 0.32
Grade 7
DA (21) 8 3.39 26 5.45 18 2.068
Control (18) 35 6.57 36 6.64 1 0.07
Grade 8
DA (9) 5 3.38 21 5.61 16 2.23
Control (10) 34 6.94 35 7.36 1 0.42
Grade 10
DA (7) 17 5.58 26 6.65 9 1.07
Control (13) 15 5.25 18 5.6 3 0.35

Total
Exper.(209) 12 2.27 29 3.22 17 0.95
Control (240) 52 5.35 56 5.71 4 0.36

This chapter has outlined some of the successes that have been
attributed to the Direct Access approach. The next Chapter is a
discussion of some of the methods that are consistent with Direct
Access.

CHAPTER 6
SUMMARY, CONCLUSIONS, RECOMMENDATIONS
Summary
Current teaching methods almost invariably use an indirect
phonological route to meaning in which the written word is
converted to its phonological counterpart so that meaning derives
from auditory comprehension. A child comes to school knowing that
the sound “ball” means the concept “a round, bouncy thing”. In
reading, the letters b-a-l-l must lead to the concept of “a round,
bouncy thing”. In virtually every case, the child is taught to see
the word, say it, and understand its meaning from its sound. This
is an effective technique for two reasons. First, it takes
advantage of the existing auditory comprehension of children;
second, it provides the background for the future decoding of new
words. As effective as this procedure is for most children, a
significant number of individuals are not able to learn under this
protocol and they comprise the majority of the children we term
“reading disabled.”
Kaliski, Zenhausern, and Andrews have shown that there are two
groups of children who have unique deficits that interact with
these standard strategies used for teaching reading. It is this
interaction that directly leads to reading disability. All the
children in grades 1 to 8 who were reading at least one year below
grade level were screened for inclusion in the study. The majority
of the reading disabled group (85 per cent) fall into the category
of children who have to struggle to pronounce every word and thus
lose all continuity in reading. They were termed Phonetic disabled
readers. The smaller group of reading disabled children can “read”
aloud fluently, but do not comprehend what was “read”. These
children were called Semantic disabled readers. The final sample
consisted of 80 children, 40 Phonetic and 40 Semantic disabled
readers, spread evenly across the 8 grades. The authors showed
that the Phonetic children could not determine whether two words
(which were known to be in their sight vocabulary) did or did not
rhyme. The Semantic group had no difficulty with a rhyme task, but
made considerably more errors than the normal readers and Phonetic
disabled readers in determining whether a word and a picture
represented the same concept. These two deficits can be directly
related to the indirect phonological approaches to the teaching of
reading. The Phonetic disabled reader can not convert the word to
its sound and thus can not take the first step required by these
reading methods. The Semantic disabled reader can perceive the
words and translate them to their sound but has difficulty in
comprehending the meaning of the written word from this sound. This
disabled reader can take the first step and convert the written
word to its phonological counterpart, but the sound does not lead
to meaning. The results of this study can be seen in Figures 1 and
2.

The standard methods of teaching reading are well-entrenched
and educators sincerely believe that this indirect phonological
route to meaning is the best. Therefore, remediation for these
“disabled readers” means an intensification of what was not
successful in the past. Extensive drilling in phonetic skills has
led to an emphasis on teaching to weakness, rather than strength.
The imbalance is reflected in reading curricula and standardized
tests that stress phonetic decoding at the expense of
comprehension. Phonetic decoding is a means to the end of
comprehension; it has become an end in itself. An alternative
approach to reading which does not depend on an indirect
phonological approach to comprehension, called Direct Access, has
one basic principle: the meaning of the printed word should not be
derived from the sound of that word. Any procedure that avoids the
grapheme to phoneme conversion is consistent with this approach.
The child is never required to read aloud, but is asked to explain
what a passage meant. Trivial deviations in verbiage, e.g., “jet”
for “plane”, are de-emphasized. The stress is on comprehension
rather than a slavish word for word decoding. Specific Direct
Access techniques will be discussed later in this chapter.
The first study involving Direct Access was by Maxwell and
Zenhausern (1982) who applied the approach to First Grade children
“at risk” in reading by the second half of the year. After 25 half-
hour sessions, the children increased their scores from the 26th
to the 56th percentile on the Metropolitan Achievement Test and
increased their sight vocabulary by over 100 words. A comparable
control group showed no gain. Minardi, Zenhausern, and Maxwell
(1983) found similar results with Junior and Senior High School
children. Using the same regimen of 25 half-hour sessions, the
Junior High School students gained an average of 7 months and the
Senior High School students an average of 1.4 years on the Reading
Comprehension scale of the Metropolitan Achievement Test.
During the Spring of 1988, over 200 reading disabled children
in grades 1 through 10 from 8 schools within the Guilford County
School System in Greensboro NC used the Direct Access approach.
The children were tested on the Metropolitan Achievement Test
before and after 10 weeks of using the approach. The average gain
was .95 years and every grade from Grade 6 onward gained at least
1 year, with the 7th and 8th grades showing gains of over 2 years.
In the Fall of 1988, High Point NC used the approach with 73
reading disabled children. After 7 weeks, there was an average
gain on the Woodcock Johnson of 15 months. The Kindergarten group
showed a 12 month gain; the primary, a 7 month gain, and the middle
school a 21 month gain. Both Greensboro and High Point, North
Carolina used Direct Access for the past year. On their State
mandated California Achievement Test, those children on Direct
Access instruction showed an average gain of 17 percentile points
above last year’s scores.

SELECTED DIRECT ACCESS TECHNIQUES
The results of the demonstration project and the use of Direct
Access in the past year in North Carolina clearly show that reading
disabled children can benefit from the Direct Access method of
teaching reading. To be able to read means that one can get
meaning from the printed word. The indirect phonological route
attempts to accomplish this by having the reader convert the
written word to its phonological counterpart and from this sound
derive meaning. Converting the word to its sound is a means to the
end of comprehension, not the comprehension itself. Direct Access
attempts to derive the meaning of the printed word not via its
sound, but directly. The stress is on comprehension, not decoding.
One of the first and most basic Direct Access techniques
consists of pairing an index card which contains a word and one
that contains a picture so that the child can consistently make the
pairing. At that point the child can read the word, that is, the
child can comprehend the printed word. Note that this is true
whether or not the child can say the word correctly or not. The
pictures can be provided by the teacher, cut from magazines for
homework by the child, or even drawn by the child. The question
of abstractions and hard to picture words at first seems
insurmountable, but it is surprising how easily a child will
develop and remember appropriate pictures. In connection with this
aspect, games can be developed to strengthen the connection between
the words and the pictures. Variations of Concentration and Old
Maid have been used successfully.
This pairing, however, is only the beginning of the Direct
Access approach. The typical reaction at this point is, “This is
nothing new.” or “We tried that 20 years ago and it did not work.”
The next step is the most critical. The words and pictures must
be combined into sentences. A word sentence can be covered by the
appropriate picture and vice versa. The child should not be asked
to read the sentence aloud, word for word. Rather, have the child
summarize the sentence, point to a picture from a series that
corresponds to it, or even draw a picture of the sentence. The
stress should always be on whether the child has understood the
basic meaning of the sentence rather than a word for word rendition
of it.
There are two important side benefits of this approach. One
is an increase in spelling skills. The second advantage is the
ease with which children can do creative writing using the cards.
It is a simple way to separate penmanship from writing. The child
could be asked to write the funniest (most exciting, etc.) sentence
they can from their words. The step from sentences to paragraphs
is minimal.
There are two basic approaches to class recitation within a
Direct Access framework. The phonetic disabled reader would be
asked to summarize a passage for the class and the teacher and
classmates could discuss the errors of omission and commission.
It also opens the door for class discussion on any relevant issues.
The semantic disabled reader would read aloud, but be required to
do so with expression to assure that the meaning and not only the
words were being read. Of course, any child could be given the
opportunity to use either approach.
Flash cards are a standard part of the classroom and can be
used within a Direct Access framework. Let the children have their
pictures in front of them when the words are flashed. They will
serve as a cue and minimize the chance of failure. As the children
progress, they can turn the pictures face down on the desk and only
turn them over as needed. This will strengthen skills and continue
to minimize the chance of failure. This technique could easily be
converted into a game where more points accrue if a card is not
turned over, but the child will always get some points.
What happens when children come across a word they have never
seen before? This is the usual response of people who first
encounter Direct Access. There are several approaches to this.
First and foremost, the child should be encouraged to determine the
meaning of the word from the context of the whole passage.
Second, the teacher can tell the child the word and immediately
have the child cut out or draw an appropriate picture for that
word.
Third, the child can be encouraged to look it up in the
dictionary just like anyone else who comes across a word with which
they are unfamiliar. The child may not be able to pronounce the
word, but its meaning will be known.
Fourth, phonetic decoding should be an essential part of any
reading program. It is an important skill and should not be
neglected. On the other hand, it should not be the main approach
to deriving meaning from the printed word for some children.
There is a temporary remediation procedure to use with Semantic
disabled readers. Have the child read aloud into a tape recorder.
Then the child can play back the tape while reading from the text
material. Although this is an awkward procedure it will allow the
child to get meaning from the printed word. Direct Access has a
technique for the teaching of spelling and number facts. It has
been shown that some children not only do not learn by verbally
repeating the word and letters (e.g. “cat, C-A-T, cat”, “6 times
3 is 18”) but this procedure can actually interfere with learning.
As an alternative have the child look at the word and practice
forming an image of the letters without saying anything (This is
essential!!). When it comes time to spell the word, have the child
bring back the image of the letters and copy them.
The Direct Access approach does not depend on a rigid structure
that the teacher must follow slavishly, but is a general principle
that can lead to unique and creative techniques. Furthermore, the
method is not limited to the disabled population, but may be an
effective strategy for all readers since it has some similarities
to “speed reading” techniques.

SUMMARY AND RECOMMENDATIONS
Summary
Reading Disability is as much a physical disability as
blindness, deafness and paralysis but a person with such a
disability has not received the help offered to those suffering
from the latter disorders. The reading disabled child is
considered responsible for the disability. The purpose of this
paper is to point out that these children can learn to read if only
we are willing to change the methods with which we teach reading.

The standard approaches to reading demand that the child
convert the written word to its sound and, from that sound, derive
the meaning. It was shown that 85% of the children we call reading
disabled have difficulty making that first step and the remaining
15% can convert the word to its sound, but this still does not give
them meaning. The Direct Access approach to reading can help both
types of children because meaning is not derived by converting the
printed word to its sound. Rather, the sound of the word is
derived from its meaning. Several specific techniques using this
approach have been discussed earlier in this Paper.
Our brain is capable of many fascinating and wondrous things.
Our conscious awareness of our surroundings is somehow derived from
light of various wavelengths falling on our retina and causing
neurons to fire and not fire. It is this pattern of neuronal
activity that gives us conscious experience. Even more amazing is
the ability to create literary, musical, and visual works of art.
It is the brain that is responsible for all of this. The brain
also has a rather obscure function. It can take an arbitrary
series of symbols (printed words) and convert them into an equally
arbitrary set of sounds (spoken words). This function pales
alongside literary and artistic masterpieces. Why have we made it
the basis of our educational system?
Recommendations
There are two major administrative recommendations that flow
from this paper. The first concerns the establishment of a centre
for learning disability to be associated with the Centre for Social
Development and Humanitarian Affairs. The second concerns the
development of a pilot project to investigate the effectiveness of
the Direct Access approach to reading.
1) A center for the dissemination of information and training in
learning disabilities should be established which would be called
the Learning Enhancement Centre of the Disabled Persons Unit.
The purpose of the Learning Enhancement Centre would be to
research and disseminate information on the theory and remediation
of educational disabilities and to provide training in the
remediation of these disabilities. The scope of this training
would include all educational approaches that stress the individual
styles of learning with a particular emphasis on the Direct Access
approach in reading. There would be two main educational foci:
1) ongoing workshops open to teachers from all member
countries; and 2) visiting teams which would provide on-site
training for those teachers who cannot travel to the Centre. In
addition, new teaching techniques would constantly be developed
and evaluated in real classroom situations. These teaching
techniques would take advantage of the latest technology, but the
effective use of more basic strategies would also be investigated.
The Centre would publish a newsletter to promulgate its activities
and share the latest innovations in teaching techniques.
2) A large scale pilot study should be initiated by the Learning
Enhancement Centre to evaluate the effectiveness of the Direct
Access approach across a wide variety of cultures. The Learning
Enhancement Centre would provide a series of workshops to train
teachers in the theory and practice of Direct Access. These
teachers would consist of individuals from various countries who
would then develop Direct Access projects in their country.
Consultants from the Learning Enhancement Centre would visit the
project sites to provide ongoing feedback to the teachers. These
same teachers can provide on site training for countries who are
unable to send teachers to the Centre. In addition to these
administrative recommendations, there are several educational
recommendations that are aimed at eliminating all forms of learning
disability. The aim of the Learning Enhancement Centre is to
implement these recommendations. 3) Individual preferences in
learning strategies should be taken into consideration in selecting
teaching strategies.
Both lateral eye movements and Hemispheric Preference Test data
should be collected on all children. Strategies of teaching that
are compatible with the learning strategies associated with these
Hemispheric Related Strategies should be incorporated into the
classroom. In addition, other measures of individual differences
in learning styles should be incorporated into the framework of the
Centre.
4) A testing program aimed at identifying individual differences
in learning styles should be developed at the Centre and
disseminated among the various member nations. Children can be
tested for Phonetic and Semantic reading disability by means of a
test derived from the results presented in Chapter 4. The Phonetic
Semantic Reading Scale (PSRS) requires a child to match written and
pictorial material on the basis of their sound or on the basis of
their meaning. The point would be to identify individuals who do
well on one portion of the test and poorly on the other to make a
differential diagnosis between the Phonetic and Semantic disabled.

5) The techniques described in the Selected Direct Access Technique
section above should be applied to these children.
These would include, but not be limited to:
a) Alternative forms of class recitation
b) De-emphasis of phonics
c) Use of word picture vocabulary cards
d) Emphasis on comprehension rather than decoding
6) The criteria for success should reflect the capabilities of the
child in conjunction with the demands of the culture rather than
artificial restrictions.
These would include, but not be limited to:
a) Speed should be de-emphasized
b) Tests should be given on an “open book” basis.
c) Calculators should be allowed on mathematics tests.
Note that these changes actually reflect the way people operate
in the real world. No successful business places unrealistic time
limits on workers or denies them use of tools and references.
7) An essential aspect of the Centre will be to develop new and
creative techniques aimed at the elimination of all forms of
learning disabilities.
While the emphasis at present is on developmental disabilities,
it is expected that this will expand to cover acquired
disabilities, especially those related to head injuries. The same
principles of educational remediation will be applied to cognitive
remediation. The major recommendation of this paper is that
learning disability should be recognized as a true disability and
treated in the same way as the more physical disabilities such as
deafness, blindness and paralysis. The learning disabled child
should not be considered at fault for the disorder, but should be
recognized as a person in need of special help. It is our
responsibility to supply that special help.
The emphasis must be on individualizing instruction rather than
finding the “one true method”. The good from all approaches must
be used with those who find it good and avoided for those who find
it not good. Only by tailoring our teaching to the unique style
of each student do we maximize their strengths rather than trying
to strengthen their minima.

BIBLIOGRAPHY

Alberts, F. L., & McCallum, R. S. (1982). The relationship among
three measures of cognitive style. Clinical Neuropsychology,4,
70-71.

Bakker, D. (1982) Cognitive deficits and cerebral asymmetry.
Journal of Research and Development in Education, 150, 49-54.

Beaumont, J., Young, A., & McManus (1984) Hemisphericity: A
critical review. Cognitive Neuropsychology, 1, 191-212.

Boder, E. (1973) Developmental dyslexia: A diagnostic approach
based on three atypical reading-spelling patterns.
Developmental Medicine and Child Neurology, 15, 663- 687.

Bradshaw, J. & Nettleton, N. (1981) The nature of hemispheric
specialization in man. Behavior and Brain Sciences, 4, 51-97

Breitling, D., & Bonnet, K. (1985). Lateralization of GSR, lateral
eye movements and a visual half-fields recognition task.
International Journal of Clinical Neuropsychology, 7, 140-143

Bruce, P. R., Herman, J. F., & Stern, J. (1982). Lateral eye
movements and the recall of spatial information in a familiar,
large-scale environment. Neuropsychologica, 20, 505-508.

Coleman, S. & Zenhausern, R. (1979) Processing speed, laterality
patterns, and memory encoding as a function of hemispheric
dominance. Bulletin of the Psychonomic Society, 14, 357-360.

Day, M. E. (1967) An eye-movement indicator of individual
differences in the psychological organization of attentional
process and anxiety. Journal of Psychology, 66, 51-62.

Denckla, M.B. (1979) Childhood learning disabilities. In. K.M.
Heilman and E.M. Valenstein (Eds.), Clinical Neuropsychology,
New York: Oxford University Press.

Dunn, R., Price, G., Bacilious, Z., & Zenhausern, R. (1983)
Learning Style — a predictor of school achievement. Momentum,
13, 47-48.

Dunn, R., Zenhausern, R., Cavanaugh, D., & Eberle, B. (1982)
Hemispheric preference the newest elements of learning style.
Journal of the National Association of Biology Teachers, 44,
291-294.

Dunn, R, White, R. & Zenhausern, R. (1984) Do educators create some
discipline problems? Illinois School Research and Development
Journal, 34, 56-67.

Ehrlichman, H., & Barrett, J. (1984) Right
hemisphere specialization for mental imagery: A review of the
evidence. Brain and Cognition, 2, 55-76.

Ehrlichman, H., & Weinberger, A. (1978) Lateral eye movements and
hemispheric asymmetry: A critical review. Psychological
Bulletin, 86, 1080-1101.

Falcone, D. J., & Loder, K. (1984). A
modified lateral eye movement measure, the right hemisphere,
and creativity. Perceptual and Motor Skills, 58, 823-830.

Fisk, J. & Rourke, B. (1979) Identification of subtypes of learning
disabled children at three age levels: A neuropsychological,
multivariate approach. Journal of Clinical Neuropsychology, 1,
289-310.

Furst, C. EEG asymmetry and visuospatial performance. Nature,
260, 254-255. Galin,D., & Ornstein, R. (1972) Lateral
specialization of cognitive mode: An EEG study.
Psychophysiology, 9, 412-418.

Galin, D., & Ornstein, R. (1975) Hemispheric specialization and
the duality of consciousness. Laterality and brain function.
Springfield, IL: C.C.Thomas.

Golden, M., & Zenhausern, R. (1983)
Grapheme to phoneme conversion: The basis of reading
disability? International Journal of Neuroscience, 20, 229-240.

Gur, R.E. (1978) Left hemisphere dysfunction and left hemisphere
overactivation in schizophrenia. Journal of Abnormal
Psychology, 87, 226-238.

Gur, R. E., & Gur, R. C. (1975). Defense mechanisms,
psychosomatic symptomatology, and conjugate lateral eye
movements. Journal of Consulting and Clinical Psychology,
43, 416-420.

Gur, R.E., Gur, R.C., & Harris (1975) Cerebral activation, as
measured by subjects’ lateral eye movements is influenced by
experimenter location. Neuropsychologia, 13, 35-44.

Gur, R.C., Packer, I, Hungerbuhler, J., Reivich, M., Obrist, W., & Amarner,
W.(1980) Differences in the ion of grey and white matter in the
human cerebral cortex. Science, 207, 1226-128.

Huang, M. S., & Byrne, B. (1978). Cognitive style and lateral eye
movements. British Journal of Psychology, 69, 85-90.

Hugdahl, K., & Carlgren, H. E. (1981). Hemispheric asymmetry as
indexed by differences in direction of initial conjugate
lateral eye movements (CLEMS) in response to verbal, spatial,
and emotional tasks. Journal of Mind and Behavior 2, 259-270.

Jamieson, J. L., & Sellick, T. B. (1985) Effects of subject-to-
experimenter distance and instructions on lateral eye movement.
Perceptual and Motor Skills, 60, 155-159.

Kaliski, M., Zenhausern, R., Andrews, R. (1989) The direct
access method of teaching reading and the diagnosis and
remediation of reading disability. International Journal
of Neuroscience, 44, 103-109.

Kinsbourne, M. (1972) Eye and head turning indicate cerebral
lateralization. Science, 176, 539-541.

Kinsbourne, M., & Warrington, E. (1963) Developmental factors in
reading and writing backwardness. British Journal of
Psychology, 54, 145-156.

Krikorian, R., & Rafales, L. (1983). Emotional stimulation,
defensive orientation, and hemispheric activation. Brain and
Cognition, 1, 371-380.

Leboeuf, A., McKay, P., & Clarke, K. (1983). Lateral eye movements
and dream recall in males: a reappraisal. Imagination,
Cognition, and Personality, 3, 61-68.

Lenhart, R. E. (1985) The effects of distance between interactants
and subject anxiety on conjugate lateral eye movements.
Brain and Cognition, 4(3), 328-337.

Levy, J. (1974) Psychobiological implications of bilateral
asymmetry. In S. Dimond & J. Beaumont (Eds.) Hemispheric
function and the human brain. New York: Wiley

Markman, S. & Zenhausern, R. (1988) The interaction of hemispheric related
strategies and individual differences in learning.
International Journal of Neuroscience, 43, 165-170.

Mattis, S., French, J., & Rapin, I. (1975) Dyslexia in children and young
adults: three independent neuropsychological syndromes.
Developmental Medicine and Child Neurology, 17, 150-163

Maxwell, M. & Zenhausern, R. (1983) Teaching reading to disabled
readers by eliminating the necessity for grapheme to phoneme
conversion. Paper presented at the Eastern Psychological
Association, Philadelphia.

Minardi, A., Zenhausern, R., & Maxwell, M. (1984) The remediation
of reading disability: a new approach. Paper presented at the
International Neuropsychology Convention, Houston.

Oexle, J. & Zenhausern, R. (1981) Differential hemispheric
activation in good and poor readers. International Journal of
Neuroscience, 15, 31-36.

Ogorman, J. & Siddle, D. (1981). The effects of question type and
experimenter position on bilateral differences in electrodermal
activity and conjugate lateral eye movements. Acta
Psychologica, 49, 43-51.

Owens, W., & Limber, J. (1983). Lateral eye movement as a measure
of cognitive ability and style. Perceptual and Motor Skills,
56, 711-719.

Parrott, C. A. (1983). Personality characteristics associated with
lateral eye movement patterns. Perceptual and Motor Skills,
58, 867-874.

Paivio, A., Yuille, J., & Madigan, S. (1968) Concreteness, imagery
and meaningfulness values for 925 nouns. Journal of
Experimental Psychology Monographs, 76, (1 pt. 2).

Petroskas, R. & Rourke, B. (1979) Identification of subtypes
of retarded readers: A neuropsychological, multivariate approach.
Journal of Clinical Neuropsychology, 1, 17-37.

Pirozzolo, F. (1979) The neuropsychology of developmental reading
disorders. New York: Praeger.

Schwartz, G., Davidson, R., & Maer, F. (1977). Right Hemisphere
Lateralization for Emotion in the Human Brain: Interactions
with cognition. Science, 190, 286-288.

Schweitzer, L. (1979). Differences of cerebral lateralization
among schizophrenic and depressed patients. Biological
Psychiatry, 14, 721-733.

Smokler, I. A., & Shevrin, H. (1979). Cerebral lateralization and
personality style. Archives of General Psychiatry, 36,
949-954.

Swinnen, S. (1984). Some evidence for the hemispheric asymmetry
model of lateral eye movements. Perceptual and Motor Skills,
58, 79-88.

Thompson, M., Greenberg, R. P., & Fisher, S. (1982). Defense
mechanisms, somatic symptoms, and lateral eye movements in
females. Perceptual and Motor Skills, 55, 939-942.

Tucker, D. M., Antes, J. R., Stenslie, C. E., & Barnhardt, T. M.
(1978). Anxiety and lateral cerebral function. Journal of
Abnormal Psychology, 87, 380-383.

Tucker, G. H., & Suib, M. R. (1978). Conjugate lateral
eye movement (CLEM) direction and its relationship to
performance on verbal and visuospatial tasks.
Neuropsychologica, 16, 251-254

Tucker, D. (1981) Lateral brain function, emotion, and
conceptualization. Psychological Bulletin, 89, 19-46.

Van Nuys, D. (1985) Lateral eye movement and dream recall: II sex
differences and handedness. International Journal of
Psychosomatics, 31, 3-7.

Weiten, W., & Etaugh, C. F. (1974) Lateral eye movement as related
to verbal and perceptual-motor skills and values. Perceptual
and Motor Skills, 36, 423-428.

Zenhausern, R. (1978) Imagery, cerebral dominance, and
style of thinking: A unified field model. Bulletin of
the Psychonomic Society, 12, 381-384.

Zenhausern, R. (1982) Rights and lefts and how they learn. Early
Years, 12, 51-67.

Zenhausern, R. (1983) Lateralized presentation
and hemispheric integration. American Psychologist, 38.

Zenhausern, R. (1987) The relationship of reading disability and
the techniques of teaching reading. International Journal of
Neuroscience, 34, 55-62.

Zenhausern, R. (1988) Eyes Right. Teaching K through 8, 23, 76-78.

Zenhausern, R. & Dunivin, D. (1981) Differential hemispheric
activation and handedness and hysterical and obsessive
personality styles. Bulletin of the Psychonomic Society, 17,
23-25.

Zenhausern, R., & Dunn, R. (1984) How brainy are you about the
brain? Early Years, 15, 46-49.

Zenhausern, R., Dunn, R., Cavanaugh, D. & Eberle, B. (1981) Do
right and left brained students learn differently. Roeper
Review, 4, 35-39.

Zenhausern, R. & Nickel, M. (1978) Hemispheric dominance in recall
and recognition. Bulletin of the Psychonomic Society, 13, 50-54.

Zenhausern, R. & Gebhard, M. (1979) Hemispheric dominance in recall
and recognition. Bulletin of the Psychonomic Society, 14, 71-73.

Zenhausern, R., Notaro, J. Grosso, J. & Schiano, P. (1980) The
interaction of hemispheric preference, laterality, and sex in
the perception of emotional tone and verbal content.
International Journal of Neuroscience, 13, 121-126.

Zenhausern, R. & Parisi, I. (1981) Brain dis-integration in
psychosis. Paper presented at International Neuropsychology
Society, Atlanta.

Zenhausern, R. & Sinatra, R.(1983) The rapid identification of poor
readers with a grapheme to phoneme deficit. Eastern
Psychological Association, Philadelphia.

—-
For more information contact:
Robert Zenhausern, Ph.D. Internet: drz@sjuvm.stjohns.edu
St. John’s University Bitnet: drz@sjuvm.bitnet
SB 15 Marillac Phone: 718-990-6447
Jamaica, NY 11439 Fax: 718-990-6705

Abbreviations For Map Regions

ABBREVIATIONS FOR MAP REGIONS (others will not be recognized)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
ADR Adriatic Sea DEN Denmark MOS Moscow SKA Skaggerak
AEG Aegean Sea ECH Eng.Channel MUN Munich SMY Smyrna
ALB Albania EDI Edinburgh NAF North Africa SPA Spain
ANK Ankara EMD East Medit. NAP Naples STP St.Petersburg
APU Apulia FIN Finland NAT NorthAtlantic SYR Syria
ARM Armenia GAL Galacia NOR Norway SWE Sweden
BAL Baltic Sea GAS Gascony NTS North Sea TRI Trieste
BAR Barents Sea GRE Greece NWS Norwegian Sea TUN Tunis
BEL Belgium HEL Helgoland B. PAR Paris TUS Tuscany
BER Berlin HOL Holland PIC Picardy TYR Tyrolia
BOH Bohemia ION Ionian Sea PIE Piedmont TYS Tyrrehnean Sea
BOT GulfofBothnia IRI Irish Sea POR Portugal UKR Ukraine
BLA Black Sea KIE Kiel PRU Prussia VEN Venice
BRE Brest LON London ROM Rome VIE Vienna
BUD Budapest LVP Liverpool RUH Ruhr WAL Wales
BUL Bulgaria LVN Livonia RUM Rumania WAR Warsaw
BUR Burgundy LYO Gulf of Lyon SER Serbia WMD West Medit.
CON Constantin. MAO Mid Atlantic SEV Sevastopol YOR Yorkshire
CLY Clyde MAR Marseilles SIL Silesia
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Decoding Social Security Numbers (September 8, 1992)

Article 2148 (25 more) in alt.privacy:
From: hhll@milton.u.washington.edu (Steven Hodas)
Subject: Decoding Social Security numbers
Date: 8 Sep 92 07:27:03 GMT
Organization: University of Washington
Lines: 43

I found this on CI$:

Decoding the Social Security Number
(from “Social-Security-Numbers And Other Telling Information:”
by Simson Garfinkel, published in the Whole Earth Review, Fall 1989)

The first three digits of a person’s Social Security Number indicate
the state that the person was living in at the time the number was
assigned (see table). The exceptions to this rule are numbers in the
700-729 range, which were issued by the Railroad Retirement agency, the
only such retirement plan to have its own block of SSNs.

The fourth and fifth digits indicate the group number. The sequence is
reported to be odd numbers from 01-09, then even numbers from 10-98, then
even numbers 02-08, and finally odd numbers 11-99. All numbers issued
before 1965 are either odd numbers between 01 and 09, or even numbers
between 10 and 98. The last four digits are the “serial number,” and run
from 0001 to 9999…

001-003 New Hampshire 318-361 Illinois 520 Wyoming
004-007 Maine 362-386 Michigan 521-524 Colorado
008-009 Vermont 387-399 Wisonsin 525 New Mexico
010-034 Massachusetts 400-407 Kentucky 585 New Mexico
035-039 Rhode Island 408-415 Tennessee 526-527 Arizona
040-049 Connecticut 416-424 Alabama 528-529 Utah
050-134 New York 425-428 Mississippi 530 Nevada
135-158 New Jersey 587-588 Mississippi 531-539 Washington
159-211 Pennsylvania 429-432 Arkansas 540-544 Oregon
212-220 Maryland 433-439 Louisiana 545-573 California
221-222 Delaware 440-448 Oklahoma 574 Alaska
223-231 Virginia 449-467 Texas 575-576 Hawaii
232-236 West Virginia 468-477 Minnesota 577-579 Washington, DC
232 N. Carolina (1) 478-485 Iowa 580 Virgin Islands
237-246 N. Carolina 486-500 Missouri 580-584 Puerto Rico
247-251 S. Carolina 501-502 N. Dakota 586 Guam
252-260 Georgia 503-504 S. Dakota 586 American Samoa
261-267 Florida 505-508 Nebraska 586 Phillipine Islands
589-595 Florida 509-515 Kansas 700-729 Railroad Retirement
268-302 Ohio 516-517 Montana
303-317 Indiana 518-519 Idaho

(1) Number 232, with middle digits 30, has been allocated to North Carolina
from West Virginia.

Fairmount Writes About James Dean

Fairmount bids farewell to Dean

James Byron Dean: Bad boy of the ’50s. He slouched. And there
was that studied, sometimes sullen smile. And the backswept hair that
foretold a young man moveing fast – too fast. And the gentle voice
that shouted defiance during those days when Ike was in the White House.
It has been 37(now 39) years since his name was etched in the
granite of his Indiana gravestone – and his image etched in the album
of American popular culture.
The icon remains untarnished:
The trio of movies in which he starred (East of Eden, Rebel Without
a Cause, Giant) continues to draw audiences – particularly in Europe.
His photograph is used today to sell shoes in so prestigious a
marketplace as The New Yorker magazine.
His legions of fans, many born after his death, continue to make
pilgrimages to the place on the Indiana landscape from which he came.
The placeis along Sand Pike, a two-lane blacktop road that splits
the otherwise-unbroken horizon of corn and soybean fields north of
Fairmount in Grant County in north-central Indiana.
Along the road, spread over two miles, are the shrines central to
the short life of James Dean, places to which the faithful flock,
particularly in late September near the anniversary of his death on the
30th – “9/30/55” in the cryptic code of his fans.
To the west of Sand Pike rises a typically Midwestern farmstead:
Two-story, white frame home resting on a fieldstone foundation. It has
an expansive front porch shaded by ancient oaks and sycamores, a porch
swing suspended from chains anchored in the roof. There is a normal
complement of outbuildings, and a stream meanders through the swales
and knolls in the land between the lawn and the tillable acreage.
It was here, on the farm of his aunt and uncle, Marcus and Ortense
Winslow, that James Dean grew from childhood to adolescence to maturity.
Dean’s cousin, Marcus Winslow, and his family now live here.
A mile to the south of the Winslow farm is a church, a Quaker
church. The Back Creek Friends Meeting. A circular drive approaches
the red brick building. True to Quaker and Midwestern values, the
church is unadorned. A mural of Christ as shepherd is the focal point
of the sanctuary, bathed in white light filtered through sharply vertical
and colorless windows.
And yet another mile to the south, is a cemetery. Park Cemetery.
As old as the Quaker community it was created to serve back before the
Civil War, it is the place where Fairmount, a community of 3,286, buries
its dead.
Fairmount, wrote Stewart Stern in his movie script for The James
Dean Story, is “not just a quaint little town, but a useful town, used
well and long by its people.”
Joseph Winslow, an ancestor of James Dean, established the first
farm in Fairmount Township of Grant County in 1830 – on the site that
is now the Marcus Winslow farm.
In 1850, a community was formed, which chose to call itself Pucker.
Pucker it was, and Pucker it remained, until 1870, when community
dissatisfaction with the moniker led to a renameing: Fairmount,
suggested by Joseph W. Balwin, who was attracted by the name of a park
in Philadelphia. Fairmount was incorporated on Dec. 10, 1870.
While James Dean may be the most widely celebrated son of Fairmount,
he is not alone. Among others:
Jim Davis, creator of the Garfield cartoon strip.
Phil Jones, former White House correspondent for CBS News.
Mary Jane Ward, author of the novel Snake Pit, an indictment of
mental health facilities in the late 1940’s.
Alvin Seal, an ichthyologist credited with major contributions
to the classification of Asiatic fish.
Robert Sheets, current director of the National Hurricane Center.
David Payne, a principal player in the creation of Oklahoma
Territory. He was the original Sooner.
In Park Cemetery, surrounded by the past generations of Fairmount,
is a granite gravestone, made remarkable only by the perpetual presence
of flowers, real and artificial.
The stone is a reddish pink, pock-marked by the work of pilgrims
who would take a fragment of the stone as a relic.
It is the final resting place of
James B. Dean
1931-1955
The stone is the second on the grave. The original was stolen in
1983 and was replaced before it was recovered in Fort Wayne in 1987.
It is to this place more than any other that the Dean faithful come.
They arrive in all seasons, at all times, in all vehicles. Most conduct
themselves with dignity; others, so eager for souvenirs, will strip an
ear of corn from a stalk in the field across the road and take it away.
Among those who come to this place, especially in late September,
are those who knew him.
On the afternoon of each September 30 since 1956 the family,
friends and followers of the actor who brooded his way into national
character have assembled at Back Creek Friends Church and at Park
Cemetery to play out a small drama of tribute. The roles have been set
by tradition.
There was the late Ortense Winslow, a reluctant participant for
whom the role became more burdensome each year. She and her late
husband, Marcus, reared the young man who blazed across the screen and
crashed in flames at 5:45 PM on Sept. 30, 1955, at a rural intersection
in San Luis Obispo County, Calif.

Phiction By Tristan Farnon Himself

80 Columns
Tristan Farnon presents…

+:-:-:-:-:-:-:+
| Dead End |
+:-:-:-:-:-:-:+ …another twistful adventure!

“Next, please.” said the attendent. Sarah had been working at Citicorp Savings
Bank for almost a year now. WHY? She asked herself. THIS HAS GOT TO BE THE MOST
BORING PLACE IN THE WORLD.

“Hello.” greeted the man politely. “My name is Max. In my left hand, I hold a
.22 caliber revolver.”

It took a few seconds for what he said to register in Sarah’s head. Then,
another few to actually realize what he meant. She froze.

“Please! Please…” smiled the man (if you could call it smiling – his eyes
were staring coldly at her, but his mouth was turned upward with a smile that
only LOOKED safe.) “Act natural. If you act as though something peculiar is
going on…I’m afraid I’ll have to shoot you.” his voice remained calm, but his
gun remained pointed.

“What do you want?” whispered Sarah.

“I’d like to make a withdrawl. A withdrawl of, say, ten thousand.”

“Let me check with my–”

“NO!” he commanded. “The money is in the drawer right in front of you. I’ll
take it in ten One-Thousand dollar amounts, please.”

Sarah quickly fumbled with the key to open the drawer. Hastily, she counted
out ten thousand dollars.

“Thank you. I would advise you to keep absolutely quiet and remain perfectly
still until I leave. My gun will be pointed at anyone and everyone within range.
Do you understand?”

“Yes.” replied Sarah, stiffening.

He quickly walked towards the exit. HURRY…HURRY…he thought. GET THE HELL
OUT OF HERE. YOU’RE ALMOST OUT THE DOOR. WALK NATURALLY.

Sarah let out a scream. “Stop him! He stole ten thousand dollars!! HELP!” The
security guard reached for his gun. “Freeze!”

Quickly drawing out his pistol, Max fired a shot at the guard. He crumpled to
the ground. Screams shot out from various locations of the bank. The second
security guard reached for his gun.

Instinctively, Max grabbed a young woman and held her in front of him. His gun
was pointed directly under her chin. He clicked the trigger back.

“ANYBODY MOVE AND I SHOOT A BULLET STRAIGHT UP HER SKULL!” he stated.

The guard dropped his gun to the floor. People stood around, not knowing quite
how to react.

“Nice to see you all. Have a nice day.” Still holding a handful of her long
blond hair, he pulled her out the door and into his car.

“Where are you taking me?” she cried.

“Shut up.” He started the car, and drove off at a speed that almost broke the
sound barrier. Keeping one hand on the wheel, he kept his other hand holding his
pistol, which was pointed straight at her.

“What’s your name.” he didn’t ask it…he said it.

“Cathy.” she whispered. “Where are we going. You don’t NEED me anymore. Let me
out of the car. Please.”

“Be quiet. We’re going to count my money – that’s where we’re going.”

They got out of the car right in front of his apartment.

“Get inside,” he commanded.

She walked across the room and sat on the bed, not looking at him. WHY DOES HE
WANT ME HERE? WHAT DOES HE WANT FROM ME?

“Look.” he said, and flashed the $10,000 in front of her face. “Quite a steal,
isn’t it?” She said nothing. “ISN’T IT!” he screamed.

“YES!” she screamed back, with tears in her eyes. “I WANT TO GET OUT!!”

“Have a drink.” he poured her a glass of scotch.

She decided to go along with him. “Thank you,” she whispered.

“Have you ever SEEN that much money before in your LIFE?” he boasted.

“No…I haven’t.”

“You’re a nice girl. A very nice girl.” he said. She said nothing. “See this?
See this gun? Watch.” He opened up the wheel and took all four bullets out of
the cage. “We’ll forget about the gun. Now we can enjoy ourselves.”

“What are you doing?”

“What does it look like?” he smiled…unbuttoning his shirt.

“LEAVE ME ALONE! DON’T COME NEAR ME!” she shrieked.

“Why? Don’t you like me? You do like me, don’t you? DON’T YOU!”

She smiled. “I like you…do you know why?”

“Because I’m rich. I’m a rich man.”

“Nope.” she said, reaching into her purse.

“They why?”

“Because you’re my first case.” she said, pulling out a gold badge and a
rather large pistol. “You’re under arrest.”

+:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:+
“Dead End” – Copyright (C) February 5th 1986 by Tristan Farnon
+:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:+

The Star Wars: Dark Forces FAQ By Karsten A. Loepelmann (Version 1.0, February 10, 1995)

_______ ___ ______ ___ __
/ _____ / _ | __ / / /
/ /####/ // / | |#| |##| |# / /
/ /#/ / /#/ /__| |#| |#_| |#
/ /#/ / /#/ __ |#| _ / # \
/ /#/ / /#/ /##| |#| |# # #
/ /#/__/ /#/ /#/ | |#| |## # ##
/________/#/__/#/ |__|#|__|##__ #__\##__
##############/ ######### #### ###/ ####/
__________ ________ ________ _______ ________ _______
/ _______// ______ | _____ / _____ / _____ / _____
/ /########/ /#####/ / | |####| | | |####_# ####/ / #####/
/ _____/#// /#/ / /#/ | |____| | | | ##/# ____ # ______
/ /######// /#/ / /#/ | ____ / | | # __ #_____
/ /#/ / /#/ / /#/ | |####| | | __ # #/ #####
/ /#/ / /#/_/ /#/ | | | || |_____/ / # ____ ___#
/___/#/ ________/#/ |__| |__|_________// #______/_______/
####/ ########/ |##| |##||#########/ #######/########/

_____________ _____________ ______________
/ / / /
/ _________/#// _________ / ________
/ /##########// /######### # #######
/ /#/___ | |#_______#| |# #
/ / | |# #
/ ______/#/ | _________ | # #
/ /#######/ | /######### | # #
/ /#/ | |#| |#| | # ___/
/ /#/ | |#| |#| | # _
/____/#/ |_____|#| |#|_____| # __________
#####/ |#######| |#######| ############______
#######/

—————————————————————————-
STAR WARS:
DARK FORCES
FAQList
“The dark side of the force
Just got darker.”

Version 1.10
Last updated: February 10, 1995

compiled and maintained by
Karsten A. Loepelmann
kloepelm@gpu.srv.ualberta.ca
kloepel@psych.ualberta.ca

This FAQList is copyright 1995 by Karsten A. Loepelmann. All rights reserved.
Permission is granted for reproduction, distribution, transmission, or storage
for noncommercial purposes only, on the condition that the contents are not
changed in any way. Permission for any other use or distribution of this
FAQList must be obtained from the rights holder, Karsten A. Loepelmann. All
trademarks herein are acknowledged as the property of their respective owners.
Star Wars is a registered trademark of Lucasfilm Ltd. Dark Forces is a
trademark of LucasArts Entertainment Company. Header created by Bren Lynne
(bren@gold.interlog.com).

Preferred forum for discussion is:
news:alt.games.dark-forces

Due to low propagation of the above newsgroup, an alternate forum is:
news:comp.sys.ibm.pc.games.action

Abbreviations used:
DF = Dark Forces
LA = LucasArts
TD = Thermal Detonator
DT = Dark Trooper

Contents:
* indicates a section changed since the last release of this FAQ
+ indicates a new section added since the last release of this FAQ

+ 0.0 Dark Forces FAQList
1.0 Introduction
* 1.1 What is “Dark Forces”?
* 1.2 When will DF be released, already!?
* 1.3 What media format is DF offered on?
* 1.4 What is required to run DF?
+ 1.4.1 What kind of sound support does DF have?
+ 1.4.1.1 Sound card tips
1.5 Why no modem play?
1.6 How much will DF cost?
1.7 Is DF canon?
+ 1.8 Will there be any sequels to DF?
+ 1.8.1 Will any sequels offer a multiplayer option?
2.0 Is there a DF demo available?
* 2.1 Where is the demo available from?
* 2.2 Is there a demo editor?
+ 2.3 Will the demo level be in the full game release?
* 3.0 DF vs. DOOM
3.1 Isn’t DF just a ripoff of iD Software’s DOOM?
3.2 Does DF kick DOOM’s butt?
3.3 Is DF easier than DOOM?
4.0 What are some DF command-line options and undocumented features?
5.0 What are the secret areas in the Prologue Mission 1 demo?
5.1 Red Key Door
5.2 A New Area
5.3 Thermal Detonator/Shield Unit Storage
5.4 Ground Floor Zero
* 5.5 Outer Ledge and Caves
5.6 The Big One
5.6.1.1 Method 1: Troublesome Windows
5.6.1.2 Method 2: A Leap of Faith
* 5.6.2 To the Outer Wall
5.7 The Death Star Plans
5.8 A Revolution
5.9 A Diversion and a Grate Finish
6.0 Weapons, shields, and objects
6.1 What weapons are there?
6.1.1 Fists
6.1.2 Modified Bryar Rifle (“blaster”)
* 6.1.3 Stormtrooper Rifle
6.1.4 Thermal Detonators
6.1.5 Imperial Repeater Rifle (“autogun”)
6.1.6 Jeron Fusion Cutter
6.1.7 IM Claymore Mine
6.1.8 Packered Mortar Gun
+ 6.1.9 Weapon Supercharge
6.2 How is aiming/targeting accomplished?
+ 6.3 How do the shields work?
* 6.4 What do those little black robots that run on the ground do?
6.4.1 How do you shoot them?
6.5 What does the ‘Spider-Gem’ do?
* 6.6 What does the red switch behind the hidden panel in the ‘Emperor’s
Lounge’ do?
7.0 Misc questions
7.1 Who are the people behind DF?
+ 7.2 Has George Lucas provided any input to DF?
+ 7.3 What are .GOB files?
* 7.3.1 What software was used to create the .GOB files?
+ 7.3.2 How should a custom .GOB file be loaded?
* 8.0 Problems running DF?
8.1 How can I contact LA?
9.0 References

============================================================================
0.0 Dark Forces FAQList

This file is a list of Frequently-Asked Questions about the MS-DOS game “Dark
Forces.” It’s also a file of answers to those questions 😉 I welcome any
feedback, questions, answers, and suggestions. You can send email to either of
my addresses. I also scan the Usenet newsgroups comp.sys.ibm.pc.games.action
and alt.games.dark-forces semi-regularly. This file is available in the AOL
Star Wars Software Library, the Action Games forum on CompuServe, as well as
the wpi.wpi.edu Star Wars FTP archive. (With that kind of distribution, I
don’t intend on establishing a mailing list.)

What I’d like to have is more info on solving problems running DF, especially
with regard to sound cards. I’d also like to have Dark Forces snugly spinning
in my NEC 3Xi as soon as possible 🙂

Dark Forces fans are fortunate that DF project leader Daron Stinnett has
agreed to provide me with inside info on DF. Many of the questions below were
answered with info provided to me by Daron (thanks!). In fact, he’s even
outlined the contents of the .GOB files (see section 7.3)! Send your questions
to me; I will relay them to Daron and include them in the FAQ.
-KAL
(hate to say it, but…)
May the Force be with You

1.0 Introduction
1.1 What is “Dark Forces”?
[*** Warning: Spoilers in paragraphs below! ***]

Dark Forces (“DF”) is LucasArts’ (“LA”) new first-person perspective game. It
is based on a LA-developed ‘Jedi Engine’, which according to the company
supports “full 3D objects, a realistic lighting model, atmospheric effects
(haze, fog, etc.), Gouroud shading, animating textures, 3D viewing angles and
more.”

Missions encompass 14 different worlds, each with a unique look and feel.
This is not a static environment, according to project leader Daron Stinnett:
“the worlds extend out in all directions. There are elevators to take you to
multiple floors, bridges over flowing water, catwalks, air shafts and other
architectural features. We wanted an active environment, so ships come and
go at the flight decks, rivers sweep along, platforms and conveyor belts
move, and much of the machinery functions.”

In this game, you play Kyle Katarn, a mercenary once employed by the Empire,
now working for the Rebel Alliance. Kyle’s first mission is to steal the plans
for the Death Star. However, Kyle stumbles upon the Imperial Admiral Mon Mohc’s
plans to create battalions of mechanized “Dark Troopers” — specially enhanced
stormtroopers which could spell the end of the rebellion. In Dark Forces, the
player, as Katarn, must travel to varied locations — such as the rebel base on
the planet Agamar and the Gromas Mines, a Star Destroyer, the Imperial City on
Coruscant, and the spaceport moon of Nar Shadda — to stop the Empire from
unleashing the Dark Troopers…

The characters inhabiting the game are familiar ones from the Star Wars
universe, and include Imperial Stormtroopers and officers, Gamorreans,
interrogation droids, the monster from the trash compactor, and Boba Fett
(and maybe even Princess Leia, Darth Vader, and Jabba the Hutt). You will be
able to use nine different weapons; among them fists, blaster, blaster rifle,
thermal detonators, autogun, mortar gun, fusion cutter, Claymore mines, and
an assault cannon. (For more, see section 6.1. No, there are no lightsabres.
Why not? Because the protagonist, Kyle Katarn, is *not* a Jedi. Yet. 😉

In your DF directory, you will find the file TXT.MSG, which is the source for
the messages displayed on-screen during the game. This file lists some
interesting objects — such as ice cleats and gas mask — not found in the
demo. Scott H. Novack (scottn@csfcorp.com) hacked this file:
So, in the spirit of the recent Star Wars commercial on TV, I’ve changed,
among other things, the message “1 Battery Pack” to “1 Energizer”. 🙂

1.2 When will DF be released, already!?

Hold your horses. Do you want it good, or do you want it now? (Yeah, I know:
you want both!) Note that LA doesn’t provide an exact shipping or release
date. Also, the estimated release date apparently depends on which customer
service representative you speak with!

Bottom line (as of 2/1/95):
Late February/early March, 1995

1.3 What media format is DF offered on?

Right now, DF is being offered on MPC CD-ROM *only*. Although it has been
rumoured, there are apparently *no* plans to offer DF on floppies later.
Daron Stinnett notes:
I don’t think so. We considered it, but it doesn’t look like the
retailers want a floppy version.
LA has not announced that there will be a version of DF for the Apple
Macintosh computers, which is not a denial 😉

1.4 What is required to run DF?

COMPUTER: IBM and 100% compatibles
OPERATING SYS: MS-DOS 5.0 or higher
CPU: 386/33 DX Minimum (486 strongly recommended)
MEMORY: 8 megabytes system memory (6.5 megabytes EMS free)
INPUT DEVICE: Mouse required, joystick supported
VIDEO: VGA (Local Bus, or PCI Recommended)
SOUND CARD: Various popular sound cards supported; see section 1.4.1.

The full release of DF requires a CD-ROM drive. The drive need not adhere to
the MPC2 standard of a 300kb/s transfer rate, but the faster your drive, the
faster you’ll load the levels. DF actually exceeds certain MPC2 requirements
(i.e., you *must* have 8 Mb RAM). Yes, you need at least 8 (eight) megabytes
of RAM — no, this is *not* a typo. Time to upgrade that PC XT! (There are
rumours of people running the DF demo with Dark Forces Demo Version: 0.163D
>………………………………
>FILE: c:projjedisrcmainmain.c, LINE: 1484, ASSERT: COULD NOT LOAD LEVEL
>AVAILABLE MEMORY: 4272K LARGEST BLOCK: 3135K
>
>
>PRESS ANY KEY TO EXIT…

Type:
df -advanced
result:

>Dark Forces Demo Version: 0.163D
>……………….
>
>Dark Forces Advanced Controller Mode…
>
>Control Structure Version: 18616458.7341812
>Control Structure Address: 0H
>ERROR: Bad Control Structure Version Number
>ERROR: Terminating Advanced Controller Mode…
>
>
>Press Any Key To Continue…

5.0 What are the secret areas in the Prologue Mission 1 demo?
[*** Warning! Spoilers ahead! ***]

5.1 Red Key Door

To get the red key, go outside the complex to Floor 0. As you exit Floor 1,
there will be two doors in front of you–one to your left, one to your
right. Go in either one, and shoot the stormtrooper. There will be an
elevator which you will take up a level. Shoot any enemies; the Imperial
officer is the one with the red key. Run over the key and go back to Floor
1. Now you can go through the red door and take the elevator up a level.

5.2 A New Area

In the red key area, there is a round, red switch on the wall. Press the
switch and jump down to Floor 1. There will be a new area now open, to the
right of where you started the game. Kill any enemies there.

5.3 Thermal Detonator/Shield Unit Storage

While in the new area described in the section above, turn around as if to
leave this area the way you came. There will be a switch on the wall. Press
this and return to the red key area (Floor 2). Go to the round switch again,
and look across the hallway. There will be a ‘closet’ that has opened up. To
get to it, you must run fast (hold down the left [SHIFT] key and jump [X] at
the last moment. You will retrieve some shield packs and Thermal Detonators.

5.4 Ground Floor Zero

Go outside to Floor 0 again. Check your map with [TAB]. You exited Floor 1 at
a location of 6:00 on an analog clock; on the outside wall, between 11:00 and
12:00, there is a crack in the wall. (It’s pretty tough to see; it looks a
little like an “X”.) Use a TD to blow open the crack (stand back a ways!).

Enter the cave; if it’s too dark, turn on your headlight with the [F5] key.
You will find 5 TDs and a Weapon Supercharge!

5.5 Outer Ledge and Caves

Go into the area opened up by pressing the round switch in the red key area.
(This is the area behind the walls to your right as your started the game.)
Take the round elevator up to Floor 2. Shoot any enemies. Go up to the
Northmost part of the Floor (don’t fall off!). Point yourself West. You
should see a ledge on the outer wall that has three shield units on it. Back
up as far East as your can go, and take a running jump to reach the ledge.
Pick up the shields.

Now face the wall; if you turn to your right you should see another, very
narrow ledge. You will see two cracks in the wall here. Open them up with a
couple of TDs. Now do a tiny run and jump to this ledge. Turn on your
headlight to see. The left cave contains energy units and the autogun. The
right cave contains medkits and an extra life (the spinning red New Republic
insignia).

5.6 The Big One
5.6.1.1 Method 1: Troublesome Windows

Go into the red key area again. There you will see two windows to the outside.
You must get to the other side. Some have found it easy to get through the
right window by taking a crouching run and jumping at the last moment. Others
can only get through by doing a crouching run *backwards* and jumping (it’s
worked for me). Go to section 5.6.2.

5.6.1.2 Method 2: A Leap of Faith

Go to Floor 2 again, as described in section 5.5. Go to the Southmost point,
where it forms a little ‘peninsula’. There is another peninsula for the East
side of this Floor. You must jump across from the West side to the East side.
(It may help to use the Map view.) It *is* possible to run and jump almost
immediately and reach the other side.

5.6.2 To the Outer Wall

Go to the NorthEast corner of this Floor, and point yourself to the
NorthEast. You should be able to see a crack in the outer wall. Throw a TD
to the crack (hold down the fire control for a second or so to get some
distance). Back up a ways, and run and jump into the cave. Turn on your
headlight. You cannot open the door on your right. Go deeper into the cave
until you hit a wall. You can open the wall, which reveals a switch. Press
the switch to open the door by the cave mouth. Go through the door, and
press the switch on the wall. This will lower the wall. Drop down.

Now you’re on Floor 0 again, but to your left will be a new area. Go through
the door. This area will contain a lot of neat stuff. First up will be some
axe-wielding Gamorrean guards who are, for some odd reason, a lot tougher
than stormtroopers. Be on the lookout for TD-tossing Quarren (“Squid Heads”).
There are also seeker remotes, which are much more lethal than the ones Luke
Skywalker practiced with. You will also find *lots* of goodies! Among them,
the Mortar Gun and mortar shells, TDs, Fusion Cutter, Claymore mines, a
battery cell, infrared goggles, and a ‘revive’ gem.

Go to the door of the central room. In the room are several dangerous
interrogator droids. You’ll see why this room is called the “Emperor’s
Lounge”: there are a couple of pictures of Palpatine. On the wall is a
panel, behind which is a switch. Pressing this switch will start a few enemy
generators. When you leave this area, there will be a *lot* of stormtroopers
and floating probe droids (“probots”). Note: you don’t *have* to flip the
‘enemy generator’ switch if you don’t want to!

Interestingly, the probots don’t appear consistently each time you play.
Sometimes they do, sometimes they don’t. It is not clear why this occurs.
Also, some enemies will tend to come back to life after this switch has been
activated!

5.7 The Death Star Plans

Go to the new area described in section 5.2. Take the stairs behind the
round elevator. Behind the first door is a stormtrooper and a brownish
mechanism, which is part of the elevator mechanism. If you have followed
this walkthru so far, the elevator will be in the upright position, and you
will be able to step into the secret area behind the mechanism and pick up
some energy cells and shield units.

Continue down and past the holo of the Death Star, turn left down the hallway.
You will see an Imperial officer behind a counter. Shoot him and any others.
Behind the counter is a switch which will open the wall behind you . Go into
this new room and take the red circuit board. “This is too easy. Now to get
to my ship!”

5.8 A Revolution

Go through the door on your left, and go *past* the door of the round elevator
until you reach a lone stormtrooper. Blast him. Now face East. Go up to the
wall and open it. It will turn, and you must move ahead to enter the room.
Blast the stormtroopers and soldiers. Pick up the TDs, rifles, energy packs,
and shield units. To exit, go back up to the wall and open it again.

5.9 A Diversion and a Grate Finish

Now take the round elevator up. Blast any stormtroopers here. (In this
courtyard, you can open a grate in front of a duct leading down. If you take
this, you will land right where you started, which is kind of pointless. This
is presumably how Kyle entered the Imperial Base in the first place.)

Go out into the courtyard, where your ship is waiting. You’ve accomplished
your objectives! (Hit [ESC] to end.)

*** If I’ve left out any secret areas, please let me know where they are and
how to reach them.
*** If my description makes no sense, let me know and I’ll attempt to
clarify my instructions.

6.0 Weapons, shields and objects
6.1 What weapons are there?
6.1.1 Fists
Good luck! 😉

6.1.2 Modified Bryar Rifle (“Blaster”)
Fires coherent packets of intense light energy, also called bolts.

6.1.3 Stormtrooper Rifle
Also fires bolts, but more rapidly. Also, each bolt takes *two* units of
energy, whereas the blaster uses only one. Note that it appears the player
is only allowed a certain number of shots at any given moment (e.g., when
you shoot a near wall, the rifle fires more rapidly than when firing at a
more distant target). Uses the same ammo as the blaster; you can carry a
maximum of 500 rounds.

6.1.4 Thermal Detonators
When activated, a TDs produce a fusion reaction which causes a small
explosion. Princess Leia threatened to use one in _Return of the Jedi_. The
longer you hold down the primary fire button (e.g., the [CTRL] key), the
farther you toss the TD when you release it. Hitting secondary fire (e.g.,
[z]) tosses the TDs with a time delay before detonation.

6.1.5 Imperial Repeater Rifle (“autogun”)
Fires blue energy bolts. Pressing primary fire shoots off a single bolt,
whereas pressing secondary fire shoots off a trio of bolts simultaneously
in a triangular configuration.

6.1.6 Jeron Fusion Cutter
Fires green energy bolts. Pressing primary fire shoots bolts successively
from each of the four chambers. Pressing secondary fire launches all four
chambers simultaneously

Scanning Masers For Informational Retreval (December 22, 1990)

(word processor parameters LM=8, RM=75, TM=2, BM=2)
Taken from KeelyNet BBS (214) 324-3501
Sponsored by Vangard Sciences
PO BOX 1031
Mesquite, TX 75150

There are ABSOLUTELY NO RESTRICTIONS
on duplicating, publishing or distributing the
files on KeelyNet!

December 22, 1990

CRYSTAL1.ASC
——————————————————————–

Scanning Masers for Information Retrieval

This file is inspired by the TV show, “Science Fiction Theatre”.
One of their segments had to do with spying on a conference. The
method used was unknown and was traced to what appeared to be a
bottle of ant poison.

The show used the term “Crystal of Deception”. Unfortunately, I do
not remember the EXACT technique although it can be narrowed down to
only two.

The first technique used a clear fluid placed in the bottle of ant
poison. This fluid hardened (crystallized) over time. As the fluid
crystallized, the matrix thus formed recorded the sonic waves
present just as recordings are made in plastic or wax.

The second technique used a seed crystal onto which the new fluid
accumulated. Much like the saturated solutions used to “grow”
crystal formations. Since the absorption was somewhat regular over
time, it would also record sonic patterns.

Of the two, I think the seed crystal technique to be the most
logical since the initiator of the growth process would already be
present.

By using M.A.S.E.R. (molecular amplification by stimulated emission
of radiation) energy in a scanning pattern, the sounds could be
recovered.

When the molecules are excited, they produce modulations in the
audible spectrum which can be recovered much like radio signals are
broadcast on the AM (amplitude modulation) bands.

Scanning is done by raking the focussed beam over the area in an X
and Y pattern (vertical and horizontal to produced a 2 dimensional
pattern). Of course, by adding a Y vector (through phase
conjugation) we could scan a 3 dimensional matrix.

For a twist, the show used a rock which when scanned yielded voices
and screams. Of course, the rock was a piece of lava from Mt.
Vesuvius and had “captured” the screams of the dying inhabitants as
the lava cooled. A very interesting concept.

Page 1

Needless to say, the aggregation rate and the size and thus response
time of the particles would play a distinct part in the clarity,
fidelity and resolution of the recording.

Note that Star Trek used a credit card size piece of plastic to
record both video and audio. Science fiction it might be FOR NOW
but it does have possibilities.

Also remember the claims of Richard Shaver regarding what he said
were images recorded in stone geodes by some ancient civilization.

The geodes were sliced into thin plates which could be projected
onto a wall to see the images.

I have seen photos of these images and they are somewhat reminiscent
of intelligible patterns. By today’s standards they have almost no
merit, however.

Bear in mind that most images, either audible or visual, are direct
reproductions of ANALOG patterns (amplitude variations).

This crystal recording technique simply points to another phenomenon
that might produce a useable technology.
——————————————————————–

If you have comments or other information relating to such topics
as this paper covers, please upload to KeelyNet or send to the
Vangard Sciences address as listed on the first page.
Thank you for your consideration, interest and support.

Jerry W. Decker………Ron Barker………..Chuck Henderson
Vangard Sciences/KeelyNet

——————————————————————–
If we can be of service, you may contact
Jerry at (214) 324-8741 or Ron at (214) 242-9346
——————————————————————–

Page 2

Cyberpoet’s Guide To Virtual Culture Journal (March 14, 1994)

[] [] [] []
[] [] [] [] [] []
[] [] [] [] [] [][][]
[][] [] [][][] [][][] [] []
[] [] [] [] [] [] [] [] [][]
[] [] [] [][][] [][][] [] [][][]

A Cyberpoet’s Guide to Virtual Culture Journal

Issue.1.00 3-14-94
————————————————————————

XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXXxX
x x
X -=*=- X
x C O N T E N T S ! x
X X
x 1- Editorial o Welcome to Kibble the zine x
X 2- Guest FAQ o Clipper News & action. X
x 3- Ongoing projects o Interpedia – Internet Encyclopedia x
X 4- Upcoming conferences o DEFCON ][ – July 22, 23, 24 – 1994 X
x 5- Letters to the editor o x
X 6- Editorial Policy o X
x x
XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXXxX

Information wants to be free. Believe it, pal.
-=- Bruce Sterling

If only you could see what I’ve seen through your eyes.
-=- Blade Runner

I think that a new kind of replicator has recently emerged on this
very planet. it is staring us in the face. It is still in its infancy,
still drifting clumsily about in its primeval soup, but already it is
achieving evolutionary change at a rate which leaves the old gene panting
far behind…..
-=- Richard Dawkins [concerning memes]

The techno-underground is a direct descendant of the hippy revolution.
-=- Select Magazine (April ’92)

They made LSD illegal. I wonder what they’re going to do about this
stuff.
-=- Jerry Garcia (about VR)

Cyberpunk is really about the present.
-=- Rudy Rucker

On the Internet, no one knows that you’re a dog.
-=- New Yorker Comic

-=- 1- Editorial |
——————/

Welcome to the first issue of Kibble: the cyberpoet’s guide to virtual
culture journal. Why ‘kibble’ you may ask? A logical question. Phillip K
Dick fans will have already grep’d that ‘kibble’ is a word used in his
famous tome “Do Androids Dream of Electric Sheep”, which later was made
into a movie we know as _BladeRunner_. Kibble then, is the extraneous
stuff laying around. The things society has cast off to the junkyards and
backyards everywhere. But more specifically, the refuge that has
overflown the borders of the junkyards and that has begun to clutter up
our streets, our minds, our friendships and our politics. Yes, there
seems to be alot of kibble around these days.

Who really gives a shit about the Whitewater affair. It’s just political
kibble cluttering up my mind. I wanna know how to get more and better jobs
in Califormia. How to solve the war in the old Yugoslavia. And I want to
know why if there is so much extra wheat in America that we have to pay
people not to grow it, then why are there people starving today? Kibble
is the drug war and the anti-gang crusade, instead of the education war
and the youth brigade crusade. Kibble is the gov’ts adoption of the
clipperchip when the clipper functions are already old tech and wasted
spending. Kibble is the FBI’s attempt assemble an interception site on the
Internet for all datapackets. Kibble is the inability of one person to
smile at the next while walking down the street for fear of getting robbed
or shot.

I guess this isn’t so much the kibble zine as it is the anti-kibble zine.
But that doesn’t have quite the ring to it. So don’t be fooled by the
title. We accept Kibble and non-kibble alike (we don’t like to
discriminate). Can society exist without kibble? probably not, but as
J.F. Sebastion feared, we might soon be consumed by our kibble. I join
him in his concern.

-=- 2- Guest FAQ |
——————/

ooooooooooooooooooooooooooooooooooooooooooooooooooooooo
o This issue’s guest FAQ : Prempted by News o
o (send me your FAQs for inclusion) o
ooooooooooooooooooooooooooooooooooooooooooooooooooooooo

This section left (not)blank in the request that you read up on the
clipper fiasco currently going on with the US gov’t. Those of you of
international flavor reading this might be a good idea, for it could help
you prevent this error in your country.

Pointers on where to look for Clipper info

USENET –
comp.org.eff.talk
alt.privacy.clipper What you don’t know can hurt you.
alt.security.pgp The Pretty Good Privacy package.
alt.politics.datahighway You’ve read about it. Now Bitch about it.

FTP
ftp.eff.org pub/EFF/Policy/Clipper/
soda.berkeley.edu pub/cypherpunks

GOPHER
gopher.eff.org eff/policy/clipper
wired.com

Forwarded message:
From: jberman@eff.org Jerry Berman
Date: Mon, 7 Mar 1994 19:09:22 -0500
Subject: Leahy to hold hearings on Clipper Chip!

Dear Friends on the Electronic Frontier:

I have some good news to share with you. Senator Leahy just sent me a
letter indicating that he *will* be scheduling hearings on the
Administration’s Clipper Chip proposal. I would like to thank all of you
who sent us messages to forward to him urging hearings. I’m sure that
stack of messages we printed out made a significant impact on the Senator
— the stack was over seven inches tall! (We look forward to the day when
no trees will have to be sacrificed in the furtherance of democracy!)

And if you haven’t written a message to Rep. Cantwell yet about her
proposed amendment to the Export Control Act, please do so and forward it
to cantwell@eff.org. This is an address we set up to enable us to collect
messages in support of her bill. We have been printing out messages and
delivering them each week — so far we’ve received over 4500 letters of
support. For more information on the Cantwell bill, send a message to
cantwell-info@eff.org.

Thanks again. We’ll let you know as soon as the Clipper hearing gets
scheduled.

Sincerely,

Jerry Berman
EFF Executive Director

-.-.-.-.-.-.-. forward from Sen. Leahy -.-.-.-.-.-.-.-.-.-.

United States Senate
Committee on the Judiciary
Washington, DC 20510

March 1, 1994

Mr. Jerry Berman
Executive Director
Electronic Frontier Foundation
1001 G Street, Suite 950 East
Washington, DC 20001

Dear Jerry,

Thank you for forwarding to me the many thoughtful and informative messages
you received over the Internet regarding the Administration’s recent
approval of an escrowed encryption standard, known as the Clipper Chip.

Many of the messages urge Congress to hold hearings to review the
Administration’s Clipper Chip standard. In fact, I intend to hold a
hearing before the Judiciary Subcommittee on Technology and the Law, which
I chair, to consider the important issues raised by the Clipper Chip. I
will let you know when a date for the hearing is scheduled.

Thank you again.

Sincerely,

/s/ PATRICK J. LEAHY
United States Senator

PJL/jud
-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.

JOIN EFF!!
==========

EFF’s work as a civil liberties organization in Washington has been very
successful, but the realization of our goals of freedom and privacy online
can only come with the active and vocal participation of the entire online
community. Now that you have personally experienced both the threat of the
loss of your privacy and the power having won the first battle, won’t you
take that next step and become a member of EFF?

By joining EFF, you will help us to expand our reach to educate and involve
an even greater number of people in the shaping of these critical issues.
Your tax-deductible donation will tie you into the EFF information network
and support our public policy and legal work. As a member, you will be
guaranteed timely the timely information and mechanism you need to respond
on these issues. Our voices in unity *do* make a difference.

-stuff deleted–

o How to get PGP o

When in the Course of human events, it becomes necessary for one
people to ensure their own right to privacy, they get PGP :-).

Tired of sending your e-mail on postcards? Send me mail at
<qwerty@netcom.com with Subject "Bomb me!" to get Gary Edstrom's PGP FAQ
and my "Here's How to MacPGP!" guide. (They are also available by
anonymous ftp to netcom.com in /pub/gbe and /pub/qwerty).

PGP is the free encryption program designed by Phil Zimmerman, and is
available for most any computer.

-=Xenon=-

======================================================================

-=- 3- Ongoing projects |
————————-/

So you want to get in on the action. Here are some various projects which
are starting up or in process around the net. Like any other culture, the
net requires constant tuning and growth. These are some of the more overt
methods of doing just that. In addition these projects are a great way of
accomplishing what the cyberpoet is constantly searching for . . . a
net.community.

o Interpedia – Internet Encyclopedia mailing list

This is to inform you about the proposed Internet Encyclopedia, or
Interpedia and the mailing-list for discussion of it.

The original idea, due to Rick Gates, was for volunteers to
cooperatively write a new encyclopedia, put it in the public domain,
and make it available on the Internet. Participants on the
mailing-list have expanded the concept by noting that the
bibliography entries and references provided with Interpedia articles
could include hypertext links to other resources available on the
Internet. Unlike any printed encyclopedia, the Interpedia could be
kept completely up-to-date. Indeed, it could include hypertext links
to ongoing discussions, and perhaps evolve into a general interface
to all resources and activities on the Internet.

If you find these ideas interesting, please join the Interpedia
mailing-list by sending a message to
interpedia-request@telerama.lm.com with the body of the message
containing the word ‘subscribe’ and your e-mail address, as follows:

subscribe your_username@your.host.domain

Owner: Doug Luce interpedia-request@telerama.lm.com
Interpedia List Maintainer
Telerama Public Access Internet

-=- 4- Upcoming conferences |
—————————–/

xxxxxxxxxxxxxxxxxxxxxxxx xx DEF CON ][ Convention Initial Announcement
xxxxxxxXXXXxxxxxxxxxxxxxxx xx DEF CON ][ Convention Initial Announcement
xxxxxxXXXXXXxxxxxx x x DEF CON ][ Convention Initial Announcement
xxxxxXXXXXXXXxxxxxxx x DEF CON ][ Convention Initial Announcement
xxxxXXXXXXXXXXxxxx xxxxxxxxx DEF CON ][ Convention Initial Announcement
xxxXXXXXXXXXXXXxxxxxxxxxx x DEF CON ][ Convention Initial Announcement
xxXXXXXXXXXXXXXXxxxxxx xx x DEF CON ][ Convention Initial Announcement
xxxXXXXXXXXXXXXxxxxxxxx DEF CON ][ Convention Initial Announcement
xxxxXXXXXXXXXXxxxxxxxx x xx DEF CON ][ Convention Initial Announcement
xxxxxXXXXXXXXxxxxxxxxxx xx x DEF CON ][ Convention Initial Announcement
xxxxxxXXXXXXxxxxxxxxx x DEF CON ][ Convention Initial Announcement
xxxxxxxXXXXxxxxxxxxxxxxxxx DEF CON ][ Convention Initial Announcement
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx DEF CON ][ Convention Initial Announcement

READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE

=============================================================================

What’s this? This is the initial announcement and invitation to DEF CON ][,
a convention for the “underground” elements of the computer culture. We try
to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
Virii coders, programmers, crackers, Cyberpunk Wannabees, Civil Liberties
Groups, CypherPunks, Futurists, Artists, Etc..

WHO: You know who you are, you shady characters.
WHAT: A convention for you to meet, party, and listen to some speeches
that you would normally never hear.
WHEN: July 22, 23, 24 – 1994
WHERE: Las Vegas, Nevada @ The Sahara Hotel

So you heard about DEF CON I, and want to hit part ][? You heard about the
parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
check it out in person? Load up your laptop muffy, we’re heading to Vegas!

Here is what Three out of Three people said about last years convention:

“DEF CON I, last week in Las Vegas, was both the strangest and the best
computer event I have attended in years.” — Robert X. Cringely, Info World

“Toto, I don’t think we’re at COMDEX anymore.” — Coderipper, Gray Areas

“Soon we were at the hotel going through the spoils: fax sheets, catalogs,
bits of torn paper, a few McDonald’s Dino-Meals and lots of coffee grounds.
The documents disappeared in seconds.” — Gillian Newson, New Media Magazine

DESCRIPTION:

Last year we held DEF CON I, which went over great, and this year we are
planning on being bigger and better. We have expanded the number of
speakers to included midnight tech talks and additional speaking on Sunday.
We attempt to bring the underground into contact with “legitimate” speakers.
Sure it’s great to meet and party with fellow hackers, but besides that we
try to provide information and speakers in a forum that can’t be found at
other conferences.

While there is an initial concern that this is just another excuse for the
evil hackers to party and wreak havok, it’s just not the case. People come
to DEF CON for information and for making contacts. We strive to distinguish
this convention from others in that respect.

WHAT’S NEW THIS YEAR:

This year will be much larger and more organized than last year. We have a
much larger meeting area, and have better name recognition. Because of this
we will have more speakers on broader topics. Expect speaking to run
Saturday and Sunday, ending around 5 p.m. Some of the new things expected
include:

> An INet connection with sixteen ports will be there, _BUT_ will only
provide serial connections because terminals are too hard to ship. So
bring a laptop with communications software if you want to connect to the
network. Thanks to cyberlink communications for the connection.

> There will be door prizes, and someone has already donated a Cell Phone
to give away.

> Dr. Ludwig will present his virii creation awards on Sunday.

> A bigger and better “Spot The Fed” contest, which means more shirts to
give away.

> More room, we should have tables set up for information distribution.
If you have anything you want distributed, feel free to leave it on the
designated tables. Yes, this year there will be a true 24 hour
convention space.

> A 24 hour movie / video suite where we will be playing all type of stuff.
VHS Format. Mail me with suggested titals to show, or bring your own.

> Midnight Tech Talks on Friday and Saturday night to cover the more
technical topics and leave the days free for more general discussions.

WHO IS SPEAKING:

I was going to run a list of the current speakers we have lined up, but at
this point things are still fluid. In a few months when the speakers list
is more solidified I will release it. I’ll name the poeple who have
committed to attending in the next announcement. Trust me.

WHERE THIS THING IS:

It’s in Las Vegas, the town that never sleeps. Really. There are no clocks
anywhere in an attempt to lull you into believing the day never ends. Talk
about virtual reality, this place fits the bill with no clunky hardware. If
you have a buzz you may never know the difference. It will be at the Sahara
Hotel. Intel as follows:

The Sahara Hotel: 1.800.634.6078
Room Rates: Single/Double $55, Tripple $65, Suite $120
(Usually $200) + 8% tax
Transportation: Shuttles from the airport for cheap

NOTE: Please make it clear you are registering for the DEF CON ][
convention to get the room rates. Our convention space price is
based on how many people register. Register under a false name if
it makes you feel better, ‘cuz the more that register the better for
my pocket book. No one under 21 can rent a room by themselves, so
get your buddy who is 21 to rent for you and crash out. Don’t let
the hotel people get their hands on your baggage, or there is a
mandatory $3 group baggage fee. Vegas has killer unions.

OTHER STUFF:

If you check out Wired like 1.5 or 1.6 there was a blurb about the new
Luxor hotel with it’s total VR experience. It looks like the first true VR
ride / experience for a group of people, it seats eight. Intense. A friend
was just over there, and tested out the various rides. Not to be outdone
the new MGM grand (Largest hotel in the world) has a ride called the R360
which is basically a gyroscope they trap you into with goggles. We should
get a group together and make a mass trek over there and check it out.
If enough people are interested I’ll call and see if we can book a time
to reserve space for a bunch of us. Both are within walking distance.

I’ll whip up a list of stuff that’s cool to check out in town there so if for
some reason you leave the awesome conference you can take in some unreal
sites in the city of true capitalism.

MEDIA:

Some of the places you can look for information from last year include:

New Media Magazine, September 1993
InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely
Gray Areas Magazine, Vol 2, #3 (Fall 1993)
Unix World, ???
Phrack #44

COST:

Cost is whatever you pay for a hotel room split however many ways, plus
$15 if you preregister, or $30 at the door. This gets you a nifty 24 bit
color name tag (We’re gonna make it niftier this year) and your foot in the
door. There are fast food places all over, and there is alcohol all over
the place but the trick is to get it during a happy hour for maximum
cheapness.

============================================================================

-=- 5- Letters to the editor |
—————————–/

This is a new section, please see our policy regarding letters.

From: Lauren N.
Mucho E-Pizza & E-Beer at you for your efforts!
___
| ~~–.
|%=@%%/
|o%%%/
__ |%%o/
_,–~~ | |(_/ ._
,/’ m%%%%| |o/ / `.
/’ m%%o(_)%| |/ /o%%m `
/’ %%@=%o%%%o| /(_)o%%% `
/ %o%%%%%=@%%| /%%o%%@=%%
| (_)%(_)%%o%%| /%%%=@(_)%%% |
| %%o%%%%o%%%(_|/%o%%o%%%%o%%% |
| %%o%(_)%%%%%o%(_)%%%o%%o%o%% |
| (_)%%=@%(_)%o%o%%(_)%o(_)% |
~%%o%%%%%o%o%=@%%o%%@%%o%~ /
. ~o%%(_)%%%o%(_)%%(_)o~ ,/
_ ~o%=@%(_)%o%%(_)%~ _/
`_~~o%%%o%%%%%~~_/’
`–..____,,–‘

#XXXX– #/—`
###XXX// – —-##= – —
##XX///-` ` — –##- – –_
###XX//- = – #/ – – —
###XX//- # #= = = |||
###XX |##- / #X- ==||
##X| | #-/ | | ||=====–)
#|| | #- | | || | |
-|| | | | | || | |
|| | | | | || | |
|| | | | | || | |
|| | | | | || | |
|| | | | | ||_______/)
|| | | | | ||=====//)
|| | | | | ||
|| | | | | ||
-| | | | | |/
==== | | |====
===============
Cheers!

***editors note: Thanks I enojoyed them both.***

-= 6- Editorial Policy |
———————–/

-=*=-

The Cyberpoet’s Guide to Virtual Culture and the associated Ezine
“Kibble: the Cyberpoet’s Guide to Virtual Culture Journal” is a
semi-monthly publication of John Frost (frost@netcom.com). Kibble is
dedicated to publishing information/articles/stories that affects the
culture of the Internet. Submissions to Kibble are encouraged although
the editors must reserve the right to edit them. Letters to the editor
may be sent to frost@netcom.com and should have the word “Kibble” in the
subject. Each letter will appear with the authors name and email address.
Anonymous letters will not be printed without a working response
address. The editors reserve the right to edit letters and encourage
accuracy and brevity.

-=*=-

Kibble is currently planning to release an issue centered on issues of
Gender and the Net. We especially encourage people to send in articles,
papers, opinion peices (or whatever) dealing with that topic. Thank you.

———————————————————————–

As far as I know this zine (and the guide itself) is archived at mindvox &

ftp//ftp.eff.org//pub/net_info/cyberpoet.gvc
ftp//etext.archive.umich.edu//pub/Zines/Cyberpoet
ftp//vela.oakland.edu//pub/tribe/publications
USENET//alt.cyberspace, alt.cyberpunk, alt.virtual.culture

Please inform me of any other archival so that I may make mention of
it here.

Kibble, it’s format, theme and articles are copyright 1993,1994 John Frost
[frost@netcom.com], except where the copyright is retained by the original
author. The rights to distribute and reproduce this document are granted
in accord with the Agitprop guidelines founded by Bruce Sterling. A copy
of those guidelines may be found via ftp at ftp.eff.org
ftp/pub/Publications/Bruce_Sterling/README or at EFF’s gopher site. Other
uses and non-electronic reproduction of this document must first be
cleared, in writing, with John Frost. Under no circumstance may
money/script/funds be charged for access to this document, beyond the
money charged for general access to the system it is found on. Kibble may
not be distributed on any disk/tape/device with a capacity of more then 80
megs.


John Frost (also Indigo) | So we have erected a glowing altar in the
frost@netcom.com <- best | center of our lives that feeds on our terror,
frost@lclark.edu <-2ndbest | and fear has become our national religion.
Indig0 on IRC | -John Perry Barlow
Indigo on MediaMOO | on the current state of TV
PGP public key avaiable | -=-
upon request | without PGP your email is just a postcard.

Cyberpoet’s Guide To Virtual Culture Part 5 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p5/5

Part V of V – 3.14.94 A Cyberpoet’s Guide to Virtual Culture

-=- 05.Offline Interests
o Magazines
o Bibliography

-=- 05.Offline Interests
——————————————————
-=- 05.1.Magazines |
———————–

aXcess
PO Box —–
San Deigo, CA 920??
-“Music, Cyberculture, Style” professes the banner.
I give them high marks for the music and
cyberculture, and low marks for the Style
and the definate Southern California centricity
of the articles. But this *was* the first issue
-$4 an issue, $?? for 6 issues.

Boardwatch
Black Ice
Body Art

bOING bOING
PO Box 18432
Boulder, CO 80308
-cyberpunk zine. Not as glossy as the others that
have recently debuted, but who needs all those
pretty pictures anyway.
-$4 an issue, $14 for 4 issues

Communications of the ACM
Critique: Studies in Contemporary Fiction
Cryonics Magazine
CyberEdge Journal
Cybertek
Disco Family Plan
Edge Detector

EFF Effector
Membership Coordinator
Electronic Frontier Foundation
1001 G Street, N.W.
Suite 950 East
Washington, DC 20001 USA

Membership rates:
$20.00 (student or low income membership)
$40.00 (regular membership)

-the print magazine of the Electronic Frontier
Foundation. A bible of constitutional thought and
action regarding the online world.
-A $40 membership will merit you a subscription.
Join yesterday! (Backdate your check =)

EXTROPY: The Journal of Trans-humanist Thought
PO Box 57306
Los Angeles, CA 90057-0306
-There are also a few Mailing lists and USENET
groups that follow this subject. Check those out
before checking out this magazine.
-$9 two issues (one year)

FactSheet-Five
Seth Friedman
PO Box 170099
San Francisco CA 94117-0099
-independently-oriented reviewers of the
zine culture. It was gone, but now it’s back.
-1 issue $4, 6 issues $20 (or more)

FAD Magazine
Fluxu8
Freakbeat
Full Disclosure
Future Sex
Hack-Tic
The HardCore
Interference on the Brain Screen

Internet Business Journal
E-mail: 72302.3062@compuserve.com
phone: (613) 747-6106.
$149 ($179 Canadian) for a one year (6 issue plus six supplements)

Internet World
E-mail: meckler@jvnc.net.
Phone: (800)-MECKLER. [Subscription price?]

Intertek
Interzone
Iron Feather Journal
Isaac Asimov’s Science Fiction magazine
The Journal of Complex Systems
The Magazine of Fantasy and Science Fiction

Matrix News
E-mail: mids@tic.com
Published in online and paper editions.
Online edition is $25 for 12 monthly issues ($15 for students.)

Mondo 2000
PO Box 10171
Berkeley, CA 94709
415.845.9018 (phone)
415.649.9630 (fax)
mondo2k@well.sf.ca.us
mondo2k@mindvox.phantom.com
-your guide to all things cyberpunk and some things
not. The Original magazine to document this
virutal culture, but, unless they change for the
next issue, not the best.
-$24 for 5 issues (published quarterly, maybe)

Nootropic News

Online Access
E-mail: 70324.343@compuserve.com
Subscription is $19.80 for 8 issues

Pixel: The Magazine of Scientific Visualization
Pixel Vision
Robot Experimenter
Science Fiction Eye
Science Fiction Studies
Sector 9737
Sound Choice
Audio Evolution network
SOUND News and Arts
TAP
Technology Works
Territories

2600
PO Box 752
Middle Island, NY 11953-0752
516.751.2600 (office)
516.751.2608 (fax)
2600@well.sf.ca.us
-the famous hacker’s zine. Still ticking.
-subscriptions are $21 for 4 issues (published
quarterly)
-back issues are $25 / year

Urb Magazine
US RAVE Magazine
Verbum: The Journal of Personal Computer Aesthetics
Virus 23
Whole Earth Review

WIRED
info@wired.com
-The magazine is hot! and made quite a buzz
across the internet for weeks after it debuted
-now it is publishing 12 months a year
-$4 an issue. $29.95 / year.

Zine Exchange

-=- 05.2.Bibliography |
————————

??? American Flagg – comic
Cyberpunk – comic
Dirty Pair – comic
Judge Dredd – comic
Vertigo Series – DC comics

Anonymous – Go Ask Alice. Diary of 15 year-old girl in the drug world
– Computers: Crimes, Clues, and Controls. Hacking

Abraham, Ralph – A Visiual Introduction to Dynamical Systems Theory
– The Visual Mathematics Library

Acker, Kathy – Blood and Guts in High School (fiction)
– Don Quixote, which was a dream (fiction)
– Empire of the Senseless (fiction)
– Great Expectations (fiction)
– The Adult Life of Toulouse-Lautrec
– In Memoriam to Identity

Adams, Douglas – The Meaning of Liff (fiction)
– The Hitchhiker’s Guide to the Galaxy (fiction)
– The Restaurant at the End of the Universe (fiction)
– Life, the Universe, and Everything (fiction)
– So Long, and Thanks For All the Fish (fiction)
– Mostly Harmless (fiction)
– Dirk Gently’s Holistic Detective Agency (fiction)
– The Long Dark Tea Time of the Soul (fiction)

Aldiss, Brian Wilson – Barefoot in the Head (fiction)
– Enemies of the System (fiction)

Algren, Nelson – Man with the Golden Arm (fiction)

Army, U.S. – Computer-Related Crime

Artaud, Antonin – The Peyote Dance

Ashby, W. Ross – An Introduction to Cybernetics

Asimov, Isaac – The Robot Novels
– Robots: Machines in Man’s Image
– The Foundation Series

Austakalnis, Steve & David Blatner – Silicon Mirage. Vr

Bachman, Richard – The Running Man (fiction)

Ballard, J. G. – The Atrocity Exhibition (Re/Search publication)
– Crash (fiction)
– Concrete Island
– High rise

Barlow, John Perry – Everything We Know is Wrong (forthcoming)

Barnes, Steven – Gorgon Child (fiction)
– Streetlethal (fiction)

Barrow, John and Frank Tipler – The Anthropic Cosmological Principle

Barry, Judith – Public Fantasy. PoMo

Bass, Thomas – The Eudaemonic Pie. Chaos

Bateson, Gregory – Steps to an Ecology of Mind
– Mind and Nature: Necessary Unity

Baudrillard, Jean – The Anti-Aesthetic: Essays on Postmodern Culture
– Body Invaders: Panic Sex in America (ed.)
– The Ecstacy of Communication
– America
– Simulations
– In the Shadow of the Silent Majorities
– Seduction
– Cool Memories

Bear, Greg – Blood Music (fiction)
– Eon (fiction)
– Eternity (fiction; sequel to Eon)
– Beyond Heaven’s River (fiction)
– Forge of God (fiction)
– Great Sky River (fiction)
– Psychlone (fiction)
– Strength of Stones (fiction)
– The Wind Froma Burning Woman (fiction)

Beck, Jerome, & Rosenbaum, Marsha – Pursuit of Ecstacy: The MDMA Experience

Bell, Madison Smartt – The Washington Square Ensemble
– Waiting for the End of the World

Belsito, Peter – HardCore California
– Notes from the Pop Underground

Benedikt, Michael – Cyberspace: First Steps
+ the canonical cyberspace resource.

Benford, Gregory – Against Infinity

Bernal, J. D. – The World, the Flesh, and the Devil

Bester, Alfred – Computer Connection (fiction)
– Golem 100 (fiction)
– The Demolished Man (fiction)
– The Stars My Destination (fiction)

Betanacourt, G. – Johnny Zed (fiction)

Bethke, Bruce – Cyberpunk (fiction)
– Elimination Round (fiction)

Bey, Hakim – T.A.Z.

Black, Bob – The Abolition of Work and Other Essays
– Friendly Fire
– Rants and Mineral Tracts (with Adam Parfrey, eds.)

Blake, William – The Mariage of Heaven and Hell

Blankenship, Loyd (Steve Jackson Games) – GURPS Cyberpunk RPG

Bloombecker, Buck – Spectacular Computer Crimes

Blumlein, Michael – The Movement of Mountains (fiction)

Bova, Ben – Exiled from Earth (fiction)

Bradbury, Ray – Fahrenheit 451 (fiction)

Brecher, Edward M. (Consumer’s Union) – Guide to Licit and Illicit Drugs

Breton, Andre – What is Surrealism? Selected Writings
– Manuifestos of Surrealism

Brin, David -Earth (fiction)

Brockman, John (ed) – Speculations: Reality Club 1
– Doing Science: Reality Club 2
– Ways of Knowing: Reality Club 3

Brunner, John – The Shockwave Rider (fiction)
– Stand on Zanzibar (fiction)
– The Jagged Orbit (fiction)
– The Sheep Look Up (fiction)
– The Stone that Never Came Down (fiction)

Budrys, Algis – Michaelmas (fiction)

Burger, Ralf – COmputer Viruses: A High Tech Disease

Burgess, Anthony – A Clockwork Orange (fiction)
– The End of the World News: An Entertainment.

Burroughs, William S. – Interzone (fiction)
– Naked Lunch (fiction)
– Nova Express (fiction)
– The Soft Machine (fiction)
– Ticket That Exploded (fiction)
– The Wild Boys: A Book of the Dead (fiction)
– The Third Mind
– The Yage Letters
– The Adding Machine: Selected Essays
– The Last Words of Dutch Schultz
– The Western Lands
– Cities of the Red Night

Butler, Jack – Nightshade (fiction)

Cadigan, Pat – MindPlayers (fiction)
– Indigo (fiction)
– Patterns (fiction)
– Synners (fiction)

Card, Orson Scott – Ender’s Game (fiction)

Carlisle, Anne – Liquid Sky (fiction)

Chambers, Iain – Popular Culture: The Metropolitan Experience (fiction)

Chesebro, James w. and Donald g. Bonsall – Computer-mediated
Communication:
human relationships in a computerized world

Churchland, Patricia – Neurophilosophy:…Unified Science of the Mind/Brain

Consumer Reports – Complete Drug Reference

Cornwall, Hugo – Datatheft. Hacking
– Hacker’s Handbook III. Hacking.

Crick, Francis – Life Itself: It’s Origin and Nature

Cross, Ronald Anthony – Prisoners of Paradise (fiction)

Crowley, Aleister – Diary of a Drug Fiend
– Magick Without Tears

Davies, Paul – The Accidental Universe

Davis, Douglas – Art and the Future

Dean, Ward – Smart Drugs & Nutrients. Nootropics, smart drugs

Deken, Joseph – Computer Images: State of the Art

Delany, Paul and George Landlow (eds) – Hypermedia & Literary Studies

Delany, Samuel – Dahlgren (fiction)
– Babel 17 (fiction)
– Nova (fiction)
– The Edge of Space: Three Original Novellas of SF

Delgado, Jose – Physical Control of the Mind: Towards Psychocivilized

DeLillo, Don – White Noise (fiction)

Denning, Peter J. (ed. ACM) – Computers Under Attack

Denton, Bradley – Wrack’n’Roll (fiction)

de Quincy, Thomas – Confessions of an English Opium Eater

Derrida, Jacques – Of Grammatology
– Speech and Phenomena
– Writing and Difference

Dick, Philip K. – Do Androids Dream of Electric Sheep
(Blade Runner)(fiction)
– Flow My Tears the Policeman Said (fiction)
– Vulcan’s Hammer (fiction)
– Ubik (fiction)
– A Scanner Darkley (fiction)

Dickson, Gordon – The R-Master (fiction)

Dobbs, Bob – Book of the SubGenius

Dozois, Gardner – Slow Dancing Through Time (fiction)

Drexler, Eric – Engines of Creation. Nanotechnology
– Unbounding the Future: The Nanotechnology Revolution

Duchamp, Marcel – The Complete Works of Marcel Duchamp

Eco, Umberto – Foucault’s Pendulum (historical fiction)
– Travels in Hyper Reality: Essays

Effinger, George Alec – A Fire in the Sun (fiction)
– When Gravity Fails (fiction)
– The Exile Kiss (fiction)

Eisner, Bruce – Ecstacy: The MDMA Story

Em, David – The Art of David Em: 100 Computer Paintings

Farren, Mick – The Long Orbit (fiction)

Faust, Clifford – The Company Man (fiction)
– A Death of Honor (fiction)

Feynman, Richard – QED: The Strange Theory of Light and Matter

Fjermedal, Grant – The Tomorrow Makers (fiction)

Foley, James et al – Computer Graphics: Principles and Practice

Ford, John – Web of Angels (fiction)

Forester, Tom – Computer Ethics. Hacking, viruses, etc

Foster, Alan Dean – Cyber Way (fiction)

Friedman, David – The Machinery of Freedmon. Anarchy

Furst, Stevyn – Hallucinogens and Culture

Gerrold, David – When Harlie Was One

Gibson, William – Burning Chrome (fiction)
– Count Zero (fiction)
– The Difference Engine (with Bruce Sterling)(fiction)
– Mona Lisa Overdrive (fiction)
– Neuromancer (fiction)
– Virtual Light (fiction)
– Agrippa: A Book of the Dead (poem: multimedia)

Gleick, James – Chaos: The Making of a New Science

Goodman, Cynthia – Digital Visions: COmputers and Art

Gracie & Zarkov – Notes from Underground. Drugs

Griffith, Winter – Complete Guide to Prescription and
Nonprescription Drugs

Grof, Stanislov – The Human Encounter with Death. Death, Psychology, LSD
– Realms of the Human Unconscious. LSD, Subconscious.

Gunderloy, Mike and Cari Goldberg Janice – Zine Culture

Gyson, Brion and Terry Wilson – Here to Go: Planet 101

Hafner, Katie with John Markoff – Cyberpunk: Outlaws and Hackers…Frontier

Hamit, Francis & Wes Thomas – Virtual Reality: Adventures in Cyberspace

Hand, Elisabeth – Winterlong (fiction)
Aestival Tide (fiction)
Icarus Descending (fiction)

Harasim, Linda, ed. – Global Networks: computers and international
communication

Harraway, Donna – Simians, Cyborgs & …

Harrison, Harry – Make Room! Make Room! (fiction)

Harry, M. – Computer Underground: Hacking, Piracy, Phreaking, & …Crime

Hattori, Katura – What’s Virtual Reality?

Hawke, Simon – Psychodrome (fiction)

Hawking, Stephen – A Brief History of Time

Heinlein, Robert – The Moon is a Harsh Mistress (fiction)
– Notebooks of Lazarus Long (fiction)
– Stranger in a Strange Land (fiction)
– Time Enough for Love (fiction)
– not to mention all the others he wrote

Helsel, Sandra & Judith Roth – Virtual Reality: Practice, Theory, & Promise

Herbert, Nick – Faster Than Light: Superluminal Loopholes in Physics
– Quantum Reality: Beyond the New Physics

Herer, Jack – Hemp & Marijuana Conspiracy: The Emperor Wears No Clothes

Hoffman, Abbie – Steal This Book
– Steal This Urine Test: Fighting Drug Hysteria
– Soon To Be a Major Motion Picture
– Best of Abbie Hoffman

Hofmann, Albert – Insight/Outlook
– LSD: My Problem Child

Hofstadter, Douglas R. – The Mind’s I: Reflections on Self & Soul

Holmes, Thomas – Electronic and Experimental Music

Home, Stewart – The Assault on Culture

Hooper, Judith – Would the Buddha Wear A Walkman? Catalogue of Consciousness

Hoy, ??? – Loompanics Greatest Hits

Hoyle, Fred and Chandra Wickramasinghe – Living Comets

Hutchison, Michael – Mega-brain. Consciousness, Brain growth, stimulation

Huxley, Aldous – Brave New World (fiction)
– Brave New World Revisited (fiction)
– The Doors of Perception. Mescaline encounters
– Ends and Means. Nature of ideals and realization
– Heaven and Hell
– Island (fiction)
– Moksha. Hallucinogens, religious experiences, visions
– Perennial Philosophy. Philosophy and religion

Huyssen, Andreas – After the Great Divide: Modernism, Mass Culture,
Postmodern

Jacobsen, Linda (ed) – Cyberarts: Exploring art and technology

Jahn, robert and Brenda Dunne – Margins of Reality..Consciousnes….

Jeter, K. W. – Death Arms (fiction)
– Dr. Adder (fiction)
– Farewell Horizontal (fiction)
– Infernal Devices (fiction)
– The Glass hammer (fiction)

Kadrey, Richard – Metrophage (fiction)

Kawaguchi, Yoichiro – Growth Metamorphogenesis. Computer art

Kehoe, Brendan – Zen and the Art of the Internet

Kerouac, Jack – On the Road

Kelly, James Patrick – Look Into the Sun (fiction)

Kelly, Kevin – SIGNAL: Communications Tools of the Information Age

Kesey, Ken – Sometimes a Great Notion. Autobiography
– Further Inquiry. Tales of the Merry Pranksters

Key, William Bryan – Subliminal Seduction
– Media Sexploitation
– The Clam-Plate Orgy

Kowalski, Roy – The Science of Virtual Reality and Virtual Environments

Kroker, Arthur, and David Cook – The Postmodern Scene

Krol, Ed – The Whole Internet User’s Guide & Catalog

Krueger, Myron W. – Artificial Reality
– Artificial Reality II

Kunetka, James – Nature’s End (fiction)

Lacan, Jacques – Television

Laidlaw, Marc – Dad’s Nuke (fiction)
– Neon Lotus (fiction)

Landreth, Bill – Out of the Inner Circle. Hacking

Langston, Christopher – Artificial Life 1
– Artificial Life 2

LaQueye Tracey and Jeanne Ryer – The Internet Companion

Laurel, Brenda – The Art of Human-Computer Interface Design
– Computers as Theatre

Leary, Timothy – Changing My Mind, Among Others
– Flashbacks
– Info Psychology
– Neuropolitiques
– Politics of Ecstacy
– Psychedelic Experience

LeGuin, Ursula – Always Coming Home (fiction)

Lee, Marvin – Acid Dreams: CIA, LSD, and the Sixties

Lem, Stanislaw – Memoirs Found in a Bathtub (fiction)
– Solaris
– The Futuroligcal Congress
– The Cyberiad
– One Human Minute
– Fiasco
– A Perfect Vacuum
– Imaginary Magnitude

Lennon, John – Lost Prophetic Writings

Levy, Steven – Hackers. Origins of hackers

Lewit, S. N. – Cyberstealth (fiction)
– Dancing Vac (fiction)

Leyner, Mark – My Cousin, My Gastroenterologist (fiction)
– American Made (fiction)
– I Was an Infinitely Hot and Dense Dot (fiction)

Lilly, John – Center of the Cyclone: An Autobiography of Inner Space
– The Deep Self: Profound Relaxation….Isolation Tank
– Programming and Meta-programming the Human Biocomputer
– Simulations of God: The Science of Belief
– The Dyadic Cyclone: Autobiography of a Couple
– The Scientist: A Metaphysical Autobiography
– John Lilly, so far…

Lippard, Lucy R. – Contemporary Art and the Art of Prehistory

Lovecock, James – Gaia: A New Look at Life on Earth

Lucky, Robert (executive director of bell labs)
– silicon dreams: information, man, and machine. 1992
+ how information theory shapes the world of computers.

Ludlow, ??? – Hasheesh eater: The Life of Pythagorean. published in 157!

Lyotard, Jean-Francois – The Postmodern Condition: A Report on Knowledge

Lyttle, ??? – Psychedelic Monographs and Essays Volumes #1-5

Maddox, Tom – Halo (fiction)

Malacalypse the Younger – The Principia Discordia.

Mandlebrot, Benoit – The Fractal Geometry of Nature

Marcus, Greil – Lipstick Traces: A Secret History of the 20th Century

Mason, Lisa – Arachne (fiction)

McAfee, John – Computer Viruses, Worms….And Other Threats to your System

McAffrey, Larry – Storming the Reality Studio. Cyberpunk, postmodern fiction
– Across the Wounded Galaxies

McDonald, Ian – Out on Blue Six (fiction)

McHale, Brian – Postmodern Fiction

McKenna, Dennis – The Invisible Landscape

McKenna, Terence – The Archaic Revival
– Food of the Gods
– True Hallucinations

McLellan, H. – Virtual Reality: A Selected Bibliography

McLuhan, Marshall – Verbi-Voco-Visual Explorations
– Through the Vanishing Point: Space in Poetry & Painting
– >>From Cliche to Archetype
– Culture is our Business
– Take Today: The Executve as Drop-Out
– The City as Classroom: Understanding Media & Language
– Laws of Media: The New Science
– The Global Village: TransformAtions in World Life…

Milan, Victor – The Cybernetic Samurai (fiction)
– The Cybernetic Shogun (fiction)

Minsky, Marvin – Society of Mind
– Robotics
– The Turing Option

Misha – Red Spider, White Web (fiction)

Mondo 2000 – A User’s Guide to the New Edge

Moorcock, Michael – The Cornelious chronicles (fiction)

Moravec, Hans – Mind Children

Morgan, Ted – Literary Outlaw: Life & Times of William S. Burroughs

Murphy, Pat – The Falling Woman (fiction)

Myers, Norman – Gaia: An Atlas of Planet Management

Nelson, Theodor – Cumpter Lib/Dream Machines
– Literary Machines

Orwell, George – 1984 (fiction)

Otomo, Katsuhiro – Akira

Pagels, Heinz – The Cosmic Code: Quantum Physics As Language of Nature

Palmer, Thomas – Dream Science (fiction)

Parker, Don – Fighting Computer Crime

Parsegian, V. Lawrence – This Cybernetic World. Cybernetics

Parfrey, Adam – Apocalypse Culture. Pomo/industrialism
– Rants and Incendiary Tracts

Pearson, Durk and Sandy Shaw – Life Extension: Practical Scientific Approach
– Life Extension Companion

Peitgen, Heinz-Otto and Peter Richter – The Beauty of Fractals

Pelton, Ross – Mind Food & Smart Pills. Neuropharmacology

Penley, Constance & Andrew Ross (eds.) – Technoculture

Perry, Paul – On the Bus. Story of Ken Kesey and Merry Pranksters
– Haight-Ashbury: A History

Pfohl, Stephen – Death at the Parasite Cafe

Pickover, Clifford – Computers and the Imagination

Pirsig, Robert – Zen and the Art of Motorcycle Maintenance

Platt, Charles – The Silicon Man

Pohl, Frederick – Beyond the Blue Event Horizon (fiction)
– Gateway (fiction)
– Heechee Rendezvous (fiction)
– Man Plus (fiction)
– The Annals of the Heechee (fiction)

Porush, David – The Soft Machine: Cybernetic Fiction

Potter, Beverly – Way of the Ronin. Career, vocation changes

Powell, William – The Anarchists Cookbook. Drug abuse, explosives, firearms

Pynchon, Thomas – Crying of Lot 49 (fiction)
– Gravity’s Rainbow (fiction)
– V (fiction)
– Vineland (fiction)

Quarterman, John S. – The Matrix. Computer Networks

Rand, Ayn – For the New Intellectual. Philosophy

Ratsch, ??? – Gateway to Inner Space

Regis, Ed – Great Mambo Chicken & the Transhuman Condition

Re/Search – Industrial Culture Handbook. Industrial musicians profiles
– Modern Primitives
– PRANKS!
– Angry Women

Rheingold, Howard – Virtual Reality. Cybernetics, virtual reality, simulation
– Virtual Communities

Rivlin, Robert – The Algorithmic Image: Graphic Images of the Computer Age

Roberts, Steven – Computing Across America

Robinson, Spider – Mindkiller: A Novel of the Near Future (fiction)

Ronell, Avital – The Telephone Book: Technology, Schizophrenia, ….
– Crack Wars: Literature, Addiction, Mania

Roszak, Theodore – The Cult of Information: The Folklore of Computers…

Rucker, Rudy – Software (fiction)
– Wetware (fiction)
– The Secret of Life (fiction)
– Masters of Space and Time (fiction)
– Spacetime Donuts (fiction)
– The 5th Franz Kafka (fiction)
– White Light (fiction)
– Mind Tools: The 5 Levels of Mathematical Reality
– The Fourth Dimension: A Guided Tour of the Higher Universes
– Transreal! (fiction)
– Semiotext(e) (ed. w/ Robert A. Wilson, Peter Wilson)
– M2k: User’s Guide to the New Edge (ed. w/ RU Sirius et al)

Ruelle, David – Chance and Chaos

Russo, Richard Paul – Inner Eclipse (fiction)
– Subterranean Gallery (fiction)
– Destroying Angel (fiction)

Ryan, Thomas – The Adolescence of PI (fiction)

Sarfatti, Jack – Space-Time and Beyond

Schafer, Murray – The Tuning of the World. Electronic Music

Schultes, Richard Evans – Plants of the Gods: Origins of Hallucinogens

Schodt, Frederik – Inside the Robot Kingdom: …Coming Robotopia

Sheldrake, Robert – A New Science of Life:….Formative Causation
– The Rebirth of Nature: Greening of Science and God
– The Presence of the Past: Morphic Resonance ….

Shelley, Mary – Frankenstein (fiction)

Sherman, Barry – Glimpses of Heaven, Visions of Hell. VR

Shiner, Lewis – Frontera (fiction)
– Deserted Cities of the Heart (fiction)
– Slam (fiction)

Shirley, John – Eclipse (fiction)
– Eclipse Corona (fiction)
– Eclipse Penumbra (fiction)
– Total Eclipse (fiction)
– City Come A’Walkin’ (fiction)
– Heatseeker (fiction)
– Transmaniacon (fiction)
– A Splendid Chaos (fiction)

Shulgin, Ann and Alexander – PIKHAL: A Chemical Love Story
– The Controlled Substance Act

Sieber, Ulrich – International Handbook on Computer Crime

Sirius, R.U. & Rudy Rucker (eds) – A User’s Guide to the New Edge

Smith, Thomas – Industrial Light & Magic: The Art of Special Effects

Solomonides, Tony and Les Levidow – Compulsive Technology…

Spinrad, Norman – Agent of Chaos (fiction)
– Little Heroes (fiction)
– Other Americas (fiction)
– Streetman (fiction)
– Bug Jack Barron (fiction)

Stafford, Peter – Psychedelics Encyclopedia

Stang, Ivan – High Weirdness By Mail. Fringes of culture sources
– Three-Fisted Tales of Bob. Subgenius

Starks, ??? – Cocaine Fiends and Reefer Madness. Drugs on film

Stelarc – Obsolete Body Suspensions

Stephenson, Neal – Snow Crash (fiction)

Sterling, Bruce – Artificial Kid (fiction)
– Crystal Express (fiction)
– Difference Engine (with William Gibson)
– Involution Ocean (fiction)
– Islands in the Net (fiction)
– Mirrorshades: A Cyberpunk Anthology (editor)
– Schismatrix (fiction)
– The Hacker Crackdown: Law and Disorder..Frontier
– Globalhead (fiction)

Stevens, Jay – Storming Heaven: LSD & the American Dream

Stoll, Clifford – The Cuckoo’s Egg. Hacking

Sturgeon, Theodore – More Than Human (fiction)

Swanwick, Michael – Vacuum Flowers (fiction)
– In the Drift (fiction)
– Stations of the Tide (fiction)

Swezey, ??? – AMOK Dispatch

Tamm, Eric – Brian Eno: His Music and the Vertical Color of Sound

Thom, Rene – Semiophysics: A Sketch

Thompson, Hunter S. – Fear and Loathing on the Campaign Trail ’72
– The Great Shark Hunt: Gonzo Papers 1
– Generation of Swine: Gonzo Papers 2
– Songs of the Doomed: Gonzo Papers 3

Todd, Stephen and William Latham – Evolutionary Art and Computers

Toffler, Alvin – Future Shock. Social Change
– The Third Wave. Social Change
– War- Anti-War

Turkle, Sherry – The Second Self: Computers & the Human Spirit

2030, F.M. – Upwingers
– Are You A Transhuman?

Tzara, Tristan – Seven Dada Manifestos and Lampistries

Vallee, Jacques – The Network Revolution: Confessions of a Computer Scientist

Varley, John – The Ophiuchi Hotline (fiction)
– Millenium (fiction)

Vinge, Vernor – Marooned Across Real-time (fiction)
– True Names and Other Dangers (fiction)
– Threats and Other Promises (fiction)
– The Peace War (fiction)

Vollman, William – You Bright and Risen Angels (fiction)

Wade, ??? – Anarchist’s Guide to the BBS

Warhol, Andy – Diaries
– POPism: The Warhol 60’s

Weil, Andrew – Marriage of Sun & Moon: Quest for Unity in Consciousness
– Natural Mind: Investigation of Drugs and Higher Consciousness
– Chocoloate to Morphine: Understanding Mind-Active Drugs

Wells, H.G. – The Island of Dr. Moreau

Whole Earth Catalog – Essential Whole Earth Catalog
– The Fringes of Reason
– Signal, Communications for the Information Age
– Software Catalog
– Whole Earth Access Mail Order Catalog

Wiener, Norbert – Cybernetics: Control & Communication in Animal and Machine
– The Human Use of Human Beings

Williams, Walter Jon – Angel Station (fiction)
– Facets (fiction)
– Hardwired (fiction)
– Solips System (fiction)
– Voice of the Whirlwind (fiction)

Wilson, Robert Anton – Cosmic Trigger
– Cosmic Trigger 2
– Historical Illuminatus Chronicles (fiction)
The Earth Will Shake
Nature’s God
The Widow’s Son
– Illuminati Papers
– The Illuminatus! Trilogy (fiction)
– Ishtar Rising
– Masks of the Illuminati (fiction)
– New Inquisition
– Prometheus Rising
– Quantum Psychology
– Right Where You are Sitting Now
– Schrodinger’s Cat Trilogy (fiction)
– Sex & Drugs, A Journey Beyond Limits
– The Earth Will Shake (fiction)
– The Widow’s Son (fiction)
– The Book of the Breast
– Natural Law, or Don’t put a Rubber on your Willy
– Wilhelm Reich in Hell
– Coincidence: A Head Test

Windling, Terri (editor) – Borderlands (fiction)
– Bordertown (fiction)

Wolfe, Tom – Electrik Kool-Aid Acid Test. Kesey & Pranksters & Haight-Ashbury

Wolfram, Stephen – Mathematica: System for Doing Mathematics by Computer

Womack, Jack – Ambient (fiction)
Terraplane (fiction)
Heathern (fiction)
Elvissey (fiction)

Wright, Robert – Three Scientists and Their Gods. Information age

Zahn, Timothy – Cobra (fiction)
– Cobra Bargain (fiction)
– Cobra Strike (fiction)

oooooooooooooooooooooooooooooooooooooooooooooo
o -=- Final Words -=- o
oooooooooooooooooooooooooooooooooooooooooooooo

As you can see this document is shorter in some sections then in other.
But it’s a living document. It will grow and morph through time. If you
want to add anything to it… or see a new section… just send me a
note.

I have to give credit where it’s due… many thanks to Andy Hawks for
starting the FutureCulture elist, the home of this document. The
inspiration and content of the cyberpoet’s guide comes largely from the
FutureCulture FAQ, which was authored by Andy. Others who contributed in
detail and spirit are Freeside’s Thesisnet-FAQ, John December’s
Internet-cmc, and Scott Yanoff’s Internet Services List. Many thanks to
them as well.

Requests to join the FutureCulture E-list should be directed as follows:

The list is officially: futurec@uafsysb (bitnet)
futurec@uafsysb.uark.edu (internet)
[this is where all posts to the list should be sent]

to subscribe, mail to:
listserv@uafsysb (bitnet)
listserv@uafsysb.uark.edu (internet)

body of message is:
subscribe FUTUREC your name

to leave the list, same as above except:
unsubscribe FUTUREC your name

if you want to receive a copy of your own posts (“reflector” mode):
set futurec repro

if you want to receive a daily digest instead of realtime:
set futurec digest

to get help and more info:
info refcard

-=> The End <=-

o o / _ o __| / |__ o _ o / o
/| | / ___o o | o/ o/__ / | /|
/ / | /) | ( /o / ) | ( / | / /

Check out the newest section of the Cyberpoet's Guide. The Ezine

[] [] [] []
[] [] [] [] [] []
[] [] [] [] [] [][][]
[][] [] [][][] [][][] [] []
[] [] [] [] [] [] [] [] [][]
[] [] [] [][][] [][][] [] [][][]

(c) copyright 1994 John Frost

Cyberpoet’s Guide To Virtual Culture Part 4 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p4/5

Part IIII of V – 3.14.94

A Cyberpoet’s Guide to Virtual Culture –

-=- 04.Resources & References
o Online how-to’s
o Similar Lists
o Assorted Online Resources
o Access Points

——————————————————
-=- 04.1.Online how-to’s |
—————————-

Admittedly, the the more exotic centers of virtual culture have a steep
learning curve. There are plenty of places, however, that require hardly
any excess knowledge at all. Fortunately, a plethora of manuals, books and
FAQs (Frequently Asked Question lists) exist to help you through your
troubled times.

o Zen and the Art of the Internet
by Brendan Kahoe
– ftp at
ashley.cs.widener.edu /pub/zen
csn.org pub/net/zen
quartz.rutgers.edu pub/internet/zen
relay.cs.toronto.edu pub/zen
mrcnext.cso.uiuc.edu gutenberg/etext92/zen10*

o ftp ftp.sura.net
/pub/nic
– How-to’s about internet (email, ftp, telnet, etc.)

o nic.merit.edu
/documents
– Gold in Networks!
– Hitchikers Guide to the Internet
– New User’s Questions
– What is the Internet
/resources
– Internet Cruise

o ftp.eff.org.
/pub/Net_info
– Big Dummy’s Guide to the Internet

o server.cs.virginia.edu
/pub/techreports/CS-91-19.ps.Z
– Virtual Reality on Five Dollars a Day
by Randy Pausch, U. of Virginia, Tech Report CS-91-19

o news.answers
– On USENET. (also see misc.answers)

-=- 04.2.Similar lists |
————————–

Hey, I wasn’t the first one to have this idea. There are a variety of
other lists out there that can direct you to Oft’ used Internet resources.

o gopher to una.hh.lib.umich.edu
– inetdirs/
– A project called the Internet Clearing House (very nice work ppl)

o Bert’s BigFun List
– ftp cerberus.cor.epa.gov pub/misc/bigfun

o Electric Mystics Guide
– ftp panda1.uottawa.ca pub/religion
– guide to religious things on the net.
– if you are techno-pagan they don’t include you, sorry.

o FutureCulture FAQ
– ftp sites
ftp.eff.org /pub/cud/papers/future
ftp.css.itd.umich.edu /poli/future.culture.d
redspread.css.itd.umich.edu
ftp.u.washington.edu /public/alt.cyberpunk
– Also through thesisnet and listserv
– started by Andy Hawks (ahawks@nyx.cs.du.edu) as
a compendium of all things futureculture
– now maintained by the list members of FutureCulture.

o Internet Services – FAQ
– USENET alt.internet.services news.answers
– FTP rtfm.mit.edu:/pub/usenet/news.answers/

o The Jargon File (same as The Hacker’s Dictionary)
– ftp sites
wuarchive.wustl.edu /pub
ftp.uu.net /doc
merit.edu /pub/doc
nic.funet.fi /pub/doc
pit-manager.mit.edu /pub
– nice. You’ll like it.

o the internet and computer-mediated communication

– ftp ftp.rpi.edu pub/communications/internet-cmc
– an all-encompassing list of internet-accessible
information (so why are you still reading this) 🙂

o alt.cyberpunk faq
– ftp ftp.u.washington.edu pub/alt.cyberpunk/
– restricted to the purview of the newsgroup
– a WWW – HTML hypertext version now exists… keen!

-=- 04.3.Assorted Online Resources |
————————————–

o Almanac of Events
– “On this day” information. For the trivia minded.
– finger copi@oddjob.uchicago.edu
– mail geiser@pictel.com to join the mailing list

o Anonymous post
– mail anonymus+ping@tygra.michigan.com “help”
– mail help@anon.penet.fi “help”

o Archeological Dbase
telnet cast.uark.edu or telnet 130.184.71.44 (Login: nadb)
– National Arch. Database information management system.

o BBSlists –
– National Graphical BBS List
+ mail beezer@cc.utah.edu
+ USENET alt.bbs.*

o CARL telnet pac.carl.org or 192.54.81.128
– Online database, book reviews, magazine fax delivery

o current cites
– ftp ftp.lib.berkeley.edu /pub/Current.Cites
ftp.eff.org pub/journals
– Over 30 journals in librarianship and information
technology are scanned for selected articles on optical
disk technologies, computer networks and networking,
information transfer, expert systems and artificial
intelligence, electronic publishing, and hypermedia and
multimedia. Brief annotations accompany most of the
citations.

o DataBase Via Finger
– finger help@dir.su.oz.au
– Query databases, find newsgroups, access archie, etc., via finger.

o Empire Schoolhouse telnet nysernet.org (login: empire)
– K-12 resources, discussion groups, etc.
– A gopher based BBS in NY.

o FEDIX/MOLIS/HERO telnet fedix.fie.com or telnet 192.111.228.33
– info. on scholarships, minority assistance, etc.
– alternative access via Gopher world menu

o ftp by mail
– mail ftpmail@decwrl.dec.com “help”

o History Databases telnet ukanaix.cc.ukans.edu
– History databases

o Hpcwire telnet hpcwire.ans.net (Login: hpcwire)
– menu-driven information searches.

o human-computer interaction bibliography (hcibib)
mail hcibib@rumpus.colorado.edu message body “help”

– a publically accessible mail-based retrieval system for
searching Human-Computer Interaction journals, conference
proceedings and books. Users can send in both word
queries and relevance feedback queries. Over 3200
abstracts from non-electronic sources.

o Hytelnet
Are you familiar with HYTELNET by Peter Scott? This is a hypertext
program for PC, Mac and other platforms that lists ostensibly ALL
telnet-accessible resources on the Net, all over the world. Updates are
almost constant and are mailed to Scott’s mailing list members.

You can anonymous ftp the files from ftp.usask.ca or telnet to that same
address and check out a (slow) Unix version of HYTELNET.
(on Netcom you can just type )

o USENET posts thru email
– News Mail Servers mail [newsgroup]@cs.utexas.edu
– Post to Usenet news via email.(eg. [newsgroup] = alt-bbs)

o virtual center for the study of virtual spaces (vcsvs)
mail vcsvs-request@nicco.sscnet.ucla.edu asking for info
– ftp nicco.sscnet.ucla.edu /pub/papers

-=- 04.4.Access Points |
—————————–

So, you say, I’ve got this wonderful Internet access setup at work or
school… what happens when I graduate or lose my job? Or perhaps you’ve
got a friend who is moving to the otherside of the continent. Is there a
way for you to remain in contact over email? Fortunately, there are easy
answers to these queries.

-o0 Lists to checkout 0o-

o Community Networks Surv
ftp atlas.ce.washington.edu
pub/seattle-community-network/community-networks/surveys
– A collection of data regarding freenet’s around
the world.

o Pdial/Kaminski List
ftp rtfm.mit.edu pub/usenet/news.answers/pdial
USENET: news.answers, alt.internet.access.wanted, alt.bbs.lists
– A nearly complete list of access points to the
the Internet. Check the Pdial list first.
– Area Codes with access as of Oct 1st 1993.
(may not be local to your prefix, check phone book)

201 jvnc-tiger
202 CAPCON clarknet express tmn
203 jvnc-tiger
205 nuance
206 eskimo GLAIDS halcyon netcom nwnexus olympus
212 echonyc maestro mindvox panix pipeline
213 crl dial-n-cerf kaiwan netcom
214 metronet netcom
215 jvnc-tiger PREPnet
216 OARnet wariat
217 prairienet
301 CAPCON clarknet express tmn
303 cns csn netcom nyx
310 class crl dial-n-cerf kaiwan netcom
312 mcsnet netcom
313 michnet MSen
401 anomaly ids jvnc-tiger
403 PUCnet
404 crl netcom
408 a2i netcom portal tellink
410 CAPCON clarknet express
412 PREPnet telerama
415 a2i class crl dial-n-cerf IGC netcom portal tellink well
416 hookup.net uunorth
419 OARnet
503 agora.rain.com netcom
503 teleport
504 sugar
508 anomaly nearnet northshore novalink
510 class crl dial-n-cerf holonet netcom
512 realtime
513 fsp OARnet
514 CAM.ORG
516 jvnc-tiger
517 michnet
519 hookup.net uunorth
602 crl evergreen indirect
603 MV nearnet
609 jvnc-tiger
613 uunorth
614 OARnet
616 michnet
617 delphi nearnet netcom northshore novalink world
619 class crash.cts.com cyber dial-n-cerf netcom
703 CAPCON clarknet express netcom tmn
704 concert Vnet
707 crl
708 mcsnet
713 blkbox nuchat sugar
714 class dial-n-cerf express kaiwan netcom
717 PREPnet
718 maestro mindvox netcom panix pipeline
719 cns csn oldcolo
804 wyvern
814 PREPnet
815 mcsnet
818 class dial-n-cerf netcom
906 michnet
907 alaska.edu
908 express jvnc-tiger
916 netcom
919 concert

-o0 Public Access Sites & Freenets 0o-

o Freenets
telnet nyx.cs.du.edu or 130.253.192.68 (login: new)
– Free account, with access to various UNIX features.
telnet hermes.merit.edu or telnet 35.1.48.150
telnet m-net.ann-arbor.mi.us or telnet 35.208.17.4
– Which host: um-m-net Enter ‘g’ for guest. login: newuser
telnet yfn.ysu.edu login: visitor

______ _____ __ __ ______
/ ___ / __ / “-. /__ _
____ / \ -. \/_/ / __
_____\ _____\ _\”_ _ /_
/_____/ /____ / /_/ /_/ /_/ /_/ In Part 5 of 5
copyright 1994 John Frost

Cyberpoet’s Guide To Virtual Culture Part 4 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p3/5

Part III of V – 3.14.94

A Cyberpoet’s Guide to Virtual Culture –

-=- 03.Virtual hangouts
o Elists & newsgroups
o e.Cafes (irc, bbs)
o Parks & Rec

-=- 03.1.Elists & newsgroups |
——————————-

Two of the most common forms of discourse in virtual culture occur on the
elist (or electronic mailing list) and the USENET newsgroup. While the
up-to-date listings of what elists or newsgroups are up and running are
available on the newsgroup news.answers or the ftp site rftm.mit.edu
(/pub/usenet-by-group/rec.answers) it is very time consuming to examine
each list thouroughly. The following are a few lists which either have
helped to form virtual culture or deal with various aspects of it.

-oO Elists Oo-

o List of eLists
– ftp ftp.nisc.sri.com /netinfo/interest-groups.

o Acadlist
– ftp KSUVXA.KENT.EDU /library
– Acadlist – list of academic elists

o 21st-Century list
21ST-C-L@BRUFPB.BITNET
– post your views on the 21st-century.

o ACE-MG
almanac@esusda.gov
Americans Communicating Electronically
primary info source on government action to improve public access

o ACTNOW-L
LISTSERV@BROWNVM.BITNET
– College Activism/Information list.
– To subscribe to this list, send the command,
SUBSCRIBE ACTNOW-L /

o ADV-ELO
LISTSERV@UTFSM.BITNET
– Sub Adv-elo
– to discuss the latest advances in electronics.

o ADV-INFO
LISTSERV@UTFSM.BITNET
– Sub Adv-info
– list to discuss the latest advances in computing.

o AIDSNEWS
– send email to LISTSERV@RUTVM1.BITNET
– message body: SUBSCRIBE AIDSNEWS Your_Full_Name

o ALA-WO
listserv@uicvm.uic.edu
regular reports on legislation and access
effecting library networks

o Alternative Institutions
AltInst-request@cs.cmu.edu
– High Signal to noise ratio.

o amnesty@VMS.CIS.PITT.EDU
Listserv@VM1.NODAK.EDU
– Amnesty International’s Elist
– message body: sub amnesty

o Anarchy List
anarchy-list-request@cwi.nl
– discussion of all aspects of anarchy

o Anne Rice
ngustas@HAMPVMS.BITNET
– the works of Anne Rice.
– To subscribe, send a request to ngustas@HAMPVMS.BITNET.

o APOGEES
listserv@VM1.NODAK.EDU
– message body: sub apogees full name
– information management with a business slant

o ArachNet: E-Journal of Virtual Culture
listserv@kentvm.kent.edu
– message body: SUB ARACHNET
– journal of all aspects of on-line life
– ftp archive ftp byrd.mu.wvnet.edu /pub/ejvc

o Artificial Life
alife-request@cognet.ucla.edu
– artificial life

o AUtopia (Pirate Ship Utopia)
autopia-rquest@wixer.cactus.rg
– a floating technology-oriented commune
– run by Jagwire X, cool ideas….

o BBS-L
LISTSERV@SAUPM00.BITNET
– To help people with getting BBS’s going and online
– Message body: subscribe bbs-l full_name

o BIOSPH-L Biosphere
LISTSERV%UBVM.BITNET@VM1.NODAK.EDU
– message text: SUB BIOSPH-L Your Name

o CET-MG
almanac@esusda.gov
Communities in Economic Transition – for rural and small town groups

o CNI-PUBINFO@CNI.ORG
LISTSERV@CNI.ORG
– CNI (Coalition for Networked Information) Access to
Public Information Working Group.

o COMMUNET
listserv@uvmvm.uvm.edu
– Community and Civic Networks

o COMMUNITY-ACCESS
community-access-request@parc.xerox.com
– Community Access Issues

o Computers and Academic Freedom
listserv@eff.org
– put add comp-academic-freedom-news
or
add comp-academic-freedom-talk
in the first line
– computing freedom, mostly deals with college campuses
– (Usenet) alt.comp.acad-freedom.talk or news

o Comp-Soc@LIMBO.INTUITIVE.COM
– to sub contact moderator @ taylor@LIMBO.INTUITIVE.COM
– Society and Computers Information Technology

o COM-PRIV
com-priv-request@psi.com
Commercialization/Privatization of Inet

o CO_PUB_INFO
listproc@resudox.net
Canada’s Coalition for Public Information

o COUNCIL
LISTSERV@SJSUVM1.SJSU.EDU
– Global Council Forum — Moving Beyond the Nation-State
– Like the UN but different. =)

o CPSR
LISTSERV@GWUVM.EDU
– Computer Professionals for Social Responsibility
– an elist for CPSR-related materials and announcements
– an elist for CPSR-related materials and announcements

o CRTNet
t3b@psuvm.psu.edu
– email LISTSERV@PSUVM.bitnet
message body: SUB CRTNET
– information theory and technologies

o Cybernetics
listserv@bingvaxu.cr.birminghamton.edu
– message body: sub cybsys-l full_name

o Cypherpunks
cypherpunks@toad.com
– public key encryption, remailers, e-privacy list

o Cypherpunks Announcement List
cypherpunks-announce-request@toad.com
– lower volume

o Derrida
listserv@cfrvm.bitnet
– message body: subscribe derrida full_name
– deconstructionalists Unite 🙂

o DEVEL-L Technology Transfer in International Development
LISTSERV@AUVM.BITNET
– message text: SUB DEVEL-L Your Name

o Digital Games Review
digital-games-request@intuitive.com
– mail info@limbo.intuitive.com
[body: ‘help’ and ‘listall Digital.Games’]
– SNES, Sega, etc.

o Edtech
edtech@msu.edu
– Educational Technology

o EFF News (EFFector Online)
effnews-request@eff.org
– subscribe to the electronic version of EFF’s
zine, the EFFector (catchy huh!)

o E-List Review Service
listserv@kentvm.kent.edu
– message body: sub libref-l your name
– a useful list, if you are looking to add to your
elist load (most people can handle 2 or 3).

o ETHICS-L@TWNMOE10.bitnet
– ETHICS-L is for discussions of ethics in computing.

o Extropians
extropians-request@gnu.ai.mit.edu
exi-daily-request@gnu.ai.mit.edu
exi-essay-request@gnu.ai.mit.edu
– nanotechnology, cryonics, anarcho-capitalist
politics, technological extension of human
intelligence and perception
– serious discussion from an informative perspective
– the first two addresses are for realtime and
digest versions, respectively, the third is for
essays and longer posts of interest only

o FNORD-L
listserv@ubvm.bitnet
– Message body: sub fnord-l
– philosophies of Leary, Robert Anton Wilson, Dr.
Lilly, etc.

o FringeWare, Inc.
fringeware-request@wixer.cactus.org
– Paco Xander Nathan’s company
– Your online shopping mall for all that’s kewl

o FutureCulture
listserv@UAFSYSB.UARK.EDU
– message body: sub futurec
– discussion of new edge, cyebrculture,
technoculture.
– Discussion of future culture and all things
that entails. (a lot).

o Future Technologies List
future-tech-request@cs.umb.edu
– artificial intelligence, nanotech, etc.

o GLOMOD-L
GLOMOD-L@UHCCVM.bitnet
– The Global Modeling Forum

o GNET
gnet_request@dhvx20.csudh.edu
– Toward a Truely Global Network
– archives @ dhvx20.csudh.edu

o GopherJewels
sub: LISTPROC@EINET.NET
share interesting gopher finds.

o ICPT-L
listserv@guvm.georgetown.edu
– Internet Research
– message body “index ipct-l

o The Information Professional’s List
– to join ask for info from jcook@netcom.com
– for verifiable private investigators, fee-based information brokers,
document retrieval liasons, commercial intelligence specialists, or
related professional. Professional resumes requested.

o Leri-L
leri-request@pyramid.com
– archives at penguin.gatech.edu pub/leri
– mailing list devoted to meta-programming,
philosophy, expanding consciousness, etc.
and a ton of chat.
– #leri is a popular channel on IRC.

o Libernet
– Sub address: LIBERNET-REQUEST@DARTMOUTH.EDU
– Archives Coos.dartmouth.edu
– Pertaining to all things libertarian.

o Masonic SIG
contact: Peter Trei (Internet) PTREI@ASGARD.BBN.COM
– Freemasonry, their philosophy et al.
– the place to lurk for conspiracy theorists! =)

o MERTON-L@BYRD.MU.WVNET.EDU
– sub address: LISTSERV@BYRD.MU.WVNET.EDU
– MERTON-L was formed for substantive discourse on research
and scholary inquiry to create and and develop knowledge about
contemplative life.

o Mind Machine Digest
mind-l-request@asylum.sf.ca.us
– ftp asylum.sf.ca.us /pub/mind-l
ftp.u.washington.edu /public/alt.cyberpunk
– brain stimulation, nootropics, etc.

o Net Happennings: (MODERATED) high volume
Includes a variety of interesting postings from around the Internet
including new Gopher announcements.
– To subscribe send a subscribe message to:
listserv@internic.net
SUBSCRIBE NET-HAPPENNINGS firstname lastname

o Neuron Digest
neuron-request@cattell.psych.upenn.edu
-neural networks

o NEWNIR-L (MODERATED)
NEWNIR-L-Request%ITOCSIVM.bitnet@icineca.cineca.it
announces postings regarding new information sources including
Gopher, Telnet, FTP, WAIS and WWW. Moderate volume

o PACS-L
listserv@uhupvm1.uh.edu
Library & Public Access Computer Systems

o PostModern Culture Journal
PMC@cc.ncsu.edu [sub pmc-list your name]
LISTSERV@CC.NCSU.EDU
archive: ftp.cc.ncsu.edu
– message body: GET PMC-TALK GUIDE
PMC-TALK F=MAIL

o Postmodern Culture Talk
listserv@cc.ncsu.edu
– [sub pmc-talk your_first_name your_last_name]

o PowerGlove List
listserv@karazm.math.uh.edu

– ftp karazm.math.uh.edu /pub/VR

o RISKS Digest
risks-request@csl.sri.com
– ftp crvax.sri.com risks
– the RISKS of computing in our lives

o RURALDATA
ruraldata-info-request@cic.net
Rural Datafication Project ) planning rural community access to
the Internet

o RRE News Service
rre-request@weber.ucsd.edu
– Subject: subscribe
– these days most of the messages concern the social and political
aspects of computers.

o SOCHIST Social History
LISTSERV@VM.USC.EDU
– message text: SUB SOCHIST Your Name

o Subgenius
Subgenius-request@mc.lcs.mit
– ftp quartz.rutgers.edu /pub/subgenius

o TechnoNomads (Steve Roberts)
technomads-request@bikelab.sun.com
– the guy featured on Donahue & Mondo’s list
– nomadness, ham radio, mobile communities, etc.

o Telecom Privacy Digest
telecom-priv-request@pica.army.mil

o Telecom Digest
telecom-request@eecs.nwu.edu
– deals with all aspects of telecommunications

o ThesisNet
thesisnet@pobox.upenn.edu
– thesisnet-request@pobox.upenn.edu
– to ‘subscribe’ ‘unsubscribe’ and/or ‘faq’

o ThinkNet
thinknet@world.std.com
– philosophy, systems theory

o Virtual Reality List
listserv@uiucvmd.bitnet
– message body: subscribe virtu-l

o VPIEJ-L@VTVM1
LISTSERV@VTVM1.CC.VT.EDU
– An e-conference for electronic publishing issues
– (Usenet) BIT.LISTSERV.VPIEJ-L

o Y-RIGHTS@SJUVM.BITNET
Listserv@sjuvm.bitnet
– Youth Rights, open to all.

-o0 Newsgroups 0o-

A short bit on the Usenet Hierarchy. Alt.groups is supposed to stand for
alternative, but should probably stand for adolescent. These are news
groups waiting to grow up and consequently have a low signal to noise
ratio. But like adolescents, if you really listen to them, you can gleem
some really neat insights. When Alt.groups get a large enough following or
a serious enough topic, they tend to graduate into other prefixes; ie,
comp. (computer) rec. (recreation), sci. (science), bit. (Bitnet
listservs), soc. (social, society). What this means generally, is that the
group becomes heady and cliqueish. But if you’re persistant ad polite, you
can usually elicit a response from somebody. One final comment about
USENET, anything I said above is likely to be untrue at any moment in
time. Thus the attraction of USENET for even the most experienced
cyberpoets.

alt.3d Three-dimensional imaging.
alt.activism Activities for activists.
alt.aldus.pagemaker Forget expensive user support, come here instead.
alt.amateur-comp The Amateur Computerist.
alt.angst Anxiety in the modern world.
alt.artcom Artistic Community, arts & communication.
alt.astrology Twinkle, twinkle, little planet.
alt.atheism.* Godless heathens next on Oprah
alt.bbs.ads Ads for various computer BBS’s.
alt.bbs.internet BBS systems accessible via the Internet.
alt.bbs.lists Postings of regional BBS listings.
alt.best.of.internet Sort of an oxymoron.
alt.binaries.* Pictures, programs, multimedia, etc.
alt.books.anne-rice A Biting look at the author and her books
alt.buddha.short.fat.guy Religion. And not religion. Both. Neither.
alt.california The state and the state of mind.
alt.cd-rom That shiny amazing disc and it’s users.
alt.censorship Discussion about restricting speech/press.
alt.co-ops Discussion about co-operatives.
alt.comp.acad-freedom.* Academic freedom issues related to computers.
alt.consciousness All aspects of consciousness.
alt.conspiracy Be paranoid –‘they’ are out to get you.
alt.cult-movies Movies with a cult following
alt.culture.usenet A self-referential oxymoron.
alt.culture.internet A place to comment reflexively
alt.cyberpunk High-tech low-life.
alt.cyberpunk.chatsubo Cyberpunk fiction.
alt.cyberpunk.movement Cybernizing the Universe.
alt.cyberpunk.tech Cyberspace and Cyberpunk technology.
alt.cyberspace and how it should work.
alt.devilbunnies Probably better left undescribed.
alt.discordia All hail Eris, etc.
alt.dreams What do they mean?
alt.drugs Recreational pharmaceuticals.
alt.fan.douglas-adams Author of “Hitchhiker’s Guide to the Galaxy”.
alt.fan.frank-zappa Is that a Sears poncho?
alt.fan.hofstadter Douglas Hofstadter and Godel, Escher, Bach.
alt.fan.mst3k Mystery Science Theatre 3000 tv show.
alt.fashion All facets of the fasion industry discussed.
alt.gathering.rainbow For discussing the annual Rainbow Gathering.
alt.gopher Discussion of the gopher information service.
alt.gothic Things mournful and dark. Gothic lifestyle’s
alt.graffiti Usenet spraypainters and their documenters.
alt.hackers Boats of projects currently under develpment.
alt.history.what-if Really worth reading every now and then
alt.hypertext Discussion of hypertext
alt.illuminati See alt.cabal. Fnord.
alt.individualism Individualist discussions
alt.industrial Industrial culture, etc.
alt.internet.access.wanted People looking for internet access
alt.internet.services Internet services
alt.irc Internet Relay Chat material.
alt.magick For discussion about supernatural arts.
alt.meditation.transcendental Contemplation of states beyond.
alt.memetics Ideas spread like genes. A new discipline.
alt.mindcontrol You WILL read this group and ENJOY it!
alt.music.alternative For groups with 2 or less Platinum albums.
alt.news-media Don’t believe the hype.
alt.online-service Commercial online services, and the Internet.
alt.out-of-body Nobody’s home.
alt.pagan Discussions about paganism & religion.
alt.paranormal Phenomena which are not explicable.
alt.politics.* Politics.
alt.postmodern Postmodernism, semiotics, deconstruction.
alt.privacy Privacy issues in cyberspace.
alt.prose Postings of original writings.
alt.psychoactives Better living through chemistry.
alt.radio.pirate Discussions surrounding pirate radio.
alt.radio.scanner Discussion of scanning radio receivers.
alt.rave Rave culture.
alt.religion.computers People who believe computing is “real life.”
alt.religion.kibology He’s Fred, Jim.
alt.rock-n-roll.* Counterpart to alt.sex and alt.drugs.
alt.security Security issues on computer systems.
alt.security.pgp The Pretty Good Privacy package.
alt.sex.* Postings of a purient nature.
alt.skate-board Discussion of all apsects of skate-boarding.
alt.skinheads The skinhead culture/anti-culture.
alt.slack Posting about the Church of the Subgenius.
alt.society.ati The Activist Times Digest. (Moderated)
alt.society.civil-disob Civil disobedience.
alt.society.civil-liberties Individual rights.
alt.society.revolution Discussions on revolution(s).
alt.society.sovereign Independantistes, unite!
alt.spam.tin Spam is neither particle nor wave.
alt.techno-shamanism Can’t program your VCR? Consult a TechnoShaman.
alt.thrash Thrashlife.
alt.uu.future Does Usenet University have a viable future?
alt.wired Wired Magazine.
alt.zines Small magazines, mostly noncommercial.
bionet.info-theory Discussions about biologicalinformation theory.
bionet.neuroscience Research issues in the neurosciences
bionet.women-in-bio Discussions about women in biology.
bit.listserv.biosph-l Biosphere, ecology, Discussion List.
bit.listserv.cyber-l CDC Computer Discussion.
bit.listserv.disarm-l Disarmament Discussion List.
bit.listserv.edpolyan Professionals and Students Discuss Education.
bit.listserv.edtech Educational Technology elist.
bit.listserv.emusic-l Electronic Music Discussion List.
bit.listserv.ethics-l Discussion of Ethics in Computing.
bit.listserv.frac-l FRACTAL Discussion List.
bit.listserv.4ad-l The 4AD recording label.
bit.listserv.film-l Film making and reviews List.
bit.listserv.fnord-l New Ways of Thinking List.
bit.listserv.frac-l FRACTAL Discussion List.
bit.listserv.gutnberg GUTNBERG Discussion List.
bit.listserv.ioob-l Industrial Psychology.
bit.listserv.mbu-l Megabyte University – Computers and Writing.
bit.listserv.sganet Student Government Global Mail Network.
bit.listserv.valert-l Virus Alert – Urgent Virus Warnings.
bit.listserv.vpiej-l Electronic Publishing Discussion List.
bit.listserv.xtropy-l Extropians
comp.ai Artificial intelligence discussions.
comp.ai.neural-nets All aspects of neural networks.
comp.ai.philosophy Philosophical aspects of AI.
comp.bbs.misc BBS Discussion
comp.dcom.telecom Telecommunications digest. (Moderated)
comp.graphics Computer graphics, art, animation.
comp.graphics.research Highly technical computer graphics discussion.
comp.graphics.visualization Info on scientific visualization.
comp.internet.library Discussing electronic libraries.
comp.music Applications of computers in music research.
comp.org.eff.news News from the Electronic Frontiers Foundation.
comp.org.eff.talk Discussion of EFF goals, strategies, etc.
comp.org.issnnet The International Student Society for Neural
Networks.
comp.publish.cdrom.* Concerning cdrom publishing.
comp.research.japan The nature of research in Japan. (Moderated)
comp.risks Risks to the public from computers. (Moderated)
comp.robotics All aspects of robots and their applications.
comp.security.misc Security issues of computers and networks.
comp.simulation Simulation methods, problems, uses. (Moderated)
comp.society The impact of technology on society. (Moderated)
comp.society.cu-digest The Computer Underground Digest. (Moderated)
comp.society.development Computer technology in developing countries.
comp.society.folklore Computer folklore & culture, past & present.
comp.society.futures Events in technology affecting future computing.
comp.sys.* Everything you would ever need to know about
computer systems
comp.theory Theoretical Computer Science.
comp.theory.cell-automata Discussion of all aspects of cellular automata.
comp.theory.dynamic-sys Ergodic Theory and Dynamical Systems.
comp.theory.self-org-sys Topics related to self-organization.
misc.activism.progressive Information for Progressive activists.
misc.int-property Discussion of intellectual property rights.
misc.legal.computing Discussing the legal climate of computing.
news.announce.important General announcements to all. (Moderated)
news.future The future technology of network news systems.
rec.arts.animation Discussion of various kinds of animation.
rec.arts.anime Japanese animation fen discussion.
rec.arts.comics Comic books and strips, graphic novels.
rec.arts.int-fiction Discussions about interactive fiction
rec.arts.sf-lovers Science fiction lovers’ newsgroup.
rec.arts.sf-reviews of science fiction/fantasy/horror works.
rec.arts.sf.announce Major announcements of SF. (Moderated)
rec.arts.sf.fandom Discussions of SF fan activities.
rec.arts.sf.marketplace Personal for-sale notices of SF materials.
rec.arts.sf.misc Science fiction lovers’ newsgroup.
rec.arts.sf.movies Discussing SF motion pictures.
rec.arts.sf.reviews Critiques of sf stories. (Moderated)
rec.arts.sf.science Real and speculative aspects of SF science.
rec.arts.sf.tv Discussing general television SF.
rec.arts.sf.written Discussion of written sf and fantasy.
rec.music.gdead A group for (Grateful) Dead-heads.
rec.music.industrial Discussion of industrial-related music styles.
rec.music.makers For performers and their discussions.
rec.music.newage “New Age” music discussions.
rec.music.synth Synthesizers and computer music.
rec.music.video Discussion of music videos.
rec.radio.amateur.misc Amateur radio practices.
rec.radio.noncomm Topics relating to noncommercial radio.
rec.radio.shortwave Shortwave radio enthusiasts.
rec.video Video and video components.
rec.video.releases Pre-recorded video releases.
sci.bio.technology Any topic relating to biotechnology.
sci.chaos The science of Chaos.
sci.cryonics People who freeze themselves after death.
sci.crypt Different methods of data en/decryption.
sci.fractals Objects of non-integral dimension and other chaos.
sci.lang.japan The Japanese language, both spoken and written.
sci.logic Logic: math, philosophy & computational aspects.
sci.nanotech Molecular-scale machines. (Moderated)
sci.philosophy.tech Technical philosophy: math, science, logic, etc.
sci.psychology Topics related to psychology.
sci.skeptic Skeptics discussing pseudo-science.
sci.space Space. The Final Frontier…not!
sci.virtual-worlds Virtual reality. (Moderated).
sci.virtual-worlds.apps Applications of VR technology.
soc.culture.japan Everything Japanese.
soc.culture.usa The culture of the United States of America.
talk.bizarre The unusual, bizarre, curious, and often stupid.
talk.philosophy.misc Philosophical musings on all topics.
talk.politics.drugs The politics of drug issues.
talk.politics.space Non-technical issues affecting space exploration.

-=- 03.2.Cafes |
————————-

If you see a net.user with more then one window open, chances are one of
those windows is linked to an electronic cafe. Like ER, these coffeehouse
atmospheres are prime spots for chatting or perhaps a little gaming or
roleplaying. The two most plentiful forms of these cafes in virtual
culture are Mu*s, or Multi-User Dimension or Dungeon (MUDS, MUSE, MUSH,
etc), and IRC, or Internet Relay Chat and of course the orginal, the BBS.
But new versions, offshoots, and even completely different surroundings
are likely to spring up at anytime and often do.

-o0 IRC 0o-

o IRC (Internet Relay Chat) Info
cs.bu.edu
ftp.eff.org /pub/irc
cs.utk.edu /pub
speedy.cs.uiuc.edu /pub

o IRC telnet server (Login: irc)
telnet irc.demon.co.uk or 158.152.1.74
telnet sci.dixie.edu 6668 or telnet 144.38.16.2 6668
telnet irc.tuzvo.sk 6668 or telnet 192.108.157.3 6668
– Internet Relay Chat via telnet.

o Virtual culture IRC channels
#Autopia Jagwire X’s Autopia group
#ccc Chaos Computer Club (“/msg CCCServ info” for CCC info)
#cDc Cult of the Dead Cow
#CyberPunk Cyberpunk (“/msg CyberBot info” for CPBot Files)
#drugs Drugs (“/msg LearyBot info” for LearyBot Files)
#free.acid Hehehe
#future FutureCulture
#hack Hacking
#leri For the discussion of Metaprograming and
Expanding Consciousness
#mindvox MindVox
#phreak Hackers and Phreakers
#Rave_Scen Raves
#report News reports from hot spots around the world
#tribe Of, about, with the tribe elist.
#wired Concerning the magazine

-o0 The world of Internet BBS’ 0o-

o Am. Philos. Assoc. eis.calstate.edu
– gopher gate.oxy.edu
– Philosophy.

o Auggie BBS bbs.augsburg.edu (141.224.128.3)
login bbs
– Friendly… good archives.

o Badboy nameserver.aue.com
login bbs/new

o Badboy’s Inn badboy.aue.com
login bbs

o Chatsubo chatsubo.nersc.gov
login guest

o Cimmaron bugs.mty.itesm.mx
login bbs/new (limited hours)

o Cleveland Free-Net freenet-in-[a|b|c].cwru.edu
129.22.8.[75|76|82]
– Usenet, MUD, USA Today, Interest groups, local mail

o Eagle’s Nest seabass.st.usm.edu
login bbs/bbs

o Endless Forest, The forest.unomaha.edu
login ef

o Fedworld fedworld.doc.gov
– A bbs run by the NIST to house US gov’t documents.

o Greta’s garbo.uwasa.fi
login bbs/new

o ISCABBS bbs.isca.uiowa.edu 128.255.40.203
login new
– largest bbs with 12,000 + users and over 200 online connections

o Island Net
telnet to island.amtsgi.bc.ca (134.87.180.1)
or dial 604-477-5163. A ‘guest’ account is available

o Kids kids.kotel.co.kr
login kids/new

o Mars Hotel solaria.ee.msstate.edu
login bbs/bbs

o Monochrome mono.city.ac.uk
login mono /psswd mono
– oh that british humour.

o NEBBS nebbs.nersc.gov
login guest

o OUBBS oubbs.telecom.uoknor.edu
– catering to University of Oklahoma students

o Prism BBS bbs.fdu.edu
login bbs

o Quartz BBS quartz.rutgers.edu
login bbs

o Ragged Edge, the wagner.musicnet.ua.edu

o SCF BBS freedom.nmsu.edu (128.123.1.14)
login bbs

o SkyNet hpx5.aid.no
login skynet
– Norway

o Shadow shadow.acc.iit.edu 192.41.245.143
login

o Sunset BBS paladine.hacks.arizona.edu
login bbs

o Virtual Rave sfraves.stanford.edu 7282
login new

o YaBBS phred.pc.cc.cmu.edu 8888 128.2.111.111 8888

-o0 Other Net Cafes 0o-
o usenet
-alt.callahans
+ Callahan’s bar for puns and fellowship.

-=- 03.3.Parks & Rec. |
————————-

Q. Of course, what is a culture without fun & games? (A. Boring.) Even the
most dedicated hacker craves a little fun everynow and then. Here is some
of the fun stuff to explore.

-o0 Elists & Zines 0o-

o Cyberpunk RPGs
cyberrpg-request@veritas.com
– Elist discussing cyber orriented RPGs

o FlashLife (CP RPGs)
flashlife-request@netcom.com
– Elist discussing cyber orriented RPGs.

o Ravelists
– DCRAVES
listserv@auvm.american.edu
sub dcraves
– Florida Raves
steve@sunrise.cse.fau.edu
– Manchester
manchester-request@irss.njit.edu
ftp irss.njit.edu /pub/manchester
bands from manchester, raving, shoegazing, etc.
– MidWest Raves
mw-raves-request@engin.umich.edu
– NE (NorthEastern) Raves
ne-raves-request@silver.lcs.mit.edu
– SFRaves (SanFrancisco Raves)
sfraves-request@soda.berkeley.edu
+ rave culture, mostly in the Bay Area
– SoCal Raves (Southern California)
socal-raves-request@ucsd.edu
– SouthEast Raves
listserv@american.edu
‘SUBSCRIBE SERAVES Your name’ in body
– UK Dance (Raves)
listserv@orbital.demon.co.uk
subscribe uk-dance

-o0 FTP sites 0o-

o soda.berkeley.edu
/pub/sfraves
– Alt.rave FAQ
+ Brian B’s excellent rave FAQ

-o0 Mu*s 0o-

o MUD Info
oinker.ucsb.edu /pub/mud
jwisdom@gnu.ai.mit.edu
– “mud list” in subject

o MUD List
A list of future or cyber- oriented MUDs. MUDs go up and down a lot, so,
not my fault if you can’t access them.

AbacusMUD abacus.hgs.se 130.238.204.10 4080
BattleTech 129.72.2.48 3026
CyberWorld elf.etsu.edu 192.43.19.199.27 3000
Global MUSH lancelot.cif.rochester.edu 4207
Infinity 129.10.10.33 3000
LambdaMOO parc.xerox.com 8888
MariMUSE pc2.pc.maricopa.edu 140.198.16.12 4228
MediaMOO purple-crayon.media.mit.edu 8888
MicroMUSE michael.ai.mit.edu 18.43.0.177

SciFiMUSH zaphod.cs.uwindsor.ca 137.207.224.3 1972
SpaceMadness riemann.math.okstate.edu 139.78.1.15 6250
StarFireMUSE agronomy.auburn.edu 131.204.60.2 4201
Star Raiders ub.d.umn.edu 131.212.32.6 2000
TrekMUSE nebula.lib.vt.edu 128.173.7.183 1701
TrippyMUSH 128.153.16.13 7567
Virtual Realities coyote.wustl.edu 128.252.136.100 3019

-o0 Game Servers, Etc 0o-

o Backgammon Servers telnet ouzo.rog.rwth-aachen.de 8765
– Backgammon! (Login: guest)

o Eliza-type Interactive AI
– telnet to debra.dgbt.doc.ca ( login: chat)

o Chess Server telnet to 129.15.10.21 5000
– Play/watch real-time chess w/ human opponents.
– Type ‘help’ for help

o Game Server telnet castor.tat.physik.uni-tuebingen.de
– a myriad online games. (Login: GAMES)

o GO Server telnet hellspark.wharton.upenn.edu 6969
– Ancient Chinese Secret. Now on the Internet!

o Iowa Politcl. Stk Mkt telnet ipsm.biz.uiowa.edu
– Buy & sell shares in political candidates.
(Non profit research proj)

o The Oracle
– mail oracle@cs.indiana.edu w/ subject: help
– The Usenet Oracle answers all your questions!

o Scrabble telnet phoenix.aps.muohio.edu 7777
– The popular Milton Bradley board game. (unable to connect)

___
______ _____ __ __ ______
/ ___ / __ / “-. /__ _
____ / \ -. \/_/ / __
_____\ _____\ _\”_ _ /_
/_____/ /____ / /_/ /_/ /_/ /_/ In Part 4 of 5
copyright 1994 John Frost

Cyberpoet’s Guide To Virtual Culture Part 2 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p2/5

Part II of V – 3.14.94

Cyberpoet’s Guide to Virtual Culture –

-=- 02.Cultural Signposts
o Libraries – cyber-repositories of data
-o- FTP sites
-o- Telnetable Repositories
-o- Gopher Space
o Museums, galleries, ezines & stuph
-o- Art FTP sites
-o- Art Centered Elists
-o- Ezines
-o- Misc Internet Art
o Organizations & Gov’t

-=- 02.Places
——————————————————
-=- 02.1.Libraries |
————————-

Like a child who enjoys reading, a cyberpoet will return often to hir
favorite net.repository of information and check for new ‘books.’ Unlike
everyday reality [ER], there are thousands of libraries and also unlike ER
they are usually less then 100 keystrokes away. No fossil fuel is burned;
they are almost never closed; and the cost of use is minimal, undoubtedly
a few steps in the right direction.

A cyberpoet with a good memory or a handy Personnal Digital Assistant
[PDA](such as a Newton, Sharp, or Intelligent Agent) will often be able to
list off hir favorite net.repositories upon request. However it is often
useful to have a pre-made list of common sites to forward if time is short
or the PDA is without batteries. Consider this such a list.

-o0 FTP sites 0o-
the self service library

~o 141.214.4.135
– UnderWorld Industries
– 8.3 format *yuck* =)

~o alfred.carleton.ca
pub/freenet/working.papers/
– Volumes of information on Freenets and Internet Use

~o aug3.augsburg.edu
/pub/bbs-lists
– Lists of BBS’s internet and dial-up
– also the archives of the Auggie BBS.

~o bertha.pyramid.com
– leri, cybernews info
– an archive on personal freedom

~o byrd.mu.wvnet.edu
/pub/ejvc/
– Electronic journal on virtual culture archives
/pub/history
– History archives, databases, other…
– Some internet History
– Mostly political and military now.
/pub/merton
– Merton-L archives

~o cert.sei.cmu.edu
/pub
– Computer/Internet Security (those guys in red shirts)
– Computer Emergency Response Team FAQ (anti-viral)
– virus-l archives

~o coombs.anu.edu.au
/coombspapers
– a variety of research papers about the ‘internet’ etc.
– some papers on buddhism.

~o dhvx20.csudh.edu
/global.net
– Toward a truely global network
– Archives on networks around the world, mostly 3rd world.
(Maybe it’s his first time around.)

~o dla.ucop.edu
/pub/internet
– Library Resources Guide

~o etext.archive.umich.edu
– a wealth of text archives
– recipient of the most discriptive e-address award

~o ftp.cica.indiana.edu
/pub/pc/win3
– Windows software archive Also the home of the

~o ftp.cpsr.org
– Tap-Info archives (Ralph Nader’s Internet Group)
/cpsr/work
– CPU: an ezine for cpsr news and info.
/cypherpunks
– cypherpunks archive

~o ftp.cwru.edu
/hermes
– Supreme Court ASCII rulings.
– Also available thru telnet and gopher.

~o ftp.eff.org
– preferred access: gopher
– recently reorganized to server you better.
– There is no way I could cover all the good stuff available here.
It is my suggestion that you spend some time skimming each
document to grok its true purpose.
– also note that all the zines & journals have been moved to
etext.archive.umich.edu and the IRC archive has been moved
to ftp.kei.com /pub/irc

/pub/Alerts – Up to the minute alerts for the iNet community.
/pub/CAF – Computer Academic Freedom Archives
/banned – banned books list.
/pub/EFF – misc, newsletters & eff Policy
/pub/Groups – Info/archives from groups on the outposts.faq
/pub/Net_info – Big Dummy Guide, Cyberpoet’s Guide and more.
/pub/Publications – written material from the likes of
– Bruce_Sterling, Esther_Dyson, John_Gilmore, CuD,
John_Perry_Barlow, Mike_Godwin, Mitch_Kapor and more

~o ftp.kei.com
/pub/irc
– irc elist archives.

~o ftp.msstate.edu
– History – Africa & Americas
– fineart_online (an epub and archives)

~o ftp.nevada.edu
/pub/guitar
– Guitar Chords, Tablature.

~o ftp.rpi.edu
/pub/communications
– internet-cmc (also known as the december list).

~o ftp.u.washington.edu
[] the alt.cyberpunk archives that used to be maintianed here []
[] are missing. If you know where they are now, please update me []
[] ditto the alt.drugs archives []

/pub/virtual-worlds
– a library of information of Virtual Reality

~o ftp.uwp.edu–
– THE central repository for music information
– Lyrics, gifs, discographies, etc, etc, etc…

o grind.isca.uiowa.edu (128.255.19.233)
/info/articles
– Academic papers and news articles about hacking
/info/hacking
– Quotations from “experts” about hackers and hacking
/info/jfk
– JFK conspiracy files, alt.conspiracy.jfk archives
– you can telnet to this ftp site, login iscabbs

o KSUVXA.KENT.EDU
/library
– Acadlist – list of academic elists

~o lysita.lysator.liu.se
– many texts (including SF zines and stories)
– Magick, religion et al.
– Black7 disc. list archives =)

~o media-lab.media.mit.edu
/access/
– information concerning the mit media lab in
particular, see ProjList, the list of
medialab-related projects

~o mrcnext.cso.uiuc.edu
/pub/etext
– Project Gutenberg and other etext holdings (books!)

o ftp.cc.ncsu.edu
/pub/ncsu/pmc
– General files about postmodernism
– Avital Ronell Interview
– Dead Doll Humility
by Kathy Acker
– Notes Toward an Un-written Non-Linear
Electronic Text “The End of Print Culture”
A Work in Progress
by Michael Joyce
– Play it Again, Pac-Man
by Charles Bernstein

~o netcom.com
/pub/amcgee/*
– leftist, liberal, activism stuff.
/pub/fixion
– collabrative fiction, but more.
/pub/Guides
– the Internet Mall (commercial entities on the net)
/pub/aleph
– Unofficial archive aleph@pyramid.com e-list.
/pub/alm
– FreeBSD Unix-related files and info
/pub/bskendig
– programming docs MUF on TinyMUCKs; useful MUF programs
/pub/btf
– Computer Underground Digest; Funhouse
/pub/bverreau
– solar eclipse photography; GIF and JPEG images
/pub/css
– Socially Responsible Investment Oppty.
/pub/dwu/InsightsHumor
– misc stuff that are funny or insightful
/pub/eblade
– lpmud and other misc.
/pub/fb
– TinyMUCK 2.2fb mud server source code, and muf source code.
/pub/fdesign
– Design & print IFS fractals, advanced features
/pub/forge
– Documentation and demo files of FORGE product set.
/pub/gasman
– Quotes, witticisms, etc. stolen from others for YOUR usage.
/pub/gleep
– Anime pictures, original and just colorized.
/pub/imf
– Interesting Mac shareware/free
/pub/johnl
– E-zine-list (list of net-accessible zines); CRASH zine
/pub/katbrown
– info on Kathleen Brown’s Campaign for California Governor
/pub/kevitech
– Internet Underground Music Archive curent info; cool stuff.
/pub/kgreene
– Synaesthsorium Archives
/pub/lemay
– Short stories; mostly horror, gothic
/pub/qwerty
– Xenon’s ftp site. PGP FAQ and “Here’s How to MacPGP!”
/pub/rone
– Miscellaneous files and assorted junque; pictures; News.
/pub/sjourney
– Oingo Boingo Electronic Newsletter backissues;
/pub/totse
– Temple of the Screaming Electron BBS
/pub/vidgames
– Electronic Game FAQ’s; Mortal Kombat II; Game Genie
/pub/zzyzx
– public keyserver; pseudonym registry anon.penet.fi

~o nexus.yorku.ca
/pub/Internet-info
– Lot’s of stuff, including High Weirdness.

o nic.funet.fi
/pub/culture
– Cultural Information

o nicco.sscnet.ucla.edu
[] Gone! ugh… anyone know any mirrors? []
/pub/papers/
– a course in sociology and cyberspace by Peter Kollock
– Mark Smith’s masters thesis
– virtual center for the study of virtual spaces archives

~o nifty.andrew.cmu.edu
/pub/QRD
– AIDS info/gay rights info
/pub/erotica
– like it says… erotica (a fair sized archive too)

o oak.oakland.edu
– software archive for PCs and UNIX.

o obi.std.com
/pub/obi
– On-Line Text (published works)

o ocf.berkeley.edu
/pub/Library
– lib. of docs, bible, lyrics, etc.

o panda1.uottawa.ca pub/religion
– Electric Mystics Guide
– Much religious stuff

o parcftp.xerox.com
[] down due to (hacking?) back soon []
/pub/MOO/papers/
– mud-related perspectives on social worlds in vr
– stuph.

o penguin.gatech.edu
pub/leri/articles
– Timothy Leary’s 8 Circuit Model

o pilot.njin.net
pub/ftp-list/ftp.list
– List of FTP Sites (1992 version)

o quartz.rutgers.edu or cathouse.org
/pub/humor
– text/humor files (tv, sex..)

o rtfm.mit.edu
– USENET FAQ repository
– General Net Info
– tends to be a little techie (RFC’s and the like)

o sulaw.law.su.oz.au
/pub/law
– Law libraries and legal research.

o slopoke.mlb.semi.harris.com
/pub/loopy
– Loopy (Quantum Gravity & String Theory)
/pub/magick
– Magick, not parlor tricks.
/pub/scripture.*
– Church of Virtuality/Reality
/pub
– High Weirdness
+ Guide to some interesting stuph
– The Human Evasion
+ by Celia Green
– Hypertext and Hypermedia: A Selected Bibliography
+ by Terence Harpold
– Principia Discordia
+ by Malacalypse the Younger
– wilson.on.cis
+ Interview with Robert Anton Wilson
– Temporary Autonomous Zones (TAZ)
+ by hakim Bey
+ a defining work of virtual space.
– New Maps of HyperSpace
+ Terence McKenna
– schizmat
+ Tom Maddox on Schizmatrix (by B. Sterling)

o soda.berkeley.edu
/pub/cypherpunks
– CryptoAnarchist Manifesto
– Cryptography Glossary

o sounds.sdsu.edu
– sounds archive

o sunset.cse.nau.edu
– pictures, sounds

o sunsite.unc.edu
/pub/docs
– internet-info
/pub/multimedia/OTIS
– OTIS archives.

o wiretap.spies.com
/Clinton
– Clinton Public Docs & Speeches

o wuarchive.wustl.edu
– pictures, sounds

-o0 Telnetable Repositories 0o-

o CARL telnet pac.carl.org or 192.54.81.128
– Online database, book reviews, magazine fax delivery

o FedWorld Gateway telnet fedworld.doc.gov or 192.239.92.201
– Access to some gov’t databases, files, libraries, etc.

o Hpcwire telnet hpcwire.ans.net (Login: hpcwire)
– menu-driven information searches.

o InterNIC telnet rs.internic.net
– Gopher, WAIS, Whois, finger, book orders, etc

o Law Library telnet liberty.uc.wlu.edu (login: lawlib)
– State,Computer,Law Library.

o LawNet telnet lawnet.law.columbia.edu (login: lawnet)
– Law/Judicial info and catalogs access.

o Library of Congress telnet locis.loc.gov
– lib. of congress, legislative info, and copyright info.

o NSSDCA nssdca.gsfc.nasa.gov
login as “NODIS” no password
– online catalog of NASA material

o Rutgers CWIS telnet info.rutgers.edu
– (CIA World Factbook, Religious/Gov’t Texts)
– Recommend select LIBRARY
– dictionary/thesaurus/familiar-quotations

o World Wide Web info.cern.ch
– an attempt to build an online hypertext reference work.

-o0 Gopher Space 0o-

A menu based realm of information access. To use these gopher servers,
‘gopher gopher.server.name’, (unless otherwise noted) else hunt them down
from the global menu. Much gopher stuff is duplicated at ftp sites, and
vica versa.

o GopherJewels@EINet.net
share interesting gopher finds via this elist
sub: LISTPROC@EINET.NET
msg: sub gopherjewels

o gopher ba.com
Bell Atlantic Gopher
URL=”gopher://ba.com/”
The seven baby bells have made a gopher to store information
about their task force on the future of the baby bells and the
information super highway

o gopher cns.cscns.com
offers: ASCII Clip Art, USA Today, UPI News,
Commerce Biz Daily, Classifieds

o gopher cypher.esusda.gov
location of foundation center libraries
and book listing funding info sources

o gopher english-server.hss.cmu.edu
A variety of info… worth a surf. Lots of links.. almost uptodate

o telnet fatty.LAW.cornell.edu (login: gopher)
– mucho stuph concerning LAW, legal issues, gov’t.

o gopher.eff.org
– legal issues in cyberspace. privacy, freedom, etc.

o telnet GOPHER.GSFC.NASA.GOV (login: gopher)
– nasa info & GSFC info (was Nicolas BBS)
– images
– a selection of internet resources
– a selection of internet resources

o gopher lan.vita.org
3rd WORLDNETWORK DEVELOPMENT

o gopher gopher.mta.ca
Mount Allison University Gopher
– on-line art Galler

o gopher mudhoney.micro.umn.edu
– gnews-archive
– big archive too

o telnet nicol.jvnc.net or telnet 128.121.50.2 (Login: nicol)
– Access to internet resources
– Elec. Publishing Service (library resources)

o gopher peg.cwis.uci.edu 7000
URL: gopher://peg.cwis.uci.edu:7000/11/gopher.welcome/peg/GOPHERS
An example of a well organized gopher (kewl stuff too)

o gopher una.hh.lib.umich.edu
– helpful directories for the Inet
– much more stuff (really incredible)

o wiretap.spies.com
– collection of etexts
– white house releases

o is.internic.net
– alternative: telnet is.internic.net login gopher
– pointers to and fulltext of resource guides
– information about the internet itself

-o0 World Wide Web 0o-

Although others would claim that WWW isn’t the latest greatest thing
on the Internet, it is just beginning to come into wider use (what with
the advent of Mosaic at al). So, like a good soldier, I have added this
section. It is small now, but with your support, and a keen eye, it will
grow fast.

Introducing Lynx. The solution too your dialup WWW needs.

o Lynx (a textbased WWW server)
code available via ftp at ftp2.cc.ukans.edu pub/lynx
or try out lynx by telnetting to:
ukanaix.cc.ukans.edu ( login: www )
www.twi.tudelft.nl ( login: lynx )
millbrook.lib.rmit.edu.au (login: lynx )

o http://141.214.4.176/uwi/reviews.html
– Look here for “What’s Hot and Cool” on the Web.

o http://www.cen.uiuc.edu/
– a variety of Internet guides here

o http://www.eff.org/CAF/cl-index.html
– (A live index to “newsy” civil-liberties related Net material)

o http://www.ics.uci.edu/~ejw/csr/cyber.html
The Cyberspace Report, a radio show aired on KUCI, 88.9 FM

o http://www.ncb.gov.sg
– Singapore National Computer board

o http://nearnet.gnn.com/GNN-ORA.html
– O’Reilly & Associates Global Network News

o http://solar.rtd.utk.edu/friends/home.html
– New Russia-American Friends and Partners

o http://sunsite.unc.edu/expo.ticket_office.html
A virtual World’s Fair that lets you tour exhibits from around
the world and, at the end of the day, hop on a computerized
shuttle bus for a trip to the official Expo restaurant.

o http://tlg.org/
The Little Garden cooperative has a WWW service online,

o http://www.ifi.uio.no/~mariusw/nexus/
– Nexus elist info

o http://www.wired.com
– WiReD magazine

o http://zapruder.pds.med.umich.edu/uwi.html
– Contains Hot and Cool- pointers and reviews of Web spots
– Worth a long look(and probably point you to even cooler sites)

-=- 02.2.Museums, galleries & stuph |
—————————————

Every subculture has art it can call it’s own. Indeed, some would say that
without art it would not really be a culture at all. The world of
virtual culture is no exception. Civilizations, uncivilized that they are,
have been prone to collecting art in museums, supposedly to make public
viewing easier. The result, however, is that only a few people see this
art every year and the scarcity of this viewing makes the art-world seem
elitist. To some extent, this has been replicated in virutal space.

However, the medium of the net allows for wider distribution and new
spaces for all forms of art. New spaces, even new artforms, pop up all the
time and hopefully find their way into this document. This activity seems
to be both motivated by and motivating a groundswell in popular art and
computer mediated art.

-o0 Gopher, FTP & WWW sites 0o-

o Agrippa available @
gopher spinaltap.micro.umn.edu

o alt.pictures.fine-art.*
archives can be found the file
ftp uxa.ecn.bgu.edu /pub/fine-art

o Amine Info
– oinker.ucsb.edu /pub/anime

o collection of sci-fi stories
– http://tardis.ed.ac.uk/~charlie/fictionhome.html

o gopher cs4sun.cs.ttu.edu
– Ascii pics and other art

o GIF Pictures (general archives)
– ahkcus.org
– apocalypse.engr.ucf.edu /pub/images
– hubcap.clemson.edu /pub
– solaria.cc.gatech.edu /pub

o Music
– ftp.uwp.edu /pub/music
+ Music (lyrics/discographies/etc.)

o mtv www page
– www.mtv.com

o OTIS (Operative Term Is Stimulate) archives
– sunsite.unc.edu /pub/multimedia/pictures/OTIS
+ original e-art

o Spunk Press archive:
gopher: o etext.archive.umich.edu:/politics/Spunk
AnonFTP: o etext.archive.umich.edu:/pub/politics/Spunk
WWW: o http://www.cwi.nl/cwi/people/Jack.Jansen/spunk/Spunk_Home.html

o Survival Research Laboratories (SRL) Info
– ftp.u.washington.edu /public/alt.cyberpunk
+ info on the industrial robot group
[] missing in action – do you know of copies? []

o WAX: The Discovery of Television Among the Bees
a film by Davids Blair
– ftp.u.washington.edu /public/alt.cyberpunk
– reviews and info about David Blair’s cyberdelic film
[] missing in action – do you know of copies? []

-o0 Art Centered Elists 0o-

o FineArt Forum
fast@garnet.berkeley.edu

– elist on arts on the net and elsewhere

o Gibraltar
gibraltar-request@maestro.mitre.org
– discussion of artistic and progressive music

o NetJam
netjam-request@xcf.berkeley.edu
– MIDI, musc makers, etc.

o Phillip K. Dick
pkd-list-request@wang.com
– list celebrating the famous sf author

o Playlist
playlist-request@ecst.csuchico.edu
– alternative radio/dj playlists and discussion

-o0 Ezines 0o-

o Armadillo Culture
sokay@mitre.org
– cool ezine

o ArtCom
artcomtv@well.sf.ca.us
– interfacing art and communicaion
– usenet alt.artcom

o BLINK
– FTP: blink.acns.nwu.edu:/pub/blink
– WWW: – http://www.acns.nwu.edu/blink/
– Gopher: gopher.well.sf.ca.us
– Issues surrounding the intersection of consciousness and
technology.

o Computer Underground Digest
– An open forum dedicated to sharing information and the
presentation and debate of diverse views.
– FTP: ftp.eff.org:/pub/Publications/CuD
etext.archive.umich.edu:/pub/CuD/cud
aql.gatech.edu;/pub/eff/cud
ftp.ee.mu.oz.au:/pub/text/CuD (Australia)
nic.funet.fi:pub/doc/cud (Finland)
ftp.warwick.ac.uk:pub/cud (United Kingdom)

o CORE
core-journal@eff.org
– fictional/essay e-zine
– ftp ftp.eff.org for back issues

o Crash
– Guide to traveling through the underground. Alternative travel
stories, hints, and tips.
– FTP: netcom.com:/pub/johnl/zines/crash

o Drum
– Interesting ASCII layout concept.
– FTP: etext.archive.umich.edu:/pub/Zines/Drum
– Gopher: gopher.well.sf.ca.us
etext.archive.umich.edu

o Fact Sheet 5 – the e.version
– FTP: etext.archive.umich.edu:/pub/Factsheet.Five
– Gopher: gopher.well.sf.ca.us
etext.archive.umich.edu

o Hi-Rez
– Electronic Journal for CyberBeatniks
– FTP: etext.archive.umich.edu:/pub/Zines/CyberPunk/HI-REZ
– Gopher: etext.archive.umich.edu

o Holy Temple of Mass Consumption
– strong ties to the finest SubGenius traditions
– ftp: quartz.rutgers.edu /pub/journals/HToMC

o interface
– FTP: etext.archive.umich.edu:/pub/Zines/Interface
– Gopher: etext.archive.umich.edu

o InterText (was Athene)
– FTP: network.ucsd.edu:/intertext
etext.archive.umich.edu:/pub/Zines/Literary/
– Gopher: etext.archive.umich.edu

o Line_Noiz_
– ae687@freenet.carleton.ca for info
– to sub send email to dodger@fubar.bk.psu.edu
– with the body: Subscription LineNoiz

o Meta
– ftp ftp.netcom.com:/pub/mlinksva
– cryptography, electronic publishing, free software development,
intellectual property, internet commercialization, privacy and
virtual communities.

o Morpho_online
– etext.archive.umich.edu
– alt.cyberpunk

o Obscure Electronic
– Profiles the people in this publishing subculture
– FTP: etext.archive.umich.edu:/pub/Zines/Obscure.Electric
– Gopher: gopher.well.sf.ca.us
etext.archive.umich.edu

o Parthenogenesis
– FTP: etext.archive.umich.edu:/pub/Zines/Parthenogenesis
– Gopher: etext.archive.umich.edu

o Quanta
export.acs.cmu.edu /pub/quanta
ftp.eff.org /pub/cud/misc/journals
-fiction ezine

o Scream Baby
ftp.eff.org /pub/journals/ScreamBaby
red.css.itd.umich.edu /poli
ftp.css.itd.umich.edu /poli

o SOUND News and Arts
quartz.rutgers.edu /pub/journals
– e-version of the popular zine

o The Undiscovered Country
– the undiscovered country is a netzine regarding
life/art/literature/cyberspace/philosophy/etc.
– FTP: etext.archive.umich.edu:/pub/Zines/Literary/

o UnPlastic News
ftp.eff.org /pub/cud/misc/journals

o Voices from the net
voices-request@andy.bgsu.edu
ftp sites for Voices are:
etext.archive.umich.edu /pub/Zines/Voices
aql.gatech.edu /pub/Zines/Voices_from_the_Net

-o0 Misc Internet Art 0o-

o Adam Curry’s Cyber-Sleaze Report
– finger adam@mtv.com or hotlist@mtv.com
– worth putting in your .logout file

o Coke Machines et al.
– finger info or graph@drink.csh.rit.edu
– finger coke@cs.cmu.edu
+ Tap that coke machine.
– finger franklin@ug.cs.dal.ca
+ Random Star Trek quotes.
– finger buckmr@rpi.edu
+ U.S. Top Pop singles for the week.
– finger nasanews@space.mit.edu
+ Nasa daily news briefs
– finger normg@halcyon.halcyon.com
+ Weekly Nielsen TV ratings
– internet coffee machine (with Jpeg of coffee)
+ http://www.cl.cam.ac.uk/coffee/coffee.html

-=- 02.4.Organizations & Gov’t |
————————————-

The internet is international, national and pinpoint local; private,
public, profit, non-profit, all at the same time. This structure makes it
not only unreasonable to impose a government upon the net, but nearly
impossible. So when you talk about Gov’t on the net, you are talking about
the Goverment’s attempts to reach out to the net.citizens and, ideally, to
listen to them.

-o0 The Legislative Branch 0o-

o Congress Email/FTP
– mail congress@hr.house.gov and ftp ftp.senate.gov
– sadly I only found two senators who were using this (Alaska &
Mass)

o The Congress is in the process of establishing its own electronic public
access links. You can get more information from any of the following.
Please remember that these are not connected in any way to any White
House online projects (due to the separation of powers), so if you have
any problems with their systems, you will have to contact their system
administrators for assistance.

Senate gopher site: gopher ftp.senate.gov
Senate ftp site: ftp ftp.senate.gov
Library of Congress: telnet locis.loc.gov
” ” ” : ftp seq1.loc.gov
” ” ” : gopher marvel.loc.gov
Government documents: gopher esusda.gov
Government documents: gopher sunsite.unc.edu

-o0 The Executive Branch 0o-

The official Party Line: “The White House e-mail system is under
construction. This is a new project and suffers from all of the problems
common to a startup operation. The Communications office is currently
working on defining what this system will do, as well as trying to come up
with equipment and staffing to make sure that it works. E-mail messages
are currently being printed out and responses are being sent out via US
Mail.

“Nobody wants this new venture to work more than the staff that has
devoted so many hours to getting it up and running. But much time and
effort will be required before the system is truly interactive. In the
mean time, they will need a little patience from the electronic community.
If you send a message to the White House, please include a US Post office
address for replies.”

On the Internet, send to:
president@whitehouse.gov or vice.president@whitehouse.gov

-o0 Other 0o-

o Voice of America
ftp ftp.voa.gov
gopher gopher.voa.gov
– Voice of America Newsfiles (very very interesting. hm?)

o FCC (Federal Communications Commision)
Open to the public since 2-22-94
ftp ftp.fcc.gov

o California Gov’s Race
ftp ftp.netcom.com
– /pub/katbrown – info on Kathleen Brown’s Campaign for California
Governor

-=- 02.5.Organizations |
—————————–

Home, home on the net. The ability of the Internet to bring people
together who share common interests is amazing. Someone may start a
mailing list to discuss a local environmental problem, then suddenly
someone from halfway around the world joins in and you learn they are
having the same problem as well. Before you know it, the mailing list
becomes a clearing house for information regarding environmental
pollution. That is one sort of organization on the net. Other’s join the
net with the explicit intention of operating as an Organization. Both are
growing in numbers everyday.

This is the last time this section will be in the Guide.
In the future please refer to the
-=> OUTPOSTS <=-
on the Electronic Frontier
list maintained by Stanton McCandlish .
available via ftp from ftp.eff.org or EFF’s gopher.
OUTPOSTS is posted every 21 days to the groups
comp.org.eff.talk
alt.politics.datahighway
alt.internet.services
comp.answers
alt.answers
news.answers

______ _____ __ __ ______
/ ___ / __ / “-. /__ _
____ / \ -. \/_/ / __
_____\ _____\ _\”_ _ /_
/_____/ /____ / /_/ /_/ /_/ /_/ In Part 3 of 5
copyright 1994 John Frost

Cyberpoet’s Guide To Virtual Culture Part 1 (March 14, 1994)

Subject: Cyberpoet’s Guide to Virtual Culture – 3.14.94 – p1/5

____________________._____________________________________________________
_._______________________________________________________________________.
_…______________________________________________________________________
_________________…____.. _____ . _______….________….. . .. ____.__

////////////////////////////////////////////////////////////////////
// |
// \ // /////// |
// \ // // |
// \ // // |
///////////// yberpoet’s Guide to \//irtual ///////ulture |
|
A multipart guide to the electronic frontier. 039414 o

-=- 01.Introduction
——————————————————

Beyond the hype, behind the glamour, underneath the sea of buzzwords,
icons and flames a new subculture is spreading in this petri dish known as
the Internet. Here science and art – media and mind – combine in a cyborg
frenzy to create this replicant cousin to cyberpunk and hacking. It is a
subculture with no name, few labels, but thousands of common attractors,
which link together before our eyes like digital DNA to create, in the
helix of the autologue, a new frontier for participants in these wide
virtual spaces to explore.

Any document that attempts to cover an emerging culture is doomed to be
incomplete. Even more so if the culture has no overt identity (at least
none outside virtual space). But the other side of that coin presents us
with the oportunity to document the ebb and flow, the moments of growth
and defeat, the development of this young culture.

Although young, there is rich history and varied philosophies for this
group to draw on. From cyberpunk, the quest for access to information and
a vision of the future (the cyber) has been exorcised from the
distopic and ‘punk’ish views of the monster the media has made of
cyberpunk. From the Hacker ethic, we get the rally cry that “infomation
wants to be free.” From the workings of the Internet, we see the desire
for universal access and the pursuit of Jeffersonian Democracy (kapor)
that is manifested itself partially through the anarchy inherent in the
system and partially through the efforts of many net.users.

This document, although significantly different, attempts to pick up where
the FutureCulture FAQ (by andy hawks) left off. It should act as a
starting point for those new to the net, as one avenue to reach a level
of net.literacy, and as a handy reference point for those already
comfortable in this pocket of the net.

It is a road map to the interesting viewpoints, hot dog stands, museums,
flora and fauna that dots this constantly changing landscape of virtual
space. Explore these sites. Dig in the cyborganic gardens. Report back
your findings, so that others may follow. And they will.

-oO -==- Oo-

[Cyberpoet] Cyber-, having to do with information flow, human and
computer use/combinations, computer mediated communication. -Poet, one who
makes art with words, an artist, a renaissance trait. A cyberpoet is one
who strives to be artful in their use of virtual space. Someone who makes
frequent trips to the edge of technology/culture/society and then reports
back to anyone who will listen. The avant-guard of virtual culture.
Someone who, like a renaissance man, has their eye on the future and their
nose in its knowledge, technologies and politics.

-oO -==- Oo-

-=- 01.2.Contents |
————————-

Part I

-=- 01.Introduction
o preface
o contents -=>what you are reading>From A to Z
==================
================
================
==========

-=- 01.Lexicon of Virtual Culture
——————————————————
-=- 01.3.The dictionary |
—————————

Virtual Culture — >>From A to Z

ADSL (Asynchronous Digital Subscriber Loop) – The transmission method
likely to be used to send movies, tv shows and sports – at the viewers
request – over existing telephone lines right to your television. Look for
this to be available and affordable in the next two years. This is the
main contender to ISDN, the winner will provide the link between 50
channels and 500 channels, 50,000 channels or (hopefully) more.

Agrippa: A Book of the Dead – A collaboration between author William
Gibson, publisher Kevin Begos Jr., and artist Dennis Ashbaugh. This
art-work contains engravings by Ashbaugh which appear or disappear in
light and an on-disk semi-autobiographical poem by William Gibson which
is unreadable after having been read once. Agrippa is notable because in
many respects it blurs the lines concerning what art is, and adds fuel to
the fire on issues of property rights and intellectual property. A
highlight of 1992 was the release of Gibson’s poem on to the net.

Artificial Life – man-made systems that exhibit characteristics associated
with the concept of “life”.

Artificial Reality – similar to virtual reality, but more interactive,
with the participant being part of, not just experiencing, the artificial
environment.

Barlow, John Perry – A drummer for the Grateful Dead and co-founder of the
EFF. Now a net.denizen who speaks often on virtual culture and cyberspace
sociology and technology.

BBSes – electronic Bulletin Board Systems. Begun in the late 70’s, a form
of virtual community existing in cyberspace where participants (usually
using aliases) may send and receive public and private messages to each
other on any topic imaginable, transfer software (copyrighted and/or
public domain), play on-line games, etc. There is the “over-ground” BBS
world where aliases are less common and illegal activities are avoided in
discussion, and the computer underground where illegal activities and
discussions are very common, members use aliases, and illegal information
and/or software is exchanged.

Boxing – A variety of electronic devices used to aid in phreaking. The
original was the blue box, used from the mid 60’s to the mid 80’s, which
allowed long distance phone calls to be made for free. A variety of other
similar instruments accomplishing different tasks have been developed,
some purely comical, some quite practical.

Chaos – Chaos is a state that garners a lot of respect in cyberculture, to
the point of being a techno-pagan religion. Many people are self-described
Chaoticians.

Chaos Theory – A field of science revolving around simplistic equations
involving a large number of variables. Gave rise to fractals, a form of
cyberdelic art. For further info on the subject, James Gleick’s “Chaos:
Making a New Science” is suggested.

C0dez Doodz – Essentially a phreaker’s version of pirates. People who seek
out telco codes to be used to gain long distance (ld) telephone calls
without paying for them. Scourge of the computer underground.

Communitek – an informational technology that provides the potential for a
community to develop in cyberspace. For example, within the net, IRC and
elists are two communiteks.

Computer Underground – “A group organized in secrecy, hidden behind
aliases, to promote the free exchange of information regarding anything
and everything including, but not limited to: computers, telephones,
radios, chemicals, and ideas.” (Thanx to The Butler for this definition)
The mainstay of communication for the computer underground is cyberspace,
more specifically BBSes. The computer underground is composed of hackers,
phreakers, pirates, anarchists, and other cyberpunks.

Cyber- – A prefix taken from cybernetics generally used in popular culture
to mean anything that is technologically oriented.

Cyberculture – Often used in the media to denote aspects of “life as a
cyberpunk.” Yet if we are to follow strict meaning, cyberculture is more
accurately defined as an information-based culture.

Cyberdeck – Term originated by William Gibson to refer to a computer used
by deck cowboys that can connect to the matrix.

Cyberdelic – “Cyber-art”. Examples include fractals, computer-generated
pictures and/or music, virtual worlds, etc. (sidebar – fractal pict)

Cybernetics – The study of communication systems in living organisms and
machines, the mathematical analysis of the flow of information.

Cyberpunk – Begun as a literary movement in the 80’s, an off-shoot of
normal science fiction. Unique in that it generally occurs in the present
or not so distant future, the characters are often considered “punks”
(social deviants) and technology, (the cyber aspect), is prominent.
“Neuromancer” by William Gibson, published in 1984, is considered by most
to be the “bible” of cyberpunk. Another prominent author is Bruce
Sterling, editor of another worthy cyberpunk collection, “Mirrorshades”.
Other examples of cyberpunk include Max Headroom (TV show) and BladeRunner
(movie). Cyberpunk is special in that it has evolved from a purely
literary movement to a realistic subculture. Many “techno-punks” (i.e.,
hackers) are considered cyberpunks. Other contributing factors to the
cyberpunk subculture include: virtual reality, hallucinogenic and
nootropic drugs, and industrial and punk music. For an in-depth, detailed
look at cyberpunk fiction and cyberpunk culture, “Storming the Reality
Studio,” ed. by Larry McCaffery is suggested.

Cyberspace – “The electronic frontier.” A completely virtual environment:
the sum of all BBSes, computer networks, and other virtual communities.
Unique in that it is constantly being changed, exists only virtually, can
be practically infinite in “size”, communication occurs instantaneously
world-wide – physical location is completely irrelevant most of the time.
Some include video and telephone transmissions as part of cyberspace.

Cypherpunks – net.folks who have evolved from hacking to encryption and
concern with creating multiple anonymous identities.

Deck Cowboys – Futuristic, some say fantasy, version of a computer hacker
or a modern-day cyberpunk.

Electronic Frontier Foundation – (EFF). Organization founded by Mitch
Kapor (of Lotus fame) and John Perry Barlow (writer and Grateful Dead
songwriter) to establish laws for cyberspace and apply the constitution to
virtual communities. The EFF has recently morphed into a strong lobbying
force in Washington D.C..

Elist (email-lists) – An electronic discussion group that anyone with an
email address can subscribe to. Email addresses for the elist members are
stored on a single computer. When you send email to that machine, it will
automatically bounce your letter to every other subscriber. Thousands of
these elists, covering almost every topic, exist on the Internet for your
reading pleasure and more are materializing weekly.

Ezine – An net version of the small press magazine (known as a zine)
culture. Usually ezines exist only on the net, but more and more
paper-zines are distributing an electronic version as well. (sidebar, some
zines to watch for)

F2F – face to face meeting (also FTF)

Flame – Disagreement (hell, full fledged war sometimes) occurring in
cyberspace. Common on Usenet.

Fleshmeet – a F2F meeting. Often a party of some sort where people who
have met previously on the net get together.

Fractals – Images created using chaos theory. A mish-mash of colors
presented in a pattern that repeats itself many times over. A popular
type of fractal image is one created using the “Mandlebrot set”. Fractals
are considered cyberdelic art.

Gibson, William – Considered by most to be the “father” of cyberpunk,
along with Bruce Sterling. His works include the infamous “Neuromancer”,
“Count Zero”, “Mona Lisa Overdrive” (these 3 works are known as the sprawl
series), “The Difference Engine” with which he was co-author with Bruce
Sterling, and “Burning Chrome” a collection of short stories. A recent
work of his is a poem in “Agrippa: A Book of the Dead”. Gibson says he
will no longer be writing the “classic” cyberpunk novels he is famous
for. His latest work is entitled “Virtual Light” is futuristic fiction
was released in August.

Global Village – Famous term coined by Marshall McLuhan, exemplified by
the net.

Gopher – A menu driven service useful for grep’ing info off the net. You
forgot your friend’s email address, look here. Need to read the latest
issue of “Voices from the net” (An electronic text based zine or ezine),
look here. Searching for a file to read or software to download, use
Gopher. Over 1200 individual gopher sites exist and the number is growing
weekly.

Grep – search, or scan.

Grok – Word with roots in Shamanism that is akin to gnow. and implies a
thorough and complete holistic understanding. Popularized in Robert A.
Heinlein’s _Stranger in a Strange Land_.

Hacker – 60’s (1st) generation (orig. MIT): one who tinkers with
software, electronics, computer hardware, etc. 80’s (2nd) WarGames
generation: one who enters computer systems without permission with
either malicious or non-malicious intent, to gain, alter, or destroy
information (labeled as crackers by the 60’s generation). 90’s (3rd)
generation: often called cyberpunks, mostly non-malicious crackers
interested in information for the sake of information, and not hacking for
the sake of the hack – sometimes calling themselves “information
liberators”, they have re-adopted more of the original hacker ethic of the
60’s that mainly states “all information should be free”, “access to
computers should be unlimited and total” and “promote decentralization”.
This new, 3rd generation is commonly associated with the computer
underground, despite its mostly non-malicious intent.

Identity Hacking – The use of pseudo-anonymity or false accounts to
put ones self off as another person on the Internet. Not nice.

Infonomics – The idea of an economy based on information, which obviously
holds many different properties from our current state of the world.

Internet – A large and very popular world-wide computer network begun by
the Department of Defense in the 60’s that connects educational
institutions, corporations, organizations, and military and government
installations around the globe. Some organizations exist that offer
Internet access to the general public for an hourly,monthly or yearly fee.
Suggested are places like the WELL, MindVox, Nyx (which is free of cost),
Netcom, etc. Many Internet users partake in reading and contributing to
Usenet, playing MUDs, FTPing text files and programs free of charge at the
various FTP sites, and ‘telnet’ing to other Internet sites. Because of its
accessibility at a relatively low cost, size (the largest computer network
in the world), connectivity, and infinite amounts of information, many
network users prefer the Internet to such services as CompuServe (often
called Compu$erve on the Internet) or Prodigy (which is more restricting
in its content). The Internet has something to offer for everyone. There
are many helpful books published about how to use the Internet, some are
available right on-line. Once you gain access to the Internet, it is
suggested that you read the ‘news.announce.newusers’ and
‘news.newusers.questions’ and ‘news.answers’ newsgroups on Usenet.

IRC – Internet Relay Chat. Realtime communication forums between Internet
users all over the world.

ISDN – Integrated Services Digital Network. A communitek hopefully coming
soon to a house near you, basically it will greatly expand the potential
for information coming into your house, such as having 700 cable TV
channels, interactive realtime video-phones, and far off in the future
possible even realtime networked interactive 3d virtual reality.

Kapor, Mitch – One of EFF’s founders (along with John Perry Barlow). He
started the Lotus software company and built it into one of the top 5
software companies in the world, then left to start the EFF. In addition
to working at the top of EFF ladder, he frequently writes stories for
magazines and newspapers, interviews on the TV and is often called to
testify before congressional hearings.

Knowbot – provides a uniform user interface to heterogeneous remote
information services. A predecesor to the Intelligent Agent.

Legion of Doom – (LoD). A legendary group of hackers from the computer
underground. When they disbanded, some members went on to form a computer
security firm (ComSec), Loyd Blankenship wrote GURPS Cyberpunk for Steve
Jackson Games and some ended up in jail from Operation Sundevil.

Matrix – Term coined by William Gibson that refers to the consensual
hallucination of cyberspace.

Meme – An “agent of communicative resonance,” or more simply, “an
information virus.” Memetics is the study and theories behind the root
structures of information itself.

MindVox – A virtual community in cyberspace, also a BBS connected to the
Internet. A nexus of the computer underground and cyberpunk and virtual
reality began by Phantom Access Technologies, former members of the Legion
of Doom. See also the WELL.

Mirrorshades – A very important collection of cyberpunk fiction by various
authors, most of whom are labeled as the mirrorshades group. This book is
edited by Bruce Sterling and should be available in most bookstores.

Mirrorshades Group – Original collection of cyberpunk authors which
includes William Gibson, Bruce Sterling, Tom Maddox, Lewis Shiner, John
Shirley, SF Eye magazine editor Steve Brown, Rudy Rucker, Pat Cadigan, and
others.

Mondo 2000 – Very popular cyberpunk and new edge magazine. Recently
challenged by a new magazine, WIRED.

MUD – Multi-User Domain, Multi-User Dungeon, or Multi-User Dimension. MUDs
are multi-user role-playing-games of sorts that exist on the Internet for
entertainment purposes. MUDs are essentially text-based virtual worlds
which players (participants) may explore, change, or add on to. In most
cases, the MUD is actually a “game” with scores, player attributes,
levels, etc., but some MUDs are with more social goals in mind. MUDs tend
to be based around different science fiction genres such as fantasy,
space, or even cyberpunk.
More recently MUDs have SIDEBAR – MU*’s have a somewhat unfortunate
developed new uses. Research, SIDEBAR – of being addicting. I attribute
conferencing, and more SIDEBAR – this to the strong feeling of
academic MUDs are popping SIDEBAR – community one gets from mudding.
up like wildflowers these SIDEBAR – Students have been known to drop
days and indicate a possible SIDEBAR – out of school just to MUD. Others
trend in the Internet, that SIDEBAR – have fallen in love over a mu*
being integration of services. SIDEBAR – only to later realize the other
SIDEBAR – player doesn’t feel the same.
Nanotechnology – the science SIDEBAR – I recommend going cold turkey as
of “micro-machines”. Small SIDEBAR – the only solution to the MUDding
gears or other machines seen SIDEBAR – addiction. =)
only by a microscope, that
can be used in areas such as medicine and health, art, and other
technologies.

Net – A computer network. Often used to mean the Internet when referred to
as “the net”.

Netrip – Many similarities exist in some people’s minds between
psychedelic drugs and the net, and a netrip is the state of literally
getting “high” off the net, accompanied by distortions in space and time,
a gnowledge of the net itself, an intense desire to communicate your
subconscious to the rest of the net, etc.

New Edge – Fringe culture and fringe science, mostly techno-oriented, and
very popular in Southern California. Mondo 2000 is a magazine devoted to
the new edge.

Nexus – The dictionary defines a “nexus” as a “a connection, tie, or link
between individuals of a group, members of a series, etc.” When applied to
virtual cultures and the networked humans which comprise them, a NEXUS is
basically a domicile/workspace/cultural-center formed in real-life by
people who have met and established relationships over the Net. They
purchase and secure group Internet access, and thus control their own
node, living in close proximity, since creativity blossoms in people when
surrounded with creativity; since similar approaches to work and life can
re-inforce each other. We have seen this happen on the Net; the NEXUS
community intends to manifest it in reality, to integrate it into our
lifestyle.

Nootropics – A new science revolving around drugs used to increase
intelligence, aid in memory, enhance brain activity, etc. Touted as a fad
by some, others claim that use of nootropics actually work. See also
SmartDrinks.

Operation Sundevil – Secret Service operation begun in 1990 intended to
destroy the computer underground by confiscating BBSes and detaining
hackers.

Paste Bomb – Sometimes a litteral core dump. Via the Mac’s Cut and Paste
capability, take random bits of data from one’s hard drive and paste it
into an online conversation, email, mud, whatever. Eris Lives. Sci-fi
author Bruce Sterling is a notorious paste bomber. Get in the habit

Phrack – An important magazine existing only in cyberspace, of interest to
the computer underground. It’s founder, Craig Neidorf, now works for the
Electronic Frontier Foundation.

Phreaker – Hacking the phone system. Usually meaning to get phone calls
for free, whether by boxing or calling card fraud. Individual phreakers
are called phreaks.

Pirate – One who copies software illegally. Commonly associated with the
computer underground. Although commonplace, pirates are looked down upon
as with codez d00dz . (sidebar SPA and the big corporation pirates)

Post-industrial – The state of the world, including megacorp zaibatsus, an
evolving infonomics, etc.

Post-modern – Literary, artistic, cultural, and philosophical movement
revolving around the post-industrial world in which we live, and the
unique aspects of the trends of modern society.

Raves – A ‘dying’ subculture revolving around all-night dance parties.
Typically, the parties are generally illegal and thus a complex process is
involved to find out where they are located. Rave music is generally
techno or house , the parties usually include 1 or more DJs. Also present
in many cases are “chill out rooms” which feature more ambient music.
Lasers, blaring music, cyberdelic images, SmartDrinks and drugs most often
MDMA {X, XTC, Ecstasy, E}, LSD {acid}, ketamine, or nootropics) are all
general contributors to the rave experience. Raves are usually held in
warehouses, and last until the next morning. Another large part of rave
culture is the flyers – used to find out where your next party will be.
Raves are meant to be very happy events, everyone ideally should be open
and free, laying aggressions and inhibitions aside for the night. Some
have likened the rave experience to “a weekly roving techno-woodstock for
the 90’s.” Rave fashion includes over-sized baggy t-shirts and pants,
hooded sweat-shirts, ski caps, and usually bright colors, as well as
accessories such as whistles, Cat In The Hat hats, “doctor” masks,
VapoRub, etc. Many factors have led to an often heard questions these
days, “where have all the ravers gone?” (one answer is… they’ve gone Retro)

RTFM – Read The Fucking Manual. An abbreviation used when clueless
questions are asked about subjects that are answered in the manual or FAQ.

Shaman – An overused word that in ancient and modern cultures implies one
who is a wise medicine man or healer, with a keen understanding of the
ways of things. Used increasingly in modern culture, especially in
conjunction with techno-paganism.

Slipstream – Term used to denote cyberpunk fiction, particularly pre-1984
fictional works that have been influential to the mirrorshades group or
that closely resemble cyberpunk, but are sometimes outside of the sf
genre. An example would be William S. Burroughs.

SmartDrugs – nootropics.

SmartDrinks – Similar to SmartDrugs, or nootropics, the intent of these
substances, loaded with vitamins, minerals, amino acids, and other healthy
substances, is to aid in brain functioning. Smart Drinks are most often
consumed at raves, thus, the purpose of some smart drinks is to “energize”
the drinker, not to make them smarter.

Sprawl – Word used by William Gibson to mean large mega-cities, and places
where different cities collide. Southern California and New York City
might be early examples of the sprawl. This word is used often in modern
times as “urban sprawl”.

Steve Jackson Games – RPG manufacturers that have played a key role in the
evolution of cyberpunk and the computer underground. Operators of the
Illuminati BBS and makers of GURPS Cyberpunk, an RPG guide written by Loyd
Blankenship, a member of the Legion of Doom.

Sterling, Bruce – considered by most to be the “co-founder” of cyberpunk
along with William Gibson. He is the editor of “Mirrorshades: A cyberpunk
anthology,” which is considered the quintessential collection of cyberpunk
works by the mirrorshades group. Some of his other works include “Islands
in the Net”, “Schismatrix”, “Involution Ocean”, “The Artificial Kid”, “The
Difference Engine” which he co-authored with Gibson and “The Hacker
Crackdown” a non-fiction account of the computer underground and Operation
Sundevil, including the Electronic Frontier Foundation, Phrack, the Legion
of Doom, Steve Jackson Games, etc. Sterling has also been a vocal member
of the net. Keep your eyes open, you never know where he will surface next.

Social Engineering – Technique by which hackers or crackers acquire
information, such as names and passwords. Essentially a modern-day con,
often conducted via phone conversations, such as portraying oneself as a
telco employee.

TBT – Talking by Typing.

Techno- – prefix similar to cyber-, referring to anything which has its
roots in current or futuristic technology.

Techno – type of music made almost entirely with the help of computers,
revolving around a fast-paced drum beat (as high as 160 BPM), sampling,
and synthesizers.

Technoculture – The idea of a culture with a strong foundation rooted in
technology. Often used loosely in association with cyberculture and new edge.

Techno-paganism – Literally the worshipping of technology. Many people
*believe* that, for example, the net has some magic or is a sentient
entity in itself, or that technology can be an agent of evolution.
(sidebar Aleph spew)

Teledildonics – Virtual sex in a virtual environment. Term often used by
the new edge community. (sidebar: from new CD to magazine to etc)

Toasternet – Putting together a LAN, WAN or Internet hook up with the
cheapest of technology. Read up on Toasternets on the Wells Gopher.

Usenet – A collection of “newsgroups” on the Internet, in which Internet
users may post or read messages on almost any subject imaginable. The
topics of discussion are divided up into the individual newsgroups, which
total about 2000 on average. Usenet is divided into various large
sections, including the ‘alt’ernative newsgroups, the ‘comp’uter
newsgroups, the ‘sci’ence newsgroups and the ‘talk’ newsgroups, among
others. Some groups are moderated, while most remain completely
uncensored. Usenet is often referred to as Abusenet for its all-too
familiar flames and appearance of perpetual chaos.

Virtual Community – any group or gathering that exists in cyberspace. This
could be a BBS, a hacking group, a net, or even a zaibatsu.

Virtual Culture – the collection of virtual communities, and the cultural
aspects unique to those communities.

Virtual Reality – a consentual hallucination of a world existing only in
cyberspace. Modern day virtual reality uses helmets, gloves, and body
suits to create such a world, which is first created on a computer and
connected to the vr devices. A goal of some virtual reality researchers is
to generate a completely alternate reality. Research in vr includes
networking people, so spatial limitations are meaningless. The
possibilities of vr-generated environments are as limitless as the
imagination.

Virtual World – a world existing in cyberspace created and used with
virtual reality technologies.

WELL – The Whole Earth ‘Lectronic Link. An important gridpoint in the
matrix, a virtual community in cyberspace, also a BBS connected to the
Internet. A group concerned mostly with cyberpunk, virtual reality,
nootropics, and other aspects of the new edge. Many celebreties have an
account on the Well.

WIRED – A new magazine devoted to exploring virtualspace and new
technologies. Wired is not as new edge as Mondo 2000 and seemingly gives
off a more corporate news oriented format. However, it is a refreshing
view and perhaps infonomics first steps into the public realm. (The TIME
magazine of virtual culture.)

Wirehead – a hardware hacker.

Zaibatsu – Japanese term used a lot by William Gibson that means a large
mega-corporation, such as Sony for example.

______ _____ __ __ ______
/ ___ / __ / “-. /__ _
____ / \ -. \/_/ / __
_____\ _____\ _\”_ _ /_
/_____/ /____ / /_/ /_/ /_/ /_/ In Part 2 of 5
copyright 1994 John Frost

How To Be A Couch Potato In The Nineties By Francis U. Kaltenbaugh

How To Be A Couch Potato In The Nineties
by Francis U. Kaltenbaugh

Do you want to be with the technically-correct in-crowd, who have
already prepared for television in the nineties? You better hurry to
obtain a few needed essentials. Your old television, operating in
the background, even with its stereo speakers, single remote
controlling your vcr, cable box, and TV, is passe. There is a new
age dawning in the art of television watching; it is — Interactive
Viewing. You too can be a part of this new Couch Potato mentality by
following a few simple rules. Do not get left behind! Follow the
simple suggestions that follow:

o You must purchase a 35-inch screen television (bare minimum);
bigger is better here. Or your neighbors will tease you, “Nah-na!
Mine is bigger than yours.” You need: quad stereo speakers, split-
screen(s), built-in voice activated VCR programing, self-timers, a
minimum of 300 cable ready channels and the largest screen your
wallet can handle. Then, with the addition of a CD-ROM, you are
ready to interact properly with your computer aided TV.

o Purchase a fully automated satellite dish that includes the
proverbial black-box, which unscrambles virtually all channels. This
will dissuade those channel hoppers, who always lay hands on the
remote before you do. Since they will have to browse about 300
channels, after their first time through, they will realize — three
hours later — they missed the show they intended to watch before the
commercials started.

o Have someone install the above. You must realize your time is
too precious to waste on menial labor tasks, when instead, you could
be watching/interacting with your TV.

o Test your couch; is it large enough to serve as a bed, and
dining room table, while still allowing room for you, and selected
friends and family to lounge comfortably? If not, replace it
immediately. You must be comfortable to interact well.

o Stock your refrigerator, freezer, and pantries with easy to
prepare (microwave) and ready-to-eat foods and snacks. The closer
your snacks are to the TV/CD-ROM, the more quickly you will be able
to interact with your system.

o If you don’t have someone to serve you, it may be a good idea
to make arrangements for this contingency. Or be adventurous, do it
yourself, but also get a monitor for the kitchen. It’s always best to
carry your remote with you wherever you go. Don’t settle for those
puny laser-light activated remotes (line-of-sight only), get one that
will penetrate walls. Always be in charge during your interactions.
Just because you are in the third floor bathroom, that’s no
reason why you shouldn’t be able to continue interacting with that
Soap Opera in the downstairs living room — simply crank up the
volume to a comfortable sound level for yourself. Besides, while
you’re gone you don’t want someone channel surfing in your absence.

o After all the above steps are completed, get fired from your
job, draw unemployment and food stamps. Then grab snacks and drinks,
sit down and RELAX! Enjoy your remote controlled interactive
environment. You can really interact now, much like you used to
when working, only differently.

Spare no expense and be a part of the new breed of Couch Potato, or
“THEY” will pass you by. Or you could really get RADICAL and read
Electronic Books and Magazines — I hear it’s the rage among all the
Nerds.
—————————————————————-
Francis U. Kaltenbaugh is a 40 something computer enthusiast, who
enjoys video stimulations. Two children keep things interesting, one
an 18 year-old Marine, and a ten year-old girl, whose only response
is, “Why?” Francis, who has two books in progress and articles out
everywhere, feels fiction is a mainstay of life — for everyone.
———————————————————————
Sound Byte:

God is Dead. – Nietzsche

Nietzsche is Dead. – God

Do NOT Wear Contact Lenses Near Electric Arcs!

4

Please copy this and distribute to anyone you know who might wear
contacts or work around equipment that generates ARCS.

Two recent incidents have uncovered a previously unknown phenomenon of
the most serious gravity.

1. At Duquesne Electric a worker threw an electrical switch into a
closed position, which produced a short-lived electrical spark.

2. An employee at UPS flipped open the colored lense of his welding
helmet to better position the welding rod. He inadvertently struck
the metal rod to be welded producing an electric arc.

BOTH MEN WERE WEARING CONTACT LENSES. Upon returning home from work,
they removed the contact lenses, and THE CORNEA OF THE EYE WAS REMOVED
ALONG WITH THE LENS. RESULT: PERMANENT BLINDNESS!!!

The electric arc generates microwaves that instantly bond the cornea of
the eye to the lens, by drying up the fluid between the eye and the
lens. THIS TRAUMA (INJURY) IS PAINLESS AND THE INDIVIDUAL NEVER KNOWS
THAT AN INJURY HAS OCCURRED UNTIL THE CONTACT LENS IS REMOVED!!
-Pause- [C]ontinue, [N]onStop, [S]top? [C]

As this phenomenon was UNKNOWN, no Federal, State, or local safety and
health agency has regulations on this matter but they are pursuing the
investigation and hopefully will take immediate action.

In the meantime, it is suggested that NO CONTACT LENSES BE WORN by
anyone who is potentially subject to an electrical sparking situation.

From John Voss
Commonwealth Electric Co.
Lincoln, Nebraska

Submitted to Borderland Research by Dennis Bullard
———————————————————————-
Borderland Sciences Research Foundation, Inc.,
PO BOX 429,
Garberville, California, 95440-0429 USA.
———————————————————————-
Carried by Grey Matter Computer Services

Bulletins updated: ALL
-Pause- [C]ontinue, [N]onStop, [S]top? [C]

How To Be A Computer Consultant: A Guide

GETTING STARTED – Part 1

The one nice advantage to being a Computer Consultant is that you
are self-employed. To be self-employed you have to act self-
employed. If you don’t believe it, no one else will either.

CHOOSING A BUSINESS NAME:

When you sit down to choose a Business Name think long
lasting and professional. First, try your name or initials
with the words “& Associates” by it. If you don’t like
that approach, then go through the yellow pages of your
your phone book and check the listings of “Computer
Stores”, “Computer Design and Consultants” and “Employment
Agencies” and look at names. Ask friends and relatives
for suggestions. Your Business Name makes a very
important statement about you, so take your time. It
will be worth it.

BUSINESS ADDRESS:

Most of us like to be home based. For those of you who
can afford the luxury of a private office, this section
is not for you. However, if you do plan to work from
your home, read on.

I have friends who have used their apartment numbers as
“Suite” numbers. That is fine. But if you own a home or
have a mail box like mine which collects so much junk mail
that I usually take the whole pile, sometimes including
important bills, and throw it in the trash.

So the answer for me was to check into P. O. Box’s. This
also protects you from having clients show up at your door
demanding work at strange hours.

The United States Post Office Boxes are the most reasonable
cost wise. However, if you plan to receive items shipped
UPS, you will not be able to receive them at this P. O.
address.

For those of you who don’t mind $10 to $12 a month, there is
another alternative. There are P. O. Box rental companies
which have a street address you can use. You then use the
Box number as your “Suite” number. Since this is a street
address, UPS will deliver parcels to you here. Check the
yellow page listing under “Mail Receiving Service”, to
find one of these service near you. This is also the
address that will go on your letterhead.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

GETTING STARTED – Part Two

BUSINESS CARDS AND LETTERHEAD:

The first step to take for networking with clients and
people you will be meeting is to have business cards and
letterhead stationery.

If your budget is tight, there are printers listed in the
yellow pages who offer overnight “Starter Packages” which
consist of 500 letterhead, 500 envelopes and 500 business
cards for a reasonable fee.

If you are more ambitious, you may want to go to a type-
setter and choose a print style and/or a logo and have
“boards” prepared for custom designed stationery. Fees
vary so you should do some calling on quotes for typesetting
of your letterhead, envelopes and business cards.

To save money on printing costs, when you use an
independent typesetter to design your own format, you can
buy your own paper for your stationery. In the yellow pages
under “Paper” you can usually find “Self Help Service
Centers”. By purchasing your own paper and envelopes from
these centers, you save a substantial amount of money. Plus
you get to choose what you want and not what the printer
gives you.

If you wish to have your letterhead printed on continous
form paper there are printers listed under “Printers –
Continuous & Individual Form” in the yellow pages. However,
if you use the “Starter Package” as mentioned above you
probably will not receive the “die” used for printing
your stationery. The quick overnight jobs are ususally
done with paper “die”, so it’s life span is very short.
When you have your stationey set up by a typesetter, they
paste your information for letterhead, envelopes and
business cards on “boards”. The printer then uses these
“boards” to make metal “die” for printing your stationery.
These metal “die” can be used over and over provided you
store them in such a manner so they do not get scratched.
The printer can then use these metal”die” to print
continuous form paper.

Of course, you can always pay the continous form printer
to prepare the proper “die” for you, in the event you
have not gone the custom typesetting route but want this
type of stationery.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

GETTING STARTED – Part Three

FICTICIOUS BUSINESS NAME STATEMENT:

If you are newly starting out as a Computer Consultant and
plan to be a one man operation, there is a very cost
effective way to being a legitimate business entity without
incorporating. This is done by filing a “Ficticious
Business Name Statement”. Most local newspapers offer this
service. The easiest way of obtaining the Ficticious Business
Name Statement form is to call whatever newspaper you decide
on and ask them to send you the appropriate information
needed for filing.

Once you receive the form in the mail, fill it out. When the
form is completed, mail it back to the newspaper with the
proper filing fees (at this writing it was $40.00).

A notice will run in the newspaper for four weeks.

If there is no contesting of your business name from any
other proprietor in this period, then you will receive
a “Proof of Publication” form showing the dates your
notice ran. Your notice will be attached and a filing date
will be listed above the notice.

At this point you are an official bonafide business.
Congratulations!

Now, I’m sure some of you are asking, “But I want to
be on my own. I don’t need a business. I can still take
advantage of the tax benefits for being self employed. Why
should I want to do this?” The answer is you can take it
to the bank.

BUSINESS CHECKING ACCOUNT:

It is always a good idea to have a business checking account
for numerous reasons: 1) This is a very convenient way of
keeping your personal and business expenses separate; 2) If
you plan to sell products on a retail level, a business
account looks good when you are signing an agreement with
the distributor. It gives the air that you are an
established firm; and, 3) You create a business bank
reference, which never looks bad when you apply for loans.
There are many more reasons, but these are the ones that have
been important to me.

Before you open a Business Checking Account, call around to
various banks and see what their requirements and fees are
for a business account. Some banks require a minimum
opening balance of $500 and some require $1,000. Don’t
hesitate to interview your bank. Make an appointment with
one of the chief officers and find out about lines of
credit towards outstanding invoices, loans and their
feelings about small businesses in general. If you cannot
get an appointment, then write them off. Your business
would mean nothing to them anyway.

Do not open your account with a Savings and Loan. Even
though some advertise free checking accounts and will open
an account in your business name, you cannot borrow money
against business invoices. You may find yourself not
being able to get the proper help you need as your business
grows.

So, now you have selected a bank. In order to open the
account you will need to take the “Proof of Publication”
form sent to you verifying that you are in fact a bonafide
business and the minimum deposit.

The next step is to wait for the printed checks to arrive
in the mail. If you want, you can order continuous form
checks instead. This is not done through the bank but
from outside vendors and printers.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

GETTING STARTED – Part Four

BUSINESS PHONES:

Yes, getting a business line is more expensive than a
private line but there are very good benefits for you.

Number one, you can be listed under your business name,
or if you have decided to stay solo, a business line lets
you be listed in the yellow pages as well.

One word of caution…beware of the Yellow Pages Sales Reps.
They will do their darndest to make you feel your business
will not survive without a quarter page, five hundred dollar
a month ad. Keep in mind that you want your business to
support you! You do not want to support your business!

For example, I chose two directories I wanted to be listed
in and selected a one line bold face print for the white
pages and took 5 different subject listings in the yellow
pages with the standard bifocal print and no frills. My
phone charges run about $30. a month with these two
directories. The most important thing is that you are
listed. In your business, networking pays off more than
advertising in the Yellow Pages.

Los Angeles is serviced by two different phone companies.
One is General Telephone and the other is Pacific Telephone.
When I first started my business, I wanted to be listed in
the Beverly Hills phone directory also. So the infamous
Yellow Page Sales Rep gladly took my request. When I
received the directory, I found out it was a Neighborhood
Phone Book directory. I was never told this. When I called
asking why I wasn’t in the main directory for Beverly Hills,
I was told that Beverly Hills was covered by Pacific
Telephone and I would need a Pacific Telephone line to be
listed. That was $46 down the drain.

Do some research if you live in a metropolitan area with
more than one phone company. Stay within the areas your
phone company services. Again, I will repeat…much of your
success will be through networking, not a phone listing.

Don’t forget a good answering machine or service either.

*Excerpted from the Computer Consultant’s Consultant,
copyright 1985, by Valerie Hood, all rights reserved

GETTING STARTED – Part 5

BUSINESS PERMIT:

If you are going to conduct a business, and advertise as
one, at least in the state of California, you are required
to obtain a “Business Permit” from the city you are
conducting your business in.

You can obtain the Permit from the “City Clerk – Tax and
Permit Division”. You must go and apply in person.

The initial Business Permit cost me $30. My white cash
register receipt was proof of my business until I received
the permit in the mail. It is called a “City of Los
Angeles Tax Registration Certificate”.

Due to zoning laws, in California, you are not allowed to
conduct business with clients in your home. This is due
to foot traffic and fire laws. So, use your home address
as a “Business Address For Mail Purposes Only”. I did not
use my P. O. Address as a business address just in case the
Fire Marshall or someone else showed up at my 3″ by 5″ box
to post “Maximum Occupancy Allowed”. I was told by the clerk
that I was supposed to pick and deliver any materials from
clients.

Each year you will be sent an “Annual Tax Renewal” form to
retain your Business Permit. The more you earn through
your business the more your Business Tax will be. However,
this tax can be deducted as a business expense on the
“Schedule C – Profit or (Loss) From a Business or
Profession” which is filed with your 1040 Federal Income
Tax Return.

One word of caution is to remember that the Business
Permit is valid from January 1st to December 31 of each
year. If you file for a Business Permit in December and
pay your $30, don’t be surprised in January, one month
later, when you are billed for another $30. That’s how
the system works.

*Excerpted from The Computer Consultant’s Network,
copyright 1985, by Valerie Hood, all rights reserved

GETTING STARTED – Part Six

RESALE NUMBER:

If you are planning to provide clients with supplies, plan
to set up computer systems, sell software or anything else
relating to your business, you need to apply for a Resale
Number.

To obtain a Resale Number check for the nearest “Board of
Equalization” to you under “State Government Offices –
California State of” in white pages of your phone
directory. Remember I am writing in regards to procedures
for Los Angeles, California. Check with other retailers
in your area and ask what the requirements are to obtain
a Resale Number.

You will have to apply in person. The best time to go and
apply is when the office first opens. Otherwise, the wait
can be quite lengthy. When you arrive, ask for the proper
papers to fill out to apply for a new Resale Number.
After you have filled out the questionaire and returned it
to the receptionist, it will be forwarded to an interviewer.
The interviewer will call your name and go over your
questionaire and ask you questions. It is at this point
that you will be denied or permitted to obtain a Resale
Number.

One of the questions will be how much you estimate in sales
for the upcoming year. Depending on the amount, you may be
required to put up a deposit against future taxes to
establish your account. Be honest with them…if you cannot
estimate the yearly sales, then tell them so.

Additionally, before you can obtain a Resale Number you must
have already had made a sale. Otherwise, you will not be
permitted a Resale Number until you do.

Once you have been approved, every quarter you will receive
a “State, Local and District Sales and Use Tax Return”.
When you make a sale, you charge the client sales tax. It
is with this Return that you pay the State the sales tax
you have collected for that quarter.

The advantage to having a Resale Number is that you are
allowed to purchase merchandise at “Wholesale Prices” from
distributors of products. This discount is usually anywhere
from 20% to 50% depending upon the quantity of merchandise
purchased. You, the Reseller, are not charged sales tax
on the wholesale price of your purchase. However, you are
required to charge the appropriate Sales Tax on the “Retail
Price” of the merchandise upon sale to a customer. The
difference between your wholesale price and your retail price
is your “Profit Margin”. On top of your consulting fees,
the additional profit can be a nice enhancement to your
financial status especially if you are setting up computer
systems and obtaining them at a discount from the distributors.

If you plan to do this, most companies have you sign an
agreement and complete a credit application as a “VAR”
(Value Added Reseller). If you are interested in being a VAR,
a business checking account and a resale number are a must.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

ADVERTISING

I have found one very reasonable ways to go. It costs $55.
as of this writing.

“MIS WEEK Consultants Directory”. The directory is printed twice
a year. There is a Spring Directory and a Fall Directory. The
directory is an alphabetical listing of consulting firms and
services and also has a geographic listing of consulting firms by
regions served.

My ad has always paid for itself. To be honest, from that
listing one company alone has sent me business for two
years. It is the only sure fire avenue I have seen pay off
immediately.

To inquire for advertising in MIS WEEK, you can contact the New
York office directly at (212) 741-4010 (for an ad counselor) or
741-4014 (for space reservations) or write to Classified
Advertising Department, MIS Week, 7 East 12th Street, New York,
New York 10003.

Or contact:

615 South Flower Street
Suite 200
Los Angeles, California 90017
(213) 612-0725

MIS Week also features a special “Consulting Services” section
which runs every fourth issue of each month. One column inch is
1-15/16″. The rates as of this writing are as follows:

Open rate $55.00 per column inch
3 consecutive times $51.00 ” ” ”
6 times in one year $49.50 ” ” ”
12 times in one year $48.00 ” ” ”

I honestly cannot say if this every fourth week advertising
actually works. I asked for some samples and I received one year
old issues and the consultants section was very sparse. I would
highly recommend just sticking to the bi-yearly directories.

*Excerpted from The Computer Consultant’s Network,
copyright 1985 by Valerie Hood, all rights reserved

PUBLICATIONS

One of the major secrets to success is to be well informed. With
all the publications on the market today, it is easy to be
overwhelmed with literature.

When I decided to delve into this new electronic world, I admit,
I knew nothing. I was a newly reformed computer phobic. I knew
there was something fascinating to this whole area but I didn’t
know how to find it. At this stage, I was only as far as Valdocs
and my QX-10. The infamous A> at the CP/M system level scared me
half to death. But, I was going to make a living at this.

I have found the longer we are in the industry, the lazier we get
about staying on top of even the littlest detail. I mean, it has
got be such an impactful piece of news such as “NEW UNIX 5
MEGABYTE BUBBLE MEMORY PORTABLE TO HIT THE MARKET FOR $1,000” to
catch out attention. I admit I am finding myself falling into
that.

Eventually, the day will come when you will be found by every
publication possible. Most of them will look worthy. Some of
them will be reasonable in price and some will be quite
expensive. These expensive publications try to make you feel how
“elite” you will be if you subscribe. There are the many
software directories that are very valuable to have. In my
research and in actually subscribing to one with a 30 day trial
offer, I found a very impressive subscription service. For me,
it paid for itself within one week. It is called DATA SOURCES.

I found this one quite by accident. Contrary to what I said
above about being found, I found Data Sources. It was a tiny ad
in one of the OEM newspapers. It had a 30 day trial offer so my
curiosity said, “Why not?”

About six weeks later a package arrived. It was about 8 1/2 by
11 by 4 inches and weighed about 10 or more pounds. I opened it
and found 2 large directories. One labeled “Software” and one
labled “Hardware – Data Communications”. Of course, there was
the invoice staring at me…AMOUNT DUE – $159.00. Gasp! So I
started looking through all of the information and was sold in
five minutes. I do not know what the price will be at the time
of this writing. A regular subscription rate is $210.00 for the
year.

Data Sources updates these directories 4 times a year.
Presently my 1st Quarter 1985 issue is marked up with notes,
indexed and coded. The software volume looks like I’ve used this
for 10 years already and it’s only one month old. Am I going to
have to do this again in the 2nd Quarter?

Data Sources contains approximately 21,000 software packages, for
hundreds of business and vertical market applications and are
indexed by function compatiblility, package name and company.
There are approximately over 18,000 hardware and data
communications products, from micros to mainframes, printers to
comm processors and everything inbetween, are categorized and
described for instant reference. Approximately 9,000 companies
are profiled with complete contact information and pertinent
details for vendor qualification.

I used Data Sources to locate all of the companies listed in
Chapter 2 which are consulting houses and handle personnel. This
saved me a lot of time in research.

Once you subscribe to Data Sources there is a Hotline to answer
any questions you may have. Third party maintenance companies
and dial-up security equipment companies have been recently added
to the directory. Check it out at your local library.

It is a must for the serious computer professional.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

P.S. Details, details….the address is:

Data Sources
P.O. Box 5845
Cherry Hills, NJ 08034

Editor: Kathy Thompson

Is approximately $179 a year, updated quarterly and well worth it.

CONTRACTS AND FEES

You probably think this is going to an answer to all of your
questions regarding Contracts and Fees. Wrong. There is really
no right answer or perfect form agreement that is going to work
for everyone…the truth is, everyone is different. My advice is
to seek a reputable attorney in computer law and spend an hour
talking to him/her.

If you are consultant being hired through a personnel agency or
through another consulting house, they usually will carry their
own agreements for you to sign.

I would also suggest to talk with other consultant’s about their
agreements. Ask if they have encountered any problems and how
they handled the situation. Ask for tips or tricks of the trade
they have learned. For example, one of my electronic pen pals,
Frank, is a consultant. I asked him what he could suggest for
other consultants. Since he does programming, he makes sure that
it states in the contract that all programs developed by him
remain his sole property until paid in full. He further suggests
to find out through various contacts as much as you can about the
company, who they deal with, how they conduct business and pay
their bills.

Fees are another world of inconsistencies. What do you charge?
How do you decide? Well, from my experience I have seen a
programmer making $8 to $10 an hour while an ex-Burger King
Employee comes in at $12.50 an hour just to sit down and play
with a piece of software and give a novice point of view. I have
seen people with years of mainframe experience making $25 an hour
while another person makes $40 an hour teaching off-the-shelf
word processing programs to individuals.

I have spoken with head hunters who chuckle telling me of people
who come out of aerospace with one to two years experience and
want $30 to $35 dollars an hour. He goes on laughing. Then I
say, “Well I’ve only been in microcomputers for one and half
years and I’m making $30 to $40 an hour, depending on the job.”
He chokes and patronizingly says, “Well, honey, that’s because
you’re smart.” And I say, “Aren’t they?”

In my opinion, go for what you feel you are worth. The worst
that can happen is to hear, “We don’t want to pay that much”.
Then you’re open to negotiate.

If an offer comes along, talk to other consultants and see how
they feel. But get more than one opinion. You do not want to
sell yourself short. For example, I have one friend who makes
$25 an hour programming on a certain mainframe. I have another
friend who swears that kind of job is not worth more than $9 an
hour.

So…bottom line, go for what you feel you are worth. If that
doesn’t work and you honestly want that particular job or
contract, negotiate. There is such a thing as a raise, even in
consulting.

Another area which is important is what to charge as a retainer.
A retainer is put into effect when a client may need you on call
but doesn’t know when. So he pays you a monthly retainer to be
available for a day or so many days a month.

Dr. Jeffrey Lant, in his book, “The Consultant’s Kit”, which I
highly recommend, suggests that you take your daily rate and
times that times four and that is your monthly retainer fee.
However, this is for only being available one day a month. He
suggests you charge your hourly fee over and above the day used.

Then again, I have seen proposal’s cross my desk where the person
charges only their daily rate as the monthly retainer rate.
Naturally, I much prefer Dr. Lant’s suggestion.

Sometimes, for those of you who also do software training and
education, client’s want to remain very cost effective and have
you come in for only one or two hours. Somehow they are always
the ones 50 miles away. After gas, car maintenance, the time of
getting ready, one to two hours does not quite seem worth it. I
would advise you to state up front that you charge a 4 hour
minimum and milage. The usual response I get is, “Oh. Ok. What
time can you be here?”

There are no set rules. Do research. Talk to an attorney. Most
importantly, Network.

*Excerpted from The Computer Consultant’s Consultant,
copyright 1985 by Valerie Hood, all rights reserved

BUSINESS EXPENSES AND WRITE OFFS

I was caught off guard at all of the consultants I would run into
who did not realize the benefits they were entitled to as
independent contractors. When I was working permanent full time,
I still had a business on the side earning additional income.
Under the law this is considered self-employment. I was able to
deduct certain allowable expenses for that business, even though
I was employed full time by a permanent employer. These
allowances were taken on the “Schedule C – Profit or (Loss) From
a Business or Profession (Sole Proprietorship)”. This Schedule is
an addendum to your “1040 – U.S. Individual Income Tax Return”.

Yes, I am going to tell you to speak with an accountant, or take
a tax course, but this is an area where it is the same for
everyone, so examples can be given. The IRS also has booklets
you can order which explain in detail your rights to being self-
employed.

If you are a Partnership or a Corporation you cannot use Schedule
C and should consult with an accountant. But, for the purposes
of this book, we are concentrating on the individual self-
employed consultant.

Below I will list the areas which are considered to be allowable
decuctions that are imprinted on Schedule C and try to explain
them. Again, I stress to order booklets from the IRS and/or
speak to an accountant. Allowable deductions are:

1. Advertising – You are allowed to deduct any expenses you
incur for advertising as long as it pertains to promoting your
business to the public for purposes of generating income. This
would cover ads in any media (i.e. newspapers, magazines, radio
or television).

2. Bad debts from sales or services – Since we work on what
the IRS calls a “Cash Method” you are not allowed to deduct any
bad debts as of this writing unless you had previously reported
the amount as income.

We, the Cash Method Taxpayers, have to deal with collection
agencies, small claims court and attorneys to handle our money
matters.

3. Bank service charges – These can be bank charges on
business checking accounts (i.e. monthly fee plus per check
charge) or business credit card erroneous bank charges (i.e. the
charges the bank charges for using the automated teller).
Remember, these are only for those charges used in connection
with your business.

4. Car and truck expenses – This is a touchy area. It always
seems to change every year. So vaguely this allows you to deduct
the percentage of the monthly payment of your car used for
business. For example, you may need your car for 50% personal
and 50% business. Your monthly payment is $250. Considering the
car has been used for the business for the entire year you take
$250 x 12 = $3,000 x 50% = $1,500 as your allowable deduction.

You are also allowed to deduct the cost of maintenance and
repairs as well as gas and car washes. Parking fees and tolls
would be applied here also.

As I said, this is one of those touchy areas. Do your homework.

5. Commissions – This could be a deduction when you hire an
advertising agency and they place your advertising for you.
Usually the standard agency commission is 15%. Since this is
considered to be the agencies income, on which they will pay
taxes, you are allowed to deduct it.

Additionally, this could also be sales commissions you have paid
to personnel or other contractor’s working with you.

6. Depletion – This does not apply to us.

7. Depreciation and Section 179 deduction from Form 4562 –
You can deduct a certain percentage of the cost of assets you buy
to use in your business to hold or produce investment income.

Since your car is a business expense, you may be able to
depreciate the business portion. Seek the advice of an
accountant. Please make note that if you lease your car you are
not entitled to a depreciation deduction.

Our obvious depreciation expense would be our computers. You
cannot depreciate software. The law is getting sticky about
computers. You must be able to prove over 50% business use at
the time of this writing.

Some of the assets depreciated may also qualify you to take an
investment tax credit. Again, you know, talk to an accountant.

This is not used when you include any depreciation amounts in
Part III of Schedule C – Costs of Good Sold and/or Operations.

8. Dues and publications – Your subscription to business
related publications (books, magazines, newspapers, newsletters)
if needed for business are deductible.

Additionally, any dues paid for membership in professional
associations are deductible (i.e. dues to join the Independent
Computer Consultants Association).

9. Employee benefit programs – Amounts go here that are
not included in pension and profit-sharing plans mentioned later.
Contributions to insurance, health and welfare programs go here.
For example, even though we are not, but if we were Writers Guild
Members, we would be required to pay 10% on top of our salary to
the Pension, Health and Welfare Fund. This amount would be
deducted here.

10. Freight – If you do not include this in the Cost of Goods
Sold and/or Operations section, charges you incur for freight
shipping costs would go here. For example, your computer goes
down, the warranty has expired, the store you purchased it from
is out of business and you are forced to ship it to the
distributor for repair. The cost of shipping would be deducted
here.

11. Insurance – Auto Insurance, Renters/Business Insurance
premiums would be deducted here.

12. Interest on business indebtedness – If you have loans
incurred for business reasons, the interest you pay is deducted
here.

13. Laundry and cleaning – Does not apply to us.

14. Legal and professional services – Legal costs incurred
pertaining to your business can be deducted here. This also
would allow for other consulting fees, accountants, etc.

15. Office expense – This is a strange one. Expense amounts
go here that don’t fit anywhere else. There is a place for
“Other expenses”, so this is up in the air. Talk to an
accountant. Things I put here can go in the “Other expenses”, so
I suppose it’s up to you, as long as you can verify it being an
expense.

16. Pension and profit-sharing plans – You should enter
amounts here made as an employer on your behalf (but not
voluntary contributions you made as an employee on your behalf).
You will have to file form 5500-C or 5500-R if you fill this in
with less than 100 participants. This is another area where you
will need advice.

17. Rent on business property – This is where Uncle Sam gets
real sticky. Since for the purposes of this book we work from
our homes read this one with caution. You are only allowed to
deduct that percentage portion or square footage of the home used
strictly for business. You better be able to prove this too.
The law will not allow the deduction if there is any personal
activity affiliated in this area. A separate bedroom is better
for an office, that way the deduction is more solid.

18. Repairs – Since your warranty was up on the computer you
had to pay for the cost of the repair. That amount goes here.

19. Supplies – If you don’t include in Cost of Goods Sold
and/or operations, amounts for ribbons, disks, paper, pens and
whatever else would go here.

20. Taxes – Taxes reimbursed to the state with your Resale#
and local Business permit taxes would be deducted here. If you
paid cash for an item, the sales tax could be deducted here also.

21. Travel and entertainment – Amounts are allowed here only
for expenses incurred in connection with your business. Airline
tickets, dinners/lunches with clients, hotel accomodations, etc.
Tread lightly on those conventions held in the Bahamas or on
Cruise ships. Make sure you can prove this is legitmate without
a doubt.

22. Utilities and telephone – This is self explanatory. This
is where it is a nice idea to have a business line so there will
be no questions as to what were personal calls and what were
business.

23. Wages – Any amounts you paid for outside help would be
deducted here. This does not allow for amounts paid to yourself.
If you pay an individual person over $1,000. you are required by
law to file a 1099 form to Uncle Sam.

24. Windfall profit tax – This does not apply to us.

25. Other expenses – Now this is where I may put what is an
office expense. It gets confusing to me. But items I deduct
here are items like Business Gifts, P.O. Box rental, Postage,
Xeroxing, Typesetting, and other subscription services needed for
the business like CompuServe, MCI Mail, Telex, etc.

This is where we would add up all of our deductions and subtract
them from our Gross receipts/sales amount. This amount would be
our profit or (loss) from the business and would be carried over
to the proper line on the 1040 form.

There is a part three which I have mentioned a few times but
basically applies to those of you who are going to be carrying an
inventory.

State returns will vary from state to state so you know what to
do. Yes, speak with an accountant.

SELF-PUBLISHING

How to publish your software/books without a high overhead:

1) Get it copyrighted. Call the Federal Building (213-688-3800)
and request the proper copyright filing forms for software
programs/books.

2) Next step is to get your IBSN #.

Send a letter requesting a block of ISBN numbers to Emery I.
Koltay, Director, U.S. IBSN and SAN Agency, R.R. Bowker
Company, 205 East 42nd Street, New York, New York 10017.
The block (amount) of numbers you receive depends on the
amount of items you want to publish within the next year.

Request a SAN number at the same time. You can also
request “The IBSN System’s User Manual” and Bowker’s
brochure describing its products and services for
publishers.

I’ll explain the SAN number later. It just makes everything
easier for stores and distibutors to order material from
you.

3) Write the CIP Division, Library of Congress, Washington,
D.C. 20540 and request a Publisher’s Response Form and
“Cataloging in Publication: Information for Participating
Publishers.”

4) Now write Beverly Palacio, ABI Department, R.R. Bowker
Company, 205 East 42nd Street, New York, New York 10017
and request information on getting listed in “The
Advance Book Information” (ABI) Program.

This is free. This gets you listed on the Books in Print
database available to libraries and book sellers/
distributors on line.

5) Then write Jaime Ariza, Sales Representative, R.R. Bowker
company, 205 East 42nd Street, New York, New York 10017
for a media kit for a listing in the PTLA (The Publishers
Trade List Annual.

This does cost. As far as you are concerned you can pay
only $30 to get a single title listing. This directory
is used by thousands of libraries and bookstores. You have
to have your IBSN number first.

6) And last but not least write, Rosemary Catoggio, R.R.
Bowker Company, 205 East 42nd Street, New York, New York
and request a media kit on getting listed in the
“Microcomputer Market Place”.

No, it doesn’t stop here. But for $31.00 plus some, you will be
able to reach thousands of potential buyers. You can receive
advance sales from these listings and take them to the bank if
you need publishing capital.
�����������������������������������

COMSEC Bulletin #1 (February 17, 1990)

THIS IS COMSEC BULLETIN #1, FEBRUARY 17, 1990. FOR FURTHER
INFORMATION, CONTACT THE COMSEC BBS (202) 334-1304 OR CALL OUR
OFFICE AT (301) 670-0512 AND LEAVE A MESSAGE.

About the Bulletin

The COMSEC Bulletin is published to provide a means of informing
COMSEC Association members of the business of the association. It
is published on a random basis with news that can affect members.
Please note, the ‘COMSEC Journal’, which will be the association’s
premier publication, will be published quarterly and should not be
confused with the bulletin.

The association wants to thank all of our members for their
patience during the associations transition. We hope that you will
be satisfied with your membership in the coming year.

What’s Inside

– Surveillance Expo ’89
– Annual COMSEC membership meeting
– Using a Spectrum Analyzer
– Audio Tapes Available
– Washington DC COMSEC Chapter News
– S&L’s Phone Bugged
– Membership Certificates and Cards
– Advertising
– TECHNET Data Systems – First COMSEC Corporate Sponsor
– Call to all writers
– Competitive Intelligence
– Hacker enters GRUMMAN Corp computer

Surveillance EXPO ’89

For those of our members who weren’t able to make it to
Surveillance Expo ’89 we missed you. Needless to say the Expo was a
rousing success with exhibitors and speakers that represented the
entire spectrum of the security field. The Association is glad to
have been one of the cornerstones that made this years Expo happen
and we have already begun making preparations for the next Expo to
be held 28-30 November, 1990. Mark that date on your calendars and
plan to attend.

Annual COMSEC Membership Meeting

The annual COMSEC membership meeting was held on December 13, 1989
following the last Expo seminar of the day. Although participation
could have been better , a majority of the board of the directors
were present enabling us to make decisions that will affect the
association for the following year.

A number of topics were covered that all of the association members
should be aware of. For those of you who were unable to attend they
will be covered briefly.

The first topic that was covered was membership goals for the
coming year. Currently the association has a small but growing
number of members. In order to provide reasonable membership
benefits, cover the associations overhead and increase the name
recognition of the association we have to increase the number of
members that the association has. A number of ideas were floored
that may help. It was first suggested that we limit our recruitment
of new members to the Washington, DC area. Its a matter of simple
logistics.

Since a large portion of our members reside in the DC area and the
national chapter has its offices in the area the recruitment of new
members can be closely monitored. However this means that members
outside of the DC area would suffer. Because of this the board
decided that a 75/25% split of effort would be used to recruit new
members with the majority of effort occurring in the Washington
area.

The next topic covered was the formation of local chapters. The
Association is proud to note that the first local chapter has been
established in the Washington area. The local chapter president is
Mike Brumbaugh (phone 703-739-8313) and he has some interesting
ideas. The first meeting of the Washington chapter will be in the
month of April. If you are interested in attending please give him
a call.

The discussion covered then covered the possibility of starting
other local chapters. A number of inquiries have been made but
other than this there has been no progress. The major problem is
finding individuals that are motivated enough to start a chapter.
Its a difficult task and it takes a special kind of person to
undertake the responsibilities and headaches associated with
forming a local chapter. Because of the responsibilities associated
with starting a local chapter it was decided that each local
chapter president would also automatically become a member of the
board of directors and would not be affected by the rule that board
members cannot miss more than two consecutive board meetings.

It was also decided that the minimum number of people required to
start a local chapter would be increased from 5 to 10. It was felt
that the more people involved in the initial formation of the local
chapter the better the chances of success.

Another topic discussed was the possibility of the COMSEC
association joining forces with the National Computer Security
Association. The Board of Directors and the director of NCSA
believe that both organizations would profit from a merging of
resources. The board plans on discussing this option further during
the first meeting of FY90. This meeting will be held the 3rd
Saturday of January. Subsequent board meetings will be held the 3rd
Saturday of the first month of a calendar quarter: January, April,
July and October.

The final item of discussion was the status of the COMSEC Journal.
The journal will be the cornerstone of the association and will
provide timely articles of interest to all members of the
association. Currently a number of articles are in the works for
the March issue. These articles include Telecommunication network
security problems and a story about a hacker who broke into a major
telecommunications network. There might be an article on STU III if
we can get it in time for publication. The association has also
approached a number of companies to inquire if they might be
interested in submitting articles for publication.

Finally, the association is attempting to compile a listing of
companies/ individuals involved in providing specialized security
services. One of the concerns is how to provide a listing that
holds some credibility. Members suggestions are welcomed and will
be provided to the board of directors for consideration.

Possibilities include a certification or training program.

Overall the annual meeting was a success and the next meeting will
even be better. Plan on being there.

Using a Spectrum Analyzer

The association received an interesting call a few weeks ago from
someone who was attempting to use a spectrum analyzer to locate an
clandestine listening device.

The problem with any specialized piece of equipment is that the
user must be aware of the limitations of the equipment that they
are using and also apply a little thought to how to systematically
locate a transmitter once there is a positive indication that it
exists.

In this particular case a spectrum analyzer with a audio speaker
must be utilized. Without a speaker the operator of the analyzer
cannot tell whether they are looking at a signal that is caused by
RF interference, a genuine signal put out by commercial transmitter
or a clandestine transmitter that is located in the room or
building.

Remember, in this particular instance we are discussing only one of
many means that some type of device may be utilized to listen to a
conversation in a room.

First, place a sound source in the room you are checking. Your
analyzer should also be located nearby since most transmitters of
this type have a limited range. You should then go slowly through
the frequency range to locate a signal source transmitting the same
audio that the sound source is transmitting. If you should find
that there is a transmitter located nearby, the sound source can be
moved in the room to see where it is best picked up by the
transmitter. At this point a physical search would have to be done.

Audio Tapes Available

Audio tapes of all the seminars given at EXPO 89′ are available to
COMSEC members. They can be obtained by contacting:
Audio Archives International
3043 Foothill Blvd
Suite #2
Crescenta, CA 91214

Washington DC COMSEC Chapter News

The first meeting of the DC chapter will be April 1990. Mike
Brumbaugh is looking for help in setting up a successful chapter
and meeting. If you are interested in helping him, mike can be
reached at 703-739-8313. Mike said that details of the first
meeting will be sent to members as they become available.

S & L’S Phone Bugged

The Washington Post noted in a recent article that the phone used
by California state S&L examiners had been bugged. The phone, which
was supposed to be a private line, had been tampered with so the
investigators calls could be monitored from other phones in the
building. (Editors note: I’m not sure bugged is the correct word,
jury rigged sounds more like it. Besides who, in their right mind
would pass sensitive information of any type in the same building
they are working in.) Private Investigators were called in to track
down were the calls were being monitored from but were unable to
because the key to the phone room could not be found! When they
returned two days later the phone lines had been returned to
normal. The bugged phone was cited as one of the ways that Lincoln
Savings & Loan attempted to frustrate regulators.

Hacker, Age 15, Enters GRUMMAN Corporation Computer System

A youth from Levittown, New York gained access to the computer that
Grumman uses to handle military customers including the Pentagon.

Grumman stated that all the material that the youth had gained
access to was recovered and he was caught because Grumman’s own
computers detected his illegal entry into the system.

Membership Certificates and Cards

Membership certificates and cards will be sent to all members in
the months of January and February. The association wants to
apologize to all our members for the delay. For those of you that
received the membership cards with a expiration date of 1-1-90, you
may send them back and we’ll send you a new one with a correct
date.

Advertising

Both the COMSEC BULLETIN and the COMSEC JOURNAL will accept paid
advertising. This will allow both publications to increase their
scope and provide even more pages per issue. If you are interested
in placing any type of advertising in either publication contact
the COMSEC Association at 301-670-0512.

TECHNET DATA SYSTEMS – First COMSEC Corporate Sponsor

Technet Data Systems has become the COMSEC Associations first
corporate sponsor. Technet is a small corporation that provides
computer services ranging from installation of small and large
systems to troubleshooting existing systems. Located in the
Washington, DC area the have provided a wide range of services to
large and small corporations. TECHNET also will custom build a
system to fit in your price range.

They can be reached at 703-471-8714 or by writing :
44901 Falcon Place
Suite 110
Sterling, VA 22170

Call To Writers

COMSEC members, you can now enhance your professional prestige and
even give your company a plug by authoring a article for
publication in the COMSEC JOURNAL. The association is seeking
individuals who can speak authoritatively on different aspects of
the security field and wish to become involved. If you are one of
those professionals with a knack for writing let the association
know.

Competitive Intelligence

For those of us who believe that corporate spying has gone the way
of the EDSEL, think again. Todays term of competitive intelligence
may sound nicer but major corporations still spend large sums to
stay one step ahead of their competition.

Most companies simply employ improved telecommunications and
computer systems to evaluate their competitors but others have gone
as far as hiring ex-FBI agents to uncover information. The
undercover work may be as straightforward as reading the other guys
employee publications or as complicated as analyzing all of a
competitors operations. One major US corporation has admitted that
they have sent their personnel to count smokestacks, delivery
trucks and employees cars at a rival facility. A spokesperson for
the corporation stated “This type of information can help you
determine how well your rival is doing.” One of this competitive
intelligence firms most prized intelligence coups was a competitors
in-house phone book, which was used to reconstruct and estimate the
competitions pricing structure.

Here are a few examples of major corporations that utilize
information on their competitors.

* AT&T has an 800-man world-wide network of employees who
monitor competitors sales teams, trade publications and
research papers for the latest developments. This
information is fed into a data base, analyzed and then
supplied to key management on a daily basis.

* Kraft Inc analyzes point-of-purchase scanner data to get
not only price information but also product features and
promotional programs. Kraft has also gone to the extreme
of hiring consultants to interview competitors under the
guise of “independent market research.”

Chat Of Different Colors And Patterns Of Cat Fur (Choose Your Cats!)

ЙННННННННННННННННННННННННННННННННННННННННСНННННННННННННННННННННННННН
є і Dense Black
є і B*D*
МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Standard Solids oo aaC* iissww і Black
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є BiДColors oo aaC* iiS*ww і Black & White
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Tortoiseshells Oo aaC*T* iissww і Tortie
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Calicos Oo aaC*T* iiS*ww і Calico
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Standard Tabbies oo A*C*T* iissww і Tabby
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Patched Tabbies oo A*C*T* iiS*ww і Brown Patched Tabby
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Torbies Oo A*C*T* iissww і Torbie
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Patched Torbies Oo A*C*T* iiS*ww і Patched Torbie
МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Shaded Solids oo aaC* I*ssww і (Silver) Smoke
є і Shaded Silver
є і (Silver) Chinchilla
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Torties Oo aaC*T* I*ssww і Tortie Chinchilla
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Tabbies oo A*C*T* I*ssww і Silver Tabby
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Golden Solids oo A*C*TTa iissww і Golden Chinchilla
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Torties Oo A*C*TTa iissww і Golden Tortie Chinchilla
МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Spotted Tabbies oo A*C*T* iissww і Bronze
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Shaded oo A*C*T* I*ssww і Silver
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Abyssinians oo A*C*Ta* iissww і Ruddy
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Shaded oo A*C*Ta* I*ssww і Silver

МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Orientals oo aaC* iissww і Ebony
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Burmese oo aacbcb iissww і Sable
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Tonkinese oo aacbcs iissww і Natural Mink
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Siamese oo aacscs iissww і Seal Point
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Colorpoint Torties Oo aacscsT* iissww і Seal Tortie Point
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Tabbies oo A*cscsT* iissww і Seal Lynx Point
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Torbies Oo A*cscsT* iissww і Seal Torbie Point
МННННННННННННННННННННННННННННННННННННННННШНННННННННННННННННННННННННН
є Vans oo Wv* і Black Van
є ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДД
є Dominant Whites W* і White
ИННННННННННННННННННННННННННННННННННННННННПНННННННННННННННННННННННННН

Color Chart

СНННННННННННННННННННННННННСНННННННННННННННННННННННННННН
і Dilute Black і Dense Brown
і B*dd і b*D*
ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Blue і Chestnut
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue & White і Chestnut & White
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Tortie і Chestnut Tortie
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Calico і Chestnut Calico
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Tabby і Chestnut Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Patched Tabby і Chestnut Patched Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Torbie і Chestnut Torbie
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Patched Torbie і Chestnut Patched Torbie
ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Blue Smoke і Chestnut Smoke
і Shaded Blue і Chestnut Shaded
і Blue Chinchilla і Chestnut Chinchilla
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Tortie Chinchilla і Chestnut Tortie Chinchilla
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Silver Blue Tabby і Silver Chestnut Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і і Honey Chinchilla
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і і Honey Tortie Chinchilla
ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Bronze Blue і Bronze Chocolate
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Silver Blue і Silver Chocolate
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue і Chestnut
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Silver Blue і Silver Chestnut

ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Blue і Chocolate
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue і Champagne
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Mink і Honey Mink
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Point і Chocolate Point
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Tortie Point і Chocolate Tortie Point
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Lynx Point і Chocolate Lynx Point
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і Blue Torbie Point і Chocolate Torbie Point
ШНННННННННННННННННННННННННШНННННННННННННННННННННННННННН
і Blue Van і Chocolate Van
ЕДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДДД
і White і White
ПНННННННННННННННННННННННННПНННННННННННННННННННННННННННН

СННННННННННННННННННННННННННННСННННННННННННННННННННННННННСННННННННННННННННННННН
і Dilute Brown і Dense LightДBrown і Dilute Light Brown
і b*dd і blblD* і blbldd
ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Lavender і Cinnamon і Fawn
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender & White і Cinnamon & White і Fawn & White
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Tortie і Cinnamon Tortie і Fawn Tortie
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Calico і Cinnamon Calico і Fawn Calico
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Tabby і Cinnamon Tabby і Fawn Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Patched Tabby і Cinnamon Patched Tabby і Fawn Patched Tabby
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Torbie і Cinnamon Torbie і Fawn Torbie
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Patched Torbie і Cinnamon Patched Torbie і Fawn Patched Torbie
ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Lavender Smoke і і
і Lavender Shaded і і
і Lavender Chinchilla і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender Tortie Chinchilla і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Silver Lilac Tabby і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і і і
ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Bronze Lavender і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Silver Lilac і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lavender і Red і Fawn
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Silver Lilac і Silver Red і Silver Fawn

ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Lilac і Caramel і Fawn
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Platinum і Cinnamon і Fawn
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Champagne Mink і Cinnamon Mink і Fawn Mink
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lilac Point і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lilac Tortie Point і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lilac Lynx Point і і
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і Lilac Torbie Point і і
ШННННННННННННННННННННННННННННШННННННННННННННННННННННННННШННННННННННННННННННННН
і Lilac Van і Cinnamon Van і Fawn Van
ЕДДДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД
і White і White і White
ПННННННННННННННННННННННННННННПННННННННННННННННННННННННННПННННННННННННННННННННН

СНННННННННННННННННННСННННННННННННННННННННН»
і Dense Orange і Dilute Orange є
і OOD* і OOdd є
ШНННННННННННННННННННШННННННННННННННННННННН№
і Red і Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red & White і Cream & White є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Tabby і Cream Tabby є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Patched Tabby і Cream Patched Tabby є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ШНННННННННННННННННННШННННННННННННННННННННН№
і Red Smoke і Cream Smoke є
і Red Shaded і Cream Shaded є
і Red Chinchilla і Cream Chinchilla є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Silver Red Tabby і Silver Cream Tabby є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Copper Chinchilla і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ШНННННННННННННННННННШННННННННННННННННННННН№
і Copper і Bronze Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Silver Red і Silver Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і True Red і Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і True Silver Red і Silver Cream є

ШНННННННННННННННННННШННННННННННННННННННННН№
і Red і Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red і Cream є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Mink і Cream Mink є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Point і Cream Point є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і Red Lynx Point і Cream Lynx Point є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і і є
ШНННННННННННННННННННШННННННННННННННННННННН№
і Auburn Van і Cream Van є
ЕДДДДДДДДДДДДДДДДДДДЕДДДДДДДДДДДДДДДДДДДДД¶
і White і White є
ПНННННННННННННННННННПНННННННННННННННННННННј

How To Get Into College By Ian Osmond

How To Get Into College
by
Ian Osmond (AKA Xiphias Gladius, Esq.)

Getting into college these days is a competitive business.
Luckily, you’re competing against people who have no clue
what they are doing. Unluckily, neither do you. So, with
the clue or two you may glean from this manuscript, you will
be ahead of the game.

Colleges look at the following five things, which will
be dealt with in this paper in order of importance:
A. Transcript
B. SAT/ACT scores
C. Teacher recommendations
D. Essays
E. Resume – a list of all the stuff you’ve done besides
school

Section 1 – Transcript

For those of you who don’t recognize the term, this is
the official copy of your grades in High School. “What?” you
cry? ” thought those were practice grades!” Never fear!
Your problem can be solved simply with a bobby pin, some
white-out and a ball-point pen!

The locks on school file cabinets are rather pitiful.
Frankly, I’ve never successfully picked one, but I am a klutz
anyway, and need a professional lock-gun to pick my teeth.
Nonetheless, once you have your official transcript in your
sweaty little hands, your work is nearly done.

My High School makes it easy. Each year’s grade record
is printed on a separate standard oversize mailing label.
The final GPA and class rank are printed on a standard normal
mailing label. The printing is done with a nine-pin dot-
matrix printer on draft quality. A student from Arlington
High merely needs to procure five mailing labels, re-print
his/her transcript, with the grades s/he INTENDED to get, re-
calculate and print his/her GPA, and put down a new,
reasonable, class rank.

Section 2 – SAT/ACT Scores

The Scholastic Aptitude Test and the American College
Test are the two standard tests requested by colleges. YOU
NEED TAKE ONLY ONE OF THESE! Of the two, the ACT provides
the more accurate indicator of probable performance in
college, as it tests reading, math, deductive reasoning, and
science ability. NOBODY in the Northeast takes the ACT.

A really good score on the SAT is about 1100 – 1200, and
there are three ways to do this. The first, and most highly
recommended, is to be a genius. Failing that, take a lot of
expensive SAT preparatory courses. The third method requires
some work.

First, practice your guidance counselor’s signature.
Second, steal one piece of his/her stationery. Sign up to
take the SAT somewhere other than your school. Bribe a local
genius to take the test for you. Type a description of the
genius on the stationary, saying that the person of that
description is you, and sign it WITH THE GUIDANCE COUNSELOR’S
NAME. This method has several advantages. You get a better
score on the SAT, the genius gets extra pocket money and a
chance to practice taking the test, and, you don’t have to
wake up early on a Saturday.

Section 3 – Teacher Recommendations

If no teacher really likes you a lot, try bribery, or
blackmail if you are getting short of cash.

Section 4 – Essays

Another cash-intensive area, there is much precedent for
bribery here, too. Again, if you can’t, merely pay someone
who can. After all, when you get right down to it, isn’t
that the basis of our economic system? Really, that’s the
foundation of Western Civilization, so how could it be wrong?

Section 5 – Your Resume

This section is weighted the least of the five major
areas, which is unfortunate, because, with a little work,
your resume can be spectacular! It is worth your while to
turn in an outstanding resume, not only to get into college,
but also as practice for later life, in the business world.

The major rule in college resume writing is: there is
nothing too insignificant, pointless, pitiful, or stupid to
put on a resume. Hey, let’s face it, colleges are pretty
much looking for length. I’d like to give you a few examples
of things you could put on a college resume, with real-world
translations.

College Translation / Comments
I led an improvisational performance I was the class
troupe that staged impromptu routines clown.
for the amusement of my classmates
at periodic points during the year.

A home-course in hostile negotiations I fought with my
gave me the skills necessary to enter parents.
into contract in today’s competitive
business world.
Independent research into the effects Oh, c’mon – you can
of certain chemical substances on the figure this one
human neurosystem. out!

Studied the trade of locksmithing Hey, I really know
in order to learn a trade and become a someone who did
more-rounded individual this!

Utilizing hard-to-come-by periodicals, I collect rare
I increased my appreciation of art- Swedish porn mags.
photography, and of the human form

Independent research into computer Well, I was
security systems and cryptoanalysis, arrested, but
specifically as it pertains to the the judge really
Internet, and to the UNIX operating liked me!
system, gave me an opportunity to meet
contacts who may be important in later
life.

My leadership position in a local Our gang managed to
youth group taught me responsibility, increase its turf
loyalty, and trust. I was able to lead six blocks last
our organization through a period of month.
growth and expansion.

As you can see, there is nothing which can’t be phrased
in a positive manner! A few pointers on how to phrase things:
1. Stick in the phrase “independent research” a lot. You
can do well with these words.
2. Keep a thesaurus handy. You don’t want to use the exact
same words too often.
3. Colleges like stuff that shows leadership and maturity –
aim for that in how you phrase stuff.
4. Don’t use profanity.
5. Do use a spell-checker. Nothing is more embarrassing to
you and to the college than your claiming that you won a
“speling bee”.
6. Get everything in BEFORE THE DEADLINE.

I hope this paper has been useful to you, and good luck
to you as you go through the college application process.
Remember, many of the skills you will learn from this process
will be useful in later life, too!

><iphias Gladius, Esq.

A List Of Animal Collectives

The following is a list of animal collectives

Group Name Animal Type
———- ———–
Band gorillas
Bed clams, oysters
Bevy quail, swans
Brace ducks
Brood chicks
Cast hawks
Cete badgers
Charm goldfinches
Chattering choughs
Cloud gnats
Clowder cats
Clutch chicks
Clutter cats
Colony ants
Congregation plovers
Covey quail,partridge
Crash rhinoceri
Cry hounds
Down hares
Drift swine
Drove cattle,sheep
Exaltation larks
Flight birds
Flock sheep,geese
Gaggle geese
Gam whales
Gang elks
Grist bees
Heard elephants
Horde gnats
Husk hares
Kindle kittens
Knot toads
Leap leopards
Leash greyhounds,foxes
Litter pigs
Mob kangaroos
Murder crows
Muster peacocks
Mute hounds
Nest vipers
Nest,Nide pheasants
Pack hounds
Pair horses
Pod whales
Pride lions
School fish
Sedge,Siege cranes
Shoal fish,pilchards
Skein geese
Skulk foxes
Sleuth bears
Sounder boars,swine
Span mules
Spring teals
Swarm bees
Team ducks,horses
Tribe,Trip goats
Troop kangaroos,monkeys
Volery birds
Watch nightingales
Wing plovers
Yoke oxen

—- END —-

What You Should Know About Collection Agencies

==)— P TO PAUSE S TO STOP —(==

What You Should Know About Collection Agencies

“Cosmopolitan” (November 1984) pp 136-143

Karen Hartney laughed when she pulled the lavishly illustrated book on
Galapagos Islands wildflowers out of her mailbox. She hadn’t ordered the
book, wasn’t about to pay for it, and felt no obligation to go to the
trouble and expense of returning it.
Two weeks later, she was billed $29.95, plus mailing and handling. She
threw the statement in the trash. In time, the letters grew nasty,
demanding payment and warning that her credit rating would suffer if she
didn’t respond promptly. When a collection agent began calling her at work,
she snapped.
“Leave me alone,” Karen hissed. “I never wanted that dumb book
anyway!”
“You might have thought of that before you decided to keep it,” the man
responded. “I think the word for taking things that aren’t yours is
‘stealing.'”
Karen (whose name has been changed) was furious– but also worried.
Could the collection agency harm her credit rating, contact her employer,
neighbors, landlord? Most of all, she just wanted the harassing calls and
letters to stop. Though resentful, she mailed the payment– now a full
$37.50, including interest and collection charges.
Karen’s case is not an isolated one. Despite the strong new consumer
protection laws passed in recent years, abuses still exist, and a sizeable
minority of retailers and collection agencies engage in such illegal
collection practices. Charging for unordered goods is only one of the many
activities that are prohibited by federal law. (If, by the way, you receive
unrequested merchandise as Karen did, you are under no obligation to pay.
You may treat it as a free gift, but you should notify the sender, in
writing, of your intention as soon as you receive a “bill”.)
The thorniest problems occur when a debt is truly owed and a consumer,
through overextension or inadvertence, falls behind in paying it. In this
case, the account is often turned over to a collection agency, which may
behave unethically in its effort to recoup the money.
“Some of the most extreme cases we see involve actual threats of
violence,” reports Diane Conner, staff attorney for the Credit Practices
Division of the Federal Trade Commission (FTC). “Children have been told
over the phone, ‘Tell your parents they’re going to jail tomorrow if we
don’t get the money.’ We’ve also heard about collection agencies trying to
add on illegal fees of up to 100 percent of the original debt.”
Federal law protects you against such abusive practices. By knowing
which tactics are illegal and how to stop them, you can avoid being a
victum.

BEYOND THE LEGAL LIMIT______________________________________________________

The following are violations of consumer protection laws:

REPETITIVE CALLING OR CALLS AT UNUSUAL TIMES OR PLACES. Some collection
agents will call a consumer repeatedly during a single day, or telephone
late at night without permission– both of which are clearly illegal under
the Fair Debt Collection Practices Act (FDCPA).
Calls at work are not considered “harassing” if an office is the most
convenient place for you to receive the call– but, says Diane Conner, “If
the agent knows that your employer does not allow you to receive personal
calls at work, or if you’ve asked not to be contacted there, then it would
be a violation.”

CALLS TO PERSONS OTHER THAN THE CONSUMER. If a collection agent has
business with you, you are the only person with whom he may discuss that
business. “We frequently hear that a collection agent has called an
employer, or perhaps a neighbor, and left an “urgent message’ that the
consumer should call XYZ Collection Agency regarding payment of a debt,”
reports Bill McDonough, an FTC staff attorney. “The only motive would be to
embarass the consumer, and it’s against the law.”

ABUSIVE, OBSCENE, OR THREATENING LANGUAGE. Late bill payers have been
called deadbeats and bums, subjected to rude and obscene language, and given
veiled as well as direct threats of violence and imprisonment. If this
happens, end the conversation immediately, requesting that you never be
contacted again. Follow up with a brief letter barring future contact with
the collection agency. You may then wish to file a complaint with the FTC
or state consumer protection agency, or pursue private legal action.

MISLEADING THREATS OF LEGAL ACTION. No one has the right to make false
threats or to claim that legal action has been or is about to be instituted
if that’s not the case. Also prohibited are papers that look like official
notices from a state agency or court of law– including documents with
headings that mimic a common legal form (such as “Ace Collection Agency v.
Jane Consumer”) or ones that use an agency name similar to that of a state or
federal agency.

OTHER ABUSIVE BEHAVIOR. Because debt collectors show infinite
ingenuity, the Fair Debt Collection Practices Act covers scores of other
forbidden tricks, from tacking on collection charges not authorized by
contract or law, to using false names and publishing lists of consumers in
debt. Realizing that it could not forsee every possible abuse, Congress
even added a prohibition against any “harassing, oppressive, and abusive
conduct”– a general phrase that increases the power of the courts and the
Federal Trade Commission to protect you against improper collection
practices.

STEPS TOWARD SELF-DEFENSE____________________________________________________

What can you do if you’re the victum of an overeager collection agency?
Your first and simplest option under the FDCPA is to request in writing that
all collection contacts stop. Once you do that, the collection agency is
not allowed to call or write to demand payment; it can only advise you of
new action, such as the referring of your account back to the creditor or
the filing of legal action.
if the harassment continues, you may wish to contact your state
consumer agency. According to Cyra Narva of the Consumer Assistance
Division of the Massachusetts State Banking Department, these agencies will
often intervene to solve the problem. “Usually,” Narva reports, “the
consumer is content just to know that the rug has been pulled out from under
the collection agency and that the abusive practices will stop.”
The agencies won’t compensate you for their past harassment; however a
successful lawsuit might. You could bring suit under the FDCPA and, if
successful, recover a cash judgement of actual damages suffered, attorney’s
fees, sourt costs, and a special statutory award of up to one thousand
dollars.
“If a consumer has been truly injured,” says Willard Ogburn, deputy
director of the National Consumer Law Center, “he or she is entitled to be
compensated. The fact that attorney’s fees may be recovered in a successful
case encourages some attorneys to pursue strong cases on a commission basis,
while the possibility of an extra statutory award of up to a thousand
dollars acts as an extra incentive to the consumer. Meanwhile, the public
interest is served as collection agencies learn that violating consumer
protection laws can be very expensive.”
Whatever decision you make, you’re sure to reap some gratification from
simply standing up for your rights and the rights of others like you.
Rudeness and abuse need never be tolerated, and you can see to it that
they’re not.

+———————————-+ +———————————–+
| STOPPING TROUBLE | | CONSUMER AGENCIES THAT CAN |
| BEFORE IT STARTS | | HELP YOU PROTECT YOURSELF |
| | | |
| Healthy credit use is not | | THE FEDERAL TRADE COMMISSION |
| inconsistent with sound | | (FTC). Your regional office |
| personal finance management, | | can advise you of your rights |
| but if you overextend, these | | and may even make an investi- |
| measures should enable you to | | gation if a collection agency’s |
| resolve the problem without | | abuse has been severe or if |
| becoming vulnerable to further | | yours is one of several com- |
| embarassment or harassment: | | plaints against the same |
| | | agency. Meanwhile, let both |
| IMMEDIATELY CONTEST IN WRITING | | creditor and collection agency |
| ANY INACCURATE CHARGES, AND | | know that you’ve alerted the |
| REQUEST VERIFICATION. | | FTC. Their attitudes may not |
| No collection activities may | | improve, but their behavior |
| proceed until a charge is | | probably will. |
| verified: Waiting may make a | | |
| challenge more difficult. | | STATE CONSUMER PROTECTION |
| | | AGENCY. In some states, this |
| IF YOU REALIZE THAT YOU ARE | | government office can arbitrate |
| NOT GOING TO BE ABLE TO MAKE | | a dispute and order that |
| REQUIRED PAYMENTS ON A DEBT, | | abusive practices be stopped. |
| CONTACT THE CREDITOR. Most | | If your debt is undisputed or |
| are understanding and co- | | can be proved, the agency can |
| operative if you propose an | | help you negotiate a reasonable |
| alternate payment plan at the | | extended-payment plan; it may |
| first sign of trouble. Review | | also have greater power to |
| your own budget, determine a | | intervene in an individual case |
| monthly amount you can afford | | than a regional FTC office |
| to pay, then explain the | | would. |
| problem to the creditor and | | To learn what state services |
| offer to pay the lesser | | are available to protect you |
| amount. | | against collection harassment, |
| | | contact your state government |
| DON’T ALLOW YOUR ACCOUNT TO BE | | information-office or your |
| TRANSFERRED TO A COLLECTION | | state attorney general’s |
| AGENCY THROUGH YOUR OWN | | office. |
| INACTION. Creditors use | | |
| collection agencies to goad | | If the improper conduct comes |
| the reluctant or forgetful. | | from an attorney practicing law |
| A creditor who understands | | in the collection area, contact |
| that you are overextended but | | your LOCAL BAR ASSOCIATION, and |
| doing the best you can will | | ask for the disciplinary board |
| have no reason to resort to | | or licensing agency that |
| such measures. | | receives complaints against |
| Many people are too anxious | | lawyers. They probably won’t |
| or embarassed to approach a | | step in directly; however, a |
| creditor about dificulty in | | lawyer who knows that a |
| making payments. Remember that | | complaint is being checked |
| the creditor, whether a merch- | | generally takes more care to |
| ant or a banker, wants to keep | | act within legal and ethical |
| your business. An amicable | | bounds. |
| resolution is in “everyone’s” | | |
| interest. | | CONSUMER CREDIT COUNCELING |
| | | AGENCIES. Frequently the |
+———————————-+ | problem is less one of outright |
| harassment than of anxiety and |
| increasingly short tempers on |
| both sides. A nonprofit con- |
| sumer credit counceling agency |
| has no official enforcement |
| power, but it “can” help you |
| assess your financial situation |
| and act as a mediator in making |
| more mutually suitable payment |
| arrangements. |
| |
+———————————–+

Downloaded From P-80 Systems…..