------------------------------ From: Gordon Meyer Subject: CuD Index, Volume Two (2.00 - 2.19) Date: 25 February, 1991 ******************************************************************** *** CuD #3.07: File 3 of 6: CuD Index for Volume Two *** ******************************************************************** **************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Index to Volume Two *** *** Issues 2.00 - 2.19 *** **************************************************************************** Volume 1, Issue #2.00 (Aug 25, 1990) CONTENTS: File 1: Moderators' Corner File 2: EFF mailing #3: About the Electronic Frontier Foundation File 3: Len Rose's Search Warrant File 4: What to Read When the SS is at the Door File 5: CU in the News: More on the NY Raids ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.01 (Aug 31, 1990) CONTENTS: File 1: Moderators' Corner File 2: Proposed changees in Computer Abuse Act (S.2476) File 3: CPSR Seeks FBI data on Bulletin Board Monitoring File 4: Computers, Social Responsibility, and Political Action File 5: Another experience with the SS File 6: CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.02 (September 9, 1990) CONTENTS: File 1: Moderators' Corner File 2: Musing over Operation Sun Devil File 3: IPCO BBS Back on-Line File 4: CuD Index, Volume 1 (Nos. 1.00 through 1.29, complete) File 5: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.03 (September 14, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose's experience with the Secret Service File 3: Tim Wolfson's address, cite list File 4: A comment on Zod's case ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.04 (September 23, 1990) CONTENTS: File 1: Moderators' Corner File 2: Re: Evidence (was Re: Musing on Constitutionality) File 3: Why the FBI should be concerned about the Secret Service File 4: California Computer Abuse Law revisited File 5: Candidate for state governor supports electronic freedom & privacy File 6: Review of Steven Levy's CLOAK AND DAGGER File 7: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.05 (September 30, 1990) CONTENTS: File 1: Moderators' Corner File 2: Re: The CU in the News (Mail reading) File 3: Anarchist Times, Inc. (ATI)--background File 4: The status of the electronic forum (BBS) File 5: Another experience with the law File 6: Some views on what to do if questioned by LE agents File 7: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.06 (October 6, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: MARS BBS Sting a Prank File 4: Another view of hacking File 5: The CU in the news ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.07 (October 15, 1990) CONTENTS: File 1: Moderators' Corner File 2: Re: IBM mainframe trojan repost File 3: CPSR Annual Meeting (Oct. 20-21, 1990) File 4: Electronic Frontier Foundation Hires Staff Counsel File 5: 13th Annual National Computer Security Conference (Part 1) File 6: 13th Annual National Computer Security Conference (Part 2) File 7: Summary of COMPUTER ETHICS (book) File 8: Introduction to TOXIC SHOCK ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.08 (October 20, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: Prodigy, Problems, and Censorship File 4: Censorship on the Nets File 5: PC's & Political Action ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.09 (October 27, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose Arrest File 3: Mars was not "Censored" File 4: Response to Mars "Censoring" File 5: Steve Jackson Games (SJG) Update File 6: The Future of Hacking and the System Security Profession File 7: The Ultimate Interface: Hackers and the Private Sector File 8: CU in the News: "Hackers" and Bank Blackmail in England ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.10 (November 2, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose Funds--A Humanitarian Necessity File 3: EFF Seeks Executive Director (Job Announcement) File 4: Massachusetts Computer Crime Bill File 5: Re: C-u-D, #2.09 Censoring of gif's File 6: The Piratical Dilemma File 7: Obtaining Identification Cards File 8: Logisticon vs. Revlon File 9: In-House Security Problems ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.11 (November 13, 1990) *** SPECIAL ISSUE: SEARCH AFFIDAVIT FOR STEVE JACKSON GAMES *** ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.12 (November 17 1990) (mailed in two parts) CONTENTS: File 1: Moderators' Corner File 2: PhD Candidate Seeks information on the CU File 3: Riggs, Darden, and Grant Sentenced File 4: Prodigy Saga Continues File 5: Re: Response to Mars "Censoring" File 6: Response to SJG Affidavit (part 1) File 7: Warrants schmarrants! The SS is Crazy! File 8: More guidelines on what to do if busted File 9: CU in the News--England and Emma Nicholson; VOGON News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.13 (November 25 1990) CONTENTS: File 1: Moderators' Corner File 2: EPIC (Effective Performance in Candidates) File 3: The Riggs Sentencing (reprint from Newsbytes) File 4: First Conference on Computers, Freedom & Privacy File 5: Hackers Break into DEA Lines ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.14 (November 30, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose Indicted File 3: CPSR's FOIA request from the FBI File 4: International Information Retrieval Guild File 5: A Note on Censorship File 6: Two Comments on Prodigy File 7: Don't Talk to Cops File 8: Response to DEA/PBX News Story ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.15 (December 5, 1990) CONTENTS: File 1: Moderators' Corner File 2: Len Rose Indictment in Illinois File 3: 2600 Magazine Response to Atlanta Sentencing File 4: List of Computer Underground Clippings File 5: Computer Crime Laws list File 6: Media and the CU File 7: The Hermetic Underground ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.16 (December 10, 1990) *> SPECIAL ISSUE: "ATLANTA THREE" SENTENCING MEMORANDUM <* ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.17 (December 16, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: EFF Response to Atlanta Sentencing Memorandum File 4: Some Thoughts on the Atlanta Sentencing File 5: Earning your Stripes File 6: Playgrounds of the Mind: Cyberspace File 7: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.18 (December 28, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: Computers Under Attack File 4: CU Resources in Germany File 5: Trade Secrets; When are they Bad? ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Volume 2, Issue #2.19 (December 31, 1990) CONTENTS: File 1: Moderators' Corner File 2: From the Mailbag File 3: Telecoms Ripping off BBSs? File 4: Michigan Bell vs BBSs File 5: Clarification of Gail Thackeray's Comment on Modem Licensing File 6: a.k.a. freedom of expression File 7: Z-modem Virus Alert ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ******************************************************************** ****** END OF CuD VOLUME TWO - INDEX ******** ******************************************************************** ******************************************************************** >> END OF THIS FILE << ***************************************************************************