Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 05 Issue 52
Computer underground Digest Wed July 14 1993 Volume 5 : Issue 52
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cpyp Editor: Etaoin Shrdlu, Senior
CONTENTS, #5.52 (July 14 1993)
File 1--Subjective opinion (Paul Ferguson Responds to #5.51)
File 2--Update on 2600 Case
File 3--BBSes Carrying CuDs
File 4--Re: CRYPT Newsletter
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Tue, 13 Jul 93 20:05:52 EDT
From: fergp@SYTEX.COM(Paul Ferguson)
Subject: File 1--Subjective opinion (Paul Ferguson Responds to #5.51)
Mr. Thomas (and readers of CuD),
While my first instinct was to not post any response to your
scathing series of highly volatile articles (albeit, on a highly
volatile subject, Cud 5.51), I reconsidered after a colleague
reminded me that, unfortunately, silence on my part may be
misinterpreted as some form of admission of guilt. I do regret
that this instance has created such a stir, but I do not apologize
for the attention brought upon the AIS system which ultimately
resulted in the removal of commented virus disassemblies from
public access.
Without launching into a dissertation about the harm caused by
virus code (both compiled executables and reverse-engineered
disassemblies), I would like to make a couple of points which are
commonly taken for granted or disregarded altogether.
The debate will obviously continue on virus eXchange systems,
which name they have been given due to the availability of virus
disassemblies, creation tools and the likes. (All of which were
available on AIS.) I get the distinct impression that we have not
heard the last on this topic. Far from it, I'd wager.
On one hand, we have those who argue that virus exchange (Vx) BBSs
do not further the spread of viruses and efforts to curtail their
activities are akin to stifling freedom of expression and the flow
of information. On the other hand, we have those who argue that Vx
BBSs most certainly aid in the spread of computer viruses simply
because they allow live computer viruses, source code and
disassemblies to be freely exchanged as would youngsters trade
baseball cards.
However, baseball cards do not inflict damage, but many times
viruses do exactly this, in the hands of an unwitting or
inexperienced computer user.
Let's examine, for a moment, some points on both sides of the
argument.
Pro Vx
o Individuals in favor of Vx claim that they have seen no
evidence that virus exchange systems have contributed to
the spread of viruses.
o Proponents of virus exchanges claim that by making viruses
and disassemblies available to their users, they are providing
them with the tools necessary to understand how computer viruses
work. Similarly, once this information is understood, they also
claim that it contributes to the overall enhancement of the
computer security knowledge-base of their users.
o Many advocates of Vx systems claim that attempts at stemming the
flow of computer viruses is an idealism which should be protected
under freedom of expression and freedom of information concepts.
Con Vx
o Figures reflected in statistics compiled by virtually all
computer security and antivirus organizations, show a dramatic
increase in the number of computer viruses within the past three
years. Since Todor Todorov's Virus eXchange BBS in Bulgaria (which
was the first of its kind in the world), the number of "underground"
systems which mimic Todorov's system has risen. And so has the
number of viruses. Exponentially. Sara Gordon has documented quite
a bit concerning the impact of these systems; I'd recommend her
paper(s) on the subject which she has presented on several
occasions. <vfr@netcom.com>
o Viruses and disassemblies which are made available on these
systems are a potential danger. While live viruses present a more
immediate threat in the wrong hands, disassemblies can be
considered even more of a danger (in most cases) because of their
ability to be easily modified, recompiled and redistributed as
undetectable variants of existing viruses. These instances have
happened with increasing frequency and can be directly attributed
to Vx systems and virus creation groups such as Phalcon/Skism,
YAM, NuKe and ARCV.
o With the availability of virus creation "kits," such as the VCL,
PS-MPC and the G-squared, even "wannabe" virus writers with little
or no skill at all can make viruses and distribute them at their
leisure.
o While it should be realized that this type of activity cannot be
stopped completely, we must acknowledge the fact that Virus
exchange systems _do_ contribute to the spread of viruses. Virus
exchanges _do_ contribute to the propagation of new and undetectable
viruses. Access to live viruses and disassemblies are not necessary
for gaining knowledge and understanding how they work. A basic
understanding of assembler language and some practical examples
(including Ralf Brown's compendium) would suffice.
Can there be a common ground on this issue? Probably not. The
computer virus arena is filled with complex and diversified idealisms
on the subject. I consider myself a proponent of freedom of
information, but I also believe there are limits to one's freedom.
In fact, I'm most fond of the adage,"The freedom to swing your fist
ends when it meets my face." In other words, one's right to a
particular freedom ends where it infringes on someone else's rights
for safety or privacy, in this instance. And the government should
certainly not allow systems which participate in these type of
questionable activities to function within their realm of
responsibility. Simply the appearance of government sponsorship
tends to lend some form of legitimacy to the activities in question.
Proponents of virus exchanges remain unconvinced that making live
viruses, source code and disassemblies available endangers end-users.
I'm convinced that not all instances do cause damage, but I'm also
convinced that many times, it has done exactly this.
In the case of the AIS BBS, it was operating under the auspices,
whether explicitly or implied, of a Federal Office, namely the US
Department of Treasury. The point in all of this is not necessarily
what AIS did, but rather, how it was done and the apparent moral
"high ground" of legitimacy it portrayed by being an apparatus of
a United States Government office, financed (in part) with taxpayer
money.
I admit that I am dismayed that people do not see the problem here.
I certainly claim no "moral high ground" on the issue. I took what I
thought was the best venue of approach, which was to bring this topic
out of the shadows and into the forefront for discussion.
Unfortunately, the discussion was brief, the actions behind the
scenes were apparently swift and apparently, I've been portrayed as
some type of computer stool-pigeon who can't stand to see something
"successful" succeed. Actually, my part in this entire scenario is
actually very small, although rumor and innuendo would suggest
otherwise.
In an ideal world, we all share the freedom to express our concerns
and ideas in an open forum. Although I may not agree with what you may
say, I would give my life for your right to freedom of expression.
However, let's not confuse concepts of freedom of expression and
reckless computing (my opinion, implied).
After reading my thoughts on the matter, reasonable deduction is an
exercise left to the reader.
To briefly address some selected points made in Cud 5.51:
Jim Thomas writes (in File 1 -- Introduction to the AIS BBS
Controversy) -
"Perhaps the anonymous accusers are correct: Some types of
information may pose a risk if abused. But, in an open democracy,
the potential for abuse has been neither a necessary nor a
sufficient justification to silence those with whom we disagree."
I am flattered that you suggest I actually have enough clout to
personally silence AIS, if that is the gist. I took the liberty
of making it public knowledge, while concurrently voicing _my_
opinion about its merits. This street goes both ways. Most of us
are painfully aware of the numerous virus underground systems
around the world, yet the attention is focused on a solitary
system run by an employee of the U.S. Treasury Department. Why is
that? I suggest that most who squeak the loudest in opposition
to my anonymous (hardly) posting are either a.) not familiar with
the amount of damage, in both manhours and dollars, caused by
computer viruses each year, b.) overly radical proponents of
information exchange who care not what damage may result in said
exchange, or c.) banging their drum just to bang their drum.
(Please note the use of the word "most" in the statement above.)
Jim Thomas again writes (in File 6 -- Media, Anti-virus
personnel, Ethics, and AIS) -
"Let's keep some facts straight. 'Mr. Smith (Kouch)' did *not*
'nail Clancy's coffin.' Paul Ferguson and his friends did with
anonymous inflammatory posts and with other posts that
irresponsibly suggest illegal and 'underground' activity."
I'll address this directly, since it is obviously your opinion,
not fact, as you seem to imply. In fact, I think you should have
used "opinionated" instead of "inflammatory," but that is your
prerogative. I find it odd that after so much "underground"
exposure as was afforded AIS in the months preceding my
"anonymous" post, not an eyebrow was raised. Perhaps Kouch's
publication is truly "underground" catering specifically to
hush-hush underground circles of computer vandals? I don't
think so. Perhaps Cud is truly an "underground" publication?
I think not. So where's the beef?
One "anonymous" post, strategically placed razed the house of
cards.
Mr. Thomas makes one excellent point, however, in the midst of
the remaining text -
"It's said that some people, angered at this affair, are planning
to retaliate against those judged responsible. This would be an
ethically bankrupt response."
At least we can agree on this point.
One final note, for what its worth. I did not post the forwarded
article to damage Clancy's reputation or to prove any particular
political point. Personally, I have nothing to gain by the
results. I do not foolishly sally forth and and do someone else's
bidding in hopes of gaining favor. I do not publish software
which would be directly or indirectly beneficial to myself,
especially anti-virus software (I have done extensive work in
assembly and have reversed-engineered viruses since their
appearance, however). I posted the article because I believe
it is a conflict of interest for any governmental agent to
openly make viruses and disassemblies available, regardless of
intent. If only one instance of damage resulted directly from the
virus-related material available from AIS, then that is one too
many and I would happily rest my case.
What happened to the hacker ethic? I seem to recall a "no damage
clause" which still echoes in my mind, especially with the advent
of this fiasco. "Damage?" "Damage," you say, "What Damage?" "AIS
only made it available -- they're not responsible for what is
done with it!"
Now that I think about about it again, I'm really "not sorry."
Cynically,
Paul Ferguson | "Confidence is the feeling you get
Network Integrator | just before you fully understand
Centreville, Virginia USA | the problem."
fergp@sytex.com | - Murphy's 7th Law of Computing
Quis Custodiet Ipsos Custodes?
------------------------------
Date: Tue, 13 Jul 1993 14:33:44 EST
From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
Subject: File 2--Update on 2600 Case
UPDATE ON 2600 CASE
The Secret Service recently admitted that it possesses six previously
unacknowledged documents relating to the break-up of a 2600 meeting at
Pentagon City Mall last November. In conjunction with that admission,
the agency has filed an affidavit executed by the Special Agent in
Charge of its Washington field office. The affidavit, which is
re-printed below, provides the most detailed explanation yet of the
Secret Service's role in this affair.
The most important parts of the affidavit appear to be paragraphs
22-24, which state that "the Secret Service received information from
a business indicating that that business' PBX had been manipulated,"
and that the business provided the agency with "certain information
concerning the individual(s) who had entered the system." Based on
these statements, here is the best guess of what happened: 1) the
"victim business" had some reason to believe that the individual
involved had some relationship to 2600; 2) the business passed this
information on to the Secret Service; 3) the Secret Service knew that
people associated with 2600 met at the mall on a regular basis; and 4)
the Secret Service recruited the mall security personnel to identify
the individuals attending the monthly meetings.
The litigation of CPSR's FOIA case against the Secret Service is
proceeding, and new information will continue to be posted as it is
obtained.
CPSR is a national organization of individuals concerned about the
impact of computer technology on society. The best way to support
CPSR's work is to become a member. For more information, write to
<cpsr@cpsr.org> .
David Sobel
CPSR Legal Counsel
dsobel@washofc.cpsr.org
================================================================
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
Computer Professionals )
for Social Responsibility, )
)
Plaintiff )
) Civil Action No. 93-0231
v. )
)
United States Secret Service, )
)
Defendant )
PUBLIC DECLARATION OF WILLIAM F. BURCH,
SPECIAL AGENT IN CHARGE,
UNITED STATES SECRET SERVICE, WASHINGTON FIELD OFFICE
I, William F. Burch hereby depose and say:
1. I am the Special Agent in Charge (SAIC) of the
United States Secret Service (hereinafter Secret Service),
Washington Field office having held this position since
January 24, 1993. I have been employed as a Special Agent of
the Secret Service since January 20, 1969.
2. I am providing this declaration in connection with the
above-captioned civil action arising under the Freedom of
Information Act (FOIA). The purpose of this declaration is to
address matters raised by the plaintiff in Plaintiff's Memorandum
in Opposition to Defendant's Motion for Summary Judgement and in
Support of Plaintiff's Cross-motion for Summary Judgement
(hereinafter Plaintiff's Memorandum).
[1]
3. This declaration is provided for the public record
and is somewhat limited, as the records which are at issue in this
case were compiled by the Secret Service in the course of a
criminal matter which is currently open and ongoing. I have,
however, also provided a separate and more detailed declaration
for in camera review by this Court.
4. In my position as the Special Agent in Charge of the
Washington Field Office, I am aware that plaintiff submitted to
the Secret Service a FOIA request for information in the
possession of the Secret Service which concerns "the breakup of
a meeting of individuals" associated with the "2600 Club" at the
"Pentagon City Mall in Arlington, Virginia on November 6, 1992."
5. In January of 1993, my office received a written request
from the Secret Service's Freedom of Information and Privacy Acts
(FOI/PA) Office asking that my office search its records to
determine if it maintained information concerning plaintiff's FOIA
request.
6. Pursuant to this request my office realized that it was
maintaining records concerning an ongoing criminal matter and that
these records might contain information which was responsive to
plaintiff's FOIA request.
7. It was then directed that a copy of all records
concerning this criminal investigation be provided to Secret
Service headquarters.
2
8. In May of this year I was asked to provide an in camera
and a public declaration concerning the underlying criminal
investigation and the records concerning that investigation which
related to plaintiff's FOIA request.
9. In the original draft of these declarations I noted that
they referred only to certain newspaper articles and two specific
records. Through my discussions with the "case agent" assigned to
the underlying criminal matter, I was, however, personally aware
that my office maintained certain additional records which
appeared to concern plaintiff's FOIA request.
10. Upon further review I found that inadvertently copies
of certain records which were in the possession of my office and
which appeared to be responsive to plaintiff's FOIA request were
not in the possession of the Secret Service FOI/PA.
11. Copies of all records maintained by my office which
records concern plaintiff's FOIA request, and which records were
in the possession of my office at the time this office's original
search for material responsive to plaintiff's FOIA request,l
have now been provided to Secret Service headquarters.
------------------------
1 The underlying criminal investigation has continued and,
therefore, additional records have been compiled by the Secret
Service in regard to that investigation.
3
12. Additionally, a record by record, page by page
comparison has been made of the information maintained in the
Washington Field Office, which information was in the possession
of the Secret Service at the time of my office's original search
for information responsive to plaintiff's FOIA request, with the
copies of the records which have now been provided to Secret
Service headquarters. This comparison showed that these two
groups of records are now identical.
13. The records which concern plaintiff's FOIA request,
with the exception of the newspaper articles, had been provided to
the Secret Service fron a confidential source and had been
compiled for law enforcement purposes.
14. The information contained in these records was compiled
in order to identify and to further investigate individual(s) who
are considered to be possible suspect(s) in a criminal
investigation being conducted by the Secret Service, which
investigation relates to a violation of Title 18 of the United
States Code, Section 1029, and/or 1030, "Fraud and related
activity in connection with access devices," and "Fraud and
related activity in connection with computers."
15. More specifically, the Secret Service has reason to
believe that the suspect(s) in this case had gained access to a
Public Branch Exchange (PBX) owned by a private company and
manipulated that PBX so as to enable the commission of several
tens of thousands of dollars of telephone toll fraud.
4
16. It is my understanding that at the request of my
office the records at issue in this case, with the exception of
the newspaper articles, were withheld from release due to the
ongoing nature of the enforcement proceeding, as to release the
information could constitute an invasion of the privacy of certain
individuals, as the records at issue had been provided to the
Secret Service by a confidential source, and as to release the
records would reveal the identity of confidential sources.
17. I have been advised that plaintiff is now claiming that
the Secret Service's action in withholding these records was
improper. In particular, I have been advised that plaintiff is
alleging that the records have been improperly withheld as the
Secret Service does not have the authority to conduct investiga-
tions in the area of computer crime, and, as the Secret Service is
not conducting a criminal investigation, but "'merely engaging in
a general monitoring of private individuals activities' .... or
conducting an inquiry 'for purposes of harassment'." Plaintiff's
Memorandum, page 5.
18. While I am not an expert in the proprieties of releasing
or withholding information under the FOIA, as the Special Agent in
Charge of the Secret Service's Washington Field office, I can
provide relevant information concerning the Secret Service's
investigative authority and the underlying criminal investigation
through which the records in question came into the possession of
the Secret Service.
5
19. The Secret Service is a criminal law enforcement agency
which operates under the provisions of Title 18 of the United
States Code, Section 3056. Under Section 3056, Subsection (b),
the Secret Service is specifically authorized to detect and arrest
any person who violates federal criminal laws relating to coins,
obligations, and securities of the United States and foreign
governments, electronic fund transfers, credit or debit card
fraud, false identification documents or devices, false
identification documents and devices, and certain laws relating to
financial institutions. Additionally, pursuant to Title 18 of
the United States Code, Sections 1029 and 1030, the Secret Service
is specifically charged with the authority to investigate offenses
concerning fraud and related activity in connection with computers
and/or access devices. See Title 18 U.S.C. 1030(d), Fraud and
related activity in connection with computers ("The United States
States Secret Service shall ... have the authority to investigate
offenses under this section."). Contrary to plaintiff's argument,
the Secret Service does, therefore, have clear statutory authority
to conduct criminal investigations relating to computer fraud.
20. With regard to plaintiff's allegation that the Secret
Service was "merely engaging in a general monitoring of private
individuals' activities" .... or conducting an inquiry "for
purposes of harassment," (Plaintiff's Memorandum, page 5), I
would state that there is absolutely no truth to plaintiff's
suggestion.
6
21. The records which are at issue in this case were
provided to the Secret Service by a confidential source and were
compiled by the Secret Service for law enforcement purposes --
the identification of possible suspect(s) in a criminal
investigation and the further investigation of the suspect(s).
22. In connection with its law enforcement
responsibilities, the Secret Service received information from a
business indicating that that business' PBX had been manipulated
and that as a result the business had been the victim of long
distance telephone toll fraud.
23. The victim business provided the Secret Service with
information which might lead to the individual(s) who had
manipulated the system or utilized the manipulated system to
steal telephone time.
24 The victim business had access to certain information
concerning the individual(s) who had entered the system, but could
not directly identify the individual(s) involved. It was,
through a follow-up investigation and an attempt to identify the
individual(s) who had committed this fraud, that the Secret
Service came into the possession of the information which is at
issue in this case.
25. The details of the law enforcement proceeding which
underlies this matter are set out in my in camera declaration.
I believe, however, that the generic facts as described above show
7
that the records which are at issue in this case were compiled by
the Secret Service for valid law enforcement purposes.
26. I am aware that plaintiff is arguing that the records at
issue have been improperly withheld as the records consist of
information which is already known to the subject(s) of the
investigation. To the knowledge of the Secret Service, however,
this is not correct. At this time the Secret Service has no
reason to believe that the suspect(s) in its investigation, or the
plaintiff in this case, are aware of the nature of the Secret
Service's investigation, who is under investigation by the
Secret Service, what information is in the possession of the
Secret Service, or who has provided information to the Secret
Service in regard to this matter.
27. I am also aware that the plaintiff argues that "the
shopping mall was clearly the source of the records being
withheld." Again contrary to plaintiff's argument, to date there
has been no public statement that the "Mall" is the source of the
information which is being withheld.
28. Additionally, the Secret Service recently contacted the
source to determine the position of the source in regard to this
matter. At this time, the source reiterated the source's original
position and understanding that the fact that it had provided
certain information to the Secret Service would not be revealed.
8
29. Further, the records at issue also contain information
concerning a second source of information which source has since
provided information to the Secret Service in regard to the
underlying criminal case.
30. Due to the nature of the investigative work conducted
by the Secret Service, this agency must protect from exposure the
sources which the Secret Service utilizes to gain information in
the course of its criminal investigations. In the course of its
investigative function the Secret Service routinely receives
information from various sources with the understanding that,
unless the source is needed to provide testimony or records
in a criminal trial, the fact of that source's cooperation will
not be revealed to the public. Further, information is often
provided by a source with the understanding that at the time of a
criminal trial a subpoena will be issued to protect the fact of
the earlier cooperation of the source. Therefore, if such
confidential sources are compromised by premature exposure, the
result could have a chilling effect on the law enforcement
function of the Secret Service in that, in the future, such
sources would be less cooperative with the Secret Service, and
federal law enforcement in general.
31. It is, then, reasonable and necessary that the Secret
service preserve its relationship with confidential sources by
protecting from release information which would expose the
cooperation of such sources with the Secret Service.
9
32. As I have attempted to describe above, the records which
are being withheld in this case are records which were compiled
by the Secret Service for law enforcement purposes. Further,
the release of the records could result in interference with an
open enforcement proceeding, an invasion of the personal privacy
of third parties, reveal information provided by a confidential
source and compromise the future cooperation of a confidential
source, by revealing the cooperation of those sources with the
Secret Service. My office has, therefore, requested that the
records involved in this matter continue to be withheld.
I declare under penalty of perjury that the foregoing is true
to the best of my knowledge and belief.
/Signed/
William F. Burch
Special Agent in Charge
Washington Field Office
10
=================================================================
------------------------------
Date: Wed, 7 July, 1993 21:43:12 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 3--BBSes Carrying CuDs
We receive a number of letters, faxes, phone calls, and psychic vibes
each week from non-net users asking how CuDs can be retrieved without
Internet access. We will periodically run BBS numbers where ya'll can
obtain CuDs. Canadian readers are especially interested in Montreal,
Toronto, and Vancouver boards, so we'd like to receive some numbers to
pass.
The CuD header lists a variety of world-wide outlets for CuD. We
encourage U.S. readers to call RIPCO (312-528-5020), The Works
(617-861-8976), or Rune Stone (203-832-8441).
+++++++++++++
Date--Tue, 6 Jul 93 21:19:42 CST
From--bazooka%podbox@CS.UTEXAS.EDU(Bob Anderson)
Subject--BBSes that carry CuD
Dear CuD,
Thanks for being there!
Here's a listing for you of another BBS that has CuD available.
BBS name: Pair O Dice
BBS numbers: 1.512.451.4610 @ 300 - 2400 baud
1.512.451.7117 @ 2400 - 14400 baud
BBS hours: 24 hours
BBS location: Austin, Texas, USA
Pod both subscribes to comp.society.cu.digest and also keeps current
and past issues online in it's gfile area as well as various other
ezines that deal with the computer underground, art and virtual
culture.
We specialize in original computer graphics and are also a dialup
site for the OTIS image collection. We have also just received
permission from the Smithsonian to stock images from their PHOTO1
collection.
Pair O Dice is an official Info Site for EFF-Austin and the
sysop is a long time member of the EFF.
We offer about 75 newsgroups, publicly subscribe to a few mailing
lists, have a good selection of online games and carry basic
support programs for the Amiga as well as important programs for
the Mac and MS-DOS users such as PD graphic viewers and convertors.
The system is run on an Amiga and uses the CNet bbs software and
Amiga UUCP.
++++++
From--ehunt%bsc835@UUNET.UU.NET
Subject--CuD Carrying BBS
Date--Mon, 5 Jul 93 14:31:55 CDT
BBS Name: The MATRIX
BBS Phone: 205-323-2016 - 2400 bps only
205-323-6016 - V.32/V.32bis/HST only (no 2400)
205-458-3449 - V.32/V.32bis only (no 2400)
21 total incoming phone lines
Hours: 24
CuDs from Volume 2 to current online. All issues of EFFector Online.
All issues of Quanta and InterText (ASCII only).
CuD and EFFector Online available for DL on first call. 15 hour
complimentary subscription given to all new callers, but takes 1-2
weeks for activation.
Home BBS for the American BBS Association (ABBSA)
Over 130,000 files available in addition to CuD and EFFector Online.
Most major PC based echonets as well as an Internet Email feed and
small assortment of UseNet newsgroups.
Located in Birmingham, Alabama.
+++++++
From--Chuck Frieser <summarized from snailmail>
Chuck Frieser's BBS, in Beverly, Mass, carries CuD online through
the ReadRoom Door (written by Michael Gibbs of The Infomat BBS).
Chuck's board number is (508) 927-6712.
------------------------------
Date: Mon, 12 Jul 93 09:04:36 EDT
From: morgan@ENGR.UKY.EDU(Wes Morgan)
Subject: File 4--Re: CRYPT Newsletter
>Date--Mon, 21 Jun 93 21:18:31 EDT
>From--Urnst Kouch <70743.1711@COMPUSERVE.COM>
>Subject--File 5--Fear and Loathing--On the Virus Code Trail at AIS
>
>((Urnst Kouch is editor of CRYPT NEWSLETTER. Additional details on the
>background of the incident and those involved can be found
>in CRYPT NEWSLETTER #16)).
I'd like to make a public apology to Urnst Kouch and the authors/editors
of CRYPT Newsletter.
After reading an interview with Urnst Kouch in a previous issue of CuD,
I made several comments about both him and CRYPT Newsletter. A kind
individual (who shall remain nameless) sent me a sample copy of CRYPT,
and I found that the excerpts printed in CuD were in no way represen-
tative of the editorial slant of the newsletter as a whole. In fact,
I found it both comprehensive and well-written in all respects; if
subscriptions are available via email, I'd greatly appreciate the ad-
dition of my address to the subscription list. (I don't cruise the
BBSs as much as I once did; a new daughter tends to cut down on one's
time online.)
Again, I offer my apologies to Urnst and his associates. I may not
condone every position presented by individual articles, but my com-
ments about CRYPT were "way out of line." Please consider my earlier
comments retracted, and feel free to either delete my previous com-
ments in your archive files or append to them this apology/retraction.
--Wes Morgan
------------------------------
End of Computer Underground Digest #5.52
************************************