957 lines
49 KiB
Plaintext
957 lines
49 KiB
Plaintext
|
|
Computer underground Digest Sun Mar 5, 1995 Volume 7 : Issue 18
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Semi-retiring Shadow Archivist: Stanton McCandlish
|
|
Correspondent Extra-ordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Monster Editor: Loch Nesshrdlu
|
|
|
|
CONTENTS, #7.18 (Sun, Mar 5, 1995)
|
|
|
|
File 1--Review of _The Virus Creation Labs_ (by George Smith)
|
|
File 2--The Virus Creation Labs: an excerpt
|
|
File 3--Re: Press Coverage Bloopers in the Mitnick Story (CuD 7.16)
|
|
File 4--Italian BBS Charged with "Subversion"
|
|
File 5--Cu Digest Header Info (unchanged since 26 Feb, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Thu, 2 Mar 1995 21:13:33 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 1--Review of _The Virus Creation Labs_ (by George Smith)
|
|
|
|
There are relatively few books on the "computer underground" that
|
|
provide richly descriptive commentary and analysis of personalities
|
|
and culture that simultaneously grab the reader with entertaining
|
|
prose. Among the classics are Cliff Stoll's _The Cuckoo's Egg_, Katie
|
|
Hafner and John Markoff's _Cyberpunks_, and Bruce Sterling's _The
|
|
Hacker Crackdown_. Add George Smith's _The Virus Creation Labs_ to
|
|
the list.
|
|
|
|
_Virus Creation Labs_ is about viruses as M*A*S*H is about war.
|
|
Computer viruses are simply a window through which Smith guides our
|
|
gaze into a bizarre Pirandellian world of inflated egos, malicious
|
|
territorialism, questionable ethics, and avarice, about equally
|
|
divided between the moral entrepreneurs amongst virus fighters and
|
|
their nemesis, the virus writers. Smith writes with irony, cynical
|
|
humor, and well-researched prose to provide insights into the
|
|
symbiotic, chaotic, and oft-times seemingly pathological relationship
|
|
between churlish virus writers and the equally churlish anti-virus
|
|
moral entrepreneurs.
|
|
|
|
At the outset, Smith makes it clear that his is neither a technical
|
|
tome nor an expose. Although his text reads with the ease of a novel,
|
|
the subtext is a biting commentary on the Manichean world view
|
|
possessed by many in the phalleocentric anti-virus community and on the
|
|
maturity-challenged actions of many of the virus writers who coexist
|
|
in an uneasy partnership of co-dependency.
|
|
|
|
Smith begins his narrative with the Michelangelo virus hysteria of
|
|
1992, which, he explains, launched his own interest in viruses:
|
|
|
|
It sent me down the trail to the rim of cyberspace in search
|
|
of people who, perhaps not surprisingly, turned out to be
|
|
pretty much like most Americans, except with an order of
|
|
magnitude greater interest in the inner workings of the
|
|
desktop personal computer. Like most of us, there wasn't a
|
|
nobleman in the lot--and there were none among the ranks of
|
|
the antivirus software developers and security consultants
|
|
who consider themselves the gatekeepers at a fantasy wall of
|
|
their own construction erected between the Wild West of
|
|
cyberspace and the mannered, sterile environment of safe
|
|
home and business computing (p. 2).
|
|
|
|
Smith argues with some persuasiveness that Michelangelo was fueled
|
|
largely by the anti-virus industry who, while seeming to magnaminously
|
|
provide the public with free cleansing software, in fact hyped the
|
|
virus to the media to dramatize the dangers of this and other viruses
|
|
as an effective commercial strategy. Although Smith is hardly the
|
|
first to make this accusation, he is the first to provide a strong
|
|
argument. He notes, for example, that Compuserve made $100,000 in on
|
|
line charges from the McAfee forum, the source of anti-virus software
|
|
author John McAfee, in the days prior to March 6, the date the virus
|
|
was supposed to strike (p. 7), and notes how the virus threat allowed
|
|
McAfee to gain major dominance of the U.S. anti-virus software market.
|
|
|
|
Smith notes that some anti-virus experts, such as Pam Kane,
|
|
tried to temper the hysteria with reasoned writings, but she
|
|
and a few others were out-shouted by the "vendor-created hysteria:"
|
|
|
|
It's a venal pattern repeated over and over: Anti-virus
|
|
software manufactures and security consultants carping at
|
|
each other and conducting back-stabbing negative publicity
|
|
campaigns in the computer or mainstream press, complicated
|
|
by the entrenched practice within computer industry
|
|
publishing houses allowing corporate heads or their catspaws
|
|
to write books and reviews focused on their merchandise.
|
|
These tricks tend to be hidden behind mock concern over
|
|
high-tech petty atrocities usually perpetrated by
|
|
mysterious, unseen computer vandals or hackers. Like many
|
|
hardscrabble businessmen vying for commercial advantage in
|
|
an increasingly confined arena dominated by one company,
|
|
such tactics grant them all the charm and panache of a
|
|
60-pound bag of money-mad cockroaches (p 18).
|
|
|
|
Among the anti-virus faction Smith singles out as especially dubious
|
|
are John Buchanan, who is described as a mercenary and a-moral
|
|
huckster with little technical talent but a bent for self-promotion,
|
|
and Alan Solomon, who is portrayed as a territorial, mean-spirited
|
|
busy-body. Was Solomon at least partly responsible for the one of the
|
|
most mean-spirited and unethical acts on the nets? Smith implies that
|
|
he was. Paul Ferguson, "an obscure security consultant," wrote an
|
|
anonymous letter to RISKS Digests. In the anonymous letter, Ferguson
|
|
engaged in a good bit of disingenuous diatribe, character
|
|
assassination, and hysteria to complain that AIS BBS, a
|
|
general-information BBS run by the Treasury Department's Office of
|
|
Public Debt, was engaged in unethical and likely illegal distribution
|
|
of virus source code. A copy of the post was sent to Congress, and an
|
|
inquiry began. Ferguson was later exposed as the letter's author, but
|
|
not before his cowardly action brought the roof down on the AIS sysop,
|
|
a young woman with a military background and substantial integrity.
|
|
The story was picked up by the national media, and the "good ol' boys"
|
|
in the anti-virus crowd succeeded in illustrating that, in the name of
|
|
their sacred cause, they were not above engaging in actions as
|
|
reprehensible as those they claimed to opposed. Like the virus
|
|
writers, Ferguson and his cronies displayed no honor in their devious
|
|
assault on a security expert whose opposition to viruses was no less
|
|
than their own. So much for ethics.
|
|
|
|
It should be noted that Smith does not dispute the need for
|
|
anti-virus software, and he gives credit to those anti-virus
|
|
authors who make products that work. His intent is not to disparage
|
|
talent where it exists. Instead he criticizes the social
|
|
organization of the culture, its exclusiveness, and the often
|
|
self-serving shennanigans of some of the practitioners.
|
|
|
|
Smith is no less gentle on most virus writers than he is on
|
|
the anti-virus crowd. A few, such as Little Loc, the teenager
|
|
who wrote Satan Bug, and the mysterious Dark Avenger, depicted as one
|
|
of the most brilliant of virus writers, are acknowledged for their
|
|
talents, but not romanticized. Most virus writers, Smith argues, are
|
|
simply untalented kids capable of modifying source code (or running
|
|
"virus creation software"), but not of doing any real programming.
|
|
Although here I've emphasized some of Smith's discussion of the
|
|
anti-virus crowd, he covers both groups fairly evenly.
|
|
|
|
What do we learn from Smith's book? First, he provides a new look at
|
|
the relationship between virus writers and anti-virus software
|
|
developers. We learn that the former are not demons and the latter, as
|
|
a group, are hardly altruistic heroes. Second, we learn that there is a
|
|
difference between those who write viruses and those who plant them.
|
|
Smith displays an intellectual appreciation for the talents of
|
|
competent programers (of all types), but shares hostility for vandals,
|
|
"wannabes," and those who prey on others. Third, Smith describes in
|
|
nifty detail the workings of both virus and anti-virus cultures, and
|
|
suggests a symbiosis by which each culture is driven. Finally, Smith
|
|
drives home the lesson that the best protection against viruses is
|
|
simple common sense: Maintain clean disks, make regular backups, and
|
|
practice "safe hex."
|
|
|
|
That _The Virus Creation Labs_ is both well-written and well
|
|
researched is no surprise. Smith, a chemistry Phd, combines a scholars
|
|
eye with the skills he honed as a journalist. If he had chosen a
|
|
major publisher for his manuscript, a light routine editing would
|
|
smooth over some of the rough edges, and there likely would have been
|
|
an index included. However, a major publisher would also have more
|
|
than doubled the price of the book. While there always minor flaws in
|
|
all books, and although not all readers will share the perspective or
|
|
some of the conclusions, _The Virus Creation Labs_ is one of the best
|
|
descriptions of this slice of computer culture to date. The book will
|
|
serve as a handy resource or a supplement for classes. Unfortunately,
|
|
it's not available in bookstores, and must be ordered directly from
|
|
American Eagle Publications, an unwise marketing move. But, it's
|
|
well-worth ordering.
|
|
|
|
"The Virus Creation Labs: A Journey Into the Underground" by
|
|
George Smith (American Eagle, ISBN 0-929408-09-8, paperback,
|
|
$12.95)
|
|
|
|
Orders: Mark Ludwig
|
|
American Eagle
|
|
POB 41401
|
|
Tucson, AZ 85717
|
|
ameagle@mcimail.com
|
|
(602)888-4957
|
|
toll free: 1-800-719-4957
|
|
|
|
American Eagle Publications is the work of Mark Ludwig, a physics
|
|
graduate of Caltech, who was recently profiled in WIRED magazine
|
|
as a scientist who publishes books on computer viruses, artificial
|
|
life and the cutting edge of cyberspace.
|
|
|
|
------------------------------
|
|
|
|
Date: 19 Jan 95 15:17:53 EST
|
|
From: george c smith <70743.1711@COMPUSERVE.COM>
|
|
Subject: File 2--The Virus Creation Labs: an excerpt
|
|
|
|
------------------------------------------------------------
|
|
For Computer underground Digest, an excerpt from the newly
|
|
published book, "The Virus Creation Labs: A Journey Into the
|
|
Underground" by George Smith (ISBN 0-929408-09-8, American
|
|
Eagle)
|
|
|
|
"The Virus Creation Labs" is $12.95. The publisher can be
|
|
contacted at: American Eagle
|
|
POB 41401
|
|
Tucson, AZ 85717
|
|
e-mail: ameagle@mcimail.com
|
|
ph: 1-602-888-4957
|
|
1-800-719-4957
|
|
|
|
------------------------------------------------------------
|
|
|
|
A Priest Deploys his Satanic Minions
|
|
|
|
Everyone knows the best virus writers hang out on secret bulletin
|
|
board systems, the bedroom bohemias of the computer underground,
|
|
right? Wrong. In mid-1992, a 16-year-old hacker from San Diego who
|
|
called himself Little Loc signed on to the Prodigy on-line service for
|
|
his virus information needs. The experience was not quite what he
|
|
expected.
|
|
|
|
Prodigy had a reputation in 1992 as the on-line service for
|
|
middle-class Americans who could stand mind-roasting amounts of retail
|
|
advertising on their computer screens as long as they had relatively
|
|
free access to an almost infinite number of public electronic mail
|
|
forums devoted to callers' hobbies. Since Prodigy's pricing scheme
|
|
was ridiculously cheap per hour, it was quite seductive for callers to
|
|
spend an hour or two a night sifting through endless strings of
|
|
messages just to engage in a little cyberspace chit-chat.
|
|
|
|
|
|
Into this living-room atmosphere stepped Little Loc, logged on as
|
|
James Gentile, looking for anyone to talk with about computer viruses,
|
|
particularly his idea of properly written computer viruses. Little
|
|
Loc, you see, had written a mutating virus which infected most of the
|
|
programs on a system dangerously quickly. If you were using
|
|
anti-virus software that didn't properly recognize the virus - and at
|
|
the time it was written none did - the very process of looking for it
|
|
on a machine would spread it to every possible program on a computer's
|
|
hard disk. While many viruses were trivial toys, Satan Bug, which is
|
|
what Little Loc called his program, was sophisticated enough to pose a
|
|
real hazard. The trouble was, Little Loc was dying to tell people
|
|
about Satan Bug. But he had no one to talk to who would understand.
|
|
That's where Prodigy came in. Prodigy, thought Little Loc, must have
|
|
some hacker discussions, even if they were feeble, centered on
|
|
viruses. It was a quaintly naive assumption.
|
|
|
|
The Satan Bug was named after a Seventies telemovie starring George
|
|
Maharis, Anne Francis and a sinister Richard Basehart in a race to
|
|
find a planet-sterilizing super virus stolen from a U.S. bio-warfare
|
|
lab. Little Loc had never actually seen the movie, but he'd run
|
|
across the name in a copy of TV Guide and it sounded cool, so he used
|
|
it for his digital creation. Satan Bug was the second virus he had
|
|
electronically published. The first was named Fruitfly but it was a
|
|
slow, tame infector so the hacker didn't push it.
|
|
|
|
A bigger inspiration for Satan Bug was the work of the Dark Avenger,
|
|
the shadowy Bulgarian virus programmer whom anti-virus software p.r.
|
|
men and others had elevated to the stature of world's greatest virus
|
|
writer. Little Loc was fascinated by the viruses attributed to Dark
|
|
Avenger. The Dark Avenger obviously knew how real computer viruses
|
|
should be written, thought Little Loc. None of his programs were like
|
|
the silly crap that composed most of the files stocked by the computer
|
|
underground. For example, his Eddie virus - also known as Dark
|
|
Avenger - had gained a reputation as a program to be reckoned with.
|
|
It pushed fast infection to a fine art, using the very process
|
|
anti-virus programs used to examine files as an opportunity to corrupt
|
|
them with its presence. If someone suspected they had a virus,
|
|
scanned for it and Eddie was in memory but not detected, the
|
|
anti-virus software would be subverted, spreading Eddie to every
|
|
program on the disk in one sweep. Eddie would also mangle a part of
|
|
the machine's command shell when it jumped into memory from an
|
|
infected program. When this happened, the command processor would
|
|
reload itself from the hard disk and promptly be infected, too. This
|
|
put the Eddie virus in total charge of the machine. From that point
|
|
on, every sixteen infections, the virus would take a pot shot at a
|
|
sector of the hard disk, obliterating a small piece of data. If the
|
|
data were part of a never-used program, it could go unnoticed. So as
|
|
long as the Eddie virus was in command, the user stood a good chance
|
|
of having to deal with a slow, creeping corruption of his programs and
|
|
data.
|
|
|
|
Little Loc was a good student of the Dark Avenger's programming and
|
|
although he was completely self-taught, he had more native ability
|
|
than all of the other virus programmers in the phalcon/SKISM and NuKE
|
|
hacking groups. "[Virus writing] was something to do besides blasting
|
|
furballs in Wing Commander," he said blithely when asked about the
|
|
origins of his career as a virtuoso virus writer.
|
|
|
|
Accordingly, the Satan Bug was just as fast an infector as Eddie and
|
|
it, too, would immediately go after the command shell when launched
|
|
into memory from an infected program. But Satan Bug was very cleverly
|
|
encrypted, whereas Eddie was not, and it extended these encryption
|
|
tricks so that it was cloaked in computer memory, a feature somewhat
|
|
unusual in computer viruses but popularized by another program called
|
|
The Whale which intrigued Little Loc.
|
|
|
|
The Whale was a German virus which - theoretically - was the most
|
|
complex of all computer viruses. It was packed with code which was
|
|
supposed to make it stealthy -- invisible to certain anti-virus
|
|
software techniques. It was armored with anti-debugging code and
|
|
devilishly encrypted, designed purely to flummox anti-virus software
|
|
developers trying to examine it. They would often mention it as an
|
|
example of a super stealth virus to mystified science and technology
|
|
writers looking for good copy. In practice, The Whale was what one
|
|
might call anti-stealth. Although it was all the things mentioned and
|
|
more, when run on any machine, The Whale's processes were so
|
|
cumbersome the computer would be forced to slow to a crawl. Indeed, it
|
|
was a clever fellow who could get The Whale to consent to infect even
|
|
one program.
|
|
|
|
The Whale appeared to be purely an intellectual challenge for
|
|
programmers. It was intended to mesmerize anti-virus software
|
|
developers and suck them into spending hours analyzing it. Little Loc,
|
|
too, was drawn to it. He pored over the German language disassembly
|
|
of The Whale's source code. The hacker even made a version that
|
|
wasn't encrypted, pulling out the code which The Whale used to
|
|
generate its score of mutant variations. It didn't help. The Whale,
|
|
even when disassembled, was loathe to let go of its secrets and
|
|
remained a slow, obstinately uninfective puzzle.
|
|
|
|
Have you gotten the idea that Prodigy callers might not be the perfect
|
|
choice as an audience to appreciate Little Loc's Satan Bug?
|
|
|
|
Nevertheless, Little Loc landed on Prodigy with a thud. He described
|
|
the Satan Bug and invited anyone who was interested to pick up a copy
|
|
of its source code at a bulletin board system where he'd stashed it.
|
|
Immediately, the hacker got into a rhubarb with a Prodigy member named
|
|
Henri Delger. Delger was, for want of a better description, the
|
|
Prodigy network's unpaid computer virus help desk manager. Every
|
|
night, Delger would log on and look for the messages of users who had
|
|
questions about computer viruses. If they just wanted general
|
|
information, Delger would supply it. If they had some kind of
|
|
computer glitch which they thought might be a virus, Delger would hold
|
|
their hand until they calmed down, and then tell them what to do.
|
|
And, for the few who had computer virus infections, Delger would try
|
|
to identify the virus and recommend software, usually McAfee
|
|
Associates' SCAN, which would remedy the problem.
|
|
|
|
Little Loc was annoyed by Delger, whom he thought was merely a shill
|
|
for McAfee Associates. Since Delger answered so many questions on
|
|
Prodigy, he had a set of canned answers which he would employ to make
|
|
the workload lighter. The canned answers tended to antagonize Little
|
|
Loc and other younger callers who fancied themselves hackers, too.
|
|
Prodigy's liberal demo account policy allowed some of these young
|
|
callers to get access to the network under assumed names like "Orion
|
|
Rogue." This allowed them to be rude and truculent, at least for a few
|
|
days, to paying Prodigy customers. These techno-popinjays, of course,
|
|
immediately sided with Little Loc, which didn't do much for the virus
|
|
programmer's credibility.
|
|
|
|
There was often quite a bit of talk about viruses and Delger would
|
|
supply much of the information, typing up brief summaries of virus
|
|
effects embroidered with his own experiences analyzing viruses.
|
|
"You're not a programmer!" Little Loc would storm at Delger. If you
|
|
weren't a programmer, you couldn't understand viruses, insisted the
|
|
author of Satan Bug. Little Loc would correct minor technical errors
|
|
Delger made when describing the programs. In retaliation, Delger would
|
|
calmly point out the spelling mistakes made by Little Loc and his
|
|
colleagues. It was quite a flame war. On one side was Little Loc, who
|
|
gamely tried to get callers to appreciate the technical qualities of
|
|
some viruses. On the other side was a bunch of middle-aged computer
|
|
hobbyists who were convinced all virus writers were illiterate teenage
|
|
nincompoops in need of serious jail time, or perhaps a sound beating.
|
|
|
|
The debates drew a big audience, including another hacker named Brian
|
|
Oblivion, whose Waco, Texas, bulletin board, Caustic Contagion, would
|
|
provide a brief haven for Satan Bug's author. Little Loc, however,
|
|
soon found other places that would accept his virus source code. Kim
|
|
Clancy's famous Department of the Treasury Security Branch system was
|
|
among them. Little Loc logged on and proffered Satan Bug. The Hell
|
|
Pit - a huge virus exchange in a suburb of Chicago - had its phone
|
|
number posted on Prodigy, as was that of one called Dark Coffin, a
|
|
system in eastern Pennsylvania. Dutifully, Little Loc couriered his
|
|
virus to these systems, too.
|
|
|
|
Satan Bug was a difficult virus to detect. Although in a pinch you
|
|
could find Satan Bug because of a trick change it made to an infected
|
|
program's date/time stamp, for all intents and purposes Satan Bug was
|
|
transparent to anti-virus scanners. And this window of opportunity
|
|
stayed open for a surprising amount of time despite the fact that
|
|
Little Loc had supplied the Satan Bug to all the public virus
|
|
exchanges patrolled by anti-virus moles.
|
|
|
|
Little Loc stood apart from other virus programmers who seemed to have
|
|
little interest in whether their creations made it into the public's
|
|
computers. The real travel of his virus around the world would grant
|
|
him recognition like that of the Dark Avenger, he thought. So, he
|
|
wanted people to take Satan Bug and infect the software of others,
|
|
period. Months later, after the virus had struck down the Secret
|
|
Service network clear across the continent, I asked Little Loc how it
|
|
might have gotten into the wild in large enough numbers so that it
|
|
eventually found its way into such a supposedly secure system.
|
|
|
|
"I'll tell you this once and only once: Satan Bug had help!" he said,
|
|
simply.
|
|
|
|
After his Prodigy debut and before Satan Bug hit the Secret Service,
|
|
Little Loc was recruited by the virus-writing group phalcon/SKISM,
|
|
changing his handle in the process to Priest. Joining phalcon/SKISM
|
|
didn't necessarily mean you were going to virus writing conventions in
|
|
cyberspace with other members of the group, but it was a badge of
|
|
status signifying to others in the computer underground who required
|
|
such things that you had arrived, as a virus writer anyway.
|
|
|
|
Since Priest lived on the West Coast, however, and the brain trust of
|
|
phalcon/SKISM was located in the metro-NYC area, there was little
|
|
concrete collaboration between the two, especially after Priest racked
|
|
up a $600 telephone bill calling bulletin boards. Since Priest didn't
|
|
hack free phone service, his family had to pay the bill, which
|
|
effectively cut down on much of his long distance telephone contact
|
|
bulletin board systems like Caustic Contagion in Waco, Texas.
|
|
|
|
Caustic Contagion, for a short period of time, was one of the better
|
|
known virus exchange bulletin board systems. Its sysop, Brian
|
|
Oblivion, had an extremely liberal policy with regards to virus access
|
|
and carried a large number of Internet/Usenet newsgroups which gave
|
|
callers a semblance of access to the Internet. Caustic Contagion's
|
|
other specialty, besides viruses, was Star Trek newsgroups and for
|
|
some reason which completely eludes me, the BBS's callers found the
|
|
convergence of computer viruses and Star Trek debate extremely
|
|
congenial.
|
|
|
|
Priest and another phalcon/SKISM virus writer named Memory Lapse would
|
|
hang out on Caustic Contagion. Quite naturally, Oblivion's bulletin
|
|
board was one of the first places to receive the programmers' newest
|
|
creations, often before they were published in phalcon/SKISM's
|
|
electronic publication, 40Hex magazine.
|
|
|
|
Priest's next virus was Payback and it was written to punish the
|
|
mainstream computing community for the arrest of Apache Warrior, the
|
|
"president" of ARCV, a rather harmless but vocal English virus-writing
|
|
group which had been undone when Alan Solomon, an anti-virus software
|
|
developer, was able to convince New Scotland Yard's computer crime
|
|
unit to seize the hacking group's equipment and software in a series
|
|
of surprise raids. Priest's Payback virus would format the hard disk
|
|
in memory of this event. Payback gathered little attention in the
|
|
underground, mostly because few people knew much about ARCV and Apache
|
|
Warrior in the first place.
|
|
|
|
Another of Priest's interests was the set of anti-virus programs
|
|
issued by the Dutch company, Thunderbyte. The product of a virus
|
|
researcher named Frans Veldman, the Thunderbyte programs were regarded
|
|
by most virus writers as the anti-virus programs of choice. They were
|
|
sophisticated, technically sweet and put to shame similar software
|
|
marketed by McAfee Associates, Central Point Software, and Symantec,
|
|
which manufactured the Norton Anti-virus.
|
|
|
|
One of Frans Veldman's programs, called TBClean, was of particular
|
|
interest to Priest and others because it claimed to be able to remove
|
|
completely unknown viruses from infected files. How it did this was a
|
|
neat trick. Essentially, TBClean would execute the virus-infected
|
|
file in a controlled environment and try to take advantage of the fact
|
|
that the virus always had to reassemble in memory an uncontaminated
|
|
copy of the infected program to make it work properly. TBClean would
|
|
intercept this action and write the program back to the hard disk sans
|
|
virus. Priest and virus writer Rock Steady, the leader of the NuKE
|
|
virus-writing group, had also noticed the phenomenon. Both tried
|
|
writing viruses that would subvert the process and turn TBClean upon
|
|
itself.
|
|
|
|
Priest wrote Jackal, a virus which - under the proper conditions -
|
|
would sense TBClean trying to execute it, step outside the Thunderbyte
|
|
software's controls and format the hard disk. In theory, this made
|
|
Priest's virus the worst kind of retaliating program, with the
|
|
potential to destructively strip unsuspecting users' hard disks of
|
|
their data when they tried to disinfect their machines. (It couldn't
|
|
happen if you just manually erased the Jackal-virus-infected program,
|
|
but many people who use computers as part of everyday work simply want
|
|
the option of having the software remove viruses. They don't want to
|
|
have to worry about the technicalities of retaliating viruses designed
|
|
to smash their data if they have the temerity to use anti-virus
|
|
software.)
|
|
|
|
Of course, Jackal's development was deemed a great propaganda victory
|
|
by the North American virus underground. Rock Steady nonsensically
|
|
insisted Frans Veldman's programs were dangerous software because
|
|
TBClean could be made to augment a virus infection instead of remove
|
|
it.
|
|
|
|
Brian Oblivion immediately tried Jackal out. It didn't work, he said,
|
|
but only caused TBClean to hang up his machine. This was because
|
|
Jackal was version specific, explained Priest. It would only work on
|
|
certain editions of the program. In reality, this meant that Jackal's
|
|
retaliating capability posed little threat to typical computer users,
|
|
who had never heard of the virus-programmer's favorite software,
|
|
Thunderbyte, much less TBClean. Nevertheless, Priest continued to
|
|
write the TBClean subverting trick into his viruses, including it in
|
|
Natas (that's Satan spelled backwards), which eventually got loose in
|
|
Mexico City in the spring of 1994.
|
|
|
|
All the routines to format a computer's hard disk and to slowly
|
|
corrupt data ala the Eddie virus, which Priest had designed his
|
|
Predator virus to do, made it clear the hacker cared little for any of
|
|
the finer arguments over the value of computer viruses which were
|
|
entertained from time to time by denizens of the underground as well
|
|
as academics. Viruses were for getting your name around, infecting
|
|
files and destroying data, according to Priest. He just laughed when
|
|
the topic of ethical or productive uses of computer viruses -- such as
|
|
the study of artificial life -- came up.
|
|
|
|
In any case, by the fall of 1993, after Priest had retired from the
|
|
Prodigy scene, Satan Bug was generating its own kind of media-fueled
|
|
panic.
|
|
|
|
On the Compuserve network, hysterical government employees were
|
|
posting nonsensical alarums about the virus in the McAfee Associates
|
|
virus information special interest group.
|
|
|
|
"Satan's Bug" was part of a foreign power's attempt to sabotage
|
|
government computers! It was encrypted in nine different ways and was
|
|
"eating" your data! A State Department alarm had started!
|
|
|
|
Wherever the information about "Satan's Bug" was coming from, it was
|
|
100 percent phlogiston. Satan Bug was hardly aimed at government
|
|
computer systems. It did not "eat" anything and although difficult for
|
|
many anti-virus programs to scan, the virus could be found on infected
|
|
systems by making good use of software designed to take a snapshot of
|
|
the vital statistics of computer files and sound an alarm when these
|
|
changed, which always happened when Satan Bug added itself to
|
|
programs.
|
|
|
|
Even more amusing was the suspicion that Satan Bug had been inserted
|
|
on government computers by some undisclosed foreign country, from
|
|
whence it originated. I suppose, however, some people might consider
|
|
Southern California a foreign country.
|
|
|
|
Priest enjoyed reading these kinds of things. His virus was famous,
|
|
an obvious source of confusion and hysteria.
|
|
|
|
About the same time, the Secret Service's computer network in
|
|
Washington, D.C., was infected by the virus, which knocked the
|
|
infected machines off-line for approximately three days. News about
|
|
the event was tough to keep secret among government employees and it
|
|
leaked. The Crypt Newsletter published a short news piece in its
|
|
September 1993 issue on the event and reported that the infection had
|
|
been cleaned up by David Stang, formerly of the National Computer
|
|
Security Association, but now providing anti-virus and security
|
|
guidance for Norman Data Defense Systems in Fairfax, northern
|
|
Virginia.
|
|
|
|
Jack Lewis, head of the Secret Service's computer crime unit, and two
|
|
other agents flew out to interrogate Priest in his San Diego home in
|
|
October of 1993.
|
|
|
|
Lewis and the other agents gave Priest the third degree. They shook a
|
|
printed-out copy of The Crypt Newsletter containing the Satan Bug
|
|
story in his face and did everything in their power to make Priest
|
|
think he ought to cease and desist writing computer viruses forthwith.
|
|
|
|
"About the Secret Service, they weren't too happy about [Satan Bug],
|
|
and saw fit to pay me a little visit," recalled Priest ruefully.
|
|
|
|
The agents wanted to know everything about Priest - his Social
|
|
Security number, where he'd travelled, even who the 16-year-old worked
|
|
for. But Priest didn't work for anyone.
|
|
|
|
"I'm not quite sure they believed me," he said. "Apparently, they
|
|
thought I worked for some anti-virus company or something to write
|
|
viruses. Plus, they wanted the sources for them."
|
|
|
|
The Secret Service men wanted to know, straight from the horse's
|
|
mouth, what Satan Bug did. "They said some victims were worried their
|
|
systems weren't completely clean because they thought it might infect
|
|
data files," Priest continued. "I told them it wouldn't. They also
|
|
wanted my opinion on things which surprised me, like different
|
|
anti-virus programs and encryption algorithms, including Clipper. I
|
|
didn't ask why.
|
|
|
|
"Jack Lewis also said someone claimed I said 'All government computers
|
|
will be infected by December' or some such rubbish. Apparently, they
|
|
thought I wrote Satan Bug as a weapon against the government or
|
|
whatever, I can't be too sure . . ."
|
|
|
|
Priest told them no, Satan Bug wasn't specifically aimed at government
|
|
computers, but it was hard to tell if the agents believed him. They
|
|
were trained to reveal little, and to be unnerving to those
|
|
interviewed.
|
|
|
|
"They just stared," Priest said, "as they did in response to every
|
|
question I asked, including 'what's your name?' I tried - really tried
|
|
- to act cool, but my heart was pounding like a hummingbird's."
|
|
|
|
The agents were keenly interested in Priest's other handles, all the
|
|
viruses he had written, which, if any, computer systems he might have
|
|
spread them on, the names of some phalcon/SKISM members and the
|
|
structure of the virus-writing group and details of their hacking
|
|
exploits.
|
|
|
|
Priest declined to say anything about the identities of members of
|
|
phalcon/SKISM. "I told them I knew nothing of the hackers and
|
|
phreakers, and little more than you could pick up from reading an
|
|
issue of 40Hex."
|
|
|
|
Priest was more interested in other secretive agencies within the
|
|
government. He cultivated an interest in stories about deep black
|
|
intelligence agencies. Perhaps he envisioned himself writing
|
|
destructive viruses as part of a covert weapons project for one of
|
|
them.
|
|
|
|
"Aren't there any other agencies which would be more interested in
|
|
what I'm doing?" Priest asked the agents. He didn't get an answer.
|
|
|
|
Eventually, the Secret Servicemen went away with a Priest-autographed
|
|
printout of the source code to Satan Bug.
|
|
|
|
Programming Satan Bug had turned out to be richly rewarding for
|
|
Priest. Not only had it gotten him recognized immediately in the
|
|
computer underground, it had made him feared in the trenches of
|
|
corporate America to the point where the Secret Service had felt
|
|
compelled to intervene.
|
|
|
|
Since the Satan Bug panic was a golden opportunity for anti-virus
|
|
vendors to once again market wares, the stories in the computing press
|
|
kept coming. LAN Times put the virus on the front page of its
|
|
November 1 issue with the headline, "Be on the Lookout for the
|
|
Diabolical 'Satan Bug' Virus." LAN Times East Coast bureau chief Laura
|
|
Didio wrote "the Satan Bug is designed to circumvent the security
|
|
facilities in Novell Inc. Netware's NETX program, thereby allowing it
|
|
to spread across networks." While Satan Bug may have certainly spread
|
|
across networks, it had nothing to do with the virus's design. It
|
|
seemed no matter the truth about Satan Bug, the story just got more
|
|
pumped up with phlogiston and air as it rolled along.
|
|
|
|
"What's NETX?" asked Priest when he heard about the LAN Times article.
|
|
|
|
Of course, the LAN Times article accurately served as an advertisement
|
|
for the Satan Bug-detecting software of Norman Data Defense Systems
|
|
and McAfee Associates.
|
|
|
|
Priest, meanwhile, continued to work on viruses. He had just
|
|
completed Natas, which he'd turned over to the Secret Service and to
|
|
phalcon/SKISM for publication in an issue of 40Hex. He also uploaded
|
|
the virus to a couple of bulletin board systems in Southern
|
|
California. And he finished a very small, 96-byte .COM
|
|
program-infecting virus. And there were other things he was working
|
|
on, he said.
|
|
|
|
The most interesting fallout from the Secret Service visit was a job
|
|
offer from David Stang at Norman Data Defense Systems, said Priest.
|
|
Stang wanted the virus programmer to come to work for him, starting in
|
|
the summer of 1994, after the hacker finished high school.
|
|
|
|
Priest said Stang was interested in his opinion about the use of virus
|
|
code in anti-virus software. Such code wasn't copyrighted, so it was
|
|
fair game. Priest thought this was a bad idea. Too much virus code,
|
|
in his opinion, was crappy anyway, so why would anyone want to use it?
|
|
But Priest said he would think about the job offer.
|
|
|
|
By May 1994, Priest's Natas virus had cropped up in Mexico City,
|
|
where, according to one anti-virus software developer, it had been
|
|
spread by a consultant providing anti-virus software services.
|
|
Through ignorance and incompetence, the consultant had gotten Natas
|
|
attached to a copy of the anti-virus software he was using. However,
|
|
like most of Priest's viruses, Natas was a bit more than most software
|
|
could handle. The software detected Natas in programs but not in an
|
|
area of the hard disk known as the master boot record, where the virus
|
|
also hid itself. The result was tragicomic. The consultant would
|
|
search computers for viruses. The software would find Natas! Golly,
|
|
the consultant would think, "Natas is here! I better check other
|
|
computers, too." And so, the consultant would take his Natas-infected
|
|
software to other computers where, quite naturally, it would also
|
|
detect Natas as it spread the virus to the master boot record, a part
|
|
of the computer where the software could not detect Priest's program.
|
|
|
|
Natas had come to Mexico from Southern California. The consultant
|
|
often frequented a virus exchange bulletin board system in Santa
|
|
Clarita which not only stocked Natas, but also the issue of 40Hex that
|
|
contained its source code. He had downloaded the virus, perhaps not
|
|
fully understood what he was dealing with, and a month or so later
|
|
uploaded a desperate plea for help with Priest's out-of-control
|
|
program. You could tell from the date on the electronic cry for help
|
|
-- May 1994 -- when Natas began being a real problem in Mexico.
|
|
|
|
Natas was another typical tricky Priest program. When in computer
|
|
memory, it masked itself in infected programs and made them appear
|
|
uninfected. It would also retrieve a copy of the uninfected master
|
|
boot record it carried encrypted in its body and fake out the user by
|
|
showing it to him if he tried to go looking for it there. Natas also
|
|
infected diskettes and spread quickly to programs when they were
|
|
viewed, copied or looked at by anti-virus software. It was fair to say
|
|
that computer services providers wielding anti-virus software in a
|
|
casual manner ought not to have been allowed anywhere near Natas.
|
|
|
|
Back in San Diego, Priest was still being interviewed on the telephone
|
|
by David Stang and other associates at Norman Data Defense Systems.
|
|
They were concerned that Priest might leak proprietary secrets to
|
|
competitors after hiring, so it was a must that he be absolutely sure
|
|
of the seriousness of his potential employment.
|
|
|
|
By the end of the interview, Priest thought he didn't have much of a
|
|
chance at the job, but by July he'd accepted an offer and moved to
|
|
Fairfax to begin working for David Stang. This was the same David
|
|
Stang who had written in the July 1992 issue of his Virus News and
|
|
Review magazine, "In this office, we try to see things in terms of
|
|
black and white, rather than gray . . . The problem is that good guys
|
|
don't wear white hats. Among virus researchers are a large number of
|
|
seemingly gray individuals . . . This grayness is clear to users.
|
|
Last week, I asked my class if anyone in the room trusted anti-virus
|
|
vendors. Not one would raise their hand . . . "
|
|
|
|
But what was Priest working on at Norman Data Defense Systems?
|
|
|
|
"A cure for Natas," he laughed softly one afternoon in late July,
|
|
1994, in the Norman Data office. Looking over the virus once more,
|
|
Priest sardonically concluded that his disinfector made it clear the
|
|
hacker had made Natas a little too easy to remove from infected
|
|
systems. Norman Data Defense had clients in Mexico and at the Secret
|
|
Service.
|
|
|
|
You had to admire the moxie of the young American virus programmer.
|
|
He'd set out in 1992 to emulate the world's greatest virus programmer,
|
|
Dark Avenger, and ended up being paid cash money to cure the paintpots
|
|
of computer poison he'd created. As for that poor stone fool, the
|
|
legendary Dark Avenger, he never even got a handful of chewing gum for
|
|
his viruses, having the misfortune to have been born in the wrong
|
|
place, Bulgaria, at the wrong time, during the fall of Communism.
|
|
|
|
But by the end of the summer, the blush was off the rose for Priest
|
|
and Norman Data, too. Another manager in the office, Sylvia Moon,
|
|
didn't like the idea of the hacker working for the company, Priest
|
|
said. And when management representatives arrived from the parent
|
|
corporation in Norway on an inspection tour and were appraised of
|
|
Priest's status at a meeting, the hacker heard, they were not
|
|
pleasantly surprised to learn there was a virus writer on the staff.
|
|
Officially, said Priest, there was no reaction, but in reality, the
|
|
hacker felt, the atmosphere was deeply strained. Nevertheless, said
|
|
Priest, David Stang maintained that he would protect the hacker's
|
|
position. And Jack Lewis, said Priest, had contacted the company to
|
|
set up a luncheon date with the hacker to discuss more technical
|
|
issues. However, Priest said, David Stang wanted Lewis to provide a
|
|
Secret Service statement to the effect that the hiring of the hacker
|
|
wasn't such a bad idea. The luncheon fell through. The Secret
|
|
Service would provide no such statement because, said Priest, it might
|
|
be construed as a conflict of interest. Unknown to him at the time,
|
|
the agency had also started spying on his comings-and-goings in
|
|
Fairfax.
|
|
|
|
It all came to an end when one of Priest's acquaintances from the
|
|
BBSes called the Norman Data office and left a message for "James
|
|
Priest." Priest was immediately let go. David Stang, said Priest,
|
|
told him the call was an indication that the hacker couldn't be
|
|
trusted, that he was still in touch with the underground.
|
|
|
|
Paranoia and recriminations flew. There had been an intern from
|
|
William & Mary working at the company whose father was a Pentagon
|
|
official, said Priest. The rumor was that Priest had been pumping the
|
|
intern for information on how to penetrate Pentagon computers and
|
|
siphoning it back into the underground. It was nonsense, said the
|
|
hacker, but it became the official version of events. These were
|
|
pretexts, thought Priest. The real reason he had to be shown the
|
|
door, he said, was pressure from the higher-ups in Norway. They had
|
|
been presented with him as a done-deal hire and it hadn't set well, he
|
|
said. David Stang, said Priest, needed a reason to cut him loose and
|
|
the phone call from the friend had been the peg to hang it on. Priest
|
|
was a hot potato and he had to go.
|
|
|
|
Back in San Diego once again, Priest almost sounded relieved. He had
|
|
a Sylvia Moon-autographed copy of a computer book as a memento from
|
|
the company and that was it. However, he had finally been able to
|
|
videotape "The Satan Bug" telemovie. He shifted the VCR into replay
|
|
and turned to look at his computer while it was playing. But the
|
|
hacker said he still didn't know what the movie was about when it was
|
|
over. He had been too busy at the PC to pay attention. Working . . .
|
|
|
|
copyright 1994 American Eagle Publications
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 2 Mar 1995 14:20:50
|
|
From: padgett@GOAT.ORL.MMC.COM(Padgett 0sirius)
|
|
Subject: File 3--Re: Press Coverage Bloopers in the Mitnick Story (CuD 7.16)
|
|
|
|
Jason Hillyard <jasonh@sdepl.ucsd.edu> writes:
|
|
|
|
>"Hacker case underscores Internet's vulnerability"
|
|
>New York Times, February 16, 1995.
|
|
><http://www.nando.net/newsroom/nt/216net1.html>
|
|
|
|
Just a quick comment - was surprised that no highlight of this was
|
|
made since *There Is No Security On The Internet* (see RFC 1281). The
|
|
net did exacly what it is supposed to do, delivered packets to the
|
|
proper recipients. The "vulnerability" was at improperly secured
|
|
nodes/sites that the big M gained access to.
|
|
|
|
Apparently it is "politically incorrect" to imply that certain
|
|
facilities should qualify as "attractive nuisances" (this has a
|
|
special meaning in the US - see swimming pools) since this could mean
|
|
that their management was negligent in not securing them from children
|
|
of all ages.
|
|
|
|
Not saying that criminal acts did not take place, just that there is a
|
|
difference between "breaking and entering" and "trespass" (I "assume"
|
|
there were "keep out" signs on each ?) and that the fault should not
|
|
be all one-sided. Would make my job easier if some owners/stockholders
|
|
would start mentioning things like "culpable negligence" to Those In
|
|
Charge of compuer systems everywhere.
|
|
|
|
Obviously my personal opinion only - I am not a lawyer, the ones I
|
|
have asked over the years have all said "no precidence".
|
|
|
|
A. Padgett Peterson, P.E.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 4 Mar 1995 21:20:19 +0000 (CUT)
|
|
From: Luc Pac <lpaccagn@RISC1.GELSO.UNITN.IT>
|
|
Subject: File 4--Italian BBS Charged with "Subversion"
|
|
|
|
STATE CHARGES ITALIAN COMPUTER BULLETIN BOARD WITH 'SUBVERSION'
|
|
|
|
On Tuesday, 28 February, at seven in the morning, members of the
|
|
Carabinieri Anti-Crime Special Operations Group raided the homes of a
|
|
number of people in Rovereto and Trento associated with the local
|
|
Self-managed Social Centre 'Clinamen'. Some of those raided are also
|
|
active in the Italian anarchist movement.
|
|
|
|
The warrant from the Rovereto court spoke of 'assocation with
|
|
intent to subvert the democratic order' (art.270 bis CP), a charge
|
|
which carries a very heavy penalty for those convicted of 7 to 15
|
|
years imprisonment. The absurdity of the charge speaks for itself.
|
|
|
|
Confiscated in the raids were journals and magazines, leaflets,
|
|
diaries, notebooks and video tapes, all of which were either publicly
|
|
available or else for strictly personal use.
|
|
|
|
Also seized was the personal computer which hosted 'BITS
|
|
Against the Empire', a node in the Cybernet and Fidonet networks.
|
|
Stored on the computer was a vast number of documents concerning
|
|
the social use of new technologies, Italy's Self-managed Social
|
|
Centres and independent music production, along with hundreds of
|
|
elctronic reviews publicly available throughout the world computer
|
|
network. Having decided quite explicitly from the onset not to hold
|
|
any software whatsoever, the founders of the bulletin board (BBS) had
|
|
dedicated themselves exclusively to communication through public
|
|
electronic conferences and the consultation of texts held in the BBS
|
|
archives. There can, therefore, be no substance to any charge of
|
|
computer piracy or abusive software duplication, an accusation often
|
|
advanced in earlier cases against Italian BBSs.
|
|
|
|
The seizure of BITS Against the Empire strikes at one of the
|
|
most prominent nodes within the Cybernet network, the first place in
|
|
Italy to open itself up to the voices of the non-aligned, to those who
|
|
refuse to be represented by the political parties, choosing instead
|
|
- both in the virtual and real worlds - the path of self-management.
|
|
Nor has Cybernet ever accepted the use of authoritarian instruments
|
|
tp police the BBS, whether these be 'the laws of cyberspace' or
|
|
conference moderators (cybercops), preferring instead to leave
|
|
all responsibilities - and thus freedom of action and thought - to
|
|
each individual.
|
|
|
|
It is precisely these freedoms which are daily negated in the
|
|
physical world by the State and its demokracy. Cyberspace has now
|
|
been discovered as a new consumer market, and above all as a new
|
|
cultural terrain for the legitimation of the first, second and
|
|
all subsequent Italian Republics.
|
|
|
|
Alongside the sensationalism surrounding their direct actions
|
|
against small, insignificant episodes of domestic computer piracy,
|
|
the Italian magistrates and police forces have for some years now
|
|
shown a certain fascination for places such as Cybernet and the
|
|
European Counter Network, places which have experimented with new
|
|
forms of social relations, new forms of contaminating culture and
|
|
knowledge in the light of digital media.
|
|
|
|
It is not surprising that the repressive organs of the State
|
|
have reacted to their own technical and social ignorance by seizing
|
|
an instrument of communication like a BBS: if they don't understand
|
|
something it means they can't control it, and what can't be
|
|
controlled is dangerous for a social order based upon fear and
|
|
institutionalised violence.
|
|
|
|
All those charged have formally applied for the return of the impounded
|
|
goods, as they await more information concerning the progress of the
|
|
investigation.
|
|
|
|
Messages of support and requests for further information can be
|
|
sent to:
|
|
|
|
Internet:lpaccagn@riscl.gelso.unitn.it
|
|
Bitnet: lpaccag@itncisti
|
|
European Counter Network: Luc Pac 45:1917/2.1
|
|
Cybernet: Luc Pac 65:1400/6
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 26 Feb 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 5--Cu Digest Header Info (unchanged since 26 Feb, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB <your name>
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.18
|
|
************************************
|
|
|