home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Aug 22 1993 Volume 5 : Issue 64
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Ediot: Etaoin Shrdlu, III
-
- CONTENTS, #5.64 (Aug 22 1993)
- File 1--Has the EFF SOLD OUT?!?
- File 2--EICAR '93 conference / members' meeting
- File 3--Re SKIPJACK Review (CuD 5.60)
- File 4--CuNews ("Smart Kards," Comp Snooping at IRS/FBI, & more)
- File 5--CuNews -- ("Hackers need not Apply" & more)
- File 6--Table of Contents for Volume #1 (of P/H Msg Bases)
- File 7--Graduate Paper Competition for CFP-'94
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sun, 22 Aug 1993 20:23:18 CDT
- From: Jim Thomas <cudigest@mindvox.phantom.com>
- Subject: File 1--Has the EFF SOLD OUT?!?
-
- The Electronic Frontier Foundation has been co-opted by the
- telecommunications conglomerates and has, as a consequence, lost it's
- integrity and credibility. Or so some critics would have us believe.
- Especially since the re-organization of The EFF, allegations that they
- have "sold out" by accepting contributions from telephone
- companies--or worse, that EFF now is implicitly in the employ of
- telephone companies--persist. This allegation seems not only
- unfounded, but does a disservice to the cybercommunity by falsely
- maligning the integrity of one of the two (CPSR being the other) most
- active and effective organizations working to establish and preserve
- the rights of the electronic realm.
-
- Because I am a dues-paying member of EFF and have recently sent my
- subscription fee to CPSR, I am not a dispassionate observer. Both
- groups are effective, and--even when in disagreement, I respect the
- goals and strategies chosen by each group. Therefore, as a member of
- EFF, I'm troubled by some of the public commentary I've read on
- Usenet, BBSes, and public access systems that continue to
- irresponsibly tarnish the integrity of EFF with false allegations.
-
- Some of the basis for criticism rests on rumors. Perhaps some derives
- from malice. But, the bulk may simply be a lack of information about
- EFF's funding sources and an imperfect understanding about the
- relationship between funders and recipients and the obligations that
- relationship entails. I see nothing *inherently* improper about EFF
- (or any organization) accepting funds from organizations whose goals,
- ideology or practices may not overlay perfectly with those of the
- recipients. Let's look at a few issues.
-
- 1. HOW MUCH DOES EFF RECEIVE FROM TELECOS? According to EFF sources,
- roughly eight percent of their $1.6 million operation budget comes
- from telecom sources, with no more than five percent coming from a
- single source. Fiscal ratios change, and whether the exact sum is
- seven or 11 percent matters nil. This is a useful chunk of resources,
- but hardly substantial. It is certainly not a sufficient amount to
- cause a crisis if it were withdrawn. The remainder of EFF's resources
- are reported to derive from private donors, membership fees, and
- revenue-generating activities (such as sales of t-shirts). Both in the
- Usenet discussion group (comp.org.eff.talk) and in its newsletters,
- EFF has been open about its funding sources and has never concealed or
- minimized contributions by corporate donors, including telecos.
- Therefore, EFF's alleged ethical malfeasance does not lie in failure
- to conceal its funding resources. Nor does it lie in a dependency
- relationship with the donors.
-
- 2. WHAT OBLIGATIONS DOES EFF OWE THE TELECOS? The broader question
- here centers on what obligations a donor might expect from the
- recipient. It is hardly unusual for organizations to accept funds from
- contributors whose interests overlap. Examples include contributions
- by R.J. Reynolds tobacco and The Playboy Foundation to the ACLU to--as
- a personal example--my own former funding by the National Institute of
- Justice. Does the ACLU support freedom of speech because it is funded
- in part by those with a commercial interest in protecting it? Should
- the ACLU abstain from taking a position on smokers'/non-smokers'
- rights because of funding sources? Should I have refused federal
- funding lest I be accused (as I once was) of being little more than a
- paid lackey of federal police and social control interests? Criticism
- of EFF for its funding sources and suspicion of the strings that might
- be attached extend into the lives of many of us. However, it is rare
- that general donations require any substantive changes in the behavior
- or principles of recipients. It is also common for well-endowed donors
- to spread their largess to a variety of groups with ends often
- (seemingly) antithetical to each other and even to the donor.
-
- There is no evidence whatsoever that EFF has changed its direction to
- satisfy donors. In fact, the recent re-organization at EFF, however
- much some of us might be disappointed by the emphasis, is fully
- consistent with their original policy statement. In fact, a careful
- reading of the founding EFF statement and its recent public policy
- formulations indicate that the re-organization was primarily
- structural rather than the reflection of a new philosophy. As the
- CPSR/EFF/ACLU coalition in the 2600 Magazine Washington Mall incident
- of 1992 suggest, the EFF continues to involve itself with those types
- of issues that led to its founding. And, as Mike Godwin's continued
- involvement with EFF and his willingness to help those in need of
- legal advice attest, EFF remains the first resource most of us think of
- when we seek computer-related legal assistance. Those who know Mike
- and EFF founders John Barlow and Mitch Kapor cannot, in their wildest
- fantasies, imagine even the most generous donor influencing their
- behavior or principles.
-
- 3. WHAT ARE THE ETHICAL/LEGAL OBLIGATIONS OF RECIPIENTS? Federal and
- state statutes, as well as various professional codes of ethics,
- specify obligations that might lead to a conflict of interest. The
- attorneys amongst us can elaborate on these. However, there is
- absolutely no evidence that the EFF approaches even the strictest
- conflict of interest threshold. Its coincidental interests with
- telecos involve policy and legislation affecting primarily the
- development of an "information highway" and the attendant technology.
- The EFF is not litigating on behalf of any telecos, it is not
- (according to EFF sources and their documents) serving in a client
- relationship with them, and it is engaged in no activity that--at
- least by any apparent logic--could be construed to place the EFF in a
- conflict of interest situation. EFF's initiative and perseverance in
- the Steve Jackson Games litigation would seem prima facie evidence
- that the EFF is committed to principle and not to funding expedience.
-
- There is room for considerable intellectual disagreement over the
- focus, goals, and organization of EFF, CPSR, and, I suppose, even CuD.
- But the one issue that is indisputable is the integrity, commitment,
- and credibility the EFF possesses. Because there is nary a soupcon of
- evidence to to suggest cooptation, it's time to end this unnecessary
- and destructive bickering about EFF's funding sources.
-
- Those who have taken the trouble to follow the public policy
- statements and read the EFF electronic and hardcopy newsletters, will
- find nothing new in my comments. Those who do not receive the
- newsletter and do not follow CuD's periodic summaries of the
- activities of groups such as the EFF and CPSR might have been
- influenced by rumors and misinformation. Those of us who are concerned
- about the future of "cyberspace" should remember our debt to these
- groups. Part of that debt means that we squelch false rumors that risk
- irreparably tarnishing the reputations and subverting the effectiveness
- of groups from whose actions we all benefit.
-
- ------------------------------
-
- Date: Thu, 19 Aug 93 09:46:16 GMT
- From: Anthony Naggs <amn@UBIK.DEMON.CO.UK>
- Subject: File 2--EICAR '93 conference / members' meeting
-
- EICAR '93 Conference
-
- At a recent meeting the board of EICAR (European Institute for
- Computer Anti-Virus Research), decided to cancel the planned
- London conference this year. I understand this is due to low
- participation in other computer security / anti-virus events this
- year.
-
- However, there will instead be a Members' Meeting in Hamburg
- (Germany), the proposed agenda is:
- 25 November 1993
- 14:00 Working Group 3 (Legal Questions) meeting
- 16:00 Working Group 1 (Antivirus Technologies) meeting
- 18:00 Joint Dinner
-
- 26 November 1993
- 09:00 Discussion of the Working Groups results
- 11:00 Members Meeting
- 13:00 Lunch
-
- EICAR '94 Conference
-
- The next EICAR conference is proposed to be from 14 to 16 November
- 1994 in the vicinity of London.
-
- (Disclaimer; I am not an official spokesman for EICAR).
-
- +++
- Anthony Naggs Email: Paper mail:
- Software/Electronics Engineer amn@ubik.demon.co.uk PO Box 1080, Peacehaven
- & Computer Virus Researcher East Sussex BN10 8PZ
- Phone: +44 273 589701 Great Britain
-
- ------------------------------
-
- Date: Fri, 13 Aug 1993 16:15:47 CST
- From: roy@SENDAI.CYBRSPC.MN.ORG(Roy M. Silvernail)
- Subject: File 3--Re SKIPJACK Review (CuD 5.60)
-
- In comp.society.cu-digest #5.60:
-
- > Date: Mon, 02 Aug 1993 15:23:28 -0400 (EDT)
- > From: denning@CS.GEORGETOWN.EDU(Dorothy Denning)
- > Subject--File 5--SKIPJACK Review (Encryption Background and Assessment)
-
- > LEAF decoders that allow an authorized law enforcement official to
- > extract the device identifier and encrypted session key from an
- > intercepted LEAF. The identifier is then sent to the escrow
- > agents, who return the components of the corresponding device
- > unique key. Once obtained, the components are used to reconstruct
- > the device unique key, which is then used to decrypt the session
- > key.
-
- This is the first time I've heard anyone clarify that point. One of my
- main objections to the Clipper proposal was that once a legal tap had
- been authorized, all further communications with that Clipper chip were
- compromised unless the court order only released the session key. LE
- has NO NEED for the unique device key. They legitimately need only the
- session key for the lawfully intercepted communications.
-
- > 5. Secrecy of the Algorithm
- >
- > The SKIPJACK algorithm is sensitive for several reasons. Disclosure of
- > the algorithm would permit the construction of devices that fail to
- > properly implement the LEAF, while still interoperating with legitimate
- > SKIPJACK devices. Such devices would provide high quality
- > cryptographic security without preserving the law enforcement access
- > capability that distinguishes this cryptographic initiative.
-
- > However, while full exposure of the internal details of SKIPJACK would
- > jeopardize law enforcement and national security objectives, it would
- > not jeopardize the security of encrypted communications. This is
- > because a shortcut attack is not feasible even with full knowledge of
- > the algorithm. Indeed, our analysis of the susceptibility of SKIPJACK
- > to a brute force or shortcut attack was based on the assumption that
- > the algorithm was known.
-
- These sections actually makes me feel better about SKIPJACK in general.
- I kind of suspected that the real reason for secrecy was to protect LE
- access. (I'd still prefer the algorithm be made public)
-
- Now, anyone care to speculate about the security of the LEAF itself?
- This whole discussion centered upon SKIPJACK security, but I don't
- recall whether the LEAF is _actually_ encrypted by SKIPJACK. A SKIPJACK
- key and a Clipper key are both 80 bits, but that doesn't mean you have
- to crypt them the same way.
-
- ------------------------------
-
- Date: Wed, 18 Aug 93 12:19:00 BST
- From: grmeyer@GENIE.GEIS.COM
- Subject: File 4--CuNews ("Smart Kards," Comp Snooping at IRS/FBI, & more)
-
- Smart Kards Are Coming
- ======================
- A group of corporations, including MasterCard, Visa, Citicorp, Amex,
- IBM, AT&T, Microsoft, and Apple, have formed the Smart Card Forum.
- The cross-industry group will promote the use of smart-card technology
- for payment, transit, health care, identification, and security
- applications.
- (Information Week August 9, 1993 pg 10)
-
- Computer Snooping at the IRS and FBI
- ====================================
- The Internal Revenue Service is implementing a $23 billion computer
- modernization project that will give it online access to taxpayer
- information. In the midst of this, the GAO has revealed that as
- many as 350 employees in the IRS's Southeast Region (Atlanta) have
- been snooping into taxpayer records. So far, 154 have been
- disciplined.
-
- The GAO (Government Accounting Office) has also said that access to
- the FBI's National Crime Information Center (NCIC) databases has
- been systematically abused by law enforcement workers and associates.
- Cases cited as examples include an officer using NCIC to track down
- his ex-girlfriend (he later killed her), a terminal operator checking
- customers for her drug-dealing boyfriend...just to be sure they
- weren't undercover agents, and a dispatcher running background checks
- on her fiance's political opponents. The FBI declines comment, but
- the GAO has recommended that Congress make it a criminal offense to
- access the network for private use.
- (Information Week. August 9, 1993. pg 13)
-
- Wipe Before Discarding
- ======================
- A Canadian citizen, who purchased a used hard drive from a local
- computer store, found himself in possession of a goldmine of personal
- data and information.
-
- The used drive contained the personnel records of every employee in
- the Alberta land title offices in Edmonton and Calgary. It included
- salaries, social security numbers [presumably the Canadian equivalent],
- and performance evaluations. It also held lengthy, confidential memos
- about plans to turn over the land title department to a private
- agency.
- (Information Week August 9, 1993 pg 60)
-
- Pay Your Rent
- =============
- Speaking of Edmonton, Alberta... A landlord's association there has
- formed a group to share information about tenants. The online database
- can be searched with little more than a name or driver's license
- number. The landlords say the primary purpose is to keep track of
- people who skip out on rent payments, or damage property. They answer
- concerns about discrimination by saying that anyone caught abusing
- the system will be forbidden from using it in the future.
- (Information Week August 9, 1993 pg 66)
-
- ------------------------------
-
- From: grmeyer@GENIE.GEIS.COM
- Date: Fri, 20 Aug 93 00:23:00 BST
- Subject: File 5--CuNews -- ("Hackers need not Apply" & more)
-
- If It's Blurry You Shouldn't Be Watching
- ========================================
- A patented digital technology from VideoFreedom Systems (San Diego,
- CA) may be the key to getting an intrusive Congress off their
- censorship bandwagon. The technology would allow television (and movie
- theatres!) to blur objectionable scenes and sounds. Much the same way
- the news programs can distort the voice and image of a confidential
- source who wishes to remain that way. The technology would allow those
- viewers who want to see "the good parts" to clean-up the image to
- their tastes. (Information Week August 16, 1993 pg 10)
-
- Hackers Need Not Apply
- ======================
- Information Week magazine recently conducted a "fax vote"
- self-selected survey of readers. The questions asked about policies,
- thoughts, and practices regarding hiring ex-hackers to help out with
- computer security. Of the those who choose to respond, 15% said they
- had been approached for a job by a hacker. Only 6% said they had ever
- hired a hacker to test security. Of their concerns about doing so,
- over half said "they might compromise security". About 35% expressed
- concerns over "legal problems".
-
- Some of the write-in comments included:
-
- "Their crimes are difficult to prove and almost impossible to
- prosecute. Not only do they go unpunished, but hiring them makes
- crime pay."
-
- "What happened to our idea of ethics and morality? I don't believe
- only felon hackers are smart enough to foolproof our computer
- systems."
-
- "They could sell ideas back to your competitor. These people will do
- anything for a buck".
-
- Refer to Information Week, August 16, 1993 pg 29 for full details.
-
- This Tag Line Meets Corporate Standards
- =======================================
- Duke Power Company (Charlotte, NC) has issued a memo to supervisors
- and managers that forbids employees from expressing their religious or
- political opinions over the company's Email, voice mail, or fax
- machines. The company says the memo arises out of problems with people
- using 'tag lines' (short sentences at the end of messages) on the
- company's Profs mail system. The company did not forbid tag lines, but
- issued guidelines for their content. According to the company few of
- its 18,000 employees see the rules as a restriction of free speech.
- (Information Week. August 16, 1993 pg 60)
-
- Woodstock for Hackers and Phreaks
- =================================
- Newsweek magazine (Aug 16, 1993 pg 47) features a story on the End of
- The Universe conference in the Netherlands. According the Information
- Week's summary, the Newsweek article reports that attendees had at
- least one thing in common with the Woodstock guests....they believe
- that rules were meant to be broken. (IW's summary is on pg. 64,
- August 16, 1993)
-
- Don't Copy That (Microsoft) Floppy!
- ===================================
- Information Week reports that an article in the San Francisco paper
- THE REVOLVER (Aug 9, pg 1) says some lawyers claim that Microsoft
- might enjoy too much influence over federal prosecutors. It seems that
- an unusually high number of cases against software pirates are
- launched on Microsoft's behalf. The number is higher compared with
- Lotus or WordPerfect for example. (Information Week. August 1, 1993.
- pg 64)
-
- ------------------------------
-
- Date: Tue, 10 Aug 93 22:48:47 EDT
- From: lodcom (LOD Communications)
- Subject: File 6--Table of Contents for Volume #1 (of P/H Msg Bases)
-
- ((MODERATORS' NOTE: In CuD #5.39, we reviewed the BBS Message Base
- File Archive Project compiled by LODCOM. We were impressed by the
- comprehensiveness of the project and favorably reviewed it as a
- valuable set of documents for scholars and curious readers who are
- interested in BBS "underground" culture of the 1980s. The collection
- has been expanded, and the current offerings are described below)).
-
- ++++
-
- Volume I of the Hack/Phreak BBS Message Base File Archive Project
- has been completed. This file is 19 KB in length and contains the
- Table's of Contents for each of the 20 Message Base Files. Volume II
- is being compiled and is expected to be completed and sent out to
- those who have ordered the Set sometime in September. Volume III is
- expected to be completed in November 1993. Should any additional
- material come our way, a fourth and final Volume will be made.
-
- The newest version of the Order Form File will be sent to you
- sometime in the next week. Should you find the following TOC's
- interesting and you want to order the files do so with the NEW order
- form. If you have already ordered using the old order form that is
- fine, as the price change is retroactive since it is to YOUR benefit.
- As you will note when you see the new order form and information file,
- ALL the volumes created will cost $39.00 personal, $99.00 commercial.
- That is, for the above price you receive ALL the volumes, not just one
- volume. The price change was made due to the good response to the
- initial order form.
-
- When Volume #2 is completed a file similar to this one with its
- TOC's will be mailed to you. If you wish to be taken off this mailing
- list just say so. If not, Lodcom will continue to keep you up to date
- on the projects' progress. Disseminate this File as you see fit.
-
- If you have any questions feel free to email us anytime.
-
-
- VOLUME #1 CONTENTS:
- +++++++++++++++++++
-
- LOD Communications (c) 1993: VOLUME #1 List of Hack/Phreak BBS Message Bases
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- BBS NAME A/C SYSOP(S) # MSGS DATES KBYTES PROPHILE
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- Alliance BBS 618 Phantom Phreaker 113 2/09/86 - 215 YES
- Doom Prophet G,P 6/30/86
-
- Black Ice Private 703 The Highwayman 880 12/1/88 - 560 YES
- P,U 5/13/89
-
- Broadway Show/ 718 Broadway Hacker 180 9/29/85 - 99 YES
- Radio Station BBS 12/27/85
-
- CIA BBS 201 CIA Director 30 5/02/84 - 30 NO
- 6/08/84
-
- C.O.P.S. 305 Mr. Byte-Zap 227 11/5/83 - 196 YES
- The Mechanic G,R,U 7/16/84
-
- Face To Face 713 Montressor 572 11/26/90 - 400 YES
- Doc Holiday 12/26/90
-
- Farmers Of Doom 303 Mark Tabas 41 2/20/85 - 124 YES
- G 3/01/85
-
- Forgotten Realm 618 Crimson Death 166 3/08/88 - 163 NO
- 4/24/88
-
- Legion Of Doom! 305 Lex Luthor 194 3/19/84 - 283 YES
- Paul Muad'Dib * G,P 11/24/84
-
- Metal Shop Private 314 Taran King 520 4/03/86 - 380 YES
- Knight Lightning P,R,U 5/06/87
-
- OSUNY 914 Tom Tone 375 7/9/82 - 368 YES
- Milo Phonbil * G,U 4/9/83
-
- Phoenix Project 512 The Mentor 1118 7/13/88 - 590 YES
- Erik Bloodaxe * G,R 2/07/90
-
- Plover-NET 516 Quasi Moto 346 1/14/84 - 311 YES
- Lex Luthor * G 5/04/84
-
- Safehouse 612 Apple Bandit 269 9/15/83 - 251 YES
- G,U 5/17/84
-
- Sherwood Forest I 212 Magnetic Surfer 92 5/01/84 - 85 YES
- P,U 5/30/84
-
- Sherwood Forest ][ 914 Creative Cracker 100 4/06/84 - 200 YES
- Bioc Agent 003 * G 7/02/84
-
- Split Infinity 408 Blue Adept 52 12/21/83 - 36 YES
- 1/21/84
-
- Twilight Phone ??? System Lord 17 9/21/82 - 24 NO
- 1/09/83
-
- Twilight Zone/ 203 The Marauder 108 2/06/85 - 186 YES
- Septic Tank Safe Cracker * G,U 7/24/86
-
- WOPR 617 Terminal Man 307 5/15/84 - 266 YES
- The Minute Man * G,U 1/12/85
- _____________________________________________________________________________
-
-
- Alliance BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. Alliance BBS Pro-Phile written by the Sysop (Phantom Phreaker)
- III. 103 Messages From the Alliance BBS Message Base
- IV. 10 Messages From the Alliance Sub-Board on The Metal Shop BBS
- V. G-Philes by the System Operators
- 1. Busy Line Verification (BLV) [Phantom Phreaker]
- 2. An Overview of the Teradyne 4Tel System [Doom Prophet]
- 3. Automatic Number Identification (ANI) [Phantom & Doom Prophet]
- 4. The Facility Assignment and Control System (FACS) [Phantom]
- 5. Step By Step Switching System Notes [Phantom Phreaker]
- 6. Automatic Message Accounting (AMA) [Phantom Phreaker]
- 7. Telephone Signalling Methods [Doom Prophet]
- _____________________________________________________________________________
-
-
- Black Ice Private BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files (File 1)
- II. Black Ice Private BBS Pro-Phile by Erik Bloodaxe (File 1)
- III. 231 Messages from the General Sub-Board (File 1)
- 96 Messages from the Telenet [now called SprintNet] Sub-Board (File 1)
- IV. 48 Messages from the Tymnet Packet Switching Network Sub-Board (File 2)
- 54 Messages from the 'Other Networks' Sub-Board (File 2)
- 99 Messages from the UNIX Sub-Board (File 2)
- 57 Messages from the VAX/VMS Sub-Board (File 2)
- 17 Messages from the PRIMOS Sub-Board (File 2)
- 36 Messages from the 'Other Operating Systems' Sub-Board (File 2)
- V. 45 Messages from the Vocal Hacking [Social Eng.] Sub-Board (File 3)
- 100 Messages from the Advanced Telecom Sub-Board (File 3)
- 97 Messages from the SPCS/OSS Sub-Board (File 3)
- VI. Black Ice Private BBS Userlist as of Mid-May 1989 [Estimated] (File 3)
-
- 880 Messages Total
- _____________________________________________________________________________
-
-
- BroadWay Show BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. Broadway Show BBS Pro-Phile
- III. Portions of the Broadway Show Message Base
- IV. Portions of The Radio Station Message Base
-
- There are approximately 180 Messages within this File.
- _____________________________________________________________________________
-
-
- CIA BBS Message Base File Table of Contents
-
-
- I. General Remarks About the BBS Message Base Files
- II. 30 messages from the CIA BBS Message Base
-
- _____________________________________________________________________________
-
-
- C.O.P.S. BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. C.O.P.S. BBS Pro-Phile written by Lodcom with help from the Co-Sysop
- III. 227 messages from the COPS Message Base (Including Sub-Boards)
- IV. G-Philes by the System Operator
- 1. How to Crash your Favorite BBS's
- 2. MCI Access Numbers
- 3. ITT Served Area Codes by State
- 4. 'Notes on the Network' Technical Info
- 5. Mini-Directory to Compuserve
- 6. COPS Apple Tips
- 7. Interesting Scanner Frequencies
-
- _____________________________________________________________________________
-
-
- Face to Face BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files (File 1)
- II. Face to Face BBS Pro-Phile written by Doc Holiday [Co-Sysop] (File 1)
- III. 196 Messages from the Face to Face [General] Sub-Board (File 1)
- IV. 64 Messages from the In the News Sub-Board (File 2)
- 88 Messages from the Conferences & Seminars Sub-Board (File 2)
- 30 Messages from the Internet Sub-Board (File 2)
- 48 Messages from the Operation SunDevil Sub-Board (File 2)
- 47 Messages from the UNIX OS Sub-Board (File 2)
- 31 Messages from the Telecom Sub-Board (File 2)
- 62 Messages from the Hacking Sub-Board (File 2)
- 6 Messages from the Private Sector Sub-Board (File 2)
-
- 572 Messages Total
-
- _____________________________________________________________________________
-
-
- Farmers Of Doom! BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. FOD BBS Pro-Phile written by the Sysop (Mark Tabas)
- III. 41 messages from the FOD Message Base
- IV. Phreak Philes by the System Operator
- 1. Equal Access and the American Dream
- 2. Better Homes and Blue Boxing, Parts i, ii, and iii.
-
- _____________________________________________________________________________
-
-
- Forgotten Realm BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. 13 Messages from the Packet Switching Networks Sub-Board
- 40 Messages from the Unix/Bell Computer Systems Sub-Board
- 56 Messages from the Telecom International Sub-Board
- 23 Messages from the Preferred User Sub-Board
-
- 132 Messages Total
-
- _____________________________________________________________________________
-
-
- Legion of Doom! BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. LOD BBS Pro-Phile
- III. LOD Main Menu Commands
- IV. 132 Messages from the LOD Main Msg Base, 'Trashing', & Local Sub-Boards
- V. 62 Messages from LOD and LOH Group (Private) Sub-Boards
- VI. LOD Internal Phreak/Hack Philes
- 1. Social Engineering an ESS (Paul Muad'Dib)
- 2. South Fla. COSMOS Wire Centers (Unknown Soldier & Gary Seven)
- 3. The TEL-TEC Long Distance Service (Lex Luthor)
- 4. Jiffy Scan V1.2 Telenet Node Scanning Pgm (Gary Seven)
- 5. The History of ESS (Lex Luthor)
- 6. CNA Listing as of 9/84 (Sharp Razor and X-Man)
- 7. Hacking Bell's CAROT System (Lex Luthor)
- 8. Hacking the HP3000 (Gary Seven)
- 9. Credit Bureau Incorporated (Lex Luthor)
- 10. Hacking Burroughs Computers (Blue Archer)
- 11. IBM's JCL - Job Control Language (Master of Impact)
- 12. Hacking Primos (Carrier Culprit)
- _____________________________________________________________________________
-
-
- Metal Shop Private (MSP) BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files (File 1)
- II. Metal Shop BBS Pro-Phile by Taran King & Knight Lightning (File 1)
- III. MSP General Menu Commands Including the MSP USERLIST (File 1)
- IV. 166 Messages from the Phreak, Hack, and MS-Elite Sub-Boards (File 1)
- 25 Messages from the Social Engineering Sub-Board (File 1)
- 44 Messages from the New User Sub-Board (File 1)
- 6 Messages from the Royal Court Sub-Board (File 1)
- V. 100 Messages from the General Discussion Sub-Board (File 2)
- 100 Messages from the Phrack Sub-Board (File 2)
- 70 Messages from the Phreak/Hack Sub-Board (File 2)
- 10 Messages from the MSP/Alliance Private Access Sub-Board (File 2)
-
- 521 Messages Total
- ______________________________________________________________________________
-
-
- OSUNY BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files (File 1)
- II. OSUNY BBS Pro-Phile (File 1)
- III. Portions of the Osuny Message Base (File 1)
- IV. Portions of the Osuny Message Base (File 2)
- V. Undated OSUNY Userlist (File 2)
- VI. OSUNY Bulletins aka G-Philes [Approximately 30] (File 2)
-
- Files 1 & 2 contain 375 messages from the original OSUNY Message Base.
- ______________________________________________________________________________
-
-
- Phoenix Project BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files (File 1)
- II. Phoenix Project BBS Pro-Phile by Erik Bloodaxe (co-sysop) (File 1)
- III. Messages from the First Incarnation of the Phoenix Project:
- 100 Messages from the Packet Switched Networks Sub-Board (File 1)
- 58 Messages from the General Discussion Sub-Board (File 1)
- 39 Messages from the 'Instructor' Sub-Board (File 1)
- IV. Some G-Philes written by the sysop, The Mentor: (File 1)
- 1. The Conscience of a Hacker (aka The Hacker's Manifesto)
- 2. A Novice's Guide to Hacking (1989 Edition)
- 3. A Multi-User Chat Program for DEC-10's
- 4. DCL Utilities for VMS Hackers
- V. Messages from the Second Incarnation of the Phoenix Project:
- 132 Messages from the General Discussion Sub-Board (File 2)
- 26 Messages from the 'We the People' Sub-Board (File 2)
- 77 Messages from the Basic Telecom Sub-Board (File 2)
- 58 Messages from the Hacking Sub-Board (File 2)
- 46 Messages from the Phone Company Sub-Board (File 2)
- 80 Messages from the SprintNet Packet Network Sub-Board (File 2)
- 49 Messages from the BT Tymnet Sub-Board (File 2)
-
- 31 Messages from the Internet Sub-Board (File 3)
- 60 Messages from the Other Packet Networks Sub-Board (File 3)
- 69 Messages from the UNIX Sub-Board (File 3)
- 18 Messages from the VAX/VMS Sub-Board (File 3)
- 28 Messages from the Primos Sub-Board (File 3)
- 41 Messages from the HP-3000 Sub-Board (File 3)
- 42 Messages from the Other Operating Systems Sub-Board (File 3)
- 27 Messages from the Programming Sub-Board (File 3)
- 27 Messages from the Social Engineering Sub-Board (File 3)
- 72 Messages from the Electronic Banking Sub-Board (File 3)
- 32 Messages from the Radio & Electronics Sub-Board (File 3)
- 11 Messages from the PC's Sub-Board (File 3)
- 35 Messages from the Altered States Sub-Board (File 3)
- 59 Messages from the Security Personnel Sub-Board (File 3)
- 59 Messages from the Phrack Sub-Board (File 3)
- 49 Messages from the 'Friends of the Family' PVT Sub-Board (File 3)
- VI. Directory of Downloadable Files Online (2nd Incarnation) (File 3)
-
- 1325 Messages Total
-
- _____________________________________________________________________________
-
-
- Plover-NET BBS Message Base File Table of Contents
-
-
- I. General Remarks About the BBS Message Base Files
- II. Plover-NET BBS Pro-Phile written by the Sysop (Quasi Moto)
- III. Approximately 346 messages from the Plover-NET Message Base
- IV. 18 of the 35 Phreak Philes that were online.
-
- _____________________________________________________________________________
- The Safehouse BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. Safehouse BBS Pro-Phile
- III. 269 messages from the Safehouse Message Base (Phreak & Merits sub's)
- IV. The Safehouse Userlist (undated)
- V. Some Phreak Philes that were available on The Safehouse
- 1. The Fine Art of Telesearching (by The Dragyn)
- 2. Compuserve Access Numbers (by The Hacker)
- 3. How to Box and Not Get Caught (by The Dragyn)
- 4. Moscow Phones
- 5. The Best of TEL: Trashing (by The Dragyn)
- 6. Secret Signals (by Texas Star)
-
- _____________________________________________________________________________
-
-
- Sherwood Forest I BBS Message Base File Table of Contents
-
-
- I. General Remarks About the BBS Message Base Files
- II. Sherwood Forest I BBS Pro-Phile written by Lord Digital
- III. Sherwood Forest I Userlist
- IV. 46 messages from the Phreak and Hack Sub-Boards of the Message Base
- V. 46 messages from the Knights of Shadow Phreak Group's Private Sub-Board
-
- Total Number of Messages in this File: 92.
-
- _____________________________________________________________________________
-
-
- Sherwood Forest II BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. Sherwood Forest II BBS Pro-Phile
- III. 100 Messages from the SF2 Message Base
- IV. G-Philes by the Co-Sysop, Bioc Agent 003
- 1. Hacking Morality by Big Brother
- 2. The Book of Bioc
- 3. Hacking Western Union's Easylink by Bioc & TUC
- 4. Bioc's Basic Telecom: Parts I through VII
- _____________________________________________________________________________
-
-
- Split Infinity BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. Split Infinity BBS Pro-Phile written by Sir Francis Drake
- III. 52 Messages from the Split Infinity Phreak Sub-Board Message Base
-
- ______________________________________________________________________________
-
-
- Twilight Phone BBS Message Base File Table of Contents
- I. General Remarks About the BBS Message Base Files
- II. 17 messages from the Twilight Phone Message Base
-
- _____________________________________________________________________________
-
-
- Twilight Zone BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. Twilight Zone BBS Pro-Phile written by the Sysop
- III. Twilight Zone Userlist
- IV. Portions of the Twilight Zone Message Base (Including Sub-Boards)
- V. Portions of The Septic Tank Message Base
- VI. G-Philes by the System Operator
- 1. Septic Tank INWATS Database Volume I - updated 6-26-86
- 2. Understanding the Traffic Services Position System (TSPS)
- 3. GETPAS - RSTS/E Basic Program to Hack Passwords.
- 4. Inside RSTS Volumes I through IV.
- 5. Hacking RSTS/E V9.X-XX
-
- _____________________________________________________________________________
-
-
- WOPR BBS Message Base File Table of Contents
-
- I. General Remarks About the BBS Message Base Files
- II. WOPR BBS Pro-Phile
- III. 307 messages from the WOPR Message Base (Including the Hack Sub-Board)
- IV. G-Philes by the System Operator
- 1. How To Use GTE Telenet
- 2. Introduction to Dec-10 and Dec-20 Computers
-
- ++++++++++++++++++++++++++++++++++++++
-
- End of Volume #1 TOC File.
-
-
- LOD Communications: Leaders in Engineering, Social and Otherwise ;)
-
- Email: lodcom@mindvox.phantom.com
- Voice Mail: 512-448-5098
- Snail Mail: LOD Communications
- 603 W. 13th
- Suite 1A-278
- Austin, Texas USA 78701
-
- ------------------------------
-
- Date: Fri, 20 Aug 1993 18;21:43 EDT
- From: eff@eff.org
- Subject: File 7--Graduate Paper Competition for CFP-'94
-
- STUDENT PAPER COMPETITION
-
- Full time college or graduate students are invited to enter the
- student paper competition. Papers must not exceed 2500 words and
- should address the impact of computer and telecommunications
- technologies on freedom and privacy in society. Winners will
- receive a scholarship to attend the conference and present their
- papers. All papers should be submitted by November 1, 1993 (either
- as straight text via e-mail or 6 printed copies) to:
-
- Prof. Eugene Spafford
- Department of Computer Science
- Purdue University
- West Lafayette, IN 47907-2004
- E-Mail: spaf@cs.purdue.edu; Voice: 317-494-7825
-
-
- REGISTRATION
-
- Registration information and fee schedules will be announced by
- September 1, 1993. Inquiries regarding registration should be
- directed to RoseMarie Knight, Registration Chair, at the JMLS
- address above; her voice number is 312-987-1420.
-
- ------------------------------
-
- End of Computer Underground Digest #5.64
-