931 lines
41 KiB
Plaintext
931 lines
41 KiB
Plaintext
|
Computer underground Digest Sun Oct 16, 1994 Volume 6 : Issue 90
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Retiring Shadow Archivist: Stanton McCandlish
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Urban Legend Editor: E. Greg Shrdlugold
|
||
|
|
||
|
CONTENTS, #6.90 (Sun, Oct 16, 1994)
|
||
|
|
||
|
File 1--"Operation Sundevil" is finally over for Dr. Ripco
|
||
|
File 2--Turing Test Conference
|
||
|
File 3--Internet Security: Secure Comm over Untrusted Networks
|
||
|
File 4--CPSR Award to Antonia Stone
|
||
|
File 5--"Tastes like Chicken" ("chicken" domain explanation/Canada)
|
||
|
File 6--More Gems from Spam-meister Siegel (NYT Excerpts)
|
||
|
File 7--Cu Digest Header Information (unchanged since 10 Sept 1994)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
----------------------------------------------------------------------
|
||
|
|
||
|
Date: Sat, 8 Oct 1994 00:57:06 -0500 (CDT)
|
||
|
From: bje@RIPCO.COM(Bruce Esquibel)
|
||
|
Subject: File 1--"Operation Sundevil" is finally over for Dr. Ripco
|
||
|
|
||
|
((MODERATORS' NOTE: I first learned of Operation Sundevil, part of
|
||
|
the US Secret Service's "hacker crackdown" of 1990 described by Bruce
|
||
|
Sterling in the book of the same name, the day after it happened.
|
||
|
I called RIPCO BBS in Chicago and received a voice message instead of
|
||
|
the familiar computer tone. Dr. Ripco and Ripco BBS had been busted,
|
||
|
and he bade farewell to us all:
|
||
|
|
||
|
This is 528-5020.
|
||
|
|
||
|
As you are probably aware, on May 8, the Secret Service
|
||
|
conducted a series of raids across the country. Early news
|
||
|
reports indicate these raids involved people and computers
|
||
|
that could be connected with credit card and long distance
|
||
|
toll fraud. Although no arrests or charges were made, Ripco
|
||
|
BBS was confiscated on that morning. It's involvement at
|
||
|
this time is unknown. Since it is unlikely that the system
|
||
|
will ever return, I'd just like to say goodbye, and thanks
|
||
|
for your support for the last six and a half years. It's
|
||
|
been interesting, to say the least.
|
||
|
|
||
|
Talk to ya later. %Dr. Ricpo%
|
||
|
|
||
|
The raiders carted off Dr. Ripco's BBS-related computer hardware,
|
||
|
books, posters, and other possessions. No computer-related charges
|
||
|
were filed against Dr Ripco then or since. Nor was he given any
|
||
|
indication that he was under suspicion for any offense. For over four
|
||
|
years, he remained in legal limbo, while over $15,000 worth of
|
||
|
computer equipment depreciated in government possession.
|
||
|
|
||
|
Because of its lively and diverse message boards, the large
|
||
|
cross-section of users, and the exceptional competence of Dr. Ripco as
|
||
|
a sysop, the BBS became one of the most popular "underground" boards
|
||
|
in the country in the 1980s. Despite its reputation as a "hacker
|
||
|
haven," Ripco was an open system with at that time one of the best
|
||
|
collection of text files in the nation. As we reported in CuD 3.02 in
|
||
|
1991, it also attracted an informant known as "The Dictator," also
|
||
|
identified as "Dale Drew." According to court documents, "The
|
||
|
Dictator's" reports were the primary "evidence" to justify the Ripco
|
||
|
raid.
|
||
|
|
||
|
When announcing the news of Operation Sundevil, Secret Service
|
||
|
spokespersons lauded its scope--150 USSS agents in addition to local
|
||
|
law enforcement support, 13 cities, 28 search warrants, 23,000 seized
|
||
|
computer disks--they had no reason to suspect that their
|
||
|
then-perceived "success" would quickly turn into a major embarrassment
|
||
|
of comic proportions (see CuD 1.09 for Sundevil news). A few
|
||
|
eventual arrests--some of which were not Sundevil dependant--were
|
||
|
the only demonstrable outcome. Even these were tarnished by USSS and
|
||
|
others' hyperbole and similar excesses: The ludicrous claim that this
|
||
|
"group" was responsible for what one newspaper reported as "up to $50
|
||
|
million" in fraud costs, the questionable use of an informant, the
|
||
|
seemingly indiscriminate manner in which equipment was seized, the
|
||
|
lack of subsequent information to convince a skeptical community that
|
||
|
the raids' excesses were warranted--soon had Sundevil operatives on
|
||
|
the defensive. Some of those responsible for Sundevil, such as USDA
|
||
|
Bill Cook and USSS special agent Tim Foley, were successfully sued in
|
||
|
civil court for their excesses in raiding Steve Jackson Games a few
|
||
|
months earlier. One high-profile state prosecutor closely associated
|
||
|
with Sundevil often cautioned critics to "wait until all the facts
|
||
|
come out," presumably because the operation and those who planned it
|
||
|
would be vindicated.
|
||
|
|
||
|
After over four years, vindicating facts have not yet emerged. Quite
|
||
|
the opposite: Sundevil was costly, had few significant results,
|
||
|
produced few directly-related indictments or convictions, proved a
|
||
|
major public relations disaster, and messed up some innocent lives.
|
||
|
|
||
|
Sundevil did, however, have some significant unintended
|
||
|
consequences. It galvanized the cybercommunity, increased the
|
||
|
visibility of The Electronic Frontier Foundation (EFF) and Computer
|
||
|
Professionals for Social Responsibility (CPSR), and led to the
|
||
|
involvement of many individuals and groups in monitoring and shaping
|
||
|
legislation affecting the "information infrastructure."
|
||
|
|
||
|
Ripco BBS returned to operation a few months after the raid more
|
||
|
popular than ever, and has since evolved into a sophisticated system
|
||
|
linked to the Internet. The original telephone number is the same,
|
||
|
although it now has multiple lines to accommodate all the users.
|
||
|
|
||
|
And, for Dr. Ripco, Operation Sundevil has finally come to a close.
|
||
|
His equipment was finally returned, although the original files
|
||
|
were erased. Ripco can be reached at (312) 528-5020.))
|
||
|
|
||
|
== Dr. Ripco's report on events this week ==
|
||
|
|
||
|
Hiya Jim,
|
||
|
|
||
|
Besides offering greetings I just wanted to let you know that
|
||
|
Operation Sundevil is officially closed, I guess.
|
||
|
|
||
|
Ripco (the original) came home to roost, the SS finally released the
|
||
|
seized hardware and I picked it up today. From what I gathered I was
|
||
|
the last one to get out of their hair.
|
||
|
|
||
|
I know SJ had some problems but surprisingly, everything seems to be
|
||
|
in fairly good shape. My guess is it all probably just sat in storage.
|
||
|
|
||
|
Although it physically is back, the system isn't. One condition was to
|
||
|
have all the data erased prior to return because of the copyrighted
|
||
|
pirate warez lurking about. The guy from the justice department said
|
||
|
it wouldn't look right to just return it, would put the feds in the
|
||
|
light that it was ok to have it with their blessing.
|
||
|
|
||
|
I suppose I could of cut some deal leaving the non-warez intact but
|
||
|
after seeing it take 4 1/2 years just to make up their mind to return
|
||
|
it, I didn't feel like waiting another 4 for someone to sort
|
||
|
everything out. A few pieces of the hardware still have some value
|
||
|
today, the old bbs would only have historical value.
|
||
|
|
||
|
It would also appear (Secret Service agents) Foley & Golden are/were
|
||
|
the butt of some inside joke.
|
||
|
Every time their names were mentioned, someone either rolled their eyes or
|
||
|
engaged in jest. The new guy in charge (Greg Meyer) seemed pretty cool
|
||
|
overall. I know, never trust a fed, but it was interesting he had the same
|
||
|
attitude like the guy in D.C. (Josuha Silverman), a hint of
|
||
|
embarrassment and total lack of logic behind the whole thing. It
|
||
|
appears the computer fraud division, at least here in the Chicago
|
||
|
office is more aiming at counterfeiting.
|
||
|
|
||
|
Anyway, I wanted to say thanks for everything. I don't know what would
|
||
|
have happened if we didn't communicate early on, but it's unlikely
|
||
|
things would have ended in a whimper like it did. I'm totally
|
||
|
convinced the efforts of CuD, the EFF and CPSR made a major impact on
|
||
|
all of this; it put the feds in a defensive position instead of
|
||
|
offensive. Things could always have come out better but you have to be
|
||
|
grateful for what you have.
|
||
|
|
||
|
Thanks much Jim, all your efforts and assistance is deeply
|
||
|
appreciated.
|
||
|
|
||
|
Bruce Esquibel (Dr. Ripco)
|
||
|
bje@ripco.com
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 8 Sep 1994 00:10:27 -0700 (PDT)
|
||
|
From: Robert Epstein <repstein@NUNIC.NU.EDU>
|
||
|
Subject: File 2--Turing Test Conference
|
||
|
|
||
|
**********************************************************************
|
||
|
NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS
|
||
|
For Immediate Release September 1, 1994
|
||
|
**********************************************************************
|
||
|
|
||
|
INTERNATIONAL QUEST FOR THINKING COMPUTER
|
||
|
TO BE HELD IN SAN DIEGO
|
||
|
(Human vs. Computers on December 16th)
|
||
|
|
||
|
In the very near future, many believe that human beings will be
|
||
|
joined by an equally intelligent species -- computers so smart that they
|
||
|
can truly think, converse, and perhaps even feel.
|
||
|
|
||
|
To expedite the search for this new species, the fourth annual
|
||
|
Loebner Prize Competition in Artificial Intelligence will be held at
|
||
|
the new San Marcos campus of California State University on Friday,
|
||
|
December 16th, 1994. The Loebner Prize pits humans against
|
||
|
computers in what the Wall Street Journal described as "a groundbreaking
|
||
|
battle." The first three competitions drew national and international
|
||
|
media coverage.
|
||
|
|
||
|
In the event, human judges converse at computer terminals and
|
||
|
attempt to determine which terminals are controlled by fellow humans and
|
||
|
which by computers. For the 1994 competition, conversation will be
|
||
|
restricted to certain topics. This year, as in 1993, all judges will be
|
||
|
members of the national press. The 1993 judges represented TIME
|
||
|
Magazine, Popular Science, PBS, the Voice of America, and elsewhere. The
|
||
|
contest has drawn media attention around the world, including coverage on
|
||
|
CNN television, PBS television, the New York Times (front page), the
|
||
|
Washington Post, the London Guardian, The Economist, the San Diego Union
|
||
|
Tribune (front page), Science News, and many periodicals in the computer
|
||
|
field, including Computerworld and AI Magazine (cover story).
|
||
|
|
||
|
"Surprisingly, in early competitions, some of the computers fooled
|
||
|
some of the judges into thinking they were people," said Dr. Robert
|
||
|
Epstein, Research Professor at National University, Director Emeritus of
|
||
|
the Cambridge Center for Behavioral Studies, and the organizer and
|
||
|
director of the three previous contests.
|
||
|
|
||
|
The author of the winning software of this year's event will receive
|
||
|
$2,000 and a bronze medal. In 1995, Epstein said, the first open-ended
|
||
|
contest -- one with no topic restrictions -- will be conducted. When a
|
||
|
computer can pass an unrestricted test, the grand prize of $100,000 will
|
||
|
be awarded, and the contest will be discontinued.
|
||
|
|
||
|
The competition is named after benefactor Dr. Hugh G. Loebner of New
|
||
|
York City and was inspired by computer pioneer Alan Turing, who in 1950
|
||
|
proposed a test like the Loebner contest as a way to answer the question:
|
||
|
Can computers think?
|
||
|
|
||
|
Transcripts of conversations during the first three competitions are
|
||
|
available from the Cambridge Center for Behavioral Studies (telephone
|
||
|
617-491-9020). Diskettes that will play back the conversations in real
|
||
|
time may also be purchased.
|
||
|
|
||
|
A partial list of sponsors of previous competitions includes: Apple
|
||
|
Computers, Computerland, Crown Industries, GDE Systems, IBM Personal
|
||
|
Computer Company's Center for Natural Computing, Greenwich Capital
|
||
|
Markets, Motorola, the National Science Foundation, The Alfred P. Sloan
|
||
|
Foundation, and The Weingart Foundation.
|
||
|
|
||
|
Application guidelines: Official rules and an application may be
|
||
|
obtained by contacting Dr. Robert Epstein, Contest Director, 933
|
||
|
Woodlake Drive, Cardiff by the Sea, CA 92007-1009 Tel: 619-436-4400
|
||
|
Fax: 619-436-4490 Internet: repstein@nunic.nu.edu * The deadline for
|
||
|
receipt of applications is November 1, 1994. * Applications must be
|
||
|
accompanied by printed protocols recording actual interaction between the
|
||
|
system to be entered and one or more humans. The protocols may not
|
||
|
exceed ten double-spaced pages. * Applications must specify a single
|
||
|
domain of discourse in which the computer system is proficient. The
|
||
|
domain must be expressed by an English phrase containing no more than
|
||
|
five words. * Each entry must communicate using approximations of
|
||
|
natural English, and it must be prepared to communicate for an indefinite
|
||
|
period of time. * Computer entries may contain standard or customized
|
||
|
hardware and software. The hardware may be of any type as long as it is
|
||
|
inorganic and as long as its replies are not controlled by humans
|
||
|
responding in real time to the judges' inputs. * Entrants must be
|
||
|
prepared to interface their systems to standard computer terminals over
|
||
|
telephone lines at 2400 baud. * The prize will be awarded if there is
|
||
|
at least one entry.
|
||
|
|
||
|
Advance notice of new guidelines for 1995: The 1995 event will be
|
||
|
an unrestricted Turing Test, requiring computer entries to be able to
|
||
|
converse for an indefinite period of time with no topic restrictions. In
|
||
|
1995, entries may be required to run on hardware located at the
|
||
|
competition site.
|
||
|
|
||
|
For further information: Complete transcripts and IBM-compatible
|
||
|
diskettes that play the 1991, 1992, and 1993 conversations in real-time
|
||
|
are available for purchase from the Cambridge Center for Behavioral
|
||
|
Studies (tel: 617-491-9020). Sponsorship opportunities are available.
|
||
|
|
||
|
|
||
|
************************
|
||
|
CONTACTS:
|
||
|
|
||
|
Dr. Robert Epstein
|
||
|
Contest Director
|
||
|
619-436-4400 (fax 4490)
|
||
|
repstein@nunic.nu.edu
|
||
|
|
||
|
Dr. Hugh G. Loebner
|
||
|
Prize Donor
|
||
|
201-672-2277 (fax 7536)
|
||
|
loebner@acm.org
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
From: voidstar@NETCOM.COM(Scott Corcoran)
|
||
|
Subject: File 3--Internet Security: Secure Comm over Untrusted Networks
|
||
|
Date: Thu, 22 Sep 1994 08:35:44 GMT
|
||
|
|
||
|
INTERNET SECURITY
|
||
|
SECURE COMMUNICATIONS OVER UNTRUSTED NETWORKS
|
||
|
|
||
|
A one-day seminar on November 12, 1994
|
||
|
Embarcadero Hyatt Regency Hotel in San Francisco.
|
||
|
|
||
|
|
||
|
Methods of achieving authentication, authorization,
|
||
|
confidentiality, integrity, and nonrepudiation are key to the
|
||
|
successful realization of the National Information
|
||
|
Infrastructure (NII). Today's Internet is a proving ground for
|
||
|
what will become the NII.
|
||
|
|
||
|
The San Francisco Chapter of the IEEE Computer Society has put
|
||
|
together an outstanding program on encryption, intrusion
|
||
|
detection, firewalls, architectures, and protocols for Internet
|
||
|
Security. Speakers in this seminar will describe several of
|
||
|
the main techniques that exist today and the directions in
|
||
|
which they are evolving. The seminar will be helpful to
|
||
|
engineers, engineering managers and product planners seeking
|
||
|
current knowledge of Internet Security.
|
||
|
|
||
|
|
||
|
PROGRAM
|
||
|
|
||
|
8:30 a.m. Registration opens
|
||
|
|
||
|
9:00 a.m. Introduction
|
||
|
|
||
|
9:05 a.m. Keynote Address James Bidzos, President of RSA
|
||
|
|
||
|
9:45 a.m. Steven Bellovin, Ph.D., Bell Labs
|
||
|
"Firewalls for Computer Security"
|
||
|
|
||
|
11:00 a.m. Teresa Lunt, SRI
|
||
|
"Intrusion Detection"
|
||
|
|
||
|
11:45 a.m. Round Table Lunch (incl. with registration)
|
||
|
|
||
|
1:00 p.m. Professor Martin E. Hellman, Ph.D., Stanford
|
||
|
"Cryptography: The Foundation of Secure Networks"
|
||
|
|
||
|
2:00 p.m. Dan Nessett, Ph.D.,
|
||
|
SunSoft and PSRG
|
||
|
"Future Internet Security Architecture"
|
||
|
|
||
|
3:00 p.m. Matt Blaze, Ph.D., Bell Labs
|
||
|
"Protocols: Security Without Firewalls"
|
||
|
|
||
|
4:00 p.m. "Public Safety vs. Private Liberty"
|
||
|
A Panel Discussion on the Social
|
||
|
Implications of Internet Security
|
||
|
Rex Buddenberg NPS
|
||
|
Alan McDonald FBI
|
||
|
Stewart Baker formerly of the NSA
|
||
|
James Bidzos President of RSA
|
||
|
Matt Blaze Bell Labs
|
||
|
Martin Hellman Stanford
|
||
|
|
||
|
|
||
|
A one day seminar in San Francisco, on Saturday, November 12th,
|
||
|
covering private and public-key encryption, key-escrow,
|
||
|
fire-walls, architecture and protocols for security,
|
||
|
intrustion detection, and a spirited panel discussion on
|
||
|
"Public Safety vs. Private Liberty" !
|
||
|
|
||
|
SEATING IS LIMITED. PRE-REGISTER BY OCTOBER 15TH.
|
||
|
|
||
|
|
||
|
9:05 Keynote Address
|
||
|
|
||
|
James Bidzos, President of RSA
|
||
|
|
||
|
James Bidzos, President of RSA Data Security, will present the
|
||
|
keynote address. Mr. Bidzos heads a company whose encryption
|
||
|
technologies are licensed for products ranging from computer
|
||
|
operating systems, to software copy protection, to electronic
|
||
|
mail, to secure telephones. RSA has licensed several million
|
||
|
copies of its encryption software, and has become a focal point
|
||
|
for debate on appropriate application of cryptography.
|
||
|
|
||
|
Mr. Bidzos has gained a unique perspective on the requirements
|
||
|
of effective cryptographic systems. He will highlight the
|
||
|
problem of providing strong encryption for users of computer
|
||
|
networks while meeting the legitimate needs of law enforcement
|
||
|
|
||
|
|
||
|
9:45 Steven Bellovin, Ph.D., Bell Labs
|
||
|
"Firewalls for Computer Security"
|
||
|
|
||
|
When you connect your computer to the Internet, you also create
|
||
|
a channel into your computer. Clever vandals, thieves and
|
||
|
industrial spies have found ways to abuse most of the Internet
|
||
|
protocols from FTP and Telnet to the World Wide Web and
|
||
|
Network Time Protocols. Short of pulling the plug, firewalls
|
||
|
provide the surest defense. The firewall administrator must
|
||
|
keep abreast of new methods of attack and understand how
|
||
|
firewalls can mitigate the threat. Steven M. Bellovin, Ph.D.,
|
||
|
is a senior researcher at AT&T's Bell Laboratories and
|
||
|
co-author of the well known guide "Firewalls and Internet
|
||
|
Security: Repelling the Wily Hacker." As one responsible for
|
||
|
protecting "the phone company" from Internet hackers, Dr. Bellovin
|
||
|
can describe from firsthand experience how firewalls can be
|
||
|
constructed to screen them out. Dr. Bellovin will join us in a
|
||
|
live video teleconference from Bell Laboratories.
|
||
|
|
||
|
11:00 Teresa Lunt, SRI "Intrusion Detection"
|
||
|
|
||
|
Inevitably, someone will try to breach your firewall and might
|
||
|
succeed. The time it takes you to discover the intrusion and
|
||
|
catch the culprit depends on the event logging you have
|
||
|
established. However, logging the many different transactions
|
||
|
that might expose trespassing produces mountains of data.
|
||
|
Automatic digestion of the logs is the only hope of monitoring
|
||
|
them all. Teresa F. Lunt, Director of Secure Systems Research
|
||
|
at SRI's Computer Systems Laboratory, directs work in
|
||
|
multilevel database systems and intrusion detection. Ms. Lunt
|
||
|
will describe intrusion detection and demonstrate automated
|
||
|
tools developed at SRI to analyze audit data for suspicious
|
||
|
behavior.
|
||
|
|
||
|
1:00 Professor Martin E. Hellman, Ph.D., Stanford
|
||
|
"Cryptography: The Foundation of Secure Networks"
|
||
|
|
||
|
Data in transit across unsecured networks like the Internet
|
||
|
are subject to wiretapping attacks and impersonation.
|
||
|
Moreover, privacy of communication and authentication of the
|
||
|
sender's message are essential to Internet commerce, with
|
||
|
exchange of contracts, receipts, credit card drafts and the
|
||
|
like increasingly commonplace. Encryption can solve some of
|
||
|
these problems, but what kind of encryption? Authentication
|
||
|
only or encrypted messages? Secret key or public key, or
|
||
|
both? Will you need a giant key ring for mes sage keys,
|
||
|
session keys, file keys, and passwords? Martin E. Hellman,
|
||
|
Ph.D., Professor of Electrical Engineering at Stanford
|
||
|
University, is co-inventor of public key cryptography with
|
||
|
Whitfield Diffie and Ralph Merkle. He was elected a Fellow of
|
||
|
the IEEE for contributions to cryptography. Dr. Hellman will
|
||
|
explore threats to communication and costs of electronic
|
||
|
countermeasures. He will explain the importance and means of
|
||
|
authenticating electronic messages, and he will survey public key
|
||
|
cryptography. Dr. Hellman will describe public key techniques
|
||
|
including Rivest-Shamir-Adleman (RSA), Diffie-Hellman, ElGamal
|
||
|
and Digital Signature Standard (DSS). He will also describe
|
||
|
the current status of export control and encryption standards
|
||
|
such as the Data Encryption Standard (DES), Escrowed
|
||
|
Encryption Standard (EES) and its encryption algorithm,
|
||
|
Skipjack, which is implemented in Clipper and Capstone chips.
|
||
|
|
||
|
2:00 Dan Nessett, Ph.D., SunSoft and PSRG
|
||
|
"Future Internet Security Architecture"
|
||
|
|
||
|
Dan Nessett, Ph.D., of the SunSoft Division of Sun
|
||
|
Microsystems, and until recently with Lawrence Livermore
|
||
|
National Laboratory, has worked extensively in local area
|
||
|
networks, distributed operating systems and distributed systems
|
||
|
security. He is a member of the Privacy and Security Research
|
||
|
Group (PSRG), which is convened under the auspices of the
|
||
|
Internet Society. Dr. Nessett will explain the emerging
|
||
|
Internet security architecture work undertaken by the PSRG.
|
||
|
The architecture will guide the development of security
|
||
|
mechanisms used in Internet standards.
|
||
|
|
||
|
|
||
|
3:00 Matt Blaze, Ph.D., Bell Labs
|
||
|
"Protocols: Security Without Firewalls"
|
||
|
|
||
|
We use firewalls because Internet protocols are not inherently
|
||
|
secure. Can we rehabilitate the Internet protocols to produce
|
||
|
protocols which are secure, not computationally prohibitive,
|
||
|
and compatible with existing protocols? Matt Blaze, Ph.D., of
|
||
|
Bell Laboratories will talk about the problems of integrating
|
||
|
cryptographic protection into large-scale network infrastructure.
|
||
|
Dr. Blaze is the author of "A Cryptographic
|
||
|
File System for Unix," presented at the 1993 ACM Conference on
|
||
|
Communications and Computer Security, and co-author with John
|
||
|
Ioann idis of "The Architecture and Implementation of
|
||
|
Network-Layer Security Under UNIX," which describes "swIPe," a
|
||
|
network-layer security protocol for the IP protocol suite.
|
||
|
Dr. Blaze will address issues concerning network security
|
||
|
protoc ols, key management and distribution, and threats and
|
||
|
models for cryptographic engineering.
|
||
|
|
||
|
4:00 A Panel Discussion on the Social Implications of
|
||
|
Internet Security "Public Safety vs. Private Liberty"
|
||
|
|
||
|
At one end of an imagined security spectrum lies the
|
||
|
information police-state. Through traffic analysis,
|
||
|
mandatory personal ID numbers and escrowed encryption, and
|
||
|
the ability to record all messages and commerce carried out
|
||
|
on the Information Superhighway, governments could maintain
|
||
|
dossiers on every aspect of the personal life and business
|
||
|
of its citizens. Privacy advocates fear that a corrupt government
|
||
|
could use such information against its political enemies and to
|
||
|
subvert personal freedoms. At the other extreme lies information
|
||
|
anarchy. Through the use of digital cash, anonymous remailers,
|
||
|
and strong non-escrowed encryption, the Information
|
||
|
Superhighway could become a hide-out for criminals and
|
||
|
national security threats. The potential for black-market
|
||
|
activity and the associated tax-evasion is so enormous that
|
||
|
some have speculated that governments could eventually
|
||
|
collapse. Law-enforcem ent advocates fear that they will be
|
||
|
unable to keep up with criminals and terrorists who ply their
|
||
|
trade electronically. Our distinguished panel will provide
|
||
|
insight into the interplay between the rights of individuals
|
||
|
to privacy and freedom, the rights of companies to conduct
|
||
|
unrestrained trade, and the ability of law enforcement and
|
||
|
security agencies to perform their functions efficiently.
|
||
|
This conclusion to the seminar will put into perspective
|
||
|
the social changes that might be wrought by the technical
|
||
|
advances discussed earlier in the day.
|
||
|
|
||
|
Panelists include:
|
||
|
|
||
|
Rex Buddenberg NPS
|
||
|
Alan McDonald FBI
|
||
|
Stewart Baker formerly of the NSA
|
||
|
James Bidzos President of RSA
|
||
|
Matt Blaze Bell Labs
|
||
|
Martin Hellman Stanford
|
||
|
|
||
|
Rex Buddenberg, Instructor of information systems architecture
|
||
|
and applied networking at the Naval Postgraduate School, will
|
||
|
moderate the panel. Mr. Buddenberg is a maritime command,
|
||
|
communication, control and intelligence (C3I) consultant and a
|
||
|
computer networking author. As a C3I architect for the U.S.
|
||
|
Coast Guard, he developed plans and specifications for
|
||
|
extending Internet connectivity to oceanographic ships. Mr.
|
||
|
Buddenberg contemplates the means and effects of net warfare as
|
||
|
both the good guys and bad guys share the same network.
|
||
|
|
||
|
Alan McDonald, Special Counsel for Electronic Surveillance Matters,
|
||
|
Information Resources Division, Federal Bureau of Investigation,
|
||
|
is a specialist in the law and policy concerning electronic
|
||
|
surveillance, Digital Telephony, and encryption issues.
|
||
|
He frequently represents the FBI's view of law enforcement equities
|
||
|
in light of advanced telecommunications and encryption.
|
||
|
|
||
|
Stewart Baker is a former General Counsel to the NSA and
|
||
|
a partner in Steptoe & Johnson, a Washington, DC law firm.
|
||
|
His expertise is in telecommunications, computer export policy,
|
||
|
security of national information infrastructure and encryption.
|
||
|
Mr. Baker brings direct experience with the problem that strong
|
||
|
encryption creates for the NSA in protecting our national
|
||
|
security.
|
||
|
|
||
|
|
||
|
QUESTIONS? CALL (415)-327-6622.
|
||
|
|
||
|
Cut-off and complete this form, enclose your check payable to
|
||
|
the IEEE SFCS, and mail to: IEEE Council Office 701 Welch
|
||
|
Rd. #2205 Palo Alto, CA. 94304
|
||
|
|
||
|
To qualify for the reduced Pre-registration fees, your
|
||
|
application with check must be postmarked no later than Oct.
|
||
|
15, 1994. Registration fee includes lunch, refreshments, and
|
||
|
parking. Seating is limited. To make sure the seminar is
|
||
|
not sold out, call (415) 327-6622.
|
||
|
|
||
|
please check the appropriate box
|
||
|
|
||
|
Fees on or before Oct. 15th:
|
||
|
|
||
|
___ IEEE Member $ 110
|
||
|
___ Non-member $ 120
|
||
|
___ Student $ 85
|
||
|
|
||
|
Fees after Oct. 15th:
|
||
|
___ IEEE Member $ 125
|
||
|
___ Non-member $ 145
|
||
|
___ Student $ 100 (students must present ID)
|
||
|
|
||
|
|
||
|
The seminar location is the Hyatt Regency Embarcadero Hotel,
|
||
|
near the Ferry Building, in San Francisco.
|
||
|
Your registration fee includes the all day seminar, lunch,
|
||
|
and convenient parking in the garages underneath adjacent
|
||
|
Embarcadero Centers 1, 2, or 3. (Keep your ticket for validation).
|
||
|
|
||
|
|
||
|
Please print clearly:
|
||
|
|
||
|
Name : __________________________________________
|
||
|
|
||
|
Title : __________________________________________
|
||
|
|
||
|
Company: __________________________________________
|
||
|
|
||
|
Address: __________________________________________
|
||
|
|
||
|
__________________________________________
|
||
|
|
||
|
_______________________________ ___ ______
|
||
|
|
||
|
Day phone #:(___)_____-_______
|
||
|
|
||
|
IEEE member (or affiliate) #:_______ ____ (for discount)
|
||
|
|
||
|
College/University (if student):___________________
|
||
|
|
||
|
___ Vegetarian lunch option
|
||
|
|
||
|
|
||
|
Refunds will be honored through October 22nd, substitutions
|
||
|
any time. Additional information can be obtained by telephoning
|
||
|
the IEEE Bay Area Council Office: (415)327-6622.
|
||
|
|
||
|
IEEE SFCS RESERVES THE RIGHT TO MAKE CHANGES TO THE SEMINAR
|
||
|
|
||
|
Sponsored by the San Francisco Chapter of the IEEE Computer
|
||
|
Society. The IEEE is a non-profit organization.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 7 Oct 94 16:27:22 PDT
|
||
|
From: email list server <listserv@SUNNYSIDE.COM>
|
||
|
Subject: File 4--CPSR Award to Antonia Stone
|
||
|
|
||
|
|
||
|
Playing To Win Founder Antonia Stone
|
||
|
Wins Prize for Social Responsibility
|
||
|
|
||
|
|
||
|
Palo Alto, Calif., October 6, 1994 - Computer Professionals for Social
|
||
|
Responsibility (CPSR), the national public interest organization based here,
|
||
|
announced today that Playing to Win founder Antonia Stone is the 1994
|
||
|
winner of the Norbert Wiener Award for Social and Professional
|
||
|
Responsibility. The award is presented annually to a distinguished
|
||
|
computer professional who has, through personal example, demonstrated a
|
||
|
deep commitment to the socially responsible use of computing technology.
|
||
|
|
||
|
"The greatest danger on the horizon for the National Information
|
||
|
Infrastructure is that we will be left with two societies: a privileged classs
|
||
|
that enjoys the benefits of the information age, and another that is left
|
||
|
behind with none of those advantages," said Stanford professor and CPSR
|
||
|
board president Eric Roberts. "Through her work with Playing To Win,
|
||
|
Antonia Stone has been fighting for years to achieve the equality of access
|
||
|
necessary to empower all of us together."
|
||
|
|
||
|
"I'm thrilled," said Stone. "I believe that CPSR, in recognizing the work
|
||
|
I've been doing by honoring me with the Norbert Wiener award,
|
||
|
emphasizes the importance of a grass-roots effort towards real equity of
|
||
|
technology access, and the need to offer opportunities for learning about
|
||
|
and hands-on use of technology to those who otherwise wouldn't have such
|
||
|
an opportunity."
|
||
|
|
||
|
Stone will be presented with the Wiener award at CPSR's annual meeting
|
||
|
banquet in San Diego, California, on Saturday, October 8th. This year's
|
||
|
annual meeting is a two-day conference entitled "Organizing for Access: A
|
||
|
National Forum on Computer Networking, Community Action and
|
||
|
Democracy", that will bring together local, regional and national activists
|
||
|
and decision makers to take a critical look at some of the social implications
|
||
|
of the NII.
|
||
|
|
||
|
Stone has worked in the area of computer learning since the 1970s. After
|
||
|
an intense period of fundraising and outreach, she opened a computer
|
||
|
center in a basement room of a Harlem housing project. Starting from that
|
||
|
base, with Stone serving as Executive Director from 1980 through 1992, the
|
||
|
Playing to Win network has grown to over 45 affiliates located across the
|
||
|
US as well as in Poland and Northern Ireland.
|
||
|
|
||
|
The PTW network of non-profit groups is dedicated to promoting and
|
||
|
providing equitable technology access and education for economically,
|
||
|
socially, and geographically disadvantaged people. PTW seeks to establish a
|
||
|
national community of neighborhood technology access providers
|
||
|
dedicated to true universal technological enfranchisement. Each PTW
|
||
|
community computer center shares a belief that everyone can learn as
|
||
|
long as they are allowed to follow their own motivational path and develop
|
||
|
according to their own interests.
|
||
|
|
||
|
The Wiener Award was established in 1987 in memory of Norbert Wiener,
|
||
|
the originator of the field of cybernetics and a pioneer in looking at the
|
||
|
social and political consequences of computing. Author of the book, The
|
||
|
Human Use of Human Beings, Wiener began pointing out the dangers of
|
||
|
nuclear war and the role of scientists in developing more powerful
|
||
|
weapons shortly after Hiroshima.
|
||
|
|
||
|
Past recipients of the Wiener Award have been: Dave Parnas, 1987, in
|
||
|
recognition of his courageous actions opposing the Strategic Defense
|
||
|
Initiative; Joe Weizenbaum, 1988, for his pioneering work emphasizing the
|
||
|
social context of computer science; Daniel McCracken, 1989, for his work
|
||
|
organizing computer scientists against the Anti Ballistic Missiles
|
||
|
deployment during the 1960s; Kristen Nygaard of Norway, 1990, for his
|
||
|
work in participatory design; Severo Ornstein and Laura Gould, 1991, in
|
||
|
recognition of their tireless energy guiding CPSR through its early years;
|
||
|
Barbara Simons, 1992, for her work on human rights, military funding, and
|
||
|
the U.C. Berkeley reentry program for women and minorities; and the
|
||
|
Institute for Global Communications, 1993, for their work to use network
|
||
|
technology to empower previously disenfranchised individuals and groups
|
||
|
working for progressive change.
|
||
|
|
||
|
Founded in 1981, CPSR is a national, non-profit, public interest
|
||
|
organization of computer scientists and other professionals concerned with
|
||
|
the impact of computer technology on society. The mission of CPSR is to
|
||
|
provide the public and policymakers with realistic assessments of the
|
||
|
power, promise, and problems of information technology. As concerned
|
||
|
citizens, CPSR members work to direct public attention to critical choices
|
||
|
concerning the applications of information technology and how those
|
||
|
choices affect society.
|
||
|
|
||
|
For more information about CPSR, the annual meeting, or the awards
|
||
|
banquet, call 415-322-3778 or send email to cpsr@cpsr.org.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 2 Sep 1994 11:15:17 -0400 (EDT)
|
||
|
From: eye WEEKLY <eye@IO.ORG>
|
||
|
Subject: File 5--"Tastes like Chicken" ("chicken" domain explanation/Canada)
|
||
|
|
||
|
A little item that we've received a fair number of queries about.
|
||
|
|
||
|
kkc
|
||
|
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
eye WEEKLY August 18 1994
|
||
|
Toronto's arts newspaper .....free every Thursday
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
EYENET EYENET
|
||
|
|
||
|
TASTES JUST LIKE CHICKEN!!!
|
||
|
|
||
|
by
|
||
|
K.K.Campbell
|
||
|
|
||
|
|
||
|
On July 21, we found this email awaiting us:
|
||
|
|
||
|
address I'm using to send you this message [i.e., eye@io.org] on one
|
||
|
of your postings in rec.arts.books . In a recent book, E-mail
|
||
|
Addresses Of The Rich And Famous, by Seth Godin (Addison-Wesley,
|
||
|
1994) eye is listed as eye@chicken.planet.org (page 75). Strangely,
|
||
|
almost every Canadian address in the book ends with
|
||
|
@chicken.planet.org, including Jean Chretien's, and those of many
|
||
|
other govt officials and departments. I have a strong suspicion that
|
||
|
this is a hoax. Do you know who might have perpetrated it?"
|
||
|
|
||
|
Indeed, in the same month, New York Times Magazine was compelled
|
||
|
to ask: "Why do the email addresses of so many Canadian government
|
||
|
officials end in @chicken.planet.org ?"
|
||
|
|
||
|
Here's the story: chicken.planet.org was a "fax gateway," known as
|
||
|
Digital Chicken. Run by Toronto's Rob Riley (riley@gold.interlog.com),
|
||
|
it died last May. Riley distributed a list of maybe 100
|
||
|
people/organizations reachable through Digital Chicken. By writing
|
||
|
email to, say, ontatg@chicken.planet.org , a fax would be sent to
|
||
|
Ontario Attorney-General Marion Boyd.
|
||
|
|
||
|
The list of chicken.planet.org addresses "is all over the place, I still
|
||
|
get mail about it," says Riley in a phone interview. "I've put out
|
||
|
posts saying the service is no longer operating, but it's apparently
|
||
|
not getting spread as rapidly as the original list."
|
||
|
|
||
|
Godin thought it was a list of email addresses and included them in
|
||
|
the book without verifying the list by contacting Riley or Digital
|
||
|
Chicken.
|
||
|
|
||
|
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Retransmit freely in cyberspace Author holds standard copyright
|
||
|
Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
|
||
|
Mailing list available http://www.io.org/eye
|
||
|
eye@io.org "Break the Gutenberg Lock..." 416-971-8421
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 16 Oct 1994 17:21:01 PDT
|
||
|
From: Anonymous <cudigest@mindvox.phantom.com>
|
||
|
Subject: File 6--More Gems from Spam-meister Siegel (NYT Excerpts)
|
||
|
|
||
|
"SPAMMING' ON THE INTERNET BRINGS FAME AND FORTUNE
|
||
|
Source: New York Times, Sunday Oct 16, 1994 (Business, p. 9)
|
||
|
Author: Laurie Flynn
|
||
|
|
||
|
((Here are some extracts from a NYT story in spam artists. The story
|
||
|
begins by noting that Laurence Canter and Martha Siegel have been
|
||
|
heavily criticized since their "Green Card" advertisement on April 12
|
||
|
was sent to thousands of Internet targets. Laurence Canter and Martha
|
||
|
Siegel have been the focus of intense criticism on computer networks
|
||
|
since April 12, when they posted an advertisement offering their
|
||
|
immigration legal services on thousands of Internet bulletin boards,
|
||
|
called Usenet news groups.))
|
||
|
|
||
|
The episode forced the debate about commercialism and free
|
||
|
speech on the global computer network, which is not governed
|
||
|
by any single regulating body. It also earned the pair, who
|
||
|
are married, $100,000 in new legal business.
|
||
|
|
||
|
((The article explains that Canter and Siegel abandoned their law
|
||
|
careers to help businesses and individuals market on the Internet. It
|
||
|
notes how they have written a book on it. The book, called "How to
|
||
|
Make a Fortune on the Information Superhighway" is scheduled to appear
|
||
|
in November.))
|
||
|
|
||
|
Some quotes from Siegel:
|
||
|
|
||
|
Question: Are you really the ones who ought to be writing
|
||
|
such a book?
|
||
|
|
||
|
Answer: Ms. Siegel: Who would be better? We know exactly
|
||
|
what's going on. We know exactly how it should be done.
|
||
|
|
||
|
Canter: We know all the pros and cons we experienced
|
||
|
everything positive and negative.
|
||
|
|
||
|
Q: Do you think that people who follow the advice in your
|
||
|
book, the almost step-by-step instructions, are going to get
|
||
|
the same reaction you did?
|
||
|
|
||
|
Ms. Siegel. I think the same small group of people will
|
||
|
continue to react that way, but it's important to understand
|
||
|
that they are a small group. The people who were in favor of
|
||
|
us, who sent us requests for information, makes up the
|
||
|
overwhelming majority, and they will react in the same way
|
||
|
again, too. We got 20,000 to 25,000 positive requests for
|
||
|
information. In direct mail terms, that's an incredibly
|
||
|
positive response.
|
||
|
|
||
|
Canter. There were probably somewhere between 20,000 and
|
||
|
25,000 flames that we received but they were not from 20,000
|
||
|
to 25,000 people. There were individuals who sent us
|
||
|
hundreds and thousands. There was one guy who sent us close
|
||
|
to 1,000 a day. As far as the positive responses, we did get
|
||
|
slightly over 1,000 paying clients out of it.
|
||
|
|
||
|
Q. Has the commercialization of the information highway
|
||
|
become a personal cause rather than merely a business
|
||
|
opportunity?
|
||
|
|
||
|
Ms. Siegel. Freedom of speech has become a cause for us. I
|
||
|
continue to be personally appalled at the disrespect for
|
||
|
freedom of speech by this handful of individuals who would
|
||
|
take over the net if they could.
|
||
|
|
||
|
Canter. The Internet is a very powerful communications
|
||
|
vehicle, and it should be available for everyone. The
|
||
|
problem we have is the few people and in some cases
|
||
|
companies trying to control it for their own benefits.
|
||
|
|
||
|
Q. So you believe many of the people trying to protect the
|
||
|
Internet are really just trying to horde the profits for
|
||
|
themselves?
|
||
|
|
||
|
Ms. Siegel. I think there are two parts to this group. There
|
||
|
are the wild-eyed zealots who view the Usenet as their home.
|
||
|
They don't view it as just for recreation or a place where
|
||
|
you exchange information. To them it's become a womb
|
||
|
practically, and they're defending their home. They have a
|
||
|
very exaggerated sense of importance of the Usenet in their
|
||
|
lives, that the average person doesn't share.
|
||
|
|
||
|
I think that the other group is people like Wired magazine,
|
||
|
who want to be the ones who make money off it. They can do
|
||
|
that; but if they believe they're going to control everyone
|
||
|
who comes in, they've overstepped their boundaries.
|
||
|
|
||
|
Q. You founded Cybersell a few months ago. How many clients
|
||
|
do you have?
|
||
|
|
||
|
Canter: We have over 100 people who are involved with us
|
||
|
now. We plan to have a grand opening soon, primarily on a
|
||
|
Web site.
|
||
|
|
||
|
Q. What's going to happen with advertising on the Internet?
|
||
|
|
||
|
Ms. Siegel. I think the debate is going to go away quite
|
||
|
fast.
|
||
|
|
||
|
Canter. We put advertising guidelines in the book. I think
|
||
|
if people follow all those, in particular designating
|
||
|
something as an ad so somebody clearly knows it's an
|
||
|
advertisement, I don't see there's really an valid
|
||
|
objections. The most common objection I hear, that on the
|
||
|
surface makes sense, is how it's going to clog everything
|
||
|
up.
|
||
|
|
||
|
The truth is what's clogging up the Usenet and the Internet
|
||
|
is that there are just too many people on it.
|
||
|
|
||
|
((The article notes that Canter was born on June 24, 1953, and Siegal was
|
||
|
born on June 9, 1948. The article also adds some of their personal
|
||
|
history)).
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 13 Aug 1994 22:51:01 CDT
|
||
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
|
Subject: File 7--Cu Digest Header Information (unchanged since 10 Sept 1994)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #6.90
|
||
|
************************************
|
||
|
|