Cryptography References
David Kahn's book "The Code Breakers" is a classic. It covers the history of
code breaking, emphasizing many of the breakthroughs made during World War II.
It discusses the National Security Agency, our nation's main agency for doing
such things, but the info is limited to 20 years ago. Times have changed!
James Bamford wrote "The Puzzle Palace," in the mid-80's about NSA. It
includes comments from former employees and managers adding some sense of
authenticity.
Those who'd like to hack with their computers should check out George
Sassoon's "The Radio Hacker's Code Book." It's an excellent source of
information about cipher types and their use on the radio. He gives lots of
examples and some basic algorithms for analysis. This book is hard to come by,
but it was last available from the Longwood Publishing Group, 27 S. Main
Street, Wolfesboro, NH 03894. ISBN is 0-7156-2068-1.
------------
"The Radio Hacker's Code Book" used to be available through Gilfer
Associates. I don't know if it still is, as they failed to send me a catalog
this year.
------------
I seem to recall several books and even a play about Alan Turing's work during
WWII. Turing was a particularly brilliant mind with an unfortunately twisted
and tortured psyche. Perhaps he was the perfect paranoid type to work in
codes and ciphers. No titles come to mind at the moment.
------------
Q: Where can I get a copy of The Puzzle Palace and a book called The
Codebreakers? I understand they are very good crypto books and I have all of a
sudden developed an interest in coding.
A: I think both books are still in print in paperback form. Take a look under
history or current affairs sections in your local Waldenbooks or similar. And
the library might be able to help you, too. Those of you who, like me, live
in the boonies should ask the librarian about inter-library loans, too.
------------
Perhaps this doesn't belong here since it has nothing to do with Radio and
only a little to do with Cryptography, but the book I am reading now is
The Cuckoo's Egg -- by Clifford Stoll
What an INTERESTING BOOK! Do yourself a favor and read it!!!
------------
AHA ! I finished The Cuckoo's Egg and realized why it should be here. Part
of it deals with password decryption and NSA standards, and the bibliography
recommends:
The Puzzle Palace by James Bamford
The Codebreakers by David Kahn
Deep Black by William E. Burrows (spy satellites)
Cryptography and Data Security by Dorothy Denning
Unix System Security by Wood and Kochan
Defending Secrets, Sharing Data, U.S. Congress Office of Technology
Assessment, OTA-CIT-310.
------------
Did you see the guy who wrote Cuckoo's Egg when he was on whatever news show
Connie Chung has??? This is one strange guy, left over from Woodstock or
something. It's no wonder hat nobody believed him. BTW, I too loved the
book.
------------
This material has been posted previously - but is a good
basic introduction to "The Numbers" - so...
In response to recent questions about the "Numbers"
Stations, their origin and purpose, the following summary
captures the high points.
"Spy Numbers Transmissions" are a shortwave oddity which have
been around for the last 25 years. They are commonly heard
in English, German, Spanish and the Slavic languages and take
the form of four and five digit groups of numbers which are
preceded by a three digit "identifier" and a "group count"
which corresponds to the number of number groups transmitted
in the crypt. They are generally broadcast by a mechanical-sounding YL, although Morse code (CW) "cut number" transmissions
are also frequently reported, as are phonetic alphabet transmissions. Several distinctly different formats have been
noted.
The "who" and "why" aspects of these transmissions are,
for the most part, unknown. Their mysterious nature has
resulted in their common characterization as 'spy' transmissions. Information on the "where" aspects below.
The spy theory has been enhanced over the years by the FCC's
inconsistent position in response to numerous inquiries by
the Shortwave Listening community.
If you've never heard a numbers transmission, tune your
radio to 11468 kHz any Saturday at 4pm EST (2100 UTC).
You'll almost certainly hear a 'classic' numbers transmission
which will run from 15-30 minutes. The signal from this
Saturday transmission is very powerful and can be heard
across the United States.
In regards the "where" - a number of sites have been identified
in recent years, notably in Warrenton and Remington, VA and
Miami, FL. In addition, with the aid of sophisticated RDF
(radio direction finding) equipment and the invaluable assistance of highly authoritative and professional resources, several
new transmission sites have been positively identified over the
past several months, including sites in Nicaragua, Honduras, El
Salvador, Cuba and Cozumel.
One particularly dangerous station has been interfering with
air to ground traffic on 6577 kHz, a frequency allocated to international aeronautical communications in the busy Caribbean sector.
On at least one monitored transmission, the air traffic controller
at ARINC moved the pilot to an alternate frequency as the numbers
transmission was totally blocking the frequency from effective use.
This regular transmission can be heard on Mondays at 0200 UTC
(Sunday night local US time) across most of the US.
A recently identified Cuban site (Guineo) is believed to ba a major
transmitter site used by DGI (Cuban Intelligence).
There has been some suggestion that the numbers are a form of
'one-time-pad' - a crude but unbreakable form of encryption
(unless you've got the key, that is) - if that's the case,
it's very curious to note that the same five-digit groups are
often seen to repeat over and over again in the very same
crypt - and that the same transmissions are seen to
repeat from week to week, and from month to month -
so often, in fact, that tape breaks are sometimes noted. When
spliced back together, the sloppy handling sometimes results in
truncated 5-digit groups - the end result being amixture of 4
and 5 digit groups in the very same transmission!
These facts would tend to point one away from the one-time-pad
concept and support a couple of other theories - suggesting that
the numbers are NOT a cipher, but rather a code unto themselves,
and that much of this traffic is 'dummy' in nature - broadcast
simply to keep a frequency open over a long period of time.
In addition, most five-digit Spanish numbers transmissions are
very badly over-modulated, resulting in numerous spurs up and
down frequency. When broadcast under such conditions, the
numbers (6) seis and (7) siete are almost indistinguishable,
making it impossible to copy a crypt without numerous errors.
It is worth noting that the four-digit Spanish and English
transmissions do not reflect this same technical ineptitude.
There are a number of reference materials available which provide
detailed information about cryptography and cryptanalysis, in
general, and numbers crypts, specifically. I'd be happy to provide
anyone interested with a list of books.
Only two publications I know of are currently available which
provide regular coverage of numbers, clandestine, pirate and
other interesting transmissions. The ACE Bulletin (monthly newsletter of the Association of Clandestine Enthusiasts - PO Box
11201, Department KK, Shawnee Mission, KS 66207 $16/yr) and the Umbra
et Lux Newsletter (a newsletter devoted to SIGINT, covert radio
and related topics - 10606-8 Camino Ruiz, Department KK, Suite
174, San Diego, CA 92126 $18/yr).
------------
For mathematically sophisticated readers, I can recommend "An Introduction to
Cryptology," by Henk C.A. van Tilborg. (1988 ISBN 0-89838-271-8 GR.) It
covers the following subjects:
Classical systems
Shift register sequences
Shannon theory
Huffman codes
Data Encryption Standard
Public Key Cryptography
Discrete Logarithm Problem
RSA
McEliece System
Knapsack problem
Threshold schemes
At $45.95 it isn't for everyone, but you order it from Kluwer Academic
Publishers, 101 Philip Drice, Norwell MA 02061. (Tel 617- 871-6600)
------------
Codes, ciphers, one-time-pads, numbers transmissions, spy communications - they all conjure up intrigue and shadows. There's lots
of information out there on this topic, and while much of it is
behind tightly closed doors, passwords and layers of armed
guards, much can be learned from books that aren't devoted entirely
to the technicalities of the subject.
The following bibliography will provide anyone with an interest in this
topic with an unusual mix of material. Some of the reference sources
are technical and deal exclusively with cryptographic/cryptanalytic
technique, while others provide insight into real-world situations/
applications of these techniques, and/or a historical perspective.
While some of the titles referenced may seem to be off the topic,
the careful reader will gain valuable insight from even those books
which contain very little pure cryptographic material (marked with
asterisks).
I have attempted to select books that can be read easily by the
beginner, although many of them may be extremely difficult to locate.
Inter-library loan might be of valuable assistance in this regard.
A word about my background - I spent several years in the military
and US Intelligence community with specialties in telecommunications,
traffic analysis, cryptography, cryptanalysis and counterintelligence.
I've written a couple of books and hundreds of magazine articles using
the pseudonym 'Havana Moon', which have dealt primarily with covert
radio and 'spy' numbers transmissions. I prefer to maintain my
anonymity for obvious reasons, and write on other subjects using
another name.
------------
And ye shall know the truth,
and the truth shall make you free.
John, VIII: 32
Inscription on the main lobby wall of the CIA
------------
SELECTED READING LIST
A HISTORY OF CODES, William Friedman (Aegean Park Press)
ALAN TURING: THE ENIGMA, Andrew Hodges (Burnett Books)
AN INTRODUCTION TO CRYPTOLOGY, van Tilborg
*A WORLD OF SECRETS. THE USES AND LIMITS OF INTELLIGENCE, by Walter
Laqueur (Basic Books)
*AGENCY OF FEAR, Edward Jay Epstein (McGraw-Hill)
AND I WAS THERE: PEARL HARBOR AND MIDWAY - BREAKING THE SECRETS, by
Rear Admiral Edwin T. Layton, USN (Ret.) (William Morrow)
*ANTI-MATTER, by C. M. Stanbury (Dust Books)
[This book borders on the lunatic fringe, but the careful reader
will gain an interesting perspective].
BEYOND CLOAK AND DAGGER: INSIDE THE CIA, by Miles Copeland (Pinnacle
Books)
BROKEN SEAL, by Ladislas Farago (Random House)
BURN AFTER READING, by Ladislas Farago (Pinnacle Books)
*CIA: THE INSIDE STORY, by Andrew Tully (Fawcett)
CLOAK AND CIPHER, by Dan Moore & Martha Waller (Bobbs-Merrill)
CODES AND CRYPTOGRAPHY, Dominic Welsh (Oxford Science Publishers)
CODES, CIPHERS AND COMPUTERS, by Bruce Bosworth (Hayden Books)
COMPUTER SIMULATION OF CLASSICAL SUBSTITUTION SYSTEMS, by Rudolph
Lauer (Aegean Park Press)
CRYPTANALYSIS, by Helen Fouche Gaines (Dover Paperbacks)
CRYPTANALYSIS FOR MICRO COMPUTERS, by Caxton Foster (Hayden Books)
CRYPTOGRAPHY, by Laurence Smith (Dover Paperbacks)
CRYPTOGRAPHY AND DATA SECURITY, by Dorothy Denning (Addison-Wesley)
[This is a highly technical book, included here with a word of
caution to the novice].
CRYPTOGRAPHY: A PRIMER, by Alan G. Konheim (John Wiley)
CRYPTOLOGY: YESTERDAY, TODAY AND TOMORROW, C. Deavours, et. al (Reprints
from Cryptologia, Volume I)
CRYPTOLOGY: MACHINES, HISTORY & METHODS, C. Deavours, et. al (Reprints
from Cryptologia, Volume II)
DEADLY MAGIC, by Edward Van Der Rhoer (Scribners)
DEFENDING SECRETS, SHARING DATA, US Office of Technology Assessment
DEEP BLACK, William Burrows
DOUBLE-EDGED SECRETS, by W.J. Holmes (Naval Institute Press)
ELEMENTARY CRYPTANALYSIS, Math Association of America
ELEMENTS OF CRYPTANALYSIS, by William F. Friedman (Aegean Park Press)
EMBASSY RADIO COMMUNICATIONS HANDBOOK, by Michael Schaay (Universal
Electronics)
ENIGMA, W. Kozaczuk, University Publications of America
*GERMAN MILITARY INTELLIGENCE, by Paul Leverkuehn (Weidenfeld & Nicol-
son)
GREAT MYTHS OF WORLD WAR II, by Karl Roebling (Paragon Press/Dyna
Press)
GUIDE TO EMBASSY AND ESPIONAGE COMMUNICATIONS, by Tom Kneitel (CRB
Research)
*HITLER'S SPIES, by David Kahbn, Ph.D. (Macmillan)
*HOW TO TUNE THE SECRET SHORTWAVE SPECTRUM, by Harry Helms (TAB Books)
INSIDE THE AQUARIUM, by Viktor Suvorov (Macmillan)
KAHN ON CODES, David Kahn, Ph.D., (Macmillan)
LANGUAGE IDENTIFICATION TABLE, by N. Ingle (Technical Translation
International)
MACHINE CRYPTOGRAPHY AND MODERN CRYPTANALYSIS, by C.A. Deavours
and Louis Kruh (Artech House)
MILITARY CRYPTANALYTICS, Callimahos & Friedman (Aegean Park Press)
NORMAL AND REVERSE ENGLISH WORD LIST, by US Department of Commerce,
National Technical Information Service)
PRINCIPLES OF MILITARY COMMUNICATIONS, by Don J. Torrieri (Artech
House Books)
*SPYCATCHER, by Peter Wright (Dell Paperbacks)
STATISTICAL METHODS IN CRYPTANALYSIS, by Solomon Kullback, Ph.D.
(Aegean Park Press)
*THE ANATOMY OF TWO TRAITORS, by Wayne Barker and Rodney Coffman
(Aegean Park Press)
THE AMERICAN BLACK CHAMBER, Herbert O. Yardley, Bobbs-Merrill, 1931
*THE BIG SECRET, by William Poundstone (William Morrow)
*THE CIA AND THE US INTELLIGENCE SYSTEM, by Scott Breckinridge
(Westview Press)
THE CODE BOOK, by Michael Marotta (Loompanics Unlimited)
THE CODEBREAKERS, by David Kahn, Ph.D. (Macmilllan)
*THE CRAFT OF INTELLIGENCE, by Allen Dulles (Harper & Rowe)
*THE CUBAN STORY, by Herbert Matthews (Braziller)
*THE CUCKOO'S EGG, Clifford Stoll (Doubleday)
*THE DOUBLE-CROSS SYSTEM, by J.C. Masterman (Yale University Press)
*THE GAME OF THE FOXES, by Ladislas Farago (McKay)
THE HUT SIX STORY, Gordon Welchman (McGraw-Hill)
THE NIGHT WATCH, by David Atlee Phillips (Atheneum)
THE PUZZLE PALACE, by James Bamford (2nd edition, Penguin Paperbacks)
THE RADIO HACKER'S CODE BOOK, George Sassoon (Longwood Publishing Group)
*THE SECRET WAR REPORT OF THE OSS, by Anthony Cave Brown (Berkley
Medallion Press)
*THE TOP SECRET REGISTRY OF US GOVERNMENT RADIO FREQUENCIES, by Tom
Kneitel (CRB Research)
*THE ULTRA AMERICAN: THE US ROLE IN BREAKING NAZI CODES" by Thomas
Parrish (Stein & Day)
*THE ULTRA SECRET, by F.W. Winterbotham (Dell Paperbacks)
*THE ZIMMERMAN TELEGRAM, by Barbara Tuchman (Viking)
WAR SECRETS IN THE ETHER, by William Flicke (Aegean Park Press)
------------
The following organizations frequently publish material on cryptography/cryptanalysis, some of it quite expensive. I believe they all
have catalogs available, so I've provided their addresses. A word
of caution, many of the titles in the Loompanics Catalog are offbeat
enough to cause one to rethink the right to freedom of expression
and freedom of the press.
Loompanics Unlimited
PO Box 1197
Port Townsend, WA 98368
Aegean Park Press
PO Box 2387
Laguna Hills, CA 92654
American Cryptogram Association
18789 W. Hickory Street
Mundelein, IL 60060
For an excellent real world perspective on the use of cryptographic
techniques, don't forget your shortwave radio.
------------
Footnote
The following publications provide fairly regular coverage of
similar topics. Their inclusion in a comprehensive listing of
reference material is important, but I wish to indicate clearly
that I have an interest - and/or publish regularly - in many of
these books/magazines/newsletters, and would hope that their
inclusion here not be misconstrued as an attempt at solicitation.
. The Umbra et Lux Newsletter, published by DX/SWL Press, edited by
Harry Helms - 10606-8 Camino Ruiz, Suite 174, San Diego, CA 92126
$18/year - $2.00/sample copy.
. The Numbers Factsheet, published quarterly by MoonBeam Press,
compiled and edited by Havana Moon. PO Box 149, Briarcliff, NY 10510
$16/year domestic, $25/year international. $5.00/sample copy
. Popular Communications Magazine, 76 North Broadway, Hicksville, NY
11801
. The A*C*E Digest, PO Box 11201, Shawnee Mission, KS 66207
$16/year - $2.00/sample copy.
. UNO, DOS, CUATRO: A GUIDE TO THE SPY NUMBERS STATIONS, by Havana Moon,
(Tiare Publications)
. LOS NUMEROS: THE NUMBERS STATIONS GUIDE, by Havana Moon, (Tiare
Publications)
. LOS NUMEROS ON-LINE, a full-featured electronic shortwave magazine,
with a dedicated "Crypto Vault"
------------
The ENIGMA cipher machine was used
by the German armed forces during WWII. The history of its interception, and
the breaking of the code have become legend, and a synopsis of that history
will be found in the accompanying .DOC file. In July 1981, an article
authored by Marian Rejewski appeared in "Annals of the History of
Computing", a quarterly publication of AFIPS (American Federation of
Information Publishing Societies, Inc.). Published with that article was a
simulation program in BASIC language which illust- rated the operation of the
ENIGMA. The program was authored by C.Deavours of the Math Dept., Kean
College of NJ. Of course, that issue (vol 3, # 3) was copyrighted by AFIPS.
The original program was modified, and was later translated to IBM/PC BASIC,
by J.E.Eller, Va.Beach, VA. ENIGMA.EXE is the result of that history. All
rights are reserved. Permission to use the original source material was
granted by AFIPS, on condition that credit be given to the source, and that
copying and distribution would not be used for direct commercial advantage.
Therefore, this library of files, includ- ing ENIGMA.EXE, ENIGMA.DOC, and
READ_ME.1st, may be distributed ONLY AS-IS without alteration or deletion, and
may not be used in any commercial manner.
Enigma, Ultra, cyclometer, bombas, bombes, Bletchley, Banbury,
Turing, .., .., . The list of names associated with the solution of
the code is endless. There is certainly no intent to slight here
the effort of any nation(s) or individual(s) by omitting them from
this list. Indeed, there is equally no intention of extending this
paper into the area, where angels fear to tread, of the several
controversies which have arisen, as they always do around legends.
Rather, the intent of this paper, and indeed this library of files,
will be to present, on a very small scale, the Enigma as a device,
and the technical factors involved in interceptions.
A few of those points WILL be simply mentioned now, to put the
entire issue in perspective, by associating the legends.
1) The question of which nation took what part, at which stage,
and under what constraints, in the monumental effort.
2) The relative impact of the project on the conduct or outcome
of World War II, from "winning the war" to "incidental".
3) The often repeated, but unsubstantiated, questions surrounding the bombing of Coventry in 1940.
Actually, one controversy may be of interest in computer terms.
It has been reported that Great Britain, which in 1943 developed
the "world's first electronic computer" (referring, of course, to
COLOSSUS, though even that title is disputable), did so as an
outgrowth of the earlier (electromechanical) bombas and bombes, and
applied it to the solution of Enigma traffic. This report has been
questioned, on the grounds that the COLOSSI were used to attack the
German Geheimschreibers (secret writers), more complex than the
Enigma.
The origin during the 1920's, of the Engima as we know it was as
a commercial device, sold to German industrial and business users,
and indeed in the 1930's to other nationalities as well. Poland
first became aware of the device about 1927, through a weekend
incident in Polish Customs involving a shipment made in error to a
German firm in Poland. Later, Poland openly purchased one from the
German manufacturer. The effort more often attributed to the Poles
was the capturing of a military version by the underground early
in the war. In any event, several European nations, including
Great Britain, Poland, and France were involved during the 1930's
in deciphering messages using the Engima, with little cooperation,
yet with considerable success. Indeed, an early, non-plugboard
version was used in the Spanish Civil War. Of course, the military
version differed in some respects, notably that the reflecting drum
was immovable in it, but the point here is that the Enigma concept
had been studied by the Allies long before 1939, the war's opening.
Physically, the external case of the original device resembled a
portable typewriter, though the ratio of the length of its sides
differed, being long and narrow. It contained a 26-letter keyboard
with (flashlight-like) lamps in place of the typebars, a plug-type
switchboard (which actually exchanged letter pairs), a battery for
power, and, finally, its most important part, a shaft holding three
drums (rotors), together with a fourth "reflecting" drum. On each
drum was a ring, on which were engraved the 26 letters of the
alphabet, and which could be rotated with respect to the rest of
the drum. The center of each drum was an insulating disk, with 26
stationary contacts on one side connected irregularly to 26 spring
contacts on the other side. The drums had toothed gears, to allow
relative turning of one by the next one.
When a key was pressed, the rightmost drum rotated 1/26th of
its circumference, and current flowed through the key, through the
three drums to the reflecting drum, then back again through the
three drums, through the plugboard, to light the proper lamp for
the enciphered letter. As encipherment continued, each successive
drum in turn rotated according to a plan much like an odometer.
Actually, in certain positions, the second drum might rotate two
positions for one complete rotation of the previous one, unlike an
odometer.
As this description indicates, a number of factors influenced
encipherment :
1) the connections of the drums, a factor of manufacture,
2) the daily key, including the setting of the rings, the order
of the drums on the shaft, the plugboard settings, and others,
3) the message key, the name applied to the initial setting of
the drums, with which the current message began.
It should be noted that, in early usage, the daily key was changed
on a somewhat extended schedule (perhaps once each month for some).
As the war progressed, they were changed with increasing frequency,
until finally, it became apparent that the Germans suspected their
traffic was being handled with some degree of success. As the war
ended, a new cipher machine was being introduced on the line.
Clearly, the intent of such a device relies less on the device
itself than on the management of its several factors. The Germans
decided that each military message originator would randomly set
his own message key, transmitting it in three enciphered characters
at the beginning of each message. Because of the unreliability of
military communications at that stage, they were transmitted twice
in succession. Thus, the first six characters of each message were
the message key, i.e. the initial settings of the drums.
To illustrate the complexity of the problem, the number of
possible unique interconnection sets of enciphering drums is 26!,
or 403,291,461,126,605,635,584,000,000 , and the number of unique
reflecting drum connections is 7,905,853,580,025. However, from a
practical point of view, all military machines would have the same
set of connections, to insure universal military communications.
This, then, is the importance of capturing a military unit, without
the enemy's certain knowledge. Clearly, the replacement of ALL
military units (estimated at 100,000 to 200,000) during the war,
would be a monumental logistic task, to be avoided unless totally
necessary.
Yet, even the keys presented no small problem. Each enciphering
drum can be set 26 different ways. Even with only three drums,
this means 17,576 possibilities. And, since their order on the
shaft can be changed, the combination of the two yields 105,456
possibilities. Add to this the plugboard variations (the original
6 pairs of letters was later increased to 10 pairs, leaving only 6
self-steckers of the 26 letters), and the problem increases. Then,
note that, as early as 1939, some parts of the German military used
a selection of eight drums from which to draw their three, and the
U-boats later used a 4-drum device. Each of these geometrically
increased complexity.
The task at hand was statistically a gigantic one, but one which
could be solved with sufficient resources, both mechanical and
human. These were applied during the war in a number of locations,
mostly in England ... from Alan Turing's organisation, with its
statisticians and other specialists to "the girls" of Banbury, as
they were known, the scores of young women who daily prepared the
"Banbury sheets". These were laboriously punched forms of daily
message traffic, from which repeat patterns were derived, using
"weights of evidence". And, as history knows, it WAS solved, to
the great benefit of the Allied war effort.
I sincerely hope that this writing, though perhaps too simple for
those with an interest in cryptoanalysis, has provided you with
some knowledge of the nature of the Engima, and the project which
the British called Ultra.
The program included in this library illustrates the techniques
described here. There are a number of papers and books on the
subject for those who wish to pursue it, including the one from
which part of this material was drawn. That article, which itself
contains some bibliography, appeared in the Annals of the History
of Computing, Vol 3, # 3, copyright July 1981, AFIPS (American
Federation of Information Processing Societies).
------------
On page 110 of the Fall 19?? issue of Whole Earth Review, there is an article
called "Clandestine Access" by Robert Horvitz. Numerous publications are
reviewed including "The Ace", "Umbra et Lux", "The Numbers Factsheet" (all of
which have published articles by Havana Moon) as well as "Pirate Pages",
"Clandestine Radio Broadcasting", etc. etc.!! Interesting reading!
If you can't find Whole Earth Review, write to Box 38, Sausalito CA 94966.
------------
The Winter 1987 issue of the Whole Earth Review was known as the "Signal"
issue and had a couple of articles of interest. Bob Horvitz wrote "An
Intelligent Guide to Intelligence" which had a definitie radio bent, with
sidebars on Foreign News Monitors and News via Radioteletype.
There was also an article called "H-Bomb Truck Watch: Citizen Intelligence
Activism" about efforts to track DOE truck convoys between US Nuclear
facilities. These convoys CAN be monitored on the HF bands.
This issue of WER was rereleased as a full-scale book in late 1988 or early
1989 and should still be available at your local bookstore.
|