888 lines
41 KiB
Plaintext
888 lines
41 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Aug 22 1993 Volume 5 : Issue 64
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Ediot: Etaoin Shrdlu, III
|
||
|
||
CONTENTS, #5.64 (Aug 22 1993)
|
||
File 1--Has the EFF SOLD OUT?!?
|
||
File 2--EICAR '93 conference / members' meeting
|
||
File 3--Re SKIPJACK Review (CuD 5.60)
|
||
File 4--CuNews ("Smart Kards," Comp Snooping at IRS/FBI, & more)
|
||
File 5--CuNews -- ("Hackers need not Apply" & more)
|
||
File 6--Table of Contents for Volume #1 (of P/H Msg Bases)
|
||
File 7--Graduate Paper Competition for CFP-'94
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Sun, 22 Aug 1993 20:23:18 CDT
|
||
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
||
Subject: File 1--Has the EFF SOLD OUT?!?
|
||
|
||
The Electronic Frontier Foundation has been co-opted by the
|
||
telecommunications conglomerates and has, as a consequence, lost it's
|
||
integrity and credibility. Or so some critics would have us believe.
|
||
Especially since the re-organization of The EFF, allegations that they
|
||
have "sold out" by accepting contributions from telephone
|
||
companies--or worse, that EFF now is implicitly in the employ of
|
||
telephone companies--persist. This allegation seems not only
|
||
unfounded, but does a disservice to the cybercommunity by falsely
|
||
maligning the integrity of one of the two (CPSR being the other) most
|
||
active and effective organizations working to establish and preserve
|
||
the rights of the electronic realm.
|
||
|
||
Because I am a dues-paying member of EFF and have recently sent my
|
||
subscription fee to CPSR, I am not a dispassionate observer. Both
|
||
groups are effective, and--even when in disagreement, I respect the
|
||
goals and strategies chosen by each group. Therefore, as a member of
|
||
EFF, I'm troubled by some of the public commentary I've read on
|
||
Usenet, BBSes, and public access systems that continue to
|
||
irresponsibly tarnish the integrity of EFF with false allegations.
|
||
|
||
Some of the basis for criticism rests on rumors. Perhaps some derives
|
||
from malice. But, the bulk may simply be a lack of information about
|
||
EFF's funding sources and an imperfect understanding about the
|
||
relationship between funders and recipients and the obligations that
|
||
relationship entails. I see nothing *inherently* improper about EFF
|
||
(or any organization) accepting funds from organizations whose goals,
|
||
ideology or practices may not overlay perfectly with those of the
|
||
recipients. Let's look at a few issues.
|
||
|
||
1. HOW MUCH DOES EFF RECEIVE FROM TELECOS? According to EFF sources,
|
||
roughly eight percent of their $1.6 million operation budget comes
|
||
from telecom sources, with no more than five percent coming from a
|
||
single source. Fiscal ratios change, and whether the exact sum is
|
||
seven or 11 percent matters nil. This is a useful chunk of resources,
|
||
but hardly substantial. It is certainly not a sufficient amount to
|
||
cause a crisis if it were withdrawn. The remainder of EFF's resources
|
||
are reported to derive from private donors, membership fees, and
|
||
revenue-generating activities (such as sales of t-shirts). Both in the
|
||
Usenet discussion group (comp.org.eff.talk) and in its newsletters,
|
||
EFF has been open about its funding sources and has never concealed or
|
||
minimized contributions by corporate donors, including telecos.
|
||
Therefore, EFF's alleged ethical malfeasance does not lie in failure
|
||
to conceal its funding resources. Nor does it lie in a dependency
|
||
relationship with the donors.
|
||
|
||
2. WHAT OBLIGATIONS DOES EFF OWE THE TELECOS? The broader question
|
||
here centers on what obligations a donor might expect from the
|
||
recipient. It is hardly unusual for organizations to accept funds from
|
||
contributors whose interests overlap. Examples include contributions
|
||
by R.J. Reynolds tobacco and The Playboy Foundation to the ACLU to--as
|
||
a personal example--my own former funding by the National Institute of
|
||
Justice. Does the ACLU support freedom of speech because it is funded
|
||
in part by those with a commercial interest in protecting it? Should
|
||
the ACLU abstain from taking a position on smokers'/non-smokers'
|
||
rights because of funding sources? Should I have refused federal
|
||
funding lest I be accused (as I once was) of being little more than a
|
||
paid lackey of federal police and social control interests? Criticism
|
||
of EFF for its funding sources and suspicion of the strings that might
|
||
be attached extend into the lives of many of us. However, it is rare
|
||
that general donations require any substantive changes in the behavior
|
||
or principles of recipients. It is also common for well-endowed donors
|
||
to spread their largess to a variety of groups with ends often
|
||
(seemingly) antithetical to each other and even to the donor.
|
||
|
||
There is no evidence whatsoever that EFF has changed its direction to
|
||
satisfy donors. In fact, the recent re-organization at EFF, however
|
||
much some of us might be disappointed by the emphasis, is fully
|
||
consistent with their original policy statement. In fact, a careful
|
||
reading of the founding EFF statement and its recent public policy
|
||
formulations indicate that the re-organization was primarily
|
||
structural rather than the reflection of a new philosophy. As the
|
||
CPSR/EFF/ACLU coalition in the 2600 Magazine Washington Mall incident
|
||
of 1992 suggest, the EFF continues to involve itself with those types
|
||
of issues that led to its founding. And, as Mike Godwin's continued
|
||
involvement with EFF and his willingness to help those in need of
|
||
legal advice attest, EFF remains the first resource most of us think of
|
||
when we seek computer-related legal assistance. Those who know Mike
|
||
and EFF founders John Barlow and Mitch Kapor cannot, in their wildest
|
||
fantasies, imagine even the most generous donor influencing their
|
||
behavior or principles.
|
||
|
||
3. WHAT ARE THE ETHICAL/LEGAL OBLIGATIONS OF RECIPIENTS? Federal and
|
||
state statutes, as well as various professional codes of ethics,
|
||
specify obligations that might lead to a conflict of interest. The
|
||
attorneys amongst us can elaborate on these. However, there is
|
||
absolutely no evidence that the EFF approaches even the strictest
|
||
conflict of interest threshold. Its coincidental interests with
|
||
telecos involve policy and legislation affecting primarily the
|
||
development of an "information highway" and the attendant technology.
|
||
The EFF is not litigating on behalf of any telecos, it is not
|
||
(according to EFF sources and their documents) serving in a client
|
||
relationship with them, and it is engaged in no activity that--at
|
||
least by any apparent logic--could be construed to place the EFF in a
|
||
conflict of interest situation. EFF's initiative and perseverance in
|
||
the Steve Jackson Games litigation would seem prima facie evidence
|
||
that the EFF is committed to principle and not to funding expedience.
|
||
|
||
There is room for considerable intellectual disagreement over the
|
||
focus, goals, and organization of EFF, CPSR, and, I suppose, even CuD.
|
||
But the one issue that is indisputable is the integrity, commitment,
|
||
and credibility the EFF possesses. Because there is nary a soupcon of
|
||
evidence to to suggest cooptation, it's time to end this unnecessary
|
||
and destructive bickering about EFF's funding sources.
|
||
|
||
Those who have taken the trouble to follow the public policy
|
||
statements and read the EFF electronic and hardcopy newsletters, will
|
||
find nothing new in my comments. Those who do not receive the
|
||
newsletter and do not follow CuD's periodic summaries of the
|
||
activities of groups such as the EFF and CPSR might have been
|
||
influenced by rumors and misinformation. Those of us who are concerned
|
||
about the future of "cyberspace" should remember our debt to these
|
||
groups. Part of that debt means that we squelch false rumors that risk
|
||
irreparably tarnishing the reputations and subverting the effectiveness
|
||
of groups from whose actions we all benefit.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 19 Aug 93 09:46:16 GMT
|
||
From: Anthony Naggs <amn@UBIK.DEMON.CO.UK>
|
||
Subject: File 2--EICAR '93 conference / members' meeting
|
||
|
||
EICAR '93 Conference
|
||
|
||
At a recent meeting the board of EICAR (European Institute for
|
||
Computer Anti-Virus Research), decided to cancel the planned
|
||
London conference this year. I understand this is due to low
|
||
participation in other computer security / anti-virus events this
|
||
year.
|
||
|
||
However, there will instead be a Members' Meeting in Hamburg
|
||
(Germany), the proposed agenda is:
|
||
25 November 1993
|
||
14:00 Working Group 3 (Legal Questions) meeting
|
||
16:00 Working Group 1 (Antivirus Technologies) meeting
|
||
18:00 Joint Dinner
|
||
|
||
26 November 1993
|
||
09:00 Discussion of the Working Groups results
|
||
11:00 Members Meeting
|
||
13:00 Lunch
|
||
|
||
EICAR '94 Conference
|
||
|
||
The next EICAR conference is proposed to be from 14 to 16 November
|
||
1994 in the vicinity of London.
|
||
|
||
(Disclaimer; I am not an official spokesman for EICAR).
|
||
|
||
+++
|
||
Anthony Naggs Email: Paper mail:
|
||
Software/Electronics Engineer amn@ubik.demon.co.uk PO Box 1080, Peacehaven
|
||
& Computer Virus Researcher East Sussex BN10 8PZ
|
||
Phone: +44 273 589701 Great Britain
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 13 Aug 1993 16:15:47 CST
|
||
From: roy@SENDAI.CYBRSPC.MN.ORG(Roy M. Silvernail)
|
||
Subject: File 3--Re SKIPJACK Review (CuD 5.60)
|
||
|
||
In comp.society.cu-digest #5.60:
|
||
|
||
> Date: Mon, 02 Aug 1993 15:23:28 -0400 (EDT)
|
||
> From: denning@CS.GEORGETOWN.EDU(Dorothy Denning)
|
||
> Subject--File 5--SKIPJACK Review (Encryption Background and Assessment)
|
||
|
||
> LEAF decoders that allow an authorized law enforcement official to
|
||
> extract the device identifier and encrypted session key from an
|
||
> intercepted LEAF. The identifier is then sent to the escrow
|
||
> agents, who return the components of the corresponding device
|
||
> unique key. Once obtained, the components are used to reconstruct
|
||
> the device unique key, which is then used to decrypt the session
|
||
> key.
|
||
|
||
This is the first time I've heard anyone clarify that point. One of my
|
||
main objections to the Clipper proposal was that once a legal tap had
|
||
been authorized, all further communications with that Clipper chip were
|
||
compromised unless the court order only released the session key. LE
|
||
has NO NEED for the unique device key. They legitimately need only the
|
||
session key for the lawfully intercepted communications.
|
||
|
||
> 5. Secrecy of the Algorithm
|
||
>
|
||
> The SKIPJACK algorithm is sensitive for several reasons. Disclosure of
|
||
> the algorithm would permit the construction of devices that fail to
|
||
> properly implement the LEAF, while still interoperating with legitimate
|
||
> SKIPJACK devices. Such devices would provide high quality
|
||
> cryptographic security without preserving the law enforcement access
|
||
> capability that distinguishes this cryptographic initiative.
|
||
|
||
> However, while full exposure of the internal details of SKIPJACK would
|
||
> jeopardize law enforcement and national security objectives, it would
|
||
> not jeopardize the security of encrypted communications. This is
|
||
> because a shortcut attack is not feasible even with full knowledge of
|
||
> the algorithm. Indeed, our analysis of the susceptibility of SKIPJACK
|
||
> to a brute force or shortcut attack was based on the assumption that
|
||
> the algorithm was known.
|
||
|
||
These sections actually makes me feel better about SKIPJACK in general.
|
||
I kind of suspected that the real reason for secrecy was to protect LE
|
||
access. (I'd still prefer the algorithm be made public)
|
||
|
||
Now, anyone care to speculate about the security of the LEAF itself?
|
||
This whole discussion centered upon SKIPJACK security, but I don't
|
||
recall whether the LEAF is _actually_ encrypted by SKIPJACK. A SKIPJACK
|
||
key and a Clipper key are both 80 bits, but that doesn't mean you have
|
||
to crypt them the same way.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 18 Aug 93 12:19:00 BST
|
||
From: grmeyer@GENIE.GEIS.COM
|
||
Subject: File 4--CuNews ("Smart Kards," Comp Snooping at IRS/FBI, & more)
|
||
|
||
Smart Kards Are Coming
|
||
======================
|
||
A group of corporations, including MasterCard, Visa, Citicorp, Amex,
|
||
IBM, AT&T, Microsoft, and Apple, have formed the Smart Card Forum.
|
||
The cross-industry group will promote the use of smart-card technology
|
||
for payment, transit, health care, identification, and security
|
||
applications.
|
||
(Information Week August 9, 1993 pg 10)
|
||
|
||
Computer Snooping at the IRS and FBI
|
||
====================================
|
||
The Internal Revenue Service is implementing a $23 billion computer
|
||
modernization project that will give it online access to taxpayer
|
||
information. In the midst of this, the GAO has revealed that as
|
||
many as 350 employees in the IRS's Southeast Region (Atlanta) have
|
||
been snooping into taxpayer records. So far, 154 have been
|
||
disciplined.
|
||
|
||
The GAO (Government Accounting Office) has also said that access to
|
||
the FBI's National Crime Information Center (NCIC) databases has
|
||
been systematically abused by law enforcement workers and associates.
|
||
Cases cited as examples include an officer using NCIC to track down
|
||
his ex-girlfriend (he later killed her), a terminal operator checking
|
||
customers for her drug-dealing boyfriend...just to be sure they
|
||
weren't undercover agents, and a dispatcher running background checks
|
||
on her fiance's political opponents. The FBI declines comment, but
|
||
the GAO has recommended that Congress make it a criminal offense to
|
||
access the network for private use.
|
||
(Information Week. August 9, 1993. pg 13)
|
||
|
||
Wipe Before Discarding
|
||
======================
|
||
A Canadian citizen, who purchased a used hard drive from a local
|
||
computer store, found himself in possession of a goldmine of personal
|
||
data and information.
|
||
|
||
The used drive contained the personnel records of every employee in
|
||
the Alberta land title offices in Edmonton and Calgary. It included
|
||
salaries, social security numbers [presumably the Canadian equivalent],
|
||
and performance evaluations. It also held lengthy, confidential memos
|
||
about plans to turn over the land title department to a private
|
||
agency.
|
||
(Information Week August 9, 1993 pg 60)
|
||
|
||
Pay Your Rent
|
||
=============
|
||
Speaking of Edmonton, Alberta... A landlord's association there has
|
||
formed a group to share information about tenants. The online database
|
||
can be searched with little more than a name or driver's license
|
||
number. The landlords say the primary purpose is to keep track of
|
||
people who skip out on rent payments, or damage property. They answer
|
||
concerns about discrimination by saying that anyone caught abusing
|
||
the system will be forbidden from using it in the future.
|
||
(Information Week August 9, 1993 pg 66)
|
||
|
||
------------------------------
|
||
|
||
From: grmeyer@GENIE.GEIS.COM
|
||
Date: Fri, 20 Aug 93 00:23:00 BST
|
||
Subject: File 5--CuNews -- ("Hackers need not Apply" & more)
|
||
|
||
If It's Blurry You Shouldn't Be Watching
|
||
========================================
|
||
A patented digital technology from VideoFreedom Systems (San Diego,
|
||
CA) may be the key to getting an intrusive Congress off their
|
||
censorship bandwagon. The technology would allow television (and movie
|
||
theatres!) to blur objectionable scenes and sounds. Much the same way
|
||
the news programs can distort the voice and image of a confidential
|
||
source who wishes to remain that way. The technology would allow those
|
||
viewers who want to see "the good parts" to clean-up the image to
|
||
their tastes. (Information Week August 16, 1993 pg 10)
|
||
|
||
Hackers Need Not Apply
|
||
======================
|
||
Information Week magazine recently conducted a "fax vote"
|
||
self-selected survey of readers. The questions asked about policies,
|
||
thoughts, and practices regarding hiring ex-hackers to help out with
|
||
computer security. Of the those who choose to respond, 15% said they
|
||
had been approached for a job by a hacker. Only 6% said they had ever
|
||
hired a hacker to test security. Of their concerns about doing so,
|
||
over half said "they might compromise security". About 35% expressed
|
||
concerns over "legal problems".
|
||
|
||
Some of the write-in comments included:
|
||
|
||
"Their crimes are difficult to prove and almost impossible to
|
||
prosecute. Not only do they go unpunished, but hiring them makes
|
||
crime pay."
|
||
|
||
"What happened to our idea of ethics and morality? I don't believe
|
||
only felon hackers are smart enough to foolproof our computer
|
||
systems."
|
||
|
||
"They could sell ideas back to your competitor. These people will do
|
||
anything for a buck".
|
||
|
||
Refer to Information Week, August 16, 1993 pg 29 for full details.
|
||
|
||
This Tag Line Meets Corporate Standards
|
||
=======================================
|
||
Duke Power Company (Charlotte, NC) has issued a memo to supervisors
|
||
and managers that forbids employees from expressing their religious or
|
||
political opinions over the company's Email, voice mail, or fax
|
||
machines. The company says the memo arises out of problems with people
|
||
using 'tag lines' (short sentences at the end of messages) on the
|
||
company's Profs mail system. The company did not forbid tag lines, but
|
||
issued guidelines for their content. According to the company few of
|
||
its 18,000 employees see the rules as a restriction of free speech.
|
||
(Information Week. August 16, 1993 pg 60)
|
||
|
||
Woodstock for Hackers and Phreaks
|
||
=================================
|
||
Newsweek magazine (Aug 16, 1993 pg 47) features a story on the End of
|
||
The Universe conference in the Netherlands. According the Information
|
||
Week's summary, the Newsweek article reports that attendees had at
|
||
least one thing in common with the Woodstock guests....they believe
|
||
that rules were meant to be broken. (IW's summary is on pg. 64,
|
||
August 16, 1993)
|
||
|
||
Don't Copy That (Microsoft) Floppy!
|
||
===================================
|
||
Information Week reports that an article in the San Francisco paper
|
||
THE REVOLVER (Aug 9, pg 1) says some lawyers claim that Microsoft
|
||
might enjoy too much influence over federal prosecutors. It seems that
|
||
an unusually high number of cases against software pirates are
|
||
launched on Microsoft's behalf. The number is higher compared with
|
||
Lotus or WordPerfect for example. (Information Week. August 1, 1993.
|
||
pg 64)
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 10 Aug 93 22:48:47 EDT
|
||
From: lodcom (LOD Communications)
|
||
Subject: File 6--Table of Contents for Volume #1 (of P/H Msg Bases)
|
||
|
||
((MODERATORS' NOTE: In CuD #5.39, we reviewed the BBS Message Base
|
||
File Archive Project compiled by LODCOM. We were impressed by the
|
||
comprehensiveness of the project and favorably reviewed it as a
|
||
valuable set of documents for scholars and curious readers who are
|
||
interested in BBS "underground" culture of the 1980s. The collection
|
||
has been expanded, and the current offerings are described below)).
|
||
|
||
++++
|
||
|
||
Volume I of the Hack/Phreak BBS Message Base File Archive Project
|
||
has been completed. This file is 19 KB in length and contains the
|
||
Table's of Contents for each of the 20 Message Base Files. Volume II
|
||
is being compiled and is expected to be completed and sent out to
|
||
those who have ordered the Set sometime in September. Volume III is
|
||
expected to be completed in November 1993. Should any additional
|
||
material come our way, a fourth and final Volume will be made.
|
||
|
||
The newest version of the Order Form File will be sent to you
|
||
sometime in the next week. Should you find the following TOC's
|
||
interesting and you want to order the files do so with the NEW order
|
||
form. If you have already ordered using the old order form that is
|
||
fine, as the price change is retroactive since it is to YOUR benefit.
|
||
As you will note when you see the new order form and information file,
|
||
ALL the volumes created will cost $39.00 personal, $99.00 commercial.
|
||
That is, for the above price you receive ALL the volumes, not just one
|
||
volume. The price change was made due to the good response to the
|
||
initial order form.
|
||
|
||
When Volume #2 is completed a file similar to this one with its
|
||
TOC's will be mailed to you. If you wish to be taken off this mailing
|
||
list just say so. If not, Lodcom will continue to keep you up to date
|
||
on the projects' progress. Disseminate this File as you see fit.
|
||
|
||
If you have any questions feel free to email us anytime.
|
||
|
||
|
||
VOLUME #1 CONTENTS:
|
||
+++++++++++++++++++
|
||
|
||
LOD Communications (c) 1993: VOLUME #1 List of Hack/Phreak BBS Message Bases
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
BBS NAME A/C SYSOP(S) # MSGS DATES KBYTES PROPHILE
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
Alliance BBS 618 Phantom Phreaker 113 2/09/86 - 215 YES
|
||
Doom Prophet G,P 6/30/86
|
||
|
||
Black Ice Private 703 The Highwayman 880 12/1/88 - 560 YES
|
||
P,U 5/13/89
|
||
|
||
Broadway Show/ 718 Broadway Hacker 180 9/29/85 - 99 YES
|
||
Radio Station BBS 12/27/85
|
||
|
||
CIA BBS 201 CIA Director 30 5/02/84 - 30 NO
|
||
6/08/84
|
||
|
||
C.O.P.S. 305 Mr. Byte-Zap 227 11/5/83 - 196 YES
|
||
The Mechanic G,R,U 7/16/84
|
||
|
||
Face To Face 713 Montressor 572 11/26/90 - 400 YES
|
||
Doc Holiday 12/26/90
|
||
|
||
Farmers Of Doom 303 Mark Tabas 41 2/20/85 - 124 YES
|
||
G 3/01/85
|
||
|
||
Forgotten Realm 618 Crimson Death 166 3/08/88 - 163 NO
|
||
4/24/88
|
||
|
||
Legion Of Doom! 305 Lex Luthor 194 3/19/84 - 283 YES
|
||
Paul Muad'Dib * G,P 11/24/84
|
||
|
||
Metal Shop Private 314 Taran King 520 4/03/86 - 380 YES
|
||
Knight Lightning P,R,U 5/06/87
|
||
|
||
OSUNY 914 Tom Tone 375 7/9/82 - 368 YES
|
||
Milo Phonbil * G,U 4/9/83
|
||
|
||
Phoenix Project 512 The Mentor 1118 7/13/88 - 590 YES
|
||
Erik Bloodaxe * G,R 2/07/90
|
||
|
||
Plover-NET 516 Quasi Moto 346 1/14/84 - 311 YES
|
||
Lex Luthor * G 5/04/84
|
||
|
||
Safehouse 612 Apple Bandit 269 9/15/83 - 251 YES
|
||
G,U 5/17/84
|
||
|
||
Sherwood Forest I 212 Magnetic Surfer 92 5/01/84 - 85 YES
|
||
P,U 5/30/84
|
||
|
||
Sherwood Forest ][ 914 Creative Cracker 100 4/06/84 - 200 YES
|
||
Bioc Agent 003 * G 7/02/84
|
||
|
||
Split Infinity 408 Blue Adept 52 12/21/83 - 36 YES
|
||
1/21/84
|
||
|
||
Twilight Phone ??? System Lord 17 9/21/82 - 24 NO
|
||
1/09/83
|
||
|
||
Twilight Zone/ 203 The Marauder 108 2/06/85 - 186 YES
|
||
Septic Tank Safe Cracker * G,U 7/24/86
|
||
|
||
WOPR 617 Terminal Man 307 5/15/84 - 266 YES
|
||
The Minute Man * G,U 1/12/85
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Alliance BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. Alliance BBS Pro-Phile written by the Sysop (Phantom Phreaker)
|
||
III. 103 Messages From the Alliance BBS Message Base
|
||
IV. 10 Messages From the Alliance Sub-Board on The Metal Shop BBS
|
||
V. G-Philes by the System Operators
|
||
1. Busy Line Verification (BLV) [Phantom Phreaker]
|
||
2. An Overview of the Teradyne 4Tel System [Doom Prophet]
|
||
3. Automatic Number Identification (ANI) [Phantom & Doom Prophet]
|
||
4. The Facility Assignment and Control System (FACS) [Phantom]
|
||
5. Step By Step Switching System Notes [Phantom Phreaker]
|
||
6. Automatic Message Accounting (AMA) [Phantom Phreaker]
|
||
7. Telephone Signalling Methods [Doom Prophet]
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Black Ice Private BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files (File 1)
|
||
II. Black Ice Private BBS Pro-Phile by Erik Bloodaxe (File 1)
|
||
III. 231 Messages from the General Sub-Board (File 1)
|
||
96 Messages from the Telenet [now called SprintNet] Sub-Board (File 1)
|
||
IV. 48 Messages from the Tymnet Packet Switching Network Sub-Board (File 2)
|
||
54 Messages from the 'Other Networks' Sub-Board (File 2)
|
||
99 Messages from the UNIX Sub-Board (File 2)
|
||
57 Messages from the VAX/VMS Sub-Board (File 2)
|
||
17 Messages from the PRIMOS Sub-Board (File 2)
|
||
36 Messages from the 'Other Operating Systems' Sub-Board (File 2)
|
||
V. 45 Messages from the Vocal Hacking [Social Eng.] Sub-Board (File 3)
|
||
100 Messages from the Advanced Telecom Sub-Board (File 3)
|
||
97 Messages from the SPCS/OSS Sub-Board (File 3)
|
||
VI. Black Ice Private BBS Userlist as of Mid-May 1989 [Estimated] (File 3)
|
||
|
||
880 Messages Total
|
||
_____________________________________________________________________________
|
||
|
||
|
||
BroadWay Show BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. Broadway Show BBS Pro-Phile
|
||
III. Portions of the Broadway Show Message Base
|
||
IV. Portions of The Radio Station Message Base
|
||
|
||
There are approximately 180 Messages within this File.
|
||
_____________________________________________________________________________
|
||
|
||
|
||
CIA BBS Message Base File Table of Contents
|
||
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. 30 messages from the CIA BBS Message Base
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
C.O.P.S. BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. C.O.P.S. BBS Pro-Phile written by Lodcom with help from the Co-Sysop
|
||
III. 227 messages from the COPS Message Base (Including Sub-Boards)
|
||
IV. G-Philes by the System Operator
|
||
1. How to Crash your Favorite BBS's
|
||
2. MCI Access Numbers
|
||
3. ITT Served Area Codes by State
|
||
4. 'Notes on the Network' Technical Info
|
||
5. Mini-Directory to Compuserve
|
||
6. COPS Apple Tips
|
||
7. Interesting Scanner Frequencies
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Face to Face BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files (File 1)
|
||
II. Face to Face BBS Pro-Phile written by Doc Holiday [Co-Sysop] (File 1)
|
||
III. 196 Messages from the Face to Face [General] Sub-Board (File 1)
|
||
IV. 64 Messages from the In the News Sub-Board (File 2)
|
||
88 Messages from the Conferences & Seminars Sub-Board (File 2)
|
||
30 Messages from the Internet Sub-Board (File 2)
|
||
48 Messages from the Operation SunDevil Sub-Board (File 2)
|
||
47 Messages from the UNIX OS Sub-Board (File 2)
|
||
31 Messages from the Telecom Sub-Board (File 2)
|
||
62 Messages from the Hacking Sub-Board (File 2)
|
||
6 Messages from the Private Sector Sub-Board (File 2)
|
||
|
||
572 Messages Total
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Farmers Of Doom! BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. FOD BBS Pro-Phile written by the Sysop (Mark Tabas)
|
||
III. 41 messages from the FOD Message Base
|
||
IV. Phreak Philes by the System Operator
|
||
1. Equal Access and the American Dream
|
||
2. Better Homes and Blue Boxing, Parts i, ii, and iii.
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Forgotten Realm BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. 13 Messages from the Packet Switching Networks Sub-Board
|
||
40 Messages from the Unix/Bell Computer Systems Sub-Board
|
||
56 Messages from the Telecom International Sub-Board
|
||
23 Messages from the Preferred User Sub-Board
|
||
|
||
132 Messages Total
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Legion of Doom! BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. LOD BBS Pro-Phile
|
||
III. LOD Main Menu Commands
|
||
IV. 132 Messages from the LOD Main Msg Base, 'Trashing', & Local Sub-Boards
|
||
V. 62 Messages from LOD and LOH Group (Private) Sub-Boards
|
||
VI. LOD Internal Phreak/Hack Philes
|
||
1. Social Engineering an ESS (Paul Muad'Dib)
|
||
2. South Fla. COSMOS Wire Centers (Unknown Soldier & Gary Seven)
|
||
3. The TEL-TEC Long Distance Service (Lex Luthor)
|
||
4. Jiffy Scan V1.2 Telenet Node Scanning Pgm (Gary Seven)
|
||
5. The History of ESS (Lex Luthor)
|
||
6. CNA Listing as of 9/84 (Sharp Razor and X-Man)
|
||
7. Hacking Bell's CAROT System (Lex Luthor)
|
||
8. Hacking the HP3000 (Gary Seven)
|
||
9. Credit Bureau Incorporated (Lex Luthor)
|
||
10. Hacking Burroughs Computers (Blue Archer)
|
||
11. IBM's JCL - Job Control Language (Master of Impact)
|
||
12. Hacking Primos (Carrier Culprit)
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Metal Shop Private (MSP) BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files (File 1)
|
||
II. Metal Shop BBS Pro-Phile by Taran King & Knight Lightning (File 1)
|
||
III. MSP General Menu Commands Including the MSP USERLIST (File 1)
|
||
IV. 166 Messages from the Phreak, Hack, and MS-Elite Sub-Boards (File 1)
|
||
25 Messages from the Social Engineering Sub-Board (File 1)
|
||
44 Messages from the New User Sub-Board (File 1)
|
||
6 Messages from the Royal Court Sub-Board (File 1)
|
||
V. 100 Messages from the General Discussion Sub-Board (File 2)
|
||
100 Messages from the Phrack Sub-Board (File 2)
|
||
70 Messages from the Phreak/Hack Sub-Board (File 2)
|
||
10 Messages from the MSP/Alliance Private Access Sub-Board (File 2)
|
||
|
||
521 Messages Total
|
||
______________________________________________________________________________
|
||
|
||
|
||
OSUNY BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files (File 1)
|
||
II. OSUNY BBS Pro-Phile (File 1)
|
||
III. Portions of the Osuny Message Base (File 1)
|
||
IV. Portions of the Osuny Message Base (File 2)
|
||
V. Undated OSUNY Userlist (File 2)
|
||
VI. OSUNY Bulletins aka G-Philes [Approximately 30] (File 2)
|
||
|
||
Files 1 & 2 contain 375 messages from the original OSUNY Message Base.
|
||
______________________________________________________________________________
|
||
|
||
|
||
Phoenix Project BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files (File 1)
|
||
II. Phoenix Project BBS Pro-Phile by Erik Bloodaxe (co-sysop) (File 1)
|
||
III. Messages from the First Incarnation of the Phoenix Project:
|
||
100 Messages from the Packet Switched Networks Sub-Board (File 1)
|
||
58 Messages from the General Discussion Sub-Board (File 1)
|
||
39 Messages from the 'Instructor' Sub-Board (File 1)
|
||
IV. Some G-Philes written by the sysop, The Mentor: (File 1)
|
||
1. The Conscience of a Hacker (aka The Hacker's Manifesto)
|
||
2. A Novice's Guide to Hacking (1989 Edition)
|
||
3. A Multi-User Chat Program for DEC-10's
|
||
4. DCL Utilities for VMS Hackers
|
||
V. Messages from the Second Incarnation of the Phoenix Project:
|
||
132 Messages from the General Discussion Sub-Board (File 2)
|
||
26 Messages from the 'We the People' Sub-Board (File 2)
|
||
77 Messages from the Basic Telecom Sub-Board (File 2)
|
||
58 Messages from the Hacking Sub-Board (File 2)
|
||
46 Messages from the Phone Company Sub-Board (File 2)
|
||
80 Messages from the SprintNet Packet Network Sub-Board (File 2)
|
||
49 Messages from the BT Tymnet Sub-Board (File 2)
|
||
|
||
31 Messages from the Internet Sub-Board (File 3)
|
||
60 Messages from the Other Packet Networks Sub-Board (File 3)
|
||
69 Messages from the UNIX Sub-Board (File 3)
|
||
18 Messages from the VAX/VMS Sub-Board (File 3)
|
||
28 Messages from the Primos Sub-Board (File 3)
|
||
41 Messages from the HP-3000 Sub-Board (File 3)
|
||
42 Messages from the Other Operating Systems Sub-Board (File 3)
|
||
27 Messages from the Programming Sub-Board (File 3)
|
||
27 Messages from the Social Engineering Sub-Board (File 3)
|
||
72 Messages from the Electronic Banking Sub-Board (File 3)
|
||
32 Messages from the Radio & Electronics Sub-Board (File 3)
|
||
11 Messages from the PC's Sub-Board (File 3)
|
||
35 Messages from the Altered States Sub-Board (File 3)
|
||
59 Messages from the Security Personnel Sub-Board (File 3)
|
||
59 Messages from the Phrack Sub-Board (File 3)
|
||
49 Messages from the 'Friends of the Family' PVT Sub-Board (File 3)
|
||
VI. Directory of Downloadable Files Online (2nd Incarnation) (File 3)
|
||
|
||
1325 Messages Total
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Plover-NET BBS Message Base File Table of Contents
|
||
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. Plover-NET BBS Pro-Phile written by the Sysop (Quasi Moto)
|
||
III. Approximately 346 messages from the Plover-NET Message Base
|
||
IV. 18 of the 35 Phreak Philes that were online.
|
||
|
||
_____________________________________________________________________________
|
||
The Safehouse BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. Safehouse BBS Pro-Phile
|
||
III. 269 messages from the Safehouse Message Base (Phreak & Merits sub's)
|
||
IV. The Safehouse Userlist (undated)
|
||
V. Some Phreak Philes that were available on The Safehouse
|
||
1. The Fine Art of Telesearching (by The Dragyn)
|
||
2. Compuserve Access Numbers (by The Hacker)
|
||
3. How to Box and Not Get Caught (by The Dragyn)
|
||
4. Moscow Phones
|
||
5. The Best of TEL: Trashing (by The Dragyn)
|
||
6. Secret Signals (by Texas Star)
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Sherwood Forest I BBS Message Base File Table of Contents
|
||
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. Sherwood Forest I BBS Pro-Phile written by Lord Digital
|
||
III. Sherwood Forest I Userlist
|
||
IV. 46 messages from the Phreak and Hack Sub-Boards of the Message Base
|
||
V. 46 messages from the Knights of Shadow Phreak Group's Private Sub-Board
|
||
|
||
Total Number of Messages in this File: 92.
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Sherwood Forest II BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. Sherwood Forest II BBS Pro-Phile
|
||
III. 100 Messages from the SF2 Message Base
|
||
IV. G-Philes by the Co-Sysop, Bioc Agent 003
|
||
1. Hacking Morality by Big Brother
|
||
2. The Book of Bioc
|
||
3. Hacking Western Union's Easylink by Bioc & TUC
|
||
4. Bioc's Basic Telecom: Parts I through VII
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Split Infinity BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. Split Infinity BBS Pro-Phile written by Sir Francis Drake
|
||
III. 52 Messages from the Split Infinity Phreak Sub-Board Message Base
|
||
|
||
______________________________________________________________________________
|
||
|
||
|
||
Twilight Phone BBS Message Base File Table of Contents
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. 17 messages from the Twilight Phone Message Base
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
Twilight Zone BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. Twilight Zone BBS Pro-Phile written by the Sysop
|
||
III. Twilight Zone Userlist
|
||
IV. Portions of the Twilight Zone Message Base (Including Sub-Boards)
|
||
V. Portions of The Septic Tank Message Base
|
||
VI. G-Philes by the System Operator
|
||
1. Septic Tank INWATS Database Volume I - updated 6-26-86
|
||
2. Understanding the Traffic Services Position System (TSPS)
|
||
3. GETPAS - RSTS/E Basic Program to Hack Passwords.
|
||
4. Inside RSTS Volumes I through IV.
|
||
5. Hacking RSTS/E V9.X-XX
|
||
|
||
_____________________________________________________________________________
|
||
|
||
|
||
WOPR BBS Message Base File Table of Contents
|
||
|
||
I. General Remarks About the BBS Message Base Files
|
||
II. WOPR BBS Pro-Phile
|
||
III. 307 messages from the WOPR Message Base (Including the Hack Sub-Board)
|
||
IV. G-Philes by the System Operator
|
||
1. How To Use GTE Telenet
|
||
2. Introduction to Dec-10 and Dec-20 Computers
|
||
|
||
++++++++++++++++++++++++++++++++++++++
|
||
|
||
End of Volume #1 TOC File.
|
||
|
||
|
||
LOD Communications: Leaders in Engineering, Social and Otherwise ;)
|
||
|
||
Email: lodcom@mindvox.phantom.com
|
||
Voice Mail: 512-448-5098
|
||
Snail Mail: LOD Communications
|
||
603 W. 13th
|
||
Suite 1A-278
|
||
Austin, Texas USA 78701
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 20 Aug 1993 18;21:43 EDT
|
||
From: eff@eff.org
|
||
Subject: File 7--Graduate Paper Competition for CFP-'94
|
||
|
||
STUDENT PAPER COMPETITION
|
||
|
||
Full time college or graduate students are invited to enter the
|
||
student paper competition. Papers must not exceed 2500 words and
|
||
should address the impact of computer and telecommunications
|
||
technologies on freedom and privacy in society. Winners will
|
||
receive a scholarship to attend the conference and present their
|
||
papers. All papers should be submitted by November 1, 1993 (either
|
||
as straight text via e-mail or 6 printed copies) to:
|
||
|
||
Prof. Eugene Spafford
|
||
Department of Computer Sciences
|
||
1398 Computer Science Building
|
||
Purdue University
|
||
West Lafayette, IN 47907-1398
|
||
E-Mail: spaf@cs.purdue.edu; Voice: 317-494-7825
|
||
|
||
|
||
REGISTRATION
|
||
|
||
Registration information and fee schedules will be announced by
|
||
September 1, 1993. Inquiries regarding registration should be
|
||
directed to RoseMarie Knight, Registration Chair, at the JMLS
|
||
address above; her voice number is 312-987-1420.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.64
|
||
************************************
|
||
|