**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 3, Issue #3.17 (May 17, 1991) ** ** SPECIAL ISSUE: EXHIBITS FROM RIGGS'S SENTENCING MEMORANDUM ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / / Bob Kusumoto GAELIC GURU: Brendan Kehoe +++++ +++++ +++++ +++++ +++++ CONTENTS THIS ISSUE: File 1: Moderator's Corner File 2: A Media Commentary on the RIGGS Sentencing File 3: Exhibits from the Atlanta 3 Sentencing Memorandum File 4: EXHIBIT A from Riggs' Sentencing Memorandum File 5: EXHIBIT E from Riggs' Sentencing Memorandum +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ USENET readers can currently receive CuD as alt.society.cu-digest. Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig), PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132); (2) cudarch@chsun1.uchicago.edu; (3) dagon.acc.stolaf.edu (130.71.192.18). E-mail server: archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators Subject: Moderator's Corner Date: May 17, 1991 ******************************************************************** *** CuD #3.17: File 1 of 5: Moderators Corner *** ******************************************************************** ++++++++++++++++ Information on subversive software wanted ++++++++++++++++ (Gordon received a number of helpul replies from his earlier request, but for those who missed CuD 3.14, we reprint it again. Thanks to all those who responded). Gordon is in the beginning stages of research for a technical paper on 'subversive' software. The article will discuss software that has been written for unusual purposes and circumstances, not all of which may be legal. Examples in this "genre" would be 'Fuckin' Hacker', 'Code Thief', and 'Receipt Writer'. It would be helpful to gather as many examples as possible, from many different computer platforms. He is *not* seeking executable copies, but just the name and description of the program. Any additional historical information, such as author name, date, innovative features, etc would be a bonus. If you can recall having seen, used, or heard of any unusual software that you feel fits in this category He would appreciate it if you'd drop me a line. The article has not, as of yet, been slated for publication, but he will supply a finished copy to anyone who responds or requests one. The finished work may also appear in a future issue of CuD. Thanks for your time and assistance! Gordon Meyer 72307.1502@Compuserve.com GRMEYER (GEnie and Delphi) or via CuD at tk0jut2@niu.bitnet +++++++ New BBS +++++++ A new BBS, similar in goals and philosophy to FACE-TO-FACE (which crashed) began May 18. It's called FREE SPEECH (618-943-2399), and will be open to all callers. Computer security and law enforcement agents are welcome. The sysop (Crimson Death) aims to encourage discussion and debate of Constitutional, computer security, and other issues. It's running Emulex, HST compatible, and users are encouraged to upload news articles and related files. ******************************************************************** >> END OF THIS FILE << ***************************************************************************