💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CUD › cud0403.txt captured on 2022-06-12 at 10:47:47.

View Raw

More Information

-=-=-=-=-=-=-



Computer underground Digest    Fri, Jan 24, 1992   Volume 4 : Issue 03

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #4.03 ( Jan 24, 1992)
Subject: File 1--INDEX TO CuD, VOLUME 3

Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au.  To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted as long as the source
is cited.  Some authors do copyright their material, and they should
be contacted for reprint permission.  It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to the
Computer Underground.  Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

----------------------------------------------------------------------

Date: Thu, 23 Jan 92 18:32:10
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--INDEX TO CuD, VOLUME 3



                Volume 3, Issue #3.00 (January 6, 1991)

  CuD #3.00: File 1 of 6: Moderator's corner
  CuD #3.00: File 2 of 6: From the Mailbag
  CuD #3.00: File 3 of 6: Gender-Neutral Language
  CuD #3.00: File 4 of 6: Sexism and the CU
  CuD #3.00: File 5 of 6: Security on the Net
  CuD #3.00: File 6 of 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.01 (January 12, 1991)

            SPECIAL ISSUE:  RESPONSES TO CU/SEXISM ARTICLES

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.02 (January 16, 1991)

       SPECIAL ISSUE: SECRET SERVICE STING BOARD AND INFORMANT

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.03 (January 22, 1991)

  CuD #3.03: File 1 of 4: Moderator's corner
  CuD #3.03: File 2 of 4: From the Mailbag
  CuD #3.03: File 3 of 4: CU-Related Bibliography
  CuD #3.03: File 4 of 4: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.04 (January 28, 1991)

  CuD #3.04, File 1 of 4: Moderator's corner
  CuD #3.04, File 2 of 4: From the Mailbag
  CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986
  CuD #3.04, File 4 of 4: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.05 (February 9, 1991)

  CuD #3.05, File 1 of 8: Moderator's corner
  CuD #3.05: File 2 of 8: From the Mailbag
  CuD #3.05: File 3 of 8: Arrest of Phiber Optik
  CuD #3.05: File 4 of 8: The Dictator--My Thoughts
  CuD #3.05: File 5 of 8: Chaos Computer Conference (Reprint)
  CuD #3.05: File 6 of 8: The Feds hit Ham Packet BBS Ops.
  CuD #3.05: File 7 of 8: Review--Exporting the First Amndmnt
  CuD #3.05: File 8 of 8: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.06 (February 23, 1991)


  CuD #3.06, File 1 of 6: Moderator's corner
  CuD #3.06: File 2 of 6: From the Mailbag
  CuD #3.06: File 3 of 6: CuD Archive Server
  CuD #3.06: File 4 of 6: No Felony Charges against Phiber O.
  CuD #3.06: File 5 of 6: The FBI Comes Rapping.....
  CuD #3.06: File 6 of 6: Some Thoughts on Gov't Actions

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.07 (March 2, 1991)

  CuD #3.07, File 1 of 6: Moderator's corner
  CuD #3.07: File 2 of 6: From the Mailbag
  CuD #3.07: File 3 of 6: CuD Index for Volume Two
  CuD #3.07: File 4 of 6: EFF Job Announcement
  CuD #3.07: File 5 of 6: Computers in the Movies
  CuD #3.07: File 6 of 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.08 (March 12, 1991)

  CuD #3.08, File 1 of 6: Moderator's corner
  CuD #3.08: File 2 of 6: From the Mailbag
  CuD #3.08: File 3 of 6: "Hollywood Hacker" Info Wanted
  CuD #3.08: File 4 of 6: What the EFF's Been Doing
  CuD #3.08: File 5 of 6: Book Review: Computer Ethics
  CuD #3.08: File 6 of 6: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.09 (March 19, 1991)

  CuD #3.09, File 1 of 2: Hollywood Hacker or Media Hype?
  CuD #3.09: File 2 of 2: Computers & First Amendment

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.10 (March 28, 1991)

  CuD #3.10--File 1 of 5: From the Mailbag
  CuD #3.10--File 2 of 5: The Hollywood Hacker, Part II
  CuD #3.10--File 3 of 5: AP Story on Len Rose
  CuD #3.10--File 4 of 5: Washington Post Story on Len Rose
  CuD #3.10--File 5 of 5: Len Rose and the Washington Post

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.11 (April 4, 1991)

  CuD #3.11: File 1 of 5: Moderators' Corner
  CuD #3.11: File 2 of 5: From the Mailbag
  CuD #3.11: File 3 of 5: Sundevil Arrest Announced
  CuD #3.11: File 4 of 5: Chicago Press Release on Len Rose
  CuD #3.11: File 5 of 5: Letter to AT&T Cancelling Service

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.12 (April 15, 1991)

  CuD #3.12: File 1 of 4: From the Moderators
  CuD #3.12: File 2 of 4: From the Mailbag
  CuD #3.12: File 3 of 4: Responses to Business Week Article
  CuD #3.12: File 4 of 4: Using the CuD mailserver

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.13 (April 21, 1991)

  CuD #3.13: File 1 of 4: From the Mailbag
  CuD #3.13: File 2 of 4: Response to Len Rose Article (1)
  CuD #3.13: File 3 of 4: Response to Len Rose Article (2)
  CuD #3.13: File 4 of 4: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.14 (April 26, 1991)

  CuD #3.14: File 1 of 6: Moderators Corner
  CuD #3.14: File 2 of 6: Comments on Len Rose Articles
  CuD #3.14: File 3 of 6: Moving toward Common Ground?
  CuD #3.14: File 4 of 6: CERT Advisory
  CuD #3.14: File 5 of 6: Fox and the Hollywood Hacker
  CuD #3.14: File 6 of 6: MONDO -- Great new 'Zine!

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.15 (May 2, 1991)

  CuD #3.15: File 1 of 3: Moderators Corner
  CuD #3.15: File 2 of 3: The CU in the News
  CuD #3.15: File 3 of 3: EFF/SJG SUE COOK, FOLEY ET. AL.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.16 (May 9, 1991)

  CuD #3.16: File 1 of 6: Moderators Corner
  CuD #3.16: File 2 of 6: Is Prodigy Snooping?
  CuD #3.16: File 3 of 6: Prodigy under Fire
  CuD #3.16: File 4 of 6: Assorted Comments on Prodigy
  CuD #3.16: File 5 of 6: Prodigy's response to Stage.dat File
  CuD #3.16: File 6 of 6: A Few Observations on Prodigy

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.17 (May 17, 1991)

  CuD #3.17: File 1 of 5: Moderators Corner
  CuD #3.17: File 2 of 5: Media Comment on Riggs Sentencing
  CuD #3.17: File 3 of 5: Exhibits from Riggs' Sentencing
  CuD #3.17: File 4 of 5: Exhibit A from Memorandum
  CuD #3.17: File 5 of 5: EXHIBIT E from Memorandum

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

                Volume 3, Issue #3.18 (May 28, 1991)

    SPECIAL ISSUE: GENIE ON-LINE CONFERENCE: FREE SPEECH AND PRIVACY

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
                Volume 3, Issue #3.19 (June 4, 1991)
CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: From the Mailbag
File 3: Thrifty-Tel--Victim or Victimizer?
File 4: The CU in the News
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
                Volume 3, Issue #3.20 (June 10, 1991)
CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: From the Mailbag
File 3: Bay Area Archive Site
File 4: Top Ten Fallacies about SJG Raid
File 5: Hacking and Hackers: The Rise, Stagnation, and Renaissance
File 6: EFFector Online 1.07: S.266 Loses First Round
File 7: How to get WATCH.EXE
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
               Volume 3, Issue #3.21 (June 17, 1991)
CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: From the Mailbag
File 3: Review of Gary Marx's UNDERCOVER
File 4: Review of PROTECTORS OF PRIVILEGE
File 5: Review of THE INFORMATION WEB
File 6: Hollywood Hacker Sentenced
File 7: Len Rose Sentenced (Reprint from Newsbytes)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
               Volume 3, Issue #3.22 (June 21, 1991)
CONTENTS THIS ISSUE:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Punishment and Control: Reply to Gene Spafford
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
               Volume 3, Issue #3.24 (July 3, 1991)
CONTENTS THIS ISSUE:
File 1: From the Mailbag  (Response to "Cyberpunk" definition)
File 2: Bill Vajk, Len Rose, Gene Spafford
File 3: Comsec Security Press Release
File 4: Comments on ComSec Data Security
File 5: Police Confiscations and Police Profit
File 6: House Crime Bill (1400) and its Threat to Modemers
File 7: Law Panel Recommends Computer Search Procedures
File 8: The CU in the News (data erasing; cellular fraud)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
               Volume 3, Issue #3.23 (June 27, 1991)
CONTENTS THIS ISSUE:
File 1: From the Mailbag  (Response to Dalton; Hacker Definitions)
File 2: Warrants issued for Indiana and Michigan "Hackers"
File 3: More on Thrifty-Tel
File 4: The CU in the News (Thackeray; Cellular Fraud; Privacy)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Computer Underground Digest--Sat Jul 13 01:10:10 CDT 1991 (Vol #3.25)

         Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Today's Contents:
          Moderators' Corner
          Spaf's Response to Bill Vajk
          Comments to Bill Vajk's posting in CuD #3.22 (T. Klotzbach)
          LOD Members for Comsec Computer Security (News Reprint)
          Alcor Email (ECPA) Case Settled (Keith Henson)
          NIST announces public-key digital signature standard (gnu)
          Secret Service Pays Hacker Call (Reprint from Newsbytes)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Thu Jul 18 17:22:30 CDT 1991 (Vol #3.26)

         Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents, #3.26 (June 18, 1991)
File 1:          Moderators' Corner
File 2:          The Vajk-Spaf-Leichter dialogue continues......
File 3:          The TERMINUS of Len Rose
File 4:          "Computer Crime" paper by Brian Peretti available
File 5:          Doc Savage Sentenced (NEWSBYTES Reprint)
File 6:          CompuServe Responds to Policy and Operations Questions

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Sat July 27 19:39:41 CDT 1991 (Vol #3.27)

         Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents, #3.27 (July 27, 1991)
Subject: File 1-- Response to "The Terminus of Len Rose"(1)
Subject: File 2-- Response to "The Terminus of Len Rose"(2)
Subject: File 3-- Response to Neidorf's "Terminus of Len Rose"(3)
Subject: File 4-- chinet review
Subject: File 5-- Comsec Data Security Article Corrections
Subject: File 6-- Crypto-conference statement
Subject: File 7-- Reasonable laws on computer crime
Subject: File 8-- re: Bill Vajk's latest comments
Subject: File 9--Chaos Computer Club archives at titania.mathematik.uni-ulm.de
Subject: File 10--Late reply to Dutch Crackers article (CUD3.19)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Thu Aug 1, 1991 (Vol #3.28)
             >> SPECIAL ISSUE: RESPONSE TO FORESTER ARTICLE <<

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents, #3.28 (August 1, 1991)
Subject: File 1--SPECIAL ISSUE: THE TOM FORESTER ARTICLE
Subject: File 2--CuD Review of _Computer Ethics_ (Reprint)
Subject: File 3--Re: Hackers - Clamp Down NOW!
Subject: File 4--Reply to Tom Forester Article

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Thu Aug 9, 1991 (Vol #3.29)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.29 (AUGUST 9, 1991)
Subject: File 1--Moderators' Corner
Subject: File 2--Say Goodbye to FOIA?
Subject: File 3--Hackers Challenged to Break In
Subject: File 4--Reciprocity in Cyberspace, by Robert Jacobson
Subject: File 5--text of chron-spacemail
Subject: File 6--Reply to Gene Spafford
Subject: File 7--Estimates on virus activity
Subject: File 8--Research Analysis
Subject: File 9--comp.patents, misc.legal.computing and misc.int-property

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Aug 16, 1991 (Vol #3.30)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

#3.30 (AUGUST 16, 1991)
File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford)
File 2--Review of "Practical Unix Security" (Garfinkel & Spafford).
File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint)
File 4--Mystery Lurks In The Death of INSLAW Reporter

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Aug 23, 1991 (Vol #3.31)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.31 (AUGUST 23, 1991)
File 1--Moderators' Corner: Blurbs
File 2--Request info on suggestions for a class
File 3--New BBS for CuD back issues and other services
File 4--Moderators' Corner: Blurbs
File 5--BOARDWATCH Magazine
File 6--NREN Boondoggle?
File 7--Inslaw Death Investigation Continues (NEWSBYTES REPRINT)
File 8--Memes, Gurus, and Viruses

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Sept 8, 1991 (Vol #3.32)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
              -> SPECIAL ISSUE: REVIEW OF _CYBERPUNK_ <-

CONTENTS, #3.32 (September 8, 1991)
File 1--CYBERPUNK Review
File 2--Review of _CYBERPUNK_
File 3--_CYBERPUNK_ Review
File 4--Newsweek review CYBERPUNK
File 5--Review of _CYBERPUNK_

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Fri Sept 14, 1991 (Vol #3.33)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.33 ( September 14, 1991)
File 1--Moderators' Corner
File 2--Clarification of "Boycott" Comment
File 3--How BellSouth Calculated $79,000
File 4--Houston Chronicle spacemail follow
File 5--More on Casolaro (INSLAW) Suicide (Mary McGrory reprint)
File 6--"Freaker's Bureau Incorporated" (FBI)
File 7--Review of Site Security Handbook (by Dark Adept)
File 8--Complain to Journalists
File 9--Spaf's Response to Reviews of _Unix Security_

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer Underground Digest--Tue, Sept 25, 1991 (Vol #3.34)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.34 ( September 25, 1991)
File 1--Moderators' Corner
File 2--WANTED: TARGETS OF OPERATION SUN DEVIL
File 3--BBS Services Fight NY "Download" Tax (Newsbytes Reprint)
File 4--New York Tax Law and Commentary by Tony Mack
File 5--Confusion Reigns on NY Download" Tax (Newsbytes Reprint)
File 6--Confusion unfolds on NY "Download" Tax (Newsbytes Reprint)
File 7--Clarification of NY BBS Law
File 8--Summary of Significance of NY "BBS Download Tax" (reprint)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Computer Underground Digest--Fri, Oct 4, 1991 (Vol #3.35)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.35 ( October 4, 1991)
Subject: File 1--Moderators' Corner
Subject: File 2--Cyperpunk Author Responds to Mitnick Charges
Subject: File 3--Computer Security Basics review
Subject: File 4--Steam age cyberpunk
Subject: File 5--Errata to "Practical Unix Security"
Subject: File 6--Living with the Law -- A view from Finland
Subject: File 7--Let's Get It Right.
Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)
Subject: File 9--Announcement
Subject: File 10--Cyberspace Conference in Montreal
Subject: File 11--Conference Info and Press Releases

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.36 ( October 12, 1991)
Subject: File 1-- Intro to Biblio and Resources Moderators' Corner
Subject: File 2-- General CU-Related Bibliography
Subject: File 3-- Dissertations and Theses
Subject: File 4-- General On-Line and Print Resources
Subject: File 5-- Misc. Books for Fun Reading

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer underground Digest    Sat, Oct 19, 1991   Volume 3 : Issue 37

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

  **** SPECIAL ISSUE: "GERALDO AND THE MAD HACKERS'S KEY PARTY" ****

CONTENTS, #3.37 ( October 19, 1991)
File 1:  Summary of Geraldo's _Now it can be Told_
File 2:  Excerpts from "Mad Hacker's Key Party"
File 3:  Review_of_Now_It_Can_Be_Told_
File 4:  Geraldo Rivera show on "Hacking"
File 5:  The_RISKS_of_Geraldo
File 6:  2600 Magazine Exposes Security Holes (NEWSBYTE reprint)

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Computer underground Digest    Sun, Oct 27, 1991   Volume 3 : Issue 38

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.38 ( October 27, 1991)
File 1:  Geraldo's _Now it can be Told_ Revisited
File 2:  Comment on the Geraldo Show
File 3:  A Guest's-eye view of the Geraldo Show
File 4:  Second Thoughts about the "Ingraham Massacre"
File 5:  Response to CuD #3.37's "Mad Hacker" Issue
File 6:  Release of Informatik #1
File 7:  Second Annual XMASCON

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.39 ( November 3, 1991)
File 1: Moderator's Corner--Brendan Kehoe's FTP information
File 2: The Secret Service and Protection of Privacy
File 3: Re: Response to Bill Vajk's FOIA Piece
File 4: Letters from Prison: Installment #1
File 5: Diehard 2 And Hacking
File 6: Re: CuD - Now It Can Be Told
File 7: Is the Government creating malign hackers?

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.40 ( November 10, 1991)
File 1: Rhetoric and CuD
File 2: Re: Comments on J Thomas's Ingraham post in CuD #3.38
File 3: Response to Ingraham Criticisms
File 4: Draft of BBS warnings to Law Enforcement Agents
File 5: CU Bibliography Update
File 6: Senate Bill 516 : Electronic Privacy in the Workplace
File 7: Letter from Prison (part 2 of 2)
File 8: "Password violations helped Hill hacker"

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CONTENTS, #3.41 ( November 16, 1991)

  Bill Cook's opening statement in Neidorf/PHRACK trial

  ...and more!

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.42 ( November 30, 1991)
File 1--Moderators' Corner
File 2--CPSR FOIAs Secret Service
File 3--Responses to CPSR (Reprinted from Telecom Digest)
File 4--Why Covert Surveillance is Wrong

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.43 ( Dec 8, 1991)
File 1--Moderators' Corner
File 2--You can help build the National Public Network.  Here's how.
File 3--#3.41--Bill Cook's opening statement in the Neidorf trial
File 4-- Two Juveniles arrested in BBS Extortion case
File 5--Law Enforcement and Rights
File 6--Townson's reply to Neidorf (in Cu Digest, #3.42)
File 7--"High-Tech Watergate" (Inslaw reprint by E. Richardson)
File 8--Software Piracy
File 9--Hacker Convicted
File 10--"Teens Tapped Computers of U.S. Military"
File 11--Canada: Police Seize BBS, Software Piracy Charges Expected 11/25/91
File 12--Here's something you might find of interest
File 13--24 Year Old Cracks NASA

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS, #3.44 ( Dec 17, 1991)
File 1: Jyrkis Posting
File 2: Re: Canada: Police Seize BBS, Software Piracy Charges Expected
File 3: FBI vs Kiddie Porn
File 4: "Getting what he Deserved?" (Reprint from Effector 2.02)
File 5--A book worth adding to your CuD list ...
File 6: E-mail privacy bibliography
File 7: Second CFP Conference

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
                   ** END  CuD  INDEX  VOLUME  3 **
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

------------------------------

End of Computer Underground Digest #4.03