974 lines
48 KiB
Plaintext
974 lines
48 KiB
Plaintext
|
||
|
||
Computer underground Digest Tue Aug 24 1993 Volume 5 : Issue 65
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Ediot: Etaoin Shrdlu, III
|
||
|
||
CONTENTS, #5.65 (Aug 24 1993)
|
||
|
||
File 1--Report on Summer Hack-Tic Conference in the Netherlands
|
||
File 2--Another View of the Hack-tic '93 Conference
|
||
File 3--Computer Culture and Media Images
|
||
File 4--Media Images of Cu Digest - CuD Response to SunWorld
|
||
File 5--CORRECTION on Graduate Paper Competition for CFP-'94
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Wed, Aug 11, '93 04:28:01 PDT
|
||
From: Robert David Steele <steeler@well.sf.ca.us>
|
||
Subject: File 1--Report on Summer Hack-Tic Conference in the Netherlands
|
||
|
||
((MODERATORS' NOTE: Newsweek (July 26, 1993: 58) billed
|
||
the Hack-tic conference in Lelystad, the Netherlands,
|
||
on August 3-6 as "Woodstock for the Nintendo generation."
|
||
|
||
There's no guarantee of a large turn-out, but if
|
||
thousands show up, it may help demonstrate just how far
|
||
hacking has moved out of the bedrooms of smelly
|
||
adolescents. If so, there's likely to be less geeking
|
||
and more dancing in the Dutch summer night. Programmers
|
||
may one day be able to lean back from their terminals,
|
||
pat their pocket protectors and say, "I was there."
|
||
|
||
The following two reports by attendees Robert D. Steeler and Emmanuel
|
||
Goldstein, editor of 2600 Maazine, {suggest that the techno-phreak
|
||
gathering was a success)).
|
||
|
||
++++
|
||
|
||
Here is a brief report (on the Hack-tic conference:
|
||
|
||
Roughly 150 people endured the rigors of camping out in a damp
|
||
environment with no showers and minimal toilet facilities. The food
|
||
provided and cooked by volunteers was wholesome but plain (lots of
|
||
rice and beans). The Hack-tic organizers did a great job of setting
|
||
up a main tent and two smaller workshop tents, as well as a full local
|
||
net (which may not have hooked up to INTERNET as intended). Some sexy
|
||
products and literature, but on the whole it was a mind-link event.
|
||
(I had bronchitis and stayed in a local hotel on advice of doctor, so
|
||
I missed most of the late night workshops.
|
||
|
||
Here are a few highlights, mostly an outline of what took place with
|
||
some follow-up contacts and one or two editorial comments:
|
||
|
||
"Networking for the Masses". Main tent, 75 or so in audience. Talked
|
||
about obstacles to free flow of information, main being that "the
|
||
masses" aren't even close to understanding the technologies and the
|
||
obscure mediocre user interfaces and complex unintegratable
|
||
applications. For more info:
|
||
ted@nluug.nl (Ted Lindgreen, Manager of nlnet)
|
||
peter@hacktic.nl (Peter von der Pouw Kraan, involved in
|
||
squat movement newsletters Blurf and NN)
|
||
maja@agenda.hacktic.nl (Maja van der Velden, Agenda
|
||
Foundation)
|
||
nonsenso@utopia.hacktic.nl (Felipe Rodriguez from Hack-Tic
|
||
Network which spun out of Dutch computer underground)
|
||
zabkar@roana.hacktic.nl (Andre Blum, expert in wireless
|
||
communications).
|
||
|
||
A few others:
|
||
|
||
"Phreaking the Phone" I missel uhis one, which was surely very
|
||
interesting. Emmanuel can comment. For more info:
|
||
bill@tech.hacktic.nl (Billsf, one of the world's best...
|
||
|
||
"Hacking and the Law" Very important discussion of whether the laws
|
||
are out-dated or retarded (to which I would also add my standard
|
||
comment that law is not a good substitute for engineering oversights).
|
||
More info: fridge@cri.hacktic.nl (Harry Onderwater, technical EDP
|
||
auditor at Dutch National Criminal Intelligence Service)
|
||
herschbe@dutiws.twi.tudelft.nl (Professor Bob Herschberg, lectures on
|
||
computer insecurity and unprivacy) rgb@tracer.hacktic.nl (Ronald RGB
|
||
O., the only Dutch hacker arrested both before and after new law in
|
||
effect, self-taught writer and author for Hack-tic Magazine)
|
||
andy@cccbln.ccc.de (andy Mueller-Maguhn, from German Chaos Computer
|
||
Club) emmanuel@eff.org (our ((The Well's)) own)
|
||
|
||
kaplan@bpa.arizona.edu (Ray Kaplan, computer security consultants,
|
||
hosts "meet the enemy" sessions" rop@hacktic.nl (Rop Gonggrijp, was
|
||
involved in some of the first computer break-ins om 80's, editor of
|
||
Hacktic Magazine, and a VERY hard worker and leader of the team that
|
||
put this conference together. I have guaranteed his expenses and am
|
||
hosting his participation, and emmanuels, in my symposium in November
|
||
whose secret title is "hacking the intelligence community".
|
||
|
||
A number of technical workshops, modest participation.
|
||
|
||
The most impressive workshop, which drew a lot of people and had
|
||
continuous spin-off conversations the next day, was led by David
|
||
Chaum of DigiCash, address Kruislaan 419, 1098 VA Amsterdam, The
|
||
Netherlands, phone +31 20 665-2611 fax +31 20 668-5486 email
|
||
david@digicash.nl. This guy, either English or England trained, is a
|
||
heavy duty dude who appears to be on the bleeding edge (actually he's
|
||
holding the knife) in the areas of smart cash, undeniable signatures,
|
||
untraceable electronic mail, zero-knowledge signatures and zero
|
||
information circuits, privacy protected payments, and so on. I was
|
||
very impressed.--not my thing, but a class act. My next (separate
|
||
response) contains my outline for the workshop, "Hacking the
|
||
Intelligence Community: Increasing Citizens' Access to Intelligence in
|
||
the Age of Information Warfare".
|
||
|
||
++++++++++++++++++++++++
|
||
|
||
Outline of Hack-tic Workshop 6 August, Holland "Hacking the
|
||
Intelligence Community: Increasing Citizens' Access to Intelligence in
|
||
the Age of Information Warfare"
|
||
|
||
- What IS intelligence? Data, Info, Intel
|
||
- Why Hack the Intelligence Community?
|
||
- Age of Info, InfoWar, InfoEcon
|
||
- Empower CITIZENS, the "troops"
|
||
- Move $1-5 billion from U.S. Intel Budget (per year, there is a draft
|
||
bill I wrote circulating for comment, to create a National Knowledge
|
||
Foundation)
|
||
- Salute to Hackers--The Trail Blazers
|
||
- Mile in My Shoes
|
||
- Intel Experience
|
||
-$10M mistake (USMC Intel Ctr built Top Secret system to get into CIA
|
||
data, etc., only to find database empty of useful Third World
|
||
info--and the system isn't allowed to go into open source databases by
|
||
security regulations)
|
||
- Explode the Myth of Intelligence
|
||
- Collection failures (less than 10%)
|
||
- Production failures (90% or more of what a policy maker reads/listens
|
||
to is UNCLASSIFIED and UNANALYZED)
|
||
- Production types & limits (too much, too late, too secret)
|
||
Dinosaur/Cadilac Analogy (We've spent billions building a superhighway
|
||
between Mosco and Washington, and a single Cadillac, when what we
|
||
really need now is many many off-road vehicles--five jeeps, 100
|
||
motorcycles, 1000 bikes)
|
||
- BENCHMARKING (Get consumers of intelligence to give same question to
|
||
library as to intel--one general got an answer from library in 45
|
||
minutes and it was of course unclassified; intel community came back
|
||
in two days, SAME answer, classified)
|
||
- Power in the Age of Information
|
||
- Information Continuum (K-12, univ, lib, businesses, private
|
||
investigators-info brokers, media, government, defense-intel)
|
||
- Barriers--Iron Curtains between sectors, Bamboo Curtains between
|
||
institutions within sectors, plastic curtains between individuals
|
||
within institutions.
|
||
- Hackers helping poke holes in the curtains.
|
||
|
||
INFORMATION COMMONS
|
||
|
||
Need to break down curtains SHARED collection responsibilities
|
||
DISTRIBUTED analysis & production Age of "central" intelligence is
|
||
OVER!! Direct "mind-links" in real time between consumer w/question
|
||
and expert w/answer Old linear paradigm dead (consumer to analyst to
|
||
collector to source and back) New diamond paradigm (all four all ways)
|
||
Must empower the citizen with intelligence
|
||
-- as a voter
|
||
-- as an investor
|
||
-- as an entrepreneur
|
||
-- as scientist
|
||
-- as social thinker
|
||
New Security Concepts: Focus on connectivity and speed, NOT on
|
||
restricting dissem or even bothering to decrypt Need a NATIONAL
|
||
KNOWLEDGE STRATEGY God Bless Al Gore BUT he is "all connectivity and
|
||
no content" Need to free up unclassified information wrapped in the
|
||
"cement overcoat" of peripheral classified information Need a national
|
||
program to break down curtains and increase sharing of original
|
||
unclassified source material Need a national cooperative R&D effort to
|
||
avoid waste (I believe the intelligence community wastes $100 million
|
||
a year at least, from having at least ten different "black" programs
|
||
each trying to build the ultimate all source analysts workstation in
|
||
isolation--and this is just one small example of waste from
|
||
compartmentation)
|
||
Intelligence for the Masses
|
||
|
||
Lots of good Q&A.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 11 Aug 1993 18:21:43 PDT
|
||
From: Emmanuel Goldstein, 2600 Magazine <emmanuel@well.sf.ca.us>
|
||
Subject: File 2--Another View of the Hack-tic '93 Conference
|
||
|
||
Actually, attendance was estimated by the organizers at around 1,000.
|
||
It was bigger than the Galactic Hacker Party and, in my opinion, more
|
||
interesting. Too bad so few Americans showed up - tons of media
|
||
though. Some of the highlights for me: the "stone" keyboard -
|
||
somebody set up a computer on the grass with a keyboard made of stones
|
||
and, yes, it worked; the room filled with computers from all over the
|
||
world tied into a giant ethernet and then further tied to all of the
|
||
computers in tents on the field; the social engineering workshop where
|
||
people from all corners of the globe shared stories; and the overall
|
||
Woodstock atmosphere of the whole thing. It's incredible how you can
|
||
just pull things like this off over there with a minimum of hassle. In
|
||
the States there are literally dozens of reasons why such an event
|
||
wouldn't work. Despite that, we're going to try to do something next
|
||
summer for the tenth anniversary of 2600. We need two things: a
|
||
warehouse and some network experts to be creative. Plus a whole lot of
|
||
good karma.
|
||
|
||
P.S. United States Customs took one look at my passport and pulled me
|
||
aside yet again. The usual: bags searched, interrogation as to what
|
||
kind of magazine I write for, and a 25 minute wait while they "check"
|
||
my name. This has happened to me so many times now that I can hardly
|
||
consider it coincidence anymore. It's pure harassment and it's
|
||
garbage like this that makes it an embarrassment to be an American
|
||
these days.
|
||
|
||
I guess I can expect to disappear now having spoken against the state.
|
||
|
||
------------------------------
|
||
|
||
Date: 20 Aug 93 19:28:52 EDT
|
||
From: george c smith <70743.1711@COMPUSERVE.COM>
|
||
Subject: File 3--Computer Culture and Media Images
|
||
|
||
Computer Culture and Media Images
|
||
(By George C. Smith)
|
||
|
||
"I've had enough of that crummy stuff. Crummy stuff, crummy
|
||
stuff, crummy, crummy, crummy, crummy, crummy stuff." (from
|
||
"Crummy Stuff," by The Ramones)
|
||
|
||
After reviewing numerous stories on the computer underground dating
|
||
back to 1990, Mike Liedtke's Contra Costa Times piece on the
|
||
NIRVANAnet BBS's comes off as another example of the genre:
|
||
paint-by-numbers journalism, so predictable it's a cliche. The locales
|
||
shift, the names change, the breathless "maybe something shady's going
|
||
on here" tone stays the same.
|
||
|
||
Unfortunately, so does the expertise of the reporters. Seemingly
|
||
locked into some kind of "computer neophyte from Hell" never-never
|
||
land, there never seems to be a lack of writers who turn in stories
|
||
which are painfully unsophisticated, sensational and . . . crummy.
|
||
It's damnable, because the picture which emerges is one of mainstream
|
||
journalists who ought to be starting to get the lay of the land, but
|
||
aren't.
|
||
|
||
By contrast, this lack of know-how hasn't stopped reporters, or even
|
||
slowed them down, in generation of countless fluffy, trend stories on
|
||
the information superhighway, this year's bright and shiny cliche.
|
||
|
||
So, that the users of the NIRVANAnet systems think the news media
|
||
arrogant is not a scream of wounded pride or the surprised squeak of
|
||
slimy characters exposed when their rock is turned over. It's
|
||
justified.
|
||
|
||
Why?
|
||
|
||
Take for example a news piece which appeared in 1990 in The Morning
|
||
Call newspaper of Allentown, PA, a continent and three years away.
|
||
|
||
The Call had discovered a now long gone "underground" bulletin board
|
||
in nearby Easton, PA. I lived in the area at the time and Liedtke's
|
||
Contra Costa Times piece was uncannily similar to the one Morning Call
|
||
reporter Carol Cleaveland delivered for the Call's readership. The
|
||
same ingredients were in the mix: a couple of textfiles on how to
|
||
make bombf a regional lawman explaining about how hard it is to nail
|
||
people for computer crime and a tut-tutting sysop of another local
|
||
"public domain" system acting as a tipster, warning concerned readers
|
||
that he sure as Hell wouldn't want such a system in his backyard.
|
||
Just like Liedtke's Contra Costa Times piece, there was not a shred of
|
||
comment from the sysop whose system was being profiled. Nothing ever
|
||
came of the nonsense. The system continued online for a couple of
|
||
more years, no criminal charges were filed, and the local businesses
|
||
appeared not to go up in flames at the hands of unknown hackers or
|
||
bomb-throwing, masked anarchists. So, this was news?
|
||
|
||
Now, fast forward to The New York Times on January 25 of this year. In
|
||
an 'A' section article, reporter Ralph Blumenthal profiled "Phrakr
|
||
Trakr," a federal undercover man keeping our electronic streets safe
|
||
from cybernetic hoodlums too numerous to mention singly.
|
||
|
||
A quick read shows the reporter another investigator from the
|
||
mainstream who hadn't gotten anything from underground BBS's
|
||
first-hand, relying instead on the Phrakr Trakr's tales of nameless
|
||
computer criminals trafficking in "stolen information, poison recipes
|
||
and _bomb-making_ [emphasis MINE] instructions."
|
||
|
||
While not dwelling on or minimizing the issue of phone-related phraud
|
||
and the abuse of credit card numbers on underground BBS's (which has
|
||
been established), Blumenthal's continued attention to text files for
|
||
"turning household chemicals into deadly poisons, [or] how to build an
|
||
'Assassin Box' to supposedly send a lethal surge through a telephone
|
||
line" was more of the same. It was the kind of news which furthers the
|
||
perception on the nets that reporters are rubes, reluctant to use
|
||
their mental faculties to analyze material of dubious nature.
|
||
|
||
Most anyone from teenagers to the college educated on-line seem to
|
||
recognize text files on a BBS as usually menacingly written trivial
|
||
crap or bowdlerized, error-filled reprints from engineering, biology
|
||
and chemistry books. In either case, hardly noteworthy unless you're
|
||
one who can't tell the difference between comic books and real news.
|
||
So why can't we, make that why SHOULDN'T we, expect the same critical
|
||
ability from mainstream journalists? Of course, we should.
|
||
|
||
And it's not only the on-line community which is getting mugged. Just
|
||
about every sentient, reading mammal in North America was fed a
|
||
continuous line on the Michelangelo virus for the first three months
|
||
of 1992 courtesy of the mainstream press. In the aftermath, the
|
||
perception seeped in that inadvertently or not, most reporters had
|
||
been played for suckers by software developers. However, there was no
|
||
informed skepticism when it counted.
|
||
|
||
Recall, newspapers around the country ran headlines warning of
|
||
imminent disaster. "Thousands of PC's could crash Friday," said USA
|
||
Today. "Deadly Virus Set to Wreak Havoc Tomorrow," said the
|
||
Washington Post. "Paint It Scary," said the Los Angeles Times.
|
||
|
||
Weeks after the grand viral no-show on March 6th, reporters still
|
||
insisted the hysterical coverage prevented thousands of computers from
|
||
losing data. John Schneidawind of USA Today claimed "everyone's PC's
|
||
would have crashed" in interview for the American Journalism Review
|
||
but was unable to provide any evidence to back it up.
|
||
|
||
Even The San Jose Mercury News credited the publicity with saving the
|
||
day. There was, however, little mention that corporate wallets were
|
||
swollen with payouts from worried consumers or that most of the
|
||
experts used as sources came from the same circle of businessmen
|
||
benefiting from the panic.
|
||
|
||
In the aftermath everyone blamed John McAfee, the nation's leading
|
||
antiviral software manufacturer. After all, it was McAfee who told
|
||
many reporters that as many as 5 million computers were at risk,
|
||
wasn't it?
|
||
|
||
However, a look back at some of his comments to American Journalism
|
||
Review in May 1992 expands the limelight a little. "I told reporters
|
||
all along that estimates ranged from 50,000 to 5 million," he said. "I
|
||
said, '50,000 to 5 million, take your pick,' and they did."
|
||
|
||
"I never contacted a single reporter, I never sent out a press
|
||
release, I never wrote any articles," he continued. "I was just
|
||
sitting here doing my job and people started calling."
|
||
|
||
"Before the media starts to crucify the antivirus community," he
|
||
continued, "they should look in the mirror and see how much [of the
|
||
coverage] came from their desire to make it a good story. Not that I'm
|
||
a press-basher."
|
||
|
||
Why does this happen? What drives one of these "good stories"?
|
||
|
||
John Schneidawind of USA Today, when interviewed shortly after
|
||
Michelangelo said John McAfee was always available to explain things
|
||
from the early days of the Silicon Valley. There was a sense, said
|
||
Schneidawind, that "we owed him." That's even-handed reporting!
|
||
|
||
Obviously, a great many news stories are hung on a sexy hook, too.
|
||
Often this has little to do with reality. Put yourself in a
|
||
reporter's shoes, fire-balling these leads past an editor.
|
||
Techno-kids running amok in cyberspace, crashing the accounts of
|
||
hapless businessmen, playing fast and loose with the law, fostering
|
||
the dissolution of community in the suburbs! Or, computer virus
|
||
plague set to incinerate data world wide! Or, government BBS flouts
|
||
public interest, aids computer vandals in high-tech predation of
|
||
nation's information superhighways! Whoosh! Bang! Who wouldn't bite?
|
||
|
||
Now imagine trying to sell an on-going series dealing with the warp
|
||
and weave of the networks, touching on everything from dating BBS's to
|
||
encryption to virus distribution to electronic publishing, copyright
|
||
law and free speech. Frequently, you'll need more than 40 column
|
||
inches per topic to do it right.
|
||
|
||
If you're a reporter you might hear these responses as reasons NOT to
|
||
get into such a project.
|
||
|
||
1. We don't have the space. (There will, however, always be 40 inches
|
||
of space for the latest equivalent of "Jurassic Park.")
|
||
|
||
2. We can get that off the wire. We can't afford to get involved in
|
||
specialty journalism.
|
||
|
||
3. No more long stories - our readership won't follow them. (Policy
|
||
at USA Today.)
|
||
|
||
4. No one is interested in computers. (Believe it or not, this was a
|
||
popular one in 1992 at The Morning Call in Allentown, PA.)
|
||
|
||
5. I don't understand all that, our readers won't either.
|
||
|
||
6. Where's the hook?
|
||
|
||
So, proactive news stories, particularly on computers, are a hard sell
|
||
many reporters aren't up to. Conversely, most have no trouble selling
|
||
what Carl Jensen, journalism prof at Sonoma State in California, calls
|
||
"junk food news."
|
||
|
||
Junk food news is, he writes, "sensationalized, personalized,
|
||
homogenized trivia . . . generic to [some] of the following
|
||
categories: Madonna's latest sexscapades . . . the newest diet craze,
|
||
fashion craze, dance craze, sports craze, video game craze . . . the
|
||
routine freeway pile-up . . . the torrents of rhetoric pouring from
|
||
the mouths of candidates, pledging to solve unemployment, reduce the
|
||
deficit, lower prices, [and] defy foreign invaders . . ."
|
||
|
||
Junk food news soaks up a lot of effort on the part of reporters. And
|
||
there is no shortage of junk food computer news, either.
|
||
|
||
Take, for instance, almost anything using the word "cyber." The August
|
||
15th issue of The L.A. Times Sunday Magazine devoted three-quarters of
|
||
a page to "Hack Attack - Cybersex." "Cybersex," in the finest
|
||
gosh-oh-jeekers style, went on about yet another budding entrepreneur
|
||
who's puzzled out there's a market in putting $70 worth of sex
|
||
animation on CD-ROM. Only such a junk food news piece _could_ close
|
||
with a quote from the businessman so ludicrous it would be laughed off
|
||
the table in any self-respecting barroom. "This is a powerful
|
||
medium," said the computer sex movie-maker. "The potential is there
|
||
for people prone to become alienated to become alienated. But we also
|
||
envision virtual reality sex as a vehicle for people to interact with
|
||
others in a way they might not feel comfortable in reality."
|
||
|
||
The week before, the same magazine ran a story on cyberpunk Billy Idol
|
||
and how callers to The Well were dissing him for being a phony.
|
||
That's news!
|
||
|
||
Other computer junk food news stories include, but are by no means
|
||
limited to:
|
||
|
||
--Just about anything on Jaron Lanier and data gloves.
|
||
|
||
--Tittering, voyeuristic "human interest" pieces on local
|
||
lonely-hearts BBS's that DON'T mention that 50 percent of the data
|
||
storage is devoted to color photos of hideously obese men and women
|
||
screwing, young models licking each other's private parts and other
|
||
similar stuff which, if warehoused as magazines in a windowless,
|
||
beige-colored building on the publisher's block, would be the target
|
||
of a picketing team from the metro section of the same newspaper.
|
||
|
||
--Flogging the latest Steven Spielberg project which involves using
|
||
50-gazillion megabytes of computer power and more cash than the gross
|
||
national product of the Ukraine to make a TV show on some kind of
|
||
virtual reality living submarine with tentacular arms and talking
|
||
porpoise sidekicks.
|
||
|
||
--Anything on the information superhighway with the usual pro forma
|
||
hey-even-I-could-think-of-that quotes from Ed Markey and Mitch Kapor.
|
||
|
||
--Gadget stories - actually, unpaid advertisements - on the newest
|
||
computer-chip controlled stun gun, the newest computer-driven home
|
||
studio, the newest useless morphing software for amusing and cowing
|
||
your friends, the newest wallet-sized computer which doesn't exist,
|
||
the newest whatever-press-release-selling-it-came-in
|
||
-through-the-fax-machine-today device.
|
||
|
||
Ah, but these are easy shots to take, being mostly the handiwork of
|
||
features and entertainment reporters, long regarded as the:Slft white
|
||
underbelly of the news media.
|
||
|
||
What about front page news? Take a look back at Joel Garreau's
|
||
Washington Post expose of Kim Clancy and the AIS system.
|
||
|
||
It's reliance on the usual he said/she said reporting resulted in the
|
||
trotting out of source Paul Ferguson who was able to pose as two
|
||
people at once. This, perhaps, would not have happened had Garreau
|
||
been more familiar with the complexities of computer security. As it
|
||
was, the pursuit of the news from a human interest angle resulted in a
|
||
set-up, or "official scandal" as its called by Martin Lee and Norman
|
||
Solomon in a devastating criticism of journalistic methods,
|
||
"Unreliable Sources: A Guide To Detecting Bias in Newsmedia" (1990,
|
||
Lyle Stuart).
|
||
|
||
According to Lee and Solomon, "official" scandals as reported by the
|
||
press, have certain hallmarks.
|
||
|
||
1. "The 'scandal' [came] to light much later than it could have." So
|
||
it was with AIS: The hacker files were removed from the BBS
|
||
weeks before the story was retold by The Washington Post.
|
||
|
||
2. "The focus is on scapegoats, fallguys, as though remedial action
|
||
amounts to handing the public a few heads on a platter." Kim
|
||
Clancy, the administrator of AIS, was the fallguy, er, fall-lady,
|
||
here.
|
||
|
||
3. "Damage control keeps the media barking but at bay. The press is
|
||
so busy chewing on scraps near the outer perimeter that it stays
|
||
away from the chicken house." While the news media was chewing on
|
||
AIS, it neglected to discover Paul Ferguson doing double-duty,
|
||
anti-virus researchers helping themselves to dangerous code on
|
||
AIS while complaining about it to others, and the ugly truth
|
||
that much of the virus code and live viruses on amateur BBS's
|
||
throughout the U.S. can be traced to AIS's opponents, a few of
|
||
the same complaining researchers.
|
||
|
||
4. "Sources on the inside supply tidbits of information to steer
|
||
reporters in certain directions -- and away from others."
|
||
|
||
5. "The spotlight is on outraged officials." In this case,
|
||
"anonymous", Paul Ferguson, Ed Markey, etc., -- asking tough,
|
||
but not TOO tough, questions.
|
||
|
||
Because it ran in The Washington Post, Garreau's story immediately
|
||
touched off a wave of pack journalism. The Associated Press digested
|
||
all the wrong, flashy aspects of Garreau's work. Specialty
|
||
publications catering to corporate computer users published weird,
|
||
warped tales on AIS, culminating in Laura Didio's August 9th feature
|
||
in LAN Times which called Computer underground Digest "a BBS" and had
|
||
the ubiquitous Ed Markey claiming that the AIS system had infected
|
||
itself with a virus, a serious falsehood. This from a reporter, no,
|
||
make that a _bureau chief_, who works for a computer publication!
|
||
|
||
So if the NIRVANAnet BBS operators are angry with Mike Liedtke for
|
||
blind-siding them in the pages of The Contra Costa Times, good for
|
||
them. If they think mainstream journalists have been doing a rotten
|
||
job on computer stories, they have the ammunition to prove it.
|
||
|
||
It is right for them to expect more from journalists than the passing
|
||
on of whatever received wisdom is currently circulating about the
|
||
computer underground. It's perfectly legitimate to expect more from
|
||
reporters than junk food computer news or dressed-up press releases.
|
||
They're right if they think they're being patronized by news
|
||
organizations which assign reporters who don't know what a modem is,
|
||
have only been Prodigy members or who believe that being a "people"
|
||
person is sufficient qualification to report in this beat.
|
||
|
||
Good journalists are obliged to be responsive and receptive to the
|
||
beats and communities they cover. So it should be with the computer
|
||
underground. It is not considered cool to use ignorance or
|
||
inexperience as an excuse for slipshod work, to take the path of least
|
||
resistance, to rely only upon sources who are mainstream professional
|
||
acquaintances or whose names are right near the telephone. Those who
|
||
think otherwise are jerks.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 17 Aug 1993 13:39:27 CDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 4--Media Images of Cu I^est - CuD Response to SunWorld
|
||
|
||
((MODERATORS' NOTE: Media misrepresentations directly affect CuD. We
|
||
are periodically depicted as a "BBS" or a "system." When a reporter
|
||
from New Jersey writing on computer crime called me in early August, I
|
||
found it impossible to explain an electronic journal to
|
||
her--incredibly, she not only did NOT know about Internet or BBSes,
|
||
but DID NOT KNOW WHAT A MODEM WAS!
|
||
|
||
The problem grows more serious when CuD is misrepresented in a way
|
||
that depicts us as advocating illegal activity, abetting computer
|
||
intrusion, or suggesting that we advocate chaos or disorder. Because
|
||
such articles generally do not appear in national media, we don't see
|
||
them unless readers send us a copy. The following SunWorld article is
|
||
such an example. Although CuD was referenced just once in a single
|
||
sentence, the phrasing carried discomforting implications. We could
|
||
not let this one go without a response. We reproduce this material as
|
||
an example of the difficulties we all continue to confront in
|
||
"educating" the media, and to illustrate the generally unintended
|
||
genesis of twists of phrase that become self-perpetuating in the game
|
||
of "catch-up to the facts." What follows is, first, our letter to the
|
||
author of the SunWorld piece, Phillip Moyer. Second, we summarize our
|
||
e-mail responses to him. Finally, because we do not how our final
|
||
response to SunWorld will appear after editing, we include the entire
|
||
letter.
|
||
|
||
CuD has continually argued that most editors and reporters are quite
|
||
amenable to receiving criticisms. Phillip Moyer's response was civil
|
||
and cooperative. We were especially impressed with SunWorld editor
|
||
Mark Cappel's attitude, which was cordial, cooperative, and--while he
|
||
deferred judgment until "the facts were in"--he was fully amendable to
|
||
listening without defensiveness and to consider our complaint.
|
||
However, such courtesy is what we'd expect from one originally from
|
||
our University town of DeKalb, Ill.
|
||
|
||
++++ (Original letter to the author) ++++
|
||
|
||
Date--Fri, 9 Jul 93 1:26 CDT
|
||
To--PRM@ECN.PURDUE.EDU
|
||
From--Cu-Digest (tk0jut2@mvs.cso.niu.edu) <TK0JUT2>
|
||
Subject--Response to your SunWorld (July '93) piece
|
||
|
||
|
||
Dear Phillip Moyer:
|
||
|
||
I am stunned by your description of Cu Digest in the July,
|
||
'93, issue of SunWorld. Among other things, you write:
|
||
|
||
"If you have reason to look in a novice's account, you
|
||
will probably find copies of Phrack, the Computer
|
||
Underground Digest, and the Legion of Doom's Technical
|
||
Journals, all of which have information novices (and
|
||
more advanced crackers) find useful (p. 101).
|
||
|
||
|
||
My complaint centers on your CuD comments. CuD does not
|
||
cater to "crackers," and if you had bothered to read CuD you
|
||
would note the editorial philosophy in the header. We have
|
||
*never*, not once, published cracking material or any
|
||
material that could even remotely be described as "helpful
|
||
to 'crackers'". If you believe I am mistaken, please cite a
|
||
specific article. If not, I request an explicit correction
|
||
and an apology for your misrepresentation.
|
||
|
||
CuD is a legitimate electronic newsletter/journal.
|
||
Relatively few of our 80,000+ readers are students, let
|
||
alone "crackers." Most are academics, computer specialists,
|
||
journalists, attorneys, and others interested in a variety
|
||
of legal, ethical, social, political, and scholarly issues
|
||
surrounding computer culture. Had you looked at past
|
||
issues, you would see book reviews, debates, news, legal
|
||
documents, legislative information, conference announcements
|
||
and summaries, and a broad range of other information that
|
||
covers "cyberspace." Further, had you bothered to examine
|
||
the CuD ftp sites, you would note that we maintain
|
||
directories of a variety of Electronic newsletters, academic
|
||
papers, state and federal computer laws, and other archival
|
||
invaluable.
|
||
|
||
We have worked hard to establish a reputation as a forum for
|
||
debate that allows diversity of views. To have our
|
||
reputation tarnished with public claims insinuating
|
||
collusion in illegal or unethical conduct is intolerable. We
|
||
have consistently gone on record publicly and privately to
|
||
oppose all forms of predatory behavior, including
|
||
unauthorized computer intrusion. For those unfamiliar with
|
||
CuD, your article both misrepresents our purpose and impugns
|
||
our integrity. As a criminal justice professor, I'm not
|
||
inclined let such a reckless disregard for truth pass
|
||
lightly.
|
||
|
||
I trust that we can resolve your misrepresentation amicably,
|
||
and an apology and retraction in a forthcoming issue of
|
||
SunWorld would suffice.
|
||
|
||
<jt sig>
|
||
|
||
+++
|
||
|
||
Phillip Moyer replied with an explanation. He also identified several
|
||
articles that he thought would be helpful to hackers. Because CuD has
|
||
never published "hacking" information, we were compelled to respond.
|
||
This issue strikes is as critical, because when other read the
|
||
article, such as law enforcement agents or our University personnel,
|
||
the CuD editors are placed in jeapordy. The following are excerpts
|
||
from our correspondence to him. We summarize his comments, to which we
|
||
are responding:
|
||
|
||
((In his response, Mr. Moyer indicated that his CuD description was
|
||
based on personal experience of network intruders into his site, where
|
||
his "investigations" reveal multiple copies of CuD, Phrack, and
|
||
LOD/TJ. The CuD response:
|
||
|
||
Connecting CuD to "hackers" in this manner is quite a leap
|
||
of logic. You could also make the same statement about CuD
|
||
being carried and read by law enforcement. From our estimate,
|
||
thousands of BBSes, public access systems, ftp, and other
|
||
sites carry CuD. Finding CuD amongst "hackers" is no more
|
||
surprising than finding O'Reilly's books (eg, "Practical
|
||
Unix Security" or "The Whole Internet") in "hacker"
|
||
libraries. Your twist of phrase is neither innocent nor
|
||
neutral, and the implications are quite clear. I'm pleased
|
||
that "hackers" read CuD just as I am that law enforcement
|
||
reads it. Perhaps the former will learn from it that
|
||
computer intrusion and predatory behavior are uncool, just
|
||
as we hope the latter will learn that civil liberties and
|
||
common sense extend to "cyberspace."
|
||
|
||
You identify several categories of information "useful" to
|
||
"hackers."
|
||
|
||
1. "Cult" information about famous cracking groups.
|
||
2. Technical cracking information.
|
||
3. Information about networks in general, and how to move around...
|
||
4. Information about cracker activities/clubs/busts.
|
||
5. Cyberpunk related articles.
|
||
|
||
Guilty as charged, with the exception of #2, which we have
|
||
*never* published. We publish news. So what? So does the New
|
||
York Times, SunWorld, and other sources. The list you
|
||
identify is a miniscule fraction of our contents. EFFector
|
||
publishes similar, but more narrow, material. I find your
|
||
list quite disingenuous. Please re-read your own article:
|
||
You write about hackers and where they obtain their skills.
|
||
In that context, you list CuD along with two other E-'Zines
|
||
specifically devoted to developing skills. You falsely
|
||
categorize us, tarnish us by "guilt by association," and in
|
||
the context of your article you paint us as a "hacker"
|
||
source. You made a mistake, and I would think it more
|
||
honorable that you acknowledge it rather than glibly try to
|
||
engage in word games and further insult me with sloppy
|
||
logic.
|
||
|
||
((Mr. Moyer suggests that "hackers" are interested in more than "how
|
||
to" documents, which may be why they "insist" on keeping copies of CuD
|
||
in their "stolen accounts."))
|
||
|
||
You continue with your "guilt by association" rationale.
|
||
Your wording is curious: I'm not sure why you use the term
|
||
"insist," and perhaps it reflects more about your own
|
||
attempts to impute motives to others as you have attributed
|
||
false meaning to CuD. From my experience, few "hackers"
|
||
keep things in "stolen accounts," but that's a trivial
|
||
issue. More to the point is your continued insistence on
|
||
linking CuD with "stolen accounts" and other illegal
|
||
behavior. Please remember that your article made no mention
|
||
of "other" information, but in context focused on the "how
|
||
to" aspect. And, the fact that CuDs may be "of interest"
|
||
does not lead to the conclusion that they are helpful for
|
||
"hacking," as you strongly suggest.
|
||
|
||
I challenged you to list an article that is "helpful" for
|
||
"hackers" or "hacking," and you identify the following:
|
||
|
||
> CuD #2.14, file 7: Don't Talk to Cops
|
||
>
|
||
>This one lists security problems that novice crackers may
|
||
>not have thought about, and therefore gives them avenues of
|
||
>attack which they may otherwise have overlooked:
|
||
|
||
((MODERATORS' NOTE: Because of ambiguity of wording, it appeared that
|
||
the reporter's description of file the "Security on the Net" File
|
||
referred to the "Don't Talk to Cops" article. The CuD letter
|
||
describes the following, not the previous issue. There was no
|
||
explanation given for why "Don't Talk" was used as an example)).
|
||
|
||
Astounding! This file says no such thing. It was written in
|
||
response to abuses by law enforcement in overstepping their
|
||
bounds in investigations. The Phrack and Steve Jackson
|
||
cases, of which I assume you're aware, typify such excesses.
|
||
You'll recall that in many of the so-called "Bill Cook" and
|
||
"Sun Devil" cases of early 1990, at which time that file was
|
||
written, investigators were rather zealous in their
|
||
techniques. This file was written by an attorney for *all*
|
||
readers. Even CuD editors were concerned about the "knock on
|
||
the door." I'm stunned that you saw in that article anything
|
||
related to "security problems that novice crackers may not
|
||
have thought about, and therefore gives them avenues of
|
||
attack which they may otherwise have overlooked." The
|
||
article says no such thing and casts serious credibility on
|
||
your claim to have read CuD, let alone this article. The
|
||
article is simply not about what you claim. Period!
|
||
|
||
> CuD #3.00, file 5: Security on the Net
|
||
|
||
Again, I'm appalled at your interpretation. This article was
|
||
written by a system administrator who was once active on the
|
||
nets and whose name you might recognize. It is essentially
|
||
a summary of survey responses, which strikes me as fully
|
||
legitimate. If you see in that something "of interest" to
|
||
hackers that would aid them in intrusion (and that was,
|
||
after all, my query to you), then your own SunWorld piece
|
||
must surely be classified as a primer for novice hackers.
|
||
This is another article which it seems you have not read.
|
||
|
||
>For true novices who haven't figured out how to forge
|
||
>mail yet, there's:
|
||
> CuD #1.06, file 5: SMPT (sic)
|
||
|
||
Sorry, but mail forging is hardly a "hacking" tactic and is
|
||
of no use in system intrusion. Even for those who would
|
||
attempt to use that file to forge mail, they would find that
|
||
it wouldn't work. Even if I were to concede (which I don't)
|
||
that such an article is of technical interest to hackers, it
|
||
is of such inconsequential value and was (even at that time)
|
||
so well-known that it's odd that you would consider it in
|
||
your list. I should also add that (if my recollection is
|
||
correct) it was written by a computer professional as a bit
|
||
of a prank because of it's useless value, and we ran it as a
|
||
bit of a spoof. Sorry, but you get no points for this one.
|
||
|
||
>For a number of system-level penetration ideas, mostly to do
|
||
>with poor memory protection, check out
|
||
> Cud #1.07, file 4: article forwarded from alt.security
|
||
|
||
Again, there is nothing technical in this post. An "old
|
||
time" hacker reflects on the past and, if anything, bemoans
|
||
the direction of irresponsible newcomers. We've posted many
|
||
such pieces, pro and con. That you adduce this as evidence
|
||
of a hacking aid, which was what I asked you to produce,
|
||
suggests that my original claim was correct: You can find no
|
||
articles to substantiate the inference in your article.
|
||
|
||
We have published about 200 issues of Cu Digest, which comes
|
||
to over 1,000 articles, almost 8 megs of text files, and
|
||
many reams of printouts. You have failed to substantiate
|
||
your claim other than with some vague allusion to "of
|
||
interest" to hackers, which by you definition, includes a
|
||
range of articles so diverse as to defy credibility.
|
||
|
||
((Are CuD editors merely bickering over terminology??))
|
||
|
||
I don't see this as mere bickering. Your claims in the
|
||
SunWorld article were clear and tarnished our professional
|
||
reputations. Your words in the article were not
|
||
conditional, were not qualified, and explicitly linked CuD
|
||
with other media that were targeted to a teenage hacker
|
||
audience and included considerable, although generally
|
||
publicly available, technical "how to" information. Your
|
||
inability to make your case, your "guilt by association"
|
||
approach, and your apparent inability to see that as
|
||
anything more than mere "bickering" of words is shocking.
|
||
|
||
((The following is the public letter we finally submitted to SunWorld)):
|
||
|
||
+++++
|
||
|
||
Date: Tue, 20 Jul 93 2:24 CDT
|
||
To: mark.cappel@sunworld.com
|
||
From: Jim Thomas (tk0jut1@mvs.cso.niu.edu) <TK0JUT1>
|
||
Subject--Response to SunWorld article of July 23, '93 from Cu Digest
|
||
CC: PRM@ECN.PURDUE.EDU,GRMEYER@GENIE.GEIS.COM
|
||
|
||
18 July, 1993
|
||
|
||
|
||
To: Mark Cappel, Editor
|
||
SunWorld
|
||
|
||
In the July, 1993, issue of SunWorld, Phillip Moyer's piece on
|
||
computer "hackers" ("Defending the Realm") referred to Computer
|
||
underground Digest (CuD) with an unfortunate choice of words:
|
||
|
||
"If you have reason to look in a novice's account, you will
|
||
probably find copies of Phrack, the Computer Underground
|
||
(sic) Digest, and the Legion of Doom's Technical Journals,
|
||
all of which have information novices (and more advanced
|
||
crackers) find useful (p. 101).
|
||
|
||
Although probably unintended, the phrasing might lead those
|
||
unfamiliar with CuD to mistakenly infer that it is a "hacker"
|
||
journal that encourages "hacking" and publishes "how to
|
||
'crack'" information. Although we're pleased that hackers are
|
||
among those who find CuD of interest, the usefulness of our
|
||
articles does not include any technical or other "how to"
|
||
information, and CuD is not aimed at a "hacker" audience.
|
||
|
||
CuD is an electronic journal/newsletter available at no cost to
|
||
anybody with an internet mailing address. We have at least
|
||
80,000 readers world-wide. The audience is primarily computer
|
||
professionals, academics, attorneys, journalists, students, and
|
||
others who are interested in computer culture. Articles include
|
||
research papers, legal and legislative summaries, conferences
|
||
news and excerpts, book reviews, interviews, news, debates of
|
||
current issues related to "cyberspace" and "virtual reality,"
|
||
and other information aimed at a diverse readership. We have
|
||
never published technical information helpful for
|
||
"hacking/cracking" and have consistently criticized all forms
|
||
of computer abuse. The emphasis on a "hacker" culture and
|
||
related articles derives in part from the editors' criminal
|
||
justice background, and in part from CuD's original goal, begun
|
||
in March, 1990, as what at the time was conceived as a
|
||
temporary service to publish overflow pieces from Telecom
|
||
Digest related to the 1990 "hacker crackdown."
|
||
|
||
We recognize any writer's difficulty in choosing words that will
|
||
please everybody, and we sympathize with what may seem to the
|
||
SunWorld author (and others) as simply bickering over phrasing.
|
||
However, given the power of labels and the potential harm that
|
||
might result from being construed as a medium that abets
|
||
criminal activity, we assure SunWorld readers that, although
|
||
we're pleased that CuDs can be found in the files of "hackers"
|
||
(as well as law enforcement, thousands of BBSes and public
|
||
access systems, ftp sites, and elsewhere), CuD is of no more of
|
||
use to "hackers/crackers" than a SunWorld article describing
|
||
specific techniques that curious potential intruders might try.
|
||
|
||
((Final comment: We reproduce this not out of self-indulgence, but to
|
||
show how easily articles might be misconstrued. There is also an
|
||
apparent double-standard operating: An obscure CuD piece can be given
|
||
a "helpful to hacker's" gloss while explicitly technical details found
|
||
in security manuals, technical volumes, or even classbooks, are not.
|
||
Even though reporters see their comments as innocent, and even though
|
||
they may judge our comments as excessively thin-skinned, we can
|
||
envision a reader of such articles writing an irate letter to an
|
||
employer, university administrator, congressional rep, or law
|
||
enforcement agent, wondering "why taxpayer dollars are being used to
|
||
fund 'hacking' at a public university." We're obligated to stifle such
|
||
misinformation when it's brought to our attention. If CuD readers
|
||
come across similar articles in trade journals or other media, let us
|
||
know. For media folk wanting to know what a "CuD" is, we suggest the
|
||
"Frequently Asked Questions" list that we include with new
|
||
subscriptions.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 20 Aug 1993 18;21:43 EDT
|
||
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu)
|
||
Subject: File 5--CORRECTION on Graduate Paper Competition for CFP-'94
|
||
|
||
((MODERATORS' NOTE: The address listed in CuD 5.64 for the CFP-'94
|
||
grad student paper competition should be corrected as listed below. If
|
||
you know of grad students doing work in an area related to
|
||
computers/technology/privacy, pass this information along to them. WE
|
||
REQUEST THAT FACULTY ALSO POST THE INFORMATION ON THEIR DEPT BULLETIN
|
||
BOARDS AND SLIP THE INFORMATION INTO GRAD STUDENT MAIL BOXES.
|
||
|
||
CFP-'94 will be held in Chicago in March, 1984, and brings together an
|
||
exciting multi-disciplinary mix of academics, professionals, and
|
||
others, to discuss the issues between technology, freedom, and
|
||
privacy. For further details, see CuD 5.60, File 2)).
|
||
|
||
+++
|
||
|
||
STUDENT PAPER COMPETITION
|
||
|
||
Full time college or graduate students are invited to enter the
|
||
((CFP-'904)) student paper competition. Papers must not exceed 2500
|
||
words and should address the impact of computer and telecommunications
|
||
technologies on freedom and privacy in society. Winners will receive
|
||
a scholarship to attend the conference and present their papers. All
|
||
papers should be submitted by November 1, 1993 (either as straight
|
||
text via e-mail or 6 printed copies) to:
|
||
|
||
Professor Eugene Spafford
|
||
Department of Computer Sciences
|
||
1398 Computer Science Building
|
||
Purdue University
|
||
West Lafayette, IN 47907-1398
|
||
E-Mail: spaf@cs.purdue.edu; Voice: 317-494-7825
|
||
|
||
|
||
REGISTRATION
|
||
|
||
Registration information and fee schedules will be announced by
|
||
September 1, 1993. Inquiries regarding registration should be
|
||
directed to RoseMarie Knight, Registration Chair, at the JMLS
|
||
address above; her voice number is 312-987-1420.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.65
|
||
************************************
|
||
|
||
|
||
|