Investigations Involving the Internet and Computer Networks

Total Page:16

File Type:pdf, Size:1020Kb

Investigations Involving the Internet and Computer Networks U.S. Department of Justice Office of Justice Programs J National Institute of Justice AN. 07 Special REPORT Investigations Involving the Internet and Computer Networks www.ojp.usdoj.gov/nij U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 Alberto R. Gonzales Attorney General Regina B. Schofield Assistant Attorney General David W. Hagy Deputy Assistant Attorney General, Office of Justice Programs and Principal Deputy Director, National Institute of Justice This and other publications and products of the National Institute of Justice can be found at: National Institute of Justice www.ojp.usdoj.gov/nij Office of Justice Programs Partnerships for Safer Communities www.ojp.usdoj.gov JAN. 07 Investigations Involving the Internet and Computer Networks NCJ 210798 David W. Hagy Deputy Assistant Attorney General, Office of Justice Programs and Principal Deputy Director, National Institute of Justice This document is not intended to create, does not create, and may not be relied upon to create any rights, substantive or procedural, enforceable by law by any party in any matter civil or criminal. Opinions or points of view expressed in this document represent a consensus of the authors and do not necessarily reflect the official position or policies of the U.S. Department of Justice. The products, manufacturers, and organizations discussed in this document are presented for informational purposes only and do not constitute product approval or endorsement by the U.S. Department of Justice. This document was prepared under Interagency Agreement #2003–IJ–R–029 between the National Institute of Justice and the National Institute of Standards and Technology, Office of Law Enforcement Standards. The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance, the Bureau of Justice Statistics, the Office of Juvenile Justice and Delinquency Prevention, and the Office for Victims of Crime. Photo Credits Cover: Getty Images and Photodisc Text: Photodisc, Getty Images, and Digital Stock Foreword As the use of the Internet and other ■ Electronic crime scene investigation by computer networks has grown rapidly first responders. in recent years, so has the opportunity for electronic crime. Unlawful activity ■ Forensic examination of digital evidence. can be committed or facilitated online. ■ Criminals can trade and share information, Internet and network investigations. mask their identity, identify and gather ■ Investigative uses of technology. information on victims, and communicate with co-conspirators. Web sites, electronic ■ Courtroom presentation of digital mail, chat rooms, and file sharing networks evidence. can all yield evidence in an investigation of computer-related crime. ■ Development of a digital evidence forensic unit. This report was developed by the Technical Working Group for the Investigation of The recommendations presented in this High Technology Crimes and is intended guide are not mandates or policy directives to be a resource for individuals responsible and may not represent the only correct for investigations involving the Internet course of action. The guide is intended to and other computer networks. It is one be a resource for those who investigate of a series of electronic crime investiga­ crimes related to the Internet and other tion documents already published or in computer networks. It does not discuss development by the National Institute of all of the issues that may arise in these Justice (NIJ). The guides are developed by investigations and does not attempt to technical working groups that consist of cover traditional investigative procedures. practitioners and subject matter experts brought together by NIJ to help law NIJ extends its appreciation to the mem­ enforcement agencies and prosecutors bers of the Technical Working Group for deal with the growing volume and com­ the Investigation of High Technology plexity of electronic crime. Crimes for their involvement. We commend them for the long hours of work required to The series of guides will discuss the inves­ prepare this report and recognize that they tigation process from the first responder, did this while still performing their existing to the laboratory, to the courtroom. duties with their home offices or agencies. Specifically, the guides will address: Their commitment of time and expertise was invaluable to the success of the project. David W. Hagy Deputy Assistant Attorney General, Office of Justice Programs and Principal Deputy Director, National Institute of Justice iii Technical Working Group for the Investigation of High Technology Crimes Planning panel Tom Sadaka Of Counsel Carleton Bryant Berger Singerman Staff Attorney Attorneys at Law Knox County Sheriff’s Office Ft. Lauderdale, Florida Knoxville, Tennessee Raemarie Schmidt John Davis Vice President Operations Manager Digital Intelligence, Inc. Colorado Regional Computer Forensics Waukesha, Wisconsin Laboratory Lone Tree, Colorado Todd Shipley Director, Systems Security and High Tech Toby Finnie Crime Prevention Training Director SEARCH Group, Inc. High Tech Crime Consortium Sacramento, California Tacoma, Washington Chris Stippich Alex Graves President Program Specialist Digital Intelligence, Inc. Federal Law Enforcement Training Center Waukesha, Wisconsin Brunswick, Georgia Patrick Hogan Technical Working Special Agent Group members Investigator/DE Examiner USSS Electronic Crimes Section Walter E. Bruehs Washington, D.C. Forensics Examiner Forensic Audio, Video and Imaging Michael J. Menz Analysis Unit HP-IT Security Investigator Federal Bureau of Investigation Detective Quantico, Virginia Sacramento High Technology Crimes Task Force Tim Dees Sacramento, California Regional Training Coordinator Oregon Department of Public Safety Sean P. Morgan Standards and Training White Collar Crime Program Manager Kennewick, Washington American Prosecutors Research Institute Alexandria, Virginia Michael W. Finnie Senior Computer Forensic Specialist Cynthia Murphy Computer Forensics, Inc. Detective Seattle, Washington Madison Police Department Madison, Wisconsin v Carlton Fitzpatrick Bill Moylan Chief, Financial Investigations Branch Detective Federal Law Enforcement Training Center Nassau County Police Department U.S. Department of Homeland Security Westbury, New York Glynco, Georgia Thomas Musheno Grant Gottfried Forensic Examiner MITRE Forensic Audio, Video and Image Analysis McLean, Virginia Federal Bureau of Investigation Engineering Research Facility Ronald J. Green Quantico, Virginia Senior Vice President Corporate Information Security Tim O’Neill Bank of America Hewlett-Packard Information Security Charlotte, North Carolina Roseville, California Gerald Griffin Scott R. Patronik Director Chief, Division of Technology and Forensic and Technical Services Advancement U.S. Postal Inspection Service Erie County Sheriff’s Office U.S. Postal Service Buffalo, New York Dulles, Virginia Jim Riccardi, Jr. William Harrod Electronic Crime Specialist Director, Investigative Response CyberScience Lab TruSecure National Law Enforcement and Herndon, Virginia Corrections Technology Center–Northeast Rome, New York Dave Heslep Sergeant Rebecca Richardson Maryland State Police Network Administrator Technical Investigation Division Montana State University–Billings Columbia, Maryland Billings, Montana Darrell Johnson Alan Roth Captain Postal Inspector Knox County Sheriff’s Office Forensic and Technical Services Knoxville, Tennessee U.S. Postal Service Dulles, Virginia Kevin Manson Coordinator Jonathan J. Rusch Internet Investigations Training Programs Special Counsel for Fraud Prevention Financial Fraud Institute Criminal Division, Fraud Section Federal Law Enforcement Training Center U.S. Department of Justice Glynco, Georgia Washington, D.C. Michael McCartney Kim Schaffer Special Investigator New Technologies, Inc. New York State Attorney General’s Office Gresham, Oregon Buffalo, New York vi Michael Schirling Mike Weil Lieutenant Huron Consulting Group Burlington Police Chicago, Illinois Vermont Internet Crimes Task Force Burlington, Vermont Craig Wilson Detective Sergeant Greg Schmidt Kent Police Computer Crime Unit Computer Forensics United Kingdom Frisco, Texas Howard Schmidt Facilitators Chief Security Officer Susan Ballou Ebay, Inc. Program Manager for Forensic Sciences Campbell, California Office of Law Enforcement Standards National Institute of Standards and Russ Skinner Technology Sergeant Gaithersburg, Maryland Maricopa County Sheriff’s Office Computer Crimes Division Anjali R. Swienton Phoenix, Arizona President & CEO SciLawForensics, Ltd. Fred Smith Germantown, Maryland Assistant United States Attorney Albuquerque, New Mexico vii Contents Foreword . iii Technical Working Group for the Investigation of High Technology Crimes .........................................................v Chapter 1. Introduction and Investigative Issues ...........................1 Chapter 2. Tracing an Internet Address to a Source ........................5 Chapter 3. Investigations Involving E-Mail. 17 Chapter 4. Investigations Involving Web Sites . 27 Chapter 5. Investigations Involving Instant Message Services, Chat Rooms, and IRC. 33 Chapter 6. Investigations Involving File Sharing Networks . 49 Chapter 7. Investigations of Network Intrusion/Denial of Service . 55 Chapter 8. Investigations Involving Bulletin Boards, Message Boards, Listservs, and Newsgroups . 61 Chapter 9. Legal Issues. 73 Appendix
Recommended publications
  • DETECTING BOTS in INTERNET CHAT by SRITI KUMAR Under The
    DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR (Under the Direction of Kang Li) ABSTRACT Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service. Chat bots target popular chat networks to distribute spam and malware. We first collect data from a large commercial chat network and then conduct a series of analysis. While analyzing the data, different patterns were detected which represented different bot behaviors. Based on the analysis on the dataset, we proposed a classification system with three main components (1) content- based classifiers (2) machine learning classifier (3) communicator. All three components of the system complement each other in detecting bots. Evaluation of the system has shown some measured success in detecting bots in both log-based dataset and in live chat rooms. INDEX WORDS: Yahoo! Chat room, Chat Bots, ChatterBots, SPAM, YMSG DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR B.E., Visveswariah Technological University, India, 2006 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2010 © 2010 Sriti Kumar All Rights Reserved DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR Major Professor: Kang Li Committee: Lakshmish Ramaxwamy Prashant Doshi Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2010 DEDICATION I would like to dedicate my work to my mother to be patient with me, my father for never questioning me, my brother for his constant guidance and above all for their unconditional love.
    [Show full text]
  • Expectation of Privacy in Internet Communications
    Fourth Amendment Aspects of Internet Communications and Technology Dennis Nicewander Assistant State Attorney 17th Judicial Circuit Ft. Lauderdale, Florida The emergence of Internet technology has revolutionized the world of communication and information sharing. Unfortunately, criminals have seized this opportunity to enhance the efficiency and productivity of their criminal pursuits. The task ahead of law enforcement is daunting, to say the least. New forms of technology emerge before we are able to master the old ones. The most significant legal issue to arise in this struggle to make order out of chaos is the application of the Fourth Amendment to these emerging technologies. If our economy is going to continue to grow at the rapid pace promised by Internet technology, we must find a way to balance our citizens‟ right to privacy with the necessity of establishing law and order in this new frontier. As our culture and legal system suffer the growing pains of radical change, it is responsibility of prosecutors to work together with law enforcement to strike a balance between effective police work and privacy rights afforded by the Fourth Amendment. Understanding the role of “reasonable expectation of privacy” is critical to this role. Since most information placed on the Internet is designed for mass distribution, a reasonable expectation of privacy will not apply in the majority of cases. The purpose of this paper is to provide basic guidance and case law concerning this issue as it relates to some of the most common forms Internet technology. The topics will be divided into the following categories: General Privacy Cases Email Chatrooms Peer-to-Peer Internet Service Provider Records Websites Bulletin Boards University Usage Logs Text Messages General Privacy Cases Katz v.
    [Show full text]
  • Lesson 1 Key-Terms Meanings: Internet Connectivity Principles
    Lesson 1 Key-Terms Meanings: Internet Connectivity Principles Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 1 Publs.: McGraw-Hill Education Header Words • Header words are placed as per the actions required at succeeding stages during communication from Application layer • Each header word at a layer consists of one or more header fields • The header fields specify the actions as per the protocol used Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 2 Publs.: McGraw-Hill Education Header fields • Fields specify a set of parameters encoded in a header • Parameters and their encoding as per the protocol used at that layer • For example, fourth word header field for 32-bit Source IP address in network layer using IP Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 3 Publs.: McGraw-Hill Education Protocol Header Field Example • Header field means bits in a header word placed at appropriate bit place, for example, place between bit 0 and bit 31 when a word has 32-bits. • First word fields b31-b16 for IP packet length in bytes, b15-b4 Service type and precedence and b3-b0 for IP version • Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 4 Publs.: McGraw-Hill Education IP Header • Header fields consist of parameters and their encodings which are as per the IP protocol • An internet layer protocol at a source or destination in TCP/IP suite of protocols Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 5 Publs.: McGraw-Hill Education TCP Header • Header fields consist of parameters and their encoding which are as
    [Show full text]
  • Mac OS 8 Update
    K Service Source Mac OS 8 Update Known problems, Internet Access, and Installation Mac OS 8 Update Document Contents - 1 Document Contents • Introduction • About Mac OS 8 • About Internet Access What To Do First Additional Software Auto-Dial and Auto-Disconnect Settings TCP/IP Connection Options and Internet Access Length of Configuration Names Modem Scripts & Password Length Proxies and Other Internet Config Settings Web Browser Issues Troubleshooting • About Mac OS Runtime for Java Version 1.0.2 • About Mac OS Personal Web Sharing • Installing Mac OS 8 • Upgrading Workgroup Server 9650 & 7350 Software Mac OS 8 Update Introduction - 2 Introduction Mac OS 8 is the most significant update to the Macintosh operating system since 1984. The updated system gives users PowerPC-native multitasking, an efficient desktop with new pop-up windows and spring-loaded folders, and a fully integrated suite of Internet services. This document provides information about Mac OS 8 that supplements the information in the Mac OS installation manual. For a detailed description of Mac OS 8, useful tips for using the system, troubleshooting, late-breaking news, and links for online technical support, visit the Mac OS Info Center at http://ip.apple.com/infocenter. Or browse the Mac OS 8 topic in the Apple Technical Library at http:// tilsp1.info.apple.com. Mac OS 8 Update About Mac OS 8 - 3 About Mac OS 8 Read this section for information about known problems with the Mac OS 8 update and possible solutions. Known Problems and Compatibility Issues Apple Language Kits and Mac OS 8 Apple's Language Kits require an updater for full functionality with this version of the Mac OS.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • The New Standard for Data Archiving
    The new standard for data archiving 1 Explosively increasing 2 Why data management digital data is important Ever-increasing volumes of digital data are mounting up every day due to rapidly growing Today, files can be lost from computers in any number of ways—you might accidentally internet technology, widespread use of SNS, data transmission between network- connected delete a file, a virus might wipe one out, or there could be a complete hard drive failure. devices, and other trends. Within the video production industry, data-heavy video content When a hard drive dies an untimely death, it can feel like a house has burnt down. (for example, 4K, 8K, and 4K/8K high-frame-rate video) is becoming a major source of video Important personal items are usually gone forever—photos, significant documents, broadcasting. Many companies and research institutes are creating high volumes of data downloaded music, and more. (big data) for use in AI systems. Somehow, these newly created assets need to be managed effectively, stored safely, and utilized along with the old assets. There are many options for backing up content without any sophisticated equipment—you can 163,000 EB use DVDs, external hard drives, optical discs, or even online storage. It’s a good idea to back up data to multiple places. Computer Natural Viruses Disasters 4% Other 2% 40,026 EB 3% 2,837 EB 8,591 EB 1,227 EB Software Corruption 9% 2010 2012 2015 2020 2025 System/ Hardware 1 EB = 1,000,000 TB Malfunction 56% User Error Performance 26% Source: Ontrack Data Recovery High Performance www.ontrack.co.uk/understandingdataloss E-commerce, Financial HOT SSD RAM Capacity Optimized Back O­ce, General Service WARM HDD Sony's Optical Disc Archive storage system offers the solution, Long-Term Archive COLD with a low total cost of ownership through the use of long-life Auto Loader, O-line Tape Optical Disc Cost media, and it includes inter-generational compatibility based on the same optical disc technology used in DVDs and Blu-ray discs.
    [Show full text]
  • A Short IRC Primer
    A short IRC primer Nicolas Pioch Nap on IRC <Nicolas Pi och g ras p ins al yo nf r> Text conversion by Owe Rasmussen Sorg <drasmus d tek ch al mer s se> Edition b February Abstract Have you ever wanted to talk with other computer users in other parts of the world Well guess what::: You can The program is called IRC Internet Relay Chat and it is networked much over North America Asia Europ e and Oceania This program is a substitution for talk and many other multiple talk programs you might have read ab out When you are talking on IRC everything you type will instantly b e transmitted around the world to other users that might b e watching their terminals at the time they can then type something and respond to your messages and vice versa I should warn you that the program can b e very addictive once you b egin to make friends and contacts on IRC esp ecially when you learn how to discuss in languages::: Topics of discussion on IRC are varied just like the topics of Usenet newsgroups are varied Technical and p olitical discussions are p opular es p ecially when world events are in progress IRC is also a way to expand your horizons as p eople from many countries and cultures are on hours a day Most conversations are in English but there are always channels in German Japanese French Finnish and o ccasionally other languages IRC gained international fame during the late Persian Gulf War when up dates from around the world came across the wire and most p eople on IRC gathered on a single channel to hear these rep orts CONTENTS Contents
    [Show full text]
  • Abstract Introduction Methodology
    Kajetan Hinner (2000): Statistics of major IRC networks: methods and summary of user count. M/C: A Journal of Media and Culture 3(4). <originally: http://www.api-network.com/mc/0008/count.html> now: http://www.media-culture.org.au/0008/count.html - Actual figures and updates: www.hinner.com/ircstat/ Abstract The article explains a successful approach to monitor the major worldwide Internet Relay Chat (IRC) networks. It introduces a new research tool capable of producing detailed and accurate statistics of IRC network’s user count. Several obsolete methods are discussed before the still ongoing Socip.perl program is explained. Finally some IRC statistics are described, like development of user figures, their maximum count, IRC channel figures, etc. Introduction Internet Relay Chat (IRC) is a text-based service, where people can meet online and chat. All chat is organized in channels which a specific topic, like #usa or #linux. A user can be taking part in several channels when connected to an IRC network. For a long time the only IRC network has been EFnet (Eris-Free Network, named after its server eris.berkeley.edu), founded in 1990. The other three major IRC networks are Undernet (1993), DALnet (1994) and IRCnet, which split off EFnet in June 1996. All persons connecting to an IRC network at one time create that IRC network’s user space. People are constantly signing on and off, the total number of users ever been to a specific IRC network could be called social space of that IRC network. It is obvious, that the IRC network’s social space by far outnumbers its user space.
    [Show full text]
  • Restoring in All Situations
    Restoring in all situations Desktop and laptop protection 1 Adapt data restore methods to different situations Executive Summary Whether caused by human error, a cyber attack, or a physical disaster, data loss costs organizations millions of euros every year (3.5 million euros on average according to the Ponemon Institute). Backup Telecommuting Office remains the method of choice to protect access to company data and ensure their availability. But a good backup strategy must necessarily be accompanied by a good disaster recovery strategy. Nomadization The purpose of this white paper is to present the best restore practices depending on the situation you are in, in order to save valuable time! VMs / Servers Apps & DBs NAS Laptops Replication 2 Table of Contents EXECUTIVE SUMMARY .......................................................................................................................... 2 CONTEXT ................................................................................................................................................ 4 WHAT ARE THE STAKES BEHIND THE RESTORING ENDPOINT USER DATA? ................................. 5 SOLUTION: RESTORING ENDPOINT DATA USING LINA ................................................................... 6-7 1. RESTORE FOR THE MOST NOVICE USERS ................................................................................ 8-10 2. RESTORE FOR OFF SITE USERS ................................................................................................11-13 3. RESTORE FOLLOWING LOSS,
    [Show full text]
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Internet Relay Chat. ERIC Digest
    ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. ERIC Development Team www.eric.ed.gov Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. Internet Relay Chat. ERIC Digest............................................... 1 WHY USE INTERNET RELAY CHAT?..................................... 2 WHAT IS REQUIRED?........................................................ 2 HOW IS IRC ORGANIZED?.................................................. 3 NETS..............................................................................3 CHANNELS......................................................................3 OPS............................................................................... 3 NICKS.............................................................................4 HOW DO YOU FIND, JOIN, OR CREATE A CHANNEL?............... 4 CAN YOU SEND A PRIVATE MESSAGE?................................ 4 HOW DOES ONE EXIT AN IRC CHAT?................................... 4 WHAT ARE THE DISADVANTAGES OF IRC?............................4 WHAT EDUCATIONAL BENEFITS CAN I EXPECT?....................5 ERIC Identifier: ED425743 Publication Date: 1999-01-00 Author: Simpson, Carol Source: ERIC Clearinghouse on Information and Technology Syracuse NY. Internet Relay Chat. ERIC Digest. ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. Page 1 of 6 www.eric.ed.gov ERIC Custom Transformations Team THIS DIGEST WAS CREATED BY ERIC, THE EDUCATIONAL RESOURCES INFORMATION CENTER. FOR MORE
    [Show full text]
  • Volume 4, Number 7 July 1, 1998 [email protected]
    About This Particular Macintosh™ 4.07: About the personal computing experience™ Volume 4, Number 7 July 1, 1998 Send requests for free subscriptions to: [email protected] Cover Art ©1998 Jamal Ghandour <[email protected]> We need new cover art every month! Write to us! Contributors Scott R. Boveia Scott Byers Martin Cox Simon Edison Jamal Ghandour Edward Goss [email protected] Tom Iovino Staci Trekles Robert Paul Leitao Robert Madill Mike Shields Michael Tsai Marc Zeedar Macintosh users like you Please write for ATPM! Check out the Guidelines Editorial Staff Publishers - Michael Tsai & Robert Paul Leitao Editor - Michael Tsai Managing Editor - Robert Paul Leitao Opinionated Associate Editor - Mike Shields Reviews Editor- Robert Madill Copy Editor - Christopher Turner Shareware Reviews Editor - Vacant Interviews Manager - Vacant Publicity Manager - Kyle Alexander Page o’ Linker - Vacant Welcome Author - Robert Paul Leitao List Server Manager - Michael Tsai Webzingers - Michael Tsai, Evan Trent Beta Testers - The Staff Columnists Jamal Ghandour Edward Goss Tom Iovino Robert Paul Leitao Mike Shields Michael Tsai Artwork & Design Graphics Director - Jamal Ghandour Layout/Design - Michael Tsai Blue Apple Icon Designs - Marc Robinson Typewriter-Style Section Headers - RD Novo The Tools Anarchie AppleWorks BBEdit DOCMaker Emailer Illustrator Kai’s PowerTools LetterRip Myrmidon Nisus Writer Online Army Knife Photoshop ResEdit Snapz Pro StuffIt The Fonts Carbonated Gothic Cheltenham Cloister Foundation Frutiger Garamond Geneva Gill Sans Helvetica Isla Bella Marydale Where to Find ATPM Online and downloadable issues are available at the ATPM Web Page: < h t t p : / / w w w . a t p m . c o m > and via anonymous FTP at: < f t p : / / f t p .
    [Show full text]