901 lines
44 KiB
Plaintext
901 lines
44 KiB
Plaintext
|
|
|
|
****************************************************************************
|
|
>C O M P U T E R U N D E R G R O U N D<
|
|
>D I G E S T<
|
|
*** Volume 2, Issue #2.03 (Sepember 14, 1990) **
|
|
****************************************************************************
|
|
|
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|
ARCHIVISTS: Bob Krause / Alex Smith
|
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted as long as the source is
|
|
cited. It is assumed that non-personal mail to the moderators may be
|
|
reprinted, unless otherwise specified. Readers are encouraged to submit
|
|
reasoned articles relating to the Computer Underground.
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|
views of the moderators. Contributors assume all responsibility
|
|
for assuring that articles submitted do not violate copyright
|
|
protections.
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
CONTENTS:
|
|
File 1: Moderators' Corner
|
|
File 2: Len Rose's experience with the Secret Service
|
|
File 3: Tim Wolfson's address, cite list
|
|
File 4: A comment on Zod's case
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
********************************************************************
|
|
*** CuD #2.03, File 1 of 4: Moderator's corner ***
|
|
********************************************************************
|
|
|
|
Date: Sepember 14, 1990
|
|
From: Moderators
|
|
Subject: Moderators' Corner
|
|
|
|
++++++++++
|
|
In this file:
|
|
1. BBS AND THE LAW PAPER ADDED TO ARCHIVES
|
|
2. GATEWAY TO USENET
|
|
|
|
++++++++++++++++++
|
|
BBS and the Law Paper added to Archives
|
|
++++++++++++++++++
|
|
|
|
We have added a paper by Mike Riddle, a law student, to the CuD archives.
|
|
It's entitled: "The Electronic Pamphlet--Computer Bulletin Boards and the
|
|
Law." It provides a nice overview of privacy and other issues and is worth
|
|
reading.
|
|
|
|
++++++++++++++++
|
|
Gateway to Usenet Newsgroup
|
|
++++++++++++++++
|
|
|
|
A Gateway service is available for people who cannot read or post to the
|
|
Usenet newsgroup comp.org.eff.talk.
|
|
|
|
To subscribe send mail to EFF-REQUEST@NETSYS.COM.
|
|
You will receive a copy of every article appearing in the newsgroup.
|
|
|
|
To post to comp.org.eff.talk send your article to EFFTALK@NETSYS.COM. It
|
|
will be gatewayed automatically without modification.
|
|
|
|
This service has no connection with the Electronic Frontier Foundation.
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 11 Sep 90 01:34:49 -0400
|
|
From: len@NETSYS.NETSYS.COM
|
|
Subject: Len Rose's experience with the Secret Service
|
|
|
|
********************************************************************
|
|
*** CuD #2.03: File 2 of 4: Len Rose's Experience with the S.S. ***
|
|
********************************************************************
|
|
|
|
[Jim Thomas suggested I write something for the digest and I have been
|
|
casting around for ideas.. All I really can think about nowadays is my
|
|
own situation. I have become quite a bore to my friends I am sure.]
|
|
|
|
Please excuse any vestiges of self-pity you may detect.
|
|
|
|
The Day It Happened:
|
|
|
|
I left my home around eleven am to drive down to Washington DC to meet
|
|
with a potential client. After several hours with them , I started the
|
|
drive back through the rush hour traffic. It was just a few minutes
|
|
after five pm that I pulled into my driveway in Middletown Md. I remember
|
|
getting out of the car and noticing that someone was in the back yard.
|
|
|
|
He was wearing a blue wind breaker and was neatly dressed. We had been
|
|
trying to sell a Jeep , and I assumed he was interested in buying the
|
|
car. "What can I do for you" I asked.. I remember being slightly pissed
|
|
that this person had just been hanging around the back of my home. He
|
|
flipped his jacket aside and I saw a badge on his belt and a gun
|
|
in a shoulder holster. "Please go into the house" he replied. I was
|
|
pretty shaken and asked "What have I done wrong?" .. without answering
|
|
the question, he took my arm and sort of marched me into the front door
|
|
of my home. Upon entering, two agents pulled me up from the foyer, and
|
|
put me against the wall while searching me. Then I remember being shown
|
|
the front of a search warrant and then taken into my master bedroom.
|
|
The door was shut and I didn't leave the room for more than five hours.
|
|
|
|
They introduced themselves, and I asked them what this was about. Foley
|
|
replied "We will ask the questions" .. "Do you know any of these hackers?"
|
|
I was asked about 10 or 15 names, and out of them I said I recognized
|
|
one or two from seeing articles here and there but hadn't had any contact
|
|
with them. I remember Foley getting angry. "You had better cooperate,
|
|
let's try again". I reiterated that I knew none of them. He said "You
|
|
are not telling us the truth" ... I told him I had little contact with
|
|
hackers and had been away from that scene for quite some time. He then
|
|
scoffed and said "You have a hacker handle don't you... What is It?"
|
|
I paused, and then replied "Terminus, but I haven't used it or gone by
|
|
that in a very long time" He said "Right, like last month..." I thought
|
|
about that and then I started to feel sick inside.. I knew that I had
|
|
sent Craig Neidorf a copy of login.c which had been modified to perform
|
|
certain functions that basically made it a trojan horse. I used that
|
|
handle since I didn't want the world to know that Len Rose was sending
|
|
someone proprietary source code through mail.. He shoved a photocopy of a
|
|
printout under my nose and asked me if I recognized it.. I looked at it
|
|
and said, "Yes.. " .. He asked me If I had made the modifications and
|
|
placed certain comments within the source. "Yes" again. "But I never used
|
|
it" I blurted out.
|
|
|
|
"We are only interested in the 911 software and Rich Andrews" they said.
|
|
[I never had anything to do with 911 software and after an extensive search
|
|
of my systems that night by a certain AT&T employee they seemed to agree.]
|
|
|
|
"Did Rich Andrews send you a copy of the 911 software?" Foley asked me.
|
|
I told them no, no one had sent me anything of the sort. I told them
|
|
that Rich had found some portion of 911 software on his system and
|
|
sent it to Charley Boykin at killer to see if it was serious. Rich had
|
|
told me before, and I sort of approved of the idea. I remember Rich
|
|
saying that he'd had no response whatsoever..
|
|
|
|
[I wish he had told me the truth, but that is for him to explain why]
|
|
|
|
"We want dirt on Rich Andrews.." Special Agent Timothy Foley said.
|
|
"We feel he has been less then cooperative.." and "Do you know he is
|
|
a convicted felon" I replied "Yes" but he is a good friend and I
|
|
know he hasn't done anything wrong. He is not involved with hackers.
|
|
Foley asked me about any dealings I had with Rich. I realized then
|
|
that lying wouldn't do me any good, so I told them everything I could
|
|
remember. What I had to say must not have been good enough, as Foley
|
|
kept saying I wasn't going to get anywhere unless I told them all the
|
|
truth. It took me a long time to convince them that was all I knew.
|
|
|
|
During the interrogation, my legal problems in Virginia were brought up,
|
|
and I mentioned that I might be acquitted. Jack Lewis said "If you get
|
|
off in Virginia, I'll make sure we burn you for this" .. I felt then
|
|
that I was completely shut off from reality.
|
|
|
|
Foley then asked me to tell them anything illegal I had done.
|
|
Jack Lewis said "It would be better if you tell us now, because if we
|
|
discover anything else later it will be very serious". By this time, I
|
|
was scared and I remember telling them that I had copies of AT&T System V
|
|
v3.1, System V v3.2 and various other pieces of software which had been
|
|
given to me by certain employees of AT&T (without the benefit of a license
|
|
agreement). "Where is it" they asked.. I told them that I had a couple
|
|
9 track tapes with prominent labels on a tape rack.
|
|
|
|
I remember asking several times to see my wife, and to go to the bathroom.
|
|
Each time I was told I couldn't. If I hadn't been so scared I would have
|
|
asked for an attorney, but my mind had shutdown completely. About 6 hours
|
|
later I was finally led out of my bedroom and told to sit at the kitchen
|
|
table and not to move. Foley and Lewis sat with me and put a sheet of
|
|
paper in front of me and told me to write a statement. "What do you want
|
|
me to write about" I asked. Foley said "Everything you told us about
|
|
Rich Andrews and also everything about the Trojan horse login program."
|
|
"Make sure you mention the System V source code"..
|
|
|
|
So, as they were finishing loading up the moving truck, I sat there and
|
|
wrote about two pages of information.
|
|
|
|
It was about midnight, when they left, but not before handing me a
|
|
subpoena to appear before the Grand Jury.
|
|
|
|
They told me to tell Rich Andrews my main Unix system had crashed, and
|
|
not to let him know that the SS had been there. I felt pretty bad about
|
|
this because I kept thinking they were going to get him. He must have
|
|
called siz or seven times the day after the "raid". I couldn't tell him
|
|
anything, since I assumed my line was tapped.
|
|
|
|
I remember going outside as they were starting to leave and looking into
|
|
the back of the moving truck. The way some of the equipment was packed, I
|
|
knew it wouldn't survive the trip into Baltimore. I asked for permission
|
|
to re-pack several items (CPUs,Hard Disks, and a 9 track drive) and received
|
|
it. As I watched my belongings pull away , I remember feeling so helpless,
|
|
and confused. It was only then did it sink in that every material possession
|
|
that really mattered to me (other than my home), was gone. All I had to
|
|
show for it was a sketchy 20 page inventory..
|
|
|
|
Later, my wife told me what had gone on until I came home. The SS
|
|
arrived around 3 pm, and had knocked on the door. She opened the door,
|
|
and 5 or 6 agents pushed her back into the foyer. They took her by the
|
|
arms and moved her over to a sofa in the living room. They had a female
|
|
agent with them, and this person was detailed to stay with her. She was
|
|
not allowed to make phone calls, or answer them (until much later in the
|
|
evening.) My children were also placed there. My son, who was 4 at the
|
|
time refused to submit to their authority (guns didn't scare him) would
|
|
get up often and follow agents around. From what my wife recalls, they
|
|
were amused at first , then later became less enthusiastic about that.
|
|
|
|
She wasn't allowed to feed the kids until after I had been released
|
|
from the interrogation session. She remembers getting up several times,
|
|
to go to the bathroom or to retrieve diapers,etc. and being told to get
|
|
back onto the sofa. The female agent even followed her into the bathroom.
|
|
The massive search of every nook and cranny of our home encompassed much
|
|
more than computer equipment. To this day, I feel there is a direct
|
|
link between my previous legal problem in Virginia, and the extent of the
|
|
search that day. In fact, the SS had obtained items seized from me by
|
|
Virginia and had them in their posession before the raid ever took place.
|
|
|
|
|
|
I remember going down to the SS office a couple days later to
|
|
voluntarily answer the subpoena. I set up my equipment for them. Although
|
|
they had labled most cables and connectors, there was some confusion.
|
|
I remember showing them how to use my systems, and in particular how to
|
|
do a recursive directory listing of every file contained within. After a
|
|
while, once they made sure they had backups , I was allowed to type a few
|
|
commands at a terminal in order to retrieve an ascii text file (a resume).
|
|
|
|
Later, while being escorted back out to the front of their offices,
|
|
I saw a large room filled with stacks of boxes and equipment cases which
|
|
had constituted the entire sum of my office and all equipment,software,and
|
|
documentation. I was feeling pretty numb, and remember asking the agents
|
|
there to please take care of everything, since I hoped to get it back.
|
|
In reflection, it seems pretty pitiful.
|
|
|
|
It was this day that they told me I would be prosecuted, and I remember
|
|
driving back from Baltimore feeling betrayed. Even though I had completely
|
|
cooperated with them, and had been told I would not be prosecuted. When I
|
|
got home, I was crying .. I couldn't handle this anymore. My sister was
|
|
there and I remember she gave me three vallium.. I calmed down and in
|
|
fact got pretty high from it.
|
|
|
|
[The following is something the SS allege I did]
|
|
|
|
Allegedly from a phone booth that night I called Rich Andrews and warned
|
|
him to get rid of any source code or software he shouldn't have.. At this
|
|
time I was also alleged to have told Rich that I was leaving the country,
|
|
and would go to Korea with my wife and kids. [If I did do this, I never
|
|
said anything about leaving] .. They apparently had either tapped his line,
|
|
or he told them about my call. [I would have been stupid to say this, since
|
|
Korea has extradition treaties with the US]
|
|
|
|
My Arrest:
|
|
|
|
Several days later, I received a sudden call from Special Agent John Lewis
|
|
and he told me to come down and pick up my fax machine. (I had been
|
|
pestering them about it so I could fax my resume out to headhunters so I
|
|
could find a job)..
|
|
|
|
[ Ironically, I had been hired a week before by Global Computer Systems,
|
|
in New Jersey to work as a contractor at AT&T's 3B2 Hotline in South
|
|
Plainfield New Jersey .. I knew that after this AT&T wouldn't have anything
|
|
to do with me and in fact was informed so the night of the raid ]
|
|
|
|
Upon entering the SS office (Feb. 6) around 5 pm, I waited outside in
|
|
the waiting room.. I had been doing some house painting and wasn't dressed
|
|
very well. Jack Lewis came out and brought me back to one of their offices
|
|
He held out his hand (as if to shake it) and instead put hand cuffs on my
|
|
hand. He then locked the other to an eyebolt on the desk. He sat down
|
|
across from me and told me to empty my pockets.. I complied, and then he
|
|
started writing an inventory of my posessions.
|
|
|
|
Jack Lewis looked up from his writing and said "You fucked us,Len!"
|
|
|
|
"What do you mean?" I said. "You called Rich Andrews, and warned him to
|
|
get rid of anything he shouldn't have,you fucked us!" .. I didn't reply.
|
|
He then told me to pull my shoestrings out of my sneakers, and I did..
|
|
He called another agent in to witness the contents of his inventory,sealed
|
|
the envelope and then told me I was going to jail.. About 15 minutes later
|
|
he released the handcuffs from the desk, and put my arms behind my back and
|
|
handcuffed them.
|
|
|
|
I was led into the hallway, while he finished some last minute details..
|
|
He was nice enough to let me make a phone call, when I asked him..I promptly
|
|
called a friend in Philadelphia. I knew he would know what to do.. Because
|
|
my wife didn't speak English well, and would also have been hysterical
|
|
I couldn't count on her to be much help.
|
|
|
|
They drove me over to the Baltimore City Jail,told the bored looking turnkey
|
|
at the desk to hold me for the night.
|
|
|
|
I was pretty hungry but I had missed the evening meal , and despite
|
|
repeated pleas to make my "phone call" the jailers ignored me.
|
|
The people in the cells next to mine were an interesting lot.
|
|
One was in for killing someone, and the other was in for a crack bust..
|
|
Someone in the cell block was drugged out, and kept screaming most of
|
|
the night.. I didn't sleep much that night, and the with the cold steel
|
|
slab they call a bed it wouldn't have been possible anyway. Sometime
|
|
around 9 am a jailer appeared and let me out.
|
|
|
|
I was then turned back over to the SS and they drove me back to the
|
|
Federal Building... They put me in another holding cell and I was there
|
|
for about 2 hours. A Federal Marshal came and took me to a court room,
|
|
where I was charged with a criminal complaint of transporting stolen
|
|
property over interstate lines with a value of $5000 or more.
|
|
|
|
The conditions for my release were fairly simple..
|
|
|
|
Sign a signature bond placing my home as collateral, and surrender
|
|
my passport. Fortunately my wife had come down earlier and Agent Lewis
|
|
had told her to get my passport or I wouldn't be released .. She drove
|
|
the 120 mile round trip and found it.. She returned, I was brought down
|
|
to the courtroom and the magistrate released me.
|
|
|
|
We retained an attorney that day, and several weeks later they agreed to
|
|
drop all charges. I am told this was to give both sides some time to work
|
|
out a deal. Against the better judgement of my (then) attorney I offered to
|
|
meet with the Assistant U.S. attorney if they would bring someone down from
|
|
Bell Labs. My thinking was that surely a Unix hacker would understand the
|
|
ramifications of my changes to the login.c source and corroborate my
|
|
explanations for the public domain password scanner. They also wanted me
|
|
to explain other "sinister" activities , such as why I had an alias for
|
|
the Phrack editors, and I knew a Unix person from the labs would know what
|
|
I meant when I said it made it easier for people to get to .BITNET sites.
|
|
|
|
|
|
I was a complete fool,and the person from Bell Labs got me in even worse
|
|
trouble when he told them I had other "trojan" software on the systems.
|
|
He was referring to a public domain implementation of su.c which David Ihnat
|
|
(chinet) had written to allow people to share su access without actually
|
|
knowing the root password. "But it is public domain software," I cried.
|
|
The Bell Labs person turned and told David King (Asst. US Attorney) that
|
|
I was lying. He went on to say that there was a considerable amount of
|
|
R&D source code on my machines. Things that no one should possess outside of
|
|
AT&T, like Korn shell and AwkCC.
|
|
|
|
My attorney (Mr. Carlos Recio of Deso, and Greenberg - Washington DC) was
|
|
furious with me. All he could say was that "I told you so.." and I realized
|
|
I had been stupid. I had hoped if I could explain the situation to the govt.
|
|
and have someone from AT&T verify what I said was true, then they would
|
|
realize I was just a typical Unix freak, who hadn't been involved in anything
|
|
more sinister than possibly having things I shouldn't have.
|
|
|
|
After a few months the best deal Mr. King offered was for me to plead
|
|
guilty to 2 felony counts (Computer Fraud) and I would receive a sentence
|
|
of 17 months in prison. I refused to take the deal, [ Perhaps I may live
|
|
to regret that decision when my trial begins in 91.. ]
|
|
|
|
In May I was formally charged with 5 felony counts.. The rest is history..
|
|
|
|
Present Day:
|
|
|
|
In better times I never lacked for work, and lived in a world where I
|
|
spent more on phone bills per month (uucp traffic), than I have earned
|
|
in the last four months.
|
|
|
|
I am sitting here (rather lying, since I cannot get up) by the laptop
|
|
computer (on loan to me from a friend) . Lately, I have grown to feel
|
|
that without this little laptop and it's modem linking me to the network
|
|
I would have been driven mad a long time ago.Reading Usenet news has been
|
|
my only solace lately. During the day I spend hours calling around to all
|
|
the head hunters asking for work.Since I still have a fax machine,
|
|
I am able to fax my resume around. So far, I haven't had much luck in
|
|
finding anything at all. Since all this happened , it seems that I have
|
|
been blacklisted. A few companies expressed interest, but later called
|
|
back and asked me if I was the "LoD hacker" and I told them yes.. They
|
|
weren't interested anymore (I cannot blame them).
|
|
|
|
I guess the Unix Today articles have cost me more than any of the others..
|
|
I lost a great contract ($500 a day) with a major bank in Manhattan when
|
|
they saw the first article.. In various articles from various newspapers,
|
|
I have been called the "Mastermind of the Legion of Doom" and other bizarre
|
|
things.
|
|
|
|
The lies told by the US Attorney in Baltimore in their press release
|
|
were printed verbatim by many papers.. The usual propaganda about the
|
|
Legion's activities in credit card fraud, breakins and the threat to the
|
|
911 system were all discussed in that press release and cast a bad light
|
|
on me.
|
|
|
|
I have had the good fortune to have a friend in Philadelphia who has
|
|
loaned me office space in his firm's building. Such an arrangement lends
|
|
an air of credibility to Netsys Inc. Too bad I have no clients or contracts.
|
|
|
|
Since I broke my leg pretty badly (The doctor says I will be in a cast for
|
|
six months and maybe some surgery) ,I haven't been able to visit the
|
|
"office" but I have an answering machine there and I check my calls daily.
|
|
|
|
We (my wife and two children) moved to the Philadelphia suburbs in order
|
|
to put as much distance as possible from the SS Agent John "Jack" Lewis
|
|
who is based in Baltimore.
|
|
|
|
I realize that the SS have offices in every city, and agents to spare
|
|
but it made me feel better knowing that he is in Baltimore and I am here.
|
|
|
|
Anyway, at this point I am trying to find a few system admin jobs, and
|
|
would take any salary they offered me. I am scared about the next few
|
|
months since I cannot even get a job as a laborer or a 7-11 clerk since
|
|
my leg is screwed.. My wife (who has a liberal arts degree) is looking
|
|
for a job in this area.. We hope she can get a job working minimum wage
|
|
in some department store or as a waitress.
|
|
|
|
We have enough money to last another month I guess. Then I am not sure
|
|
what we will do, since we haven't any relatives who will take us in.
|
|
I have never been un-employed since leaving high school, and It's a
|
|
pretty bad feeling. One day , If I survive this, I will never forget
|
|
what has happened. I can't help feeling that there is a thin veneer
|
|
of freedom and democracy in this country, and agencies like the Secret
|
|
Service are really far more powerful than anyone had realized.
|
|
|
|
I know that my friends within AT&T (E. Krell for one) feel I have
|
|
"stolen" from their company. I can only laugh at this attitude since
|
|
I have probably done more for AT&T than he has. Those of you who knew
|
|
me before can attest to this. While it was "wrong" to possess source code
|
|
without a license,I never tried to make money from it. I wrote a Trojan
|
|
Horse program, which in all honesty was done to help defend my own systems
|
|
from attack (it is currently installed as /bin/login on my equipment).
|
|
Any allegations that I installed it on other systems are completely false.
|
|
|
|
[ in fact, most of the source code was given to me by AT&T employees ]
|
|
|
|
As far as the public domain password scanner program, well.. I realize
|
|
that most of you know this, but items far more powerful can be obtained
|
|
from any site that archives comp.sources.unix,and comp.sources.misc ..
|
|
I used it as a legitimate security tool when doing security audits on
|
|
my own systems and clients. It wasn't very good really, and considering it
|
|
was obsolete (System V 3.2 /etc/shadow) anyway, it's usefulness was limited.
|
|
|
|
Since the SS will be reading this article with interest, I want to
|
|
point out that I will fight you to the end. Someday I hope you will
|
|
realize you made an honest mistake and will rectify it. Perhaps there
|
|
was some justification I am not aware of, but I doubt it. If I have to
|
|
go to prison for this, perhaps it will benefit society. Who knows what
|
|
what Len Rose would have done if left to continue his criminal pursuits.
|
|
|
|
I hope to get my equipment, and software back and then re-start my life.
|
|
There have been repeated motions to get my equipment back , but the judge
|
|
has summarily denied them saying I will commit crimes If I get it back.
|
|
I have offered to assist the SS in saving evidence,and to sign any agreement
|
|
they choose regarding validity of that evidence.
|
|
|
|
I may take up begging soon , and ask for help from someone who is rich.
|
|
It's going to be winter soon and I don't look forward to being on the
|
|
street.
|
|
|
|
Len
|
|
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
Date: Mon, 10 Sep 90 22:24:24 -0400
|
|
From: Timothy C Wolfson TTUNIX.BITNET
|
|
Subject: Tim Wolfson's address, cite list
|
|
|
|
********************************************************************
|
|
*** CuD #2.03: File 3 of 4: Bibliography of Law Articles ***
|
|
********************************************************************
|
|
|
|
|
|
Below is a list of articles published in legal periodicals that may be of
|
|
interest to your readers. This list is in no way meant to be all inclusive,
|
|
I'm sure I've left out (or not yet discovered) many pertinent pieces.
|
|
|
|
|
|
|
|
24 Am. Crim. L. Rev. 623 MAIL AND WIRE FRAUD Winter, 1987
|
|
Kimi N. NuraKami 24 AMCRLR 623
|
|
|
|
PLI Order No. C4-4175 Civil RICO 1986
|
|
PREDICATE ACTS OF MAIL FRAUD AND WIRE FRAUD June 1, 1986 Brad D. Brian
|
|
141 PLI/Lit 79
|
|
|
|
63 U. Det. L. Rev. 843
|
|
COPYRIGHT--Bootleg Records--Copyright infringement in the form of unauthorized
|
|
phonograph recordings, when such records are shipped interstate, does not fall
|
|
within the reach of the National Stolen Property Act. Dowling v. United
|
|
States, 105 S. Ct. 3127 (1985). Summer, 1986 Kenneth Adamczyk
|
|
|
|
13 Legal Econ. 44 ELECTRONIC BULLETIN BOARD SYSTEM PROVER BBS
|
|
November/December, 1987 Rees W. Morrison 13 LEGEC 44
|
|
|
|
39 Fed.Com.L.J. 217
|
|
An Electronic Soapbox: Computer Bulletin Boards and the First Amendment
|
|
October, 1987 Eric C. Jensen 39 FCLJ 217
|
|
|
|
Public Utilities Fortnightly The March of Events November 9, 1989
|
|
NEW MEXICO ELECTRONIC BULLETIN BOARD AVAILABLE AT COMMISSION
|
|
124 No. 10 Fortnight 50
|
|
|
|
PLI Order No. G4-3847
|
|
How to Handle Basic Copyright and Trademark Problems A Satellite Program
|
|
PATENT AND TRADEMARK OFFICE: PROSECUTING APPLICATIONS FOR TRADEMARK
|
|
REGISTRATION, AND INTER PARTES PRACTICE BEFORE THE TRADEMARK TRIAL AND APPEAL
|
|
BOARD February 13, 1990 Roberta S. Bren 288 PLI/Pat 135
|
|
|
|
PLI Order No.G4-3844
|
|
Patents, Copyrights, Trademarks, and Literary Property Course Handbook Series
|
|
THE LICENSING OF COMPUTER SOFTWARE PROGRAMS January 1, 1990
|
|
Gerald E. Lester 287 PLI/Pat 293
|
|
|
|
PLI Order No. 64-3839 Communications Law 1989
|
|
THE MEDIA AND THE COMMUNICATIONS REVOLUTION: AN OVERVIEW OF THE REGULATORY
|
|
FRAMEWORK AND DEVELOPING TRENDS November 9,1989 Richard E. Wiley
|
|
283 PLI/Pat 327
|
|
|
|
57 Geo. Wash. L. Rev. 1459
|
|
THE FIRST AMENDMENT AND TECHNOLOGICAL CHANGE: THE NEW MEDIA HAVE A MESSAGE
|
|
August 1, 1989 M. Ethan Katsh 57 GWLR 1459
|
|
|
|
75 A.B.A.J. 82 THE FUTURE OF TECHNOLOGY IN LAW FIRMS July, 1989
|
|
Jon E. Klemens 75 ABAJ 82
|
|
|
|
44 Bus. Law. 1081 ELECTRONIC FUND TRANSFERS May, 1989
|
|
David B. Goldstein, Edward L. Rubin, Dewey B. Morris,
|
|
Charles P. Seibold, Richard P. Kessler, Jr., Richard S. Wyde.
|
|
|
|
PLI Order No. G4-3831 Protecting Trade Secrets 1989
|
|
PROTECTING TRADE SECRETS: LEGAL THEORIES April 1, 1989 Michael J. Hutter
|
|
269 PLI/Pat 9
|
|
|
|
PLI Order No. A4-4255
|
|
Law Practice Management for the Solo and Small Office Practitioners
|
|
Conquer the Computer It's your ticket to tomorrow and the key to a more
|
|
effective and competitive practice April 1, 1989 JAMES A. EIDELMAN
|
|
492 PLI/Comm 353
|
|
|
|
54 W.Educ.L.Rep. 761
|
|
COMPUTER VIRUSES: LEGAL AND POLICY ISSUES FACING COLLEGES AND UNIVERSITIES
|
|
1989 David R. Johnson, J.D. Thomas P. Olson, J.D.,
|
|
David G. Post, Ph.D., J.D. 54 WELR 761
|
|
|
|
PLI Order No. G4-3821/3 Communications Law 1988
|
|
THE MEDIA AND THE COMMUNICATIONS REVOLUTION: AN OVERVIEW OF THE REGULATORY
|
|
FRAMEWORK AND DEVELOPING TRENDS November 10, 1988 Richard E. Wiley
|
|
262 PLI/Pat 681
|
|
|
|
XXIX B.C.L.Rev. 803
|
|
COPYRIGHTED SOFTWARE: SEPARATING THE PROTECTED EXPRESSION FROM UNPROTECTED
|
|
IDEAS, A STARTING POINT September, 1988 J. Dianne Brinson
|
|
XXIX BCLR 803
|
|
|
|
21 J. Marshall L. Rev. 735
|
|
COMMUNICATIONS TECHNOLOGY: NEW CHALLENGES TO PRIVACY Summer, 1988
|
|
Fred W. Weingarten 21 JMARLR 735
|
|
|
|
63 N.Y.U.L.Rev. 416
|
|
DON'T TOUCH THAT DIAL: RADIO LISTENING UNDER THE ELECTRONIC COMMUNICATIONS
|
|
PRIVACY ACT OF 1986 May, 1988 Fred Jay Meyer 63 NYULR 416
|
|
|
|
14 Legal Econ. 30 ELECTRONIC COMMUNICATIONS A LAWYER'S PRIMER
|
|
April, 1988 Carl G. Roberts Rees W. Morrison Greg H. Schlender
|
|
14 LEGEC 30
|
|
|
|
PLI Order No. G4-3804
|
|
Telecommunications 1987: Current Developments In Policy and Regulation
|
|
AN OVERVIEW OF INTERNATIONAL ISSUES December 10, 1987 P. Michael Nugent
|
|
244 PLI/Pat 145
|
|
|
|
PLI Order No. G4-3804
|
|
Telecommunications 1987: Current Developments In Policy and Regulation
|
|
REALITY RELEARNED December 10, 1987 Lawrence W. DeMuth, Jr.
|
|
244 PLI/Pat 133
|
|
|
|
24 Am. Crim. L. Rev. 623 MAIL AND WIRE FRAUD Winter, 1987
|
|
Kimi N. NuraKami 24 AMCRLR 623
|
|
|
|
13 Legal Econ. 28 LEGAL TECHNOLOGY: PRESENT AND FUTURE TRENDS
|
|
November/December, 1987 Gordon L. Jacobs 13 LEGEC 28
|
|
|
|
73 A.B.A.J. 50 HOW COMPUTERS MADE US BETTER LAWYERS May 15, 1987
|
|
Joshua Stein 73 ABAJ 50
|
|
|
|
72 Iowa L.Rev. 1015
|
|
The National Security Agency and Its Interference with Private Sector Computer
|
|
Security May, 1987 Renae Angeroth Franks 72 IALR 1015
|
|
|
|
27 Va. J. Int'l. L. 575
|
|
Statutory Improvements to the Foreign Availability Process for High Technology
|
|
National Security Export Controls Spring, 1987 Richard T. Horan, Jr.
|
|
|
|
42 Bus.Law. 614 COMPUTER LAW February, 1987
|
|
Bernard G. Helldorfer, Harold J. Daw, William E. Hirschberg, Darrell K.
|
|
Fennell, and Andrew W. Hoffmann 42 BUSLAW 614
|
|
|
|
67 B.U.L.Rev. 179
|
|
WARRANT REQUIREMENT FOR SEARCHES OF COMPUTERIZED INFORMATION January, 1987
|
|
C. Ryan Reetz
|
|
|
|
40 Vand.L.Rev. 1 Free Speech, Copyright, and Fair Use January, 1987
|
|
L. Ray Patterson
|
|
|
|
10 U.Ark.Little Rock L.J. 55
|
|
WHAT IS COMPUTER CRIME, AND WHY SHOULD WE CARE? 1987-88
|
|
Michael C. Gemignani 10 UARLRLJ 55
|
|
|
|
13 Rutgers Computer And Tech.L.J. 451
|
|
THE ELECTRUNIC COMMUNICATIONS PRIVACY ACT OF 1986: THE CHALLENGE OF APPLYING
|
|
AMBIGUOUS STATUTORY LANGUAGE TO INTRICATE TELECOMMUNICATION TECHNOLOGIES
|
|
1987 Russell S. Burnside 13 RUCTLJ 451
|
|
|
|
PLI Order No. G4-3790 Protecting Trade Secrets 1986
|
|
LEGAL THEORIES AND RECENT DEVELOPMENTS May 1, 1986 Michael J. Hutter
|
|
224 PLI/Pat 11
|
|
|
|
20 Colum.J.L.Soc.Prob. 89
|
|
Teleinformatics, Transborder Data Flows and the Emerging Struggle for
|
|
Information: An Introduction to the Arrival of the New Information Age 1986
|
|
ANTHONY PAUL MILLER
|
|
|
|
Judicature Articles August-September 1989
|
|
TECHNOLOGY IN APPELLATE COURTS: THE NINTH CIRCUIT'S EXPERIENCE WITH ELECTRONIC
|
|
MAIL Stephen L. Wasby 73 JUDICATURE 90
|
|
|
|
Judicature Focus August-September, 1988
|
|
TECHNOLOGY COMES TO THE COURTS Paul Nejelski 72 JUDICATURE 136
|
|
|
|
38 Cath.U.L.Rev. 401
|
|
THE FIRST AMENDMENT INVALIDITY OF FCC OWNERSHIP REGULATIONS Winter, 1989
|
|
Jonathan W. Emord 38 CATHULR 401
|
|
|
|
38 Cath.U.L.Rev. 299
|
|
RED LIONS, TIGERS AND BEARS; BROADCAST CONTENT REGULATION AND THE FIRST
|
|
AMENDMENT Winter, 1989 Charles D. Ferris Terrence J. Leahy
|
|
38 CATHULR 299
|
|
|
|
38 Cath.U.L.Rev. 471
|
|
THE DIVERSITY PRINCIPLE AND THE MFJ INFORMATION SERVICES RESTRICTION: APPLYING
|
|
TIME-WORN FIRST AMENDMENT ASSUMPTIONS TO NEW TECHNOLOGIES Winter, 1989
|
|
Richard A. Hindman 38 CATHULR 471
|
|
|
|
57 Geo. Wash. L. Rev. 1459
|
|
THE FIRST AMENDMENT AND TECHNOLOGICAL CHANGE: THE NEW MEDIA HAVE A MESSAGE
|
|
August 1, 1989 M. Ethan Katsh 57 GWLR 1459
|
|
|
|
57 Geo. Wash. L. Rev. 1495
|
|
ON UNDERSTANDING THE FIRST AMENDMENT STATUS OF CABLE: SOME OBSTACLES IN THE WAY
|
|
August 1, 1989 Jerome A. Barron 57 GWLR 1495
|
|
|
|
38 Emory L.J. 715
|
|
THE ILLEGITIMACY OF THE PUBLIC INTEREST STANDARD AT THE FCC July 1, 1989
|
|
William T. Mayton 38 EMORYLJ 715
|
|
|
|
PLI Order No. G4-3826/1
|
|
Cable Television Law 1989: Dealing with the New Challenges
|
|
TELEPHONE COMPANY ENTRY INTO VIDEO PROGRAMMING March 1, 1989 Frank W. Lloyd
|
|
266 PLI/Pat 9
|
|
|
|
87 Mich.L.Rev. 499
|
|
FREE SPEECH AND THE 'ACID BATH': AN EVALUATION AND CRITIQUE OF JUDGE RICHARD
|
|
POSNER'S ECONOMIC INTERPRETATION OF THE FIRST AMENDMENT November, 1988
|
|
Peter J. Hammer 87 MILR 499
|
|
|
|
86 Mich.L.Rev. 1269 QUESTIONING BROADCAST REGULATION May, 1988
|
|
Jonathan Weinberg 86 MILR 1269
|
|
|
|
1988 Duke L.J. 329 CABLE TELEVISION AND THE FREEDOM OF EXPRESSION
|
|
April/June, 1988 Daniel Brenner 1988 DUKELJ 329
|
|
|
|
VI Yale L. Pol'y Rev. 449
|
|
Ad Hoc Access: The Regulation of Editorial Advertising on Television and Radio
|
|
1988 Rhonda Brown VI YLLPR 449
|
|
|
|
39 Hastings L.J. 165
|
|
The TRAC to Fairness: Teletext and the Political Broadcasting Regulations
|
|
November, 1987 GAIL A. FLESHER 39 HSTLJ 165
|
|
|
|
21 U.Mich.J.L.Ref. 137
|
|
THE RIGHT TO SPEAK, THE RIGHT TO HEAR, AND THE RIGHT NOT TO HEAR: THE
|
|
TECHNOLOGICAL RESOLUTION TO THE CABLE/PORNOGRAPHY DEBATE Fall/Winter, 1987-88
|
|
Michael I. Meyerson 21 UMIJLR 137
|
|
|
|
8 Cardozo L.Rev. 317
|
|
AN EXCESS OF ACCESS: THE CABLE COMMUNICATIONS POLICY ACT OF 1984 AND FIRST
|
|
AMENDMENT PROTECTION OF EDITORIAL DISCRETION December, 1986 Adam R. Spilka
|
|
8 CDZLR 317
|
|
|
|
75 Geo.L.J. 361 A Press Privilege for the Worst of Times
|
|
October, 1986 David Joseph Onorato
|
|
|
|
35 Emory L.J. 563
|
|
CABLE LEASED ACCESS AND THE CONFLICT AMONG FIRST AMENDMENT RIGHTS AND FIRST
|
|
AMENDMENT VALUES Summer, 1986 William E. Lee
|
|
|
|
XX Suffolk U.L.Rev. 1 FREE SPEECH IN AN ECONOMIC PERSPECTIVE
|
|
Spring, 1986 Richard A. Posner
|
|
|
|
33 U. Kan. L. Rev. 305
|
|
INDEPENDENT BUT INADEQUATE: STATE CONSTITUTIONS AND PROTECTION OF FREEDOM OF
|
|
EXPRESSION Winter, 1985 Todd F. Simon
|
|
|
|
58 S.Cal.L.Rev. 1351 CONTROLLING THE CONTENT OF PRINT AND BROADCAST
|
|
September, 1985 MATTHEW L. SPITZER
|
|
|
|
22 Harv.J.Legis. 503
|
|
TELEPHONE PORNOGRAPHY: FIRST AMENDMENT CONSTRAINTS ON SHIELDING CHILDREN FROM
|
|
DIAL-A-PORN Summer, 1985 JOHN C. CLEARY
|
|
|
|
133 U. Pa. L. Rev. 661
|
|
A PROPOSED MODEL OF THE SOVEREIGN/PROPRIETARY DISTINCTION March, 1985
|
|
Teresa Gillen
|
|
|
|
98 Harv.L.Rev. 747
|
|
INFORMATION TECHNOLOGY AND THE STRUCTURE OF SECURITIES REGULATION
|
|
February, 1985 Donald C. Langevoort
|
|
|
|
98 Harv.L.Rev. 205
|
|
Leading Cases of the 1983 Term--Constitutional Law: Freedom of Speech, Press,
|
|
and Association--Restrictions on Public Broadcasters' Rights to Editorialize
|
|
November, 1984 98 HVLR 205
|
|
|
|
38 U.Miami L.Rev. 769
|
|
A Common Law for the Ages of Intellectual Property Septemer, 1984
|
|
DAN ROSEN
|
|
|
|
25 Harv. Int'l L.J. 299
|
|
The British Telecommunications Decision: Toward a New Telecommunications Policy
|
|
in the Common Market March, 1984 Slida A. Wall
|
|
|
|
8 Nova L.J. 631
|
|
Communications Revolutions and Legal Revolutions: The New Media and the Future
|
|
of Law March, 1984 M. Ethan Katsh
|
|
|
|
82 Mich.L.Rev. 981 FREE SPEECH AND HIGH TECH February, 1984
|
|
Francis Dummer Fisher 82 MILR 981
|
|
|
|
XIII Fordham Urb.L.J. 801
|
|
ELECTRONIC PUBLISHING: FIRST AMENDMENT ISSUES IN THE TWENTY-FIRST CENTURY
|
|
1984 Lynn Becker
|
|
|
|
97 Harv.L.Rev. 584
|
|
SAFEGUARDING THE FIRST AMENDMENT IN THE TELECOMMUNICATIONS ERA TECHNOLOGIES OF
|
|
FREEDOM. By Ithiel de Sola Pool. Cambridge, Massachusetts: Belknap Press
|
|
of Harvard University Press. 1983. Pp. 299. $20. December, 1983
|
|
Mario L. Baeza
|
|
|
|
36 Vand.L.Rev. 985
|
|
Global Governance of Global Networks: A Survey of Transborder Data Flow in
|
|
Transition May, 1983 Anne W. Branscomb 36 VNLR 985
|
|
|
|
38 Cath.U.L.Rev. 365
|
|
INFORMATION AS PROPERTY: DO RUCKELSHAUS AND CARPENTER SIGNAL A CHANGING
|
|
DIRECTION IN INTELLECTUAL PROPERTY LAW? Winter, 1989 Pamela Samuelson
|
|
38 CATHULR 365
|
|
|
|
47 U.Pitt.L.Rev. 1185
|
|
ALLOCATING OWNERSHIP RIGHTS IN COMPUTER-GENERATED WORKS Summer, 1986
|
|
Pamela Samuelson
|
|
|
|
47 U. Pitt. L. Rev. 1131
|
|
THE UNCERTAIN CASE FOR SPECIAL LEGISLATION PROTECTING COMPUTER SOFTWARE
|
|
Summer, 1986 Leo J. Raskind
|
|
|
|
32 Wayne L.Rev. 1191
|
|
PROPOSED JUDICIAL GUIDELINES FOR DECIDING SOFTWARE INFRINGEMENT ACTIONS
|
|
Spring, 1986 SUSAN L. MASHOUR
|
|
|
|
16 Rutgers Computer and Tech.L.J. 323
|
|
DIGITAL MEDIA AND THE CHANGING FACE OF INTELLECTUAL PROPERTY LAW
|
|
Winter, 1990 Pamela Samuelson
|
|
|
|
_____________________________________________________________________
|
|
| Tim Wolfson | Internet: tcwst@unix.cis.pitt.edu |
|
|
| Pitt Law | CCNet : tcwst@CISUNX |
|
|
| PGH, PA 15260 | UUCP : tcwst@cisunx.uucp |
|
|
| (412) 486-0182 | Bitnet : TCWST@PITTVMS.BITNET |
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
Date: September
|
|
From: Entity
|
|
Subject: A comment on Zod's case
|
|
|
|
********************************************************************
|
|
*** CuD #2.03: File 4 of 4: A Comment on the Zod Case ***
|
|
********************************************************************
|
|
|
|
|
|
I hope to present you with some of the details regarding Zod's bust so
|
|
that your readers can be more familiar with the case. Sometime around
|
|
late October 1989 or so, Zod set up a multi user chat system on a US Air
|
|
Force system. The program he was using was Hans Kornedor's chat program ,
|
|
which many of you may recognize as the chat program used on the ALTOS
|
|
german hacker chat systems. In any case, Zod modified this program,
|
|
making superficial changes and labelled it TDON chat.
|
|
|
|
What he did was infiltrate a US Air Force UNIX system at Andrews Air Force
|
|
Base. Because of the extremely lax security on the system, he was easily
|
|
able to gain super user privileges and set up an SUID shell in one of the
|
|
directories. He then changed the password on an unused account (Foster.
|
|
Password was TDON) and set his TDON chat system up. He then went onto
|
|
places such as TCHH (Germany), ALTGER (Germany) and QSD (France) and
|
|
started spreading the news of this great new chat. Thankfully, not many
|
|
people paid any attention to Zod (who is world reknown to be a class "A"
|
|
bozo.) Very few people called and of those who did, it was mostly
|
|
american users on telenet, although there were a few european callers as
|
|
well. I was actually invited to the system by an up and coming VAX/VMS
|
|
hacker who used the alias 'Corrupt' (he was part of the group HiJiNx!). I
|
|
knew him from meetings on the various european chat systems as well as him
|
|
being on the Corrupt Computing Canada BBS System in Toronto, Canada. Last
|
|
I heard, he was busted as well, although I am not sure of on what charges.
|
|
|
|
The chat itself was up for maybe a week -- a week and a half at best. At
|
|
this point you are probably wondering who would be suicidal enough to set
|
|
up a hacker chat system on a US Air Force system, right? Well, there's
|
|
more to Zod's stupidity than just that. In addition to setting up the
|
|
chat, Zod decided that he would be smart and in the .login script for the
|
|
foster account he added in the TEE command to log everything to a file.
|
|
For those unfamiliar with UNIX, the tee command basically takes the input
|
|
coming into the user's TTY, and makes a copy of it into a specified file.
|
|
Zod had this input go into a directory with the filename the same as the
|
|
user's process ID. I guess Zod's intention was to at a later time peruse
|
|
these files for useful information, but what he ended up doing was handing
|
|
us all to the authorities on a silver platter.
|
|
|
|
Now one of the modifications that Zod had made to the chat program was to
|
|
add in a shell escape. I never did figure out what the escape sequence
|
|
was (not that I ever looked very hard), but I noticed that if I lifted my
|
|
phone up, (thereby sending garbage over the modem) and put it back down, I
|
|
would automatically be plopped into the shell! It was here that I
|
|
discovered all the craziness that Zod had set up. You can imagine my
|
|
surprise when I looked at some of the files in my directory and discovered
|
|
that this chat system had been set up on a military unix machine! It was
|
|
then that I found all the TEE'd files, the source code to his TDON chat,
|
|
and the SUID root shell. Again for those unfamiliar with unix, an SUID
|
|
root shell basically allows a user to run this file and gain superuser
|
|
privileges by temporarily changing their User ID to that of root
|
|
(superuser). Those familiar with hacking unix's will agree that it is
|
|
never a good idea to leave such a file around on a system since it can be
|
|
easily detected if not hidden properly. Not only was this file NOT
|
|
hidden, it was put in plain view of the system administrator! If my
|
|
memory serves correctly, it was put into the /tmp directory under a very
|
|
obvious filename!
|
|
|
|
Of course, the biggest problem with this particular set up was the TEE'd
|
|
log files that zod had created. Those files had some very far reaching
|
|
consequences as I shall describe in just a minute. Because of Zod's
|
|
generosity in logging all chat sessions, Air Force Security staff had no
|
|
reason to do any additional logging of information. What the security
|
|
staff did was first of all change the password on the foster/tdon account
|
|
and then made backups of all the chat session files. These were then
|
|
compiled into a huge document (looks to be about 800-900 pages) and was
|
|
edited to take out overlapping chat processes. I have managed to acquire
|
|
this document through a friend of mine who was recently charged for
|
|
infiltrating several systems. Part of the evidence was that document
|
|
submitted by the Andrews Air Force base.
|
|
|
|
For the benefit of those people who called this chat and who gave out
|
|
incriminating evidence, I will just briefly list their names. You guys
|
|
should realize that your particular sessions were logged and are included
|
|
as part of the evidence. I would not be surprised if a further
|
|
investigation stemming from Zod's bust were to be carried out. The people
|
|
who should be watching their tails are: Sam Brown, Hunter, Phreakenstein,
|
|
Outlaw, Corrupt and Jetscream. These are obviously not the only people
|
|
who were logged, but they do represent those who passed out accounts and
|
|
passwords and other incriminating information on the chat, as well as
|
|
having spent the most amount of time on there.
|
|
|
|
So how does this lead up to Zod's arrest? Well, I'm not positive. On the
|
|
Air Force machine, zod was dumb enough to leave his name plastered all
|
|
over the chat including on the logon screen. Of course this cannot be
|
|
used solely as evidence enough to convict, but it sure as hell points in
|
|
his direction. Zod was also not a very careful person -- this is of
|
|
course obvious from him having set up the Air Force Chat, but in addition,
|
|
he left behind a lot of clues. He wasn't a very competent hacker and never
|
|
cleaned up after himself. I assume it wasn't very difficult to track him
|
|
down from his blatant misuse of the City University system in Washington.
|
|
It is my understanding that Corrupt and others were busted indirectly
|
|
because of him. Perhaps someone closer to the source can confirm this.
|
|
|
|
In any case, what all this goes to show you is how the stupidity of one
|
|
individual can lead to the problems of so many others. By setting up a
|
|
hacker chat system on the Andrews Air Force base system, he committed a
|
|
great mistake. By then inviting so many hackers from the international
|
|
hack scene, he committed a greater sin. But for actually logging all this
|
|
information and never deleting it, he committed the ultimate crime. This
|
|
kid is a royal pain in the posterior and a serious threat to all hackers.
|
|
|
|
- Entity/CCCAN! (Corrupt Computing Canada)
|
|
|
|
|
|
********************************************************************
|
|
|
|
------------------------------
|
|
|
|
**END OF CuD #2.03**
|
|
********************************************************************
|
|
! |