Send Link mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://mailman.anu.edu.au/mailman/listinfo/link
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Link digest..."


Today's Topics:

   1. New AI training and guidance for APS now available
      (Tom Worthington)
   2. 'Catastrophic' Internet Archive Attack (Stephen Loosley)
   3. Re: 'Catastrophic' Internet Archive Attack (Roger Clarke)


----------------------------------------------------------------------

Message: 1
Date: Fri, 11 Oct 2024 16:50:49 +1100
From: Tom Worthington <[email protected]>
To: "[email protected]" <[email protected]>
Subject: [LINK] New AI training and guidance for APS now available
Message-ID: <[email protected]>
Content-Type: text/plain; charset="utf-8"; Format="flowed"

-------- Forwarded Message --------
Subject:        New AI training and guidance for APS now available
Date:   Fri, 11 Oct 2024 00:59:51 +0000
From:   Digital Transformation Agency <[email protected]>


New AI training and guidance for APS now available As adoption of AI 
grows across the APS, it?s crucial to ensure staff are equipped with the 
necessary skills to safely engage.
View this email in your browser 
<https://mailchi.mp/7835fd619c0f/new-ai-training-and-guidance-for-aps-now-available?e=579ef4b253>
 



   AI policy guidance and training: Rounding out a responsible approach
   for AI adoption


The DTA has released two new resources 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=48a2bafe72&e=579ef4b253>,
 
emphasising the importance of AI training for the APS to ensure safe and 
confident use of AI tools.

Our AI policy guidance on staff training 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=a8579b5710&e=579ef4b253>
 
recommends completing fundamentals training within 6 months of an AI 
policy being implemented. Agencies should also develop role-specific 
specialist training, covering AI procurement, development, training, and 
deployment.

To assist with this implementation, we have also released a fundamentals 
training module 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=bc7abea57c&e=579ef4b253>
 
to deliver staff a basic understanding of:

   * the applications and risks of AI
   * applying relevant advice
   * when it's suitable to use generative AI
   * developing sound judgement with AI.

Read the full blog: *AI policy guidance and training: Rounding out a 
responsible approach for AI adoption* 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=55a2367f46&e=579ef4b253>.

AI policy guidance and training 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=fa6440f789&e=579ef4b253>
 



     Recent AI news

We released the Policy for the responsible use of AI in government, an 
important step to achieve this goal while building public trust.
Read more here 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=996e129a63&e=579ef4b253>.
 

<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=c7307d1c16&e=579ef4b253>

To help agencies comply with the Policy, we published a standard for 
accountable officials and another for AI transparency statements.
Read more here 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=31e2af21be&e=579ef4b253>.
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=512cd184fe&e=579ef4b253>

See our latest news and blogs 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=0cd8d24d46&e=579ef4b253>.

LinkedIn 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=c915ec51ab&e=579ef4b253>
 


Website 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=2c43696de2&e=579ef4b253>
 


If you have ideas or suggestions for News from DTA, please email 
[email protected] <mailto:[email protected]>

/Copyright ? Digital Transformation Agency 2024, All rights reserved./
You have received this email because you subscribed to /News from DTA/.
You can update your preferences 
<https://dta.us12.list-manage.com/profile?u=81bbb1d15242b2224ee11e3fe&id=427c57f270&e=579ef4b253&c=8a1d03ec5e>
 
or unsubscribe from this list 
<https://dta.us12.list-manage.com/unsubscribe?u=81bbb1d15242b2224ee11e3fe&id=427c57f270&t=b&e=579ef4b253&c=8a1d03ec5e>.

LinkedIn 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=5bc2763071&e=579ef4b253>
 


Twitter 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=dfd24b1df5&e=579ef4b253>
 


Website 
<https://dta.us12.list-manage.com/track/click?u=81bbb1d15242b2224ee11e3fe&id=4550f61bd3&e=579ef4b253>
 


-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 665 bytes
Desc: OpenPGP digital signature
URL: 
<https://mailman.anu.edu.au/pipermail/link/attachments/20241011/58e619e2/attachment-0001.sig>

------------------------------

Message: 2
Date: Fri, 11 Oct 2024 17:30:41 +1030
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] 'Catastrophic' Internet Archive Attack
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"

Hackers Claim 'Catastrophic' Internet Archive Attack

By Marie Boran Technology Reporter Oct 10, 2024
https://www.newsweek.com/catastrophic-internet-archive-hack-hits-31-million-people-1966866


A group linked to a pro-Palestinian hacktivist movement has launched a 
catastrophic cyberattack revealing the details of 31 million people, 
compromising their email addresses and screen names.

An account on X under the name SN_BlackMeta claimed responsibility for the 
attack on The Internet Archive, a nonprofit organization, and implied that 
further attacks were planned. 

The Internet Archive is known for its digital library and the Wayback Machine. 
SN_BlackMeta has previously been linked to an attack against a Middle Eastern 
financial institution earlier this year, and a security firm has linked it to a 
pro-Palestinian hacktivist movement.

Encrypted passwords were also exposed and although these are relatively safe, 
users have been advised to change their passwords. And one expert has told 
Newsweek people should avoid browsing or using any files obtained from the site 
until it has declared an "all clear."

This breach was accompanied by a series of Distributed Denial-of-Service (DDoS) 
attacks that temporarily took down the organization website, archive.org, on 
Wednesday and is continuing to affect the website currently. Wayback Machine is 
also inaccessible right now.

A popup warning of a computer hack.

[Photo caption: A pop-up warns of a system hack. The Internet Archive, the 
nonprofit that runs the Wayback Machine, suffered from a catastrophic hack 
exposing the details of 31 million users. solarseven/Getty Images]

Brewster Kahle, founder and digital librarian of the Internet Archive, 
confirmed the breach and acknowledged the ongoing DDoS attacks.

In a post on X (formerly Twitter), Kahle stated: "What we know: DDOS 
attack?fended off for now; defacement of our website via JS library; breach of 
usernames/email/salted-encrypted passwords. What we've done: Disabled the JS 
library, scrubbing systems, upgrading security. Will share more as we know it."


Newsweek reached out to Brewster Kahle via DM on X for further comment.

The Internet Archive digital library was founded in 1996 with the mission of 
providing "universal access to all knowledge." It preserves billions of 
webpages, texts, audio recordings, videos, and software applications.

Its most used service is the Wayback Machine, a tool that allows users to 
browse archived versions of websites as they appeared at different points in 
history, with snapshots of webpages dating back to the early days of the 
internet.

Read more Hack

Mike Pence Backs TikTok Lawsuit?'Digital Fentanyl'
Google Hits Back Over Proposal to Break It Up
Bitcoin's Mystery Creator? Peter Todd Reacts to HBO Reveal
Will Trump or Kamala Harris Win Key Swing States: We Asked ChatGPT, Grok


On October 9, visitors to the Internet Archive's website were met with a pop-up 
message indicating that the site had been hacked. The message read: "Have you 
ever felt like the Internet Archive runs on sticks and is constantly on the 
verge of suffering a catastrophic security breach? It just happened. See 31 
million of you on HIBP!"

The reference to HIBP points to Have I Been Pwned?, a widely-used service that 
allows individuals to check if their personal data has been compromised in 
known data breaches.

Troy Hunt, founder of HIBP, confirmed to Bleeping Computer that he had received 
a database containing email addresses, screen names, bcrypt-hashed passwords, 
and other internal data for 31 million unique email addresses associated with 
the Internet Archive.


Hunt took to X to address the situation, confirming his communication with the 
Internet Archive regarding the breach. He wrote: "I've been in communication 
with the Internet Archive over the last few days re the data breach, didn't 
know the site was defaced until people started flagging it with me just now. 
More soon."

Hunt also mentioned that 54 percent of the compromised email addresses were 
already present in the HIBP database from previous breaches.

In the eight hours since Kahle's post, Archive.org appears to be unavailable 
once again.

"Based on publicly available evidence, the site has been thoroughly 
compromised. Their database has been exfiltrated, indicating that the back-end 
infrastructure was accessible, and their pages have been defaced, suggesting 
that the attackers have some degree of control over the web content served to 
users," Jason Meller, VP of Product at 1Password, told Newsweek.

"The website has also been repeatedly knocked offline, indicating that the 
attackers have gained dominance at the network layer. This is undoubtedly a 
difficult and challenging time for the Archive, a resource many of us rely on," 
he added.

"Given the severity of this breach and until they have had time to fully 
investigate, my strong recommendation is to avoid browsing or using any files 
obtained from the site until they have declared an 'all clear'," said Meller.

Involvement of Hacker Group SN_BlackMeta

SN_BlackMeta, who claimed responsibility for the attack, has previously been 
linked to other cyberattacks, including a record-breaking DDoS attack against a 
Middle Eastern financial institution earlier this year.

The hacktivist group, who emerged in November 2023 and previously targeted the 
Internet Archive with a DDoS attack in May 2024, battered the Middle Eastern 
financial institute for six days with attacks using a new DDoS-for-hire service 
called InfraShutdown.

Cybersecurity firm Radware connected SN_BlackMeta to a pro-Palestinian 
hacktivist movement that utilizes DDoS-for-hire services like InfraShutdown.

In posts on X from October 9, SN_BlackMeta stated: "The Internet archive has 
and is suffering from a devastating attack. We have been launching several 
highly successful attacks for five long hours and, to this moment, all their 
systems are completely down."


The account added, " "second round | New attack. 09/10/2024 Duration 6 hours," 
linking to a series of status reports on check-host.net, showing multiple 
connection timeouts for the Internet Archive.

A community note attached to this post on X read: "Readers added context they 
thought people might want to know. This group claims they took down the 
Internet Archive because it "belongs to the USA ... who support Israel" which 
is not true. The Archive is not U.S. government, it is a nonprofit that 
includes many resources about Palestine, which we can't now access because of 
this attack."

"Sophisticated DDoS attacks, like the one just suffered by The Internet 
Archive, are often politically motivated," Meller said.

Although SN_BlackMeta has openly claimed responsibility for the latest Internet 
Archive DDoS attack, Meller says: "While SN_BlackMeta has implied involvement 
in the data breach that occurred more than a week earlier, it's currently 
unclear if they were actually responsible for that attack or the website 
defacement which occurred on the same date as the DDoS attack."


Newsweek reached out to SN_BlackMeta via X for comment.

Details of the Internet Archive Data Breach

Internet Archive users subscribed to Have I Been Pwned were made aware of the 
data breach late on Wednesday evening when they received an email titled 
'You're one of 31,081,179 people pwned in the Internet Archive data breach'.

In the email, they were told that "In September 2024, the digital library of 
internet sites Internet Archive suffered a data breach that exposed 31M 
records. The breach exposed user records including email addresses, screen 
names and bcrypt password hashes."


The compromised data appears to have been obtained through the exploitation of 
a JavaScript library used by the Internet Archive, which allowed the attacker 
to deface the website and display the pop-up message.

The database, a 6.4GB SQL file named "ia_users.sql," contains records up to 
September 28, 2024, suggesting the breach occurred around that time.

Cybersecurity researcher Scott Helme confirmed the validity of the data after 
matching his own account information with the details in the leaked database. 
Helme noted that the bcrypt-hashed password in the data matched the hashed 
password stored in his password manager, and the time-stamps aligned with his 
records.

Bcrypt-hashed passwords are passwords converted into a secure, scrambled format 
using the bcrypt algorithm. This method makes it extremely difficult for anyone 
who obtains the hashed passwords to determine what the original passwords were, 
thereby keeping your actual password safer.


What This Means for Internet Archive Users

The breach is a significant concern for users who have registered accounts with 
the Internet Archive. Exposed information includes email addresses, screen 
names, and bcrypt-hashed passwords.

While bcrypt is a strong hashing algorithm, users are advised to change their 
passwords as a precautionary measure, especially if they use the same password 
on other sites.

As a result of the DDoS attacks, the Internet Archive's website is experiencing 
significant downtime, with services being temporarily offline. The organization 
directed users to its social media accounts for updates during the outage.


The Internet Archive has been the target of cyberattacks in the past. In May, 
the same group claimed responsibility for DDoS attacks aimed at disrupting the 
Archive's services. Jason Scott, an archivist and software curator at the 
Internet Archive, commented on the attacks, noting that they appeared to be 
conducted "just because they can."


pdate on 10/10/2024 at 11:01 a.m.: This story has been updated to include 
expert comment from Jason Meller, VP of Product at 1Password.

--



------------------------------

Message: 3
Date: Fri, 11 Oct 2024 19:29:59 +1100
From: Roger Clarke <[email protected]>
To: [email protected]
Subject: Re: [LINK] 'Catastrophic' Internet Archive Attack
Message-ID: <[email protected]>
Content-Type: text/plain; charset=UTF-8; format=flowed


 > Hackers Claim 'Catastrophic' Internet Archive Attack
 > By Marie Boran Technology Reporter Oct 10, 2024
 > 
https://www.newsweek.com/catastrophic-internet-archive-hack-hits-31-million-people-1966866
...
 > In a post on X (formerly Twitter), Kahle stated: "What we know: DDOS 
attack?fended off for now; defacement of our website via JS library; 
breach of usernames/email/salted-encrypted passwords. What we've done: 
Disabled the JS library, scrubbing systems, upgrading security. Will 
share more as we know it."

My first reaction was 'Catastrophic'?

A quote from social media maybe?  Or Donald Trump?  (Same thing).

Ah, a quote from the hacker.

This event is a fair test of whether one respects the mainstream norm of 
'Use one password for lots of sites that demand one, but that want the 
password to protect their interests rather than yours'  (:-)}

____________________________


On 11/10/2024 18:00, Stephen Loosley wrote:
> Hackers Claim 'Catastrophic' Internet Archive Attack
> 
> By Marie Boran Technology Reporter Oct 10, 2024
> https://www.newsweek.com/catastrophic-internet-archive-hack-hits-31-million-people-1966866
> 
> 
> A group linked to a pro-Palestinian hacktivist movement has launched a 
> catastrophic cyberattack revealing the details of 31 million people, 
> compromising their email addresses and screen names.
> 
> An account on X under the name SN_BlackMeta claimed responsibility for the 
> attack on The Internet Archive, a nonprofit organization, and implied that 
> further attacks were planned.
> 
> The Internet Archive is known for its digital library and the Wayback 
> Machine. SN_BlackMeta has previously been linked to an attack against a 
> Middle Eastern financial institution earlier this year, and a security firm 
> has linked it to a pro-Palestinian hacktivist movement.
> 
> Encrypted passwords were also exposed and although these are relatively safe, 
> users have been advised to change their passwords. And one expert has told 
> Newsweek people should avoid browsing or using any files obtained from the 
> site until it has declared an "all clear."
> 
> This breach was accompanied by a series of Distributed Denial-of-Service 
> (DDoS) attacks that temporarily took down the organization website, 
> archive.org, on Wednesday and is continuing to affect the website currently. 
> Wayback Machine is also inaccessible right now.
> 
> A popup warning of a computer hack.
> 
> [Photo caption: A pop-up warns of a system hack. The Internet Archive, the 
> nonprofit that runs the Wayback Machine, suffered from a catastrophic hack 
> exposing the details of 31 million users. solarseven/Getty Images]
> 
> Brewster Kahle, founder and digital librarian of the Internet Archive, 
> confirmed the breach and acknowledged the ongoing DDoS attacks.
> 
> In a post on X (formerly Twitter), Kahle stated: "What we know: DDOS 
> attack?fended off for now; defacement of our website via JS library; breach 
> of usernames/email/salted-encrypted passwords. What we've done: Disabled the 
> JS library, scrubbing systems, upgrading security. Will share more as we know 
> it."
> 
> 
> Newsweek reached out to Brewster Kahle via DM on X for further comment.
> 
> The Internet Archive digital library was founded in 1996 with the mission of 
> providing "universal access to all knowledge." It preserves billions of 
> webpages, texts, audio recordings, videos, and software applications.
> 
> Its most used service is the Wayback Machine, a tool that allows users to 
> browse archived versions of websites as they appeared at different points in 
> history, with snapshots of webpages dating back to the early days of the 
> internet.
> 
> Read more Hack
> 
> Mike Pence Backs TikTok Lawsuit?'Digital Fentanyl'
> Google Hits Back Over Proposal to Break It Up
> Bitcoin's Mystery Creator? Peter Todd Reacts to HBO Reveal
> Will Trump or Kamala Harris Win Key Swing States: We Asked ChatGPT, Grok
> 
> 
> On October 9, visitors to the Internet Archive's website were met with a 
> pop-up message indicating that the site had been hacked. The message read: 
> "Have you ever felt like the Internet Archive runs on sticks and is 
> constantly on the verge of suffering a catastrophic security breach? It just 
> happened. See 31 million of you on HIBP!"
> 
> The reference to HIBP points to Have I Been Pwned?, a widely-used service 
> that allows individuals to check if their personal data has been compromised 
> in known data breaches.
> 
> Troy Hunt, founder of HIBP, confirmed to Bleeping Computer that he had 
> received a database containing email addresses, screen names, bcrypt-hashed 
> passwords, and other internal data for 31 million unique email addresses 
> associated with the Internet Archive.
> 
> 
> Hunt took to X to address the situation, confirming his communication with 
> the Internet Archive regarding the breach. He wrote: "I've been in 
> communication with the Internet Archive over the last few days re the data 
> breach, didn't know the site was defaced until people started flagging it 
> with me just now. More soon."
> 
> Hunt also mentioned that 54 percent of the compromised email addresses were 
> already present in the HIBP database from previous breaches.
> 
> In the eight hours since Kahle's post, Archive.org appears to be unavailable 
> once again.
> 
> "Based on publicly available evidence, the site has been thoroughly 
> compromised. Their database has been exfiltrated, indicating that the 
> back-end infrastructure was accessible, and their pages have been defaced, 
> suggesting that the attackers have some degree of control over the web 
> content served to users," Jason Meller, VP of Product at 1Password, told 
> Newsweek.
> 
> "The website has also been repeatedly knocked offline, indicating that the 
> attackers have gained dominance at the network layer. This is undoubtedly a 
> difficult and challenging time for the Archive, a resource many of us rely 
> on," he added.
> 
> "Given the severity of this breach and until they have had time to fully 
> investigate, my strong recommendation is to avoid browsing or using any files 
> obtained from the site until they have declared an 'all clear'," said Meller.
> 
> Involvement of Hacker Group SN_BlackMeta
> 
> SN_BlackMeta, who claimed responsibility for the attack, has previously been 
> linked to other cyberattacks, including a record-breaking DDoS attack against 
> a Middle Eastern financial institution earlier this year.
> 
> The hacktivist group, who emerged in November 2023 and previously targeted 
> the Internet Archive with a DDoS attack in May 2024, battered the Middle 
> Eastern financial institute for six days with attacks using a new 
> DDoS-for-hire service called InfraShutdown.
> 
> Cybersecurity firm Radware connected SN_BlackMeta to a pro-Palestinian 
> hacktivist movement that utilizes DDoS-for-hire services like InfraShutdown.
> 
> In posts on X from October 9, SN_BlackMeta stated: "The Internet archive has 
> and is suffering from a devastating attack. We have been launching several 
> highly successful attacks for five long hours and, to this moment, all their 
> systems are completely down."
> 
> 
> The account added, " "second round | New attack. 09/10/2024 Duration 6 
> hours," linking to a series of status reports on check-host.net, showing 
> multiple connection timeouts for the Internet Archive.
> 
> A community note attached to this post on X read: "Readers added context they 
> thought people might want to know. This group claims they took down the 
> Internet Archive because it "belongs to the USA ... who support Israel" which 
> is not true. The Archive is not U.S. government, it is a nonprofit that 
> includes many resources about Palestine, which we can't now access because of 
> this attack."
> 
> "Sophisticated DDoS attacks, like the one just suffered by The Internet 
> Archive, are often politically motivated," Meller said.
> 
> Although SN_BlackMeta has openly claimed responsibility for the latest 
> Internet Archive DDoS attack, Meller says: "While SN_BlackMeta has implied 
> involvement in the data breach that occurred more than a week earlier, it's 
> currently unclear if they were actually responsible for that attack or the 
> website defacement which occurred on the same date as the DDoS attack."
> 
> 
> Newsweek reached out to SN_BlackMeta via X for comment.
> 
> Details of the Internet Archive Data Breach
> 
> Internet Archive users subscribed to Have I Been Pwned were made aware of the 
> data breach late on Wednesday evening when they received an email titled 
> 'You're one of 31,081,179 people pwned in the Internet Archive data breach'.
> 
> In the email, they were told that "In September 2024, the digital library of 
> internet sites Internet Archive suffered a data breach that exposed 31M 
> records. The breach exposed user records including email addresses, screen 
> names and bcrypt password hashes."
> 
> 
> The compromised data appears to have been obtained through the exploitation 
> of a JavaScript library used by the Internet Archive, which allowed the 
> attacker to deface the website and display the pop-up message.
> 
> The database, a 6.4GB SQL file named "ia_users.sql," contains records up to 
> September 28, 2024, suggesting the breach occurred around that time.
> 
> Cybersecurity researcher Scott Helme confirmed the validity of the data after 
> matching his own account information with the details in the leaked database. 
> Helme noted that the bcrypt-hashed password in the data matched the hashed 
> password stored in his password manager, and the time-stamps aligned with his 
> records.
> 
> Bcrypt-hashed passwords are passwords converted into a secure, scrambled 
> format using the bcrypt algorithm. This method makes it extremely difficult 
> for anyone who obtains the hashed passwords to determine what the original 
> passwords were, thereby keeping your actual password safer.
> 
> 
> What This Means for Internet Archive Users
> 
> The breach is a significant concern for users who have registered accounts 
> with the Internet Archive. Exposed information includes email addresses, 
> screen names, and bcrypt-hashed passwords.
> 
> While bcrypt is a strong hashing algorithm, users are advised to change their 
> passwords as a precautionary measure, especially if they use the same 
> password on other sites.
> 
> As a result of the DDoS attacks, the Internet Archive's website is 
> experiencing significant downtime, with services being temporarily offline. 
> The organization directed users to its social media accounts for updates 
> during the outage.
> 
> 
> The Internet Archive has been the target of cyberattacks in the past. In May, 
> the same group claimed responsibility for DDoS attacks aimed at disrupting 
> the Archive's services. Jason Scott, an archivist and software curator at the 
> Internet Archive, commented on the attacks, noting that they appeared to be 
> conducted "just because they can."
> 
> 
> pdate on 10/10/2024 at 11:01 a.m.: This story has been updated to include 
> expert comment from Jason Meller, VP of Product at 1Password.
> 
> --
> 
> _______________________________________________
> Link mailing list
> [email protected]
> https://mailman.anu.edu.au/mailman/listinfo/link

-- 
Roger Clarke                            mailto:[email protected]
T: +61 2 6288 6916   http://www.xamax.com.au  http://www.rogerclarke.com

Xamax Consultancy Pty Ltd      78 Sidaway St, Chapman ACT 2611 AUSTRALIA 

Visiting Professorial Fellow                          UNSW Law & Justice
Visiting Professor in Computer Science    Australian National University



------------------------------

Subject: Digest Footer

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link


------------------------------

End of Link Digest, Vol 383, Issue 15
*************************************

Reply via email to