Computer underground Digest Fri, Jan 24, 1992 Volume 4 : Issue 03 Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #4.03 ( Jan 24, 1992) Subject: File 1--INDEX TO CuD, VOLUME 3 Issues of CuD can be found in the Usenet alt.society.cu-digest news group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132), chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail with the subject "help" (without the quotes) to archive-server@chsun1.spc.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Thu, 23 Jan 92 18:32:10 From: Moderators Subject: File 1--INDEX TO CuD, VOLUME 3 Volume 3, Issue #3.00 (January 6, 1991) CuD #3.00: File 1 of 6: Moderator's corner CuD #3.00: File 2 of 6: From the Mailbag CuD #3.00: File 3 of 6: Gender-Neutral Language CuD #3.00: File 4 of 6: Sexism and the CU CuD #3.00: File 5 of 6: Security on the Net CuD #3.00: File 6 of 6: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.01 (January 12, 1991) SPECIAL ISSUE: RESPONSES TO CU/SEXISM ARTICLES ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.02 (January 16, 1991) SPECIAL ISSUE: SECRET SERVICE STING BOARD AND INFORMANT ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.03 (January 22, 1991) CuD #3.03: File 1 of 4: Moderator's corner CuD #3.03: File 2 of 4: From the Mailbag CuD #3.03: File 3 of 4: CU-Related Bibliography CuD #3.03: File 4 of 4: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.04 (January 28, 1991) CuD #3.04, File 1 of 4: Moderator's corner CuD #3.04, File 2 of 4: From the Mailbag CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986 CuD #3.04, File 4 of 4: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.05 (February 9, 1991) CuD #3.05, File 1 of 8: Moderator's corner CuD #3.05: File 2 of 8: From the Mailbag CuD #3.05: File 3 of 8: Arrest of Phiber Optik CuD #3.05: File 4 of 8: The Dictator--My Thoughts CuD #3.05: File 5 of 8: Chaos Computer Conference (Reprint) CuD #3.05: File 6 of 8: The Feds hit Ham Packet BBS Ops. CuD #3.05: File 7 of 8: Review--Exporting the First Amndmnt CuD #3.05: File 8 of 8: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.06 (February 23, 1991) CuD #3.06, File 1 of 6: Moderator's corner CuD #3.06: File 2 of 6: From the Mailbag CuD #3.06: File 3 of 6: CuD Archive Server CuD #3.06: File 4 of 6: No Felony Charges against Phiber O. CuD #3.06: File 5 of 6: The FBI Comes Rapping..... CuD #3.06: File 6 of 6: Some Thoughts on Gov't Actions ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.07 (March 2, 1991) CuD #3.07, File 1 of 6: Moderator's corner CuD #3.07: File 2 of 6: From the Mailbag CuD #3.07: File 3 of 6: CuD Index for Volume Two CuD #3.07: File 4 of 6: EFF Job Announcement CuD #3.07: File 5 of 6: Computers in the Movies CuD #3.07: File 6 of 6: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.08 (March 12, 1991) CuD #3.08, File 1 of 6: Moderator's corner CuD #3.08: File 2 of 6: From the Mailbag CuD #3.08: File 3 of 6: "Hollywood Hacker" Info Wanted CuD #3.08: File 4 of 6: What the EFF's Been Doing CuD #3.08: File 5 of 6: Book Review: Computer Ethics CuD #3.08: File 6 of 6: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.09 (March 19, 1991) CuD #3.09, File 1 of 2: Hollywood Hacker or Media Hype? CuD #3.09: File 2 of 2: Computers & First Amendment ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.10 (March 28, 1991) CuD #3.10--File 1 of 5: From the Mailbag CuD #3.10--File 2 of 5: The Hollywood Hacker, Part II CuD #3.10--File 3 of 5: AP Story on Len Rose CuD #3.10--File 4 of 5: Washington Post Story on Len Rose CuD #3.10--File 5 of 5: Len Rose and the Washington Post ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.11 (April 4, 1991) CuD #3.11: File 1 of 5: Moderators' Corner CuD #3.11: File 2 of 5: From the Mailbag CuD #3.11: File 3 of 5: Sundevil Arrest Announced CuD #3.11: File 4 of 5: Chicago Press Release on Len Rose CuD #3.11: File 5 of 5: Letter to AT&T Cancelling Service ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.12 (April 15, 1991) CuD #3.12: File 1 of 4: From the Moderators CuD #3.12: File 2 of 4: From the Mailbag CuD #3.12: File 3 of 4: Responses to Business Week Article CuD #3.12: File 4 of 4: Using the CuD mailserver ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.13 (April 21, 1991) CuD #3.13: File 1 of 4: From the Mailbag CuD #3.13: File 2 of 4: Response to Len Rose Article (1) CuD #3.13: File 3 of 4: Response to Len Rose Article (2) CuD #3.13: File 4 of 4: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.14 (April 26, 1991) CuD #3.14: File 1 of 6: Moderators Corner CuD #3.14: File 2 of 6: Comments on Len Rose Articles CuD #3.14: File 3 of 6: Moving toward Common Ground? CuD #3.14: File 4 of 6: CERT Advisory CuD #3.14: File 5 of 6: Fox and the Hollywood Hacker CuD #3.14: File 6 of 6: MONDO -- Great new 'Zine! ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.15 (May 2, 1991) CuD #3.15: File 1 of 3: Moderators Corner CuD #3.15: File 2 of 3: The CU in the News CuD #3.15: File 3 of 3: EFF/SJG SUE COOK, FOLEY ET. AL. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.16 (May 9, 1991) CuD #3.16: File 1 of 6: Moderators Corner CuD #3.16: File 2 of 6: Is Prodigy Snooping? CuD #3.16: File 3 of 6: Prodigy under Fire CuD #3.16: File 4 of 6: Assorted Comments on Prodigy CuD #3.16: File 5 of 6: Prodigy's response to Stage.dat File CuD #3.16: File 6 of 6: A Few Observations on Prodigy ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.17 (May 17, 1991) CuD #3.17: File 1 of 5: Moderators Corner CuD #3.17: File 2 of 5: Media Comment on Riggs Sentencing CuD #3.17: File 3 of 5: Exhibits from Riggs' Sentencing CuD #3.17: File 4 of 5: Exhibit A from Memorandum CuD #3.17: File 5 of 5: EXHIBIT E from Memorandum ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.18 (May 28, 1991) SPECIAL ISSUE: GENIE ON-LINE CONFERENCE: FREE SPEECH AND PRIVACY ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.19 (June 4, 1991) CONTENTS THIS ISSUE: File 1: Moderator's Corner File 2: From the Mailbag File 3: Thrifty-Tel--Victim or Victimizer? File 4: The CU in the News +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.20 (June 10, 1991) CONTENTS THIS ISSUE: File 1: Moderator's Corner File 2: From the Mailbag File 3: Bay Area Archive Site File 4: Top Ten Fallacies about SJG Raid File 5: Hacking and Hackers: The Rise, Stagnation, and Renaissance File 6: EFFector Online 1.07: S.266 Loses First Round File 7: How to get WATCH.EXE +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.21 (June 17, 1991) CONTENTS THIS ISSUE: File 1: Moderator's Corner File 2: From the Mailbag File 3: Review of Gary Marx's UNDERCOVER File 4: Review of PROTECTORS OF PRIVILEGE File 5: Review of THE INFORMATION WEB File 6: Hollywood Hacker Sentenced File 7: Len Rose Sentenced (Reprint from Newsbytes) +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.22 (June 21, 1991) CONTENTS THIS ISSUE: File 1: Moderators' Corner File 2: From the Mailbag File 3: Punishment and Control: Reply to Gene Spafford +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.24 (July 3, 1991) CONTENTS THIS ISSUE: File 1: From the Mailbag (Response to "Cyberpunk" definition) File 2: Bill Vajk, Len Rose, Gene Spafford File 3: Comsec Security Press Release File 4: Comments on ComSec Data Security File 5: Police Confiscations and Police Profit File 6: House Crime Bill (1400) and its Threat to Modemers File 7: Law Panel Recommends Computer Search Procedures File 8: The CU in the News (data erasing; cellular fraud) +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 3, Issue #3.23 (June 27, 1991) CONTENTS THIS ISSUE: File 1: From the Mailbag (Response to Dalton; Hacker Definitions) File 2: Warrants issued for Indiana and Michigan "Hackers" File 3: More on Thrifty-Tel File 4: The CU in the News (Thackeray; Cellular Fraud; Privacy) +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Sat Jul 13 01:10:10 CDT 1991 (Vol #3.25) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Today's Contents: Moderators' Corner Spaf's Response to Bill Vajk Comments to Bill Vajk's posting in CuD #3.22 (T. Klotzbach) LOD Members for Comsec Computer Security (News Reprint) Alcor Email (ECPA) Case Settled (Keith Henson) NIST announces public-key digital signature standard (gnu) Secret Service Pays Hacker Call (Reprint from Newsbytes) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Thu Jul 18 17:22:30 CDT 1991 (Vol #3.26) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Contents, #3.26 (June 18, 1991) File 1: Moderators' Corner File 2: The Vajk-Spaf-Leichter dialogue continues...... File 3: The TERMINUS of Len Rose File 4: "Computer Crime" paper by Brian Peretti available File 5: Doc Savage Sentenced (NEWSBYTES Reprint) File 6: CompuServe Responds to Policy and Operations Questions ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Sat July 27 19:39:41 CDT 1991 (Vol #3.27) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Contents, #3.27 (July 27, 1991) Subject: File 1-- Response to "The Terminus of Len Rose"(1) Subject: File 2-- Response to "The Terminus of Len Rose"(2) Subject: File 3-- Response to Neidorf's "Terminus of Len Rose"(3) Subject: File 4-- chinet review Subject: File 5-- Comsec Data Security Article Corrections Subject: File 6-- Crypto-conference statement Subject: File 7-- Reasonable laws on computer crime Subject: File 8-- re: Bill Vajk's latest comments Subject: File 9--Chaos Computer Club archives at titania.mathematik.uni-ulm.de Subject: File 10--Late reply to Dutch Crackers article (CUD3.19) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Thu Aug 1, 1991 (Vol #3.28) >> SPECIAL ISSUE: RESPONSE TO FORESTER ARTICLE << Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Contents, #3.28 (August 1, 1991) Subject: File 1--SPECIAL ISSUE: THE TOM FORESTER ARTICLE Subject: File 2--CuD Review of _Computer Ethics_ (Reprint) Subject: File 3--Re: Hackers - Clamp Down NOW! Subject: File 4--Reply to Tom Forester Article +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Thu Aug 9, 1991 (Vol #3.29) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.29 (AUGUST 9, 1991) Subject: File 1--Moderators' Corner Subject: File 2--Say Goodbye to FOIA? Subject: File 3--Hackers Challenged to Break In Subject: File 4--Reciprocity in Cyberspace, by Robert Jacobson Subject: File 5--text of chron-spacemail Subject: File 6--Reply to Gene Spafford Subject: File 7--Estimates on virus activity Subject: File 8--Research Analysis Subject: File 9--comp.patents, misc.legal.computing and misc.int-property ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri Aug 16, 1991 (Vol #3.30) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) #3.30 (AUGUST 16, 1991) File 1--Review: PRACTICAL UNIX SECURITY (Garfinkel and Spafford) File 2--Review of "Practical Unix Security" (Garfinkel & Spafford). File 3--Cyberspace and the Legal Matrix: Laws or Confusion? (Reprint) File 4--Mystery Lurks In The Death of INSLAW Reporter ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri Aug 23, 1991 (Vol #3.31) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.31 (AUGUST 23, 1991) File 1--Moderators' Corner: Blurbs File 2--Request info on suggestions for a class File 3--New BBS for CuD back issues and other services File 4--Moderators' Corner: Blurbs File 5--BOARDWATCH Magazine File 6--NREN Boondoggle? File 7--Inslaw Death Investigation Continues (NEWSBYTES REPRINT) File 8--Memes, Gurus, and Viruses ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri Sept 8, 1991 (Vol #3.32) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) -> SPECIAL ISSUE: REVIEW OF _CYBERPUNK_ <- CONTENTS, #3.32 (September 8, 1991) File 1--CYBERPUNK Review File 2--Review of _CYBERPUNK_ File 3--_CYBERPUNK_ Review File 4--Newsweek review CYBERPUNK File 5--Review of _CYBERPUNK_ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri Sept 14, 1991 (Vol #3.33) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.33 ( September 14, 1991) File 1--Moderators' Corner File 2--Clarification of "Boycott" Comment File 3--How BellSouth Calculated $79,000 File 4--Houston Chronicle spacemail follow File 5--More on Casolaro (INSLAW) Suicide (Mary McGrory reprint) File 6--"Freaker's Bureau Incorporated" (FBI) File 7--Review of Site Security Handbook (by Dark Adept) File 8--Complain to Journalists File 9--Spaf's Response to Reviews of _Unix Security_ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Tue, Sept 25, 1991 (Vol #3.34) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.34 ( September 25, 1991) File 1--Moderators' Corner File 2--WANTED: TARGETS OF OPERATION SUN DEVIL File 3--BBS Services Fight NY "Download" Tax (Newsbytes Reprint) File 4--New York Tax Law and Commentary by Tony Mack File 5--Confusion Reigns on NY Download" Tax (Newsbytes Reprint) File 6--Confusion unfolds on NY "Download" Tax (Newsbytes Reprint) File 7--Clarification of NY BBS Law File 8--Summary of Significance of NY "BBS Download Tax" (reprint) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Fri, Oct 4, 1991 (Vol #3.35) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.35 ( October 4, 1991) Subject: File 1--Moderators' Corner Subject: File 2--Cyperpunk Author Responds to Mitnick Charges Subject: File 3--Computer Security Basics review Subject: File 4--Steam age cyberpunk Subject: File 5--Errata to "Practical Unix Security" Subject: File 6--Living with the Law -- A view from Finland Subject: File 7--Let's Get It Right. Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint) Subject: File 9--Announcement Subject: File 10--Cyberspace Conference in Montreal Subject: File 11--Conference Info and Press Releases +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.36 ( October 12, 1991) Subject: File 1-- Intro to Biblio and Resources Moderators' Corner Subject: File 2-- General CU-Related Bibliography Subject: File 3-- Dissertations and Theses Subject: File 4-- General On-Line and Print Resources Subject: File 5-- Misc. Books for Fun Reading +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer underground Digest Sat, Oct 19, 1991 Volume 3 : Issue 37 Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) **** SPECIAL ISSUE: "GERALDO AND THE MAD HACKERS'S KEY PARTY" **** CONTENTS, #3.37 ( October 19, 1991) File 1: Summary of Geraldo's _Now it can be Told_ File 2: Excerpts from "Mad Hacker's Key Party" File 3: Review_of_Now_It_Can_Be_Told_ File 4: Geraldo Rivera show on "Hacking" File 5: The_RISKS_of_Geraldo File 6: 2600 Magazine Exposes Security Holes (NEWSBYTE reprint) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Computer underground Digest Sun, Oct 27, 1991 Volume 3 : Issue 38 Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.38 ( October 27, 1991) File 1: Geraldo's _Now it can be Told_ Revisited File 2: Comment on the Geraldo Show File 3: A Guest's-eye view of the Geraldo Show File 4: Second Thoughts about the "Ingraham Massacre" File 5: Response to CuD #3.37's "Mad Hacker" Issue File 6: Release of Informatik #1 File 7: Second Annual XMASCON ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.39 ( November 3, 1991) File 1: Moderator's Corner--Brendan Kehoe's FTP information File 2: The Secret Service and Protection of Privacy File 3: Re: Response to Bill Vajk's FOIA Piece File 4: Letters from Prison: Installment #1 File 5: Diehard 2 And Hacking File 6: Re: CuD - Now It Can Be Told File 7: Is the Government creating malign hackers? +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.40 ( November 10, 1991) File 1: Rhetoric and CuD File 2: Re: Comments on J Thomas's Ingraham post in CuD #3.38 File 3: Response to Ingraham Criticisms File 4: Draft of BBS warnings to Law Enforcement Agents File 5: CU Bibliography Update File 6: Senate Bill 516 : Electronic Privacy in the Workplace File 7: Letter from Prison (part 2 of 2) File 8: "Password violations helped Hill hacker" ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.41 ( November 16, 1991) Bill Cook's opening statement in Neidorf/PHRACK trial ...and more! ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.42 ( November 30, 1991) File 1--Moderators' Corner File 2--CPSR FOIAs Secret Service File 3--Responses to CPSR (Reprinted from Telecom Digest) File 4--Why Covert Surveillance is Wrong ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.43 ( Dec 8, 1991) File 1--Moderators' Corner File 2--You can help build the National Public Network. Here's how. File 3--#3.41--Bill Cook's opening statement in the Neidorf trial File 4-- Two Juveniles arrested in BBS Extortion case File 5--Law Enforcement and Rights File 6--Townson's reply to Neidorf (in Cu Digest, #3.42) File 7--"High-Tech Watergate" (Inslaw reprint by E. Richardson) File 8--Software Piracy File 9--Hacker Convicted File 10--"Teens Tapped Computers of U.S. Military" File 11--Canada: Police Seize BBS, Software Piracy Charges Expected 11/25/91 File 12--Here's something you might find of interest File 13--24 Year Old Cracks NASA +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS, #3.44 ( Dec 17, 1991) File 1: Jyrkis Posting File 2: Re: Canada: Police Seize BBS, Software Piracy Charges Expected File 3: FBI vs Kiddie Porn File 4: "Getting what he Deserved?" (Reprint from Effector 2.02) File 5--A book worth adding to your CuD list ... File 6: E-mail privacy bibliography File 7: Second CFP Conference +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ** END CuD INDEX VOLUME 3 ** +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ------------------------------ End of Computer Underground Digest #4.03 ************************************