1135 lines
54 KiB
Groff
1135 lines
54 KiB
Groff
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
= =
|
||
|
- WELCOME TO THE SEVENTH ISSUE OF -
|
||
|
= =
|
||
|
- -=>PHANTASY<=- -
|
||
|
= =
|
||
|
- A PUBLICATION AND NEWSLETTER OF -
|
||
|
= =
|
||
|
- THE -
|
||
|
= INTERNATIONAL =
|
||
|
- INFORMATION -
|
||
|
= RETRIEVAL =
|
||
|
- GUILD -
|
||
|
= =
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Volume Number Three,Issue Number Seven Dated 3/1/92
|
||
|
Editor: Mercenary@f515.n141.z1.fidonet.org
|
||
|
|
||
|
Article Submissions: The Mercenary/IIRG
|
||
|
862 Farmington Avenue
|
||
|
Suite 306
|
||
|
Bristol,Ct 06010
|
||
|
|
||
|
Table of Discontents:
|
||
|
|
||
|
[1] New Onslaught of Hacker Mania?
|
||
|
Editorial By: The Silent Brotherhood
|
||
|
|
||
|
[2] New Information on USA Bust
|
||
|
From: Computer Underground Digest Issue #4.06
|
||
|
|
||
|
[3] Quick Comment on USA Bust
|
||
|
By: Mercenary
|
||
|
|
||
|
[4] More Information on USA Bust
|
||
|
Supplied By: Online BBS File
|
||
|
|
||
|
[5] Phantasy Magazine to Carry C.O.D.E. and D.O.A.
|
||
|
By: Knight Hack
|
||
|
|
||
|
[6] Social Security Number Prefixes
|
||
|
By: C.O.D.E. (Crackers Of Digital Equipment)
|
||
|
|
||
|
[7] FireCrackers Part I
|
||
|
By: Saint Anarchy/D.O.A.
|
||
|
|
||
|
[8] PHANTASY TIDBITS: News and Views of Interest
|
||
|
|
||
|
1. Dad Downloads Gun into Son's Computer
|
||
|
2. MIT Anti-Semitic Problem
|
||
|
3. Digital Announces ALPHA
|
||
|
|
||
|
[9] FOR THE PEOPLE
|
||
|
Supplied By: Bulletin Boards Across the Country
|
||
|
Edited by: Mercenary
|
||
|
|
||
|
1. Video Game Piracy
|
||
|
2. Cybertek
|
||
|
3. Note From "Static"
|
||
|
4. Michelangelo Virus Info
|
||
|
5. Genghis Khan's Bust
|
||
|
|
||
|
[10] Listing of IIRG Distribution Sites
|
||
|
|
||
|
[11] Listing of PHANTASY Distribution Sites
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
OFFICIAL DISLAIMER...
|
||
|
|
||
|
All information in PHANTASY is from USER contributed material
|
||
|
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
||
|
any liability from any damages of any type that the reader or
|
||
|
user of such information contained within this newsletter may encounter
|
||
|
from the use of said information. All files are brought to you for
|
||
|
entertainment purposes only! We also assume all information infringes
|
||
|
no copyrights and hereby disclaim any liability.
|
||
|
|
||
|
PHANTASY is (C) 1990 by The IIRG
|
||
|
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [1]: New Onslaught of Hacker Mania
|
||
|
Editorial By: Silent Botherhood
|
||
|
|
||
|
Staying Alive and Surviving in the Nineties.
|
||
|
|
||
|
Seems to be a common theme amongst everyone nowdays, from the layed-off
|
||
|
factory worker to the grandmother on Social-Security.
|
||
|
And yet Big Brother seems fit to be on another current wave of round-ups
|
||
|
of those "EVIL HACKERS" once again.
|
||
|
Those of here at the Brotherhood have a few questions to ponder, and we'd
|
||
|
ask you to join us on our contemplation.
|
||
|
|
||
|
1. How come during a declining Economy, Federal Agencies such as
|
||
|
the Secret Service and F.B.I., always seem to Dig-up
|
||
|
"Domestic Threats"?
|
||
|
|
||
|
Response:
|
||
|
|
||
|
Job Security, Who do you know that wants to be layed off?
|
||
|
Agents must look busy, especially during an election year, and what better
|
||
|
way to pad the payroll then by chasing a 15 year old computer enthusiast.
|
||
|
Plus, this is much less demanding than say, rounding up real terrorists
|
||
|
who just might actually have the gall to shoot back.
|
||
|
|
||
|
2. Why do Government Agencies such as the Secret Service and F.B.I.
|
||
|
Confiscate equipment, Never press charges, then never return those
|
||
|
items?
|
||
|
|
||
|
Response:
|
||
|
|
||
|
MONEY!! What better way to line the old pockets with a few extra bucks,
|
||
|
Ever seen those ads for Government Auctions? I bet you have boys and girls!
|
||
|
And it saves those agents the trouble of shoplifting, such as Secret Service
|
||
|
Agent Joyce Fletcher,(A Dan Quayle Body-Guard), they're not very good at it.
|
||
|
|
||
|
3. Why Target Hackers,Phreakers, and Pirates?
|
||
|
|
||
|
Response:
|
||
|
|
||
|
Like we said earlier, a computer enthusiast makes a nice easy mark.
|
||
|
Whens the last time you saw this headline,
|
||
|
|
||
|
"SECRET SERVICE BUST GOES BAD, 15 YEAR OLD HACKER KILLS 5 WITH DISK DRIVE"
|
||
|
|
||
|
Nice to know you won't be shot at, plus the real people ripping off
|
||
|
more phone service than you can shake a stick at,"THE MOB", has guns
|
||
|
and a few trigger happy boys to use them.
|
||
|
As for Pirates, a little under the table "Bonus" for cracking down on
|
||
|
someone dealing in your product has become a way of life.
|
||
|
|
||
|
Well, it all boils down to Survival.... And unless the economy shores
|
||
|
up or we get in a nice little war again, We won't see a let-up of
|
||
|
pressure on the Federal Agencies to legitamize their payrolls.
|
||
|
|
||
|
THE SILENT BROTHERHOOD
|
||
|
|
||
|
P.S.: If your an F.B.I. or S.S. Agent reading the above article
|
||
|
I own nothing, I live off of Food Stamps, I live under a bridge,
|
||
|
and I sure as hell hope you don't hold a grudge....
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [2]: New Information on USA Bust
|
||
|
From: CUD #4.06
|
||
|
|
||
|
The following appeared in Computer Underground Digest Issue 4.06, it seems
|
||
|
to conflict with what else we've learned about the Bust here at Phantasy.
|
||
|
We present it here in its original form as to offer both sides of the
|
||
|
story, as CUD's story appears to conflict with the news file currently
|
||
|
circulating on the Pirate Community Boards. (SEE SECTION [4])
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
Date: 8 Feb 92 17:31: 39 CST
|
||
|
From: Moderators (tk0jut2@mvs.niu.edu)
|
||
|
Subject: File 1--Bust of "NotSoHumble Babe" / USA
|
||
|
|
||
|
The recent busts of three persons in the Detroit and Los Angeles areas
|
||
|
for alleged carding, theft, software copyright violations and fraud
|
||
|
raise a number of issues of CU relevance. Because of misinformation
|
||
|
circulating on the nature of the case, we summarize what we know of it
|
||
|
below. "Amy" (handle: "NotSoHumble Babe") was busted on her birthday,
|
||
|
and is not untypical of many CU types, so we focus on her.
|
||
|
|
||
|
1. "Amy" was busted on Jan 30, in Farmington Hills (Mi), by local,
|
||
|
state, and federal agents. There were reportedly up to 20 agents.
|
||
|
The large number was because there were several from each
|
||
|
department, including the FBI, SecServ, Mi State police, and
|
||
|
others. They reportedly showed no warrant, but knocked on the door
|
||
|
and asked if they could come in. When "Amy" said "yes," they burst
|
||
|
(rather than calmly entered) with weapons, including
|
||
|
"semi-automatics." Her boyfriend was reportedly asleep, and the
|
||
|
agents awakened him with a gun to his head. The agent in charge
|
||
|
was Tony Alvarez of the Detroit SecServ.
|
||
|
|
||
|
2. There has been no indictment, but the agents indicated that charges
|
||
|
would include theft, fraud, and copyright violations. (software
|
||
|
piracy and carding). The initial figure given was a combined $20,000
|
||
|
for the three ("Amy," "Tom," and Mike").
|
||
|
|
||
|
3. All equipment was confiscated, included "every scrap of paper in
|
||
|
the house. She was informed that, whatever the outcome of the case,
|
||
|
she would not receive the equipment back and that it would be kept
|
||
|
for "internal use."
|
||
|
|
||
|
The above account differs dramatically from one given by "anonymous"
|
||
|
in "Phantasy #6," which was a diatribe against the three for
|
||
|
"ratting." However, the above account seems fairly reliable, judging
|
||
|
from a news account and a source close to the incident.
|
||
|
|
||
|
"Amy" is 27, and reported to be the head of USA (United Software
|
||
|
Alliance), which is considered by some to be the current top
|
||
|
"cracking" group in the country. If memory serves, "ENTERPRISE BBS"
|
||
|
was the USA homeboard. She was questioned for about 10 hours, and
|
||
|
"cooperated." She has, as of Saturday (Feb 9) *not* yet talked to an
|
||
|
attorney, although she was put in contact with one late Saturday. The
|
||
|
prosecutor in Oakland County is the same one who is prosecuting Dr.
|
||
|
Kavorkian (of "suicide machine" fame). He has a reputation as
|
||
|
excessively harsh, and his demeanor in television interviews does not
|
||
|
contradict this.
|
||
|
|
||
|
The other two defendants, "Mike/The Grim Reaper," and "Tom/Genesis"
|
||
|
are from the Detroit and Los Angeles areas.
|
||
|
|
||
|
What are the issues relevant for us?
|
||
|
|
||
|
My own radiclib concern is with over-criminalization created by
|
||
|
imposing a label onto a variety of disparate behaviors and then
|
||
|
invoking the full weight of the system against the label instead of
|
||
|
the behaviors. It is fully possible to oppose the behaviors while
|
||
|
recognizing that the current method of labelling, processing, and
|
||
|
punishment may not be wise. Len Rose provides an example of how
|
||
|
unacceptable but relatively benign behaviors lead to excessive
|
||
|
punishment. This, however, is a broader social issue of which
|
||
|
computer-related crimes is simply a symptom.
|
||
|
|
||
|
Of more direct relevance:
|
||
|
|
||
|
1) It appears that the continued use of massive force and weaponry
|
||
|
continues. We've discussed this before in alluding to cases in New
|
||
|
York, Illinois, Texas, and California. The video tape of the bust
|
||
|
of the "Hollywood Hacker" resembles a Miami Vice episode: A
|
||
|
middle-aged guy is confronted with an army of yelling weapons with
|
||
|
guns drawn charging through the door. Others on the board have
|
||
|
reported incidences of being met with a shotgun while stepping out
|
||
|
of the shower, a gun to the head while in bed, and (my favorite) a
|
||
|
15 year old kid busted while working on his computer and the
|
||
|
agent-in-charge put her gun to his head and reportedly said, "touch
|
||
|
that keyboard and die." The use of such force in this type of bust
|
||
|
is simply unacceptable because of the potential danger (especially
|
||
|
in multi-jurisdictional busts, which reduces the precision of
|
||
|
coordination) of accidental violence.
|
||
|
|
||
|
2. Until indictments and supporting evidence are made public, we
|
||
|
cannot be sure what the occured. But, it seems clear that, for
|
||
|
"Amy" at least, we are not dealing with a major felon. Carding is
|
||
|
obviously wrong, but I doubt that, in situations such as this,
|
||
|
heavy-duty felony charges are required to "teach a lesson," "set
|
||
|
an example," and re-channel behavior into more productive outlets.
|
||
|
|
||
|
3. We can continue to debate the legal and ethical implications of
|
||
|
software piracy. There is a continuum from useful and fully
|
||
|
justifiable "creative sharing" to heavy-duty predatory rip-off for
|
||
|
profit. This case seems to be the former rather than the latter.
|
||
|
There is no sound reason for treating extreme cases alike.
|
||
|
|
||
|
3. We should all be concerned about how LE frames and dramatizes such
|
||
|
cases for public consumption. The Farmington newspaper gave it
|
||
|
major coverage as a national crime of immense proportions. We
|
||
|
should all be concerned about how piracy cases are handled, because
|
||
|
even extreme cases have implications for minor ones. Does
|
||
|
possession of an unauthorized copy of Aldus Pagemaker and Harvard
|
||
|
Graphics, collective worth more than $1,000, really constitute a
|
||
|
major "theft"? We have seen from the cases of Len and Craig how
|
||
|
evaluation of a product is inflated to justify indictments that
|
||
|
look serious but in fact are not.
|
||
|
|
||
|
I'm not sure what purpose it serves to simply assert that people--even
|
||
|
if guilty of carding or piracy--should "get what's coming to them"
|
||
|
without reflecting on what it is they get and why. The issue isn't
|
||
|
one of coddling or protecting "criminals," but to examine more
|
||
|
carefully what kinds of computer-related crimes should be
|
||
|
criminalized, which should be torts, and which should be accepted as
|
||
|
minor nuisances and--if not ignored--at least not criminalized.
|
||
|
|
||
|
To give the dead horse one last kick: I am not arguing that we condone
|
||
|
behaviors. I am only suggesting that we reflect more carefully on how
|
||
|
we respond to such behaviors. I do not know the circumstances of "Tom"
|
||
|
and "Mike," but "Amy's" case raises many issues we can address without
|
||
|
condoning the behavior.
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [3]: QUICK COMMENT ON BUST
|
||
|
By: MERCENARY
|
||
|
|
||
|
CUD does not name its sources, but the following article in section
|
||
|
four appears to Substantiate the Article supplied to our Headquarters BBS.
|
||
|
by an Anonymous Donor.
|
||
|
Although the article claims Five Men were detained, its suprising in its
|
||
|
similarity of the original article supplied to us.
|
||
|
Even the file Circulating By The NotSoHumble Babe says the members were
|
||
|
going to pick up their carded packages.
|
||
|
At the time of this printing, We're trying to prepare an interview with
|
||
|
One of the busted members.
|
||
|
In closing please read section Four and try to formulate your own
|
||
|
conclusions.
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [4]: More USA Bust Info
|
||
|
Supplied By: Online BBS File
|
||
|
|
||
|
|
||
|
Dateline: Livonia Observer, Monday, February 3, 1992 , Volume 52 Number 1
|
||
|
|
||
|
AUTHORITIES CRACK NATIONAL COMPUTER FRAUD RING
|
||
|
|
||
|
In a continuous 36-hour investigation, Farmington Hills Police, U.S.
|
||
|
Secret Service and Michigan State Police cracked what is believed to be a
|
||
|
nationwide computer fraud ring operating from Farmington Hills and involving
|
||
|
men from Livonia, Canton, Plymouth.
|
||
|
|
||
|
Farmington Hills police briefly detained the five men, who they say agreed
|
||
|
Thursday to cooperate with the investigation.
|
||
|
|
||
|
Oakland County and federal prosecutors are reviewing the case to determine
|
||
|
what charges will be filed against the five men - two from Livonia, one form
|
||
|
Farmington Hills, one from Plymouth and one from Canton, said Farmington Hills
|
||
|
Det. Sgt. Charles Nebus.
|
||
|
|
||
|
The five men were not identified pending arrest and arraignment.
|
||
|
|
||
|
"They are computer hackers," said Farmington Hills Det. Patrick Monti. "They
|
||
|
have a high level of expertise in computers."
|
||
|
|
||
|
Members of the alleged fraud ring apparently gained access to computers of
|
||
|
credit reporting companies and used information, such as credit card numbers,
|
||
|
credit limit, card balance, and card holder names, to order computer
|
||
|
equipment, Monti said.
|
||
|
|
||
|
Purchases of computer equipment were billed to people who had no idea their
|
||
|
credit card numbers and information were being used to place the orders, Monti
|
||
|
said.
|
||
|
|
||
|
The 36-hour investigation began early Wednesday, Jan. 29, with a telephone
|
||
|
call to Farmington Hills police from a computer company with offices in Hawaii
|
||
|
and Texas.
|
||
|
|
||
|
Company officials told police they believed they had a fraudulent order that
|
||
|
led to Farmington Hills.
|
||
|
|
||
|
Police got in touch with Federal Express in Novi where packages where expected
|
||
|
to arrive. Dectectives Monti, Tim Swanson and David Loe conducted
|
||
|
surveillance of the area. They saw three men in three cars arrive to pick up
|
||
|
packages from the computer company, Monti said.
|
||
|
|
||
|
Detectives followed the men to a Farmington Hills apartment where a fourth man
|
||
|
was waiting. "At that time we confronted the occupants of the apartment. And
|
||
|
they agreed to cooperate with us." Monti said.
|
||
|
|
||
|
Police surveillance continued to Meijer Thrifty Acres at Eight Mile and
|
||
|
Haggerty roads, Northville Township, where the Canton man - considered to be
|
||
|
the brains behind the operation - retrieved the packages, Nebus said.
|
||
|
|
||
|
"It was a ring of people with the man in Canton as the main actor. He placed
|
||
|
the orders and others delivered the packages to him."
|
||
|
|
||
|
Police recovered packages, valued at about $20,000, ordered by the ring.
|
||
|
|
||
|
Forfeiture proceedings are expected to intitiated on equipment owned by one of
|
||
|
the men in the ring. The other packages of computers will be returned to the
|
||
|
companies from which they were ordered, Monti said.
|
||
|
|
||
|
"We determined all the packages we picked up were fraudulent," Monti added.
|
||
|
"When they would go to Federal Express they would sign the name of the person
|
||
|
(whose credit card numbers they used) for the packages.
|
||
|
|
||
|
Farmington Hills police, Secret Service officers and the Michigan State
|
||
|
Police searched the Canton man's house Thursday.
|
||
|
|
||
|
"The Canton man placed the orders and advised a Farmington Hills man to go to
|
||
|
Federal Express in Novi and pick up the packages," Monti said. "It is our
|
||
|
belief they were selling the computers."
|
||
|
|
||
|
The ring would make use of what is called a "bulletin board," which is
|
||
|
computer information available throughout the country. While using the
|
||
|
bulletin board is not illegal, the information ring members used is, Monti
|
||
|
said.
|
||
|
|
||
|
"The detectives did an outstanding job," Nebus said. "From the time the
|
||
|
information came in, these guys really had to scramble. I credit them with
|
||
|
doing an excellent job on surveillance."
|
||
|
|
||
|
Nebus also credited Federal Express. "We really depend on them a lot. They're
|
||
|
good folks to work with."
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [5]: Phantasy to Carry C.O.D.E. and D.O.A.
|
||
|
By: Knight Hack
|
||
|
|
||
|
Starting with this Issue, Number Seven. Phantasy Magazine will be carrying
|
||
|
independently authored files by C.O.D.E. (Crackers of Digital Equipment)
|
||
|
and D.O.A. (Distributors of Anarchy).
|
||
|
These two groups have agreed to distribute thier files in Phantasy, instead
|
||
|
of trying to distribute their files independently.
|
||
|
If your group would like to take advantage of Phantasys Distribution
|
||
|
network and not go through the hassle of setting up sites yourselves
|
||
|
please contact Mercenary at any listed site or Anubis at Dark Shadows.
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [6]: Social Security Number Prefixes
|
||
|
By: C.O.D.E. (Crackers Of Digital Equipment)
|
||
|
|
||
|
C.O.D.E Phile Number One
|
||
|
|
||
|
SOCIAL SECURITY NUMBER PREFIXES
|
||
|
|
||
|
SSNs (Social Security Numbers) are issued with prefixes related
|
||
|
to the applicant's address at the time of application.
|
||
|
The following is a list of those prefixes for you to rapidly look
|
||
|
up by State.
|
||
|
Although accurate as of this printing, the information
|
||
|
this text provides may become obsolete. The Social Security
|
||
|
Administration periodically adds to the numbers issued. It may
|
||
|
at times assign numbers from one geographical area to another
|
||
|
area.
|
||
|
|
||
|
Prefix numbers are continuous from 001 through 626, and 700
|
||
|
through 729. Numbers 627 through 699 and 730 or above may be
|
||
|
suspect.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
STATE Prefixes Used Comment
|
||
|
-------------------------------------------------------------------------------
|
||
|
AK Alaska Prefixes: 574
|
||
|
AL Alabama Prefixes: 416 thru 424
|
||
|
AR Arkansas Prefixes: 429 thru 432
|
||
|
AS American Samoa Prefixes: 586
|
||
|
AZ Arizona Prefixes: 526,527
|
||
|
AZ Arizona Prefixes: 600,601 Since August 1985
|
||
|
CA California Prefixes: 545 thru 573
|
||
|
CA California Prefixes: 602 thru 626 Since August 1985
|
||
|
CO Colorado Prefixes: 521 thru 524
|
||
|
CT Connecticut Prefixes: 040 thru 049
|
||
|
DC District of Columbia Prefixes: 577 thru 579
|
||
|
DE Deleware Prefixes: 221,222
|
||
|
FL Florida Prefixes: 261 thru 267
|
||
|
FL Florida Prefixes: 589 thru 595
|
||
|
GA Georgia Prefixes: 252 thru 260
|
||
|
GU Guam Prefixes: 586
|
||
|
HI Hawaii Prefixes: 575,576
|
||
|
IA Iowa Prefixes: 478 thru 485
|
||
|
ID Idaho Prefixes: 518,519
|
||
|
IL Illinois Prefixes: 318 thru 361
|
||
|
IN Indiana Prefixes: 303 thru 317
|
||
|
KS Kansas Prefixes: 509 thru 515
|
||
|
KY Kentucky Prefixes: 400 thru 407
|
||
|
LA Louisiana Prefixes: 433 thru 439
|
||
|
MA Massachusetts Prefixes: 010 thru 034
|
||
|
MD Maryland Prefixes: 212 thru 220
|
||
|
ME Maine Prefixes: 004 thru 007
|
||
|
MI Michigan Prefixes: 362 thru 386
|
||
|
MN Minnesota Prefixes: 468 thru 477
|
||
|
MO Missouri Prefixes: 486 thru 500
|
||
|
MS Mississippi Prefixes: 425 thru 528
|
||
|
MS Mississippi Prefixes: 587,588
|
||
|
MT Montana Prefixes: 516,517
|
||
|
NC North Carolina Prefixes: 232
|
||
|
NC North Carolina Prefixes: 237 thru 246
|
||
|
ND North Dakota Prefixes: 501,502
|
||
|
NE Nebraska Prefixes: 505 thru 508
|
||
|
NH New Hampshire Prefixes: 001,002,003
|
||
|
NJ New Jersey Prefixes: 135 thru 158
|
||
|
NM New Mexico Prefixes: 525,585
|
||
|
NV Nevada Prefixes: 530
|
||
|
NY New York Prefixes: 050 thru 134
|
||
|
OH Ohio Prefixes: 268 thru 302
|
||
|
OK Oklahoma Prefixes: 440 thru 448
|
||
|
OR Oregon Prefixes: 540 thru 544
|
||
|
PA Pennsylvania Prefixes: 159 thru 211
|
||
|
PI Philippine Islands Prefixes: 586
|
||
|
PR Puerto Rico Prefixes: 580 thru 584
|
||
|
PR Puerto Rico Prefixes: 596 thru 599 Since August 1985
|
||
|
RI Rhode Island Prefixes: 035 thru 039
|
||
|
RR RailRoad Retirement Prefixes: 700 thru 729
|
||
|
SC South Carolina Prefixes: 247 thru 257
|
||
|
SD South Dakota Prefixes: 503,504
|
||
|
TN Tennessee Prefixes: 408 thru 415
|
||
|
TX Texas Prefixes: 449 thru 467
|
||
|
UT Utah Prefixes: 528,529
|
||
|
VA Virginia Prefixes: 223 thru 231
|
||
|
VI Virgin Islands Prefixes: 580
|
||
|
VT Vermont Prefixes: 008,009
|
||
|
WA Washington Prefixes: 531 thru 539
|
||
|
WI Wisconsin Prefixes: 387 thru 399
|
||
|
WV West Virginia Prefixes: 232 thru 236
|
||
|
WY Wyoming Prefixes: 520
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [7]: FireCrackers Part I
|
||
|
By: Saint Anarchy/D.O.A.
|
||
|
|
||
|
FireCrackers are so simple to make that many books on fireworks
|
||
|
often ingnore them.
|
||
|
There are two main types of FireCrackers, but many different mixtures
|
||
|
or powder formulas.
|
||
|
This month I will only look at the "GIANT" FireCracker Class.
|
||
|
Handmade "GIANT" FireCrackers are made by first rolling paper around
|
||
|
a 3/4 inch wooden dowel until the paper is 1/8 inch thick. This is the
|
||
|
casing of the FireCracker.
|
||
|
The best paper to use is from a brown paper grocery bag. It is cut into
|
||
|
the desired width and length to make 1/8 inch when rolled.
|
||
|
On the last layer of the rolling process, the paper is glued and the
|
||
|
completed paper tube is slipped off the dowel.
|
||
|
1/4 Inch thick slice of the dowel is used to plug the end. The plug
|
||
|
for the fuse end is drilled to allow for the fuse. The plugs are smeared
|
||
|
with glue before being pressed into the end of the tube. More glue is
|
||
|
squeezed around the fuse after being inserted.
|
||
|
In all the directions I have for making giant FireCrackers, it is
|
||
|
recommended that they be filled only about 1/3 full. It is generally
|
||
|
accepted that completely filled ones are not as loud as 1/3 filled
|
||
|
tubes.
|
||
|
If you choose to only fill the tube 1/3 of the way, make sure you
|
||
|
insert the fuse deep enough as to reach the powder.
|
||
|
Adequate FireCrackers can be made with commercial gun powder, pistol
|
||
|
powder being the best to use,but even shotgun powder will do.
|
||
|
In Part II next month will look at complete powder formulas and
|
||
|
the second class of FireCrackers.
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [8]: PHANTASY TIDBITS
|
||
|
News and Views of Interest
|
||
|
Edited By: Mercenary
|
||
|
-------------------------------------------------------------------------------
|
||
|
Dateline: 2/11/92
|
||
|
From: Spokane,Washington
|
||
|
|
||
|
DAD DOWNLOADS GUN INTO SON'S COMPUTER
|
||
|
|
||
|
A man apparently irritated by the amount of time his son spent using a
|
||
|
Computer was arrested after firing seven shots into the machine, police said.
|
||
|
Charles R. Hubbard,44,of Spokane was arrested late Tuesday for investigation
|
||
|
of assault, He was released Wednesday after posting $20,000 Bail.
|
||
|
"He appeared to be upset because his son was unemployed and all he did was
|
||
|
mess with that -qoute- "STUPID" computer" police Sgt. Al Odenthal said.
|
||
|
The assault charge was for allegedly pointing a .45-caliber semi-automatic
|
||
|
handgun at his son, Odenthal said.
|
||
|
"Im not sure if its against the law to shoot property in your own home,"
|
||
|
he said.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
Dateline: 2/14/92
|
||
|
From: MIT (Massachusetts Institute of Technology)
|
||
|
|
||
|
Phantasy Note: It appears that MIT is having similar woes to Prodigy
|
||
|
of Anti-Semitic Messages being placed on-line
|
||
|
The following two letters have appeared in "The Tech",
|
||
|
Volume 112,Number 5, (an MIT Newspaper).
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
LETTER ONE:
|
||
|
|
||
|
FREE SPEECH DOES NOT PROTECT ETHNIC "JOKES"
|
||
|
|
||
|
Freedom of speech and the privilege of attending an institution like
|
||
|
MIT imply, (but do not always require), responsibility.
|
||
|
As MIT's president, it often falls to me to defend freedom of speech
|
||
|
and academic freedom on our campus. I do so gladly and with conviction,
|
||
|
because it is important that our campus and society allow people to give
|
||
|
voice to difficult questions and analyses that may differ radically from
|
||
|
the norm.
|
||
|
Such defenses begin to ring hollow, however, when individuals engage in
|
||
|
mindless,offensive,and hurtful behavior just to "prove a point".
|
||
|
This is precisely how I would characterize the use of computer bulletin
|
||
|
boards by an MIT student to disseminate repugnant ethnic "jokes".
|
||
|
Surely those who exercise freedom of speech have a responsibility to
|
||
|
consider the consequences of what they say. Disparaging remarks about
|
||
|
certain groups within our cumminity are hurtful to those individuals
|
||
|
and diminish us all.
|
||
|
|
||
|
Charles M. Vest
|
||
|
President
|
||
|
------------------------------------------------------------------------------
|
||
|
LETTER TWO:
|
||
|
|
||
|
COMPUTER NETWORK NOT THE PLACE FOR ANTI-SEMITIC HUMOR
|
||
|
|
||
|
I'm deeply disturbed about reports that at least one student at MIT
|
||
|
is using the computer network to broadcast misogynist and anti-semitic
|
||
|
jokes, even holocaust jokes.
|
||
|
The use of our communications technology in this way can only diminish
|
||
|
and dehumanize the members of some groups in the eyes of others. To
|
||
|
dehumanize is a precursor to harassment, and even to persecution and
|
||
|
terror. If individuals want to demean themselves by telling such
|
||
|
jokes in private, they are free to do so. But to use MIT communication
|
||
|
facilities to greatly amplify the audience for such jokes should not be
|
||
|
considered acceptable behavior at MIT.
|
||
|
It is difficult enough to create a community of civility and caring
|
||
|
where people feel safe to share and learn without being confonted with
|
||
|
such ugly assault.
|
||
|
|
||
|
Rev. Scott Paradise
|
||
|
Episcopal Chaplain
|
||
|
-------------------------------------------------------------------------------
|
||
|
Dateline: 2/25/92
|
||
|
From: Digital
|
||
|
|
||
|
DIGITAL ANNOUNCES THE ALPHA OPEN COMPUTING ARCHITECTURE,
|
||
|
THE WORLD'S FASTEST MICROPROCESSOR,
|
||
|
AND NEW BUSINESS PRACTICES
|
||
|
|
||
|
|
||
|
...Lays the foundation for 21st century network computing
|
||
|
with a solid bridge from the present.
|
||
|
|
||
|
|
||
|
HUDSON, MA -- February 25, 1992 -- Digital Equipment Corporation
|
||
|
today announced Alpha, its program for 21st century computing.
|
||
|
According to Kenneth H. Olsen, President of Digital Equipment
|
||
|
Corporation, "Alpha is a totally new, open computing
|
||
|
architecture that will be the foundation for advanced 21st
|
||
|
century computing. It will give computer users a clear and
|
||
|
consistent growth path from today's computing technology to the
|
||
|
benefits of advanced 21st century computer technology. The
|
||
|
Alpha program is a major element in the new, more competitive
|
||
|
Digital Equipment Corporation, and we believe it will
|
||
|
significantly fuel Digital's growth in the coming years."
|
||
|
"This new architecture will, over time, address the needs
|
||
|
of a broad range of computer users by providing systems that
|
||
|
span the desktop to the supercomputer. Alpha will offer users
|
||
|
the flexibility to deploy current applications on popular
|
||
|
operating environments, beginning with OSF/1 and VMS. It will
|
||
|
enhance and extend the capability of today's Digital products.
|
||
|
Customers can continue to buy today's leadership VMS and UNIX
|
||
|
systems from Digital knowing they have a clear entry path into
|
||
|
21st century computing," added William Demmer, vice president of
|
||
|
Digital's VAX VMS Systems and Servers group. "The beauty of
|
||
|
Alpha is that it opens the future with a solid bridge from the
|
||
|
present," he added.
|
||
|
|
||
|
Announced today were:
|
||
|
|
||
|
o The Alpha architecture. This advanced, full 64-bit
|
||
|
Reduced Instruction Set Computing (RISC) architecture is
|
||
|
optimized for speed, engineered to support multiple
|
||
|
operating systems, and designed to increase performance
|
||
|
by a factor of 1000 over its anticipated 25-year life.
|
||
|
|
||
|
o The first Alpha product -- Digital's 21064-AA RISC
|
||
|
microprocessor. This 150-MegaHertz microprocessor is the
|
||
|
first in a family of full 64-bit chips with address space
|
||
|
many thousands of times larger than 32-bit
|
||
|
implementations from IBM, Hewlett-Packard, and Sun. The
|
||
|
new chip has demonstrated performance at 200 MegaHertz,
|
||
|
and over time Digital will offer versions of this
|
||
|
microprocessor at various speeds.
|
||
|
|
||
|
Evaluation quantities of the 21064-AA microprocessor are
|
||
|
available now. It is priced at $3375 each in units of 1
|
||
|
to 100; $1650 in units of 101 to 1,000; and $1559 for
|
||
|
over 1,000. Quantity shipments will begin in July, 1992.
|
||
|
|
||
|
The new RISC microprocessor chips are manufactured at the
|
||
|
company's high-volume, state-of-the-art manufacturing
|
||
|
plants in Hudson, Massachusetts, and South Queensferry,
|
||
|
Scotland.
|
||
|
|
||
|
o New business practices to achieve the broadest possible
|
||
|
use of the Alpha architecture, and to make the widest
|
||
|
range of software available on Alpha. Digital will sell
|
||
|
Alpha at all levels of integration -- chip, board, and
|
||
|
system -- to other computer companies and to OEMs.
|
||
|
Digital also will license its operating systems
|
||
|
(including DEC OSF/1 and VMS), compilers, and layered
|
||
|
software products.
|
||
|
|
||
|
To ensure a broad applications portfolio, Digital is
|
||
|
offering a comprehensive support program to help leading
|
||
|
software companies quickly move up to Alpha. Thirty
|
||
|
Alpha Upgrade Centers are being located in the US, Europe
|
||
|
and Asian Rim, staffed by software support personnel with
|
||
|
expertise in VMS, ULTRIX, and DEC OSF/1. Complete
|
||
|
documentation, seminars and training session are
|
||
|
available now, and seed Alpha system will be available
|
||
|
this summer. The Alpha Upgrade Program already is
|
||
|
underway with many leading software companies. Major
|
||
|
vendors supporting the Alpha platform will be highlighted
|
||
|
at DECWORLD '92 beginning in April.
|
||
|
|
||
|
o A variety of ways for customers to enhance their VMS and
|
||
|
UNIX computing environments with Alpha. Customers can
|
||
|
develop and run applications on today's leadership VAX
|
||
|
and DECsystem products with the assurance that they
|
||
|
easily will be able to add Alpha systems into their
|
||
|
computing environments. Alpha systems will provide data,
|
||
|
image, source code, and user interface compatibility with
|
||
|
VAX systems running open VMS and DECsystem products
|
||
|
running DEC OSF/1. Alpha systems will network with these
|
||
|
products to share information and processing tasks, and
|
||
|
will work in VAXcluster configurations. Common buses for
|
||
|
VAX, DECsystem, and Alpha systems means that many
|
||
|
peripherals will be able to be used between systems.
|
||
|
|
||
|
o A complete portfolio of service programs for users and
|
||
|
other vendors who incorporate Alpha technology into their
|
||
|
products. Digital will support customers with services
|
||
|
ranging from consulting to training, systems management,
|
||
|
and integration and upgrade services. Digital will
|
||
|
support vendors during product design and implementation.
|
||
|
Through OEMs, VARs, or direct distribution channels,
|
||
|
Digital also will provide services for vendors'
|
||
|
Alpha-based products.
|
||
|
|
||
|
Alpha will extend the ability of Digital's current software
|
||
|
systems environment to address major business opportunities.
|
||
|
Supercomputer or large mainframe applications -- seismic data
|
||
|
analysis, econometric forecasting, molecular modeling,
|
||
|
engineering design verification, and many others -- will be able
|
||
|
to run on Alpha at a fraction of traditional mainframe price per
|
||
|
unit of performance. Alpha will expand the market for networks
|
||
|
of high performance distributed production systems and servers,
|
||
|
replacing mainframes. The powerful new single-chip Alpha
|
||
|
microprocessor will open new markets for embedded OEM
|
||
|
applications and board-level products. Alpha will provide the
|
||
|
power for emerging personal use applications that are beyond the
|
||
|
capability of most of today's PCs, such as voice and video,
|
||
|
visualization systems, imaging, and artificial intelligence.
|
||
|
With Digital's NAS (Network Application Support), customers will
|
||
|
have the flexibility to integrate leading-edge, Alpha-based
|
||
|
applications with their current applications environment.
|
||
|
"Alpha is based on the expertise Digital has gained from 35
|
||
|
years of providing systems and networking based on leadership
|
||
|
architectural design," noted Robert B.Palmer, Digital's vice
|
||
|
president of manufacturing. "In addition, Digital has 15 years
|
||
|
of experience in designing and delivering chip technology,
|
||
|
including leading-edge CMOS technology. We have some of the
|
||
|
industry's most advanced fabrication technology, and most
|
||
|
experienced chip design teams using a leading-edge suite of CAD
|
||
|
tools, involved in delivering the world's fastest RISC
|
||
|
microprocessor."
|
||
|
|
||
|
DEC, DECsystem, DECWORLD, ULTRIX, VAX, VAXcluster and VMS are trademarks of
|
||
|
Digital Equipment Corporation.
|
||
|
OSF/1 is a trademark of Open Software Foundation, Inc.
|
||
|
UNIX is a registered trademark of UNIX System Laboratories, Inc.
|
||
|
Hewlett-Packard is a registered trademark of Hewlett-Packard Company.
|
||
|
IBM is a registered trademark of International Business Machines Corporation.
|
||
|
SUN is a registered trademark of Sun Microsystems, Inc.
|
||
|
-------------------------------------------------------------------------------
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [9]: "FOR THE PEOPLE"
|
||
|
News of Interest from BBS's Around the Country
|
||
|
Edited By: Mercenary
|
||
|
-------------------------------------------------------------------------------
|
||
|
IIRG NOTE: The following message has appeared on Pirate Boards across the
|
||
|
country, The English is a little frayed but I think the message
|
||
|
comes through Clear. We've Deleted the two American Board Numbers
|
||
|
to protect their anonymity.
|
||
|
-------------------------------------------------------------------------------
|
||
|
_____
|
||
|
/ ___/ _______________ __ _________
|
||
|
/ /__ /\ /\\ __ \ __/\ __ \ / \/ __/ ___/
|
||
|
\___ \ / // // ___/_/ / _/ / /\ \_/ \__ \
|
||
|
____/ // // // / / /___/ /\ \ / / / /_____/ /
|
||
|
\____/ \___/ \/ \____/\/ \/ \/ \/_______/
|
||
|
_____
|
||
|
/ ___/____ __ ____ _____ _____
|
||
|
/ /_ / __// \/ __// ___//\ ___/
|
||
|
/ /\ \/ _/ / /\ \_/ \__ \/ /__ \
|
||
|
/ /_/ / /__/ / / /______/ / /__/ /
|
||
|
\____/\____// \/___/\___/\/\___/
|
||
|
____
|
||
|
/ __ \ ____ ____ __ ____ __ ____
|
||
|
/ /_/ // __/ / __// \ / __/ / \ / __/
|
||
|
/ ____// / / _/ / /\ \/ /\ \/ /\ \/ _/
|
||
|
/ / / /___ / /__/ / / / //\\ \/ / / /___
|
||
|
\/ O \____/ O \____// \/\___/ \/ \/\____/
|
||
|
|
||
|
|
||
|
VIDEO GAME PIRACY TEXT PART #3 !
|
||
|
|
||
|
|
||
|
The Video Game Piracy has begun, call the bulletin boards for
|
||
|
Super Famiocm/Nes, Megadrive/Genesis, PC Engine/Turbo Express
|
||
|
Software!.
|
||
|
|
||
|
S.S.M.S. Its an Alpha Flight again but it runs in Germany not in
|
||
|
the USA.. There is only an Amiga Section and this great
|
||
|
new Conference called `SUPER NiNTENDO / FAMiKOM'...
|
||
|
The BBS runs by SAiNTZ...
|
||
|
|
||
|
ULTRABOX This one is one of the biggest and oldest Crack Houses
|
||
|
in Germany.. It runs by ULTRA and you can find there a
|
||
|
Amiga and again this great Console Conference...
|
||
|
|
||
|
|
||
|
WORLD OF MIRAGE On this bbs you can order The Super Magic drve
|
||
|
in the USA and start to exchange file !
|
||
|
|
||
|
TOXIC INSULT An indy BBS in search of quality users for support.
|
||
|
Console conference is open and files should be pouring
|
||
|
in real soon.
|
||
|
|
||
|
|
||
|
>>>>>> ALL BOARD NUMBERS WITH A VIDEO GAME PIRACY CONF! <<<<<<
|
||
|
|
||
|
|
||
|
THUNDERDOME AFLHQ +1 408-263-9136 Amiga, Consoles
|
||
|
|
||
|
TREA.ISLAND IPHQ +44 992-465soon Amiga, Consoles
|
||
|
|
||
|
ULT.DREAM IPHQ +44 222-495919 Amiga, Consoles
|
||
|
|
||
|
LIVING HELL NEMHQ +44 386-765550 Amiga, Consoles
|
||
|
|
||
|
THE OASIS CSLHQ +44 386-553876 Amiga, Consoles
|
||
|
|
||
|
S.S.M.S. AFLHQ +49 303-339471 Amiga, Consoles
|
||
|
|
||
|
ULTRABOX INDI. +49 303-943531 Amiga, Consoles
|
||
|
|
||
|
TOXIC INSULT INDI. +1 [IIRG DELETE] Amiga, Consoles
|
||
|
|
||
|
WORLD OF MIRAGE USA +1 [IIRG DELETE] Amiga/IBM Consoles
|
||
|
|
||
|
|
||
|
Well hope this has been useful to all you console pirates. If you are
|
||
|
Not and want to be you will need some sort of copying device, which
|
||
|
Executioner/IP can supply you with, grab the files or call Ult Dream
|
||
|
to find out more or to place an order!.
|
||
|
|
||
|
Credits
|
||
|
~~~~~~~
|
||
|
|
||
|
This Text File : {Mr.SCARFACE} of CRYSTAL!
|
||
|
Ansi : {Mr.SCARFACE} of CRYSTAL!
|
||
|
Game Copiers : EXECUTIONER of INF.PERFECTION!
|
||
|
Modification : SAiNTZ of ALPHA FLiGHT
|
||
|
Further mods.: Zeke of T.I
|
||
|
|
||
|
Big hi's to all the Sysop's and Co-sysops who run the Boards above.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
CYBERTEK: The Cyberpunk Technical Journal
|
||
|
P.O. Box 64, Brewster, NY 10509
|
||
|
|
||
|
What is CYBERTEK?
|
||
|
by Thomas Icom, editor
|
||
|
|
||
|
CYBERTEK is The Cyberpunk Technical Journal. Our first issue was printed
|
||
|
in April, 1990. We publish an issue once every two months. CYBERTEK is an
|
||
|
informational and discussion forum for technological enthusiasts/survivalists/
|
||
|
activists, and others whose desire is to maximize their freedom and be able to
|
||
|
function as free citizens in a totalitarian society.
|
||
|
CYBERTEK was created because within the past years, The United States,
|
||
|
once the model of freedom, has slid downward to become more and more of a
|
||
|
totalitarian state. With this downward slide has been the withholding from
|
||
|
the people of certain knowledge and information which is essential to have if
|
||
|
they desire to exist as free citizens in a free country. An ignorant populace
|
||
|
is very easy for a tyrant to keep down, but people who are knowledgeable in
|
||
|
the ways and means to live independently and fight totalitarianism are
|
||
|
impossible for despotic state to have control over. As James Madison, the
|
||
|
father of the U.S. Constitution, once said, "A people to mean to be their own
|
||
|
governors must arm themselves with the power knowledge gives."
|
||
|
CYBERTEK's primary objective is the dissemination of easy to understand by
|
||
|
the average person technological survival information. This is also better
|
||
|
known in Cyberpunk literature as "street tech". This covers, but is not
|
||
|
limited to, COMPUTERS, ELECTRONICS, PHONES, ENERGY, WEAPONS, CHEMISTRY,
|
||
|
SECURITY, FINANCIAL, and HEALTH/MEDICAL. Knowledge of these topics is
|
||
|
necessary for anyone seeking self-reliance and personal independence in
|
||
|
today's world; as well as for preparing for any "unforeseen circumstances".
|
||
|
The secondary objective of CYBERTEK is the discussion of political,
|
||
|
libertarian, populist, alternative & underground culture and opinions. It is
|
||
|
our aim to allow people to exercise their First Amendment right to freedom of
|
||
|
speech and discuss their opinions and views. In this respect, if we print a
|
||
|
submission, it will be printed unedited, uncensored, and in it's entirety.
|
||
|
Unlike the majority of the traditional mass newsmedia, CYBERTEK takes the bill
|
||
|
of rights seriously, and will prove it.
|
||
|
CYBERTEK is published for educational purposes only under The First
|
||
|
Amendment of The United States Constitution. The subject matter, while
|
||
|
controversial in the eyes of some, is 100% legal to own in the United States.
|
||
|
Although some of the information presented in CYBERTEK could be used in an
|
||
|
illegal manner, no illegal acts are suggested or implied.
|
||
|
Subscriptions to CYBERTEK are $15 a year for six issues. Sample issues
|
||
|
are $2.50. Payment is by check, M/O (recommended), or by cash (not
|
||
|
recommended. do at own risk). You can send payment to the address at the top
|
||
|
of this textfile.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
IIRG NOTE: The following file has been circulating with the USA BUST text
|
||
|
files, We can neither Confirm nor deny its Authenticity and
|
||
|
supply it here for your Judgement.
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
>From : Static #1
|
||
|
To : All
|
||
|
Subject: Bust
|
||
|
Date : 01-31-92 00:47
|
||
|
|
||
|
We were busted today, by some Secret Service guys and some FBI people..
|
||
|
This is no bull shit, they were here and made me delete everything I had and
|
||
|
get rid of all my disks or they were going to take my hardware with them.
|
||
|
|
||
|
There is no hidden section anywhere on this system, from now on everything is
|
||
|
Public Domain.. IE: Gifs,mods, stuff like that. When I get done cleaning the
|
||
|
place of all my disks I will re-do the system to make the sections look right.
|
||
|
|
||
|
They have my user log, so change your passwords. I am not helping them bust
|
||
|
other boards or narcing on anyone, this is our deal and we will pay the price.
|
||
|
|
||
|
I hope that all of you continue to call here, I will try to run the board the
|
||
|
best I can.. We will go multi node soon as things settle down. And we will run
|
||
|
a large gif section as they told me that was ok to do.
|
||
|
|
||
|
Static
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
THE MICHELANGELO VIRUS
|
||
|
Prepared by Charles Rutstein
|
||
|
Research Center
|
||
|
National Computer Security Association
|
||
|
3631 Jenifer St. NW
|
||
|
Washington, DC 20015
|
||
|
Voice: 202-364-8252 Fax: 202-364-1320 BBS: 202-364-1304
|
||
|
|
||
|
This document is copyright (c) 1992 by the National Computer Security
|
||
|
Association. Call 202-364-8252 to learn more about viruses and what you
|
||
|
can do to fight them.
|
||
|
|
||
|
|
||
|
The Michelangelo virus is based on the Stoned virus replication
|
||
|
process and is extremely destructive. It was only discovered in
|
||
|
mid-1991, but it has spread extremely rapidly across the United
|
||
|
States. Recently, several major companies have shipped products
|
||
|
infected with the virus. Among these are Leading Edge Products,
|
||
|
who shipped up to 6000 infected machines [San Francisco
|
||
|
Chronicle, 25 Jan 1992], and DaVinci Systems, who shipped about
|
||
|
900 infected demo disks to customers and resellers [Virus-L Digest,
|
||
|
Feb 4 1992].
|
||
|
|
||
|
One of the major reasons for the growth in the number of
|
||
|
Michelangelo infections is the fact that the virus is new and is
|
||
|
undetectable by recently outdated scanners. Additionally, it is
|
||
|
based on the same efficient replication process found in the Stoned
|
||
|
virus, which is the most common virus in the United States today.
|
||
|
Finally, the virus presents no messages to the user and so masks its
|
||
|
presence until triggered.
|
||
|
|
||
|
On March 6 of any year the virus will overwrite the hard disk with
|
||
|
random information found in memory. The portions of the disk
|
||
|
overwritten include the FAT (File Allocation Table) and Master
|
||
|
Boot Record (MBR). Recovery from the damage caused by the
|
||
|
virus is extremely difficult, if not impossible. For this reason,
|
||
|
users should remember to keep updated backups and to check their
|
||
|
systems for the presence of the virus before March 6.
|
||
|
|
||
|
The virus infects the boot sectors of floppy disks and the master
|
||
|
boot records of hard disks. When a system is booted from an
|
||
|
infected disk, the virus will place itself into memory and infect the
|
||
|
hard disk (if not already infected). The virus occupies about 2K
|
||
|
(2048 bytes) of memory while resident, decreasing the available
|
||
|
memory reported by DOS accordingly. While resident in memory,
|
||
|
any action which accesses a floppy disk (via interrupt 13h) will
|
||
|
cause that disk to become infected. The virus places itself in the
|
||
|
last sector of the area on the diskette reserved for the root directory
|
||
|
entries. Therefore, a disk with a full (or nearly full) root directory
|
||
|
may experience an immediate data loss. Similarly, data loss can
|
||
|
occur on an infected hard disk when the virus moves the original
|
||
|
master boot record to a new location. Some reports indicate that
|
||
|
the virus mis-interprets the Disk Parameter Block of 1.44 MB
|
||
|
floppies, causing them to return the message "Invalid Media" when
|
||
|
accessed again. Note that every floppy disk has a boot sector,
|
||
|
regardless of whether or not it is a bootable disk. Therefore, any
|
||
|
floppy disk can be a carrier of the virus.
|
||
|
|
||
|
Michelangelo is relatively easy to remove. Before performing any
|
||
|
disinfection, cold boot the machine with a clean, write protected
|
||
|
diskette. To disinfect floppies, use the DOS "SYS" command to
|
||
|
place a new boot sector on the disk. Syntax is "SYS X:", where
|
||
|
X is the drive containing the infected diskette. The only easy way
|
||
|
to remove a hard disk infection with DOS is to use the DOS 5.0
|
||
|
FDISK program. Use only DOS 5.0 for this procedure; all other
|
||
|
versions may destroy data! Type "FDISK /MBR" to remove the
|
||
|
virus by rebuilding the MBR.
|
||
|
|
||
|
All major recent anti-virus packages should be able to reliably
|
||
|
remove the virus. Two shareware products available on the NCSA
|
||
|
BBS (202-364-1304 8/n/1) are SCAN/CLEAN from McAfee
|
||
|
Associates and F-Prot from FRISK software. With Clean, type
|
||
|
"CLEAN X: [mich]", where X is the infected drive. With F-Prot,
|
||
|
type "F-Prot /Auto /Disinf X:", where X is the infected drive. Call
|
||
|
NCSA at 202-364-8252 for free help in removing this and any
|
||
|
infection.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
IIRG NOTE: The following Two Messages illustrate the downfall of Genhis Khan,
|
||
|
a Dayton,Ohio Area Hacker. The first message shows the root of the
|
||
|
problem, the second shows the result.
|
||
|
-------------------------------------------------------------------------------
|
||
|
When : 2/6/92
|
||
|
Subject: Public Domain...
|
||
|
To : All
|
||
|
>From : Genghis Khan
|
||
|
|
||
|
OK,
|
||
|
|
||
|
In Dayton Ohio we have a little problem. A few months ago,
|
||
|
someone pulled up this pd sysop's credit report, who was getting on our nerves
|
||
|
with his anti-virus shit. Anyways.. over $7000 worth of charges were put on
|
||
|
his credit cards. Some shit was sent to his house. But still I think it's
|
||
|
$6300 is still unaccounted for.
|
||
|
From there on, the PD has pretty much declared war on the underground.
|
||
|
They have formed a group called LPACHUL with the main constituant being Hells
|
||
|
Furrie. Hells Furrie gets information from narcs in the underground, and also
|
||
|
get's people to try to infiltrate the underground boards. Then they capture
|
||
|
everything they see and put it in these newsletters.
|
||
|
I've locked out probably 10-15 people who could be narcs. I know a lot
|
||
|
of other people have locked out a lot more also. I'm trying to run a not so
|
||
|
super elite board. But one with Phreak Klass, Hack Klass and trying to teach
|
||
|
the 'lamers' how to get around and not look like idiots.
|
||
|
What I'm asking is this. We've done all kinds of shit. We played up
|
||
|
and made them look like idiots by creating a group called Smells Furrie and
|
||
|
made newsletters like Hells Furries' but with everythign turned around. We
|
||
|
made annoyance dialers that would call the sysops home fone number. We made
|
||
|
programs that plain made fun of the pd. And passed it around the pd. We had
|
||
|
the main guy's fone disconnected (Al Lee). He got it reconnected the next day.
|
||
|
We've tryed a lot of shit. But they still keep coming. And each newsletter
|
||
|
they put out exposes more and more about the underground..
|
||
|
So. We tryed to control it, but I think their views maybe nationwide.
|
||
|
That they might want to take down h/p and warez boards around the country. If
|
||
|
we don't stop them now, they may start telling other people in other towns to
|
||
|
try the same thing.
|
||
|
This is a big problem. So I'm asking for EVERYONE's help. If you can
|
||
|
infiltrate their boards, and trash/crash them. Send shit to their house.
|
||
|
Cause general Anarchy we can win this war. It's getting out of control. And I
|
||
|
think that WE NEED TO STOP IT!
|
||
|
So.. If you guys would like to terrorize, here is an address.
|
||
|
|
||
|
[IIRG Edited]
|
||
|
[IIRG Edited]
|
||
|
Dayton Ohio 45414
|
||
|
Home Fone Number [IIRG Edited]
|
||
|
Data Fone Number [IIRG Edited]
|
||
|
|
||
|
His board is called [IIRG Edited]. He is butt buddies with John
|
||
|
McAffee and sends every file he gets to McAfee to get it checked out and shit.
|
||
|
He passes around all them damn virus scanners and cleaners and shit, which make
|
||
|
it hard to trash boards.
|
||
|
|
||
|
|
||
|
|
||
|
Get this guy first. I'll have more address and fone numbers soon!
|
||
|
|
||
|
Genghis Khan
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
When : 2/14/92
|
||
|
Subject: BUST
|
||
|
To : All
|
||
|
>From : [IIRG Edited]
|
||
|
|
||
|
Well, tonight at around 10:00 I got a call from my friend Genghis Khan, yes
|
||
|
the one who is on my board and always posting on this net. It turns out that
|
||
|
today, he recieved a visit from the Secret Service and the Sheriif. They
|
||
|
confiscated about everything, his computer, all his disks, papers, printer, and
|
||
|
everything else. He was busted for hacking and using the 1-800-733-5000
|
||
|
extender and for pulling CBI's. It turns out that the head PD guy that we
|
||
|
have been telling all of you about, reported him and there was also a narc (who
|
||
|
we are almost positive was THE ENFORCER a.k.a THE PREVENTOR a.ka. Dave Rowe)
|
||
|
|
||
|
I don;t have much time right now to go into further detail, but i will post
|
||
|
more tommorrow and when i talk to him again. Along with Genghis, TERM INAL,
|
||
|
was also busted, and possibly others. IF YOU RUN A SYSTEM OR ARE ON A SYSTEM
|
||
|
THAT HAS EITHER OF THESE USERS, I WOULD RECOMEND DELETING THEIR ACCOUNTS,
|
||
|
BECAUSE THEY WILL NOT BE CALLING ANYMORE. Please let people know that 733's
|
||
|
and CBI have busted them, and play it safe.
|
||
|
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
Section [10]: IIRG Distribution Sites
|
||
|
|
||
|
IIRG World HQ: Dark Shadows
|
||
|
19.2/9600 Baud HST
|
||
|
24 Hours a Day
|
||
|
1.2 Gigs Online
|
||
|
(203)-628-9660
|
||
|
|
||
|
|
||
|
IIRG Distribution Site One: Restaurant at the End of the Universe
|
||
|
2400/1200 Baud (3 Nodes!!)
|
||
|
24 hours a day
|
||
|
130 Megs of Files
|
||
|
(203)567-8903 2 Nodes 2400
|
||
|
(203)567-4808 1 Node 1200
|
||
|
|
||
|
IIRG Distribution Site Two: The Generic Access BBS
|
||
|
INC New England Regional District HQs
|
||
|
IUD New England Regional District HQs
|
||
|
1.2 gigs online
|
||
|
USR Dual Standard HST
|
||
|
NO Ratios
|
||
|
(508) 281-3961
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Section [11]: Phantasy Distribution Sites
|
||
|
|
||
|
Phantasy's Distribution Site's are continually growing,we apologize if you
|
||
|
called a board and didn't find the Mag. Network Distribution Sites will
|
||
|
have the Issues first, we suggest calling one of them if a problem does
|
||
|
arise.
|
||
|
|
||
|
|
||
|
1. Lightning Systems
|
||
|
19,200-1200 BAUD, 24 hours a day
|
||
|
(414) 363-4282
|
||
|
|
||
|
2. Sycamore Elite
|
||
|
19,200-1200 Baud HST, 24 Hours a day
|
||
|
(815) 895-5573
|
||
|
|
||
|
3. The Works BBS at (617-861-8976)
|
||
|
Largest Text Files BBS in the world, 3500+ text files online.
|
||
|
2400-300 Baud, 24 Hours a day
|
||
|
|
||
|
4. Pipers Pit BBS
|
||
|
19,200-9600 HST ONLY!!
|
||
|
24 Hours a Day
|
||
|
THG DISTRO SITE
|
||
|
(203)229-3251
|
||
|
|
||
|
5. Blitzkrieg BBS TAP Magazine
|
||
|
(502)-499-8933 P.O. BOX 20264
|
||
|
Home of TAP MAgazine Louisville,KY. 40250-0264
|
||
|
|
||
|
6. The Dickinson Nightlight
|
||
|
(713)-337-1452
|
||
|
Der WeltanSchauung Distro Site (World View Magazine)
|
||
|
Phantasy Distro Site
|
||
|
|
||
|
7. Lucid Dreams
|
||
|
(713)-522-0709
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
PHANTASY(C) IIRG 1991,1992
|
||
|
May Odin Guide Your Way!
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
|