Computer underground Digest    Wed  Apr 13, 1995   Volume 7 : Issue 29
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Copy Desecrator:  Emo Shrdlu

CONTENTS, #7.29 (Wed, Apr 13, 1995)

File 1--EPIC Online Guide To Privacy Resources 4/11/95
File 2--ANNOUNCE: DEF CON ]I[ (Normal)
File 3--Cu Digest Header Info (unchanged since 19 Mar, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 12 Apr 1995 23:17:28 -0400
From: "Dave Banisar" <banisar@EPIC.ORG>
Subject: File 1--EPIC Online Guide To Privacy Resources 4/11/95

    ============================================================

                 An Online Guide to Privacy Resources
                       (privacy resources.faq)

    ============================================================

                         Published by the
             Electronic Privacy Information Center (EPIC)
                          Washington, DC

                      Last Updated 4/11/1995
	
       Text and HTML versions: cpsr.org/cpsr/privacy/epic/
	
          Send additions, suggestions to alert@epic.org

=======================================================================
Table of Contents:
=======================================================================

 [1] Privacy Organizations
 [2] Publications
 [3] Net Sites for Privacy
 [4] Privacy Mailing Lists and Newsgroups
 [5] Upcoming Conferences and Events

=======================================================================
[1] Privacy Organizations
=======================================================================

Electronic Privacy Information Center. EPIC was established in 1994 to
focus public attention on emerging privacy issues relating to the
National Information Infrastructure, such as the Clipper Chip, the
Digital Telephony proposal, medical records privacy and the sale of
consumer data. EPIC conducts litigation, sponsors conferences,
produces reports, publishes the EPIC Alert and leads campaigns on
privacy issues. For more info, email: info@epic.org, or
HTTP://epic.digicash.com /epic. EPIC, 666 Penn. Ave, SE, Suite 301,
Washington, DC 20003. (202) 544-9240 (tel). Director: Marc Rotenberg.

Privacy International. An international human rights group based in
London, England with offices in Washington, DC and Sydney, Australia.
PI has members in over 40 countries and has led campaigns against
privacy violations in numerous countries including Australia, New
Zealand, and the Philippines. PI publishes the International Privacy
Bulletin and sponsors international conferences on privacy issues.
Email pi@privacy.org. http://cpsr.org/cpsr/privacy/
privacy_international/pi.html, Gopher cpsr.org
/cpsr/privacy/privacy_international/. Privacy International c/o
EPIC,666 Penn. Ave, SE, Suite 301, Washington, DC 20003. Director
General: Simon Davies.

US Privacy Council. A coalition of US privacy groups and individuals
founded in 1991 to deal with privacy issues in the US. USPC works in
Washington monitoring legislation and the activities of government
agencies. USPC works closely with other groups on privacy issues
including National ID cards, reforming credit reporting, Caller ID and
international issues. Email: privtime@access.digex.net. P.O. Box
15060, Washington, DC 20003. (202) 829-3660 (tel). Chair: Evan
Hendricks.

Privacy Rights Clearinghouse. A California-based organization formed
in 1992. The Clearinghouse has produced many fact sheets and an annual
report, and maintains a toll free hotline to provide advice to
consumers about their rights. Email: prc@teetot.acusd.edu or HTTP:
//www.manymedia.com/prc/ 5998 Alcala Park, San Diego, CA 92110. (619)
260-4806 (tel). 800-773-7748 (in Cal. only). Director: Beth Givens.

Computer Professionals for Social Responsibility. A national
membership organization of people concerned about the impact of
technology on society. CPSR sponsors an annual conference, maintains
numerous mailing lists on computer-related issues, a large internet
site of information and publishes a quarterly newsletter. It has 24
local chapters across the US and several international affiliates.
CPSR sponsors working groups on civil liberties, working in the
computer industry and others.  Contact: cpsr-info@cpsr.org or http://
cpsr.org/cpsr PO Box 717, Palo Alto, CA 94301. (415) 322-3778 (tel).
Managing Director: Kathleen Kells.

Internet Society. Group dedicated to fostering evolution of the
Internet and its use. Sponsors yearly conference, publishes excellent
quarterly newsletter, works with standards committees to develop
Internet standards for networking and privacy. Email: isoc@isoc.org.
http://info.isoc.org/ 12020 Sunrise Valley Drive, Suite 270, Reston,
VA 22091. (703) 648-9888 (tel). Executive Director: Anthony Rutkowski.

Electronic Frontier Foundation.  Organization formed in 1990 to
maintain and enhance intellectual freedom, privacy, and other values
of civil liberties and democracy in networked communications.
Publishes newsletters, Internet Guidebooks and other documents,
provides mailing lists and other online forums, and hosts a large
electronic document archive.  Email: info@eff.org. ftp: ftp.eff.org,
gopher: gopher.eff.org, WWW: http://www.eff.org. 1667 K St. NW, Suite
801, Washington DC 20006-1605 USA, +1 202 861 7700 (voice), +1 202 861
1258 (fax), +1 202 861 1224 (BBS). Executive Director: Andrew Taubman.

American Civil Liberties Union. National civil liberties organization.
Originally founded in 1920, the ACLU conducts extensive litigation on
Constitutional issues including privacy, and free speech. The ACLU
Washington office lobbies Congress for civil liberties and civil
rights issues. Email: infoaclu@aclu.org or Gopher aclu.org 322 Eighth
Ave, New York, NY 10001. Executive Director: Ira Glasser.

Voters Telecom Watch. NY based cyber-rights lobbying group. In 1994
lobbied against the FBI Wiretap bill and for relaxation of export
controls on cryptography. Affiliated with Society for Electronic
Access. Contact: shabbir@panix.com. gopher://gopher.panix.com/11/vtw/
http://www.panix.com/vtw/

Society for Electronic Access. NY-based electronic civil liberties
organization promotes "civil liberties and access in cyberspace".
Email: sea@sea.org or http://www.panix.com/sea. P.O. Box 7081, New
York, NY 10116-7081. (212) 592-3801. President: Simona Nass.

EFF-Austin. Austin, TX-based, electronic civil liberties organization
founded in 1990. Purpose is to engage in and support educational
activities that promote a clearer understanding of the social, legal,
and technical issues surrounding online telecommunications.  Contact:
eff-austin@zilker.net or (gopher/ftp).zilker.net.  Also see newsgroup
austin.eff. PO Box 18957, Austin, TX 78760. President: David Smith.

Cypherpunks. Informal group that develops technological solutions to
protect privacy. the Cypherpunks write cryptography and other
programs, set up anonymous remailers and discuss political and
technical issues. Meetings are also regularly held in California and
other states. Email: majordomo@toad.com, subscribe cypherpunks.
ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html


======================================================================
[2] Publications
=======================================================================

Privacy Times. Biweekly newsletter on information law. Each issue
covers developments related to privacy and information access,
including summaries of court decisions on the Freedom of Information
Act and other relevant statutes. Editor: Evan Hendricks. Address: P.O.
Box 21501, Washington, DC 21501. (202) 829-3660. Cost: $250/Year

Privacy Journal. A monthly journal on mainly US privacy, now in its
20th year of publication. Editor: Robert Ellis Smith. P.O. Box 28577,
Providence, RI 02908. (401) 274-7861 (tel). Cost: $109/year. The PJ
also publishes numerous books and compendiums on privacy including its
excellent yearly Compilation of State and Federal Laws.

International Privacy Bulletin. Published quarterly by Privacy
International. The IPB covers international trends and new
technologies. Each issue also includes reports from different
countries and reviews of new publications. Editor: Dave Banisar. 666
Penn. Ave, SE #301, Washington, DC 20003. (202) 544-9240 (tel). Cost:
$75/year individuals, $125 libraries, $200/year businesses.

Privacy and American Business. Published bi-monthly. Industry
perspective on privacy. Editor: Bob Belair. Bimonthly with special
issues. Two University Plaza, Suite 414, Hackensack, NJ 07601. (201)
996-1154 (tel). Cost: $395/year.

Full Disclosure. A monthly newspaper on surveillance and civil
liberties issues. Editor: Glen Roberts.  Box 734, Antioch, IL 60002.
(708) 395-6200. http://ripco.com:8080/~glr/glr.html. Cost: $29.95/year.

Low Profile. Asset protection and financial privacy. Published
monthly. Editor: Mark Nestman. P.O. Box 84910, Phoenix, AZ 85701.
702-333-5942 (tel). Cost: $149/year.

Privacy and Security 2001. Technical aspects of privacy and security.
Focuses on electronic surveillance and counter-measures with recent
assaults on privacy highlighted. Editor Jim Ross. 504 Shaw Road, Suite
222, Sterling, VA 20166. (703) 318-8600.  10/year. $35/year.

2600 Magazine.  Inside technical information on telephone and computer
network operations. Published quarterly. Editor: Emmanuel Goldstein.
Email 2600@well.com.  P.O. Box 752, Middle Island, NY 11953. Cost:
$21/year.

Privacy Law and Policy Reporter. A well written, law-oriented overview
of privacy developments in NZ and Australia. 10 issues/year. Level 11,
Carlton Centre, 55-63 Elizabeth Street, Sydney, NSW 2000, Australia.
61-2-221-6199 (tel). Cost: $AZ 345

Transnational Data and Communications Report. Bimonthly international
overview of privacy, data protection, telecommunications and
information access. Editor: Russell Pipe. P.O. Box 10528, Burke VA
22009-0528. Cost: $280/year.

Privacy Laws and Business. A quarterly comprehensive overview of
privacy issues in Europe. Focuses mainly on regulatory and data
protection from a business perspective.  Editor: Stewart Dresner.
Cost:  3 Central Avenue, Pinner, Middlesex HA5 5BT United Kindgom.
44-81-866-8641(tel). $UK 240/year.

Security Insider Report: News, Reviews, Opinion on security, privacy,
information warfare, hackers, phreaks. Editor Winn Schwartau.
Interpact Press, Inc.  Monthly. $99/Yr.

=======================================================================
[3] Net Sites
=======================================================================

ACLU On-line Reading Room. Files on civil liberties. ftp/gopher
aclu.org

CPSR Internet Library. Maintains the online archives for CPSR, EPIC
Privacy International and others. FTP/Gopher/WAIS/HTTP cpsr.org /cpsr

Cypherpunks. Archives on cryptography and other privacy technologies.
ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html ftp
ftp.csua.berkeley.edu

Electronic Frontier Foundation Archives. Archives on privacy, free
speech, underground newsletters. ftp: ftp.eff.org, gopher:
gopher.eff.org, WWW: http://www.eff.org

Electronic Privacy Information Center. Includes back issues of EPIC
Alert, privacy resources, legislation, and articles.
http://www.epic.digicash.com/. Gopher cpsr.org /cpsr/privacy/

Privacy Rights Clearinghouse. http://www.manymedia.com/prc/ E-mail:
prc@teetot.acusd.edu. Gopher: gopher.acusd.edu FTP:ftp.acusd.edu.
Telnet: teetot.acusd.edu (local> c teetot, login: privacy). BBS:
619-260-4670 (same login as telnet).

The Freedom Project. Files on free expression and privacy.
http://att2.cs.mankato.msus.edu/~hayden/freedom

Glass Houses on the Information Highway: Who Needs Privacy? Web page on
documents, groups and individuals on sides of privacy battles.
http://www.gatech.edu/lcc/idt/Miscellaneous/Glass_Houses/Privacy.html

Data Surveillance and Information Privacy Web Page. Extensive materials
on privacy of transaction materials and data matching.
http://commerce.anu.edu.au/comm/staff/RogerC/Dataveillance/RogersDV.html

UK Data Commissioner's Web page. Overview of UK Data Protection Act.
http://www.open.gov.uk/dpr/dprhome.html

The Norwegian Data Inspectorate (Datatilsynet). Web page of Norway
Privacy Commissioner. Mostly in Norwegian.
http://www.uio.no/~jonnyb/personvern/tilsyn.html

Swiss Data Protection Agency WWW page. In German, French and Italian.
http://www.eunet.ch:80/edsb/

Arge Daten. Web Site on Austrian Privacy. Mostly in German.
http://www.ad.or.at/

German Privacy Information from Humbalt University. Extensive collection
of German data protection information. All in German.
http://respa.rewi.hu-berlin.de:80/Datenschutz/

List of Reliable Anonymous Remailers.
http://www.cs.berkeley.edu/~raph/remailer-list.html. Can also be
obtained by fingering remailer-list@kiwi.cs.berkeley.edu.

Where to Get Pretty Good Privacy (PGP) FAQ.
ftp://ftp.netcom.com/pub/mp/mpj/getpgp.asc or send mail to
ftp-request@netcom.com with the line SEND mpj/getpgp.asc

=======================================================================
[4] Electronic Newsgroups and Mailing Lists
=======================================================================

***Unmoderated Newsgroups and mailing lists***

Alt.privacy. Unmoderated discussion on privacy. High traffic, low
content.

Alt.privacy clipper. Unmoderated discussion of the Clipper chip and
encryption policy.

Comp.org.cpsr.talk. Unmoderated discussion of issues related to the
Computer Professionals for Social Responsibility. Topics include
privacy, the NII, telecommunications reform and social implications of
technology.

Comp.org.eff.talk. Unmoderated discussion of issues related to the
Electronic Frontier Foundation.

Cypherpunks Mailing list. Discussion of cryptography and technical
protections of privacy. Warning: High Traffic (100+ messages/day).
Email: majordomo@toad.com

Sci.crypt. Unmoderated technical discussion of encryption.

talk.politics.crypto. Unmoderated discussion of the Clipper chip and
encryption policy.


***Moderated Newsletters and Digests***

EPIC Alert. Biweekly electronic newsletter of the Electronic Privacy
Information Center. Mail to listserv@cpsr.org. 1st line: subscribe
cpsr-announce. Back issues at cpsr.org /cpsr/alert and
http://www.epic.digicash.com/

CPSR-Global. A new CPSR sponsored mailing list on Global information
infrastructure issues. To subscribe, email listserv@cpsr.org with the
1st line: subscribe cpsr-global. Moderator: Marsha Woodbury.

Risks Digest. Moderated digest on risks to the public using computers
and related systems. Newsgroup: comp.society.risks.  Also available as
mailing list from  email: risks-request@csl.sri.com 1st line: SUBSCRIBE.
Back issues at ftp unix.sri.com /risks. Moderator: Peter Neumann.

Computer Privacy Digest. Moderated digest on privacy. Newsgroup:
comp.society.privacy.  at wam.uwm.edu. To subscribe, email:
comp-privacy-request@uwm.edu, 1st line "subscribe" Back issues
gopher://gopher.cs.uwm.edu, ftp: ftp.cs.uwm.edu/comp-priv. Moderator:
Len Levine.

Computer Underground Digest. Weekly moderated digest on computer
underground, privacy, free speech issues. Newsgroup:
comp.society.cu-digest. Email at LISTSERV@VMD.CSO.UIUC.EDU, 1st line:
SUB CUDIGEST <your name>. Back issues at etext.archive.umich.edu
/pub/CuD/. Moderator: Jim Thomas.

PRIVACY Forum.  Moderated digest on privacy sponsored in part by ACM.
For info, send message text: help to "privacy-request@vortex.com".
Back issues and other related materials via FTP at "ftp.vortex.com" in
"/privacy", by gopher at "gopher.vortex.com", or via WWW at
"http://www.vortex.com/". Moderator: Lauren Weinstein.

Comp.org.cpsr.announce. Moderated mailing list for CPSR. Includes EPIC
Alert, and other CPSR newsletters and releases. Also available as
mailing list. See EPIC Alert for subscription info.

VTW Announce. Moderated mailing list of Voters Telecomm Watch. Email
listproc@panix.com, 1st line of the message: SUBSCRIBE VTW-ANNOUNCE
<your name>.

Red Rock Mailing List. Distributes the Network Observer monthly
newsletter. Email: rre-request@weber.ucsd.edu.  with the Subject:
subscribe Jane Doe.

=======================================================================
[5] Upcoming Privacy Related Conferences and Events
=======================================================================

National Net '95: Reaching Everyone. Washington, DC.  Apr. 5-7, 1995.
Sponsored by EDUCOM.  The privacy panel will include Brock Meeks
(CyberWire Dispatch), Bob Gellman (information and privacy policy
consultant), Lance Hoffman (George Washington University), and Don
Haines (ACLU). Contact: net95@educom.edu or call 202/872-4200.

Security on the I-WAY. Arlington, VA. Apr. 10-11. Sponsored by
National Computer Security Assn. Contact: 74774.1326@compuserve.com

Information Security and Privacy in the Public Sector. Hyatt Dulles,
VA. Apr. 19-20, 1995. Sponsored by AIC Conferences.  Speakers include
Joan Winston (OTA), Lynn McNulty (NIST), Marc Rotenberg (EPIC),
Dorothy Denning (Georgetown University), David Banisar (EPIC) and Jim
Bidzos (RSA). Contact: Scott Kessler 212/952-1899 x308.

Health Care, Privacy @ Cyberspace. Desmond Hotel, Albany, New York.
June 21-22, 1995. Sponsored by the Institute for the Advancement of
Health Care Management and the Government Law Center of Albany Law
School.  Contact Debra Sottolano ds3789@albany.edu.

INET '95. Honolulu, HI. June 28-30, 1995. Sponsored by the Internet
Society. Speakers on privacy include Frank Tuerkheimer (University of
Wisconsin School of Law.). Contact inet95@isoc.org.

Key Players in the Introduction of Information Technology: Their
Social Responsibility and Professional Training. July 5-6-7, 1995.
Namur, Belgium. Sponsored by CREIS. Contact: nolod@ccr.jussieu.fr.

DEF CON III. August 4-6, 1995. Las Vegas. Major hacker conference.
Contact: dtangent@defcon.org or http://dfw.net/~aleph1/defcon

Advanced Surveillance Technologies. Sept. 4, 1995. Copenhagen,
Denmark. Sponsored by Privacy International and EPIC. Contact
pi@privacy.org.

17th International Conference of Data Protection and Privacy
Commissioners. Copenhagen, Denmark.  September 6-8, 1995.  Sponsored
by the Danish Data Protection Agency.  Contact Henrik Waaben, +45 33
14 38 44 (tel), +45 33 13 38 43 (fax).

Managing the Privacy Revolution. Privacy & American Business. Oct.
31 - Nov. 1, 1995. Washington, DC.  Speakers include C.B. Rogers
(Equifax). Contact Alan Westin 201/996-1154.

          (Send calendar submissions to Alert@epic.org)

=======================================================================

About The Electronic Privacy Information Center

The Electronic Privacy Information Center is a public interest
research center in Washington, DC.  It was established in 1994 to
focus public attention on emerging privacy issues relating to the
National Information Infrastructure, such as the Clipper Chip, the
Digital Telephony proposal, medical record privacy, and the sale of
consumer data.  EPIC is sponsored by the Fund for Constitutional
Government and Computer Professionals for Social Responsibility. EPIC
publishes the EPIC Alert and EPIC Reports, pursues Freedom of
Information Act litigation, and conducts policy research on emerging
privacy issues.  For more information, email info@epic.org, WWW at
HTTP://epic.digicash.com /epic or write EPIC, 666 Pennsylvania Ave.,
SE, Suite 301, Washington, DC 20003. (202) 544-9240 (tel), (202)
547-5482 (fax).

The Fund for Constitutional Government is a non-profit organization
established in 1974 to protect civil liberties and constitutional
rights.  Computer Professionals for Social Responsibility is a
national membership organization of people concerned about the impact
of technology on society.  For information contact: cpsr-info@cpsr.org

If you'd like to support the work of the Electronic Privacy
Information Center, contributions are welcome and fully
tax-deductible.  Checks should be made out to "The Fund for
Constitutional Government" and sent to EPIC, 666 Pennsylvania Ave.,
SE, Suite 301, Washington DC 20003.

Your contributions will help support Freedom of Information Act
litigation, strong and effective advocacy for the right of privacy and
efforts to oppose Clipper and Digital Telephony wiretapping proposals.

Current FOIA cases include: EPIC v. National Security Council (effort
to uncover information surrounding Security Policy Board, see article
above), EPIC v. FBI (effort to obtain information justifying wiretap
legislation), CPSR v. National Security Agency (records relating to
Clipper and NSA decision to classify public documents), CPSR v.
National Institute of Standards and Technology (records regarding
development of Digital Signature Standard), and CPSR v. Secret
Services (activities of Secret Service in beak-up of 2600 group at
Pentagon City)

Thank you for your support.

------------------------------

Date: Wed, 5 Apr 1995 18:32:43  (CDT)
From: Metalhead <metal@MAGELLAN.CLOUDNET.COM>
Subject: File 2--ANNOUNCE: DEF CON ]I[ (Normal)

This is _not_ the professional sounding announcement.  Use that one to con
your boss / employers out of the cost of the trip.  The professional
announcement will be available on the FTP site and other more serious mailing
lists and news groups, etc.  This is the k-RaD kriminal shout out to all u
el1te hacker types that aren't in jail to attend 'da def con.  werd.

READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE

What's this?  This is an initial announcement and invitation to DEF CON III,
a convention for the "underground" elements of the computer culture.  We try
to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
Groups, CypherPunks, Futurists, Artists, Criminally Insane, Hearing Impaired.

WHO:   You know who you are, you shady characters.
WHAT:  A convention for you to meet, party, and listen to some speeches
       that you would normally never get to hear from some k-rad people.
WHEN:  August 4, 5, 6 - 1995 (Speaking on the 5th and 6th)
WHERE: Las Vegas, Nevada @ The Tropicana Hotel

So you heard about DEF CON II, and want to hit part III?  You heard about the
parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
check it out in person?  You want to do weird shit _away_ from the hotel
where you can't get me in trouble?  Then you're just the person to attend!

Sure it's great to meet and party with fellow hackers, but besides that we
try to provide information and speakers in a forum that can't be found at
other conferences.  While there is an initial concern that this is just
another excuse for the evil hackers to party and wreak havoc, it's just
not the case.  People come to DEF CON for information and for making
contacts.  We strive to distinguish this convention from others in that
respect.  Plus this year we have official DEF CON GOONS(c) who will pummel
you until you pass out should you cause problems for other con.friendly
people!  Big Brother loves you!

What's been said (Only the good stuff will be quoted, of course)

  Stevyn - "What can eye say, it was intense! . . . the whole con just
     kicked ass!  I totally recommend you check out the next one."

  Gail Thackeray, Prosecutor, "It's partly an entertaining party, it's
     partly a fashion statement.  But it's mostly something about which the
     business world has no clue."

  Wendy Murdock, Boardwatch, "Def Con represents the tug-of-war that has
     always been present - people strive to get that which is just out of
     reach, aggravating governments and breaking rules in the process."

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

WHERE IT IS:

The Tropicana has rooms reserved for the convention.  Rooms are expensive.
They are even more expensive if you don't book under the convention.  If it
is to expensive for you, please see the section below on Las Vegas WWW sites
that can provide you with information on other nearby hotels that are cheaper.
Check-in is 3 pm, check-out time is 12 noon.  Remember there is an 8% sales
tax in Vegas.

               65$ Single or Double room, Midweek (Monday - Thursday)
               90$ Single or Double room, Weekend (Friday - Sunday)
               350$ One-Bedroom Suite (Call for Availability)

     The Tropicana, 3801 Las Vegas Blvd. So., Las Vegas, Nevada, 89109
          (702) 739-2581 or (800) 468-9494 or (702) 739-2448 (Fax)

Held in three conference rooms at the Tropicana hotel in Las Vegas, DEF CON
promises to be interesting.  The Tropicana has a huge pool (largest in the
world?  Anyway, lots of cool movies have been filmed with this pool in them)
and in August Vegas should be about 100(f) degrees at one in the morning.
What do you care?  You'll be wired on caffeine and not sleeping anyway.  There
are numerous attractions in town from the strip bars to the local COs in case
you seek distraction.

The Tropicana is located right on the "Strip" with the other three corners of
the street occupied by the MGM Grand (Largest hotel in the world), the
Excalibur, and the Luxor (The big sense-net pyramid).  If you can afford it
I totally recommend spending some extra time in town.. there are too many
cool things to do, especially if you have never visited.  Heck, last time I
got to rent and fire uzi's and MP-5 machine guns (OK, so you can do that for
cRacK in Los Angeles) see some strippers, and drink 1$ bottles of imported
beer.  What a place!  Now you know why I chose Vegas for a location.



                               SPECIAL EVENTS

This year there will be a number of special events going down, including:

[> Hacker Jeopardy       [> Spot the Fed Contest       [> Voice bridge
[> Giveaways             [> A Red Box Creation Contest [> A Video Room
[> Cool Video Shit       [> Scavenger Contest          [> Who knows?

                                   COSTS

The price of admission will be 30$ in advance (See the end of this
announcement the address to pre-register to) or 40$ at the door.  This will
include your goovie 24bit color name tag and a conference program.

Don't forget to factor in Hotel costs, (The more people you crash with, the
cheaper it is) gas, food, gambling, booze, strippers, bail, etc.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

                                   SPEAKERS

This is a partial list of speakers for this year.  More are being invited
or waiting to make plans.  As this list changes further announcements will
be made.  This should give you a flavor or what to expect, though.

[> Bruce Schneier, Author of "Applied Cryptography" and "" TOPIC: Will speak
   on issues surrounding cryptography, digital authentication, digital cash,
   and will answer questions from the audience.

[> John Perry Barlow

[> Winn Schwartau, Author of "Information Warfare" and "Terminal Compromise"
   is a consultant to government and the private sector regarding enterprise
   and national security concerns.  TOPICS: "Information Warfare, the year
   in review" (Comedic) and "Tempest Attack Videos."

[> Len Rose AKA Terminus
   After the legal fiasco Len faced years ago (as partially chronicled in
   "The Hacker Crackdown.") this will be his first chance to speak of his
   experiences without the threat of having his parole revoked.  TOPIC: To
   be decided later.

[> Chris Hall of Executive Protection will be demonstrating a fully
   equipped "A-Team" van, a fully loaded spy mobile with all types of cool
   interception and surveillance goodies.  Last year his talk included an
   overview of surveillance techniques.  TOPIC: To be decided later.

[> Theora, a veteran of DEF CON II, will be presenting another speech
   this year.  Topics to include security and anonymous activity on the
   net.  Last year she organized a round table discussion with Phillip
   Zimmermann and the Presence and focused on security issues of encryption
   and privacy expectations.  TOPIC:  Not revealed to me yet.  Doh!

[> Curtis Karnow, former federal prosecutor and attorney focusing on
   intellectual property litigation and computer law.  TOPIC: Agents in the
   telecommunications context, and "smart" software that we 'trust' to do the
   Right Thing.  The specific issue is legal liability and responsibility for
   the actions of intelligent agents, and then spinning off to chat about the
   liability for artificial intelligence generally.

[> Robert D. Steele, President of OPEN SOURCE SOLUTIONS, Inc.  A former Spy,
   Experienced Bureaucrat, Radical Visionary.  Tofflers call him the "rival
   store" to CIA.  Keynote Speaker at HOPE, Workshop at Hac-Tic '93.

[> The Electronic Frontier Foundation (EFF) will cover current legal threats
   privacy and computer information networks.

Speakers will be talking Saturday and Sunday, and maybe Friday depending.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

                                 SPECIAL EVENTS

So you think you're so damn smart, eh?  Think your shit doesn't stink?
Right. Think you got one up on the Feds, huh?  Well, now's your chance to
prove it smarty-pants.   Winn Schwartau will take command and moderate.

                           ! A N N O U N C I N G !

                        H A C K E R   J E O P A R D Y

That's right.  You can now prove how smart you really are.  Get up on stage
and question a few answers, pile up the points  . . . and win big!

You know the game.  You know the rules.  Now all you have to do is have the
guts, get up on stage in front of your peers and the narks and show us all!

When?  After Dark Tangent's opening speech (which we're all really looking
forward to . . . [yawn]  HACKER JEOPARDY starts!

                         MIDNIGHT - DAY 1 of DEF CON (Friday)

If you wanna play . . . show up.  If you don't wanna play, show up.

There will be three rounds of three people.  Just like real. The winners of
each round will go into the Finals and the winner of that will win 25,000
units of some foreign currency!  From Dark Tangent himself!  Plus:

     - A T-shirt three sizes to small for the women.
     - No T-shirts for the men.
     - Silk jackets for everyone.
     - One Heineken per player per round at DT's expense.
     - Round trip directions to Hoover Dam.
     - Phiber Optik's home address.
     - Erik Bloodaxe's Blood Samples.
     - And more . . .

Contestants will be picked at random from a pool of those who want to play.
If you don't wanna play, don't enter the contest.  Only the elite survive!

FEDS:  If you get picked to play, and we ask you what your job is, YOU HAVE
TO TELL THE TRUTH!  If you don't, our custom Fed-O-Meter will detect your
lies and off to the casinos you go!

Potential categories for questions include:

- - Famous Busts  - Famous Narks  - UNIX Bugs  - Telco Tech  - "Hacking"
and beware of the killer daily double.  Bribing the judge is acceptable.

EMail your suggested questions and answers to winn at winn@infowar.com

So, in the inimitable words of Al Bundy . . .  LET'S ROCK!


                       3rd ANNUAL SPOT THE FED CONTEST
                         Spot the fed, win the shirt

"Like a paranoid version of pin the tail on the donkey, the favorite sport
at this gathering of computer hackers and phone phreaks seems to be hunting
down real and imagined telephone security and Federal and local law
enforcement authorities who the attendees are certain are tracking their
every move.. .. Of course, they may be right."  John Markhoff, NYT

Basically the contest goes like this:  If you see some shady MB (Men in
Black) earphone penny loafer sunglass wearing Clint Eastwood to live and
die in L.A. type lurking about, point him out.  Just get my attention and
claim out loud you think you have spotted a fed.  The people around at the
time will then (I bet) start to discuss the possibility of whether or not a
real fed has been spotted.  Once enough people have decided that a fed has
been spotted, and the Identified Fed (I.F.) has had a say, and informal vote
takes place, and if enough people think it's a true fed, or fed wanna-be,
or other nefarious style character, you win a "I spotted the fed!" shirt,
and the I.F. gets an "I am the fed!" shirt.

Note to the feds:  This is all in good fun, and if you survive unmolested
and undetected, but would still secretly like an "I am the fed!" shirt to
wear around the office or when booting in doors, please contact me when no
one is looking and I will take your order(s).  Just think of all the looks
of awe you'll generate at work wearing this shirt while you file away all
the paperwork you'll have to generate over this convention.  I won't turn in
any feds who contact me, they have to be spotted by others.


             TELEPHONE CONFERENCE BRIDGE (801-855-3326)

For DEF CON III there will be a dial in conference set up.  If you are
overseas, or just too poor to make it to the convention this year, you can
still get an idea of what is going on and participate.  One part of the voice
conference equipment will allow you to listen to the convention room
microphone, another will allow you to ask questions during the Q&A sections
of peoples speeches.  A general conversation area will be up so you can chat
with others at the convention, or just others dialed into the bridge.
Navigate through the voice mail maze and get free phone sex!  Impress others!

The Voice bridge is up now at 801-855-3326.  It has 5 analog ports, but in a
few weeks will have eight digital ports for better sound, etc.

                     SPOOAH DOOPAH RAFFLE GIVE AWAY!@#

Throughout the convention, between speakers and events there will be a raffle
giveaway in which if your number is drawn, you win the prize.  Last year's
giveaway included an ancient kaypro monochrome portable, a roll of Sprint
"security" tape, "Computer Warriors" evil anti-virus cartoon, a 240 meg IDE
HD, and other elite things.

>> All the prizes given away are donated by other convention goers, so if <<
>> you have any stuff to give away, please save and donate it to the con! <<

                       RED BOX BUILDING CONTEST

While we don't encourage or condone the use of toll fraud devices, we do
encourage creativity and expression of thought.  We combine these and come
up with a red box creating contest.  The final device doesn't have to
produce the real red box tones (can't have people getting arrested) BUT it
does have to produce some audible tones, any kind of tones.  This contest
is inspired by last year's give away of a red box "Big Red" that looked just
like a big pack of Big Red gum, but really was a red box.  Elite!  There was
also a little girl's doll that was a red box, but the switch for that one was
hidden under the dress and, well, it just wasn't given away.

Come up with unique ideas!  With just a Hallmark card and some spare time you
can create an elite 007 style tone generating device!  What will you win if
yours is chosen as the most k-rad besides the envy of fellow hackers?  You'll
get a tee shirt and the cost of admission to the convention refunded PLUS
some as-of-yet undecided prize.  I bet you just can't wait to burn your
fingers with your soldering iron now!

                                THE VIDEO ROOM

In one of the rooms a LCD wall projector will be hooked up connected to a
VCR, and people can bring flicks to play.  Stuff like Max Headroom, War Games
etc.  You know, the cool cheesey stuff.  Also some "hacker" videos will be
shown.  If you have something you wanna show, bring it along.  When the
projector is needed in the main conference room it will be swiped for the
duration.

                                COOL VIDEO SHIT

At this time we are working to see if a T1 connection is possible.  If it is
there will be a cu-see me connection set up with multiple video cameras in
various locations.  Images will also be added automatically to a WWW page for
people to snag.  As all this works itself out there will be further
announcements.  No, there will be no "Hack our server" contests, and there
will be "Security Professionals" with "Diagnostic Tools" to "Correct" any
people who may cause the network problems.

                               SCAVENGER CONTEST

A scavenger contest is being planned.  The person or group with the most
number of items on the list wins the prize.  (Prize undetermined as of yet)
and there will be a few follow up prizes.  Don't forget to carry massive
amounts of water as you run about the concrete jungle, dehydration can
happen just crossing the street.  This is a contest for only the most k-rad.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

                             WHAT YOU CAN DO TO HELP

DEF CON III will be planned right up until the last minute, with problems
being fixed and new things being added all along.. a sort of work in progress
that you get to witness in person when you show up.  Hopefully it won't be
too messed up when presented to the public.  What can you do to help?

=> Please help generate questions for Hacker Jeopardy.  Come up with some
   questions and answers, and Winn will decide which ones to use.  Mail 'em
   to winn@infowar.com.

- -> We are looking for people to speak on Personnel Information Gathering and
   selling.  Hopefully a speaker (who could remain anonymous) in this area
   has experiences in gathering and selling such information.  If you know
   of such a person, please invite them to contact me or let them know we
   are looking for such speakers.

- -> We are looking for some people to submit artwork to be used in the
   convention someplace.  It could be a poster, or in the program.  Black
   and white art would be eligible for the program only.

- -> Articles and interesting FTP sites, WWW pages, mini FAQs, etc. are all
   wanted for the program.  Quality articles that are informative and apply
   to the theme of the convention.  Scanner frequency lists,


:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

                         MORE DEF CON INFORMATION

The World Wide Web Page is located at: http://underground.org/defcon/

FTP Site: ftp.fc.net /pub/defcon

Mailing lists: mail majordomo@fc.net with the following statement in the body
of your message: subscribe dc-announce    This will set you up on the mailing
list and you will receive updated information, information on the other
mailing lists offered, etc.  I suggest joining the dc-stuff list just so you
can talk and plan with other people going to the con to coordinate rides,
sharing of rooms, etc.

Voice or Voice Mail:  0-700-826-4368 from a phone with AT&T LD.
                     or 206-626-2526

E-Mail: dtangent@defcon.org (The Dark Tangent)

Snail Mail: 2709 E. Madison #102, Seattle, WA, 98112

BBS System to call for info if you don't have net access:

Alliance Communications - +1 612 251 2511,,66 - USRobotics HST DS 16800
Problems connecting to Alliance?  Email metal@geeks.org

Voice Bridge Chat System: 801-855-3326

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

                    INFORMATION ABOUT LAS VEGAS

NEWS GROUPS

Please note the following newsgroups may or may not be designated for local
distribution (Distribution: Vegas and/or nv), and is intended for all
systems in the Las Vegas area or those interested in same on the same level
as the la, ca, ba, ny, nyc, and other similar local higherarchies:

vegas.bi                Talk for bisexually natured persons
vegas.config            Configuration discussions for the higherarchy
vegas.food              Anything about food in Las Vegas
vegas.for-sale          For Sale/Want ads (no commercials, please!)
vegas.general           General discussion
vegas.jobs              Jobs offered and wanted in Las Vegas
vegas.motss             MOTSS community talk
vegas.personals         Personal ads - any nature
vegas.singles           Talk for singles
vegas.test              Group to test post to

WWW PAGES about Las Vegas, Hotels, Things to do, etc.

HTTP://www.infi.net:80/vegas/online/
HTTP://www.ocf.berkeley.edu/~iew/index.html
HTTP://www.best.com/~rdc/roger/vegas.html
HTTP://www.intermind.net/las.vegas.on-line/homepage.html

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

                                 STUFF TO BUY

Stuff is for sale from DEF CON I and II in case you are interested.  From the
first year we have audio tapes (4 90 minute tapes) for $20 and the second
year (10 90 minute tapes) for $30.  Descriptions of these tapes are below.

DEF CON I Tapes (4) include the following speakers:

Ray Kaplan, Curtis Karnow, Gail Thackeray, Dead Addict, Dark Druid, Judi Clark
Dan Farmer, and Dr. Mark Ludwig.

DEF CON II Tapes (10) include the following speakers:

Phillip Zimmermann : Keynote Speaker, PGP.
Gail Thackeray : Response to Mr. Zimmermann and Privacy issues.
Chris Hall : Electronic Surveillance.
Curtis Karnow : Recombinant Culture, Crime in the Digital Network.
Dr. Mark Ludwig : Virus Creation Awards and What to do when the Feds come.
Judi Clark, Mara, Fen and Marianne in a Round Table Discussion.
The Dark Knight : Hacking in the UK
Sara Gordon, Mark Aldrich, Phil Zimmermann: Internet and PGP privacy concerns.
Annaliza (Torquie) : The European Underground scene.
Mark Lottor : Various cellular topics.
Winn Schwartau : HERF guns, Van Eck, Information Warfare
Peter Beruk : The role of the SPA, general Q&A.
Padgett Peterson : Anti-Virus writing, Cleaning up other peoples messes.
The Jackal : A basic radio overview with Q&A.
Artimage : Underground spoof and give aways.
Stephen Dunifer : Radio Free Berkeley and pirate media.
Damien Thorn : Random Cell information from the late night tech talks.

SHIRTS are still available to buy.  The ones remaining are long sleeve white
with the choice of two styles.  Both styles have a three color logo on the
front (Red, Gray, Black) with "DEF CON".  The back is either a list of
strange grep key words and "inside" keywords with "Why?  Because I can." at
the top.  Back #2 is the same back as DEF CON I with the old and "new" 4
Amendment as stated by J.P. Barlow with "Protect your rights, Encrypt your
data..." at the top.  The back on this style is two colors.. black lettering
framed in light gray for better definition.  Shirts are $20.

SHIPPING : If you buy anything, please include 2.90 for priority shipping.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

                                LAST AND LEAST

OK!  Your almost ready to go.  Now here is an E-Z to follow checklist of
things you should take care of before throwing caution to the wind and
bailing out to the dangerous and sexy-wrong world of Las Vegas.  In the
words of one famous (and abused) phone system: "Sit up straight, PAY
ATTENTION, Listen to what your being told. (Now try again)"  (Whoever can
identify that phone system first gets in free)

                    StUPh 2 D0 b3fore the C0nvent1ion:

_  Check out inpho about Vegas so you know what you wanna do.
_  Get a hotel room or some crash pad.
_  Bring $40 for admission or pay $30 in advance.
_  Bring your PGP key on disk to key sign with others.
_  Bring Laptop, laplink, serial, and bizarre gender changer cables.
_  Bring things to donate for the give-away raffle.
_  Leave massively incriminating evidence at home.
_  Police scanners can provide hours of fun in Vegas.
_  Bring interesting videos to play in the video room.
_  Caffeine and snacks are fun to eat.
_  Don't forget any drugs or medication you may need.
_  You won't need saline for your contact lenses, you won't be sleeping.
_  Anything you promised your friends you would bring for them.
_  Join the mailing list and arrange rides or rooms with others in advance.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

                                 MY PGP KEY

                       This is the unsigned version
        My signed version is available on the public key-servers

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.1

mQCNAy6v5H8AAAEEAJ7xUzvdRFMtJW3CLRs2yXL0BC9dBiB6+hAPgBVqSWbHWVIT
/5A38LPA4zqeGnGpmZjGev6rPeFEGxDfoV68voLOonRPcea9d/ow0Aq2V5I0nUrl
LKU7gi3TgEXvhUmk04hjr8Wpr92cTEx4cIlvAeyGkoirb+cihstEqldGqClNAAUR
tCZUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
=ngNC
- -----END PGP PUBLIC KEY BLOCK-----

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

                      WHY IS THE ANNOUNCEMENT SIGNED?

Well, last year it came to my attention that some unknown person in
California had modified an announcement and was having people mail their
pre-registration money to them instead.  It was actually pretty funny.  Only
one person was fooled and lost 10$.  Not bad.  I knew something was up when
he said he had pre-registered for 10$ and had the receipt I had supposedly
mailed back.  I am never that organized!  To avoid potential problems like
this one please verify this announcement!@#  My key is available for
verification on public key servers, and my key-id is 46A8294D.  The
other key you will find on servers may be my older 1284bit key, which is
still good, but just not used to sign this text.

((PGP Sig and stuff deleted by CuD editors for parsimony--available
on request))

------------------------------


------------------------------

Date: Sun, 19 Mar 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 3--Cu Digest Header Info (unchanged since 19 Mar, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CUDIGEST <your name>
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         In ITALY: Bits against the Empire BBS:  +39-464-435189
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
                  ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.29
************************************