---------------------------------------------------------------------- Date: Thu, 23 Jan 92 18:32:10 From: Moderators Subject: File 1--INDEX TO CuD, VOLUME 3 Volume 3, Issue #3.00 (January 6, 1991) CuD #3.00: File 1 of 6: Moderator's corner CuD #3.00: File 2 of 6: From the Mailbag CuD #3.00: File 3 of 6: Gender-Neutral Language CuD #3.00: File 4 of 6: Sexism and the CU CuD #3.00: File 5 of 6: Security on the Net CuD #3.00: File 6 of 6: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.01 (January 12, 1991) SPECIAL ISSUE: RESPONSES TO CU/SEXISM ARTICLES ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.02 (January 16, 1991) SPECIAL ISSUE: SECRET SERVICE STING BOARD AND INFORMANT ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.03 (January 22, 1991) CuD #3.03: File 1 of 4: Moderator's corner CuD #3.03: File 2 of 4: From the Mailbag CuD #3.03: File 3 of 4: CU-Related Bibliography CuD #3.03: File 4 of 4: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.04 (January 28, 1991) CuD #3.04, File 1 of 4: Moderator's corner CuD #3.04, File 2 of 4: From the Mailbag CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986 CuD #3.04, File 4 of 4: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.05 (February 9, 1991) CuD #3.05, File 1 of 8: Moderator's corner CuD #3.05: File 2 of 8: From the Mailbag CuD #3.05: File 3 of 8: Arrest of Phiber Optik CuD #3.05: File 4 of 8: The Dictator--My Thoughts CuD #3.05: File 5 of 8: Chaos Computer Conference (Reprint) CuD #3.05: File 6 of 8: The Feds hit Ham Packet BBS Ops. CuD #3.05: File 7 of 8: Review--Exporting the First Amndmnt CuD #3.05: File 8 of 8: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.06 (February 23, 1991) CuD #3.06, File 1 of 6: Moderator's corner CuD #3.06: File 2 of 6: From the Mailbag CuD #3.06: File 3 of 6: CuD Archive Server CuD #3.06: File 4 of 6: No Felony Charges against Phiber O. CuD #3.06: File 5 of 6: The FBI Comes Rapping..... CuD #3.06: File 6 of 6: Some Thoughts on Gov't Actions ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.07 (March 2, 1991) CuD #3.07, File 1 of 6: Moderator's corner CuD #3.07: File 2 of 6: From the Mailbag CuD #3.07: File 3 of 6: CuD Index for Volume Two CuD #3.07: File 4 of 6: EFF Job Announcement CuD #3.07: File 5 of 6: Computers in the Movies CuD #3.07: File 6 of 6: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.08 (March 12, 1991) CuD #3.08, File 1 of 6: Moderator's corner CuD #3.08: File 2 of 6: From the Mailbag CuD #3.08: File 3 of 6: "Hollywood Hacker" Info Wanted CuD #3.08: File 4 of 6: What the EFF's Been Doing CuD #3.08: File 5 of 6: Book Review: Computer Ethics CuD #3.08: File 6 of 6: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.09 (March 19, 1991) CuD #3.09, File 1 of 2: Hollywood Hacker or Media Hype? CuD #3.09: File 2 of 2: Computers & First Amendment ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.10 (March 28, 1991) CuD #3.10--File 1 of 5: From the Mailbag CuD #3.10--File 2 of 5: The Hollywood Hacker, Part II CuD #3.10--File 3 of 5: AP Story on Len Rose CuD #3.10--File 4 of 5: Washington Post Story on Len Rose CuD #3.10--File 5 of 5: Len Rose and the Washington Post ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.11 (April 4, 1991) CuD #3.11: File 1 of 5: Moderators' Corner CuD #3.11: File 2 of 5: From the Mailbag CuD #3.11: File 3 of 5: Sundevil Arrest Announced CuD #3.11: File 4 of 5: Chicago Press Release on Len Rose CuD #3.11: File 5 of 5: Letter to AT&T Cancelling Service ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.12 (April 15, 1991) CuD #3.12: File 1 of 4: From the Moderators CuD #3.12: File 2 of 4: From the Mailbag CuD #3.12: File 3 of 4: Responses to Business Week Article CuD #3.12: File 4 of 4: Using the CuD mailserver ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.13 (April 21, 1991) CuD #3.13: File 1 of 4: From the Mailbag CuD #3.13: File 2 of 4: Response to Len Rose Article (1) CuD #3.13: File 3 of 4: Response to Len Rose Article (2) CuD #3.13: File 4 of 4: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.14 (April 26, 1991) CuD #3.14: File 1 of 6: Moderators Corner CuD #3.14: File 2 of 6: Comments on Len Rose Articles CuD #3.14: File 3 of 6: Moving toward Common Ground? CuD #3.14: File 4 of 6: CERT Advisory CuD #3.14: File 5 of 6: Fox and the Hollywood Hacker CuD #3.14: File 6 of 6: MONDO -- Great new 'Zine! ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.15 (May 2, 1991) CuD #3.15: File 1 of 3: Moderators Corner CuD #3.15: File 2 of 3: The CU in the News CuD #3.15: File 3 of 3: EFF/SJG SUE COOK, FOLEY ET. AL. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.16 (May 9, 1991) CuD #3.16: File 1 of 6: Moderators Corner CuD #3.16: File 2 of 6: Is Prodigy Snooping? CuD #3.16: File 3 of 6: Prodigy under Fire CuD #3.16: File 4 of 6: Assorted Comments on Prodigy CuD #3.16: File 5 of 6: Prodigy's response to Stage.dat File CuD #3.16: File 6 of 6: A Few Observations on Prodigy ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.17 (May 17, 1991) CuD #3.17: File 1 of 5: Moderators Corner CuD #3.17: File 2 of 5: Media Comment on Riggs Sentencing CuD #3.17: File 3 of 5: Exhibits from Riggs' Sentencing CuD #3.17: File 4 of 5: Exhibit A from Memorandum CuD #3.17: File 5 of 5: EXHIBIT E from Memorandum ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.18 (May 28, 1991) SPECIAL ISSUE: GENIE ON-LINE CONFERENCE: FREE SPEECH AND PRIVACY ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.19 (June 4, 1991) CONTENTS THIS ISSUE: File 1: Moderator's Corner File 2: From the Mailbag File 3: Thrifty-Tel--Victim or Victimizer? File 4: The CU in the News +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.20 (June 10, 1991) CONTENTS THIS ISSUE: File 1: Moderator's Corner File 2: From the Mailbag File 3: Bay Area Archive Site File 4: Top Ten Fallacies about SJG Raid File 5: Hacking and Hackers: The Rise, Stagnation, and Renaissance File 6: EFFector Online 1.07: S.266 Loses First Round File 7: How to get WATCH.EXE +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.21 (June 17, 1991) CONTENTS THIS ISSUE: File 1: Moderator's Corner File 2: From the Mailbag File 3: Review of Gary Marx's UNDERCOVER File 4: Review of PROTECTORS OF PRIVILEGE File 5: Review of THE INFORMATION WEB File 6: Hollywood Hacker Sentenced File 7: Len Rose Sentenced (Reprint from Newsbytes) +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.22 (June 21, 1991) CONTENTS THIS ISSUE: File 1: Moderators' Corner File 2: From the Mailbag File 3: Punishment and Control: Reply to Gene Spafford +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.24 (July 3, 1991) CONTENTS THIS ISSUE: File 1: From the Mailbag (Response to "Cyberpunk" definition) File 2: Bill Vajk, Len Rose, Gene Spafford File 3: Comsec Security Press Release File 4: Comments on ComSec Data Security File 5: Police Confiscations and Police Profit File 6: House Crime Bill (1400) and its Threat to Modemers File 7: Law Panel Recommends Computer Search Procedures File 8: The CU in the News (data erasing; cellular fraud) +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.23 (June 27, 1991) CONTENTS THIS ISSUE: File 1: From the Mailbag (Response to Dalton; Hacker Definitions) File 2: Warrants issued for Indiana and Michigan "Hackers" File 3: More on Thrifty-Tel File 4: The CU in the News (Thackeray; Cellular Fraud; Privacy) +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Sat Jul 13 01:10:10 CDT 1991 (Vol #3.25) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Today's Contents: Moderators' Corner Spaf's Response to Bill Vajk Comments to Bill Vajk's posting in CuD #3.22 (T. Klotzbach) LOD Members for Comsec Computer Security (News Reprint) Alcor Email (ECPA) Case Settled (Keith Henson) NIST announces public-key digital signature standard (gnu) Secret Service Pays Hacker Call (Reprint from Newsbytes) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Thu Jul 18 17:22:30 CDT 1991 (Vol #3.26) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Contents, #3.26 (June 18, 1991) File 1: Moderators' Corner File 2: The Vajk-Spaf-Leichter dialogue continues...... File 3: The TERMINUS of Len Rose File 4: "Computer Crime" paper by Brian Peretti available File 5: Doc Savage Sentenced (NEWSBYTES Reprint) File 6: CompuServe Responds to Policy and Operations Questions ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Sat July 27 19:39:41 CDT 1991 (Vol #3.27) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Contents, #3.27 (July 27, 1991) Subject: File 1-- Response to "The Terminus of Len Rose"(1) Subject: File 2-- Response to "The Terminus of Len Rose"(2) Subject: File 3-- Response to Neidorf's "Terminus of Len Rose"(3) Subject: File 4-- chinet review Subject: File 5-- Comsec Data Security Article Corrections Subject: File 6-- Crypto-conference statement Subject: File 7-- Reasonable laws on computer crime Subject: File 8-- re: Bill Vajk's latest comments Subject: File 9--Chaos Computer Club archives at titania.mathematik.uni-ulm.de Subject: File 10--Late reply to Dutch Crackers article (CUD3.19) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Thu Aug 1, 1991 (Vol #3.28) >> SPECIAL ISSUE: RESPONSE TO FORESTER ARTICLE << Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Contents, #3.28 (August 1, 1991) Subject: File 1--SPECIAL ISSUE: THE TOM FORESTER ARTICLE Subject: File 2--CuD Review of _Computer Ethics_ (Reprint) Subject: File 3--Re: Hackers - Clamp Down NOW! Subject: File 4--Reply to Tom Forester Article +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Thu Aug 9, 1991 (Vol #3.29) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.29 (AUGUST 9, 1991) Subject: File 1--Moderators' Corner Subject: File 2--Say Goodbye to FOIA? Subject: File 3--Hackers Challenged to Break In Subject: File 4--Reciprocity in Cyberspace, by Robert Jacobson Subject: File 5--text of chron-spacemail Subject: File 6--Reply to Gene Spafford Subject: File 7--Estimates on virus activity Subject: File 8--Research Analysis Subject: File 9--comp.patents, misc.legal.computing and misc.int-property ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri Aug 16, 1991 (Vol #3.30) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) #3.30 (AUGUST 16, 1991) File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford) File 2--Review of "Practical Unix Security" (Garfinkel & Spafford). File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint) File 4--Mystery Lurks In The Death of INSLAW Reporter ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri Aug 23, 1991 (Vol #3.31) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.31 (AUGUST 23, 1991) File 1--Moderators' Corner: Blurbs File 2--Request info on suggestions for a class File 3--New BBS for CuD back issues and other services File 4--Moderators' Corner: Blurbs File 5--BOARDWATCH Magazine File 6--NREN Boondoggle? File 7--Inslaw Death Investigation Continues (NEWSBYTES REPRINT) File 8--Memes, Gurus, and Viruses ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri Sept 8, 1991 (Vol #3.32) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) -> SPECIAL ISSUE: REVIEW OF _CYBERPUNK_ <- CONTENTS, #3.32 (September 8, 1991) File 1--CYBERPUNK Review File 2--Review of _CYBERPUNK_ File 3--_CYBERPUNK_ Review File 4--Newsweek review CYBERPUNK File 5--Review of _CYBERPUNK_ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri Sept 14, 1991 (Vol #3.33) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.33 ( September 14, 1991) File 1--Moderators' Corner File 2--Clarification of "Boycott" Comment File 3--How BellSouth Calculated $79,000 File 4--Houston Chronicle spacemail follow File 5--More on Casolaro (INSLAW) Suicide (Mary McGrory reprint) File 6--"Freaker's Bureau Incorporated" (FBI) File 7--Review of Site Security Handbook (by Dark Adept) File 8--Complain to Journalists File 9--Spaf's Response to Reviews of _Unix Security_ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Tue, Sept 25, 1991 (Vol #3.34) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.34 ( September 25, 1991) File 1--Moderators' Corner File 2--WANTED: TARGETS OF OPERATION SUN DEVIL File 3--BBS Services Fight NY "Download" Tax (Newsbytes Reprint) File 4--New York Tax Law and Commentary by Tony Mack File 5--Confusion Reigns on NY Download" Tax (Newsbytes Reprint) File 6--Confusion unfolds on NY "Download" Tax (Newsbytes Reprint) File 7--Clarification of NY BBS Law File 8--Summary of Significance of NY "BBS Download Tax" (reprint) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri, Oct 4, 1991 (Vol #3.35) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.35 ( October 4, 1991) Subject: File 1--Moderators' Corner Subject: File 2--Cyperpunk Author Responds to Mitnick Charges Subject: File 3--Computer Security Basics review Subject: File 4--Steam age cyberpunk Subject: File 5--Errata to "Practical Unix Security" Subject: File 6--Living with the Law -- A view from Finland Subject: File 7--Let's Get It Right. Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint) Subject: File 9--Announcement Subject: File 10--Cyberspace Conference in Montreal Subject: File 11--Conference Info and Press Releases +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.36 ( October 12, 1991) Subject: File 1-- Intro to Biblio and Resources Moderators' Corner Subject: File 2-- General CU-Related Bibliography Subject: File 3-- Dissertations and Theses Subject: File 4-- General On-Line and Print Resources Subject: File 5-- Misc. Books for Fun Reading +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer underground Digest Sat, Oct 19, 1991 Volume 3 : Issue 37 Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) **** SPECIAL ISSUE: "GERALDO AND THE MAD HACKERS'S KEY PARTY" **** CONTENTS, #3.37 ( October 19, 1991) File 1: Summary of Geraldo's _Now it can be Told_ File 2: Excerpts from "Mad Hacker's Key Party" File 3: Review_of_Now_It_Can_Be_Told_ File 4: Geraldo Rivera show on "Hacking" File 5: The_RISKS_of_Geraldo File 6: 2600 Magazine Exposes Security Holes (NEWSBYTE reprint) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer underground Digest Sun, Oct 27, 1991 Volume 3 : Issue 38 Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.38 ( October 27, 1991) File 1: Geraldo's _Now it can be Told_ Revisited File 2: Comment on the Geraldo Show File 3: A Guest's-eye view of the Geraldo Show File 4: Second Thoughts about the "Ingraham Massacre" File 5: Response to CuD #3.37's "Mad Hacker" Issue File 6: Release of Informatik #1 File 7: Second Annual XMASCON ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.39 ( November 3, 1991) File 1: Moderator's Corner--Brendan Kehoe's FTP information File 2: The Secret Service and Protection of Privacy File 3: Re: Response to Bill Vajk's FOIA Piece File 4: Letters from Prison: Installment #1 File 5: Diehard 2 And Hacking File 6: Re: CuD - Now It Can Be Told File 7: Is the Government creating malign hackers? +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.40 ( November 10, 1991) File 1: Rhetoric and CuD File 2: Re: Comments on J Thomas's Ingraham post in CuD #3.38 File 3: Response to Ingraham Criticisms File 4: Draft of BBS warnings to Law Enforcement Agents File 5: CU Bibliography Update File 6: Senate Bill 516 : Electronic Privacy in the Workplace File 7: Letter from Prison (part 2 of 2) File 8: "Password violations helped Hill hacker" ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.41 ( November 16, 1991) Bill Cook's opening statement in Neidorf/PHRACK trial ...and more! ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.42 ( November 30, 1991) File 1--Moderators' Corner File 2--CPSR FOIAs Secret Service File 3--Responses to CPSR (Reprinted from Telecom Digest) File 4--Why Covert Surveillance is Wrong ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.43 ( Dec 8, 1991) File 1--Moderators' Corner File 2--You can help build the National Public Network. Here's how. File 3--#3.41--Bill Cook's opening statement in the Neidorf trial File 4-- Two Juveniles arrested in BBS Extortion case File 5--Law Enforcement and Rights File 6--Townson's reply to Neidorf (in Cu Digest, #3.42) File 7--"High-Tech Watergate" (Inslaw reprint by E. Richardson) File 8--Software Piracy File 9--Hacker Convicted File 10--"Teens Tapped Computers of U.S. Military" File 11--Canada: Police Seize BBS, Software Piracy Charges Expected 11/25/91 File 12--Here's something you might find of interest File 13--24 Year Old Cracks NASA +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.44 ( Dec 17, 1991) File 1: Jyrkis Posting File 2: Re: Canada: Police Seize BBS, Software Piracy Charges Expected File 3: FBI vs Kiddie Porn File 4: "Getting what he Deserved?" (Reprint from Effector 2.02) File 5--A book worth adding to your CuD list ... File 6: E-mail privacy bibliography File 7: Second CFP Conference +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ** END CuD INDEX VOLUME 3 ** +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ End of Computer Underground Digest #4.03 ************************************