888 lines
41 KiB
Plaintext
888 lines
41 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun Aug 22 1993 Volume 5 : Issue 64
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Ediot: Etaoin Shrdlu, III
|
|||
|
|
|||
|
CONTENTS, #5.64 (Aug 22 1993)
|
|||
|
File 1--Has the EFF SOLD OUT?!?
|
|||
|
File 2--EICAR '93 conference / members' meeting
|
|||
|
File 3--Re SKIPJACK Review (CuD 5.60)
|
|||
|
File 4--CuNews ("Smart Kards," Comp Snooping at IRS/FBI, & more)
|
|||
|
File 5--CuNews -- ("Hackers need not Apply" & more)
|
|||
|
File 6--Table of Contents for Volume #1 (of P/H Msg Bases)
|
|||
|
File 7--Graduate Paper Competition for CFP-'94
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Sun, 22 Aug 1993 20:23:18 CDT
|
|||
|
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
|||
|
Subject: File 1--Has the EFF SOLD OUT?!?
|
|||
|
|
|||
|
The Electronic Frontier Foundation has been co-opted by the
|
|||
|
telecommunications conglomerates and has, as a consequence, lost it's
|
|||
|
integrity and credibility. Or so some critics would have us believe.
|
|||
|
Especially since the re-organization of The EFF, allegations that they
|
|||
|
have "sold out" by accepting contributions from telephone
|
|||
|
companies--or worse, that EFF now is implicitly in the employ of
|
|||
|
telephone companies--persist. This allegation seems not only
|
|||
|
unfounded, but does a disservice to the cybercommunity by falsely
|
|||
|
maligning the integrity of one of the two (CPSR being the other) most
|
|||
|
active and effective organizations working to establish and preserve
|
|||
|
the rights of the electronic realm.
|
|||
|
|
|||
|
Because I am a dues-paying member of EFF and have recently sent my
|
|||
|
subscription fee to CPSR, I am not a dispassionate observer. Both
|
|||
|
groups are effective, and--even when in disagreement, I respect the
|
|||
|
goals and strategies chosen by each group. Therefore, as a member of
|
|||
|
EFF, I'm troubled by some of the public commentary I've read on
|
|||
|
Usenet, BBSes, and public access systems that continue to
|
|||
|
irresponsibly tarnish the integrity of EFF with false allegations.
|
|||
|
|
|||
|
Some of the basis for criticism rests on rumors. Perhaps some derives
|
|||
|
from malice. But, the bulk may simply be a lack of information about
|
|||
|
EFF's funding sources and an imperfect understanding about the
|
|||
|
relationship between funders and recipients and the obligations that
|
|||
|
relationship entails. I see nothing *inherently* improper about EFF
|
|||
|
(or any organization) accepting funds from organizations whose goals,
|
|||
|
ideology or practices may not overlay perfectly with those of the
|
|||
|
recipients. Let's look at a few issues.
|
|||
|
|
|||
|
1. HOW MUCH DOES EFF RECEIVE FROM TELECOS? According to EFF sources,
|
|||
|
roughly eight percent of their $1.6 million operation budget comes
|
|||
|
from telecom sources, with no more than five percent coming from a
|
|||
|
single source. Fiscal ratios change, and whether the exact sum is
|
|||
|
seven or 11 percent matters nil. This is a useful chunk of resources,
|
|||
|
but hardly substantial. It is certainly not a sufficient amount to
|
|||
|
cause a crisis if it were withdrawn. The remainder of EFF's resources
|
|||
|
are reported to derive from private donors, membership fees, and
|
|||
|
revenue-generating activities (such as sales of t-shirts). Both in the
|
|||
|
Usenet discussion group (comp.org.eff.talk) and in its newsletters,
|
|||
|
EFF has been open about its funding sources and has never concealed or
|
|||
|
minimized contributions by corporate donors, including telecos.
|
|||
|
Therefore, EFF's alleged ethical malfeasance does not lie in failure
|
|||
|
to conceal its funding resources. Nor does it lie in a dependency
|
|||
|
relationship with the donors.
|
|||
|
|
|||
|
2. WHAT OBLIGATIONS DOES EFF OWE THE TELECOS? The broader question
|
|||
|
here centers on what obligations a donor might expect from the
|
|||
|
recipient. It is hardly unusual for organizations to accept funds from
|
|||
|
contributors whose interests overlap. Examples include contributions
|
|||
|
by R.J. Reynolds tobacco and The Playboy Foundation to the ACLU to--as
|
|||
|
a personal example--my own former funding by the National Institute of
|
|||
|
Justice. Does the ACLU support freedom of speech because it is funded
|
|||
|
in part by those with a commercial interest in protecting it? Should
|
|||
|
the ACLU abstain from taking a position on smokers'/non-smokers'
|
|||
|
rights because of funding sources? Should I have refused federal
|
|||
|
funding lest I be accused (as I once was) of being little more than a
|
|||
|
paid lackey of federal police and social control interests? Criticism
|
|||
|
of EFF for its funding sources and suspicion of the strings that might
|
|||
|
be attached extend into the lives of many of us. However, it is rare
|
|||
|
that general donations require any substantive changes in the behavior
|
|||
|
or principles of recipients. It is also common for well-endowed donors
|
|||
|
to spread their largess to a variety of groups with ends often
|
|||
|
(seemingly) antithetical to each other and even to the donor.
|
|||
|
|
|||
|
There is no evidence whatsoever that EFF has changed its direction to
|
|||
|
satisfy donors. In fact, the recent re-organization at EFF, however
|
|||
|
much some of us might be disappointed by the emphasis, is fully
|
|||
|
consistent with their original policy statement. In fact, a careful
|
|||
|
reading of the founding EFF statement and its recent public policy
|
|||
|
formulations indicate that the re-organization was primarily
|
|||
|
structural rather than the reflection of a new philosophy. As the
|
|||
|
CPSR/EFF/ACLU coalition in the 2600 Magazine Washington Mall incident
|
|||
|
of 1992 suggest, the EFF continues to involve itself with those types
|
|||
|
of issues that led to its founding. And, as Mike Godwin's continued
|
|||
|
involvement with EFF and his willingness to help those in need of
|
|||
|
legal advice attest, EFF remains the first resource most of us think of
|
|||
|
when we seek computer-related legal assistance. Those who know Mike
|
|||
|
and EFF founders John Barlow and Mitch Kapor cannot, in their wildest
|
|||
|
fantasies, imagine even the most generous donor influencing their
|
|||
|
behavior or principles.
|
|||
|
|
|||
|
3. WHAT ARE THE ETHICAL/LEGAL OBLIGATIONS OF RECIPIENTS? Federal and
|
|||
|
state statutes, as well as various professional codes of ethics,
|
|||
|
specify obligations that might lead to a conflict of interest. The
|
|||
|
attorneys amongst us can elaborate on these. However, there is
|
|||
|
absolutely no evidence that the EFF approaches even the strictest
|
|||
|
conflict of interest threshold. Its coincidental interests with
|
|||
|
telecos involve policy and legislation affecting primarily the
|
|||
|
development of an "information highway" and the attendant technology.
|
|||
|
The EFF is not litigating on behalf of any telecos, it is not
|
|||
|
(according to EFF sources and their documents) serving in a client
|
|||
|
relationship with them, and it is engaged in no activity that--at
|
|||
|
least by any apparent logic--could be construed to place the EFF in a
|
|||
|
conflict of interest situation. EFF's initiative and perseverance in
|
|||
|
the Steve Jackson Games litigation would seem prima facie evidence
|
|||
|
that the EFF is committed to principle and not to funding expedience.
|
|||
|
|
|||
|
There is room for considerable intellectual disagreement over the
|
|||
|
focus, goals, and organization of EFF, CPSR, and, I suppose, even CuD.
|
|||
|
But the one issue that is indisputable is the integrity, commitment,
|
|||
|
and credibility the EFF possesses. Because there is nary a soupcon of
|
|||
|
evidence to to suggest cooptation, it's time to end this unnecessary
|
|||
|
and destructive bickering about EFF's funding sources.
|
|||
|
|
|||
|
Those who have taken the trouble to follow the public policy
|
|||
|
statements and read the EFF electronic and hardcopy newsletters, will
|
|||
|
find nothing new in my comments. Those who do not receive the
|
|||
|
newsletter and do not follow CuD's periodic summaries of the
|
|||
|
activities of groups such as the EFF and CPSR might have been
|
|||
|
influenced by rumors and misinformation. Those of us who are concerned
|
|||
|
about the future of "cyberspace" should remember our debt to these
|
|||
|
groups. Part of that debt means that we squelch false rumors that risk
|
|||
|
irreparably tarnishing the reputations and subverting the effectiveness
|
|||
|
of groups from whose actions we all benefit.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 19 Aug 93 09:46:16 GMT
|
|||
|
From: Anthony Naggs <amn@UBIK.DEMON.CO.UK>
|
|||
|
Subject: File 2--EICAR '93 conference / members' meeting
|
|||
|
|
|||
|
EICAR '93 Conference
|
|||
|
|
|||
|
At a recent meeting the board of EICAR (European Institute for
|
|||
|
Computer Anti-Virus Research), decided to cancel the planned
|
|||
|
London conference this year. I understand this is due to low
|
|||
|
participation in other computer security / anti-virus events this
|
|||
|
year.
|
|||
|
|
|||
|
However, there will instead be a Members' Meeting in Hamburg
|
|||
|
(Germany), the proposed agenda is:
|
|||
|
25 November 1993
|
|||
|
14:00 Working Group 3 (Legal Questions) meeting
|
|||
|
16:00 Working Group 1 (Antivirus Technologies) meeting
|
|||
|
18:00 Joint Dinner
|
|||
|
|
|||
|
26 November 1993
|
|||
|
09:00 Discussion of the Working Groups results
|
|||
|
11:00 Members Meeting
|
|||
|
13:00 Lunch
|
|||
|
|
|||
|
EICAR '94 Conference
|
|||
|
|
|||
|
The next EICAR conference is proposed to be from 14 to 16 November
|
|||
|
1994 in the vicinity of London.
|
|||
|
|
|||
|
(Disclaimer; I am not an official spokesman for EICAR).
|
|||
|
|
|||
|
+++
|
|||
|
Anthony Naggs Email: Paper mail:
|
|||
|
Software/Electronics Engineer amn@ubik.demon.co.uk PO Box 1080, Peacehaven
|
|||
|
& Computer Virus Researcher East Sussex BN10 8PZ
|
|||
|
Phone: +44 273 589701 Great Britain
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 13 Aug 1993 16:15:47 CST
|
|||
|
From: roy@SENDAI.CYBRSPC.MN.ORG(Roy M. Silvernail)
|
|||
|
Subject: File 3--Re SKIPJACK Review (CuD 5.60)
|
|||
|
|
|||
|
In comp.society.cu-digest #5.60:
|
|||
|
|
|||
|
> Date: Mon, 02 Aug 1993 15:23:28 -0400 (EDT)
|
|||
|
> From: denning@CS.GEORGETOWN.EDU(Dorothy Denning)
|
|||
|
> Subject--File 5--SKIPJACK Review (Encryption Background and Assessment)
|
|||
|
|
|||
|
> LEAF decoders that allow an authorized law enforcement official to
|
|||
|
> extract the device identifier and encrypted session key from an
|
|||
|
> intercepted LEAF. The identifier is then sent to the escrow
|
|||
|
> agents, who return the components of the corresponding device
|
|||
|
> unique key. Once obtained, the components are used to reconstruct
|
|||
|
> the device unique key, which is then used to decrypt the session
|
|||
|
> key.
|
|||
|
|
|||
|
This is the first time I've heard anyone clarify that point. One of my
|
|||
|
main objections to the Clipper proposal was that once a legal tap had
|
|||
|
been authorized, all further communications with that Clipper chip were
|
|||
|
compromised unless the court order only released the session key. LE
|
|||
|
has NO NEED for the unique device key. They legitimately need only the
|
|||
|
session key for the lawfully intercepted communications.
|
|||
|
|
|||
|
> 5. Secrecy of the Algorithm
|
|||
|
>
|
|||
|
> The SKIPJACK algorithm is sensitive for several reasons. Disclosure of
|
|||
|
> the algorithm would permit the construction of devices that fail to
|
|||
|
> properly implement the LEAF, while still interoperating with legitimate
|
|||
|
> SKIPJACK devices. Such devices would provide high quality
|
|||
|
> cryptographic security without preserving the law enforcement access
|
|||
|
> capability that distinguishes this cryptographic initiative.
|
|||
|
|
|||
|
> However, while full exposure of the internal details of SKIPJACK would
|
|||
|
> jeopardize law enforcement and national security objectives, it would
|
|||
|
> not jeopardize the security of encrypted communications. This is
|
|||
|
> because a shortcut attack is not feasible even with full knowledge of
|
|||
|
> the algorithm. Indeed, our analysis of the susceptibility of SKIPJACK
|
|||
|
> to a brute force or shortcut attack was based on the assumption that
|
|||
|
> the algorithm was known.
|
|||
|
|
|||
|
These sections actually makes me feel better about SKIPJACK in general.
|
|||
|
I kind of suspected that the real reason for secrecy was to protect LE
|
|||
|
access. (I'd still prefer the algorithm be made public)
|
|||
|
|
|||
|
Now, anyone care to speculate about the security of the LEAF itself?
|
|||
|
This whole discussion centered upon SKIPJACK security, but I don't
|
|||
|
recall whether the LEAF is _actually_ encrypted by SKIPJACK. A SKIPJACK
|
|||
|
key and a Clipper key are both 80 bits, but that doesn't mean you have
|
|||
|
to crypt them the same way.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 18 Aug 93 12:19:00 BST
|
|||
|
From: grmeyer@GENIE.GEIS.COM
|
|||
|
Subject: File 4--CuNews ("Smart Kards," Comp Snooping at IRS/FBI, & more)
|
|||
|
|
|||
|
Smart Kards Are Coming
|
|||
|
======================
|
|||
|
A group of corporations, including MasterCard, Visa, Citicorp, Amex,
|
|||
|
IBM, AT&T, Microsoft, and Apple, have formed the Smart Card Forum.
|
|||
|
The cross-industry group will promote the use of smart-card technology
|
|||
|
for payment, transit, health care, identification, and security
|
|||
|
applications.
|
|||
|
(Information Week August 9, 1993 pg 10)
|
|||
|
|
|||
|
Computer Snooping at the IRS and FBI
|
|||
|
====================================
|
|||
|
The Internal Revenue Service is implementing a $23 billion computer
|
|||
|
modernization project that will give it online access to taxpayer
|
|||
|
information. In the midst of this, the GAO has revealed that as
|
|||
|
many as 350 employees in the IRS's Southeast Region (Atlanta) have
|
|||
|
been snooping into taxpayer records. So far, 154 have been
|
|||
|
disciplined.
|
|||
|
|
|||
|
The GAO (Government Accounting Office) has also said that access to
|
|||
|
the FBI's National Crime Information Center (NCIC) databases has
|
|||
|
been systematically abused by law enforcement workers and associates.
|
|||
|
Cases cited as examples include an officer using NCIC to track down
|
|||
|
his ex-girlfriend (he later killed her), a terminal operator checking
|
|||
|
customers for her drug-dealing boyfriend...just to be sure they
|
|||
|
weren't undercover agents, and a dispatcher running background checks
|
|||
|
on her fiance's political opponents. The FBI declines comment, but
|
|||
|
the GAO has recommended that Congress make it a criminal offense to
|
|||
|
access the network for private use.
|
|||
|
(Information Week. August 9, 1993. pg 13)
|
|||
|
|
|||
|
Wipe Before Discarding
|
|||
|
======================
|
|||
|
A Canadian citizen, who purchased a used hard drive from a local
|
|||
|
computer store, found himself in possession of a goldmine of personal
|
|||
|
data and information.
|
|||
|
|
|||
|
The used drive contained the personnel records of every employee in
|
|||
|
the Alberta land title offices in Edmonton and Calgary. It included
|
|||
|
salaries, social security numbers [presumably the Canadian equivalent],
|
|||
|
and performance evaluations. It also held lengthy, confidential memos
|
|||
|
about plans to turn over the land title department to a private
|
|||
|
agency.
|
|||
|
(Information Week August 9, 1993 pg 60)
|
|||
|
|
|||
|
Pay Your Rent
|
|||
|
=============
|
|||
|
Speaking of Edmonton, Alberta... A landlord's association there has
|
|||
|
formed a group to share information about tenants. The online database
|
|||
|
can be searched with little more than a name or driver's license
|
|||
|
number. The landlords say the primary purpose is to keep track of
|
|||
|
people who skip out on rent payments, or damage property. They answer
|
|||
|
concerns about discrimination by saying that anyone caught abusing
|
|||
|
the system will be forbidden from using it in the future.
|
|||
|
(Information Week August 9, 1993 pg 66)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: grmeyer@GENIE.GEIS.COM
|
|||
|
Date: Fri, 20 Aug 93 00:23:00 BST
|
|||
|
Subject: File 5--CuNews -- ("Hackers need not Apply" & more)
|
|||
|
|
|||
|
If It's Blurry You Shouldn't Be Watching
|
|||
|
========================================
|
|||
|
A patented digital technology from VideoFreedom Systems (San Diego,
|
|||
|
CA) may be the key to getting an intrusive Congress off their
|
|||
|
censorship bandwagon. The technology would allow television (and movie
|
|||
|
theatres!) to blur objectionable scenes and sounds. Much the same way
|
|||
|
the news programs can distort the voice and image of a confidential
|
|||
|
source who wishes to remain that way. The technology would allow those
|
|||
|
viewers who want to see "the good parts" to clean-up the image to
|
|||
|
their tastes. (Information Week August 16, 1993 pg 10)
|
|||
|
|
|||
|
Hackers Need Not Apply
|
|||
|
======================
|
|||
|
Information Week magazine recently conducted a "fax vote"
|
|||
|
self-selected survey of readers. The questions asked about policies,
|
|||
|
thoughts, and practices regarding hiring ex-hackers to help out with
|
|||
|
computer security. Of the those who choose to respond, 15% said they
|
|||
|
had been approached for a job by a hacker. Only 6% said they had ever
|
|||
|
hired a hacker to test security. Of their concerns about doing so,
|
|||
|
over half said "they might compromise security". About 35% expressed
|
|||
|
concerns over "legal problems".
|
|||
|
|
|||
|
Some of the write-in comments included:
|
|||
|
|
|||
|
"Their crimes are difficult to prove and almost impossible to
|
|||
|
prosecute. Not only do they go unpunished, but hiring them makes
|
|||
|
crime pay."
|
|||
|
|
|||
|
"What happened to our idea of ethics and morality? I don't believe
|
|||
|
only felon hackers are smart enough to foolproof our computer
|
|||
|
systems."
|
|||
|
|
|||
|
"They could sell ideas back to your competitor. These people will do
|
|||
|
anything for a buck".
|
|||
|
|
|||
|
Refer to Information Week, August 16, 1993 pg 29 for full details.
|
|||
|
|
|||
|
This Tag Line Meets Corporate Standards
|
|||
|
=======================================
|
|||
|
Duke Power Company (Charlotte, NC) has issued a memo to supervisors
|
|||
|
and managers that forbids employees from expressing their religious or
|
|||
|
political opinions over the company's Email, voice mail, or fax
|
|||
|
machines. The company says the memo arises out of problems with people
|
|||
|
using 'tag lines' (short sentences at the end of messages) on the
|
|||
|
company's Profs mail system. The company did not forbid tag lines, but
|
|||
|
issued guidelines for their content. According to the company few of
|
|||
|
its 18,000 employees see the rules as a restriction of free speech.
|
|||
|
(Information Week. August 16, 1993 pg 60)
|
|||
|
|
|||
|
Woodstock for Hackers and Phreaks
|
|||
|
=================================
|
|||
|
Newsweek magazine (Aug 16, 1993 pg 47) features a story on the End of
|
|||
|
The Universe conference in the Netherlands. According the Information
|
|||
|
Week's summary, the Newsweek article reports that attendees had at
|
|||
|
least one thing in common with the Woodstock guests....they believe
|
|||
|
that rules were meant to be broken. (IW's summary is on pg. 64,
|
|||
|
August 16, 1993)
|
|||
|
|
|||
|
Don't Copy That (Microsoft) Floppy!
|
|||
|
===================================
|
|||
|
Information Week reports that an article in the San Francisco paper
|
|||
|
THE REVOLVER (Aug 9, pg 1) says some lawyers claim that Microsoft
|
|||
|
might enjoy too much influence over federal prosecutors. It seems that
|
|||
|
an unusually high number of cases against software pirates are
|
|||
|
launched on Microsoft's behalf. The number is higher compared with
|
|||
|
Lotus or WordPerfect for example. (Information Week. August 1, 1993.
|
|||
|
pg 64)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 10 Aug 93 22:48:47 EDT
|
|||
|
From: lodcom (LOD Communications)
|
|||
|
Subject: File 6--Table of Contents for Volume #1 (of P/H Msg Bases)
|
|||
|
|
|||
|
((MODERATORS' NOTE: In CuD #5.39, we reviewed the BBS Message Base
|
|||
|
File Archive Project compiled by LODCOM. We were impressed by the
|
|||
|
comprehensiveness of the project and favorably reviewed it as a
|
|||
|
valuable set of documents for scholars and curious readers who are
|
|||
|
interested in BBS "underground" culture of the 1980s. The collection
|
|||
|
has been expanded, and the current offerings are described below)).
|
|||
|
|
|||
|
++++
|
|||
|
|
|||
|
Volume I of the Hack/Phreak BBS Message Base File Archive Project
|
|||
|
has been completed. This file is 19 KB in length and contains the
|
|||
|
Table's of Contents for each of the 20 Message Base Files. Volume II
|
|||
|
is being compiled and is expected to be completed and sent out to
|
|||
|
those who have ordered the Set sometime in September. Volume III is
|
|||
|
expected to be completed in November 1993. Should any additional
|
|||
|
material come our way, a fourth and final Volume will be made.
|
|||
|
|
|||
|
The newest version of the Order Form File will be sent to you
|
|||
|
sometime in the next week. Should you find the following TOC's
|
|||
|
interesting and you want to order the files do so with the NEW order
|
|||
|
form. If you have already ordered using the old order form that is
|
|||
|
fine, as the price change is retroactive since it is to YOUR benefit.
|
|||
|
As you will note when you see the new order form and information file,
|
|||
|
ALL the volumes created will cost $39.00 personal, $99.00 commercial.
|
|||
|
That is, for the above price you receive ALL the volumes, not just one
|
|||
|
volume. The price change was made due to the good response to the
|
|||
|
initial order form.
|
|||
|
|
|||
|
When Volume #2 is completed a file similar to this one with its
|
|||
|
TOC's will be mailed to you. If you wish to be taken off this mailing
|
|||
|
list just say so. If not, Lodcom will continue to keep you up to date
|
|||
|
on the projects' progress. Disseminate this File as you see fit.
|
|||
|
|
|||
|
If you have any questions feel free to email us anytime.
|
|||
|
|
|||
|
|
|||
|
VOLUME #1 CONTENTS:
|
|||
|
+++++++++++++++++++
|
|||
|
|
|||
|
LOD Communications (c) 1993: VOLUME #1 List of Hack/Phreak BBS Message Bases
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
BBS NAME A/C SYSOP(S) # MSGS DATES KBYTES PROPHILE
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
Alliance BBS 618 Phantom Phreaker 113 2/09/86 - 215 YES
|
|||
|
Doom Prophet G,P 6/30/86
|
|||
|
|
|||
|
Black Ice Private 703 The Highwayman 880 12/1/88 - 560 YES
|
|||
|
P,U 5/13/89
|
|||
|
|
|||
|
Broadway Show/ 718 Broadway Hacker 180 9/29/85 - 99 YES
|
|||
|
Radio Station BBS 12/27/85
|
|||
|
|
|||
|
CIA BBS 201 CIA Director 30 5/02/84 - 30 NO
|
|||
|
6/08/84
|
|||
|
|
|||
|
C.O.P.S. 305 Mr. Byte-Zap 227 11/5/83 - 196 YES
|
|||
|
The Mechanic G,R,U 7/16/84
|
|||
|
|
|||
|
Face To Face 713 Montressor 572 11/26/90 - 400 YES
|
|||
|
Doc Holiday 12/26/90
|
|||
|
|
|||
|
Farmers Of Doom 303 Mark Tabas 41 2/20/85 - 124 YES
|
|||
|
G 3/01/85
|
|||
|
|
|||
|
Forgotten Realm 618 Crimson Death 166 3/08/88 - 163 NO
|
|||
|
4/24/88
|
|||
|
|
|||
|
Legion Of Doom! 305 Lex Luthor 194 3/19/84 - 283 YES
|
|||
|
Paul Muad'Dib * G,P 11/24/84
|
|||
|
|
|||
|
Metal Shop Private 314 Taran King 520 4/03/86 - 380 YES
|
|||
|
Knight Lightning P,R,U 5/06/87
|
|||
|
|
|||
|
OSUNY 914 Tom Tone 375 7/9/82 - 368 YES
|
|||
|
Milo Phonbil * G,U 4/9/83
|
|||
|
|
|||
|
Phoenix Project 512 The Mentor 1118 7/13/88 - 590 YES
|
|||
|
Erik Bloodaxe * G,R 2/07/90
|
|||
|
|
|||
|
Plover-NET 516 Quasi Moto 346 1/14/84 - 311 YES
|
|||
|
Lex Luthor * G 5/04/84
|
|||
|
|
|||
|
Safehouse 612 Apple Bandit 269 9/15/83 - 251 YES
|
|||
|
G,U 5/17/84
|
|||
|
|
|||
|
Sherwood Forest I 212 Magnetic Surfer 92 5/01/84 - 85 YES
|
|||
|
P,U 5/30/84
|
|||
|
|
|||
|
Sherwood Forest ][ 914 Creative Cracker 100 4/06/84 - 200 YES
|
|||
|
Bioc Agent 003 * G 7/02/84
|
|||
|
|
|||
|
Split Infinity 408 Blue Adept 52 12/21/83 - 36 YES
|
|||
|
1/21/84
|
|||
|
|
|||
|
Twilight Phone ??? System Lord 17 9/21/82 - 24 NO
|
|||
|
1/09/83
|
|||
|
|
|||
|
Twilight Zone/ 203 The Marauder 108 2/06/85 - 186 YES
|
|||
|
Septic Tank Safe Cracker * G,U 7/24/86
|
|||
|
|
|||
|
WOPR 617 Terminal Man 307 5/15/84 - 266 YES
|
|||
|
The Minute Man * G,U 1/12/85
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Alliance BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. Alliance BBS Pro-Phile written by the Sysop (Phantom Phreaker)
|
|||
|
III. 103 Messages From the Alliance BBS Message Base
|
|||
|
IV. 10 Messages From the Alliance Sub-Board on The Metal Shop BBS
|
|||
|
V. G-Philes by the System Operators
|
|||
|
1. Busy Line Verification (BLV) [Phantom Phreaker]
|
|||
|
2. An Overview of the Teradyne 4Tel System [Doom Prophet]
|
|||
|
3. Automatic Number Identification (ANI) [Phantom & Doom Prophet]
|
|||
|
4. The Facility Assignment and Control System (FACS) [Phantom]
|
|||
|
5. Step By Step Switching System Notes [Phantom Phreaker]
|
|||
|
6. Automatic Message Accounting (AMA) [Phantom Phreaker]
|
|||
|
7. Telephone Signalling Methods [Doom Prophet]
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Black Ice Private BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files (File 1)
|
|||
|
II. Black Ice Private BBS Pro-Phile by Erik Bloodaxe (File 1)
|
|||
|
III. 231 Messages from the General Sub-Board (File 1)
|
|||
|
96 Messages from the Telenet [now called SprintNet] Sub-Board (File 1)
|
|||
|
IV. 48 Messages from the Tymnet Packet Switching Network Sub-Board (File 2)
|
|||
|
54 Messages from the 'Other Networks' Sub-Board (File 2)
|
|||
|
99 Messages from the UNIX Sub-Board (File 2)
|
|||
|
57 Messages from the VAX/VMS Sub-Board (File 2)
|
|||
|
17 Messages from the PRIMOS Sub-Board (File 2)
|
|||
|
36 Messages from the 'Other Operating Systems' Sub-Board (File 2)
|
|||
|
V. 45 Messages from the Vocal Hacking [Social Eng.] Sub-Board (File 3)
|
|||
|
100 Messages from the Advanced Telecom Sub-Board (File 3)
|
|||
|
97 Messages from the SPCS/OSS Sub-Board (File 3)
|
|||
|
VI. Black Ice Private BBS Userlist as of Mid-May 1989 [Estimated] (File 3)
|
|||
|
|
|||
|
880 Messages Total
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
BroadWay Show BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. Broadway Show BBS Pro-Phile
|
|||
|
III. Portions of the Broadway Show Message Base
|
|||
|
IV. Portions of The Radio Station Message Base
|
|||
|
|
|||
|
There are approximately 180 Messages within this File.
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
CIA BBS Message Base File Table of Contents
|
|||
|
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. 30 messages from the CIA BBS Message Base
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
C.O.P.S. BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. C.O.P.S. BBS Pro-Phile written by Lodcom with help from the Co-Sysop
|
|||
|
III. 227 messages from the COPS Message Base (Including Sub-Boards)
|
|||
|
IV. G-Philes by the System Operator
|
|||
|
1. How to Crash your Favorite BBS's
|
|||
|
2. MCI Access Numbers
|
|||
|
3. ITT Served Area Codes by State
|
|||
|
4. 'Notes on the Network' Technical Info
|
|||
|
5. Mini-Directory to Compuserve
|
|||
|
6. COPS Apple Tips
|
|||
|
7. Interesting Scanner Frequencies
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Face to Face BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files (File 1)
|
|||
|
II. Face to Face BBS Pro-Phile written by Doc Holiday [Co-Sysop] (File 1)
|
|||
|
III. 196 Messages from the Face to Face [General] Sub-Board (File 1)
|
|||
|
IV. 64 Messages from the In the News Sub-Board (File 2)
|
|||
|
88 Messages from the Conferences & Seminars Sub-Board (File 2)
|
|||
|
30 Messages from the Internet Sub-Board (File 2)
|
|||
|
48 Messages from the Operation SunDevil Sub-Board (File 2)
|
|||
|
47 Messages from the UNIX OS Sub-Board (File 2)
|
|||
|
31 Messages from the Telecom Sub-Board (File 2)
|
|||
|
62 Messages from the Hacking Sub-Board (File 2)
|
|||
|
6 Messages from the Private Sector Sub-Board (File 2)
|
|||
|
|
|||
|
572 Messages Total
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Farmers Of Doom! BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. FOD BBS Pro-Phile written by the Sysop (Mark Tabas)
|
|||
|
III. 41 messages from the FOD Message Base
|
|||
|
IV. Phreak Philes by the System Operator
|
|||
|
1. Equal Access and the American Dream
|
|||
|
2. Better Homes and Blue Boxing, Parts i, ii, and iii.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Forgotten Realm BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. 13 Messages from the Packet Switching Networks Sub-Board
|
|||
|
40 Messages from the Unix/Bell Computer Systems Sub-Board
|
|||
|
56 Messages from the Telecom International Sub-Board
|
|||
|
23 Messages from the Preferred User Sub-Board
|
|||
|
|
|||
|
132 Messages Total
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Legion of Doom! BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. LOD BBS Pro-Phile
|
|||
|
III. LOD Main Menu Commands
|
|||
|
IV. 132 Messages from the LOD Main Msg Base, 'Trashing', & Local Sub-Boards
|
|||
|
V. 62 Messages from LOD and LOH Group (Private) Sub-Boards
|
|||
|
VI. LOD Internal Phreak/Hack Philes
|
|||
|
1. Social Engineering an ESS (Paul Muad'Dib)
|
|||
|
2. South Fla. COSMOS Wire Centers (Unknown Soldier & Gary Seven)
|
|||
|
3. The TEL-TEC Long Distance Service (Lex Luthor)
|
|||
|
4. Jiffy Scan V1.2 Telenet Node Scanning Pgm (Gary Seven)
|
|||
|
5. The History of ESS (Lex Luthor)
|
|||
|
6. CNA Listing as of 9/84 (Sharp Razor and X-Man)
|
|||
|
7. Hacking Bell's CAROT System (Lex Luthor)
|
|||
|
8. Hacking the HP3000 (Gary Seven)
|
|||
|
9. Credit Bureau Incorporated (Lex Luthor)
|
|||
|
10. Hacking Burroughs Computers (Blue Archer)
|
|||
|
11. IBM's JCL - Job Control Language (Master of Impact)
|
|||
|
12. Hacking Primos (Carrier Culprit)
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Metal Shop Private (MSP) BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files (File 1)
|
|||
|
II. Metal Shop BBS Pro-Phile by Taran King & Knight Lightning (File 1)
|
|||
|
III. MSP General Menu Commands Including the MSP USERLIST (File 1)
|
|||
|
IV. 166 Messages from the Phreak, Hack, and MS-Elite Sub-Boards (File 1)
|
|||
|
25 Messages from the Social Engineering Sub-Board (File 1)
|
|||
|
44 Messages from the New User Sub-Board (File 1)
|
|||
|
6 Messages from the Royal Court Sub-Board (File 1)
|
|||
|
V. 100 Messages from the General Discussion Sub-Board (File 2)
|
|||
|
100 Messages from the Phrack Sub-Board (File 2)
|
|||
|
70 Messages from the Phreak/Hack Sub-Board (File 2)
|
|||
|
10 Messages from the MSP/Alliance Private Access Sub-Board (File 2)
|
|||
|
|
|||
|
521 Messages Total
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
OSUNY BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files (File 1)
|
|||
|
II. OSUNY BBS Pro-Phile (File 1)
|
|||
|
III. Portions of the Osuny Message Base (File 1)
|
|||
|
IV. Portions of the Osuny Message Base (File 2)
|
|||
|
V. Undated OSUNY Userlist (File 2)
|
|||
|
VI. OSUNY Bulletins aka G-Philes [Approximately 30] (File 2)
|
|||
|
|
|||
|
Files 1 & 2 contain 375 messages from the original OSUNY Message Base.
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Phoenix Project BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files (File 1)
|
|||
|
II. Phoenix Project BBS Pro-Phile by Erik Bloodaxe (co-sysop) (File 1)
|
|||
|
III. Messages from the First Incarnation of the Phoenix Project:
|
|||
|
100 Messages from the Packet Switched Networks Sub-Board (File 1)
|
|||
|
58 Messages from the General Discussion Sub-Board (File 1)
|
|||
|
39 Messages from the 'Instructor' Sub-Board (File 1)
|
|||
|
IV. Some G-Philes written by the sysop, The Mentor: (File 1)
|
|||
|
1. The Conscience of a Hacker (aka The Hacker's Manifesto)
|
|||
|
2. A Novice's Guide to Hacking (1989 Edition)
|
|||
|
3. A Multi-User Chat Program for DEC-10's
|
|||
|
4. DCL Utilities for VMS Hackers
|
|||
|
V. Messages from the Second Incarnation of the Phoenix Project:
|
|||
|
132 Messages from the General Discussion Sub-Board (File 2)
|
|||
|
26 Messages from the 'We the People' Sub-Board (File 2)
|
|||
|
77 Messages from the Basic Telecom Sub-Board (File 2)
|
|||
|
58 Messages from the Hacking Sub-Board (File 2)
|
|||
|
46 Messages from the Phone Company Sub-Board (File 2)
|
|||
|
80 Messages from the SprintNet Packet Network Sub-Board (File 2)
|
|||
|
49 Messages from the BT Tymnet Sub-Board (File 2)
|
|||
|
|
|||
|
31 Messages from the Internet Sub-Board (File 3)
|
|||
|
60 Messages from the Other Packet Networks Sub-Board (File 3)
|
|||
|
69 Messages from the UNIX Sub-Board (File 3)
|
|||
|
18 Messages from the VAX/VMS Sub-Board (File 3)
|
|||
|
28 Messages from the Primos Sub-Board (File 3)
|
|||
|
41 Messages from the HP-3000 Sub-Board (File 3)
|
|||
|
42 Messages from the Other Operating Systems Sub-Board (File 3)
|
|||
|
27 Messages from the Programming Sub-Board (File 3)
|
|||
|
27 Messages from the Social Engineering Sub-Board (File 3)
|
|||
|
72 Messages from the Electronic Banking Sub-Board (File 3)
|
|||
|
32 Messages from the Radio & Electronics Sub-Board (File 3)
|
|||
|
11 Messages from the PC's Sub-Board (File 3)
|
|||
|
35 Messages from the Altered States Sub-Board (File 3)
|
|||
|
59 Messages from the Security Personnel Sub-Board (File 3)
|
|||
|
59 Messages from the Phrack Sub-Board (File 3)
|
|||
|
49 Messages from the 'Friends of the Family' PVT Sub-Board (File 3)
|
|||
|
VI. Directory of Downloadable Files Online (2nd Incarnation) (File 3)
|
|||
|
|
|||
|
1325 Messages Total
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Plover-NET BBS Message Base File Table of Contents
|
|||
|
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. Plover-NET BBS Pro-Phile written by the Sysop (Quasi Moto)
|
|||
|
III. Approximately 346 messages from the Plover-NET Message Base
|
|||
|
IV. 18 of the 35 Phreak Philes that were online.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
The Safehouse BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. Safehouse BBS Pro-Phile
|
|||
|
III. 269 messages from the Safehouse Message Base (Phreak & Merits sub's)
|
|||
|
IV. The Safehouse Userlist (undated)
|
|||
|
V. Some Phreak Philes that were available on The Safehouse
|
|||
|
1. The Fine Art of Telesearching (by The Dragyn)
|
|||
|
2. Compuserve Access Numbers (by The Hacker)
|
|||
|
3. How to Box and Not Get Caught (by The Dragyn)
|
|||
|
4. Moscow Phones
|
|||
|
5. The Best of TEL: Trashing (by The Dragyn)
|
|||
|
6. Secret Signals (by Texas Star)
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Sherwood Forest I BBS Message Base File Table of Contents
|
|||
|
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. Sherwood Forest I BBS Pro-Phile written by Lord Digital
|
|||
|
III. Sherwood Forest I Userlist
|
|||
|
IV. 46 messages from the Phreak and Hack Sub-Boards of the Message Base
|
|||
|
V. 46 messages from the Knights of Shadow Phreak Group's Private Sub-Board
|
|||
|
|
|||
|
Total Number of Messages in this File: 92.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Sherwood Forest II BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. Sherwood Forest II BBS Pro-Phile
|
|||
|
III. 100 Messages from the SF2 Message Base
|
|||
|
IV. G-Philes by the Co-Sysop, Bioc Agent 003
|
|||
|
1. Hacking Morality by Big Brother
|
|||
|
2. The Book of Bioc
|
|||
|
3. Hacking Western Union's Easylink by Bioc & TUC
|
|||
|
4. Bioc's Basic Telecom: Parts I through VII
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Split Infinity BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. Split Infinity BBS Pro-Phile written by Sir Francis Drake
|
|||
|
III. 52 Messages from the Split Infinity Phreak Sub-Board Message Base
|
|||
|
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Twilight Phone BBS Message Base File Table of Contents
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. 17 messages from the Twilight Phone Message Base
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Twilight Zone BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. Twilight Zone BBS Pro-Phile written by the Sysop
|
|||
|
III. Twilight Zone Userlist
|
|||
|
IV. Portions of the Twilight Zone Message Base (Including Sub-Boards)
|
|||
|
V. Portions of The Septic Tank Message Base
|
|||
|
VI. G-Philes by the System Operator
|
|||
|
1. Septic Tank INWATS Database Volume I - updated 6-26-86
|
|||
|
2. Understanding the Traffic Services Position System (TSPS)
|
|||
|
3. GETPAS - RSTS/E Basic Program to Hack Passwords.
|
|||
|
4. Inside RSTS Volumes I through IV.
|
|||
|
5. Hacking RSTS/E V9.X-XX
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
WOPR BBS Message Base File Table of Contents
|
|||
|
|
|||
|
I. General Remarks About the BBS Message Base Files
|
|||
|
II. WOPR BBS Pro-Phile
|
|||
|
III. 307 messages from the WOPR Message Base (Including the Hack Sub-Board)
|
|||
|
IV. G-Philes by the System Operator
|
|||
|
1. How To Use GTE Telenet
|
|||
|
2. Introduction to Dec-10 and Dec-20 Computers
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
End of Volume #1 TOC File.
|
|||
|
|
|||
|
|
|||
|
LOD Communications: Leaders in Engineering, Social and Otherwise ;)
|
|||
|
|
|||
|
Email: lodcom@mindvox.phantom.com
|
|||
|
Voice Mail: 512-448-5098
|
|||
|
Snail Mail: LOD Communications
|
|||
|
603 W. 13th
|
|||
|
Suite 1A-278
|
|||
|
Austin, Texas USA 78701
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 20 Aug 1993 18;21:43 EDT
|
|||
|
From: eff@eff.org
|
|||
|
Subject: File 7--Graduate Paper Competition for CFP-'94
|
|||
|
|
|||
|
STUDENT PAPER COMPETITION
|
|||
|
|
|||
|
Full time college or graduate students are invited to enter the
|
|||
|
student paper competition. Papers must not exceed 2500 words and
|
|||
|
should address the impact of computer and telecommunications
|
|||
|
technologies on freedom and privacy in society. Winners will
|
|||
|
receive a scholarship to attend the conference and present their
|
|||
|
papers. All papers should be submitted by November 1, 1993 (either
|
|||
|
as straight text via e-mail or 6 printed copies) to:
|
|||
|
|
|||
|
Prof. Eugene Spafford
|
|||
|
Department of Computer Sciences
|
|||
|
1398 Computer Science Building
|
|||
|
Purdue University
|
|||
|
West Lafayette, IN 47907-1398
|
|||
|
E-Mail: spaf@cs.purdue.edu; Voice: 317-494-7825
|
|||
|
|
|||
|
|
|||
|
REGISTRATION
|
|||
|
|
|||
|
Registration information and fee schedules will be announced by
|
|||
|
September 1, 1993. Inquiries regarding registration should be
|
|||
|
directed to RoseMarie Knight, Registration Chair, at the JMLS
|
|||
|
address above; her voice number is 312-987-1420.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.64
|
|||
|
************************************
|
|||
|
|