Computer underground Digest Wed Apr 13, 1995 Volume 7 : Issue 29 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copy Desecrator: Emo Shrdlu CONTENTS, #7.29 (Wed, Apr 13, 1995) File 1--EPIC Online Guide To Privacy Resources 4/11/95 File 2--ANNOUNCE: DEF CON ]I[ (Normal) File 3--Cu Digest Header Info (unchanged since 19 Mar, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Wed, 12 Apr 1995 23:17:28 -0400 From: "Dave Banisar" Subject: File 1--EPIC Online Guide To Privacy Resources 4/11/95 ============================================================ An Online Guide to Privacy Resources (privacy resources.faq) ============================================================ Published by the Electronic Privacy Information Center (EPIC) Washington, DC Last Updated 4/11/1995 Text and HTML versions: cpsr.org/cpsr/privacy/epic/ Send additions, suggestions to alert@epic.org ======================================================================= Table of Contents: ======================================================================= [1] Privacy Organizations [2] Publications [3] Net Sites for Privacy [4] Privacy Mailing Lists and Newsgroups [5] Upcoming Conferences and Events ======================================================================= [1] Privacy Organizations ======================================================================= Electronic Privacy Information Center. EPIC was established in 1994 to focus public attention on emerging privacy issues relating to the National Information Infrastructure, such as the Clipper Chip, the Digital Telephony proposal, medical records privacy and the sale of consumer data. EPIC conducts litigation, sponsors conferences, produces reports, publishes the EPIC Alert and leads campaigns on privacy issues. For more info, email: info@epic.org, or HTTP://epic.digicash.com /epic. EPIC, 666 Penn. Ave, SE, Suite 301, Washington, DC 20003. (202) 544-9240 (tel). Director: Marc Rotenberg. Privacy International. An international human rights group based in London, England with offices in Washington, DC and Sydney, Australia. PI has members in over 40 countries and has led campaigns against privacy violations in numerous countries including Australia, New Zealand, and the Philippines. PI publishes the International Privacy Bulletin and sponsors international conferences on privacy issues. Email pi@privacy.org. http://cpsr.org/cpsr/privacy/ privacy_international/pi.html, Gopher cpsr.org /cpsr/privacy/privacy_international/. Privacy International c/o EPIC,666 Penn. Ave, SE, Suite 301, Washington, DC 20003. Director General: Simon Davies. US Privacy Council. A coalition of US privacy groups and individuals founded in 1991 to deal with privacy issues in the US. USPC works in Washington monitoring legislation and the activities of government agencies. USPC works closely with other groups on privacy issues including National ID cards, reforming credit reporting, Caller ID and international issues. Email: privtime@access.digex.net. P.O. Box 15060, Washington, DC 20003. (202) 829-3660 (tel). Chair: Evan Hendricks. Privacy Rights Clearinghouse. A California-based organization formed in 1992. The Clearinghouse has produced many fact sheets and an annual report, and maintains a toll free hotline to provide advice to consumers about their rights. Email: prc@teetot.acusd.edu or HTTP: //www.manymedia.com/prc/ 5998 Alcala Park, San Diego, CA 92110. (619) 260-4806 (tel). 800-773-7748 (in Cal. only). Director: Beth Givens. Computer Professionals for Social Responsibility. A national membership organization of people concerned about the impact of technology on society. CPSR sponsors an annual conference, maintains numerous mailing lists on computer-related issues, a large internet site of information and publishes a quarterly newsletter. It has 24 local chapters across the US and several international affiliates. CPSR sponsors working groups on civil liberties, working in the computer industry and others. Contact: cpsr-info@cpsr.org or http:// cpsr.org/cpsr PO Box 717, Palo Alto, CA 94301. (415) 322-3778 (tel). Managing Director: Kathleen Kells. Internet Society. Group dedicated to fostering evolution of the Internet and its use. Sponsors yearly conference, publishes excellent quarterly newsletter, works with standards committees to develop Internet standards for networking and privacy. Email: isoc@isoc.org. http://info.isoc.org/ 12020 Sunrise Valley Drive, Suite 270, Reston, VA 22091. (703) 648-9888 (tel). Executive Director: Anthony Rutkowski. Electronic Frontier Foundation. Organization formed in 1990 to maintain and enhance intellectual freedom, privacy, and other values of civil liberties and democracy in networked communications. Publishes newsletters, Internet Guidebooks and other documents, provides mailing lists and other online forums, and hosts a large electronic document archive. Email: info@eff.org. ftp: ftp.eff.org, gopher: gopher.eff.org, WWW: http://www.eff.org. 1667 K St. NW, Suite 801, Washington DC 20006-1605 USA, +1 202 861 7700 (voice), +1 202 861 1258 (fax), +1 202 861 1224 (BBS). Executive Director: Andrew Taubman. American Civil Liberties Union. National civil liberties organization. Originally founded in 1920, the ACLU conducts extensive litigation on Constitutional issues including privacy, and free speech. The ACLU Washington office lobbies Congress for civil liberties and civil rights issues. Email: infoaclu@aclu.org or Gopher aclu.org 322 Eighth Ave, New York, NY 10001. Executive Director: Ira Glasser. Voters Telecom Watch. NY based cyber-rights lobbying group. In 1994 lobbied against the FBI Wiretap bill and for relaxation of export controls on cryptography. Affiliated with Society for Electronic Access. Contact: shabbir@panix.com. gopher://gopher.panix.com/11/vtw/ http://www.panix.com/vtw/ Society for Electronic Access. NY-based electronic civil liberties organization promotes "civil liberties and access in cyberspace". Email: sea@sea.org or http://www.panix.com/sea. P.O. Box 7081, New York, NY 10116-7081. (212) 592-3801. President: Simona Nass. EFF-Austin. Austin, TX-based, electronic civil liberties organization founded in 1990. Purpose is to engage in and support educational activities that promote a clearer understanding of the social, legal, and technical issues surrounding online telecommunications. Contact: eff-austin@zilker.net or (gopher/ftp).zilker.net. Also see newsgroup austin.eff. PO Box 18957, Austin, TX 78760. President: David Smith. Cypherpunks. Informal group that develops technological solutions to protect privacy. the Cypherpunks write cryptography and other programs, set up anonymous remailers and discuss political and technical issues. Meetings are also regularly held in California and other states. Email: majordomo@toad.com, subscribe cypherpunks. ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html ====================================================================== [2] Publications ======================================================================= Privacy Times. Biweekly newsletter on information law. Each issue covers developments related to privacy and information access, including summaries of court decisions on the Freedom of Information Act and other relevant statutes. Editor: Evan Hendricks. Address: P.O. Box 21501, Washington, DC 21501. (202) 829-3660. Cost: $250/Year Privacy Journal. A monthly journal on mainly US privacy, now in its 20th year of publication. Editor: Robert Ellis Smith. P.O. Box 28577, Providence, RI 02908. (401) 274-7861 (tel). Cost: $109/year. The PJ also publishes numerous books and compendiums on privacy including its excellent yearly Compilation of State and Federal Laws. International Privacy Bulletin. Published quarterly by Privacy International. The IPB covers international trends and new technologies. Each issue also includes reports from different countries and reviews of new publications. Editor: Dave Banisar. 666 Penn. Ave, SE #301, Washington, DC 20003. (202) 544-9240 (tel). Cost: $75/year individuals, $125 libraries, $200/year businesses. Privacy and American Business. Published bi-monthly. Industry perspective on privacy. Editor: Bob Belair. Bimonthly with special issues. Two University Plaza, Suite 414, Hackensack, NJ 07601. (201) 996-1154 (tel). Cost: $395/year. Full Disclosure. A monthly newspaper on surveillance and civil liberties issues. Editor: Glen Roberts. Box 734, Antioch, IL 60002. (708) 395-6200. http://ripco.com:8080/~glr/glr.html. Cost: $29.95/year. Low Profile. Asset protection and financial privacy. Published monthly. Editor: Mark Nestman. P.O. Box 84910, Phoenix, AZ 85701. 702-333-5942 (tel). Cost: $149/year. Privacy and Security 2001. Technical aspects of privacy and security. Focuses on electronic surveillance and counter-measures with recent assaults on privacy highlighted. Editor Jim Ross. 504 Shaw Road, Suite 222, Sterling, VA 20166. (703) 318-8600. 10/year. $35/year. 2600 Magazine. Inside technical information on telephone and computer network operations. Published quarterly. Editor: Emmanuel Goldstein. Email 2600@well.com. P.O. Box 752, Middle Island, NY 11953. Cost: $21/year. Privacy Law and Policy Reporter. A well written, law-oriented overview of privacy developments in NZ and Australia. 10 issues/year. Level 11, Carlton Centre, 55-63 Elizabeth Street, Sydney, NSW 2000, Australia. 61-2-221-6199 (tel). Cost: $AZ 345 Transnational Data and Communications Report. Bimonthly international overview of privacy, data protection, telecommunications and information access. Editor: Russell Pipe. P.O. Box 10528, Burke VA 22009-0528. Cost: $280/year. Privacy Laws and Business. A quarterly comprehensive overview of privacy issues in Europe. Focuses mainly on regulatory and data protection from a business perspective. Editor: Stewart Dresner. Cost: 3 Central Avenue, Pinner, Middlesex HA5 5BT United Kindgom. 44-81-866-8641(tel). $UK 240/year. Security Insider Report: News, Reviews, Opinion on security, privacy, information warfare, hackers, phreaks. Editor Winn Schwartau. Interpact Press, Inc. Monthly. $99/Yr. ======================================================================= [3] Net Sites ======================================================================= ACLU On-line Reading Room. Files on civil liberties. ftp/gopher aclu.org CPSR Internet Library. Maintains the online archives for CPSR, EPIC Privacy International and others. FTP/Gopher/WAIS/HTTP cpsr.org /cpsr Cypherpunks. Archives on cryptography and other privacy technologies. ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html ftp ftp.csua.berkeley.edu Electronic Frontier Foundation Archives. Archives on privacy, free speech, underground newsletters. ftp: ftp.eff.org, gopher: gopher.eff.org, WWW: http://www.eff.org Electronic Privacy Information Center. Includes back issues of EPIC Alert, privacy resources, legislation, and articles. http://www.epic.digicash.com/. Gopher cpsr.org /cpsr/privacy/ Privacy Rights Clearinghouse. http://www.manymedia.com/prc/ E-mail: prc@teetot.acusd.edu. Gopher: gopher.acusd.edu FTP:ftp.acusd.edu. Telnet: teetot.acusd.edu (local> c teetot, login: privacy). BBS: 619-260-4670 (same login as telnet). The Freedom Project. Files on free expression and privacy. http://att2.cs.mankato.msus.edu/~hayden/freedom Glass Houses on the Information Highway: Who Needs Privacy? Web page on documents, groups and individuals on sides of privacy battles. http://www.gatech.edu/lcc/idt/Miscellaneous/Glass_Houses/Privacy.html Data Surveillance and Information Privacy Web Page. Extensive materials on privacy of transaction materials and data matching. http://commerce.anu.edu.au/comm/staff/RogerC/Dataveillance/RogersDV.html UK Data Commissioner's Web page. Overview of UK Data Protection Act. http://www.open.gov.uk/dpr/dprhome.html The Norwegian Data Inspectorate (Datatilsynet). Web page of Norway Privacy Commissioner. Mostly in Norwegian. http://www.uio.no/~jonnyb/personvern/tilsyn.html Swiss Data Protection Agency WWW page. In German, French and Italian. http://www.eunet.ch:80/edsb/ Arge Daten. Web Site on Austrian Privacy. Mostly in German. http://www.ad.or.at/ German Privacy Information from Humbalt University. Extensive collection of German data protection information. All in German. http://respa.rewi.hu-berlin.de:80/Datenschutz/ List of Reliable Anonymous Remailers. http://www.cs.berkeley.edu/~raph/remailer-list.html. Can also be obtained by fingering remailer-list@kiwi.cs.berkeley.edu. Where to Get Pretty Good Privacy (PGP) FAQ. ftp://ftp.netcom.com/pub/mp/mpj/getpgp.asc or send mail to ftp-request@netcom.com with the line SEND mpj/getpgp.asc ======================================================================= [4] Electronic Newsgroups and Mailing Lists ======================================================================= ***Unmoderated Newsgroups and mailing lists*** Alt.privacy. Unmoderated discussion on privacy. High traffic, low content. Alt.privacy clipper. Unmoderated discussion of the Clipper chip and encryption policy. Comp.org.cpsr.talk. Unmoderated discussion of issues related to the Computer Professionals for Social Responsibility. Topics include privacy, the NII, telecommunications reform and social implications of technology. Comp.org.eff.talk. Unmoderated discussion of issues related to the Electronic Frontier Foundation. Cypherpunks Mailing list. Discussion of cryptography and technical protections of privacy. Warning: High Traffic (100+ messages/day). Email: majordomo@toad.com Sci.crypt. Unmoderated technical discussion of encryption. talk.politics.crypto. Unmoderated discussion of the Clipper chip and encryption policy. ***Moderated Newsletters and Digests*** EPIC Alert. Biweekly electronic newsletter of the Electronic Privacy Information Center. Mail to listserv@cpsr.org. 1st line: subscribe cpsr-announce. Back issues at cpsr.org /cpsr/alert and http://www.epic.digicash.com/ CPSR-Global. A new CPSR sponsored mailing list on Global information infrastructure issues. To subscribe, email listserv@cpsr.org with the 1st line: subscribe cpsr-global. Moderator: Marsha Woodbury. Risks Digest. Moderated digest on risks to the public using computers and related systems. Newsgroup: comp.society.risks. Also available as mailing list from email: risks-request@csl.sri.com 1st line: SUBSCRIBE. Back issues at ftp unix.sri.com /risks. Moderator: Peter Neumann. Computer Privacy Digest. Moderated digest on privacy. Newsgroup: comp.society.privacy. at wam.uwm.edu. To subscribe, email: comp-privacy-request@uwm.edu, 1st line "subscribe" Back issues gopher://gopher.cs.uwm.edu, ftp: ftp.cs.uwm.edu/comp-priv. Moderator: Len Levine. Computer Underground Digest. Weekly moderated digest on computer underground, privacy, free speech issues. Newsgroup: comp.society.cu-digest. Email at LISTSERV@VMD.CSO.UIUC.EDU, 1st line: SUB CUDIGEST . Back issues at etext.archive.umich.edu /pub/CuD/. Moderator: Jim Thomas. PRIVACY Forum. Moderated digest on privacy sponsored in part by ACM. For info, send message text: help to "privacy-request@vortex.com". Back issues and other related materials via FTP at "ftp.vortex.com" in "/privacy", by gopher at "gopher.vortex.com", or via WWW at "http://www.vortex.com/". Moderator: Lauren Weinstein. Comp.org.cpsr.announce. Moderated mailing list for CPSR. Includes EPIC Alert, and other CPSR newsletters and releases. Also available as mailing list. See EPIC Alert for subscription info. VTW Announce. Moderated mailing list of Voters Telecomm Watch. Email listproc@panix.com, 1st line of the message: SUBSCRIBE VTW-ANNOUNCE . Red Rock Mailing List. Distributes the Network Observer monthly newsletter. Email: rre-request@weber.ucsd.edu. with the Subject: subscribe Jane Doe. ======================================================================= [5] Upcoming Privacy Related Conferences and Events ======================================================================= National Net '95: Reaching Everyone. Washington, DC. Apr. 5-7, 1995. Sponsored by EDUCOM. The privacy panel will include Brock Meeks (CyberWire Dispatch), Bob Gellman (information and privacy policy consultant), Lance Hoffman (George Washington University), and Don Haines (ACLU). Contact: net95@educom.edu or call 202/872-4200. Security on the I-WAY. Arlington, VA. Apr. 10-11. Sponsored by National Computer Security Assn. Contact: 74774.1326@compuserve.com Information Security and Privacy in the Public Sector. Hyatt Dulles, VA. Apr. 19-20, 1995. Sponsored by AIC Conferences. Speakers include Joan Winston (OTA), Lynn McNulty (NIST), Marc Rotenberg (EPIC), Dorothy Denning (Georgetown University), David Banisar (EPIC) and Jim Bidzos (RSA). Contact: Scott Kessler 212/952-1899 x308. Health Care, Privacy @ Cyberspace. Desmond Hotel, Albany, New York. June 21-22, 1995. Sponsored by the Institute for the Advancement of Health Care Management and the Government Law Center of Albany Law School. Contact Debra Sottolano ds3789@albany.edu. INET '95. Honolulu, HI. June 28-30, 1995. Sponsored by the Internet Society. Speakers on privacy include Frank Tuerkheimer (University of Wisconsin School of Law.). Contact inet95@isoc.org. Key Players in the Introduction of Information Technology: Their Social Responsibility and Professional Training. July 5-6-7, 1995. Namur, Belgium. Sponsored by CREIS. Contact: nolod@ccr.jussieu.fr. DEF CON III. August 4-6, 1995. Las Vegas. Major hacker conference. Contact: dtangent@defcon.org or http://dfw.net/~aleph1/defcon Advanced Surveillance Technologies. Sept. 4, 1995. Copenhagen, Denmark. Sponsored by Privacy International and EPIC. Contact pi@privacy.org. 17th International Conference of Data Protection and Privacy Commissioners. Copenhagen, Denmark. September 6-8, 1995. Sponsored by the Danish Data Protection Agency. Contact Henrik Waaben, +45 33 14 38 44 (tel), +45 33 13 38 43 (fax). Managing the Privacy Revolution. Privacy & American Business. Oct. 31 - Nov. 1, 1995. Washington, DC. Speakers include C.B. Rogers (Equifax). Contact Alan Westin 201/996-1154. (Send calendar submissions to Alert@epic.org) ======================================================================= About The Electronic Privacy Information Center The Electronic Privacy Information Center is a public interest research center in Washington, DC. It was established in 1994 to focus public attention on emerging privacy issues relating to the National Information Infrastructure, such as the Clipper Chip, the Digital Telephony proposal, medical record privacy, and the sale of consumer data. EPIC is sponsored by the Fund for Constitutional Government and Computer Professionals for Social Responsibility. EPIC publishes the EPIC Alert and EPIC Reports, pursues Freedom of Information Act litigation, and conducts policy research on emerging privacy issues. For more information, email info@epic.org, WWW at HTTP://epic.digicash.com /epic or write EPIC, 666 Pennsylvania Ave., SE, Suite 301, Washington, DC 20003. (202) 544-9240 (tel), (202) 547-5482 (fax). The Fund for Constitutional Government is a non-profit organization established in 1974 to protect civil liberties and constitutional rights. Computer Professionals for Social Responsibility is a national membership organization of people concerned about the impact of technology on society. For information contact: cpsr-info@cpsr.org If you'd like to support the work of the Electronic Privacy Information Center, contributions are welcome and fully tax-deductible. Checks should be made out to "The Fund for Constitutional Government" and sent to EPIC, 666 Pennsylvania Ave., SE, Suite 301, Washington DC 20003. Your contributions will help support Freedom of Information Act litigation, strong and effective advocacy for the right of privacy and efforts to oppose Clipper and Digital Telephony wiretapping proposals. Current FOIA cases include: EPIC v. National Security Council (effort to uncover information surrounding Security Policy Board, see article above), EPIC v. FBI (effort to obtain information justifying wiretap legislation), CPSR v. National Security Agency (records relating to Clipper and NSA decision to classify public documents), CPSR v. National Institute of Standards and Technology (records regarding development of Digital Signature Standard), and CPSR v. Secret Services (activities of Secret Service in beak-up of 2600 group at Pentagon City) Thank you for your support. ------------------------------ Date: Wed, 5 Apr 1995 18:32:43 (CDT) From: Metalhead Subject: File 2--ANNOUNCE: DEF CON ]I[ (Normal) This is _not_ the professional sounding announcement. Use that one to con your boss / employers out of the cost of the trip. The professional announcement will be available on the FTP site and other more serious mailing lists and news groups, etc. This is the k-RaD kriminal shout out to all u el1te hacker types that aren't in jail to attend 'da def con. werd. READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE What's this? This is an initial announcement and invitation to DEF CON III, a convention for the "underground" elements of the computer culture. We try to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies, Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks, Futurists, Artists, Criminally Insane, Hearing Impaired. WHO: You know who you are, you shady characters. WHAT: A convention for you to meet, party, and listen to some speeches that you would normally never get to hear from some k-rad people. WHEN: August 4, 5, 6 - 1995 (Speaking on the 5th and 6th) WHERE: Las Vegas, Nevada @ The Tropicana Hotel So you heard about DEF CON II, and want to hit part III? You heard about the parties, the info discussed, the bizarre atmosphere of Las Vegas and want to check it out in person? You want to do weird shit _away_ from the hotel where you can't get me in trouble? Then you're just the person to attend! Sure it's great to meet and party with fellow hackers, but besides that we try to provide information and speakers in a forum that can't be found at other conferences. While there is an initial concern that this is just another excuse for the evil hackers to party and wreak havoc, it's just not the case. People come to DEF CON for information and for making contacts. We strive to distinguish this convention from others in that respect. Plus this year we have official DEF CON GOONS(c) who will pummel you until you pass out should you cause problems for other con.friendly people! Big Brother loves you! What's been said (Only the good stuff will be quoted, of course) Stevyn - "What can eye say, it was intense! . . . the whole con just kicked ass! I totally recommend you check out the next one." Gail Thackeray, Prosecutor, "It's partly an entertaining party, it's partly a fashion statement. But it's mostly something about which the business world has no clue." Wendy Murdock, Boardwatch, "Def Con represents the tug-of-war that has always been present - people strive to get that which is just out of reach, aggravating governments and breaking rules in the process." ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: WHERE IT IS: The Tropicana has rooms reserved for the convention. Rooms are expensive. They are even more expensive if you don't book under the convention. If it is to expensive for you, please see the section below on Las Vegas WWW sites that can provide you with information on other nearby hotels that are cheaper. Check-in is 3 pm, check-out time is 12 noon. Remember there is an 8% sales tax in Vegas. 65$ Single or Double room, Midweek (Monday - Thursday) 90$ Single or Double room, Weekend (Friday - Sunday) 350$ One-Bedroom Suite (Call for Availability) The Tropicana, 3801 Las Vegas Blvd. So., Las Vegas, Nevada, 89109 (702) 739-2581 or (800) 468-9494 or (702) 739-2448 (Fax) Held in three conference rooms at the Tropicana hotel in Las Vegas, DEF CON promises to be interesting. The Tropicana has a huge pool (largest in the world? Anyway, lots of cool movies have been filmed with this pool in them) and in August Vegas should be about 100(f) degrees at one in the morning. What do you care? You'll be wired on caffeine and not sleeping anyway. There are numerous attractions in town from the strip bars to the local COs in case you seek distraction. The Tropicana is located right on the "Strip" with the other three corners of the street occupied by the MGM Grand (Largest hotel in the world), the Excalibur, and the Luxor (The big sense-net pyramid). If you can afford it I totally recommend spending some extra time in town.. there are too many cool things to do, especially if you have never visited. Heck, last time I got to rent and fire uzi's and MP-5 machine guns (OK, so you can do that for cRacK in Los Angeles) see some strippers, and drink 1$ bottles of imported beer. What a place! Now you know why I chose Vegas for a location. SPECIAL EVENTS This year there will be a number of special events going down, including: [> Hacker Jeopardy [> Spot the Fed Contest [> Voice bridge [> Giveaways [> A Red Box Creation Contest [> A Video Room [> Cool Video Shit [> Scavenger Contest [> Who knows? COSTS The price of admission will be 30$ in advance (See the end of this announcement the address to pre-register to) or 40$ at the door. This will include your goovie 24bit color name tag and a conference program. Don't forget to factor in Hotel costs, (The more people you crash with, the cheaper it is) gas, food, gambling, booze, strippers, bail, etc. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: SPEAKERS This is a partial list of speakers for this year. More are being invited or waiting to make plans. As this list changes further announcements will be made. This should give you a flavor or what to expect, though. [> Bruce Schneier, Author of "Applied Cryptography" and "" TOPIC: Will speak on issues surrounding cryptography, digital authentication, digital cash, and will answer questions from the audience. [> John Perry Barlow [> Winn Schwartau, Author of "Information Warfare" and "Terminal Compromise" is a consultant to government and the private sector regarding enterprise and national security concerns. TOPICS: "Information Warfare, the year in review" (Comedic) and "Tempest Attack Videos." [> Len Rose AKA Terminus After the legal fiasco Len faced years ago (as partially chronicled in "The Hacker Crackdown.") this will be his first chance to speak of his experiences without the threat of having his parole revoked. TOPIC: To be decided later. [> Chris Hall of Executive Protection will be demonstrating a fully equipped "A-Team" van, a fully loaded spy mobile with all types of cool interception and surveillance goodies. Last year his talk included an overview of surveillance techniques. TOPIC: To be decided later. [> Theora, a veteran of DEF CON II, will be presenting another speech this year. Topics to include security and anonymous activity on the net. Last year she organized a round table discussion with Phillip Zimmermann and the Presence and focused on security issues of encryption and privacy expectations. TOPIC: Not revealed to me yet. Doh! [> Curtis Karnow, former federal prosecutor and attorney focusing on intellectual property litigation and computer law. TOPIC: Agents in the telecommunications context, and "smart" software that we 'trust' to do the Right Thing. The specific issue is legal liability and responsibility for the actions of intelligent agents, and then spinning off to chat about the liability for artificial intelligence generally. [> Robert D. Steele, President of OPEN SOURCE SOLUTIONS, Inc. A former Spy, Experienced Bureaucrat, Radical Visionary. Tofflers call him the "rival store" to CIA. Keynote Speaker at HOPE, Workshop at Hac-Tic '93. [> The Electronic Frontier Foundation (EFF) will cover current legal threats privacy and computer information networks. Speakers will be talking Saturday and Sunday, and maybe Friday depending. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: SPECIAL EVENTS So you think you're so damn smart, eh? Think your shit doesn't stink? Right. Think you got one up on the Feds, huh? Well, now's your chance to prove it smarty-pants. Winn Schwartau will take command and moderate. ! A N N O U N C I N G ! H A C K E R J E O P A R D Y That's right. You can now prove how smart you really are. Get up on stage and question a few answers, pile up the points . . . and win big! You know the game. You know the rules. Now all you have to do is have the guts, get up on stage in front of your peers and the narks and show us all! When? After Dark Tangent's opening speech (which we're all really looking forward to . . . [yawn] HACKER JEOPARDY starts! MIDNIGHT - DAY 1 of DEF CON (Friday) If you wanna play . . . show up. If you don't wanna play, show up. There will be three rounds of three people. Just like real. The winners of each round will go into the Finals and the winner of that will win 25,000 units of some foreign currency! From Dark Tangent himself! Plus: - A T-shirt three sizes to small for the women. - No T-shirts for the men. - Silk jackets for everyone. - One Heineken per player per round at DT's expense. - Round trip directions to Hoover Dam. - Phiber Optik's home address. - Erik Bloodaxe's Blood Samples. - And more . . . Contestants will be picked at random from a pool of those who want to play. If you don't wanna play, don't enter the contest. Only the elite survive! FEDS: If you get picked to play, and we ask you what your job is, YOU HAVE TO TELL THE TRUTH! If you don't, our custom Fed-O-Meter will detect your lies and off to the casinos you go! Potential categories for questions include: - - Famous Busts - Famous Narks - UNIX Bugs - Telco Tech - "Hacking" and beware of the killer daily double. Bribing the judge is acceptable. EMail your suggested questions and answers to winn at winn@infowar.com So, in the inimitable words of Al Bundy . . . LET'S ROCK! 3rd ANNUAL SPOT THE FED CONTEST Spot the fed, win the shirt "Like a paranoid version of pin the tail on the donkey, the favorite sport at this gathering of computer hackers and phone phreaks seems to be hunting down real and imagined telephone security and Federal and local law enforcement authorities who the attendees are certain are tracking their every move.. .. Of course, they may be right." John Markhoff, NYT Basically the contest goes like this: If you see some shady MB (Men in Black) earphone penny loafer sunglass wearing Clint Eastwood to live and die in L.A. type lurking about, point him out. Just get my attention and claim out loud you think you have spotted a fed. The people around at the time will then (I bet) start to discuss the possibility of whether or not a real fed has been spotted. Once enough people have decided that a fed has been spotted, and the Identified Fed (I.F.) has had a say, and informal vote takes place, and if enough people think it's a true fed, or fed wanna-be, or other nefarious style character, you win a "I spotted the fed!" shirt, and the I.F. gets an "I am the fed!" shirt. Note to the feds: This is all in good fun, and if you survive unmolested and undetected, but would still secretly like an "I am the fed!" shirt to wear around the office or when booting in doors, please contact me when no one is looking and I will take your order(s). Just think of all the looks of awe you'll generate at work wearing this shirt while you file away all the paperwork you'll have to generate over this convention. I won't turn in any feds who contact me, they have to be spotted by others. TELEPHONE CONFERENCE BRIDGE (801-855-3326) For DEF CON III there will be a dial in conference set up. If you are overseas, or just too poor to make it to the convention this year, you can still get an idea of what is going on and participate. One part of the voice conference equipment will allow you to listen to the convention room microphone, another will allow you to ask questions during the Q&A sections of peoples speeches. A general conversation area will be up so you can chat with others at the convention, or just others dialed into the bridge. Navigate through the voice mail maze and get free phone sex! Impress others! The Voice bridge is up now at 801-855-3326. It has 5 analog ports, but in a few weeks will have eight digital ports for better sound, etc. SPOOAH DOOPAH RAFFLE GIVE AWAY!@# Throughout the convention, between speakers and events there will be a raffle giveaway in which if your number is drawn, you win the prize. Last year's giveaway included an ancient kaypro monochrome portable, a roll of Sprint "security" tape, "Computer Warriors" evil anti-virus cartoon, a 240 meg IDE HD, and other elite things. >> All the prizes given away are donated by other convention goers, so if << >> you have any stuff to give away, please save and donate it to the con! << RED BOX BUILDING CONTEST While we don't encourage or condone the use of toll fraud devices, we do encourage creativity and expression of thought. We combine these and come up with a red box creating contest. The final device doesn't have to produce the real red box tones (can't have people getting arrested) BUT it does have to produce some audible tones, any kind of tones. This contest is inspired by last year's give away of a red box "Big Red" that looked just like a big pack of Big Red gum, but really was a red box. Elite! There was also a little girl's doll that was a red box, but the switch for that one was hidden under the dress and, well, it just wasn't given away. Come up with unique ideas! With just a Hallmark card and some spare time you can create an elite 007 style tone generating device! What will you win if yours is chosen as the most k-rad besides the envy of fellow hackers? You'll get a tee shirt and the cost of admission to the convention refunded PLUS some as-of-yet undecided prize. I bet you just can't wait to burn your fingers with your soldering iron now! THE VIDEO ROOM In one of the rooms a LCD wall projector will be hooked up connected to a VCR, and people can bring flicks to play. Stuff like Max Headroom, War Games etc. You know, the cool cheesey stuff. Also some "hacker" videos will be shown. If you have something you wanna show, bring it along. When the projector is needed in the main conference room it will be swiped for the duration. COOL VIDEO SHIT At this time we are working to see if a T1 connection is possible. If it is there will be a cu-see me connection set up with multiple video cameras in various locations. Images will also be added automatically to a WWW page for people to snag. As all this works itself out there will be further announcements. No, there will be no "Hack our server" contests, and there will be "Security Professionals" with "Diagnostic Tools" to "Correct" any people who may cause the network problems. SCAVENGER CONTEST A scavenger contest is being planned. The person or group with the most number of items on the list wins the prize. (Prize undetermined as of yet) and there will be a few follow up prizes. Don't forget to carry massive amounts of water as you run about the concrete jungle, dehydration can happen just crossing the street. This is a contest for only the most k-rad. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: WHAT YOU CAN DO TO HELP DEF CON III will be planned right up until the last minute, with problems being fixed and new things being added all along.. a sort of work in progress that you get to witness in person when you show up. Hopefully it won't be too messed up when presented to the public. What can you do to help? => Please help generate questions for Hacker Jeopardy. Come up with some questions and answers, and Winn will decide which ones to use. Mail 'em to winn@infowar.com. - -> We are looking for people to speak on Personnel Information Gathering and selling. Hopefully a speaker (who could remain anonymous) in this area has experiences in gathering and selling such information. If you know of such a person, please invite them to contact me or let them know we are looking for such speakers. - -> We are looking for some people to submit artwork to be used in the convention someplace. It could be a poster, or in the program. Black and white art would be eligible for the program only. - -> Articles and interesting FTP sites, WWW pages, mini FAQs, etc. are all wanted for the program. Quality articles that are informative and apply to the theme of the convention. Scanner frequency lists, ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: MORE DEF CON INFORMATION The World Wide Web Page is located at: http://underground.org/defcon/ FTP Site: ftp.fc.net /pub/defcon Mailing lists: mail majordomo@fc.net with the following statement in the body of your message: subscribe dc-announce This will set you up on the mailing list and you will receive updated information, information on the other mailing lists offered, etc. I suggest joining the dc-stuff list just so you can talk and plan with other people going to the con to coordinate rides, sharing of rooms, etc. Voice or Voice Mail: 0-700-826-4368 from a phone with AT&T LD. or 206-626-2526 E-Mail: dtangent@defcon.org (The Dark Tangent) Snail Mail: 2709 E. Madison #102, Seattle, WA, 98112 BBS System to call for info if you don't have net access: Alliance Communications - +1 612 251 2511,,66 - USRobotics HST DS 16800 Problems connecting to Alliance? Email metal@geeks.org Voice Bridge Chat System: 801-855-3326 ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: INFORMATION ABOUT LAS VEGAS NEWS GROUPS Please note the following newsgroups may or may not be designated for local distribution (Distribution: Vegas and/or nv), and is intended for all systems in the Las Vegas area or those interested in same on the same level as the la, ca, ba, ny, nyc, and other similar local higherarchies: vegas.bi Talk for bisexually natured persons vegas.config Configuration discussions for the higherarchy vegas.food Anything about food in Las Vegas vegas.for-sale For Sale/Want ads (no commercials, please!) vegas.general General discussion vegas.jobs Jobs offered and wanted in Las Vegas vegas.motss MOTSS community talk vegas.personals Personal ads - any nature vegas.singles Talk for singles vegas.test Group to test post to WWW PAGES about Las Vegas, Hotels, Things to do, etc. HTTP://www.infi.net:80/vegas/online/ HTTP://www.ocf.berkeley.edu/~iew/index.html HTTP://www.best.com/~rdc/roger/vegas.html HTTP://www.intermind.net/las.vegas.on-line/homepage.html ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: STUFF TO BUY Stuff is for sale from DEF CON I and II in case you are interested. From the first year we have audio tapes (4 90 minute tapes) for $20 and the second year (10 90 minute tapes) for $30. Descriptions of these tapes are below. DEF CON I Tapes (4) include the following speakers: Ray Kaplan, Curtis Karnow, Gail Thackeray, Dead Addict, Dark Druid, Judi Clark Dan Farmer, and Dr. Mark Ludwig. DEF CON II Tapes (10) include the following speakers: Phillip Zimmermann : Keynote Speaker, PGP. Gail Thackeray : Response to Mr. Zimmermann and Privacy issues. Chris Hall : Electronic Surveillance. Curtis Karnow : Recombinant Culture, Crime in the Digital Network. Dr. Mark Ludwig : Virus Creation Awards and What to do when the Feds come. Judi Clark, Mara, Fen and Marianne in a Round Table Discussion. The Dark Knight : Hacking in the UK Sara Gordon, Mark Aldrich, Phil Zimmermann: Internet and PGP privacy concerns. Annaliza (Torquie) : The European Underground scene. Mark Lottor : Various cellular topics. Winn Schwartau : HERF guns, Van Eck, Information Warfare Peter Beruk : The role of the SPA, general Q&A. Padgett Peterson : Anti-Virus writing, Cleaning up other peoples messes. The Jackal : A basic radio overview with Q&A. Artimage : Underground spoof and give aways. Stephen Dunifer : Radio Free Berkeley and pirate media. Damien Thorn : Random Cell information from the late night tech talks. SHIRTS are still available to buy. The ones remaining are long sleeve white with the choice of two styles. Both styles have a three color logo on the front (Red, Gray, Black) with "DEF CON". The back is either a list of strange grep key words and "inside" keywords with "Why? Because I can." at the top. Back #2 is the same back as DEF CON I with the old and "new" 4 Amendment as stated by J.P. Barlow with "Protect your rights, Encrypt your data..." at the top. The back on this style is two colors.. black lettering framed in light gray for better definition. Shirts are $20. SHIPPING : If you buy anything, please include 2.90 for priority shipping. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: LAST AND LEAST OK! Your almost ready to go. Now here is an E-Z to follow checklist of things you should take care of before throwing caution to the wind and bailing out to the dangerous and sexy-wrong world of Las Vegas. In the words of one famous (and abused) phone system: "Sit up straight, PAY ATTENTION, Listen to what your being told. (Now try again)" (Whoever can identify that phone system first gets in free) StUPh 2 D0 b3fore the C0nvent1ion: _ Check out inpho about Vegas so you know what you wanna do. _ Get a hotel room or some crash pad. _ Bring $40 for admission or pay $30 in advance. _ Bring your PGP key on disk to key sign with others. _ Bring Laptop, laplink, serial, and bizarre gender changer cables. _ Bring things to donate for the give-away raffle. _ Leave massively incriminating evidence at home. _ Police scanners can provide hours of fun in Vegas. _ Bring interesting videos to play in the video room. _ Caffeine and snacks are fun to eat. _ Don't forget any drugs or medication you may need. _ You won't need saline for your contact lenses, you won't be sleeping. _ Anything you promised your friends you would bring for them. _ Join the mailing list and arrange rides or rooms with others in advance. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: MY PGP KEY This is the unsigned version My signed version is available on the public key-servers - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.1 mQCNAy6v5H8AAAEEAJ7xUzvdRFMtJW3CLRs2yXL0BC9dBiB6+hAPgBVqSWbHWVIT /5A38LPA4zqeGnGpmZjGev6rPeFEGxDfoV68voLOonRPcea9d/ow0Aq2V5I0nUrl LKU7gi3TgEXvhUmk04hjr8Wpr92cTEx4cIlvAeyGkoirb+cihstEqldGqClNAAUR tCZUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkZWZjb24ub3JnPg== =ngNC - -----END PGP PUBLIC KEY BLOCK----- ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: WHY IS THE ANNOUNCEMENT SIGNED? Well, last year it came to my attention that some unknown person in California had modified an announcement and was having people mail their pre-registration money to them instead. It was actually pretty funny. Only one person was fooled and lost 10$. Not bad. I knew something was up when he said he had pre-registered for 10$ and had the receipt I had supposedly mailed back. I am never that organized! To avoid potential problems like this one please verify this announcement!@# My key is available for verification on public key servers, and my key-id is 46A8294D. The other key you will find on servers may be my older 1284bit key, which is still good, but just not used to sign this text. ((PGP Sig and stuff deleted by CuD editors for parsimony--available on request)) ------------------------------ ------------------------------ Date: Sun, 19 Mar 1995 22:51:01 CDT From: CuD Moderators Subject: File 3--Cu Digest Header Info (unchanged since 19 Mar, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.29 ************************************