Computer underground Digest Tue Dec 31, 1996 Volume 8 : Issue 93 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.93 (Tue, Dec 31, 1996) File 1--Unamailer Attacks on Christmas Day File 2--Gray Areas hit by Mailbomb at Compuserve File 3--The xchaotic story (Re Xmas Mailbombings) (fwd) File 4--Kevin Mitnick placed in solitary File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Fri, 27 Dec 1996 23:04:35 -0500 (EST) From: ptownson@MASSIS.LCS.MIT.EDU(TELECOM Digest Editor) Subject: File 1--Unamailer Attacks on Christmas Day Date--Fri, 27 Dec 1996 05:59:05 PST From--Eric_Florack@xn.xerox.com (Florack,Eric) Subject---Unamailer Strikes on Christmas Some interesting notes about mail-site security in this news dispatch. An interesting read, but perhaps a warning, as well. Passed onto all of you without further comment: /E -=-=-=-=-=-=-=-=-=-=-==-= CyberWire Dispatch / Copyright (c)1996/ December 26, 1996 / Jacking in from the "Spam in the Stocking" Port: Unamailer Delivers Christmas Grief by Lewis Z. Koch Special to CyberWire Dispatch "johnny xchaotic," also known as the "Unamailer," is back, and twenty-one individuals -- many of whom are deeply involved in the Internet ---journalists, the heads of computer companies such as Mircrosoft, politicians, and religious figures -- received a "denial of service" Christmas present they wished they didn't have. johnny, and possible friends of johnny, effectively halted these individuals' ability to send and receive E-mail, a denial of service attack which may take days to restore. Among those hit were prominent journalists including magazine columnist Joel Snyder, because, in xchaotic's words,"your last article in 'Internet World' places all the blame of my actions on an innocent person." Also hit was the magazine's editor Michael Neubarth because of his failure to "apologize" for what were termed journalistic errors.'' Political figures, such as former Presidential candidate Pat Buchanan and U.S. Senate wannabe David Duke, also were targets. Religious figures such as Pat Robertson and Billy Graham were subject to e-mail bombings, as were members of the Church of Scientology and members of the KKK. Microsoft's Bill Gates, several people from the cable channel MTV also were among those apparently attacked. Others hit include Carolyn Meinel who operates a "Happy Hacker" mailing list, the Klu Klux Klan, MTV and the Nazi party. All told, 21 individuals were hit, some, like Gates for the second time. This is the second time in six months that the work of one or more individuals has exploited relatively simple vulnerabilities in Internet e-mail lists. The first attack, in August, targeted more than 40 individuals, including Bill Clinton and Newt Gingrich and brought a torrent of complaints from the people who found their names sent as subscribers to some 3,000 E- mail lists. By comparison to the Christmas attack, even that relatively modest attack sent enough e-mail to the targeted recipients that it effectively halted their computers' ability to process the messages. This attack is estimated to involve 10,139 listservs groups, 3 times greater than the one that took place in the summer, also at xchaotic's instigation. If each mailing list in this attack sent the targeted individuals just a modest 10 letters to the subscribers' computer those individuals would receive more than 100,000 messages. If each listing system sent 100 messages -- and many do -- then the total messages could tally 1,000,000. Once again, johnny xchaotic has offered an "open letter," given to this reporter before it was scheduled to be posted throughout the Internet, as a way to explain the reasons behind the attack. He also taunted the FBI, telling the agency not to "waste tax dollars trying to track me" because "there are a lot more dangerous people out there you should be concentrating on." (The complete letter will be released shortly to the Net by johnny.) The open letter, and the information outlining the e-mail blast, were give to this reporter as the "attack" was concluding. The attack began the evening of December 24 just before midnight and took four hours, eight minutes and twenty-nine seconds. "They [listserv-based mailing lists] could stop this kind of attack tomorrow," one source close to johnny said, "if they only took the simplest of precautions --like authentication." Authentication is a means by which the listing system, instead of agreeing to the ''subscription'' and then automatically forwarding tens or hundreds of letters to the subscriber, would first ask if the person really wanted to subscribe. This ''verification'' could come as an electronic mail message to the subscriber asking for confirmation. If this process had been in place, someone subject to an E-mail denial of service attack would only receive one letter from each list-- that one being the authentication confirmation query -- do you really want this E-mail -- before sending on 10 or 100 messages. "They're either too lazy or too dumb to do that -- so they have to pay a price," this source said, indicating that the attacks would continue until the administrators "get it right," indicating that johnny and his friends want to pressure administrators into authentication. In these kinds of instances, individuals who have been hit wind up quickly canceling their e-mail accounts, thus passing the responsibility for canceling the "subscription" back to the list administrator. Many suspect the authentication-confirmation process is viewed by listserv systems administrators as an inconvenience and confusing to the subscriber and so, they just avoid it. The attack, however, may be a violation of federal law, punishable by up to five years in prison, or $250,000.00 in fines or both. While there are techniques for tracing this kind of attack when there is advance warning, knowledgeable sources say that this kind of attack is very difficult to trace once the attack has occurred. johnny xchaotic has been labeled a 'Net terrorist,' which, according to some, debases the meaning of the word "terrorism." No one knows who johnny is. He was misidentified earlier by Internet Underground magazine as a well known hacker who calls himself "se7en." This identification proved false. One person close to "johnny xchaotic" said the FBI and Secret Service had been contacted about the illegality of this kind of hack but said they had no interest in this kind of "Net" attack. "We have bigger fish to fry," was the response from law enforcement officials, according to this person. This attitude was confirmed by a former federal prosecutor who said the few federal investigators who understood computers and the Internet were stretched thin in their attempts to apprehend serious cyber-criminals, or to pursue high profile but relatively unimportant cases against hackers such as Kevin Mitnick. There has been a tendency on the part of law enforcement and the media to grossly overestimate the monetary damage caused by hackers. "johnny" and those close to him made it clear that there would be a continuation of these kinds of email "denial of service" attacks. These same sources say those few Federal investigators with the Secret Service and the FBI who are computer literate and savvy about hacking are stretched thin in attempts to solve serious multimillion dollar computer crimes, the vast majority of which are committed by insiders against the companies they work for. It is far easier, these sources say, to track down, arrest and jail 16-year-old hackers who brag about their exploits to friends and fellow hackers than to track down a true professional computer cracker on assignment from one company to search and steal the files of a competitor company. While it may take up to three years to investigate and prosecute one important computer thievery case, teenage hackers can be arrested every few months, thus improving the "stats" by which the FBI and other agencies make their mark and their budgets. This repeated E-mail denial of service attack will be sure to reignite the debate about the "moral" issues surrounding hackers and hacking. What may be ignored -- again --is the failure to rectify the problem after the first attack back in August. Immediately following the first E-mail bombing attack, the Computer Emergency Response Team (CERT) was quick to tell the media that while they had no "solution," they had "hopes" they would be able to "limit the impact" of these kinds of attacks. Today's three-fold attack showed that a six month period of study "hoping to limit the impact" has been futile. Vital communications do not appear to have been slowed down. The attack is a major "inconvenience" to be sure. Others argue that "complacency" is the only true victim of this attack. The temporary inconvenience caused by a few days loss of E-mail privileges might seem to pale in significance with those who were killed and maimed by the terrorists' bombing of the Federal Building, in Oklahoma City, or at the World Trade Center in New York, or in Atlanta at the 96 Olympics, or those who opened packages from the Unibomber and were killed. Prominent government officials like U.S. Deputy Attorney General Jamie Gorelick have called for the development of the equivalent of a "Manhattan project" to stop hackers, though the specifics of what kind of "bomb" Gorelick would develop and on whom she would drop "the bomb" are vague. Unsafe at Any Modem Speed On December 16, a computer attack against WebCom knocked out more than 3,000 Web sites for 40 hours, curtailing Website shopping. The attack --a "SYN-flood" -- sent as many as 200 messages a second against the WebCom host computer. This was the same kind of attack that brought down the popular New York Internet provider Panix for more than a week in September. While Seattle computer security consultant Joel McNamara is sympathetic toward WebCom's users problems, he allows less leeway to the company. "The SYN-flood denial of service attack has been known for months, and there are a variety of solutions for addressing it," McNamara said, "I'd be curious as to what, if any, security measures WebCom, a large provider, had in place to deal with a well-known SYN-flood attack. If I couldn't conduct business for 40 hours, I'd have some serious questions to ask." McNamara believes a great deal of the responsibility for the success of these kinds of known attacks rests on the shoulders of managers and systems administrators who do not fully "understand the implications of poor security practices. While the industry hasn't seen this happen yet, it's just a matter of time before a customer files a lawsuit against a service provider because of damages caused by ineffective security," he predicts. FBI agents have been undergoing some education in computer related crimes, but sources say the educated ones are few in number and burdened by too many cases. On the other hand, the FBI has singled out small but prominent hackers for arrest and prosecution, hoping the jailing of these individuals who are well-known to the Net would be a deterrent to other younger people considering hacking. The recent adolescent-like hacking of the Department of Justice Web site seems to indicate that hackers aren't all that deterred. There are other indications that Web page hacks are going to become more political, and perhaps even more dangerous than in the past. The recent hack of the Kriegsman Furs company Web page by animal rights activists indicates one new, sophisticated path. In this attack, the hackers left a manifesto, as well as links to animals rights sites throughout the Web. How easy was it to do? "Security for the site was extremely weak," says McNamara, "The commonly known PHF exploit was likely used to retrieve a system file, which contained a series of easy to crack passwords." Presto, chango. Pro-fur into anti-fur. "It's too easy to pass the blame off on hackers," McNamara says. Like the keys in the car or in the front door, "maintaining an insecure site is just an invitation to problems." Those who were responsible for today's denial of service attack were careful to repeatedly point out to this reporter how "unsophisticated" their attack was and how easily it could have been avoided if the list managers had only taken minimal precautions. "It's kind of like buying new locks and getting an alarm system after everything in the house is stolen. Sure it will probably prevent it from happening again, but if you took the precautions in the first place, the damn thing wouldn't have occurred," he concludes. -------------------- Lew Koch can be reached at: lzkoch@mcs.net ------------------------------ Date: Tue, 31 Dec 1996 10:27:11 -0600 (CST) From: Gray Areas Subject: File 2--Gray Areas hit by Mailbomb at Compuserve ((MODERATORS' NOTE: Netta Gilboa, publisher of Gray Areas Magazine, reports Compuserve's response to her queries about the Christmas mailbombing)) gray areas got hit at out cserve acct over xmas. cserve has chosen to deny this has ever happened there before even though i know of at least 4 users there (including ross perot and rush limbaugh who were definitely hit in the past). cserve has refused to check the sendmail headers, to fix the problem, to credit us for the time spent unsubscribing (cserve charges by the minute to be online writing or reading mail), etc. we don't even know the full extent of the newsgroups we got subscribed to because cserve only stores 102 pieces of mail at a time :) we feel cserve was grossly negligent by not having anyone with access to the mail servers available on xmas (traditionally one of the biggest hacking days of the year) and by having the entire corporate billing dept. and corporate headquarters closed on xmas. by contrast, smaller isp's like mindspring notified all of their users that their full staff would be working on xmas because of possible problems like this one. we wish to publicize compuserve's abysmal response, the fact that they lied knowing i was tape recording the calls regarding previous incidents, and we are curious as to whether anyone else got hit at the same time as generally that is the case with reporters... we may be contacted at grayarea@gti.gti.net or grayarea@well.com for however long those addresses hold out ;) ------------------------------ Date: Sun, 29 Dec 1996 14:10:14 -0800 (PST) From: Declan McCullagh Subject: File 3--The xchaotic story (Re Xmas Mailbombings) (fwd) ((MODERATORS' NOTE: From the fight-censorship discussion group, one of the best on the net, comes the following forwarded commentary, allegedly written by the Xmas mailbomber)) ================= [A followup to the Christmas Day email bombings. --Declan] ---------- Forwarded message ---------- today's act of "cyber-terrorism" is brought to you by the letters 'A', 'D', and the number '1'. and the person who brought it to you? you know who you are.

before i continue, lets have a quick look at a few interesting comments from past articles as well as some notable quotes from various fans.

"What's striking to me is how cowardly they are; anonymous, I mean, if you have something to say, say it."

- John Markoff

[signing a letter isn't quite anonymous John.]

"We're on Defcon 4 alert here, We expect an attack, possibly over the weekend. We said a lot of things in our special report the unamailer will not like. We called him names."

- Stephen Baldwin

[if i don't stop, will you call me more names? trying to insult me through name calling is quite childish of you. amusing, but childish.]

"Clearly the guy's a nutcase, This guy should get a life instead of running around annoying people.",p> - Helena Kobrin

[well, it looks like you and I have something in common. difference? you run around harassing people for a living.]

"I hope they hang this guy by some vital personal part, I don't know what he's trying to prove. He seems to be a smart guy with too much time on his hands."

- John Markoff

[thanks for the compliment, i think.]

"I hope they fry the little fuck. Can I say 'fuck?'"

- Michelle Slatalla

[cry for me you insipid bitch.]

from the Netly News: He also calls himself, "Final Result." Desperate

for publicity from the same people he ridicules, FR posted a manifesto of sorts to....

[can we not read the last paragraph of the first letter i posted? that was a random hacked account. we had nothing to do with the name on it.]

from every source: "johnny xchaotic"

[brackets indicate a group affiliation, not a last name.]

from josh at Netly: We wrestled long and hard over the journalistic ethics of printing your "Manifesto." In the end, we decided we had to do it, if only to get more hits. Surely a man with your keen instincts for the media spotlight can understand that, eh, SpamBoy?

Give it up, Unamailer. Come in from the cold. We're waiting for your call.

[i would guess this qualifies as the "names" Stephen talked about. if so, that was really pathetic.]

and finally, after soliciting my article for Netly, Noah decides to let Philip Elmer-Dewitt take a few cheap shots at my article, without giving me a chance to reply. if memory serves, he apologized on the phone for that, but either way it was a cheap move. so, my reply to PED:

>going to need quite a bit of work. I find the "writing >style," as the author calls it, generally flabby and

come on PED, you should at least be able to admit that it is a little different than the lock and stock method you and the others use. let me tell you what kind of excitement YOUR writing brings out.

>undisciplined. Why "certain well known public figures"? >If they're public figures, they're well known by

duh. how much do you know about the head of the NSA? he is a textbook definition of 'public figure', yet you probably don't even know his name.

>definition, no? If he mailbombed the President, why not >say so? Also, note the overuse of the first person if you stole a car, would you tell the whole world? no.

>singular. Why all these "i"s? We are not e.e. cummings.

i speak for more than myself.

>me. More important: I remain unconvinced by his central >argument. How can this possibly be the "first time in >history" that the average joe has the technical means to >take revenge? Has the author never heard of >saboteurs? The Luddites? Political assassins? Peasants ?have legitimate grievances; how far can a people's

gee. are you trying to provoke me with this unfounded stupidity? remember, we talked on the phone. i know you are not as inept as you sound right now. since when have the luddites been grouped as a 'technical revenge'? yes, that does sound stupid now that you think about it, huh? how many assassins have hit their mark AND gotten away to tell about it? a very low percentage. saboteurs is your best argument, but coupled with the rest is pathetic. look at the above again and think about it. the 'average joe' has the means to enact revenge, without getting caught, and doing equal or greater damaage. it just hasn't been that way until now.

>revolt against a bad ISP? Finally, can we do something

incomplete sentence PED. and you insult MY writing?

>about the byline? Johnny [xchaotic] seems so early >eighties. Hasn't this guy read anything since Neuromancer?

if you recall, i was correcting your outdated terms in your magazine. once again, another cheezy attempt to provoke me or something. i can say one thing about the early eighties comment though.. at least i was on the net then. how about you?

>On second thought, maybe we should just tell him his >story was spaced out by breaking news and thank him for >thinking of us.

how unappreciative. i called you on my dime, and called back when you asked. i did the same for Steve at IU, Noah at the Netly News, as well as other journalists. i even wrote the article requested of me regarding all this. instead of insulting your computer literacy, i chose to shed some light on a popular subject and show another viewpoint. i'm afraid that is something that has long since escaped you and other journalists.

so, that leaves me with today's letter (not manifesto). i would like to first give thanks to a few journalist types (believe it or not).

Steve Knopper. Steve has shown more than his share of proffesional courtesy in the past. he also has shown that he is more than fair when writing articles by getting both sides of the story as well as remaining objective.

Noah Robischon. despite a few minor annoyances, you too have extended some professional courtesy after a few poorly worded articles at the beginning. if you could put a leash on josh, i think you would be more successful.

Lewis Koch. thank you for going out of your way to get both sides of the story.

the state of the net hasn't improved of course. however, i can say the quality of journalism has gone up one small step since my last letter to the internet community. i have noticed more articles being written that are technically accurate, quote better sources, or withold the typical bias found in most articles.

that alone tells me something is going right. wether or not i had something to do with it doesn't really matter. as long as better journalism continues, the more i lay off. of course, there are plenty of other people who deserve some special attention so my jihad continues.

in the mean time, let me give thanks and/or greets to the following people.

P0E: hey babe! this act of terrorism is for you! keep up the great music, and feel free to write a song about me. :)

FBI: don't waste my tax dollars trying to track me. there are a lot more dangerous people out there you should be concentrating on.

on a separate tangent..

seems that since the late 50s, the government has been doing its best to keep young citizens from exploring their full potential. rather than look at what they do and use it as a template for fixing problems, they would rather put all of their energy into jailing those that explore. it started with "beatniks", moved to "radicals", and has landed on "hackers"

. people like me point out problems in the system. wether it is the social system or computer system, it ends up with the same result. instead of responsible parties fixing the problem, they are much too intent upon trying to place blame on the people that found the problem. don't make excuses, fix the problem.

one last thing before we move on. so many articles today say something along the lines of "the average person is vulnerable to these evil terrorists". wrong isn't quite the word for it. yes, everyone can be a victim, but why? don't even presume you are important enough to occupy my time or anyone elses for that matter. as usual, there are always bigger and better fish to fry out there, why stop on the first step of the ladder?

on to the bombs...

76042.3624@compuserve.com Netta Gilboa what does it take to make you realize you are not part of the scene, and that we don't want you in it? all you do is cry about the injustices committed against you, but you won't take the hint and go away.

askbill@microsoft.com bill gates

you still suck.

bb748@FreeNet.Carleton.CA neo-nazi recruiter

misfitx@gnn.com

micetrap@cyberenet.net

the net is not a place to recruit more neo-nazi chimps.

cmeinel@swcp.com carolyn meinel

your happy hacker mail list is demented. you are trying to get those people busted, aren't you? you give them enough rope for them to hang themselves with, and then try to preach about not using the information. give up.

crunch@well.com john draper

shouldn't have tried to narc me to the feds. and you definitely shouldn't have bragged about doing so.

feedback@mtv.com mtv

loveline3@aol.com

minutes120@aol.com

mtvnews@aol.com

yomail96@aol.com

you still censor your videos. when will you realize the hypocrisy of your actions? you talk about freedom of speech, but don't practice it.

grossa@sdsc.edu helped track mitnick

mis@seiden.com

each of you helped track down kevin mitnick. in the process, you helped another felon gain public acceptance creating a double standard. you should have been going after the real crook: tsutomu

hud@netcom.com Co$ Supporter or Member

jaarobin@aol.com

koreenb@jovanet.com

vjohnson@psyber.com

the cult of scientology needs to be shut down. it is a criminal organization and should be treated as such.

jms@opus1.com joel snyder

your last article in 'internet world' places all the blame of my actions on an innocent person. needless to say, you were wrong. quality journalism is what you should strive for.

neubart@iw.com editor of joel's article

unremorseful bastard. you put someone else through a lot of shit over my actions, and didn't have the balls to apologize for it?

kkk@members.iglou.com kkk

have a warm feeling knowing a nice white boy did this to you.

root@duke.org david duke

politics are fucked up already. no need to drag even more fucked up individuals into the fray.

toddpeak@usa.net todd stauffer

don't write about the internet until you actually know what it is. you are way too sheltered to make such naive statements about the net.

root@cbn.org pat robertson

abradshaw@graham-assn.org billy graham

"doing my part to piss off the religious right"

root@buchanan.org pat buchanan

what part of "seperation between church and state" is so hard to understand? changing the names of the days is just about the most fanatical thing i have heard in my life.

once again, the internet can not be controlled by a single body. the religious fanatics fall into that category. as long as you try to control the net, people will slip through your fingers. the tighter your control, the more that slip through. i am one of many..

angry johnny

------------------------------ Date: Sat, 28 Dec 1996 18:14:57 -0800 From: Rich Burroughs Subject: File 4--Kevin Mitnick placed in solitary Source - fight-censorship@vorlon.mit.edu More on Kevin Mitnick. http://cause-for-alarm.com/flash/mitnick.html >>>>>>>>> [updated Saturday, 28-Dec-96 17:48:32 PST] Kevin Mitnick was placed in solitary confinement yesterday for possessing reading materials related to hacking. Mitnick, whose hacking exploits and capture generated a media frenzy, is currently being held in the Metropolitan Detention Center in Los Angeles. This is not the first time he has been placed in solitary there. I first learned of Mitnick's move to solitary through the following email, sent by Fernanda Serpa: "URGENT!!! KEVIN MITNICK WAS PLACED UNDER SOLITARY CONFINEMENT TODAY, DECEMBER 27 TH, AT 1.00 PM, ON THE GROUNDS OF BEING A SECURITY RISK, DUE TO HIS READING LEGAL BOOKED IN THE LIBRARY. IT IS OBVIOUS THAT HE WAS EXERCISING HIS RIGHTS. WE ARE AFRAID THAT THE SANE THING THAT HAPPENED IN NORTH CAROLINA IS HAPPENING AGAIN WHEN KEVIN WAS PLACED IN SOLITARY CONFINEMENT FOR 7 DAYS AND HAD TO WAYVE HIS LEGAL RIGHTS IN ORDER TO BE RELEASED. WE KNOW THAT THE ONLY WAY FBI IS ABLE TO PRESSURE KEVIN IS TROUGH SOLITARY CONFINEMENT. PLEASE, DO SOMETHING AND INFORM THE PRESS URGENTLY ABOUT THIS SITUATION. WE ARE DOING OUR BEST HERE. FERNANDA SERPA SUPPORT KEVIN CAMPAIGN" Serpa, who maintains a web site supporting Mitnick, further wrote me that "We do not have details about yesterday's events concerning Kevin Mitnick..... His cell was searched, and his personal belongings were seized. MDC does not release any information whatsoever.... Due to the case backgrounds, we are concerned about Kevin's life and physical integrity." Since receiving Serpa's email, I have confirmed the story with a source who is knowledgeable about the details of Mitnick's incarceration. According to my source, Mitnick's additional punishment came after a search of his cell revealed written materials related to hacking, including back issues of 2600 magazine. The magazines were allegedly sent to Mitnick by Emmanuel Goldstein, editor of 2600. Prisoners are able to receive written materials if they are sent directly from the publisher, and those materials are routinely searched. The reason the authorities gave for Mitnick's isolation? He's a "security risk." This latest twist in Mitnick's case begs several questions: Why is Mitnick being punished for possessing materials that he received through legitimate prison channels? How can he possibly be a "security risk" when he has no access to computers, and can't even use a phone for anything but collect, operator-assisted calls? Why place a prisoner in solitary confinement for their choice of reading materials? And how much did Markoff and Shimomura really make off of Mitnick's bust? Ironically, several recent issues of 2600 covered the imprisonment of Ed Cummings (aka Bernie S), a 2600 writer who was convicted of possessing a red box and software capable of cloning cell phones. Cummings, who was subjected to inhumane prison conditions, was attacked by another inmate after being transferred to a maximum security facility for "protective custody." He received a fractured jaw and arm in the incident, and was released soon after due to a grassroots protest campaign. Cummings served about a year and a half in jail. Maybe Mitnick was reading 2600 to catch up on Cummings' case, or maybe he was reading about how to do a SYN flood, who knows? Either way, he wasn't going to be able to do much with the information while behind bars. I'll try to pass on more news about Mitnick's situation, as it becomes available. Check back here for updates. >>>>>>>> Serpa's site is at: http://www.netmarket.com.br/mitnick Kevin's defense fund is at: http://www.kevinmitnick.com/ Rich -- Rich Burroughs, rich@cause-for-alarm.com Editor and Publisher, cause for alarm A web zine about electronic freedoms http://cause-for-alarm.com/ ------------------------------ Date: Thu, 15 Dec 1996 22:51:01 CST From: CuD Moderators Subject: File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.93 ************************************