Detweiler's motivations
From: NetSurfer <jdwilson@gold.chem.hawaii.edu>
The author is Gordon McLachlan (mclachlan@cardinal.com), and the article appeared in the "Crosswired" column of May 1994 Vol. 5 No. 5 Lan Computing. [...] First of all, we need a seven-day waiting period and a thorough background check before anyone can get issued a user-ID. This would give system administrators time to find out if a user is a loon, or has been bounced off of other systems for misbehaving. To support this effort, congress should establish a national database to keep track of network offenders.
A quick scan of almost any mailing list or newsgroup will reveal sociopaths who should have their access priviledges revoked. And we should never forget that network access is a priviledge and not a right. Its ironic to me that we license people to drive cars, but all you need to get on the information superhighway is a MODEM.
This kind of suggestion, although made in jest, provides a clue to what Detweiler is trying to do, IMO. (These are just my speculations, and perhaps they are obvious to others, but I haven't seen these specific points made here.) He posts innumerable messages, alternating between reasonable-sounding arguments and insane gibbering. He replies to himself, posting other people's words as if they were his own. He calls for accountability and decries the use of pseudonyms while being one of the most prominent users and abusers of this technology. Some have concluded that Detweiler actually is insane, but I don't think so. I suspect that he is acting on a carefully calculated program designed to discredit the kinds of technologies we support. By posting trash to the newsgroups under a pseudonym, and making clear that it is just a psuedo- nym, he hopes to undermine tolerance for this method of using the net. He has largely ruined talk.politics.crypto as a forum for serious discussion of the kinds of social changes which might be brought about by strong crypto- graphy. This kind of abuse will undoubtedly lead to complaints against his service provider, as well as demands to know his true identity. Detweiler also seeks to reveal hypocrisy on the part of supporters of anonymity, as when I posted logs of his "Death to Blacknet" post bombs to dozens of Usenet groups, breaking his anonymity. He is saying that anonymity is so bad that even its supporters will seek to destroy it when provoked. In this way he seeks to further discredit CP goals. His bizarre practice of posting replies to his own messages, criticizing his own words in scathing tones (apparently basing these messages on the private email he receives) is designed to show that lack of clear ident- ification of message sources is confusing. This further advances his argu- ment that psuedonymity is bad and that clear identification of identities will be necessary for effective communication. So, having failed to persuade by his words, Detweiler is trying to demon- strate his points by example. By taking all that he hates and becoming the embodiment of it, to an exagerrated degree, he is trying to show that anonymity is dangerous, confusing, and a barrier to communication. In this light, his behavior is perfectly rational. Hal
Hal wrote:
Some have concluded that Detweiler actually is insane, but I don't think so. I suspect that he is acting on a carefully calculated program designed to discredit the kinds of technologies we support. By posting trash to
I agree it is difficult to determine Detweiler's motivations; I've carried on quite civil email exchanges with him... but the posts from tmp@netcom.com are quite bizzare. Anyway, I was looking thought this months PC Techniques articles on Secret Sharing, Simple Encryption (XOR), and Subliminal Channels, when I flipped through Connect magazine... and was stunned to see the article "Cryptography for the Unwashed Masses" by L. Detweiler! The article is calm, reasonable, explains the rudiments of crypto (keeping in mind the target audience), and in general pro crypto. So while he may have it in for cypherpunks stuff, he seems to be supporting cryptography. -- Karl L. Barrus: klbarrus@owlnet.rice.edu keyID: 5AD633 hash: D1 59 9D 48 72 E9 19 D5 3D F3 93 7E 81 B5 CC 32 "One man's mnemonic is another man's cryptography" - my compilers prof discussing file naming in public directories
Karl said:
I agree it is difficult to determine Detweiler's motivations; I've carried on quite civil email exchanges with him... but the posts from tmp@netcom.com are quite bizzare.
He's still mostly normal in e-mail. However, I think it's best to be careful what you say. I once responded to a question of his about actual instances of PSEUDOSPOOFING; I mentioned a user here who spent some time replying to himself on rec.music.industrial. His response was something along the lines of "hee hee you're a tentacle", and now look what he's doing to talk.politics.crypto et al.... Hal's analysis seems plausible to me. This whole self-reply cascade has got to be some kind of surreal propaganda maneuver. Eli ebrandt@hmc.edu
On May 30, 5:58pm, Eli Brandt wrote:
Subject: Re: Detweiler's motivations Karl said:
I agree it is difficult to determine Detweiler's motivations; I've carried on quite civil email exchanges with him... but the posts from tmp@netcom.com are quite bizzare.
He's still mostly normal in e-mail. However, I think it's best to be careful what you say. I once responded to a question of his about actual instances of PSEUDOSPOOFING; I mentioned a user here who spent some time replying to himself on rec.music.industrial. His response was something along the lines of "hee hee you're a tentacle", and now look what he's doing to talk.politics.crypto et al....
I had a similar thing happen to: Detweiler sent me private email some months back, in some apparent urgency, asking my opinion on "pseudospoofing", as "a director of the Extropy Institute". I replied that I wasn't in the business - as an ExI director or otherwise - of having an opinion on everything. This seemed to really bother him. He emailed me back, expressing his surprise that I didn't drop everything and respond to his clarion call. I'm told - though I didn't find out until a few days ago - that I too ended up being listed as a "tentacle". How amusing.
Hal's analysis seems plausible to me. This whole self-reply cascade has got to be some kind of surreal propaganda maneuver.
Or a serious local loopback problem.
Eli ebrandt@hmc.edu
-- End of excerpt from Eli Brandt
-- Russell Earl Whitaker whitaker@csd.sgi.com Silicon Graphics Inc. Technical Assistance Center / Centre D'Assistance Technique / Tekunikaru Ashisutansu Sentaa Mountain View CA (415) 390-2250 ================================================================ #include <std_disclaimer.h>
Perhaps we should just call the FBI and tell them that we have information that he has child porno on his computer (anonymously of course), and call the Customs office and say he has exported crypto, and call the CIA and tell them he's working for the soviets? <grin> :-)
participants (5)
-
Eli Brandt -
Hal -
Karl Lui Barrus -
rarachel@prism.poly.edu -
whitaker@dpair.csd.sgi.com