Computer underground Digest Wed July 28 1993 Volume 5 : Issue 56 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Coop Eitidor: Etaoin Shrdlu, Senior CONTENTS, #5.56 (July 28 1993) File 1--Akron Anomaly BBS UpDate (Seizure Warrant) File 2--Call for Paper: Computer Network Use and Abuse Conference File 3--Credit Reports and National File 4--UPDATE #19-AB1624: PROGRAMMERS! START YOUR ENGINES! File 5--Community Network Survey Results Available Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020 CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893; In ITALY: Bits against the Empire BBS: +39-461-980493 ANONYMOUS FTP SITES: UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud halcyon.com( 202.135.191.2) in /pub/mirror/cud aql.gatech.edu (128.61.10.53) in /pub/eff/cud AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. EUROPE: nic.funet.fi in pub/doc/cud. (Finland) ftp.warwick.ac.uk in pub/cud (United Kingdom) COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: 26 Jul 93 11:48:32 EDT From: David Lehrer <71756.2116@COMPUSERVE.COM> Subject: File 1--Akron Anomaly BBS UpDate (Seizure Warrant) ((MODERATORS' NOTE: The AKRON ANOMALY BBS was raided last summer because of allegedly "pornographic" files it possessed (for background, see CuD #5.23). Subsequent events indicated that the raid was an excessive exercise in local law enforcement zeal. Under pressure, the sysop pleaded guilty to a minor misdemeanor charge to avoid costly legal entanglements. But, the case continues to raise issues, and CuD will address some of these in a forthcoming issue. The following is an update on the case)). =-=-=-=-=-=-= Akron Anomaly =-=-=-=-=-= Newsgroups: akr.newsadmin,cle.general,oh.general,news.admin.policy,comp.org.e There have been some recent developments in the Akron Anomaly case. Briefly, some materials have been returned to Mark Lehrer, sysop of The Akron Anomaly BBS. These materials do not include any of the email that was on the system at the time it was seized approximately one year ago. The email is being held by the Ohio Bureau of Criminal Investigation. =-=-=-=-= This file contains: <1> Description of property to be searched and seized (from search warrant). <2> Excerpts from the transcript of court proceedings, related to the hardware to be forfeited. <3> List of seized material (from David Lehrer). <4> Notice from chief Stahl that returned software can be picked up. <5> List of actual items returned (from David Lehrer). <6> Letter from chief Stahl saying the Ohio Bureau of Criminal Investigation has everything else. =-=-=-=-= <1> Description of property to be searched and seized (from search warrant). Quote: PROPERTY TO BE SEARCHED AND SEIZED Computer(s) used to operate the Akron Anomaly Bulletin Board and data contained in them, computer disks and/or tapes containing data involved in the operation of the Akron Anomaly Bulletin Board, records of users of the Akron Anomaly Bulletin Board and the items they have uploaded to or downloaded from the Akron Anomaly Bulletin Board, financial records related to the operation of the Akron Anomaly Bulletin Board, and other associated items including but not limited to modems, disk drives, printers and software programs. %executed June 18, 1992% =-=-=-=-= IN THE COURT OF COMMON PLEAS COUNTY OF SUMMIT STATE OF OHIO, ) CASE NO. 92-07-1789 ) Plaintiff, ) Robert Incorvati ) Assistant Summit County vs. ) Prosecutor ) MARK LEHRER, ) Donald S. Varian ) Attorney at Law Defendant. ) - - - Visiting Judge Presiding: Lorain, Ohio--Robert J. Corts TRANSCRIPT OF PROCEEDINGS March 8, 1993 %excerpts% MR. INCORVATI: %prosecutor's explanation of reducing two 2nd degree felonies to a 1st degree misdemeanor% The State of Ohio is also in possession of Mr. Lehrer's >computer system. It's my understanding that is currently in >possession of BCI and according to Rule 11F negotiations will be forfeited to BCI in Columbus. THE COURT: Now, I'm not sure I understand the charges. Pandering obscenity? MR. INCORVATI: The original charge, that's correct. THE COURT: Was that done by means of computer, is that what I understand? MR. INCORVATI: Exactly, exactly. It was a computer, computer log- on network that was available, and at the time it appeared that information that may have been accessible to that or through some work been accessible to it may have involved minors. With respect to the State's case, there is indeed question as to whether in fact that is a provable point, whether the minors were involved on that. THE COURT: etc. . . . --Continued-- THE COURT: Very well. MR.VARIAN: Thank you, Your Honor. I would only add, I think, we have agreed to the facts as have been presented other than I think >there are unrelated soft disks, floppy disks that would be >returned to the defendant that are unrelated to any sexual related >matter. > The hardware, I think, is what we agreed would go to the >Bureau of Criminal Identification. I think further that it's the prosecutor's position, and correct me if I'm wrong, that we would be entering a plea to a misdemeanor and they are not requesting any jail time or any probation. If that is the fact, at this time we are prepared to enter a plea of guilty to possession of criminal tools and -- attempt to possess criminal tools. MR. INCORVATI: Attorney Varian is correct. >THE COURT: So I understand, what needs to be forfeited >specifically? >>MR. INCORVATI: The hardware itself, if you will. >THE COURT: What is that? MR. INCORVATI: Specifically, I don't know. I can tell you that it is a computer system. THE COURT: Could you tell me? >MR. VARIAN: My client would know the very best, but it's >basically a computer, a disk drive, a -- is there a printer there >-- and a printer. >MR. INCORVATI: Also have the monitor and keyboard as well. MR. VARIAN: Correct. >>THE COURT: There is not going to be any difficulty with >>identifying -- MR. VARIAN: They already have it. >MR. INCORVATI: In fact, we are in possession of it. In fact, also as attorney Varian states, we are in possession of some of the software associated with that, that is available for the defendant to pick up. THE COURT: %continuation of the plea% . . . =-=-=-=-= <3> List of seized material (from David Lehrer). MISSING ITEMS LIST: for reference: PROPERTY LISTED BY STEVE STAHL THAT HE TOOK FROM THE HOME OF DAVID LEHRER, 58 BERMONT AVE., MUNROE FALLS, OH, ON 6/18/1992 UNDER THE GUISE OF THE ABOVE SEARCH WARRANT--THIS LIST AS WRITTEN BY STAHL. ---------------------------------------------------------- Page 1- ITEM # Quantity Description of property taken 1 1 US Robotics Modem 2 1 Home Built Computer 3 1 Loop Monitor 4 1 IBM Keyboard 5 1pk of 10 3.5 DD Diskettes 6 1 Epson Printer 7 1 Leaquer Int Corp (mouse) 8 1 Archive Corp Drive (cartridge tape) ---------------------------------------------------------- Page 2- Item # 9 Misc. Wires 10 1- 5 1/4 Disc w/viruses 11 3- 3M DC 600A Data Cartridge Tapes 12 1- Letter w/check (fee) 13 1- OS2 IBM Operating System 14 1- Notebook w/documentation 15 1 pkg w/198 3 1/2 discs 16 1 pkg w/3 cases 210 5 1/4 discs 17 1 case w/59 5 1/4 discs 18 1 case w/89 5 1/4 discs 19 1 bag w/misc. records ---------------------------------------------------------- LIST OF ITEMS THAT SHOULD HAVE BEEN RETURNED: PART A: Itemized List 1. Line Item 10: "1- 5 1/4 Disc w/ viruses" These are anti-viral programs Mark uses in his normal work activities. Stahl wouldn't recognize a 'virus' program if it bit him. 2. Line Item 11: "3- 3M DC 600A Data Cartridge Tapes" These had NO 'sexually related' matter of any kind on them. 3. Line Item 12: "Letter w/check (fee)" This is NOT 'sexually related' matter. 4. Line Item 13: "OS2 IBM Operating System" This is Mark's REGISTERED copy of IBM OS/2 Operating System. Mark is an IBM-approved beta test site for IBM's OS/2 software. 'They' returned Mark's BACKUP discs of OS/2. IBM takes a very dim view of use of mis-appropriated REGISTERED software. (and this case is posted all over their own internal network--at their request) 5. Line Item 14: "1- Notebook w/documentation" This is NOT 'sexually related' matter. 6. Line Item 19: "1 bag w/misc. records" This is NOT 'sexually related' matter. 7. Line Items 15-18: a) 5 diskette storage cases. b) Approximately 300 of the more than 560 diskettes taken contained NO 'sexually related' matter whatsoever. They DID contain an enormous library of entirely 'shareware' programs. PART B: Things Taken But Not Documented List IMPORTANT: --we want four items returned that Stahl took, but did NOT DOCUMENT on his seizure inventory list: 1) ALL E-mail of the several hundred Akron Anomaly users improperly and (my opinion) illegally taken, examined and kept by Steve Stahl. Also all FidoNet E-mail in automatic transfer and/or storage when Stahl 'pulled the plug'. 2) All copies made of data from the Akron Anomaly. Disclosure of all existent copied data and its location prior to its return. 3) The listing file from the hard disk of all users of the Akron Anomaly. 4) The detailed library file from the hard disk that identifies each of the diskettes taken by Stahl. i.e. precisely those that are shareware library and those that are input area backups. Backup copies of this missing data probably exist, either in Stahl's department or OBCI (or BOTH). I can't imagine them not making copies when checking out software that could have an auto- destruct feature. =-=-=-=-= <4> Notice from Chief Stahl that returned software can be picked up. Quote: May 5, 1993 "Bureau of Criminal Identification and Investigation has returned to us certain software that they have determined is to be returned to you. You need to come to the police station Monday - Friday, 7:30AM - 3:30PM to pick up and sign for this property." [signed: Steve Stahl] =-=-=-=-= <5> List of items actually returned (from David Lehrer). The items 'returned' by OBCI were picked up and signed for at the Munroe Falls police station on Friday, June 18, 1993 by Mark Lehrer and his father David, with an attorney accompanying to oversee this activity. Items received Friday June 18th were: 53 diskettes 27 unopened/blank 16 with a commercial label i.e. DeScribe, Sierra 10 of OS/2 software backups 1 coaster for cold drinks Period. NO E-mail was returned. =-=-=-=-= <6> Letter from Chief Stahl saying the Ohio Bureau of Criminal Investigation has everything else. Quote: June 21, 1993 Mr. Mark Lehrer 58 Bermont Ave. Munroe Falls, Ohio 44262 Dear Mr. Lehrer, I appreciate you coming in to pick up your property on June 18, 1993. I did want to advise you that we have no more of the equipment that was seized. The rest of it was turned over to BCI. Based on your notation, it appears you feel you are entitled to other materials. We were told by the prosecutor's office that we would receive a list of items you felt you were entitled to upon completion of the case. The case was disposed of on March 8, 1993. To date we have received no list. On May 4, 1993 any re- maining equipment we had in our evidence was turned over to BCI pursuant to the court ordered disposition. If you feel additional items need to be returned, I suggest you contact them at P.O. Box 365 London, Ohio 43140, Attn: Investigations Supervisor. Sincerely, signed Steve Stahl COMMENT: Not even attorney Varian had heard of any such arrangements as this. The individual referred to at OBCI is John Lenhart, Superintendent. Note also Stahl's first letter is dated May 5th, one day after his 'contact' with OBCI to turn over his 'evidence'. David Lehrer ------------------------------ Date: Mon, 26 Jul 93 11:31:40 EDT From: Paul Higgins Subject: File 2--Call for Paper: Computer Network Use and Abuse Conference CALL FOR PAPERS The National Conference of Lawyers and Scientists (NCLS) invites proposals for original papers to be presented at a two-and-a-half-day invitational conference on "Legal, Ethical, and Technological Aspects of Computer and Network Use and Abuse." The conference, which will include 40 participants representing a diverse set of perspectives and areas of expertise, will be held in Irvine, California on December 17-19, 1993. Up to three successful applicants will receive travel expenses and room and board at the conference. Papers will be included in the conference proceedings and may be published subsequently in a book or journal symposium. The conference will focus on the ways in which the law, ethics, and technology can contribute to influencing and enforcing the bounds of acceptable behavior and fostering the development of positive human values in a shared computer environment. Primary attention will be on unwanted intrusions into computer software or networks, including unauthorized entry and dissemination of viruses through networks or shared disks. Discussions will deal with such issues as access to information, privacy, security, and equity; the role of computer users, academic institutions, industry, professional societies, government, and the law in defining and maintaining legal and ethical standards for the use of computer networks; and a policy agenda for implementing these standards. Papers are invited on any aspect of the conference theme. Especially welcome would be papers reporting on empirical research, surveys of computer users, and case studies (other than those that are already well-known). Interested persons should submit a summary or outline of no more than 500 words, together with a brief (one-page) resum% and a statement (also brief) of how one's expertise or perspective might contribute to the meeting. Proposals will be reviewed by an advisory committee convened by NCLS and successful applicants will be asked to prepare papers for the meeting. Papers must be the original work of the author, not previously published, in good academic form, and between about 5,000 and 8,000 words (25-30 double-spaced pages) in length. Deadline for receipt of proposals is 5 p.m. Eastern Time, September 15, 1993. Applicants who are selected to prepare papers will be informed by October 1, 1993. Draft papers will be due December 3, 1993. Final versions of the papers, revised in light of conference discussions, will be due approximately two months after the conference. NCLS is an organization sponsored jointly by the American Association for the Advancement of Science and the American Bar Association, dedicated to improving communication between members of the legal and scientific/technical professions and exploring issues at the intersection of law, science, and technology. Funding for this meeting has been provided by the Program on Ethics and Values Studies of the National Science Foundation. For further information please contact Deborah Runkle, Directorate for Science & Policy Programs, American Association for the Advancement of Science, 1333 H Street, NW, Washington, DC 20005. Phone: 202-326-6600. Fax: 202-289-4950. E-mail: values@gwuvm.gwu.edu. ------------------------------ Date: Sat, 24 Jul 1993 14:13:08 EST From: Dave Banisar Subject: File 3--Credit Reports and National Credit Reports and National Security Last week, the Senate Intelligence Committee approved a provision that allows for FBI access to credit reports using only a letter instead of a judical warrant in cases that they say involved national security. There is concern that this will be subject to abuse and that the necessity has not been proven. Several privacy and consumer groups sent this letter opposing the provision. I was unable to easily find the actual text but will get it after I come back from vacation. Dave Banisar CPSR Washington Office July 12, 1993 The Honorable Dennis Deconcini Chairman Senate Select Committee on Intelligence United States Senate SH-211 Hart Senate Office Building Washington, DC 20510-6475 Dear Chairman DeConcini; We are writing to voice our strong opposition to the Administration's legislative proposal to amend the Fair Credit Reporting Act (FCRA) to allow the Federal Bureau of Investigation (FBI) to obtain consumer credit reports in foreign counterintelligence cases. The FBI seeks a national security letter exemption to the FCRA to obtain personal information from consumer reporting agencies without a subpoena or court order. A national security letter gives the FBI the authority to obtain records without judicial approval and without providing notice to the individual that his or her records have been obtained by the Bureau. Similar FBI proposals were rejected in previous years after Congressional leaders expressed concern over the civil liberties issues raised. Although the current draft proposal is more comprehensive than those circulated in previous years, the changes and additions do not alter significantly the central character of the proposal. The Administration's 1993 proposal includes explicit limits to dissemination of obtained information within the government, penalties for violations including punitive damages, and reporting requirements. These provisions are positive changes from the legislation put forward in previous years, but they do not save the proposal from its intrinsic flaws. Therefore, the reasons for our fundamental opposition to the current proposal remain the same: 1) the FBI has not demonstrated a compelling need for access to consumer credit reports; and 2) legislation that implicates civil liberties should be addressed separately and not as part of the authorization process. There are only two instances in which Congress has authorized the FBI, in counterintelligence investigations, to obtain information about individuals pursuant to a national security letter but without a subpoena, search warrant or court order. First, the Electronic Communications Privacy Act (ECPA) of 1986 included a provision requiring common carriers to disclose subscriber information and long distance toll records to the FBI in response to a national security letter. Second, congress included in the 1987 Intelligence Authorization Act an amendment to the Right to Financial Privacy Act (RFPA) that requires banks to provide customer records to the FBI in response to a similar letter. In that case, the FBI presented to Congress its case for obtaining financial records in foreign counter- intelligence cases and the difficulty of obtaining those records without a court order. in both instances when congress has previously authorized the national security letter, Congress recognized that the procedure departs dramatically from the procedure necessary to obtain a court order. The FBI's current proposal seeks similar access to individuals' credit records held by consumer reporting companies. The FBI has yet to adequately justify its need to add such highly personal, sensitive information to the narrow category of records subject to the national security letter exemption. The Bureau claims obtaining credit reports will allow it to more easily determine where a subject of an investigation banks -- information the FBI claims will help them effectuate their ability to access bank records under the RFPA. We opposed the national security letter exemption in the RFPA and do not endorse the FBI's slippery slope approach to ensuring that they can more easily obtain financial information in foreign counterintelligence cases. This information can be and is routinely gained without credit reports. We do not believe convenience is a sufficient justification for this significant exception to the law. The FBI further argues that obtaining banking information through a credit report is preferred because it is actually less intrusive than those investigative methods that would otherwise be used. While we too are frustrated that other information- gathering techniques are frequently too intrusive, our objections to the other techniques do not lead us to endorse yet another technique that is also intrusive and that weakens existing privacy law. Finally, we object to using the authorization process as the vehicle for pursuing this change. The national security latter exemption, because it diminishes the due process and privacy protections for individuals, must be given the most careful consideration. The FBI's proposal should be introduced as separate legislation on which public hearings can be held. only in this way can the Committee test thoroughly the FBI's case for the exemption and hear from witnesses who object to the change. We urge you to reject the FBI's proposal in its current form. We are available to work with you on this issue. Sincerely, Janiori Goldman Michelle Meier Privacy and Technology Project Consumers Union American civil Liberties Union Marc Rotenberg Evan Hendricks Computer Professionals for U.S. Privacy Council Social Responsibility cc: Members, Senate Select Committee on Intelligence The Honorable George J. Mitchell Senate Majority Leader The Honorable Donald W. Riegle, Jr., Chairman Senate Committee on Banking, Housing and Urban Affairs The Honorable Patrick J. Leahy, Chairman Subcommittee on Technology and the Law ------------------------------ Date: Thu, 22 Jul 1993 10:42:07 -0700 From: Jim Warren Subject: File 4--UPDATE #19-AB1624: PROGRAMMERS! START YOUR ENGINES! July 20, 1993 Okay, all you programmers who volunteered to create readers, indexers, print utilities, etc., for California's legislative data --HERE'S YOUR FIRST CHANCE. GAIN FAME AND GLORY (if not wealth :-) ! Be the FIRST to create legislative data-handling utilities and share the source-code with the world. Do it fast, and you/it can amaze and impress legislators at the Aug. 18th Senate Rules Committee hearing on AB1624. The Legislative Data Center (LDC) has provided bill-author Bowen's office with six diskettes full of sample legislative data in the various forms in which it exists internally, at the LDC and/or the Office of State Printing (OSP). They also provided documentation-files in electronic form. With some kindly Sacramento assistance, Tim Pozar now has all of these files available across the Internet in the anonymous ftp directory (file transfer protocol) on kumr.lns.com. To obtain copies of the files, use the command "ftp kumr.lns.com". Login as "anonymous" and use your mailing address as a password. Be sure to use the command "binary" to transfer the files intact. Use the command "cd pub/ldc" to change to the proper directory. Then the command "mget *" to get all of the files. After all of the files are retrieved, type the command "quit" to end the ftp session and log out of kumr.kns.com. If you have ftp problems, contact Tim: Internet: pozar@kumr.lns.com FidoNet: Tim Pozar @ 1:125/555 Snail: Tim Pozar, KKSF, 77 Maiden Lane, San Francisco CA 94108 POTS: +1 415 788 2022 Radio: KC6GNJ / KAE6247 According to LCD notes that accompanied the diskettes, the files include: cgml.sou - California Generic Markup Language (CGML) parser table codes.fmt - documentation of CGML (the LDC formatting language, that does *not* give the page- or line-numbers by which amendments are defined) measures.fmt - documentation of Page II (the OSP typesetting input, which is the only source of the page- and line-numbers of printed bills) *cg.ina - introduced bill, in the Assembly, coded in CGML *cg.ams - amended bill, in the Senate, coded in CGML *.cg - Constitution part, state code or uncodified statute, coded in CGML ab????.ina - bill introduced in the Assembly, coded in Page II ab????.ams - Assembly bill amended in the Senate, coded in Page II *.pg2 - Page II tables for introduced, amended, enrolled and chaptered bills *ca - committee analysis *fa - floor analysis *cf - committee vote *fv - floor vote *s - bill status *h - bill history *ve - Governor's veto message 063093.boo files apparently concern the Assembly and Senate Daily Files. If you have questions AFTER you have diligently diddled these files and become totally frustrated, send specific questions to me and I'll try to scrounge up some answers. [No guarantees, though. :-) ] Let me know if/when you think you have some code working, and we'll figure out how best to gloriously - and *timely* - flaunt it in Sacramento. :-) [Note: I will be at the Telluride Tele-Community conference and mostly offline 7/22-7/26.] ------------------------------ Date: Fri, 16 Jul 1993 16:34:17 EDT From: Doug Schuler Subject: File 5--Community Network Survey Results Available Community Networkers, A few months ago I distributed a community network survey to several electronic forums. I stated that I'd make the survey results available electronically and I've received quite a few requests for the results. I've *finally* moved them to a site suitable for anonymous ftp. ftp to atlas.ce.washington.edu login = anonymous password = e-mail-address cd to pub/seattle-community-network/community-networks/surveys The completed surveys, explanatory information and blank surveys are also in the directory. I hope to maintain up-to-date information so completed surveys on systems not previously described or completed surveys that reflect major changes in status are welcome. I'd prefer that these be mailed to me. My address is dschuler@cs.washington.edu. I've received nearly 30 completed surveys so far. I hope that this information is useful. Thanks to everybody that's participated! -- Doug P.S. I've purposefully kept the survey short. I'm interested in comments on improving the survey. Completed (or nearly completed) Surveys --------------------------------------- CIAO-trail-freenet Vancouver, B.C., Canada IGC San Francisco, CA SPACECON Merritt Island, FL african-studies-bbs Madison, WI akron-regional-freenet Akron, OH boston-peace-and-justice-hotline Brighton, MA chippewa-valley-freenet Eau Claire, WI columbia-online-information-network Columbia, MO cruzio Santa Cruz, CA denver-freenet Denver, CO ecoline Burlington, VT eugene-community-network Eugene, OR FACTS Fayetteville, NC [nearly ready] heartland-freenet Peoria, IL mt-view-community-network Mountain View, CA national-capital-freenet Ottawa, Ontario, Canada new-mexico-network Albuquerque, NM rtk Washington, DC santa-cruz-county-wan Santa Cruz, CA seattle-community-network Seattle, WA [nearly ready] slo-county San Luis Obispo, CA suncoast-freenet Tampa, FL sustainable-development-info-network Cambridge, MA toronto-freenet Toronto, Ontario, Canada triangle-freenet Triangle Park, NC youngstown-freenet Youngstown, OH ++++++++++++ Thanks to David Barts and Coralee Whitcomb for help with this. ------------------------------ End of Computer Underground Digest #5.56 ************************************